Sie sind auf Seite 1von 30

1

Section A
Bahagian A
[36 marks]
[36 markah]
Answer all questions. Write your answer in the spaces provided in Answer Sheet.
Each answer carries one mark.
Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian
Jawapan. Setiap jawapan diperuntukkan satu markah.
1

Compared to other hardware technology, transistors had many advantages


such as:
Berbanding dengan teknologi perkakasan lain, transistor mempunyai banyak
kelebihan seperti:
transistors were smaller than vacuum tubes
transistor adalah lebih kecil daripada tiub vakum
they needed no warm up time
tidak memerlukan masa untuk warm-up
consumed less energy
kurang penggunaan tenaga
Based on the statement above, state the generation of computer using
transistor technology.
Berdasarkan pernyataan di atas, Nyatakan generasi komputer yang
menggunakan teknologi transistor.
Second Generation (1956 1963)

Figure 1 above show the interface of Public Bank Internet Banking.


Rajah 1 menunjukkan antaramuka perbankan internet Public Bank

Figure 1
Rajah 1
Based on figure 1, state one activity can be done with internet banking.
Berdasarkan rajah 1, nyatakan satu aktiviti yang boleh dilakukan melalui
perbankan internet. Pay electric bill, account transferring
3

State the following statement is True or False.


Nyatakan pernyataan berikut Benar atau Palsu.
False
Table 1 shows The Differences Between Computerised An
NonComputerised Systems.
Jadual 1 menunjukkan Perbezaan Antara Sistem Berkomputer Dan Bukan
Berkomputer.
Sector
Bidang

EDUCATION
PENDIDIKA
N

Computerised
Sistem berkomputer

depends strictly on
teachers & textbook
bergantung sepenuhnya
kepada guru dan buku teks

no or limited technology
in the teaching & learning
process
tiada teknologi atau terhad
dalam proses pengajaran &
pembelajaran
Table 1/ Jadual 1

Non-Computerised Systems
Sistem Bukan berkomputer
more interesting & interactive
experiences Pembelajaran
menjadi lebih menarik dandapat
melalui pengalaman yang
interakrif
enhanced learning
Mempertingkatkan proses
pembelajaran

There are two methods of identification and verification used in the latest of
computer systems:
Terdapat dua kaedah Pengecaman dan Pengesahan yang digunapakai
dalam sistem komputer terkini:
A. Methods of Authentication
Kaedah Pengecaman
B. Methods of Verification
Kaedah Pengesahan
Match the two methods of identification and verification with the system to be
uses.
Padankan dua keadah pengenalan dan pengesahan dengan system yang
digunakan.
i.

user identification and processed object.

Pengenalan pengguna dan pemprosesan objek.


ii.

biometric device and callback system.


peranti biometric dan sistem panggil balik.

Which of the following statements is not true about the definition of computer
system?
Manakah antara pernyataan yang berikut tidak benar mengenai definisi
sistem komputer?
A

A computer system is defined as any utility software such as winzip


and scandisk.
Sistem komputer boleh didefinisikan sebagai sebarang perisian utility
seperti winzip dan scandisk.

A computer system requires hardware, software and a user to fully


function.
Sistem komputer memerlukan perkakasan, perisian dan pengguna
untuk berfungsi.

A computer system is defined as combination of components designed


to process data and store files.
Sistem komputer boleh didefinasikan sebagai kombinasi komponen
yang direka untuk memproses data dan menyimpan fail.

A computer system consists of four major hardware components; input


devices, output devices, processor and storage devices
Sistem komputer mengandungi empat komponen perkakasan utama,
perkakasan input, perkakasan output, pemproses dan perkakasan
storan.

Beng likes to sing and plans to promote himself through the Internet by
showing his singing video clip on it. The devices he needs to record the video
is a digital camera and a keyboard to type the lyrics that will be shown on
the screen.
Beng suka menyanyi dan bercadang mempromosikan dirinya melalui Internet
dengan menunjukkan klip video nyanyiannya.
diperlukannya

untuk

merekod

video

Peranti-peranti yang

ialah______(i)_______

______(ii)_______ untuk menaip lirik yang akan ditayangkan pada skrin.

dan

Alex invites his family and friend to celebrate his birthday by watching a movie
and singing karaoke using his new home theatre.
Alex menjemput keluarga dan rakan-rakannya untuk meraikan ulangtahun
kelahirannya dengan menonton filem dan menyanyi karaoke menggunakan
set teater rumah yang baru dibelinya.

