Anda di halaman 1dari 7

1

SMK KEPONG INFORMATION COMMUNICATION AND TECHNOLOGY (ICT) TEST 1 : MARCH (40 marks) DURATION : 1 hour and 15 minutes FORM 4 Answer all questions. / Jawab semua soalan di atas kertas jawapan yang disediakan 1. What is the Information and Communication Technology (ICT)? A Any communication and application facilities based on computer. B Technical means people use to improve their surroundings. It is also knowledge of using tools and machines to do tasks efficiently. C Intercourse by words, letters or messages; interchange of thoughts or opinions, by conference or other means; conference; correspondence. D Includes any communication or application facilities such as radio, cellular phones, computer, software and so on as well as the various services and applications associated with them. Apakah Teknologi Maklumat dan Komunikasi (TIK)? A. Apa sahaja bentuk komunikasi dan kemudahan aplikasi berasaskan pada komputer. B. Suatu bentuk teknikal yang digunakan untuk memperbaiki persekitaran mereka. Hal ini juga tentang pengetahuan menggunakan perkakas dan mesin untuk melakukan tugas-tugas secara cekap. C Kursus berkaitan dengan kata-kata, surat atau mesej, pertukaran fikiran atau pendapat,dengan persidangan atau dalam bahasa lain persidangan; korespondensi. D Termasuk semua kemudahan komunikasi atau aplikasi seperti radio, telefon bimbit, komputer, perisian dan sebagainya serta pelbagai perkhidmatan dan aplikasi berkaitan dengan manusia. 2. Read statement 1. Name the technology used for this generation of computers. Baca kenyataan 1. Nama teknologi yang digunakan untuk generasi komputer. The computers for this generation use magnetic drums as storage media and are large in size, taking up entire room. They use a great deal of electricity, generating a lot of heat, which is often the cause of malfunctions. Komputer-komputer generasi ini menggunakan drum magnetik sebagai media penyimpanan dan besar dari segi saiz hampir sebesar sebuah bilik. Mereka menggunakan banyak kuasa, panas dan yang seringkali menjadi penyebab kerosakan. Statement 1 / Kenyataan 1 3. Figure 1 shows several components of computer technology generations. Gambar 1 menunjukkan beberapa komponen generasi teknologi komputer.

C A B Figure 1 Match A, B, or C with the following generation of computer technology. Padan A, B atau C berdassarkan generasi kepada teknologi komputer i. 2nd Generation Computer ii. 4th Generation Computer
2011 TEST 1 MARCH: FORM 4

4.

Table 1 shows three different fields and Figure 2 shows the use of ICT in two different fields. Jadual menunjukan tiga lapangan berbeza dan rajah 2 menunjukkan penggunaan ICT dalam 2 lapangan berlainan Industry (industri) Banking (perbankan) Education (pelajaran) Table 1

(A) Figure 2

(B)

Based on Figure 2, match the use of ICT with the fields given in Table 1. Berdasarkan rajah 2, padankan penggunaan ICT dengan lapangan yang diberi di jadual 1 i. A - ______ ii. B - ______ 5. Study the statement 2 below carefully. / Kaji pernyataan 2 di bawah dengan teliti Production was slow because everything was done manually and totally depended on human labour. Produksi perlahan kerana segalanya dilakukan secara manual dan bergantung secara keseluruhannya kepada buruh Statement 2 Statement 2 above regarding to _________________ system. Pernyataan 2 di atas merujuk kepada sistem _______________ 6. Figure 3 shows the impact of ICT on society. / rajah 3 menunjukkan kesan ICT ke atas masyarakat

Figure 3 Based on figure 3, / Berdasarkan rajah 3, berikan, i. State two advantages of ICT on society. / 2 kelebihan ICT ke atas masyarakat ii. State two disadvantages of ICT on society. / 2 Kelemahan ICT ke atas masyarakat
2011 TEST 1 MARCH: FORM 4

7.

