You are on page 1of 6

Skema jawapan PPT form 5 2012

1

3765/1 @Hak cipta SMK Kepong Mei 2012



SECTION A
1
i communication 1
ii software 1
2 A 1
3
ii 4 1
iv 2 1
4 D 1
5 character 1
6 2
20
atau 1 048 576 1
7
i B 1
ii C 1
8
i C 1
ii A 1
9
i C 1
ii D 1
10
i Peer to peer 1
ii Client server 1
11 Virtual Private Network / VPN 1
12 Modem 1
13
i Infrared 1
ii X 1
14 False 1
15
i Text editor 1
ii Notepad / wordpad / PSPad 1
16 B 1
17 C 1
18
i Icon-based 1
ii Card-based 1
19 B 1
20 second 1
21 B 1
22 False 1
23
i Interpreter 1
ii Compiler 1
24 String 1
25
i Selection control 1
ii Sequence control 1
JUMLAH 36
Skema jawapan PPT form 5 2012
2

3765/1 @Hak cipta SMK Kepong Mei 2012


BAHAGIAN B
26.
























Mana2 dua
jawapan markah
adalah 2
Skema jawapan PPT form 5 2012
3

3765/1 @Hak cipta SMK Kepong Mei 2012


27.







28.




29.











Skema jawapan PPT form 5 2012
4

3765/1 @Hak cipta SMK Kepong Mei 2012



30.
BAHAGIAN C
31. a) identity : if they answer virus, so examples other then virus and seterusnya.
2 examples: virus, spyware, adware, browser hijacker, worm, Trojan horse, logic bomb.
(Any two)
b) 2 reasons:
- User opens an infected files
- User runs an infected program
- No anti virus installed in the computer
- User used infected storage devices
- No anti spyware installed
(any two)
2 ways to prevent:
- Install anti virus
- Install anti spyware
- Scan the files before using the computer
- Scan virus
- Update anti virus
- Install firewall
- Scan the storage devices
- Do not open file / email from unknown resource
- Do not download files from entrusted sides
(any two)

Skema jawapan PPT form 5 2012
5

3765/1 @Hak cipta SMK Kepong Mei 2012



32.























Skema jawapan PPT form 5 2012
6

3765/1 @Hak cipta SMK Kepong Mei 2012

You might also like