Figure 2 / Rajah 2
Figure 2 shows a set of home theatre. Based on figure above:
Rajah 2 menunjukkan set teater rumah. Berdasarkan rajah di atas:
Name two output devices.
Namakan dua peranti output.
Speaker, LCD Projector, LCD Screen

Figure 3 shows a motherboard with the components and their slots.


Rajah 3 menunjukkan papan induk dengan komponen-komponen dan slot
masing-masing.

Figure 3
Rajah 3
Based on Figure 3, state whether the following statement is True or False.
Berdasarkan Rajah 3, nyatakan sama ada pernyataan berikut Benar atau
Palsu.

(i)

P is slot for audio card.


P untuk slot kad bunyi.

False

(ii)

Q is slot for video card.


Q untuk slot kad video.

True

Table 2 shows two categories of wireless transmission.


Jadual 2 menunjukkan dua kategori penghantaran tanpa wayar.
i

Normally omnidirectional, signal propagated in all direction


Biasanya omniarah, isyarat disebarkan ke semua arah
Electromagnetic waves ranging in frequencies between 3 KHz1GHz

Gelombang elektromagnetik dalam frekuensi julatnya antara 3 KHz1GHz


ii

Radiowave
Used for short-range communication
Digunakan dalam komunikasi jarak pendek
Signals frequencies between 300 GHz ke 400 THz.
Frekuensi signal antara 300 GHz ke 400 THz
Infrared
Table 2
Jadual 2

Based on Table 2, state X and Y .


Berdasarkan Jadual 2 nyatakan X dan Y.
10

Cornplete the following statements:


Lengkapkan pernyataan berikut :
Virtual Private Network (VPN)
Voice Over Internet Protocol (VOIP)
(i)

Virtual Private Network (VPN) is a network that uses a public


telecommunication infrastructure, such as the Internet to remote offices
or individuals with secure access to their organisation's private
network.
______________adalah satu rangkaian yang menggunakan
infrastruktur telekomunikasi awam, seperti Internet untuk pejabat jarak
jauh atau individu yang mempunyai akses yang selamat untuk
rangkaian persendirian organisasi mereka.

(ii)

Voice Over Internet Protocol (VOIP) is one of the Internet Protocol


technology that allows a user to make telephone calls using the
Internet.

______________adalah salah satu daripada teknologi Internet


Protocol yang membolehkan pengguna untuk membuat panggilan
telefon menggunakan Internet.
11

Figure 4 shows part of a result in configuring a network.


Rajah 4 menunjukkan sebahagian daripada keputusan dalam
mengkonfigurasi rangakaian
Reply from 10.5.25.1: bytes=32 time<1ms TTL=255
Reply from 10.5.25.1: bytes=32 time<1ms TTL=255
Reply from 10.5.25.1: bytes=32 time<1ms TTL=255
Reply from 10.5.25.1: bytes=32 time<1ms TTL=255
Figure 4
Rajah 4
Based on Figure 4, write the command used.
Berdasarkan rajah 4, tuliskan arahan yang digunakan
Ping 10.5.25.1

12

Which of the following IPs are in same network?


Manakan antara IP berikut yang berada dalam rangkaian yang sama?
i.
ii.
iii.
iv.

10.152.245.39
10.152.245.38
10.153.246.39
10.153.245.39

A.
B.
C.
D.
13

i and ii
i, iii and iv
iii and iv
i, iii and iv

Which of the following are WYSIWYG web editors?


Antara yang berikut, yang manakah penyunting web WYSIWYG?
I Frontpage
Frontpage
II Notepad
Notepad
III Dreamweaver
Dreamweaver
IV Internet Explorer
Internet Explorer
A

I and III
I dan III

I and IV
I dan IV

II and III
II dan III

II and IV
II dan IV

14

Figure 5 shows the storyboard of multimedia presentation.


