22
Name : ………………………………………………………….. Class : …………………… SECTION A (50 MARKS) Write your answer on the answer sheet given. 1. Choose the correct statement to define Information and Communication Technology (ICT). Pilih pernyataan yang paling tepat untuk mendefinisikan Teknologi Maklumat dan Komunikasi (ICT). A. Information and Communication Technology is composed of three main components of a computer, Internet and networking. Teknologi Maklumat dan Komunikasi (ICT) terdiri daripada tiga komponen utama iaitu komputer, internet dan rangkaian. B. Information and Communication Technology (ICT) is a technology used by people to improve their lives. Teknologi Maklumat dan Komunikasi (ICT) adalah teknologi yang digunakan oleh manusia untuk meningkatkan kehidupan mereka. C. Information and Communication Technology (ICT) is a technology that is needed to process the information using electronic equipment and software applications to transfer, store, send and receive data. Teknologi Maklumat dan Komunikasi (ICT) adalah satu teknologi yang diperlukan untuk memproses maklumat menggunakan peralatan elektronik dan perisian aplikasi untuk memindah, menyimpan, menghantar dan menerima data. 1

soalan ICT tingkatan 4

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: soalan ICT tingkatan 4

Name : ………………………………………………………….. Class : ……………………

SECTION A (50 MARKS)

Write your answer on the answer sheet given.

1. Choose the correct statement to define Information and Communication Technology (ICT).

Pilih pernyataan yang paling tepat untuk mendefinisikan Teknologi Maklumat dan Komunikasi (ICT).A. Information and Communication Technology is composed of three main components of a

computer, Internet and networking.Teknologi Maklumat dan Komunikasi (ICT) terdiri daripada tiga komponen utama iaitu komputer, internet dan rangkaian.

B. Information and Communication Technology (ICT) is a technology used by people to improve their lives.Teknologi Maklumat dan Komunikasi (ICT) adalah teknologi yang digunakan oleh manusia untuk meningkatkan kehidupan mereka.

C. Information and Communication Technology (ICT) is a technology that is needed to process the information using electronic equipment and software applications to transfer, store, send and receive data.Teknologi Maklumat dan Komunikasi (ICT) adalah satu teknologi yang diperlukan untuk memproses maklumat menggunakan peralatan elektronik dan perisian aplikasi untuk memindah, menyimpan, menghantar dan menerima data.

D. Information and Communication Technology (ICT) is any communication facilities and computer-based applications.Teknologi Maklumat dan Komunikasi (ICT) adalah sebarang komunikasi dan kemudahan aplikasi berasaskan komputer.

1

Page 2: soalan ICT tingkatan 4

2. Information may come in various forms such as ________. Maklumat diperoleh dari pelbagai bentuk seperti ________

I Reading II InvestigationBacaan Penyiasatan

III Study IV Research Tinjauan Kajian

A. I and II

B. II and III

C. II, III and IV

D. All the above

3. Information refers to Maklumat merujuk A. an act of transmitting messages

suatu tindakan menghantar mesejB. the knowledge obtained from reading, investigation, study or research.

pengetahuan yang diperolehi dari membaca, kajian penyiasatan, atau penyelidikanC. the use of scientific knowledge, experience and resources to create processes and

products that fulfill human needspenggunaan sains, pengalaman, pengetahuan dan sumber daya untuk mencipta proses dan produk

yang memenuhi keperluan manusiaD. the technology required for information processing, in particular, the use of electronic

computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytimeteknologi yang diperlukan untuk memproses maklumat, khususnya, penggunaan komputer elektronik, peranti komunikasi dan aplikasi perisian untuk menukar, menyimpan, melindungi, proses, menghantar dan mengambil maklumat dari mana saja, bila-bila masa sahaja

4. Thus the invention of cellular phones, television and other electronic devices are important in enhancing _________as a whole.Penciptaan telefon bimbit, televisyen dan peranti elektronik lain penting dalam meningkatkan ________ secara keseluruhan.A. Games / permainan

