7
Section A (36 mark) . 1. Figure 1 shows several generations of computer technology.  A B C  Match A, B or C with the following generations of computer technology. i) 1 st Generation computer ii) 3 rd Generation computer 2. Table 1 shows types of computer crimes. A Computer fraud B Computer theft C Computer attack Table 1 Based on Table 1, write A, B or C to categories the following activities:  (i ) E- mail hoa xes, fals e c laims o f e xpe rt is e on c er tain fi el ds. (ii ) Tap i nto t he da ta tran smi ssi on li nes and i nte nti onal tra nsf er of pa yme nts to t he 3. Answer question 3, based on the text bel ow  The above statement refers to :_____________________ any laws relating to protecting the internet and other online communication technology 

UJIAN PERTAMA F4 09

  • Upload
    pichung

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

8/9/2019 UJIAN PERTAMA F4 09

http://slidepdf.com/reader/full/ujian-pertama-f4-09 1/7

Section A

(36 mark)

.1. Figure 1 shows several generations of computer technology.

 

A B C 

Match A, B or C with the following generations of computer technology.

i) 1st Generation computer 

ii) 3rd Generation computer 

2. Table 1 shows types of computer crimes.

A Computer fraud 

B Computer theft 

C Computer attack 

Table 1

Based on Table 1, write A, B or C to categories the following activities: 

(i) E-mail hoaxes, false claims of expertise on certain fields.

(ii) Tap into the data transmission lines and intentional transfer of payments to the

3. Answer question 3, based on the text below

 

The above statement refers to :_____________________ 

any laws relating to protecting the internet and other online communication technology 

8/9/2019 UJIAN PERTAMA F4 09

http://slidepdf.com/reader/full/ujian-pertama-f4-09 2/7

Answer question 4,5 and 6, by matching the statement with correct word given below

 

4.

5.

6. B

Answer questions 7 and 8 based on diagram 1

8. Match A or B with the following statement of Intellectual property protection

i) Utility, design or plant patents that protect inventions and improvements toexisting inventions.

ii) Literary and artistic material, music, films, sound recordings and roadcasts,

including software and multimedia.

9. Match C or D with the following term of Intellectual property protection

i) Design for product appearance

ii) Trademarks for brand identity

The collection of rawunprocessed facts, figures and 

The information had been processed become the useful

 A process whereby informationis exchanged between

individuals usin s mbols, si ns

DATA INFORMATION

ICT COMMUNICATION

B

Words, names, symbols, devices and imagethat represent products, goods or services

 The features of, in particular, the lines,

contours, colors ,shape, texture or materialof the product itself or its ornamentation.

C

D

8/9/2019 UJIAN PERTAMA F4 09

http://slidepdf.com/reader/full/ujian-pertama-f4-09 3/7

10. Diagram 2 below shows a security measures taken to protect information

Name the security measures above _____________________.

Answer true or false for the following statement

11. We can only find limited sources of information on the Internet.

12. The usage of ICT technologies such as to create pornographic web sites can have a

negative impact on society.

13. Cyber law is a system of moral standards or values used as a guideline for 

computer users.

14. Spyware is antivirus

15. A firewall permits limited access to unauthorised users or any activities from the

network environment

16. In presentation should contain three well-defined sections Introduction, Content andConclusion.

17. Virus a program that can pass on the malicious code to other programs by modifyingthem.

18. Site blocking is a process that prevents or blocks access to certain materials on theInternet.

19. Hacking is a form of cyber crime.

20. Computer ethics and law is the same concept

Fill in the blanks with the correct answers.

21. .____________  are used to identify users by web casting, ecommerce and other web

applications.

22. ____________ is privacy threat which is obtained by a form such as magazine

subscription or product warranty cards that had been filled by online subscribers.A

Plaintext Decryption Plaintext

8/9/2019 UJIAN PERTAMA F4 09

http://slidepdf.com/reader/full/ujian-pertama-f4-09 4/7

 __________________   refers to a program that collects user information without the

user’s knowledge.

23. ____________ Oral communication of false statements and malicious statement

or report about someone to injurious to a person's reputation.

24. We need privacy for anonymity, privacy can be protected by _________________ 

and ______________ such as anti-spam program, firewall, and _____________.

25.  _____________ includes virus, Trojan horse, logic door, trapdoor and backdoor, and

many others. A ____________ is a program that copies and spreads itself through a

network. Example of a antivirus is _______________.

 

SECTION B

Question 1.

a. What is ethics?

 ________________________________________________________________  

 b. State the differences between ethics and law. Fill in the box with the correct answer.

ETHICS LAW

[2 marks]

Question 2

Technology A

8/9/2019 UJIAN PERTAMA F4 09

http://slidepdf.com/reader/full/ujian-pertama-f4-09 5/7

a. Name the technology A. ( 1 mark)

A is: ____________________________________________________________ 

 b. Technology A is one of two mehod used in _______________________.(1 mark)

 

c. State two example of technology A. . (2 marks)

i. ___________________________________________________________ 

 __ 

ii. ___________________________________________________________ 

 __ 

Question 2

.

a. What is computer crime ? [2 mark ]

  b. Give two types computer crime [2 marks]

 

Question 4a) Give two method commonly use in verification. [2 marks]

i)_____________________________________________________________________ 

ii)_____________________________________________________________________ 

  b) State two examples of validating process. [2 marks]

i)_____________________________________________________________________ 

ii)_____________________________________________________________________ 

 

Question 5a) State two negative impacts of Internet on the society. [2 marks]

i)_____________________________________________________________________ 

ii)_____________________________________________________________________ 

8/9/2019 UJIAN PERTAMA F4 09

http://slidepdf.com/reader/full/ujian-pertama-f4-09 6/7

  b) State two positive impacts of Internet on the society. [2 marks]

i)____________________________________________________________________ 

ii)_____________________________________________________________________ 

SECTION C

Base on the picture below, answer all the questions.

a) What is pornography? [1 mark]

 ____________________________________________________________ 

 b) Give two impacts of controversial content on Malaysia society.[4 marks]

i)_______________________________________________________________ 

ii)

 ________________________________________________________________ 

c) Give two preferred method of choice to limit access on the internet to filter 

 pornography content. [2 marks]i) _________________________________________ 

ii) _________________________________________ 

8/9/2019 UJIAN PERTAMA F4 09

http://slidepdf.com/reader/full/ujian-pertama-f4-09 7/7