Rajah 5 menunjukkan papan cerita sebuah persembahan multimedia
Previous
Current
Next
Remark:
Screen
Screen
Screen
Subtitle 1

Subtitle 2

Subtitle 3

malam_kebudayaan.txt
malam_kebudayaan.wav
malam_kebudayaan.wmv
Interactivity :
User can make selection by clicking the
buttons

10

Figure 5
Rajah 5
Based on Figure 5 , which two multimedia elements are not included in the
storyboard.

Animation, graphics

Berdasarkan Rajah 5 apakah dua elemen multimedia yang tidak dimasukkan


dalam papan cerita itu.
15

Table 3 shows the information on the types of authoring tool concept.


Jadual 3 menunjukkan maklumat tentang jenis-jenis konsep alat
Concept

Elements are presented..

Example

Konsep

Elemen dipersembahkan..

Contoh

Time frame

along a timeline

(i)

Kerangka masa

di sepanjang garis waktu

Macromedia
Flash/Director

Icon

in a structural framework

Ikon

di dalam kerangka kerja berstruktur

(ii)
Card Concept

as pages in a book

Authorware

Toolbook

sebagai halaman didalam buku


Table 3 / Jadual 3

Based on Table 3, complete the table with the correct words.


Berdasarkan jadual 3, lengkapkan jadual itu dengan perkataan yang betul.
16

State whether the following statement is True or False.


Nyatakan sama ada pernyataan berikut Benar atau Palsu.
A program is a list of instructions for the computer to follow to accomplish the
task of processing data into information.
Program ialah jujukan arahan untuk diikuti oleh komputer bagi menyelesaikan
tugas memproses data kepada maklumat.

11

True
17

Read the following statements in Table 4 about the translators of


programming language.
Baca pernyataan dalam Jadual 4 mengenai penterjemahan bahasa
pengaturcaraan.

A
Converts the source code into a machine

B
Converts one statement at a time into

language code, called the object code.

machine code before it is to be executed.

The object code can be saved and run

No object code is saved.

later.
Menukar kod sumber kepada bahasa

Menukar satu pernyataan pada satu-satu

mesin, dipanggil kod objek. Kod objek ini

masa kepada bahasa mesin sebelum

boleh disimpan dan dijana kemudian.

dijana. Tiada kod objek disimpan.


Table 4 / Jadual 4

Based on Table 4, write A or B to match the following statements.


Berdasarkan jadual 4, tuliskan A atau B untuk dipadankan dengan pernyataan
berikut:.
(i)

Compiler

Pengkompil
(ii)

Interpreter

Pentafsir

18

Figure 6 shows one of the programming language approaches.


Rajah 6 menunjukkan satu daripada pendekatan bahasa pengaturcaraan.

12

Time and Billing


Process

Obtain Input

Obtain Daily
Log

Produce Output

Compute
Hours

Print Bill

Print Report

Figure 6
Rajah 6
Complete the following statement by filling in the blanks.
Lengkapkan pernyataan berikut dengan mengisi tempat kosong:
Based on Figure 6 structured programming is a computer programming technique
in which the program is divided into modules like function, subroutine and procedure.
Berdasarkan Rajah 6, .... ialah teknik pengaturcaraan
komputer di mana aturcara itu dibahagi kepada modul seperti fungsi, subrutin dan
prosidur.

19

Figure 7 shows the operator that perform certain actions or operations in


computer.

13

Rajah 7 menunjukkan simbol-simbol operator yang melaksanakan operasi


dalam komputer.

AND, OR, NOT


Figure 7
Rajah 7
Figure 8 shows part of the program to calculate the interest of loan payment.
Rajah 8 menunjukkan sebahagian atur cara untuk mengira faedah bayaran
pinjaman.
Private Sub Command_1()
Declare The Variables
Dim money as double
Dim month as X
Dim comments as string
.
.
.

Figure 8
Rajah 8
(i)

Based on Figure 7, state the operator.

Logical Operator

Berdasarkan Rajah 7, nyatakan operator.


(ii)

Based on Figure 8, identify X.


Berdasarkan Rajah 8, kenal pasti X.

20

Table 5 shows the information system components.


