Download - f4 Learning Area 1 Ict (3)
28
Soalan-Soalan Berdasarkan Subtopik ( Soalan Percubaan ICT SPM Negeri-negeri 2013 dan Soalan SPM Sebenar 2008-2013)
SMK RAJA MUDA MUSA
BESTARI JAYA SELANGOR
(INTRODUCTION OF ICT)NAMA
:
TINGKATAN: 4..
1.1 Introduction to Information Technology 1.1.1 Overview of Information and Communication Technology (ICT)
1.1.1.1 Define ICT.
1.1.1.2 Describe the brief evolution of computers.
SECTION A
1. State the name of the first generation computer.
Nyatakan nama komputer generasi pertama
(SPM 2008)
2. Figure 1 shows three technologies used in the generations of computers Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.
(SPM 2010)Based on Figure 1, write A, B or C to match the following:
Berdasarkan Rajah l, tulis A, B atau C untuk dipadankan dengan berikut: (i) Second Generation /
Generasi Kedua
...................
(ii) Third Generation /
Generasi Ketiga
.
Figure 1 / Rajah 1
3.. Complete the following statement: / Lengkapkan pernyataan berikut.Information and Communication Technology is the use of computers,( i) ...........................devices and( ii) ......;:......................applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.
Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i) ......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan , mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa.
(SPM 2010)4. The following are features for one generation of computer.
Berikut merupakan ciri-ciri satu generasi komputer.
(Kedah 2013) Vacuum tube technology / Teknologi vakum tiub
Huge size / Bersaiz besar
.
State the generation of the computer.
Nyatakan generasi komputer tersebut
..
5. Figure 1 show the technologies used in two different generations of computers.
Rajah 1 menunjukkan teknologi yang digunakan dalam dua generasi komputer yang berbeza.
(Kelantan 2013 Set 1)
(A)
(B)
Figure 1 / Rajah 1
Which of the following is true? / Antara berikut, yang manakah benar?(A)(B)
AFirst Generation
Generasi PertamaFourth Generation
Generasi Keempat
BSecond Generation
Generasi KeduaFirst Generation
Generasi Pertama
CThird Generation
Generasi KetigaSecond Generation
Generasi Kedua
DThird Generation
Generasi KetigaFourth Generation
Generasi Keempat
6. Figure 1 shows the technologies used in the evolution of computers :
Rajah 1 menunjukkan teknologi yang digunakan dalam evolusi komputer.(Pahang 2013)
Figure 1 / Rajah 1 Based on Figure 1 state the name of component.
Berdasarkan Rajah 1, nyatakan nama komponen.
(i) X.(ii) Y.7. Which technology was used to replace vacuum tubes?
Teknologi manakah yang digunakan untuk menggantikan tiub hampagas?(Terengganu 2013)A Transistors/Transistor
B Microprocessor/Pemproses mikro
C Integrated circuit/Litar bersepadu
D Artificial intelligence/Kepintaran buatan1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce
1.1.2.1 List the usage of ICT in everyday life.
SECTION A
1. Auto Teller Machine (ATM), cash deposit machine and electronic fund transfer are examples of ICT usage in _______________ sector.
(Kelantan 2013 set 3)ICT digunakan dalam pelbagai bidang. Mesin ATM (Auto Teller Machine), mesin deposit wang tunai dan pemindahan wang elektronik adalah beberapa contoh penggunaan ICT dalam bidang _______________.
2.ICT has bring many positive impacts on society.
ICT membawa banyak kesan positif terhadap masyarakat. (Kelantan 2013 set 5)
Figure 1 / Rajah 1
Based on Figure 1, state positive impacts of ICT on society
Berdasarkan Rajah 1, nyatakan kesan positif ICT kepada masyarakatI. Lower communication cost because people can save time and resources
Kos komunikasi yang rendah kerana manusia boleh menjmatkan masa dan sumber
II. Inappropriate online communication with unknown person through the Internet
Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui Internet
III.
Effective sharing of information and opinions
Perkongsian maklumat dan pendapat yang efektif
IV. Effective sharing slander and false contents
Perkongsian fitnah dan penipuan kandungan yang efektif
A. I and II
B. I and III
C. II and IV
D. III and IV1.1.2.2 State the differences between computerised and non-computerised systems.SECTION B
1. Figure 6 shows a situation in a banking system. /
Rajah 6 menunjukkan situasi di dalam sistem bank.
(Kedah 2012)
Figure 6 / Rajah 6
Based on Figure 6:/Berdasarkan Rajah 6:
State the difference between system A and system B.
