Post on 09-Feb-2021
transcript
4
Soalan-Soalan Berdasarkan Subtopik
( Soalan-Soalan SPM Sebenar 2007-2014)
SMK RAJA MUDA MUSA
BESTARI JAYA SELANGOR
(INTRODUCTION OF ICT)
NAMA
: ……………………………………………
TINGKATAN: 4……………………………………..
1.1 Introduction to Information Technology
1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1 Define ICT.
1.1.1.2 Describe the brief evolution of computers.
SECTION A
1. State the name of the first generation computer.
Nyatakan nama komputer generasi pertama
(SPM 2008)
……………………
2. Figure 1 shows three technologies used in the generations of computers
Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.
(SPM 2010)
Based on Figure 1, write A, B or C to match the following:
Berdasarkan Rajah l, tulis A, B atau C untuk dipadankan dengan berikut:
(i) Second Generation /
Generasi Kedua
...................
(ii) Third Generation /
Generasi Ketiga
…………….
Figure 1 / Rajah 1
3.. Complete the following statement: / Lengkapkan pernyataan berikut.
Information and Communication Technology is the use of computers,( i) ...........................devices and( ii) ......;:......................applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.
Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i) ……......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan , mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa.
(SPM 2010)
1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce
1.1.2.1 List the usage of ICT in everyday life.
SECTION A
1.1.2.2 State the differences between computerised and non-computerised systems.
SECTION A
1. Table 1 shows the charecteristics of the operation mode ini Company A and Company B.
Jadual menunjukkan cirri mod operasi dalam Syarikat A dan Syarikat B
(SPM 2014)
Company A / Syarikat A
Company B / Syarikat B
· Using bollboard to advertise new product
Menggunakan papan iklan untuk mengiklan produk baharu
· Receive customer order by telephone
Menerima tempahan pelanggan melalui telefon
· All transactions recorded in forms
Semua urusniaga direkod dalam borang
· Promote new product at company/s website
Mempromosikan produk baharu di sesawang syarikat
· Receive customer order by email
Menerima tempahan pelanggan melalui email
· All transactions recorded in electronic forms
· Semua urusniaga direkod dalam borang elektronik
Table 1 / Jadual 1
Based on Table 1, state the operation mode use in :
Berdasarkan jadual 1, nyatakan mod operasi yang digunakan dalam :
i. Company A / Syarikat A
……………………………….
ii. Company B / Syarikat B
……………………………….
1.1.2.3 State the impact of ICT on society.
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.
SECTION A
1. Table 1 shows the characteristics of X and Y in computer usage guideline.
Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan
komputer.
(SPM 2011)
X
Y
Moral guidelines for computer users.
Garis panduan moral untuk pengguna komputer.
Rules for computer users.
Peraturan-peraturan untuk pengguna komputer.
No penalty or punishment.
Tiada penalti atau hukuman.
Penalties or punishments imposed.
Penalti atau htLkuman dikenakan.
Table 1 / Jadual 1l
Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:
(i) X……………………………………………
(ii) Y……………………………………………
2.Table 2 shows terms which are related to computer ethics and legal issues
Jadual 2 di bawah menunjukkan terma berkaitan etika komputer dan undang-undang
(SPM 2014)
A
Privacy
Keadaan berahsia
B
Intellectual property
Hak Intelektual
C
Cyber Law
Peraturan Siber
D
Computer ethics
Etika komputer
Table 2 / Jadual 2
Based on Table 2, write A,B,C or D to match the following statements
Berdasarkan jadual 2, tulis A,B, C atau D untuk dipadankan dengan pernyataan berikut
(i) Standards moral conduct in the use of computers
Standard perlakuan bermoral dalam penggunaan komputer
……………….
(ii) The right of and individual to restrict the collection and use of personal data
Hak individu untuk mengehadkan pengutipan dan penggunaan data peribadi
……………….
1.2.1.2 Differentiate between ethics and law.
1.2.1.3 State the need for intellectual property laws.
1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
SECTION B
1.
The following is a statement on information privacy.
Pernyataan berikut berkaitan keperibadian maklumat
(SPM 2007)
Based on the statement, list four ways of making personal data more private.
Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi
lebih peribadi
i) ………………………………………………………………………………………….
ii) ………………………………………………………………………………………….
iii) ………………………………………………………………………………………….
iv) ………………………….……………………………………………………………….
1.2.2.2 State authentication and verification methods/technologies.
SECTION A
1. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti biometrik.
