learning area 1

98
1.1.1.1 Define ICT. Section A 3.. Complete the following statement: Lengkapkan pernyataan berikut Information and Communication Technology is the use of computers, ( i) ..................devices and( ii) ......;:........applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime. Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i) ...............dan aplikasi( ii) ...............untuk memproses ,menyimpan , m encapai semula, melindungi dan menghantar m aklumat dari mana-mana tempat pada bila-bilamasa COMMUNICATION / SOFTWARE Source Year Leve l Bloom SPM 2010 1. Choose the correct statement to define Information and Communication Technology (ICT). Pilih pernyataan yang paling tepat untuk mendefinisikan Teknologi Maklumat dan Komunikasi (ICT). A. Information and Communication Technology is composed of three main components of a computer, Internet and networking. Teknologi Maklumat dan Komunikasi (ICT) terdiri daripada tiga komponen utama iaitu komputer, internet dan rangkaian. B. Information and Communication Technology (ICT) is a technology used by people to improve their lives. Teknologi Maklumat dan Komunikasi (ICT) adalah teknologi yang yang digunakan oleh manusia untuk meningkatkan kehidupan mereka. C. Information and Communication Technology (ICT) is a technology that is needed to process the information using electronic equipment and software applications to transfer, store, send and receive data. Teknologi Maklumat dan Komunikasi (ICT) adalah satu teknologi yang diperlukan untuk memproses maklumat menggunakan peralatan elektronik dan perisian aplikasi untuk memindah, menyimpan, menghantar dan menerima data. D. Information and Communication Technology (ICT) is any communication facilities and computer-based applications. 1

description

learning area 1 question paper of ict spm

Transcript of learning area 1

Page 1: learning area 1

1.1.1.1 Define ICT.

Section A

3.. Complete the following statement: Lengkapkan pernyataan berikutInformation and Communication Technology is the use of computers,( i) ..................devices and( ii) ......;:........applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i) ...............dan aplikasi( ii)...............untuk memproses ,menyimpan , m encapai semula, melindungi dan menghantar m aklumat dari

mana-mana tempat pada bila-bilamasaCOMMUNICATION / SOFTWARE

Source Year Level

Bloom

SPM 2010

1. Choose the correct statement to define Information and Communication Technology (ICT). Pilih pernyataan yang paling tepat untuk mendefinisikan Teknologi Maklumat dan Komunikasi (ICT).

A. Information and Communication Technology is composed of three main components of a computer, Internet and networking.

Teknologi Maklumat dan Komunikasi (ICT) terdiri daripada tiga komponen utama iaitu komputer, internet dan rangkaian.

B. Information and Communication Technology (ICT) is a technology used by people to improve their lives.

Teknologi Maklumat dan Komunikasi (ICT) adalah teknologi yang yang digunakan oleh manusia untuk meningkatkan kehidupan mereka.

C. Information and Communication Technology (ICT) is a technology that is needed to process the information using electronic equipment and software applications to transfer, store, send and receive data. Teknologi Maklumat dan Komunikasi (ICT) adalah satu teknologi yang

diperlukan untuk memproses maklumat menggunakan peralatan elektronik dan perisian aplikasi untuk memindah, menyimpan, menghantar dan menerima data. D. Information and Communication Technology (ICT) is any communication facilities and computer-based applications. Teknologi Maklumat dan Komunikasi (ICT) adalah sebarang komunikasi dan kemudahan aplikasi berasaskan komputer.

C

Source Year Level

Bloom

KELANTAN

2010

2. Information may come in various forms such as ________.Maklumat diperoleh dari pelbagai bentuk seperti ________.I Reading /BacaanII Investigation / PenyiasatanIII Study / TinjauanIV Research / KajianA. I and IIB. II and IIIC. II, III and IV

D. All the above DSource Year Lev

elBloom

1

Page 2: learning area 1

Technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.Teknologi memerlukan kepada pemprosesan maklumat, penggunaan komputer elektronik, peralatan komunikasi dan perisian aplikasi untuk dicantumkan, disimpan, dilindungi, diproses, dihantar dan menerima maklumat bila-bila masa dan dimana-mana jua.

PERLIS 2010

3. The term computer literacy refers to _______________Istilah literasi computer merujuk kepada ________________.A. Books stored in a library on computer related subjects.

Buku-buku tentang computer yang disimpan di perpustakaan.B. A basic knowledge of computers and their use.

Pengetahuan asas tentang computer dan kegunaannya.C. Technical research conducted by colleges and universities.

Kajian teknikal yang dijalankan oleh kolej dan universiti.D. User’s guide that accompany applications software.

Panduan pengguna yang disertakan bersama perisian aplikasi.B

Source Year Level

Bloom

PERLIS 2010

Source Year Level

Bloom

TERENGGANU 2009

1.

This statement refers to..........................................Penyataan ini merujuk kepada.................................

A. Information and Communication Technology Teknologi Maklumat dan Komunikasi

B. Internet Protocol Protokol Internet

C. Operating SystemSistem Pengoperasian

D. Management Information System Sistem Pengurusan Maklumat

Source Year Level

Bloom

2

Page 3: learning area 1

UNKNOWN

Section B

Section C

1.1.1.2 Describe the brief evolution of computers.

Section A

4. Computers in ____________ Generation use transistor to transfer electronic signals acrossresister.Komputer Generasi ____________ menggunakan transistor untuk menghantar isyarat elektronikmelalui perintang. Second

Source Year Level

Bloom

TERENGGANU 2010

1. State the name of the first generation computer. / Nyatakan nama komuter generasi pertamaENIAC

Source Year Level

Bloom

SPM 2010

2. Figure 1 shows three technologies used in the generations of computers Rajah I menunjukkan tiga teknologi yang digunakan dalam generasi komputer.

Figure 1 / Rajah 1

Based on Figure 1, write A, B or C to match the following:Berdasarkan Rajah l, tulis A, B atau C untuk dipadankan dengan berikut: {(i) Second Generation / Generasi Kedua C(ii) Third Generation / Generasi Ketiga A

3

Page 4: learning area 1

Source Year Level

Bloom

SPM 2010

1.

Name the technology used for this generation of computers.

Source Year

Level

Bloom

PENANG 2008

1.

“Production was slow because everything was done manually and totally depended on human

labor.”

Statement above is regarding

A. Impact of ICT on Industry

B. Impact of ICT in Banking

C. Computerised Systems

D. Non-Computerised Systems

Source Year Level

Bloom

PERLIS 2008

1. Figure 1 shows the hardware technology that was created in second generation of computer.

Rajah 1 menunjukkan teknologi perkakasan yang dicipta dalam zaman komputer generasi kedua.

Figure 1Rajah 1

Name the hardware in Figure 1.

Namakan perkakasan dalam Rajah 1.

Source Year Level

Bloom

4

The computers for this generation use magnetic drums as storage media and are large in size, taking up entire room. They use a great deal of electricity, generating a lot of heat, which is often the cause of malfunctions.

Page 5: learning area 1

UNKNOWN

2009

2 Figure 1 show the technologies used in two different generations of computers.

(a) (b)

FIGURE 1

Which of the following is true?

1(a) 1(b)

A First Generation Fourth Generation

B Second Generation First Generation

C Third Generation Second Generation

D Fourth Generation Third Generation

Source Year Level BloomSARAWAK

(A)2008

1. Figure 1 shows several components of computer technology generations.

Rajah 1 menunjukkan beberapa komponen bagi generasi teknologi komputer.

FIGURE 1RAJAH 1

Match A, B or C with the following generation of computer technology.

Padankan A, B atau C dengan generasi teknologi computer.

a) 1st Generation Computer

Komputer Generasi Pertama

b) 2nd Generation Computer

5

A

B C

Page 6: learning area 1

Komputer Generasi Kedua

Source Year Level

Bloom

UNKNOWN

2009

2. Figure 1 shows several components of computer technology generations. Rajah 1 menunjukkan beberapa komponen bagi generasi teknologi komputer.

Figure 1Rajah 1

Match A, B or C with the following generation of computer technology.Padankan A, B atau C dengan generasi teknologi komputer.

(i) 1st Generation ComputerKomputer Generasi Pertama

(ii) 4th Generation ComputerKomputer Generasi Keempat

Source Year Level

Bloom

KELANG 2009

1. The following are the technologies used in different generations of computers.

Integrated CircuitsVacuum TubesArtificial IntelligenceMicroprocessorsTransistors

Which technology is used in the second generation computer?

Source Year Level

Bloom

PCGHS 2009

A BC

6

Page 7: learning area 1

1. Figure 1 shows the technologies used in two generations of computers.Rajah 1 menunjukkan teknologi yang digunakan dalam dua generasi computer.

(a) (b)

Figure 1Rajah 1

Based on Figure 1, which of the followings is true?Berdasarkan kepada Rajah 1, yang mana satu antara berikut adalah benar.

(a) (b)A First Generation

Generasi PertamaSecond GenerationGenerasi Kedua

B Second GenerationGenerasi Kedua

ThirdGenerationGenerasi Ketiga

C Third GenerationGenerasi Ketiga

Fourth GenerationGenerasi Keempat

D Fourth GenerationGenerasi Keempat

First GenerationGenerasi Pertama

Source Year Level

Bloom

JOHOR 2009

7

Page 8: learning area 1

1. Figure 1 shows the evolution of computers. Rajah 1 menunjukkan aliran evolusi komputer.

Based on Figure 1, Name the hardware :Berdasarkan Rajah 1, Namakan perkakasan:

(i) X (ii) Y.

Source Year Level

Bloom

KELANTAN

2009

1. State the name of the first generation computer.Nyatakan nama komputer generasi pertama.

Source Year Level

Bloom

PERAK 20098

1951 - 1957

1958 - 1963

1964-1969

1970 - 1990

Vacuum TubeTiub Hampagas

Integrated CircuitLitar Bersepadu

X Y

Figure 1Rajah 1

Page 9: learning area 1

1. Figure 1 show the technologies used in three different generations of computersRajah 1 menunjukkan beberapa teknologi yang digunakan dalam tiga generasi komputer yang berlainan

A B C

Figure 1Rajah 1

Match A, B or C with the following generations of computer technology.Padankan A, B atau C dengan generasi teknologi komputer berikut.

(i) 1st Generation Computer. Komputer Generasi Pertama.

(ii) 2nd Generation Computer. Komputer Generasi Kedua

Source Year Level

Bloom

SPM 2007

1. State the name of the first generation computer. Nyatakan nama komputer generasi pertama.

Source Year Level

Bloom

SPM 2008

Section B

Section C

1.1.2.1 List the usage of ICT in everyday life.

Section A

1. Figure 3 shows the usage of ICT in three different fields.Rajah 3 menunjukkan penggunaan Teknologi Maklumat dan Komunikasi dalam tiga bidang yangberbeza .

9

Page 10: learning area 1

Figure 3 / Rajah 3

Based on statement in Figure 3,state the name of field X and Z:Berdasarkan Rajah 3, nyatakan nama bidang komputer X dan Z:(i) X(ii) ZCommerce / PerdaganganIndustry/ Manufacturing/Perindustrian

Source Year Level

Bloom

JOHOR 2010

2. ICT is used in many sectors.(i) Auto Teller Machine (ATM), cash deposit machine and electronic fund transfer are examples of

ICT usage in _______________ sector.ICT digunakan dalam pelbagai bidang. Mesin ATM (Auto Teller Machine), mesin deposit wang tunai dan pemindahan wang elektronik adalah beberapa contoh penggunaan ICTdalam bidang _______________.

(ii) In ________________ sector, teachers use computers to search for teaching materials,participate in online forums and online conferences.Dalam bidang __________________, guru menggunakan komputer untuk medapatkan bahan mengajar, melibatkan diri dalam forum dan persidangan atas talian(i) banking / perbankan (ii) education / pendidikan / pelajaran

Source Year Level

Bloom

KEDAH 2010

3. Customers benefit from Electronic Banking in terms of _____________ Pelanggan mendapat faedah dari Perbankan Elektronik dalam konteks _________

10

Page 11: learning area 1

I. 24 hour service Perkhidmatan 24 jam

II. Electronic Fund Transfer Pemindahan wang secara elektronik

III. Electronic Cash Deposits Deposit Tunai secara elektronik

IV. Electronic Loan Applications Aplikasi Pinjaman secara elektronik

A. I , II and IIIB. I, II and IVC. I, III and IVD. II,III and IVA

Source Year Level

Bloom

SELANGOR 2010

3. State True or False for the following statements.Nyatakan Benar atau Salah bagi pernyataan-pernyataan berikut.

Nowadays, computer plays bigger roles in our daily life. In banking sector, the computer is the nerve centre of the banking system around the world where the transaction can be done anytime and place. Pada masa sekarang, komputer memainkan peranan yang sangat besar di dalam kehidupan kita seharian. Dalam sektor perbankan, komputer merupakan nadi penggerak sistem perbankan seluruh dunia di mana operasi transaksi boleh dilakukan pada bila-bila masa dan di mana sahaja.

Source Year

Level

Bloom

PERAK 2008

4 Table 1 show three different fields and Figure 3 shows the use of ICT in two different fields.

TABLE 1

11

Industry Banking Education

Page 12: learning area 1

(a) (b)

FIGURE 3

Based on Figure 3, match the use of ICT with the fields given in Table 1 .

(a) ____________________

(b) ____________________

Source Year Level BloomSARAWAK

(A)2008

12 Table 3 shows the usage of multimedia in various fields.Jadual 3 menunjukkan penggunaan multimedia dalam pelbagai bidang.

P MedicinePerubatan

Q BusinessPerniagaan

R EngineeringKejuruteraan

S EntertainmentHiburan

Table 3Based on Table 3, choose P, Q, R or S for the following statements.Berdasarkan Rajah 3, pilih sama ada P, Q, R atau S bagi pernyataan tersebut.

(a) Users can produce computer games, and develop animations or special effects for cartoons.Pengguna boleh membina permainan komputer dan animasi atau kesan-kesan khas pada kartun.

(b) Users can practice or be trained in performing high-risk surgery virtually.Pengguna boleh mengaplikasi atau menjalani latihan dalam melaksanakan pembedahan berisiko tinggi secara maya.

