JABATAN PELAJARAN NEGERI MELAKA PEPERIKSAAN PERCUBAAN SIJIL PELAJARAN MALAYSIA 2011 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas 1 September 2011 2½ jam Dua jam tiga puluh minit JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU 1. Tulis nombor kad pengenalan dan angka giliran anda pada semua helaian jawapan. 2. Kertas soalan ini adalah dalam dwibahasa. 3. Soalan dalam bahasa Inggeris mendahului soalan yang sepadan dalam bahasa Melayu. 4. Calon dibenarkan menjawab keseluruhan atau sebahagian soalan sama ada dalam bahasa Inggeris atau bahasa Melayu. 5. Kertas soalan ini mengandungi tiga bahagian : Bahagian A, Bahagian B dan Bahagian C. 6. Jawapan untuk Bahagian A hendaklah ditulis di ruang yang disediakan pada Helaian Jawapan Bahagian A. 7. Jawapan untuk Bahagian B dan Bahagian C mestilah ditulis pada Helaian Jawapan Bahagian B dan C. 8. Helaian jawapan hendaklah diceraikan dan diserahkan kepada guru pengawas. 9. Anda dibenarkan menggunakan kalkulator saintifik. Kertas soalan ini mengandungi 19 halaman bercetak
NAMA : ANGKA GILIRAN : ( Helaian Jawapan Bahagian A) No. Soalan Jawapan Calon Markah 1 (i) 1 (ii) 2 2 3 (i) 3 (ii) 4 (i) 5 (ii) 6 4 7 5 8 6 (i) 9 (ii) 10 7 11 8 12 9 13 10 14 11 15 12 16 13 (i) 17 (ii) 18 14 19 15 20 16 21 17 (i) 22 (ii) 23 18 24 19 20 21 22 (i) 25 (ii) 26 (i) 27 (ii) 28 (a) 29 (b) 30 (i) 31 (ii) 32 23 33 24 (a) 34 (b) 35 25 36
Section A Bahagian A [36 Marks] Answer ALL question. Write your answers in the spaces provided in Answer Sheet. Each answer carries one mark. Jawab semua soalan. Tulis jawapan anda di ruang yang disediakan pada Helaian Jawapan. Setiap jawapan diperuntukkan satu markah. 1. Based on figures below, state the computer generation level : Berdasarkan rajah-rajah di bawah, nyatakan tahap generasi komputer : X Y (i) X (ii) Y 2. Information and Communication Technology is the use of computers, (i). devices and (ii). applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime. Teknologi Maklumat dan Komunikasi adalah penggunaan computer, peranti (i) dan aplikasi (ii). untuk memproses, menyimpan, mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa. 1
3. Figure below shows two input devices. Rajah di bawah menunjukkan dua peranti input. R S Based on Figure, state the type of input for: Berdasarkan Rajah, nyatakan jenis input untuk: (i) R (ii) S 4. Figure below shows the components of computer system. Write A or B to match the following statement. Rajah di bawah menunjukkan komponen untuk sistem komputer. Tulis A atau B untuk dipadankan dengan pernyataan di bawah. A B The device loses its data when the power is switched off. Peranti ini akan kehilangan data yang disimpan apabila bekalan arus terputus. 5. Based on the figure below, which of following can be slotted in X. 2
X A. RAM B. CPU C. Memory card D. NIC 6. The following are features in application software. Berikut adalah fitur-fitur dalam perisian aplikasi. S Application Software Perisian Aplikasi R Identify application: Kenal pasti aplikasi : (i) R (ii) S 3
7. Based on figure below, state whether the following statement is True or False. Berdasarkan rajah di bawah nyatakan sama ada pernyataan berikut Benar atau Palsu. Fetch and decode is in the execution cycle whereas execute and store is in the instruction cycle. Capai dan dekod berada di dalam pusingan pelaksanaan manakala laksana dan simpan berada di dalam pusingan arahan. 8. State whether the following statement is True / False. Nyatakan sama ada pernyataan berikut Benar atau Palsu. X Based on figure above, if computer X stops functioning, the entire network stops. 9. State whether the following statement is True or False. Nyatakan sama ada pernyataan berikut Benar atau Palsu. Communications is about the transfer of information from a sender, across a distance, to a receiver. Komunikasi adalah berkaitan dengan pemindahan data dari seorang penghantar melalui sesuatu jarak kepada seorang penerima. 4
