36
1 (INTRODUCTION OF ICT) NAMA : …………………………………………… TINGKATAN : ………………………………………….. 1.1 Introduction to Information Technology 1.1.1 Overview of Information and Communication Technology (ICT) 1.1.1.1 Define ICT. 1.1.1.2 Describe the brief evolution of computers. [email protected] ( http://rmmict.blogspot.com )

F4 learning-area-1-ict

Embed Size (px)

Citation preview

Page 1: F4 learning-area-1-ict

1

(INTRODUCTION OF ICT)

NAMA : ……………………………………………

TINGKATAN : …………………………………………..

1.1 Introduction to Information Technology 1.1.1 Overview of Information and Communication Technology (ICT)1.1.1.1 Define ICT.1.1.1.2 Describe the brief evolution of computers.

[email protected] ( http://rmmict.blogspot.com )

Page 2: F4 learning-area-1-ict

2

SECTION A

1. State the name of the first generation computer. Nyatakan nama komputer generasi pertama (SPM 2008)……………………

2. Figure 1 shows three technologies used in the generations of computers Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.

(SPM 2010)

Based on Figure 1, write A, B or C to match the following:

Berdasarkan Rajah l, tulis A, B atau C untuk dipadankan dengan berikut: (i) Second Generation /

Generasi Kedua ................... (ii) Third Generation /

Generasi Ketiga …………….

Figure 1 / Rajah 1

3.. Complete the following statement: / Lengkapkan pernyataan berikut.Information and Communication Technology is the use of computers,( i) ...........................devices and( ii) ......;:......................applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i) ……......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan , mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa. (SPM 2010)

4. The computers for this generation use magnetic drums as storage media and are large in size, taking up entire room. They use a great deal of electricity, generating a lot of heat, which is often the cause of malfunctions. Komputer-komputer generasi ini menggunakan drum magnetik sebagai media simpanan yang besar dalam ukuran sehingga memuatkan satu bilik. Ia juga

[email protected] ( http://rmmict.blogspot.com )

Page 3: F4 learning-area-1-ict

3

menggunakan banyak tenaga elektrik, menghasilkan banyak haba dan kerap menyebabkan kerosakan.

(Hulu Perak 2012)

Name the technology used for this generation of computers. Namakan teknologi yang digunakan dalam generasi komputer ini.

………………………………..

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce1.1.2.1 List the usage of ICT in everyday life.SECTION A

1. In an advanced ICT modemization, but there are positive and negative effects on the use of ICT. Which ofthe following non-negative impact on the use of ICT on society.Di dalam arus pemodenan ICT yang maju, nqmttn terdapat kesan posittf dan juga kesan negatif terhadap penggunaan ICT. Antara berikut yang-manakah bukan kesan negative terhadap penggunaan ICT terhadap masyarakat.

(Kelantan 2012)

A. Personal information will be easily exposed and this will make no privacy ofpersonal information.Maklumat peribadi seseorang akan mudah terdedah dan ini akanmembuatkan tiada privasi terhadap maklumat diri.

B. Unethical use ofICT will lead to computer crime.Penggunaan ICT yang tidak beretika akon menyebabkan berlakunyajenayah komputer

C. A person can get various information from various sources.Seseorang boleh mendapatkan pelbagai maklumat daripada pelbagaisumber

D. Some users of ICT as a waste of time but might be limited solely entertainment.Sebahagian pengguna ICT membuang masa kerana hanyalah mencarihiburan semata-mata.

2. Complete the following statement: Lengkapkan pernyataan berikut:

Table 1 is regarding to the use of ICT in everyday life. Jadual 1 merujuk kepada penggunaan TMK dalam kehidupan seharian.

(MERSING JOHOR 2012)

[email protected] ( http://rmmict.blogspot.com )

Page 4: F4 learning-area-1-ict

4

• All transactions are done by computers Semua traksaksi dilakukan dengan komputer

• Transaction can be done anytime and anyplace Transaksi boleh dilaksanakan bila-bila masa dan di mana-mana

• Example of transactions is electronic funds transfer Contoh transaksi adalah pemindahan wang elektronik

Table 1 / Jadual 1

Table 1 refer to the use of ICT in ______________________ sector. Jadual 1 merujuk kepada penggunaan ICT dalam sector _______________.

1.1.2.2 State the differences between computerised and non-computerised systems.

SECTION B

1. Figure 6 shows a situation in a banking system. / Rajah 6 menunjukkan situasi di dalam sistem bank. (Kedah 2012)

Figure 6 / Rajah 6

Based on Figure 6:/Berdasarkan Rajah 6:

(a) State the difference between system A and system B.Nyatakan perbezaan di antara sistem A dan sistem B.

[2 marks][2 markah]

[email protected] ( http://rmmict.blogspot.com )

System A System B

Sistem B

Page 5: F4 learning-area-1-ict

5

1.1.2.3 State the impact of ICT on society.

SECTION A

1. Which of these is an impact of slander towards society?Yang manakah kesan kepada fitnah terhadap masyarakat?

(P.Pinang 2012)A Closer relationship / Hubungan lebih rapatB Trust among people / Kepercayaan di antara manusiaC Higher moral behaviour / Perlakuan moral lebih tinggi.D Bad reputation of people / Reputasi buruk pada seseorang.

