+ All Categories
Home > Documents > Scheme of Soalan Aras Tinggi

Scheme of Soalan Aras Tinggi

Date post: 24-Aug-2014
Category:
Upload: nurul-aini-nordin
View: 133 times
Download: 1 times
Share this document with a friend
Popular Tags:
27
ICT Soalan aras tinggi….. TYPE OF DESCRIPTION QUESTIONS LA 1 :INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY 1. Decsribe the brief evolution of computers i) First generation MARK 1 use mechanical switches. ENIAC (Electronic Numerical Integrator and Computer) use vacuum tube. A vacuum tube which is an electronic tube about the size of light bulbs. The disadvantages is the vacuum tubes generated a great deal of heat causing many problems in temperature regulation and climate control and the tubes also burnt out frequently. Storage used are punched card and magnetic tape. UNIVAC ( Universal Automatic Computer ) could calculate at rate 10,000 addition p/s ii) Second generation Use transistor - It was small devices use to transfer electronic signals across a resister. Advantages : transistors were smaller than vacuum tubes they needed no warm up time consumed less energy generated much less heat faster and more reliable iii) Third generation IBM 370 series were introduced in 1964..It was used for business and scientific programs. Silicone chip was developed in 1961 Microchip replace magnetic Core memory First 256 bit RAM was introduced and as basis for 1 K bit RAM Advantanges : Silicone chips were reliable, compact and cheaper. Sold hardware and software separately which created the software industry.
Transcript
Page 1: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

TYPE OF DESCRIPTION QUESTIONS

LA 1 :INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY

1. Decsribe the brief evolution of computersi) First generation –

MARK 1 use mechanical switches. ENIAC (Electronic Numerical Integrator and Computer) use vacuum

tube. A vacuum tube which is an electronic tube about the size of light bulbs. The disadvantages is the vacuum tubes generated a great deal of heat causing many problems in temperature regulation and climate control and the tubes also burnt out frequently.

Storage used are punched card and magnetic tape. UNIVAC ( Universal Automatic Computer ) could calculate at rate

10,000 addition p/sii) Second generation –

Use transistor - It was small devices use to transfer electronic signals across a resister.

Advantages : transistors were smaller than vacuum tubes they needed no warm up time consumed less energy generated much less heat faster and more reliable

iii) Third generation – IBM 370 series were introduced in 1964..It was used for business and

scientific programs. Silicone chip was developed in 1961 Microchip replace magnetic Core memory First 256 bit RAM was introduced and as basis for 1 K bit RAM Advantanges :

Silicone chips were reliable, compact and cheaper. Sold hardware and software separately which created the

software industry.

iv) Fourth Generation- Comp models introduced : Apple Macintosh, IBM, DELL, ACER

1971- Intel created 1st microprocessor1976 – 1st Apple comp introduced.1981 – 1st IBM PC introduced.

Hardw tech invented– silicone chips, microprocessor ( for comp memory and logic , circuit that contained thousands of transistors) and storage devices.

Advantages :

Page 2: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

- Comp became 100 times smaller than ENIAC - More speed, reliability and storage capability - Personal n software industry boomed

v) Fifth Generation – Inventions of new hardw tech:

silicone chips, processor, robotics, virtual reality, Intelligent system, program translate language

expert system- teleconferencing- speech recognition system

2. Describe the process of filtering to control access to controversial contents.

KEYWORD BLOCKING - uses a list of banned words or objectionable terms. As the page is downloading, the filter searches for any of these words. If found, it will block the page completely, stop downloading the page, block the banned words and even shut down the browser.

WEB RATING SYSTEMS-Web sites are rated in terms of nudity, sex, violence and language. - ratings done either by the web page author or by the independent bureau.- browsers set to only accept pages with certain levels of ratings.

SITE BLOCKING software company maintains a list of ‘dubious Internet sites’ the software prevents access to any sites on this list ‘denial lists’ regularly updated some software provides control over what categories of information you block

3. Explain the need for Cyber Law

RESPECTING OWNERSHIPWe must respect ownership by not stealing other people’s work either by duplicating or distributing it. Duplicating and distributing copies of audio tapes, video tapes and computer programs without permission and authorisation from the individual or company that created the program are immoral and illegal.

