Koleksi Soalan Negeri Bab_1

Embed Size (px)

Citation preview

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    1/35

    1

    INTRODUCTION OF ICT)

    pengenalan kepada ict

    NAMA :

    TINGKATAN : ..

    1.1 Introduction to Information Technology

    1.1.1 Overview of Information and Communication Technology (ICT)

    1.1.1.1Define ICT.

    1.1.1.2Describe the brief evolution of computers.

    SECTION A

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    2/35

    2

    1. State the name of the first generation computer.

    Nyatakan nama komputer generasi pertama (SPM 2008)

    2. Figure 1 shows three technologies used in the generations of computers

    Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.

    (SPM 2010)

    Based on Figure 1, write A, B or C to

    match the following:

    Berdasarkan Rajah l, tulis A, B atau C

    untuk dipadankan dengan berikut:

    (i) Second Generation /

    Generasi Kedua

    ...................

    (ii) Third Generation /

    Generasi Ketiga

    .

    Figure 1 / Rajah 1

    3.. Complete the following statement: / Lengkapkan pernyataan berikut.

    Information and Communication Technology is the use of computers,( i)

    ...........................devices and( ii) ......;:......................applications for processing,storing, retrieving, protecting and transmitting information from anywhere at

    anytime.

    Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i)

    ......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan ,

    mencapai semula, melindungi dan menghantar maklumat dari mana-mana

    tempat pada bila-bila masa. (SPM 2010)

    4. The computers for this generation use magnetic drums as storage media and are

    large in size, taking up entire room. They use a great deal of electricity, generating

    a lot of heat, which is often the cause of malfunctions.

    Komputer-komputer generasi ini menggunakan drum magnetik sebagai mediasimpanan yang besar dalam ukuran sehingga memuatkan satu bilik. Ia juga

    menggunakan banyak tenaga elektrik, menghasilkan banyak haba dan kerap

    menyebabkan kerosakan.

    (Hulu Perak 2012)

    Name the technology used for this generation of computers.

    Namakan teknologi yang digunakan dalam generasi komputer ini.

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    3/35

    3

    ..

    1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce1.1.2.1 List the usage of ICT in everyday life.

    SECTION A

    1. In an advanced ICT modemization, but there are positive and negative effects on

    the use of ICT. Which ofthe following non-negative impact on the use of ICT on

    society.

    Di dalam arus pemodenan ICT yang maju, nqmttn terdapat kesan posittf dan juga

    kesan negatif terhadap penggunaan ICT. Antara berikut yang-manakah bukan

    kesan negative terhadap penggunaan ICT terhadap masyarakat.

    (Kelantan 2012)

    A. Personal information will be easily exposed and this will make no privacy of

    personal information.

    Maklumat peribadi seseorang akan mudah terdedah dan ini akan

    membuatkan tiada privasi terhadap maklumat diri.

    B. Unethical use ofICT will lead to computer crime.

    Penggunaan ICT yang tidak beretika akon menyebabkan berlakunya

    jenayah komputer

    C. A person can get various information from various sources.

    Seseorang boleh mendapatkan pelbagai maklumat daripada pelbagai

    sumber

    D. Some users of ICT as a waste of time but might be limited solely

    entertainment.Sebahagian pengguna ICT membuang masa kerana hanyalah mencari

    hiburan semata-mata.

    2. Complete the following statement:

    Lengkapkan pernyataan berikut:

    Table 1 is regarding to the use of ICT in everyday life.

    Jadual 1 merujuk kepada penggunaan TMK dalam kehidupan seharian.

    (MERSING JOHOR 2012)

    All transactions are done by computers

    Semua traksaksi dilakukan dengan komputer

    Transaction can be done anytime and anyplace

    Transaksi boleh dilaksanakan bila-bila masa dan di mana-mana

    Example of transactions is electronic funds transfer

    Contoh transaksi adalah pemindahan wang elektronik

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    4/35

    4

    Table 1 /Jadual 1

    Table 1 refer to the use of ICT in ______________________ sector.

    Jadual 1 merujuk kepada penggunaan ICT dalam sector _______________.

    1.1.2.2 State the differences between computerised and non-computerised systems.

    SECTION B

    1. Figure 6 shows a situation in a banking system. /

    Rajah 6 menunjukkan situasi di dalam sistem bank. (Kedah 2012)

    Figure 6 / Rajah 6

    Based on Figure 6:/Berdasarkan Rajah 6:

    (a) State the difference betweensystem A and system B.

    Nyatakan perbezaan di antara sistem A dan sistem B.

    [2 marks][2 markah]

    1.1.2.3 State the impact of ICT on society.

    SECTION A

    System A System B

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    5/35

    5

    1. Which of these is an impact of slander towards society?

    Yang manakah kesan kepada fitnah terhadap masyarakat?

