learning area 1
-
Upload
hafiza-shamsuri -
Category
Documents
-
view
25 -
download
2
description
Transcript of learning area 1
1.1.1.1 Define ICT.
Section A
3.. Complete the following statement: Lengkapkan pernyataan berikutInformation and Communication Technology is the use of computers,( i) ..................devices and( ii) ......;:........applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i) ...............dan aplikasi( ii)...............untuk memproses ,menyimpan , m encapai semula, melindungi dan menghantar m aklumat dari
mana-mana tempat pada bila-bilamasaCOMMUNICATION / SOFTWARE
Source Year Level
Bloom
SPM 2010
1. Choose the correct statement to define Information and Communication Technology (ICT). Pilih pernyataan yang paling tepat untuk mendefinisikan Teknologi Maklumat dan Komunikasi (ICT).
A. Information and Communication Technology is composed of three main components of a computer, Internet and networking.
Teknologi Maklumat dan Komunikasi (ICT) terdiri daripada tiga komponen utama iaitu komputer, internet dan rangkaian.
B. Information and Communication Technology (ICT) is a technology used by people to improve their lives.
Teknologi Maklumat dan Komunikasi (ICT) adalah teknologi yang yang digunakan oleh manusia untuk meningkatkan kehidupan mereka.
C. Information and Communication Technology (ICT) is a technology that is needed to process the information using electronic equipment and software applications to transfer, store, send and receive data. Teknologi Maklumat dan Komunikasi (ICT) adalah satu teknologi yang
diperlukan untuk memproses maklumat menggunakan peralatan elektronik dan perisian aplikasi untuk memindah, menyimpan, menghantar dan menerima data. D. Information and Communication Technology (ICT) is any communication facilities and computer-based applications. Teknologi Maklumat dan Komunikasi (ICT) adalah sebarang komunikasi dan kemudahan aplikasi berasaskan komputer.
C
Source Year Level
Bloom
KELANTAN
2010
2. Information may come in various forms such as ________.Maklumat diperoleh dari pelbagai bentuk seperti ________.I Reading /BacaanII Investigation / PenyiasatanIII Study / TinjauanIV Research / KajianA. I and IIB. II and IIIC. II, III and IV
D. All the above DSource Year Lev
elBloom
1
Technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.Teknologi memerlukan kepada pemprosesan maklumat, penggunaan komputer elektronik, peralatan komunikasi dan perisian aplikasi untuk dicantumkan, disimpan, dilindungi, diproses, dihantar dan menerima maklumat bila-bila masa dan dimana-mana jua.
PERLIS 2010
3. The term computer literacy refers to _______________Istilah literasi computer merujuk kepada ________________.A. Books stored in a library on computer related subjects.
Buku-buku tentang computer yang disimpan di perpustakaan.B. A basic knowledge of computers and their use.
Pengetahuan asas tentang computer dan kegunaannya.C. Technical research conducted by colleges and universities.
Kajian teknikal yang dijalankan oleh kolej dan universiti.D. User’s guide that accompany applications software.
Panduan pengguna yang disertakan bersama perisian aplikasi.B
Source Year Level
Bloom
PERLIS 2010
Source Year Level
Bloom
TERENGGANU 2009
1.
This statement refers to..........................................Penyataan ini merujuk kepada.................................
A. Information and Communication Technology Teknologi Maklumat dan Komunikasi
B. Internet Protocol Protokol Internet
C. Operating SystemSistem Pengoperasian
D. Management Information System Sistem Pengurusan Maklumat
Source Year Level
Bloom
2
UNKNOWN
Section B
Section C
1.1.1.2 Describe the brief evolution of computers.
Section A
4. Computers in ____________ Generation use transistor to transfer electronic signals acrossresister.Komputer Generasi ____________ menggunakan transistor untuk menghantar isyarat elektronikmelalui perintang. Second
Source Year Level
Bloom
TERENGGANU 2010
1. State the name of the first generation computer. / Nyatakan nama komuter generasi pertamaENIAC
Source Year Level
Bloom
SPM 2010
2. Figure 1 shows three technologies used in the generations of computers Rajah I menunjukkan tiga teknologi yang digunakan dalam generasi komputer.
Figure 1 / Rajah 1
Based on Figure 1, write A, B or C to match the following:Berdasarkan Rajah l, tulis A, B atau C untuk dipadankan dengan berikut: {(i) Second Generation / Generasi Kedua C(ii) Third Generation / Generasi Ketiga A
3
Source Year Level
Bloom
SPM 2010
1.
Name the technology used for this generation of computers.
Source Year
Level
Bloom
PENANG 2008
1.
“Production was slow because everything was done manually and totally depended on human
labor.”
Statement above is regarding
A. Impact of ICT on Industry
B. Impact of ICT in Banking
C. Computerised Systems
D. Non-Computerised Systems
Source Year Level
Bloom
PERLIS 2008
1. Figure 1 shows the hardware technology that was created in second generation of computer.
Rajah 1 menunjukkan teknologi perkakasan yang dicipta dalam zaman komputer generasi kedua.
Figure 1Rajah 1
Name the hardware in Figure 1.
Namakan perkakasan dalam Rajah 1.
Source Year Level
Bloom
4
The computers for this generation use magnetic drums as storage media and are large in size, taking up entire room. They use a great deal of electricity, generating a lot of heat, which is often the cause of malfunctions.
UNKNOWN
2009
2 Figure 1 show the technologies used in two different generations of computers.
(a) (b)
FIGURE 1
Which of the following is true?
1(a) 1(b)
A First Generation Fourth Generation
B Second Generation First Generation
C Third Generation Second Generation
D Fourth Generation Third Generation
Source Year Level BloomSARAWAK
(A)2008
1. Figure 1 shows several components of computer technology generations.
Rajah 1 menunjukkan beberapa komponen bagi generasi teknologi komputer.
FIGURE 1RAJAH 1
Match A, B or C with the following generation of computer technology.
Padankan A, B atau C dengan generasi teknologi computer.
a) 1st Generation Computer
Komputer Generasi Pertama
b) 2nd Generation Computer
5
A
B C
Komputer Generasi Kedua
Source Year Level
Bloom
UNKNOWN
2009
2. Figure 1 shows several components of computer technology generations. Rajah 1 menunjukkan beberapa komponen bagi generasi teknologi komputer.
Figure 1Rajah 1
Match A, B or C with the following generation of computer technology.Padankan A, B atau C dengan generasi teknologi komputer.
(i) 1st Generation ComputerKomputer Generasi Pertama
(ii) 4th Generation ComputerKomputer Generasi Keempat
Source Year Level
Bloom
KELANG 2009
1. The following are the technologies used in different generations of computers.
Integrated CircuitsVacuum TubesArtificial IntelligenceMicroprocessorsTransistors
Which technology is used in the second generation computer?
Source Year Level
Bloom
PCGHS 2009
A BC
6
1. Figure 1 shows the technologies used in two generations of computers.Rajah 1 menunjukkan teknologi yang digunakan dalam dua generasi computer.
(a) (b)
Figure 1Rajah 1
Based on Figure 1, which of the followings is true?Berdasarkan kepada Rajah 1, yang mana satu antara berikut adalah benar.
(a) (b)A First Generation
Generasi PertamaSecond GenerationGenerasi Kedua
B Second GenerationGenerasi Kedua
ThirdGenerationGenerasi Ketiga
C Third GenerationGenerasi Ketiga
Fourth GenerationGenerasi Keempat
D Fourth GenerationGenerasi Keempat
First GenerationGenerasi Pertama
Source Year Level
Bloom
JOHOR 2009
7
1. Figure 1 shows the evolution of computers. Rajah 1 menunjukkan aliran evolusi komputer.
Based on Figure 1, Name the hardware :Berdasarkan Rajah 1, Namakan perkakasan:
(i) X (ii) Y.
Source Year Level
Bloom
KELANTAN
2009
1. State the name of the first generation computer.Nyatakan nama komputer generasi pertama.
Source Year Level
Bloom
PERAK 20098
1951 - 1957
1958 - 1963
1964-1969
1970 - 1990
Vacuum TubeTiub Hampagas
Integrated CircuitLitar Bersepadu
X Y
Figure 1Rajah 1
1. Figure 1 show the technologies used in three different generations of computersRajah 1 menunjukkan beberapa teknologi yang digunakan dalam tiga generasi komputer yang berlainan
A B C
Figure 1Rajah 1
Match A, B or C with the following generations of computer technology.Padankan A, B atau C dengan generasi teknologi komputer berikut.
(i) 1st Generation Computer. Komputer Generasi Pertama.
(ii) 2nd Generation Computer. Komputer Generasi Kedua
Source Year Level
Bloom
SPM 2007
1. State the name of the first generation computer. Nyatakan nama komputer generasi pertama.
Source Year Level
Bloom
SPM 2008
Section B
Section C
1.1.2.1 List the usage of ICT in everyday life.
Section A
1. Figure 3 shows the usage of ICT in three different fields.Rajah 3 menunjukkan penggunaan Teknologi Maklumat dan Komunikasi dalam tiga bidang yangberbeza .
9
Figure 3 / Rajah 3
Based on statement in Figure 3,state the name of field X and Z:Berdasarkan Rajah 3, nyatakan nama bidang komputer X dan Z:(i) X(ii) ZCommerce / PerdaganganIndustry/ Manufacturing/Perindustrian
Source Year Level
Bloom
JOHOR 2010
2. ICT is used in many sectors.(i) Auto Teller Machine (ATM), cash deposit machine and electronic fund transfer are examples of
ICT usage in _______________ sector.ICT digunakan dalam pelbagai bidang. Mesin ATM (Auto Teller Machine), mesin deposit wang tunai dan pemindahan wang elektronik adalah beberapa contoh penggunaan ICTdalam bidang _______________.
