Sie sind auf Seite 1von 5

SECTION B

NO
SOALA
N
26

MARKAH

1 mark
1 mark

2 marks

27
1 mark

1 mark
1 mark
1 mark

28

Program Design Phase


Implementation Phase

1 mark

a.

Phase X Phase Y -

b.

Tool Used Flow Chart. Top-down design, pseudo code ( any


one )

1 mark

c.

Statement Z
1.
To tell the programmer about the following functions
in use..
2.
Internal comments within program. It explain the
purpose of the code statement within the program.
3.
This statements mostly address to other
programmers who may have to make corrections or
modification to the programs.
( any one of the above )

2
marks

29
1 mark

2
marks

30

a. Type of network communication technology used between


Central Site and Customer Site :
Extranet
b. Type of network communication technology X use in
Central Site :
X- Intranet
Its a private network that limited for employee only
c. Two differences between network communication
technologies X and network communication technologies
between Central site and Customer site
Technologies X
[ Intranet ]
Is a private network
Is used for organization and
employees only
Security level is high

1 mark
1 mark

1 mark

2
marks

Extranet
Is a private network
Is used for supplier,
customer and business
partner
Security level is high and it
used Virtual Private Network
to communicate.

SECTION C
31

(a) Security measure should be taken:


(1) Firewall

1 mark

Hardware or software which functions in a networked


environment
Perkakasan atau perisian yang mana berfungsi dalam
persekitaran rangkaian
1 mark
AND
to permit or deny network transmission based on a set of
rules.
untuk membenarkan atau menghalang transmisi
rangkaian berdasarkan satu set peraturan.

1 mark

OR
It is frequently used to protect network from unauthorised
access.
Kebiasaannya digunakan untuk melindungi dari capaian
tidak sah

1 mark

1 mark
(2) Human aspect

to give self awareness talk and motivate the employees to


be honest, responsible and trustworthy users.
Memberi ceramah kesedaran dan motivasi kepada pekerja
supaya jujur, bertanggung jawab dan menjadi pekerja yang
boleh dipercayai.
AND
to train employees to follow the rules and procedures of the
organization
melatih pekerja supaya mematuhi peraturan dan juga
prosedur.
OR
to ensure that the computers and important data can only
be accessed by authorised personnel by using lock,
password and smartcard
memastikan komputer dan data penting hanya boleh
dicapai oleh kakitangan yang diberikuasa dengan
menggunakan kunci, katalaluan dan kad pintar.

* can mix points from different security measures *

I mark

I mark

(b)
Malicious code

Is any codes in any part of software that is intended to cause


undesired effect, security breaches or damage to a system
Iaitu sebarang kod di dalam perisian yang boleh menyebabkan
kesan yang tidak diingini, memecahkan perisian keselamatan
atau kerosakan sistem

Natural Disaster/Bencana alam


The effect of earth natural hazard such as flood, fire,
earthquake, storms and tornados. etc.
Kesan daripada bencana alam semulajadi seperti banjir,
kebakaran, gempa bumi, ribut taufan, dan puting
beliung sebagainya.

I mark

1 mark

I mark
I mark

Theft
Theft is the illegal taking of another persons property or
information without that persons freely given consent.
Mengambil harta/maklumat orang lain tanpa
persetujuan empunya.

*choose two from answers given


32

a. Phase that is omitted by Ahmad is program design.


In this phase Ahmad suppose to write an outline of
the logic program or pseudo code, create flowchart
to look at the logic flow of the program and to design
user interface of the program. (3m)
b. Another translation method is a compiler. Compiler
translates entire programming statement of a
program into machine language, save it in object
code and then executes it later. (2m)
c. Phase IV is documentation. Documentation is
important for people involve in the program in the
future, documentation is a reference when problem
occur that need programmers to rectify the errors.
Documentation also a guide to update and modify
program. Program maintenance can easily be done
with the help of documentation. (2m)

3
marks

2
marks

2
marks

33

3
marks

4
marks

Das könnte Ihnen auch gefallen