    (P.Pinang 2012)

    A Closer relationship / Hubungan lebih rapatB Trust among people / Kepercayaan di antara manusia

    C Higher moral behaviour / Perlakuan moral lebih tinggi.

    D Bad reputation of people / Reputasi buruk pada seseorang.

    2. ICT has brought many positive impacts on society.

    ICT membawa banyak kesan positif terhadap masyarakat. (Wilayah 2012)

    Figure 1/ Rajah 1

    Based on Figure 1, state one positive impact of ICT on society

    Berdasarkan Rajah 1, nyatakan kesan positif ICT kepada masyarakat

    I. Lower communication cost because people can save time and resources

    Kos komunikasi yang rendah kerana manusia boleh menjimatkan masa dansumber

    II. Inappropriate online communication with unknown person through the

    Internet

    Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui Internet

    III. Effective sharing of information and opinions

    Perkongsian maklumat dan pendapat yang efektif

    IV. Effective sharing slander and false content

    Perkongsian fitnah dan penipuan kandungan yang efektif

    A. I and II B. I and III C. II and IV D. III and IV

    1.2 Computer Ethics and Legal Issues

    1.2.1 Definition

    1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer

    Crime and Cyber Law.

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    6/35

    6

    SECTION A

    1. Computer ethics refers to the / Etika Komputer merujuk kepada

    (Kedah 2012)

    I study about moral principal for computer user.

    kajian mengenai nilai moraluntuk pengguna komputer.

    II custom that guides human behavior in cyber world.

    budaya yang membimbing tingkah laku manusiadalam dunia siber.

    III regulation that must be obeyed by the public.

    peraturan yang perlu dipatuhi oleh orang awam.

    IV knowledge about what is good and what is bad when using computer.

    pengetahuan mengenai apa yang baik dan apa yang buruk apabila

    menggunakan komputer.

    A I, II and III / I, II dan III B I, II and IV / I, II dan IV

    C I, III and IV / I, III dan IV D II, III and IV / II, III dan IV

    2.. Table 1 shows the characteristics of X and Y in computer usage guideline.

    Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan

    komputer.

    (SPM 2011)

    X Y

    Moral guidelines for computer users.

    Garis panduan moral untukpenggLrna komputer.

    Rules for computer users.

    Peraturan-peraturan untuk penggunakomputer.

    No penalty or punishment.

    Tiada penalti atau hukuman.

    Penalties or punishments imposed.

    Penalti atau htLkuman dikenakan.

    Table 1 / Jadual 1l

    Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:

    (i) X

    (ii) Y

    3. Table I below shows the number of terms of security threats.

    Jadual I di bawah menunjukkan beberapa istilah ancaman keselamotan.(Kelantan 2012)

    A Piracy / Cetak rompak

    B Natural disaster / Bencana Alam

    C Malicious code / Kod Hasad

    D Hacking / Pengodam

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    7/35

    7

    Tabel I /Jadual I

    Ahmad had downloaded the songs online and make copies for sale to the

    public..

    Ahmad telah memuat turun laguJagu di atas talian dan membuat salinanuntuk dijual kepada orang ramai

    4. Figure 2 shows Intellectual Property types.

    Rajah 2 menunjukkan jenis-jenis Harta Intelek. (Wilayah 2012)

    Figure 2 / Rajah 2

    Based on Figure 2, state X and Y.

    Berdasarkan Rajah 2, nyatakan X dan Y.

    X: .

    Y: .

    SECTION B

    1. Figure 6 shows a situation in a banking system. /

    Rajah 6 menunjukkan situasi di dalam sistem bank.

    (Kedah 2012)

    Figure 6 / Rajah 6

    Based on Figure 6:/Berdasarkan Rajah 6:

    X Y

    Intellectual property

    Harta Intelek

    System A System B

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    8/35

    8

    State two reasons why bank clients who use system B should be protected

    under the Malaysian Cyber Law.

    Nyatakan dua sebab mengapa pelanggan bank yang menggunakan sistem B

    harus dilindungi di bawah Undang-undang Siber Malaysia.

    [2 marks][2 markah].

    .

    .

    1.2.1.2 Differentiate between ethics and law.

    SECTION A

    1. State whether the following statement is True or False.

    Nyatakan sama ada pernyataan berikut Benar atau Palsu

    (P..Pinang 2012)

    We need computer ethics and laws to guide users from misusing the computer.

    Kita memerlukan etika dan undang-undang komputer sebagai panduan kepada

    pengguna supaya tidak menyalahgunakan komputer.

    2. Choose the false statement about ethics and law

    Pilih penyataan yang salah tentang etika dan undang-undang.

