Post on 14-Dec-2014
description
Name : ………………………………………………………….. Class : ……………………
SECTION A (50 MARKS)
Write your answer on the answer sheet given.
1. Choose the correct statement to define Information and Communication Technology (ICT).
Pilih pernyataan yang paling tepat untuk mendefinisikan Teknologi Maklumat dan Komunikasi (ICT).A. Information and Communication Technology is composed of three main components of a
computer, Internet and networking.Teknologi Maklumat dan Komunikasi (ICT) terdiri daripada tiga komponen utama iaitu komputer, internet dan rangkaian.
B. Information and Communication Technology (ICT) is a technology used by people to improve their lives.Teknologi Maklumat dan Komunikasi (ICT) adalah teknologi yang digunakan oleh manusia untuk meningkatkan kehidupan mereka.
C. Information and Communication Technology (ICT) is a technology that is needed to process the information using electronic equipment and software applications to transfer, store, send and receive data.Teknologi Maklumat dan Komunikasi (ICT) adalah satu teknologi yang diperlukan untuk memproses maklumat menggunakan peralatan elektronik dan perisian aplikasi untuk memindah, menyimpan, menghantar dan menerima data.
D. Information and Communication Technology (ICT) is any communication facilities and computer-based applications.Teknologi Maklumat dan Komunikasi (ICT) adalah sebarang komunikasi dan kemudahan aplikasi berasaskan komputer.
1
2. Information may come in various forms such as ________. Maklumat diperoleh dari pelbagai bentuk seperti ________
I Reading II InvestigationBacaan Penyiasatan
III Study IV Research Tinjauan Kajian
A. I and II
B. II and III
C. II, III and IV
D. All the above
3. Information refers to Maklumat merujuk A. an act of transmitting messages
suatu tindakan menghantar mesejB. the knowledge obtained from reading, investigation, study or research.
pengetahuan yang diperolehi dari membaca, kajian penyiasatan, atau penyelidikanC. the use of scientific knowledge, experience and resources to create processes and
products that fulfill human needspenggunaan sains, pengalaman, pengetahuan dan sumber daya untuk mencipta proses dan produk
yang memenuhi keperluan manusiaD. the technology required for information processing, in particular, the use of electronic
computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytimeteknologi yang diperlukan untuk memproses maklumat, khususnya, penggunaan komputer elektronik, peranti komunikasi dan aplikasi perisian untuk menukar, menyimpan, melindungi, proses, menghantar dan mengambil maklumat dari mana saja, bila-bila masa sahaja
4. Thus the invention of cellular phones, television and other electronic devices are important in enhancing _________as a whole.Penciptaan telefon bimbit, televisyen dan peranti elektronik lain penting dalam meningkatkan ________ secara keseluruhan.A. Games / permainan
2
B. Animation / animasiC. Multimedia / multimediaD. Communication / komunikasi
5. Suhaimi spreads a rumor that a prime minister is receiving bribes. Suhaimi’s conduct is called
Suhaimi menyebarkan khabar angin tentang Perdana Menteri menerima rasuah. Perbuatan
Suhaimi adalah__________
6. Which of the following statements is related to the Positive Impact of ICT on the society?Manakah antara berikut berkait rapat dengan kesan ICT ke atas masyarakat?I. Information travels borderless through the Internet.I.Maklumat perjalanan tanpa batas melalui internet.
II. People can receive information faster by using ICT technology.II. Orang boleh menerima maklumat lebih cepat dengan menggunakan teknologi ICT.
III. Using computers frequently and for long hours is harmful to health.III. Menggunakan komputer dengan kerap dan selama berjam-jam berbahaya bagi kesihatan.
IV. Today the younger generation prefers to sit in front of computers than socialise with others.IV. Hari ini generasi muda lebih memilih untuk duduk di depan komputer daripada bersosial dengan orang lain
A. I and IIB. II and IV C. II, III and IV D. All the above
3
A. Hijacker / Pencerobohan
B. Slander / Fitnah
C. Cracker / Pemusnah
D. Hacker /Penggodam
7. Which of the followings are TRUE about computer ethics?Manakah antara berikut adalah BENAR tentang etika penggunaan komputer?
I As a guideline to computer users. Sebagai garis panduan kepada pengguna komputer.
II No punishment for anyone who violates ethics.Tiada hukuman dikenakan kepada sesiapa yang melanggar etika.
