You are on page 1of 7

Nama :

No. Kad Pengenalan :

Tingkatan : 4
Answer Sheet / Helaian Jawapan
Section A / Bahagian A
Question No.
No. Soalan
1
2
3
(i)
(ii)
4
5

(i)
(ii)
(iii)
6
7

(i)
(ii)
(iii)
9
10

11

(i)
(ii)
12
13
14
15
16
17
18
19
20

21
22
23
24
25

3765/1

(i)
(ii)
(i)
(ii)
(i)
(ii)
(i)
(ii)
(i)
(ii)

Candidate's Answer
Jawapan Calon
B
D
Fingerprint Recognition
Iris Recognition / hand Geometry / Retinal Recognition/facial
recognition/voice recognition/signature verification system
C
D (Computer Theft )
A (Computer Crime)
C (Computer Attack)
B
C
False
True
False
B
B
Control Unit
Arithemetic Logic Unit
RAM
A
C
B
B
C
C
A
A
Q
S
R
S
R
T
RJ45 Connector
Cable Stripper
Radio Waves
Infrared

Marks
Markah
1
2
3
4
5
6
7
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36

SECTION B
26. a) Two main sectors that used ICT in their management.
Education
Banking
Industry
e-commerce
b) two (2) differences between worms and viruses
Worm
Operate through the network
Spread copies of itself as a stand

Virus
Spread trough any medium
Spread copies of itself as a program

alone program

that attaches to other program

27. a) Computer Fraud


Computer fraud is defined as having an intention to take advantage over or causing
loss to other people, mainly on monetary basis through the use of computers.
b) Infringement
Copyright Infringement is defined as a violation of the rights secured by a copyright.

28. a)

Complete the machine cycle of Central Processing Unit (CPU) below.

Fetching

Storing

Decoding

Executing
b)

We transmit information or data by using 2 types of signals namely digital and


analog.

29. a) Function of system software


Enables the computer to function properly
Control or maintains the operations of computer and its devices
Serves as the interface between the user, the application software and the
computers hardware.

3765/1

b) Differences between Random Access Memory (RAM) and Read Only Memory
(ROM).
RAM

30.

ROM

Data and
Program

Stores during and after


processing

Stored by manufacturer

Content

Store information temporarily

Stores instructions (information)


permanently

Processing
Time

Very fast but uses a lot of power

Fast but uses very little power

Volatility

Volatile

Non-volatile

a)

Define Client and Server in a client/server network.


A client is a computer which requests services or files from server computer
A server is a computer that shares information and resources with other
computers on a network.
b) Explain what a peer-to-peer network is.
Peer to peer or P2P network is a network with all the nodes acting as both
server and clients. A PC can access files located on other PC and can also
provide files to other PCs. All computers in the peer to peer network has equal
responsibilities and capabilities to use the resources available on the network.

QUESTION 31

3765/1

a)

Based on Figure 1, draw the information processing cycle in block diagram


accordingly.

Input

Process

Output

Storage

b)

Explain two functions of component X.


i.
Interprets and carries out basic instructions that
operate a computer
ii.
Control unit directs and coordinates operations in computer
iii.
Arithmetic logic unit (ALU) performs arithmetic, comparison, and
logical operations

c)

Differentiate between component Y and component Z

Y(primary storage)
Accessible directly by the processing unit
(CPU) CPU can access the data or
instructions directly
Access time faster, measured in
nanoseconds (billionths of a second)
More expensive and smaller capacity
Stores data from input device or ftom
secondary storage device e.g. floppy disk
for immediate acess
Stores data and instructions temporarily,
disappears when power to computer is
switched off
Volatile memory content (data and
instructions lost on failure of power supply
or when the computer is switched off
Can be read and written directly by the CPU
data and instructions can be read and
written by the CPU
Holds instructions to be executed and data
to be used with those instructions