RESPECTING PROPERTYProperty here means ownership. Since an individual data and information are considered as property, therefore, an act of tampering and changing electronic information is considered as vandalism and disrespect for other people’s property

Page 3: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

RESPECTING PRIVACY AND CONFIDENTIALITYWe should respect other people's privacy and confidentiality by refraining ourselves from reading their mails or files without their permission. If we do so, it is considered as violating an individual’s rights to privacy and confidentiality

4. Explain briefly the computer crimes below:

* Computer Fraud

Computer fraud is defined as having an intention to take advantage over or causing loss to other people, mainly on monetary basis through the use of computers.

There are many forms of computer fraud which include e-mail hoaxes, programme fraud, investment schemes, sales promotions and claims of expertise on certain fields.

* Copyright Infringement

Copyright infringement is defined as a violation of the rights secured by a copyright. Copyright infringement involves illegal copy or reproduction of copyrights material by the black market group. The open commercial sale of pirated item is also illegal.

* Computer Theft

Computer theft is defined as the unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use.

Examples of computer theft include:

transfer of payments to the wrong accounts tap into data transmission lines on database at no cost divert goods to the wrong destination

* Computer AttacksComputer attack may be defined as any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data.

Computer attack can be in the forms of:

physical attack that disrupt the computer facility or its transmission lines. an electronic attack that uses the power of electromagnetic energy to

overload computer circuitry. a computer network attack that uses a malicious code to exploit a

weakness in software, or in the computer security practices of a computer user

5. Explain briefly the different threats to computer security:

Page 4: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

* i. Malicious code

Malicious code is also known as a rogue program. It is a threat to computing assets by causing undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage.

a) VIRUS A program that can pass on the malicious code to other programs through any medium by modifying them. Virus attaches itself to the program, usually files with .doc, .xls and .exe extensions. Virus destroys or co-exists with the program.It will slow down the computer.

b) TROJAN HORSE A program which can perform useful and unexpected action. Example of a Trojan horse is the login script that requests for users’ login ID and password eg spyware.

c) LOGIC BOMB Logic bomb is a malicious code that goes off when a specific condition occurs.An example is the time bomb. It goes off and causes threats at a specified time or date.

e) TRAPDOOR OR BACKDOOR – eg spyware A feature in a program that allows someone to access the program with special privileges

f) WORM A program that copies and spreads itself through a network and spreads copies of itself as a standalone program

* ii. HackingHacking is defined as unauthorised access to the computer system by a hacker. Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers

* iii. Natural disasterComputers are also threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles.Examples of natural and environmental disasters Flood, Fire,Earthquakes and storms

* iv. Computer TheftComputer is used to steal money, goods, information and resources and stealing of computer, especially notebook and PDAs.

Theft can be prevent by :1) prevent access by using locks, smart-card or password

Page 5: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

2) prevent portability by restricting the hardware from being moved3) detect and guard all exits and record any hardware transported

6. Describe the impact of ICT on society

LOWER COMMUNICATION COST-With internet is cost effective than telephone for example is mailing service. It allows access to large amounts of data at a very low cost.

EFFECTIVE SHARING OF INFORMATION-Information can be shared by people all around the world. People can share and exchange opinions, news through discussion groups and forums.

PAPERLESS ENVIRONMENT- Information can be stored and retrieved through the comp instead of paper. Online communication via emails, online chat and msg also creating paperless environment.

RELIABLE MODE OF COMMUNICATION-With internet, information could accessed and retrieved from anywhere and at anytime. But GIGO.

HEALTH PROBLEMS – Exposed to bad posture, eyestrain, physical and mental stress but an ergonomic environmt can be introduced eg ergonomic chair reduce back strain and screen filter is used to minimize eye strain.

SOCIAL PROBLEMS-People tend to become more individualistic, introvert and negative effect such as fraud, identity theft, pornography and hacking

BORDERLESS COMMUNICATIOON-Internet offers fast information retrieval, interactivity, accessibility and versatility so it becomes a borderless sources for services and information.