10. Figure below shows the transmission media used in computer network. Rajah di bawah menunjukkan media penghantaran yang digunakan dalam rangkaian komputer. State the name of the transmission media above. Nyatakan nama media penghantaran di atas. 11. State whether the following statement is True / False. Nyatakan sama ada pernyataan berikut Benar atau Palsu. Unix is one of the Open Source Network Operating System, which organize and coordinate multiple user access and resource sharing on a network. Unix ialah satu dari Sistem Pengendalian Rangkaian Sumber Terbuka yang mengurus dan menyelaras pelbagai pengguna mencapai dan berkongsi sumber pada satu rangkaian. 12. Figure below shows the design of two different multimedia presentations. Rajah di bawah menunjukkan reka bentuk dua persembahan multimedia yang berbeza. Presentation 1 Presentation 2 Persembahan 1 Persembahan 2 Based on Figure, which is a linear multimedia presentation? Berdasarkan Rajah, yang manakah persembahan multimedia linear? 5
13. Figure below shows a multimedia team formed to produce a fine-qualitity highend application for educational application. Rajah di bawah menunjukkan pasukan multimedia yang ditubuhkan untuk menghasilkan aplikasi berkualiti tinggi untuk aplikasi pendidikan. P Subject Matter Expert (SME) Graphic Artist Audio Video Technician Based on the figure above, identify : Berdasarkan rajah di atas, kenalpasti : Q Programmer (i) (ii) P Q 14. Figures below shows a display of software. Rajah di bawah menunjukkan paparan sebuah perisian. Based on figure above, state the type of software. Berdasarkan rajah di atas, nyatakan jenis perisian itu. 6
15. Which of the following are types of web editors? Antara yang berikut, yang manakah jenis penyunting web? I. Text-based Berasaskan teks II. III. IV. WYSIWYG Dreamweaver Dreamweaver Frontpage Frontpage A. I and III I dan III B. I and II I dan II C. II and IV II dan IV D. II and III II dan III 16. Figures below refer to one of the the multimedia production phase that carries out to produce multimedia product. Rajah di bawah merujuk kepada salah satu fasa pembangunan multimedia yang dijalankan untuk menghasilkan produk multimedia. State the name of the phase. Namakan fasa tersebut. 7
17. Statements below shows the criteria of two generations of low-level programming languages. Pernyataan di bawah menunjukkan kriteria dua generasi bahasa pengaturcaraan aras rendah. P : instructions can be executed directly by CPU arahan boleh dilaksanakan terus oleh CPU : uses binary code Menggunakan kod binary Q : human readable notation nota yang boleh dibaca : use symbolic instruction codes menggunakan kod arahan simbolik Based on statements above, name the generation of programming language for : Berdasarkan pernyataan di atas, namakan generasi bahasa pengaturcaraan untuk : (i) (ii) P Q 18. The table shows the process of implementing a program written in a programming language. Jadual menunjukkan proses untuk melaksanakan sebuah program yang ditulis dalam bahasa pengaturcaraan. is a program that translates a high-level language into machine language. Translates programming statement of a program into machine language;no object code is saved and then executes it immediately Merupakan satu program yang menterjemahkan bahasa peringkat tinggi kepada bahasa mesin. Menterjemahkan pernyataan pengaturcaraan program ke dalam bahasa mesin; tiada kod objek disimpan dan kemudian melaksanakan dengan serta-merta Berdasarkan kepada jadual ini, ia merujuk kepada; Based on this table, it refers to; 8
A. An interpreter Pentafsir B. An assembler Penghimpun C. A compiler Pengkompilasi D. A translator Penterjemah 19. Write the correct words to complete the following statement : Tulis perkataan yang betul untuk melengkapkan pernyataan berikut : (i) is used to interpret and execute program directly from its source code without compiling it first. While the (ii) will convert the assembly language into machine code which is a file consisting of binary machine code that can be executed on a computer. digunakan untuk menterjemah dan melaksana aturcara secara terus daripada kod sumbernya tanpa mengkompil terlebih dahulu. Sementara akan menterjemahkan bahasa penghimpun ke kod mesin yang merupakan fail yang mengandungi kod mesin binari yang akan dilaksanakan pada komputer. 20. Figure below shows an incomplete program. Rajah di bawa menunjukkan atur cara yang tidak lengkap. Dim Name as M Dim Pi as N Name = Taman Melati Pi = 3.142 Based on figure di atas, identify : Berdasarkan rajah di atas, kenal pasti : (i) (ii) M N 9
21. Figure below shows the types of operators used in Programming Language. Rajah di bawah menunjukkan jenis operator yang digunakan dalam Bahasa Pengaturcaraan. Operators Mathematica Operators Example : +, -, *, / Comparison Operators Example : >, <, =,<> Y Example (a) Name Y. Namakan Y. (b) Give one example of Y Beri satu contoh Y 10
