SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
ICT TRIAL EXAM 2012
Marking Scheme For Section A
Question No. CHIPS Answer Marks
1. C 1
2. False 2
3. i) J 3
ii) M 4
4. i) Computer fraud 5
ii) Copyright infringement 6
5. D 7
6. i) 220
8
ii) 1000000 9
7. i) B 10
ii) A 11
8. i) LAN 12
ii) Peer-to-peer 13
9. True 14
10. i) N 15
ii) Extranet 16
11. i) Fiber optic 17
ii) e-commerce, e-business 18
12. i) L 19
ii) N 20
13. False 21
14. B 22
15. Clarity 23
16. D 24
17. i) P 25
ii) Q 26
18. i) Double 27
ii) Area 28
19. RM 240 29
20. False 30
21. i) Procedure 31
ii) People/human/user 32
22. C 33
23. False 34
24. Query 35
25. Modify 36
TOTAL MARKS
Marking Scheme Section B
Trial Exam 2012
26. a. Cyber Law
b. Fraud – Having attention to take advantage over or causing loss to the
other people, mainly on monetary basis through the use of computer eg
email hoaxes, programme fraud, investment scheme, sales promotion,
hacking
1 mark
Fraud – 1m
Definition of fraud – 1m
Example of fraud – 1m
27 a. A- Presentation
B - Graphic
b. 2 Characteristics of OS
• software provided for use, modification and redistribution
• software that any programmer can download from the Internet for
• free and modify with suggested improvements.the only
qualification is that changes can't be copyrighted
1 mark
1 mark
Any 2
2 marks
28 a. B - Coaxial Cable
C – Fiber optic
b. No cost for physical medium
- Data can be sent to unlimited people – no network
- Data can be transmitted faster
- Wider area of coverage
1 mark
1 mark
Any 2
2 marks
29 a. Testing
The multimedia developers will use a checklist to test the
multimedia program. If there are any errors, the programmer will
fix the program.
b. Navigation/ interface / content.
Navigation –navigation aids and consistency
Interface – casper principles are used
Which are contrast, proximity, emphasis and
repetition
Content – the goals of the program, text, graphics, audio, video,
animation, language used and how informative the program is.
1 mark
1 mark for description
Any one and
explanation
2 marks.
30 a. Approach A – Structured approach
Approach B - Object –oriented approach
b.
A Differences B
Uses a top down
design model
Uses Uses object
Programmer
divides
programming
problem into
module
Emphasize The programmer
packages the
data and
function into
single unit ,
object
Medium
programming
project
Suitable for Large
programming
project
1 mark
1 mark
Any two differences
(2 Pairs) for 2
marks
Marking Scheme Section C
Trial Exam 2012
31. (a) Someone – perpetrators
- Category of perpetrators
Category Description
Hacker Someone who accesses a computer or network
illegally. They often claim the intent of their
security breaches is to improve security. They have
advanced computer skills.
Cracker Someone who accesses a computer or network
illegally, but has the intent of destroying data,
stealing information, or other malicious action.
They have advanced computer skills.
Script Kiddie Someone who has the same intent as a cracker but
does not have the technical skills and knowledge.
They are often teenagers.
Corporate
Spy
Someone who is hired to break into a specific
computer and steal its proprietary data and
information.
Unethical
Employee
Employees who break into their employers’
computers for a variety of reasons.
Cyber
Extortionist
Someone who uses e-mail as a vehicle for extortion
or libeling.
Cyber
Terrorist
Someone who uses the Internet or network to
destroy or damage computers for political reasons.
Perpetrators -1 m
1 category – 1m
1 discription – 1m
Total = 3marks
31. (b) Describe 2 ways how people to protect their computer (through
human aspects)
• User should be identified and authenticated
• Users should disable file and printer sharing on Internet
connection.
• Users should implement physical access control (looked
doors, windows and equipment)
• Users should use passwords, possessed objects and
biometrics.
• Any reasonable answer – action take by the human/user.
Any two and give
briefly explanation.
4 marks
(what action should
take by the human)
32.
Input Processing Output
Customer name
Model of the car
Price of the car
Down Payment
Number of Years for
the loan
Annual Interest
percentage
Loan = Price – Down
Payment
Monthly Instalment =
(((Loan x (Annual Interest
Percentage / 100)) x
Number of Years + Loan) /
(Number of Years x 12)
Monthly
Installment
Input – any 4 input for
4 marks
Processs – 2 formula
for 2 marks
Output – 1 output
For 1 marks
Total = 7 marks
33.
33.
(a)
(i) Fill
(ii) Mak
(iii) Writ
Friend’
Friend ID
Name
Address
Date of B
(b) Create a
FRIE
NAM
ADD
DAT
in the fields
ke relationshi
te PK and FK
’s Info
D (PK)
irth
a form
FRIE
END ID
ME
DRESS
TE OF BIRT
into the table
ip ( one to m
K
END’S INFO
TH
A0
HA
No
Ta
25
15
e
many)
Pho
Tele
Frie
ORMATION
001
ASNUL BIN
o. 3 Lorong
aman Kg Pa
5200 Kuanta
5.05.1994
ne Number
ephone Num
end ID (FK)
N FORM
N AWANG
g 70,
adang 2,
an.
ber
G
Field i
(any 3
Field i
(all Cor
Label PK
make rel
Total =
Form T
Any 3 F
Sample
Draw for
Total =
in table 1
3) – 1 m
in table 2
rrect)– 1m
K & FK and
lationship –
1m
= 3 marks
Title – 1m
Fields – 1m
data – 1 m
rm in box –
1m
= 4 marks