(ii) In ________________ sector, teachers use computers to search for teaching materials,participate in online forums and online conferences.Dalam bidang __________________, guru menggunakan komputer untuk medapatkan bahan mengajar, melibatkan diri dalam forum dan persidangan atas talian(i) banking / perbankan (ii) education / pendidikan / pelajaran
Source Year Level
Bloom
KEDAH 2010
3. Customers benefit from Electronic Banking in terms of _____________ Pelanggan mendapat faedah dari Perbankan Elektronik dalam konteks _________
10
I. 24 hour service Perkhidmatan 24 jam
II. Electronic Fund Transfer Pemindahan wang secara elektronik
III. Electronic Cash Deposits Deposit Tunai secara elektronik
IV. Electronic Loan Applications Aplikasi Pinjaman secara elektronik
A. I , II and IIIB. I, II and IVC. I, III and IVD. II,III and IVA
Source Year Level
Bloom
SELANGOR 2010
3. State True or False for the following statements.Nyatakan Benar atau Salah bagi pernyataan-pernyataan berikut.
Nowadays, computer plays bigger roles in our daily life. In banking sector, the computer is the nerve centre of the banking system around the world where the transaction can be done anytime and place. Pada masa sekarang, komputer memainkan peranan yang sangat besar di dalam kehidupan kita seharian. Dalam sektor perbankan, komputer merupakan nadi penggerak sistem perbankan seluruh dunia di mana operasi transaksi boleh dilakukan pada bila-bila masa dan di mana sahaja.
Source Year
Level
Bloom
PERAK 2008
4 Table 1 show three different fields and Figure 3 shows the use of ICT in two different fields.
TABLE 1
11
Industry Banking Education
(a) (b)
FIGURE 3
Based on Figure 3, match the use of ICT with the fields given in Table 1 .
(a) ____________________
(b) ____________________
Source Year Level BloomSARAWAK
(A)2008
12 Table 3 shows the usage of multimedia in various fields.Jadual 3 menunjukkan penggunaan multimedia dalam pelbagai bidang.
P MedicinePerubatan
Q BusinessPerniagaan
R EngineeringKejuruteraan
S EntertainmentHiburan
Table 3Based on Table 3, choose P, Q, R or S for the following statements.Berdasarkan Rajah 3, pilih sama ada P, Q, R atau S bagi pernyataan tersebut.
(a) Users can produce computer games, and develop animations or special effects for cartoons.Pengguna boleh membina permainan komputer dan animasi atau kesan-kesan khas pada kartun.
(b) Users can practice or be trained in performing high-risk surgery virtually.Pengguna boleh mengaplikasi atau menjalani latihan dalam melaksanakan pembedahan berisiko tinggi secara maya.
Source Year Level
Bloom
JOHOR 2009
3. Customers benefit from Electronic Banking in terms of _____________Pelanggan mendapat faedah dari Perbankan Elektronik dalam konteks ___________
12
V. 24 hour service Perkhidmatan 24 jamVI. Electronic Fund Transfer Pemindahan wang secara elektronikVII. Electronic Cash Deposits Deposit Tunai secara elektronikVIII. Electronic Loan Applications Aplikasi Pinjaman secara elektronik
E. I , II and IIIF. I, II and IVG. I, III and IVH. II,III and IV
Source Year Level
Bloom
WPKL 2009
22 Write the words that would complete the following statement. Tulis perkataan yang dapat melengkapkan pernyataan berikut.
Buying books from an online shop and selling shoes on an internet auction site are both examples of .........................
Membeli buku dari kedai atas talian dan menjual kasut melalui tapak jualan lelong dalam internet adalah contoh .......................Source Year Lev
elBloom
SPM 2009
Section B
26 EDUCATION BEFORE ICT EDUCATION WITH ICT
Figure 3 Rajah 3
(a) Based on Figure 3, state a difference between the education before ICT and education with ICT.Merujuk kepada Rajah 3, nyatakan perbezaan antara pendidikan tanpa ICT dan dengan ICT.
(b) List two usage of ICT in the education sector.Senaraikan dua kegunaan ICT dalam sektor pendidikan.
Source Year Lev Bloom
13
elUNKNOW
N2008
Section C
1.1.2.2 State the differences between computerised and non-computerised systems.
Section A
1. Study the statement below carefully.Kaji pernyataan di bawah
Statement 1/ pernyataan 1Statement 1 above is regarding to ______________________ systems.Pernyataan 1 di atas merujuk kepada sistem ________________________.Non- computerized
Source Year Level
Bloom
SABAH 2010
2. Table 1 shows two types of systems.Jadual 1 menunjukkan dua jenis sistem.
AComputerised Berkomputer
BNon-ComputerisedTidak Berkomputer
Table 1 / Jadual 1
Choose A or B to match the following statements.Pilih A atau B untuk memadankan pernyataan berikut.All transactions can be done at anytime and any place for business purposes.Semua transaksi boleh dilakukan bila-bila masa dan di mana sahaja untuk tujuan perniagaan.A
Source Year Level
Bloom
TERENGGANU 2010
1. Using the digital medium such as online communication via emails, online chat and instantmessaging, information can be transferred, stored and retrieved. This type of informationtransfer eliminates the use of printed materials and can create a ___________ environmentin today’s society.
Dengan menggunakan perantara digital seperti komunikasi atas talian melalui emel,sembang atas talian dan mesej segera, maklumat boleh dihantar, disimpan, dan dicapai.Penghantaran maklumat jenis ini boleh menghapuskan penggunaan bahan cetakan danmewujudkan satu situasi _____________ didalam masyarakat sekarang.
Source Year Lev Bloom
14
“Production was slow because everything was done manually and totally depended on human labour.”“Produksi perlahan kerana semuanya dijalankan secara manual dan bergantung kepada tenaga manusia.”
elKEDAH 2009
2. Which of the following is the usage of computerized system?
Manakah antara berikut merupakan kegunaan sistem berkomputer?
A. Withdraw money from the ATM machine.
Mengeluarkan wang dari mesin ATM.
B. Buying a set of computer from PC Fair.
Membeli satu set komputer di pameran komputer.
C. Student assembles computer in the lab.
Pelajar membuat pemasangan komputer di makmal.
D. Buying a bus ticket at bus station counter.
Membeli tiket bas di kaunter stesen bas.
Source Year Level BloomHULU LANGAT 2009
Section B
26. Figure 1 shows a situation in a banking system .Rajah 1 menunjukkan situasi di dalam sistem bank
a. State TWO advantages when the management changed the system from A to B.Nyatakan DUA kelebihan yang diperolehi apabila pihak pengurusan bank mengubah dari sistem A ke sistem B.
i) ___________________________
ii) ___________________________ [2 Marks]
b. State TWO disadvantages when the management changed the system from A to B.Nyatakan DUA kelemahan yang diperolehi apabila pihak pengurusan mengubah dari sistem A ke sistem B.
i) ___________________________
15
ii) ___________________________ [2 Marks]
(a) Two advantages when the management changed the system from A to B.i) Faster productionsii) Can take over jobs that are dangerous to the humaniii) More reliableiv) can work continuously with no need for breaks.v) can repeat a task accurately time and again without losing accuracy
(b)Two disadvantages when the management changed the system from A to B. i) High Cost ii) High maintenanceiii) Employment iv) Less flexible
Source Year Level
Bloom
PAHANG
2009
29. Figure 8 shows how a car is assembled in a Proton factory. Rajah 8 menunjukkan aktiviti pemasangan kereta di kilang Proton.
Figure 8 Rajah 8
Based on Figure 8 :Berdasarkan Rajah 8 :
(a) State one difference between assembling a car manually and the process shown in Figure 8. Nyatakan satu perbezaan antara proses pemasangan kereta secara manual berbanding cara yang terdapat pada Rajah 8.
(a) Give two positive impact using technology in Figure 8 to the society. Berikan dua kesan positif penggunaan teknologi pada Rajah 8 kepada masyarakat. Source Year Lev
elBloom
N.SEMBILA 2009
16
N
Section C
1.1.2.3 State the impact of ICT on society.
Section A
1. ICT has brought many positive impacts on society such as …
A. Lower communication cost
B. Social problems
C. Ineffective sharing of information
D. Slow communication speed
Source Year
Level
Bloom
PETALING PERDANA 2008
2. Question 2 is in statement form about Positive Impact of ICT on society. Write True or False.
Soalan 2 adalah dalam bentuk pernyataan mengenai Kesan Positif ICT ke atas masyarakat.. Tulis Benar atau
Palsu
a) People could share and exchange ideas, news and information easier through video conference. Pengguna
lebih mudah berkongsi dan bertukar pandangan, berita dan maklumat melalui sidang video.
b) People became more individualistic and introvert.
Pengguna bersikap individual dan bersendiri.
Source Year Level
Bloom
UNKNOWN
2009
Section B
1. Figure 8 shows the impact of ICT on society.Rajah 1 memaparkan kesan ICT terhadap masyarakat
Figure 8 / Rajah 8Based on figure 8 / Berdasarkan rajah 8,(i) State two advantages of ICT on society./ Nyatakan dua kelebihan ICT terhadap masyarakat.
17
(ii) State two disadvantages of ICT on society. / Nyatakan dua kelemahan ICT terhadap masyarakat. (i) - Fastest speed of communication
- Lower communication cost- Reliable mode of communication- Effective sharing of information- Paperless environment- Borderless communication- Any relevant answer.
(ii) - Social problem (or any related answer)- Health problem (or any related anser)- Any relevant answer.
Source Year Level
Bloom
KEDAH 2010
Section C
31.
Figure 7 Rajah 7
Based on Figure 7 the above statement, answer the following question. Berdasarkan Rajah 7 pernyataan di atas, jawab soalan yang diberikan.
