Nama : …………………………… No. Kad ... - RMM ICT GROUP

joinherbalistΤεχνίτη Νοημοσύνη και Ρομποτική

17 Νοε 2013 (πριν από 3 χρόνια και 11 μήνες)

57 εμφανίσεις

3765/1

Nama : ……………………………




No. Kad Pengenalan : …………………

Tingkatan : 4



Answer Sheet

/
Helaian Jawapan



Section A /
Bahagian A


Question No.

No. Soalan

Candidate's Answer

Jawapan Calon

Marks

Markah

1

B


1

2

D


2

3

(i)

Fingerprint Recognition


3

(
ii)

Iris Recognition / hand Geometry / Retinal Recognition/facial
recognition/voice recognition/signature verification system


4

4

C



5

(i)

D (Computer Theft )


5

(ii)

A (Computer Crime)


6

(iii)

C (Computer Attack)


7

6

B


9

7

C


10

8

(i)

False


11

(ii)

True


12

(iii)

False


13

9

B


14

10

B


15

11

(i)

Control Unit


16

(ii)

Arithemetic Logic Unit


17

12

RAM


18

13

A


19

14

C


20

15

B


21

16

B


22

17

C


23

18

C


24

19

A


25

20

A


26

21

(i)

Q


27


(ii)

S


28

22

(i)

R


29

(ii)

S


30

23

(i)

R


31

(ii)

T


32

24

(i)

RJ45 Connector


33

(ii)

Cable Stripper


34

25

(i)

Radio Waves


35


(ii)

Infrared


36












3765/1

2

SECTION B


26. a) Two main sectors that used ICT in their management.


Education

Banking

Industry

e
-
commerce


b)
two (2) differences between worms and viruses


Worm

Virus

Operate thr
ough the network

Spread trough any medium

Spread copies of itself as a stand
alone program

Spread copies of itself as a program
that attaches to other program


27. a) Computer Fraud

Computer fraud is defined as having an intention to take advantage ov
er or causing
loss to other people, mainly on monetary basis through the use of computers.



b) Infringement



Copyright Infringement is defined as a violation of the

rights secured by a

copyright.



28. a) Complete the machine cycle of Central Processing Unit (CPU) below.















b) We transmit information or data by using 2 types of signals namely
digital

and


analog.


29. a) Function of system software




Enables the computer to function properly



Control or maintains the operatio
ns of computer and its devices



Serves as the interface between the user, the application software and the


computer’s hardware.

Fetching

Decoding

Executing

Storing

3765/1

3



b) Differences between Random Access Memory (RAM) and Read Only Memory


(ROM).



RAM

ROM

Data and
Program

Stores during and after
processing

Stored by manufacturer

Content

Store information temporarily

Stores instructions (information)
permanently

Processing
Time

Very fast bu
t uses a lot of power

Fast but uses very little power

Volatility

Volatile

Non
-
volatile


30. a) Define ‘Client’ and ‘Server’ in a client/server network.



A client is a computer which requests services or files from server computer

A server is a
computer that shares information and resources with other
computers on a network.


b) Explain what a
peer
-
to
-
peer network

is.





Peer to peer or P2P network is a network with all the nodes acting as both
server and clients. A PC can access files located

on other PC and can also
provide files to other PCs. All computers in the peer to peer network has equal
responsibilities and capabilities to use the resources available on the network.





























3765/1

4

QUESTION 31

a)

Based on Figure 1, draw the i
nformation processing cycle in block diagram

accordingly.






















b)

Explain two functions of component X.

i.
Interprets and carries out basic instructions that operate a computer

ii.
Control unit

directs and coordinates operations in computer

iii.
Arithme
tic logic unit (ALU)

performs arithmetic, comparison, and logical
operations


c)

Differentiate between component Y and component Z

Y(primary storage)

Z(secondary storage)

Accessible directly by the processing unit
(CPU)


CPU can access the data or
instruct
ions directly

Not accessible directly by the CPU


need
to be copied to memory (primary storage)
before the CPU can access the data or
instructions

Access time


faster, measured in
nanoseconds (billionths of a second)

Access time


slower, measured in
mi
liseconds (thousandths of a second)

More expensive and smaller capacity

Less expensive and bigger capacity

Stores data from input device or ftom
secondary storage device e.g. floppy disk
for immediate acess