2

Page 3: soalan ICT tingkatan 4

B. Animation / animasiC. Multimedia / multimediaD. Communication / komunikasi

5. Suhaimi spreads a rumor that a prime minister is receiving bribes. Suhaimi’s conduct is called

Suhaimi menyebarkan khabar angin tentang Perdana Menteri menerima rasuah. Perbuatan

Suhaimi adalah__________

6. Which of the following statements is related to the Positive Impact of ICT on the society?Manakah antara berikut berkait rapat dengan kesan ICT ke atas masyarakat?I. Information travels borderless through the Internet.I.Maklumat perjalanan tanpa batas melalui internet.

II. People can receive information faster by using ICT technology.II. Orang boleh menerima maklumat lebih cepat dengan menggunakan teknologi ICT.

III. Using computers frequently and for long hours is harmful to health.III. Menggunakan komputer dengan kerap dan selama berjam-jam berbahaya bagi kesihatan.

IV. Today the younger generation prefers to sit in front of computers than socialise with others.IV. Hari ini generasi muda lebih memilih untuk duduk di depan komputer daripada bersosial dengan orang lain

A. I and IIB. II and IV C. II, III and IV D. All the above

3

A. Hijacker / Pencerobohan

B. Slander / Fitnah

C. Cracker / Pemusnah

D. Hacker /Penggodam

Page 4: soalan ICT tingkatan 4

7. Which of the followings are TRUE about computer ethics?Manakah antara berikut adalah BENAR tentang etika penggunaan komputer?

I As a guideline to computer users. Sebagai garis panduan kepada pengguna komputer.

II No punishment for anyone who violates ethics.Tiada hukuman dikenakan kepada sesiapa yang melanggar etika.

III Depends on country and state where the crime is committed.Bergantung kepada negara dan kawasan di mana jenayah tersebut dilakukan.

IV Computer users are free to follow or ignore the code of ethics.Semua pengguna komputer bebas untuk mengamalkan kod etika yang digariskan.

A I, II and III B I, II and IVC I, III and IVD II, III and IV

8. Which of the following statements shows a good code of ethics in schools?Manakah dari pernyataan berikut menunjukkan kod etika yang baik di sekolah?A. Sending an email during school time to friends. Menghantar e-melkepada rakan semasa waktu sekolahB. Using the school equipment for students’ personal use. Menggunakan peralatan sekolah untuk kegunaan peribadi pelajar.C. Using own hand phone to call a friend during lunch break.

Menggunakan telefon bimbit sendiri untuk menghubungi rakan semasa waktu makan tengahari.

D. Doing an English assignment in the computer lab during Science period. Melakukan tugas Bahasa Inggeris di makmal komputer semasa waktu pelajaran sains

4

Page 5: soalan ICT tingkatan 4

9. Which of the followings are the similarities between ethics and law?Manakah daripada yang berikut adalah persamaan antara etika dan undang-undang?

I. to prevent any crime / untuk mencegah apa juga jenayahII. as a rule to control computer users

sebagai peraturan untuk mengawal pengguna komputerIII. to guide user from misusing computers

untuk panduan pengguna daripada penyalahgunaan komputerIV to create a healthy computer society, so that computers are used to contribute to a better life

untuk mencipta masyarakat yang sihat komputer, sehingga komputer digunakan untuk kehidupan yang lebih baik

A. I, II and IIIB. II, III and IVC. I, III and IVD. All above

10. Which of the following are ways to protect privacy? Manakah antara berikut adalah cara untuk melindungi kerahsiaan?

I Utilities software Perisian utiliti

II Purchase goods with cash, rather than credit card Beli barangan secara tunai berbanding kad kredit.

III Clear your history file when you are finished browsing. Padam fail arkib setelah selesai melayari Internet.