Source Year Level

Bloom

JOHOR 2009

3. Customers benefit from Electronic Banking in terms of _____________Pelanggan mendapat faedah dari Perbankan Elektronik dalam konteks ___________

12

Page 13: learning area 1

V. 24 hour service Perkhidmatan 24 jamVI. Electronic Fund Transfer Pemindahan wang secara elektronikVII. Electronic Cash Deposits Deposit Tunai secara elektronikVIII. Electronic Loan Applications Aplikasi Pinjaman secara elektronik

E. I , II and IIIF. I, II and IVG. I, III and IVH. II,III and IV

Source Year Level

Bloom

WPKL 2009

22 Write the words that would complete the following statement. Tulis perkataan yang dapat melengkapkan pernyataan berikut.

Buying books from an online shop and selling shoes on an internet auction site are both examples of .........................

Membeli buku dari kedai atas talian dan menjual kasut melalui tapak jualan lelong dalam internet adalah contoh .......................Source Year Lev

elBloom

SPM 2009

Section B

26 EDUCATION BEFORE ICT EDUCATION WITH ICT

Figure 3 Rajah 3

(a) Based on Figure 3, state a difference between the education before ICT and education with ICT.Merujuk kepada Rajah 3, nyatakan perbezaan antara pendidikan tanpa ICT dan dengan ICT.

(b) List two usage of ICT in the education sector.Senaraikan dua kegunaan ICT dalam sektor pendidikan.

Source Year Lev Bloom

13

Page 14: learning area 1

elUNKNOW

N2008

Section C

1.1.2.2 State the differences between computerised and non-computerised systems.

Section A

1. Study the statement below carefully.Kaji pernyataan di bawah

Statement 1/ pernyataan 1Statement 1 above is regarding to ______________________ systems.Pernyataan 1 di atas merujuk kepada sistem ________________________.Non- computerized

Source Year Level

Bloom

SABAH 2010

2. Table 1 shows two types of systems.Jadual 1 menunjukkan dua jenis sistem.

AComputerised Berkomputer

BNon-ComputerisedTidak Berkomputer

Table 1 / Jadual 1

Choose A or B to match the following statements.Pilih A atau B untuk memadankan pernyataan berikut.All transactions can be done at anytime and any place for business purposes.Semua transaksi boleh dilakukan bila-bila masa dan di mana sahaja untuk tujuan perniagaan.A

Source Year Level

Bloom

TERENGGANU 2010

1. Using the digital medium such as online communication via emails, online chat and instantmessaging, information can be transferred, stored and retrieved. This type of informationtransfer eliminates the use of printed materials and can create a ___________ environmentin today’s society.

Dengan menggunakan perantara digital seperti komunikasi atas talian melalui emel,sembang atas talian dan mesej segera, maklumat boleh dihantar, disimpan, dan dicapai.Penghantaran maklumat jenis ini boleh menghapuskan penggunaan bahan cetakan danmewujudkan satu situasi _____________ didalam masyarakat sekarang.

Source Year Lev Bloom

14

“Production was slow because everything was done manually and totally depended on human labour.”“Produksi perlahan kerana semuanya dijalankan secara manual dan bergantung kepada tenaga manusia.”

Page 15: learning area 1

elKEDAH 2009

2. Which of the following is the usage of computerized system?

Manakah antara berikut merupakan kegunaan sistem berkomputer?

A. Withdraw money from the ATM machine.

Mengeluarkan wang dari mesin ATM.

B. Buying a set of computer from PC Fair.

Membeli satu set komputer di pameran komputer.

C. Student assembles computer in the lab.

Pelajar membuat pemasangan komputer di makmal.

D. Buying a bus ticket at bus station counter.

Membeli tiket bas di kaunter stesen bas.

Source Year Level BloomHULU LANGAT 2009

Section B

26. Figure 1 shows a situation in a banking system .Rajah 1 menunjukkan situasi di dalam sistem bank

a. State TWO advantages when the management changed the system from A to B.Nyatakan DUA kelebihan yang diperolehi apabila pihak pengurusan bank mengubah dari sistem A ke sistem B.

i) ___________________________

ii) ___________________________ [2 Marks]

b. State TWO disadvantages when the management changed the system from A to B.Nyatakan DUA kelemahan yang diperolehi apabila pihak pengurusan mengubah dari sistem A ke sistem B.

i) ___________________________

15

Page 16: learning area 1

ii) ___________________________ [2 Marks]

(a) Two advantages when the management changed the system from A to B.i) Faster productionsii) Can take over jobs that are dangerous to the humaniii) More reliableiv) can work continuously with no need for breaks.v) can repeat a task accurately time and again without losing accuracy

(b)Two disadvantages when the management changed the system from A to B. i) High Cost ii) High maintenanceiii) Employment iv) Less flexible

Source Year Level

Bloom

PAHANG

2009

29. Figure 8 shows how a car is assembled in a Proton factory. Rajah 8 menunjukkan aktiviti pemasangan kereta di kilang Proton.

Figure 8 Rajah 8

Based on Figure 8 :Berdasarkan Rajah 8 :

(a) State one difference between assembling a car manually and the process shown in Figure 8. Nyatakan satu perbezaan antara proses pemasangan kereta secara manual berbanding cara yang terdapat pada Rajah 8.

(a) Give two positive impact using technology in Figure 8 to the society. Berikan dua kesan positif penggunaan teknologi pada Rajah 8 kepada masyarakat. Source Year Lev

elBloom

N.SEMBILA 2009

16

Page 17: learning area 1

N

Section C

1.1.2.3 State the impact of ICT on society.

Section A

1. ICT has brought many positive impacts on society such as …

A. Lower communication cost

B. Social problems

C. Ineffective sharing of information

D. Slow communication speed

Source Year

Level

Bloom

PETALING PERDANA 2008

2. Question 2 is in statement form about Positive Impact of ICT on society. Write True or False.

Soalan 2 adalah dalam bentuk pernyataan mengenai Kesan Positif ICT ke atas masyarakat.. Tulis Benar atau

Palsu

a) People could share and exchange ideas, news and information easier through video conference. Pengguna

lebih mudah berkongsi dan bertukar pandangan, berita dan maklumat melalui sidang video.

b) People became more individualistic and introvert.

Pengguna bersikap individual dan bersendiri.

Source Year Level

Bloom

UNKNOWN

2009

Section B

1. Figure 8 shows the impact of ICT on society.Rajah 1 memaparkan kesan ICT terhadap masyarakat

Figure 8 / Rajah 8Based on figure 8 / Berdasarkan rajah 8,(i) State two advantages of ICT on society./ Nyatakan dua kelebihan ICT terhadap masyarakat.

17

Page 18: learning area 1

(ii) State two disadvantages of ICT on society. / Nyatakan dua kelemahan ICT terhadap masyarakat. (i) - Fastest speed of communication

- Lower communication cost- Reliable mode of communication- Effective sharing of information- Paperless environment- Borderless communication- Any relevant answer.

(ii) - Social problem (or any related answer)- Health problem (or any related anser)- Any relevant answer.

Source Year Level

Bloom

KEDAH 2010

Section C

31.

Figure 7 Rajah 7

Based on Figure 7 the above statement, answer the following question. Berdasarkan Rajah 7 pernyataan di atas, jawab soalan yang diberikan.

(a) Give the definition of the environment in Figure 7 situation. Berikan definisi situasi persekitaran yang dinyatakan dalam Rajah 7.

(b) State two other positive and two other negative impacts of ICT usage. Nyatakan dua impak positif dan negatif kesan penggunaan ICT

selain daripada yang dinyatakan.

1.2.1.1 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.

Section A

3. Choose the correct answer.

Copyright Intellectual Property Privacy

The right of individuals to control the collection and use of information about themselves refers to the right of _____________________________.

Source Year

Level

Bloom

PENANG 2008

1. This Act provides the environment for the future development and delivery of healthcare in Malaysia.Akta ini menyediakan keadaan untuk perkembangan dan penghantaran kesihatan di masa hadapan di Malaysia.

18

ICT technology has created the term paperless environment. It has been used in many sector, to make our work easier and faster.

Teknologi ICT telah mencipta dunia tanpa penggunaan kertas. Ianya telah digunakan di dalam banyak sektor, agar kerja dapat dilaksanakan dengan mudah dan cepat.

Page 19: learning area 1

A. Digital Signature Act 1997B. Computer Crime Act 1997C. Telemedicine Act 1997D. Communication and Multimedia Act 1997

Source Year

Level

Bloom

GOMBAK 2008

2. Write True or False for the following statements:

Tuliskan Benar atau Palsu pada pernyataan berikut :

(i) Privacy means that we have the right not to disclose our personal details.

Kebersendirian bermaksud yang kita mempunyai hak untuk tidak mendedahkan maklumat peribadi.

(ii) Computer Ethics is a guideline for computer users. Etika Komputer adalah panduan untuk pengguna komputer.

Source Year

Level

Bloom

GOMBAK 2008

1

X is one of the issues in computer ethics. X may be

A. software theft B. encrypted textC. unauthorised accessD. inaccurate information

Source Year Level BloomSARAWAK

(A)2008

6. Creative writing such as lyrics and song compositions can be protected under the _____ law.A. patentB. designC. copyrightD. trademark

Source Year Level

Bloom

JOHOR 2008

1 A system of moral standards or values used as a guideline for computer users is known as

A. cyber lawsB. code of ethicsC. cryptographiesD. computer securities

Source Year Level BloomSARAWAK (A) 2009

19

Unknown author

X Idea can be misunderstood

Page 20: learning area 1

20 Complete the statement below by filling in the blankIsikan ruang kosong di bawah untuk melengkapkan pernyataan berikut

A violation of the rights given to the producer of a film, song and book is called _________________.

Pencabulan hak yang dimiliki oleh penerbit filem, muzik dan buku dikenali sebagai ______________ .

Source Year Level

Bloom

JOHOR 2009

1. Cyber law is defined as _____________________.Undang-undang cyber bermaksud ___________________.

A. any laws relating to electronic and technology industry.sebarang undang-undang yang berkait dengan industri elektronik dan teknologi

B. any laws relating to industry and the Internet communications.sebarang undang-undang yang berkait dengan industri dan komunikasi internet

C. any laws relating to technology and the Internet communications.sebarang undang-undang yang berkait dengan teknologi dan komunikasi internet

D. any laws relating to protecting the internet and other online communication technologysebarang undang-undang yang berkaitan dengan melindungi internet dan teknologi komunikasi dalam talian

Source Year Level

Bloom

WPKL 2009

2. State whether the following statements is True or False. Nyatakan sama ada pernyataan berikut Benar atau Palsu. (i) Privacy means that we have the right not to disclose our personal details.

Hak peribadi bermaksud kita ada hak untuk tidak mendedahkan maklumat peribadi.(ii) E-banking makes buying and selling activities faster and more efficient through internet.

Perbankan elektronik membolehkan aktiviti belian dan jualan lebih cepat dan berkesan

melalui internet.

Source Year Level

Bloom

PERAK 2009

4. Table 1 shows types of computer crimes.Jadual 1 menunjukkan jenis jenayah komputer.

A Computer Fraud. Penipuan Komputer

B Computer Theft. Pencurian Komputer

C Computer Attack. Penyerangan KomputerTable 1 Jadual 1

Based on Table 1, write A, B and C to categorise the following acivities:

20

Page 21: learning area 1

Ali has been appointed by his teacher to help other teachers to key in the test score into school HC3 Examination Program. Without his teacher knowledge he had changed his ICT’s subject marks from 40% to 75%. As a result of the actions he has successfully passed the subject.Ali telah dilantik oleh gurunya untuk membantu guru-guru memasukkan markah peperiksaan ke Program Peperiksaan HC3 sekolahnya. Tanpa pengetahuan gurunya beliau telah mengubah markah subjek ICTnya dari 40% ke 75%. Hasil dari perbuatan tersebut beliau telah lulus dengan cemerlang subjek tersebut.

Berdasarkan Jadual 1, tulis A, B atau C untuk mengkategorikan aktiviti berikut.

i) E-mail hoaxes, false claims of expertise on certain fields.Menghantar e-mail tipu helah, mengaku mahir dalam bidang tertentu.

ii) Tap in the data transmission lines and international transfer of payments to the wrong account.Memasuki saluran penghantaran data dan dengan sengaja memindahkan bayaran kepada akaun lain.

Source Year Level

Bloom

SPM 2007

Question 22 is in statements form. Write True or False for the following statement: Soalan 22 adalah dalam bentuk pernyataan. Tuliskan Benar atau Palsu untuk pernyataan tersebut.

22. Cyber law is a system of moral standards or values used as a guideline for computer users.Undang-undang siber adalah sistem piawaian moral atau nilai yang digunakan sebagai garis panduan kepada pengguna komputer.

Source Year Level

Bloom

SPM 2007

Section B

1. The following is a statement about computer ethics.

Berikut adalah pernyataan tentang etika komputer

Based on the statement above / Berdasarkan pernyataan di atas,(a) What is the type of misconduct based on the underlined phase above.

Apakah jenis kesalahan yang dilakukan berdasarkan pernyataan bergaris di atas. Definisikan jenis kesalahan tersebut.

(b) Explain the negative impact done by Ali towards the school. Terangkan kesan negatif perbuatan yang dilakukan Ali kepada sekolah.

(a) ETHICS ethics in computing means moral guidelines to refer to when using the computer and computer networks.

21

Page 22: learning area 1

ORethics is a moral philosophy where a person makes a specific moral choice and sticks to it.

(b) Negative impact:- Keputusan peperiksaan tidak tepat- Susunan kedudukan dalam kelas tidak tepat

Gred purata subjek ICT menjadi bertambah baikSource Year Lev

elBloom

KELANTAN

2010

Source Year Level

Bloom

TERENGGANU 2009

Section C

31. Figure 11 is an excerpt from a daily newspaperRajah 11 adalah petikan daripada akhbar harian.

22

MALAYSIA NEWS.COMYOUR DAILY NEWSPAPER

24 OCT 2008RM5.00

Online TheftBank Employee Charged

Kuala Lumpur 23 Oct. A bank employee was charged in the high court yesterday for breaking into the bank computer system and electronically transferring RM1.2 million to his personal bank account. The HOT Bank employee was charged…

Kecurian Atas TalianKakitangan Bank DidakwaKuala Lumpur 23 Okt. Seorang pekerja bank telah didakwa di mahkamah tinggi semalam di atas kesalahan memecah masuk ke dalam system computer bank dengan memindahkan wang berjumlah RM1.2 juta secara elektronik untuk dimasukkan ke dalam akaun bank peribadinya. Pekerja HOT Bank itu telah didakwa…

Page 23: learning area 1

Figure 11 Rajah 11

Based on the excerpt on Figure 11Berdasarkan petikan dalam Rajah 11

(a) Describe two suitable security measures that should be taken by the bank to prevent computer crime.Terangkan dua langkah keselamatan yang sesuai yang patut diambil oleh pihak bank untuk mengatasi jenayah computer itu

b) Explain why bank clients should be protected under the Malaysian Cyber Law?Mengapa pelanggan bank harus dilindungi di bawah Undang-undang Siber Malaysia?