Mais conteúdo relacionado

Destaque

Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-schemeAyuMohamad
 
Kota tinggi-question
Kota tinggi-questionKota tinggi-question
Kota tinggi-questionAyuMohamad
 
Wilayah persekutuan-scheme
Wilayah persekutuan-schemeWilayah persekutuan-scheme
Wilayah persekutuan-schemeAyuMohamad
 
Selangor question
Selangor questionSelangor question
Selangor questionAyuMohamad
 
Seri kota-question
Seri kota-questionSeri kota-question
Seri kota-questionAyuMohamad
 
Cxc pob sba template with mark scheme
Cxc pob sba template with mark schemeCxc pob sba template with mark scheme
Cxc pob sba template with mark schemesuperbmars
 

Destaque (6)

Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-scheme
 
Kota tinggi-question
Kota tinggi-questionKota tinggi-question
Kota tinggi-question
 
Wilayah persekutuan-scheme
Wilayah persekutuan-schemeWilayah persekutuan-scheme
Wilayah persekutuan-scheme
 
Selangor question
Selangor questionSelangor question
Selangor question
 
Seri kota-question
Seri kota-questionSeri kota-question
Seri kota-question
 
Cxc pob sba template with mark scheme
Cxc pob sba template with mark schemeCxc pob sba template with mark scheme
Cxc pob sba template with mark scheme
 

Semelhante a Marking scheme-trial-ict-2012

REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxREVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxjoellemurphey
 
DigComp 2.2 update (step6: validation)
DigComp 2.2 update (step6: validation)DigComp 2.2 update (step6: validation)
DigComp 2.2 update (step6: validation)Riina Vuorikari
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examgiquickly
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examginistays
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis MPhil/MRes/BSc
 
Bis 220 final examination
Bis 220 final examinationBis 220 final examination
Bis 220 final examinationbeatcourse
 
Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Siti Salmiah
 
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxCOIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxclarebernice
 
ASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEAR
ASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEARASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEAR
ASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEARDon Dooley
 
Bis 220 bis/220 final exam 100% correct answers
Bis 220 bis/220 final exam 100% correct answersBis 220 bis/220 final exam 100% correct answers
Bis 220 bis/220 final exam 100% correct answersGliven
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%largest433
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%flyperhan
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%sharing3444
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%singup22
 