22. Figure below shows the data hierarchy in an Information System. Information System Hierarchy S Student File Staf File Financial File FILE NAME CLASS AGE GENDER Azizi 5 Epsilon 17 M Arvin 5 Epsilon 17 M Irene 5 Beta 17 F T NAME CLASS AGE GENDER Azizi 5 Epsilon 17 M FIELD Azizi BYTE 11000001 BIT 0 or 1 Based on figure above, named : Berdasarkan rajah di atas, namakan : (i) S (ii) T 23. is a group of program used to add, update, access, manage and anlyse the content of database... ialah sekumpulan atur cara yang diguna untuk menambah, mengemaskini, mencapai, mengurus dan menganalisis kandungan pangkalan data. 24. A school, SMK Rembia Perkasa uses a database to store information on its pupils. Figure below shows extract of the database file. 11 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
Sebuah sekolah, SMK Rembia Perkasa menggunakan pangkalan data untuk menyimpan maklumat berkaitan murid-murid. Rajah di bawah menunjukkan keratan fail pangkalan data tersebut. a) Which field is the primary key in this database file? Medan manakah merupakan kunci primer di dalam fail pangkalan data tersebut? b) State the reason why the field you have chosen is suitable to be used as a primary key. Nyatakan alasan mengapa medan yang dipilih sesuai digunakan sebagai kunci primer. 25. Figure below shows a database object. Based on the figure above, which of the following describe the database object. 12 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
A. Table Jadual B. Form Borang C. Report Laporan D. Query Kuiri Section B Bahagian B Answer all questions. Jawab semua soalan. [20 marks] [20 markah] 26. Based on figure below, answer the following questions. Computer A Computer B IP address : 10.65.237.20 Subnet Mask : 255.255.255.0 Default gateway : 10.65.237.1 IP address : 10.65.237.15 Subnet Mask : 255.255.255.0 Default gateway : 10.65.237.1 Computer C IP address : 10.65.237.20 Subnet Mask : 255.255.255.0 Default gateway : 10.65.237.1 13 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
a) Which computers are not able to communicate with each other? Give your justification. (2M).... b) Write the solution of the problem stated in 26a) so that the computers are able to communicate. (2M).... 27. Every year the school coop will give dividend to its members. Aidel is given a task to build a program to calculate it. He uses Microsoft Visual Basic programming language to complete his task. Setiap tahun koperasi sekolah akan memberi dividen kepada ahli-ahlinya. Kamal diminta untuk membina program mengira dividen tersebut. Beliau menggunakan bahasa pengaturcaraan Microsoft Visual Basic untuk menyiapkan tugasannya. a) Give the difference between the structured programming approached and the programming language that Kamal used. (2 marks) Berikan satu perbezaan di antara pendekatan pengaturcaraan berstruktur dan bahasa pengaturcaraan yang Aidel gunakan. (2 markah) b) Describe the translation method(s) of programming language used above. Terangkan kaedah terjemahan yang digunakan pada bahasa pengaturcaraan di atas. ( 2 markah) 28. Figure below shows a network communication system used between two banks, Mewah Bank in Melaka, Malaysia and Berjaya Bank in Johor, Malaysia. Rajah di bawah menunjukkan satu sistem komunikasi rangkaian digunakan di antara dua buah bank iaitu Bank Mewah di Melaka, Malaysia and Bank Berjaya di Johor, Malaysia. 14 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
Network Communication Technology Management Switch Employee 1 Employee 2 Employee 5 Employee 4 Mewah Bank Berjaya Bank Based on the above figures : Berdasarkan rajah-rajah di atas : a) Differentiate the types of network topology used at Mewah Bank and Berjaya Bank. Bezakan jenis topologi rangkaian yang digunakan di Bank Mewah dan Bank Berjaya. [2 marks] b) (i) Name the type of network communication technology used between the two banks to communicate. Namakan jenis teknologi komunikasi rangkaian yang digunakan di antara kedua-dua bank untuk berkomunikasi. (ii) Justify your answer. Berikan justifikasi anda. [2 marks] 15 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