    (Wilayah 2012)

    Ethics LawA. Universal / universal Depend on country / Bergantung

    kepada sesebuah Negara

    B. Crime /Jenayah Immoral / Todak bermoral

    C. Free to follow / Bebas diikuti Must follow /Mesti diikuti

    D. Guide the users / Panduan

    kepada pengguna

    Control the users /Mengawal

    pengguna

    1.2.1.3 State the need for intellectual property laws.

    1.2.2 Privacy

    1.2.2.1 List ways to protect privacy.

    SECTION A

    1. Table 1 shows terms of computer ethics and legal issues.

    Choose the correct term for each given statement.

    (Wilayah 2012)

    Jadual 1 menunjukkan istilah bagi etika komputer dan isu-isu perundangan.

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    9/35

    9

    Pilih istilah yang betul bagi setiap pernyataan berikut.

    Intellectual

    Property

    Privacy Computer

    Crime

    Table 1 /Jadual 1

    i. Protect ideas, inventions, unique names, business models, industrial

    processes, computer program codes and more.

    Melindungi idea, ciptaan, nama-nama unik, model perniagaan, proses

    perindustrian, kod program komputer dan lain-lain.

    .

    ii. The right of individuals and companies to deny or restrict the collection and

    use of data and information about them.

    Hak individu dan syarikat dalam menafikan atau membataskan

    penggunaan data dan maklumat tentang mereka.

    .

    2. Choose the correct answer.

    Pilih jawapan yang betul.

    (Hulu Perak 2012)

    Intellectual Property /

    Harta Intelek

    Privacy /

    Privasi

    Copyright /

    Hak cipta

    The right of individuals to control the collection and use of information about

    themselves refers to the right of _____________________________.

    Hak individu untuk mengawal pengumpulan dan penggunaan maklumat

    mengenai diri mereka merujuk kepada ___________________________.

    SECTION B

    1. The following is a statement on information privacy.

    Pernyataan berikut berkaitan keperibadian maklumat

    (SPM 2007)

    Based on the statement, list four ways of making personal data more private.

    Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi

    lebih peribadi

    i) .

    ii) .

    iii) .

    iv) ..

    Information privacy refers to the right of individuals and organisations to deny

    or restrict the collection and use the information about them

    Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk

    menafi atau mengelakkan hasil dan maklumat mereka digunakan.

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    10/35

    10

    1.2.2.2 State authentication and verification methods/technologies.

    SECTION A

    1. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenisperanti biometrik.

    (SPM 2009 )

    Based on Figure l, / Berdasarkan Rajah 1,

    (i) State the name of the device. / Nyatakan nama peranti itu.

    (ii) State the function of the device / Nyatakan fungsi peranti itu.

    2. Figure I5(a) and Figure I5(b) show biometric authentication methods.

    Rajah I5(a) dan Rajah 15(b) menunjukkan kaedah pengesahan biometrik.

    (Kelantan 2012)

    Figure 15(a) / Rajah 15(a) Figure 15(b) / Rajah 15(b)

    Based on Figure l5(a) and Figure I 5(b) state the method used

    Berdasarkan Rajah 15 (a) dan Rajah I5(b), nyatakan kaedah yang digunakan.

    (i) Figure 15(a) / Rajah 15(a) ..

    (i) Figure 15(b) / Rajah 15(b) ..

    3. Example used in verification methods is except ________________

    Contoh yang digunakan dalamKaedah verikfikasi kecuali______________

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    11/35

    11

    (Pahang 2012)

    A Identification Card /Kad Pengenalan diri

    B Security Token / Keselamatan token

    C Cell Phone / Telefon bimbit

    D Fingerprint Recognition / Pengesahan cap jari

    4. State whether the following is True or False.

    Nyatakan sama ada penyataan berikut Benar atau Palsu.

    (Perlis 2012)

    (i) A fingerprint is an imprint made by the pattern of the skin on the pad of a

    human finger.

    Cap jari adalah cap yang dibuat melalui satu corak dari tapak jari kulit

    manusia.

    5. Figure 1 shows three authentication and verification methods.

    Rajah 1 menunjukkan tiga kaedah pembuktian dan pengesahan.

    (Trengganu 2012)

    Figure 1 / Rajah 1

    Based on Figure 1, write A, B or C to match the following statements:

    Berdasarkan Rajah 1, tuliskan A, B atau C untuk memadankan pernyataan berikut:

    (i) This method provides the ability to deliver a signature to an organisation.

    Kaedah ini menyediakan kebolehan untuk menghantar tandatangan

    kepada organisasi. ....

    (ii) This method requires users to place their hand onto a scanner surface.

    Kaedah ini memerlukan pengguna untuk meletakkan tangan ke ataspermukaan pengimbas. ..

    6. Figure 1 shows information on two types of authentuication methods.

    Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan

    (SPM 2012)

    Authentication methods

    Kaedah pengesahan

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    12/35

    12

    Based on figure 1 , state the name of / berdasarkan rajah 1, namakan

    i. P .. ii. Q .

