Anda di halaman 1dari 13

SULIT

3765/1

SECTION A / BAHAGIAN A [30 Marks] / [30 Markah] Answer all questions. Write your answer in the space provided on the Answer Sheet. Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian Jawapan. 1. What general term describes the physical equipment of computer system, such as its video screen, keyboard and storage devices? Apakah istilah umum yang menyatakan berkenaan dengan kelengkapan sesebuah system computer seperti skrin video, papan kekunci dan storan? A. B. C. D. Input / Masukan Output / Keluaran Software / Perisian Hardware / Perkakasan

Fill in the blank with the correct answer. Isikan tempat kosong denga jawapan yang tepat. 2. A collection of 8 bits is called a byte. A byte represents a single ______________ in the computer. Koleksi 8 bit dipanggil sebagai bait. Satu bait mewakili satu ________ di dalam komputer. 3. If 1 Kilobyte equals to 210 bytes, 1MB equal to _______ bytes. Jika 1 Kilobait bersamaan dengan 210 bait, 1 MB bersamaan dengan _______ bait. 4. Figure 1 shows three devices that can store data. Rajah 1 menunjukkan tiga alatan untuk meyimpan data.

Figure 1 / Rajah 1
1

SULIT

3765/1

Based on Figure 1, write A, B or C to match the following: Berdasarkan Rajah 1, tulis A, B atau C untuk suaikan yang berikut: i. ii. Can only hold the data temporarily. Hanya boleh menampung data sementara. Can store the data permanently until it is deleted or removed. Boleh menyimpan data secara kekal sehingga ia dipadam atau dibuang.

5. All the statements below are TRUE about RAM EXCEPT Semua pernyataan berikut adalah BENAR tentang RAM KECUALI A. data can be read or written. data boleh dibaca atau ditulis B. the programs and data are lost when the computer is powered off. program dan data akan hilang apabila bekalan kuasa komputer ditutup. C. the contents can be accessed and read but cannot be changed. isi kandungan boleh dicapai dan dibaca tetapi tidak boleh diubahsuai. D. it is also known as a working memory. ia juga dikenali sebagai ingatan kerja.

6. Intellectual property law is needed to cover : Undang-undang harta intelek diperlukan untuk melindungi : I. II. III. IV. A. B. C. D. Ideas / Ide Inventions / Rekaan Unique names / Nama unik Historical creations / Ciptaan sejarah I, II and III / I, II dan III I, II and IV / I, II dan IV I, III and IV / I, III dan IV II, III and IV / II, III dan IV

Fill in the blank with the correct answer. Isikan tempat kosong denga jawapan yang tepat. 7. _______________________ is a network that uses a public telecommunication infrastructure, such as the Internet to remote offices or individuals with secure access to their organizations private network. ____________ adalah rangkaian yang menggunakan infrastruktur telekomunikasi awam seperti Internet untuk mencapai rangkaian peribadi secara selamat.

SULIT

3765/1

8. Why do we need to backup our data? Mengapakah kita perlu membuat salinan data? I. II. To ensure that our data can still be used if the original is corrupted Untuk memastikan data kita boleh digunakan jika berlaku sesuatu terhadap asal. To ensure our files, program or disk that can be used if the original source is lost, damage or destroyed. Boleh menggunakan fail, program atau cakera yang telah disalin jika sumber rosak hilang atau musnah. To prevent our files or program from malicious software Menghalang fail atau program daripada perisian yang tidak dikehendaki. To protect our files from viruses . Menghalang fail daripada virus.

III. IV.

A. B. C. D.

I and II / I dan II I and III / I dan III I, II and III / I, II dan III I, II and IV / I, II dan IV

9. Table 1 shows security measures to overcome computer threats. Jadual 1 menunjukkan langkah keselamatan untuk mengatasi ancaman komputer. X Firewall Dinding Api Y Cryptography Kriptografi Z Physical aspects Aspek fizikal Table 1 / Jadual 1 Based on Table 1, choose X , Y or Z for the statements given. Berdasarkan Jadual 1, pilih X, Y atau Z untuk penyataan yang diberi. i. Functions in a network environment to prohibit unauthorized access to your computer via the Internet. Berfungsi dalam rangkaian bagi menghalang capaian tanpa kebenaran kepada komputer melalui Internet. ii. As a security measure, make sure a computer room is always locked. Sebagai langkah keselamatan, pastikan bilik komputer sentiasa berkunci.

SULIT

3765/1

10. Figure 2 shows a computer network. Rajah 2 menunjukkan sebuah rangkaian komputer.

Figure 2 / Rajah 2 Based on Figure 2, identify device Y. Berdasarkan Rajah 2, kenalpasti peranti Y. 11. Figure 3 shows the wireless transmission medium. Rajah 3 menunjukkan media transmisi tanpa wayar.