(a) Give the definition of the environment in Figure 7 situation. Berikan definisi situasi persekitaran yang dinyatakan dalam Rajah 7.
(b) State two other positive and two other negative impacts of ICT usage. Nyatakan dua impak positif dan negatif kesan penggunaan ICT
selain daripada yang dinyatakan.
1.2.1.1 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.
Section A
3. Choose the correct answer.
Copyright Intellectual Property Privacy
The right of individuals to control the collection and use of information about themselves refers to the right of _____________________________.
Source Year
Level
Bloom
PENANG 2008
1. This Act provides the environment for the future development and delivery of healthcare in Malaysia.Akta ini menyediakan keadaan untuk perkembangan dan penghantaran kesihatan di masa hadapan di Malaysia.
18
ICT technology has created the term paperless environment. It has been used in many sector, to make our work easier and faster.
Teknologi ICT telah mencipta dunia tanpa penggunaan kertas. Ianya telah digunakan di dalam banyak sektor, agar kerja dapat dilaksanakan dengan mudah dan cepat.
A. Digital Signature Act 1997B. Computer Crime Act 1997C. Telemedicine Act 1997D. Communication and Multimedia Act 1997
Source Year
Level
Bloom
GOMBAK 2008
2. Write True or False for the following statements:
Tuliskan Benar atau Palsu pada pernyataan berikut :
(i) Privacy means that we have the right not to disclose our personal details.
Kebersendirian bermaksud yang kita mempunyai hak untuk tidak mendedahkan maklumat peribadi.
(ii) Computer Ethics is a guideline for computer users. Etika Komputer adalah panduan untuk pengguna komputer.
Source Year
Level
Bloom
GOMBAK 2008
1
X is one of the issues in computer ethics. X may be
A. software theft B. encrypted textC. unauthorised accessD. inaccurate information
Source Year Level BloomSARAWAK
(A)2008
6. Creative writing such as lyrics and song compositions can be protected under the _____ law.A. patentB. designC. copyrightD. trademark
Source Year Level
Bloom
JOHOR 2008
1 A system of moral standards or values used as a guideline for computer users is known as
A. cyber lawsB. code of ethicsC. cryptographiesD. computer securities
Source Year Level BloomSARAWAK (A) 2009
19
Unknown author
X Idea can be misunderstood
20 Complete the statement below by filling in the blankIsikan ruang kosong di bawah untuk melengkapkan pernyataan berikut
A violation of the rights given to the producer of a film, song and book is called _________________.
Pencabulan hak yang dimiliki oleh penerbit filem, muzik dan buku dikenali sebagai ______________ .
Source Year Level
Bloom
JOHOR 2009
1. Cyber law is defined as _____________________.Undang-undang cyber bermaksud ___________________.
A. any laws relating to electronic and technology industry.sebarang undang-undang yang berkait dengan industri elektronik dan teknologi
B. any laws relating to industry and the Internet communications.sebarang undang-undang yang berkait dengan industri dan komunikasi internet
C. any laws relating to technology and the Internet communications.sebarang undang-undang yang berkait dengan teknologi dan komunikasi internet
D. any laws relating to protecting the internet and other online communication technologysebarang undang-undang yang berkaitan dengan melindungi internet dan teknologi komunikasi dalam talian
Source Year Level
Bloom
WPKL 2009
2. State whether the following statements is True or False. Nyatakan sama ada pernyataan berikut Benar atau Palsu. (i) Privacy means that we have the right not to disclose our personal details.
Hak peribadi bermaksud kita ada hak untuk tidak mendedahkan maklumat peribadi.(ii) E-banking makes buying and selling activities faster and more efficient through internet.
Perbankan elektronik membolehkan aktiviti belian dan jualan lebih cepat dan berkesan
melalui internet.
Source Year Level
Bloom
PERAK 2009
4. Table 1 shows types of computer crimes.Jadual 1 menunjukkan jenis jenayah komputer.
A Computer Fraud. Penipuan Komputer
B Computer Theft. Pencurian Komputer
C Computer Attack. Penyerangan KomputerTable 1 Jadual 1
Based on Table 1, write A, B and C to categorise the following acivities:
20
Ali has been appointed by his teacher to help other teachers to key in the test score into school HC3 Examination Program. Without his teacher knowledge he had changed his ICT’s subject marks from 40% to 75%. As a result of the actions he has successfully passed the subject.Ali telah dilantik oleh gurunya untuk membantu guru-guru memasukkan markah peperiksaan ke Program Peperiksaan HC3 sekolahnya. Tanpa pengetahuan gurunya beliau telah mengubah markah subjek ICTnya dari 40% ke 75%. Hasil dari perbuatan tersebut beliau telah lulus dengan cemerlang subjek tersebut.
Berdasarkan Jadual 1, tulis A, B atau C untuk mengkategorikan aktiviti berikut.
i) E-mail hoaxes, false claims of expertise on certain fields.Menghantar e-mail tipu helah, mengaku mahir dalam bidang tertentu.
ii) Tap in the data transmission lines and international transfer of payments to the wrong account.Memasuki saluran penghantaran data dan dengan sengaja memindahkan bayaran kepada akaun lain.
Source Year Level
Bloom
SPM 2007
Question 22 is in statements form. Write True or False for the following statement: Soalan 22 adalah dalam bentuk pernyataan. Tuliskan Benar atau Palsu untuk pernyataan tersebut.
22. Cyber law is a system of moral standards or values used as a guideline for computer users.Undang-undang siber adalah sistem piawaian moral atau nilai yang digunakan sebagai garis panduan kepada pengguna komputer.
Source Year Level
Bloom
SPM 2007
Section B
1. The following is a statement about computer ethics.
Berikut adalah pernyataan tentang etika komputer
Based on the statement above / Berdasarkan pernyataan di atas,(a) What is the type of misconduct based on the underlined phase above.
Apakah jenis kesalahan yang dilakukan berdasarkan pernyataan bergaris di atas. Definisikan jenis kesalahan tersebut.
(b) Explain the negative impact done by Ali towards the school. Terangkan kesan negatif perbuatan yang dilakukan Ali kepada sekolah.
(a) ETHICS ethics in computing means moral guidelines to refer to when using the computer and computer networks.
21
ORethics is a moral philosophy where a person makes a specific moral choice and sticks to it.
(b) Negative impact:- Keputusan peperiksaan tidak tepat- Susunan kedudukan dalam kelas tidak tepat
Gred purata subjek ICT menjadi bertambah baikSource Year Lev
elBloom
KELANTAN
2010
Source Year Level
Bloom
TERENGGANU 2009
Section C
31. Figure 11 is an excerpt from a daily newspaperRajah 11 adalah petikan daripada akhbar harian.
22
MALAYSIA NEWS.COMYOUR DAILY NEWSPAPER
24 OCT 2008RM5.00
Online TheftBank Employee Charged
Kuala Lumpur 23 Oct. A bank employee was charged in the high court yesterday for breaking into the bank computer system and electronically transferring RM1.2 million to his personal bank account. The HOT Bank employee was charged…
Kecurian Atas TalianKakitangan Bank DidakwaKuala Lumpur 23 Okt. Seorang pekerja bank telah didakwa di mahkamah tinggi semalam di atas kesalahan memecah masuk ke dalam system computer bank dengan memindahkan wang berjumlah RM1.2 juta secara elektronik untuk dimasukkan ke dalam akaun bank peribadinya. Pekerja HOT Bank itu telah didakwa…
Figure 11 Rajah 11
Based on the excerpt on Figure 11Berdasarkan petikan dalam Rajah 11
(a) Describe two suitable security measures that should be taken by the bank to prevent computer crime.Terangkan dua langkah keselamatan yang sesuai yang patut diambil oleh pihak bank untuk mengatasi jenayah computer itu
b) Explain why bank clients should be protected under the Malaysian Cyber Law?Mengapa pelanggan bank harus dilindungi di bawah Undang-undang Siber Malaysia?
Source Year Level
Bloom
SPM 2008
1.2.1.2 Differentiate between ethics and law.
Section A
1. Which of the followings are TRUE about computer ethics?Manakah antara berikut adalah BENAR tentang etika penggunaan komputer?I As a guideline to computer users.
Sebagai garis panduan kepada pengguna komputer.II No punishment for anyone who violates ethics.
Tiada hukuman dikenakan kepada sesiapa yang melanggar etika.III Depends on country and state where the crime is committed.
Bergantung kepada negara dan kawasan di mana jenayah tersebut dilakukan.IV Computer users are free to follow or ignore the code of ethics.
Semua pengguna komputer bebas untuk mengamalkan kod etika yang digariskan.A I, II and IIIB I, II and IVC I, III and IVD II, III and IVB
Source Year Level
Bloom
KEDAH 2010
2. The following statements are related to ethics and law.
P Judge behaviour based on moral standards.
Q Universal, can be applied anywhere, all over the world.
R Prevent misuse of computers.
S As a rule to control computer users.
T Computer users must follow the regulations.
23
Choose the statement that is related to law by writing the letter(s) in the space provided.
Source Year
Level
Bloom
PENANG 2008
Section B
26. In recent years, email is one of the popular services thru the net. Many business transactions,
management instructions even individual communication are done. Students share information,
ideas and opinions . It is very fast and easy.
Pada masa kini, email sangat digemari di kalangan pengguna internet. Banyak transaksi
perniagaan, arahan pentadbiran malah komunikasi individu juga diadakan. Pelajar-pelajar berkongsi
maklumat, idea dan pendapat. Ia sangat senang dan cepat.
a. State two examples of law breaking.
Nyatakan dua contoh aktiviti yang melanggar undang-undang. [2 marks]
b. State two reasons why do we need ethics and law in computing.
