You are on page 1of 36

1.

1 Introduction to Information Technology


1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1 Define ICT.
SECTION A

1. Figure 1shows the computer security threat / Rajah 1 menunjukkan ancaman keselamatan komputer.

Based on Figure 1, / Berdasarkan Rajah 1,


(i) State the type of computer threat. / Nyatakan jenis ancaman komputer.
………………………………………………………………
(ii) Identify the type of security measure that can be done to prevent the threat in (i).
Kenalpasti langkah keselamatan yang boleh dilakukan untuk mengelak ancaman di (i)
………………………………………………………………
(JOHOR 2010)
2. Choose the correct statement to define Information and Communication Technology (ICT).
Pilih pernyataan yang paling tepat untuk mendefinisikan Teknologi Maklumat dan Komunikasi (ICT).
A. Information and Communication Technology is composed of three main components of a computer,
Internet and networking.
Teknologi Maklumat dan Komunikasi (ICT) terdiri daripada tiga komponen utama iaitu komputer,
internet dan rangkaian.
B. Information and Communication Technology (ICT) is a technology used by people to improve their
lives.
Teknologi Maklumat dan Komunikasi (ICT) adalah teknologi yang digunakan oleh manusia untuk
meningkatkan kehidupan mereka.
C. Information and Communication Technology (ICT) is a technology that is needed to process the
information using electronic equipment and software applications to transfer, store, send and receive
data.
Teknologi Maklumat dan Komunikasi (ICT) adalah satu teknologi yang diperlukan untuk memproses
maklumat menggunakan peralatan elektronik dan perisian aplikasi untuk memindah, menyimpan,
menghantar dan menerima data.
D. Information and Communication Technology (ICT) is any communication facilities and computer-based
applications.
Teknologi Maklumat dan Komunikasi (ICT) adalah sebarang komunikasi dan kemudahan aplikasi
berasaskan komputer.
(KELANTAN 2010)
3. Information may come in various forms such as ________.
1
Maklumat diperoleh dari pelbagai bentuk seperti ________
I Reading /Bacaan II Investigation / Penyiasatan
III Study / Tinjauan IV Research / Kajian
A. I and II B. II and III C. II, III and IV D. All the above
(PERLIS 2010)

4. The term computer literacy refers to _______________


Istilah literasi computer merujuk kepada ________________.
A. Books stored in a library on computer related subjects.
Buku-buku tentang computer yang disimpan di perpustakaan.
B. A basic knowledge of computers and their use.
Pengetahuan asas tentang computer dan kegunaannya.
C. Technical research conducted by colleges and universities.
Kajian teknikal yang dijalankan oleh kolej dan universiti.
D. User’s guide that accompany applications software.
Panduan pengguna yang disertakan bersama perisian aplikasi.
(PERLIS 2010)
5. Information refers to / Maklumat merujuk
A. an act of transmitting messages
suatu tindakan menghantar mesej
B. the knowledge obtained from reading, investigation, study or research.
pengetahuan yang diperolehi dari membaca, kajian penyiasatan, atau penyelidikan
C. the use of scientific knowledge, experience and resources to create processes and products that fulfill
human needs
penggunaan sains, pengalaman, pengetahuan dan sumber daya untuk mencipta proses dan produk
yang memenuhi keperluan manusia
D. the technology required for information processing, in particular, the use of electronic computers,
communication devices and software applications to convert, store, protect, process, transmit and
retrieve information from anywhere, anytime
teknologi yang diperlukan untuk memproses maklumat, khususnya, penggunaan komputer elektronik,
peranti komunikasi dan aplikasi perisian untuk menukar, menyimpan, melindungi, proses, menghantar
dan mengambil maklumat dari mana saja, bila-bila masa sahaja
(EXAM 2010)
6. Thus the invention of cellular phones, television and other electronic devices
are important in enhancing _________as a whole.
Penciptaan telefon bimbit, televisyen dan peranti elektronik lain penting dalam meningkatkan
________ secara keseluruhan.
A. Games / permainan B. Animation / animasi
C. Multimedia / multimedia D. Communication / komunikasi
(EXAM 2010)

1.1.1.2 Describe the brief evolution of computers.

2
SECTION A

1. State the name of the first generation computer. / Nyatakan nama komuter generasi pertama
……………………
(SPM 2008)
2. Figure 1 shows three technologies used in the generations of computers
Rajah I menunjukkan tiga teknologi yang digunakan dalam generasi komputer.

Figure 1 / Rajah 1
Based on Figure 1, write A, B or C to match the following:
Berdasarkan Rajah l, tulis A, B atau C untuk dipadankan dengan berikut:
(i) Second Generation / Generasi Kedua ...................
(ii) Third Generation / Generasi Ketiga …………….
(SPM 2010)
3.. Complete the following statement: / Lengkapkan pernyataan berikut
Information and Communication Technology is the use of computers,( i) ..................devices and( ii)
......;:........applications for processing, storing, retrieving, protecting and transmitting information from anywhere
at anytime.
Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i) .....................dan aplikasi( ii)
.................... untuk memproses ,menyimpan , m encapai semula, melindungi dan menghantar m aklumat dari
mana-mana tempat pada bila-bilamasa
(SPM 2010)
4. Complete the following statement: / Lengkapkan pernyataan berikut:
Computers in ………………………. Generation use transistor to transfer electronic signals across resister.
Komputer Generasi ………………………. menggunakan transistor untuk menghantar isyarat elektronik
melalui perintang.
(TERENGGANU 2010)

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce


1.1.2.1 List the usage of ICT in everyday life.

3
SECTION A
1. Figure 3 shows the usage of ICT in three different fields.
Rajah 3 menunjukkan penggunaan Teknologi Maklumat dan Komunikasi dalam tiga bidang yang berbeza .

Figure 3 / Rajah 3
Based on statement in Figure 3,state the name of field X and Z:
Berdasarkan Rajah 3, nyatakan nama bidang komputer X dan Z:
(i) X ………………………………………… (ii) Z …………………………………………
(JOHOR 2010)
2. ICT is used in many sectors.
(i) Auto Teller Machine (ATM), cash deposit machine and electronic fund transfer are examples of ICT
usage in ………………………………………… sector.
ICT digunakan dalam pelbagai bidang. Mesin ATM (Auto Teller Machine), mesin deposit wang tunai
dan pemindahan wang elektronik adalah beberapa contoh penggunaan ICT dalam
………………………………………
(ii) In ………………………………………… sector, teachers use computers to search for teaching
materials,
participate in online forums and online conferences.
Dalam bidang …………………………………………, guru menggunakan komputer untuk medapatkan
bahan mengajar, melibatkan diri dalam forum dan persidangan atas talian
(KEDAH 2010)
3. Customers benefit from Electronic Banking in terms of …………………………………………
Pelanggan mendapat faedah dari Perbankan Elektronik dalam konteks …………………………………………
I. 24 hour service /Perkhidmatan 24 jam
4
II Electronic Fund Transfer / Pemindahan wang secara elektronik
III. Electronic Cash Deposits / Deposit Tunai secara elektronik
IV. Electronic Loan Applications / Aplikasi Pinjaman secara elektronik

A. I , II and III B. I, II and IV


B. C. I, III and IV D. II,III and IV
(SELANGOR 2010)

4. Match the various fields in Multimedia with the statements below.


Padankan pelbagai bidang Multimedia dengan kenyataan di bawah

A. Entertainment / Hiburan B. Medical / Perubatan C. Engineering / Kejuruteraan

i) Produce computer games and develop animations and special effects.


