SlideShare uma empresa Scribd logo
1 de 7
No. KadPengenalan
AngkaGiliran :
Question No.
No. Soalan
Candidate’s Answer
JawapanCalon
Marks
Markah
1 Third Generation/GenerasiKetiga 1
2 D 2
3
(i) Bit/Bit 3
(ii) Character/Aksaraor Byte/Bait 4
4
(i) R 5
(ii) Q 6
5 Network Operating System/SistemPengoperasianRangkaian 7
6 Spreadsheet Software/PerisianHamparanElektronik 8
7 C 9
8 T E-Banking/PerbankanElektronik 10
9
(i) LAN/Local Area Network/RangkaianKawasanSetempat 11
(ii) Client-Server/Pelayan-Pelanggan 12
10 Transmission Control Protocol/Internet Protocol 13
11 M Bus Topology/Topologi Bas 14
12 A 15
13
(i) Programmer/Pengaturcara 16
(ii) Implementation Phase/FasaPelaksanaan 17
14
(i) True/Benar 18
(ii) True/Benar 19
15
(i) Q 20
(ii) P 21
16 D 22
17
(i) True/Benar 23
(ii) True /Benar 24
18
(i) L 25
(ii) K 26
19 B 27
20
A Relational Operator/OperasiHubungan 28
B Logical Operator/OperasiLogik 29
21
i False/Palsu 30
ii True/Benar 31
22 X E-Business/PerniagaanElektronik 32
23 Z Software/Perisian 33
24 P A 34
25
(i) Table/Jadual 35
(ii) Registration Number/NomborPendaftaran 36
SULIT
Answer Sheet
HelaianJawapan
SULIT3765/1 © 2011 HakCipta SMKSemenchu
Answer Scheme
Section B
(20 Marks)
26.
a)
i. The internet filtering method used is Site blocking. [1m]
ii. Keyword Blocking/Web rating System [1m]
-choose any related answer-
b) Keyword Blocking
- List of banned words or objectionable terms. [1m]
Web Rating System
- Browser set to only accept pages with certain levels of ratings. [1m]
- Rating done either by the web page author or by the independent bureau. [1m]
-choose any related answer-
27.
a)
i. X : Operating System [1m]
ii. Z : Proprietary Software [1m]
b) Function of X :
- Starting a computer
- Managing data and programs
- Managing memory
- Configuring devices
-choose any two related answer- [2m]
28.
a) Star Topology [1m]
: because the system has switch [1m]
b) Differences between star topology and ring topology
Star Topology Ring Topology
Structure There is a central host
and all nodes connect to
it.
All computers and other
devices are connected in a
circle.
Host existence Yes Depends on network
needs.
Connection between
nodes
No Yes
Node failure Network can still run Network will fail
1 mark for any correct pair. Answer must be in pair form. Answer could be in table form or
paragraph. Choose any two related answer. [2m]
29.
a)
i. Text-based [1m]
ii. WYSIWYG [1m]
b)
- User friendly –does not require any HTML knowledge
- It is easier for an average computer user
- Easy to insert a specific tag
- Can visualize the design
-choose any two related answer- [2m]
30.
a)
i. X : Compiler [1m]
ii. Y : Interpreter [1m]
b) Differences between X and Y
X (Compiler) Y (Interpreter)
Translate statement line by line and execute it
immediately.
Translate entire programming statement at
one time and executes.
Store machine language as object code on the
disk.
No object code is created or saved.
1 mark for any correct pair. Answer must be in pair form. Answer could be in table form or paragraph.
[2m]
Answer Scheme
Section C
(14 marks)
31.
a)
i. Create two tables
BOOK SUPPLIER
Book ID
Book Title
Price
Supplier Registration Number
Book ID
Supplier Name