2. ICT has brought many positive impacts on society.ICT membawa banyak kesan positif terhadap masyarakat. (Wilayah 2012)

Figure 1/ Rajah 1

Based on Figure 1, state one positive impact of ICT on society Berdasarkan Rajah 1, nyatakan kesan positif ICT kepada masyarakat

I. Lower communication cost because people can save time and resourcesKos komunikasi yang rendah kerana manusia boleh menjimatkan masa dan sumber

II. Inappropriate online communication with unknown person through the Internet Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui Internet

[email protected] ( http://rmmict.blogspot.com )

Page 6: F4 learning-area-1-ict

6

III. Effective sharing of information and opinions Perkongsian maklumat dan pendapat yang efektif

IV. Effective sharing slander and false contentPerkongsian fitnah dan penipuan kandungan yang efektif

A. I and II B. I and III C. II and IV D. III and IV

1.2 Computer Ethics and Legal Issues1.2.1 Definition1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.

SECTION A

1. Computer ethics refers to the / Etika Komputer merujuk kepada (Kedah 2012)

I study about moral principal for computer user.kajian mengenai nilai moral untuk pengguna komputer.

II custom that guides human behavior in cyber world.budaya yang membimbing tingkah laku manusia dalam dunia siber.

III regulation that must be obeyed by the public.peraturan yang perlu dipatuhi oleh orang awam.

IV knowledge about what is good and what is bad when using computer.pengetahuan mengenai apa yang baik dan apa yang buruk apabila menggunakan komputer.

A I, II and III / I, II dan III B I, II and IV / I, II dan IVC I, III and IV / I, III dan IV D II, III and IV / II, III dan IV

2.. Table 1 shows the characteristics of X and Y in computer usage guideline.Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan komputer.

(SPM 2011)X Y

Moral guidelines for computer users.Garis panduan moral untuk

penggLrna komputer.

Rules for computer users.Peraturan-peraturan untuk pengguna

komputer.No penalty or punishment.

Tiada penalti atau hukuman.Penalties or punishments imposed.Penalti atau htLkuman dikenakan.

Table 1 / Jadual 1lBased on Table 1, state: / Berdasarkan Jadual I . nyatakan:

[email protected] ( http://rmmict.blogspot.com )

Page 7: F4 learning-area-1-ict

7

(i) X ……………………………………………(ii) Y ……………………………………………

3. Table I below shows the number of terms of security threats.Jadual I di bawah menunjukkan beberapa istilah ancaman keselamotan.

(Kelantan 2012)

A Piracy / Cetak rompakB Natural disaster / Bencana AlamC Malicious code / Kod HasadD Hacking / Pengodam

Tabel I /Jadual I

Ahmad had downloaded the songs online and make copies for sale to thepublic……..Ahmad telah memuat turun laguJagu di atas talian dan membuat salinanuntuk dijual kepada orang ramai………

4. Figure 2 shows Intellectual Property types.Rajah 2 menunjukkan jenis-jenis Harta Intelek. (Wilayah 2012)

Figure 2 / Rajah 2

Based on Figure 2, state X and Y.

[email protected] ( http://rmmict.blogspot.com )

X Y

Intellectual propertyHarta Intelek

Page 8: F4 learning-area-1-ict

8

Berdasarkan Rajah 2, nyatakan X dan Y.

X: …………………………………….Y: …………………………………….

SECTION B

1. Figure 6 shows a situation in a banking system. / Rajah 6 menunjukkan situasi di dalam sistem bank.

(Kedah 2012)

Figure 6 / Rajah 6

Based on Figure 6:/Berdasarkan Rajah 6:State two reasons why bank clients who use system B should be protectedunder the Malaysian Cyber Law.Nyatakan dua sebab mengapa pelanggan bank yang menggunakan sistem Bharus dilindungi di bawah Undang-undang Siber Malaysia.

[2 marks][2 markah] …………………………………………………………………………………………………. …………………………………………………………………………………………………. ………………………………………………………………………………………………….

1.2.1.2 Differentiate between ethics and law.

SECTION A

1. State whether the following statement is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu

(P..Pinang 2012)

We need computer ethics and laws to guide users from misusing the computer.Kita memerlukan etika dan undang-undang komputer sebagai panduan kepadapengguna supaya tidak menyalahgunakan komputer.

[email protected] ( http://rmmict.blogspot.com )

System A

Sistem A

System B

Sistem B

Page 9: F4 learning-area-1-ict

9

……………………

2. Choose the false statement about ethics and lawPilih penyataan yang salah tentang etika dan undang-undang.

(Wilayah 2012)Ethics Law

A. Universal / universal Depend on country / Bergantung kepada sesebuah negara

B. Crime / Jenayah Immoral / Todak bermoralC. Free to follow / Bebas diikuti Must follow / Mesti diikutiD. Guide the users / Panduan

kepada penggunaControl the users / Mengawal pengguna

1.2.1.3 State the need for intellectual property laws.1.2.2 Privacy 1.2.2.1 List ways to protect privacy.

SECTION A

1. Table 1 shows terms of computer ethics and legal issues.Choose the correct term for each given statement.

(Wilayah 2012)

Jadual 1 menunjukkan istilah bagi etika komputer dan isu-isu perundangan.Pilih istilah yang betul bagi setiap pernyataan berikut.