III Depends on country and state where the crime is committed.Bergantung kepada negara dan kawasan di mana jenayah tersebut dilakukan.
IV Computer users are free to follow or ignore the code of ethics.Semua pengguna komputer bebas untuk mengamalkan kod etika yang digariskan.
A I, II and III B I, II and IVC I, III and IVD II, III and IV
8. Which of the following statements shows a good code of ethics in schools?Manakah dari pernyataan berikut menunjukkan kod etika yang baik di sekolah?A. Sending an email during school time to friends. Menghantar e-melkepada rakan semasa waktu sekolahB. Using the school equipment for students’ personal use. Menggunakan peralatan sekolah untuk kegunaan peribadi pelajar.C. Using own hand phone to call a friend during lunch break.
Menggunakan telefon bimbit sendiri untuk menghubungi rakan semasa waktu makan tengahari.
D. Doing an English assignment in the computer lab during Science period. Melakukan tugas Bahasa Inggeris di makmal komputer semasa waktu pelajaran sains
4
9. Which of the followings are the similarities between ethics and law?Manakah daripada yang berikut adalah persamaan antara etika dan undang-undang?
I. to prevent any crime / untuk mencegah apa juga jenayahII. as a rule to control computer users
sebagai peraturan untuk mengawal pengguna komputerIII. to guide user from misusing computers
untuk panduan pengguna daripada penyalahgunaan komputerIV to create a healthy computer society, so that computers are used to contribute to a better life
untuk mencipta masyarakat yang sihat komputer, sehingga komputer digunakan untuk kehidupan yang lebih baik
A. I, II and IIIB. II, III and IVC. I, III and IVD. All above
10. Which of the following are ways to protect privacy? Manakah antara berikut adalah cara untuk melindungi kerahsiaan?
I Utilities software Perisian utiliti
II Purchase goods with cash, rather than credit card Beli barangan secara tunai berbanding kad kredit.
III Clear your history file when you are finished browsing. Padam fail arkib setelah selesai melayari Internet.
A. I only
B. I and II
C. II and III
D. I, II and III
5
11. Below are steps for scanning viruses. Arrange the steps in sequence.
Berikut merupakan langkah-langkah untuk mengimbas virus. Susun langkah mengimbas mengikut
urutan yang betul.
I. Scan the selected file
Imbas fail yang telah dipilih
II. Choose an antivirus program
Pilih program antivirus
III. Wait until the scanning process is finished and the result is displayed
Tunggu proses pengimbasan sehingga selesai
IV. Select files or folders that need to be scanned
Pilih fail atau folder yang hendak diimbas
A. IV, II, I and III
B. III, I, II and III
C. II, IV, I and III
D. I, II, III and IV
12. Which of the following is NOT the example of computer fraud?
Manakah antara berikut BUKAN contoh penipuan computer?
A. E-mail hoaxes
E-mel palsu
B. Programmed Fraud
Program Palsu
C. Investment Schemes by Internet
Skim Pelaburan melalui Internet
D. Diverts goods to the wrong destinations
6
Menghantar barangan ke destinasi lain
13. What are the benefits of Electronic Banking to bank customers?
Apakah kebaikan Electronic Banking kepada pengguna bank?
I 24-hour service
Perkhidmatan 24-jam
II Electronic Fund Transfer
Pemindahan Dana Elektronik
III Electronic Cash Deposits
Deposit Tunai Elektronik
IV Electronic Loan Application
Permohonan Pinjaman Elektronik
A. I,II and III
B. I,II and IV
C. I,III and IV
D. II, III and IV
14. A system of moral standards or values as a guideline for computer users is known as
Sebuah sistem moral atau nilai sebagai panduan penggunaan pengguna komputer dikenali sebagai..
A cyber laws / undang-undang siber
B cryptography / kriptografi
C code of ethics / kod etika
D computer ethics / etika komputer
7
15. Table 1 shows three different fields and Figure 2 shows the use of ICT in two different fields.Jadual menunjukan tiga lapangan berbeza dan rajah 2 menunjukkan penggunaan ICT dalam 2 lapangan berlainan
Industry (industri) Banking (perbankan) Education (pelajaran)Table 1
(A) (B)
Figure 2
Based on Figure 2, match the use of ICT with the fields given in Table 1.