Penghasilan permainan komputer dan pembangunan animasi dan kesan khas.

ii) View the design from many aspects and improve on it before production
Memaparkan rekabentuk dari banyak aspek dan memperbaikinya sebelum dipasarkan
(EXAM 2010)

1.1.2.2 State the differences between computerised and non-computerised systems.

SECTION A

5
1. Study the statement below carefully. / Kaji pernyataan di bawah
“Production was slow because everything was done manually and totally depended on
human labour.”
“Produksi perlahan kerana semuanya dijalankan secara manual dan bergantung kepada
tenaga manusia.”
Statement 1/ pernyataan 1
Statement 1 above is regarding to ………………………………………… systems.
Pernyataan 1 di atas merujuk kepada sistem ………………………………………….
(SET PERCUBAAN SABAH 2010)

2. Table 1 shows two types of systems. / Jadual 1 menunjukkan dua jenis sistem.
A B
Computerised Non-Computerised
Berkomputer Tidak Berkomputer
Table 1 / Jadual 1

Choose A or B to match the following statements. / Pilih A atau B untuk memadankan pernyataan berikut.
All transactions can be done at anytime and any place for business purposes.
Semua transaksi boleh dilakukan bila-bila masa dan di mana sahaja untuk tujuan perniagaan.
(TERENGGANU 2010)

3. A user refers to a person who uses a computer for the purposes of ___________.
Pengguna merujuk kepada seseorang yang menggunakan komputer untuk tujuan _______

I. playing games / bermain II. Communication / berkomunikasi


III. doing homework / membuat kerja rumah IV. business advertisement / mengiklan perniagaan

A. I, II, and III B. I, II, and IV


C. II, III, and IV D. I, II, III, and IV
(EXAM 2010)
4. Write True of False for the following statements
Tulis Benar atau Palsu berdasarkan pernyataan di bawah.

The speed in performing certain task is the most outstanding differences between computerized and non
computerized system
Kelajuan dalam melaksanakan tugas-tugas tertentu adalah perbezaan yang paling menonjol antara sistem
komputerisasi dan bukan komputerisasi.
TRUE FALSE
(EXAM 2010)

SECTION B
1. Figure 16 shows a situation in a banking system. / Rajah 16 menunjukkan situasi sistem perbankan.

6
System A System B
Figure 16 / Rajah 16
Based on Figure 16, / Berdasarkan Rajah 16,
(a) State two advantages when the management changed the system from A to B.
Nyatakan dua kelebihan yang diperolehi apabila pihak pengurusan bank mengubah dari sistem A ke sistem B.
i. ……………………………………………………………………………………………………………………………
ii. ……………………………………………………………………………………………………………………………
(b) State two disadvantages when the management changed the system from A to B.
Nyatakan dua kelemahan yang diperolehi apabila pihak pengurusan mengubah dari system A ke sistem B
i. ………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
ii. ………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
(PUTRAJAYA 2010)

1.1.2.3 State the impact of ICT on society.

SECTION A

1. Which of the following statements is related to the Impact of ICT on the society?
Manakah antara berikut berkait rapat dengan kesan ICT ke atas masyarakat?
I. Information travels borderless through the Internet.
7
II. People can receive information faster by using ICT technology.
III. Using computers frequently and for long hours is harmful to health.
IV. Today the younger generation prefers to sit in front of computers than socialise with others.

I. Maklumat perjalanan tanpa batas melalui internet.


II. Orang boleh menerima maklumat lebih cepat dengan menggunakan teknologi ICT.
III. Menggunakan komputer dengan kerap dan selama berjam-jam berbahaya bagi kesihatan.
IV. Hari ini generasi muda lebih memilih untuk duduk di depan komputer daripada bersosial dengan orang lain

A. I and III B. II and IV C. II, III and IV D. All the above


(EXAM 2010)

SECTION B

1. Figure 8 shows the impact of ICT on society./ Rajah 1 memaparkan kesan ICT terhadap masyarakat

Figure 8 / Rajah 8
Based on figure 8 / Berdasarkan rajah 8,
(i) State two advantages of ICT on society./ Nyatakan dua kelebihan ICT terhadap masyarakat.
i. ………………………………………………………………………………………………………………………
ii. ………………………………………………………………………………………………………………………
(ii) State two disadvantages of ICT on society. / Nyatakan dua kelemahan ICT terhadap masyarakat.
i. ………………………………………………………………………………………………………………………
ii. ………………………………………………………………………………………………………………………
(KEDAH 2010)
.
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.

SECTION A

1. Which of the followings are TRUE about computer ethics?


Manakah antara berikut adalah BENAR tentang etika penggunaan komputer?
8
I As a guideline to computer users. / Sebagai garis panduan kepada pengguna komputer.
II No punishment for anyone who violates ethics.
Tiada hukuman dikenakan kepada sesiapa yang melanggar etika.
III Depends on country and state where the crime is committed.
Bergantung kepada negara dan kawasan di mana jenayah tersebut dilakukan.
IV Computer users are free to follow or ignore the code of ethics.
Semua pengguna komputer bebas untuk mengamalkan kod etika yang digariskan.
A I, II and III B I, II and IV
C I, III and IV D II, III and IV
(KEDAH 2010)

In the recent years, many concerns and issues were raised on the integrity and security of information,
legal status of online transactions, privacy and confidentiality of information, intellectual property rights
and security of government data placed on the Internet. So we need to protect the Internet and other
online communication technologies.

Beberapa tahun kebelakangan, banyak pertikaian dan isu dibangkitkan tentang keselamatan dan
integriti maklumat, status perundangan bagi transaksi atas talian, kebersendirian dan kerahsiaan
maklumat, hak harta intelek dan keselamatan data kerajaan di Internet. Jadi, kita perlu melindungi
Internet dan teknologi atas talian yang lain.