(SPM 2009 )
Based on Figure l, / Berdasarkan Rajah 1,
(i) State the name of the device. / Nyatakan nama peranti itu. ………………………………………………………
(ii) State the function of the device / Nyatakan fungsi peranti itu. …………………………………………………………………………………………
…………………………………………………………………………………………
2. Figure 1 shows information on two types of authentuication methods.
Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan
(SPM 2012)
Based on figure 1 , state the name of / berdasarkan rajah 1, namakan
i. P………………………………..
ii. Q ….……………………………
1.2.3 Controversial Contents and Control
1.2.3.1 List effects of controversial contents on society:• Pornography • Slander
1.2.3.2 Describe the process of filtering to control access to controversial contents
SECTION A
1. Figure 2 shows part of an algorithm for a web page filter.
Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.
(SPM 2009)
Figure 2 / Rajah 2
State the filtering method used in the algorithm.
Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
………………………………………………..
2. Figure 2 shows the display of an internet filtering software
Rajah 2 menunjukkan paparan pada satu perisian penapisan internet
(SPM 2012)
Figure 2 / Rajah 2
Based on Figure 2 , state the method used
Berdasarkan rajah 2 nyatakan kaedah yang digunakan
…………………………………………………………….
3. Figure 1 shows the keyword blocking process
Rajah 1 menunjukkan proses penapisan kata kunci
(SPM 2013)
Figure 1 / Rajah 1
Based on figure 1 write A,B or C to match the following statement
Berdasarkan rajah 1, tuliskan A,B atau C untuk dipadankan dengan pernyataan berikut
i. Page download stops
Muat turun laman berhenti
………..
ii. Search for banned words
Mencari perkataan-perkataan yang diharamkan
………..
1.2.4 Computer Crimes
1.2.4.1 Explain the need for Cyber Law.
SECTION A
1. Cyber law is a system of moral standards or values used as a guideline for computer users. (T/F)
Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang digunakan sebagai pedoman bagi pengguna komputer
TRUE / FALSE
(SPM 2007)
1.2.4.2 Explain briefly the computer crimes below: • Fraud • Copyright Infringement • Theft • Attacks
1.3 Computer Security
1.3.1 Definition
1.3.1.1 Define computer security.
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:
• Malicious code • Hacking • Natural disaster • Theft
SECTION B
1. Figure 12 shows a pop-up message to computer users.
Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer
(SPM 2011)
Figure 12 / Rajah 12
Based on Figure 12: / Berdasarkan Rajah 12:
(a) State two ways that causes the pop-up message to appear on the
computer screen.
Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di
skrin komputer.
………………………………………………………………………………………
………………………………………………………………………………………
[2 markah]
(b) State two kinds of serious damages if a user ignore the message.
Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.
………………………………………………………………………………………
………………………………………………………………………………………
[2 markah]
2. Read the following warning
Baca amaran berikut
(SPM 2013)
Based on the warning statement
Berdasarkan pernyataan amaran itu
a. Explain why the warning important
Terangkan mengapa amaran itu penting
2 markah
b. i. What precaution should you take if you cannot follow the given warning?
Apakah langkah berjaga-jaga yang seharusnya diambil jika anda tidak dapat mematuhi amaran yang diberi?
1 markah
ii. Justify your answer
Beri justifikasi jawapan anda
1 markah
SECTION C
1. Figure 20 shows symptoms of a computer problem
Rajah 20 menunjukkan simptom pada sebuah komputer.
(SPM 2010)
· Screen displays unusual messages
Skrin memaparkan mesej pelik
· Files become corrupted
Fail menjadi rosak
· Fies mysteriously appear
Muncul fail yang menjadi tanda Tanya
Figure 20 / Rajah 20
Based on Figure 20: / Berdasarkan Rajah 20:
(a) Identify the type of computer threat which matches the symptoms.
Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.
i. ………………………………….
State two different examples of the threat. / Nyatakan dua contoh berlainan bagi ancaman itu.
ii. …………………………………
i. …………………………………
(b) Describe two reasons why the computer may have been affected by the threat in (a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
.................................................................................................
.................................................................................................
.................................................................................................
1.3.3 Security Measures
1.3.3.1 Select the appropriate security measures to overcome the identified computer threats
1.3.3.2 Apply the correct security procedures:
• Antivirus • Anti-Spyware • Cryptography • Firewall • Data backup • Human aspects
SECTION A
1.
Figure 3 shows how cryptography works
Rajah 3 menunjukkan bagaimana kriptografi bekerja.
(SPM 2007)
Name H : / Namakan H : …………………………………………………………………
2. Table 2 shorws the steps of using anti-virus software which is not in the
correct sequence.
Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak mengikut urutan yang betul.
(SPM 2011)
Complete the step. Step 1 and 3 are given.
Lengkapkan langkah itu. Langkah I dan 3 diberi.
