Professional Documents
Culture Documents
(i) ..
(ii) .
X Y
Figure 2 / Rajah 2
Based on figure 1, state types of computer crimes in :
Berdasarkan rajah 1, nyatakan jenis jenayah komputer di :
(i) X
(ii) Y
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
2
Figure 4 / Rajah 4
What is X ? ....
Apakah X ? ....
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
3
Figure 5 / Rajah 5
The software shown in Figure 5 is categorised as ... program.
Perisian yang ditunjukkan dalam Rajah 5 dikategorikan sebagai program
.
Figure 6 / Rajah 6
...............
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
4
Figure 7 / Rajah 7
State the name of the device. / Nyatakan nama peranti itu.
..
X
Illustrate ideas through still picture such as photograph.
Gambaran idea melalui gambar pegun seperti fotografi.
Programmer
P
Pengaturcara
Instruksional Designer
Q
Perekabentuk Pengajaran
Audio Video Technician
R
Juruteknik Audio - Video
Figure 8 / Rajah 8
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
5
Back :
Move to
Home
Quit : Close
Program
Statement 1 / Pernyataan 1
.
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
6
Description /Penerangan
X Translate second generation programming language into machine
language.
Menterjemah bahasa pengaturcaraan generasi kedua kepada bahasa
mesin.
Description /Penerangan
Y Executes instruction line by line until the end of the program.
Menterjemah arahan baris demi baris sehingga akhir program
.
Description /Penerangan
When the program running, the object code is loaded into the memory of
Z the computer and the program instructions begin executing.
Apabila program dilaksanakan, kod object akan dimuatkan ke dalam
memori komputer dan suruhan -
suruhan program mula dilaksanakan.
Table 2 / Jadual 2
a) Assembler :____________
Penghimpun : ______________
b) Compiler : _____________
Pengkompil : ______________
16. The following are activities carried out during program development.
Berikut merupakan aktiviti-aktiviti yang dijalankan semasa pembangunan atur cara
.., . , ., ..I
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
7
Figure 3 / Rajah 3
ii) A set of related components that collects data, processes data and provides
information.
Satu set komponen berkaitan yang mengumpul data, memproses data dan
menyediakan maklumat
Statement 2 / Pernyataan 2
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
8
20. Which of the following statement about primary and foreign key values is true?
Manakah penyataan yang benar berkait dengan kunci utama dan kunci asing?
a. Only primary key values must be unique
Hanya kunci utama mesti mempunyai nilai unik
b. Only foreign key values must be unique
Hanya kunci asing mesti mempunyai nilai unik
c. Both primary and foreign key values must be unique
Kedua-dua kunci iaitu utama dan asing mesti mempunyai nilai unik
d. Neither primary nor foreign key values must be unique
Salah satu samada kunci utama atau kunci asing mesti mempunyai nilai unik
Statement 3 / Pernyataan 3
21. Both activities above are the usage of Information System in ______.
Kedua-dua aktiviti di atas merupakan contoh kegunaan Sistem Maklumat dalam
bidang ______.
A. Education / Pendidikan B. Medicine / Perubatan
C. Management / Pengurusan D. Art / Kesenian
22. Figure 7 shows the hierarchy of data. / Rajah 7 menunjukkan hirarki data.
Figure 11 / Rajah 11
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
9
Manager uses an information system to make the business processes and activities more efficient
compared to doing them manually. The information system provides regular information about the
daily activities of a business to the manager. The information system developed using Database
Management System (DBMS) software.
Pengurus menggunakan suatu sistem maklumat untuk meningkatkan kecekapan dalam proses dan
aktiviti perniagaan berbanding dengan cara manual. Sistem maklumat ini memberikan maklumat
lazim berkaitan aktiviti harian perniagaan kepada pengurus. Sistem maklumat tersebut
dibangunkan menggunakan perisian Sistem Pengurusan Pangkalan Data (SPPD).
Statement 4 / Pernyataan 4
(ii) State one application software use to build DBMS. / Nyatakan satu contoh
perisian aplikasi yang diguna untuk membangunkan SPPD.
Figure 12 / Rajah 12
Based on the figure 12 above, which of the following describe the database object
Berdasarkan rajah 12, yang manakah menunjukkan objek pangkalan data
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
10
25. Figure 13 shows a user interface of an automated library system of SMK Indahjaya.
Rajah 13 menunjukkan antara muka pengguna sistem perpustakaan berautomasi bagi
SMK Indahjaya.
Figure 13 / Rajah 13
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
11
26. Figure 14 show that Susan is surfing the internet. Susan uses the internet facilities for
chatting with her friend at Paris. She also communicates with her lecturer through e-
learning and surf information using Yahoo search engine.
Figure 14 / Rajah 14
i. ...................................
ii. ...................................
b) State TWO examples of web browser used to surf through internet. [2 marks]
Nyatakan DUA contoh pelayar web yang digunakan untuk melayari internet.
[2 markah]
i. ...................................
ii. ...................................
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
12
State the type and function of the computer storage shown in Figure 15(a) and 15(b).
Nyatakan jenis dan fungsi storan komputer yang ditunjukkan dalam Rajah157(a) dan
15(b).
[4 marks][4 markah]
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
Mamat writes a computer program that interacts with the operating system. The program randomly
erases files and displays weird messages. He plans to distribute the programs via e-mail.
Mamat menulis program komputer yang dapat berinteraksi dengan sistem pengoperasian.
Program tersebut memadam fail-fail dan memaparkan mesej-mesej yang aneh secara rawak. Dia
merancang untuk menyebarkan program tersebut melalui mel elektronik.
Statement 5 / Pernyataan 5
28. a. Based on statement 5, explain the kind of computer threat that Mamat has
created? [2 marks]
Berdasarkan pernyataan 5 , jelaskan jenis ancaman komputer yang telah
dicipta oleh Mamat? [2 markah]
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
b. State two ways to avoid this threat from spreading into your computer?
[2 marks]
Nyatakan dua cara untuk mengelakkan ancaman ini merebak ke dalam
komputer anda.[2 markah]
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
13
i. ...............................................
ii. ...............................................
30. Figure 16 shows a process where a translator converts the source code into the
machine codes.
Rajah 16 menunjukkan satu proses penterjemah menukarkan kod sumber kepada kod
mesin.
Figure 16 / Rajah 16
(b) Describe one of the translators that you have stated in (a). [ 2 marks]
Terangkan satu daripada penterjemah yang anda nyatakan di (a)
[2 markah]
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
14
You are given the responsibility to develop a multimedia presentation for the opening
ceremony of Patriotic Month in conjunction with 52 nd Independence Day of Malaysia
using CD based multimedia application.
Statement 6 / Pernyataan 6
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
15
32. Table 4 (a) shows Customers_Data and Table 4 (b) shows Customers_Contact in an
Information System.
Jadual 4 (a) menunjukkan Maklumat_Pelanggan dan Jadual 4 (b) menunjukkan Kontek_
Pelangan dalam satu sistem maklumat
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT
16
b) State one possible reason that causes a network using Topology A fail to
function. [1 mark ]
Nyatakan satu sebab yang mungkin menyebabkan rangkaian yang
menggunakan Topologi A gagal untuk berfungsi [1 markah]
......................................................................................................................................
......................................................................................................................................
.....................................................................................................................................
......................................................................................................................................
3765/1 2015 Hak Cipta Panitia ICT SMK Raja Muda Musa [Lihat halaman sebelah
SULIT