2. This statement above refer to / Kenyataan di atas ini merujuk kepada


A. Cyber Law / Undang-undang Siber
B. Code of Ethics / Kod Etika
C. Computer Crime / Jenayah Komputer
D. Computer Ethics / Etika Komputer
(MELAKA 2010)
3. When we talk about ethics, we are concerned about __________.
Ketika kita berbicara tentang etika, kita prihatin tentang __________.
A. human privacy / privasi manusia
B. human education / pendidikan manusia
C. human personality / personaliti manusia
D. human communication / komunikasi manusia
(EXAM 2010)
4. Which of the following statements shows a good code of ethics in schools?
Manakah dari pernyataan berikut menunjukkan kod etika yang baik di sekolah?
A. Sending an email during school time to friends.
Menghantar e-melkepada rakan semasa waktu sekolah
B. Using the school equipment for students’ personal use.
Menggunakan peralatan sekolah untuk kegunaan peribadi pelajar.
C. Using own hand phone to call a friend during lunch break.
Menggunakan telefon bimbit sendiri untuk menghubungi rakan semasa waktu makan tengahari.
D. Doing an English assignment in the computer lab during Science period.
Melakukan tugas Bahasa Inggeris di makmal komputer semasa waktu pelajaran sains
(EXAM 2010)

SECTION B

9
1. The following is a statement about computer ethics. / Berikut adalah pernyataan tentang etika komputer

Ali has been appointed by his teacher to help other teachers to key in the test score into school HC3
Examination Program. Without his teacher knowledge he had changed his ICT’s subject marks from 40% to
75%. As a result of the actions he has successfully passed the subject.

Ali telah dilantik oleh gurunya untuk membantu guru-guru memasukkan markah peperiksaan ke Program
Peperiksaan HC3 sekolahnya. Tanpa pengetahuan gurunya beliau telah mengubah markah subjek ICTnya
dari 40% ke 75%. Hasil dari perbuatan tersebut beliau telah lulus dengan cemerlang subjek tersebut.

Based on the statement above / Berdasarkan pernyataan di atas,


(a) What is the type of misconduct based on the underlined phase above.
Apakah jenis kesalahan yang dilakukan berdasarkan pernyataan bergaris di atas.
Definisikan jenis kesalahan tersebut.
………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………….
(b) Explain the negative impact done by Ali towards the school.
Terangkan kesan negatif perbuatan yang dilakukan Ali kepada sekolah.
………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………….
(KELANTAN 2010)
2. Table 1 shows statements about types of Intellectual Property.
Jadual 1 menunjukkan pernyataan mengenai jenis-jenis Harta Intelektual.
A Artistic material, music, films, sound recordings and road casts including software and multimedia
Bahan artistik, muzik, filem, rakaman bunyi dan ‘road casts’ termasuk perisian dan multimedia
B Word, names, symbols, devices and images that represent product, goods or services
Perkataan, nama, simbol, peralatan dan imej yang mewakili produk barangan dan perkhidmatan
C The features of the lines, contours, colours, shape, texture or material of the product itself
Ciri-ciri garisan, kontur, warna, bentuk, tekstur atau bahan produk itu sendiri
Table 1 / Jadual 1
Based on Table 1, write A, B or C to match the following :
Berdasarkan Jadual 1, tulis A, B atau C untuk memadankan yang berikut :
I. Trademarks / Jenama ...................... II. Design / Rekabentuk ......................
(PUTRAJAYA 2010)
1.2.1.2 Differentiate between ethics and law.

SECTION A

1. Which of the followings are the similarities between ethics and law?
Manakah daripada yang berikut adalah persamaan antara etika dan undang-undang?
I. to prevent any crime / untuk mencegah apa juga jenayah
II. as a rule to control computer users

10
sebagai peraturan untuk mengawal pengguna komputer
III. to guide user from misusing computers
untuk panduan pengguna daripada penyalahgunaan komputer
IV to create a healthy computer society, so that computers are used to contribute to a better life
untuk mencipta masyarakat yang sihat komputer, sehingga komputer digunakan untuk menyumbang
untuk kehidupan yang lebih baik
A. I, II and III B. II, III and IV C. I, III and IV D. All above
(EXAM 2010)
SECTION B
1. Based on the list , Group the conducts under right heading.
Berdasarkan senarai , asingkan mengikut kumpulan yang betul.

UNETHICAL vs LAW BREAKING CONDUCTS

Sending a computer virus via e-mail.


Selling pirated software in a night market
Using the office computer to do personal things.
Plagiarizing and using materials from the Internet for your class assignment without
giving credit to the original author.
Hacking into your school’s database to change your examination results.
Reading your friend’s e-mail without his or her own permission

UNETHICAL LAW BREAKING

(EXAM 2010)
1.2.1.3 State the need for intellectual property laws.

SECTION B

11
1. The above logos are invention that represents TV stations which are operating in our country. These logos
mean each TV stations are protected by a group of legal rights which called Intellectual Property Laws.
Logo-logo di atas mewakili stesen-stesen TV yang beroperasi di negara kita. Logo-logo ini membawa maksud
stesen-stesen TV ini dilindungi oleh Undang-undang Harta Intelek.
a) What is the meaning of Intellectual Property Laws? ( 1 mark )
Apakah yang dimaksudkan dengan Undang-Undang Harta Intelek?
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
b) Name the type of protection that covers these logos and give another TWO inventions that
can be protected by laws.
Namakan jenis perlindungan yang diberikan terhadap logo-logo tersebut dan berikan DUA
ciptaan yang dilindungi dari segi undang-undang.
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
(PERLIS 2010)
SECTION C

1. Based on the statement above, / Berdasarkan pernyataan di atas,


a) i. Explain whether the issue above is involved ethical or unethical behaviour
Jelaskan sama ada isu di atas melibatkanperbuatan yang beretika atau tidak beretika
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
ii. lawful or unlawful behaviour / perbuatan yang mengikut undang-undang atau melanggar undang-
undang
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
b) Describe a type of law required to restrain the above activity. [3 marks]
Terangkan satu jenis undang-undang yang diperlukan untuk membenteras aktiviti di atas.
………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………
(TERENGGANU 2010)
1.2.2 Privacy

1.2.2.1 List ways to protect privacy.

SECTION A

1. Which of the following are ways to protect privacy? / Manakah antara berikut adalah cara untuk melindungi
kerahsiaan?
I. Utilities software / Perisian utiliti
II. Purchase goods with cash, rather than credit card / Beli barangan secara tunai berbanding kad kredit.
12
III. Clear your history file when you are finished browsing. / Padam fail arkib setelah selesai melayari
Internet.
A. I only B. I and II C. II and III D. I, II and III
(TERENGGANU 2010)

2. This question is based on the following statements: / Soalan adalah berdasarkan pernyataan
- Controls available information.
- mengawal maklumat sedia ada
- Controls information about any individual revealed over the Internet.
- Kawalan maklumat tentang mendedahkan setiap individu melalui internet.
The above statements refer to: / Pernyataan di atas merujuk kepada
A. Spyware / spyware
B. Privacy law / undang-undang privasi
C. Utilities software / perisian utiliti
D. Internet privacy / privasi internet
(EXAM 2010)

SECTION B

1. The following is a statement on information privacy. / Pernyataan berikut berkaitan keperibadian maklumat

“Information privacy refers to the right of individuals and organisations to deny or restrict
the collection and use the information about them”

Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk menafi atau
mengelakkan hasil dan maklumat mereka digunakan.