IntellectualProperty

Privacy ComputerCrime

Table 1 / Jadual 1

i. Protect ideas, inventions, unique names, business models, industrial processes, computer program codes and more.

Melindungi idea, ciptaan, nama-nama unik, model perniagaan, proses perindustrian, kod program komputer dan lain-lain.…………………………………….

ii. The right of individuals and companies to deny or restrict the collection and use of data and information about them.Hak individu dan syarikat dalam menafikan atau membataskan penggunaan data dan maklumat tentang mereka.…………………………………….

2. Choose the correct answer. Pilih jawapan yang betul.

(Hulu Perak 2012)

[email protected] ( http://rmmict.blogspot.com )

Page 10: F4 learning-area-1-ict

10

Intellectual Property / Harta Intelek

Privacy / Privasi

Copyright / Hak cipta

The right of individuals to control the collection and use of information about themselves refers to the right of _____________________________. Hak individu untuk mengawal pengumpulan dan penggunaan maklumat mengenai diri mereka merujuk kepada ___________________________.

SECTION B

1. The following is a statement on information privacy. Pernyataan berikut berkaitan keperibadian maklumat

(SPM 2007)

Based on the statement, list four ways of making personal data more private. Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi lebih peribadi

i) ………………………………………………………………………………………….ii) ………………………………………………………………………………………….

iii) …………………………………………………………………………………………. iv) ………………………….……………………………………………………………….1.2.2.2 State authentication and verification methods/technologies.

SECTION A

1. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti biometrik.

(SPM 2009 )

Based on Figure l, / Berdasarkan Rajah 1,

(i) State the name of the device. / Nyatakan nama peranti itu.…………………………………………………………………………………………

(ii) State the function of the device / Nyatakan fungsi peranti itu.……………………………………………………………………………………………………………………………………………………………………………………

2. Figure I5(a) and Figure I5(b) show biometric authentication methods.Rajah I5(a) dan Rajah 15(b) menunjukkan kaedah pengesahan biometrik.

[email protected] ( http://rmmict.blogspot.com )

“Information privacy refers to the right of individuals and organisations to deny or restrict the collection and use the information about them”Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk menafi atau mengelakkan hasil dan maklumat mereka digunakan.

Page 11: F4 learning-area-1-ict

11

(Kelantan 2012)

Figure 15(a) / Rajah 15(a) Figure 15(b) / Rajah 15(b)

Based on Figure l5(a) and Figure I 5(b) state the method usedBerdasarkan Rajah 15 (a) dan Rajah I5(b), nyatakan kaedah yang digunakan.

(i) Figure 15(a) / Rajah 15(a) …………………………………………..(i) Figure 15(b) / Rajah 15(b) …………………………………………..

3. Example used in verification methods is except ________________Contoh yang digunakan dalam Kaedah verikfikasi kecuali ______________

(Pahang 2012)A Identification Card /Kad Pengenalan diriB Security Token / Keselamatan tokenC Cell Phone / Telefon bimbitD Fingerprint Recognition / Pengesahan cap jari

4. State whether the following is True or False.Nyatakan sama ada penyataan berikut Benar atau Palsu.

(Perlis 2012)

(i) A fingerprint is an imprint made by the pattern of the skin on the pad of a human finger.Cap jari adalah cap yang dibuat melalui satu corak dari tapak jari kulit manusia.…………………………

5. Figure 1 shows three authentication and verification methods. Rajah 1 menunjukkan tiga kaedah pembuktian dan pengesahan.

(Trengganu 2012)

[email protected] ( http://rmmict.blogspot.com )

Page 12: F4 learning-area-1-ict

12

Figure 1 / Rajah 1 Based on Figure 1, write A, B or C to match the following statements: Berdasarkan Rajah 1, tuliskan A, B atau C untuk memadankan pernyataan berikut:

(i) This method provides the ability to deliver a signature to an organisation. Kaedah ini menyediakan kebolehan untuk menghantar tandatangan kepada organisasi. ..………..

(ii) This method requires users to place their hand onto a scanner surface. Kaedah ini memerlukan pengguna untuk meletakkan tangan ke ataspermukaan pengimbas. …………..

6. Figure 1 shows information on two types of authentuication methods.Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan

(SPM 2012)

Based on figure 1 , state the name of / berdasarkan rajah 1, namakani. P ……………………………….. ii. Q ….……………………………

1.2.3 Controversial Contents and Control1.2.3.1 List effects of controversial contents on society:• Pornography • SlanderSECTION A

[email protected] ( http://rmmict.blogspot.com )

Authentication methodsKaedah pengesahan

P Q

Taxi services booking / tempahan perkhidmatan teksi

Purchase using credit card / pembelian menggunakan kad kredit

- Retinal scanning / pengimbasan retina- voice recognition / Pengecaman suara

Page 13: F4 learning-area-1-ict

13

1. Table 2 shows the effects of controversial content on society.Jadual 2 menunjukkan kesan-kesan isu kontroversial dalam masyarakat.

(Wilayah 2012)

Table 2 / Jadual 2

State the type of controversial content on society.Nyatakan jenis bagi isu kontroversial dalam masyarakat……………………………………………………….

SECTION B

1.