Jadual 5 menunjukkan komponen sistem maklumat.

Integer

14

Table 5 / Jadual 5

Based on Table 5, name


Berdasarkan Jadual 5, namakan

21

(i)

People

(ii)

Hardware

Figure 9 shows one types of management level. Management level in figure


9, helps top-level management to plan strategies and forecast in future trends.
What is the management level above?
Rajah 9 menunjukkan satu jenis peringkat pengurusan. Peringkat
Pengurusan dalam rajah 9, membantu pengurusan pihak atasan mengatur
pelan strategi dan meramal trend masa depan. Apakah Peringkat
Pengurusan di atas?

Figure 9
Rajah 9

15

A.
B.
C.
D.
22

Management Information System (MIS) / Sistem Maklumat Pengurusan


Decision Support Systems (DSS)/Sistem Sokongan Keputusan
Executive Information System (EIS)/Sistem Maklumat Eksekutif
Transaction Processing System (TPS)/ Sistem Pemprosesan Transaksi
Table 6 shows a database table.
Jadual 6 menunjukkan sebuah jadual pangkalan data.

FullName
Lee Yi Lin
Ali bin Azman
Dev Anthony

EmployeeID
A00012
A00023
A00121

DateOfBirth
12031990
24121988
12101992

Table 6 / Jadual 6
Based on Table 6, choose the correct statement.
Berdasarkan Jadual 6, pilih pernyataan yang betul.
A

EmployeeID is a record.
EmployeeID ialah satu rekod.

FullName is a field.
FullName ialah satu medan.

Age is a file.
Age ialah satu fail.

DateOfBirth is a byte.
DateOfBirth ialah satu bait.

23

State whether the following statements is True or False

Age
22
24
20

16

Nyatakan sama ada pernyataan berikut Benar atau Palsu

A Data base management system DBMS can minimizes data redundancy.


Sistem Pengurusan Pengkalan Data (DBMS ) boleh mengurangkan
pertindihan data . True
24

Table 7 shows some terms used in information and communication


technology.
Jadual 7 menunjukkan beberapa istilah yang digunakan dalam teknologi
maklumat dan komunikasi.
.Secondary key DMBS
Foreign key
Table 7 / Jadual 7

database

Choose the terms shown in Table 7 which match the following statements
Pilih istilah yang ditunjukkan dalam Jadual 7 yang berpadanan dengan
kenyataan berikut.
A field key that must match a primary key value in another table
Satu medan yang mesti sepadan dengan nilai medan kunci primer
dalam jadual yang lain.
25

Foreign Key

Figure 10 shown database screen.


Rajah 10 menunjukkan skrin pangkalan data.

17

Based on figure 10, which of the following describes the screen?


Berdasarkan rajah 10 antara yang berikut yang manakah menerangkan
mengenai skrin?
A.

Form / Borang

B.

Queries / Pertanyaan

C.

Report / Laporan

D.

Table / Jadual

18

Section B
Bahagian B
[20 marks]
Answer all the questions
Jawab semua soalan

26. Figure 11(a) and Figure 11(b) shows computer hardware.


Rajah 11(a) dan Rajah 11(b) menunjukkan perkakasan komputer.

Figure 11(a)

(i)

Figure 11(b)

State two differences between X and Y.


Nyatakan dua perbezaan di antara X dan Y.
[2 mark ]

(ii)

Give another example of X and state a function.


Berikan contoh lain untuk X dan nyatakan satu fungsi.
[2 mark ]

19

27. Figure 12 shows two types of client software, S and T.


Rajah 12 menunjukkan dua jenis perisian pelanggan, S dan T

T
S

Figure 1

Rajah 12

(a) Based on Figure 12, name type of software


Berdasarkan Rajah 12, namakan jenis perisian
(i)
(ii)

S
T
[2 marks]

(b) State two functions of T software.


Nyatakan dua fungsi perisian T.
[2 marks]

28. Read the following statement


Baca penyataan berikut.

