You are on page 1of 61

1

SC 015
2016/2017

TUTORIAL 1.0 : INTRODUCTION TO INFORMATION TECHNOLOGY


1.1 Overview of Information Technology
(a) Information Technology
(b) Applications of Information Technology

1.

Computer is an electronic device that is build to help people in completing certain task.
Furthermore, the term 'IT' is being brought up as a concept to determine the operation of
digitals world. Briefly describes the meaning of 'IT'.

2.

Explain five (5) advantages of Information Technology.

3.

The implementation of Information Technology in todays life affected peoples in positive


and negative ways.
Discuss how Information Technology affected peoples in negative ways.

4.

Every day, people use computers in new ways. Computers and other electronic devices are
becoming increasingly affordable. They continue to be more powerful as informationprocessing tools as well as easier to use.
(a)

Identify two (2) examples of each application field mentioned.


(i)

Travel.

(ii)

Government.

(iii) Health care.

(b)

Name the correct application field based on statement given.


(i)

It is the process of making works available to the public. Special software


assists graphic designers in developing pages. Online news paper and online
magazine are two most popular examples.

(ii)

Computer Aided Design ( CAD ) is the use of computer programs to create


two- or three-dimensional ( 2D or 3D ) graphical representations of physical
objects.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

(c)

5.

Explain the applications below.


(i)

Online Banking

(ii)

Computer Based Training

(iii)

Virtual Reality

Information Technology can be applied in many different fields via various applications.
State the most appropriate application for each situation described below.
Situation

Examples of
Application

Miss Iradah transfer the house rental charge to her landlord


using www.maybank2u.com.my website.
Mr Suntharajan is a student from Nepal and registered to
study in one of the private college in Malaysia. How do
Vijaya interact with his lecturer without leaving his
country?
Car engineers and designers use this application to assist
them in producing the blueprint of an engine moulding.
A space-based satellite navigation system that provides
location and time information in all weather conditions,
anywhere on or near the earth.

6.

As a student in the new age, the use of technology is very important in your daily
lives. Specify two (2) IT applications often use by you in everyday life.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

TUTORIAL 1.0 : INTRODUCTION TO INFORMATION TECHNOLOGY


1.1 Overview of Information Technology
(c) Different Categories of Computers

1.

In the current world, its almost impossible to imagine that someone can live without
computers. Computers have become an electronic device of almost every day use for
individuals of every age. Explain computer.

2.

List the five (5) categories of computers.

3.

Give the examples of where super computer is commonly used.

4.

Mainframes are mostly used by major corporations for business activities. Explain
mainframe and give that kind of activities.

5.

X is a computer used in businesses for word processing, accounting, desktop publishing,


and for running spreadsheet and database management applications. Identify and describe
the category of computers based on the given statement.

6.

Recently, mobile devices gain the popularity in latest digital world. Describe mobile
devices and list five (5) mobile devices that you had learnt.

7.

An embedded computer is a special-purpose computer that functions as a component in a


larger product. List the examples for these types of embedded computers.
(a)

Consumer electronics

(b)

Home automation devices

(c)

Automobiles

(d)

Process controller & robotics

(e)

Computer device & office machine


COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

8.

Complete the following table for different categories of computer below.


Types of Computer

Physical Size

Speed

Storage

Super Computer

Mainframe

Personal Computer

9.

Cintahati Restaurant has adopted the facilities to customers with the use booking system.
Customers can access the system orders with their smart phone. Each order will be
recorded in the server. Customers will get a printed receipt once payment is made at the
counter.
(i)

Identify two (2) categories of computers being used in the system.

(ii)

Briefly describe one (1) of the categories mention in 1(a)(i).

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

TUTORIAL 2.0 : COMPUTER SYSTEM


2.1 System Concept
a) Information Processing Cycle
b)Data Representation
c)Differentiate Various Storage Capacity
a) State the definition of computer.

b) What is computer system?

c) State the components of computer system and list down all the categories for each
component.
d) State and describe the processes involved in the information processing cycle.

e) Draw a diagram of information processing cycle.

f) Differentiate between a bit and a byte.

g) Choose the correct answer. (Bit, Byte, Character)


i.

Eight bits grouped together as a unit

______________

ii.

A single binary digit (0 or 1)

______________

iii. One single unit represents one character of data

______________

iv. It is short for binary digit

______________

v.

Text presentation by computer hardware

______________

vi.

Number system with two unique digits

______________

h) How does a computer represent data?


i) Briefly explain the steps taken by computers in converting a character 'a' into binary form
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

and back.
j) State the definition of storage capacity.

k) What are the unit measurements for storage capacity?

l)

There are many types of memory cards that are used today. Give one (1) example
of them and state its capacity.

m) One of the measuring units for memory size is kilobyte (KB), which is equal to 1024
bytes.

i.

State 512 megabytes (MB) in gigabytes (GB)

ii.

States 2 gigabytes (GB) in megabytes (MB)

iii.

State 1 megabyte (MB) in bytes.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

TUTORIAL 2.0 : COMPUTER SYSTEM


2.2 Number System and Representation
a) Represent Data in Binary Form
b) Represent Data in Hexadecimal Form
1.

What is number system?

2.

Identify three (3) types of number system.

3.

Explain how the information is represented in binary form? Give one example
of a binary numbers.

4.

Give the next three (3) binary numbers in ascending order after 110.

5.

Convert the given numbers below to binary number.


i. 5610
ii. 3210
iii.2610
iv.1710

6.

Express the following binary numbers in decimal numbers.


i.

11011

ii.

10111

iii.

1110011

7.

Define the hexadecimal numbers and state their basic numbers.

8.

Give the next three (3) hexadecimal integers in ascending order after FD.

9.

Express the following numbers in hexadecimal numbers.


i.

2910

ii. 2410

iii.

3810

iv. 6010

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

10. Convert the given numbers below to decimal numbers.


i. 4AF
ii. 10A
iii. 11BC

11. Convert the following binary numbers to hexadecimal numbers.


i.

11011001

ii.

1011100

iii.