Statement 1 / Pernyataan 1 (P.Pinang 2012)

Based on Statement 1, answer the following questions:Berdasarkan Pernyataan 1, jawab soalan-soalan berikut:

a) State the controversial content that stated in Statement 1. Justify youranswer.Senaraikan satu kandungan kontroversi yang dinyatakan dalam

pernyataanJustifikasikan jawapan anda. [2 marks][2 markah]……………………………………………………………………………………………………………………………..

[email protected] ( http://rmmict.blogspot.com )

• Lead to sexual addiction.Mendorong ketagihan seks.

• Lead to perversionMendorong sifat penyumbalewengan

• Increase in rape cases

Page 14: F4 learning-area-1-ict

14

…………………………………………………………………………………………..b) Give two negative impacts of Ali’s action to the fast food company.

Berikan 2 kesan negatif perbuatan Ali terhadap syarikat makanan segeratersebut. [2 marks][2 markah]

…………………………………………………………………………………………..…………………………………………………………………………………………..

1.2.3.2 Describe the process of filtering to control access to controversial contentsSECTION A

1. Figure 2 shows part of an algorithm for a web page filter.Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.

(SPM 2009)

Figure 2 / Rajah 2

State the filtering method used in the algorithm. Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.………………………………………………..

2 Complete the following statement:/ Lengkapkan pernyataan berikut:

[email protected] ( http://rmmict.blogspot.com )

Page 15: F4 learning-area-1-ict

15

(Kedah 2012)

Ahmad and Ah Chong want to control the access to the controversial contents before their kids use the Internet. Ahmad decides to use _______(i)_________ process. He lists the websites that he will block with Internet-filtering software. Ah Chong chooses ______(ii)__________ process. He sets the browser to only accept pages with certain level of ratings.Ahmad dan Ah Chong mahu mengawal akses kepada kandungan kontroversi sebelum anak mereka menggunakan Internet. Ahmad memutuskan untuk menggunakan proses ______(i)__________. Beliau menyenaraikan laman-laman web yang hendak disekat dengan menggunakan perisian tapisan Internet. Ah Chong memilih proses ______(ii)__________. Beliau menetapkan pelayar web agar hanya menerima halaman yang mempunyai tahap penilaian tertentu.

(i)

(ii)

3. State whether the following statements is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu

(Kelantan 2012)

Site blocking is aprivate combination of character associated with a username……………..Sekatan laman web adalah kombinasi rahsia aksara berkoitan dengannama pengguns……………….

4. Figure 2 shows the display of an internet filtering softwareRajah 2 menunjukkan paparan pada satu perisian penapisan internet

(SPM 2012)

[email protected] ( http://rmmict.blogspot.com )

FILTERING SETTINGS FILTERING SETTINGS

Restricted List

http://www.seperti.comhttp://www.jalan.com

ADDADD REMOVE EXIT

Page 16: F4 learning-area-1-ict

16

Figure 2 / Rajah 2

Based on Figure 2 , state the method usedBerdasarkan rajah 2 nyatakan kaedah yang digunakan

…………………………………………………………….

SECTION B1. Figure 16 below is an example of Internet filtering used by Puan Asiah to control

access of certain website.Rajah 16 merupakan contoh Internet filtering yang digunakan oleh Puan Asiah untuk mengawal capaian kepada laman web tertentu. (Wilayah 2012)

Figure 16 / Rajah 16

Based on Figure 16 : / Berdasarkan Rajah 16:a. State two other methods beside mention above that can be used to control

access of controversial content

[email protected] ( http://rmmict.blogspot.com )

Chat, Sex

Page 17: F4 learning-area-1-ict

17

Namakan dua kaedah lain selain yang dinyatakan di atas yang boleh digunakan untuk mengawal kandungan kontroversi [2 marks][2 markah]....................................................................................................................................................

b. Explain why does Puan Asiah need to prevent her son from accessing the content.

Terangkan kenapa Puan Asiah perlu menghalang anaknya daripada memasuki kandungan tersebut. [2 marks][2 markah]................................................................................................................................................................................................................................................................ ................................................................................................................................

SECTION C

1. Figure ……. below shows issues on controversial contents.Rajah… dibawah menunjukkan isu kandungan kontroversial

(Perlis 2012)

[email protected] ( http://rmmict.blogspot.com )

Page 18: F4 learning-area-1-ict

18

Figure 12 / Rajah 12(a) (i) What is pornography? / Apakah maksud pornografi?

................................................................................................................................

................................................................................................................................ ....

............................................................................................................................(ii) Give two impact of controversial content on Malaysia society

Beri dua impak kandungan controversial dalam masyarakat Malaysia.

................................................................................................................................

................................................................................................................................[3 marks][3 markah]

(b) Give two preferred method of to limit access on the internet to filter pornography content, and explain briefly.Berikan dua cara yang sesuai untuk mengurangkan pencapaian ke internetbagi menyaring bahan lucah and terangkan dengan ringkasnya.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

[4 marks][4 markah]

1.2.4 Computer Crimes1.2.4.1 Explain the need for Cyber Law.

SECTION A

1. Cyber law is a system of moral standards or values used as a guideline for computer users. (T/F)Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang digunakan sebagai pedoman bagi pengguna komputerTRUE / FALSE (SPM 2007)

2. Which of the following are related to the computer laws? Manakah yang berikut berkait dengan undang-undang komputer?

(Selangor 2012)I. Depend on country and state where the crime is committed

[email protected] ( http://rmmict.blogspot.com )

Page 19: F4 learning-area-1-ict

19

Bergantung kepada negara dan negeri di mana jenayah berlaku II. Prevent misuse of computers

Untuk mengelakkan penyalahgunaan komputer III. Act as guideline to computer users

Panduan kepada pengguna komputer IV. Can be applied anywhere

Boleh digunakan di mana-mana

A. I and II B. I and III C. II and IV D. III and IV

SECTION C

1. The following is a text on computer crime in television station broadcasting. Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.

