Beruflich Dokumente
Kultur Dokumente
(INTRODUCTION OF ICT)
NAMA
TINGKATAN :
4..
1.1
(SPM
sppangsess@gmail.com ( http://rmmict.blogspot.com )
2.
the
Figure 1 / Rajah 1
3..
Table 1 shows the charecteristics of the operation mode ini Company A and Company B.
Jadual menunjukkan cirri mod operasi dalam Syarikat A dan Syarikat B
(SPM 2014)
-
Company A / Syarikat A
Using bollboard to advertise new
product
Company B / Syarikat B
Promote new product at
company/s website
sppangsess@gmail.com ( http://rmmict.blogspot.com )
Mempromosikan produk
baharu di sesawang syarikat
Receive customer order by
email
Menerima tempahan
pelanggan melalui email
All transactions recorded in
electronic forms
Semua urusniaga direkod
dalam borang elektronik
Company A / Syarikat A
.
Company B / Syarikat B
.
X
Moral guidelines for computer users.
Garis panduan moral untuk pengguna komputer.
No penalty or punishment.
Tiada penalti atau hukuman.
(SPM
Y
Rules for computer users.
Peraturan-peraturan untuk pengguna
komputer.
Penalties or punishments imposed.
Penalti atau htLkuman dikenakan.
sppangsess@gmail.com ( http://rmmict.blogspot.com )
4
Table 1 / Jadual 1l
Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:
(i)
X
(ii)
Y
2.
Table 2 shows terms which are related to computer ethics and legal issues
Jadual 2 di bawah menunjukkan terma berkaitan etika komputer dan undang-undang
(SPM 2014)
A
Privacy
Keadaan berahsia
B
Intellectual property
Hak Intelektual
C
Cyber Law
Peraturan Siber
D
Computer ethics
Etika komputer
Table 2 / Jadual 2
(ii)
The right of and individual to restrict the collection and use of personal data
Hak individu untuk mengehadkan pengutipan dan penggunaan data peribadi
.
sppangsess@gmail.com ( http://rmmict.blogspot.com )
5
ii) .
iii) .
iv) ..
1.2.2.2 State authentication and verification methods/technologies.
SECTION A
1.
Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti
biometrik.
(SPM 2009 )
Based on Figure l, / Berdasarkan Rajah 1,
(i)
State the name of the device. / Nyatakan nama
peranti itu.
(ii)
State the function of the device / Nyatakan fungsi
peranti itu.
2.
(SPM 2012)
Authentication methods
Kaedah pengesahan
- Retinal scanning /
pengimbasan retina
- voice recognition /
Pengecaman suara
sppangsess@gmail.com ( http://rmmict.blogspot.com )
6
1.
(SPM 2009)
Figure 2 / Rajah 2
State the filtering method used in the algorithm.
Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
..
2.
FILTERING SETTINGS
Restricted List
http://www.seperti.com
http://www.jalan.com
START
Figureaccess
2 REMOV
/ Rajah 2
ADD User
Based on Figure
2
,
state
the
a web page
E method used
Berdasarkan rajah 2 nyatakan kaedah yang digunakan
EXIT
.
A
3.
YES
Contained
banned
words?
(SPM 2013)
NO
C
sppangsess@gmail.com ( http://rmmict.blogspot.com )
STOP
Figure 1 / Rajah 1
(SPM 2011)
Figure 12 /
Rajah 12
Based on Figure 12: / Berdasarkan Rajah 12:
(a)
State two ways that causes the pop-up message to appear on the
computer screen.
Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di
sppangsess@gmail.com ( http://rmmict.blogspot.com )
8
skrin komputer.
(b)
2.
[2 markah]
State two kinds of serious damages if a user ignore the message.
Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.
[2 markah]
(SPM 2013)
b.
i.
What precaution should you take if you cannot follow the given warning?
Apakah langkah berjaga-jaga yang seharusnya diambil jika anda tidak
dapat mematuhi amaran yang diberi?
1 markah
ii.
SECTION C
1.
(SPM 2010)
Figure 20 / Rajah 20
Based on Figure 20: / Berdasarkan Rajah 20:
sppangsess@gmail.com ( http://rmmict.blogspot.com )
9
(a)
i.
(b)
Describe two reasons why the computer may have been affected by the threat in
(a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
.................................................................................................
.................................................................................................
.................................................................................................
Plaintext
Encrypt
Decrypt
Plaintext
Name H : / Namakan H :
2.
Table 2 shorws the steps of using anti-virus software which is not in the
correct sequence.
Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak
mengikut urutan yang betul.
(SPM 2011)
Complete the step. Step 1 and 3 are given.
Lengkapkan langkah itu. Langkah I dan 3 diberi.
Choose anti virus software/Pilih perisian anti virus
(i)
1
Take necessary action /Ambil tindakan yang perlu
(ii) ..
Scan the selected area /Imbas kawasan yang dipilih
(iii)
3
Select area to be scanned /Pilih kawasan yang akan diimbas
(iv) ..
Table 2 /Jadual 2
(ii)
(iv)
3.
out
Ali has send a confidential file to Sandra using email. Rearrange the activities carried
by Ali in the correct sequence.
Ali perlu menghantar satu fail sulit kepada Sandra menggunakan email. Susun semula
aktiviti yang dijalankan oleh Ali mengikut urutan yang betul.
(SPM 2013)
P
Decrypt file / Menyahsulit file
Q
Open file received to view contents
Buka fail yang diterima untuk melihat kandungan
sppangsess@gmail.com ( http://rmmict.blogspot.com )
10
R
S
T
SECTION B
1.
Status:
The scan has finished
Last Object:
J:\merged_partition_content\50GB AV scan test
bundle\...mcw10.exe
100%
Figure 15 / Rajah 15
[2 marks/2markah]
b)
State two actions that can be taken to remove the untreated threats.
Nyatakan dua tindakan yang boleh diambil untuk mengalihkan ancaman yang
tidak dapat dirawat.
[2 marks/2markah]
sppangsess@gmail.com ( http://rmmict.blogspot.com )
11
SEMAKAN
Tarikh
Tanda tangan
Guru
Catatan
sppangsess@gmail.com ( http://rmmict.blogspot.com )