1.1.1.1
1.1.1.2
1.1.2.1
1.1.2.2
1.1.2.3
1.2.1.1
1.2.1.2
1.2.1.3
1.2.2.1
1.2.2.2
1.2.3.1
1.2.3.2
1.2.4.1
1.2.4.2
1.3.1.1
1.3.2.1
1.3.3.1
Year
Section
Define ICT.
Describe the brief evolution of computers.
List the usage of ICT in everyday life.
State the differences between computerised and non-computerised
systems.
State the impact of ICT on society.
Define Computer Ethics, Code of Ethics, Intellectual Property,
Privacy, Computer Crime and Cyber Law.
Differentiate between ethics and law.
State the need for intellectual property laws.
List ways to protect privacy.
State authentication and verification methods/technologies.
List effects of controversial contents on society: i. Pornography and
ii. Slander;
Describe the process of filtering to control access to controversial
contents.
Explain the need for Cyber Law.
Explain briefly the computer crimes below: i. Fraud, ii. Copyright
Infringement, iii. Theft and iv. Attacks
Define computer security.
Explain briefly the different threats to computer security: i. Malicious
code, ii. Hacking, iii. Natural disaster and iv. Theft
Select the appropriate security measures to overcome the identified
computer threats
Tahun 2007
B
C
Tahun 2008
B
C
Tahun 2009
B
C
A
2
2
Tahun 2010
B
4
3
3
4
6
2
2
4
2.1.2.1 State the relationship of data representation: bit, byte and character.
2.1.3.1 Explain the function of ASCII code.
State the units of data measurement: i.) Bit, ii.) Byte, iii.) Kilobyte
2.1.4.1 (KB), iv.) Megabyte (MB), v.) Gigabyte (GB) and vi.) Terabyte (TB)
State the units of clock speed measurement: i. Megahertz (MHz), ii.
2.1.5.1 Gigahertz (GHz)
2.2.1.1 Identify the input devices used for text, graphic, audio and video.
2.2.2.1 Identify the output devices used for text, graphic, audio and video
Identify the location of the central processing unit (CPU), expansion
slots, expansion cards, RAM slots, ports and connectors on the
2.2.3.1 motherboard.
2.2.4.1
2.3.1.1
2.3.1.2
2.3.1.3
2.3.2.1
2.3.2.2
2.3.3.1
2.3.4.1
2.4.1.1
2.4.1.2
2.4.2.1
2
1
1
1
4
1
1
4
1
2
4
4
2
2
3.4.2.1 Crimp and test UTP cable: i. Straight cable and ii. Crossed cable
3.4.2.2 Create awareness of the correct way when crimping a cable.
Configure the workstation to join a Local Area Network : i. Internet
3.4.3.1 Protocol (IP) Address, ii. Subnet Mask and iii. Server name
3.4.3.2 Test the network connection.
3.4.4.1 Create a shared folder.
1
4
1
2
1
3
4
3.5.1.1
4.1.1.1
4.1.2.1
4.1.3.1
4.1.4.1
4.1.5.1
4.2.2.1
4.2.3.1
4.2.4.1
4.3.1.1
4.3.1.2
1
4
1
2
2
1
1
2
2
1
5.2.1.1
5.2.2.1
5.3.1.1
6.1.1.1
6.1.2.1
6.1.3.1
6.1.3.2
6.1.3.3
6.1.4.1
6.1.4.2
6.1.5.1
6.1.5.2
6.2.1.1
6.2.1.2
6.2.2.1
6.2.2.2
0.5
0.5
1
2
3
1
1
2
2
1
2
2
2
2
2
1
2
1
2
2
3
1
1
1
1
1
2
1
1
1
4
7
20
20
36
20
21
36
20
21
36
20
ahun 2010
C
Tahun 2011
B
C
2
5
1
0
4
6
6
0
6
2
0
2
0
0
0
5
9
8
8
0
0
0
0
0
0
1
1
1
0
4
0
4
0
0
2
1
4
7
7
9
9
1
0
0
2
0
0
0
0
0
0
5
4
1
1
6
9
1
13
3
2
4
1
1
2
0
0
2
0
3
4
0
0
0
0
1
3
4
9
1
6
6
3
5
0
1
1
5
1
1.5
0.5
1
1
11
13
4
10
7
7
1
7
17
22
0
2
0
1
2
2
0
2
2
1
5
3
2
2
7
0
0
0
2
2
1
2
2
2
0
0
6
1
0