A. I only

B. I and II

C. II and III

D. I, II and III

5

Page 6: soalan ICT tingkatan 4

11. Below are steps for scanning viruses. Arrange the steps in sequence.

Berikut merupakan langkah-langkah untuk mengimbas virus. Susun langkah mengimbas mengikut

urutan yang betul.

I. Scan the selected file

Imbas fail yang telah dipilih

II. Choose an antivirus program

Pilih program antivirus

III. Wait until the scanning process is finished and the result is displayed

Tunggu proses pengimbasan sehingga selesai

IV. Select files or folders that need to be scanned

Pilih fail atau folder yang hendak diimbas

A. IV, II, I and III

B. III, I, II and III

C. II, IV, I and III

D. I, II, III and IV

12. Which of the following is NOT the example of computer fraud?

Manakah antara berikut BUKAN contoh penipuan computer?

A. E-mail hoaxes

E-mel palsu

B. Programmed Fraud

Program Palsu

C. Investment Schemes by Internet

Skim Pelaburan melalui Internet

D. Diverts goods to the wrong destinations

6

Page 7: soalan ICT tingkatan 4

Menghantar barangan ke destinasi lain

13. What are the benefits of Electronic Banking to bank customers?

Apakah kebaikan Electronic Banking kepada pengguna bank?

I 24-hour service

Perkhidmatan 24-jam

II Electronic Fund Transfer

Pemindahan Dana Elektronik

III Electronic Cash Deposits

Deposit Tunai Elektronik

IV Electronic Loan Application

Permohonan Pinjaman Elektronik

A. I,II and III

B. I,II and IV

C. I,III and IV

D. II, III and IV

14. A system of moral standards or values as a guideline for computer users is known as

Sebuah sistem moral atau nilai sebagai panduan penggunaan pengguna komputer dikenali sebagai..

A cyber laws / undang-undang siber

B cryptography / kriptografi

C code of ethics / kod etika

D computer ethics / etika komputer

7

Page 8: soalan ICT tingkatan 4

15. Table 1 shows three different fields and Figure 2 shows the use of ICT in two different fields.Jadual menunjukan tiga lapangan berbeza dan rajah 2 menunjukkan penggunaan ICT dalam 2 lapangan berlainan

Industry (industri) Banking (perbankan) Education (pelajaran)Table 1

(A) (B)

Figure 2

Based on Figure 2, match the use of ICT with the fields given in Table 1.

Berdasarkan rajah 2, padankan penggunaan ICT dengan lapangan yang diberi di jadual 1

i. A - ______

ii. B - ______

16. Study the statement 2 below carefully. / Kaji pernyataan 2 di bawah dengan teliti

Statement 2

Statement 2 above regarding to _________________ system.

Pernyataan 2 di atas merujuk kepada sistem _______________

8

Production was slow because everything was done manually and totally depended on human labour.Produksi perlahan kerana segalanya dilakukan secara manual dan bergantung secara keseluruhannya kepada buruh

Page 9: soalan ICT tingkatan 4

17. Figure 4 shows one type of verification methods.

Rajah 4 menunjukkan sejenis kaedah pengesahan

Figure 4

Based on figure 4, state the method used.

Berdasarkan rajah 4, nyatakan kaedah yang digunakan.

18. Table 7 shows the Malaysian Cyber Law.Fill in the blanks using anwers in table 7

Jadual 7 menunjukkan Undang-undang Siber Malaysia.Isi tempat kosong dengan jawapan dalam

jadual 7.

A Copyright Act 1987

Akta hak cipta 1987

B Communications and Multimedia Act 1998

Akta Komunikasi dan Multimedia 1998

C Digital Signature Act 1997

Akta Tanda Tangan Digital 1997

D Computer Crimes 1997

Jenayah Komputer 1997

E Telemedicine Act 1997

Akta Teleperubatan 1997

Table 7

i. __________________ secures electronic communications especially on the Internet.

