SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
SULIT
LEMBAGA PEPERIKSAAN
KEMENTERIAN PELAJARAN MALAYSIA
_________________________________
SIJIL PELAJARAN MALAYSIA 2007 3765/1
INFORMATION AND COMMUNICATION TECHNOLOGY
Kertas 1
Nov./ Dis
2 ½ jam Dua jam tiga puluh minit
________________________________________________________________
JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU
1. Tulis nombor kad pengenalan dan angka giliran anda pada semua buku jawapan.
2. Kertas soalan ini adalah dalam dwibahasa.
3. Soalan dalam banasa inggeris mendahului soalan yang sepadan dalam bahasa
Melayu.
4. Calon dibenarkan menjawab keseluruhan atau sebahagian soalan sama ada dalam
bahasa inggeris atau bahasa Melayu.
5. Kertas soalan ini mengandungi tiga bahagian : Bahagian A, Bahagian B dan Bahagian
C.
6. Jawapan untuk Bahagian A hendaklah ditulis diruang yang disediakan pada Helaian
Jawapan.
7. Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yang
dibekalkan.
8. Anda dibenarkan menggunakan kalkulator saintifik.
Kertas soalan ini mengandungi 10 halaman bercetak dan 0 halaman tidak bercetak.
[Lihat halaman sebelah
3765/1 © 2007 Hak Cipta Kerajaan Malaysia SULIT
1
SPM ICT 2007
Section A : Answer all questions. Write your answers in the spaces
provided in Answer Sheet. Each answer carries one mark. [36 marks]
1. Figure 1 show the technologies used in three different generations of
computers
A B C
Match A, B or C with the following generations of computer technology.
(i) 1st
Generation Computer
(ii) 2nd
Generation Computer
2. State one approach in programming.
_________________________________________________________
3. Figure 2 shows methods of Internet Filtering.
X is ________________________________
4. Table 1 shows types of computer crimes.
A Computer Fraud
B Computer Theft
C Computer Attack
Based on Table 1, write A, B and C to categorise the following acivities:
i) E-mail hoaxes, false claims of expertise on certain fields.
ii) Tap in the data transmission lines and international
transfer of payments to the wrong account.
Internet Filtering
Keyword Blocking X Web Rating System
2
5. Figure 3 shows how cryptography works.
Name H : ___________________________________________
6. Figure 4 shows the information processing cycle.
Name D : _________________________________________
7. Figure 5 shows the hierachy of data.
Name :
(i) K : ________________________ (ii) L : ____________________
8. Table 2 shows statements of devices
A A stationary pointing device with a ball on its top or side.
B
A small, flat, rectangle pointing device that is sensitive to
pressure and motion
C
A pressure-sensitive pointing device shape like pencil eraser
positioned between keys on a keyboard.
Based on Table 2, write A, B or C for the following devices.
i) Touchpad ii) Pointing Stick
Plaintext H Plaintext
Encrypt Decrypt
D Process Input
Storage
Bit K Field L Database
3
9. Figure 6 shows a computer motherboard.
Name
i) G : _____________________ ii) H : _______________________
10. Figure 7 shows network topology A and B.
Name the topology
i) A : _____________________ ii) B : ____________________
11. A network that spans a city is called a __________________________
12. Multimedia elements include text, animation, audio, video,
and _______________________
H
G
A B
4
13. Table 3 shows a number of editing software used to produce multimedia
presentation.
X Audio editor
Y Graphic and image editor
Z Video and animation editor
Based on table 3, match the editing software with the following statement
by writing X, Y and Z.
i) Creates effects of action and motion by projecting a
set of still pictures.
ii) Adjust individual instrument sounds with a mixer to
get the tone of effect wanted.
14. Table 4 shows some steps for two activities used in multimedia
production.
Activities Steps
A
Choose the colours and layout of each individual screen
Determine the position of navigation buttons.
B
Package the presentation using suitable software
Distribute the presentation for public viewing
Based on Table 4, name the phase which involve the following activities:
i) Activity A : _____________________________________
ii) Activity B : _____________________________________
15. A series of step by step instructions telling the computer exactly what to
do is called a ________________________
16. A device that enables you to connect a video camera to a computer and
manipulate the input is _________________________
17. ‘<’ symbols are examples of ____________________
5
18. Figure 8(a) and 8(b) show flowchart segments
Figure 8(a) Figure 8(b)
Identify the control structure used in
i) Figure 8(a) : ________________________________________
ii) Figure 8(b) : ________________________________________
19. Figure 9 show program development phases
Phase 2 and Phase 4 for the proper program development phase are :
i) Phase 2 : ___________________________________________
ii) Phase 4 : ___________________________________________
20. The components of an information system are human, hardware,
software, procedures and ________________________________
1 Problem analysis
2
3 Coding
4
5 Documentation
6
21. Figure 10 shows a school data base
Name
i) A : _______________________ ii) B : _______________________
Question 22 to Question 25 are in statements form. Write True or False for
the following statements:
22. Cyber law is a system of moral standards or values used as
a guideline for computer users.
23. A disk scanner is a utility program that reorganises files
and unused space on a computer hard disk.
24. A programmer uses flowcharts to code a program.
