Nama : …………………………… No. Kad Pengenalan : …………………
Tingkatan : 4
Answer Sheet / Helaian Jawapan
Section A / Bahagian A
Question No. Candidate's Answer Marks
No. Soalan Jawapan Calon Markah
1 B 1
2 D 2
3 (i) Fingerprint Recognition 3
(ii) Iris Recognition / hand Geometry / Retinal Recognition/facial 4
recognition/voice recognition/signature verification system
5 (i) D (Computer Theft ) 5
(ii) A (Computer Crime) 6
(iii) C (Computer Attack) 7
6 B 9
7 C 10
8 (i) False 11
(ii) True 12
(iii) False 13
9 B 14
10 B 15
11 (i) Control Unit 16
(ii) Arithemetic Logic Unit 17
12 RAM 18
13 A 19
14 C 20
15 B 21
16 B 22
17 C 23
18 C 24
19 A 25
20 A 26
21 (i) Q 27
(ii) S 28
22 (i) R 29
(ii) S 30
23 (i) R 31
(ii) T 32
24 (i) RJ45 Connector 33
(ii) Cable Stripper 34
25 (i) Radio Waves 35
(ii) Infrared 36
26. a) Two main sectors that used ICT in their management.
b) two (2) differences between worms and viruses
Operate through the network Spread trough any medium
Spread copies of itself as a stand Spread copies of itself as a program
alone program that attaches to other program
27. a) Computer Fraud
Computer fraud is defined as having an intention to take advantage over or causing
loss to other people, mainly on monetary basis through the use of computers.
Copyright Infringement is defined as a violation of the rights secured by a copyright.
28. a) Complete the machine cycle of Central Processing Unit (CPU) below.
b) We transmit information or data by using 2 types of signals namely digital and
29. a) Function of system software
Enables the computer to function properly
Control or maintains the operations of computer and its devices
Serves as the interface between the user, the application software and the
b) Differences between Random Access Memory (RAM) and Read Only Memory
Data and Stores during and after Stored by manufacturer
Content Store information temporarily Stores instructions (information)
Processing Very fast but uses a lot of power Fast but uses very little power
Volatility Volatile Non-volatile
30. a) Define ‘Client’ and ‘Server’ in a client/server network.
A client is a computer which requests services or files from server computer
A server is a computer that shares information and resources with other
computers on a network.
b) Explain what a peer-to-peer network is.
Peer to peer or P2P network is a network with all the nodes acting as both
server and clients. A PC can access files located on other PC and can also
provide files to other PCs. All computers in the peer to peer network has equal
responsibilities and capabilities to use the resources available on the network.
a) Based on Figure 1, draw the information processing cycle in block diagram
Input Process Output
b) Explain two functions of component X.
i.Interprets and carries out basic instructions that operate a computer
ii.Control unit directs and coordinates operations in computer
iii.Arithmetic logic unit (ALU) performs arithmetic, comparison, and logical
c) Differentiate between component Y and component Z
Y(primary storage) Z(secondary storage)
Accessible directly by the processing unit Not accessible directly by the CPU – need
(CPU) – CPU can access the data or to be copied to memory (primary storage)
instructions directly before the CPU can access the data or
Access time – faster, measured in Access time – slower, measured in
nanoseconds (billionths of a second) miliseconds (thousandths of a second)
More expensive and smaller capacity Less expensive and bigger capacity
Stores data from input device or ftom Stores data from input device or from other
secondary storage device e.g. floppy disk secondary storage devices permanently but
for immediate acess must be copied to memory first
Stores data and instructions temporarily,
disappears when power to computer is
Volatile memory – content (data and Nonvolatile – content retained and not lost
instructions lost on failure of power supply even when power is removed
or when the computer is switched off
Can be read and written directly by the CPU Can be read and written but not directly by
– data and instructions can be read and the CPU – data and instructions have to be
written by the CPU copied to memory before they can be read
and written by the CPU
Holds instructions to be executed and data Holds instrunctions and data which have to
to be used with those instructions be copied to memory (primary storage)
before instructions can be executed and
data can be used by the CPU
Holds instrunctions and data while they are
being processed by the CPU
Stores instructions to execute a programme
to allow the CPU to follow instantly the set
d) Mr. Hamdan had installed a few application software on Computer A.
Differentiate between word processing software and spreadsheet software.
Word Processing Software Spreadsheet Software
Used to create, edit and format textual Used to create, edit and format worksheets
documents such as letters, memos, reports,
fax cover sheets, mailing labels, and
Allow user to create, edit, format, print, and Allow users to organize data in rows and
save documents columns
Features include Feature include
Web Page Development
(a) Explain Mr. M’s activity in Figure 11(a).
Mr. M’s using his computer network skill illegally accessing the server at
College ABC. Mr. M’s access the server data without permission. That
mean Mr. M hacks the computer server at College ABC. Mr. M also
changes the data in the examination database in the server. By using his
skill he is paid by other students.
(b) Explain how the activity in Figure 11(a) will affect the college
Hacker changes the examination marks. The examination database is
not valid anymore. So false data will be distributed and the organization
will be unstable. The organizer will try to find where the problem is and
this will increase the cost of maintenance.
(c) Give two other possible threats to the computer security of the college.
disaster such as flood, storm and etc.
ii.Malicious code such as virus and worm.
(d) State one possible measure that can be carried out by the network
administrators in Figure 11(b).
(a) Give the definition of the environment in statement 2 situation.
Information can be stored and retrieved through the digital
medium instead of paper .Example online communication via
email, online chat ,MayBank2U and any other relevant example.
(b) State two other positive and two other negative impacts of ICT usage.
Faster Communication Speed
In the past, it took a long time for any news or messages to be send. Now
with the Internet, news or messages are sent via e-mail to friends, business
partners or to anyone efficiently. With the capability of bandwidth,
broadband and connection speed on the Internet, any information can
travel fast and at an instant. It saves time and is inexpensive.
Lower Communication Cost
Using the Internet is cost-effective than the other modes of communication
such as telephone, mailing or courier service. It allows people to have
access to large amounts of data at a very low cost. With the Internet we do
not have to pay for any basic services provided by the Internet.
Furthermore, the cost of connection to the Internet is relatively cheap.
Reliable Mode Of Communication
Computers are reliable. With the internet, information could be accessed
and retrieved from anywhere and at anytime. This makes it a reliable mode
of communication. However, the input to the computer is contributed by
humans. If the data passed to the computer is faulty, the result will be
faulty as well. This is related to the term GIGO.
GIGO is a short form for Garbage In Garbage Out. It refers to the quality of
output produced according to the input. Normally bad input produces bad
Effective Sharing Of Information
With the advancement of ICT, information can be shared by people all
around the world. People can share and exchange opinions, news and
information through discussion groups, mailing list and forums on the
Internet. This enable knowledge sharing which will contribute to the
development of knowledge based society.
Physical and mental stress
* any relevant explaination for each answers is acceptable.
Sebarang huraian bagi setiap jawapan yang boleh diterima.