Nyatakan perbezaan di antara sistem A dan sistem B.
[2 marks][2 markah]
1.1.2.3 State the impact of ICT on society.
SECTION A
1. Statement 1 is regarding to the use of ICT in everyday life.
(PERAK 2011)
Statement 1 / Penyataan 1
Statement 1 refer to the use of ICT in ... sector.
Penyataan 1 merujuk kepada penggunaan ICT dalam sector
2. Write the correct words to complete the following statement: ( KEDAH 2011)
Tulis perkataan yang betul untuk melengkapkan pernyataan berikut:
Information and Communication Technology enables information to be stored and retrieved through digital medium instead of printed materials. This creates a/an (i) ............................... environment. Communication technology that uses the Internet provides (ii) ................................ communication since it is not restricted by geographical and political boundaries.
Teknologi Maklumat dan Komunikasi membolehkan maklumat disimpan dan dicapai melalui media digital dan bukan bahan bercetak. Perkara ini mewujudkan persekitaran (i) .............................. . Teknologi komunikasi yang menggunakan Internet menyediakan komunikasi (ii) ................................... boleh dilakukan tanpa batasan geografi dan politik.3. Which of these is an impact of slander towards society?
Yang manakah kesan kepada fitnah terhadap masyarakat?
(P.Pinang 2012)
A Closer relationship / Hubungan lebih rapatB Trust among people / Kepercayaan di antara manusiaC Higher moral behaviour / Perlakuan moral lebih tinggi.D Bad reputation of people / Reputasi buruk pada seseorang.4. ICT has brought many positive impacts on society.
ICT membawa banyak kesan positif terhadap masyarakat. (Wilayah 2012)
Figure 1/ Rajah 1
Based on Figure 1, state one positive impact of ICT on society
Berdasarkan Rajah 1, nyatakan kesan positif ICT kepada masyarakat
I. Lower communication cost because people can save time and resources
Kos komunikasi yang rendah kerana manusia boleh menjimatkan masa dan sumber
II. Inappropriate online communication with unknown person through the Internet
Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui InternetIII. Effective sharing of information and opinions
Perkongsian maklumat dan pendapat yang efektif
IV. Effective sharing slander and false content
Perkongsian fitnah dan penipuan kandungan yang efektifA. I and II B. I and IIIC. II and IVD.III and IV
SECTION B
1. Based on figure 1, state a difference between the education before ICT and education with ICT .
Merujuk kepada rajah 1, nyatakan perbezaan antara pendidikan tanpa ICT dan pendidikan berbantukan ICT.
(PERAK 2011)
EDUCATION BEFORE ICT /
PEMBELAJARAN SEBELUM MENGGUNAKAN ICTEDUCATION WITH ICT /
PEMBELAJARAN MENGGUNAKAN ICT
[2 markah]
b.List TWO sectors that uses ICT in daily life.
Senaraikan dua sektor yang menggunakan ICT di dalam kehidupan seharian.
1
2.
[2 markah]
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.SECTION A
1. Table 1 shows the characteristics of X and Y in computer usage guideline.
Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan komputer.
(SPM 2011)
XY
Moral guidelines for computer users.
Garis panduan moral untuk pengguna komputer.Rules for computer users.
Peraturan-peraturan untuk pengguna komputer.
No penalty or punishment.
Tiada penalti atau hukuman.Penalties or punishments imposed.
Penalti atau htLkuman dikenakan.
Table 1 / Jadual 1l
Based on Table 1, state: / Berdasarkan Jadual I . nyatakan:
(i) X(ii) Y2. Table 1 below shows computer ethics. Based on table, select A, B, C or D for the following statements
Jadual 1 di bawah menunjukkan etika komputer. Berdasarkan jadual, pilih A, B, C atau D untuk pernyataan-pernyataan berikut.
(Kelantan 2013 set 3)Computer EthicsComputer CrimeCode of EthicsCode of Crime
ABCD
Table 1 / Jadual 1
a. Is a system of moral standard or moral values used as a guideline for computer user
Adalah sistem standard moral atau nilai moral digunakan sebagai panduan untuk pengguna computer.
.b. Is guidelines in ICT that help determine whether a specific computer action ethical or unethical.
Satu panduan dalam ICT yang membantu bagi menentukan sesuatu computer action beretika atau tidak.SECTION B1. Figure 6 shows an application in a smartphone.
Rajah 6 menunjukkan satu aplikasi dalam telefon pintar.
(Terengganu 2013)
Figure 6 / Rajah 6
Based on Figure 6, / Berdasarkan Rajah 6,
Give two impacts of using this application to society.