Nyatakan dua sebab mengapa kita perlu beretika dan undang-undang dalam
perkomputeran. [2 marks]
Source Year Level
Bloom
PERLIS 2009
26. Electronic mail is one of the most popular services on the internet. It makes business managers and administrators more productive by allowing them to share information, ideas and opinions easily.Mel electronic merupakan perkhidmatan dalam internet yang paling popular. Ia membuatkan ahli perniagaan dan pentadbir lebih produktif dengan membenarkan mereka berkongsi maklumat, pendapat dan pandangan dengan mudah.
In relation to electronic mail, state two examples in each case which can be considered as:Berkaitan dengan mel elektronik, nyatakan dua contoh daripada setia kes yang dianggap sebagai:
a) Ethical Beretika
b) Law breaking Melanggar undang-undang
Source Year Level
Bloom
SPM 2008
Section C
1.2.1.3 State the need for intellectual property laws.
Section A
24
2. Table 1 shows statements about types of Intellectual Property.Jadual 1 menunjukkan pernyataan mengenai jenis-jenis Harta Intelektual.
A Artistic material, music, films, sound recordings and road casts including software and multimediaBahan artistik, muzik, filem, rakaman bunyi dan ‘road casts’ termasuk perisian dan multimedia
B Word, names, symbols, devices and images that represent product, goods or servicesPerkataan, nama, simbol, peralatan dan imej yang mewakili produk barangan dan perkhidmatan
C The features of the lines, contours, colours, shape, texture or material of the product itselfCiri-ciri garisan, kontur, warna, bentuk, tekstur atau bahan produk itu sendiri
Table 1 / Jadual 1
Based on Table 1, write A, B or C to match the following :Berdasarkan Jadual 1, tulis A, B atau C untuk memadankan yang berikut :
(i) Trademarks / Jenama B
(ii) Design / Rekabentuk C
Source Year Level
Bloom
PUTRAJAYA 2010
12. A ____________gives authors and artists exclusive rights to duplicate, publish or sell their materials.
____________membolehkan pengarang dan artis hak eksklusif untuk menyalin, mempersembah dan menjual hasil mereka.
Source Year
Level
Bloom
PAHANG 2008
2. Trademark is _____________________.
A. the features of, in particular, the lines, contours, colours, shape, texture or material of the
product itself or its ornamentation.
B. words, names, symbols, devices and images that represent products, goods or services.
C. utility, design or plant patents that protect inventions and improvements to existing inventions.
D. literary and artistic material, music, films, sound recordings and broadcasts, including software
and multimedia.
Source Year Level
Bloom
PERLIS 2008
25
Source Year Level
Bloom
TERENGGANU 2009
2. Intellectual property law is needed to cover:Undang-undang harta intelek diperlukan untuk melindungi:
I. Ideas IdeII. Inventions RekaanIII. Historical creations Ciptaan SejarahIV. Unique names Nama unik
A. I, II and IIIB. I, II and IVC. I, III and IVD. II, III and IV
Source Year Level
Bloom
KEDAH 2009
2. Creative writing such as lyrics and song compositions can be protected under the ___________ law.Penulisan kreatif seperti lirik dan susunan lagu boleh dilindungi dengan undang-undang ____________
A. Patent/PaternB. Design/RekabentukC. Copyright/HakciptaD. Trademark/Tanda Perniagaan
Source Year Level
Bloom
WPKL 2009
26
1. Cik Masita obtained the exclusive legal rights for the distribution and sale of the CD-ROM. This is associated with Cik Masita mendapat hak eksklusif yang sah di sisi undang-undang untuk mengedar dan menjual CD-ROM. Perkara ini dikaitkan dengan
A. piracy cetak rompakB. privacy rights hak kebersendirianC. copyright hak cipta D. patent Paten
Source Year Level
Bloom
PUTRAJAYA 2009
Section B
1. The above logos are invention that represents TV stations which are operating in our country.These logos mean each TV stations are protected by a group of legal rights which calledIntellectual Property Laws.Logo-logo di atas mewakili stesen-stesen TV yang beroperasi di negara kita. Logo-logo inimembawa maksud stesen-setesen TV ini dilindungi oleh Undang-undang Harta Intelek.a) What is the meaning of Intellectual Property Laws? ( 1 mark )
Apakah yang dimaksudkan dengan Undang-Undang Harta Intelek?b) Name the type of protection that covers these logos and give another TWO inventions that
can be protected by laws. Namakan jenis perlindungan yang diberikan terhadap logo-logo tersebut dan berikan DUAciptaan yang dilindungi dari segi undang-undang.
a. Intellectual Property refers to works created by inventors, authors and artists. These works are unique and have value in the market place
b. cover ideas, inventions, literary creations, unique names, business models, industrial processes, Trademarks, Trade/company names , Copyrights , Patents( any two )
Source Year Level
Bloom
PERLIS 2010
26. Joyce is a Computer Science graduate of a local university. She has written an inventory program for her brother, Mathew, who owns a sundry shop. She does not charge him anything for the program. Even though the program is not a polished finished product, it works reasonably well and saves Mathew a lot of time keeping track of his supplies. As Joyce discovers later, Mathew has copied the program to his friend who also owns a sundry shop.
27
Based on the situation above,
(i) Explain the major ethical issue. [ 2 marks ]
(ii) Explain why intellectual property law is needed for protecting Joyce’s original work. [ 2 marks ]
Source Year Level
Bloom
PCGHS 2009
Section C
1. Based on the statement above,Berdasarkan pernyataan di atas,a) Explain whether the issue above is involved
Jelaskan sama ada isu di atas melibatkani. ethical or unethical behaviour [2 marks]
perbuatan yang beretika atau tidak beretika______________________________________________________________________________________________________________________________________________
ii. lawful or unlawful behaviour [2 marks]perbuatan yang mengikut undang-undang atau melanggar undang-undang______________________________________________________________________________________________________________________________________________
b) Describe a type of law required to restrain the above activity. [3 marks]Terangkan satu jenis undang-undang yang diperlukan untuk membenteras aktiviti di atas.________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
a) i. Unethical - He uses the text without permission /- He uses someone else’s work in his own ……
ii. Unlawful - The author of the text can sue him /- The text is protected under law ……
b) cyberlaw - a law that protects online material / activities
- it prevents cyber criminals Source Year Lev
elBloom
TERENGGANU 2010
1.2.2.1 List ways to protect privacy.
Section A
1. Which of the following are ways to protect privacy?Manakah antara berikut adalah cara untuk melindungi kerahsiaan?
28
I. Utilities software / Perisian utilitiII. Purchase goods with cash, rather than credit card
Beli barangan secara tunai berbanding kad kredit.III. Clear your history file when you are finished browsing.
Padam fail arkib setelah selesai melayari Internet.A. I onlyB. I and IIC. II and IIID. I, II and IIID
Source Year Level
Bloom
TERENGGANU 2010
2. Write whether the statements below are True or False.
Tuliskan sama ada pernyataan di bawah Benar atau Palsu.
(a) Privacy can be protected by utilities software such as firewall.
Kebersendirian boleh dilindungi dengan menggunakan perisian utiliti seperti tembok ap.
(b) Cyber law is a way to protect data privacy.
Undang-undang siber merupakan satu cara untuk melindungi kebersendirian data.
Source Year
Level
Bloom
N. SEMBILAN
2009
Section B
26. The following is a statement on information privacy.Berikut adalah penyataan tentang kebersendirian maklumat.
Based on the statement, list four ways of making personal data more private.[4 marks]Berdasarkan pernyataan itu, senaraikan empat cara untuk menjadikan data peribadi lebih sulit.
Source Year Level
Bloom
SPM 2007
29
“Information privacy refers to the right of individuals and organisations to deny or restrict the collection and use the information about them”
“Kebersendirian maklumat merujuk kepada hak individu dan hak organisasi menolak atau menghadkan pengumpulan dan penggunaan maklumat yang berkaitan dengannya”
Shelly, 2006
29. You keep a data base of your friends’ names, addresses and dates of birth. The data base is kept in the school server and can be retrieve by other user. [4 marks]Anda menyimpan pangkalan data berkaitan nama, alamat, dan tarikh lahir rakan-rakan anda. Pangkalan data itu disimpan di dalam komputer pelayan sekolah dan boleh dicapai oleh pengguna lain.
(a) State two uses of the information from the data base to be utilized.Nyatakan dua kegunaan itu maklumat daripada pangkalan data dimanfaatkan.
(b) State two problems that may arised by having shared data base.Nyatakan dua masalah yang mungkin timbul dengan mempunyai perkongsian pangkalan data.
Source Year Level
Bloom
SPM 2007
Section C
1.2.2.2 State authentication and verification methods/technologies.
Section A
3. Figure 1 shows one type of biometric device.Rajah 1 menunjukkan satu jenis peranti biometrik.
Figure 1 / Rajah 1Based on Figure 1 / Berdasarkan Rajah 1,
(i) State the name of the device (a)./ Nyatakan nama peranti (a)(ii) State the authentication method in Figure 1. / Nyatakan kaedah pembuktian dalam Rajah 1.(i) Iris scanner / biometric device 1(ii) Biometric devices / iris scanning
Source Year Level
Bloom
PAHANG
2010
4. Figure 1 shows authentication and verification methods.Rajah 1 menunjukkan kaedah pembuktian dan pengesahan.
30
Figure 1 /Rajah 1
Choose A or B to match the following statements.Pilih A atau B untuk memadankan pernyataan berikut.A possessed object that you must carry to gain access to computer or computer facility.Sejenis objek yang mesti di bawa untuk mencapai komputer atau kemudahan computerA
Source Year Level
Bloom
TERENGGANU 2010
4. Figure 1 shows one type of verification methods.Rajah 1 menunjukkan satu jenis kaedah pengesahan.
Figure 1 / Rajah 1Based on Figure 1, state the method used.