Figure 3 / Rajah 3 Based on Figure 3, / Berdasarkan Rajah 3, i. State the type of wireless transmission medium. Nyatakan jenis media transmisi tanpa wayar.

ii. Choose X, Y or Z for long range wireless data transmission. Pilih X, Y atau Z bagi transmisi data tanpa wayar jarak jauh.

SULIT

3765/1

12. Utility programs also known as ____________ Program utiliti juga dikenali sebagai _____________ A. delete programs program memadam B. service programs program servis C. programming languages bahasa programming D. output devices peranti output 13. Figure 4 shows three types of cables which are used as physical transmission medium. Rajah 4 menunjukkan tiga jenis kabel yang digunakan sebagai media penghantaran secara fizikal.

R S

T Figure 4 / Rajah 4 Based on Figure 4, write R, S or T for the following statements. Berdasarkan Rajah 4, tulis R, S atau T bagi pernyataan berikut. i. This cable has two insulated copper wires that are twisted around each other. Kabel ini mempunyai dua wayar bersalut kuprum yang terpiuh antara satu sama lain. This cable consists of a single copper wire surrounded by at least three layers. Kabel ini mengandungi satu wayar kuprum tunggal yang dikelilingi oleh sekurang-kurangnya tiga lapisan.

ii.

SULIT

3765/1

14. Write whether the statements below are TRUE or FALSE. Tuliskan sama ada pernyataan di bawah BENAR atau PALSU. i. Privacy can be protected by utilities software such as firewall. Kebersendirian boleh dilindungi dengan menggunakan perisian utiliti seperti tembok api. Cyber law is a way to protect data privacy. Undang-undang siber merupakan satu cara untuk melindungi kebersendirian data.

ii.

15. Complete the following statements by filling in the blanks: Isikan ruang kosong untuk melengkapkan pernyataan berikut.. In ______________medium, multimedia application can store high end multimedia elements such as video and audio. Di dalam medium ___________, aplikasi multimedia boleh menyimpan unsur-unsur multimedia dengan resolusi yang tinggi seperti video dan audio. 16. State whether the following statements is TRUE or FALSE. Nyatakan sama ada pernyataan berikut BENAR atau PALSU. A video that combines audio, graphics and animation is still considered as a non-linear multimedia content since the user is a passive receiver of the content. Video yang menggabungkan audio, grafik dan animasi masih disebut sebagai kandungan multimedia tidak sejajar selagi pengguna menjadi penerima pasif. 17. Figure 5 shows web editor interface. Rajah 5 menunjukkan antaramuka suntingan web.

Figure / Rajah 5
6

SULIT

3765/1

Based on Figure 5, / Berdasarkan Rajah 5, i. Name the type of web editor software used. Namakan jenis perisian suntingan web yang digunakan. Give one example of web editor. Berikan satu contoh perisian suntingan web di (a).

ii.

18. Which of the following cannot be used to produce multimedia? Manakah antara berikut yang tidak boleh menghasilkan multimedia? A. B. C. D. Scanner / Pengimbas Monitor / Monitor Microphone / Mikrofon Digital Camera / Kamera Digital

19. Hasni wants to record new version of National Anthem from a television programmed and use it as audio source in her presentations. What is the most suitable software for audio editor? Hasni hendak merakam versi baru Lagu Kebangsaan daripada program televisyen dan menggunakannya sebagai sumber audio dalam persembahannya. Apakah perisian yang paling sesuai untuk penyuntingan audio? A. B. C. D. Notepad / Notepad Soundpad / Soundpad Sound Forge / Sound Forge Moviemaker / Moviemaker

20. Figure 6 shows various concepts in authoring tools. Rajah 6 menunjukkan pelbagai konsep alat pengarangan.

Figure 6 / Rajah 6
7

SULIT

3765/1

Based on Figure 6, state the type of concepts authoring tools of multimedia. Berdasarkan Rajah 6, nyatakan jenis konsep alat pengarangan di dalam multimedia. i. Q ii. R 21. Which of the following have a non-linear multimedia presentations? Antara yang berikut yang manakah mempunyai persembahan multimedia tidak linear? I. II. III. IV. Movies / Tayangan filem Computer games / Permainan kornputer Television advertisement / Iklan televisyen Web page browser/ Pelungsur laman web B D I and III / I dan III III and IV / III dan IV

A. I and II / I dan II C. II and IV / II dan IV

22. Table 2 shows the advantages of two types of medium for delivering multimedia application. Jadual 2 menunjukkan kelebihan dua jenis media penghantaran dalam aplikasi multimedia. Medium P Media P It can store high quality video. dapat menyimpan video berkualiti tinggi. The content can be permanently stored. Kandungan dapat disimpan secara kekal Medium Q Media Q It uses compressed video format. Menggunakan format video termampat. The content can be updated easily. Kandungan dapat dikemas kini dengan mudah.