111001000

12. Convert the following hexadecimal numbers to binary numbers.


i. 11A16
ii. 1CB16
iii. F616
iv. DB16

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

SC 015
2016/2017

TUTORIAL 2.0 : COMPUTER SYSTEM


2.3 Information Coding Scheme
a) Identify the Coding System Used in Data Processing.
b) Differentiate the Coding System.
1. Explain the purpose of Information Coding Scheme.

2. Identify three (3) coding system used in data processing.

3. Differentiate the coding system based on the criteria given below:


(a) Number of bits
(b) Number of characters

4. The American Standard Code for Information Interchange or ASCII assigns values
between _____ and _____.

5. Identify the suitable coding system for the statement below.


A fixed-length, binary coding system used to represent text-based data for
computer processing on many types of computers.

6. _____________________ is an international coding system for text-based data using any


written language.

7. What does the acronym EBCDIC stand for?

8. By using an 8-bit code, how many characters or bit combinations can be represented?

9. How many ASCII 'characters' does the following piece of text use:
ASCII rocks!

10. Give a benefit of using ASCII.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

10

SC 015
2016/2017

11. Give a benefit of using Unicode over ASCII.


12. You are designing a computer system for use worldwide, what character encoding
scheme should you use and why?

13. The ASCII code for the letter 'Z' is 90 (base 10), what is the letter 'X' stored as?

14. How many bits would it take to represent the following phrase using the ASCII code?

Introduction to Computer Science

15. How many bits would it take to represent the following phrase using the Unicode code?

Malacca Matriculation College, Melaka.

16. How many bits would it take to represent the following phrase using the EBCDIC code?

Londang, Masjid Tanah 78300 Melaka.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

11

TUTORIAL 2.0 : COMPUTER SYSTEM


2.4 Logic Gate & Simple Logic Circuit
a) Identify Logical Operators
b) Form Valid Boolean Expressions
c) Evaluate Boolean Expression Using Truth Table
d) Identify symbol For Logic Gate
e) Draw Simple Logic Circuit For a Given Boolean Expression
1. Identify three (3) basic logical operators.

2. Name the logic gate based on the diagram given.


(a)

(b)

(c)

3. Write a Boolean expression for each logic circuit below:

a)

b)

A
B

c)

d)

A
B

e)

A
B

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

(d)

(e)

SC 015
2016/2017

12

f)

A
B

g)
A
B

h)

A
B

i)

j)

A
X
B

k)

A
X
B

2. Write the expressions and fill in the truth tables for following logic gates.
a)

A
Y
B

b)

A
Y
B

c)
A

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

13

d)
A
Y
B

e)

B
Y

f)

A
B
Y

2. Write a Boolean expression and the truth table to represent logic circuit below:
a)
A

Y
B

b)
A
B
Y
C

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

14

c)

d)

e)

4. Draw a logic circuit for a Boolean expression given below:

a) Y = (A + B) C

h) X = A' B + A B'

b) F = A + B

i) F = (A + B) ' + (CD) '

c) X = A + BC + D

j) Y = (A ' B) + (CD ') + (A + C)

d) Z = AB + (AC)

k) Z = (A + B) (B ' + C)

e) F = (A + B) + C + D

l) Z = (A + B) ' B

f) Y = (A + B) (C + D) C

m) X = A + (BC) '

g) Y = (BC + A) (A' + C)

n) F = ((A + B) C ) '

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

15

SC 015
2016/2017

5. Write a Boolean expression based on the situation given below:

a) Electronic door will only open if it detects a person and the switch is set to
be unlocked.

b) Microwave will only start if the start button is pressed and the door close
switch is closed.

c) Microwave will stop if the door is not closed.

d) House alarm will go off if the door is not closed.

e) Traffic light will operate normally if it's not in maintenance mode.

f) If door open and TV picked up then sound alarm.

g) If belt off or door open then sound warning.

h) If there is a pedestrian then green traffic light turns off.

i) An electronic system will only operate if three switches R, S and T are correctly set.
An output signal ( X = 1 ) will occur if R and S are both in the ON position OR if R is
in the OFF position and S and T are both in the ON position. Design a logic circuit to
represent the above situation.

j) Create a logic circuit that will light a seat belt warming lamp if a car's
engine is on and the driver's seat belt is not plugged in.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

16

SC 015
2016/2017

TUTORIAL 2.0 PART A


2.5 Hardware
a) Basic Components of a Motherboard
b) Functions of Processor
c) Steps in Machine Cycle
1. What is the system unit?

2. Describe the function of motherboard.

3. List three (3) basic components of a motherboard.

4. Identify the function for each basic component of the motherboard.

5. State two (2) types of adapter card slots.

6. Explain the function of a processor.

7. Processor contains of two (2) units. Give the name of those units and explain.

8. What are the four (4) basic operations in a machine cycle and how does it work?

9. State two (2) units of measurement used in measuring the speed of a processor.

10. Give two (2) manufactures that produce processor.

11. What is storage media?

12. Explain the function of storage media?

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

17

SC 015
2016/2017

13. Explain the function of memory.

14. How is memory measured?

15. Identify two (2) types of memory

16. Differentiate between Random Access Memory (RAM) and Read Only Memory (ROM).

17. Identify three (3) basic types of RAM chips.

18. Identify three (3) types of ROM.

19. When someone used an application in a computer such as Microsoft Word, a few
operations take place in the Central Processing Unit (CPU).
State four (4) main operations of the CPU.

20. Rearrange the operation of central processing unit below:


(i) Execute

(ii) Fetch

(iii) Store

(iv) Decode

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

18

SC 015
2016/2017

TUTORIAL 2.0 PART B


2.5 Hardware
a) Input and Output Devices
b) Functions of Input and Output Devices
1. What are Input Devices?

2. Identify nine (9) types of Input Devices.

3. What is the function of keyboard?

4. List two (2) types of keyboard.

5. Give three (3) examples of pointing devices.

6. List five (5) types of mouse.

7. Identify two (2) examples of pen input.

8. Identify two (2) examples of voice/audio input.

9. State two (2) examples of video input.

10. What is the function of biometric input device? Give three (3) examples of biometric
input device.

11. Give three (3) examples of game controller.

12. Some input devices save users time by eliminating manual data entry. With this device,
users do not type, speak or write into the computer. Instead, these devices capture data
from a source document, which is original form of the data. Identify this input device.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

19

SC 015
2016/2017

13. What are Output Devices?


14. Identify four (4) types of Output Devices.

15. State two (2) examples of display devices.

16. Identify two (2) types of printer.

17. Explain the function of data projector.

18. Describe the functions of storage.

19. Differentiate between storage and RAM.

20. Identify three (3) medium of storage. Give two (2) examples for each medium.

21. Storage holds data, instructions, and information for future use. Every computer uses
storage to hold system and application software. There are two (2) types of storage:
primary storage and secondary storage. Give two (2) examples for each of the storage.