Berdasarkan Rajah 1, nyatakan kaedah yang digunakan. User Identification
Source Year Level
Bloom
PUTRAJAYA 2010
Questions 23 are in statements form. Write True or False for the following statements.
31
Soalan 23 adalah dalam bentuk pernyataan. Tuliskan Benar atau Palsu bagi pernyataan-pernyataan berikut.
23.i. Biometric device translates personal characteristic into a digital code that is
compared with a digital code stored in the database. Peranti biometrik menterjemah ciri-ciri individu kepada kod digital dan dibandingkan dengan kod digital yang tersimpan di dalam pangkalan data.
ii. SCSI is a special high-speed parallel port used to attach peripheral devices such as disk drive and printer. SCSI ialah tempat sambungan khas berkelajuan tinggi untuk menghubungkan peranti seperti
pemacu cakera dan pencetak.
Source Year Level
Bloom
UNKNOWN
2008
4. Choose your answers from the list below.Pilih jawapan daripada senarai di bawah.
Figure 3 shows different methods of authentication.Rajah 3 menunjukkan kaedah yang berbeza bagi menentukan ketulenan.
Figure 3 Rajah 3
Based on Figure 3, name the method used inBerdasarkan Rajah 3, namakan kaedah yang digunakan dalam
(i) ...................................................
Fingerprint RecognitionPengecam Cap Jari
Voice RecognitionPengecam Suara
Iris ScanningPengimbas Iris
Hand Geometry ScanningPengimbas Geometri Tangan
(ii)(i)
32
(ii) ...................................................
Source Year Level
Bloom
KELANG 2009
State whether the following statetements are true or false.
Source Year Level
Bloom
TERENGGANU 2009
2. TABLE 1 describes two authentication methods.
Method X Verify a user’s identify using items such as badgesand credit cards.
Method Y Verify a user’s identity based on the user’sbiological or behavioural characteristics.
TABLE 1State(i) Method X(ii) Method Y
33
Source Year Level
Bloom
PCGHS 2009
5. Figure 01 shows the authentication and verification technologies.Rajah 01 menunjukkan teknologi pengesanan dan pengesahan
Figure 01 Rajah 01
a. Name the Technology A. Namakan teknologi A
b. State another example for Technology A. Nyatakan satu contoh lain bagi Teknologi A
Source Year Level
Bloom
WPKL 2009
Question 4 Soalan 4Choose your answers from the list below .Pilih jawapan dari senarai yang diberikan dibawah.
Fingerprint RecognitionPengecam CapJari
Voice recognitionPengecam Suara
Iris ScanningPengimbas Iris
Hand Geometry ScanningPengimbas Geomatri Tangan
Figure 1 shows different methods of authentication.Rajah 1 menunjukkan kaedah yang berbeza bagi menentukan ketulenan.
Technology A
34
Figure 1Rajah 1
Based on Figure 1, name the method used inBerdasarkan Rajah 1, namakan kaedah yang digunakan dalam
i……………………ii…………………..
Source Year Level
Bloom
UNKNOWN
2. Which of the following is NOT an example of a biometric device? Yang manakah di antara berikut BUKAN contoh peralatan biometrik?
A. Smart card Kad pintar B. Face recognition system Sistem pengecam wajah C. Hand geometry system Sistem geometri tangan D. Fingerprint scanner Pengimbas cap jari
Source Year Level
Bloom
PERLIS 2009
1. Figure 1 shows one type of biometric device. Rajah 1 menunjukkan satu jenis peranti biometrik.
Figure 1 Rajah 1
35
i ii
(i) State the name of the device. Nyatakan nama peranti itu.
(ii) State the function of the device. Nyatakan fungsi peranti itu.
Source Year Level
Bloom
SPM 2009
Section B
27.
a) Explain two authentification methods that fulfill the Ministry of Defense need.Terangkan dua kaedah pengesahan yang sesuai untuk memenuhi keperluan Kementerian Pertahanan.
Source Year
Level
Bloom
PAHANG 2008
Question 1 Soalan 1
a) The above pictures show the examples of biometric device. List another TWO examples of biometric devices
that you have learnt.
Gambar-gambar di atas menunjukkan contoh biometrik. Senaraikan DUA lagi contoh biometrik yang telah
anda pelajari. [2M]
b) State the need of authentication.
Nyatakan keperluan authentication. [2M]
Source Year Level
Bloom
PERLIS 2008
36
Fingerprint Recognition Iris Scanning
As a part of security measure Ministry of Defense wants to apply new security method that can prevent unauthorized access to the confidential area inside the building. You are hired as the consultant to install the security system.
Kementerian Pertahanan hendak melaksanakan kaedah keselamatan yang baru yang dapat melindungi capaian yang tidak sah ke dalam bahagian sulit dalam bangunan. Anda ditugaskan sebagai perunding untuk memasang system keselamatan
26. (a) List TWO types of Intellectual Property Protection.
(i) ____________________________
(ii) ____________________________[2 marks]
(b) Based on the pictures below, name TWO biometric devices used for authentication.
(i)
(ii)
Source Year
Level
Bloom
PETALING PERDANA 2008
27. Figure 13 shows two methods of Authentication and Verification
Rajah 13 menunjukkan dua kaedah dalam Authentication dan Verification
Figure 13 Rajah 13
(a) Based on figure 13 :
(i) State X…………………………………………………….. [1 marks]37
Method of Authentication and Verification
Authentication Verification
Biometric Device
Call Back System
X Processed object
Nyatakan X……………………………………………….. [1 markah]
(ii) State the right method of verification for the following case :
Nyatakan kaedah pengesahan yang betul bagi kes berikut:
Show the exam slip to verify that you are the valid candidate for the exam.
Menunjukkan slip peperiksaan untuk mengesahkan yang kamu adalah calon yang sebenarnya untuk menduduki peperiksaan
(b) State two examples of biometric device.
Nyatakan dua contoh alat biometrik:
26. Figure 11 shows the examples of biometric device.Rajah 11 menunjukkan contoh-contoh peranti biometrik.
Figure 11 Rajah 11
(i) List another TWO examples of biometric devices that you have learnt.Senaraikan DUA lagi contoh peranti biometrik yang telah anda pelajari.
[2 markah](ii) State the need of authentication.
Nyatakan keperluan pengesahan ketulenan. [2 markah]
Source Year Level
Bloom
KELANG 2009
Section C
1.2.3.1 List effects of controversial contents on society: i. Pornography and ii. Slander;
Section A
1. Statement below is about controversial issue. Kenyataan di bawah ini adalah tentang isu kontroversi
Fingerprint Recognition Iris Scanning
38
Azman is a Muslim. One day, he received a “spam” e-mail stating that his favourite drink “Power-B” uses non-halal food colouring, but he does not know if the source of the content is credible or true. He decides to forward the e-mail to 50 of his friends.
Statement 2 Kenyataan 2Based on Statement 2 above, Berdasarkan Kenyataan 2 di atas,i. Azman has convicted ____________ii. List another effect of controversial content Senarakan kesan lain dari kandungan kontroversiSlander / Pornography
Source Year Level
Bloom
SABAH 2010
Question 16Soalan 16
Write TRUE or FALSE in the spaces provided in the Answer Sheet.
Tulis BENAR atau PALSU diruangan yang disediakan di kertas jawapan
16. (a) Criminal acts such as exploitation of women and children are effects of
slander.
Tindakan jenayah seperti mengekplotasikan wanita dan kanak-kanak adalah kesan dari fitnah.
(b) An employee of a big company spread rumours which were not true about his employer causing the company to lose many clients. This is an example of an effect of slander.
Seorang pekerja yang menyebaran khabar-khabar angin yang tidak benar mengenai majikannya telah menyebabkan syarikat kehilangan banyak pelanggan. Ini adalah contoh kesan daripada fitnah.
Source Year
Level
Bloom
PAHANG 2008
2. Which of these is an impact of slander towards society?Yang manakah kesan fitnah terhadap masyarakat?A. Closer relationship.
Hubungan lebih rapat.B. Trust among people.
Kepercayaan di antara manusia.C. Higher moral behaviour.
Perlakuan moral lebih tinggi.D. Bad reputation of people
39
Reputasi buruk pada seseorang.
4.
Figure 4 Rajah 4
The situation in the Figure 4 can give negative impact to society.What is the computer crime committed?
Situasi dalam Rajah 4, boleh memberikan kesan negatif kepada masyarakat. Apakah bentuk jenayah komputer yang dilakukan?
A. Pornography Pornografi
B. Hacking Menggodam
C. Slander Fitnah
D. Fraud Penipuan.
Source Year Level
Bloom
UNKNOWN
2009
3. Mei Ling has just posted an article on “Famous artist Kasey Tan is a drug addict and child abuser” to her Facebook. She purposely wants to damage the reputation of this artist. Mei Ling’s action is called ____________.
Source Year Level
Bloom
PCGHS 2009
2 . Suhana spreads a rumor that a Minister is receiving bribes. Suhana’s conduct is calledSuhana menyebarkan khabar angin bahawa seorang Menteri menerima rasuah. Perbuatan Suhana dikenali sebagai
A Hijacker PerampasB Slander FitnahC Cracker Memecah kata laluanD Hacker Penggodam
Source Year Lev Bloom40
Amran had written an e-mail about his fellow friend stealing books from the library, which is not true. Amran then sent the e-mail to five other friends.
