Anda di halaman 1dari 5

SKEMA TRIAL KUALA LUMPUR SECTION A 1 2 3 4 X- Ecommerce A D I. Natural and environmental threats II. Human Aspect a.

American Standard Code for Information Interchange b. 00110000 (mana-mana contoh ASCII code boleh diterima) 6 7 8 9 10 11 A Operating System Ring topology True False a. Hub/switch b. Function of P : Used for connecting wired computer/devices on a LAN Act as connection point for nodes on a star networks X straight cable / network cable / UTP cable False C What You See Is What You Get i. Design phase ii. Publishing phase 17 18 19 20 B Prolog, Mercury, SQL, NOMAD, FOCUS, Visual Basic True i. P- Length q- Width / Area ii. A- Input Length, Width,Area B Print Area of Rectangle True C i. As a unique identifier ii. To joint between two table a. X Record b. Y File/Table

12 13 14 15 16

21 22 23

24

25

i. P Data ii. Q- Software iii. R - Procedure

Section B 26 a. i. A- Secondary storage II. B- Primary storage b. Differences between storage A and storage B Storage A [ Secondary storage] It is an external storage Data can accessed directly by the processor Main memory of computer Has three types optical disc, magnetic disk, flash memory Storage B [ primary storage] It is an internal storage Data can accessed when according to user need Alternative storage in a computer Has two types RAM and ROM

27

a. Advantages of peer to-peer network architecture All node acting as both servers and clients All node has same capabilities

b.

Cross Cable

PC 1
Dua computer, 1 markah. Sambungan dan line bersambungan, 1 markah 28 a. A - Selection control structure B Sequence control structure

PC 2

b. Differences between A and B A [ Selection control structure] Enables a program to execute different condition B [ Sequence control structure] Execute the statement one by one in consecutive order

Has to use the decision symbol 29

Does not use the decision symbol

a. The issued involved in managing orders between Company Aman and its customer is non-computerized system because Company Aman used letter and telephone for manage their customers order. Disadvantage using non-computerized system : All activities were done manually All business activities can only made during working hours It also less productivity b. One possible threat if the proposed service is implemented Malicious code Hacker Theft Suggest one way to minimize the threat: Malicious code antivirus/ antispyware Hacker Firewall Theft Human Aspect

30

a. Web-based b. Two advantages of method Mutu used: Store high end resolution picture or video Can permanently store Not changeable c. Advantages medium of delivery in (a) Content can be changed or edited directly Its a user friendly Can easily visualize the design

SECTION C 31 Criteria: 3 slides Theme: Transformasi Berjaya Rakyat Sejahtera Non linear interctivity Multimedia elements : text/audio/video/graphic/animation Slide 1 slide 2

Text 1 : Tajuk 1Malaysia logo.jpg

Text 2: Video

1Malaysia.avi Animation 1 (Scrolling Text) Transformasi Berjaya Rakyat Sejahtera

Slide 3

Text 3 Lagu-lagu Patriotik Malaysia Kita.mp3 Sejahtera Malaysia.wav

32

a. IC Number in Student table Primary Key IC Number in Resevation table Foreign key b. The importances of relationship between field IC Number in Student table and IC Number in Reservation table: To joint Student table with Resevation table By matching a foreign key with a primary key, the data does not need to be entered repeated The primary key of in Student table becomes a foreign key in Reservation table

c.

Relationship between both table: Student table IC Number Name Address Telephone Reservation table BookID IC Number Book Title Author

Type of relationship : One to many 33 a. Type of network communication technology used between Central Site and Customer Site : Extranet b. Type of network communication technology X use in Central Site : X- Intranet Its a private network that limited for employee only c. Two differences between network communication technologies X and network communication technologies between Central site and Customer site Technologies X [ Intranet ] Is a private network Is used for organization and employees only Security level is high Extranet Is a private network Is used for supplier, customer and business partner Security level is high and it used Virtual Private Network to communicate.

Anda mungkin juga menyukai