Professional Documents
Culture Documents
SC 015
2016/2017
1.
Computer is an electronic device that is build to help people in completing certain task.
Furthermore, the term 'IT' is being brought up as a concept to determine the operation of
digitals world. Briefly describes the meaning of 'IT'.
2.
3.
4.
Every day, people use computers in new ways. Computers and other electronic devices are
becoming increasingly affordable. They continue to be more powerful as informationprocessing tools as well as easier to use.
(a)
Travel.
(ii)
Government.
(b)
(ii)
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
(c)
5.
Online Banking
(ii)
(iii)
Virtual Reality
Information Technology can be applied in many different fields via various applications.
State the most appropriate application for each situation described below.
Situation
Examples of
Application
6.
As a student in the new age, the use of technology is very important in your daily
lives. Specify two (2) IT applications often use by you in everyday life.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
1.
In the current world, its almost impossible to imagine that someone can live without
computers. Computers have become an electronic device of almost every day use for
individuals of every age. Explain computer.
2.
3.
4.
Mainframes are mostly used by major corporations for business activities. Explain
mainframe and give that kind of activities.
5.
6.
Recently, mobile devices gain the popularity in latest digital world. Describe mobile
devices and list five (5) mobile devices that you had learnt.
7.
Consumer electronics
(b)
(c)
Automobiles
(d)
(e)
SC 015
2016/2017
8.
Physical Size
Speed
Storage
Super Computer
Mainframe
Personal Computer
9.
Cintahati Restaurant has adopted the facilities to customers with the use booking system.
Customers can access the system orders with their smart phone. Each order will be
recorded in the server. Customers will get a printed receipt once payment is made at the
counter.
(i)
(ii)
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
c) State the components of computer system and list down all the categories for each
component.
d) State and describe the processes involved in the information processing cycle.
______________
ii.
______________
______________
______________
v.
______________
vi.
______________
SC 015
2016/2017
and back.
j) State the definition of storage capacity.
l)
There are many types of memory cards that are used today. Give one (1) example
of them and state its capacity.
m) One of the measuring units for memory size is kilobyte (KB), which is equal to 1024
bytes.
i.
ii.
iii.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
2.
3.
Explain how the information is represented in binary form? Give one example
of a binary numbers.
4.
Give the next three (3) binary numbers in ascending order after 110.
5.
6.
11011
ii.
10111
iii.
1110011
7.
8.
Give the next three (3) hexadecimal integers in ascending order after FD.
9.
2910
ii. 2410
iii.
3810
iv. 6010
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
11011001
ii.
1011100
iii.
111001000
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
SC 015
2016/2017
4. The American Standard Code for Information Interchange or ASCII assigns values
between _____ and _____.
8. By using an 8-bit code, how many characters or bit combinations can be represented?
9. How many ASCII 'characters' does the following piece of text use:
ASCII rocks!
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
10
SC 015
2016/2017
13. The ASCII code for the letter 'Z' is 90 (base 10), what is the letter 'X' stored as?
14. How many bits would it take to represent the following phrase using the ASCII code?
15. How many bits would it take to represent the following phrase using the Unicode code?
16. How many bits would it take to represent the following phrase using the EBCDIC code?
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
11
(b)
(c)
a)
b)
A
B
c)
d)
A
B
e)
A
B
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
(d)
(e)
SC 015
2016/2017
12
f)
A
B
g)
A
B
h)
A
B
i)
j)
A
X
B
k)
A
X
B
2. Write the expressions and fill in the truth tables for following logic gates.
a)
A
Y
B
b)
A
Y
B
c)
A
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
13
d)
A
Y
B
e)
B
Y
f)
A
B
Y
2. Write a Boolean expression and the truth table to represent logic circuit below:
a)
A
Y
B
b)
A
B
Y
C
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
14
c)
d)
e)
a) Y = (A + B) C
h) X = A' B + A B'
b) F = A + B
c) X = A + BC + D
d) Z = AB + (AC)
k) Z = (A + B) (B ' + C)
e) F = (A + B) + C + D
l) Z = (A + B) ' B
f) Y = (A + B) (C + D) C
m) X = A + (BC) '
g) Y = (BC + A) (A' + C)
n) F = ((A + B) C ) '
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
15
SC 015
2016/2017
a) Electronic door will only open if it detects a person and the switch is set to
be unlocked.
b) Microwave will only start if the start button is pressed and the door close
switch is closed.
i) An electronic system will only operate if three switches R, S and T are correctly set.