(N.Sembilan 2012)

Nora works as an editor in one of the larger private television broadcasting in Malaysia. She uses her expertise in ICT for editing the television programs in order to preserve the quality before they were broadcast by the television station. Without company’s permission Nora has made copies of the television programs and sells it via Internet.Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran televisyen swasta yang terbesar di Malaysia. Nora menggunakan kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa pengetahuan majikannya.

Based on the text: / Berdasarkan teks itu:

Explain why cyber laws are important for television station broadcasting.Terangkan mengapa undang-undang siber adalah penting untuk stesen penyiaran televisyen. [2 marks] [2 markah]

................................................................................................................................

................................................................................................................................

................................................................................................................................

1.2.4.2 Explain briefly the computer crimes below: • Fraud • Copyright Infringement • Theft • AttacksSECTION A

1. Figure 1 showing example of computer [email protected] ( http://rmmict.blogspot.com )

Page 20: F4 learning-area-1-ict

20

Rajah 1 menunjukkan contoh jenayah komputer. (Pahang 2012)

. Figure 1 / Rajah 1

Based on figure 1, state types of computer crimes in : Berdasarkan rajah 1, nyatakan jenis jenayah komputer di :

(i) X …………………………………………(ii) Y …………………………………………

2. Fill in the blanks with the correct word. Isi tempat kosong dengan perkataan yang betul.

(Terengganu 2012)

(i) Activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data is called _____________ . Aktiviti-aktiviti yang diambil untuk mengganggu peralatan sistem komputer, mengubah pemproses kawalan atau data yang tersimpan rosak dipanggil ____________.

(ii) Transfering of payments to the wrong accounts is an example of _____________ . Pemindahan bayaran bagi akaun-akaun salah ialah satu contoh _____________ .

SECTION B1. Figure 8 shows issues and concern among internet users.

Rajah 8 menunjukkan isu –isu dan kebimbangan dikalangan pengguna internet.

[email protected] ( http://rmmict.blogspot.com )

X Y

Integrity And Security Of Information

Legal Status Of Online Transaction

Privacy And confidentially

Of Information

Security Of Government

Data

Page 21: F4 learning-area-1-ict

21

Figure 8 / Rajah 8(a) The above concerns and issues show the need of ....................

Kebimbangan dan isu-isu di atas menunjukkan keperluan kepada........................ [1 mark][1 markah]

(b) Explain one of the computer crime which involve Legal status of Online Transaction.

Terangkan satu daripada jenayah computer yang berkaitan dengantransaksi atas talian................................................................................................................................................................................................................................................................................................................................................................................................

[3 marks][3 markah]

2. (a) What is computer crime?Apa maksud jenayah computer? (Perlis 2012) ................................................................................................................................................................................................................................................................ [2 mark ][2 markah]

(b) Figure 7 shows examples of computer crimeRajah 7 menunjukkan contoh jenayah computer

[email protected] ( http://rmmict.blogspot.com )

Page 22: F4 learning-area-1-ict

22

FigFigure7 / Rajah 7

State two methods on how to prevent computer crimes?Nyatakan dua cara bagi mengatasi jenayah computer?................................................................................................................................................................................................................................................................................................................................................................................................

[2 mark ][2 markah]

SECTION C

1. The following is a text on computer crime in television station broadcasting. Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.

(N.Sembilan 2012)

Nora works as an editor in one of the larger private television broadcasting in Malaysia. She uses her expertise in ICT for editing the television programs in order to preserve the quality before they were broadcast by the television station. Without company’s permission Nora has made copies of the television programs and sells it via Internet.

Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran televisyen swasta yang terbesar di Malaysia. Nora menggunakan kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa pengetahuan majikannya.

[email protected] ( http://rmmict.blogspot.com )

Page 23: F4 learning-area-1-ict

23

Based on the text: / Berdasarkan teks itu:(a) State the computer crime that has been done by Nora.

Nyatakan jenayah komputer yang telah dilakukan oleh Nora.……………………………………………………. [1 marks][1markah]

1.3 Computer Security1.3.1 Definition1.3.1.1 Define computer security.SECTION A1. Write True or False for the following statement : Tuliskan Benar atau Palsu pada pernyataan berikut:

(Pahang 2012)

Computer security means protecting strangers to read our e-mail or use our computer to attack other systems.

Keselamatan komputer bermakna melindungi orang yang tidak dikenali untuk membaca e-mel atau menggunakan komputer kita untuk menyerang sistem lain.

………………………….

1.3.2 Security Threats1.3.2.1 Explain briefly the different threats to computer security:• Malicious code • Hacking • Natural disaster • Theft SECTION A

1. Table I below shows the number of terms of security threats.Jadual I di bawah menunjukkan beberapa istilah ancaman keselamotan.