FASTER COMMUNICATION SPEED-With internet, news or message are sent via e-mail to friends, business partners efficiently which fast and saves times

Page 6: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

LA 2 : COMPUTER SYSTEM

7. Describe the information processing cycle which includes input, process, output and storage.i) An Input device feed raw data to the processor. Data input comes in various forms;

texts, graphics, audio and video The examples of input devices are keyboard, mouse, scanner, barcode reader and digital camera.

ii) A processor or CPU accepts instruction from the user and translates the instruction into readable information. The processor must be connected to input devices, output devices and storage devices to carry out the tasks. Examples of processor is Intel Pentium, AMD Celeron and Intel Centrino Duo.

iii) Storage store data, instruction and information are held for future use. Examples of storage is primary storage ( RAM, ROM ) and secondary storage

( pen drives, disket ).

iv) An output device shows or display the processed data called information. The examples of output devices are monitor and printer. There are four types of output, which are texts, graphics, audio and video.

8. Explain the function of ASCII code.i) ASCII was established to achieve compatibility( keserasian ) between various types of data processing equipment such as printer, scanner, so that the components ( between computer and equipment) can communicate with each other successfully.

ii) ASCII enables manufacturers to produce components that are assured operate correctly in a computer in term of ‘on’ and ‘off’.

iii)ASCII makes it possible for humans to interact with a computer because computer only understand binary digit 1 and 0.

9. i) Explain types and functions of:* primary storage ( RAM, ROM )

RAM ( Random Access Memory )1. RAM is volatile which means the programs and data in Z are lost when the computer is powered off.2. RAM is Random Access Memory which hold instructions and data temporary needed to complete tasks and can be change. 3. RAM stores data and program during and after processing until the user decide to save in secondary storage.4. The data in RAM can be read (retrieved) or written (stored).

Page 7: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

ROM ( Read Only Memory )1. ROM is non-volatile. It holds the programs and data even the computer is powered off 2. ROM is a memory permanently stored inside the computer and cannot be changed, once it is done. 3. Store data and program by manufacturer. The configure is done in factory.4. The data in ROM can be read only.

ii) Explain types and functions of: Secondary storage ( magnetic medium, optical medium, flash memory)

Magnetic mediumIs a non-volatile storage. The devices use disks that are coated with magnetically sensitive material. The examples of magnetic storage are:

magnetic disk such as a floppy disk and hard diskmagnetic tape such as video cassette.

Optical mediumIs a non-volatile storage media that holds content in digital form that are written and read by a laser.Examples :

CD, CD-ROM, and DVD: Read only storage, used for digital information such as music, video and computer programs.CD-R: Write once storage, the data cannot be erased or written over once it is saved.CD-RW, DVD-RW, and DVD-RAM: Slow to write but fast reading storage; it allows data that have been saved to be erased and rewritten.

Flash memoryFlash Memory is a solid-state, non-volatile, rewritable memory that functions like RAM and a hard disk drive combined.. Flash memory cards and flash memory sticks are examples of flash memory.Flash memory cards are also used with digital cellular phones, MP3 players and digital video cameras.

Flash memory is also called USB drives or thumb drives.

The advantages of flash memory are, it offers fast reading, light and small but it is more expensive than the magnetic disk of the same capacity.

Page 8: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

10. Describe the uses of application software ( word processing, spreadsheet, presentation, graphic )

Word processing:- Allows users to create and manipulate documents containing mostly text and sometimes graphics.- It provides the ability to create, check spelling, edit and format a document on the screen before printing it to paper.-can be used to produce documents such as letters, memos, reports, fax cover sheets, mailing labels, newsletters, and web pages.- Eg Microsoft Word, StarOffice Writer, TexMaker and Corel WordPerfect

Spreadsheet:- containing formulas which can perform calculations on the data in the worksheet- making charts such as column charts or pie charts - what-if analysis, the ability of recalculating the rest of the worksheet when data in a worksheet changes

Presentation:- providing a variety of layouts for each individual slide such as a title slide, a two-column slide and a slide with clip art, a picture, a chart, a table or animation- enhancing text, charts and graphical images on a slide with 3-D and other special effects such as shading, shadows and textures- applying special effects to the transition between each slide- inserting images, video and audio clips

