Beruflich Dokumente
Kultur Dokumente
Section A
Bahagian A
[36 marks]
[36 markah]
Answer all questions. Write your answer in the spaces provided in Answer Sheet.
Each answer carries one mark.
Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian
Jawapan. Setiap jawapan diperuntukkan satu markah.
1
Figure 1
Rajah 1
Based on figure 1, state one activity can be done with internet banking.
Berdasarkan rajah 1, nyatakan satu aktiviti yang boleh dilakukan melalui
perbankan internet. Pay electric bill, account transferring
3
EDUCATION
PENDIDIKA
N
Computerised
Sistem berkomputer
depends strictly on
teachers & textbook
bergantung sepenuhnya
kepada guru dan buku teks
no or limited technology
in the teaching & learning
process
tiada teknologi atau terhad
dalam proses pengajaran &
pembelajaran
Table 1/ Jadual 1
Non-Computerised Systems
Sistem Bukan berkomputer
more interesting & interactive
experiences Pembelajaran
menjadi lebih menarik dandapat
melalui pengalaman yang
interakrif
enhanced learning
Mempertingkatkan proses
pembelajaran
There are two methods of identification and verification used in the latest of
computer systems:
Terdapat dua kaedah Pengecaman dan Pengesahan yang digunapakai
dalam sistem komputer terkini:
A. Methods of Authentication
Kaedah Pengecaman
B. Methods of Verification
Kaedah Pengesahan
Match the two methods of identification and verification with the system to be
uses.
Padankan dua keadah pengenalan dan pengesahan dengan system yang
digunakan.
i.
Which of the following statements is not true about the definition of computer
system?
Manakah antara pernyataan yang berikut tidak benar mengenai definisi
sistem komputer?
A
Beng likes to sing and plans to promote himself through the Internet by
showing his singing video clip on it. The devices he needs to record the video
is a digital camera and a keyboard to type the lyrics that will be shown on
the screen.
Beng suka menyanyi dan bercadang mempromosikan dirinya melalui Internet
dengan menunjukkan klip video nyanyiannya.
diperlukannya
untuk
merekod
video
Peranti-peranti yang
ialah______(i)_______
dan
Alex invites his family and friend to celebrate his birthday by watching a movie
and singing karaoke using his new home theatre.
Alex menjemput keluarga dan rakan-rakannya untuk meraikan ulangtahun
kelahirannya dengan menonton filem dan menyanyi karaoke menggunakan
set teater rumah yang baru dibelinya.
Figure 2 / Rajah 2
Figure 2 shows a set of home theatre. Based on figure above:
Rajah 2 menunjukkan set teater rumah. Berdasarkan rajah di atas:
Name two output devices.
Namakan dua peranti output.
Speaker, LCD Projector, LCD Screen
Figure 3
Rajah 3
Based on Figure 3, state whether the following statement is True or False.
Berdasarkan Rajah 3, nyatakan sama ada pernyataan berikut Benar atau
Palsu.
(i)
False
(ii)
True
Radiowave
Used for short-range communication
Digunakan dalam komunikasi jarak pendek
Signals frequencies between 300 GHz ke 400 THz.
Frekuensi signal antara 300 GHz ke 400 THz
Infrared
Table 2
Jadual 2
(ii)
12
10.152.245.39
10.152.245.38
10.153.246.39
10.153.245.39
A.
B.
C.
D.
13
i and ii
i, iii and iv
iii and iv
i, iii and iv
I and III
I dan III
I and IV
I dan IV
II and III
II dan III
II and IV
II dan IV
14
Subtitle 2
Subtitle 3
malam_kebudayaan.txt
malam_kebudayaan.wav
malam_kebudayaan.wmv
Interactivity :
User can make selection by clicking the
buttons
10
Figure 5
Rajah 5
Based on Figure 5 , which two multimedia elements are not included in the
storyboard.
Animation, graphics
Example
Konsep
Elemen dipersembahkan..
Contoh
Time frame
along a timeline
(i)
Kerangka masa
Macromedia
Flash/Director
Icon
in a structural framework
Ikon
(ii)
Card Concept
as pages in a book
Authorware
Toolbook
11
True
17
A
Converts the source code into a machine
B
Converts one statement at a time into
later.
Menukar kod sumber kepada bahasa
Compiler
Pengkompil
(ii)
Interpreter
Pentafsir
18
12
Obtain Input
Obtain Daily
Log
Produce Output
Compute
Hours
Print Bill
Print Report
Figure 6
Rajah 6
Complete the following statement by filling in the blanks.
Lengkapkan pernyataan berikut dengan mengisi tempat kosong:
Based on Figure 6 structured programming is a computer programming technique
in which the program is divided into modules like function, subroutine and procedure.
Berdasarkan Rajah 6, .... ialah teknik pengaturcaraan
komputer di mana aturcara itu dibahagi kepada modul seperti fungsi, subrutin dan
prosidur.
19
13
Figure 8
Rajah 8
(i)
Logical Operator
20
Integer
14
Table 5 / Jadual 5
21
(i)
People
(ii)
Hardware
Figure 9
Rajah 9
15
A.