25. Database Management System (DBMS) is a software used
in adding, updating, managing, accessing, and analysing
data in a database.
Section B : This section consists of five questions. You are required to
answer all questions. [20 marks]
26. The following is a statement on information privacy.
Based on the statement, list four ways of making personal data more
private. [4 marks]
i) _____________________________________________________
ii) _____________________________________________________
iii) _____________________________________________________
iv) _____________________________________________________
Studen ID Name Class
2396 Azahrina 5A1
3975 Saraswathy 5A1
3981 Tommy 5A2
4782 Wahid 5A2
A
B
“Information privacy refers to the right of individuals
and organisations to deny or restrict the collection and
use the information about them”
7
27. Figure 11(a) and 11(b) show different types of software.
Figure 11(a) Figure 11(b)
State four differences between the software listed in Figured 11(a) and
Figure 11(b) [4 marks]
Figure 11(a)
__________________________
Figure 11(b)
___________________________
i)
ii)
iii)
iv)
28. Figure 12 shows a computer network at Bank Sufi. Two networks,
Network A and Network B are part of the bank’s wide area network.
Currently the bank implements two network communications
technology. Apart from Internet, the bank also has its own intranet to
facilitate their internal communications.
Windows XP
MS Office
Adobe Photoshop
Norton Antivirus
Solaris
Windows XP
MS Office 2003
Adobe Photoshop
Norton Antivirus
Solaris
Windows XP
MS Office
Adobe Photoshop
Norton Antivirus
Solaris
Linux Redhat
OpenOffice.org
GIMP
Open LDAP
Tiny OS
Internet
Router
Proxy Server
Firewall
Hub
Web server Mail Server
Network A
Network B
8
State two differences between Network A and Network B for the bank.
[4 marks]
Network A
__________________________
Network B
___________________________
i)
ii)
29. You keep a data base of your friends’ names, addresses and dates of
birth. The data base is kept in the school server and can be retrieve by
other user. [4 marks]
a) State two uses of the information from the data base to be utilized.
i) ____________________________________________________
ii) ___________________________________________________
b) State two problems that may arised by having shared data base.
i) ____________________________________________________
ii) ___________________________________________________
30. Table 5 shows two methods how Malisa and David get the informations
from an encylopedia. [4 marks]
Users Methods
Malisa Uses encyclopedia stored on CD
David Reads from the encylopedia
State four advantages of using an encyclopedia stored on CD.
i) ______________________________________________________
ii) ______________________________________________________
iii) ______________________________________________________
iv) ______________________________________________________
9
Section C : This section consists of three questions. [14 marks]
You are required to answer two question only:
Question 31 is compulsory and Either Question 32 or Question 33.
31. SMK Kampung Merdeka plans to upgrade the school’s ICT facilities. A
computer laboratory is to be equipped with twenty workstations, a hub
and a server will be built. In addition, fifteen laptop computer will be
provided equipped with wireless network technology. You are hired as the
consultant to ensure the smooth running of project.
a) Propose a suitable wired network topology for the computer
laboratory. Justify your proposal. [4 marks]
Topology : __________________________________________
Justification : __________________________________________
______________________________________________________
b) Identify two hardware devices required to provided Internet access
to all the computers at the computer laboratory and also the laptop
computer which use wireless access. Explain the function of the
devices. [4 marks]
Device Function
i)
ii)
32. Bank XYZ Berhad has a computer network system to run their operations
between its branches in Malaysia. An unknown man was seen entering the
computer control room at its headquarters in Kuala Lumpur after office
hours. The following day, the system administrator found that all data in
the server were removed and a few computer hardware missing. It was
also reported that the bank computer network was down.
a) Explain one possible threat done by the unknown man. [2 marks]
_______________________________________________________
_______________________________________________________
_______________________________________________________
10
b) After an investigation, the management found that the threats come
from the lack of security procedure at the computer control room.
Explain two actions on human aspect on security procedure that
should be taken by the management to increase security at the
computer control room. [4 marks]
33. Figure 13 shows an interface of an automated library system of SMK
Indah.
SMK Indah
Library Management System
Book Information
Book ID Quantity
Title Author
Edition Year
Publisher
Synopsis
Update Menu Insert Delete
Based on Figure 13:
a) Identify one data manipulation button and explain its function.
Button : _______________________ [2 marks]
Function : ________________________________________________
_________________________________________________________
b) Which field is the primary key? Justify your answer. [4 marks]
Field : ________________________
Justification : ______________________________________________
_________________________________________________________