Table 2 / Jadual 2 Based on Table 2, name / Berdasarkan Jadual 2, namakan i. Medium P / Media P ii. Medium Q / Media Q

SULIT

3765/1

SECTION B / BAHAGIAN B [20 MARKS] / [20 MARKAH] 23. Figure 7 shows tools used by multimedia development team members. Rajah 7 menunjukkan alatan yang digunakan oleh pasukan pembangunan multimedia.

Figure 7 / Rajah 7 (a) Name the member of the team who uses Namakan ahli pasukan yang menggunakan

[2m]

(i) tool A / alat A - _______________________________________________ (ii) tool B / alat B - _______________________________________________

(b)

State one role of the team member illustrated in Nyatakan satu peranan ahli pasukan yang digambarkan dalam

[2m]

(i) A - ____________________________________________________________ (ii) B - ____________________________________________________________

SULIT

3765/1

24. Based on the Figure 8 below, complete the multimedia production phases chart. Berdasarkan Rajah 8 di bawah, lengkapkan carta fasa penghasilan produk multimedia.
X

Design

Implementation

Testing

Evaluation

Publishing

Figure 8 / Rajah 8 (a) State phase X / Nyatakan fasa X [1m] _____________________________________________________________________ Describe the activity during this phase. Terangkan aktiviti yang berlaku pada fasa ini. [2m] ________________________________________________________________________ ________________________________________________________________________ Storyboard plays an important role in multimedia. In which phase does this activity occurs? Papan cerita memainkan peranan yang penting dalam multimedia. Di fasa manakah aktiviti ini berlaku? [1m] ________________________________________________________________________

(b)

(c)

10

SULIT

3765/1

25. Amirah is ICT student in SMK Bukit Baru, she had developed a multimedia project title SMK Bukit Baru Gemilang. Amirah had to go through the multimedia development phases to develop her multimedia project as shown on Figure 9. Amirah seorang pelajar ICT di SMK Bukit Baru. Beliau telah membangunkan suatu projek multimedia bertajuk SMK Bukit Baru Gemilang. Amirah perlu melalui langkahlangkah dalam fasa pembangunan multimedia untuk membangunkan projek multimedia tersebut seperti Rajah 9.

Analysis Phase Fasa Analisis

Implementation Phase Fasa Pelaksanaan

Publishing Phase FasaPenerbitan

Testing Phase FasaPengujian

Figure 9 / Rajah 9 (a) State phase P & Q / Nyatakan fasa P & Q P - ________________________________________ Q - ________________________________________ [2m]

(b) Amirahs school has Internet service interruption regularly. What is the appropriate way to store the multimedia production? Justify your answer. [2m] Sekolah Amirah mengalami gangguan perkhidmatan Internet. Apakah cara yang sesuai untuk menyimpan produksi multimedia tersebut. Berikan justifikasi anda. _____________________________________________________________________ _____________________________________________________________________ _____________________________________________________________________

11

SULIT

3765/1

26. In recent years, email is one of the popular services through the net. Many business transactions, management instructions even individual communication are done. Students share information, ideas and opinions . It is very fast and easy. Pada masa kini, email sangat digemari di kalangan pengguna internet. Banyak transaksi perniagaan, arahan pentadbiran malah komunikasi individu juga diadakan. Pelajar-pelajar berkongsi maklumat, idea dan pendapat. Ia sangat senang dan cepat. a) State two examples of law breaking. Nyatakan dua contoh aktiviti yang melanggar undang-undang. __________________________________________________________ __________________________________________________________

[2m]

b)

State two reasons why do we need ethics and law in computing. Nyatakan dua sebab mengapa kita perlu beretika dan undang-undang dalam perkomputeran. [2m] ___________________________________________________________ ___________________________________________________________ ___________________________________________________________

27. Figure 10 below shows two different types of network. Rajah 10 di bawah menunjukkan dua jenis rangkaian komputer.

Figure 10 / Rajah 10

12

SULIT

3765/1

a)

State two types of the computer networks shown in the Figure 10 above. Nyatakan kedua-dua jenis rangkaian komputer yang ditunjukkan dalam Rajah 10 di atas. [2m] ________________________________________________________________ ________________________________________________________________ Give two differences between these two types of computer networks. Berikan dua perbezaan antara dua jenis rangkaian komputer ini. (Draw table) / (Lukiskan jadual)

b)

[2m]

-Good Luck-Semoga Berjaya-

13

Anda mungkin juga menyukai