An output signal ( X = 1 ) will occur if R and S are both in the ON position OR if R is
in the OFF position and S and T are both in the ON position. Design a logic circuit to
represent the above situation.
j) Create a logic circuit that will light a seat belt warming lamp if a car's
engine is on and the driver's seat belt is not plugged in.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
16
SC 015
2016/2017
7. Processor contains of two (2) units. Give the name of those units and explain.
8. What are the four (4) basic operations in a machine cycle and how does it work?
9. State two (2) units of measurement used in measuring the speed of a processor.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
17
SC 015
2016/2017
16. Differentiate between Random Access Memory (RAM) and Read Only Memory (ROM).
19. When someone used an application in a computer such as Microsoft Word, a few
operations take place in the Central Processing Unit (CPU).
State four (4) main operations of the CPU.
(ii) Fetch
(iii) Store
(iv) Decode
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
18
SC 015
2016/2017
10. What is the function of biometric input device? Give three (3) examples of biometric
input device.
12. Some input devices save users time by eliminating manual data entry. With this device,
users do not type, speak or write into the computer. Instead, these devices capture data
from a source document, which is original form of the data. Identify this input device.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
19
SC 015
2016/2017
20. Identify three (3) medium of storage. Give two (2) examples for each medium.
21. Storage holds data, instructions, and information for future use. Every computer uses
storage to hold system and application software. There are two (2) types of storage:
primary storage and secondary storage. Give two (2) examples for each of the storage.
24. Sophia would like to develop a multimedia presentation for her college.
a) Among the multimedia elements that she will include in her presentation are
pictures from the magazines and recorded voice over. Suggest the two (2)
input devices to help her to complete her presentation.
b) Name two (2) output devices that she can use to present her work.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
20
25. Aziah intends to include her photo and beautiful pictures from her favorite magazine to
make her presentation more attractive. Identify two (2) input devices to help her complete
her presentation.
26. Some input devices save users time by eliminating manual data entry. With this device,
users do not type, speak or write into the computer. Instead, these devices capture data
from a source document, which is original form of the data. Identify this input device.
Hardware Components
Category
What input device would have been used in the supermarket to read this label?
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
21
SC 015
2016/2017
1. Define software.
12. Give one (1) example of open source software and proprietary software for operating
system.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
22
SC 015
2016/2017
18. State (5) basic types of utility program and explain the functions for each type.
19. Give two (2) examples for each basic types of utility program.
20. Explain the purpose of disk cleanup, search utility and disc burning utility program.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
23
Purpose
Utility Programs
2. Most PC users see their computer system as hardware and software that effortlessly work
together. In addition, it receives that help from the operating system.
State two (2) purposes of operating system.
4. Aidid found that his computer is very slow when opening certain software. Suggest to
him one (1) utility program that he can use to overcome the problem.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
24
SC 015
2016/2017
c) Haris is a power user. He likes to use this operating system because of its flexibility
and power. Besides, he wants to use for his laptop and his computer in his office,
which connect to each other.
d) Sarah does not have enough money to buy operating system for her notebook. She is
looking for popular, free, multitasking UNIX-type operating system.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
25
4. Give one (1) example of proprietary software and open source software for each basic
application software.
Application Software
Proprietary Software
Word Processing
software.
Spreadsheet software.
Presentation software.
Database software.
Web browser
5. Sofia has to present her project to her lecturer using presentation software.
State two (2) examples of the software that she might use to complete her presentation.
SC 015
2016/2017
26
Usage
Application Software
Give one (1) examples of Proprietary Software that can be use to create a database as shown
above.
9.
a) Identify the type of application software that has been used by Xinyi to
produce this presentation.
b) Name two (2) examples of software mention in (a)
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
27
10.
SC 015
2016/2017
Your boss assigns you to advertise your company profile. Among the information that
you need to include in the advertisement is the company background and yearly turnover.
Based on the information given suggest any types of application software suitable:
11.
Millions of people use this software everyday to develop documents such as letters and
memos. Identify the category of software.
12.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
28
SC 015
2016/2017
2.
3.
4.
5.
6.
Transmission media
Explanation
Distributes radio signals through the air over
long distances
Broadcast radio that is used widely for
mobile communications
Space station that receives microwave signals
from earth-based station, amplifies and
broadcast the signal over wide area
Sends signal using infrared lightwaves
Radio waves that provide high speed signal
transmission
7.
8.