1
1
0
0
4
7
0
21
36
20
21
0
384
384
6.1.4.1
6.2.2.3
6.2.2.4
6.2.2.5
6.3.2.1
6.3.2.2
6.3.2.5
6.3.2.9
2.1.3.1
2.1.4.1
2.4.3.1
3.3.2.1
4.2.3.1
4.3.1.1
6.2.3.1
LAMPIRAN A
1
2
2
5
6
11
2
1
2
15
16
24
Jum
19
10
15
10
8
14
76
2011
4
7
6
7
7
5
36
Jum
13
7
21
3
22
11
77
2011
4
4
4
4
0
4
20
Jum
4
11
16
13
18
15
77
2011
0
7
0
7
7
0
21
Jum
15
7
8
10
27
10
77
Jum
8
18
10
18
14
9
77
JUM
21
34
24
31
42
28
180
JUM
18
12
24
16
12
18
100
JUM
20
7
22
7
35
13
104
A, B DAN C
JUM
59
53
70
54
89
59
384
1.1.1.1
1.1.1.2
1.1.2.1
1.1.2.2
1.1.2.3
1.2.1.1
1.2.1.2
1.2.1.3
1.2.2.1
1.2.2.2
1.2.3.1
1.2.3.2
1.2.4.1
1.2.4.2
1.3.1.1
1.3.2.1
1.3.3.1
Year
Section
Define ICT.
Describe the brief evolution of computers.
List the usage of ICT in everyday life.
State the differences between computerised and non-computerised
systems.
State the impact of ICT on society.
Define Computer Ethics, Code of Ethics, Intellectual Property,
Privacy, Computer Crime and Cyber Law.
Differentiate between ethics and law.
State the need for intellectual property laws.
List ways to protect privacy.
State authentication and verification methods/technologies.
List effects of controversial contents on society: i. Pornography and
ii. Slander;
Describe the process of filtering to control access to controversial
contents.
Explain the need for Cyber Law.
Explain briefly the computer crimes below: i. Fraud, ii. Copyright
Infringement, iii. Theft and iv. Attacks
Define computer security.
Explain briefly the different threats to computer security: i. Malicious
code, ii. Hacking, iii. Natural disaster and iv. Theft
Select the appropriate security measures to overcome the identified
computer threats
Tahun 2007
B
C
Tahun 2008
B
C
Tahun 2009
B
C
A
2
2
Tahun 2010
B
4
3
3
4
6
2
2
4
ahun 2010
C
Tahun 2011
B
C
2
5
1
4
6
6
6
2
9
8
59
Tahun 2007
B
C
Tahun 2009
B
C
2.1.2.1 State the relationship of data representation: bit, byte and character.
2.1.3.1 Explain the function of ASCII code.
State the units of data measurement: i.) Bit, ii.) Byte, iii.) Kilobyte
2.1.4.1 (KB), iv.) Megabyte (MB), v.) Gigabyte (GB) and vi.) Terabyte (TB)
State the units of clock speed measurement: i. Megahertz (MHz), ii.
2.1.5.1 Gigahertz (GHz)
2.2.1.1 Identify the input devices used for text, graphic, audio and video.
Tahun 2008
B
C
2.2.2.1 Identify the output devices used for text, graphic, audio and video
Identify the location of the central processing unit (CPU), expansion
slots, expansion cards, RAM slots, ports and connectors on the
2.2.3.1 motherboard.
2.2.4.1
2.3.1.1
2.3.1.2
2.3.1.3
2.3.2.1
2.3.2.2
2.3.3.1
2.3.4.1
2.4.1.1
2.4.1.2
2.4.2.1
2
1
1
1
4
1
1
4
1
Tahun 2010
B
ahun 2010
C
Tahun 2011
B
C
1
1
2
1
4
7
7
9
9
1
53
Tahun 2007
B
C
Tahun 2008
B
C
Tahun 2009
B
C
Tahun 2010
B
2
4
4
2
2
1
4
1
4
1
2
1
3.4.2.1 Crimp and test UTP cable: i. Straight cable and ii. Crossed cable
3.4.2.2 Create awareness of the correct way when crimping a cable.
3
4
ahun 2010
C
Tahun 2011
B
C
5
4
1
1
6
9
1
13
3
2
4
1
1
2
3
4
70
4.1.1.1
4.1.2.1
4.1.3.1
4.1.4.1
4.1.5.1
Year
Section
Define multimedia.