Based on the statement, list four ways of making personal data more private.
Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi lebih peribadi
i) ………………………………………………………………………………………….
ii) ………………………………………………………………………………………….
iii) ………………………………………………………………………………………….
iv) ………………………………………………………………………………………….
(SPM 2007)

1.2.2.2 State authentication and verification methods/technologies.

SECTION A

1. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti biometrik.

13
Based on Figure l, / Berdasarkan Rajah 1,
(i) State the name of the device. / Nyatakan nama peranti itu.
…………………………………………………………………………………………
(ii) State the function of the device / Nyatakan fungsi peranti itu.
…………………………………………………………………………………………
…………………………………………………………………………………………
(SPM 2009 )

2. Figure 1 shows one of the authentication method. / Rajah 1 menunjukkan salah satu kaedah pengesahan.

Figure 1 / Rajah 1
Based on Figure 1, / Berdasarkan Rajah 1,
(i) Identify the authentication method./ Kenalpasti kaedah tersebut.
…………………………………………………………
(ii) Give another example of method stated in (i)./ Berikan satu contoh lain bagi kaedah yang dinyatakan
dalam (i) …………………………………………………………
(N.SEMBILAN 2010)

3. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti biometrik.

Figure 1 / Rajah 1
Based on Figure 1 / Berdasarkan Rajah 1,
(i) State the name of the device (a)./ Nyatakan nama peranti (a)
…………………………………………………………
(ii) State the authentication method in Figure 1. / Nyatakan kaedah pembuktian dalam Rajah 1.
…………………………………………………………
(PAHANG 2010)

14
4. Figure 1 shows authentication and verification methods./ Rajah 1 menunjukkan kaedah pembuktian dan
pengesahan.

Figure 1 / Rajah 1
Choose A or B to match the following statements. / Pilih A atau B untuk memadankan pernyataan berikut.
A possessed object that you must carry to gain access to computer or computer facility. ……….
Sejenis objek yang mesti di bawa untuk mencapai komputer atau kemudahan computer ……….
(TERENGGANU 2010)

5. Figure 1 shows one type of verification methods./ Rajah 1 menunjukkan satu jenis kaedah pengesahan.

Figure 1 / Rajah 1
Based on Figure 1, state the method used.
Berdasarkan Rajah 1, nyatakan kaedah yang digunakan.
……………………………………………………………
(PUTRAJAYA 2010)
1.2.3 Controversial Contents and Control
1.2.3.1 List effects of controversial contents on society:• Pornography • Slander

SECTION A

1. Statement below is about controversial issue. Kenyataan di bawah ini adalah tentang isu kontroversi

Azman is a Muslim. One day, he received a “spam” e-mail stating that his favourite drink “Power-B” uses non-
15 of the content is credible or true. He decides to forward
halal food colouring, but he does not know if the source
the e-mail to 50 of his friends.
Statement 2 Kenyataan 2
Based on Statement 2 above, Berdasarkan Kenyataan 2 di atas,
i. Azman has convicted ………………………………..
Azman terlibat dalam ………………………………..
ii. List another effect of controversial content Senaraikan kesan lain dari kandungan kontroversi
…………………………………….
(SET PERCUBAAN SABAH 2010)
SECTION B

Based on the diagram below:


Berdasarkan diagram di bawah:

1. Give two impacts of controversial content on Malaysian society.


Berikan 2 kesan kandungan kontroversi ke atas masyarakat Malaysia.
i) ………………………………………………………………………………………………………
ii) ………………………………………………………………………………………………………
(EXAM 2010)
1.2.3.2 Describe the process of filtering to control access to controversial contents

SECTION A

1. Figure 2 shows part of an algorithm for a web page filter.


Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.

16
Figure 2 / Rajah 2
State the filtering method used in the algorithm. / Nyatakan nama kaedah penapisan yang digunakan dalam
algoritma itu.
………………………………………………..
(SPM 2009)
2. Figure 2 shows part of a algorithm for a web page filter.

Figure 2 / Rajah 2

Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.


State the filtering method used in the algorithm.
Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
………………………………………………
(PAHANG 2010)

SECTION B

1. Aris is a form 4 student. His mother, Puan Asiah just bought him a personal computer. She has set a method to
filter the content in the Internet, Whenever Aris types a URL with the words such as “sex” or “porno”, he could
not access the website.
Aris seorang pelajar tingkatan 4. Ibunya, Puan Asiah telah membelikan sebuah komputer peribadi. Dia telah
menetapkan kaedah untuk menapis bahan-bahan dalam Internet. Apabila Aris menaip alamat laman sesawang
17
yang mengandungi perkataan seperti “seks” atau “porno”, dia tidak boleh mengakses laman sesawang
tersebut.

Based on the situation above, / Berdasarkan situasi di atas,


(a) (i) Name the method that Puan Asiah uses to control the website access.
Namakan kaedah yang digunakan oleh Puan Asiah untuk menapis capaian
laman sesawang.
……………………………………………………………………………………………………………
(ii) State the impact to Aris, if Puan Asiah did not control the website access
Nyatakan kesan kepada Aris jika capaian laman sesawang tidak dikawal
oleh Puan Aishah.

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………
(b) Name two methods that can be used to limit the Internet access other than the one stated in (a) (i).
Namakan dua kaedah yang boleh digunakan untuk menapis capaianInternet, selain dari yang
dinyatakan pada (a)(i).
i. ……………………………………………………………………………
ii. ……………………………………………………………………………
(JOHOR 2010)

1.2.4 Computer Crimes

1.2.4.1 Explain the need for Cyber Law.

SECTION A

1. Cyber law is a system of moral standards or values used as a guideline for computer users. (T/F)

18
Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang digunakan sebagai pedoman bagi
pengguna komputer TRUE / FALSE

(SPM 2007)

In the recent years, many concerns and issues were raised on the integrity and security of information, legal
status of online transactions, privacy and confidentiality of information, intellectual property rights and
security of government data placed on the Internet. So we need to protect the Internet and other online
communication technologies.

Dalam beberapa tahun terakhir, banyak kebimbangan dan isu-isu yang dibangkitkan, pada integriti dan
keselamatan maklumat, status undang-undang transaksi online, privasi dan kerahsiaan maklumat, hak
kekayaan intelektual dan keselamatan data kerajaan meletakkan di Internet. Jadi kita perlu melindungi
internet dan teknologi komunikasi dalam talian yang lain.