Source Year Level

Bloom

SPM 2008

1.2.1.2 Differentiate between ethics and law.

Section A

1. Which of the followings are TRUE about computer ethics?Manakah antara berikut adalah BENAR tentang etika penggunaan komputer?I As a guideline to computer users.

Sebagai garis panduan kepada pengguna komputer.II No punishment for anyone who violates ethics.

Tiada hukuman dikenakan kepada sesiapa yang melanggar etika.III Depends on country and state where the crime is committed.

Bergantung kepada negara dan kawasan di mana jenayah tersebut dilakukan.IV Computer users are free to follow or ignore the code of ethics.

Semua pengguna komputer bebas untuk mengamalkan kod etika yang digariskan.A I, II and IIIB I, II and IVC I, III and IVD II, III and IVB

Source Year Level

Bloom

KEDAH 2010

2. The following statements are related to ethics and law.

P Judge behaviour based on moral standards.

Q Universal, can be applied anywhere, all over the world.

R Prevent misuse of computers.

S As a rule to control computer users.

T Computer users must follow the regulations.

23

Page 24: learning area 1

Choose the statement that is related to law by writing the letter(s) in the space provided.

Source Year

Level

Bloom

PENANG 2008

Section B

26. In recent years, email is one of the popular services thru the net. Many business transactions,

management instructions even individual communication are done. Students share information,

ideas and opinions . It is very fast and easy.

Pada masa kini, email sangat digemari di kalangan pengguna internet. Banyak transaksi

perniagaan, arahan pentadbiran malah komunikasi individu juga diadakan. Pelajar-pelajar berkongsi

maklumat, idea dan pendapat. Ia sangat senang dan cepat.

a. State two examples of law breaking.

Nyatakan dua contoh aktiviti yang melanggar undang-undang. [2 marks]

b. State two reasons why do we need ethics and law in computing.

Nyatakan dua sebab mengapa kita perlu beretika dan undang-undang dalam

perkomputeran. [2 marks]

Source Year Level

Bloom

PERLIS 2009

26. Electronic mail is one of the most popular services on the internet. It makes business managers and administrators more productive by allowing them to share information, ideas and opinions easily.Mel electronic merupakan perkhidmatan dalam internet yang paling popular. Ia membuatkan ahli perniagaan dan pentadbir lebih produktif dengan membenarkan mereka berkongsi maklumat, pendapat dan pandangan dengan mudah.

In relation to electronic mail, state two examples in each case which can be considered as:Berkaitan dengan mel elektronik, nyatakan dua contoh daripada setia kes yang dianggap sebagai:

a) Ethical Beretika

b) Law breaking Melanggar undang-undang

Source Year Level

Bloom

SPM 2008

Section C

1.2.1.3 State the need for intellectual property laws.

Section A

24

Page 25: learning area 1

2. Table 1 shows statements about types of Intellectual Property.Jadual 1 menunjukkan pernyataan mengenai jenis-jenis Harta Intelektual.

A Artistic material, music, films, sound recordings and road casts including software and multimediaBahan artistik, muzik, filem, rakaman bunyi dan ‘road casts’ termasuk perisian dan multimedia

B Word, names, symbols, devices and images that represent product, goods or servicesPerkataan, nama, simbol, peralatan dan imej yang mewakili produk barangan dan perkhidmatan

C The features of the lines, contours, colours, shape, texture or material of the product itselfCiri-ciri garisan, kontur, warna, bentuk, tekstur atau bahan produk itu sendiri

Table 1 / Jadual 1

Based on Table 1, write A, B or C to match the following :Berdasarkan Jadual 1, tulis A, B atau C untuk memadankan yang berikut :

(i) Trademarks / Jenama B

(ii) Design / Rekabentuk C

Source Year Level

Bloom

PUTRAJAYA 2010

12. A ____________gives authors and artists exclusive rights to duplicate, publish or sell their materials.

____________membolehkan pengarang dan artis hak eksklusif untuk menyalin, mempersembah dan menjual hasil mereka.

Source Year

Level

Bloom

PAHANG 2008

2. Trademark is _____________________.

A. the features of, in particular, the lines, contours, colours, shape, texture or material of the

product itself or its ornamentation.

B. words, names, symbols, devices and images that represent products, goods or services.

C. utility, design or plant patents that protect inventions and improvements to existing inventions.

D. literary and artistic material, music, films, sound recordings and broadcasts, including software

and multimedia.

Source Year Level

Bloom

PERLIS 2008

25

Page 26: learning area 1

Source Year Level

Bloom

TERENGGANU 2009

2. Intellectual property law is needed to cover:Undang-undang harta intelek diperlukan untuk melindungi:

I. Ideas IdeII. Inventions RekaanIII. Historical creations Ciptaan SejarahIV. Unique names Nama unik

A. I, II and IIIB. I, II and IVC. I, III and IVD. II, III and IV

Source Year Level

Bloom

KEDAH 2009

2. Creative writing such as lyrics and song compositions can be protected under the ___________ law.Penulisan kreatif seperti lirik dan susunan lagu boleh dilindungi dengan undang-undang ____________

A. Patent/PaternB. Design/RekabentukC. Copyright/HakciptaD. Trademark/Tanda Perniagaan

Source Year Level

Bloom

WPKL 2009

26

Page 27: learning area 1

1. Cik Masita obtained the exclusive legal rights for the distribution and sale of the CD-ROM. This is associated with Cik Masita mendapat hak eksklusif yang sah di sisi undang-undang untuk mengedar dan menjual CD-ROM. Perkara ini dikaitkan dengan

A. piracy cetak rompakB. privacy rights hak kebersendirianC. copyright hak cipta D. patent Paten

Source Year Level

Bloom

PUTRAJAYA 2009

Section B

1. The above logos are invention that represents TV stations which are operating in our country.These logos mean each TV stations are protected by a group of legal rights which calledIntellectual Property Laws.Logo-logo di atas mewakili stesen-stesen TV yang beroperasi di negara kita. Logo-logo inimembawa maksud stesen-setesen TV ini dilindungi oleh Undang-undang Harta Intelek.a) What is the meaning of Intellectual Property Laws? ( 1 mark )

Apakah yang dimaksudkan dengan Undang-Undang Harta Intelek?b) Name the type of protection that covers these logos and give another TWO inventions that

can be protected by laws. Namakan jenis perlindungan yang diberikan terhadap logo-logo tersebut dan berikan DUAciptaan yang dilindungi dari segi undang-undang.

a. Intellectual Property refers to works created by inventors, authors and artists. These works are unique and have value in the market place

b. cover ideas, inventions, literary creations, unique names, business models, industrial processes, Trademarks, Trade/company names , Copyrights , Patents( any two )

Source Year Level

Bloom

PERLIS 2010

26. Joyce is a Computer Science graduate of a local university. She has written an inventory program for her brother, Mathew, who owns a sundry shop. She does not charge him anything for the program. Even though the program is not a polished finished product, it works reasonably well and saves Mathew a lot of time keeping track of his supplies. As Joyce discovers later, Mathew has copied the program to his friend who also owns a sundry shop.

27

Page 28: learning area 1

Based on the situation above,

(i) Explain the major ethical issue. [ 2 marks ]

(ii) Explain why intellectual property law is needed for protecting Joyce’s original work. [ 2 marks ]

Source Year Level

Bloom

PCGHS 2009

Section C

1. Based on the statement above,Berdasarkan pernyataan di atas,a) Explain whether the issue above is involved

Jelaskan sama ada isu di atas melibatkani. ethical or unethical behaviour [2 marks]

perbuatan yang beretika atau tidak beretika______________________________________________________________________________________________________________________________________________

ii. lawful or unlawful behaviour [2 marks]perbuatan yang mengikut undang-undang atau melanggar undang-undang______________________________________________________________________________________________________________________________________________

b) Describe a type of law required to restrain the above activity. [3 marks]Terangkan satu jenis undang-undang yang diperlukan untuk membenteras aktiviti di atas.________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

a) i. Unethical - He uses the text without permission /- He uses someone else’s work in his own ……

ii. Unlawful - The author of the text can sue him /- The text is protected under law ……

b) cyberlaw - a law that protects online material / activities

- it prevents cyber criminals Source Year Lev

elBloom

TERENGGANU 2010

1.2.2.1 List ways to protect privacy.

Section A

1. Which of the following are ways to protect privacy?Manakah antara berikut adalah cara untuk melindungi kerahsiaan?

28

Page 29: learning area 1

I. Utilities software / Perisian utilitiII. Purchase goods with cash, rather than credit card

Beli barangan secara tunai berbanding kad kredit.III. Clear your history file when you are finished browsing.

Padam fail arkib setelah selesai melayari Internet.A. I onlyB. I and IIC. II and IIID. I, II and IIID

Source Year Level

Bloom

TERENGGANU 2010

2. Write whether the statements below are True or False.

Tuliskan sama ada pernyataan di bawah Benar atau Palsu.

(a) Privacy can be protected by utilities software such as firewall.

Kebersendirian boleh dilindungi dengan menggunakan perisian utiliti seperti tembok ap.

(b) Cyber law is a way to protect data privacy.

Undang-undang siber merupakan satu cara untuk melindungi kebersendirian data.

Source Year

Level

Bloom

N. SEMBILAN

2009

Section B

26. The following is a statement on information privacy.Berikut adalah penyataan tentang kebersendirian maklumat.

Based on the statement, list four ways of making personal data more private.[4 marks]Berdasarkan pernyataan itu, senaraikan empat cara untuk menjadikan data peribadi lebih sulit.

Source Year Level

Bloom

SPM 2007

29

“Information privacy refers to the right of individuals and organisations to deny or restrict the collection and use the information about them”

“Kebersendirian maklumat merujuk kepada hak individu dan hak organisasi menolak atau menghadkan pengumpulan dan penggunaan maklumat yang berkaitan dengannya”

Shelly, 2006

Page 30: learning area 1

29. You keep a data base of your friends’ names, addresses and dates of birth. The data base is kept in the school server and can be retrieve by other user. [4 marks]Anda menyimpan pangkalan data berkaitan nama, alamat, dan tarikh lahir rakan-rakan anda. Pangkalan data itu disimpan di dalam komputer pelayan sekolah dan boleh dicapai oleh pengguna lain.

(a) State two uses of the information from the data base to be utilized.Nyatakan dua kegunaan itu maklumat daripada pangkalan data dimanfaatkan.

(b) State two problems that may arised by having shared data base.Nyatakan dua masalah yang mungkin timbul dengan mempunyai perkongsian pangkalan data.

Source Year Level

Bloom

SPM 2007

Section C

1.2.2.2 State authentication and verification methods/technologies.

Section A

3. Figure 1 shows one type of biometric device.Rajah 1 menunjukkan satu jenis peranti biometrik.

Figure 1 / Rajah 1Based on Figure 1 / Berdasarkan Rajah 1,

(i) State the name of the device (a)./ Nyatakan nama peranti (a)(ii) State the authentication method in Figure 1. / Nyatakan kaedah pembuktian dalam Rajah 1.(i) Iris scanner / biometric device 1(ii) Biometric devices / iris scanning

Source Year Level

Bloom

PAHANG

2010

4. Figure 1 shows authentication and verification methods.Rajah 1 menunjukkan kaedah pembuktian dan pengesahan.

30

Page 31: learning area 1

Figure 1 /Rajah 1

Choose A or B to match the following statements.Pilih A atau B untuk memadankan pernyataan berikut.A possessed object that you must carry to gain access to computer or computer facility.Sejenis objek yang mesti di bawa untuk mencapai komputer atau kemudahan computerA

Source Year Level

Bloom

TERENGGANU 2010

4. Figure 1 shows one type of verification methods.Rajah 1 menunjukkan satu jenis kaedah pengesahan.

Figure 1 / Rajah 1Based on Figure 1, state the method used.

Berdasarkan Rajah 1, nyatakan kaedah yang digunakan. User Identification

Source Year Level

Bloom

PUTRAJAYA 2010

Questions 23 are in statements form. Write True or False for the following statements.

31

Page 32: learning area 1

Soalan 23 adalah dalam bentuk pernyataan. Tuliskan Benar atau Palsu bagi pernyataan-pernyataan berikut.

23.i. Biometric device translates personal characteristic into a digital code that is

compared with a digital code stored in the database. Peranti biometrik menterjemah ciri-ciri individu kepada kod digital dan dibandingkan dengan kod digital yang tersimpan di dalam pangkalan data.

ii. SCSI is a special high-speed parallel port used to attach peripheral devices such as disk drive and printer. SCSI ialah tempat sambungan khas berkelajuan tinggi untuk menghubungkan peranti seperti

pemacu cakera dan pencetak.

Source Year Level

Bloom

UNKNOWN

2008

4. Choose your answers from the list below.Pilih jawapan daripada senarai di bawah.

Figure 3 shows different methods of authentication.Rajah 3 menunjukkan kaedah yang berbeza bagi menentukan ketulenan.

Figure 3 Rajah 3

Based on Figure 3, name the method used inBerdasarkan Rajah 3, namakan kaedah yang digunakan dalam

(i) ...................................................

Fingerprint RecognitionPengecam Cap Jari

Voice RecognitionPengecam Suara

Iris ScanningPengimbas Iris

Hand Geometry ScanningPengimbas Geometri Tangan

(ii)(i)

32

Page 33: learning area 1

(ii) ...................................................

Source Year Level

Bloom

KELANG 2009

State whether the following statetements are true or false.

Source Year Level

Bloom

TERENGGANU 2009

2. TABLE 1 describes two authentication methods.

Method X Verify a user’s identify using items such as badgesand credit cards.

Method Y Verify a user’s identity based on the user’sbiological or behavioural characteristics.

