sijil pelajaran malaysia 2009 3765/1 · pdf filejabatan pelajaran negeri sarawak zon a kuching...

17
JABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas 1 Oktober 2 ½ jam Dua jam tiga puluh minit JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU 1. Tulis nombor kad pengenalan dan angka giliran anda pada ruang yang disediakan dan semua buku jawapan. 2. Kertas soalan in adalah dalam dwibahasa. 3. Anda boleh menjawab kertas soalan ini dalam bahasa Melayu dan bahasa Inggeris sepenuhnya atau sebahagian dalam Bahasa Melayu dan sebahagian dalam bahasa Inggeris. 4. Kertas soalan ini mengandungi tiga bahagian: Bahagian A, Bahagian B dan Bahagian C. 5. Jawapan untuk Bahagian A hendaklah ditulis di ruang yang disediakan pada Helaian Jawapan. 6. Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yang dibekalkan. 7. Anda dikehendaki menceraikan Helaian Jawapan dan menyerahkannya kepada Ketua Pengawas bersama-sama dengan buku jawapan anda. Kertas soalan ini mengandungi 17 halaman bercetak dan 1 halaman tidak bercetak

Upload: phungdan

Post on 04-Mar-2018

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

JABATAN PELAJARAN NEGERI SARAWAK

ZON A KUCHING

SIJIL PELAJARAN MALAYSIA 2009 3765/1INFORMATION AND COMMUNICATION TECHNOLOGYKertas 1Oktober

2 ½ jam Dua jam tiga puluh minit

JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU

1. Tulis nombor kad pengenalan dan angka giliran anda pada ruang yang disediakan dansemua buku jawapan.

2. Kertas soalan in adalah dalam dwibahasa.

3. Anda boleh menjawab kertas soalan ini dalam bahasa Melayu dan bahasa Inggerissepenuhnya atau sebahagian dalam Bahasa Melayu dan sebahagian dalam bahasaInggeris.

4. Kertas soalan ini mengandungi tiga bahagian: Bahagian A, Bahagian B dan BahagianC.

5. Jawapan untuk Bahagian A hendaklah ditulis di ruang yang disediakan pada HelaianJawapan.

6. Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yangdibekalkan.

7. Anda dikehendaki menceraikan Helaian Jawapan dan menyerahkannya kepada KetuaPengawas bersama-sama dengan buku jawapan anda.

Kertas soalan ini mengandungi 17 halaman bercetak dan 1 halaman tidak bercetak

Page 2: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

2

Nama Calon:

No. Kad Pengenalan - - Answer Sheet

Angka Giliran Helaian Jawapan

Question No.No. Soalan

Candidate’s AnswerJawapan Calon

Marks

Markah1 1

2 (i) 2(ii) 3

3 (i) 4(ii) 5

4 6

5 (i) 7(ii) 8

6 (i) 9(ii) 10

7(i) 11

(ii) 12

8(i) 13

(ii) 14

9 15

10 16

11 17

12 18

13 19

14(i) 20

(ii) 21

15 22

16(i) 23

(ii) 24

17 25

18(i) 26

(ii) 27

19 28

20 29

21 30

22(i) 31

(ii) 32

23(i) 33

(ii) 34

24 35

25 36

Page 3: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

3

Section A

[36 marks]

Answer all questions. Write your answers in the spaces provided in Answer Sheet. Each answercarries one mark.

Each answer carries one mark.

1 A system of moral standards or values used as a guideline for computer users is known as

A. cyber laws

B. code of ethics

C. cryptographies

D. computer securities

2 State whether the following statements are True or False.

(i) We can control access to pornography by turning on the firewall in the computer.

(ii) A firewall is a hardware or software that is used to protect your computer againstpeople or programs that try to connect to your computer without invitation.

3 Figure 1 shows the process of cryptography.

Figure 1

Based on Figure 1, identify

(i) X(ii) Y

4 Statement 1 describes a type of security threat.

It is typically carried out by e-mail or instant messaging.

It is an example of social engineering techniques used to fool users.

It often directs users to enter details at a fake website whose look and feel are almostidentical to the legitimate one.

Statement 1

Based on statement 1, identify the threat.