Justify your answer.
Berikan dua kesan penggunaan aplikasi ini terhadap masyarakat.
Justifikasikan jawapan anda.
[4 markah][4 marks]
...................................................................................................................................
............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
1.2.1.2 Differentiate between ethics and law.
SECTION A
1. State whether the following statements is True or False.
Nyatakan sama ada pernyataan berikut Benar atau Palsu. (Kelantan 2013 Set 1)Both ethics and law are made as a rule to control computer users.
Etika dan undang-undang diwujudkan sebagai peraturan untuk mengawal pengguna komputer.
2.
State whether the following statement is True or False.
Nyatakan sama ada peryataan berikut Benar atau Palsu. (Kelantan 2013 Set 5)We need computer ethics and laws to prevent users from misusing the computer. Computer
laws are universal, can be applied anywhere, all over the world.
Kita memerlukan etika dan undang-undang komputer untuk menghalang pengguna dari
menyalahgunakan komputer. Undang-undang komputer bersifat sejagat, boleh digunakan dimana-mana negara di dunia.
SECTION B1. Statement 2 is about computer ethics.
Pernyataan 2 tentang etika computer.
(AMPANGAN SEREMBAN 2013)
Statement 2/ Pernyataan 2
Based on Statement 2,
Berdasarkan Pernyataan 2,(a) What is the type of misconduct based on the underlined phase above?
Apakah jenis kesalahan yang dilakukan berdasarkan pernyataan bergaris di atas?
[2 marks][2 markah]
.
..(b) Explain the negative impact done by Ali towards the school.
Terangkan kesan negatif perbuatan yang dilakukan Ali kepada sekolah.
[2 marks][2 markah]
.
..1.2.1.3 State the need for intellectual property laws.
1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
SECTION A
1. State whether the following statements is True or False.
Nyatakan sama ada pernyataan berikut Benar atau Palsu.
(Kelantan 2013 Set 1)Privacy means that we have the right not to disclose our personal details.
Kebersendirian bermaksud kita mempunyai hak untuk tidak mendedahkan maklumatperibadi.2. The right of individuals and companies to deny or restrict the collection and use of data and information about them refers to _________________.
Hak individu dan syarikat-syarikat untuk menafikan atau menyekat pengumpulan dan penggunaan data dan maklumat tentang mereka merujuk kepada _________________ .
Terengganu 2013..............................SECTION B
1.
The following is a statement on information privacy.
Pernyataan berikut berkaitan keperibadian maklumat (SPM 2007)
Based on the statement, list four ways of making personal data more private.
Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi
lebih peribadi
i) .
ii) .
iii) .
iv) ..1.2.2.2 State authentication and verification methods/technologies.
SECTION A
1. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti biometrik.(SPM 2009 )
Based on Figure l, / Berdasarkan Rajah 1,
(i) State the name of the device. / Nyatakan nama peranti itu.
(ii) State the function of the device / Nyatakan fungsi peranti itu.
2. Figure 1 shows information on two types of authentuication methods.Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan (SPM 2012)Based on figure 1 , state the name of / berdasarkan rajah 1, namakani. P..
ii. Q .3. Which of the following is the example of verification method?
Antara berikut yang manakah merupakan contoh kaedah pengesahan?
(Kelantan 2013 Set )
A. Callback system B. Iris scanning
Sistem panggilan Imbasan iris
C. Identification card
D. Voice recognition
Kad pengenalan Pengecam suara
4.
Figure 2 shows an authentication method.
Rajah 2 menunjukkan satu kaedah pengesahan.(Pahang 2013)
State the authentication method used in Figure 2.
Nyatakan kaedah pengesahan yang digunakan dalam Rajah 2
.
5. Example used in verifications methods is except ____________________Contoh yang digunakan dalam Kaedah Verifikasi kecuali _______________
(KERIAN PERAK 2013)A. Identification Card /Kad Pengenalan Diri
B. Security Token / Keselamatan token
C. Cell Phone / Telefon bimbit
D. Fingerprints Recognition / Pengesahan cap jari
SECTION C
1. Bank KITA intends to increase the level of security in some important bank, using the latest information technology. Through new methods such as fingerprint scanners, only authorized officer can walk into the area. You as the head of the Information Technology asked to manage the implementation.
Bank KITA bercadang untuk meningkatkan tahap keselamatan di beberapa bilik penting dalam bank tersebut, dengan menggunakan kaedah teknologi maklumat terkini. Melalui kaedah baru seperti pengimbas cap jari, hanya pegawai yang telah diberi kebenaran sahaja boleh memasuki kawasan tersebut. Anda sebagai ketua Unit Teknologi Maklumat diminta mengurus pelaksanaannya.