    1.2.3 Controversial Contents and Control

    1.2.3.1 List effects of controversial contents on society: Pornography Slander

    SECTION A

    1. Table 2 shows the effects of controversial content on society.

    Jadual 2 menunjukkan kesan-kesan isu kontroversial dalam masyarakat.

    (Wilayah 2012)

    Table 2 /Jadual 2

    State the type of controversial content on society.

    Nyatakan jenis bagi isu kontroversial dalam masyarakat.

    SEC

    TIO

    N B

    1.

    Lead to sexual addiction.

    Mendorong ketagihan seks.

    Lead to perversion

    Mendorong sifat penyumbalewengan

    Increase in rape cases

    Peningkatan kadar kes rogol

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    13/35

    13

    Statement 1 / Pernyataan 1 (P.Pinang 2012)

    Based on Statement 1, answer the following questions:

    Berdasarkan Pernyataan 1, jawab soalan-soalan berikut:

    a) State the controversial content that stated in Statement 1. Justify your

    answer.

    Senaraikan satu kandungan kontroversi yang dinyatakan dalam pernyataan

    Justifikasikan jawapan anda. [2 marks][2 markah]

    ..

    ..

    b) Give two negative impacts of Alis action to the fast food company.

    Berikan 2 kesan negatif perbuatan Ali terhadap syarikat makanan segera

    tersebut. [2 marks][2 markah]

    ..

    ..

    1.2.3.2 Describe the process of filtering to control access to controversial contents

    SECTION A

    1. Figure 2 shows part of an algorithm for a web page filter.

    Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.

    (SPM 2009)

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    14/35

    14

    Figure 2 / Rajah 2

    State the filtering method used in the algorithm.Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.

    ..

    2 Complete the following statement:/ Lengkapkan pernyataan berikut:

    (Kedah 2012)

    Ahmad and Ah Chong want to control the access to the controversial contents

    before their kids use the Internet. Ahmad decides to use _______(i)_________

    process. He lists the websites that he will block with Internet-filtering software. Ah

    Chong chooses ______(ii)__________ process. He sets the browser to only accept

    pages with certain level of ratings.

    Ahmad dan Ah Chong mahu mengawal akses kepada kandungan kontroversi

    sebelum anak mereka menggunakan Internet. Ahmad memutuskan untuk

    menggunakan proses ______(i)__________. Beliau menyenaraikan laman-laman

    web yang hendak disekat dengan menggunakan perisian tapisan Internet. Ah

    Chong memilih proses ______(ii)__________. Beliau menetapkan pelayar web agar

    hanya menerima halaman yang mempunyai tahap penilaian tertentu.

    (i)

    (ii)

    3. State whether the following statements is True or False.

    Nyatakan sama ada pernyataan berikut Benar atau Palsu

    (Kelantan 2012)

    Site blocking is aprivate combination of character associated with a username

    ..

    Sekatan laman web adalah kombinasi rahsia aksara berkoitan dengan

    nama pengguns

    .

    4. Figure 2 shows the display of an internet filtering software

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    15/35

    15

    Rajah 2 menunjukkan paparan pada satu perisian penapisan internet

    (SPM 2012)

    Figure 2 / Rajah 2

    Based on Figure 2 , state the method used

    Berdasarkan rajah 2 nyatakan kaedah yang digunakan

    .

    SECTION B1. Figure 16 below is an example of Internet filtering used by Puan Asiah to control

    access of certain website.

    Rajah 16 merupakan contoh Internet filtering yang digunakan oleh Puan Asiah

    untuk mengawal capaian kepada laman web tertentu. (Wilayah 2012)

    Figure 16 / Rajah 16

    Based on Figure 16 : / Berdasarkan Rajah 16:Chat, Sex

    Restricted List

    http://www.seperti.com

    http://www.jalan.com

    ADD REMOVE EXIT

    http://www.seperti.com/http://www.seperti.com/
  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    16/35

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    17/35

    17

    Beri dua impak kandungan controversial dalam masyarakat

    Malaysia.

    ................................................................................................................................

    ................................................................................................................................

    [3 marks][3 markah]

    (b) Give two preferred method of to limit access on the internet to filter

    pornography content, and explain briefly.

    Berikan dua cara yang sesuai untuk mengurangkan pencapaian ke internet

    bagi menyaring bahan lucah and terangkan dengan ringkasnya.

    ................................................................................................................................

    ................................................................................................................................

    ................................................................................................................................

    ................................................................................................................................

