You are on page 1of 11

1

Soalan-Soalan Berdasarkan Subtopik


( Soalan-Soalan SPM Sebenar 2007-2014)

SMKA SHARIFAH RODZIAH


MELAKA

(INTRODUCTION OF ICT)

NAMA :

TINGKATAN : 4..

1.1 Introduction to Information Technology


1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1 Define ICT.
1.1.1.2 Describe the brief evolution of computers.

SECTION A
1. State the name of the first generation computer.
Nyatakan nama komputer generasi pertama (SPM
2008)
2

2. Figure 1 shows three technologies used in the generations of computers


Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.
(SPM 2010)

Based on Figure 1, write A, B or C to match


the following:
Berdasarkan Rajah l, tulis A, B atau C
untuk dipadankan dengan berikut:
(i) Second Generation /
Generasi Kedua ...................
(ii) Third Generation /
Generasi Ketiga
.

Figure 1 / Rajah 1

3.. Complete the following statement: / Lengkapkan pernyataan berikut.


Information and Communication Technology is the use of computers,
( i) ...........................devices and( ii) ......;:......................applications for processing,
storing, retrieving, protecting and transmitting information from anywhere at anytime.
Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i)
......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan ,
mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat
pada bila-bila masa. (SPM
2010)

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce


1.1.2.1 List the usage of ICT in everyday life.
SECTION A
1.1.2.2 State the differences between computerised and non-computerised systems.
SECTION A

1. Table 1 shows the charecteristics of the operation mode ini Company A and Company B.
Jadual menunjukkan cirri mod operasi dalam Syarikat A dan Syarikat B
(SPM 2014)

Company A / Syarikat A Company B / Syarikat B


- Using bollboard to advertise new - Promote new product at
product company/s website
Menggunakan papan iklan untuk Mempromosikan produk
mengiklan produk baharu baharu di sesawang syarikat
- Receive customer order by - Receive customer order by
telephone email
Menerima tempahan pelanggan Menerima tempahan
melalui telefon pelanggan melalui email
- All transactions recorded in - All transactions recorded in
forms electronic forms
Semua urusniaga direkod dalam - Semua urusniaga direkod
3

borang dalam borang elektronik


Table 1 / Jadual 1

Based on Table 1, state the operation mode use in :


Berdasarkan jadual 1, nyatakan mod operasi yang digunakan dalam :

i. Company A / Syarikat A
.
ii. Company B / Syarikat B
.

1.1.2.3 State the impact of ICT on society.


1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy,
Computer Crime and Cyber Law.

SECTION A

1. Table 1 shows the characteristics of X and Y in computer usage guideline.


Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan
komputer. (SPM 2011)
X Y
Moral guidelines for computer users. Rules for computer users.
Garis panduan moral untuk pengguna komputer. Peraturan-peraturan untuk pengguna
komputer.
No penalty or punishment. Penalties or punishments imposed.
Tiada penalti atau hukuman. Penalti atau htLkuman dikenakan.
Table 1 / Jadual 1l
Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:
(i) X
(ii) Y

2. Table 2 shows terms which are related to computer ethics and legal issues
Jadual 2 di bawah menunjukkan terma berkaitan etika komputer dan undang-undang
(SPM 2014)
4

A Privacy
Keadaan berahsia
B Intellectual property
Hak Intelektual
C Cyber Law
Peraturan Siber
D Computer ethics
Etika komputer
Table 2 / Jadual 2

Based on Table 2, write A,B,C or D to match the following statements


Berdasarkan jadual 2, tulis A,B, C atau D untuk dipadankan dengan pernyataan berikut

(i) Standards moral conduct in the use of computers


Standard perlakuan bermoral dalam penggunaan komputer
.

(ii) The right of and individual to restrict the collection and use of personal data
Hak individu untuk mengehadkan pengutipan dan penggunaan data peribadi
.

1.2.1.2 Differentiate between ethics and law.

1.2.1.3 State the need for intellectual property laws.


1.2.2 Privacy
1.2.2.1 List ways to protect privacy.

SECTION B

1. The following is a statement on information privacy.


Pernyataan berikut berkaitan keperibadian maklumat
(SPM 2007)

Information privacy refers to the right of individuals and organisations to


deny or restrict the collection and use the information about them
Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk
menafi atau mengelakkan hasil dan maklumat mereka digunakan.

Based on the statement, list four ways of making personal data more private.
Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi
lebih peribadi
i) .
ii) .
iii) .
iv) ..