2. The above statement refers to / pernyataan di atas merjuk kepada


A. Cyber Law / undang-undang siber B. Code of Ethics / kod etika
C. Computer Crime / jenayah komputer D. Computer Ethics / etika komputer
(EXAM 2010)
SECTION C

1. The following is a text on computer crime in a Television station broadcasting.


Berikut adalah teks mengenai jenayah computer di sebuah stesen siaran Telivision.
Aizat bertugas sebagai seorang penyunting di sebuah syarikat penerbitan rancangan television swasta.. Beliau
menggunakan kepakarannya dalam bidang ICT untuk membuat suntingan terhadap rancangan-rancangan telivision
tersebut bagi menjaga kualitinya sebelum disiarkan oleh stesen-stesen television. Tanpa kebenaran pihak syarikat
tersebut Aizat telah membuat rakam salin terhadap rancangan television terbitan tersebut serta menjualnya di
internet.Aizat works as an editor in a private television broadcasting. He uses his expertise in ICT for editing the
television programs in order to preserve the quality before they were broadcast by the television station. Without
company’s permission Aizat has made copies of the television programs and sell them via Internet.
Based on the text: / Berdasarkan teks itu:
Explain the importance of Cyber Law to the editing company.
Terangkan kepentingan Undang-undang Siber untuk Syarikat penerbitan tersebut.
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
(KELANTAN 2010)
1.2.4.2 Explain briefly the computer crimes below: • Fraud • Copyright Infringement • Theft • Attacks

SECTION A

1. Which of the following activity NOT a computer crime?


Mana di antara aktiviti berikut BUKAN satu jenayah komputer?
A Sam made a few copies of the original CD that he bought and sell to his friends at cheaper price.
19
Sam membuat beberapa salinan CD asal yang dia beli dan menjual salinan tersebut kepada rakannya
dengan harga yang lebih murah.
B Ahmad, a bank manager transferred the customers’ payments to his own account.
Ahmad, seorang pengurus bank memindahkan bayaran yang dibuat oleh pelanggan ke akaun
peribadinya.
C Zaki plagiarising the material from internet for his class assignment.
Zaki menciplak bahan yang diperolehi dari internet untuk tugasannya.
D Din discovered a computer virus and sent the virus to his friends via email.
Din menemui satu virus komputer dan menyebarkan virus itu melalui emel kepada rakan-rakannya.
(PAHANG 2010)

2. Sazali has copied a copyrighted article from the Internet to use in his assignment. However, he ignores the
author’s name in his assignment. Sazali is ………………………...
Sazali telah menyalin satu artikel dari internet untuk digunakan sebagai bahan kerja kursus.
Walaubagaimanapun, beliau tidak meletakkan nama pengarang tersebut dalam kerja kursusnya. Sazali
telah……………………………..
A. committing a blue collar crime. / melakukan jenayah kolar biru.
B. taking advantage of the Internet facilities. / mengambil kesempatan terhadap kemudahan internet.
C. violating the rights secured by a copyright / melanggar peraturan hak cipta.
D denying the owner’s rightful possession of the article / menafikan hak pengarang yang memiliki artikel
tersebut.
(PERLIS 2010)
3. Choose the correct answer from the box.
Pilih jawapan yang tepat dari kotak di bawah.

…… A ……………………………… is defined as any criminal activities that are related to use of computers.
………………………………didefinisikan sebagai aktiviti jenayah yang dilakukan dengan menggunakan
komputer.
(PERLIS 2010)

4. Table 2 shows the activities of computer crime. / Jadual 2 menunjukkan aktiviti jenayah komputer
P Computer Attack / Serangan Komputer
Q Computer Theft / Kecurian Komputer
R Copyright Infringement / Pencabulan Hakcipta
S Computer Fraud / Penipuan Komputer
Table 2 / Jadual 2

20
Based on Table 2, write P, Q, R or S for the following statement:
Berdasarkan Jadual 2, tuliskan P, Q, R atau S bagi pernyataan berikut:
i. Nazre transfer his company profit to his own account.
Nazre memindahkan keuntungan syarikat ke dalam akaun peribadinya
……………………………………………
ii. Kamal downloaded an assignment from the internet and claimed it is his.
Kamal memuat turun tugasan dari internet dan mendakwa kepunyaanya
……………………………………………
(SELANGOR 2010)
5. Based on the situation above, write A, B, C or D to show the type of computer crime is being described.
Berdasarkan situasi di atas, tulis A, B, C atau D untuk menunjukkan jenis jenayah komputer yang diterangkan
di bawah.

Duplicating and distributing copies of audio tapes and computer programs without permission and authorization from
the individual or company that created the program is illegal.
Membuat salinan dan mengagihkan salinan-salinan audio, program-program komputer tanpa kebenaran individu atau
syarikat adalah aktiviti haram.

A. Computer theft / Pencuri computer B. Computer fraud / Penipuan computer


C. Computer attack / Serangan computer D. Copyright infringement / Pelanggaran hak cipta
(PUTRAJAYA 2010)
SECTION B
1. Based on the situation below, answer the following questions.

David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3
songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the
software. One day, he finds that his computer is getting slow and keeps on duplicating files.

David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering memuat turun perisian hakcipta
dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. David menggunakan kepakarannya dalam bidang ICT
untuk mendapatkan nombor siri yang tidak sah untuk mengaktifkan perisian yang telah dimuat turun. Pada
suatu hari komputer David menjadi perlahan dan sering membuat salinan fail tertentu secara berulang.
Name the type of computer crime that David has committed.
Namakan jenis jenayah komputer yang dilakukan oleh David.
…………………………………………………………………………….
(MELAKA 2010)
SECTION C

1. The following is a text on computer crime in a Television station broadcasting.


Berikut adalah teks mengenai jenayah computer di sebuah stesen siaran Telivision.

Aizat bertugas sebagai seorang penyunting di sebuah syarikat penerbitan rancangan television swasta.. Beliau
menggunakan kepakarannya dalam bidang ICT untuk membuat suntingan terhadap rancangan-rancangan telivision
tersebut bagi menjaga kualitinya sebelum disiarkan oleh stesen-stesen television. Tanpa kebenaran pihak syarikat
tersebut Aizat telah membuat rakam salin terhadap rancangan television terbitan tersebut serta menjualnya di
internet.
21
Aizat works as an editor in a private television broadcasting. He uses his expertise in ICT for editing the television
programs in order to preserve the quality before they were broadcast by the television station. Without company’s
permission Aizat has made copies of the television programs and sell them via Internet.
Based on the text: /Berdasarkan teks itu:
State the computer crime that has been done by Aizat.
Nyatakan jenaya komputer yang telah dilakukan oleh Aizat.
………………………………………………………………………………..
(KELANTAN 2010)

1.3 Computer Security

1.3.1 Definition
1.3.1.1 Define computer security.

SECTION A

1. Write True of False for the following statements


Tulis Benar atau Palsu berdasarkan pernyataan di bawah.
. Computer security refers to protecting computer system only