Supplier Address
[1m] [1m]
-Students can get 1 mark if fields in both tables are not same as above-
ii. Table for book : BOOK [1m]
Table for supplier : SUPPLIER [1m]
-It could be any name of table but must according the answer in a(i)-
b)
i. Primary key for book table : Book ID
Primary key for supplier table : Supplier Registration Number
-Students must state the primary key for each table to get 1 mark- [1m]
ii. Create relationship between the tables and state the type of relationship.
BOOK SUPPLIER
Book ID
Book Title
Price
Supplier Registration Number
Book ID
Supplier Name
Supplier Address
Type of relationship : one-to-many
-The answer must according answer in (a)- [2m]
Create relationship between the tables and state the type of relationship.
b. ii)
SUPPLIER BOOK
Supplier Registration Number
Supplier Name
Supplier Address
Book ID
Book Title
Price
Supplier Registration Number
Type of relationship : one-to-many
32.
a)
i. L is information processing cycle. [1m]
ii. Y are RAM, ROM, hardisk, pendrive, CD, DVD, removable disk
-Choose any two answer- [2m]
b) Explain process L
- An Input device feed raw data to the processor. [1m]
- X processes raw data and turns it into useful information. [1m]
- Y keeps or stores both process and unprocess data for later usage. [1m]
- An output device shows or display the processed data. [1m]
33.
a) Type of network communication technology used between Central Site and Customer Site :
- Extranet [1m]
b) Type of network communication technology Z use in Central Site :
- Z – Intranet [1m]
- It’s a private network that limited for employee only
Or
- It’s an internal network that uses Internet technologies and it is a small version of the Internet that
exists within an organisation.
-Choose any related answer- [1m]
c) Two differences between network communication technologies Z and network communication technologies
between Central site and Customer site
Technologies Z [ Intranet ] Extranet
Is used for organization and employees
only.
Is used for supplier, customer and business
partner.
Security level is high. Security level is high and it used Virtual
Private Network to communicate.
-2 marks for any correct pair. Answer must be in pair form. Answer could be in table form or
paragraph.- [4m]
33.
a) Type of network communication technology used between Central Site and Customer Site :
- Extranet [1m]
b) Type of network communication technology Z use in Central Site :
- Z – Intranet [1m]
- It’s a private network that limited for employee only
Or
- It’s an internal network that uses Internet technologies and it is a small version of the Internet that
exists within an organisation.
-Choose any related answer- [1m]
c) Two differences between network communication technologies Z and network communication technologies
between Central site and Customer site
Technologies Z [ Intranet ] Extranet
Is used for organization and employees
only.
Is used for supplier, customer and business
partner.
Security level is high. Security level is high and it used Virtual
Private Network to communicate.
-2 marks for any correct pair. Answer must be in pair form. Answer could be in table form or
paragraph.- [4m]