    [4 marks][4 markah]

    1.2.4 Computer Crimes

    1.2.4.1 Explain the need for Cyber Law.

    SECTION A

    1. Cyber law is a system of moral standards or values used as a guideline for

    computer users. (T/F)

    Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang

    digunakan sebagai pedoman bagi pengguna komputer

    TRUE / FALSE (SPM 2007)

    2. Which of the following are related to the computer laws?Manakah yang berikut berkait dengan undang-undang komputer?

    (Selangor 2012)

    I. Depend on country and state where the crime is committed

    Bergantung kepada negara dan negeri di mana jenayah berlaku

    II. Prevent misuse of computers

    Untuk mengelakkan penyalahgunaan komputer

    III. Act as guideline to computer users

    Panduan kepada pengguna komputer

    IV. Can be applied anywhere

    Boleh digunakan di mana-mana

    A. I and II B. I and III C. II and IV D. III and IV

    SECTION C

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    18/35

    18

    1. The following is a text on computer crime in television station broadcasting.

    Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.

    (N.Sembilan 2012)

    Nora works as an editor in one of the larger private television broadcasting in

    Malaysia. She uses her expertise in ICT for editing the television programs in order

    to preserve the quality before they were broadcast by the television station.

    Without companys permission Nora has made copies of the television

    programs and sells it via Internet.

    Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran

    televisyen swasta yang terbesar di Malaysia. Nora menggunakan

    kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga

    mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman

    rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa

    pengetahuan majikannya.

    Based on the text: / Berdasarkan teks itu:

    Explain why cyber laws are important for television station broadcasting.

    Terangkan mengapa undang-undang siber adalah penting untuk stesen

    penyiaran televisyen. [2 marks] [2 markah]

    ................................................................................................................................

    ................................................................................................................................

    ................................................................................................................................

    1.2.4.2 Explain briefly the computer crimes below: Fraud Copyright Infringement Theft

    Attacks

    SECTION A

    1. Figure 1 showing example of computer crime.

    Rajah 1 menunjukkan contoh jenayah komputer.

    (Pahang 2012)

    .

    X Y

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    19/35

    19

    Figure 1 / Rajah 1

    Based on figure 1, state types of computer crimes in :

    Berdasarkan rajah 1, nyatakan jenis jenayah komputer di:

    (i) X

    (ii)

    Y

    2. Fill in the blanks with the correct word.

    Isi tempat kosong dengan perkataan yang betul.

    (Terengganu 2012)

    (i) Activities taken to disrupt the equipment of computer systems, change

    processing control or corrupt stored data is called _____________ .

    Aktiviti-aktiviti yang diambil untuk mengganggu peralatan sistem komputer,

    mengubah pemproses kawalan atau data yang tersimpan rosak dipanggil

    ____________.

    (ii) Transfering of payments to the wrong accounts is an example of

    _____________ .

    Pemindahan bayaran bagi akaun-akaun salah ialah satu contoh

    _____________ .

    SECTION B

    1. Figure 8 shows issues and concern among internet users.

    Rajah 8 menunjukkan isuisu dan kebimbangan dikalangan pengguna internet.

    Figure 8 / Rajah 8(a) The above concerns and issues show the need of ....................

    Kebimbangan dan isu-isu di atas menunjukkan keperluan

    kepada........................ [1 mark][1 markah]

    (b) Explain one of the computer crime which involve Legal status of Online

    Transaction.

    Terangkan satu daripada jenayah computer yang berkaitan dengan

    transaksi atas talian

    Integrity AndLegal Status Of

    Privacy And confidentiallySecurity Of

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    20/35

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    21/35

    21

    SECTION C

    1. The following is a text on computer crime in television station broadcasting.

    Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.

    (N.Sembilan 2012)

    Nora works as an editor in one of the larger private television broadcasting in

    Malaysia. She uses her expertise in ICT for editing the television programs in order

    to preserve the quality before they were broadcast by the television station.

    Without companys permission Nora has made copies of the television

    programs and sells it via Internet.

    Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran

    televisyen swasta yang terbesar di Malaysia. Nora menggunakan

    kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga

    mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman

    rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa

    pengetahuan majikannya.

    Based on the text: / Berdasarkan teks itu:

    (a) State the computer crime that has been done by Nora.

    Nyatakan jenayah komputer yang telah dilakukan oleh Nora.

    . [1 marks][1markah]

    1.3 Computer Security

    1.3.1 Definition

    1.3.1.1 Define computer security.SECTION A

    1. Write True or False for the following statement :

    Tuliskan Benar atau Palsu pada pernyataan berikut:

    (Pahang 2012)

    Computer security means protecting strangers to read our e-mail or use our

    computer to attack other systems.

    Keselamatan komputer bermakna melindungi orang yang tidak dikenali untuk

    membaca e-mel atau menggunakan komputer kita untuk menyerang sistem lain.

    .