Amran telah menulis satu e-mail tentang rakannya yang telah mencuri buku di perpustakaan awam, walhal ianya tidak benar. Amran kemudiannya telah menghantar e-mail tersebut kepada lima orang rakannya yang lain.
elPAHAN
G2009
Section B
26.Ahmad has received an e-mail stating that his favourite soda drink “Soda Moda” uses foodcolouring that is not advisable by The Ministry of Health. He does not know the truth of thee-mail but he has forwarded the e-mail to 50 of his friends. Soda Moda label also has beenmanipulated into a picture that tends to exploit women in a distasteful manner.
Ahmad telah menerima e-mail yang menyatakan minuman kegemarannya “Soda Moda”menggunakan pewarna yang tidak dibenarkan oleh Kementerian Kesihatan. Dia tidak dapatmemastikan kebenaran kandungan e-mail itu tetapi telah menghantar e-mail itu kepada 50orang rakannya. Label “Soda Moda” telah dimanipulasi kepada gambar yang cenderunguntuk mempergunakan wanita dengan cara yang tidak sopan.
Figure 3 Rajah 3
Based on Figure 3, answer the following question:Berdasarkan Rajah 3, jawab soalan-soalan berikut:
a) List TWO controversial contents that stated in Figure 3.Senaraikan DUA kandungan kontroversi yang dinyatakan dalam Rajah 3.
[2 marks]
b) State ONE impact of controversial content in society from 3(a).Nyatakan SATU kesan kandungan kontroversi dalam masyarakat dari 3(a).
[1 mark]c) Give ONE way to prevent the problem in 3(a) above.
Berikan SATU cara untuk menghalang masalah dalam 3(a) di atas.[1 mark]
Source Year Level
Bloom
JOHOR 2008
Section C
1.2.3.2 Describe the process of filtering to control access to controversial contents.
Section A
1. Figure 2 shows part of a algorithm for a web page filter.Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.
Figure 2 / Rajah 2State the filtering method used in the algorithm.Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
41
Site blockingSource Year Lev
elBloom
PAHANG
2010
3. Keyword blocking is a process that filters all traffic between a protected network
or “inside” network and a less trustworthy or “outside” network.
A. True B. False
Source Year Level
Bloom
PERLIS 2008
3. Below are the examples on how to control the access to controversial content:
Di bawah adalah contoh bagaimana untuk mengawal capaian kepada kandungan yang kontroversi.
I. Install antivirus Menginstall antivirusII. Referred to by URLs Merujuk kepada URLsIII. Use filtering software Menggunakan tapisan perisian IV. Rate the content of websites Mengkadarkan kandungan laman web.
A. I and IIB. I, II and IVC. II, III and IVD. All at the above.
Source Year
Level
Bloom
GOMBAK 2008
3. Figure 2 shows the flowchart of internet filtering method.Rajah 2 menunjukkan carta alir mengenai kaedah penapisan internet.
Keyword in banned word list?
Users key in the keyword
Browser shuts down
Page starts downloading
True
False
Keyword in banned word list?
42
Figure 2 Rajah 2 Name the method.
Namakan kaedah tersebut.
Source Year Level
Bloom
KELANG 2009
2. Internet filtering uses both site blocking and __________ which could catch the sites that are not on the blocked list.Penapisan Internet boleh menggunakan kedua-dua penghalang laman dan__________ yang boleh mengesan laman-laman yang tiada dalam senarai yang terhalang.
Source Year Level
Bloom
KELANTAN
2009
3. State whether the following statement is True or False.
Nyatakan sama ada pernyataan berikut Benar atau Palsu.
Web filtering software is a program that restricts access to specified Web sites.
Perisian penapisan Web ialah sebuah program yang menghadkan capaian bagi
sesetengah laman Web.
Source Year Level
Bloom
PERLIS 2009
3. Figure 2 shows methods of Internet Filtering.Rajah 2 menunjukkan kaedah Penapisan Internet.
Figure 2Rajah 2
X is ____________________________________X adalah ________________________________
Source Year Level
Bloom
SPM 2007
2. Figure 2 shows part of an algorithm for a web page filter.Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.
Internet FilteringPenapisan Internet
Keyword BlockingHalangan Kata Kunci
X Web Rating SystemSistem Perkadaran Webb
43
Figure 2 Rajah 2
State the filtering method used in the algorithm. Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
Source Year Level
Bloom
SPM 2009
Section B
26 Johnson’s father found out recently that Johnson has been accessing controversial contents online in his room.
(a) State two possible effects of Johnson’s activities on himself. [2 marks]
(b) Explain one way Johnson’s father can control Johnson’s access to those contents.
[2 marks]Source Year Level Bloom
SARAWAK (A)
2008
26. Figure 7 is an excerpt from an online newspaper.
Rajah 7 menunjukkan petikan daripada akhbar atas talian
44
The Malaysian Coalition for the Prevention of Child Sexual Abuse (MCPSA) produce statistic that 1.5 millions pornographic website occur in the Internet. Recently former Prime Minister, Tun Dr Mahathir Mohamad suggested to produce a software that can filter pornographic materials in the Internet in this country
(modified from Utusan article online25 Oktober 2005)
Badan Bertindak Kesedaran Penderaan Seksual Kanak-Kanak (MCPSA) mengeluarkan statistik bahawa 1.5 juta laman web pornografi terdapat dalam Internet.Baru-baru ini pula bekas Perdana Menteri, Tun Dr. Mahathir Mohamad mengesyorkan supaya diadakan perisian untuk menyaring bahan-bahan pornografi dalam Internet di negara ini.
( diubahsuai dari rencana Utusan online 25 Oktober 2005)
Figure 7 Rajah 7
Based on the excerpt on Figure 7:
Berdasarkan petikan dalam rajah 7:
(a) Referring to the statistic by MCPSA on the increasing pornographic website, state two effect on the society
Merujuk kepada statistik yang dikeluarkan oleh MCPSA berkenaan pertambahan laman web pornografi, nyatakan dua kesan kepada masyarakat.
(b) You have been requested to implement the proposals which are recommended by Tun Dr Mahathir to produce the software in order to filter pornographic materials. Explain one suitable process of filtering.
Anda diminta membantu untuk menjayakan cadangan yang disyorkan oleh Tun Dr. Mahathir supaya diadakan perisian untuk menyaring bahan-bahan ponorgrafi. Terangkan satu proses penapisan yang sesuai.
Source Year Level
Bloom
KELANTAN
2009
Section C
1. Aris is a form 4 student. His mother, Puan Asiah just bought him a personal computer. She has set amethod to filter the content in the Internet, Whenever Aris types a URL with the words such as “sex”or “porno”, he could not access the website.Aris seorang pelajar tingkatan 4. Ibunya, Puan Asiah telah membelikan sebuah komputer peribadi. Diatelah menetapkan kaedah untuk menapis bahan-bahan dalam Internet. Apabila Aris menaip alamatlaman sesawang yang mengandungi perkataan seperti “seks” atau “porno”, dia tidak boleh mengakseslaman sesawang tersebut.
Based on the situation above,Berdasarkan situasi di atas,(a) (i) Name the method that Puan Asiah uses to control the website access.
Namakan kaedah yang digunakan oleh Puan Asiah untuk menapis capaianlaman sesawang.
(ii) State the impact to Aris, if Puan Asiah did not control the website accessNyatakan kesan kepada Aris jika capaian laman sesawang tidak dikawaloleh Puan Aishah.
(b) Name two methods that can be used to limit the Internet access other than the one stated in (a) (i).Namakan dua kaedah yang boleh digunakan untuk menapis capaianInternet, selain dari yang dinyatakan pada (a)(i).
(a) (i) Keyword BlockingHalangan Kata Kunci / Tapisan Kata Kunci
(ii) Can lead to criminal act such as exploitation towards women/childrenBoleh menjurus kepada salahlaku jenayah seperti eksploitasi kaum wanita dan kanak-kanakOR
45
ATAU- Can lead to sexual addiction- Boleh menjurus kepada ketagihan seksORATAU- Can develop low moral values/immorality- Boleh menjurus kepada keruntuhan akhlak/moralOR Any Other Relevant Answer.ATAU Mana-mana jawapan Yang Relevan
(b) (i) Site Blocking Halangan Tapak/Laman Web/Sesawang(ii) Web Rating System Sistem Penarafan Laman Web/Sesawang
Source Year Level
Bloom
JOHOR 2010
1.2.4.1 Explain the need for Cyber Law.
Section A
In the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet. So we need to protect the Internet and other online communication technologies.Beberapa tahun kebelakangan, banyak pertikaian dan isu dibangkitkan tentang keselamatan dan integriti maklumat, status perundangan bagi transaksi atas talian, kebersendirian dan kerahsiaan maklumat, hak harta intelek dan keselamatan data kerajaan di Internet. Jadi, kita perlu melindungi Internet dan teknologi atas talian yang lain.
1. This statement above refer to Kenyataan di atas ini merujuk kepadaA. Cyber Law
Undang-undang SiberB. Code of Ethics
Kod EtikaC. Computer Crime
Jenayah KomputerD. Computer Ethics
Etika KomputerA
Source Year Level
Bloom
MELAKA
2010
3. Figure 3 shows the Malaysian Cyber Law
Rajah 3 menunjukkan Undang-undang cyber di Malaysia
46
A. Copyright Act 1987
Akta Hak Cipta 1987
B. Communications and Multimedia Act 1998
Akta Multimedia dan Komunikasi 1998
C. Digital Signature Act 1997
Akta Tandatangan Digital 1997
D. Computer Crimes Act 1997
Akta Jenayah Komputer 1997
E. Telemedicine Act 1997
Akta Teleperubatan 1997
Fill in the blank with the correct statement in Figure 3 .
Isikan tempat kosong dengan pernyataan yang betul dalam Rajah 3.
(i) ……………… secures electronic communications especially on the Internet.
…………………melindungi komunikasi elektronik terutamanya internet.
(ii) ………………gives protection against the misuses of computers and computer criminal activities such as unauthorized use of programmes, illegal transmission of data or messages over computers and hacking and cracking of computer systems and networks.