Multiple ChoiceAnswer ALL questions form this section. This sect.docx
Multiple ChoiceAnswer ALL questions form this section. This sect.docxMultiple ChoiceAnswer ALL questions form this section. This sect.docx
Multiple ChoiceAnswer ALL questions form this section. This sect.docxrosemarybdodson23141
 

Semelhante a Marking scheme-trial-ict-2012 (20)

Set5 ict-question
Set5 ict-questionSet5 ict-question
Set5 ict-question
 
Set1 ict-question
Set1 ict-questionSet1 ict-question
Set1 ict-question
 
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxREVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
 
DigComp 2.2 update (step6: validation)
DigComp 2.2 update (step6: validation)DigComp 2.2 update (step6: validation)
DigComp 2.2 update (step6: validation)
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
 
Bis 220 final
Bis 220 finalBis 220 final
Bis 220 final
 
Bis 220
Bis 220 Bis 220
Bis 220
 
Bis 220 final examination
Bis 220 final examinationBis 220 final examination
Bis 220 final examination
 
Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3
 
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxCOIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
 
ASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEAR
ASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEARASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEAR
ASSIGNMENT BOOKLET 2018 DIPLOMA IN IT 3 YEARS 1ST YEAR
 
Bis 220 bis/220 final exam 100% correct answers
Bis 220 bis/220 final exam 100% correct answersBis 220 bis/220 final exam 100% correct answers
Bis 220 bis/220 final exam 100% correct answers
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Multiple ChoiceAnswer ALL questions form this section. This sect.docx
Multiple ChoiceAnswer ALL questions form this section. This sect.docxMultiple ChoiceAnswer ALL questions form this section. This sect.docx
Multiple ChoiceAnswer ALL questions form this section. This sect.docx
 
A01 assignment-1
A01 assignment-1A01 assignment-1
A01 assignment-1
 

Mais de AyuMohamad

Mais de AyuMohamad (15)

Soalan percubaan-ict-ting5-2012
Soalan percubaan-ict-ting5-2012Soalan percubaan-ict-ting5-2012
Soalan percubaan-ict-ting5-2012
 
Topology
TopologyTopology
Topology
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
Hardware
HardwareHardware
Hardware
 
Contoh rpm rpt
Contoh rpm rptContoh rpm rpt
Contoh rpm rpt
 
Networks
NetworksNetworks
Networks
 
Module networks
Module networksModule networks
Module networks
 
Module multimedia
Module multimediaModule multimedia
Module multimedia
 
Contoh rph
Contoh rphContoh rph
Contoh rph
 
Hsp ict 2006
Hsp ict 2006Hsp ict 2006
Hsp ict 2006
 
Skype
SkypeSkype
Skype
 
Web Application_Facebook
Web Application_FacebookWeb Application_Facebook
Web Application_Facebook
 