22. State four (4) examples of adapter card.

23. Explain the functions of adapter card

24. Sophia would like to develop a multimedia presentation for her college.
a) Among the multimedia elements that she will include in her presentation are
pictures from the magazines and recorded voice over. Suggest the two (2)
input devices to help her to complete her presentation.

b) Name two (2) output devices that she can use to present her work.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

20

25. Aziah intends to include her photo and beautiful pictures from her favorite magazine to
make her presentation more attractive. Identify two (2) input devices to help her complete
her presentation.

26. Some input devices save users time by eliminating manual data entry. With this device,
users do not type, speak or write into the computer. Instead, these devices capture data
from a source document, which is original form of the data. Identify this input device.

27. Categorized the hardware components listed in the table below.

Hardware Components

Category

Bar code Reader


LCD Monitor
Stylus
Magnetic Tape
Plotters

28. Figure 1 shows a label removed from an item sold at a supermarket.

What input device would have been used in the supermarket to read this label?

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

21

SC 015
2016/2017

TUTORIAL 2.0 : COMPUTER SYSTEM


2.6 Software
2.6.1 System Software (Part A)

1. Define software.

2. Identify two (2) types of software.

3. Describe system software.

4. State two (2) types of system software.

5. What is operating system?

6. List ten (10) functions of operating system.

7. Explain two (2) ways of starting of the computer.

8. Give two (2) types of user interface.

9. What is the purpose of memory management?

10. Identify three (3) categories of operating system.

11. Give four (4) examples of stand-alone operating system.

12. Give one (1) example of open source software and proprietary software for operating
system.

13. What is the purpose of server operating system?

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

22

SC 015
2016/2017

14. Give four (4) examples of server operating system.

15. Explain embedded operating system.

16. Give four (4) examples of embedded operating system.

17. Describe utility program.

18. State (5) basic types of utility program and explain the functions for each type.

19. Give two (2) examples for each basic types of utility program.

20. Explain the purpose of disk cleanup, search utility and disc burning utility program.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

23

TUTORIAL 2.0 : COMPUTER SYSTEM


2.6.1 System Software (Part B)

1. Identify the utility programs defined below.

Purpose

Utility Programs

Detects and protects a personal computer from


unauthorized intrusions.
Shrinks the size of a file(s) to free up room on the
storage media.
Writes text, graphics, audio, and video files on a
recordable or rewritable optical disc (CD, DVD,
Blu-ray)
Reorganizes the files and unused space on a
computers hard disk so that the operating system
accesses data more quickly and programs run
faster.

2. Most PC users see their computer system as hardware and software that effortlessly work
together. In addition, it receives that help from the operating system.
State two (2) purposes of operating system.

3. Utility program is one example of system software.


a) State one (1) purpose of installing utility program in a computer.
b) Most operating system include several utility programs but many other
utility programs are available on CDs or downloaded from the Internet.
List two (2) examples of built in utility programs.

4. Aidid found that his computer is very slow when opening certain software. Suggest to
him one (1) utility program that he can use to overcome the problem.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

24

SC 015
2016/2017

5. List two (2) categories of software normally used in a personal computer.


6. Ahmad does not know how to do preventive maintenance for his computer. As a good
friend, suggest to him the system tools that he can use to maintain his computer.
a) To reorganizes files and unused space on hard disk so programs run faster.

7. Identify the suitable of operating system based on the case given.

a) Fuad is thinking of buying a computer, which will use Microsoft's version.

b) Asmah bought Apple Mac notebook for his son.

c) Haris is a power user. He likes to use this operating system because of its flexibility
and power. Besides, he wants to use for his laptop and his computer in his office,
which connect to each other.

d) Sarah does not have enough money to buy operating system for her notebook. She is
looking for popular, free, multitasking UNIX-type operating system.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

25

TUTORIAL 2.0 : COMPUTER SYSTEM


2.6 Software
2.6.1 Application Software

1. Explain application software.

2. List four (4) basic types of application software.

3. Identify the usage for the following application software.


a) Word Processing software.
b) Spreadsheet software.
c) Presentation software.
d) Database software.
e) Web browser

4. Give one (1) example of proprietary software and open source software for each basic
application software.
Application Software

Proprietary Software

Open Source Software

Word Processing
software.
Spreadsheet software.
Presentation software.
Database software.
Web browser
5. Sofia has to present her project to her lecturer using presentation software.
State two (2) examples of the software that she might use to complete her presentation.

6. Farah is an account executive in YZ Accounting Firm. Her assignment is to prepare the


personal financial statement for Encik Yusoff.
a) Identify the suitable application software she can use.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

26

b) State one (1) example of application software mentioned in (a).


7.

Categorized all the application software based on the usage given.

Usage

Application Software

i. Used to create personal profiles.


ii. Used for presentation for teaching.
iii. Used for create student database
iv. Used for creating a report
8.

Give one (1) examples of Proprietary Software that can be use to create a database as shown
above.

9.

Xinyi has been using the personal computer to do a presentation.

a) Identify the type of application software that has been used by Xinyi to
produce this presentation.
b) Name two (2) examples of software mention in (a)
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

27

10.

SC 015
2016/2017

Your boss assigns you to advertise your company profile. Among the information that
you need to include in the advertisement is the company background and yearly turnover.

