Professional Documents
Culture Documents
Tutorial:_______________________________
KOLEJ MATRIKULASI LABUAN ( 2019/2020)
PART A (55 marks)
(2m)
2) a) i) Give the definition of the type of network and the owner of the network. (4m)
2) a) ii) Today, billions of home and business users around the world access a variety of services
on the Internet using computers and mobile devices. Define the Internet.
The Internet is a worldwide collection of networks that links millions of businesses,
government agencies, educational institutions, and individual.
(2m)
a) iii) List two services found in the Internet.
1) e-mail
2) social media
(2m)
3) instant messanging
4) Video and Audio streaming services 1
Name :_______________________________ PRE PSPM COMPUTER SCIENCE SUBJECT (SC015)
Tutorial:_______________________________
KOLEJ MATRIKULASI LABUAN ( 2019/2020)
2) b) i) Mira Filjah intend to start an online business from home. What are 2 network equipments
requires for her to communicate with customers and vendors assuming that he had
subscribed to Telekom Malaysia Berhad as the ISP.
1) network interface card 4) router
2) digital modem 5) wireless access point (WAP)
3) switch
(2m)
ii) Give 2 advantages of using a networking for her to sustain his business.
increase sales marketing easy to make payment/transfer fund
as medium to make advertisement (4m)
iii) There are two (2) types of transmission media network. State and give description on both
transmission media network.
wired - using physical cable to transmit data
wireless - without physical cable to transmit data (2m)
iv) Answer the questions below:
i) Define a Network Architecture
the design/layout of computer, devices and media in a network.
(2m)
ii) Network architectures are always classified into two categories: clients/server and
peer-to-peer. Give the 2 roles of server on client/server network.
1) provide service to others client such as hardware and software
2) provide central security to each device connected on the network
(2m)
3) a) We use computer in our daily life, but it is also crucial to protect it from any lose, damage
and misuse. We do not want strangers reading our email without permission, using our
computer to attack other systems, sending forged e-mail from our computer or examining
personal information stored on our computer.
i) State the different between Computer Ethics and Netiquettes.
Computer Ethics - moral guideline that govern the use of computers and
information system.
Netiquettes - code of acceptable behaviours users should follow while on(2m) internet
ii) Describe the term Information Privacy.
refer to the right of individuals and companies to deny or restrict the collection,
use and dissemination of information about them.
(2m)
iii) State two (2) examples of wrong or unethical use of computer that might bring bad
2) People who use effect to the environment.
computers never really print unnecessary large amounts of files, emails or things from the internet which
turn off the device 1)
wastes paper and harms trees. (2m)
which wastes electricity
iv)
that could have been Explain the importance of intellectual property right for a person such as a fashion
saved and reduce designer, a song composer or a novel writer.
the amount of burning 1) form an essential part of marketing, branding (2m)
of fossil
2) Ensuring the availability of the original products.
3) Provides incentive to the individual for new creations.
2
4) Ensuring the material reward for intellectual property.
5) Providing due recognition to the creators and inventors.
Name :_______________________________ PRE PSPM COMPUTER SCIENCE SUBJECT (SC015)
Tutorial:_______________________________
KOLEJ MATRIKULASI LABUAN ( 2019/2020)
b)
(i)What is the given coding schemes stand for:
(4m)
Coding scheme Term stand for
ASCII American Standard Code for Information Interchange.
EBCDIC
Extended binary coded decimal interchange code
4)a) The system development life cycle (SDLC) in systems engineering, information systems and
software engineering, is a process of creating or altering information systems, and the models
and methodologies that people use to develop these systems.
Below are the steps in System Development:
(X) (Z)
i) There are two (2) main activities in X. List one (1) of them. (1m)
1) conduct a preliminary investigation.
_______________________________________________________________
2) perform detailed analysis.
ii) The purpose of the Z phase is to provide ongoing assistance for an information system
and its users after the system is implemented. List one (1) major activity in this phase.
1) develop program 3) train users (1m)
2) install and test 4) convert to the new system
_______________________________________________________________
iii) Implementation phase involved train user activity. It shows to users exactly how they
will use the new hardware and software in the system. Give one (1) advantage of Web-
based training. (2m)
1) A learner can take the course at his convenience without any expense of time or cost
_______________________________________________________________
2) save organizations instructor costs, costs of arranging training and travel.
_______________________________________________________________
3
Name :_______________________________ PRE PSPM COMPUTER SCIENCE SUBJECT (SC015)
Tutorial:_______________________________
KOLEJ MATRIKULASI LABUAN ( 2019/2020)
iv) State two (2) conversion strategies user can use if they decide to convert to new system.
1) direct conversion 4) pilot conversion (2m)
_______________________________________________________________
2) parallel conversion
_______________________________________________________________
3) phase conversion
4)b) Programming paradigm is a general framework or model for designing and organizing program,
which is categorized according to the approach used to solve problem.
i) List one (1) programming paradigm that you know. (1m)
1) procedural 3) logic
___________________________________________________________________
2) object oriented
ii) Identify the suitable translator used by these programming language. (1m)
interpreter or compiler
1) Information processing cycle is a sequence of events in a information system. Identify TWO (2)
activities involved in each event for the Auto Pay Parking Machine.