Graphic:- drawing pictures, shapes and other graphical images with various on-screen tools such as a pen, brush, eyedropper and paint bucket- modifying the contrast and brightness of an image- cropping unwanted objects

Page 9: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

LA 3 : COMPUTER NETWORK AND COMMUNICATIONS

11. Describe the types of network communications technology* Internet : The Internet is the world’s largest computer network which connects millions of computers all over the world. Some of the usages of the Internet are:

bankingshoppingentertainment

*Intranet : An Intranet is an internal network that uses Internet technologies that exists within an organization. Employees can access make company information using intranet such as :

Telephone directoriesEvent calendarsJob postingStaff information

Every employee will be given the intranet address, user name and password to access the intranet.

* Extranet : An extranet is a private network that uses Internet technology and public communications system to securely share part of a business’s information or operations with authorised parties such as suppliers, vendors, partners and customers.. Only registered or authorised users can navigate or access the extranet.

LA 4 : MULTIMEDIA

12. Describe and give examples of web editor* text-based : A text-based Web editor is a basic editor which is use Hypertext Markup Language (HTML) tags to create a Web page. A text-based editor is less user friendly and no junk HTML .A text-based editor requires HTML knowledge so that it is hard to insert a specific tag using a text-based editor and cannot visualize the design. The example Software for text-based are Notepad and PSPad.

* WYSIWYG : WYSIWYG or What You See Is What You Get provide an editing interface that shows how the pages will be displayed in a web browser. Using a WYSIWYG editor does not require any HTML knowledge.. A WYSIWYG editor is user friendly so that it is easier for an average computer user. It is easy to insert specific tag and can visualize the design easily. Examples of WYSIWYG web editor are Microsoft FrontPage and Macromedia Dreamweaver

Page 10: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

13. Describe the phases in multimedia production:Phase Activity

Analysis Phase - The multimedia developers interview the clients to find out their needs.- The multimedia developers will identify the project title, problem, objectives, possible solution and target users.- The multimedia developers write the a Proposal for a multimedia project- The multimedia developers will use analysis tools:

Questionnaire to find the needs of target users. Content Analysis Form to choose the contents for

the multimedia program Goal Analysis Form to guide multimedia

developers to set up the focus of the project.

Design Phase - The multimedia developer will design : Flow Chart which is a lay out the flow of a multimedia

program. Storyboard which is a rough sketches of everything that

are included in a multimedia program. based on the Flow Chart.- consider the content of the program, navigational system to be used and the layout of the program.

- In this phase, CASPER design principles are used.

Implementation Phase -The process of converting the design plan such as a Storyboard into a multimedia program - The multimedia developers will use the authoring tool such as Toolbook Assistant to integrate the multimedia elements.- The multimedia developers will :

creating texts inserting graphics inserting animation inserting audio inserting video inserting hyperlink

Testing Phase - The purpose of testing is to ensure that the program runs correctly without errors - The multimedia developers will use a Checklist to test the multimedia program. If there are any errors, the programmer will fix the program..

Page 11: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

- In this Checklist the aspects focused are : Content ( refers to the goals of the program, text, graphics,

audio, video, animation, language used and how informative the program is)

Interface (CASPER principles are used ) Navigation (navigation aids and consistency )

Evaluation Phase - The Evaluation Phase focuses on overall presentation and effectiveness of the multimedia - Selected users will use an Evaluation Form to try out the program and give feedback and will focus in 2 aspects content and user interface.

Publishing Phase - When the multimedia program is completed, it will be published in two option mediums:

Web pages - multimedia program to be a Web-based multimedia.Compact discs ( CD ) - multimedia program to be a CD-based multimedia.

LA 5 : PROGRAMMING

14. Decsribe the translation method of programming using assembler, interpreter and compiler.

* Assembler : An assembler is a computer program for translating assembly language which is a mnemonic representation into machine language. For example, assembly language for the ’no operation’ command is NOP and its machine code representation is 10010000. Example of assemblers are MACRO-80 Assembler and Microsoft MASM.