TABLE 1State(i) Method X(ii) Method Y

33

Page 34: learning area 1

Source Year Level

Bloom

PCGHS 2009

5. Figure 01 shows the authentication and verification technologies.Rajah 01 menunjukkan teknologi pengesanan dan pengesahan

Figure 01 Rajah 01

a. Name the Technology A. Namakan teknologi A

b. State another example for Technology A. Nyatakan satu contoh lain bagi Teknologi A

Source Year Level

Bloom

WPKL 2009

Question 4 Soalan 4Choose your answers from the list below .Pilih jawapan dari senarai yang diberikan dibawah.

Fingerprint RecognitionPengecam CapJari

Voice recognitionPengecam Suara

Iris ScanningPengimbas Iris

Hand Geometry ScanningPengimbas Geomatri Tangan

Figure 1 shows different methods of authentication.Rajah 1 menunjukkan kaedah yang berbeza bagi menentukan ketulenan.

Technology A

34

Page 35: learning area 1

Figure 1Rajah 1

Based on Figure 1, name the method used inBerdasarkan Rajah 1, namakan kaedah yang digunakan dalam

i……………………ii…………………..

Source Year Level

Bloom

UNKNOWN

2. Which of the following is NOT an example of a biometric device? Yang manakah di antara berikut BUKAN contoh peralatan biometrik?

A. Smart card Kad pintar B. Face recognition system Sistem pengecam wajah C. Hand geometry system Sistem geometri tangan D. Fingerprint scanner Pengimbas cap jari

Source Year Level

Bloom

PERLIS 2009

1. Figure 1 shows one type of biometric device. Rajah 1 menunjukkan satu jenis peranti biometrik.

Figure 1 Rajah 1

35

i ii

Page 36: learning area 1

(i) State the name of the device. Nyatakan nama peranti itu.

(ii) State the function of the device. Nyatakan fungsi peranti itu.

Source Year Level

Bloom

SPM 2009

Section B

27.

a) Explain two authentification methods that fulfill the Ministry of Defense need.Terangkan dua kaedah pengesahan yang sesuai untuk memenuhi keperluan Kementerian Pertahanan.

Source Year

Level

Bloom

PAHANG 2008

Question 1 Soalan 1

a) The above pictures show the examples of biometric device. List another TWO examples of biometric devices

that you have learnt.

Gambar-gambar di atas menunjukkan contoh biometrik. Senaraikan DUA lagi contoh biometrik yang telah

anda pelajari. [2M]

b) State the need of authentication.

Nyatakan keperluan authentication. [2M]

Source Year Level

Bloom

PERLIS 2008

36

Fingerprint Recognition Iris Scanning

As a part of security measure Ministry of Defense wants to apply new security method that can prevent unauthorized access to the confidential area inside the building. You are hired as the consultant to install the security system.

Kementerian Pertahanan hendak melaksanakan kaedah keselamatan yang baru yang dapat melindungi capaian yang tidak sah ke dalam bahagian sulit dalam bangunan. Anda ditugaskan sebagai perunding untuk memasang system keselamatan

Page 37: learning area 1

26. (a) List TWO types of Intellectual Property Protection.

(i) ____________________________

(ii) ____________________________[2 marks]

(b) Based on the pictures below, name TWO biometric devices used for authentication.

(i)

(ii)

Source Year

Level

Bloom

PETALING PERDANA 2008

27. Figure 13 shows two methods of Authentication and Verification

Rajah 13 menunjukkan dua kaedah dalam Authentication dan Verification

Figure 13 Rajah 13

(a) Based on figure 13 :

(i) State X…………………………………………………….. [1 marks]37

Method of Authentication and Verification

Authentication Verification

Biometric Device

Call Back System

X Processed object

Page 38: learning area 1

Nyatakan X……………………………………………….. [1 markah]

(ii) State the right method of verification for the following case :

Nyatakan kaedah pengesahan yang betul bagi kes berikut:

Show the exam slip to verify that you are the valid candidate for the exam.

Menunjukkan slip peperiksaan untuk mengesahkan yang kamu adalah calon yang sebenarnya untuk menduduki peperiksaan

(b) State two examples of biometric device.

Nyatakan dua contoh alat biometrik:

26. Figure 11 shows the examples of biometric device.Rajah 11 menunjukkan contoh-contoh peranti biometrik.

Figure 11 Rajah 11

(i) List another TWO examples of biometric devices that you have learnt.Senaraikan DUA lagi contoh peranti biometrik yang telah anda pelajari.

[2 markah](ii) State the need of authentication.

Nyatakan keperluan pengesahan ketulenan. [2 markah]

Source Year Level

Bloom

KELANG 2009

Section C

1.2.3.1 List effects of controversial contents on society: i. Pornography and ii. Slander;

Section A

1. Statement below is about controversial issue. Kenyataan di bawah ini adalah tentang isu kontroversi

Fingerprint Recognition Iris Scanning

38

Page 39: learning area 1

Azman is a Muslim. One day, he received a “spam” e-mail stating that his favourite drink “Power-B” uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 50 of his friends.

Statement 2 Kenyataan 2Based on Statement 2 above, Berdasarkan Kenyataan 2 di atas,i. Azman has convicted ____________ii. List another effect of controversial content Senarakan kesan lain dari kandungan kontroversiSlander / Pornography

Source Year Level

Bloom

SABAH 2010

Question 16Soalan 16

Write TRUE or FALSE in the spaces provided in the Answer Sheet.

Tulis BENAR atau PALSU diruangan yang disediakan di kertas jawapan

16. (a) Criminal acts such as exploitation of women and children are effects of

slander.

Tindakan jenayah seperti mengekplotasikan wanita dan kanak-kanak adalah kesan dari fitnah.

(b) An employee of a big company spread rumours which were not true about his employer causing the company to lose many clients. This is an example of an effect of slander.

Seorang pekerja yang menyebaran khabar-khabar angin yang tidak benar mengenai majikannya telah menyebabkan syarikat kehilangan banyak pelanggan. Ini adalah contoh kesan daripada fitnah.

Source Year

Level

Bloom

PAHANG 2008

2. Which of these is an impact of slander towards society?Yang manakah kesan fitnah terhadap masyarakat?A. Closer relationship.

Hubungan lebih rapat.B. Trust among people.

Kepercayaan di antara manusia.C. Higher moral behaviour.

Perlakuan moral lebih tinggi.D. Bad reputation of people

39

Page 40: learning area 1

Reputasi buruk pada seseorang.

4.

Figure 4 Rajah 4

The situation in the Figure 4 can give negative impact to society.What is the computer crime committed?

Situasi dalam Rajah 4, boleh memberikan kesan negatif kepada masyarakat. Apakah bentuk jenayah komputer yang dilakukan?

A. Pornography Pornografi

B. Hacking Menggodam

C. Slander Fitnah

D. Fraud Penipuan.

Source Year Level

Bloom

UNKNOWN

2009

3. Mei Ling has just posted an article on “Famous artist Kasey Tan is a drug addict and child abuser” to her Facebook. She purposely wants to damage the reputation of this artist. Mei Ling’s action is called ____________.

Source Year Level

Bloom

PCGHS 2009

2 . Suhana spreads a rumor that a Minister is receiving bribes. Suhana’s conduct is calledSuhana menyebarkan khabar angin bahawa seorang Menteri menerima rasuah. Perbuatan Suhana dikenali sebagai

A Hijacker PerampasB Slander FitnahC Cracker Memecah kata laluanD Hacker Penggodam

Source Year Lev Bloom40

Amran had written an e-mail about his fellow friend stealing books from the library, which is not true. Amran then sent the e-mail to five other friends.

Amran telah menulis satu e-mail tentang rakannya yang telah mencuri buku di perpustakaan awam, walhal ianya tidak benar. Amran kemudiannya telah menghantar e-mail tersebut kepada lima orang rakannya yang lain.

Page 41: learning area 1

elPAHAN

G2009

Section B

26.Ahmad has received an e-mail stating that his favourite soda drink “Soda Moda” uses foodcolouring that is not advisable by The Ministry of Health. He does not know the truth of thee-mail but he has forwarded the e-mail to 50 of his friends. Soda Moda label also has beenmanipulated into a picture that tends to exploit women in a distasteful manner.

Ahmad telah menerima e-mail yang menyatakan minuman kegemarannya “Soda Moda”menggunakan pewarna yang tidak dibenarkan oleh Kementerian Kesihatan. Dia tidak dapatmemastikan kebenaran kandungan e-mail itu tetapi telah menghantar e-mail itu kepada 50orang rakannya. Label “Soda Moda” telah dimanipulasi kepada gambar yang cenderunguntuk mempergunakan wanita dengan cara yang tidak sopan.

Figure 3 Rajah 3

Based on Figure 3, answer the following question:Berdasarkan Rajah 3, jawab soalan-soalan berikut:

a) List TWO controversial contents that stated in Figure 3.Senaraikan DUA kandungan kontroversi yang dinyatakan dalam Rajah 3.

[2 marks]

b) State ONE impact of controversial content in society from 3(a).Nyatakan SATU kesan kandungan kontroversi dalam masyarakat dari 3(a).

[1 mark]c) Give ONE way to prevent the problem in 3(a) above.

Berikan SATU cara untuk menghalang masalah dalam 3(a) di atas.[1 mark]

Source Year Level

Bloom

JOHOR 2008

Section C

1.2.3.2 Describe the process of filtering to control access to controversial contents.

Section A

1. Figure 2 shows part of a algorithm for a web page filter.Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.

Figure 2 / Rajah 2State the filtering method used in the algorithm.Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.

41

Page 42: learning area 1

Site blockingSource Year Lev

elBloom

PAHANG

2010

3. Keyword blocking is a process that filters all traffic between a protected network

or “inside” network and a less trustworthy or “outside” network.

A. True B. False

Source Year Level

Bloom

PERLIS 2008

3. Below are the examples on how to control the access to controversial content:

Di bawah adalah contoh bagaimana untuk mengawal capaian kepada kandungan yang kontroversi.

I. Install antivirus Menginstall antivirusII. Referred to by URLs Merujuk kepada URLsIII. Use filtering software Menggunakan tapisan perisian IV. Rate the content of websites Mengkadarkan kandungan laman web.

A. I and IIB. I, II and IVC. II, III and IVD. All at the above.

Source Year

Level

Bloom

GOMBAK 2008

3. Figure 2 shows the flowchart of internet filtering method.Rajah 2 menunjukkan carta alir mengenai kaedah penapisan internet.

Keyword in banned word list?

Users key in the keyword

Browser shuts down

Page starts downloading

True

False

Keyword in banned word list?

42

Page 43: learning area 1

Figure 2 Rajah 2 Name the method.

Namakan kaedah tersebut.

Source Year Level

Bloom

KELANG 2009

2. Internet filtering uses both site blocking and __________ which could catch the sites that are not on the blocked list.Penapisan Internet boleh menggunakan kedua-dua penghalang laman dan__________ yang boleh mengesan laman-laman yang tiada dalam senarai yang terhalang.

Source Year Level

Bloom

KELANTAN

2009

3. State whether the following statement is True or False.

Nyatakan sama ada pernyataan berikut Benar atau Palsu.

Web filtering software is a program that restricts access to specified Web sites.

Perisian penapisan Web ialah sebuah program yang menghadkan capaian bagi

sesetengah laman Web.

Source Year Level

Bloom

PERLIS 2009

3. Figure 2 shows methods of Internet Filtering.Rajah 2 menunjukkan kaedah Penapisan Internet.

Figure 2Rajah 2

X is ____________________________________X adalah ________________________________

Source Year Level

Bloom

SPM 2007

2. Figure 2 shows part of an algorithm for a web page filter.Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.

Internet FilteringPenapisan Internet

Keyword BlockingHalangan Kata Kunci

X Web Rating SystemSistem Perkadaran Webb

43

Page 44: learning area 1

Figure 2 Rajah 2

State the filtering method used in the algorithm. Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.

Source Year Level

Bloom

SPM 2009

Section B

26 Johnson’s father found out recently that Johnson has been accessing controversial contents online in his room.

(a) State two possible effects of Johnson’s activities on himself. [2 marks]

(b) Explain one way Johnson’s father can control Johnson’s access to those contents.

[2 marks]Source Year Level Bloom

SARAWAK (A)

2008

26. Figure 7 is an excerpt from an online newspaper.

Rajah 7 menunjukkan petikan daripada akhbar atas talian

44

The Malaysian Coalition for the Prevention of Child Sexual Abuse (MCPSA) produce statistic that 1.5 millions pornographic website occur in the Internet. Recently former Prime Minister, Tun Dr Mahathir Mohamad suggested to produce a software that can filter pornographic materials in the Internet in this country

(modified from Utusan article online25 Oktober 2005)

Badan Bertindak Kesedaran Penderaan Seksual Kanak-Kanak (MCPSA) mengeluarkan statistik bahawa 1.5 juta laman web pornografi terdapat dalam Internet.Baru-baru ini pula bekas Perdana Menteri, Tun Dr. Mahathir Mohamad mengesyorkan supaya diadakan perisian untuk menyaring bahan-bahan pornografi dalam Internet di negara ini.

( diubahsuai dari rencana Utusan online 25 Oktober 2005)

Page 45: learning area 1

Figure 7 Rajah 7

Based on the excerpt on Figure 7:

Berdasarkan petikan dalam rajah 7:

(a) Referring to the statistic by MCPSA on the increasing pornographic website, state two effect on the society

Merujuk kepada statistik yang dikeluarkan oleh MCPSA berkenaan pertambahan laman web pornografi, nyatakan dua kesan kepada masyarakat.

(b) You have been requested to implement the proposals which are recommended by Tun Dr Mahathir to produce the software in order to filter pornographic materials. Explain one suitable process of filtering.

Anda diminta membantu untuk menjayakan cadangan yang disyorkan oleh Tun Dr. Mahathir supaya diadakan perisian untuk menyaring bahan-bahan ponorgrafi. Terangkan satu proses penapisan yang sesuai.

Source Year Level

Bloom

KELANTAN

2009

Section C

1. Aris is a form 4 student. His mother, Puan Asiah just bought him a personal computer. She has set amethod to filter the content in the Internet, Whenever Aris types a URL with the words such as “sex”or “porno”, he could not access the website.Aris seorang pelajar tingkatan 4. Ibunya, Puan Asiah telah membelikan sebuah komputer peribadi. Diatelah menetapkan kaedah untuk menapis bahan-bahan dalam Internet. Apabila Aris menaip alamatlaman sesawang yang mengandungi perkataan seperti “seks” atau “porno”, dia tidak boleh mengakseslaman sesawang tersebut.