……………… memberi perlindungan dalam mencegah penyalahgunaan komputer dan aktiviti jenayah komputer seperti penggunaan program-program yang tidak dibenarkan, penghantaran mesej dan data yang tidak sah melalui komputer dan menceroboh sistem komputer dan rangkaian.
(iii) ……………………….. ensures that only qualified medical practitioners can practise telemedicine and that their patient's rights and interests are protected.
………………………..memastikan hanya pengamal perubatan yang layak sahaja boleh mengendalikan teleperubatan dan hak-hak pesakit dilindungi.
(iv) The implementation of …………………………. ensures that information is secure, the network is reliable and the service is affordable all over Malaysia.
Pelaksanaan…………………………………..memastikan maklumat adalah selamat, rangkaian boleh dipercayai dan perkhidmatan yang mampu digunakan oleh semua rakyat Malaysia.
Source Year Level
Bloom
UNKNOWN
2009
Section B
Section C
1. The following is a text on computer crime in a Television station broadcasting.
Berikut adalah teks mengenai jenayah computer di sebuah stesen siaran Telivision.
47
Figure 3 Rajah 3
Aizat bertugas sebagai seorang penyunting di sebuah syarikat penerbitan rancangan television swasta.. Beliau menggunakan kepakarannya dalam bidang ICT untuk membuat suntingan terhadap rancangan-rancangan telivision tersebut bagi menjaga kualitinya sebelum disiarkan oleh stesen-stesen television. Tanpa kebenaran pihak syarikat tersebut Aizat telah membuat rakam salin terhadap rancangan television terbitan tersebut serta menjualnya di internet.Aizat works as an editor in a private television broadcasting. He uses his expertise in ICT for editing the television programs in order to preserve the quality before they were broadcast by the television station. Without company’s permission Aizat has made copies of the television programs and sell them via Internet.
Based on the text: / Berdasarkan teks itu:Explain the importance of Cyber Law to the editing company.
Terangkan kepentingan Undang-undang Siber untuk Syarikat penerbitan tersebut.
Explain important cyber law to company One important cyber law to company – 2 marks
Copyright for material
Source Year Level
Bloom
KELANTAN
2010
1.2.4.2 Explain briefly the computer crimes below: i. Fraud, ii. Copyright Infringement, iii. Theft and iv. Attacks
Section A
1. Sazali has copied a copyrighted article from the Internet to use in his assignment. However, heignores the author’s name in his assignment. Sazali is __________.Sazali telah menyalin satu artikel dari internet untuk digunakan sebagai bahan kerja kursus.Walaubagaimanapun, beliau tidak meletakkan nama pengarang tersebut dalam kerjakursusnya. Sazali telah___________.A. committing a blue collar crime.
melakukan jenayah kolar biru.B. taking advantage of the Internet facilities.
mengambil kesempatan terhadap kemudahan internet.C. violating the rights secured by a copyright
melanggar peraturan hak cipta.D denying the owner’s rightful possession of the article
menafikan hak pengarang yang memiliki artikel tersebut.C
Source Year Level
Bloom
PERLIS 2010
2. Based on the situation above, write A, B, C or D to show the type of computer crime is being described.Berdasarkan situasi di atas, tulis A, B, C atau D untuk menunjukkan jenis jenayah komputer yang diterangkan
di bawah.
48
Duplicating and distributing copies of audio tapes and computer programs without permission and authorization from the individual or company that created the program is illegal.
Membuat salinan dan mengagihkan salinan-salinan audio, program-program komputer tanpa kebenaran individu atau syarikat adalah aktiviti haram.
A. Computer theft / Pencuri computer
B. Computer fraud / Penipuan computer
C. Computer attack / Serangan computer
D. Copyright infringement / Pelanggaran hak cipta
D. Copyright InfringementSource Year Lev
elBloom
PUTRAJAYA 2010
3. Choose the correct answer from the box.Pilih jawapan yang tepat dari kotak di bawah.
A ______ is defined as any criminal activities that are related to use of computers._______ didefinisikan sebagai aktiviti jenayah yang dilakukan dengan menggunakan komputer.COMPUTER CRIME
Source Year Level
Bloom
PERLIS 2010
4. Table 2 shows the activities of computer crime. Jadual 2 menunjukkan aktiviti jenayah komputer
P Computer AttackSerangan Komputer
Q Computer TheftKecurian Komputer
R Copyright InfringementPencabulan Hakcipta
S Computer FraudPenipuan Komputer
Table 2Jadual 2
Based on Table 2, write P, Q, R or S for the following statement:Berdasarkan Jadual 2, tuliskan P, Q, R atau S bagi pernyataan berikut:
i. Nazre transfer his company profit to his own account.Nazre memindahkan keuntungan syarikat ke dalam akaun peribadinya
ii. Kamal downloaded an assignment from the internet and claimed it is his.Kamal memuat turun tugasan dari internet dan mendakwa kepunyaanyaCOMPUTER THEFTCOPYRIGHT INFRINGEMENT
49
Source Year Level
Bloom
PERLIS 2010
5. Which of the following activity NOT a computer crime?Mana di antara aktiviti berikut BUKAN satu jenayah komputer?A Sam made a few copies of the original CD that he bought and sell to his friends at cheaper price.
Sam membuat beberapa salinan CD asal yang dia beli dan menjual salinan tersebut kepada rakannyadengan harga yang lebih murah.
B Ahmad, a bank manager transferred the customers’ payments to his own account.Ahmad, seorang pengurus bank memindahkan bayaran yang dibuat oleh pelanggan ke akaun peribadinya.
C Zaki plagiarising the material from internet for his class assignment.Zaki menciplak bahan yang diperolehi dari internet untuk tugasannya.
D Din discovered a computer virus and sent the virus to his friends via email.Din menemui satu virus komputer dan menyebarkan virus itu melalui emel kepada rakan-rakannya.
CSource Year Lev
elBloom
PERLIS 2010
4. Daniel sets up a web page with the purpose of allowing someone else's music, videos, or software to be distributed and downloaded without the owner's permission. His action is considered as _____________________.
Daniel membina laman web yang membenarkan muzik, video, atau perisian seseorang disebarkan dan dimuat turun tanpa kebenaran pemiliknya. Tindakan beliau dikatakan sebagai ______________.
Source Year
Level
Bloom
GOMBAK 2008
2. Based on the statements below.
The activities above are categorized asA. computer theft
B. computer fraud
C. computer attacks
D. copyright infringement
Source Year
Level
Bloom
PETALING PERDANA 2008
01 Which of the following is NOT the example of computer fraud?
Manakah antara berikut BUKAN contoh penipuan computer?
A. E-mail hoaxes
E-mel palsu
50
Act of stealing computer equipment Act of stealing or illegally copying
software
B. Investment Schemes by Internet
Skim Pelaburan melalui Internet
C. Programmed Fraud
Program Palsu
D. Diverts goods to the wrong destinations
Menghantar barangan ke destinasi lain.
Source Year Level BloomKL 2008
1. Which of the following are the examples of computer crimes?
A. Fraud, theft and chatting.B. Fraud, theft and computer attack.C. Fraud, theft, auction and computer attack.D. Fraud, theft, chatting and computer attack.
Source Year Level
Bloom
JOHOR 2008
4. Which of the following is NOT the example of computer fraud?
Manakah antara berikut BUKAN contoh penipuan computer?
A. E-mail hoaxes E-mel palsu
B. Investment Schemes by Internet Skim Pelaburan melalui Internet
C. Programmed Fraud Program Palsu
D. Diverts goods to the wrong destinations Menghantar barangan ke destinasi lain.
Source Year Level
Bloom
UNKNOWN
2009
24 Table 7 shows types of computer crimes.Jadual 7 menunjukkan jenis jenayah computer.
A Computer AttackB Computer FraudC Computer Theft
Table 7 Jadual 7
Based on Table 7, select A, B or C to categorise the following activities:Berdasarkan Jadual 7, pilih A, B atau C bagi kategori aktiviti berikut.
(i) David who has no qualification claims he is a skin specialist and prescribes the medicine through his website.David yang tidak mepunyai kelayakan mengaku dia adalah pakar kulit dan mengesahkan senarai ubat-ubatan melalui laman webnya.
(ii) Philip taps into the data transmission of a courier company and diverts the goods to the wrong destination.
51
Philip memasuki saluran penghantaran data syarikat kiriman ekpress dan mengubahala barang ke destinasi lain.
Source Year Level
Bloom
JOHOR 2009
3. The statement in figure 2 refers to computer crimes.Pernyataan di rajah 2 merujuk kepada jenayah computer.
Downloading movie without authorisation.Memuat turun filem tanpa kebenaran
Figure 2 Rajah 2
The activities above are categorized underAktiviti di atas dikategorikan sebagaiA. Computer theft Pencurian komputerB. Computer attack Serangan computerC. Computer fraud Penipuan computerD. Copyright infringement Pelanggaran hakcipta
Source Year Level
Bloom
JOHOR 2009
3. Table 1 shows several terms of computer crime. Match the statements with the given answers. Jadual 1 menunjukkan beberapa terminologi dalam jenayah komputer. Padankan pernyataan dengan jawapan yang diberi.
Table 1 Jadual 1
Source Year Level
Bloom
PUTRAJAYA 2009
Section B
52
Computer CrimeJenayah Komputer
A
Copyright InfringementPelanggaran Hak Cipta
B
Any activities taken to disrupt the equipment of computer systems Sebarang aktiviti yang diambil untuk mengganggu peralatan sistem komputer.
i.
Any criminal activity that is related to the use of computers.Sebarang aktiviti jenayah yang berkaitan dengan penggunaan komputer.
ii.