A. Hacking

B. Phishing

C. Spyware

D. Malicious code

Plaintext Ciphertext PlaintextX Y

Page 4: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

4

5 Figure 2 shows the examples of input and output devices.

A B

C D

Figure 2

Based on Figure 2, write A, B, C or D to indicate the output device used for

(i) graphics

(ii) audio

6 Figure 3 shows a computer motherboard.

Figure 3

Based on Figure 3, name

(i) M(ii) N

M

N

Page 5: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

5

7 Figure 4 shows the interface of application software R and S.

R S

Figure 4

Based on Figure 4, identify the type of application software used in

(i) R(ii) S

8 Figure 5 shows the computer network used by Yu Seng Sdn Bhd and Harmony Sdn Bhd.

Yu Seng Sdn Bhd Harmony Sdn Bhd

Figure 5

Based on Figure 5, name the computer network type for

(i) Yu Seng Sdn Bhd

(ii) Harmony Sdn Bhd

9 State whether the following statement is True or False.

Local area networks are designed to share data and resources among several computerswithin a building.

Page 6: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

6

10 The network architecture where all computers have equal status and share resources isknown as ………………..

11 Statement 2 describes a network topology.

- It is easy to implement, only add nodes to the host.- The failure of a node does not affect the entire LAN.- Every node must connect to the host in order to communicate.- The host will control the flow of communication in the network.

Statement 2

The network topology is ……………………….

12 Which of the following are communication devices:

I. Router

II. Hub/Switch

III. Coaxial Cable

IV. Internal Modem

A. I, II and III

B. I, II and IV

C. I, III and IV

D. II, III and IV

13 Figure 6 shows part of the multimedia courseware.

Figure 6

In terms of interactivity, Figure 6 is an example of …………………multimedia.

Page 7: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

7

14 Figure 7 show two hardware used to produce multimedia products.

A B

Figure 7

Based on Figure 7, name

(i) A

(ii) B.

15 Figure 8 shows software X used to produce a multimedia element.

Figure 8

Based on Figure 8, identify the software type for X.

A. Audio editor

B. Video editor

C. Animation editor

D. Graphics and image editor

Page 8: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

8

16 Table 1 shows the roles of some members in a multimedia development team.

Member Roles

XDo research on the content of the multimedia program.

Provide access to source materials and reference items.

YWrite the program code lines or scripts using the authoring tool.

Develop the rapid prototype, upon which the final product is based.

ZDefine the scope of a project and discuss with the client.

Search for financial resources, equipment and facilities

Table 1

Based on Table 1, identify the member who holds the following position. Write X, Y or Z.

(i) Project manager

(ii) Subject matter expert

17 A set of words, symbols and codes that enables human to communicate with computers isknown as _________________________ .

18 State whether the following statements are True or False.

(i) An assembly language programmer writes instructions using symbolic instructioncodes that are meaningful abbreviations or mnemonics.

(ii) A structured programming approach is a programming approach that break bigproblems into smaller problems, then further break those into still smaller problems,and so on, until a level of such simplicity is reached.

19

Figure 9

Based on Figure 9, a program that translates the language in (a) to the language in (b) iscalled ____________.

20 Which of the following is a logical operator?

A. OR

B. MINUS

C. DIVIDE

D. CONSTANT

LOAD R1 5LOAD R2 5ADD R0 R1 R2SAVE R0 6HALT

10000001001001011000000101000101101000010000011010000010000001101111111111111111

translate

(a) (b)

Page 9: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

9

21 Figure 10 shows the flowchart for a program

Figure 10

Based on Figure 10, the flowchart uses

A. selection control structure.

B. sequence control structure.

C. repetition control structure.

D. consecutive control structure.

22 Figure 11 shows the five components of an information system.

Figure 11

No

START

READMark

PRINT“Fail”

STOP

Mark>=35?

PRINT“Pass”Yes

X

Y

Page 10: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

10

Based on Figure 11, name component

(i) X

(ii) Y

23 Column A of Table 2 describes information system P and Q. Column B lists four types ofinformation system.

A B

P - often tied to other systems

- serves the most elementary day-to-day activities ofan organisation

- usually has high volumes of input and output

DSS

ES

Q - contain acquired expert knowledge

- usually contain two components: a knowledge baseand an inference engine program

- built with decision-making rules

MIS

TPS

Table 2

Based on Table 2, identify the type of information described in

(i) P

(ii) Q

24 State whether the following statement is True or False.

A database management system is a collection of programs which allow data to be stored,retrieved, and updated. Information can be generated through queries and reports.

25 During phase P in the development of SMS Information System, the following activities arecarried out.

- receive request for modification due to system failure and to enhance part of thesystem

- fix failure and enhance system

- deliver new version

What is phase P?

Page 11: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

11

SECTION B

[20 marks]

This section consists of five questions. Answer all questions.