Mais conteúdo relacionado

Destaque (6)

Ict applied to english teaching form
Ict applied to english teaching  formIct applied to english teaching  form
Ict applied to english teaching form
 
Kertas Cadangan Kursus Google Apps Dalam Pengurusan Organisasi
Kertas Cadangan Kursus Google Apps Dalam Pengurusan OrganisasiKertas Cadangan Kursus Google Apps Dalam Pengurusan Organisasi
Kertas Cadangan Kursus Google Apps Dalam Pengurusan Organisasi
 
ICT Form 4 MAY 2015 test paper
ICT Form 4 MAY 2015 test paperICT Form 4 MAY 2015 test paper
ICT Form 4 MAY 2015 test paper
 
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
 
Cd ict-worksheet-la6-form-5
Cd ict-worksheet-la6-form-5Cd ict-worksheet-la6-form-5
Cd ict-worksheet-la6-form-5
 
Input computer hardware notes for UCEand UACE ICT
Input computer hardware notes for UCEand UACE ICTInput computer hardware notes for UCEand UACE ICT
Input computer hardware notes for UCEand UACE ICT
 

Semelhante a 2007

Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)
fizahPhd
 
Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3
Siti Salmiah
 
Computing_Year 10_Track 1_Student Paper.pdf
Computing_Year 10_Track 1_Student Paper.pdfComputing_Year 10_Track 1_Student Paper.pdf
Computing_Year 10_Track 1_Student Paper.pdf
raheeema suleman
 
2010 UPA Presentation Final Version
2010 UPA Presentation Final Version2010 UPA Presentation Final Version
2010 UPA Presentation Final Version
mgerver
 
Trial for final technical communicatioan exam 2
Trial for final technical communicatioan exam 2Trial for final technical communicatioan exam 2
Trial for final technical communicatioan exam 2
mkazree
 
Trial for final technical communicatioan exam 2
Trial for final technical communicatioan exam 2Trial for final technical communicatioan exam 2
Trial for final technical communicatioan exam 2
mkazree
 
Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)
fizahPhd
 
Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)
fizahPhd
 
Contoh format penulisan_portfolio_perkhemahan_i
Contoh format penulisan_portfolio_perkhemahan_iContoh format penulisan_portfolio_perkhemahan_i
Contoh format penulisan_portfolio_perkhemahan_i
Aisyalaila
 
L32 test x1 per student
L32 test   x1 per studentL32 test   x1 per student
L32 test x1 per student
Nick Crafts
 

Semelhante a 2007 (20)

Grade 12 EOT 2022.docx
Grade 12 EOT 2022.docxGrade 12 EOT 2022.docx
Grade 12 EOT 2022.docx
 
Pt epp ict 6-q1
Pt epp ict 6-q1Pt epp ict 6-q1
Pt epp ict 6-q1
 
Pt epp ict 6-q1
Pt epp ict 6-q1Pt epp ict 6-q1
Pt epp ict 6-q1
 
REVIEW QUIZ PART for the prelim exam II.pptx
REVIEW QUIZ PART for the prelim exam II.pptxREVIEW QUIZ PART for the prelim exam II.pptx
REVIEW QUIZ PART for the prelim exam II.pptx
 
Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)
 
Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3
 
Design Thinking Process Assessment (K-12 students)
Design Thinking Process Assessment (K-12 students)Design Thinking Process Assessment (K-12 students)
Design Thinking Process Assessment (K-12 students)
 
Computing_Year 10_Track 1_Student Paper.pdf
Computing_Year 10_Track 1_Student Paper.pdfComputing_Year 10_Track 1_Student Paper.pdf
Computing_Year 10_Track 1_Student Paper.pdf
 
Grade 10 EOT 2022.docx
Grade 10 EOT 2022.docxGrade 10 EOT 2022.docx
Grade 10 EOT 2022.docx
 
Knowing about Computer 4
Knowing about Computer 4Knowing about Computer 4
Knowing about Computer 4
 
2010 UPA Presentation Final Version
2010 UPA Presentation Final Version2010 UPA Presentation Final Version
2010 UPA Presentation Final Version
 
Trial for final technical communicatioan exam 2
Trial for final technical communicatioan exam 2Trial for final technical communicatioan exam 2
Trial for final technical communicatioan exam 2
 
Trial for final technical communicatioan exam 2
Trial for final technical communicatioan exam 2Trial for final technical communicatioan exam 2
Trial for final technical communicatioan exam 2
 
Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)
 
Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)Computer studies year 7 exercise (easy)
Computer studies year 7 exercise (easy)
 
5 Bridges, Borders and Barriers Formative Test
5 Bridges, Borders and Barriers Formative Test5 Bridges, Borders and Barriers Formative Test
5 Bridges, Borders and Barriers Formative Test
 
Introduction to Christian Education: Final Exam 2011
Introduction to Christian Education: Final Exam 2011Introduction to Christian Education: Final Exam 2011
Introduction to Christian Education: Final Exam 2011
 
Contoh format penulisan_portfolio_perkhemahan_i
Contoh format penulisan_portfolio_perkhemahan_iContoh format penulisan_portfolio_perkhemahan_i
Contoh format penulisan_portfolio_perkhemahan_i
 
L32 test x1 per student
L32 test   x1 per studentL32 test   x1 per student
L32 test x1 per student
 
Computer and Technology Today in our Lives
Computer and Technology Today in our LivesComputer and Technology Today in our Lives
Computer and Technology Today in our Lives
 

Mais de Nasran Syahiran

Mais de Nasran Syahiran (20)

Element of-multimedia
Element of-multimediaElement of-multimedia
Element of-multimedia
 
Types usage-of-information-system
Types usage-of-information-systemTypes usage-of-information-system
Types usage-of-information-system
 
Programming mind-mapping
Programming mind-mappingProgramming mind-mapping
Programming mind-mapping
 
Program development-phases
Program development-phasesProgram development-phases
Program development-phases
 