Based on the information given suggest any types of application software suitable:

a) You have decided to create flyer as your medium of advertisement.


b) Give one (1) example for the software that you have chosen in (a).
c) You want to calculate the percentage of yearly income incremental.
d) Give one (1) example for the software that you have chosen in (c).
e) You also have to present your company profile to certain client using LCD projector as
a medium of display.
f) Give one (1) example for the software that you have chosen in (e).

11.

Millions of people use this software everyday to develop documents such as letters and
memos. Identify the category of software.

12.

What is the type of application software used to create the advertisement?

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

28

SC 015
2016/2017

TUTORIAL 3.0 : INTERNET TECHNOLOGY


3.1 Network Basic
3.1.1 Basic Concept of Network
1.

State the definition of network.

2.

Define communication device.

3.

Give three (3) examples of communication device.

4.

State the definition of transmission media.

5.

State two (2) types of transmission media.

6.

Fill in the blanks with the correct wireless transmission media

Transmission media

Explanation
Distributes radio signals through the air over
long distances
Broadcast radio that is used widely for
mobile communications
Space station that receives microwave signals
from earth-based station, amplifies and
broadcast the signal over wide area
Sends signal using infrared lightwaves
Radio waves that provide high speed signal
transmission

7.

List three (3) advantages of network.

8.

List three (3) disadvantages of network.


COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

29

TUTORIAL 3.0 : INTERNET TECHNOLOGY


3.1 Network Basic
3.1.2 Network Architecture
3.1.3 Network Topology
1.

State the definition of network architecture.

2.

State two (2) types of network architecture and explain.


(a) Client/server network.
(b) Peer to peer network.

3.
4.

State the definition of network topology.


Differentiate between Physical topology and Logical topology.

Physical Topology

Logical Topology

5.

List three (3) types of commonly used network topology.

6.

Draw a diagram and give a brief explanation on each of the network topology.
Network Topology

Explanation

Star Network Topology

Ring Network Topology

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

30

Bus Network Topology


7. List three (3) advantages of each network topology.
Network Topology

Advantages

Star Network Topology


Ring Network Topology
Bus Network Topology
8. List three (3) disadvantages of each network topology.

Network Topology

Disadvantages

Star Network Topology


Ring Network Topology
Bus Network Topology
9. State the function of terminator used in bus network topology.
10. State the central device used in star topology.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

31

TUTORIAL 3.0 : INTERNET TECHNOLOGY


3.1 Network Basic
3.1.4 Classification of Network
1.

List three (3) main classification of network.

2.

Define each network classification.

3.

Make a comparison for each classification network in term of Area Covered, Network
Size, Transmission Speed and Equipment Cost.
Network

Area Covered

Network Size

Transmission

Equipment

Speed

Cost

Classification

4.

List two (2) of advantages and disadvantages of each network classification.


Network

Advantages

Disadvantages

Classification

5.

Give two (2) examples of Local Area Network (LAN).

6.

Arif set up a small office with seven computers, three printers and one scanner. He set up a
Local Area Network (LAN) using a bus topology. Justify two (2) reasons for his choice of
topology.

7.

Name the largest public Wide Area Network (WAN).

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

32

TUTORIAL 3.0 : INTERNET TECHNOLOGY


3.2 The Internet
3.2.1 Overview of the Internet
3.2.1.1 Introduction to the Internet
3.2.1.2 The Internet Connection

1.

State the definition of Internet.

2.

List advantages and disadvantages of internet.

3.

State of definition Intranet and Extranet.

4.

Differentiate between broadband and dial-up connections?


Dial-up

Broadband/Direct

5.

Explain direct connection.

6.

State a type of Internet connection in which the PC or other device must dial up and
connect to service providers computer via telephone lines before being connected to the
Internet.

7.

You need only open your browser to start your Internet session is referred to which type
of connection?

8.

Describe Digital Subscriber Line (DSL).

9.

Provide high-speed Internet connections using a dish-shaped antenna to communicate


with a tower location via radio signal.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

33

10.

Many public locations, such as airports, hotels , schools, shopping malls and coffee shops
provide the internet connections to users with mobile computers or devices.

11.

State the type of Internet access :

(a)

A fast type of Internet access via standard phone lines; does not tie up your phone.

(b)

The most widely used type of home broadband connection; does not use standard
phone lines.

(c)

Provides access to the Internet via a very fast fiber optic network.

(d)

Provides wireless Internet access to a handheld PC or mobile device.

(e)

Requires a transceiver and a clear view of the southern sky.

(f)

Accesses the Internet via standard phone lines and ties up your phone; the maximum
speed is 56 Kbps.

12. Give three (3) differences of DSL connection from dial-up connection.
DSL

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

Dial up

SC 015
2016/2017

34

TUTORIAL 3.0 : INTERNET TECHNOLOGY


3.2 The Internet
3.2.1 Overview of the Internet
3.2.1.3 Internet Service Provider
3.2.1.4 The Internet Address

1.

Define Internet Service Provider (ISP).

2.

List three (3) of the responsibilities of an Internet service provider.

3.

List three (3) examples of Internet Service Provider in Malaysia.

4.

Give the difference for domain name, IP address and DNS.


Domain

IP Address

DNS

Name

5.

Label these special reserved IP address:

0.0.0.0
255.255.255.255
10.1.31.255

6.

Define Internet Protocol (IP) address.

7.

Give difference between IPv4 and IPv6.

IPv4

IPv6

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

35

8.

SC 015
2016/2017

Write an example of IPv4 and IPv6


IPv4
IPv6

9.

State one (1) example of domain name.

10.

Identify two (2) top-level domains (TLD) used in the domain name and state what is
represented by each of them.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

36

TUTORIAL 3.0 : INTERNET TECHNOLOGY


3.2 The Internet
3.2.2 World Wide Web
1.

What is World Wide Web or Web?

2.

Differentiate Web page, Web site, home page and web server.
Web page

Web site

Home page

Web server

3.

State 2 types of web page.

4.

Define Web 2.0.

5.

What is the purpose of web browser?

6.

Identify each part of the URL below:

http://www.kmm.matrik.edu.my/bi/index.html
www.kmm.matrik.edu.my

/bi/
index.html

7.

Give one (1) example of Internet Protocol address.

8.