Web application
Web applicationWeb application
Web application
 
Sgdm3043 1
Sgdm3043 1Sgdm3043 1
Sgdm3043 1
 

Marking scheme-trial-ict-2012

  • 1. ICT TRIAL EXAM 2012 Marking Scheme For Section A Question No. CHIPS Answer Marks 1. C 1 2. False 2 3. i) J 3 ii) M 4 4. i) Computer fraud 5 ii) Copyright infringement 6 5. D 7 6. i) 220 8 ii) 1000000 9 7. i) B 10 ii) A 11 8. i) LAN 12 ii) Peer-to-peer 13 9. True 14 10. i) N 15 ii) Extranet 16 11. i) Fiber optic 17 ii) e-commerce, e-business 18 12. i) L 19 ii) N 20 13. False 21 14. B 22 15. Clarity 23 16. D 24 17. i) P 25 ii) Q 26 18. i) Double 27 ii) Area 28 19. RM 240 29 20. False 30 21. i) Procedure 31 ii) People/human/user 32 22. C 33 23. False 34 24. Query 35 25. Modify 36 TOTAL MARKS
  • 2. Marking Scheme Section B Trial Exam 2012 26. a. Cyber Law b. Fraud – Having attention to take advantage over or causing loss to the other people, mainly on monetary basis through the use of computer eg email hoaxes, programme fraud, investment scheme, sales promotion, hacking 1 mark Fraud – 1m Definition of fraud – 1m Example of fraud – 1m 27 a. A- Presentation B - Graphic b. 2 Characteristics of OS • software provided for use, modification and redistribution • software that any programmer can download from the Internet for • free and modify with suggested improvements.the only qualification is that changes can't be copyrighted 1 mark 1 mark Any 2 2 marks 28 a. B - Coaxial Cable C – Fiber optic b. No cost for physical medium - Data can be sent to unlimited people – no network - Data can be transmitted faster - Wider area of coverage 1 mark 1 mark Any 2 2 marks 29 a. Testing The multimedia developers will use a checklist to test the multimedia program. If there are any errors, the programmer will fix the program. b. Navigation/ interface / content. Navigation –navigation aids and consistency Interface – casper principles are used Which are contrast, proximity, emphasis and repetition Content – the goals of the program, text, graphics, audio, video, animation, language used and how informative the program is. 1 mark 1 mark for description Any one and explanation 2 marks. 30 a. Approach A – Structured approach Approach B - Object –oriented approach b. A Differences B Uses a top down design model Uses Uses object Programmer divides programming problem into module Emphasize The programmer packages the data and function into single unit , object Medium programming project Suitable for Large programming project 1 mark 1 mark Any two differences (2 Pairs) for 2 marks
  • 3. Marking Scheme Section C Trial Exam 2012 31. (a) Someone – perpetrators - Category of perpetrators Category Description Hacker Someone who accesses a computer or network illegally. They often claim the intent of their security breaches is to improve security. They have advanced computer skills. Cracker Someone who accesses a computer or network illegally, but has the intent of destroying data, stealing information, or other malicious action. They have advanced computer skills. Script Kiddie Someone who has the same intent as a cracker but does not have the technical skills and knowledge. They are often teenagers. Corporate Spy Someone who is hired to break into a specific computer and steal its proprietary data and information. Unethical Employee Employees who break into their employers’ computers for a variety of reasons. Cyber Extortionist Someone who uses e-mail as a vehicle for extortion or libeling. Cyber Terrorist Someone who uses the Internet or network to destroy or damage computers for political reasons. Perpetrators -1 m 1 category – 1m 1 discription – 1m Total = 3marks 31. (b) Describe 2 ways how people to protect their computer (through human aspects) • User should be identified and authenticated • Users should disable file and printer sharing on Internet connection. • Users should implement physical access control (looked doors, windows and equipment) • Users should use passwords, possessed objects and biometrics. • Any reasonable answer – action take by the human/user. Any two and give briefly explanation. 4 marks (what action should take by the human) 32. Input Processing Output Customer name Model of the car Price of the car Down Payment Number of Years for the loan Annual Interest percentage Loan = Price – Down Payment Monthly Instalment = (((Loan x (Annual Interest Percentage / 100)) x Number of Years + Loan) / (Number of Years x 12) Monthly Installment Input – any 4 input for 4 marks Processs – 2 formula for 2 marks Output – 1 output For 1 marks Total = 7 marks
  • 4. 33. 33. (a) (i) Fill (ii) Mak (iii) Writ Friend’ Friend ID Name Address Date of B (b) Create a FRIE NAM ADD DAT in the fields ke relationshi te PK and FK ’s Info D (PK) irth a form FRIE END ID ME DRESS TE OF BIRT into the table ip ( one to m K END’S INFO TH A0 HA No Ta 25 15 e many) Pho Tele Frie ORMATION 001 ASNUL BIN o. 3 Lorong aman Kg Pa 5200 Kuanta 5.05.1994 ne Number ephone Num end ID (FK) N FORM N AWANG g 70, adang 2, an. ber G Field i (any 3 Field i (all Cor Label PK make rel Total = Form T Any 3 F Sample Draw for Total = in table 1 3) – 1 m in table 2 rrect)– 1m K & FK and lationship – 1m = 3 marks Title – 1m Fields – 1m data – 1 m rm in box – 1m = 4 marks