* Interpreter :Interpreter is used to interpret and execute program directly from its source without compiling it first. The source code of an interpreted language is interpreted and executed in real time when the user execute it.The interpreter will read each codes converts it to machine code and executes it line by line until the end of the program. Examples of interpreter-based language are BASIC, Logo and Smalltalk.

Page 12: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

* Complier:The source code (in text format) will be converted into machine code which is a file consisting of binary machine code that can be executed on a computer. If the compiler encounters any errors, it records them in the program-listing file.When a user wants to run the program, the object program (exe file) is loaded into the memory and the program instructions begin executing. A compiled code generally runs faster than programs based on interpreted language. Several programming languages like C++, Pascal and COBOL used compilers as their translators

Page 13: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

15. Describe the five main phases in program development.Phases Activity

I. Problem Analysis Phase

-Programmer will interview client what they need-Programmer get the information of input, process and output-Programmer will refer to the website in internet or book or expert person-Programmer will choose the suitable programming language to solve the problem

II. Program Design Phase

- In program design, there are three popular tools used:i) Top-down design model - This top-down model consists

of three modules, namely input module, process module and output module

ii) Pseudocode - the programmer writes the pseudo code for the program based on the top-down design model

iii) Flow chart- the programmer draws the flow chart that shows the data flow of the program.

- Choossing and design the user interface

III. Coding Phase - Programmer translate the pseudocode to programming language- Key in the programming language into the computer

IV. Testing and debugging

- Programmer test the program to search for any error- Programmer will debug if there is any error.

V. Documentation - Programmer write the purpose of the program- Programmer write the guideline on how to use the program to the client - Programmer write the type of input and expected output

Page 14: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

LA 6 : INFORMATION SYSTEM

16. Decsribe the interrelation between information system components using a diagram

a) Relationship between people and hardware.People use hardware to input data and hardware is used to display the data or information to user/people.

b) Relationship between people and software.People use software to receive data and software is used to process or manipulate data to be in a readable form.

c) Relationship between people and data.People determine and choose type of data that will be used as input. People input the data into the system.

d) Relationship between software and procedure.Prosedure determine step by step the instruction on how to using the software correctly.

e) Relationship between hardware and procedure.Procedure determine step by step the instruction on how to using the hardware correctly.

f) Relationship between data and procedure.Procedure determine type of data to be as input and the steps that must be follow to manipulate the data.

*****The relationship between the components.

People use procedure that acts as a user manual and must follow the instructions correctly given by software and hardware is used to input the data as raw material while software will process data into a readable and meaningful information.

Hardware

Software

Data Procedure

People

Page 15: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

*****Types of information system

a) Manangement Information System (MIS) provide information support to users at all levels of a company. These systems can analyze data, generate information for manage and control business process. For example, when a company sells products to a customer, a transaction processing system records the sale, updates the customer’s balance and makes deduction from inventory.

b) Transaction Processing System (TPS) also known as operational system because they collected data from daya-to day business includes recording, filling and retrieving records or filling out order forms and checks. The data is stored in database.Its supports low-level employees in performing routine business. For example, customer billing, making a banking deposit and reserving an airline seat or rooms for customer.

c) Decision Support System (DSS) is used to analyzed complex and nonroutine decisions especially helps managers focus on the future. The manager may gathers and use data from wide range of sources to select the most right strategic.The system is not stand alone information resources but a combination of database or program and might use MIS first. For examples, detailed analysis of product demand are perform, suppliers and commodities, exchange rates and employment cost an manufacturing capacity and costs to help manager makes a decision on which project viability and profitability for a company.

d) Executive Information System(EIS) used by top executives to quickly identify problems, spot products trends and set strategic long and short term objective.For examples, the report such as sales figures in many categories by region, by state, by week, by month, by year. It also has the capabilities for doing “what if” features. The system also have the capability to summarized information.

e) Experts System (ES) – also known as Knowledge Management System. ES have appeared from the artificial intelligence field where stimulate human reasoning and sensation. It has been used by management and non-management to solve spscific problems such as increase workers’s productivity and maximize profit or minimize production cost. For examples in medical field, an expert system can help doctor to diagnosing a patient’s condition based on the symptoms and further question clarification. The system should be able to suggested further test or provide a list of possible causes.