Internet Protocol address requires the user to memorize a certain number to visit any
website. What other methods are used to visit any web site?

9.

Define Web Browser and give two (2) examples of Web Browser.

10.

Explain micro browser.


COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

37

11.

For a computer or mobile device to display a Web page, the page must be downloaded.
Explain what download means in this context.

12.

What is bookmark or favorite in browser?

13.

Differentiate between Hypertext and Hypermedia links.

Hypertext

Hypermedia

14.

What is the purpose of tabbed browsing?

15.

Give two types of searching tools.

16.

What is the difference between the two types of searching tools?

Search Engine

17.

Subject Directory

State three examples of search engines.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

38

SC 015
2016/2017

TUTORIAL 3.0 : INTERNET TECHNOLOGY


3.3 Internet Services
1.

State two (2) real time activities offering by internet services.

2.

When you manage a website what service you might use to transfer files from your
computer to the server. Give two examples of this service.

3.

Differentiate between message board and newsgroup.

4.

Briefly give explanation on five types of internet services.

5.

Identify the type of Internet services based on the given statement below.

(a)

The technology is used to transmit voice conversations over a data network


using Protocol (IP). This is done by digitizing voice into discrete packets
that are transferred over the network.

(b)

It is a common method of moving files between computers on the Internet. It


is also a special way to login to another network for the purposes of
retrieving and/or files.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

39

TUTORIAL 3.0 : INTERNET TECHNOLOGY


3.4 Types of Website
1.

Explain the differences between blog and wiki.


Blog

Wiki

(a)

Identify the types of web sites based on criteria given :

(b)

Contains content that promotes or sells products or services.

(c)

An informal web site consisting of time-stamped articles, or posts in a diary or


journal format, usually listed in reverse chronological order.

(d)

A web site that offers variety of internet services from single, convenient
location.

(e)

Web site that encourages members in its online community to share their
interests, ideas, photos and videos with other registered users.

(f)

Collaborative Web site that allows users to create, add to, modify, or delete
the Web site content via their Web browser.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

40

SC 015
2016/2017

TUTORIAL 4.0 : COMPUTER ETHICS AND SECURITY

4.1 Computer Ethics


4.1.1 Netiquette

1.

State the definition of netiquette.

2.

Identify the rules of netiquette on social interaction and communication electronically.

3.

State whether the following online behaviors are acceptable or not acceptable.

(a)

Ismail changes his sister's interest on Face book when she leaves her
computer for a while.

(b)

Alya types HAVE A GOOD DAY every morning to her friends in a chat room.

(c)

Haziq sends spam to his friends that he always fights in class.

(d)

Ibrahim updates his computer antivirus from time to time.

(e)

While waiting for her friend, Adrian send message to her cousin in rushing without
reading it.

(f)

Teacher sends brief e-mail to the students in order to let them know about the extra
class that will be held week after that.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

41

TUTORIAL 4.0 : COMPUTER ETHICS AND SECURITY


4.1 Computer Ethics
4.1.2 Area of Computer Ethics

1.

Define Computer Ethics.

2.

List the areas of Computer Ethics.

3.

Give three (3) ways how we could practice green computing.

4.

What is the purpose of Code of Conduct in areas of computer ethics?

5.

Define Intellectual Property.

6.

Give three (3) types of Intellectual Property.

7.

Give one (1) difference of copyright, patent, and trademark.


Copyright

Patent

Trademark

8.

Explain the importance of Intellectual Property.

9.

Copyright is a legal term that describes the right given to the creator for their literary and
artistic work.
(i)

Give 3 examples of artistic work.

(ii)

Give 3 examples of literary work.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

42

10.

SC 015
2016/2017

The explosions of information technology amongst our new generations make

them

greedy in reaching their vision without realizing that they are doing cyber criminal. They
simply copied other's works to get profit and fast returns.

11.

(a)

What type of Intellectual Property for above statement?

(b)

Give one example for answer 9(a).

( "Im Loving it"), (McDonalds double arches), (the Nike "swoosh"), (John Deere
Green)

What type of Intellectual Property for above statement?

12.

You have right to exclude others from making, using, selling, offering for sale,
or importing the invention for 20 years from the filing date (formerly 17 years from the
date the inventions was issued). As the owner, you have rights and do not have to actually
use or make your invention, you still have the right to exclude others from making and
using your patented invention.
What type of Intellectual Property for above statement?

13.

Define Information Privacy.

14.

What are the guidelines that we can practice to safeguard our personal information?

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

43

SC 015
2016/2017

TUTORIAL 4.0 : COMPUTER ETHICS AND SECURITY


4.2 Computer Security
4.2.1 Computer Security Risks

1.

Muhammad works as an Information System Officer in RBH bank. One of his


responsibilities is to make sure all corporate clients' data and information protected and
safe.

2.

(a)

Define computer security risk.

(b)

State one (1) example of security threat.

Lately Mr. Raju has found that his computer has been illegally access by someone. In order
to overcome this problem, he has created a logon user name and password for his
computer. Furthermore, the computer has been infected with various malicious codes.

3.

(a)

Give one (1) advantage of the action taken.

(b)

Name one (1) type of malicious codes that has possibly attacked her

computer.

Malware is any type of software that is designed to infiltrate, and the damage a computer
system or network without the owner's knowledge or consent.
Identify the types of malware for each of the symptoms that may show if the computer is
infected.

Unknown files appear. Unexpected loss of


available memory, Computer performance
slowdown, System setting change, File and
data corruption.

ii

You can see more pop-up advertising


windows than usual, your web browser may
go to sites you do not inspected, your
workstation is slow or takes longer than
usual to complete certain tasks.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

44

4.

SC 015
2016/2017

Madam Siti likes travelling around the world. She usually buys a flight ticket
via the Internet. Lately, she can see many more pop up advertising windows while she is
online. Her Internet service also becomes slowly down. Not just that, her web browser also
go to other websites she did not expected.

(a)

What could possibly happen to Madam Siti computer?

(b)

Define computer security risk.

(c)

Identify two (2) types of security risks.

(d)

What is an example for each types mentioned in 4(ii)?

(e)

What is a program that captures data as it travels on a network?