Mais conteúdo relacionado

Destaque

Selangor question
Selangor questionSelangor question
Selangor questionAyuMohamad
 
Wlayah persekutuan-question
Wlayah persekutuan-questionWlayah persekutuan-question
Wlayah persekutuan-questionAyuMohamad
 
Selangor scheme
Selangor schemeSelangor scheme
Selangor schemeAyuMohamad
 
Kota tinggi-question
Kota tinggi-questionKota tinggi-question
Kota tinggi-questionAyuMohamad
 
Wilayah persekutuan-scheme
Wilayah persekutuan-schemeWilayah persekutuan-scheme
Wilayah persekutuan-schemeAyuMohamad
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-schemeAyuMohamad
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-schemeAyuMohamad
 
Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012AyuMohamad
 
Seri kota-question
Seri kota-questionSeri kota-question
Seri kota-questionAyuMohamad
 

Destaque (9)

Selangor question
Selangor questionSelangor question
Selangor question
 
Wlayah persekutuan-question
Wlayah persekutuan-questionWlayah persekutuan-question
Wlayah persekutuan-question
 
Selangor scheme
Selangor schemeSelangor scheme
Selangor scheme
 
Kota tinggi-question
Kota tinggi-questionKota tinggi-question
Kota tinggi-question
 
Wilayah persekutuan-scheme
Wilayah persekutuan-schemeWilayah persekutuan-scheme
Wilayah persekutuan-scheme
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-scheme
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-scheme
 
Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012
 
Seri kota-question
Seri kota-questionSeri kota-question
Seri kota-question
 

Semelhante a Kota tinggi-scheme

C. Science (I) solution.pdf
C. Science (I)  solution.pdfC. Science (I)  solution.pdf
C. Science (I) solution.pdfShahzadaSuleman2
 
Cis 175 Enthusiastic Study / snaptutorial.com
Cis 175 Enthusiastic Study / snaptutorial.comCis 175 Enthusiastic Study / snaptutorial.com
Cis 175 Enthusiastic Study / snaptutorial.comGeorgeDixon96
 
Cis 175 Success Begins / snaptutorial.com
Cis 175 Success Begins / snaptutorial.comCis 175 Success Begins / snaptutorial.com
Cis 175 Success Begins / snaptutorial.comRobinson066
 
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxCOIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxclarebernice
 
Electronic Nameplate System
Electronic Nameplate SystemElectronic Nameplate System
Electronic Nameplate SystemIRJET Journal
 
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxIFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxscuttsginette
 
Cis 175/tutorialoutlet
Cis 175/tutorialoutletCis 175/tutorialoutlet
Cis 175/tutorialoutletPatmorez
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...smumbahelp
 
IRJET- Next Generation System Assistant
IRJET- Next Generation System AssistantIRJET- Next Generation System Assistant
IRJET- Next Generation System AssistantIRJET Journal
 
It110 assignment-1 answer key
It110 assignment-1 answer keyIt110 assignment-1 answer key
It110 assignment-1 answer keyJVM_
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2Rexon Calub
 
Federated Machine Learning Framework
Federated Machine Learning FrameworkFederated Machine Learning Framework
Federated Machine Learning FrameworkAnup kumar
 

Semelhante a Kota tinggi-scheme (20)

A01 assignment-1
A01 assignment-1A01 assignment-1
A01 assignment-1
 
C. Science (I) solution.pdf
C. Science (I)  solution.pdfC. Science (I)  solution.pdf
C. Science (I) solution.pdf
 
Cis 175 Enthusiastic Study / snaptutorial.com
Cis 175 Enthusiastic Study / snaptutorial.comCis 175 Enthusiastic Study / snaptutorial.com
Cis 175 Enthusiastic Study / snaptutorial.com
 
Cis 175 Success Begins / snaptutorial.com
Cis 175 Success Begins / snaptutorial.comCis 175 Success Begins / snaptutorial.com
Cis 175 Success Begins / snaptutorial.com
 
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docxCOIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
COIT20262 Assignment 1 Term 1, 2018 Advanced Network Secur.docx
 
Electronic Nameplate System
Electronic Nameplate SystemElectronic Nameplate System
Electronic Nameplate System
 
Set5 ict-question
Set5 ict-questionSet5 ict-question
Set5 ict-question
 
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxIFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docx
 
Cis 175/tutorialoutlet
Cis 175/tutorialoutletCis 175/tutorialoutlet
Cis 175/tutorialoutlet
 
Mi0035 computer networks...
Mi0035  computer networks...Mi0035  computer networks...
Mi0035 computer networks...
 