Berdasarkan rajah 2, padankan penggunaan ICT dengan lapangan yang diberi di jadual 1
i. A - ______
ii. B - ______
16. Study the statement 2 below carefully. / Kaji pernyataan 2 di bawah dengan teliti
Statement 2
Statement 2 above regarding to _________________ system.
Pernyataan 2 di atas merujuk kepada sistem _______________
8
Production was slow because everything was done manually and totally depended on human labour.Produksi perlahan kerana segalanya dilakukan secara manual dan bergantung secara keseluruhannya kepada buruh
17. Figure 4 shows one type of verification methods.
Rajah 4 menunjukkan sejenis kaedah pengesahan
Figure 4
Based on figure 4, state the method used.
Berdasarkan rajah 4, nyatakan kaedah yang digunakan.
18. Table 7 shows the Malaysian Cyber Law.Fill in the blanks using anwers in table 7
Jadual 7 menunjukkan Undang-undang Siber Malaysia.Isi tempat kosong dengan jawapan dalam
jadual 7.
A Copyright Act 1987
Akta hak cipta 1987
B Communications and Multimedia Act 1998
Akta Komunikasi dan Multimedia 1998
C Digital Signature Act 1997
Akta Tanda Tangan Digital 1997
D Computer Crimes 1997
Jenayah Komputer 1997
E Telemedicine Act 1997
Akta Teleperubatan 1997
Table 7
i. __________________ secures electronic communications especially on the Internet.
__________________ melindungi komunikasi elektronik terutamanya internet
9
ii. ________________ gives protection against the misuses of computers and computer criminal
activities such as unauthorized use of programmes, illegal transmission of data or messages over
computers and hacking and cracking of computers systems and networks.
___________memberikan perlindungan terhadap penyalahgunaan komputer dan aktiviti
komputer jenayah seperti program penggunaan yang tidak sah, haram penghantaran data
ataumesej melalui komputer dan hacking dan cracking sistem komputer dan rangkaian.
iii. __________________ ensures that only qualified medical practitioners can practice
telemedicine and that their patient’s rights and interests are protected.
________________memastikan bahawa pengamal perubatan yang berkualiti sahaja yang boleh
menggunakan teleperubatan dan bahawa hak-hak pesakit da nkepentingan mereka dilindungi
iv. The implementation of _______________________ ensures that information is secure, the
network is reliable and the service is affordable all over Malaysia.
Pelaksanaan _______________________ memastikan bahawa maklumat keselamatan,
rangkaian boleh dipercayai dan perkhidmatan yang berpatutan di seluruh Malaysia.
19. Read statement 1. Name the technology used for this generation of computers.Baca kenyataan 1. Nama teknologi yang digunakan untuk generasi komputer.
Statement 1 / Kenyataan 1
_______________________________________________________________
10
The computers for this generation use magnetic drums as storage media and
are large in size, taking up entire room. They use a great deal of electricity,
generating a lot of heat, which is often the cause of malfunctions.
Komputer-komputer generasi ini menggunakan drum magnetik sebagai media penyimpanan dan
besar dari segi saiz hampir sebesar sebuah bilik. Mereka menggunakan banyak kuasa, panas dan
yang seringkali menjadi penyebab kerosakan.
A B
C
20. Figure 1 shows several components of computer technology generations.Gambar 1 menunjukkan beberapa komponen generasi teknologi komputer.
Figure 1
Match A, B, or C with the following generation of computer technology.
Padan A, B atau C berdasarkan generasi kepada teknologi komputer
i. 2nd Generation Computer
ii. 4th Generation Computer
SECTION B (20 MARKS)
21. Figure 3 shows the impact of ICT on society. / rajah 3 menunjukkan kesan ICT ke atas masyarakat
Figure 3Based on figure 3, / Berdasarkan rajah 3, berikan,
i. State two advantages of ICT on society. / 2 kelebihan ICT ke atas masyarakat (4 marks)
_________________________________________________________________
_________________________________________________________________
ii. State two disadvantages of ICT on society. / 2 Kelemahan ICT ke atas masyarakat (4marks)
___________________________________________________________________
___________________________________________________________________
11
22. Table 1 shows the activities of computer crime. Jadual 1 menunjukkan aktiviti jenayah komputer
P Computer Attack / Serangan Komputer
Q Computer Theft / Kecurian Komputer
RCopyright Infringement / Pencabulan Hakcipta
S Computer Fraud / Penipuan Komputer
Table 1 Jadual 1
Based on Table 1, write P, Q, R or S for the following statement:
Berdasarkan Jadual 1, tuliskan P, Q, R atau S bagi pernyataan berikut:
i. Nazre transfer his company profit to his own account. (2marks)
Nazre memindahkan keuntungan syarikat ke dalam akaun peribadinya
_______________________________________________
ii.Kamal downloaded an assignment from the internet and claimed it is his. (2marks)