(4m)
a) Steps Activities
Input 1) The machine accept data from parking ticket that inserted by driver.
2) The machine accept amount of money that inserted by driver.
Storage 1) The machine keep start time entry until check out parking.
2) The machine store date and day
b) Encik Amirul is having his dinner with his family at KFC restaurant. He ordered one set of
Combo A, RM 10102 one set of Combo C, RM 100012 and 2 set of Happy Meals for the kids RM
10012. He paid with a piece of RM 6416 note, how much was the balance to be returned to
Encik Amirul (in hexadecimal) ?
using calculator :
combo A = 10 RM64 base 16 = 100 base 10
combo B = 17 so, RM 100 - RM 45
combo C = 9 x 2 set = RM 55 base 10
= 18 (4 m)
covert to hexadecimal,
Total = 45 base 10 = RM 37 base 16
4
Name :_______________________________ PRE PSPM COMPUTER SCIENCE SUBJECT (SC015)
Tutorial:_______________________________
KOLEJ MATRIKULASI LABUAN ( 2019/2020)
2) a)i) Based on the area of coverage, determine the type of network and its advantage.
(4 m)
The world
Wide Area 1) share informations/files over larger area
Network 2) message can be sent very quickly to anyone else
on the network
Advantages 1) can let a person to communicate with people of the world through the social
media.
2) students and lecturer can communicate each other through WhatsApp.
Disadvantages 1) some students will spend too much of time through the internet, are likely to
neglect to their study.
2) Computer viruses may easily spread in computer networks and virus can
spread itself electronically
Intranet Extranet
Advantages 1) Security from outside users 1) Work is done quickly as compared to past
2) Quick access to information manual systems.
3) Increase in productivity 2) Information can be modified, updated and
Disadvantages changed immediately on an extranet
1) Security issues from Unauthorized
access. 1) costly to apply and maintain within an
2) Less face to face communication organization.
3) High Cost of training (time, 2) lack of face to face meeting between employees,
manpower, budget) clients and organization
5
Name :_______________________________ PRE PSPM COMPUTER SCIENCE SUBJECT (SC015)
Tutorial:_______________________________
KOLEJ MATRIKULASI LABUAN ( 2019/2020)
i) Identify two (2) netiquette rule that had not been applied in the conversation.
1) be polite
2) use an appropriate language
3) cannot use capital letter (2 m)
ii) Respecting the privacy of other people is one of the rule need to be respected. List
two (2) elements of privacy related here.
1) personal detail (identity card)
2) pay salary
3) phone number
4) credit card/debit number/password (2 m)
iii) Why is it easier to show your feeling in a social media conversation?
it is easier by using emoji and emoticon to epress emotion/feeling because it use as
a short hand code in communication instead of text.
(2 m)
b) ASCII represents 8 bits per character whereas Unicode represents double of bits in ASCII per
character.
i) Calculate number of characters can be represented for 25MB in Unicode scheme?
so, in Unicode
MB ---> Byte = 25 x 1024 = 25 600 / 2 (2 m)
= 25 600 byte = 12 800 characters
ii) Based on the statement given in question 3, state one (1) advantage and one (1)
disadvantage of Unicode.
(4 m)
Advantage Disadvantage
can represent 65 536 characters, more used large memory to store data /
characters can represent for all the information
world’s written languages
6
Name :_______________________________ PRE PSPM COMPUTER SCIENCE SUBJECT (SC015)
Tutorial:_______________________________
KOLEJ MATRIKULASI LABUAN ( 2019/2020)
c) There are 2 balls in a box with two different colors (red and blue). Three children (C1, C2, and
C3) will be asking to take one ball from the box and the color of ball taken will be recorded in
a worksheet. The children will win this game if:
i) Draw the logic circuit to represent the win situation given in the statement above.
(4m)
ii) Write Boolean expression the above question
((C1 XOR C2 XORC3) + (C1 AND C2) ) . (NOT C1)
(1m)
iii) How many possibilities to win the game.
(2m)
(3m)
7
Name :_______________________________ PRE PSPM COMPUTER SCIENCE SUBJECT (SC015)
Tutorial:_______________________________
KOLEJ MATRIKULASI LABUAN ( 2019/2020)
f) Aidil sets up a Small Office Home Office (SOHO) company. He intends to establish a network.
Suggest which network architecture he should choose. Justify your answer.
Peer-to-peer network because SOHO company is commonly use fewer than
10 devices connected together on network. (3m)
4)a) Identify the step of the System Development Life Cycle (SDLC) based on the given activity.
(5m)
Steps in SDLC
4)b) A programming language is a computer language engineered to create a standard form of commands. These
commands can be interpreted into a code understood by a machine. Programs are created through
programming languages to control the behavior and output of a machine through accurate algorithms,
similar to the human communication process.
https://www.techopedia.com/definition/24815/programming-language
i) Give one (1) type of programming language. (1m)
1) low level language
2) high level language
ii) What is meant by the bold sentence; “These commands can be interpreted into a code
understood by a machine.’’ in the above statement.
this is refer to this type programming langguage used interpreter as translator (2m)
to translate high level language into machine code. Interpreter converts one statement /
instruction at a time (line-by-line) and immediately execute that code.
Continues translating the program until the first error is met, in which case it stops. Hence
locating error is easy.