1.2.2.2 State authentication and verification methods/technologies.

SECTION A
5

1. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti
biometrik.
(SPM 2009 )
Based on Figure l, / Berdasarkan Rajah 1,
(i) State the name of the device. / Nyatakan nama
peranti itu.

(ii) State the function of the device / Nyatakan fungsi
peranti itu.

2. Figure 1 shows information on two types of authentuication methods.


Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan
(SPM 2012)
Authentication methods
Kaedah pengesahan

P Q
Taxi services booking / - Retinal scanning /
tempahan perkhidmatan pengimbasan retina
teksi - voice recognition /
Purchase using credit card / Pengecaman suara
pembelian menggunakan
kad kredit

Based on figure 1 , state the name of / berdasarkan rajah 1, namakan


i. P .. ii. Q .

1.2.3 Controversial Contents and Control


1.2.3.1 List effects of controversial contents on society: Pornography Slander
1.2.3.2 Describe the process of filtering to control access to controversial contents
SECTION A
1. Figure 2 shows part of an algorithm for a web page filter.
Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.
(SPM 2009)
6

Figure 2 / Rajah 2
State the filtering method used in the algorithm.
Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
..

2. Figure 2 shows the display of an internet filtering software


Rajah 2 menunjukkan paparan pada satu perisian penapisan internet
(SPM 2012)
FILTERING SETTINGS

Restricted List
http://www.seperti.com
http://www.jalan.com

ADD Figure 2 REMOVE


/ Rajah 2 EXIT
Based on Figure 2 , state the method used
Berdasarkan rajah 2 nyatakan kaedah yang digunakan

.
START
3. Figure 1 shows the keyword blocking process
Rajah 1 menunjukkan proses penapisan kata kunci
(SPM 2013)
User access
a web page

A
Figure 1 / Rajah 1
Based on figure 1 write A,B or
C to match the following
statement
Berdasarkan rajah 1, tuliskan
YES Contained NO A,B atau C untuk dipadankan
banned dengan pernyataan berikut
words? i. Page download stops
B C

STOP
7

Muat turun laman


berhenti
..
ii. Search for banned
words
Mencari perkataan-
perkataan yang
diharamkan
..

1.2.4 Computer Crimes


1.2.4.1 Explain the need for Cyber Law.
SECTION A
1. Cyber law is a system of moral standards or values used as a guideline for computer
users. (T/F)
Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang digunakan
sebagai pedoman bagi pengguna komputer
TRUE / FALSE (SPM
2007)

1.2.4.2 Explain briefly the computer crimes below: Fraud Copyright Infringement
Theft Attacks

1.3 Computer Security


1.3.1 Definition
1.3.1.1 Define computer security.
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:
Malicious code Hacking Natural disaster Theft

SECTION B
1. Figure 12 shows a pop-up message to computer users.
Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer
(SPM 2011)

Figure 12 /
Rajah 12

Based on Figure 12: / Berdasarkan Rajah 12:


(a) State two ways that causes the pop-up message to appear on the
computer screen.
Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di
skrin komputer.


[2 markah]
(b) State two kinds of serious damages if a user ignore the message.
Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.


[2 markah]
8

2. Read the following warning


Baca amaran berikut (SPM 2013)

Never open an email attachment unless you are expecting the


attachment and it is from the trusted source

Jangan buka email yang dikepilkan kecuali anda menjangkakan kepilan


tersebut dan ia datang dari sumber yang dipercayai
Based on the warning statement
Berdasarkan pernyataan amaran itu

a. Explain why the warning important


Terangkan mengapa amaran itu penting
2 markah

b. i. What precaution should you take if you cannot follow the given warning?
Apakah langkah berjaga-jaga yang seharusnya diambil jika anda tidak
dapat mematuhi amaran yang diberi?
1 markah

ii. Justify your answer


Beri justifikasi jawapan anda
1 markah
SECTION C

1. Figure 20 shows symptoms of a computer problem


Rajah 20 menunjukkan simptom pada sebuah komputer.
(SPM 2010)

- Screen displays unusual messages


Skrin memaparkan mesej pelik
- Files become corrupted
Fail menjadi rosak
- Fies mysteriously appear
Muncul fail yang menjadi tanda Tanya

Figure 20 / Rajah 20
Based on Figure 20: / Berdasarkan Rajah 20:
(a) Identify the type of computer threat which matches the symptoms.
Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.
i. .
State two different examples of the threat. / Nyatakan dua contoh berlainan bagi
ancaman itu.
ii.
i.
9

(b) Describe two reasons why the computer may have been affected by the threat in
(a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
.................................................................................................
.................................................................................................
.................................................................................................