Phases multimedia-team
Phases multimedia-teamPhases multimedia-team
Phases multimedia-team
 
Information development-phases
Information development-phasesInformation development-phases
Information development-phases
 
Multimedia mind-mapping
Multimedia mind-mappingMultimedia mind-mapping
Multimedia mind-mapping
 
2012
20122012
2012
 
2011
20112011
2011
 
HURAIAN SUKATAN PELAJARAN KURIKULUM BERSEPADU SEKOLAH MENENGAH (KBSM)
HURAIAN SUKATAN PELAJARAN KURIKULUM BERSEPADU SEKOLAH MENENGAH (KBSM)HURAIAN SUKATAN PELAJARAN KURIKULUM BERSEPADU SEKOLAH MENENGAH (KBSM)
HURAIAN SUKATAN PELAJARAN KURIKULUM BERSEPADU SEKOLAH MENENGAH (KBSM)
 
Rancangan tahunan tingkatan 5
Rancangan tahunan tingkatan 5Rancangan tahunan tingkatan 5
Rancangan tahunan tingkatan 5
 
Rancangan tahunan tingkatan 4
Rancangan tahunan tingkatan 4Rancangan tahunan tingkatan 4
Rancangan tahunan tingkatan 4
 
F5 learning-area-6-information-system
F5 learning-area-6-information-systemF5 learning-area-6-information-system
F5 learning-area-6-information-system
 
Bidang pembelajaran-6-3
Bidang pembelajaran-6-3Bidang pembelajaran-6-3
Bidang pembelajaran-6-3
 
Bidang pembelajaran-6-2
Bidang pembelajaran-6-2Bidang pembelajaran-6-2
Bidang pembelajaran-6-2
 
Bidang pembelajaran-6-1
Bidang pembelajaran-6-1Bidang pembelajaran-6-1
Bidang pembelajaran-6-1
 
Bidang pembelajaran-5-3
Bidang pembelajaran-5-3Bidang pembelajaran-5-3
Bidang pembelajaran-5-3
 
Bidang pembelajaran-5-2
Bidang pembelajaran-5-2Bidang pembelajaran-5-2
Bidang pembelajaran-5-2
 
Bidang pembelajaran-5-1
Bidang pembelajaran-5-1Bidang pembelajaran-5-1
Bidang pembelajaran-5-1
 
Bidang pembelajaran-4-3
Bidang pembelajaran-4-3Bidang pembelajaran-4-3
Bidang pembelajaran-4-3
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 

