You are on page 1of 11

1

Soalan-Soalan Berdasarkan Subtopik


( Soalan-Soalan SPM Sebenar 2007-2014)

SMK RAJA MUDA MUSA


BESTARI JAYA SELANGOR

(INTRODUCTION OF ICT)

NAMA

TINGKATAN :

4..

1.1

Introduction to Information Technology


1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1 Define ICT.
1.1.1.2
Describe the brief evolution of computers.
SECTION A
1.
State the name of the first generation computer.
Nyatakan nama komputer generasi pertama
2008)

(SPM

sppangsess@gmail.com ( http://rmmict.blogspot.com )

2.

Figure 1 shows three technologies used in the generations of computers


Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.
(SPM 2010)
Based on Figure 1, write A, B or C to match
following:
Berdasarkan Rajah l, tulis A, B atau C
untuk dipadankan dengan berikut:
(i)
Second Generation /
Generasi Kedua
...................
(ii)
Third Generation /
Generasi Ketiga
.

the

Figure 1 / Rajah 1
3..

Complete the following statement: / Lengkapkan pernyataan berikut.


Information
and
Communication
Technology
is
the
use
of
computers,
( i) ...........................devices and( ii) ......;:......................applications for processing,
storing, retrieving, protecting and transmitting information from anywhere at anytime.
Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i)
......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan ,
mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat
pada bila-bila masa.
(SPM
2010)

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce


1.1.2.1 List the usage of ICT in everyday life.
SECTION A
1.1.2.2 State the differences between computerised and non-computerised systems.
SECTION A
1.

Table 1 shows the charecteristics of the operation mode ini Company A and Company B.
Jadual menunjukkan cirri mod operasi dalam Syarikat A dan Syarikat B
(SPM 2014)
-

Company A / Syarikat A
Using bollboard to advertise new
product

Company B / Syarikat B
Promote new product at
company/s website

sppangsess@gmail.com ( http://rmmict.blogspot.com )

Menggunakan papan iklan untuk


mengiklan produk baharu
Receive customer order by
telephone
Menerima tempahan pelanggan
melalui telefon
All transactions recorded in
forms
Semua urusniaga direkod dalam
borang
Table 1 / Jadual 1

Mempromosikan produk
baharu di sesawang syarikat
Receive customer order by
email
Menerima tempahan
pelanggan melalui email
All transactions recorded in
electronic forms
Semua urusniaga direkod
dalam borang elektronik

Based on Table 1, state the operation mode use in :


Berdasarkan jadual 1, nyatakan mod operasi yang digunakan dalam :
i.
ii.

Company A / Syarikat A
.
Company B / Syarikat B
.

1.1.2.3 State the impact of ICT on society.


1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy,
Computer Crime and Cyber Law.
SECTION A
1.
2011)

Table 1 shows the characteristics of X and Y in computer usage guideline.


Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan
komputer.

X
Moral guidelines for computer users.
Garis panduan moral untuk pengguna komputer.
No penalty or punishment.
Tiada penalti atau hukuman.

(SPM

Y
Rules for computer users.
Peraturan-peraturan untuk pengguna
komputer.
Penalties or punishments imposed.
Penalti atau htLkuman dikenakan.

sppangsess@gmail.com ( http://rmmict.blogspot.com )

4
Table 1 / Jadual 1l
Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:
(i)
X

(ii)
Y

2.

Table 2 shows terms which are related to computer ethics and legal issues
Jadual 2 di bawah menunjukkan terma berkaitan etika komputer dan undang-undang
(SPM 2014)
A
Privacy
Keadaan berahsia
B
Intellectual property
Hak Intelektual
C
Cyber Law
Peraturan Siber
D
Computer ethics
Etika komputer
Table 2 / Jadual 2

Based on Table 2, write A,B,C or D to match the following statements


Berdasarkan jadual 2, tulis A,B, C atau D untuk dipadankan dengan pernyataan berikut
(i)

Standards moral conduct in the use of computers


Standard perlakuan bermoral dalam penggunaan komputer
.

(ii)

The right of and individual to restrict the collection and use of personal data
Hak individu untuk mengehadkan pengutipan dan penggunaan data peribadi
.

1.2.1.2 Differentiate between ethics and law.


1.2.1.3 State the need for intellectual property laws.
1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
SECTION B
1.

The following is a statement on information privacy.


Pernyataan berikut berkaitan keperibadian maklumat
(SPM 2007)
Information privacy refers to the right of individuals and organisations to
deny or restrict the collection and use the information about them
Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk
menafi atau mengelakkan hasil dan maklumat mereka digunakan.
Based on the statement, list four ways of making personal data more private.
Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi
lebih peribadi
i) .

sppangsess@gmail.com ( http://rmmict.blogspot.com )

5
ii) .
iii) .
iv) ..
1.2.2.2 State authentication and verification methods/technologies.
SECTION A
1.

Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti
biometrik.
(SPM 2009 )
Based on Figure l, / Berdasarkan Rajah 1,
(i)
State the name of the device. / Nyatakan nama
peranti itu.

(ii)
State the function of the device / Nyatakan fungsi
peranti itu.

2.

Figure 1 shows information on two types of authentuication methods.


Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan

(SPM 2012)

Authentication methods
Kaedah pengesahan

Taxi services booking /


tempahan perkhidmatan
teksi
Purchase using credit card /
pembelian menggunakan
kad kredit

- Retinal scanning /
pengimbasan retina
- voice recognition /
Pengecaman suara

Based on figure 1 , state the name of / berdasarkan rajah 1, namakan


i. P ..
ii.
Q .
1.2.3 Controversial Contents and Control
1.2.3.1 List effects of controversial contents on society: Pornography Slander
1.2.3.2 Describe the process of filtering to control access to controversial contents
SECTION A

sppangsess@gmail.com ( http://rmmict.blogspot.com )

6
1.

Figure 2 shows part of an algorithm for a web page filter.


Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.

(SPM 2009)

Figure 2 / Rajah 2
State the filtering method used in the algorithm.
Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
..

2.

Figure 2 shows the display of an internet filtering software


Rajah 2 menunjukkan paparan pada satu perisian penapisan internet
(SPM 2012)

FILTERING SETTINGS

Restricted List
http://www.seperti.com
http://www.jalan.com
START

Figureaccess
2 REMOV
/ Rajah 2
ADD User
Based on Figure
2
,
state
the
a web page
E method used
Berdasarkan rajah 2 nyatakan kaedah yang digunakan

EXIT

.
A
3.

Figure 1 shows the keyword blocking process


Rajah 1 menunjukkan proses penapisan kata kunci

YES

Contained
banned
words?

(SPM 2013)

NO
C
sppangsess@gmail.com ( http://rmmict.blogspot.com )

STOP

Figure 1 / Rajah 1

Based on figure 1 write A,B or


C to match the following
statement
Berdasarkan rajah 1, tuliskan
A,B atau C untuk dipadankan
dengan pernyataan berikut
i.
Page download stops
Muat turun laman
berhenti
..
ii.
Search for banned
words
Mencari perkataanperkataan yang
diharamkan
..

1.2.4 Computer Crimes


1.2.4.1 Explain the need for Cyber Law.
SECTION A
1.
Cyber law is a system of moral standards or values used as a guideline for computer
users. (T/F)
Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang digunakan
sebagai pedoman bagi pengguna komputer
TRUE / FALSE
(SPM
2007)
1.2.4.2 Explain briefly the computer crimes below: Fraud Copyright Infringement
Theft Attacks
1.3 Computer Security
1.3.1 Definition
1.3.1.1 Define computer security.
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:
Malicious code Hacking Natural disaster Theft
SECTION B
1.
Figure 12 shows a pop-up message to computer users.
Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer

(SPM 2011)

Figure 12 /
Rajah 12
Based on Figure 12: / Berdasarkan Rajah 12:
(a)
State two ways that causes the pop-up message to appear on the
computer screen.
Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di

sppangsess@gmail.com ( http://rmmict.blogspot.com )

8
skrin komputer.

(b)

2.

[2 markah]
State two kinds of serious damages if a user ignore the message.
Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.

[2 markah]

Read the following warning


Baca amaran berikut

(SPM 2013)

Never open an email attachment unless you are expecting the


attachment and it is from the trusted source
Jangan buka email yang dikepilkan kecuali anda menjangkakan kepilan
tersebut dan ia datang dari sumber yang dipercayai
Based on the warning statement
Berdasarkan pernyataan amaran itu
a.

Explain why the warning important


Terangkan mengapa amaran itu penting
2 markah

b.

i.

What precaution should you take if you cannot follow the given warning?
Apakah langkah berjaga-jaga yang seharusnya diambil jika anda tidak
dapat mematuhi amaran yang diberi?
1 markah

ii.

Justify your answer


Beri justifikasi jawapan anda
1 markah

SECTION C
1.

Figure 20 shows symptoms of a computer problem


Rajah 20 menunjukkan simptom pada sebuah komputer.
-

(SPM 2010)

Screen displays unusual messages


Skrin memaparkan mesej pelik
Files become corrupted
Fail menjadi rosak
Fies mysteriously appear
Muncul fail yang menjadi tanda Tanya

Figure 20 / Rajah 20
Based on Figure 20: / Berdasarkan Rajah 20:

sppangsess@gmail.com ( http://rmmict.blogspot.com )

9
(a)

Identify the type of computer threat which matches the symptoms.


Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.
i.
.
State two different examples of the threat. / Nyatakan dua contoh berlainan bagi
ancaman itu.
ii.

i.

(b)

Describe two reasons why the computer may have been affected by the threat in
(a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
.................................................................................................
.................................................................................................
.................................................................................................

1.3.3 Security Measures


1.3.3.1 Select the appropriate security measures to overcome the identified computer threats
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography Firewall Data backup Human
aspects
SECTION A
1.
Figure 3 shows how cryptography works
Rajah 3 menunjukkan bagaimana kriptografi bekerja.
(SPM 2007)

Plaintext

Encrypt

Decrypt

Plaintext

Name H : / Namakan H :
2.

Table 2 shorws the steps of using anti-virus software which is not in the
correct sequence.
Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak
mengikut urutan yang betul.
(SPM 2011)
Complete the step. Step 1 and 3 are given.
Lengkapkan langkah itu. Langkah I dan 3 diberi.
Choose anti virus software/Pilih perisian anti virus
(i)
1
Take necessary action /Ambil tindakan yang perlu
(ii) ..
Scan the selected area /Imbas kawasan yang dipilih
(iii)
3
Select area to be scanned /Pilih kawasan yang akan diimbas
(iv) ..
Table 2 /Jadual 2
(ii)

(iv)

3.
out

Ali has send a confidential file to Sandra using email. Rearrange the activities carried
by Ali in the correct sequence.
Ali perlu menghantar satu fail sulit kepada Sandra menggunakan email. Susun semula
aktiviti yang dijalankan oleh Ali mengikut urutan yang betul.
(SPM 2013)
P
Decrypt file / Menyahsulit file
Q
Open file received to view contents
Buka fail yang diterima untuk melihat kandungan

sppangsess@gmail.com ( http://rmmict.blogspot.com )

10
R
S
T
SECTION B
1.

Select file to send


Pilih fail yang akan dihantar
Encrypt file
Enkripsi fail
Attach file to email
Kepilkan fail pada email

Figure 15 shows the scan summary when an antivirus program is used.


Rajah 15 menunjukkan laporan ringkas imbas bila program antivirus digunakan
(SPM 2014)

Status:
The scan has finished
Last Object:
J:\merged_partition_content\50GB AV scan test
bundle\...mcw10.exe
100%

Last detection: ADWARE/Adware.Gen2


Virus.informatiom
Scanned files:
Detections:
1583192
5
Scanned directories:
Suspicious files:
26448
0
Scanned archieves:
Warnings:
27945
52
Used time:
Objects
End
Repor scanned:
3:39:57
0
t
Scanned :
Hidden objects:
100%
0

Figure 15 / Rajah 15

Based on figure 15; /Berdasarkan rajah 15;


a)
List two steps to carry out the task
Senaraikan dua langkah untuk melaksanakan tugas itu

[2 marks/2markah]

b)

State two actions that can be taken to remove the untreated threats.
Nyatakan dua tindakan yang boleh diambil untuk mengalihkan ancaman yang
tidak dapat dirawat.
[2 marks/2markah]

sppangsess@gmail.com ( http://rmmict.blogspot.com )

11

SEMAKAN
Tarikh

Topik / Sub topik

Tanda tangan
Guru

Catatan

1.2 Introduction to Information Technology


1.1.2 Overview of Information and Communication
Technology (ICT)
1.1.2.1Define ICT.
1.1.1.3Describe the brief evolution of computers.
1.1.2 ICT In Everyday Life: Education, Banking,Industry
and Commerce
1.1.2.1 List the usage of ICT in everyday life.
1.1.2.2 State the differences between
computerised and non-computerised systems.
1.1.2.3 State the impact of ICT on society.
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of
Ethics,Intellectual Property, Privacy, Computer
Crime and Cyber Law.
1.2.1.2 Differentiate between ethics and law.
1.2.1.3 State the need for intellectual property
laws.
1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
1.2.2.2 State authentication and verification
methods/technologies.
1.2.3 Controversial Contents and Control
1.2.3.1 List effects of controversial contents on
society: Pornography Slander
1.2.3.2 Describe the process of filtering to control
access to controversial contents.
1.2.4 Computer Crimes
1.2.4.1 Explain the need for Cyber Law.
1.2.4.2 Explain briefly the computer crimes
below: Fraud Copyright Infringement Theft
Attacks
1.3 Computer Security
1.3.1 Definition
1.3.1.1 Define computer security.
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to
computer security: Malicious code Hacking
Natural disaster Theft
1.3 Computer Security
1.3.3 Security Measures
1.3.3.1 Select the appropriate security measures
to overcome the identified computer threats
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography
Firewall Data backup Human aspects

sppangsess@gmail.com ( http://rmmict.blogspot.com )

You might also like