__________________ melindungi komunikasi elektronik terutamanya internet

9

Page 10: soalan ICT tingkatan 4

ii. ________________ gives protection against the misuses of computers and computer criminal

activities such as unauthorized use of programmes, illegal transmission of data or messages over

computers and hacking and cracking of computers systems and networks.

___________memberikan perlindungan terhadap penyalahgunaan komputer dan aktiviti

komputer jenayah seperti program penggunaan yang tidak sah, haram penghantaran data

ataumesej melalui komputer dan hacking dan cracking sistem komputer dan rangkaian.

iii. __________________ ensures that only qualified medical practitioners can practice

telemedicine and that their patient’s rights and interests are protected.

________________memastikan bahawa pengamal perubatan yang berkualiti sahaja yang boleh

menggunakan teleperubatan dan bahawa hak-hak pesakit da nkepentingan mereka dilindungi

iv. The implementation of _______________________ ensures that information is secure, the

network is reliable and the service is affordable all over Malaysia.

Pelaksanaan _______________________ memastikan bahawa maklumat keselamatan,

rangkaian boleh dipercayai dan perkhidmatan yang berpatutan di seluruh Malaysia.

19. Read statement 1. Name the technology used for this generation of computers.Baca kenyataan 1. Nama teknologi yang digunakan untuk generasi komputer.

Statement 1 / Kenyataan 1

_______________________________________________________________

10

The computers for this generation use magnetic drums as storage media and

are large in size, taking up entire room. They use a great deal of electricity,

generating a lot of heat, which is often the cause of malfunctions.

Komputer-komputer generasi ini menggunakan drum magnetik sebagai media penyimpanan dan

besar dari segi saiz hampir sebesar sebuah bilik. Mereka menggunakan banyak kuasa, panas dan

yang seringkali menjadi penyebab kerosakan.

Page 11: soalan ICT tingkatan 4

A B

C

20. Figure 1 shows several components of computer technology generations.Gambar 1 menunjukkan beberapa komponen generasi teknologi komputer.

Figure 1

Match A, B, or C with the following generation of computer technology.

Padan A, B atau C berdasarkan generasi kepada teknologi komputer

i. 2nd Generation Computer

ii. 4th Generation Computer

SECTION B (20 MARKS)

21. Figure 3 shows the impact of ICT on society. / rajah 3 menunjukkan kesan ICT ke atas masyarakat

Figure 3Based on figure 3, / Berdasarkan rajah 3, berikan,

i. State two advantages of ICT on society. / 2 kelebihan ICT ke atas masyarakat (4 marks)

_________________________________________________________________

_________________________________________________________________

ii. State two disadvantages of ICT on society. / 2 Kelemahan ICT ke atas masyarakat (4marks)

___________________________________________________________________

___________________________________________________________________

11

Page 12: soalan ICT tingkatan 4

22. Table 1 shows the activities of computer crime. Jadual 1 menunjukkan aktiviti jenayah komputer

P Computer Attack / Serangan Komputer

Q Computer Theft / Kecurian Komputer

RCopyright Infringement / Pencabulan Hakcipta

S Computer Fraud / Penipuan Komputer

Table 1 Jadual 1

Based on Table 1, write P, Q, R or S for the following statement:

Berdasarkan Jadual 1, tuliskan P, Q, R atau S bagi pernyataan berikut:

i. Nazre transfer his company profit to his own account. (2marks)

Nazre memindahkan keuntungan syarikat ke dalam akaun peribadinya

_______________________________________________

ii.Kamal downloaded an assignment from the internet and claimed it is his. (2marks)

Kamal memuat turun tugasan dari internet dan mendakwa kepunyaanya

____________________________________________

23. Figure 1shows the computer security threat Rajah 1 menunjukkan ancaman keselamatan komputer.

Based on Figure 1, Berdasarkan Rajah 1, (i) State the type of computer threat. (2 marks)