Kamal memuat turun tugasan dari internet dan mendakwa kepunyaanya
____________________________________________
23. Figure 1shows the computer security threat Rajah 1 menunjukkan ancaman keselamatan komputer.
Based on Figure 1, Berdasarkan Rajah 1, (i) State the type of computer threat. (2 marks)
Nyatakan jenis ancaman komputer. _________________________________________
(ii) Identify the type of security measure that can be done to prevent the threat in (i).(2marks) Kenalpasti langkah keselamatan yang boleh dilakukan untuk mengelak ancaman di (i)
_______________________________________________________________________
12
Figure 3 shows the usage of ICT in three different fields.Rajah 3 menunjukkan penggunaan Teknologi Maklumat dan Komunikasi dalam tiga bidang yang berbeza
13
Figure 3 Rajah 3
Based on statement in Figure 3,state the name of field X and Z: (4 marks)Berdasarkan Rajah 3, nyatakan nama bidang komputer X dan Z:
(i) X ………………………………………… (ii) Z …………………………………………
24. Figure 1 shows one of the authentication method. Rajah 1 menunjukkan salah satu kaedah pengesahan.
Figure 1 Rajah 1
Based on Figure 1,
Berdasarkan Rajah 1,
(i) Identify the authentication method. (2marks)
Kenalpasti kaedah tersebut.
__________________________________________
(ii) Give another example of method stated in (i). (2marks)
Berikan satu contoh lain bagi kaedah yang dinyatakan dalam (i)
________________________________________________
25. Based on the Statement 5, answer the following question.Jawab soalan berdasarkan pernyataan di bawah
14
See Yi Poi has received an e-mail stating that his favourite soda drinks “Soda Moda” uses foodcolouring that is not advisable by The Ministry of Health. He does not know the truth of thee-mail but he has forwarded the e-mail to 50 of his friends. Soda Moda label also has beenmanipulated into a picture that tends to exploit women in a distasteful manner.Yi Poi telah menerima e-mel yang menyatakan bahawa minuman soda kegemarannya "Soda Moda" menggunakan pewarna makanan yang tidak dianjurkan oleh Jabatan Kesihatan. Dia tidak tahu kebenaran e-mel tetapi ia telah
Statement 5i. List two controversial contents that stated in Statement 5.( 2marks)
Senaraikan 2 kandungan kontroversi pada pernyataan 5
________________________________________________
________________________________________________
ii. State TWO impact of controversial content in society from 11(i). (4 marks)
Nyatakan satu kesan kandungan kontroversi dalam masyarakat daripada 11(i)
_____________________________________________________________________
_____________________________________________________________________
********************************** END OF QUESTIONS **************************
Prepared by: Checked by: Verified by:
________________ ___________________ _____________________
Pn.Nurul Jannah Ab.Hamid Pn.Rossilawati bt Razali
ICT Teacher Head of ICT Panel
SMK Pandan Mewah SMK Pandan Mewah
15
See Yi Poi has received an e-mail stating that his favourite soda drinks “Soda Moda” uses foodcolouring that is not advisable by The Ministry of Health. He does not know the truth of thee-mail but he has forwarded the e-mail to 50 of his friends. Soda Moda label also has beenmanipulated into a picture that tends to exploit women in a distasteful manner.Yi Poi telah menerima e-mel yang menyatakan bahawa minuman soda kegemarannya "Soda Moda" menggunakan pewarna makanan yang tidak dianjurkan oleh Jabatan Kesihatan. Dia tidak tahu kebenaran e-mel tetapi ia telah
SMK PANDAN MEWAH, AMPANGINFORMATION COMMUNICATION AND TECHNOLOGY (ICT)
UJIAN AKADEMIK 1 2013 FORM 4 : MARCH 123 i
ii4 i
ii56 i
ii789 i
iiiiiiv
101112 i -
ii13 i -
16
ii141516 i
iiiiiiv
17 iii
1819 i
iiJumlah markah 40
17