You are on page 1of 17
JABATAN PENDIDIKAN NEGERI TERENGGANU. SN STPM 2022 {anna PEPERIKSAAN PERCUBAAN SEMESTER 1 INFORMATION AND COMMUNICATIONS TECHNOLOGY a Section A [35 marks} Answer all question in this section 1) Firewall ia device, ora piece of software thts placed between your computer and the rest ofthe network, (where the hackers are!) 8) Explain how’a firewall ean protect the whole LAN fiom hackers out on the internet [4 marks] 'b) Deaw te diagram based on your explanations in (3). [3 masks} 2) Rendering images has uses in architecture, video games, simulators, movie ot TV visual cts, and design visualization, Bach employing a diferent balance of features nd techniques. 8) What is mean by rendering images? [2 marks} +) Give four examples of feature of rendering images. [marks] 3) The processing unit cones all activities within the system. For every instruction, the control unit repeats a st of four basi operations called the machine cyl 8) Draw a diagram oftmachineeyele [3 marks) ') Explain 4 basi operations in machine eyele [émarks) Dy a. Define ethis and law. [2 marks} b, State? similarities between ethies and laws. [2 marks) ©, Explain 2 dffrenoes between ethic and laws. [2 marks} 2 jam A [38 markah] Jawa semua soalan baagian ini “Firewall ‘alah pesmi ata satu prisian yang diltakkan di antara Komputer dan ‘solueuhrangkaian, (i mana penggodam berada). 18) Terangken bagaimana ‘Trewall” boleh molindungi keseluruhan LAN darpada penggodan di Internet? [4 marks] +b) Lokiskan rajah berdasarkan penerangan anda di (2) [3 markah] >. Pemaparanimej mempunyai kegunsan dalam seni bina, permainan video, simulator, filem atau kesan visu TV dan visualisas eka bentuk. Masing-masing menggunakan ‘keseimibangan cir dan teknik yang berbeza. 18) Apakah yang dimaksudkan dengan pemaparan ime}? [2 marks) 1b) Beran empatcontoh cir pemaparan ime? [4 marks Unit pemprosesan mengawal semua sktiviti dalam sistem. Untuk setap arn, unit kawalan mengulangi set empat operas asas yang dipangailkitaran mesin. 4) Lokiskan gumtarajh ktaran mesin [3 marks] 1b) Terangkan 4 opeasi ass dalam kitaran mesin [a markahy ‘4. Definisikan etka dan undang-undang. (2 mariah} '.Nyataken2 persamaan antaraetika dan undang-undang [2 markah} c. ‘Terangka 3 perbezaanantara etka dan undang-undang {2 markah] 5) (e) Explain whats meant by computer network (Ut marks} (b) State one difference between pee to pee and client server network [marks] (©) State two advantags of using computer network in daily routines. State one example for each ofthe advsntage mentioned [4 macs) (4) explain the difernees between intemet, intranet and extranet, [marks] 4 5)(@) Terangkan apakah yang dimaksndkan dengan rangksian komputer. (1 marksh] (6) Nyatakan satu perbezaanantara pee to peer dan rangkaian pelayenpelengean [1 marks (© Nyatakan dua kebaitan menggunskon rangkaion komputer dalam rutin brian, Nyatakan satu conteh bagi setigpkelebihan yang disebutkan, (4 markah} (4) terangean perbezaan ana inteme, intranet dan extranet [3 markab] SECTION B [15 marks} Answer ome question in this section (6) A smart phone has ICT convergence features (@) Define the concept oF ICT convergence 2 marks} (6) State tnee convergence functions which are required in smart phone {3 marks] (6) State one technology that suppors each of your answer in (b) marks] (@ State the examples of devies in sman phone which have similar function withthe computer system interms of input, process, output and storage [4 marks] (©) Explain the process involved in capturing, editing, and sharing photo using smart ‘hone in terms of rput, process and output [3 marks] LJ 7), The Malaysian Government trough the Royal Malaysian Police (PDRM) and also assisted