Identify the use of multimedia in various fields.
Differentiate between the characteristics of linear and non-linear
multimedia.
Compare and contrast the mediums of delivery for multimedia
applications: i. web-based and ii. CD-based
Identify the multimedia elements: i. text, ii. audio, iii. video, iv.
graphics and v. animation
4.2.2.1
4.2.3.1
4.2.4.1
4.3.1.1
4.3.1.2
Tahun 2007
B
C
Tahun 2009
B
C
Tahun 2010
B
4
1
2
2
Tahun 2008
B
C
ahun 2010
C
Tahun 2011
B
C
3
4
9
1
6
6
3
54
5.1.1.1
5.1.1.2
5.1.2.1
5.1.2.2
5.1.3.1
5.1.3.2
5.1.3.3
5.1.4.1
5.1.5.1
5.1.5.2
Year
Section
State the definition of program.
State the definition of programming language.
Identify the generations of low-level programming languages with
examples.
Identify the generations of high-level programming languages with
examples.
Define structured approach in programming.
Define object-oriented approach in programming.
Differentiate between structured approach and object-oriented
approach in programming.
Describe the translation method of programming using assembler,
interpreter and compiler.
Differentiate between constants and variables.
Differentiate between the data types: Boolean, integer, double,
string and date.
A
1
Tahun 2007
B
C
Tahun 2008
B
C
Tahun 2009
B
C
Tahun 2010
B
1
2
2
1
0.5
0.5
1
2
3
1
1
2
11
ahun 2010
C
Tahun 2011
B
C
1
1
1
1.5
0.5
1
1
11
13
4
10
7
7
14
17
22
89
6.1.1.1
6.1.2.1
6.1.3.1
6.1.3.2
6.1.3.3
6.1.4.1
6.1.4.2
6.1.5.1
6.1.5.2
6.2.1.1
6.2.1.2
6.2.2.1
6.2.2.2
6.2.2.3
6.2.2.4
6.2.2.5
6.2.3.1
6.2.3.2
6.2.4.1
6.2.4.2
Year
Section
Give the meaning of data, information and information systems.
State the usage of Information Systems in education, business and
management.
List the Information System components: i. data, ii. hardware, iii.
software, iv. people and v. procedure
Define each of the Information System components.
Describe the interrelation between information system components
using a diagram.
List five types of Information Systems: i. Management Information
System (MIS), ii. Transaction Processing System (TPS), iii. Decision
Support System (DSS), iv. Executive Information System (EIS), v.
Expert System (ES)/Artificial Intelligence (AI)
State the usage of each type of information system.
Define bit, byte, field, record, and file
State the hierarchy of data: Bit ? Byte (Character) ? Field ?
Record ? File ? Database
Define database and Database Management Systems (DBMS).
List the benefits of using database.
State the relationship between attribute (field), row (record) and
relation (file).
Define the primary key and foreign key.
State the importance of the primary key.
Differentiate between the primary key and foreign key.
State the importance of relationship between the primary key and
foreign key.
Define the following database objects/ tools: Table, form, query,
report.
Identify table, query, form and report as database objects/ tools.
List the basic operations of data manipulation: i. Update, ii. Insert,
iii. Delete, iv. Retrieve, v. Sort, vi. Filter and vii. Search
State the usage of basic operations in data manipulation.
Tahun 2007
B
C
A
2
Tahun 2008
B
C
Tahun 2009
B
C
Tahun 2010
B
1
2
2
2
2
2
1
2
1
2
2
3
1
1
1
1
1
6.3.2.3
6.3.2.4
6.3.2.5
6.3.2.6
6.3.2.7
6.3.2.8
6.3.2.9
2
1
1
1
4
7
ahun 2010
C
Tahun 2011
B
C
2
1
2
2
2
2
1
5
3
2
2
7
2
1
2
2
6
1
1
1
4
7
59