(Kelantan 2013 Set 3)(a) (i)State and explain the authentication method used.
Nyatakan dan jelaskan kaedah pengesahan yang telah digunakan.
[3Marks]
(ii)List 2 examples of the same method with the above underlined statement
Senaraikan 2 contoh kaedah yang sama dengan pernyataan bergaris di atas.
[2 Marks]
(b) Explain why authentication step is very important ?
Jelaskan mengapa langkah pengesahan adalah sangat penting?
[2 Marks]1.2.3 Controversial Contents and Control
1.2.3.1 List effects of controversial contents on society: Pornography Slander
SECTION A
1. Statement below is about controversial issue. Pernyataan di bawah adalah berkaitan isu kontroversi
(Bentong Pahang 2013)
Statement 2
Based on Statement 2 above,
Berdasarkan penyataan 2 di atas, (i) Azman has convicted ______________________Azman terlibat dalam perbuatan _____________________(ii) State another controversial content
Nyatakan satu lagi kandungan kontroversi
___________________________________SECTION B
1.Figure 13 shows controversial contents on society
Rajah 13 menunjukkan kandungan kontroversi dalam masyarakat.
(Pahang 2013)
Based on figure 13, give an effect towards our society:
Berdasarkan rajah 13, beri satu kesan terhadap masyarakat kita:
(i) X(ii) Y
[2 marks][2 markah]
1.2.3.2 Describe the process of filtering to control access to controversial contentsSECTION A
1. Figure 2 shows part of an algorithm for a web page filter.
Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.
(SPM 2009)
Figure 2 / Rajah 2
State the filtering method used in the algorithm.
Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
..
2. Figure 2 shows the display of an internet filtering software
Rajah 2 menunjukkan paparan pada satu perisian penapisan internet (SPM 2012)
Figure 2 / Rajah 2
Based on Figure 2 , state the method used
Berdasarkan rajah 2 nyatakan kaedah yang digunakan
.
3. Figure 1 shows the keyword blocking process
Rajah 1 menunjukkan proses penapisan kata kunci(SPM 2013)Figure 1 / Rajah 1
Based on figure 1 write A,B or C to match the following statement
Berdasarkan rajah 1, tuliskan A,B atau C untuk dipadankan dengan pernyataan berikut
i. Page download stops
Muat turun laman berhenti
ii. Search for banned words
Mencari perkataan-perkataan yang diharamkan
4. Table 1 shows the method of an Internet filtering.
Jadual 1 menunjukkan kaedah penapisan Internet. (Kelantan 2013 Set 5)XY
uses a list of banned words to block the page
menggunakan senarai perkataan terlaran untuk
halang laman
use software to list the web sites and
block the page
menggunakan perisian untuk
senaraikan laman web dan halang
laman
Table 1/Jadual 1
Based on Table 1, state the name of : / Berdasarkan Jadual 1, nyatakan nama :
(i)
X.........................................(ii)
Y.........................................5. State whether the following statements are True or False
Nyatakan sama ada pernyataan berikut Benar atau Palsu
(i) Keyword blocking uses a list of banned words or objectionable terms to block thePage completely./Sekatan kata kunci menggunakan senarai halangan perkataan atau bantahan terma untuk menghalangnya secara lengkap....................(ii) Site blocking can be done by setting the browser to only accept pages with certain level of ratings./Sekatan laman boleh dilakukan dengan menyediakan pelayar hanya untuk menerima lamandengan aras tertentu...................(Terengganu 2013)
SECTION B1.Figure 13 shows controversial contents on society
Rajah 13 menunjukkan kandungan kontroversi dalam masyarakat.
(Pahang 2013)
Based on figure 13, Z shows methods that can be used to prevent access to certain materials on the internet. Describe one of the methods used.
Berdasarkan rajah 13, Z menunjukkan kaedah-kaedah yang digunakan untuk menghalang capaian kepada kandungan internet yang tertentu.
Jelaskan satu kaedah yang digunakannya...
..
[2 marks][2markah]
SECTION C
1. En. Aaron is a schools ICT Coordinator. He has found some students were entering the ICT lab without permission and surfing pornography websites. Due to the incident, he plans to use the web filtering as shown in the Figure 10.
En. Aaron merupakan Penyelaras ICT sekolah. Beliau mendapati beberapa orang pelajar telah masuk ke makmal ICT tanpa kebenaran dan melayari beberapa laman web porno. Lantaran itu, beliau bercadang menggunakan kaedah penapisan laman web seperti dalam Rajah 10.