Based on the situation above,Berdasarkan situasi di atas,(a) (i) Name the method that Puan Asiah uses to control the website access.

Namakan kaedah yang digunakan oleh Puan Asiah untuk menapis capaianlaman sesawang.

(ii) State the impact to Aris, if Puan Asiah did not control the website accessNyatakan kesan kepada Aris jika capaian laman sesawang tidak dikawaloleh Puan Aishah.

(b) Name two methods that can be used to limit the Internet access other than the one stated in (a) (i).Namakan dua kaedah yang boleh digunakan untuk menapis capaianInternet, selain dari yang dinyatakan pada (a)(i).

(a) (i) Keyword BlockingHalangan Kata Kunci / Tapisan Kata Kunci

(ii) Can lead to criminal act such as exploitation towards women/childrenBoleh menjurus kepada salahlaku jenayah seperti eksploitasi kaum wanita dan kanak-kanakOR

45

Page 46: learning area 1

ATAU- Can lead to sexual addiction- Boleh menjurus kepada ketagihan seksORATAU- Can develop low moral values/immorality- Boleh menjurus kepada keruntuhan akhlak/moralOR Any Other Relevant Answer.ATAU Mana-mana jawapan Yang Relevan

(b) (i) Site Blocking Halangan Tapak/Laman Web/Sesawang(ii) Web Rating System Sistem Penarafan Laman Web/Sesawang

Source Year Level

Bloom

JOHOR 2010

1.2.4.1 Explain the need for Cyber Law.

Section A

In the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet. So we need to protect the Internet and other online communication technologies.Beberapa tahun kebelakangan, banyak pertikaian dan isu dibangkitkan tentang keselamatan dan integriti maklumat, status perundangan bagi transaksi atas talian, kebersendirian dan kerahsiaan maklumat, hak harta intelek dan keselamatan data kerajaan di Internet. Jadi, kita perlu melindungi Internet dan teknologi atas talian yang lain.

1. This statement above refer to Kenyataan di atas ini merujuk kepadaA. Cyber Law

Undang-undang SiberB. Code of Ethics

Kod EtikaC. Computer Crime

Jenayah KomputerD. Computer Ethics

Etika KomputerA

Source Year Level

Bloom

MELAKA

2010

3. Figure 3 shows the Malaysian Cyber Law

Rajah 3 menunjukkan Undang-undang cyber di Malaysia

46

A. Copyright Act 1987

Akta Hak Cipta 1987

B. Communications and Multimedia Act 1998

Akta Multimedia dan Komunikasi 1998

C. Digital Signature Act 1997

Akta Tandatangan Digital 1997

D. Computer Crimes Act 1997

Akta Jenayah Komputer 1997

E. Telemedicine Act 1997

Akta Teleperubatan 1997

Page 47: learning area 1

Fill in the blank with the correct statement in Figure 3 .

Isikan tempat kosong dengan pernyataan yang betul dalam Rajah 3.

(i) ……………… secures electronic communications especially on the Internet.

…………………melindungi komunikasi elektronik terutamanya internet.

(ii) ………………gives protection against the misuses of computers and computer criminal activities such as unauthorized use of programmes, illegal transmission of data or messages over computers and hacking and cracking of computer systems and networks.

……………… memberi perlindungan dalam mencegah penyalahgunaan komputer dan aktiviti jenayah komputer seperti penggunaan program-program yang tidak dibenarkan, penghantaran mesej dan data yang tidak sah melalui komputer dan menceroboh sistem komputer dan rangkaian.

(iii) ……………………….. ensures that only qualified medical practitioners can practise telemedicine and that their patient's rights and interests are protected.

………………………..memastikan hanya pengamal perubatan yang layak sahaja boleh mengendalikan teleperubatan dan hak-hak pesakit dilindungi.

(iv) The implementation of …………………………. ensures that information is secure, the network is reliable and the service is affordable all over Malaysia.

Pelaksanaan…………………………………..memastikan maklumat adalah selamat, rangkaian boleh dipercayai dan perkhidmatan yang mampu digunakan oleh semua rakyat Malaysia.

Source Year Level

Bloom

UNKNOWN

2009

Section B

Section C

1. The following is a text on computer crime in a Television station broadcasting.

Berikut adalah teks mengenai jenayah computer di sebuah stesen siaran Telivision.

47

Figure 3 Rajah 3

Page 48: learning area 1

Aizat bertugas sebagai seorang penyunting di sebuah syarikat penerbitan rancangan television swasta.. Beliau menggunakan kepakarannya dalam bidang ICT untuk membuat suntingan terhadap rancangan-rancangan telivision tersebut bagi menjaga kualitinya sebelum disiarkan oleh stesen-stesen television. Tanpa kebenaran pihak syarikat tersebut Aizat telah membuat rakam salin terhadap rancangan television terbitan tersebut serta menjualnya di internet.Aizat works as an editor in a private television broadcasting. He uses his expertise in ICT for editing the television programs in order to preserve the quality before they were broadcast by the television station. Without company’s permission Aizat has made copies of the television programs and sell them via Internet.

Based on the text: / Berdasarkan teks itu:Explain the importance of Cyber Law to the editing company.

Terangkan kepentingan Undang-undang Siber untuk Syarikat penerbitan tersebut.

Explain important cyber law to company One important cyber law to company – 2 marks

Copyright for material

Source Year Level

Bloom

KELANTAN

2010

1.2.4.2 Explain briefly the computer crimes below: i. Fraud, ii. Copyright Infringement, iii. Theft and iv. Attacks

Section A

1. Sazali has copied a copyrighted article from the Internet to use in his assignment. However, heignores the author’s name in his assignment. Sazali is __________.Sazali telah menyalin satu artikel dari internet untuk digunakan sebagai bahan kerja kursus.Walaubagaimanapun, beliau tidak meletakkan nama pengarang tersebut dalam kerjakursusnya. Sazali telah___________.A. committing a blue collar crime.

melakukan jenayah kolar biru.B. taking advantage of the Internet facilities.

mengambil kesempatan terhadap kemudahan internet.C. violating the rights secured by a copyright

melanggar peraturan hak cipta.D denying the owner’s rightful possession of the article

menafikan hak pengarang yang memiliki artikel tersebut.C

Source Year Level

Bloom

PERLIS 2010

2. Based on the situation above, write A, B, C or D to show the type of computer crime is being described.Berdasarkan situasi di atas, tulis A, B, C atau D untuk menunjukkan jenis jenayah komputer yang diterangkan

di bawah.

48

Page 49: learning area 1

Duplicating and distributing copies of audio tapes and computer programs without permission and authorization from the individual or company that created the program is illegal.

Membuat salinan dan mengagihkan salinan-salinan audio, program-program komputer tanpa kebenaran individu atau syarikat adalah aktiviti haram.

A. Computer theft / Pencuri computer

B. Computer fraud / Penipuan computer

C. Computer attack / Serangan computer

D. Copyright infringement / Pelanggaran hak cipta

D. Copyright InfringementSource Year Lev

elBloom

PUTRAJAYA 2010

3. Choose the correct answer from the box.Pilih jawapan yang tepat dari kotak di bawah.

A ______ is defined as any criminal activities that are related to use of computers._______ didefinisikan sebagai aktiviti jenayah yang dilakukan dengan menggunakan komputer.COMPUTER CRIME

Source Year Level

Bloom

PERLIS 2010

4. Table 2 shows the activities of computer crime. Jadual 2 menunjukkan aktiviti jenayah komputer

P Computer AttackSerangan Komputer

Q Computer TheftKecurian Komputer

R Copyright InfringementPencabulan Hakcipta

S Computer FraudPenipuan Komputer

Table 2Jadual 2

Based on Table 2, write P, Q, R or S for the following statement:Berdasarkan Jadual 2, tuliskan P, Q, R atau S bagi pernyataan berikut:

i. Nazre transfer his company profit to his own account.Nazre memindahkan keuntungan syarikat ke dalam akaun peribadinya

ii. Kamal downloaded an assignment from the internet and claimed it is his.Kamal memuat turun tugasan dari internet dan mendakwa kepunyaanyaCOMPUTER THEFTCOPYRIGHT INFRINGEMENT

49

Page 50: learning area 1

Source Year Level

Bloom

PERLIS 2010

5. Which of the following activity NOT a computer crime?Mana di antara aktiviti berikut BUKAN satu jenayah komputer?A Sam made a few copies of the original CD that he bought and sell to his friends at cheaper price.

Sam membuat beberapa salinan CD asal yang dia beli dan menjual salinan tersebut kepada rakannyadengan harga yang lebih murah.

B Ahmad, a bank manager transferred the customers’ payments to his own account.Ahmad, seorang pengurus bank memindahkan bayaran yang dibuat oleh pelanggan ke akaun peribadinya.

C Zaki plagiarising the material from internet for his class assignment.Zaki menciplak bahan yang diperolehi dari internet untuk tugasannya.

D Din discovered a computer virus and sent the virus to his friends via email.Din menemui satu virus komputer dan menyebarkan virus itu melalui emel kepada rakan-rakannya.

CSource Year Lev

elBloom

PERLIS 2010

4. Daniel sets up a web page with the purpose of allowing someone else's music, videos, or software to be distributed and downloaded without the owner's permission. His action is considered as _____________________.

Daniel membina laman web yang membenarkan muzik, video, atau perisian seseorang disebarkan dan dimuat turun tanpa kebenaran pemiliknya. Tindakan beliau dikatakan sebagai ______________.

Source Year

Level

Bloom

GOMBAK 2008

2. Based on the statements below.

The activities above are categorized asA. computer theft

B. computer fraud

C. computer attacks

D. copyright infringement

Source Year

Level

Bloom

PETALING PERDANA 2008

01 Which of the following is NOT the example of computer fraud?

Manakah antara berikut BUKAN contoh penipuan computer?

A. E-mail hoaxes

E-mel palsu

50

Act of stealing computer equipment Act of stealing or illegally copying

software

Page 51: learning area 1

B. Investment Schemes by Internet

Skim Pelaburan melalui Internet

C. Programmed Fraud

Program Palsu

D. Diverts goods to the wrong destinations

Menghantar barangan ke destinasi lain.

Source Year Level BloomKL 2008

1. Which of the following are the examples of computer crimes?

A. Fraud, theft and chatting.B. Fraud, theft and computer attack.C. Fraud, theft, auction and computer attack.D. Fraud, theft, chatting and computer attack.

Source Year Level

Bloom

JOHOR 2008

4. Which of the following is NOT the example of computer fraud?

Manakah antara berikut BUKAN contoh penipuan computer?

A. E-mail hoaxes E-mel palsu

B. Investment Schemes by Internet Skim Pelaburan melalui Internet

C. Programmed Fraud Program Palsu

D. Diverts goods to the wrong destinations Menghantar barangan ke destinasi lain.

Source Year Level

Bloom

UNKNOWN

2009

24 Table 7 shows types of computer crimes.Jadual 7 menunjukkan jenis jenayah computer.

A Computer AttackB Computer FraudC Computer Theft

Table 7 Jadual 7

Based on Table 7, select A, B or C to categorise the following activities:Berdasarkan Jadual 7, pilih A, B atau C bagi kategori aktiviti berikut.

(i) David who has no qualification claims he is a skin specialist and prescribes the medicine through his website.David yang tidak mepunyai kelayakan mengaku dia adalah pakar kulit dan mengesahkan senarai ubat-ubatan melalui laman webnya.

(ii) Philip taps into the data transmission of a courier company and diverts the goods to the wrong destination.

51

Page 52: learning area 1

Philip memasuki saluran penghantaran data syarikat kiriman ekpress dan mengubahala barang ke destinasi lain.

Source Year Level

Bloom

JOHOR 2009

3. The statement in figure 2 refers to computer crimes.Pernyataan di rajah 2 merujuk kepada jenayah computer.

Downloading movie without authorisation.Memuat turun filem tanpa kebenaran

Figure 2 Rajah 2

The activities above are categorized underAktiviti di atas dikategorikan sebagaiA. Computer theft Pencurian komputerB. Computer attack Serangan computerC. Computer fraud Penipuan computerD. Copyright infringement Pelanggaran hakcipta

Source Year Level

Bloom

JOHOR 2009

3. Table 1 shows several terms of computer crime. Match the statements with the given answers. Jadual 1 menunjukkan beberapa terminologi dalam jenayah komputer. Padankan pernyataan dengan jawapan yang diberi.

Table 1 Jadual 1

Source Year Level

Bloom

PUTRAJAYA 2009

Section B

52

Computer CrimeJenayah Komputer

A

Copyright InfringementPelanggaran Hak Cipta

B

Any activities taken to disrupt the equipment of computer systems Sebarang aktiviti yang diambil untuk mengganggu peralatan sistem komputer.

i.

Any criminal activity that is related to the use of computers.Sebarang aktiviti jenayah yang berkaitan dengan penggunaan komputer.

ii.

Unauthorised use of another person’s property. Penggunaan tanpa kebenaran ke atas milikan orang lain

iii.

Computer AttackPencerobohan Komputer

C

Computer TheftPencurian Komputer

D

Page 53: learning area 1

David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3 songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the software. One day, he finds that his computer is getting slow and keeps on duplicating files.David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering memuat turun perisian hakcipta dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. David menggunakan kepakarannya dalam bidang ICT untuk mendapatkan nombor siri yang tidak sah untuk mengaktifkan perisian yang telah dimuat turun. Pada suatu hari komputer David menjadi perlahan dan sering membuat salinan fail tertentu secara berulang.

1. Based on the situation below, answer the following questions.

Name the type of computer crime that David has committed.

Namakan jenis jenayah komputer yang dilakukan oleh David.______________________________________________________

Copyright InfringementSource Year Lev

elBloom

MELAKA

2010

Section C

31. Statement 2 refers to misconduct activities.Pernyataan 2 merujuk kepada aktiviti salahlaku.

Statement 2 Pernyataan 2

Based on the above statement:Berdasarkan pernyataan itu:

(a) Explain briefly about the computer crime stated in the above situation. Terangkan secara ringkas jenayah komputer yang dinyatakan di dalam situasi di atas.

(b) Explain two reasons why we need to have cyber law in computing. Jelaskan dua sebab mengapa undang-undang siber perlu dalam dunia pengkomputeran.