(Kelantan 2012)

A Piracy /Cetak rompakB Natural disaster / Bencana AlamC Malicious code / Kod HasadD Hacking / Pengodam

Tabel 1 /Jadual 1

Mr. Farid has made copies of all company data to be stored in a safe place to avoid flooding……..En. Farid telah membuat salinan terhadap semua data syarikatnya untukdisimpan di tempat yang selamat bagi mengelakkan dari banjir……..

2. Table 1 shows the threats to computer security Jadual 1 menunjukkan ancaman kepada keselamatan komputer

[email protected] ( http://rmmict.blogspot.com )

Page 24: F4 learning-area-1-ict

24

(Pahang 2012)

J Worm

K Hacking

L Nature / environment

M TheftTable 1 / Jadual 1

Based on table 1, write J, K, L or M for suitable statement below:Berdasarkan jadual 1, tulis J, K, L atau M untuk pernyataan yang sesuai di bawah:

(i) A program that can pass on the malicious code to other programs by modifying them……………….

Satu program yang boleh memindahkan kod berniat jahat kepada program-program lain dengan mengubah mereka……………….

(ii) Computer is used to steal goods and information.……………….Komputer digunakan untuk mencuri barang-barang dan maklumat…………

3. State whether the following is True or False.Nyatakan sama ada penyataan berikut Benar atau Palsu.

(Perlis 2012) (i) A fingerprint is an imprint made by the pattern of the skin on the pad of a

human finger………Cap jari adalah cap yang dibuat melalui satu corak dari tapak jari kulit manusia………..

(ii) Email with spam features is a service that receives email messages from unrecognized sources……………..Email dengan spam merupakan satu perkhidmatan menerima pesananemail dari sumber yang tidak diketahui………….

4. Match the statements (a) and (b) with the security threats in Table 1.Padankan kenyataan (a) dan (b) dengan ancaman keselamatan dalam Jadual 1. (P.Pinang 2012)

Security Threats / Ancaman KeselamatanMalicious Kod / Kos Hasad

Hacker / PenggodamTheft / Kecurian

Table 1 / Jadual 1

i. ________________ is the illegal taking of another person's property without thatperson's permission

[email protected] ( http://rmmict.blogspot.com )

Page 25: F4 learning-area-1-ict

25

________________ adalah pengambilan secara haram harta orang lain tanpa

kebenaran.

ii. _______________ is any program code or script that is intended to causeundesired effects, security breaches or damage to a system._______________ adalah sebarang kodaturcara atau skrip yang bertujuanUntuk menyebabkan kesan luar jangka, pencerobohan sekuriti ataukerosakan pada sistem.

SECTION B

1. Figure 12 shows a pop-up message to computer users.Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer

(SPM 2011)

Figure 12 / Rajah 12Based on Figure 12: / Berdasarkan Rajah 12:(a) State two ways that causes the pop-up message to appear on the

computer screen.Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar diskrin komputer.………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

[email protected] ( http://rmmict.blogspot.com )

Page 26: F4 learning-area-1-ict

26

[2 markah]

(b) State two kinds of serious damages if a user ignore the message.Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

[2 markah]

2. Figure l8 below shows symptoms of a computer problem.Rajah 18 di bowah menunjukkan simptom pada sebuah komputer (Kelantan 2012)

O Screen displays unusual messages / Skrin memaparkan mesej pelikO Files become corrupted / Fail menjadi rosakO Files mysteriously appear / Muncul fail yang menjadi tanda tanya

Figure 18 / Rajah I8Based on the figure above; / Berdasarkan rajah di atas ;

a) Identify thetype of computer threat which matches the symptoms.Kenalpasti jenis ancaman komputer yang berpadanan dengan simptom itu.State one different examples of the threat.Nyotakan satu contoh berlainan bagi ancaman itu. (2m)i. …………………………ii. …………………………

SECTION C

1. Figure 20 shows symptoms of a computer problem Rajah 20 menunjukkan simptom pada sebuah komputer.

(SPM 2010)

- Screen displays unusual messagesSkrin memaparkan mesej pelik

- Files become corruptedFail menjadi rosak

- Fies mysteriously appearMuncul fail yang menjadi tanda Tanya

Figure 20 / Rajah 20

Based on Figure 20: / Berdasarkan Rajah 20:(a) Identify the type of computer threat which matches the symptoms.

Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.i. ………………………………….

[email protected] ( http://rmmict.blogspot.com )

Page 27: F4 learning-area-1-ict

27

State two different examples of the threat. / Nyatakan dua contoh berlainan bagi ancaman itu.ii. …………………………………iii. …………………………………

(b) Describe two reasons why the computer may have been affected by the threat in (a).Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).Suggest two ways to prevent it.Cadangkan dua cara untuk mengatasinya....................................................................................................................................................................................................................................................................................................

2. Figure 11 is an excerpt from an online newspaper.Rajah 11 menunjukkan petikan daripada akhbar atas talian

(Kedah 2012)

[email protected] ( http://rmmict.blogspot.com )

KUALA LUMPUR: More laws will be introduced soon to tackle cyber intrusion.

Deputy Information, Communications and Culture Minister Dato’ Joseph Salang Gandum said this move followed the attacks on 198 websites, including government portals, by the "Anonymous" hacker group last week.

"We have to set up stronger cyber security measures and ensure that government websites are protected from such activities in the future."