(f)

A method of attack that uses legitimate looking e-mail messages to get confidential
information (account numbers, passwords) from the recipient is known as
________________.

5.

The internet connection at En. Osman's work place is blazing fast. Whenever he is free, En.
Osman uses this advantage to download mp3, movies and application on to his computer.

(a)

Base on the above statement, what type of computer security risk is


involved?

(b)

State two other type of computer security risk that can arise from En.
Osman's actions.

(c)

Briefly explain 3 ways on how a computer virus can infect your


computer?

6.

While completing her Computer Science assignment, Selvi experience a power outage.
When the power is restored, Selvi found out that all her work has gone.
Luckily the software that she uses to complete her assignment has a recovery feature. So
Selvi manage to salvage some of her assignment.

(a)

State the type of computer security risk experience by Selvi?

(b)

State 3 other causes that can lead to the above computer security risk?
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

45

SC 015
2016/2017

(c)

State 3 examples of electrical disturbance?

(d)

Explain one of the electrical disturbance that you have mention above and what
damage it can cause?

7.

There are no precise, reliable statistics on the amount of computer crime and the economic
loss to the victim partly because many of these crimes are apparently not detected by
victims, many of these crimes not reported to authorities, and partly because the losses are
often difficult to calculate.

8.

(a)

What is computer crime?

(b)

What is cybercrime?

(c)

What is a cyber terrorist?

(d)

Name 6 types of computer security risk?

The term attack can be used in a number of ways, from the more general meaning of an
attempt by a cracker to break into a computer to deface a homepage or to install a virus on
a computer to the more technical information security approach of the term, meaning an
attack to a cryptosystem.

(a)

State two type of attack that can be launch through networks?

(b)

Give the definition of computer security risk?

(c)

What type of computer security risk does software piracy fall to?

(d)

Give two causes for system failure?

(e)

Describe 3 common symptoms for a computer virus infection?

9.

State six (6) types of computer security risk.

10.

Give five (5) symptoms for the computer infected by a virus.

11.

Define malicious code.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

46

12.

13.

14.

SC 015
2016/2017

Explain briefly :

(a)

spyware

(b)

Trojan horse

(c)

worm

(d)

computer virus

(e)

Root kit

(f)

Adware

Describe briefly about :


(a)

hardware theft

(b)

software theft

(c)

information theft

State the purpose of antivirus program, spyware remover, personal firewall, firewall and
backup.

15.

Define what is cryptography.

16.

State 2 process involved in cryptography

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

47

TUTORIAL 4.0 : COMPUTER ETHICS AND SECURITY


4.2 Computer Security
4.2.2 Security Measures

1.

List seven (7) ways to overcome security risks.

2.

Complete the table below :


Computer Security Risk
Internet and network attacks:
worm, computer virus, Trojan horse and rootkit
Internet and network attacks:
spyware and adware
Internet and network attacks:
Botnet, Dos Attack, Back Door and Spoofing

Unauthorized access and use

Hardware/ software/ Information theft and


system failure

Information Theft

System Failure

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

Security Measures

48

3.

SC 015
2016/2017

Siti Aminah was given a notebook by her parents as a present for her excellent
Performance in her Sijil Pelajaran Malaysia examination. She does not has any knowledge
in using a notebook seeks advice from her best friend, Humairah. One of her advice was to
update the antivirus frequently?

4.

(a)

What is the function of an antivirus?

(b)

How does an antivirus works in a computer?

(c)

Which part of a computer does an antivirus works?

(d)

Give two examples of antivirus.

Ameer is lecturer who has to present his working paper in a seminar held in Manila next
month. He represents Malaysia as well as Universiti Teknologi Malaysia.

a)

Ammer wants to ensure his presentation runs smoothly so he did a backup of his
presentation before heading to Manila. Explain what a backup is.

b)

5.

Name two high quality media to Ameer to store his presentation paper?

Aiminuddin is responsible for the network of Gemilang Seni Company Sdn


Bhd. Recently there has been a network intrusion.

a)

What kind of solution does Aiminuddin has to take to avoid this intrusion?

b)

Describe how the above solution works

c)

If Aiminuddin unable to overcome the above problem by using the selected solution,
what kind of suggestion does he has to give to the management of the company?

6.

State the suitable security measures for each statement below.

a.

Haizam think to restore the files in his laptop by copying the backed up files to their
original location.

b.

This process includes encryption and decryption process. It also ensures that no one
can read the message except the intended receiver.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

49

SC 015
2016/2017

c.

The importance of this software is to protects a computer against viruses

d.

Hardware/software that protects a networks resources from intrusion by users on


another network.

e.

Ensure that computers are safe from malicious threat by routine check to
Update from new virus, worm or other malicious threat.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

50

COMPUTER SCIENCE SC015


PSPM 1 SESSION 2011/2012
1. (a) List three(3) types of mobile communication devices.

[3 marks]

(b) Explain how IT can benefit education.

[3 marks]

2. The numbering system is a way of representing data.


(a) Show the conversion of the binary number 1011011 to decimal number.

[4 marks]

(b) Show the conversion of the hexadecimal number 4F6A to decimal number.

[4 marks]

(c) Show the conversion of the hexadecimal number F3A2 to binary number.

[4 marks]

3. (a) What is the Boolean expression of F as shown in FIGURE 1 ?

[4 marks]

B
A
F

(b) Draw the logic circuit for the Boolean expression (BC + A)(A + C) = Y.

[6 marks]

(c) How many bits would it take to represent the following phrase using the ASCII code ?
Introduction to Computer Science

[4 marks]

(d) One of the units of measuring memory size is kilobyte (KB), which is equal to 1024
bytes.
(i) State one gigabyte (GB) in megabytes (MB).

[1 mark]

(ii) State one gigabyte (GB) in bytes.

[1 mark]

4. (a) State two (2) differences between RAM and ROM.


(b) List three (3) secondary storage.

[4 marks]
[3 marks]

(c) Central Processing Units (CPUs) contain two parts. Describe the two (2) parts [4 marks]
(d) Give three (3) utility programs and state their functions.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

[6 marks]

51

SC 015
2016/2017

5. (a) A computer network is a collection of computers and devices connected together via
communication devices and transmission media.
(i) Name three (3) communication network devices.