Choose anti virus software/Pilih perisian anti virus
(i) 1
Take necessary action /Ambil tindakan yang perlu
(ii) ..……
Scan the selected area /Imbas kawasan yang dipilih
(iii) 3
Select area to be scanned /Pilih kawasan yang akan diimbas
(iv) ……..
Table 2 /Jadual 2
(ii)…………(iv)…………
3. Ali has send a confidential file to Sandra using email. Rearrange the activities carried out
by Ali in the correct sequence.
Ali perlu menghantar satu fail sulit kepada Sandra menggunakan email. Susun semulaaktiviti yang dijalankan oleh Ali mengikut urutan yang betul.
(SPM 2013)
P Decrypt file / Menyahsulit file
Q Open file received to view contents
Buka fail yang diterima untuk melihat kandungan
R Select file to send
Pilih fail yang akan dihantar
SEncrypt file
Enkripsi fail
TAttach file to email
Kepilkan fail pada email
SECTION B
1. Figure 15 shows the scan summary when an antivirus program is used.
Rajah 15 menunjukkan laporan ringkas imbas bila program antivirus digunakan
(SPM 2014)
.
Figure 15 / Rajah 15
Based on figure 15; /Berdasarkan rajah 15;
a) List two steps to carry out the task
Senaraikan dua langkah untuk melaksanakan tugas itu
[2 marks/2markah]
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
b) State two actions that can be taken to remove the untreated threats.
Nyatakan dua tindakan yang boleh diambil untuk mengalihkan ancaman yang tidak dapat dirawat.
[2 marks/2markah]
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
…………………………………………………………………………………………………
SEMAKAN
Tarikh
Topik / Sub topik
Tanda tangan
Guru
Catatan
1.2 Introduction to Information Technology
1.1.2 Overview of Information and Communication Technology (ICT)
1.1.2.1 Define ICT.
1.1.1.3 Describe the brief evolution of computers.
1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce
1.1.2.1 List the usage of ICT in everyday life.
1.1.2.2 State the differences between computerised and non-computerised systems.
1.1.2.3 State the impact of ICT on society.
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.
1.2.1.2 Differentiate between ethics and law.
1.2.1.3 State the need for intellectual property laws.
1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
1.2.2.2 State authentication and verification methods/technologies.
1.2.3 Controversial Contents and Control
1.2.3.1 List effects of controversial contents on society: • Pornography • Slander
1.2.3.2 Describe the process of filtering to control access to controversial contents.
1.2.4 Computer Crimes
1.2.4.1 Explain the need for Cyber Law.
1.2.4.2 Explain briefly the computer crimes below:• Fraud • Copyright Infringement • Theft • Attacks
1.3 Computer Security
1.3.1 Definition
1.3.1.1 Define computer security.
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:• Malicious code • Hacking • Natural disaster • Theft
1.3 Computer Security
1.3.3 Security Measures
1.3.3.1 Select the appropriate security measures to overcome the identified computer threats
1.3.3.2 Apply the correct security procedures: • Antivirus • Anti-Spyware • Cryptography • Firewall • Data backup • Human aspects
Report
End
Detections: 5
Suspicious files: 0
Warnings: 52
Objects scanned: 0
Hidden objects: 0
“Information privacy refers to the right of individuals and organisations to deny or restrict the collection and use the information about them”
Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk menafi atau mengelakkan hasil dan maklumat mereka digunakan.
Authentication methods
Kaedah pengesahan
P
Q
Taxi services booking / tempahan perkhidmatan teksi
Purchase using credit card / pembelian menggunakan kad kredit
- Retinal scanning /
pengimbasan retina
- voice recognition /
Pengecaman suara
FILTERING SETTINGS
Restricted List
� HYPERLINK "http://www.seperti.com" �http://www.seperti.com�
http://www.jalan.com
ADD
REMOVE
EXIT
Plaintext
H
Plaintext
Encrypt
Decrypt
Last detection:ADWARE/Adware.Gen2 Virus.informatiom
Scanned files: 1583192
Scanned directories: 26448
Scanned archieves: 27945
Used time: 3:39:57
Scanned : 100%
100%
Status: The scan has finished
Last Object:
J:\merged_partition_content\50GB AV scan test bundle\...mcw10.exe
START
User access a web page
B
Contained banned words?
STOP
A
C
YES
NO
Never open an email attachment unless you are expecting the attachment and it is from the trusted source
Jangan buka email yang dikepilkan kecuali anda menjangkakan kepilan tersebut dan ia datang dari sumber yang dipercayai
sppangsess@gmail.com ( http://rmmict.blogspot.com )