Source Year Level

Bloom

PERAK 2009

1.3.1.1 Define computer security.

53

Kadri likes to watch movie. He prefers to download the movies rather than buy original CDs as his collection. Sometimes, he copies the movies into CDs and sells them to his friends.

Kadri suka menonton filem. Dia lebih suka memuat turun filem dari membeli filem yang asli untuk koleksi peribadi. Kadang kala dia menyalin filem tersebut ke dalam CD dan menjual CD tersebut kepada rakan-rakannya.

Page 54: learning area 1

Section A

3. Fill in the blank with the correct answer.Isikan tempat kosong dengan jawapan yang betul.

i. Ethics is used to produce ethical computer users while _____ must be follow to prevent the miss use of computers.Etika digunakan untuk melahirkan pengguna komputer yang beretika manakala ________wajiblah dipatuhi untuk mencegah penyalahgunaan komputer.

ii. ______________ means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. ____________ bermaksud melindungi sistem komputer dan maklumat yang terkandung dalam sistem daripada penceroboh yang tidak diundang, kerosakan atau pengubahsuaian yang tidak diingini.

Source Year

Level

Bloom

PERAK 2008

Section B

Section C

1.3.2.1 Explain briefly the different threats to computer security: i. Malicious code, ii. Hacking, iii. Natural disaster and iv. Theft

Section A

1. Table 3 shows statements about a program. Jadual 3 menunjukkan pernyataan mengenai satu program.

Table 3 / Jadual 3 Based on table 3 , name H. Berdasarkan jadual 3 , namakan H A. Virus

B. Spyware C. Kid Program D. Operating System

SPYWARESource Year Lev

elBloom

SELANGOR 2010

2. Write the words that would complete the following statement: Tulis perkataan yang dapat melengkapkan pernyataan berikut :

…………………………….. is a program placed on a computer without the user’s knowledge that secretly collects information about user. …………………………….. adalah program yang dipasang di dalam komputer tanpa

54

H is a program placed in the computer system without the user knowledge, and it secretly collects information from the computer system about user.H merupakan satu pogram yang berada dalam komputer tanpa pengetahuan pengguna dan mengumpul maklumat pengguna tanpa disedari.

Page 55: learning area 1

pengetahuan pengguna yang mengumpul maklumat rahsia mengenai pengguna. Spyware

Source Year Level

Bloom

PERAK 2010

3. Below are the examples on how the computer technology threatens the privacy of our data.Berikut merupakan contoh-contoh bagaimana teknologi komputer mengancam kerahsiaan data.I Spyware II Cookies III Phishing IV FirewallA I, II and IIIB I, II and IVC I, III and IVD II, III and IVA

Source Year Level

Bloom

PERLIS 2010

1. Table 1 shows several terms of computer crime.Jadual 1 menunjukkan beberapa terminologi dalam jenayah komputer.

A Trojan horseB WormC Trapdoor

Table 1 / Jadual 1

Based on Table 1, write A, B or C to match the following statements:Berdasarkan Jadual 1, tulis A, B atau C untuk memadankan pernyataan berikut:(i) A program that copies and spreads itself through a network.

Program yang menyalin dan menyebarkan dirinya melalui rangkaian.(ii) A program that allows someone to access the program and use it with special privileges.

Program yang membenarkan seseorang mengakses sesuatu program dan menggunakannya.B / C

Source Year Level

Bloom

KEDAH 2010

1. Match the statements (a) and (b) with the terminologies in Table 2.

Padankan kenyataan (a) dan (b) dengan istilah dalam Jadual 2.

Table 2Jadual 2

a) Agent X broke into Defense Department computer Room of USA Government and download certain data to sell to the Russian secret agents.Agen X telah menceroboh masuk ke bilik komputer Jabatan Pertahanan Amerika Syarikat dan memuat turun

data untuk dijual kepada Agen Rahsia Rusia.

Malicious codeTheftFraud

55

Page 56: learning area 1

b) A student from China created a program and spread it through the Internet to attack the United States Department of Defense computer system. Seorang pelajar dari Negara China telah mencipta satu program dan menyebarkannya melalui internet untuk menyerang sistem komputer Jabatan Pertahanan Amerika Syarikat.

Source Year Level

Bloom

KELANTAN

2010

15. Table 1 shows different types of computer threats.

Computer threat Description

P Unauthorized access into a computer system.

R A program that attaches itself to another program and can destroy or co-exists with the program.

Table 1Name the computer threats:i. Pii. R

Source Year

Level

Bloom

KEDAH 2008

19. Table 3 shows types of computer threats.Jadual 3 menunjukkan jenis-jenis ancaman komputer..

ATaking another person's property without permission.Mengambil harta orang lain tanpa kebenaran.

B

Any code in any part of a software or script that is intended to cause undesired effects, security breaches or damage to a system. Sebarang kod dalam perisian atau skrip yang bertujuan untuk menyebabkan kesan luar jangka, pencerobohan sekuriti atau kerosakan pada sistem.

Table 3 Jadual 3State A and B Nyatakan A dan B(i) A : (ii) B :

Source Year Level

Bloom

UNKNOWN

2008

1. A computer infected by virus, worm, or Trojan Horse may have any of the following symptoms except ___________.

56

Page 57: learning area 1

Berikut adalah beberapa tanda yang menyebabkan sebuah komputer dijangkiti oleh virus, worm, atau Trojan Horse kecuali _________________.A. available memory is more than expected.

kandungan memori yang lebih.B. system properties change.

“system properties” bertukar.C. existing programs and files disappear.

kehilangan fail-fail atau program-program yang sedia ada.D. files become corrupted.

berlaku kerosakan fail.

Source Year Level

Bloom

UNKNOWN

2008

2. “Quarantine is a separate area of the hard disk that holdsthe infected file until the infection can be removed.”

The statement above refers to

A. FirewallsB. Anti-virusC. Time bombD. Malicious code

4 Statement 1 describes a type of security threat.

It is typically carried out by e-mail or instant messaging. It is an example of social engineering techniques used to fool users. It often directs users to enter details at a fake website whose look and feel are

almost identical to the legitimate one.

Statement 1

Based on statement 1, identify the threat.

A. HackingB. PhishingC. SpywareD. Malicious code

Source Year Level BloomSARAWAK (A) 2009

1. Which are the following malicious codes can copy and spread themselves through a network ?Di antara yang berikut, yang manakah boleh menyalin dan meyebarkan dirinya melalui rangkaian?

A Trojan horse Trojan horseB Logic bomb Bom logicC Trapdoor TrapdoorD Worm Cecacing

57

Page 58: learning area 1

Source Year Level

Bloom

PAHANG

2009

Section B

1. Following is the definition for a type of computer crimesBerikut adalah definisi untuk jenis kejahatan komputer

Unauthorized use of another person’s property with the intention to deny the owner the rightful possession of that property penggunaan yang tidak dibenarkan harta orang lain dengan maksud untuk menolak pemilik sah pemilikan harta itu.

a) Based on the definition above, give two (2) examples of the activity that reflects the statementabove.Berdasarkan definisi di atas, berikan dua (2) contoh aktiviti yang mencerminkan kenyataan di atas.

b) Hacking is a source of threat in computer security Hacking adalah sumber ancaman dalam keselamatan komputer

(i) Briefly define hacking / secara singkat definisikan hacking (ii) Give an example activity in hacking / Berikan contoh aktiviti dalam hackinga) example: - transfer of payment to the wrong accounts

- tap into data transmission lines on database at no cost- divert goods to the wrong destination- or other suitable answer that means other people’s property to his own illegally

b) refer to notesSource Year Lev

elBloom

SABAH 2010

2. Based on the situation below, answer the following questions.

David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3 songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the software. One day, he finds that his computer is getting slow and keeps on duplicating files.David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering memuat turun perisian hakcipta dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. David menggunakan kepakarannya dalam bidang ICT untuk mendapatkan nombor siri yang tidak sah untuk mengaktifkan perisian yang telah dimuat turun. Pada suatu hari komputer David menjadi perlahan dan sering membuat salinan fail tertentu secara berulang.

What has happened to David’s computer?

Apakah yang telah terjadi kepada komputer David?___________________________________________________________

computer virus / worm attack

Source Year Level

Bloom

MELAKA

2010

58

Page 59: learning area 1

Section C

2. Figure 20 shows symptoms of a computer problemRajah 20 menunjukkan simptom pada sebuah komputer.

.

Figure 20 / Rajah 20

- screen displays unusual messages / skrin rnemaparkan mesej pelik- files become corrupted / fail menjadi rosak.- files mysteriously appear / muncul fail yang menjadi tanda tanya

Based on Figure 20: / Berdasarkan Rajah 20:(a) Identify the type of computer threat which matches the symptoms.

Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.Trojan horseState two different examples of the threat. / Nyatakan dua contoh berlainan bagi ancaman itu.

] worm / virus(b) Describe two reasons why the computer may have been affected by the threat in (a).

Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).No antivirus / not update antivirus / visit risky website / etcSuggest two ways to prevent it.Cadangkan dua cara untuk mengatasinya.1. Back up your important files. At this point it is a good idea to take the time to back up your files. If possible, compile all of Your photos, documents, Internet favorites, etc., and burn them onto a CD or DVD or save them to some other external storage device. It is vital to note that these files cannot be trusted, since they are still potentially infected. (Actually, it’s good practice to back up your files on a regular basis so that if they do get infected, you might have an uninfected set you can restore.)2. Scan your machine. Since your computer (including its operating system) may be infected with a malicious program, it is safest to scan the machine from a live CD (or “rescue” CD) rather than a previously installed antivirus program. Many antivirus products provide this functionality. Another alternative is to use a web-based vir us removal service, which some antivirus software vendors offer (try searching on “online virus scan”). Or you could just try Microsoft’s web-based PC Protection Scan. The next best action is to install an antivirus program from an uncontaminated source such as a CD-ROM. If you don’t have one, there are many to choose from, but all of them should provide the tools you need.

Source Year Level

Bloom

SPM 2010

1. The following is a text on computer crime in a Television station broadcasting.

Berikut adalah teks mengenai jenayah computer di sebuah stesen siaran Telivision.

59

Page 60: learning area 1

Aizat bertugas sebagai seorang penyunting di sebuah syarikat penerbitan rancangan television swasta.. Beliau menggunakan kepakarannya dalam bidang ICT untuk membuat suntingan terhadap rancangan-rancangan telivision tersebut bagi menjaga kualitinya sebelum disiarkan oleh stesen-stesen television. Tanpa kebenaran pihak syarikat tersebut Aizat telah membuat rakam salin terhadap rancangan television terbitan tersebut serta menjualnya di internet.Aizat works as an editor in a private television broadcasting. He uses his expertise in ICT for editing the television programs in order to preserve the quality before they were broadcast by the television station. Without company’s permission Aizat has made copies of the television programs and sell them via Internet.

Based on the text: /Berdasarkan teks itu:

State the computer crime that has been done by Aizat.

Nyatakan jenaya komputer yang telah dilakukan oleh Aizat.

Source Year Level

Bloom

PERLIS 2010

31. Ahmad’s School bought Antivirus software to enhance proficiency in computer security. That software is used for all computer related activities. Ahmad needs to ensure effective usage of that software. Figure 14 shows several activities by Ahmad.Sekolah Ahmad membeli perisian Antivirus bagi meningkat tahap keselamatan komputer di sekolahnya. Perisian tersebut telah digunakan untuk sebarang aktiviti yang melibatkan penggunaan komputer. Ahmad telah ditugaskan untuk memastikan penggunaan perisian tersebut secara berkesan. Rajah 14 menunjukkan sebahagian aktiviti yang dibuat oleh beliau.

FIGURE 14RAJAH 14

(a) What are the activities carried out by Ahmad?[3 marks]

Apakah aktiviti-aktiviti telah dilakukan oleh Ahmad ?[3 markah]

(b) Explain TWO impacts of the threats in Figure 14.[4 marks]

Terangkan DUA kesan ancaman yang telah disebut dalam Rajah 14.[4 markah]

Source Year Level

Bloom

UNKNOW60

Virus Found !! Brontok… Work.32 Trojan-Spy.Win32

All Virus has been deleted

Page 61: learning area 1

N

31. While you are doing maintenance for the school’s computer, you found out that some

hardware from certain computers are missing and some computers start to display unusual

message.

Semasa anda sedang menyelenggara komputer di sekolah, didapati beberapa perkakasan

komputer telah hilang dan beberapa buah komputer menayangkan mesej yang pelik.

i. Explain 2 threats in the situation above.

Terangkan 2 ancaman-ancaman dalam situasi di atas. [4 marks]

ii. Suggest three approaches that you can apply to prevent them from reoccur.

Cadangkan tiga pendekatan yang boleh diambil untuk mengelakkan ancaman di atas dari

berlaku. [3 marks]

Source Year Level

Bloom

PERLIS 2009

32. Bank XYZ Berhad has a computer network system to run their operations between its branches in Malaysia. An unknown man was seen entering the computer control room at its headquarters in Kuala Lumpur after office hours. The following day, the system administrator found that all data in the server were removed and a few computer hardware missing. It was also reported that the bank computer network was down.

Bank XYZ Berhad mempunyai sistem rangkaian komputer untuk melaksanakan operasi antara cawangannya di Malaysia. Seorang lelaki yang tidak dikenali telah dilihat memasuki bilik kawalan komputer ibu pejabatnya di Kuala Lumpur selepas waktu pejabat. Keesokan harinya, pentadbir sistem mendapati semua data dalam komputer pelayan telah dihapuskan dan beberapa perkakasan komputer telah hilang. Rangkaian komputer bank juga dilaporkan tidak berfungsi lagi.

a) Explain one possible threat done by the unknown man. [2 marks]Terangkan satu ancaman yang mungkin dilakukan oleh lelaki yang tidak dikenali itu.

b) After an investigation, the management found that the threats come from the lack of security procedure at the computer control room.Setelah siasatan dijalankan, pihak pengurusan mendapati bahawa ancaman itu berlaku disebabkan oleh kelemahan prosedur keselamatan di bilik kawalan komputer.

Explain two actions on human aspect on security procedure that should be taken by the management to increase security at the computer control room. [4 marks]Terangkan dua tindakan prosedur keselamatan dari aspek kemanusiaan yang boleh diambil oleh pengurusan untuk meningkatkan keselamatan di bilik kawalan komputer.