by the Malaysian Aimed Forces (ATM) has anounced tht it will se done sevies to increas the people's level of complizge with the Movement Congo Order (MOC) which isin force 4) State 2 input end ouput vies and their Funetions ona drone. [4 marks} 8) State photography angle techni commonly used a videogtaphy and photography and draw the esl of that ttnigus, [3 marks} ©) Apart rom fining and enforcement, dseribe 4 aeas hat ae inereasingly using tis one faciiy [8 marks} 6 Bahagian B [15 markab} Java satu san di babagian in 6, Telefon pintar memuryai csi penumpuan ICT. 1 (6) Takin konseppenumpuan ICT. [2 mariah] (b) Nyatakan tiga fangs penurypuan yang eiperiakan dalam telefon pina. [3 mark) (© Nyatakan sat tcnclog’ yang menyokong stip jawapan anda db) [3 maskah] (4) Nyaa cota porn dalam leon pntar yang mempunys ines yang sama dengan sistem Komputer dari si inp, roses ouput dan storan [4 maskah] (6) Terangkan proses yeng teribat dalam menangkap, mengedi an berkongs foto rmenggunakan telefn pinta dari seg input, proses dan output [8 marks] ‘Kerajan Malaysia illu Polis Diraja Malaysia PDRM) dan tar dibanu oleh Angkatan Tenita Malaysia (ATM) telah mengumumkan akan menggunakan kbidmat dron bagi rmeningkatkan tap hepstian raat kepada Perintah Kawalan Pergeratan (PKP) yang sedang, orkut kus, |. Nyaakan 2 pera input dan ouput dan Fnsinye pada sescbash don. [4 maka) Nyala 1 lod aud pongarbilan gambar yang bina Sigua dalam videopa dan fxografi dan laksa hai tk ersebu. 16 mark fi, Selan daipadaperileman dan penguatusae, trangkan 4 bidang yang semakin enggonakan Kem don i (mark) JABATAN PENDIDIKAN NEGERI TERENGGANU SONATA, STPM 2022 | {mn PERATURAN PEMARKAHAN PEPERIKSAAN PERCUBAAN SEMESTER 1 INFORMATION AND COMMUNICATIONS TECHNOLOGY SKIMA JAWAPAN, 1@ A firowall to protect your whole LAN from hackers out on the Internet, you would place a firewall between the LAN and the Internet connection, A firewall blocks unauthorised connections being made to your computer or LAN. Normal daa is allewed through the firewall (eg e-mails o¢ we pages) but all other data is blocked, 2@ Rendering Images isto convert graphics from a le into visual form to display, Its known a a process of gonerating an image from 2 model by compster programs = Rendering’ i also used to deserbe the prooess of calculating effects ina video ‘ain file to produce final video output 6) [Examples of fexture of rendering images ae shading , bump-mapping, texture- mapping, shadows, soft shadows, reflection, refraction, ‘transparency, indirect Mumination, translucency, causties, depth of fet, ‘motion br and non-photorealistic rendering. Section A [35 marks} Seherna 1@ A firewall fo protect your whole LAN from hackers out on the Internet, you would 1¢ LAN and the Internet connection places firewall beween A firewall blocks unauthorised connections being made to your computer or LAN. Normal data is allawed through the firewall (e-mails or web pages) but all ether data is blocked. » ‘4A TRIAL STPM SER 2022 | 98/22 NFOAMATION AND COMMUNICATION TECHNOLOGY 2@ -Rendering images isto convert graphics from a file into visual form to display It is known os 2 process of generating an image from @ model by computer programs. Rendering’ i also sed to desorbe the process of calculating effects ina video ceding fle to produce final video output o Examples of fsture of rendering images are shading , bump-mapping,texture- mapping, shadows, soft shadows, reflection, refraction, diffraction, transparency, indirect Mumination, translucency, caustics, depth of field, ‘mation blur aud non-photorealistic rendering. 53, ‘The processing unk controls all activities within the system. For every instruction, the

You might also like