IRJET- Next Generation System Assistant
IRJET- Next Generation System AssistantIRJET- Next Generation System Assistant
IRJET- Next Generation System Assistant
 
C programming part2
C programming part2C programming part2
C programming part2
 
C programming part2
C programming part2C programming part2
C programming part2
 
C programming part2
C programming part2C programming part2
C programming part2
 
Shai 2
Shai 2Shai 2
Shai 2
 
Lab onedesignwriteup
Lab onedesignwriteupLab onedesignwriteup
Lab onedesignwriteup
 
It110 assignment-1 answer key
It110 assignment-1 answer keyIt110 assignment-1 answer key
It110 assignment-1 answer key
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2IRM GROUP 2 CHAPTER 2
IRM GROUP 2 CHAPTER 2
 
Federated Machine Learning Framework
Federated Machine Learning FrameworkFederated Machine Learning Framework
Federated Machine Learning Framework
 

Mais de AyuMohamad

Mais de AyuMohamad (15)

Soalan percubaan-ict-ting5-2012
Soalan percubaan-ict-ting5-2012Soalan percubaan-ict-ting5-2012
Soalan percubaan-ict-ting5-2012
 
Topology
TopologyTopology
Topology
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
Hardware
HardwareHardware
Hardware
 
Contoh rpm rpt
Contoh rpm rptContoh rpm rpt
Contoh rpm rpt
 
Networks
NetworksNetworks
Networks
 
Module networks
Module networksModule networks
Module networks
 
Module multimedia
Module multimediaModule multimedia
Module multimedia
 
Contoh rph
Contoh rphContoh rph
Contoh rph
 
Hsp ict 2006
Hsp ict 2006Hsp ict 2006
Hsp ict 2006
 
Skype
SkypeSkype
Skype
 
Web Application_Facebook
Web Application_FacebookWeb Application_Facebook
Web Application_Facebook
 
Web application
Web applicationWeb application
Web application
 
Sgdm3043 1
Sgdm3043 1Sgdm3043 1
Sgdm3043 1
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Kota tinggi-scheme