SC 015
2016/2017
29
2.
3.
4.
Physical Topology
Logical Topology
5.
6.
Draw a diagram and give a brief explanation on each of the network topology.
Network Topology
Explanation
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
30
Advantages
Network Topology
Disadvantages
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
31
2.
3.
Make a comparison for each classification network in term of Area Covered, Network
Size, Transmission Speed and Equipment Cost.
Network
Area Covered
Network Size
Transmission
Equipment
Speed
Cost
Classification
4.
Advantages
Disadvantages
Classification
5.
6.
Arif set up a small office with seven computers, three printers and one scanner. He set up a
Local Area Network (LAN) using a bus topology. Justify two (2) reasons for his choice of
topology.
7.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
32
1.
2.
3.
4.
Broadband/Direct
5.
6.
State a type of Internet connection in which the PC or other device must dial up and
connect to service providers computer via telephone lines before being connected to the
Internet.
7.
You need only open your browser to start your Internet session is referred to which type
of connection?
8.
9.
SC 015
2016/2017
33
10.
Many public locations, such as airports, hotels , schools, shopping malls and coffee shops
provide the internet connections to users with mobile computers or devices.
11.
(a)
A fast type of Internet access via standard phone lines; does not tie up your phone.
(b)
The most widely used type of home broadband connection; does not use standard
phone lines.
(c)
Provides access to the Internet via a very fast fiber optic network.
(d)
(e)
(f)
Accesses the Internet via standard phone lines and ties up your phone; the maximum
speed is 56 Kbps.
12. Give three (3) differences of DSL connection from dial-up connection.
DSL
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
Dial up
SC 015
2016/2017
34
1.
2.
3.
4.
IP Address
DNS
Name
5.
0.0.0.0
255.255.255.255
10.1.31.255
6.
7.
IPv4
IPv6
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
35
8.
SC 015
2016/2017
9.
10.
Identify two (2) top-level domains (TLD) used in the domain name and state what is
represented by each of them.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
36
2.
Differentiate Web page, Web site, home page and web server.
Web page
Web site
Home page
Web server
3.
4.
5.
6.
http://www.kmm.matrik.edu.my/bi/index.html
www.kmm.matrik.edu.my
/bi/
index.html
7.
8.
Internet Protocol address requires the user to memorize a certain number to visit any
website. What other methods are used to visit any web site?
9.
Define Web Browser and give two (2) examples of Web Browser.
10.
SC 015
2016/2017
37
11.
For a computer or mobile device to display a Web page, the page must be downloaded.
Explain what download means in this context.
12.
13.
Hypertext
Hypermedia
14.
15.
16.
Search Engine
17.
Subject Directory
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
38
SC 015
2016/2017
2.
When you manage a website what service you might use to transfer files from your
computer to the server. Give two examples of this service.
3.
4.
5.
Identify the type of Internet services based on the given statement below.
(a)
(b)
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
39
Wiki
(a)
(b)
(c)
(d)
A web site that offers variety of internet services from single, convenient
location.
(e)
Web site that encourages members in its online community to share their
interests, ideas, photos and videos with other registered users.
(f)
Collaborative Web site that allows users to create, add to, modify, or delete
the Web site content via their Web browser.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
40
SC 015
2016/2017
1.
2.
3.
State whether the following online behaviors are acceptable or not acceptable.
(a)
Ismail changes his sister's interest on Face book when she leaves her
computer for a while.
(b)
Alya types HAVE A GOOD DAY every morning to her friends in a chat room.
(c)
(d)
(e)
While waiting for her friend, Adrian send message to her cousin in rushing without
reading it.
(f)
Teacher sends brief e-mail to the students in order to let them know about the extra
class that will be held week after that.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
41
1.
2.
3.
4.
5.
6.
7.
Patent
Trademark
8.
9.
Copyright is a legal term that describes the right given to the creator for their literary and
artistic work.
(i)
(ii)
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
42
10.
SC 015
2016/2017
them
greedy in reaching their vision without realizing that they are doing cyber criminal. They
simply copied other's works to get profit and fast returns.
11.
(a)
(b)
( "Im Loving it"), (McDonalds double arches), (the Nike "swoosh"), (John Deere
Green)
12.
You have right to exclude others from making, using, selling, offering for sale,
or importing the invention for 20 years from the filing date (formerly 17 years from the
date the inventions was issued). As the owner, you have rights and do not have to actually
use or make your invention, you still have the right to exclude others from making and
using your patented invention.