22
Keselamatan komputer merujuk untuk melindungi sistem komputer sahaja
…………………
(EXAM 2010)
2. Computer security can be defined as: / Keselamatan komputer boleh ditakrifkan sebagai:
A. a process of preventing and detecting unauthorized use of the computer
proses mencegah dan mengesan penyalahgunaan komputer
B. the process that allows unauthorized users to access any part of your computer system
proses yang membolehkan pengguna yang tidak dibenarkan untuk mengakses bahagian mana-mana
daripada sistem komputer anda
C. security measures using the hardware including hardware type firewall, PC-locks and keyboard
locks.
tindakan keselamatan dengan menggunakan peranti keras termasuk firewall jenis hardware, PC kunci
dan keyboard kunci.
D. a detector that helps in breaking the system
pengesan yang membantu dalam menyelesaikan sistem
(EXAM 2010)

1.3.2 Security Threats

1.3.2.1 Explain briefly the different threats to computer security:


• Malicious code • Hacking • Natural disaster • Theft

SECTION A

1. Match the statements (a) and (b) with the terminologies in Table 2.
Padankan kenyataan (a) dan (b) dengan istilah dalam Jadual 2.

23
Malicious code
Theft
Fraud

Table 2 / Jadual 2
a) Agent X broke into Defense Department computer Room of USA Government and download certain
data to sell
to the Russian secret agents.
Agen X telah menceroboh masuk ke bilik komputer Jabatan Pertahanan Amerika Syarikat dan
memuat turun data untuk dijual kepada Agen Rahsia Rusia.
………………………………………….
b) A student from China created a program and spread it through the Internet to attack the United States
Department of Defense computer system.
Seorang pelajar dari Negara China telah mencipta satu program dan menyebarkannya melalui
internet untuk menyerang sistem komputer Jabatan Pertahanan Amerika Syarikat.
………………………………………….
(KELANTAN 2010)
2. Table 1 shows several terms of computer crime.
Jadual 1 menunjukkan beberapa terminologi dalam jenayah komputer.

A Trojan horse
B Worm
C Trapdoor
Table 1 / Jadual 1

Based on Table 1, write A, B or C to match the following statements:


Berdasarkan Jadual 1, tulis A, B atau C untuk memadankan pernyataan berikut:
(i) A program that copies and spreads itself through a network.
Program yang menyalin dan menyebarkan dirinya melalui rangkaian.
………………
(ii) A program that allows someone to access the program and use it with special privileges.
Program yang membenarkan seseorang mengakses sesuatu program dan menggunakannya.
………………
(KEDAH 2010)
SECTION B

1. Based on the situation below, answer the following questions.

David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3
songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the
software. One day, he finds that his computer is getting slow and keeps on duplicating files.

David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering memuat turun perisian hakcipta
dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. David menggunakan kepakarannya dalam bidang ICT
untuk mendapatkan nombor siri yang tidak sah untuk mengaktifkan perisian yang telah dimuat turun. Pada
suatu hari komputer David menjadi perlahan dan sering membuat salinan fail tertentu secara berulang.
24
What has happened to David’s computer?
Apakah yang telah terjadi kepada komputer David?
……………………………………………………………………………………
(MELAKA 2010)

2. Following is the definition for a type of computer crimes / Berikut adalah definisi untuk jenis kejahatan komputer

Unauthorized use of another person’s property with the intention to deny the owner the rightful
possession of that property
penggunaan yang tidak dibenarkan harta orang lain dengan maksud untuk menolak pemilik
sah pemilikan harta itu.

a) Based on the definition above, give two (2) examples of the activity that reflects the
statement above.
Berdasarkan definisi di atas, berikan dua (2) contoh aktiviti yang mencerminkan
kenyataan di atas.
i. .................................................................................................
ii. .................................................................................................

c) Hacking is a source of threat in computer security


Hacking adalah sumber ancaman dalam keselamatan komputer
(i) Briefly define hacking / secara singkat definisikan hacking
.................................................................................................
.................................................................................................
(ii) Give an example activity in hacking / Berikan contoh aktiviti dalam hacking
.................................................................................................
.................................................................................................
.................................................................................................
(SET PERCUBAAN SABAH 2010)

SECTION C

1. Figure 20 shows symptoms of a computer problem / Rajah 20 menunjukkan simptom pada sebuah komputer.

25
Figure 20 / Rajah 20

Based on Figure 20: / Berdasarkan Rajah 20:


(a) Identify the type of computer threat which matches the symptoms.
Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.
…………………………..
State two different examples of the threat. / Nyatakan dua contoh berlainan bagi ancaman itu.
i. …………………………………
ii. …………………………………
(b) Describe two reasons why the computer may have been affected by the threat in (a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
.................................................................................................
.................................................................................................
.................................................................................................
(SPM 2010)

1.3.3 Security Measures


1.3.3.1 Select the appropriate security measures to overcome the identified computer threats

SECTION B

Ahmad likes to access the internet. One day, while surfing the internet, his computer starts to run a little
weird. He noticed that the modem LEDs were blinking even after he has stopped surfing. His system
seemed to get slow and suddenly reboots. Ahmad is sure that somebody has logged onto his
computer.

Ahmad suka mengakses internet. Suatu hari, semasa melayari internet, komputernya kelihatan aneh.
Dia menyedari bahawa LED modem berkelip-kelip bahkan setelah dia berhentimelayari internet.
Sistem semakin lambat dan tiba-tiba reboot. Ahmad yakin bahawa seseorang telah login ke
26
komputernya.
1. Based on statement, answer the following question:/ Berdasarkan pernyataan, jawab soalan berikut:
a. State what kind of computer threat is mentioned in the situation above?
Nyatakan jenis ancaman komputer disebutkan dalam situasi di atas?
................................................
b. Give ONE effect of the threat in (a) to Ahmad’s data.
Berikan SATU kesan ancaman tersebut dalam (a) data Ahmad
................................................ ................................................ ................................................
................................................ ................................................ ................................................
c. State TWO things that Ahmad can do to enhance the security of his data while accessing the Internet.
Nyatakan DUA perkara yang dapat Ahmad lakukan untuk meningkatkan keselamatan data sewaktu
mengakses Internet.
................................................ ................................................ ................................................
................................................ ................................................ ................................................
................................................ ................................................ ................................................
................................................ ................................................ ................................................
(EXAM 2010)

2. Give three ways to secure your computer / Berikan tiga cara untuk menjaga keselamatan komputer anda
................................................ ................................................ ................................................
................................................ ................................................ ................................................
................................................ ................................................ ................................................
(EXAM 2010)

Situation / Situasi

Your computer displays strange behavior. For instance, you discover that “portfolio.doc” has suddenly
been renamed to “portfolio.exe”.