Z(secondary storage)
Not accessible directly by the CPU need to
be copied to memory (primary storage)
before the CPU can access the data or
instructions
Access time slower, measured in
miliseconds (thousandths of a second)
Less expensive and bigger capacity
Stores data from input device or from other
secondary storage devices permanently but
must be copied to memory first

Nonvolatile content retained and not lost


even when power is removed
Can be read and written but not directly by
the CPU data and instructions have to be
copied to memory before they can be read
and written by the CPU
Holds instrunctions and data which have to
be copied to memory (primary storage)
before instructions can be executed and
data can be used by the CPU

Holds instrunctions and data while they are


being processed by the CPU
Stores instructions to execute a programme
to allow the CPU to follow instantly the set
of instructions

3765/1

d)

Mr. Hamdan had installed a few application software on Computer A.


Differentiate between word processing software and spreadsheet software.
Word Processing Software
Used to create, edit and format textual
documents such as letters, memos, reports,
fax cover sheets, mailing labels, and
newsletters
Allow user to create, edit, format, print, and
save documents
Features include
AutoCorrect
AutoFormat
Columns
Grammar Checker
Tables
Templates
Thesaurus
Tracking Changes/Comments
Voice Recognition
Web Page Development

Spreadsheet Software
Used to create, edit and format worksheets

Allow users to organize data in rows and


columns
Feature include
Function
Recalculation
Charting

QUESTION 32
(a) Explain Mr. Ms activity in Figure 11(a).
Mr. Ms using his computer network skill illegally accessing the server at
College ABC. Mr. Ms access the server data without permission. That
mean Mr. M hacks the computer server at College ABC. Mr. M also
changes the data in the examination database in the server. By using his
skill he is paid by other students.
Explain how the activity in Figure 11(a) will affect the college

(b)

Hacker changes the examination marks. The examination database is


not valid anymore. So false data will be distributed and the organization
will be unstable. The organizer will try to find where the problem is and
this will increase the cost of maintenance.
Give two other possible threats to the computer security of the college.

(c)
i.
ii.
iii.

Natural disaster such as flood, storm and etc.


Malicious code such as virus and worm.
Theft

(d) State one possible measure that can be carried out by the network

administrators in Figure 11(b).

Install firewall

3765/1

QUESTION 33
(a)

Give the definition of the environment in statement 2 situation.


Information can be stored and retrieved through the digital
medium instead of paper .Example online communication via
email, online chat ,MayBank2U and any other relevant example.

(b)

State two other positive and two other negative impacts of ICT usage.

Positive/Positif
Faster Communication Speed
In the past, it took a long time for any news or messages to be
send. Now with the Internet, news or messages are sent via e-mail
to friends, business partners or to anyone efficiently. With the
capability of bandwidth, broadband and connection speed on the
Internet, any information can travel fast and at an instant. It saves
time and is inexpensive.
Lower Communication Cost
Using the Internet is cost-effective than the other modes of
communication such as telephone, mailing or courier service. It
allows people to have access to large amounts of data at a very
low cost. With the Internet we do not have to pay for any basic
services provided by the Internet. Furthermore, the cost of
connection to the Internet is relatively cheap.
Reliable Mode Of Communication
Computers are reliable. With the internet, information could be
accessed and retrieved from anywhere and at anytime. This
makes it a reliable mode of communication. However, the input to
the computer is contributed by humans. If the data passed to the
computer is faulty, the result will be faulty as well. This is related
to the term GIGO.
GIGO is a short form for Garbage In Garbage Out. It refers to the
quality of output produced according to the input. Normally bad
input produces bad output.
Effective Sharing Of Information
With the advancement of ICT, information can be shared by
people all around the world. People can share and exchange
opinions, news and information through discussion groups, mailing
list and forums on the Internet. This enable knowledge sharing
which will contribute to the development of knowledge based
society.
Negative
Bad posture
Eyestrain

3765/1

Physical and mental stress

* any relevant explaination for each answers is acceptable.


Sebarang huraian bagi setiap jawapan yang boleh diterima.

3765/1

You might also like