Último (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

2007

  • 1. SULIT LEMBAGA PEPERIKSAAN KEMENTERIAN PELAJARAN MALAYSIA _________________________________ SIJIL PELAJARAN MALAYSIA 2007 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas 1 Nov./ Dis 2 ½ jam Dua jam tiga puluh minit ________________________________________________________________ JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU 1. Tulis nombor kad pengenalan dan angka giliran anda pada semua buku jawapan. 2. Kertas soalan ini adalah dalam dwibahasa. 3. Soalan dalam banasa inggeris mendahului soalan yang sepadan dalam bahasa Melayu. 4. Calon dibenarkan menjawab keseluruhan atau sebahagian soalan sama ada dalam bahasa inggeris atau bahasa Melayu. 5. Kertas soalan ini mengandungi tiga bahagian : Bahagian A, Bahagian B dan Bahagian C. 6. Jawapan untuk Bahagian A hendaklah ditulis diruang yang disediakan pada Helaian Jawapan. 7. Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yang dibekalkan. 8. Anda dibenarkan menggunakan kalkulator saintifik. Kertas soalan ini mengandungi 10 halaman bercetak dan 0 halaman tidak bercetak. [Lihat halaman sebelah 3765/1 © 2007 Hak Cipta Kerajaan Malaysia SULIT
  • 2. 1 SPM ICT 2007 Section A : Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each answer carries one mark. [36 marks] 1. Figure 1 show the technologies used in three different generations of computers A B C Match A, B or C with the following generations of computer technology. (i) 1st Generation Computer (ii) 2nd Generation Computer 2. State one approach in programming. _________________________________________________________ 3. Figure 2 shows methods of Internet Filtering. X is ________________________________ 4. Table 1 shows types of computer crimes. A Computer Fraud B Computer Theft C Computer Attack Based on Table 1, write A, B and C to categorise the following acivities: i) E-mail hoaxes, false claims of expertise on certain fields. ii) Tap in the data transmission lines and international transfer of payments to the wrong account. Internet Filtering Keyword Blocking X Web Rating System
  • 3. 2 5. Figure 3 shows how cryptography works. Name H : ___________________________________________ 6. Figure 4 shows the information processing cycle. Name D : _________________________________________ 7. Figure 5 shows the hierachy of data. Name : (i) K : ________________________ (ii) L : ____________________ 8. Table 2 shows statements of devices A A stationary pointing device with a ball on its top or side. B A small, flat, rectangle pointing device that is sensitive to pressure and motion C A pressure-sensitive pointing device shape like pencil eraser positioned between keys on a keyboard. Based on Table 2, write A, B or C for the following devices. i) Touchpad ii) Pointing Stick Plaintext H Plaintext Encrypt Decrypt D Process Input Storage Bit K Field L Database
  • 4. 3 9. Figure 6 shows a computer motherboard. Name i) G : _____________________ ii) H : _______________________ 10. Figure 7 shows network topology A and B. Name the topology i) A : _____________________ ii) B : ____________________ 11. A network that spans a city is called a __________________________ 12. Multimedia elements include text, animation, audio, video, and _______________________ H G A B
  • 5. 4 13. Table 3 shows a number of editing software used to produce multimedia presentation. X Audio editor Y Graphic and image editor Z Video and animation editor Based on table 3, match the editing software with the following statement by writing X, Y and Z. i) Creates effects of action and motion by projecting a set of still pictures. ii) Adjust individual instrument sounds with a mixer to get the tone of effect wanted. 14. Table 4 shows some steps for two activities used in multimedia production. Activities Steps A Choose the colours and layout of each individual screen Determine the position of navigation buttons. B Package the presentation using suitable software Distribute the presentation for public viewing Based on Table 4, name the phase which involve the following activities: i) Activity A : _____________________________________ ii) Activity B : _____________________________________ 15. A series of step by step instructions telling the computer exactly what to do is called a ________________________ 16. A device that enables you to connect a video camera to a computer and manipulate the input is _________________________ 17. ‘<’ symbols are examples of ____________________
  • 6. 5 18. Figure 8(a) and 8(b) show flowchart segments Figure 8(a) Figure 8(b) Identify the control structure used in i) Figure 8(a) : ________________________________________ ii) Figure 8(b) : ________________________________________ 19. Figure 9 show program development phases Phase 2 and Phase 4 for the proper program development phase are : i) Phase 2 : ___________________________________________ ii) Phase 4 : ___________________________________________ 20. The components of an information system are human, hardware, software, procedures and ________________________________ 1 Problem analysis 2 3 Coding 4 5 Documentation