20

Cikgu Sulaiman develops an online educational multimedia presentation


for his students to be accessed by them from home or other places.
Cikgu Sulaiman membangunkan persembahan multimedia pendidikan
secara atas talian untuk pelajar-pelajarnya mengakses dari rumah atau
tempat-tempat lain.
Based on the above statement,
Berdasarkan penyataan di atas,
(a)

Identify the medium of delivary used by Cikgu Sulaiman


Kenal pasti medium penghantaran yang digunakan oleh Cikgu Sulaiman
[1 mark]

(b)

Give three disadvantages of the medium of delivery mentioned in (a).


Beri tiga kelemahan medium penghantaran yang dinyatakan di (a)
[3 marks]

29. Figure 13 shows the pseudocode of the program.


Rajah 13 menunjukkan kod pesudo atur cara.
Compute time for client
Pengiraan masa pelanggan
Set total regular hours and total overtime hours to zero.
Get time in and time out for a job
If worked past 1700 hours, then compute overtime hours.
Add regular hours to total regular hours
Add overtime hours to total overtime hours.
Display total regular hours and total overtime hours.
Tetapkan jumlah biasa_masa dan jumlah lebih_masa kepada sifar
Dapatkan masa masuk dan masa keluar
Jika kerja lebih 1700 jam, maka kira masa lebih_masa
Tambah masa_biasa kepada jumlah masa_biasa
Tambah lebih_masa kepada jumlah lebih_masa
Paparkan jumlah masa_biasa dan jumlah lebih_masa

Figure 13
(a)

Identify the input of the program.


Kenal pasti input bagi atur cara itu.

[2 marks]

21

(b)

What control structure is used?


Give one reason for your answer.
Apakah struktur kawalan yang digunakan?
Berikan justifikasi anda.

[2 marks]

30. Figure 14 shows tables for club and subject registration.


Rajah 14 menunjukkan jadual pendaftaran kelab dan mata pelajaran

Figure 14
Based on figure above
Berdasarkan rajah di atas
a)

State Primary key and foreign key for Subject Registered Table
Nyatakan kunci utama dan kunci sekunder bagi jadual Subject
Registered.
[2 marks]

b)

Identify teachers name for Tecnologies Club and Usahawan Club


Kenalpasti nama guru-guru untuk kelab Tecnologies dan kelab
Usahawan.
[2 marks]

22

Section C
Bahagian C
[14 marks]
This section consists of three questions. Answer two questions only:
Bahagian ini mengandungi tiga soalan. Jawab dua soalan sahaja
Question 31 is compulsory and choose either Question 32 or Question 33.
Soalan 31 adalah wajib dan pilih sama ada Soalan 32 atau Soalan 33.

31. Figure 15 below show the pop up by EZY Bank internet banking before we
used the log in the system
Rajah 15 dibawah menunjukkan pop-up dari perbankan internet Bank EZY
sebelum kita log masuk ke sistem perbankan internet .

EZY sentiasa memaklumkan anda tentang


keselamatan perbankan atas talian

Figure 15
Based on the figure 15 above,
Berdasarkan rajah 15 di atas
a. Explain two functions why pop up displayed
Terangkan dua tujuan mengapa pop up tersebut dipaparkan.
[4 marks ]

23

b. State three reasons why EZY Bank needs to cyber laws security their data
Nyatakan tiga sebab mengapa pihak bank EZY perlu kepada undang-undang
siber untuk mengawal keselamatan datanya.
[ 3 markah]

32.

Figure 16(a) shows a printscreen of a computer desktop when a student


transfers a file into an empty storage medium.
Figure 16(b) shows the outcome of the transfer process.
Rajah 16(a) menunjukkan paparan skrin desktop komputer sebuah apabila
seseorang pelajar memindahkan satu fail ke sebuah medium storan yang
kosong.
Rajah 16(b) menunjukkan hasil proses pemindahan itu.

Figure 16(a)

24

Figure 16(b)

Based on Figure 16(a) and Figure 16(b)


Berdasarkan Rajah 16(a) dan Rajah 16(b),
(a)

(i)

What type of utility program is used by the student ?


Apakah jenis program utiliti yang digunakan oleh pelajar itu?

(ii)
(b)

Give two other uses of the utility program.


Beri dua kegunaan lain bagi program utility itu.