1.3.3 Security Measures


1.3.3.1 Select the appropriate security measures to overcome the identified computer threats
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography Firewall Data backup Human
aspects
SECTION A
1. Figure 3 shows how cryptography works
Rajah 3 menunjukkan bagaimana kriptografi bekerja.
(SPM 2007)
Encrypt Decrypt
Plaintext H Plaintext

Name H : / Namakan H :

2. Table 2 shorws the steps of using anti-virus software which is not in the
correct sequence.
Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak
mengikut urutan yang betul.
(SPM 2011)
Complete the step. Step 1 and 3 are given.
Lengkapkan langkah itu. Langkah I dan 3 diberi.
Choose anti virus software/Pilih perisian anti virus (i) 1
Take necessary action /Ambil tindakan yang perlu (ii) ..
Scan the selected area /Imbas kawasan yang dipilih (iii) 3
Select area to be scanned /Pilih kawasan yang akan diimbas (iv) ..
Table 2 /Jadual 2
(ii) (iv)

3. Ali has send a confidential file to Sandra using email. Rearrange the activities carried
out
by Ali in the correct sequence.
Ali perlu menghantar satu fail sulit kepada Sandra menggunakan email. Susun semula
aktiviti yang dijalankan oleh Ali mengikut urutan yang betul. (SPM 2013)
P Decrypt file / Menyahsulit file
Q Open file received to view contents
Buka fail yang diterima untuk melihat kandungan
R Select file to send
Pilih fail yang akan dihantar
S Encrypt file
Enkripsi fail
T Attach file to email
Kepilkan fail pada email
SECTION B

1. Figure 15 shows the scan summary when an antivirus program is used.


10

Rajah 15 menunjukkan laporan ringkas imbas bila program antivirus digunakan


(SPM 2014)

Status: The scan has finished


Last Object:
. J:\merged_partition_content\50GB AV scan test
bundle\...mcw10.exe
100%

Last detection: ADWARE/Adware.Gen2


Virus.informatiom
Scanned files: Detections:
1583192 5
Scanned directories: Suspicious files:
26448 0
Scanned archieves: Warnings:
27945 52
Used time: End Objects
Report scanned:
3:39:57 0
Scanned : Hidden objects:
100% 0
Figure 15 / Rajah 15

Based on figure 15; /Berdasarkan rajah 15;


a) List two steps to carry out the task
Senaraikan dua langkah untuk melaksanakan tugas itu
[2 marks/2markah]



b) State two actions that can be taken to remove the untreated threats.
Nyatakan dua tindakan yang boleh diambil untuk mengalihkan ancaman yang
tidak dapat dirawat.
[2 marks/2markah]



SEMAKAN
Tarikh Topik / Sub topik Tanda tangan Catatan
Guru
1.2 Introduction to Information Technology
1.1.2 Overview of Information and Communication
Technology (ICT)
1.1.2.1Define ICT.
1.1.1.3Describe the brief evolution of computers.
11

1.1.2 ICT In Everyday Life: Education, Banking,Industry


and Commerce
1.1.2.1 List the usage of ICT in everyday life.
1.1.2.2 State the differences between
computerised and non-computerised systems.
1.1.2.3 State the impact of ICT on society.
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of
Ethics,Intellectual Property, Privacy, Computer
Crime and Cyber Law.
1.2.1.2 Differentiate between ethics and law.
1.2.1.3 State the need for intellectual property
laws.

1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
1.2.2.2 State authentication and verification
methods/technologies.

1.2.3 Controversial Contents and Control


1.2.3.1 List effects of controversial contents on
society: Pornography Slander
1.2.3.2 Describe the process of filtering to control
access to controversial contents.
1.2.4 Computer Crimes
1.2.4.1 Explain the need for Cyber Law.
1.2.4.2 Explain briefly the computer crimes
below: Fraud Copyright Infringement Theft
Attacks

1.3 Computer Security


1.3.1 Definition
1.3.1.1 Define computer security.

1.3.2 Security Threats


1.3.2.1 Explain briefly the different threats to
computer security: Malicious code Hacking
Natural disaster Theft

1.3 Computer Security


1.3.3 Security Measures
1.3.3.1 Select the appropriate security measures
to overcome the identified computer threats
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography
Firewall Data backup Human aspects

You might also like