Beruflich Dokumente
Kultur Dokumente
Form
Candidates Answer
B
B
True
Hand Geometry Scanning
Facial Recognition
D
B
D
B
D
C
True
D
False
True
220 or 1048576 (choose either one only)
Bit
A
B
D
C
B
D
C
A
C
False
Blue-ray disc
False
C
Managing data and programs
K
L
N
A
B
TOTAL MARKS
Skor
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
QUES
QUESTIONS
NO
26
a.
Based on statement above,
list TWO controversial
contents from the impact
of ICT on society.
b.
State TWO impacts of one
controversial contents in
(a) to Malaysian society.
27
a.
Name and explain the type
of computer crime that
Shen has committed.
b.
What was happened to
Shens computer? How
can Shen prevent his
computer from the
problem?
ANSWER
Pornography
Slander
Pornography
Can lead criminal acts
Can lead sexual addiction/Can lead
sexual addiction/perversion
Can develop low moral value towards
other man, women, children
Can erode good religious, cultural and
social beliefs and behaviour
OR
Slander
Can develop into society that
disregards honesty and truth.
Can develop bad habit of spreading
untruths and rumours
Can lead to unnecessary argument
Can cause people to have negative
attitudes towards another person
(choose either TWO impacts from
Pornography OR TWO impact from
Slander. One answer carry ONE
mark)
Copyright Infringement.
Involves illegal copy or reproduction
of copyrights materials by the black
market group
Computer virus.
Install anti-virus software/ scan files
for viruses before downloading.
SCORES
1m
1m
1m
1m
1m
1m
1m
1m
1m
1m
28
29
30
a.
Describe why does Mohan
encrypt the report?
1m
1m
b.
What is the term given to
the encrypted text in the
report?
1m
1m
a.
What is R? Explain the
function of R?
Output.
Output is data that has been processed
into a useful form called information
1m
1m
b.
R have four types. State
TWO types of R.
2m
a.
Name types of user
interface for X and Y.
X- Command line
Y- Graphical User Interface
1m
1m
b.
State TWO differences
between X and Y.
X
User have to
memories all the
syntax to issues
command
Y
User have not to
memories all the
syntax to issue
command
1m
1m
Difficult to use
Easy to use.
1m
31
a.
Proposed ONE of the
latest technology that can
be use by Cikgu Rose to
conduct her lesson
although she is attending
the course.
b.
Identify TWO input
devices and ONE output
device that you justify in
(a).
32
a.
Name X, Y, and Z
1m
1m
1m
1m
2m
1m
X: Mobile users
Y: SOHO users
Z: Power users
1m
1m
1m
b.
Explain how users in Y works.
i)
1m
ii)
1m
iii)
1m
iv)
1m
33
a.
Explain the TWO function
of ASCII and describe the
ASCII working process in
the computer system.
Function of ASCII
ASCII was established to achieve
1m
compatibility between various types of
data processing equipment making it
possible for the components to
communicate with each other
successfully.
ASCII enables manufactures to
1m
produce components that are assured
to operate correctly in a computer.
ASCII working process:
Every character is converted to its
corresponding binary form. The
computer processes the letter as a
byte, which actually a series of on and
off of electrical states. When the
computer is finished processing the
byte, the software installed in the
system convert the byte back which is
then displayed in the screen.
b.
Explain the relationship of
data representation for bit,
byte and character.
2m
1m
1m
1m