[3 marks]

(ii) What is the difference between a Local Area Network (LAN) and Metropolitan Area
Network (MAN) ?
[2
marks]
(iii)Name the largest public Wide Area Network.

[1 mark]

(b) (i) All of the computers and devices (nodes) on the network connect to a central device.
All data that transfers from one node to another passes through the hub or switch.
What is the network topology described by this statement ?
[2 marks]
(ii) Draw the ring network topology.

[2 marks]

(iii) List two (2) advantages of the bus network topology.

[4 marks]

6. Puan Laila plans to subscribe Internet services at home and requests your opinion on the
following matters :
(a) What is the importance of Internet access ?
[2 marks]
(b) Give three (3) Internet service providers in Malaysia.

[3 marks]

(c) Give two (2) differences between dial-up and broadband services.

[4 marks]

(d) What is IP address and its relationship to domain name ?

[4 marks]

7. (a) Define the following terms :


(i) Web page

[2 marks]

(ii) Web server

[2 marks]

(b) Shown below is a unique address of a Web page :


http://www.mns.my/section.php
(i) Which country is this domain name registered ?

[1 mark]

(ii) Which part of the Web page address above is known as protocol ?

[1 mark]

(iii) Which part of the Web page address above is known as domain name ?

[1 mark]

(iv) Which part of the Web page address above is known as Web page name ?

[1 mark]

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

52

(c) One way of navigating Web pages is by using hyperlinks.


(i) Define hyperlinks.

[2 marks]

(ii) Refer to FIGURE 2, what is the type of hyperlinks A and B ?

[2 marks]

B
A

FIGURE 2
8. (a) Phishing is an email fraud scam use for identity theft.
(i) Define identity theft.

[3 marks]

(ii) Explain two (2) steps to protect your identity.

[4 marks]

(b) Based on the given situation, identify the type of computer crime.
(i) En. Faisal makes a copyright image of a company from the companys Web site
without permission and displays the image in his companys Web site.
[2 marks]
(ii) Siti downloaded Harry Potter movie from the Internet and then made DVD copies to
sell them to her friends.
[2 marks]

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

53

PSPM 1 SESSION 2012/2013


1. Information Technology (IT) is one of the tremendous human inventions.
(a) Define IT in your own words.

[2 marks]

(b) Give three (3) examples of IT usage in the medical field.

[3 marks]

2. (a) Information processing cycle is a series of input, process, output and storage activities
performed by a computer. Draw a diagram of information processing cycle. [3 marks]
(b) Ahmad has used 780 megabytes (MB) of storage in his computer. Convert 780 MB into
:
(i) Kilobytes (KB)

[1 mark]

(ii) Gigabytes (GB)

[1 mark]

(c) The numbering system is used to represent any input from user to be stored in a
computer.
(i) Show the conversion of the binary number 1001010 to decimal number.

[3 marks]

(ii) Show the conversion of the hexadecimal number D9B1 to binary number.

[3 marks]

(d) Give one (1) difference between ASCII and Unicode coding schemes.

[2 marks]

(e) Write the Boolean expression of Y in FIGURE 1.

[3 marks]

A
B
Y

FIGURE 1
(f) Draw the logic circuit for the Boolean expression F = (B + A)C + (A + D).

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

[5 marks]

54

SC 015
2016/2017

3. Computer consists of several components of hardware.


(a) List three (3) basic motherboard components.

[3 marks]

(b) State two (2) differences of RAM and ROM.

[4 marks]

(c) There are many adapter cards that can be slotted into motherboard. List three (3) types
of adapter card and their functions.
[6 marks]
(d) Describe the function of Arithmetic Logic Unit (ALU).
4. (a) State four (4) functions of an operating system.

[2 marks]
[4 marks]

(b) Give two (2) utility programs and state their functions.

[4 marks]

(c) Name and describe two (2) types of office software.

[4 marks]

5. (a) Computer network consists of several types of network topology.


(i) List three (3) types of network topology and state one (1) advantage for each
topology.

[6 marks]

(ii) Draw star network topology.

[2 marks]

(b) State one (1) difference between local area network (LAN) and wide area network
(WAN).
[2 marks]

6. Internet Protocol (IP) is one of the important elements in computer network.


(a) Give one (1) example of IP address. State the smallest and the largest numbers that can
be used for IP address.
[3 marks]
(b) State one (1) function of Web browser and give two (2) examples of Web browser.
[3 marks]
(c) The following is an address of a Web page :
A

http://www.nps.gov/info/planproject/wildlifeviewing.htm
Name the components of the Web page address.

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

[4 marks]

55

SC 015
2016/2017

7. (a) Name and explain three (3) Internet services.

[6 marks]

(b) List three (3) types of Web site and explain their functions.

[6 marks]

(c) State three (3) rules in Netiquette.

[3 marks]

8. Most of the Internet based companies have their products protected under intellectual
property rights (IP).
(a) Give two (2) reasons why a product must have an IP.

[4 marks]

(c) Describe three (3) ways of preventing data loss in a computer.

[6 marks]

(d) State two (2) security measures to reduce hardware theft or hardware vandalism.
[2 marks]

PSPM 1 SESSION 2013/2014


1. (a) Differentiate the two (2) categories of computers in terms of their size and cost.
[4 marks]
(b) Identify and explain one (1) way IT can be leveraged in banking.

[2 marks]

2. (a) The numbering system is used to represent any input from user to be stored in a
computer.
(i) Show the conversion of A416 to binary number.
[3 marks]
(ii) Show the conversion of 001110012 to decimal number.
(b) Draw the logic circuit for the Boolean expression Y = UV + (W + X)U

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

[3 marks]
[6 marks]

SC 015
2016/2017

56

(c) Write the Boolean expression of J in FIGURE 1.

[4 marks]

J
X
Y

FIGURE 1

3. A computer contains many electric, electronic, and mechanical components known as


hardware.
(a) List four (4) steps of machine cycle. Explain the function of each step.