Creative writing such as lyrics and song compositions can be protected under the __________ law. Penulisan kreatif seperti lirik dan penyusunan lagu boleh dilindungi di bawah undang-undang ____ A Patent / Paten B Design / Rekabentuk C Copyright / hak cipta D Trademark / tanda niaga A system of moral standards or values as a guideline for computer users is known as Sebuah sistem moral atau nilai sebagai panduan penggunaan pengguna komputer dikenali sebagai.. A cyber laws / undang-undang siber B cryptography / kriptografi C code of ethics / kod etika D computer ethics / etika komputer

8.

9. The following is a statement 3 on information privacy Pernyataan 3 berikut merujuk kepada kerahsiaan maklumat Information privacy refers to the right of individuals and organizations to deny or restrict the collection and use the information about them. Maklumat privasi merujuk pada hak individu dan organisasi untuk menolak atau menyekat pengumpulan dan penggunaan maklumat tentang mereka. " Shelly, 2006 Statement 3 Based on the statement 3, list four ways of making personal data more private. Berdasarkan pernyataan 3, senaraikan 4 cara yang membolehkan data peribadi lebih peribadi 10. Figure 4 shows one type of verification methods. Rajah 4 menunjukkan sejenis kaedah pengesahan

Figure 4 Based on figure 4, state the method used. Berdasarkan rajah 4, nyatakan kaedah yang digunakan. 11. State whether the statement 4 is True or False. Write T for True or F for False. Nyatakan benar atau palsu dengan menulis T untuk benar dan F untuk Palsu Authentication is important in order to safeguards against the unauthorized access and use. Pengesahan ini penting untuk perlindungan terhadap akses yang tidak sah dan digunakan

Statement 4
2011 TEST 1 MARCH: FORM 4

12.

Figure 5 below shows the examples of biometric devices. Rajah 5 di bawah menunjukkan contoh-contoh peranti biometrik

Fingerprint Recognition

Iris Scanning

Figure 5 List another two examples that you have learnt. Senarai 2 lagi contoh yang telah anda pelajari ii. State the need of authentication. Nyatakan keperluan kepada pengesahan i. 13. Based on the Statement 5, answer the following question. Jawab soalan berdasarkan pernyataan di bawah See Yi Poi has received an e-mail stating that his favourite soda drinks Soda Moda uses food colouring that is not advisable by The Ministry of Health. He does not know the truth of the e-mail but he has forwarded the e-mail to 50 of his friends. Soda Moda label also has been manipulated into a picture that tends to exploit women in a distasteful manner.

Yi Poi telah menerima e-mel yang menyatakan bahawa minuman soda kegemarannya "Soda Moda" menggunakan pewarna makanan yang tidak dianjurkan oleh Jabatan Kesihatan. Dia tidak tahu kebenaran e-mel tetapi ia telah meneruskan e-mel kepada 50 daripada rakan-rakannya. Moda soda label juga telah dimanipulasi menjadi gambar yang cenderung mengeksploitasi perempuan secara tidak menyenangkan.
i. ii. Statement 5 List two controversial contents that stated in Statement 5. Senaraikan 2 kandungan kontroversi pada pernyataan 5 State one impact of controversial content in society from 11(i). Nyatakan satu kesan kandungan kontroversi dalam masyarakat daripada 11(i)

14. State whether the following statement is True or False. Nyatakan sama ada pernyataan berikut Benar atau Palsu Web filtering software is a program that restricts access to specified Web Sites. Perisian penapisan web adalah program yang menyekat capaian kepada laman web tertentu

2011

TEST 1 MARCH: FORM 4

15. Figure 6 shows the part or an algorithm for a web page filter. Rajah 6 menunjukkan bahagian algoritma bagi penapis halaman web

