Professional Documents
Culture Documents
Tingkatan : 4
Answer Sheet / Helaian Jawapan
Section A / Bahagian A
Question No.
No. Soalan
1
2
3
(i)
(ii)
4
5
(i)
(ii)
(iii)
6
7
(i)
(ii)
(iii)
9
10
11
(i)
(ii)
12
13
14
15
16
17
18
19
20
21
22
23
24
25
3765/1
(i)
(ii)
(i)
(ii)
(i)
(ii)
(i)
(ii)
(i)
(ii)
Candidate's Answer
Jawapan Calon
B
D
Fingerprint Recognition
Iris Recognition / hand Geometry / Retinal Recognition/facial
recognition/voice recognition/signature verification system
C
D (Computer Theft )
A (Computer Crime)
C (Computer Attack)
B
C
False
True
False
B
B
Control Unit
Arithemetic Logic Unit
RAM
A
C
B
B
C
C
A
A
Q
S
R
S
R
T
RJ45 Connector
Cable Stripper
Radio Waves
Infrared
Marks
Markah
1
2
3
4
5
6
7
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
SECTION B
26. a) Two main sectors that used ICT in their management.
Education
Banking
Industry
e-commerce
b) two (2) differences between worms and viruses
Worm
Operate through the network
Spread copies of itself as a stand
Virus
Spread trough any medium
Spread copies of itself as a program
alone program
28. a)
Fetching
Storing
Decoding
Executing
b)
3765/1
b) Differences between Random Access Memory (RAM) and Read Only Memory
(ROM).
RAM
30.
ROM
Data and
Program
Stored by manufacturer
Content
Processing
Time
Volatility
Volatile
Non-volatile
a)
QUESTION 31
3765/1
a)
Input
Process
Output
Storage
b)
c)
Y(primary storage)
Accessible directly by the processing unit
(CPU) CPU can access the data or
instructions directly
Access time faster, measured in
nanoseconds (billionths of a second)
More expensive and smaller capacity
Stores data from input device or ftom
secondary storage device e.g. floppy disk
for immediate acess
Stores data and instructions temporarily,
disappears when power to computer is
switched off
Volatile memory content (data and
instructions lost on failure of power supply
or when the computer is switched off
Can be read and written directly by the CPU
data and instructions can be read and
written by the CPU
Holds instructions to be executed and data
to be used with those instructions
Z(secondary storage)
Not accessible directly by the CPU need to
be copied to memory (primary storage)
before the CPU can access the data or
instructions
Access time slower, measured in
miliseconds (thousandths of a second)
Less expensive and bigger capacity
Stores data from input device or from other
secondary storage devices permanently but
must be copied to memory first
3765/1
d)
Spreadsheet Software
Used to create, edit and format worksheets
QUESTION 32
(a) Explain Mr. Ms activity in Figure 11(a).
Mr. Ms using his computer network skill illegally accessing the server at
College ABC. Mr. Ms access the server data without permission. That
mean Mr. M hacks the computer server at College ABC. Mr. M also
changes the data in the examination database in the server. By using his
skill he is paid by other students.
Explain how the activity in Figure 11(a) will affect the college
(b)
(c)
i.
ii.
iii.
(d) State one possible measure that can be carried out by the network
Install firewall
3765/1
QUESTION 33
(a)
(b)
State two other positive and two other negative impacts of ICT usage.
Positive/Positif
Faster Communication Speed
In the past, it took a long time for any news or messages to be
send. Now with the Internet, news or messages are sent via e-mail
to friends, business partners or to anyone efficiently. With the
capability of bandwidth, broadband and connection speed on the
Internet, any information can travel fast and at an instant. It saves
time and is inexpensive.
Lower Communication Cost
Using the Internet is cost-effective than the other modes of
communication such as telephone, mailing or courier service. It
allows people to have access to large amounts of data at a very
low cost. With the Internet we do not have to pay for any basic
services provided by the Internet. Furthermore, the cost of
connection to the Internet is relatively cheap.
Reliable Mode Of Communication
Computers are reliable. With the internet, information could be
accessed and retrieved from anywhere and at anytime. This
makes it a reliable mode of communication. However, the input to
the computer is contributed by humans. If the data passed to the
computer is faulty, the result will be faulty as well. This is related
to the term GIGO.
GIGO is a short form for Garbage In Garbage Out. It refers to the
quality of output produced according to the input. Normally bad
input produces bad output.
Effective Sharing Of Information
With the advancement of ICT, information can be shared by
people all around the world. People can share and exchange
opinions, news and information through discussion groups, mailing
list and forums on the Internet. This enable knowledge sharing
which will contribute to the development of knowledge based
society.
Negative
Bad posture
Eyestrain
3765/1
3765/1