Komputer anda memaparkan perilaku yang aneh. Contohnya, anda mendapati bahawa "portfolio.doc"
tiba-tiba diubah namanya menjadi "portfolio.exe".

3. Based on the situation,


a. What do you think is the cause of this problem?
Pada endapat anda, apakah yang menyebabkan masalah tersebut?
……………………………………..
b. Give two examples of the security measures. / Berikan dua contoh pengukuran keselamatan
27
……………………………………
……………………………………
(EXAM 2010)
SECTION C

Ali works as a clerk in a school. He uses a keyboard to key-in all the school’s data into the computer.
He saves all the data as a backup in Device X. At the end of every month, he will send a printed report
to the school principal.

Ali bekerja sebagai kerani di sekolah. Dia menggunakan keyboard untuk memasukkan semua data
sekolah ke dalam komputer. Dia menyimpan semua data sebagai sandaran dalam Peranti X. Pada
akhir setiap bulan, ia akan menghantar laporan dicetak kepada pengetua sekolah.

1. Based on the situation given, answer the following questions:


Berdasarkan situasi yang diberi, jawab soalan-soalan berikut:
a. Explain two security measures that should be considered by Ali in order to protect his data from lost or
damaged.
Jelaskan tindakan keselamatan dua yang harus dipertimbangkan oleh Ali dalam rangka
untuk melindungi data dari hilang atau rosak.
................................................ ................................................ ................................................
................................................ ................................................ ................................................
................................................ ................................................ ................................................
b. Two security measures that can be considered by Ali:
DUA Tindakan keselamatan yang boleh dipertimbangkan oleh Ali:
................................................ ................................................ ................................................
................................................ ................................................ ................................................
................................................ ................................................ ................................................
................................................ ................................................ ................................................
(EXAM 2010)

2. Bank XYZ Berhad has a computer network system to run their operations between its branches in Malaysia. An
unknown man was seen entering the computer control room at its headquarters in Kuala Lumpur after office
hours. The following day, the system administrator found that all data in the server were removed and a few
computer hardware missing. It was also reported that the bank computer network was down.
Bank XYZ Berhad mempunyai sistem rangkaian komputer untuk menjalankan operasi mereka antara
cawangan-cawangaNnya di Malaysia. SeORANG lelaki tak dikenali terlihat memasuki ruangan kawalan
komputer di pejabat pusatnya di Kuala Lumpur selepas waktu pejabat. Hari berikutnya, pentadbir sistem
mendapati bahawa semua data di pelayan itu dihapuskan dan beberapa peranti keras komputer hilang. Ia juga
melaporkan bahawa rangkaian komputer bank rosak

a) Explain one possible threat done by the unknown man.


Jelaskan satu ancaman yang mungkin dilakukan oleh orang yang tidak dikenali
……………………………………

28
b) After an investigation, the management found that the threats come from the lack of security procedure at
the computer control room. Explain two actions on human aspect on security procedure that should be
taken by the management to increase security at the computer control room. Setelah penyelidikan,
pengurusan mendapati bahawa ancaman datang dari kurangnya prosedur keselamatan di ruangan
kawalan komputer. Jelaskan dua tindakan pada aspek manusia pada prosedur keselamatan yang perlu
diambil oleh pihak pengurusan untuk meningkatkan keselamatan di ruangan kawalan komputer.
…………………………………………………………………………
…………………………………………………………………………
(EXAM 2010)

1.3.3.2 Apply the correct security procedures:


• Antivirus • Anti-Spyware • Cryptography • Firewall • Data backup • Human aspects

SECTION A

1. Figure 3 shows how cryptography works / Rajah 3 menunjukkan bagaimana kriptografi bekerja.

Encrypt Decrypt
Plaintext H Plaintext

Name H : ___________________________________________
(SPM 2007)
2. Figure 2 shows a type of security measure. / Rajah 2 menunjukkan satu langkah keselamatan

29
Figure 2 / Rajah 2
Based on Figure 2, / Berdasarkan Rajah 2,
(i) State the type of security measure used. / Nyatakan langkah keselamatan yang digunakan.
………………………………………………………………………………………………………….
(ii) Suggest an activity on human aspect security measure that can be carried out by an organization.
Cadangkan satu aktiviti yang boleh dilaksanakan di dalam sesebuah organisasi untuk meningkatkan
keselamatan dari aspek manusia.
………………………………………………………………………………………………………….
(JOHOR 2010)
3. Below are the examples on how the computer technology threatens the privacy of our data.
Berikut merupakan contoh-contoh bagaimana teknologi komputer mengancam kerahsiaan data.
I Spyware II Cookies III Phishing IV Firewall
A I, II and III B I, II and IV C I, III and IV D II, III and IV
(KEDAH 2010)

4. Table 1 shows security measures to overcome computer threats


Jadual 1 menunjukkan langkah keselamatan untuk mengatasi ancaman komputer
Human aspects
X Aspek kemanusiaan

Firewall
Y Firewall

Cryptography
Z Kriptografi

Table 1 / Jadual 1
Based on Table 1, match the security measures with the following statements by writing X , Y or Z
Berdasarkan Jadual 1, padankan langkah keselamatan dengan pernyataan berikut dengan menulis
X , Y atau Z

30
(i) To function in a network environment to prohibit unauthorized access to your computer via the
Internet.
Berfungsi dalam rangkaian bagi menghalang capaian kepada komputer melalui Internet secara tidak
sah.
..........................
(ii) As a security measure, make sure a computer room is always locked.
Sebagai langkah keselamatan, pastikan bilik komputer sentiasa berkunci
.........................
(KELANTAN 2010)

5. Write True or False for the following statement / Tuliskan Benar atau Palsu pada pernyataan berikut
Anti Spyware is a program to scan and remove virus from computer system. ..............
Anti Spyware adalah satu program untuk mengimbas dan membuang virus dari sistem komputer. ..............
(KELANTAN 2010)

6. Figures 2 show types of security measures in computer security.


Rajah 2 menunjukkan jenis langkah-langkah keselamatan di dalam keselamatan komputer.

31
Figure 2 / Rajah 2
Based on Figure 2, identify Y
Berdasarkan Rajah 2, kenalpasti Y
……………………….
(KEDAH 2010)
7. Rearrange the procedures in scanning virus. / Susun semula prosedur mengimbas virus.
I. Scan the selected file / Imbas fail yang dipilih
II. Choose an antivirus in the program / Pilih program antivirus
III. Wait while the program is scanning and the result is display
Tunggu sehingga program membuat imbasan dan keputusan dipaparkan
IV. Select file/ folder/drive that need to be scan /Pilih file yang ingin diimbas
A. I, II, III, IV B. II, IV, I, III C. III, I, IV, II D. IV, II, I, III
(SET PERCUBAAN PERAK 2010)

8. Based on Figure 2 , state the method of security measure used.


Berdasarkan Rajah 2, nyatakan kaedah langkah keselamatan yang diigunakan.