Stores data from input device or from other
sec
ondary storage devices permanently but
must be copied to memory first

Stores data and instructions temporarily,
disappears when power to computer is
switched off


Volatile memory


content (data and
instructions lost on failure of power supply
or when th
e computer is switched off

Nonvolatile


content retained and not lost
even when power is removed

Can be read and written directly by the CPU


data and instructions can be read and
written by the CPU

Can be read and written but not directly by
the CPU


data and instructions have to be
copied to memory before they can be read
and written by the CPU

Holds instructions to be executed and data
to be used with those instructions

Holds instrunctions and data which have to
be copied to memory (primary storage)

before instructions can be executed and
data can be used by the CPU

Holds instrunctions and data while they are
being processed by the CPU


Stores instructions to execute a programme
to allow the CPU to follow instantly the set
of instructions


Input

Process

Output

Storage

3765/1

5


d)

Mr. Ha
mdan had installed a few application software on Computer A.

Differentiate between word processing software and spreadsheet software.

Word Processing Software

Spreadsheet Software

Used to create, edit and format textual
documents such as letter
s, memos, reports,
fax cover sheets, mailing labels, and
newsletters

Used to create, edit and format worksheets

Allow user to create, edit, format, print, and
save documents

Allow users to organize data in rows and
columns

Features include



AutoCorrect



A
utoFormat



Columns



Grammar Checker



Tables



Templates



Thesaurus



Tracking Changes/Comments



Voice Recognition



Web Page Development

Feature include



Function



Recalculation



Charting



QUESTION 32

(a)

Explain Mr. M’s activity in Figure 11(a).





Mr. M’s using his computer network skill illegally accessing the server at
College ABC. Mr. M’s access the server data without permission. That
mean Mr. M hacks the computer server at College ABC. Mr. M also
changes the data in the examination data
base in the server. By using his
skill he is paid by other students.


(b)

Explain how the activity in Figure 11(a) will affect the college

Hacker changes the examination marks. The examination database is
not valid anymore. So false data will be distributed an
d the organization
will be unstable. The organizer will try to find where the problem is and
this will increase the cost of maintenance.











(c)

Give two other possible threats to the computer security of the college.

i.
Natural disaster

such as flood,
storm and etc.

ii.
Malicious code

such as virus and worm.

iii.
Theft

(d)

State one possible measure that can be carried out by the network

administrators in Figure 11(b).

Install
firewall









3765/1

6

QUESTION 33

(a)

Give the definition of the env
ironment in statement 2 situation.

Information can be stored and retrieved through the digital
medium instead of paper .Example online communication via
email, online chat ,MayBank2U and any other relevant example.



(b)

State
two
other

posi
tive and

two
other negative impacts of ICT usage.


Positive/
Positif



Faster Communication Speed

In the past, it took a long time for any news or messages to be send. Now
with the Internet, news or messages are sent via e
-
mail to friends, business
partners
or to anyone efficiently. With the capability of bandwidth,
broadband and connection speed on the Internet, any information can
travel fast and at an instant. It saves time and is inexpensive.



Lower Communication Cost

Using the Internet is cost
-
effective t
han the other modes of communication
such as telephone, mailing or courier service. It allows people to have
access to large amounts of data at a very low cost. With the Internet we do
not have to pay for any basic services provided by the Internet.
Furth
ermore, the cost of connection to the Internet is relatively cheap.



Reliable Mode Of Communication

Computers are reliable. With the internet, information could be accessed
and retrieved from anywhere and at anytime. This makes it a reliable mode
of communi
cation. However, the input to the computer is contributed by
humans. If the data passed to the computer is faulty, the result will be
faulty as well. This is related to the term GIGO.

GIGO is a short form for Garbage In Garbage Out. It refers to the qualit
y of
output produced according to the input. Normally bad input produces bad
output.




Effective Sharing Of Information

With the advancement of ICT, information can

be shared by people all
around the world. People can share and exchange opinions, news and
information through discussion groups, mailing list and forums on the
Internet. This enable knowledge sharing which will contribute to the
development of knowledge based society.


Negative



Bad posture



Eyestrain




Physical and mental stress


* any relevant
explaination for each answers is acceptable.


Sebarang huraian bagi setiap jawapan yang boleh diterima.