(Kedah 2013)
Figure 11 / Rajah 11
(a) Based on the Figure 11; / Berdasarkan Rajah 11;
(i) Name the filtering method.
Namakan kaedah penapisan tersebut.[1 mark]/[1 markah](ii) Explain another filtering method.
Terangkan satu kaedah penapisan lain.[2 marks]/[2 markah]...................................................................................................(b) Describe two negative effects on students.
Huraikan dua kesan negatif terhadap pelajar tesebut. [4 marks]/ [4 markah]
......................................................................................................................
......................................................................................................................
......................................................................................................................1.2.4 Computer Crimes
1.2.4.1 Explain the need for Cyber Law.
SECTION A
1. Cyber law is a system of moral standards or values used as a guideline for computer users. (T/F)Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang digunakan sebagai pedoman bagi pengguna komputer
TRUE / FALSE
(SPM 2007)
1.2.4.2 Explain briefly the computer crimes below: Fraud Copyright Infringement Theft Attacks
SECTION A
1. Which of the following statements are computer crimes?
Antara pernyataan berikut manakah adalah jenayah komputer?
(Kedah 2013)I Hacking / Penggodaman
II Computer Attack / Serangan Komputer
III Copyright Infringement / Pelanggaran Hak Cipta
IV Computer Fraud / Penipuan Komputer
AI, II and IIIB II, III and IVC II and IIID I, II, III and IV
SECTION B1. Based on 2 statement below, answer the questions.
Berdasrkan 2 pernyataan di abwah, jawab soalan.
a. Who has committed in computer crime? State the type of computer crime he/she
has committed. Justify you answer. [ 2 marks ]
Siapakah yang telah melakukan kesalahan jenayah komputer? Nyatakan jenis
jenayah komputer yang telah dilakukan. Berikan alasan anda.
b. State two reasons why do we need Cyber Law. [ 2 marks ]
Berikan dua alasan mengapa kita memerlukan Undang-undang Siber.
SECTION C1. The following is a text on computer crime in television station broadcasting.Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.
(Kelantan 2013 Set 5)
Based on the text:
Berdasarkan teks itu:(a) State the computer crime that has been done by Dewi.
Nyatakan jenayah komputer yang telah dilakukan oleh Dewi.
...
[1 mark][1 markah]
(b) Explain why cyber laws are important for television station broadcasting.Terangkan mengapa undang-undang siber adalah penting untuk stesen penyiaran televisyen...
......
[2 mark][2 markah]
(c) Explain TWO ways from the human aspects to prevent the above crime
Terangkan DUA cara dari aspek kemanusiaan untuk mencegah jenayah di atas
..
......
[4 mark][4 markah]1.3 Computer Security
1.3.1 Definition
1.3.1.1 Define computer security.
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security:
Malicious code Hacking Natural disaster Theft
SECTION A
1. Computer security is defined as
Keselamatan komputer didefinisikan sebagai
(Pahang 2013)
A.security measures used to protect the network system
Langkah-langkah keselamatan yang digunakan untuk melindungi sistem rangkaian.
B. any criminal activity that is related to the use of computers.
Apa sahaja aktiviti jenayah yang melibatkan penggunaan komputer.
C. protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification.
Melindungi sistem komputer dan maklumat yang dimiliki terhadap capaian yang tidak sah kerosakan, kemusnahan atau pengubahsuaian.
D. storing data, program and other important documents in a place that will not affected by any major destruction.
Menyimpan data, program dan dokumen-dokumen penting di suatu tempat yangSelamat daripada kemusnahan besar.2. Figure 3 shows descriptions on computer threats.
Rajah 3 menunjukkan keterangan tentang ancaman komputer.
(Pahang 2013)
Based on Figure 3, match the computer threats. Write P, Q or R
Berdasarkan Rajah 3, padankan ancaman komputer. Tulis P, Q atau R
(i) Malicious Code.(ii) Hacking
.SECTION B1. Figure 12 shows a pop-up message to computer users.
Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer
(SPM 2011)
Figure 12 / Rajah 12
Based on Figure 12: / Berdasarkan Rajah 12:
(a) State two ways that causes the pop-up message to appear on the
computer screen.
Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar di
skrin komputer.
[2 markah]
(b) State two kinds of serious damages if a user ignore the message.
Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.
