You are on page 1of 8

Soalan-Soalan Berdasarkan Subtopik

( Soalan Percubaan ICT SPM Negeri-negeri 2013 dan Soalan SPM Sebenar 20082013)

Buku jawapan

Jawapan LA1
1.1.1.2 Describe the brief evolution of computers.
Section A
1.
ENIAC
2.
(i)
C
(ii)
A
3.
(i)
Communication/Komunikasi (ii)
Software/Perisian
4.
Pertama/1st
5.
B
6.
i.Transistor
ii.Microprocessor
7.
A
1.1.2.1 List the usage of ICT in everyday life.
Section A
1.
Perbankan
2.
B

m/s
m/s
m/s
m/s
m/s
m/s

2
2
2
2
3
3

m/s 4

m/s 4
m/s 4

1.1.2.2 State the differences between computerised and non-computerised


systems.
Section B

1.
System A (Non Computerised Banking)

m/s 5
System B (Computerised Banking)

Banking activities was done manually


by taking deposits directly

Transactions are done by using


computers

Pihak bank melaksanakan deposit


secara manual

Transaksi dilaksanakan menggunakan


komputer

Transactions can only be made during


working hours

Transaction can be done at anytime

Transaksi hanya boleh dilakukan pada


waktu bekerja

Transaksi boleh dilakukan pada bilabila masa

Takes time to approve any loan


applications

Online services, phone banking system


and credit cards are available

Memerlukan masa untuk meluluskan


pinjaman

Perkhidmatan atas talian, system


perbankan telefon dan kad kredit
sentiasa tersedia
[2 marks]

1.1.2.3 State the impact of ICT on society.


SECTION A
1.
banking
2.
(i)
Paperless/tanpakertas
(ii)Borderless/tanpa sempadan
3.
D
4.
B

m/s
m/s
m/s
m/s

SECTION B
1
a.

m/s 7

5
6
6
6

EDUCATION BEFORE ICT


EDUCATION WITH ICT
PEMBELAJARAN SEBELUM
PEMBELAJARAN MENGGUNAKAN
MENGGUNAKAN ICT
ICT
Teacher uses blackboard and chalk as Teacher uses overhead projector as
their teaching aids.
one the teaching aids.
Guru menggunakan papanhitam dan
Guru menggunakan projector
kapur dalam pengajaran mereka
sebagai satu cara pengajaran
Teaching and learning is less
Teaching and learning becomes
interesting.
more interesting.
Pengajaran & Pembelajaran kurang
Pengajaran & Pembelajaran lebih
menarik
menarik
Student depends on teacher and
Student can do self access learning
books only.
Murid belajar akses kendiri
Murid bergantung kepada guru dab
buku
*Choose any of the above suggested answer or other relevant answer.
Pilih jawaban di atas atau mana-mana yang relevan
[2 markah]
b.
Education, Banking, E-commerce or Industry.
(any two answers from the list above/mana-mana 2 jawaban di atas))
[2 markah]
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy,
Computer Crime and Cyber Law.
SECTION A
1.
i.
2.
a.
SECTION B
1.
8

ethic
A

ii.
b.

Law
C

m/s 7
m/s 8

The Impact Of ICT On Society

i.
ii.
iii.
iv.
v.

m/s

Faster communication speed Lower communication cost Can share opinions and information Paperless environment Information and communication borderless through internet -

1 fakta + 1 huraian = 2 markah


1.2.1.2 Differentiate between ethics and law.
SECTION A
1.
False / Palsu
2.
False / Palsu
SECTION B

m/s 9
m/s 9

(a) What is the type of misconduct based on the underlined phase above?
m/s 9
Unethical. [ 2 m ]
(b) Explain the negative impact done by Ali towards the school.
i)
ICT results are incorrect and will affect the results of whole school because
lack of security.
ii)
Ali act unfair to other students.
iii)
Bad reputation of school.
iii)
Any relevant answers given by students. [ 2 m ]

1.2.1.3 State the need for intellectual property laws.


1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
SECTION A
1.
True / Benar
2.
Privacy / kebersendirian

m/s 10
m/s 10

SECTION B
1
i.

m/s 10

ii.
iii.
iv.