What type of Intellectual Property for above statement?
13.
14.
What are the guidelines that we can practice to safeguard our personal information?
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
43
SC 015
2016/2017
1.
2.
(a)
(b)
Lately Mr. Raju has found that his computer has been illegally access by someone. In order
to overcome this problem, he has created a logon user name and password for his
computer. Furthermore, the computer has been infected with various malicious codes.
3.
(a)
(b)
Name one (1) type of malicious codes that has possibly attacked her
computer.
Malware is any type of software that is designed to infiltrate, and the damage a computer
system or network without the owner's knowledge or consent.
Identify the types of malware for each of the symptoms that may show if the computer is
infected.
ii
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
44
4.
SC 015
2016/2017
Madam Siti likes travelling around the world. She usually buys a flight ticket
via the Internet. Lately, she can see many more pop up advertising windows while she is
online. Her Internet service also becomes slowly down. Not just that, her web browser also
go to other websites she did not expected.
(a)
(b)
(c)
(d)
(e)
(f)
A method of attack that uses legitimate looking e-mail messages to get confidential
information (account numbers, passwords) from the recipient is known as
________________.
5.
The internet connection at En. Osman's work place is blazing fast. Whenever he is free, En.
Osman uses this advantage to download mp3, movies and application on to his computer.
(a)
(b)
State two other type of computer security risk that can arise from En.
Osman's actions.
(c)
6.
While completing her Computer Science assignment, Selvi experience a power outage.
When the power is restored, Selvi found out that all her work has gone.
Luckily the software that she uses to complete her assignment has a recovery feature. So
Selvi manage to salvage some of her assignment.
(a)
(b)
State 3 other causes that can lead to the above computer security risk?
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
45
SC 015
2016/2017
(c)
(d)
Explain one of the electrical disturbance that you have mention above and what
damage it can cause?
7.
There are no precise, reliable statistics on the amount of computer crime and the economic
loss to the victim partly because many of these crimes are apparently not detected by
victims, many of these crimes not reported to authorities, and partly because the losses are
often difficult to calculate.
8.
(a)
(b)
What is cybercrime?
(c)
(d)
The term attack can be used in a number of ways, from the more general meaning of an
attempt by a cracker to break into a computer to deface a homepage or to install a virus on
a computer to the more technical information security approach of the term, meaning an
attack to a cryptosystem.
(a)
(b)
(c)
What type of computer security risk does software piracy fall to?
(d)
(e)
9.
10.
11.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
46
12.
13.
14.
SC 015
2016/2017
Explain briefly :
(a)
spyware
(b)
Trojan horse
(c)
worm
(d)
computer virus
(e)
Root kit
(f)
Adware
hardware theft
(b)
software theft
(c)
information theft
State the purpose of antivirus program, spyware remover, personal firewall, firewall and
backup.
15.
16.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
47
1.
2.
Information Theft
System Failure
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
Security Measures
48
3.
SC 015
2016/2017
Siti Aminah was given a notebook by her parents as a present for her excellent
Performance in her Sijil Pelajaran Malaysia examination. She does not has any knowledge
in using a notebook seeks advice from her best friend, Humairah. One of her advice was to
update the antivirus frequently?
4.
(a)
(b)
(c)
(d)
Ameer is lecturer who has to present his working paper in a seminar held in Manila next
month. He represents Malaysia as well as Universiti Teknologi Malaysia.
a)
Ammer wants to ensure his presentation runs smoothly so he did a backup of his
presentation before heading to Manila. Explain what a backup is.
b)
5.
Name two high quality media to Ameer to store his presentation paper?
a)
What kind of solution does Aiminuddin has to take to avoid this intrusion?
b)
c)
If Aiminuddin unable to overcome the above problem by using the selected solution,
what kind of suggestion does he has to give to the management of the company?
6.
a.
Haizam think to restore the files in his laptop by copying the backed up files to their
original location.
b.
This process includes encryption and decryption process. It also ensures that no one
can read the message except the intended receiver.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
49
SC 015
2016/2017
c.
d.
e.
Ensure that computers are safe from malicious threat by routine check to
Update from new virus, worm or other malicious threat.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
50
[3 marks]
[3 marks]
[4 marks]
(b) Show the conversion of the hexadecimal number 4F6A to decimal number.
[4 marks]
(c) Show the conversion of the hexadecimal number F3A2 to binary number.