(Straits Time; 21 June, 2011)

KUALA LUMPUR:Lebih banyak undang-undang akan diperkenalkan tidak lama lagi bagi mengatasi gangguan siber. Timbalan Menteri Penerangan Komunikasi dan Kebudayaan Dato’ Joseph Salang Gandum mengatakan bahawa tindakan ini berikutan daripada serangan ke atas 198 laman sesawang termasuk portal kerajaan oleh kumpulan penggodam “Anonymous” minggu lepas.

“Kita perlu menetapkan langkah-langkah keselamatan siber yang lebih kukuh dan memastikan laman-laman web kerajaan dilindungi pada masa akan datang.

(Straits Time; 21 Jun ,2011)

Page 28: F4 learning-area-1-ict

28

Figure 11 / Rajah 11Based on Figure 11:/Berdasarkan Rajah 11:

Explain another two types of threats that may harm the government web site.Terangkan dua jenis ancaman lain yang mungkin memudaratkan tapak web kerajaan.

[4 marks][4 markah]……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

3. Statement 2 shows computer security risk.Pernyataan 2 menunjukkan risiko keselamatan komputer.

(Pahang 2012)

Statement 2Pernyataan 2

Based on statement 2, / Berdasar kepada pernyataan 2,

State who is someone? Explain one category of someone.Nyatakan siapa seseorang? Huraikan satu daripada kategori seseorang……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

1.3.3 Security Measures1.3.3.1 Select the appropriate security measures to overcome the identified computer threats

[email protected] ( http://rmmict.blogspot.com )

Amirul need to submit his multimedia presentation on tomorrow morning. While working on his computer, he discover some of files missing and some altered. He realize that someone have accessed his computer, who commit or responsible to wrong doing.

Amirul perlu menghantar persembahan multimedia pada keesokan hari. Semasa membuat kerja di komputer, dia mendapati beberapa fail telah hilang. Dia menyedari seseorang telah mengakses ke komputernya, orang yang bertanggungjawab membuat kesalahan.

Page 29: F4 learning-area-1-ict

29

1.3.3.2 Apply the correct security procedures: • Antivirus • Anti-Spyware • Cryptography • Firewall • Data backup • Human aspects SECTION A

1. Figure 3 shows how cryptography works Rajah 3 menunjukkan bagaimana kriptografi bekerja.

(SPM 2007)

Name H : / Namakan H : …………………………………………………………………

2. Table 2 shorws the steps of using anti-virus software which is not in thecorrect sequence.Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak mengikut urutan yang betul.

(SPM 2011)Complete the step. Step 1 and 3 are given.Lengkapkan langkah itu. Langkah I dan 3 diberi.Choose anti virus software/Pilih perisian anti virus (i) 1 Take necessary action /Ambil tindakan yang perlu (ii) ..……Scan the selected area /Imbas kawasan yang dipilih (iii) 3Select area to be scanned /Pilih kawasan yang akan diimbas (iv) ……..

Table 2 /Jadual 2(ii) ………… (iv) …………

3. Figure 1(a) and Figure 1(b) show the problems faced when surfing the internet.Rajah 1(a) dan Rajah 1(b) menunjukkan masalah yang dihadapi semasa melayari internet.

[email protected] ( http://rmmict.blogspot.com )

Plaintext H PlaintextEncrypt Decrypt

Page 30: F4 learning-area-1-ict

30

Figure 1(a) Figure 1(a) Rajah 1(b) Rajah 1(b)

Based on Figure 1(a) and Figure 1(b), match the problems above according to the correct security measures:Berdasarkan Rajah 1(a) dan Rajah 1(b), padankan masalah di atas berdasarkan langkah keselamatan yang betul:(i) Figure 1(a) /Rajah 1(a) …………………………..(ii) Figure 1(b) / Rajah 1(b) …………………………..

4. State whether the following statement is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu.

(P.Pinang 2012)

A firewall can be either software-based or hardware-based and is used tohelp keep a network secure.Tembok api boleh berasaskan perisian atau berasaskan perkakasan danDigunakan untuk membantu menjaga keselamatan rangkaian.………………………..

SECTION B

1. Figure l8 below shows symptoms of a computer problem.Rajah 18 di bawah menunjukkan simptom pada sebuah komputer

(Kelantan 2012)O Screen displays unusual messages /

Skrin memaparkan mesej pelikO Files become corrupted /

Fail menjadi rosakO Files mysteriously appear /

Muncul fail yang menjadi tanda tanya

Figure 18 / Rajah 18Based on the figure above; / Berdasarkan rajah di atas ;Explain one ways to prevent it.Huraikan satu cara untuk mengatasinya.

(2 marks/2markah)

……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

[email protected] ( http://rmmict.blogspot.com )

Page 31: F4 learning-area-1-ict

31

2. Figure 6 shows a security procedure done by Affendi. Rajah 6 menunjukkan prosedur keselamatan yang dilaksanakan oleh Affendi

(Trengganu 20Figure 6 / Rajah

Based on Figure 6, / Berdasarkan Rajah 6, (a) Name the security procedure.