Purchase goods with cash, rather than credit card


Membeli barang-barang dengan wang tunai, bukannya
kad kredit
Install personal firewall
Pasang firewall peribadi
Clear your history file when you are finished browsing
Kosongkan fail sejarah anda apabila anda selesai melayari
Fill in only information on warranty and registration form
Mengisi maklumat hanya jaminan dan borang pendaftaran

1.2.2.2 State authentication and verification methods/technologies.


SECTION A
1.
i,
Fingerprint reader
ii.
sebagai pengesahan (bergantung kepada jawapan)
2.
i.
P:Callback system
ii.
Q: Biometric
3.
C
4.
Callback system
5.
C
SECTION C
1.
a) (i) Biometric device
is a device that translates personal characteristics into a
digital code that is compared with a digital code stored in the
database.

b)

(ii) Facial Recognition, Hand Geometry Scanning,Iris Scanning


Retinal Scanning, Voice Recognition, Signature Verification
System
Authentication is important in order to safeguard against the
unauthorised access and use.

m/s 11
m/s
m/s
m/s
m/s

11
12
12
12

m/s 13
1M
2M

2M
Any 2 answer

2M

1.2.3.1 List effects of controversial contents on society: Pornography


Slander
SECTION A
1.
m/s 14
i.
Slander/fitnah
ii.
Pornography/pornografi
SECTION B
1.
i) A(slander) can develop society that disregards honesty and truth
- Can lead to bad habits like spreading rumors and gossips
- Can cause bad reputations towards certain organizations or
community.
- Can cause people to have negative attitudes towards another
person.
*accept one suitable answer
B (pornography)

m/s 14

can lead to sexual addiction


- can lead to criminal acts such as rapes, exploitation of
women
- can erode/affect the dignity of good religions, culture,
behaviours and belief
*accept one suitable answer
1.2.3.2 Describe the process of filtering to control access to controversial
contents
SECTION A
1.
Keyword blocking / halangan kata kunci
m/s 15
2.
Site blocking / penapisan tapak
m/s 15
3.
i. B
ii.A
m/s 16
4.
i.Keyword blocking/ Halangan Kata Kunci
m/s 16
ii.Site blocking/ Halangan Laman Web
5.
i.True ii.False
m/s 17
SECTION B
1.
ii)
17

site blocking a software that list the web sites that will be

m/s

blocked. User will be prevented from accessing the web sites


on the list.Web rating system web sites are rating in
terms of nudity, sex, violence,weapons and etc. Web sites
rating can be done by setting the browser or a software
to only accept pages with certain level of rating.
*accept site blocking or web rating system only because the
Question asked refer to figure C. Keyword blocking method is
not shown,therefore is not acceptable.
SECTION C
1. (a)
18

i) keyword blocking

(1 mark)

m/s

(ii) Pilih satu jawapan dan dua huraian


Site Blocking

(1 mark)

(Choose either one answer)


software company maintains a list of dubious Internet sites

(1 mark)

the software prevents access to any sites on this list


denial lists regularly updated
some software provides control over what categories of information you
block
filters can use both site blocking and word blocking
Or
Web Rating Systems

(1 mark)

(Choose either one answer)

Web sites are rated in terms of nudity, sex, violence and language. (1 mark)
The software is responsible for the rating of the websites on the content
browsers set to only accept pages with certain levels of ratings.

(b) DESCRIBE ANY TWO of these points:

cause sexual excitement


erotic behavior
social problem
any related answers

(4 marks)

1.2.4.1 Explain the need for Cyber Law.


SECTION A
1.
False

m/s 19

1.2.4.2 Explain briefly the computer crimes below: Fraud Copyright


Infringement Theft Attacks
SECTION A
1.
C
m/s 19
SECTION B
1.
(a)
Julia. Type of computer crime: Copyright infringement (1 m)
m/s 19
Justification: (1 m)
- The commercial application software is copyrighted. Julia is
only buying a license to use the software, she does not own the
software itself and therefore she is not entitled to redistribute it.
(b)

- integrity and security information


- legal status of online transactions
- privacy and confidentiality of information
- intellectual property rights
- security of government data

any 2 answer 2 m
SECTION C
1. (a) Copyright Infringement
1 mark
m/s
20
(b) Cyber laws are important for television station broadcasting because :
To give protection against the misuse of copying of the televisyen programs or other
computer criminal activities.
Criminal activities can be brought to justice. 1 mark
And any relevant answers provided by students. 1 mark
(c) TWO ways from the human aspect to prevent the above crime are :
The company should provide awareness training to every worker on data security.
The company should expose and emphasize every worker on work etiquette or good
etiquette of work.
Should be honest with our work. 2 marks

And any relevant answer provided by students. 2 marks


1.3.1.1 Define computer security.
1.3.2.1 Explain briefly the different threats to computer security:
Malicious code Hacking Natural disaster Theft
SECTION A
1.
C
m/s 21
2.
i.
P
ii.
R
m/s 21

SECTION B
1.
a.

b.
2.

a,
22
b.