ATTACK DWWDFN
ATTACK DWWDFN
ALGORITHM

PLAIN TEXT CHIPER TEXT

Figure 2 / Rajah 2
……………………………………………………
(SET PERCUBAAN PERAK 2010)

9. Why do we need to backup our data?


Mengapakah kita perlu membuat salinan data?
I To ensure that our data can still be used if the original is corrupted
Untuk memastikan data kita boleh digunakan jika berlaku sesuatu terhadap asal.
II To ensure our files, program or disk that can be used if the original source is lost, damage or
destroyed.
Boleh menggunakan fail, program atau cakera yang telah disalin jika sumber rosak hilang atau
musnah.
III To prevent our files or program from malicious software
Menghalang fail atau program daripada perisian yang tidak dikehendaki.
IV To protect our files from viruses .
Menghalang fail daripada virus.
A I and II B. Iand III C I, II and III D I, II and IV
(SELANGOR 2010)

32
10. Table 1 shows statements about a process of hiding information by altering the actual information into different
representation.
Jadual 1 menunjukkan pernyataan mengenai satu proses yang menyembunyikan maklumat sebenar dengan
menukarkan dalam bentuk persembahan yang lain.

Sahent works as a manager in a finance company. He wants to send a top secret report to Fahmi who is
working in another branch. Sahent asks Joanan, his secretary, to send this report to Fahmi. When Joana tries
to read the report, she finds out that the report has been encrypted.
Sahent bekerja sebagai seorang pengurus di syarikat kewangan. Beliau ingin menghantar sebuah laporan
yang amat sulit kepada Fahmi yang bekerja di cawangan lain. Sahent meminta setiausahanya, Joana untuk
menghantar laporan tersebut kepada Fahmi. Apabila Joana ingin membaca laporan itu, dia mendapati bahawa
laporan tersebut telah dikripkan.
Table 1
Based on Table 1 : / Berdasarkan Jadual 1:
Name the Process to the encrypted text in the report.
Namakan prosess pada laporan yang dikripkan
………………………………………………….
(SELANGOR 2010)

11. Table 3 shows statements about a program. / Jadual 3 menunjukkan pernyataan mengenai satu program.

H is a program placed in the computer system without the user knowledge, and it secretly
collects information from the computer system about user.

H merupakan satu pogram yang berada dalam komputer tanpa pengetahuan pengguna
dan mengumpul maklumat pengguna tanpa disedari.

Table 3 / Jadual 3
Based on table 3 , name H. / Berdasarkan jadual 3 , namakan H
A. Virus B. Spyware C. Kid Program D. Operating System
(SELANGOR 2010)
12. State whether the following statement is True or False.
Nyatakan sama ada pernyataan berikut Benar atau Palsu.
Anti-spyware is a software that we use to protect the computers from spyware.
Anti-spyware ialah perisian yang kita gunakan untuk melindungi komputer daripada spyware.
TRUE / FALSE
(TERENGGANU 2010)

SECTION B

1. Based on the situation below, answer the following questions.

David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3
songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the
software. One day, he finds that his computer is getting slow and keeps on duplicating files.

David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering memuat turun perisian hakcipta
dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. David menggunakan kepakarannya dalam bidang ICT
untuk mendapatkan nombor siri yang tidak sah untuk
33 mengaktifkan perisian yang telah dimuat turun. Pada
suatu hari komputer David menjadi perlahan dan sering membuat salinan fail tertentu secara berulang.
a. How can David prevent his computer from the problem in (b) in the future?
Bagaimanakah David dapat mengatasi masalah komputer yang dihadapi di (b) pada masa akan datang?
………………………………………………………………………………………………………
………………………………………………………………………………………………………
b. Other than the threat you mentioned in (b), give another computer threat that could affect David’s
computer.
Selain daripada ancaman yang dinyatakan di(b), berikan satu lagi ancaman lain yang mungkin berlaku
kepada komputer David.
………………………………………………………………………………………………………
………………………………………………………………………………………………………
(MELAKA 2010)

2. Read the following situation:


Baca situasi berikut:

34
(a) (i) What was happened to the club member’s list file?
Apakah yang berlaku pada fail senarai nama ahli kelab ICT?
…………………………………………………………………………………………………
(ii) What should Nelly do before she open the file?
Apakah yang perlu dilakukan oleh Nelly sebelum membuka fail tersebut?
…………………………………………………………………………………………………

(b) (i) State the step should be taken by Nelly to prevent this problem?
Nyatakan langkah yang perlu diambil oleh Nelly untuk mencegah masalah ini?
…………………………………………………………………………………………………
…………………………………………………………………………………………………
(ii) Based on b (i), give one example of utility software that can be use.
Berdasarkan b (i), berikan satu contoh perisian utiliti yang boleh digunakan.
…………………………………………………………………………………………………
(N.SEMBILAN 2010)

SECTION C

1. The following is a text on computer crime in a Television station broadcasting.


Berikut adalah teks mengenai jenayah computer di sebuah stesen siaran Telivision.

Aizat bertugas sebagai seorang penyunting di sebuah syarikat penerbitan rancangan television swasta.. Beliau
menggunakan kepakarannya dalam bidang ICT untuk membuat suntingan terhadap rancangan-rancangan telivision
tersebut bagi menjaga kualitinya sebelum disiarkan oleh stesen-stesen television. Tanpa kebenaran pihak syarikat
tersebut Aizat telah membuat rakam salin terhadap rancangan television terbitan tersebut serta menjualnya di internet.

Aizat works as an editor in a private television broadcasting. He uses his expertise in ICT for editing the television
programs in order to preserve the quality before they were broadcast by the television station. Without company’s
permission Aizat has made copies of the television programs and sell them via Internet.
Based on the text: / Berdasarkan teks itu:
Explain two ways from the human aspect to avoid the above crime.
Terangkan DUA langkah dari aspek kemanusiaan untuk mencegah jenayah di atas.
i. ………………………………………………………………………………………………………

35
ii. ………………………………………………………………………………………………………
(KELANTAN 2010)
2. PC02’s user scanned the hard disk using antivirus software. The result is shown in Figure 12(c).
Pengguna PC02 mengimbas cakera keras menggunakan satu perisian antivirus. Hasil pengimbasan
ditunjukkan dalam Rajah 12(c).

Figure 12(c) / Rajah 12(c)


Based on Figure 12(c), / Berdasarkan Rajah 20(c),
State the action can be taken by the user of PC02. Justify your answer.
Nyatakan tindakan yang boleh diambil oleh pengguna PC02. Berikan justifikasi anda.
………………………………………………………………………………………………………
………………………………………………………………………………………………………

………………………………………………………………………………………………………
(PAHANG 2010)

36

You might also like