26 Figure 12 shows two different types of computer storage.

X Y

Figure 12

Based on Figure 12,

(a) State two differences between X and Y. [2 marks]

(b) State two reasons why Y is required by the computer user. [2 marks]

27 Figure 13(a) shows the network configuration and Figure 13(b) and 13(c) shows the twoping result from a computer with IP address 10.188.192.50.

(a)

Figure 13

IP: 10.188.195.18

Subnet mask : 255.255.255.0

IP: 10.188.192.50

Subnet mask : 255.255.255.0

IP: 10.188.192.29

Subnet mask : 255.255.255.0

Page 12: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

12

(b)

(c)

Figure 13

Based on Figure 13,

(a) Explain the ping result shown in (b). [2 marks]

(b) Assume that all network connections and NIC are in good condition, explain whythe ping result returns Destination Host Unreachable in (c). [2 marks]

28 Figure 14 shows an interface of a multimedia product.

Figure 14

X

Page 13: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

13

Based on Figure 14,

(a) Identify one CASPER design principle that is not applied. Justify your answer.

[2 marks]

(b) Identify a hardware used to produce element X. Justify your answer.

[2 marks]

29 Figure 15(a) shows part of the code used and Figure 15(b) shows an error messagedisplayed during a program execution.

Private Sub cmdCalculate_Click()

Dim dblWeight As Double, dblHeight As Double, dblBMI As DoubleConst strMSG As String

dblWeight = Val(txtWeight.Text)dblHeight = Val(txtHeight.Text)strMSG = "Your BMI is "

dblBIM = dblWeight / (dblHeight * dblHeight)

lblDisplay.Caption = strMSG & FormatNumber(dblBMI, 2)

End Sub

(a)

(b)

Figure 15

Base on Figure 15,

(a) Identify the type of error uncovered during the program execution and write the correctcode for the mentioned error. [2 marks]

(b) State two differences between strMSG and dblBMI. [2 marks]

Page 14: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

14

30 Figure 16 shows part of the Inventory Information System of SMK Batu Karang.

Figure 16

Based on Figure 16,

(a) State the relationship between STAFF_INFO table andSTAFF_REQUEST_STATIONERY table. Justify your answer.

[2 marks]

(b) Design the form for STAFF_RECORD_STATIONERY table.

[2 marks]

Page 15: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

15

SECTION C

[14 marks]

This section consists of three questions. You are required to answer two questions only:

(i) Question 31 is compulsory, and

(ii) Either Question 32 or Question 33.

31 A group of teachers from a neighbouring country is visiting your school, SMKCemerlang. As the school head prefect, you are given the task by your principal toproduce a multimedia presentation which will introduce your school prefect board tothem. Your multimedia presentation must be informative, interactive and include theorganisation chart, history, objective and a video clip showing some activities of yourboard.

Based on the information given,

(a) Write a suitable problem statement which includes project title, objective andtarget audience. [3 marks]

(b) Design the interface for the main page. [4 marks]

32 Figure 17 (a) shows the program interface and the output of the program to find the resultof an ICT mark. Figure 17 (b) shows part of the program code.

(a)

(b)

Figure 17

Private Sub cmdCheck_Click()Dim Mark As Integer

Mark = Val(txtMark.Text)If Mark >= 40 Then

MsgBox "Congratulation, you PASS the ICT test.", vbInformation, "Pass"Else

MsgBox "Sorry, you FAIL the ICT test.", vbInformation, "Fail"End If

End Sub

Page 16: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

16

Based on Figure 1,

(a) create a flowchart [5 marks]

(b) complete the table below [2 marks]

Input Output

40

15

33 Figure 18 (a) and Figure 18 (b) shows the online reservation form for Hotel Selesa.

(a)

(b)

Figure 18

Hotel Selesa

Guest Particulars

Guest Name:

Gender:

Passport No:

Address:

Contact No:

Email Add:

Reservation Info

Reservation ID

Date Check-in:

Date Check-out:

Arrival Time:

Departure Time:

Room Type:

Method of Payment:

Page 17: SIJIL PELAJARAN MALAYSIA 2009 3765/1 · PDF fileJABATAN PELAJARAN NEGERI SARAWAK ZON A KUCHING SIJIL PELAJARAN MALAYSIA 2009 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas

SULIT 3765/1

3765/1 © Zon A Kuching, SARAWAK SULIT

17

Based on Figure 18,

(a) Design two tables to store the data in (a) and (b). State the fields and the primarykey for each table. Show the relationship between the two tables.

[4 marks]

(b) Describe a query to list the guest checking in on the 10 October 2009. The queryshould include the following:

Guest Name

Date of Check-in

Room Type

Method of Payment

[3 marks]