[4 marks]
[4 marks]
B
A
F
(b) Draw the logic circuit for the Boolean expression (BC + A)(A + C) = Y.
[6 marks]
(c) How many bits would it take to represent the following phrase using the ASCII code ?
Introduction to Computer Science
[4 marks]
(d) One of the units of measuring memory size is kilobyte (KB), which is equal to 1024
bytes.
(i) State one gigabyte (GB) in megabytes (MB).
[1 mark]
[1 mark]
[4 marks]
[3 marks]
(c) Central Processing Units (CPUs) contain two parts. Describe the two (2) parts [4 marks]
(d) Give three (3) utility programs and state their functions.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
[6 marks]
51
SC 015
2016/2017
5. (a) A computer network is a collection of computers and devices connected together via
communication devices and transmission media.
(i) Name three (3) communication network devices.
[3 marks]
(ii) What is the difference between a Local Area Network (LAN) and Metropolitan Area
Network (MAN) ?
[2
marks]
(iii)Name the largest public Wide Area Network.
[1 mark]
(b) (i) All of the computers and devices (nodes) on the network connect to a central device.
All data that transfers from one node to another passes through the hub or switch.
What is the network topology described by this statement ?
[2 marks]
(ii) Draw the ring network topology.
[2 marks]
[4 marks]
6. Puan Laila plans to subscribe Internet services at home and requests your opinion on the
following matters :
(a) What is the importance of Internet access ?
[2 marks]
(b) Give three (3) Internet service providers in Malaysia.
[3 marks]
(c) Give two (2) differences between dial-up and broadband services.
[4 marks]
[4 marks]
[2 marks]
[2 marks]
[1 mark]
(ii) Which part of the Web page address above is known as protocol ?
[1 mark]
(iii) Which part of the Web page address above is known as domain name ?
[1 mark]
(iv) Which part of the Web page address above is known as Web page name ?
[1 mark]
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
52
[2 marks]
[2 marks]
B
A
FIGURE 2
8. (a) Phishing is an email fraud scam use for identity theft.
(i) Define identity theft.
[3 marks]
[4 marks]
(b) Based on the given situation, identify the type of computer crime.
(i) En. Faisal makes a copyright image of a company from the companys Web site
without permission and displays the image in his companys Web site.
[2 marks]
(ii) Siti downloaded Harry Potter movie from the Internet and then made DVD copies to
sell them to her friends.
[2 marks]
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
53
[2 marks]
[3 marks]
2. (a) Information processing cycle is a series of input, process, output and storage activities
performed by a computer. Draw a diagram of information processing cycle. [3 marks]
(b) Ahmad has used 780 megabytes (MB) of storage in his computer. Convert 780 MB into
:
(i) Kilobytes (KB)
[1 mark]
[1 mark]
(c) The numbering system is used to represent any input from user to be stored in a
computer.
(i) Show the conversion of the binary number 1001010 to decimal number.
[3 marks]
(ii) Show the conversion of the hexadecimal number D9B1 to binary number.
[3 marks]
(d) Give one (1) difference between ASCII and Unicode coding schemes.
[2 marks]
[3 marks]
A
B
Y
FIGURE 1
(f) Draw the logic circuit for the Boolean expression F = (B + A)C + (A + D).
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
[5 marks]
54
SC 015
2016/2017
[3 marks]
[4 marks]
(c) There are many adapter cards that can be slotted into motherboard. List three (3) types
of adapter card and their functions.
[6 marks]
(d) Describe the function of Arithmetic Logic Unit (ALU).
4. (a) State four (4) functions of an operating system.
[2 marks]
[4 marks]
(b) Give two (2) utility programs and state their functions.
[4 marks]
[4 marks]
[6 marks]
[2 marks]
(b) State one (1) difference between local area network (LAN) and wide area network
(WAN).
[2 marks]
http://www.nps.gov/info/planproject/wildlifeviewing.htm
Name the components of the Web page address.
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
[4 marks]
55
SC 015
2016/2017
[6 marks]
(b) List three (3) types of Web site and explain their functions.
[6 marks]
[3 marks]
8. Most of the Internet based companies have their products protected under intellectual
property rights (IP).
(a) Give two (2) reasons why a product must have an IP.
[4 marks]
[6 marks]
(d) State two (2) security measures to reduce hardware theft or hardware vandalism.
[2 marks]
[2 marks]
2. (a) The numbering system is used to represent any input from user to be stored in a
computer.
(i) Show the conversion of A416 to binary number.