[2 markah]2. Read the following warningBaca amaran berikut
(SPM 2013)
Based on the warning statement
Berdasarkan pernyataan amaran itu
a. Explain why the warning important
Terangkan mengapa amaran itu penting2 markah
b. i. What precaution should you take if you cannot follow the given warning?Apakah langkah berjaga-jaga yang seharusnya diambil jika anda tidak dapat mematuhi amaran yang diberi?
1 markah
ii. Justify your answer
Beri justifikasi jawapan anda
1 markah
SECTION C1. Figure 20 shows symptoms of a computer problem
Rajah 20 menunjukkan simptom pada sebuah komputer.
(SPM 2010)
Screen displays unusual messagesSkrin memaparkan mesej pelik
Files become corrupted
Fail menjadi rosak
Fies mysteriously appear
Muncul fail yang menjadi tanda Tanya
Figure 20 / Rajah 20
Based on Figure 20: / Berdasarkan Rajah 20:
(a) Identify the type of computer threat which matches the symptoms.
Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.
i. .State two different examples of the threat. / Nyatakan dua contoh berlainan bagi ancaman itu.
ii. i.
(b) Describe two reasons why the computer may have been affected by the threat in (a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).
Suggest two ways to prevent it.
Cadangkan dua cara untuk mengatasinya.
.................................................................................................
.................................................................................................
.................................................................................................1.3.3 Security Measures
1.3.3.1 Select the appropriate security measures to overcome the identified computer threats
1.3.3.2 Apply the correct security procedures:
Antivirus Anti-Spyware Cryptography Firewall Data backup Human aspects
SECTION A
1.
Figure 3 shows how cryptography works
Rajah 3 menunjukkan bagaimana kriptografi bekerja.
(SPM 2007)
Name H : / Namakan H : 2. Table 2 shorws the steps of using anti-virus software which is not in the
correct sequence.
Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak mengikut urutan yang betul.
(SPM 2011)
Complete the step. Step 1 and 3 are given.
Lengkapkan langkah itu. Langkah I dan 3 diberi.
Choose anti virus software/Pilih perisian anti virus(i) 1
Take necessary action /Ambil tindakan yang perlu(ii) ..
Scan the selected area /Imbas kawasan yang dipilih(iii) 3
Select area to be scanned /Pilih kawasan yang akan diimbas(iv) ..
Table 2 /Jadual 2
(ii)(iv)
3. Ali has send a confidential file to Sandra using email. Rearrange the activities carried out
by Ali in the correct sequence.
Ali perlu menghantar satu fail sulit kepada Sandra menggunakan email. Susun semulaaktiviti yang dijalankan oleh Ali mengikut urutan yang betul.
(SPM 2013)
P Decrypt file
Menyahsulit file
Q Open file received to view contents
Buka fail yang diterima untuk melihat kandungan
R Select file to send
Pilih fail yang akan dihantar
SEncrypt file
Enkripsi fail
TAttach file to email
Kepilkan fail pada email
4. TWINKLE company seeks your advice to protect their network resources from outsides and to restrict employees access to sensitive data such as payroll or personal records.
Syarikat TWINKLE meminta nasihat anda bagi melindungi sumber rangkaian dari pihak luar dan menyekat pekerja dari mencapai data yang penting seperti gaji dan rekod peribadi.
What procedure you would suggest to them.
Apakah prosedur yang anda boleh cadangkan kepada mereka. (Kelantan 2013 Set 1)A. Antivirus / Antivirus
B. Anti-spyware / Anti spyware
C. Data backup / Sandaran dataD. Firewall / Tembok Api5. Azman Company seeks your advice to protect their network resources from outsider and to restrict employees access to sensitive data such as payroll or personal records. What procedures you would suggest to them.Syarikat Azman meminta nasihat anda untuk melindungi sumber rangkaian dari pencerobohan luar dan menghalang pekerja daripada mencapai data yang sulit seperti pembayaran gaji dan rekod individu. Apakah prosedur yang anda perlu cadangkan kepada mereka.
(Pahang 2013)A. Antivirus
B. Anti-spyware
C. Data backup
D. Firewall
6. Figure 1(a) and Figure 1(b) show the problems faced when surfing the internet.
Rajah 1(a) dan Rajah 1(b) menunjukkan masalah yang dihadapi semasa melayari internet.
(KERIAN PERAK 2013)
Lots of unwanted pop-up windows while surfing the When you want to download a file, your
internet.
Computer does not allow it to happen.
Banyak tetingkap yang tidak diigini keluar semasa Semasa anda ingin memuat turun fail, komputer melayari internet.
anda tidak membenarkannya.