Figure6 State the filtering method used in the algorithm. Nyatakan kaedah penapisan yang digunakan dalam algoritma di atas 16. Figure 7 shows the Malaysian Cyber Law. Rajah 7 menunjukkan Undang-undang Siber Malaysia A Copyright Act 1987 Akta hak cipta 1987 B Communications and Multimedia Act 1998 Akta Komunikasi dan Multimedia 1998 C Digital Signature Act 1997 Akta Tanda Tangan Digital 1997 D Computer Crimes 1997 Jenayah Komputer 1997 E Telemedicine Act 1997 Akta Teleperubatan 1997 Figure 7 __________________ secures electronic communications especially on the Internet. __________________ melindungi komunikasi elektronik terutamanya internet ii. ________________ gives protection against the misuses of computers and computer criminal activities such as unauthorized use of programmes, illegal transmission of data or messages over computers and hacking and cracking of computers systems and networks. ___________ memberikan perlindungan terhadap penyalahgunaan komputer dan aktiviti komputer jenayah seperti program penggunaan yang tidak sah, haram penghantaran data atau mesej melalui komputer dan hacking dan cracking sistem komputer dan rangkaian. iii. __________________ ensures that only qualified medical practitioners can practice telemedicine and that their patients rights and interests are protected. ________________memastikan bahawa pengamal perubatan yang berkualiti sahaja yang boleh menggunakan teleperubatan dan bahawa hak-hak pesakit dan kepentingan mereka dilindungi iv. The implementation of _______________________ ensures that information is secure, the network is reliable and the service is affordable all over Malaysia. Pelaksanaan _______________________ memastikan bahawa maklumat keselamatan, rangkaian boleh dipercayai dan perkhidmatan yang berpatutan di seluruh Malaysia. i.
2011 TEST 1 MARCH: FORM 4

17. Table 2 shows the activities of computer crime. Jadual 2 menunjukkan aktiviti dalam jenayah kompujter P Computer Attack / Serangan komputer Q R S Computer Theft / Pencurian komputer Copyright Infringement / Pelanggaran hak cipta

Computer Fraud / Penipuan komputer Table 2 Based on Table 2, write P, Q, R or S for the following statement: Berdasarkan Jadual 2, tulis P, Q, R atau S untuk kenyataan berikut: i. Chua Ban Ling transfer his company profit to his own account. Ban Chua Ling memindahan keuntungan syarikat ke akaun sendiri. ii. Chan Kar Yan downloaded an assignment from the internet and claimed it is her. Chan Kar Yan memuat turun tugas dari internet dan mendakwa itu adalah hasil kerja dirinya. 18. Which of the following is NOT the example of computer fraud? Manakah daripada yang berikut ini yang BUKAN contoh penipuan komputer? A B C D E-mail hoaxes / E-mail hoax Programmed fraud / Penipuan program Investment schemes by Internet / Pelaburan skim oleh Internet Diverts good to the wrong destinations / Mengalihkan barangan ke tempat yang salah

19. Table 3 shows different types of computer threats. Jadual 3 menunjukkan perbezaan jenis-jenis ancaman komputer Computer threat P Description Unauthorized access into a computer system. Capaian ke dalam sistem komputer tanpa izin A program that attaches itself to another program and can destroy or co-exists with the program. R Sebuah program yang melekat pada program lain dan boleh menghancurkan program tersebut Table 3 Name the computer threats: / Namakan ancaman komputer berikut; i. P = ________ ii. R = ________ **************************************END OF QUESTIONS*********************************************
Prepared by: . (HAMDAN BIN HAJI MUHAMMED IDRIS) Head of ICT Panel Approved by: .. (PUAN ROSINAH BT SUNGIP) Head Of Techniques & Vocational Department

2011

TEST 1 MARCH: FORM 4

SMK RAJA MUDA MUSA INFORMATION COMMUNICATION AND TECHNOLOGY (ICT) TEST 1 FORM 4 : MARCH ( SKEMA JAWAPAN) 1 2 3 4 5 6 7 8 9

i ii i ii i ii

i ii iii iv

10 11 12 13 14 15 16

i ii i ii

17 18 19

i ii iii iv i ii

i ii Jumlah markah

40

2011

TEST 1 MARCH: FORM 4