Page 16: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

*******State the usage of Information Systems

Education : 1) Keep track of students statistics and a grades.2) Help students and teachers in online learning and discussion.3) Store subject content.

Business : 1) Carry out online buying and selling2) Help the delivery of goods and services.3) Make room bookings and checking the best rates

Management :1) See employee record2) Analyze products services and product prices3) Process customer orders, organize production times and keep track of product inventory.

17. Describe the phases of systems development

I. Anaylsis Phase– the system developer need to define problem faced by target users by interview

the them. The targets user will indicate their requirement and give a description of what a

system must do. The system developer will define the purpose of the system and identify the

input, process and output for the system.

II. Design Phase- is the planning of the system design. Choose the necessary data you need to store in the database eg. author name,

category and publisher You need to determine what fields to include and the suitable data type format for

those fieldsEg, Author Table contains Author ID, Author Name Book Table contains BookID, BookTitle, Book Price

System developer provide input interface and output interface. Entity Relationship Diagram (ERD) – is one of the diagram that show how Table

are organized and related to one another.

Steps of creating ERD – Classify project requirement into table Creating relationship Creating primary key Creating foreign key

Page 17: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

III. Implementation Phase- The system developers will convert the technical plan and design plan into a

computer program using database software such as Microsoft Access. Involves:

CREATING TABLES

ASSIGNING TABLE RELATIONSHIP

CREATING QUERIES

CREATING FORMS

CREATING REPORTS

TYPES OF RELATIONSHIP

One-To-OneFor example, each member has only one address record. One-to-one relationships happen when there is only one record in Library Member to another one record in Member Contact.

One-To-ManyFor example, each book has only one category. Each Category has many books. One-to-many relationships happen when each record in Book Category has many related records in Book

Page 18: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

IV. Testing Phase Testing Phase involves the system developer and user. The purpose of system testing is to ensure the system runs correctly and is error

free.Data Entry In Testing PhaseBefore testing the database, data must be entered into the Tables. Enter data for four Tables : Author, Book, Category and Publisher.

Testing On Database ObjectYou can do the testing to verify that each database object is functioning.You need to conduct testing to detect any error present.

Testing On Functionality Of The SystemYou can also conduct a test to verify that all systems work together properly.

Data ValidationValidation is the process of comparing the data to a set of rules or values to determine if the data is accurate.For example, the quantity a user keyed in should be less or equal to 1000. The message will pop up if the quantity is over 1000.

V. Documentation Phase:

Documentation refers to the written materials generated throughout phases of system development.Documentation is very important when the system requires changes in the future. Documentation tells new system developers what was done in the program.

It helps to reduce the amount of time a new system developer spends learning about existing programs.

Eg i) User Manual - The User Manual helps the user to use the system.The User Manual should cover how to run the system, how to enter data, how to modify data and how to save and print reports.The User Manual should include ways to overcome errors.

ii) Help File is a documentation file that brings together help information of all the database objects in a project. This file is a guideline for the user when the user needs any help in operating the program.

Page 19: Scheme of Soalan Aras Tinggi

ICT Soalan aras tinggi…..

VI. Maintenance Phase

Maintenance refers to the changes in the system by fixing or enhancing its functionality. System maintenance involves checking, changing and enhancing to improve its performance.

Corrective MaintenanceCorrective Maintenance is changing maintenance carried out to repair an error in system design.This maintenance is used when errors are detected and need to be rectified.For example, in the School Resource System, you need to add the International Standard Book Number (ISBN) field.

Perfective MaintenancePerfective Maintenance is a system maintenance performed to improve a computer program. Perfective Maintenance is done when the users require changes in the interfaces.For example, in the School Resource System, you can modify the layout of the Book Form by changing the font colour, type, size and adding "Book Form" title.

Preventive MaintenancePreventive Maintenance is a maintenance aimed at the prevention of future breakdowns and failures. For example, in the School Resource System, you want to assign a password.The use of passwords thus helps to prevent unauthorised access to confidential information.


Recommended