Namakan prosedur keselamatan tersebut. [1 mark] …………………………………………………………………………………………………

(b) State the steps taken to apply this security procedure. Nyatakan langkah –langkah yang diambil bagi menggunakan prosedurkeselamatan ini. [3 marks] …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

[email protected] ( http://rmmict.blogspot.com )

Page 32: F4 learning-area-1-ict

32

SECTION C

1. Figure 11 is an excerpt from an online newspaper.Rajah 11 menunjukkan petikan daripada akhbar atas talian

(Kedah 2012)

Figure 11 / Rajah 11Based on Figure 11: /Berdasarkan Rajah 11:Describe the security measure that should be taken to protect governmentwebsite from the specified threat.Huraikan langkah keselamatan yang perlu diambil untuk melindungi tapak web kerajaan daripada ancaman yang dinyatakan.

[3 marks] [3 markah]

[email protected] ( http://rmmict.blogspot.com )

KUALA LUMPUR: More laws will be introduced soon to tackle cyber intrusion.

Deputy Information, Communications and Culture Minister Dato’ Joseph Salang Gandum said this move followed the attacks on 198 websites, including government portals, by the "Anonymous" hacker group last week.

"We have to set up stronger cyber security measures and ensure that government websites are protected from such activities in the future."

(Straits Time; 21 June, 2011)

KUALA LUMPUR:Lebih banyak undang-undang akan diperkenalkan tidak lama lagi bagi mengatasi gangguan siber. Timbalan Menteri Penerangan Komunikasi dan Kebudayaan Dato’ Joseph Salang Gandum mengatakan bahawa tindakan ini berikutan daripada serangan ke atas 198 laman sesawang termasuk portal kerajaan oleh kumpulan penggodam “Anonymous” minggu lepas.

“Kita perlu menetapkan langkah-langkah keselamatan siber yang lebih kukuh dan memastikan laman-laman web kerajaan dilindungi pada masa akan datang.

(Straits Time; 21 Jun ,2011)

Page 33: F4 learning-area-1-ict

33

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

2. The following is a text on computer crime in television station broadcasting. Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen. (N.Sembilan 2012)

Nora works as an editor in one of the larger private television broadcasting in Malaysia. She uses her expertise in ICT for editing the television programs in order to preserve the quality before they were broadcast by the television station. Without company’s permission Nora has made copies of the television programs and sells it via Internet.Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran televisyen swasta yang terbesar di Malaysia. Nora menggunakan kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa pengetahuan majikannya.

Based on the text: /Berdasarkan teks itu:

Explain TWO ways from the human aspect to prevent the above crime.Terangkan DUA cara dari aspek kemanusiaan untuk mencegah jenayah di atas.

(4marks)(4markah)……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

[email protected] ( http://rmmict.blogspot.com )

Page 34: F4 learning-area-1-ict

34

3 . Statement 2 shows computer security risk.Pernyataan 2 menunjukkan risiko keselamatan komputer.

(Pahang 2012)

Statement 2Pernyataan 2

Based on statement 2, / Berdasar kepada pernyataan 2,

Describe two ways, how people aspects can protect their computer in (a)?Jelaskan dua cara, bagaimana aspek manusia boleh melindungi komputer mereka dalam (a)?

[4 marks][4 markah]……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

[email protected] ( http://rmmict.blogspot.com )

Amirul need to submit his multimedia presentation on tomorrow morning. While working on his computer, he discover some of files missing and some altered. He realize that someone have accessed his computer, who commit or responsible to wrong doing.

Amirul perlu menghantar persembahan multimedia pada keesokan hari. Semasa membuat kerja di komputer, dia mendapati beberapa fail telah hilang. Dia menyedari seseorang telah mengakses ke komputernya, orang yang bertanggungjawab membuat kesalahan.

Page 35: F4 learning-area-1-ict

35

SEMAKANTarikh Topik / Sub topik Tanda

tangan Guru

Catatan

1.2 Introduction to Information Technology

1.1.2 Overview of Information and Communication Technology (ICT)

1.1.2.1 Define ICT.1.1.1.3 Describe the brief evolution of

computers.

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce1.1.2.1 List the usage of ICT in everyday life.1.1.2.2 State the differences between computerised and non-computerised systems.1.1.2.3 State the impact of ICT on society.

1.2 Computer Ethics and Legal Issues

1.2.1 Definition1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.1.2.1.2 Differentiate between ethics and law.1.2.1.3 State the need for intellectual property laws.

1.2.2 Privacy1.2.2.1 List ways to protect privacy.1.2.2.2 State authentication and verification methods/technologies.

1.2.3 Controversial Contents and Control1.2.3.1 List effects of controversial contents on society: • Pornography • Slander1.2.3.2 Describe the process of filtering to control access to controversial contents.

[email protected] ( http://rmmict.blogspot.com )

Page 36: F4 learning-area-1-ict

36

Tarikh

Topik / Sub topic

Tanda tangan Guru

Catatan

1.2.4 Computer Crimes1.2.4.1 Explain the need for Cyber Law.1.2.4.2 Explain briefly the computer crimes below:• Fraud • Copyright Infringement • Theft • Attacks

1.3 Computer Security1.3.1 Definition1.3.1.1 Define computer security.

1.3.2 Security Threats1.3.2.1 Explain briefly the different threats to computer security:• Malicious code • Hacking • Natural disaster • Theft

1.3 Computer Security1.3.3 Security Measures1.3.3.1 Select the appropriate security measures to overcome the identified computer threats1.3.3.2 Apply the correct security procedures: • Antivirus • Anti-Spyware • Cryptography • Firewall • Data backup • Human aspects

[email protected] ( http://rmmict.blogspot.com )