B.
C.
D.
22
FullName
Lee Yi Lin
Ali bin Azman
Dev Anthony
EmployeeID
A00012
A00023
A00121
DateOfBirth
12031990
24121988
12101992
Table 6 / Jadual 6
Based on Table 6, choose the correct statement.
Berdasarkan Jadual 6, pilih pernyataan yang betul.
A
EmployeeID is a record.
EmployeeID ialah satu rekod.
FullName is a field.
FullName ialah satu medan.
Age is a file.
Age ialah satu fail.
DateOfBirth is a byte.
DateOfBirth ialah satu bait.
23
Age
22
24
20
16
database
Choose the terms shown in Table 7 which match the following statements
Pilih istilah yang ditunjukkan dalam Jadual 7 yang berpadanan dengan
kenyataan berikut.
A field key that must match a primary key value in another table
Satu medan yang mesti sepadan dengan nilai medan kunci primer
dalam jadual yang lain.
25
Foreign Key
17
Form / Borang
B.
Queries / Pertanyaan
C.
Report / Laporan
D.
Table / Jadual
18
Section B
Bahagian B
[20 marks]
Answer all the questions
Jawab semua soalan
Figure 11(a)
(i)
Figure 11(b)
(ii)
19
T
S
Figure 1
Rajah 12
S
T
[2 marks]
20
(b)
Figure 13
(a)
[2 marks]
21
(b)
[2 marks]
Figure 14
Based on figure above
Berdasarkan rajah di atas
a)
State Primary key and foreign key for Subject Registered Table
Nyatakan kunci utama dan kunci sekunder bagi jadual Subject
Registered.
[2 marks]
b)
22
Section C
Bahagian C
[14 marks]
This section consists of three questions. Answer two questions only:
Bahagian ini mengandungi tiga soalan. Jawab dua soalan sahaja
Question 31 is compulsory and choose either Question 32 or Question 33.
Soalan 31 adalah wajib dan pilih sama ada Soalan 32 atau Soalan 33.
31. Figure 15 below show the pop up by EZY Bank internet banking before we
used the log in the system
Rajah 15 dibawah menunjukkan pop-up dari perbankan internet Bank EZY
sebelum kita log masuk ke sistem perbankan internet .
Figure 15
Based on the figure 15 above,
Berdasarkan rajah 15 di atas
a. Explain two functions why pop up displayed
Terangkan dua tujuan mengapa pop up tersebut dipaparkan.
[4 marks ]
23
b. State three reasons why EZY Bank needs to cyber laws security their data
Nyatakan tiga sebab mengapa pihak bank EZY perlu kepada undang-undang
siber untuk mengawal keselamatan datanya.
[ 3 markah]
32.
Figure 16(a)
24
Figure 16(b)
(i)
(ii)
(b)
[3 marks]
Explain how the student transfers that file, using the same storage
medium to another computer and open the file for editing.
Terangkan bagaimana pelajar memindahkan fail itu menggunakan
medium storan yang sama kepada komputer lain dan membuka fail
untuk suntingan.
[4 marks]
Rajah 17 menunjukkan dua jadual berhubung dalam satu pangkalan data murid.
25
Table Name:
tblStudent
Figure 10
Based on Figure 17:
Berdasarkan Rajah 17:
Draw the design of a form for users to input data and carry out basic
operations of data manipulation. The form must contain the following items:
Lukiskan reka bentuk borang untuk memasukkan data dan melakukan
operasi asas manipulasi data oleh pengguna. Borang ini mesti mengandungi
perkara berikut:
(a)
(b)
(c)
No
Marka
26
Soal
an
26
characteristi
c
Primary
storage
Secondary
storage
volatile
volatile when
the power is off
(ROM excluded),
all contents of
RAM are lost.
non-volatile and
almost permanent
cess time.
It takes lesser
time (few
nanoseconds)
for the CPU to
access RAM
Cost.
Primary
storages
Secondary
storage
Capacity
Small
Large
Access speed
Fast
Medium
Cost per MB
Expensive
Cheap
Portability
Fixed
Portable
Need
Compulsory
Alternative
OR
Primary storage is known as the main memory of a
computer. It is an internal memory (inside the CPU) that
can be accessed directly by the processor.
2
Marka
h
27
2
marka
h
Functions :
i)
ii)
iii)
No
Soal
an
27
Marka
h
2
Marka
h
2
marka
h
28
28
29
(a) Time in
1 mark
Time out
1 mark
1 mark
1 mark
30
1 mark
1 mark
1 mark
31.
1 mark
So
that
compensation from
customers
can
Pecaha
n
markah
dalam
skema
(4
markah)
3
markah
claim
the bank
- So that criminals can be prosecuted /
sentenced
32.
(a)
(i)
1
markah
29
(ii)
a.
Storage
b.
(b)
There are two ways
Compress the file using utility program before
transferring the file into the storage medium
Split the file into several parts and transfer the parts
one by one. The file that has been transferred must
be deleted so that there is space for the next file to
be transferrred
2
markah
2
markah
33.
7 mark
30