29. Read the following statement. ICT Club in your school was given responsibility by the principal to produce multimedia presentation for Excellence Academic Award ceremony by the end of this month. As a president of the club, you are asked to form a team to develop the interactive multimedia presentation. a) State two types of interactivity in multimedia presentation. (2M)...... b) Figure below shows the phases of multimedia development. Phases X Y Description Process of converting the design plan into a multimedia program The multimedia developers will design a Flow Chart and Storyboard Based on the description given, identify phase X and Y. (2M) 30. Figure below shows the interrelation between the components of an information system. Rajah di bawah menunjukkan hubungan komponan-komponan dalam sistem maklumat. B C X Y A 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
Based on figure : Berdasarkan kepada rajah : a) Explain X and Y Jelaskan X dan Y (2 markah) b) Describe the interrelation between picture A, B and C above. Terangkan hubungkait di antara gambarajah A, B dan C di atas ( 2 markah ) Answer two questions only. Jawab dua soalan sahaja. (i) Question 31, and Soalan 31, dan Section C Bahagian C [14 marks] [14 markah] (ii) Either Question 32 or Question 33. Sama ada Soalan 32 atau Soalan 33. 31. Figure below shows development of a program. Rajah di bawah menunjukkan pembangunan satu program. Case Study Your school needs a registration program to computerize the registration of Curriculum Unit. All students in the school should have his/her data like name, class and IC number keyed into the Curriculum Unit Registration Program. After the program verifies the student data and all fields are filled, it will notified his/her Curriculum Unit for the coming academic year. Pseudo Code BEGIN Key in students data (verify data) If all fields filled then Print Curriculum Unit Else Print Error Message End if END 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
Based on the case study and pseudo code at figure above : Berdasarkan kajian kes dan kod pseudo pada rajah di atas : a) Identify the input, process and output of the program. Kenalpasti input, proses dan output program. [3 marks] b) Based on the pseudo code given, draw a complete flow chart of the program. Berdasarkan kod pseudo yang diberi, lukiskan carta alir bagi program berkenaan. [4 marks] 32. Figure below shows symptoms of a computer problem. Rajah di bawah menunjukkan simptom pada sebuah komputer. Screen displays unusual messages Skrin memaparkan kesej pelik Files become corrupted Fail menjadi rosak Files mysteriously appear Muncul fail yang menjadi tanda tanya Based on the figure above : Berdasarkan rajah di atas : a) Identify the type of computer threat which matches the symptoms. Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu. State two different examples of the threat. Nyatakan dua contoh berlainan bagi ancaman itu. (3M) b) Describe two reasons why the computer may have been affected by the threat in (a). Huraikan dua sebab mengapa komputer tersebut dijangkiti oleh ancaman di (a). Suggest two ways to prevent it. Cadangkan dua cara untuk mengatasinya. (4M) 18 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
33. Figure below shows the the phases used to developed Student Information System of Sekolah Putera Afnan Rajah di bawah menunjukkan kitar hayat digunakan untuk membangunkan Sistem maklumat Pelajar Sekolah Putera Afnan Phase Phase X System Design Implementation Testing Documentation Maintenance (a) Identify and explain briefly Phase x in system development from Figure above. Kenalpasti dan terangkan secara ringkas fasa x dalam pembangunan sistem pangkalan data dari rajah di atas. [2 M] (b) State two benefit of using Student Information System of Sekolah Putera Afnan Nyatakan dua kelebihan menggunakan Sistem Maklumat Pelajar Sekolah Putera Afnan [3 M] (c ) Explain the meaning of database. Terangkan maksud pangkalan data. [2 M] END OF QUESTION PAPER KERTAS SOALAN TAMAT 19 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
1. (i) First Generation / 1st G (ii) Fifth Generation / 5th G 2. (i) communication / komunikasi (ii) software / perisian Section A [36 Marks] 3. R text / teks S audio / bunyi 4. B (Random Access Memory / RAM / Primary Storage accept this answers if found) 5. A 6. (i) R (ii) S word processing / pemproses perkataan spread sheet / Hamparan elektronik 7. False 8. False 9. TRUE 10. Fiber optic cable 11. True 12. Persembahan 1 13. (i) P Project Manager (ii) Q Instructional Designer 14. Text editor / Penyunting teks 15. B 16. Design Phase 17.