[3 marks]
(ii) Show the conversion of 001110012 to decimal number.
(b) Draw the logic circuit for the Boolean expression Y = UV + (W + X)U
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
[3 marks]
[6 marks]
SC 015
2016/2017
56
[4 marks]
J
X
Y
FIGURE 1
[8 marks]
(b) Explain the function of output device and give two (2) examples of output devices.
[4 marks]
(c) Explain what is Motherboard and list four (4) of its main electronic components.
[3 marks]
4. (a) Briefly explain three (3) functions of operating system.
[6 marks]
(b) State the function of :
(i) Disk Cleanup
[2 marks]
[2 marks]
[2 marks]
(d) List four (4) examples of utility programs which are often used by computer users.
[4 marks]
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
57
SC 015
2016/2017
[2 marks]
[2 marks]
(c) Draw a bus network topology containing three PC, one printer and one server.
[3 marks]
(e) What is Metropolitan Area Network (MAN) ?
[1 mark]
[2 marks]
[2 marks]
(ii) Wi-Fi
[2 marks]
(b) (i)
(ii)
(c) (i)
(ii)
[1 mark]
[3 marks]
What is IP Address ?
[2 marks]
[2 marks]
[4 marks]
7. The Web is one of many services on the Internet. The Internet services have changed the
way people communicate.
(a) Discuss the types of internet services below :
(i) FTTP
(ii)
VoIP
[2 marks]
[2 marks]
(b) List any two (2) types of Websites and explain their functions.
[4 marks]
(c) Based on the Golden Rule : Treat others as you would like them to treat you.
State two (2) rules in Netiquette.
[2 marks]
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
58
8. (a) Green computing involves reducing the electricity and environmental waste while using
a computer. State any three (3) suggestions to support green computing.
[3 marks]
(b) Discuss two (2) threats firewalls can protect.
[4 marks]
[1 mark]
(d) Identify and clarify three (3) key questions to ask when setting up an authentication
system ?
[3 marks]
(i)
Category
Embedded computer
(ii)
Mobile computer
Definition
Example
[1 mark]
[2 marks]
[3 marks]
[3 marks]
[6 marks]
[1 mark]
[8 marks]
[1 mark]
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
59
(d) Identify the appropriate type of memory based on the given characteristics.
Characteristics
(i) The contents will be kept even when
the power is turned off.
(ii) Holds data or programs that are
currently being used by the processor.
(iii) Can be read from and written to by
processor.
[6 marks]
Memory type
4. (a) Give one (1) example of application software based on the given usages.
[6 marks]
Usages
Example
Description
Backup
Restore
(ii) List one (1) popular compression tool which is often used by computer users.
[1 mark]
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
60
5. Network architectures are always classified into two broad categories : client-server
architectures, and peer-to-peer architectures.
(a) State one (1) difference between client-server and peer-to-peer architectures.
[4 marks]
(b) Draw client-server architecture.
[4 marks]
(c) State and explain two (2) disadvantages of client-server architecture compared to peer-topeer architecture.
[4 marks]
6. Internet is a network of the interlinked computer networking worldwide, which is accessible
to the general public.
(a) Name and explain two (2) types of Internet connection.
[4 marks]
(b) Explain two (2) purposes of web browser.
[4 marks]
(c) A web page has a unique address called a Uniform Resource Locator (URL).
(i)
(ii)
[2 marks]
[2 marks]
7. (a) Explain one (1) function of Voice over Internet Protocol (VoIP) which is a kind of
Internet
service, and give two (2) examples of VoIP products.
[4 marks]
(b) Describe one (1) difference between blog and Facebook.
[2 marks]
(c) There are two ways of navigation. State the difference between them.
[2 marks]
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~
SC 015
2016/2017
61
(d) For every domain name, the text version for IP address consists of top level domain
(TLD). Complete four (4) of the generic TLD in the following table.
[4 marks]
Generic TLD
Purpose
Example
.net
(i)
.biz
(ii)
.gov
(iii)
.org
(iv)
.edu
[4 marks]
(b) Privacy is a big concern for individuals, particularly as it relates to their Web activity.
(i)
(ii)
(c) The table below shows a conversation between a primary school student with his class
teacher in a chat room.
Pupil Y
Teacher X
Pupil Y
Identify three (3) rules in netiquette that are against the above chat conversation.
[3 marks]
COMPUTER SCIENCE
~ KOLEJ MATRIKULASI MELAKA ~