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    22/35

    22

    1.3.2 Security Threats

    1.3.2.1 Explain briefly the different threats to computer security:

    Malicious code Hacking Natural disaster Theft

    SECTION A

    1. Table I below shows the number of terms of security threats.

    Jadual I di bawah menunjukkan beberapa istilah ancaman keselamotan.

    (Kelantan 2012)

    A Piracy /Cetak rompak

    B Natural disaster / Bencana Alam

    C Malicious code / Kod Hasad

    D Data backup / Salinan data

    Tabel 1 /Jadual 1

    Mr. Farid has made copies of all company data to be stored in a safe place

    to avoid flooding..

    En. Farid telah membuat salinan terhadap semua data syarikatnya untuk

    disimpan di tempat yang selamat bagi mengelakkan dari banjir..

    2. Table 1 shows the threats to computer security

    Jadual 1 menunjukkan ancaman kepada keselamatan komputer

    (Pahang 2012)

    J Worm

    K Hacking

    L Nature / environment

    M Theft

    Table 1 /Jadual 1

    Based on table 1, write J, K, L or M for suitable statement below:

    Berdasarkan jadual 1, tulis J, K, L atau M untuk pernyataan yang sesuai di bawah:

    (i) A program that can pass on the malicious code to other programs by

    modifying them.

    Satu program yang boleh memindahkan kod berniat jahat kepada

    program-program lain dengan mengubah mereka.

    (ii) Computer is used to steal goods and information..Komputer digunakan untuk mencuri barang-barang dan maklumat

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    23/35

    23

    3. State whether the following is True or False.

    Nyatakan sama ada penyataan berikut Benar atau Palsu.

    (Perlis 2012)

    (i) A fingerprint is an imprint made by the pattern of the skin on the pad of a

    human fingerCap jari adalah cap yang dibuat melalui satu corak dari tapak jari kulit

    manusia..

    (ii) Email with spam features is a service that receives email messages from

    unrecognized sources..

    Email dengan spam merupakan satu perkhidmatan menerima pesanan

    email dari sumber yang tidak diketahui.

    4. Match the statements (a) and (b) with the security threats in Table 1.

    Padankan kenyataan (a) dan (b) dengan ancaman keselamatan dalam Jadual 1.

    (P.Pinang 2012)

    Security Threats /Ancaman Keselamatan

    Malicious Kod / Kos Hasad

    Hacker / Penggodam

    Theft / Kecurian

    Table 1 /Jadual 1

    i. ________________ is the illegal taking of another person's property without that

    person's permission

    ________________ adalah pengambilan secara haram harta orang lain tanpa

    kebenaran.

    ii. _______________ is any program code or script that is intended to causeundesired effects, security breaches or damage to a system.

    _______________ adalah sebarang kodaturcara atau skrip yang bertujuan

    Untuk menyebabkan kesan luar jangka, pencerobohan sekuriti atau

    kerosakan pada sistem.

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    24/35

    24

    SECTION B

    1. Figure 12 shows a pop-up message to computer users.

    Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer

    (SPM 2011)

    Figure 12 / Rajah 12

    Based on Figure 12: / Berdasarkan Rajah 12:

    (a) State two ways that causes the pop-up message to appear on the

    computer screen.

    Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di

    skrin komputer.

    [2 markah]

    (b) State two kinds of serious damages if a user ignore the message.Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.

    [2 markah]

    2. Figure l8 below shows symptoms of a computer problem.

    Rajah 18 di bowah menunjukkan simptom pada sebuah komputer (Kelantan 2012)

    O Screen displays unusual messages /

    Skrin memaparkan mesej pelikO Files become corrupted /

    Fail menjadi rosak

    O Files mysteriously appear /

    Muncul fail yang menjadi tanda tanya

    Figure 18 / Rajah I8

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    25/35

    25

    Based on the figure above; / Berdasarkan rajah di atas ;

    a) Identify thetype of computer threat which matches the symptoms.

    Kenalpasti jenis ancaman komputer yang berpadanan dengan simptom itu.

    State one different examples of the threat.

    Nyotakan satu contoh berlainan bagi ancaman itu. (2m)i.

    ii.

    SECTION C

    1. Figure 20 shows symptoms of a computer problem

    Rajah 20 menunjukkan simptom pada sebuah komputer.

    (SPM 2010)

    - Screen displays unusual messages

    Skrin memaparkan mesej pelik

    - Files become corrupted

    Fail menjadi rosak

    - Fies mysteriously appear

    Muncul fail yang menjadi tanda Tanya

    Figure 20 / Rajah 20

    Based on Figure 20: / Berdasarkan Rajah 20:

    (a) Identify the type of computer threat which matches the symptoms.

    Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom

    itu.

    i. .

    State two different examples of the threat. / Nyatakan dua contoh berlainanbagi ancaman itu.

    ii.

    iii.

    (b) Describe two reasons why the computer may have been affected by the

    threat in (a).

    Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman

    di (a).

    Suggest two ways to prevent it.

    Cadangkan dua cara untuk mengatasinya.

    ..................................................................................................................................................................................................

    .................................................................................................

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    26/35

    26

    2. Figure 11 is an excerpt from an online newspaper.

    Rajah 11 menunjukkan petikan daripada akhbar atas talian

    (Kedah 2012)

    Figure 11 / Rajah 11

    Based on Figure 11:/Berdasarkan Rajah 11:

    Explain another two types of threats that may harm the government web site.

    Terangkan dua jenis ancaman lain yang mungkin memudaratkan tapak web

    kerajaan.

    [4 marks][4 markah]

    KUALA LUMPUR: More laws will be introduced soon to tackle cyber intrusion.

    Deputy Information, Communications and Culture Minister Dato Joseph Salang

    Gandum said this move followed the attacks on 198 websites, including

    government portals, by the "Anonymous" hacker group last week.

    "We have to set up stronger cyber security measures and ensure that government

    websites are protected from such activities in the future."

    (Straits Time; 21 June, 2011)

    KUALA LUMPUR:Lebih banyak undang-undang akan diperkenalkan tidak lamalagi bagi mengatasi gangguan siber. Timbalan Menteri Penerangan Komunikasi

    dan Kebudayaan Dato Joseph Salang Gandummengatakan bahawa tindakan

    ini berikutan daripada serangan ke atas 198 laman sesawang termasuk portal

    kerajaan oleh kumpulan penggodam Anonymous minggu lepas.

    Kita perlu menetapkan langkah-langkah keselamatan siber yang lebih kukuh

    dan memastikan laman-laman web kerajaan dilindungi pada masa akan

    datang.

    (Straits Time; 21 Jun ,2011)

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    27/35

    27

    3. Statement 2 shows computer security risk.

    Pernyataan 2 menunjukkan risiko keselamatan komputer.

    (Pahang 2012)

    Statement 2

    Pernyataan 2

    Based on statement 2, / Berdasar kepada pernyataan 2,

    State who is someone? Explain one category of someone.

    Nyatakan siapaseseorang? Huraikan satu daripada kategoriseseorang

    1.3.3 Security Measures

    1.3.3.1 Select the appropriate security measures to overcome the identified computer

    threats

    1.3.3.2 Apply the correct security procedures:

    Antivirus Anti-Spyware Cryptography Firewall Data backup Human aspects

    SECTION A

    1. Figure 3 shows how cryptography works

    Rajah 3 menunjukkan bagaimana kriptografi bekerja.

    (SPM 2007)

    Name H : / Namakan H :

    2. Table 2 shorws the steps of using anti-virus software which is not in the

    correct sequence.

    Plaintext H PlaintextEncrypt Decrypt

    Amirul need to submit his multimedia presentation on tomorrow

    morning. While working on his computer, he discover some of

    files missing and some altered. He realize that someonehave

    accessed his computer, who commit or responsible to wrong

    doing.

    Amirul perlu menghantar persembahan multimedia pada

    keesokan hari. Semasa membuat kerja di komputer, dia

    mendapati beberapa fail telah hilang. Dia menyedari

    seseorangtelah mengakses ke komputernya, orang yang

    bertanggungjawab membuat kesalahan.

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    28/35

    28

    Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang

    tidak mengikut urutan yang betul.

    (SPM 2011)

    Complete the step. Step 1 and 3 are given.

    Lengkapkan langkah itu. Langkah I dan 3 diberi.Choose anti virus software/Pilih perisian anti virus (i) 1

    Take necessary action /Ambil tindakan yang perlu (ii) ..

    Scan the selected area /Imbas kawasan yang dipilih (iii) 3

    Select area to be scanned /Pilih kawasan yang akan diimbas (iv) ..

    Table 2 /Jadual 2

    (ii) (iv)

    3. Figure 1(a) and Figure 1(b) show the problems faced when surfing the internet.

    Rajah 1(a) dan Rajah 1(b) menunjukkan masalah yang dihadapi semasa melayari

    internet.

    Figure 1(a) Figure 1(a) Rajah 1(b) Rajah 1(b)

    Based on Figure 1(a) and Figure 1(b), match the problems above according to the

    correct security measures:

    Berdasarkan Rajah 1(a) dan Rajah 1(b), padankan masalah di atas berdasarkan

    langkah keselamatan yang betul:(i) Figure 1(a) /Rajah 1(a)

    ..

    (ii) Figure 1(b) / Rajah 1(b)

    ..