P Q 1 st generation programming language / 1GL 2 nd generation programming language / 2GL 18. A 19. Interpreter, Assembler 20. (i) M string (ii) N double 21. Mathematica Operators Comparison Operators Y Example : +, -, *, / Example : >, <, =,<> Example
(a) (b) Name Y - logic / logik and, or, not (either one) 22. (i) S DATABASE (ii) T RECORD 23. DBMS (Database Management System) / Sistem Pengurusan Pangkalan Data / SPPD / RDBMS 24. a) KP b) Unique for every pupil 25. B 26. a) Computer A and Computer C IP address are different. Section B [20 marks] b) IP address of Computer A : 10.65.237.20 IP address of Computer B : 10.65.237.25 (IP must be different) 27. a) Structured Programming Approached Structured programming approached uses a top down design model. Object Oriented Programming Approached OOP approach uses objects The programmer breaks down the original set of requirements into smaller, more manageable section. The programmer packages the data and the program into a single unit, an object. Structured programming approached does not provide a way to keep the data and the program together. Each program has to define how it will use the data and it can result in redundant programming code that must change every time the structure of the data changes When the structure of an object changes, any program that accesses the object automatically accesses the change 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
b) Visual Basic programming language uses both an interpreter and a compiler. The programmer can use the interpreter during program development. When the program is complete and error free, the programmer can compile the program so it runs faster when it is placed into production for users to execute. (2 marks) 28. a) Network Topology Mewah Bank Berjaya Bank Used Bus Topology Used Star Topology Has a single central cable Has central host and all nodes (backbone) and all nodes connect to connect to it it Central cable (backbone) failure, Central host failure, network will fail network will fail Or others relevent answers. b) (i) Internet technology (ii) Internet technology : Used to connect and link to various organisation especially banking organisation such as between Mewah Bank and Berjaya Bank for online business purposes. Used to access global information and for instant communication anywhere and anytime within the coverage area of Wide Area Network (WAN). Or others relevent answers. 29. a) Linear interactivity, Non-linear interactivity b) X implementation Y design 30. a) Perisian dan prosedur ( 2 markah ) Software and Procedure ( 2 marks) b) 1. Manusia menggunakan perkakasan komputer untuk mamasukkan data Perkakasan akan digunakan untuk memaparkan data-data yang terlibat People use computer hardware to add data Hardware will be used to display the data involved 2. Manusia menentukan dan memilih jenis data yang perlu dimasukkan Manusia memasukkan data ke dalam sistem dan memastikan ketepatan data Human determine and select the type of data to be included Human enter data into the system and ensure data accuracy ( 2 marks) 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
31. a) Input Process Etc: dan sebagainya Section C [14 marks] Name, Class, IC Number Verify students data and check all fields are filled Output b) Flow chart Print Curiculum Unit (Memenuhi Kriteria / Syarat) Print Error Message (Data Tidak Lengkap / Data Tidak Sah) Begin Key in students data Name, Class, IC No Verify students data Print Error Message If all fields are filled Print Curiculum Unit 32. Malicious code attack Serangan kod jahat End 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT
2 examples : virus, spyware, adware, browser hijacker, worm, trojan horse, logic bomb. (any two) a) 2 reasons : - User opens an infected files - User runs an infected program - No anti virus installed in the computer - User used infected storage devices - No anti spyware installed (any two) 2 ways to prevent : - Install anti virus - Install anti spyware - Scan the files before using the computer - Scan virus - Update anti virus - Install firewall - Scan the storage devices - Do not open file / email from unknown resource - Do not download files from untrusted sides (any two) 33. Analysis Phase ( Phase x ) i ) Problem defined and analysis ii) analysis end user need and organization needs iii) analysis existing hardware and software system iv) understand system functional areas,actual and potential problem (a) Benefits of Student Information System Sekolah Seri Saujana i ) Reduced data redundancy of student ii ) Improved data integrity of student iii ) Shared student data iv) Easier access to student data (c ) Database Is a collection of data organised in a manner that allows Access,retrival and use of that data Data include text, numbers, images,audio and vedio. END OF QUESTION PAPER KERTAS SOALAN TAMAT 3765/1 (C) 2011 Hakcippta JPN Melaka SULIT