[8 marks]

(b) Explain the function of output device and give two (2) examples of output devices.
[4 marks]
(c) Explain what is Motherboard and list four (4) of its main electronic components.
[3 marks]
4. (a) Briefly explain three (3) functions of operating system.
[6 marks]
(b) State the function of :
(i) Disk Cleanup

[2 marks]

(ii) Disk Defragmenter

[2 marks]

(c) State the function of spreadsheet software.

[2 marks]

(d) List four (4) examples of utility programs which are often used by computer users.
[4 marks]

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

57

SC 015
2016/2017

5. Computer communications describes a process in which two or more computers or devices


transfer data, instructions and information.
(a) What is network architecture ?

[2 marks]

(b) Give two (2) types of network architecture.

[2 marks]

(c) Draw a bus network topology containing three PC, one printer and one server.
[3 marks]
(e) What is Metropolitan Area Network (MAN) ?

[1 mark]

(f) Differentiate between Intranet and Extranet.

[2 marks]

6. (a) Describe the type of Internet connection below :


(i) FTTP

[2 marks]

(ii) Wi-Fi

[2 marks]

(b) (i)
(ii)

(c) (i)
(ii)

What is Internet Service Provider (ISP) ?

[1 mark]

Identify three (3) examples of ISP in Malaysia.

[3 marks]

What is IP Address ?

[2 marks]

Give one (1) example of IP Address and Domain Name.

[2 marks]

(d) Briefly explain two (2) types of search tool.


* Type & Explanation

[4 marks]

7. The Web is one of many services on the Internet. The Internet services have changed the
way people communicate.
(a) Discuss the types of internet services below :
(i) FTTP
(ii)

VoIP

[2 marks]
[2 marks]

(b) List any two (2) types of Websites and explain their functions.

[4 marks]

(c) Based on the Golden Rule : Treat others as you would like them to treat you.
State two (2) rules in Netiquette.
[2 marks]

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

58

8. (a) Green computing involves reducing the electricity and environmental waste while using
a computer. State any three (3) suggestions to support green computing.
[3 marks]
(b) Discuss two (2) threats firewalls can protect.

[4 marks]

(c) What is the major purpose of authentication as applied to the Internet ?

[1 mark]

(d) Identify and clarify three (3) key questions to ask when setting up an authentication
system ?
[3 marks]

PSPM 1 SESSION 2014/2015


1. (a) Give definition and one (1) example of embedded and mobile computers.
[4 marks]

(i)

Category
Embedded computer

(ii)

Mobile computer

Definition

Example

(b) Give two (2) examples of IT applications in education.


[2 marks]
2. The numbering system is a way for data representation.
(a) Define Binary Numbering System.

[1 mark]

(b) List two (2) coding schemes used to represent characters.

[2 marks]

(c) Show the conversion of BCD84216 to binary number.

[3 marks]

(d) Show the conversion of 110001112 to decimal number.

[3 marks]

(g) Draw a logic circuit for the following Boolean expression.


X = (A + B) . BC

[6 marks]

3. (a) What is a pointing device ?

[1 mark]

(b) Identify and explain four (4) types of pointing devices.

[8 marks]

(c) What is output in the context of information processing cycle.

[1 mark]

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

59

(d) Identify the appropriate type of memory based on the given characteristics.
Characteristics
(i) The contents will be kept even when
the power is turned off.
(ii) Holds data or programs that are
currently being used by the processor.
(iii) Can be read from and written to by
processor.

[6 marks]

Memory type

4. (a) Give one (1) example of application software based on the given usages.
[6 marks]
Usages

Example

(i) Allows data access, through a unique


key.
(ii) Displays statistical representation from
the data analysis.
(iii)Enhances presentation of text, chart and
graphical images with 3-D and other
special effect.
(b) (i)

List two (2) examples of operating systems available in the market.


[2 marks]

(ii) Describe three (3) roles of operating system.


[3 marks]
(c) (i) Describe the differences between backup and restore utility software by completing
the table below.
[4 marks]
Utility Software

Description

Backup
Restore

(ii) List one (1) popular compression tool which is often used by computer users.
[1 mark]

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

60

5. Network architectures are always classified into two broad categories : client-server
architectures, and peer-to-peer architectures.
(a) State one (1) difference between client-server and peer-to-peer architectures.
[4 marks]
(b) Draw client-server architecture.

[4 marks]

(c) State and explain two (2) disadvantages of client-server architecture compared to peer-topeer architecture.
[4 marks]
6. Internet is a network of the interlinked computer networking worldwide, which is accessible
to the general public.
(a) Name and explain two (2) types of Internet connection.
[4 marks]
(b) Explain two (2) purposes of web browser.
[4 marks]
(c) A web page has a unique address called a Uniform Resource Locator (URL).
(i)

What is the purpose of URL ?

(ii)

Give two (2) examples of URL.

[2 marks]
[2 marks]
7. (a) Explain one (1) function of Voice over Internet Protocol (VoIP) which is a kind of
Internet
service, and give two (2) examples of VoIP products.
[4 marks]
(b) Describe one (1) difference between blog and Facebook.
[2 marks]
(c) There are two ways of navigation. State the difference between them.
[2 marks]

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

SC 015
2016/2017

61

(d) For every domain name, the text version for IP address consists of top level domain
(TLD). Complete four (4) of the generic TLD in the following table.
[4 marks]
Generic TLD

Purpose

Example

.net

Network provider and


commercial companies

(i)

.biz

(ii)

.gov

(iii)

.org

(iv)

.edu

8. (a) Define worm and Trojan horse.

[4 marks]

(b) Privacy is a big concern for individuals, particularly as it relates to their Web activity.
(i)

Why is it easier to maintain information privacy in the past ?


[2 marks]

(ii)

Why is it much harder to do so nowadays ?


[2 marks]

(c) The table below shows a conversation between a primary school student with his class
teacher in a chat room.
Pupil Y
Teacher X
Pupil Y

GIV ME A SAMPLE PROJECT A.S.A.P


You may get sample of previous project from
our school library.
BuT, SiR, I WaNt it NOWWWWWW!

Identify three (3) rules in netiquette that are against the above chat conversation.
[3 marks]

COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~

You might also like