Source Year Level

Bloom

SPM 2007

1.3.3.1 Select the appropriate security measures to overcome the identified computer threats

Section A

4. Why do we need to backup our data? Mengapakah kita perlu membuat salinan data?

I To ensure that our data can still be used if the original is corruptedUntuk memastikan data kita boleh digunakan jika berlaku sesuatu terhadap asal.

II To ensure our files, program or disk that can be used if the original source is lost, damage or destroyed.

61

Page 62: learning area 1

Boleh menggunakan fail, program atau cakera yang telah disalin jika sumber rosak hilang atau musnah.III To prevent our files or program from malicious software

Menghalang fail atau program daripada perisian yang tidak dikehendaki.IV To protect our files from viruses .

Menghalang fail daripada virus.A I and II B I and IIIC I, II and IIID I, II and IVA

Source Year Level

Bloom

PERLIS 2010

5. Table 1 shows security measures to overcome computer threats Jadual 1 menunjukkan langkah keselamatan untuk mengatasi ancaman komputer

XHuman aspects

Aspek kemanusiaan

YFirewall

Firewall

ZCryptography

Kriptografi

Based on Table 1, match the security measures with the following statements by writing X , Y or ZBerdasarkan Jadual 1, padankan langkah keselamatan dengan pernyataan berikut dengan menulis X , Y atau Z(i) To function in a network environment to prohibit unauthorized access to your computer via the Internet.

Berfungsi dalam rangkaian bagi menghalang capaian kepada komputer melalui Internet secara tidak sah.

(ii) As a security measure, make sure a computer room is always locked.

Sebagai langkah keselamatan, pastikan bilik komputer sentiasa berkunciY / X

Source Year Level

Bloom

KELANTAN

2010

06 Why do we need to backup our data ?Mengapakah kita perlu membuat salinan data ?

I To ensure that our data can still be used if the original is corruptedUntuk memastikan data kita boleh digunakan jika berlaku sesuatu terhadap data asal.

62

Table 1Jadual 1

Page 63: learning area 1

II To ensure our files, program or disk that can be used if the original source is lost, damaged or destroyed.Boleh menggunakan fail, program atau cakera yang telah disalin jika sumber asal rosak hilang atau musnah.

III To prevent our files or program from malicious software Menghalang fail atau program daripada perisian yang tidak dikehendaki.

IV To protect our files from viruses . Menghalang fail daripada virus.

A I and II

B I and III

C I, II and III

D I, II and IV

Source Year Level BloomKL 2008

3(a) There are different threats to computer security. The threat in Figure 2 is categorised as ………………..

3(b)

The security measure described above are measures taken to prevent ……………….

Source Year Level BloomSARAWAK

(A)2008

20. Table 4 shows three types of security procedures.Jadual 4 menunjukkan tiga jenis prosedur keselamatan.

A FirewallB Backup

63

FIGURE 2

prevent access by using locks, smartcard or password prevent portability by restricting the hardware from being

moved detect and guard all exits and record any hardware transported

Page 64: learning area 1

C CryptographyBased on Table 4, write A , B , or C to the following statements:Berdasarkan Jadual 4, tulis A , B , atau C untuk pernyataan-pernyataan berikut:

(i) A process of transforming plaintext into ciphertext then back again.Adalah proses menukarkan teks biasa kepada kod rahsia dan kembali semula kepada asal.

(ii) A piece of hardware or software which function in a network environment to prevent some communications forbidden by security policy.Perkakasan atau perisian yang berfungsi untuk menghalang komunikasi terlarang oleh polisi

keselamatan dalam persekitaran rangkaian

Source Year Level

Bloom

UNKNOWN

2008

2. Table 1 shows the security measures taken to prevent computer threat.

Jadual 1 menunjukkan langkah keselamatan dalam menangani ancaman komputer.

Table 1Jadual 1

Based on Table 1, write A, B or C as a measure to solve the following problems :

Berdasarkan Jadual 1, tulis A, B atau C sebagai satu langkah untuk menyelesaikan masalah berikut:

(i) While you are surfing the Internet, your computer displays a lot of pop-up windows and disturbs your surfing.

Sewaktu kamu melayari internet, komputer kamu memaparkan banyak tetingkap pantulan dan mengganggu kamu.

(ii) You have spent a week typing your 24 pages of assignment. You are worried that something bad might happen to the computer which can cause you to lose data.

Kamu telah menghabiskan masa selama satu minggu untuk menaip tugasan sebanyak 24 muka surat. Kamu bimbang jika sesuatu yang tidak diingini akan berlaku terhadap komputer dimana menyebabkan kamu kehilangan data

A Data Backup

Sandaran Data

B Cryptography

Kriptografi

C Anti spyware

Anti Spyware

64

Page 65: learning area 1

Source Year Level

Bloom

TERENGGANU 2009

11 Table 2 shows security measures to overcome computer threats.Jadual 2 menunjukkan langkah keselamatan untuk mengatasi ancaman

komputer.

X FirewallDinding Api

Y CryptographyKriptografi

Z Physical aspectsAspek fizikal

Table 2 Jadual 2

Based on Table 2, choose X , Y or Z for the statements given.Berdasarkan Jadual 2, pilih X, Y atau Z untuk pernyataan yang diberi.

(i) Functions in a network environment to prohibit unauthorized access to your

computer via the Internet.Berfungsi dalam rangkaian bagi menghalang capaian tanpa kebenaran kepada komputer melalui Internet.

(ii) As a security measure, make sure a computer room is always locked.Sebagai langkah keselamatan, pastikan bilik komputer sentiasa berkunci.

Source Year Level

Bloom

JOHOR 2009

7. Why do we need to backup our data?Mengapakah kita perlu membuat salinan data?

I To ensure that our data can still be used if the original is corruptedUntuk memastikan data kita boleh digunakan jika berlaku sesuatu terhadap asal.

II To ensure our files, program or disk that can be used if the original source is lost, damaged or destroyed.Boleh menggunakan fail, program atau cakera yang telah disalin jika sumber rosak hilang atau musnah.

III To prevent our files or program from malicious softwareMenghalang fail atau program daripada perisian yang tidak dikehendaki.

IV To protect our files from viruses .Menghalang fail daripada virus.

A I and IIB I and IIIC I, II and III

65

Page 66: learning area 1

D I, II and IV

Source Year Level

Bloom

PAHANG

2009

2. Below are steps for scanning viruses. Arrange the steps in sequence.

Berikut merupakan langkah-langkah untuk mengimbas virus. Susun langkah mengimbas mengikut urutan yang betul.

I. Scan the selected file Imbas fail yang telah dipilih II. Choose an antivirus program Pilih program antivirusIII. Wait until the scanning process is finished and the result is displayed Tunggu proses pengimbasan sehingga selesaiIV. Select files or folders that need to be scanned Pilih fail atau folder yang hendak diimbas

A. IV, II, I and IIIB. III, I, II and IIIC. II, IV, I and IIID. I, II, III and IV

Source Year Lev

elBloom

PUTRAJAYA 2009

3. Table 1 shows the problems which commonly occur when user uses the computer.

Jadual 1 menunjukkan masalah-masalah yang sering dihadapi oleh pengguna ketika menggunakan komputer.

PWhile you are surfing the Internet, your computer displays a lot of pop-up windows and disturbs your surfing.

Ketika anda sedang melayari Internet, komputer anda mempamerkan banyak tetingkap pantulan dan mengganggu paparan anda.

Q

You are surfing the Internet to do your school assignment. When you want to download a file, your computer does not allow it to happen.

Anda sedang melayari internet untuk melakukan tugasan sekolah anda. Apabila anda ingin memuat turun sebuah fail, komputer anda tidak membenarkan anda berbuat demikian.

Table 1 Jadual 1

Based on Table 1, state the security measures that can be taken to solve the problem:

Berdasarkan Jadual 1 , Nyatakan langkah keselamatan yang boleh diambil bagi menyelesaikan masalah tersebut:

(i) P (ii) Q

66

Page 67: learning area 1

Source Year Level

Bloom

KELANTAN

2009

1. Companies use …………………to protect network resources from outsiders and

to restrict employees’ access to sensitive data such as payroll or personnel records.

Syarikat-syarikat korporat menggunakan ........................ untuk melindungi sumber rangkaian syarikat

terutamanya data sensitif seperti pendapatan pekerja atau rekod peribadi daripada capaian oleh orang

luar dan pekerja dalaman.

A. Antivirus antivirus

B. anti – spyware anti - spyware

C. cryptography kriptografi

D. firewall firewall

Source Year Level

Bloom

PERLIS 2009

Section B

6. Figure 2 shows a type of security measure. / Rajah 2 menunjukkan satu langkah keselamatan

Figure 2 / Rajah 2Based on Figure 2, / Berdasarkan Rajah 2,(i) State the type of security measure used. / Nyatakan langkah keselamatan yang digunakan.(ii) Suggest an activity on human aspect security measure that can be carried out by an organization.Cadangkan satu aktiviti yang boleh dilaksanakan di dalam sesebuah organisasi untuk meningkatkan keselamatan dari aspek manusia.Data Backup / Sandaran Data/Salinan DataOrganisational User Self Awareness / Kesedaran Diri Pengguna Dalam Organisasi

Source Year Level

Bloom

JOHOR 2010

67

Page 68: learning area 1

5. Figure 1shows the computer security threatRajah 1 menunjukkan ancaman keselamatan komputer.

Based on Figure 1, / Berdasarkan Rajah 1, (i) State the type of computer threat. / Nyatakan jenis ancaman komputer.(ii) Identify the type of security measure that can be done to prevent the threat in (i). / Kenalpasti langkah keselamatan yang boleh dilakukan untuk mengelak ancaman di (i).Natural Disaster / Bencana alam

Human Aspect / Aspek kemanusiaan

Source Year Level

Bloom

JOHOR 2010

26 Based on Situation 1, answer the following question:Berdasarkan Situasi 1, jawab soalan-soalan berikut:

Situation 1 Situasi 1

a. List two examples of computer threat is mentioned in the situation above? Senaraikan jenis ancaman komputer yang disebutkan dalam situasi di atas.

[2 marks]

b. State two things that Haziq can do to enhance the security of his data while accessing the Internet. Nyatakan dua perkara yang boleh dilakukan oleh Haziq untuk meningkatkan lagi keselamatan data beliau semasa melayari internet. [2 marks]

Source Year

Level

Bloom

GOMBAK 20068

Haziq likes to access the internet. One day, while surfing the internet, his computer starts to run a little weird. He noticed that the modem LEDs were blinking even after he has stopped surfing. His system seemed to get slow and suddenly reboots. Haziq is sure that somebody has logged onto his computer.

Haziq gemar melayari internet. Pada suatu hari, semasa Haziq sedang melayari internet, beliau mendapati komputer beliau tidak laju seperti biasa. Beliau juga mendapati bahawa ‘LED’ pada modem berkelip walaupun beliau tidak lagi melayari internet. Komputer beliau juga ‘reboot’. Haziq pasti terdapat pengguna lain yang telah memasuki sistem komputernya.

Page 69: learning area 1

8

26. Statement below shows a situation. Penyataan di bawah merupakan satu situasi.

a. Explain the kind of computer threat that Mamat has created? [2 marks]Jelaskan jenis ancaman komputer yang telah dicipta oleh Mamat? [2 markah]

b. State two ways to avoid this threat from spreading into your computer? [2 marks]Nyatakan dua cara untuk mengelakkan ancaman ini merebak ke dalam komputer anda.

Source Year Level

Bloom

UNKNOWN

2009

This section consists of five questions. You are required to answer all questions.Bahagian ini mengandungi lima soalan. Anda dikehendaki menjawab semua soalan.

26. Puan Maria is the examination secretary at SMK Bunga Raya Putri Jaya. One day, she found that certain data in the school server were missing and the other had been modified.

Puan Maria adalah setiausaha peperiksaan di SMK Bunga Raya Putri Jaya. Pada suatuhari, dia mendapati data- data tertentu dari komputer pelayan sekolah telah hilang dan ada yang telah diubahsuai .

a) State TWO threats that cause the problems faced by Puan Maria.

Nyatakan DUA ancaman yang boleh menyebabkan masalah yang dihadapi oleh Puan Maria

b) State TWO security measures that Puan Maria can take to safeguard against these threats.

Nyatakan DUA langkah keselamatan yang boleh diambil oleh Puan Maria untukmelindungi dari ancaman-ancaman berikut.

Source Year Level

Bloom

KEDAH 2009

26. Based on statements below:

Berdasarkan

penyataan di

bawah:

69

Maniam writes a computer program that interacts with the operating system.

The program randomly erases files and displays weird messages. He plans to

distribute the programs via e-mail.

Maniam menulis program komputer yang dapat berinteraksi dengan sistem

pengoperasian. Program tersebut memadam fail-fail dan memaparkan mesej-

mesej yang aneh secara rawak. Dia merancang untuk menyebarkan program

tersebut melalui mel elektronik.

Mamat writes a computer program that interacts with the operating system. The program randomly erases files and displays weird messages. He plans to distribute the programs via e-mail.

Mamat menulis program komputer yang dapat berinteraksi dengan sistem pengoperasian. Program tersebut memadam fail-fail dan memaparkan mesej-mesej yang aneh secara rawak. Dia merancang untuk menyebarkan program tersebut melalui mel elektronik.

Page 70: learning area 1

Statement 2 Pernyataan 2

a) Explain the kind of computer threat that Maniam has created? [2 marks]

Jelaskan jenis ancaman komputer yang telah dicipta oleh Maniam? [2 markah]

b) State two ways to avoid this threat from spreading into your computer? [2 marks]

Nyatakan dua cara untuk mengelakkan ancaman ini merebak ke dalam

komputer anda. [2 markah]

Source Year Level BloomHULU LANGAT 2009

26.

Based on situation above; Berdasarkan situasi di atas;

(i) What do you think is the cause of this problem and determines the appropriate measures to overcome this threat

Pada fikiran anda apakah penyebab kepada masalah ini dan kenalpasti kaedah yang sesuai untuk mengatasi ancaman ini. [2 marks]

(ii) What do you think is the cause of this problem and determines the appropriate measures to overcome the threat on Situation 2.

Pada fikiran anda apakah penyebab kepada masalah ini dan kenalpasti kaedah yang sesuai untuk mengatasi ancaman dalam Situasi 2.

70

Situation 1

Your computer displays strange behavior. For instance, you discover that “assignment.doc” has suddenly been renamed to “assignment.exe”.

