rmmict.files.wordpress.com · Web viewPeraturan-peraturan untuk pengguna komputer. No penalty or...

15
1 Soalan-Soalan Berdasarkan Subtopik ( Soalan-Soalan SPM Sebenar 2007-2014) SMK RAJA MUDA MUSA BESTARI JAYA SELANGOR (INTRODUCTION OF ICT) NAMA : …………………………………………… TINGKATAN : 4…………………………………….. 1.1 Introduction to Information Technology [email protected] ( http://rmmict.blogspot.com )

Transcript of rmmict.files.wordpress.com · Web viewPeraturan-peraturan untuk pengguna komputer. No penalty or...

4

Soalan-Soalan Berdasarkan Subtopik

( Soalan-Soalan SPM Sebenar 2007-2014)

SMK RAJA MUDA MUSA

BESTARI JAYA SELANGOR

(INTRODUCTION OF ICT)

NAMA

: ……………………………………………

TINGKATAN: 4……………………………………..

1.1 Introduction to Information Technology

1.1.1 Overview of Information and Communication Technology (ICT)

1.1.1.1 Define ICT.

1.1.1.2 Describe the brief evolution of computers.

SECTION A

1. State the name of the first generation computer.

Nyatakan nama komputer generasi pertama

(SPM 2008)

……………………

2. Figure 1 shows three technologies used in the generations of computers

Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.

(SPM 2010)

Based on Figure 1, write A, B or C to match the following:

Berdasarkan Rajah l, tulis A, B atau C untuk dipadankan dengan berikut:

(i) Second Generation /

Generasi Kedua

...................

(ii) Third Generation /

Generasi Ketiga

…………….

Figure 1 / Rajah 1

3.. Complete the following statement: / Lengkapkan pernyataan berikut.

Information and Communication Technology is the use of computers,( i) ...........................devices and( ii) ......;:......................applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.

Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i) ……......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan , mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa.

(SPM 2010)

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce

1.1.2.1 List the usage of ICT in everyday life.

SECTION A

1.1.2.2 State the differences between computerised and non-computerised systems.

SECTION A

1. Table 1 shows the charecteristics of the operation mode ini Company A and Company B.

Jadual menunjukkan cirri mod operasi dalam Syarikat A dan Syarikat B

(SPM 2014)

Company A / Syarikat A

Company B / Syarikat B

· Using bollboard to advertise new product

Menggunakan papan iklan untuk mengiklan produk baharu

· Receive customer order by telephone

Menerima tempahan pelanggan melalui telefon

· All transactions recorded in forms

Semua urusniaga direkod dalam borang

· Promote new product at company/s website

Mempromosikan produk baharu di sesawang syarikat

· Receive customer order by email

Menerima tempahan pelanggan melalui email

· All transactions recorded in electronic forms

· Semua urusniaga direkod dalam borang elektronik

Table 1 / Jadual 1

Based on Table 1, state the operation mode use in :

Berdasarkan jadual 1, nyatakan mod operasi yang digunakan dalam :

i. Company A / Syarikat A

……………………………….

ii. Company B / Syarikat B

……………………………….

1.1.2.3 State the impact of ICT on society.

1.2 Computer Ethics and Legal Issues

1.2.1 Definition

1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.

SECTION A

1. Table 1 shows the characteristics of X and Y in computer usage guideline.

Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan

komputer.

(SPM 2011)

X

Y

Moral guidelines for computer users.

Garis panduan moral untuk pengguna komputer.

Rules for computer users.

Peraturan-peraturan untuk pengguna komputer.

No penalty or punishment.

Tiada penalti atau hukuman.

Penalties or punishments imposed.

Penalti atau htLkuman dikenakan.

Table 1 / Jadual 1l

Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:

(i) X……………………………………………

(ii) Y……………………………………………

2.Table 2 shows terms which are related to computer ethics and legal issues

Jadual 2 di bawah menunjukkan terma berkaitan etika komputer dan undang-undang

(SPM 2014)

A

Privacy

Keadaan berahsia

B

Intellectual property

Hak Intelektual

C

Cyber Law

Peraturan Siber

D

Computer ethics

Etika komputer

Table 2 / Jadual 2

Based on Table 2, write A,B,C or D to match the following statements

Berdasarkan jadual 2, tulis A,B, C atau D untuk dipadankan dengan pernyataan berikut

(i) Standards moral conduct in the use of computers

Standard perlakuan bermoral dalam penggunaan komputer

……………….

(ii) The right of and individual to restrict the collection and use of personal data

Hak individu untuk mengehadkan pengutipan dan penggunaan data peribadi

……………….

1.2.1.2 Differentiate between ethics and law.

1.2.1.3 State the need for intellectual property laws.

1.2.2 Privacy

1.2.2.1 List ways to protect privacy.

SECTION B

1.

The following is a statement on information privacy.

Pernyataan berikut berkaitan keperibadian maklumat

(SPM 2007)

Based on the statement, list four ways of making personal data more private.

Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi

lebih peribadi

i) ………………………………………………………………………………………….

ii) ………………………………………………………………………………………….

iii) ………………………………………………………………………………………….

iv) ………………………….……………………………………………………………….

1.2.2.2 State authentication and verification methods/technologies.

SECTION A

1. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti biometrik.

(SPM 2009 )

Based on Figure l, / Berdasarkan Rajah 1,

(i) State the name of the device. / Nyatakan nama peranti itu. ………………………………………………………

(ii) State the function of the device / Nyatakan fungsi peranti itu. …………………………………………………………………………………………

…………………………………………………………………………………………

2. Figure 1 shows information on two types of authentuication methods.

Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan

(SPM 2012)

Based on figure 1 , state the name of / berdasarkan rajah 1, namakan

i. P………………………………..

ii. Q ….……………………………

1.2.3 Controversial Contents and Control

1.2.3.1 List effects of controversial contents on society:• Pornography • Slander

1.2.3.2 Describe the process of filtering to control access to controversial contents

SECTION A

1. Figure 2 shows part of an algorithm for a web page filter.

Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.

(SPM 2009)

Figure 2 / Rajah 2

State the filtering method used in the algorithm.

Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.

………………………………………………..

2. Figure 2 shows the display of an internet filtering software

Rajah 2 menunjukkan paparan pada satu perisian penapisan internet

(SPM 2012)

Figure 2 / Rajah 2

Based on Figure 2 , state the method used

Berdasarkan rajah 2 nyatakan kaedah yang digunakan

…………………………………………………………….

3. Figure 1 shows the keyword blocking process

Rajah 1 menunjukkan proses penapisan kata kunci

(SPM 2013)

Figure 1 / Rajah 1

Based on figure 1 write A,B or C to match the following statement

Berdasarkan rajah 1, tuliskan A,B atau C untuk dipadankan dengan pernyataan berikut

i. Page download stops

Muat turun laman berhenti

………..

ii. Search for banned words

Mencari perkataan-perkataan yang diharamkan

………..

1.2.4 Computer Crimes

1.2.4.1 Explain the need for Cyber Law.

SECTION A

1. Cyber law is a system of moral standards or values used as a guideline for computer users. (T/F)

Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang digunakan sebagai pedoman bagi pengguna komputer

TRUE / FALSE

(SPM 2007)

1.2.4.2 Explain briefly the computer crimes below: • Fraud • Copyright Infringement • Theft • Attacks

1.3 Computer Security

1.3.1 Definition

1.3.1.1 Define computer security.

1.3.2 Security Threats

1.3.2.1 Explain briefly the different threats to computer security:

• Malicious code • Hacking • Natural disaster • Theft

SECTION B

1. Figure 12 shows a pop-up message to computer users.

Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer

(SPM 2011)

Figure 12 / Rajah 12

Based on Figure 12: / Berdasarkan Rajah 12:

(a) State two ways that causes the pop-up message to appear on the

computer screen.

Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di

skrin komputer.

………………………………………………………………………………………

………………………………………………………………………………………

[2 markah]

(b) State two kinds of serious damages if a user ignore the message.

Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.

………………………………………………………………………………………

………………………………………………………………………………………

[2 markah]

2. Read the following warning

Baca amaran berikut

(SPM 2013)

Based on the warning statement

Berdasarkan pernyataan amaran itu

a. Explain why the warning important

Terangkan mengapa amaran itu penting

2 markah

b. i. What precaution should you take if you cannot follow the given warning?

Apakah langkah berjaga-jaga yang seharusnya diambil jika anda tidak dapat mematuhi amaran yang diberi?

1 markah

ii. Justify your answer

Beri justifikasi jawapan anda

1 markah

SECTION C

1. Figure 20 shows symptoms of a computer problem

Rajah 20 menunjukkan simptom pada sebuah komputer.

(SPM 2010)

· Screen displays unusual messages

Skrin memaparkan mesej pelik

· Files become corrupted

Fail menjadi rosak

· Fies mysteriously appear

Muncul fail yang menjadi tanda Tanya

Figure 20 / Rajah 20

Based on Figure 20: / Berdasarkan Rajah 20:

(a) Identify the type of computer threat which matches the symptoms.

Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.

i. ………………………………….

State two different examples of the threat. / Nyatakan dua contoh berlainan bagi ancaman itu.

ii. …………………………………

i. …………………………………

(b) Describe two reasons why the computer may have been affected by the threat in (a).

Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).

Suggest two ways to prevent it.

Cadangkan dua cara untuk mengatasinya.

.................................................................................................

.................................................................................................

.................................................................................................

1.3.3 Security Measures

1.3.3.1 Select the appropriate security measures to overcome the identified computer threats

1.3.3.2 Apply the correct security procedures:

• Antivirus • Anti-Spyware • Cryptography • Firewall • Data backup • Human aspects

SECTION A

1.

Figure 3 shows how cryptography works

Rajah 3 menunjukkan bagaimana kriptografi bekerja.

(SPM 2007)

Name H : / Namakan H : …………………………………………………………………

2. Table 2 shorws the steps of using anti-virus software which is not in the

correct sequence.

Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak mengikut urutan yang betul.

(SPM 2011)

Complete the step. Step 1 and 3 are given.

Lengkapkan langkah itu. Langkah I dan 3 diberi.

Choose anti virus software/Pilih perisian anti virus

(i) 1

Take necessary action /Ambil tindakan yang perlu

(ii) ..……

Scan the selected area /Imbas kawasan yang dipilih

(iii) 3

Select area to be scanned /Pilih kawasan yang akan diimbas

(iv) ……..

Table 2 /Jadual 2

(ii)…………(iv)…………

3. Ali has send a confidential file to Sandra using email. Rearrange the activities carried out

by Ali in the correct sequence.

Ali perlu menghantar satu fail sulit kepada Sandra menggunakan email. Susun semulaaktiviti yang dijalankan oleh Ali mengikut urutan yang betul.

(SPM 2013)

P Decrypt file / Menyahsulit file

Q Open file received to view contents

Buka fail yang diterima untuk melihat kandungan

R Select file to send

Pilih fail yang akan dihantar

SEncrypt file

Enkripsi fail

TAttach file to email

Kepilkan fail pada email

SECTION B

1. Figure 15 shows the scan summary when an antivirus program is used.

Rajah 15 menunjukkan laporan ringkas imbas bila program antivirus digunakan

(SPM 2014)

.

Figure 15 / Rajah 15

Based on figure 15; /Berdasarkan rajah 15;

a) List two steps to carry out the task

Senaraikan dua langkah untuk melaksanakan tugas itu

[2 marks/2markah]

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

b) State two actions that can be taken to remove the untreated threats.

Nyatakan dua tindakan yang boleh diambil untuk mengalihkan ancaman yang tidak dapat dirawat.

[2 marks/2markah]

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………

SEMAKAN

Tarikh

Topik / Sub topik

Tanda tangan

Guru

Catatan

1.2 Introduction to Information Technology

1.1.2 Overview of Information and Communication Technology (ICT)

1.1.2.1 Define ICT.

1.1.1.3 Describe the brief evolution of computers.

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce

1.1.2.1 List the usage of ICT in everyday life.

1.1.2.2 State the differences between computerised and non-computerised systems.

1.1.2.3 State the impact of ICT on society.

1.2 Computer Ethics and Legal Issues

1.2.1 Definition

1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.

1.2.1.2 Differentiate between ethics and law.

1.2.1.3 State the need for intellectual property laws.

1.2.2 Privacy

1.2.2.1 List ways to protect privacy.

1.2.2.2 State authentication and verification methods/technologies.

1.2.3 Controversial Contents and Control

1.2.3.1 List effects of controversial contents on society: • Pornography • Slander

1.2.3.2 Describe the process of filtering to control access to controversial contents.

1.2.4 Computer Crimes

1.2.4.1 Explain the need for Cyber Law.

1.2.4.2 Explain briefly the computer crimes below:• Fraud • Copyright Infringement • Theft • Attacks

1.3 Computer Security

1.3.1 Definition

1.3.1.1 Define computer security.

1.3.2 Security Threats

1.3.2.1 Explain briefly the different threats to computer security:• Malicious code • Hacking • Natural disaster • Theft

1.3 Computer Security

1.3.3 Security Measures

1.3.3.1 Select the appropriate security measures to overcome the identified computer threats

1.3.3.2 Apply the correct security procedures: • Antivirus • Anti-Spyware • Cryptography • Firewall • Data backup • Human aspects

Report

End

Detections: 5

Suspicious files: 0

Warnings: 52

Objects scanned: 0

Hidden objects: 0

“Information privacy refers to the right of individuals and organisations to deny or restrict the collection and use the information about them”

Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk menafi atau mengelakkan hasil dan maklumat mereka digunakan.

Authentication methods

Kaedah pengesahan

P

Q

Taxi services booking / tempahan perkhidmatan teksi

Purchase using credit card / pembelian menggunakan kad kredit

- Retinal scanning /

pengimbasan retina

- voice recognition /

Pengecaman suara

FILTERING SETTINGS

Restricted List

� HYPERLINK "http://www.seperti.com" �http://www.seperti.com�

http://www.jalan.com

ADD

REMOVE

EXIT

Plaintext

H

Plaintext

Encrypt

Decrypt

Last detection:ADWARE/Adware.Gen2 Virus.informatiom

Scanned files: 1583192

Scanned directories: 26448

Scanned archieves: 27945

Used time: 3:39:57

Scanned : 100%

100%

Status: The scan has finished

Last Object:

J:\merged_partition_content\50GB AV scan test bundle\...mcw10.exe

START

User access a web page

B

Contained banned words?

STOP

A

C

YES

NO

Never open an email attachment unless you are expecting the attachment and it is from the trusted source

Jangan buka email yang dikepilkan kecuali anda menjangkakan kepilan tersebut dan ia datang dari sumber yang dipercayai

[email protected] ( http://rmmict.blogspot.com )