Figure 1(a)
Figure 1(b)
Rajah 1(a)
Rajah 1(b)
Based on Figure 1(a) and Figure 1(b), match the problems above according to the correct
security measures:
Berdasarkan Rajah 1(a) dan Rajah 1(b), padankan masalah di atas berdasarkan langkah
keselamatan yang betul:
(i) Figure 1(a). Rajah 1(a)
(ii) Figure 1(b). Rajah 1(b)
7. Table 1 shows types of security measures.
Jadual 1 menunjukkan jenis-jenis langkah keselamatan.Antivirus
Antivirus
Firewall
Tembok Api
Cryptography
Kriptografi
P
QR
Table 1 / Jadual 1
(Terengganu 2013)
Based on Table 1, match the correct security measures to overcome the problem below by writing P, Q or R.
Berdasarkan Jadual 1, padankan langkah-langkah keselamatan bagi mengatasi masalah di bawah dengan menulis P, Q atau R.
(i) Identify and remove any computer viruses found.
Mengenalpasti dan membuang sebarang virus komputer yang ditemui.
................
(ii) Block unauthorized access while permitting authorized communication.
Menghalang capaian yang tidak dibenarkan manakala membenarkan komunikasiyang dibenarkan.
.................
SECTION B
1. Read the following situation:
Baca situasi berikut:Wilayah 2013
Figure 13
Rajah 13(a) (i)What was happened to the club members list file?
Apakah yang berlaku pada fail senarai nama ahli kelab ICT?
(iii) What should Nelly do before she open the file?
Apakah yang perlu dilakukan oleh Nelly sebelum membuka fail tersebut?
(b) (i) State the step should be taken by Nelly to prevent this problem?
Nyatakan langkah yang perlu diambil oleh Nelly untuk mencegah masalah ini?
(ii) Based on b (i), give one example of utility software that can be use.
Berdasarkan b (i), berikan satu contoh perisian utiliti yang bolehSEMAKAN
TarikhTopik / Sub topikTanda tangan
GuruCatatan
1.2 Introduction to Information Technology1.1.2 Overview of Information and Communication Technology (ICT)
1.1.2.1 Define ICT.
1.1.1.3 Describe the brief evolution of computers.
1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce1.1.2.1 List the usage of ICT in everyday life.
1.1.2.2 State the differences between computerised and non-computerised systems.
1.1.2.3 State the impact of ICT on society.
1.2 Computer Ethics and Legal Issues
1.2.1 Definition
1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.
1.2.1.2 Differentiate between ethics and law.
1.2.1.3 State the need for intellectual property laws.
1.2.2 Privacy
1.2.2.1 List ways to protect privacy.
1.2.2.2 State authentication and verification methods/technologies.
1.2.3 Controversial Contents and Control
1.2.3.1 List effects of controversial contents on society: Pornography Slander
1.2.3.2 Describe the process of filtering to control access to controversial contents.
1.2.4 Computer Crimes
1.2.4.1 Explain the need for Cyber Law.
1.2.4.2 Explain briefly the computer crimes below: Fraud Copyright Infringement Theft Attacks
1.3 Computer Security
1.3.1 Definition
1.3.1.1 Define computer security.
1.3.2 Security Threats
1.3.2.1 Explain briefly the different threats to computer security: Malicious code Hacking Natural disaster Theft
1.3 Computer Security
1.3.3 Security Measures
1.3.3.1 Select the appropriate security measures to overcome the identified computer threats
1.3.3.2 Apply the correct security procedures: Antivirus Anti-Spyware Cryptography Firewall Data backup Human aspects
System A
System B
Sistem B
All transactions are done by computers
Semua traksaksi dilakukan dengan komputer
Transaction can be done anytime and anyplace
Transaksi boleh dilaksanakan bila-bila masa dan di mana-mana
Example of transactions is electronic funds transfer
Contoh transaksi adalah pemindahan wang elektronik
education before ict
Pembelajaran sebelum menggunakan ICT
education with ict
Pembelajaran menggunakan ICT
Ali has been appointed by his teacher to help other teachers to key in the test score into school HC3 Examination Program. Without his teacher knowledge he had changed his ICTs subject marks from 40% to 75%. As a result of the actions he has successfully passed the subject.
Ali telah dilantik oleh gurunya untuk membantu guru-guru memasukkan markah peperiksaan ke Program Peperiksaan HC3 sekolahnya. Tanpa pengetahuan gurunya beliau telah mengubah markah subjek ICTnya dari 40% ke 75%. Hasil dari perbuatan tersebut beliau telah lulus dengan cemerlang subjek tersebut.