Komputer anda menunjukkan paparan yang pelik. Sebagai contoh, anda mendapati fail ”assignment.doc” tiba-tiba telah ditukar nama kepada ”assignment.exe”.

Situation 2

Laila has to send a document file containing confidential information by e-mail to her manager. One day, she found that the file had been accessed by an unauthorized user.

Laila perlu menghantar satu fail dokumen yang mengandungi maklumat sulit kepada pengurusnya melalui e-mel. Satu hari, dia mendapati fail tersebut telah dibuka oleh pengguna yang tidak dibenarkan.

Page 71: learning area 1

[2 marks]Source Year Lev

elBloom

PUTRAJAYA 2009

Section C

32. Bank XYZ Berhad has a computer network system to run their operations between its branches in Malaysia. An unknown man was seen entering the computer control room at its headquarters in Kuala Lumpur after office hours. The following day, the system administrator found that all data in the server were removed and a few computer hardware missing. It was also reported that the bank computer network was down.

Bank XYZ Berhad mempunyai sistem rangkaian komputer untuk melaksanakan operasi antara cawangannya di Malaysia. Seorang lelaki yang tidak dikenali telah dilihat memasuki bilik kawalan komputer ibu pejabatnya di Kuala Lumpur selepas waktu pejabat. Keesokan harinya, pentadbir sistem mendapati semua data dalam komputer pelayan telah dihapuskan dan beberapa perkakasan komputer telah hilang. Rangkaian komputer bank juga dilaporkan tidak berfungsi lagi.

a) Explain one possible threat done by the unknown man. [2 marks]Terangkan satu ancaman yang mungkin dilakukan oleh lelaki yang tidak dikenali itu.

c) After an investigation, the management found that the threats come from the lack of security procedure at the computer control room.Setelah siasatan dijalankan, pihak pengurusan mendapati bahawa ancaman itu berlaku disebabkan oleh kelemahan prosedur keselamatan di bilik kawalan komputer.

Explain two actions on human aspect on security procedure that should be taken by the management to increase security at the computer control room. [4 marks]Terangkan dua tindakan prosedur keselamatan dari aspek kemanusiaan yang boleh diambil oleh pengurusan untuk meningkatkan keselamatan di bilik kawalan komputer.

Source Year Level

Bloom

SPM 2007

31. Figure 11 is an excerpt from a daily newspaperRajah 11 adalah petikan daripada akhbar harian.

Figure 11 Rajah 11

71

MALAYSIA NEWS.COMYOUR DAILY NEWSPAPER

24 OCT 2008RM5.00

Online TheftBank Employee Charged

Kuala Lumpur 23 Oct. A bank employee was charged in the high court yesterday for breaking into the bank computer system and electronically transferring RM1.2 million to his personal bank account. The HOT Bank employee was charged…

Kecurian Atas TalianKakitangan Bank DidakwaKuala Lumpur 23 Okt. Seorang pekerja bank telah didakwa di mahkamah tinggi semalam di atas kesalahan memecah masuk ke dalam system computer bank dengan memindahkan wang berjumlah RM1.2 juta secara elektronik untuk dimasukkan ke dalam akaun bank peribadinya. Pekerja HOT Bank itu telah didakwa…

Page 72: learning area 1

Based on the excerpt on Figure 11Berdasarkan petikan dalam Rajah 11

(b) Describe two suitable security measures that should be taken by the bank to prevent computer crime.Terangkan dua langkah keselamatan yang sesuai yang patut diambil oleh pihak bank untuk mengatasi jenayah computer itu

b) Explain why bank clients should be protected under the Malaysian Cyber Law?Mengapa pelanggan bank harus dilindungi di bawah Undang-undang Siber Malaysia?

Source Year Level

Bloom

SPM 2008

1.3.3.2 Apply the correct security procedures. i. Antivirus, ii. Anti-Spyware, iii. Cryptography, iv. Firewall, v. Data backup and vi. Human aspects

Section A

7. State whether the following statement is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu.Anti-spyware is a software that we use to protect the computers from spyware.Anti-spyware ialah perisian yang kita gunakan untuk melindungi komputer daripadaspyware.TRUE / BENAR

Source Year Level

Bloom

TERENGGANU 2010

8. Table 1 shows statements about a process of hiding information by altering the actual information into different representation.Jadual 1 menunjukkan pernyataan mengenai satu proses yang menyembunyikan maklumat sebenar dengan menukarkan dalam bentuk persembahan yang lain.

Sahent works as a manager in a finance company. He wants to send a top secret report to Fahmi who is working in another branch. Sahent asks Joanan, his secretary, to send this report to Fahmi. When Joana tries to read the report, she finds out that the report has been encrypted.

Sahent bekerja sebagai seorang pengurus di syarikat kewangan. Beliau ingin menghantar sebuah laporan yang amat sulit kepada Fahmi yang bekerja di cawangan lain. Sahent meminta setiausahanya, Joana untuk menghantar laporan tersebut kepada Fahmi. Apabila Joana ingin membaca laporan itu, dia mendapati bahawa laporan tersebut telah dikripkan.

Table 1Based on Table 1 : / Berdasarkan Jadual 1:

Name the Process to the encrypted text in the report.Namakan prosess pada laporan yang dikripkan.ENCRYPTION

Source Year Level

Bloom

SELANGOR 2010

9. Based on Figure 2 , state the method of security measure used.Berdasarkan Rajah 2, nyatakan kaedah langkah keselamatan yang diigunakan.

72

Page 73: learning area 1

Figure 2Rajah 2CRYPTOGRAPHY

Source Year Level

Bloom

PERAK 2010

10. Rearrange the procedures in scanning virus. Susun semula prosedur mengimbas virus.

I. Scan the selected file / Imbas fail yang dipilihII. Choose an antivirus in the program / Pilih program antivirusIII. Wait while the program is scanning and the result is display Tunggu sehingga program membuat imbasan dan keputusan dipaparkanIV. Select file/ folder/drive that need to be scan /Pilih file yang ingin diimbas

E. I, II, III, IV F. II, IV, I, IIIG. III, I, IV, II H. IV, II, I, III

Source Year Level

Bloom

PERAK 2010

11. Write True or False for the following statement Tuliskan Benar atau Palsu pada pernyataan berikut

Anti Spyware is a program to scan and remove virus from computer system.Anti Spyware adalah satu program untuk mengimbas dan membuang virus dari sistem komputer.F

Source Year Level

Bloom

KELANTAN

2010

Figures 2 show types of security measures in computer security.Rajah 2 menunjukkan jenis langkah-langkah keselamatan di dalam keselamatan komputer.

73

ATTACK DWWDFN ALGORITHM

PLAIN TEXT

CHIPER TEXT

Page 74: learning area 1

Figure 2Rajah 2Based on Figure 2, identify YBerdasarkan Rajah 2, kenalpasti YfirewallSource Year Lev

elBloom

KELANTAN

2010

4. Table 1 shows security measures to overcome computer threatsX Human aspectsY FirewallZ Cryptography

Based on Table 1, match the security measures with the following statements by writing X , Y or Z

(i) To function in a network environment to prohibiting unauthorized access to your computer via the Internet.

(ii) As a security measure, make sure a computer room is always locked.

Source Year

Level

Bloom

PAHANG 2008

5. Figure 5 shows the process of cryptography. State whether the process shown is True or False.

Rajah 5 menunjukkan proses pelaksanaan kriptografi. Nyatakan sama ada susunan proses yang ditunjukkan Benar atau Palsu.

Figure 5 Rajah 5

2 State whether the following statements are True or False.

74

ChipertextTeks Siber

PlaintextTeks Biasa

ChipertextTeks Siber

Table 1

Page 75: learning area 1

(i) We can control access to pornography by turning on the firewall in the computer.

(ii) A firewall is a hardware or software that is used to protect your computer against people or programs that try to connect to your computer without invitation.

Source Year Level BloomSARAWAK (A) 2009

3 Figure 1 shows the process of cryptography.

Figure 1

Based on Figure 1, identify

(i) X(ii) Y

Source Year Level BloomSARAWAK (A) 2009

8. Below are steps for scanning viruses. Arrange the steps in sequence.Berikut merupakan langkah-langkah untuk mengimbas virus. Susun langkah mengimbas mengikut urutan yang betul.

I Scan the selected filemengimbas fail yang telah dipilih

II Choose an antivirus programPilih program antivirus

III Wait until the scanning process is finished and the result is displayedTunggu proses pengimbasan sehingga selesai

IV Select files or folders that need to be scannedPilih fail atau folder yang hendak diimbas

A IV, II, I and IIIB III, I, II and IIIC II, IV, I and IIID I, II, III and IV

Source Year Level

Bloom

PAHANG

2009

4. Encryption and decryption are processes that involve in a ________________. An encrypted ordinary text is called ____________. A reversing process in order to retrieve the message sent is called ______________. Enkrepsi dan dekrepsi adalah proses yang berkaitan dalam____________. Enkrepsi juga dikenali sebagai ____________. Manakala proses menterjemah semula untuk mengetahui mesej yang dihantar pula dikenali sebagai________________

Source Year Level

Bloom

WPKL 2009

Plaintext Ciphertext PlaintextX Y

75

Page 76: learning area 1

4. Cryptography is process associated with _________ and ________ . Kriptografi adalah proses yang berkaitan dengan _________ dan _________.

A. Encryption and TransformingB. Encryption and DecryptionC. Decryption and TransformingD. Decryption and Controlling

Source Year Level

Bloom

PUTRAJAYA 2009

3. Table 1 shows several security measures that can be used to protect computers and data. Match the given statements with the answers.

Jadual 1 menunjukkan beberapa ukuran keselamatan yang digunakan untuk melindungi komputer dan data. Padankan pernyataan yang diberi dengan jawapan.

Table 1 Jadual 1(i) A process of hiding information by altering the actual information into different representation.

Proses menyembunyikan maklumat dengan mengubahsuai maklumat sebenar kepada perwakilan yang berbeza.

(ii) A program that protects a computer against viruses. Satu program yang melindungi komputer daripada virus.

(iii) A piece of software which functions in a networked environment to prevent forbidden communications by the security.

Sejenis perisian yang fungsinya dalam persekitaran rangkaian untuk mencegah komunikasi terlarang

oleh keselamatan.

Source Year Level

Bloom

PERAK 2009

5. Figure 3 shows how cryptography works.Rajah 3 menunjukkan bagaimana kriptografi dilaksanakan.

Figure 3 Rajah 3Name H : Namakan : H

Source Year Level

Bloom

SPM 2007

2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised access to the contents of the file?

76

PlaintextTeks biasa H

PlaintextTeks biasa

EncryptEnkrip

DecryptDekrip

A. Data backupB. CryptographyC. AntivirusD. Firewall

Page 77: learning area 1

Laila perlu menghantar satu fail dokumen yang mengandungi maklumat sulit kepada pengurusnya melalui e-mel. Apakah yang perlu dilakukan oleh Laila untuk menghalang capaian tidak sah ke atas kandungan fail itu?

A. Back up the file Menbuat sandaran bagi fail ituB. Encrypt the file Mengenkrip failC. Install firewall Memasang tembok apiD. Scan the file for viruses Scan the file for viruses

Source Year Level

Bloom

SPM 2008

Section B

1. PC02’s user scanned the hard disk using antivirus software. The result is shown in Figure 12(c).Pengguna PC02 mengimbas cakera keras menggunakan satu perisian antivirus. Hasil pengimbasanditunjukkan dalam Rajah 12(c).

Figure 12(c) / Rajah 12(c)

Based on Figure 12(c),Berdasarkan Rajah 20(c),State the action can be taken by the user of PC02. Justify your answer.Nyatakan tindakan yang boleh diambil oleh pengguna PC02. Berikan justifikasi anda.Action taken: Move to vaultJustification:The antivirus will quarantines the infected file.Quarantine is a separate area of hard disk that holds the infected file until the infection can be removed. This ensures other files will not be infected.

Source Year Level

Bloom

PAHANG

2010

2. Read the following situation:Baca situasi berikut:

77

Page 78: learning area 1

(a) (i) What was happened to the club member’s list file?Apakah yang berlaku pada fail senarai nama ahli kelab ICT?

(ii) What should Nelly do before she open the file?Apakah yang perlu dilakukan oleh Nelly sebelum membuka fail tersebut?

(b) (i) State the step should be taken by Nelly to prevent this problem?Nyatakan langkah yang perlu diambil oleh Nelly untuk mencegah masalah ini?

(ii) Based on b (i), give one example of utility software that can be use.Berdasarkan b (i), berikan satu contoh perisian utiliti yang boleh digunakan.

(a) (i) The file has being infected/ attacked by virus.(ii) Scanning the thumb drive using antivirus software.

(b) (i) The computer in ICT room must be install antivirus software to preventdata or files for being infected/attacked by viruses.

(ii) Kaspersky /Avira / Norton Anti Virus/any relevant anti virus

Source Year Level

Bloom

PERLIS 2010

26 Copyright Infringement is defined as a violation of the rights secured by Copyright

78

Page 79: learning area 1

Act.(a) Give TWO examples of Copyright Infringement. [ 2 marks ]

(b) Security measures are the precautionary measures taken towards possible dangers or damages. State the appropriate security measures to overcome the identified computer threats:

(i) Data Lost

(ii) Hiding information [ 2 marks ]

Source Year

Level

Bloom

PAHANG 2008

Section C

1. Based on the situation below, answer the following questions.

David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3 songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the software. One day, he finds that his computer is getting slow and keeps on duplicating files. David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering memuat turun perisian hakcipta dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. David menggunakan kepakarannya dalam bidang ICT untuk mendapatkan nombor siri yang tidak sah untuk mengaktifkan perisian yang telah dimuat turun. Pada suatu hari komputer David menjadi perlahan dan sering membuat salinan fail tertentu secara berulang.

a. How can David prevent his computer from the problem in (b) in the future?

Bagaimanakah David dapat mengatasi masalah komputer yang dihadapi di (b) pada masa akan datang?___________________________________________________________

b. Other than the threat you mentioned in (b), give another computer threat

that could affect David’s computer.

Selain daripada ancaman yang dinyatakan di(b), berikan satu lagi ancaman lain yang mungkin berlaku kepada komputer David.

_______________________________________a) install antivirus / scan files for viruses before downloading

b) spyware/hackers

Source Year Level

Bloom

MELAKA

2010

79

Page 80: learning area 1

80