SECTION C
1.
a.
b.

not update antivirus / tidak kemaskini antivirus


m/s 22
User opens an infected files / buka fail yang dijangkiti
No anti virus installed in the computer
Tiada antivirus yang dipasang
i.
Computer become slow / Komputer menjadi lembab
ii
computer system is damaged / sistem komputer rosak
(***cadangan not confirm
Ia penting kerana daripada sumber tidak dipercayai memungkinkan m/s
terkandungkannya virus atau spyware yang boleh mengganggu atau
merosakkan komputer
i.
Komputer mestilah mempunyai perisian antivirus atau
antispyware
ii.
Dengan adanya perisian antivirus atau antispyware
sebarang aktiviti yang boleh merosakkan computer boleh
dikesan dan diambil tindakan seperti
memadam/menghapuskan virus atau spyware
i.
Trojan horse
m/s 23
ii.
worm
iii.
virus
Back up your important files.
At this point it is a good idea to take the time to back up
your files. If possible, compile all of Your photos, documents,
Internet favorites, etc., and burn them onto a CD or DVD
or save them to some other external storage device. It is
vital to note that these files cannot be trusted, since they
are still potentially infected. (Actually, its good practice
to back up your files on a regular basis so that if they do
get infected, you might have an uninfected set you can
restore.)
Sandarkan fail penting anda.
Pada ketika ini, ia adalah idea yang baik untuk mengambil
masa untuk membuat sandaran fail anda. Jika boleh,
menyusun semua gambar, dokumen anda, kegemaran
Internet, dll, dan membakar mereka pada CD atau DVD
atau menyimpannya untuk beberapa peranti storan
luaran yang lain. Adalah penting untuk ambil perhatian
bahawa fail-fail ini tidak boleh dipercayai, sejak mereka
masih berpotensi dijangkiti. (Sebenarnya, ia adalah amalan
yang baik untuk membuat sandaran fail anda secara tetap supaya
jika mereka dijangkiti, anda mungkin mempunyai
set yang dijangkiti yang anda boleh memulihkan.)
Scan your machine.
Since your computer (including its operating system) may
be infected with a malicious program, it is safest to scan
the machine from a live CD (or rescue CD) rather than a
previously installed antivirus program. Many antivirus products
provide this functionality. Another alternative is to use a
web-based vir us removal service, which some antivirus
software vendors offer (try searching on online virus scan).
Or you could just try Microsofts web-based PC Protection
Scan. The next best action is to install an antivirus program
from an uncontaminated source such as a CD-ROM. If you
dont have one, there are many to choose from, but all of
them should provide the tools you need.

Scan mesin anda.


Sejak komputer anda (termasuk sistem operasi) boleh
dijangkiti dengan program berniat jahat, ia adalah yang
paling selamat untuk mengimbas mesin dari CD secara
langsung (atau "penyelamat" CD) dan bukannya satu
program antivirus yang dipasang sebelum ini. Banyak
produk antivirus menyediakan fungsi ini. Alternatif lain
adalah dengan menggunakan berasaskan web vir kami
penyingkiran perkhidmatan, yang menawarkan beberapa
perisian antivirus vendor (cuba mencari di "online virus scan").
Atau anda hanya boleh cuba berasaskan web Perlindungan Imbas
PC Microsoft. Tindakan seterusnya yang terbaik adalah dengan
memasang program antivirus dari sumber yang bersih seperti CDROM. Jika anda tidak mempunyai satu, terdapat banyak untuk
dipilih, tetapi mereka semua harus menyediakan alat-alat yang
anda perlukan
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography Firewall Data backup Human
aspects
SECTION A
1.
2.
3.
4.
5.
6.
25
7.

Chipertext
(ii)
4
(iv)
R,S,T,P,Q
D
D
i.
Anti Spyware
i.P

SECTION B
1.
a)
(b)

ii.

Firewall

m/s
m/s
m/s
m/s
m/s

23
24
24
24
24

ii.Q

m/s 26

(i)
(ii)
(i)

The file has being infected/ attacked by virus.


m/s 27
Scanning the thumb drive using antivirus software.
The computer in ICT room must be install antivirus software to
Prevent data or files for being infected/attacked by viruses.
Kaspersky /Avira / Norton Anti Virus/any relevant anti virus

(ii)

m/s

You might also like