Information privacy refers to the right of individuals and organisations to deny or restrict the collection and use the information about them
Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk menafi atau mengelakkan hasil dan maklumat mereka digunakan.
Authentication methods
Kaedah pengesahan
P
Q
Taxi services booking / tempahan perkhidmatan teksi
Purchase using credit card / pembelian menggunakan kad kredit
- Retinal scanning /
pengimbasan retina
- voice recognition /
Pengecaman suara
Figure 2/Rajah 2
Azman is a Muslim. One day, he received a spam e-mail stating that his favourite drink Power-B uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 50 of his friends.
Azman beragama Islam. Suati hari beliau menerima email spam menyatakan minuman kegemarannya Power B menggunakan bahan pewarna makanan tidak halal, namun Azman tidak tahu sumber tersebut benar atau tidak. Azman mengambil keputusan menyebarkan email tersebut kepada 50 orang rakannya.
Fazli wrote an e-mail that a fellow classmate was having an affair with a teacher, even though it was not true. Fazli then sent it to five other friends.
Fazli telah menulis satu emel yang menyatakan seorang rakan sekelasnya mengadakan hubungan dengan seorang guru, Fazli telah menghantar emel tersebut kepada lima orang rakan
X
Z
X Rated Video
Do not enter
Y
FILTERING SETTINGS
Restricted List
HYPERLINK "http://www.seperti.com" http://www.seperti.com
http://www.jalan.com
ADD
REMOVE
EXIT
START
User access a web page
Contained banned words?
STOP
A
B
C
YES
NO
Fazli wrote an e-mail that a fellow classmate was having an affair with a teacher, even though it was not true. Fazli then sent it to five other friends.
Fazli telah menulis satu emel yang menyatakan seorang rakan sekelasnya mengadakan hubungan dengan seorang guru, Fazli telah menghantar emel tersebut kepada lima orang rakan
X
Z
X Rated Video
Do not enter
Y
Julia has purchased a commercial application software and she uploads the software to her web site for others to download it.
Julia telah membeli perisian aplikasi komersil dan dia telah memuat naik perisian itu ke laman webnya bagi membolehkan orang lain memuat turunnya.
Johan has downloaded an open source application software from the Internet. He then duplicates the software and distributes to his friends.
Johan telah memuat turun perisian aplikasi sumber terbuka dari Internet.Kemudian, dia membuat salinan perisian tersebut dan mengedarkan kepada rakan-rakannya.
Dewi works as an editor in one of the larger private television broadcasting in Malaysia.
She uses her expertise in ICT for editing the television programs in order to preserve the
quality before they were broadcast by the television station. Without companys permission
Dewi has made copies of the television programs and sells it via Internet.
Dewi bertugas sebagai seorang penyunting di salah satu stesen penyiaran televisyen
swasta yang terbesar di Malaysia. Dewi menggunakan kepakarannya dalam bidang ICT
untuk tugas penyuntingnya bagi menjaga mutu dan kualiti penyiaran. Dewi turut membuat
salinan semua rakaman rancangan televisyen di stesen tersebut dan menjualnya di Internet
tanpa pengetahuan majikannya.
Computer program that perform unauthorised processes on a computer or a network
Program komputer yang melaksanakan proses-proses yang tidak dibenarkan pada suatu komputer atau suatu rangkaian
Unauthorised access to a computer system or network
Capaian yang tidak dibenarkan terhadap suatu sistem komputer atau rangkaian
Computer is used to steal money, goods, information or resources
Komputer digunakan untuk mencuri wang, barangan, maklumat atau sumber.
R
Q
P
Figure 3/Rajah 3
Never open an email attachment unless you are expecting the attachment and it is from the trusted source
Jangan buka email yang dikepilkan kecuali anda menjangkakan kepilan tersebut dan ia datang dari sumber yang dipercayai
Plaintext
H
Plaintext
Encrypt
Decrypt
ANTIVIRUS
FIREWALL
ANTISPYWARE
As a new secretary of ICT Club, Nelly wanted to copy the club members list from the computer in ICT room to her laptop using thumb drive. While opening the file, suddenly she saw a pop up message as shown in Figure 13.
Sebagai setiausaha Kelab ICT yang baru, Nelly mahu menyalin senarai nama ahli kelab dari komputer di bilik ICT ke komputer ribanya dengan menggunakan thumb drivenya. Semasa membuka fail tersebut, tiba-tiba dia melihat mesej pop-up seperti yang ditunjukkan dalam Rajah 13.
[email protected] ( http://rmmict.blogspot.com )