  • 7. 6 21. Figure 10 shows a school data base Name i) A : _______________________ ii) B : _______________________ Question 22 to Question 25 are in statements form. Write True or False for the following statements: 22. Cyber law is a system of moral standards or values used as a guideline for computer users. 23. A disk scanner is a utility program that reorganises files and unused space on a computer hard disk. 24. A programmer uses flowcharts to code a program. 25. Database Management System (DBMS) is a software used in adding, updating, managing, accessing, and analysing data in a database. Section B : This section consists of five questions. You are required to answer all questions. [20 marks] 26. The following is a statement on information privacy. Based on the statement, list four ways of making personal data more private. [4 marks] i) _____________________________________________________ ii) _____________________________________________________ iii) _____________________________________________________ iv) _____________________________________________________ Studen ID Name Class 2396 Azahrina 5A1 3975 Saraswathy 5A1 3981 Tommy 5A2 4782 Wahid 5A2 A B “Information privacy refers to the right of individuals and organisations to deny or restrict the collection and use the information about them”
  • 8. 7 27. Figure 11(a) and 11(b) show different types of software. Figure 11(a) Figure 11(b) State four differences between the software listed in Figured 11(a) and Figure 11(b) [4 marks] Figure 11(a) __________________________ Figure 11(b) ___________________________ i) ii) iii) iv) 28. Figure 12 shows a computer network at Bank Sufi. Two networks, Network A and Network B are part of the bank’s wide area network. Currently the bank implements two network communications technology. Apart from Internet, the bank also has its own intranet to facilitate their internal communications. Windows XP MS Office Adobe Photoshop Norton Antivirus Solaris Windows XP MS Office 2003 Adobe Photoshop Norton Antivirus Solaris Windows XP MS Office Adobe Photoshop Norton Antivirus Solaris Linux Redhat OpenOffice.org GIMP Open LDAP Tiny OS Internet Router Proxy Server Firewall Hub Web server Mail Server Network A Network B
  • 9. 8 State two differences between Network A and Network B for the bank. [4 marks] Network A __________________________ Network B ___________________________ i) ii) 29. You keep a data base of your friends’ names, addresses and dates of birth. The data base is kept in the school server and can be retrieve by other user. [4 marks] a) State two uses of the information from the data base to be utilized. i) ____________________________________________________ ii) ___________________________________________________ b) State two problems that may arised by having shared data base. i) ____________________________________________________ ii) ___________________________________________________ 30. Table 5 shows two methods how Malisa and David get the informations from an encylopedia. [4 marks] Users Methods Malisa Uses encyclopedia stored on CD David Reads from the encylopedia State four advantages of using an encyclopedia stored on CD. i) ______________________________________________________ ii) ______________________________________________________ iii) ______________________________________________________ iv) ______________________________________________________
  • 10. 9 Section C : This section consists of three questions. [14 marks] You are required to answer two question only: Question 31 is compulsory and Either Question 32 or Question 33. 31. SMK Kampung Merdeka plans to upgrade the school’s ICT facilities. A computer laboratory is to be equipped with twenty workstations, a hub and a server will be built. In addition, fifteen laptop computer will be provided equipped with wireless network technology. You are hired as the consultant to ensure the smooth running of project. a) Propose a suitable wired network topology for the computer laboratory. Justify your proposal. [4 marks] Topology : __________________________________________ Justification : __________________________________________ ______________________________________________________ b) Identify two hardware devices required to provided Internet access to all the computers at the computer laboratory and also the laptop computer which use wireless access. Explain the function of the devices. [4 marks] Device Function i) ii) 32. Bank XYZ Berhad has a computer network system to run their operations between its branches in Malaysia. An unknown man was seen entering the computer control room at its headquarters in Kuala Lumpur after office hours. The following day, the system administrator found that all data in the server were removed and a few computer hardware missing. It was also reported that the bank computer network was down. a) Explain one possible threat done by the unknown man. [2 marks] _______________________________________________________ _______________________________________________________ _______________________________________________________
  • 11. 10 b) After an investigation, the management found that the threats come from the lack of security procedure at the computer control room. Explain two actions on human aspect on security procedure that should be taken by the management to increase security at the computer control room. [4 marks] 33. Figure 13 shows an interface of an automated library system of SMK Indah. SMK Indah Library Management System Book Information Book ID Quantity Title Author Edition Year Publisher Synopsis Update Menu Insert Delete Based on Figure 13: a) Identify one data manipulation button and explain its function. Button : _______________________ [2 marks] Function : ________________________________________________ _________________________________________________________ b) Which field is the primary key? Justify your answer. [4 marks] Field : ________________________ Justification : ______________________________________________ _________________________________________________________