[3 marks]

Explain how the student transfers that file, using the same storage
medium to another computer and open the file for editing.
Terangkan bagaimana pelajar memindahkan fail itu menggunakan
medium storan yang sama kepada komputer lain dan membuka fail
untuk suntingan.
[4 marks]

33. Figure 17 shows two related tables in a student database.

Rajah 17 menunjukkan dua jadual berhubung dalam satu pangkalan data murid.

25

Table Name:
tblStudent

Table Name: tblClass

Nama Jadual: tblClass


Nama Jadual:
tblStudent

Relationship between the two tables

Perhubungan antara dua jadual berkenaan

Figure 10
Based on Figure 17:
Berdasarkan Rajah 17:
Draw the design of a form for users to input data and carry out basic
operations of data manipulation. The form must contain the following items:
Lukiskan reka bentuk borang untuk memasukkan data dan melakukan
operasi asas manipulasi data oleh pengguna. Borang ini mesti mengandungi
perkara berikut:
(a)
(b)
(c)

No

Title of the form.


[1 mark]
Fields which are related to the table contents and needed for entering
data by users.
[5 marks]
Object to give command to manipulate data.
[1 mark]

SKEMA YANG DICADANGKAN

Marka

26
Soal
an

26

characteristi
c

Primary
storage

Secondary
storage

volatile

volatile when
the power is off
(ROM excluded),
all contents of
RAM are lost.

non-volatile and
almost permanent

cess time.

It takes lesser
time (few
nanoseconds)
for the CPU to
access RAM

It takes more time


(several
milliseconds) for
CPU to access
secondary storage

Cost.

Secondary storage is cheaper than


RAM in terms of cost per unit of data.
OR

Primary
storages

Secondary
storage

Capacity

Small

Large

Access speed

Fast

Medium

Cost per MB

Expensive

Cheap

Portability

Fixed

Portable

Need

Compulsory

Alternative

OR
Primary storage is known as the main memory of a
computer. It is an internal memory (inside the CPU) that
can be accessed directly by the processor.

Secondary storage medium will allow her to store the


information and retrieve it for future use. Data and
programs in secondary storage do not disappear

2
Marka
h

27

when the power is turned off..


ROM Read Only Memory

2
marka
h

Functions :

i)
ii)
iii)

No

ROM in its strictest sense can only be read from


all ROMs allow data to be written into them at
least once, either during initial manufacturing or
during a step called "programming"
Some ROMs can be erased and re-programmed
multiple times

SKEMA YANG DICADANGKAN

Soal
an

27

(a) S is a web browser. T is email client.


(b) 2 Functions of T are:
To create email messages.
To send email messages.
To receive email messages.
To forward email messages.
To store email messages.

Marka
h

2
Marka
h

2
marka
h

28

(a) Web Based


1m

(b) Three disadvantages of medium of delivery in (a).


3m
- low resolution of pictures/video
- limited picture size
-can be changed/delete/modify by irresponsible users
-delivery of information is depending on internet facilities

28

29

(a) Time in

1 mark
Time out

1 mark
1 mark

(b) Selection control


The psuedocode has a decision to be made.

1 mark

Any relevant answer

30
1 mark
1 mark
1 mark

(a) Primary Key : SUBJECTID


Foreign Key : STUDENTID
(b) DANIEL
FARAH

31.

1 mark

(a) - To tell the user to be careful with email received (1 marks),


because some email may be a fake email that can cause the loss of
bank customers . (1 mark).

- To maintain the security of customer accounts, (1 mark) in which


the bank will inform data security issues from time to time.(1 mark)

- So that the bank can take legal action to


criminals
(b)

So
that
compensation from

customers

can

Pecaha
n
markah
dalam
skema
(4
markah)

3
markah

claim

the bank
- So that criminals can be prosecuted /
sentenced

32.

(a)

(i)

File Management / Pengurusan fail

1
markah

29
(ii)

a.

Storage
b.

Store files of different formats


2
markah

(b)
There are two ways
Compress the file using utility program before
transferring the file into the storage medium
Split the file into several parts and transfer the parts
one by one. The file that has been transferred must
be deleted so that there is space for the next file to
be transferrred

2
markah

2
markah

33.

7 mark

30

Das könnte Ihnen auch gefallen