  • 1. No. KadPengenalan AngkaGiliran : Question No. No. Soalan Candidate’s Answer JawapanCalon Marks Markah 1 Third Generation/GenerasiKetiga 1 2 D 2 3 (i) Bit/Bit 3 (ii) Character/Aksaraor Byte/Bait 4 4 (i) R 5 (ii) Q 6 5 Network Operating System/SistemPengoperasianRangkaian 7 6 Spreadsheet Software/PerisianHamparanElektronik 8 7 C 9 8 T E-Banking/PerbankanElektronik 10 9 (i) LAN/Local Area Network/RangkaianKawasanSetempat 11 (ii) Client-Server/Pelayan-Pelanggan 12 10 Transmission Control Protocol/Internet Protocol 13 11 M Bus Topology/Topologi Bas 14 12 A 15 13 (i) Programmer/Pengaturcara 16 (ii) Implementation Phase/FasaPelaksanaan 17 14 (i) True/Benar 18 (ii) True/Benar 19 15 (i) Q 20 (ii) P 21 16 D 22 17 (i) True/Benar 23 (ii) True /Benar 24 18 (i) L 25 (ii) K 26 19 B 27 20 A Relational Operator/OperasiHubungan 28 B Logical Operator/OperasiLogik 29 21 i False/Palsu 30 ii True/Benar 31 22 X E-Business/PerniagaanElektronik 32 23 Z Software/Perisian 33 24 P A 34 25 (i) Table/Jadual 35 (ii) Registration Number/NomborPendaftaran 36 SULIT Answer Sheet HelaianJawapan SULIT3765/1 © 2011 HakCipta SMKSemenchu
  • 2. Answer Scheme Section B (20 Marks) 26. a) i. The internet filtering method used is Site blocking. [1m] ii. Keyword Blocking/Web rating System [1m] -choose any related answer- b) Keyword Blocking - List of banned words or objectionable terms. [1m] Web Rating System - Browser set to only accept pages with certain levels of ratings. [1m] - Rating done either by the web page author or by the independent bureau. [1m] -choose any related answer- 27. a) i. X : Operating System [1m] ii. Z : Proprietary Software [1m] b) Function of X : - Starting a computer - Managing data and programs - Managing memory - Configuring devices -choose any two related answer- [2m] 28. a) Star Topology [1m] : because the system has switch [1m] b) Differences between star topology and ring topology Star Topology Ring Topology Structure There is a central host and all nodes connect to it. All computers and other devices are connected in a circle. Host existence Yes Depends on network needs. Connection between nodes No Yes Node failure Network can still run Network will fail 1 mark for any correct pair. Answer must be in pair form. Answer could be in table form or paragraph. Choose any two related answer. [2m]
  • 3. 29. a) i. Text-based [1m] ii. WYSIWYG [1m] b) - User friendly –does not require any HTML knowledge - It is easier for an average computer user - Easy to insert a specific tag - Can visualize the design -choose any two related answer- [2m] 30. a) i. X : Compiler [1m] ii. Y : Interpreter [1m] b) Differences between X and Y X (Compiler) Y (Interpreter) Translate statement line by line and execute it immediately. Translate entire programming statement at one time and executes. Store machine language as object code on the disk. No object code is created or saved. 1 mark for any correct pair. Answer must be in pair form. Answer could be in table form or paragraph. [2m]
  • 4. Answer Scheme Section C (14 marks) 31. a) i. Create two tables BOOK SUPPLIER Book ID Book Title Price Supplier Registration Number Book ID Supplier Name Supplier Address [1m] [1m] -Students can get 1 mark if fields in both tables are not same as above- ii. Table for book : BOOK [1m] Table for supplier : SUPPLIER [1m] -It could be any name of table but must according the answer in a(i)- b) i. Primary key for book table : Book ID Primary key for supplier table : Supplier Registration Number -Students must state the primary key for each table to get 1 mark- [1m] ii. Create relationship between the tables and state the type of relationship. BOOK SUPPLIER Book ID Book Title Price Supplier Registration Number Book ID Supplier Name Supplier Address Type of relationship : one-to-many -The answer must according answer in (a)- [2m] Create relationship between the tables and state the type of relationship. b. ii) SUPPLIER BOOK Supplier Registration Number Supplier Name Supplier Address Book ID Book Title Price Supplier Registration Number Type of relationship : one-to-many
  • 5. 32. a) i. L is information processing cycle. [1m] ii. Y are RAM, ROM, hardisk, pendrive, CD, DVD, removable disk -Choose any two answer- [2m] b) Explain process L - An Input device feed raw data to the processor. [1m] - X processes raw data and turns it into useful information. [1m] - Y keeps or stores both process and unprocess data for later usage. [1m] - An output device shows or display the processed data. [1m]
  • 6. 33. a) Type of network communication technology used between Central Site and Customer Site : - Extranet [1m] b) Type of network communication technology Z use in Central Site : - Z – Intranet [1m] - It’s a private network that limited for employee only Or - It’s an internal network that uses Internet technologies and it is a small version of the Internet that exists within an organisation. -Choose any related answer- [1m] c) Two differences between network communication technologies Z and network communication technologies between Central site and Customer site Technologies Z [ Intranet ] Extranet Is used for organization and employees only. Is used for supplier, customer and business partner. Security level is high. Security level is high and it used Virtual Private Network to communicate. -2 marks for any correct pair. Answer must be in pair form. Answer could be in table form or paragraph.- [4m]
  • 7. 33. a) Type of network communication technology used between Central Site and Customer Site : - Extranet [1m] b) Type of network communication technology Z use in Central Site : - Z – Intranet [1m] - It’s a private network that limited for employee only Or - It’s an internal network that uses Internet technologies and it is a small version of the Internet that exists within an organisation. -Choose any related answer- [1m] c) Two differences between network communication technologies Z and network communication technologies between Central site and Customer site Technologies Z [ Intranet ] Extranet Is used for organization and employees only. Is used for supplier, customer and business partner. Security level is high. Security level is high and it used Virtual Private Network to communicate. -2 marks for any correct pair. Answer must be in pair form. Answer could be in table form or paragraph.- [4m]