Nyatakan jenis ancaman komputer. _________________________________________

(ii) Identify the type of security measure that can be done to prevent the threat in (i).(2marks) Kenalpasti langkah keselamatan yang boleh dilakukan untuk mengelak ancaman di (i)

_______________________________________________________________________

12

Page 13: soalan ICT tingkatan 4

Figure 3 shows the usage of ICT in three different fields.Rajah 3 menunjukkan penggunaan Teknologi Maklumat dan Komunikasi dalam tiga bidang yang berbeza

13

Page 14: soalan ICT tingkatan 4

Figure 3 Rajah 3

Based on statement in Figure 3,state the name of field X and Z: (4 marks)Berdasarkan Rajah 3, nyatakan nama bidang komputer X dan Z:

(i) X ………………………………………… (ii) Z …………………………………………

24. Figure 1 shows one of the authentication method. Rajah 1 menunjukkan salah satu kaedah pengesahan.

Figure 1 Rajah 1

Based on Figure 1,

Berdasarkan Rajah 1,

(i) Identify the authentication method. (2marks)

Kenalpasti kaedah tersebut.

__________________________________________

(ii) Give another example of method stated in (i). (2marks)

Berikan satu contoh lain bagi kaedah yang dinyatakan dalam (i)

________________________________________________

25. Based on the Statement 5, answer the following question.Jawab soalan berdasarkan pernyataan di bawah

14

See Yi Poi has received an e-mail stating that his favourite soda drinks “Soda Moda” uses foodcolouring that is not advisable by The Ministry of Health. He does not know the truth of thee-mail but he has forwarded the e-mail to 50 of his friends. Soda Moda label also has beenmanipulated into a picture that tends to exploit women in a distasteful manner.Yi Poi telah menerima e-mel yang menyatakan bahawa minuman soda kegemarannya "Soda Moda" menggunakan pewarna makanan yang tidak dianjurkan oleh Jabatan Kesihatan. Dia tidak tahu kebenaran e-mel tetapi ia telah

Page 15: soalan ICT tingkatan 4

Statement 5i. List two controversial contents that stated in Statement 5.( 2marks)

Senaraikan 2 kandungan kontroversi pada pernyataan 5

________________________________________________

________________________________________________

ii. State TWO impact of controversial content in society from 11(i). (4 marks)

Nyatakan satu kesan kandungan kontroversi dalam masyarakat daripada 11(i)

_____________________________________________________________________

_____________________________________________________________________

********************************** END OF QUESTIONS **************************

Prepared by: Checked by: Verified by:

________________ ___________________ _____________________

Pn.Nurul Jannah Ab.Hamid Pn.Rossilawati bt Razali

ICT Teacher Head of ICT Panel

SMK Pandan Mewah SMK Pandan Mewah

15

See Yi Poi has received an e-mail stating that his favourite soda drinks “Soda Moda” uses foodcolouring that is not advisable by The Ministry of Health. He does not know the truth of thee-mail but he has forwarded the e-mail to 50 of his friends. Soda Moda label also has beenmanipulated into a picture that tends to exploit women in a distasteful manner.Yi Poi telah menerima e-mel yang menyatakan bahawa minuman soda kegemarannya "Soda Moda" menggunakan pewarna makanan yang tidak dianjurkan oleh Jabatan Kesihatan. Dia tidak tahu kebenaran e-mel tetapi ia telah

Page 16: soalan ICT tingkatan 4

SMK PANDAN MEWAH, AMPANGINFORMATION COMMUNICATION AND TECHNOLOGY (ICT)

UJIAN AKADEMIK 1 2013 FORM 4 : MARCH 123 i

ii4 i

ii56 i

ii789 i

iiiiiiv

101112 i -

ii13 i -

16

Page 17: soalan ICT tingkatan 4

ii141516 i

iiiiiiv

17 iii

1819 i

iiJumlah markah 40

17