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    29/35

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    30/35

    30

    2. Figure 6 shows a security procedure done by Affendi.

    Rajah 6 menunjukkan prosedur keselamatan yang dilaksanakan oleh Affendi

    (

    T

    r

    e

    n

    g

    g

    a

    n

    u

    2

    0

    Figure 6 / Rajah

    Based on Figure 6, / Berdasarkan Rajah 6,

    (a) Name the security procedure.Namakan prosedur keselamatan tersebut. [1 mark]

    (b) State the steps taken to apply this security procedure.

    Nyatakan langkahlangkah yang diambil bagi menggunakan prosedur

    keselamatan ini. [3 marks]

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    31/35

    31

    SECTION C

    1. Figure 11 is an excerpt from an online newspaper.

    Rajah 11 menunjukkan petikan daripada akhbar atas talian

    (Kedah 2012)

    Figure 11 / Rajah 11

    Based on Figure 11: /Berdasarkan Rajah 11:

    Describe the security measure that should be taken to protect government

    website from the specified threat.

    Huraikan langkah keselamatan yang perlu diambil untuk melindungi tapak web

    kerajaan daripada ancaman yang dinyatakan.

    [3 marks] [3 markah]

    KUALA LUMPUR: More laws will be introduced soon to tackle cyber intrusion.

    Deputy Information, Communications and Culture Minister Dato Joseph Salang

    Gandum said this move followed the attacks on 198 websites, including government

    portals, by the "Anonymous" hacker group last week.

    "We have to set up stronger cyber security measures and ensure that government

    websites are protected from such activities in the future."

    (Straits Time; 21 June, 2011)

    KUALA LUMPUR:Lebih banyak undang-undang akan diperkenalkan tidak lama lagi

    bagi mengatasi gangguan siber. Timbalan Menteri Penerangan Komunikasi dan

    Kebudayaan Dato Joseph Salang Gandum mengatakan bahawa tindakan ini

    berikutan daripada serangan ke atas 198 laman sesawang termasuk portal

    kerajaan oleh kumpulan penggodam Anonymous minggu lepas.

    Kita perlu menetapkan langkah-langkah keselamatan siber yang lebih kukuh dan

    memastikan laman-laman web kerajaan dilindungi pada masa akan datang.

    (Straits Time; 21 Jun ,2011)

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    32/35

    32

    2. The following is a text on computer crime in television station broadcasting.

    Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.

    (N.Sembilan 2012)

    Nora works as an editor in one of the larger private television broadcasting in

    Malaysia. She uses her expertise in ICT for editing the television programs in order

    to preserve the quality before they were broadcast by the television station.

    Without companys permission Nora has made copies of the television

    programs and sells it via Internet.

    Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran

    televisyen swasta yang terbesar di Malaysia. Nora menggunakan

    kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga

    mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman

    rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa

    pengetahuan majikannya.

    Based on the text: /Berdasarkan teks itu:

    Explain TWOways from the human aspect to prevent the above crime.

    Terangkan DUAcara dari aspek kemanusiaan untuk mencegah jenayah di atas.

    (4marks)(4markah)

    3 . Statement 2 shows computer security risk.

    Pernyataan 2 menunjukkan risiko keselamatan komputer.

    (Pahang 2012)

    Statement 2

    Pernyataan 2

    Amirul need to submit his multimedia presentation on tomorrow

    morning. While working on his computer, he discover some of

    files missing and some altered. He realize that someonehave

    accessed his computer, who commit or responsible to wrong

    doing.

    Amirul perlu menghantar persembahan multimedia pada

    keesokan hari. Semasa membuat kerja di komputer, dia

    mendapati beberapa fail telah hilang. Dia menyedari

    seseorangtelah mengakses ke komputernya, orang yang

    bertanggungjawab membuat kesalahan.

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    33/35

    33

    Based on statement 2, / Berdasar kepada pernyataan 2,

    Describe twoways, how people aspects can protect their computer in (a)?

    Jelaskan duacara, bagaimana aspek manusia boleh melindungi komputer

    mereka dalam (a)? [4 marks][4 markah]

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    34/35

  • 8/11/2019 Koleksi Soalan Negeri Bab_1

    35/35

    35

    Tarikh Topik / Sub topic Tanda

    tangan

    Guru

    Catatan

    1.2.4 Computer Crimes

    1.2.4.1 Explain the need for Cyber Law.1.2.4.2 Explain briefly the computer crimes

    below: Fraud Copyright Infringement Theft

    Attacks

    1.3 Computer Security

    1.3.1 Definition

    1.3.1.1 Define computer security.

    1.3.2 Security Threats

    1.3.2.1 Explain briefly the different threats to

    computer security: Malicious code Hacking

    Natural disaster Theft

    1.3 Computer Security

    1.3.3 Security Measures

    1.3.3.1 Select the appropriate security

    measures to overcome the identified computer

    threats

    1.3.3.2 Apply the correct security procedures:

    Antivirus Anti-Spyware Cryptography

    Firewall Data backup Human aspects