Unauthorised use of another person’s property. Penggunaan tanpa kebenaran ke atas milikan orang lain
iii.
Computer AttackPencerobohan Komputer
C
Computer TheftPencurian Komputer
D
David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3 songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the software. One day, he finds that his computer is getting slow and keeps on duplicating files.David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering memuat turun perisian hakcipta dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. David menggunakan kepakarannya dalam bidang ICT untuk mendapatkan nombor siri yang tidak sah untuk mengaktifkan perisian yang telah dimuat turun. Pada suatu hari komputer David menjadi perlahan dan sering membuat salinan fail tertentu secara berulang.
1. Based on the situation below, answer the following questions.
Name the type of computer crime that David has committed.
Namakan jenis jenayah komputer yang dilakukan oleh David.______________________________________________________
Copyright InfringementSource Year Lev
elBloom
MELAKA
2010
Section C
31. Statement 2 refers to misconduct activities.Pernyataan 2 merujuk kepada aktiviti salahlaku.
Statement 2 Pernyataan 2
Based on the above statement:Berdasarkan pernyataan itu:
(a) Explain briefly about the computer crime stated in the above situation. Terangkan secara ringkas jenayah komputer yang dinyatakan di dalam situasi di atas.
(b) Explain two reasons why we need to have cyber law in computing. Jelaskan dua sebab mengapa undang-undang siber perlu dalam dunia pengkomputeran.
Source Year Level
Bloom
PERAK 2009
1.3.1.1 Define computer security.
53
Kadri likes to watch movie. He prefers to download the movies rather than buy original CDs as his collection. Sometimes, he copies the movies into CDs and sells them to his friends.
Kadri suka menonton filem. Dia lebih suka memuat turun filem dari membeli filem yang asli untuk koleksi peribadi. Kadang kala dia menyalin filem tersebut ke dalam CD dan menjual CD tersebut kepada rakan-rakannya.
Section A
3. Fill in the blank with the correct answer.Isikan tempat kosong dengan jawapan yang betul.
i. Ethics is used to produce ethical computer users while _____ must be follow to prevent the miss use of computers.Etika digunakan untuk melahirkan pengguna komputer yang beretika manakala ________wajiblah dipatuhi untuk mencegah penyalahgunaan komputer.
ii. ______________ means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. ____________ bermaksud melindungi sistem komputer dan maklumat yang terkandung dalam sistem daripada penceroboh yang tidak diundang, kerosakan atau pengubahsuaian yang tidak diingini.
Source Year
Level
Bloom
PERAK 2008
Section B
Section C
1.3.2.1 Explain briefly the different threats to computer security: i. Malicious code, ii. Hacking, iii. Natural disaster and iv. Theft
Section A
1. Table 3 shows statements about a program. Jadual 3 menunjukkan pernyataan mengenai satu program.
Table 3 / Jadual 3 Based on table 3 , name H. Berdasarkan jadual 3 , namakan H A. Virus
B. Spyware C. Kid Program D. Operating System
SPYWARESource Year Lev
elBloom
SELANGOR 2010
2. Write the words that would complete the following statement: Tulis perkataan yang dapat melengkapkan pernyataan berikut :
…………………………….. is a program placed on a computer without the user’s knowledge that secretly collects information about user. …………………………….. adalah program yang dipasang di dalam komputer tanpa
54
H is a program placed in the computer system without the user knowledge, and it secretly collects information from the computer system about user.H merupakan satu pogram yang berada dalam komputer tanpa pengetahuan pengguna dan mengumpul maklumat pengguna tanpa disedari.
pengetahuan pengguna yang mengumpul maklumat rahsia mengenai pengguna. Spyware
Source Year Level
Bloom
PERAK 2010
3. Below are the examples on how the computer technology threatens the privacy of our data.Berikut merupakan contoh-contoh bagaimana teknologi komputer mengancam kerahsiaan data.I Spyware II Cookies III Phishing IV FirewallA I, II and IIIB I, II and IVC I, III and IVD II, III and IVA
Source Year Level
Bloom
PERLIS 2010
1. Table 1 shows several terms of computer crime.Jadual 1 menunjukkan beberapa terminologi dalam jenayah komputer.
A Trojan horseB WormC Trapdoor
Table 1 / Jadual 1
Based on Table 1, write A, B or C to match the following statements:Berdasarkan Jadual 1, tulis A, B atau C untuk memadankan pernyataan berikut:(i) A program that copies and spreads itself through a network.
Program yang menyalin dan menyebarkan dirinya melalui rangkaian.(ii) A program that allows someone to access the program and use it with special privileges.
Program yang membenarkan seseorang mengakses sesuatu program dan menggunakannya.B / C
Source Year Level
Bloom
KEDAH 2010
1. Match the statements (a) and (b) with the terminologies in Table 2.
Padankan kenyataan (a) dan (b) dengan istilah dalam Jadual 2.
Table 2Jadual 2
a) Agent X broke into Defense Department computer Room of USA Government and download certain data to sell to the Russian secret agents.Agen X telah menceroboh masuk ke bilik komputer Jabatan Pertahanan Amerika Syarikat dan memuat turun
data untuk dijual kepada Agen Rahsia Rusia.
Malicious codeTheftFraud
55
b) A student from China created a program and spread it through the Internet to attack the United States Department of Defense computer system. Seorang pelajar dari Negara China telah mencipta satu program dan menyebarkannya melalui internet untuk menyerang sistem komputer Jabatan Pertahanan Amerika Syarikat.
Source Year Level
Bloom
KELANTAN
2010
15. Table 1 shows different types of computer threats.
Computer threat Description
P Unauthorized access into a computer system.
R A program that attaches itself to another program and can destroy or co-exists with the program.
Table 1Name the computer threats:i. Pii. R
Source Year
Level
Bloom
KEDAH 2008
19. Table 3 shows types of computer threats.Jadual 3 menunjukkan jenis-jenis ancaman komputer..
ATaking another person's property without permission.Mengambil harta orang lain tanpa kebenaran.
B
Any code in any part of a software or script that is intended to cause undesired effects, security breaches or damage to a system. Sebarang kod dalam perisian atau skrip yang bertujuan untuk menyebabkan kesan luar jangka, pencerobohan sekuriti atau kerosakan pada sistem.
Table 3 Jadual 3State A and B Nyatakan A dan B(i) A : (ii) B :
Source Year Level
Bloom
UNKNOWN
2008
1. A computer infected by virus, worm, or Trojan Horse may have any of the following symptoms except ___________.
56
Berikut adalah beberapa tanda yang menyebabkan sebuah komputer dijangkiti oleh virus, worm, atau Trojan Horse kecuali _________________.A. available memory is more than expected.
kandungan memori yang lebih.B. system properties change.
“system properties” bertukar.C. existing programs and files disappear.
kehilangan fail-fail atau program-program yang sedia ada.D. files become corrupted.
berlaku kerosakan fail.
Source Year Level
Bloom
UNKNOWN
2008
2. “Quarantine is a separate area of the hard disk that holdsthe infected file until the infection can be removed.”
The statement above refers to
A. FirewallsB. Anti-virusC. Time bombD. Malicious code
4 Statement 1 describes a type of security threat.
It is typically carried out by e-mail or instant messaging. It is an example of social engineering techniques used to fool users. It often directs users to enter details at a fake website whose look and feel are
almost identical to the legitimate one.
Statement 1
Based on statement 1, identify the threat.
A. HackingB. PhishingC. SpywareD. Malicious code
Source Year Level BloomSARAWAK (A) 2009
1. Which are the following malicious codes can copy and spread themselves through a network ?Di antara yang berikut, yang manakah boleh menyalin dan meyebarkan dirinya melalui rangkaian?
A Trojan horse Trojan horseB Logic bomb Bom logicC Trapdoor TrapdoorD Worm Cecacing
57
Source Year Level
Bloom
PAHANG
2009
Section B
1. Following is the definition for a type of computer crimesBerikut adalah definisi untuk jenis kejahatan komputer
Unauthorized use of another person’s property with the intention to deny the owner the rightful possession of that property penggunaan yang tidak dibenarkan harta orang lain dengan maksud untuk menolak pemilik sah pemilikan harta itu.
a) Based on the definition above, give two (2) examples of the activity that reflects the statementabove.Berdasarkan definisi di atas, berikan dua (2) contoh aktiviti yang mencerminkan kenyataan di atas.
b) Hacking is a source of threat in computer security Hacking adalah sumber ancaman dalam keselamatan komputer
(i) Briefly define hacking / secara singkat definisikan hacking (ii) Give an example activity in hacking / Berikan contoh aktiviti dalam hackinga) example: - transfer of payment to the wrong accounts
- tap into data transmission lines on database at no cost- divert goods to the wrong destination- or other suitable answer that means other people’s property to his own illegally
b) refer to notesSource Year Lev
elBloom
SABAH 2010
2. Based on the situation below, answer the following questions.
David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3 songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the software. One day, he finds that his computer is getting slow and keeps on duplicating files.David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering memuat turun perisian hakcipta dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. David menggunakan kepakarannya dalam bidang ICT untuk mendapatkan nombor siri yang tidak sah untuk mengaktifkan perisian yang telah dimuat turun. Pada suatu hari komputer David menjadi perlahan dan sering membuat salinan fail tertentu secara berulang.
What has happened to David’s computer?
Apakah yang telah terjadi kepada komputer David?___________________________________________________________
computer virus / worm attack
Source Year Level
Bloom
MELAKA
2010
58
Section C
2. Figure 20 shows symptoms of a computer problemRajah 20 menunjukkan simptom pada sebuah komputer.
.
Figure 20 / Rajah 20
- screen displays unusual messages / skrin rnemaparkan mesej pelik- files become corrupted / fail menjadi rosak.- files mysteriously appear / muncul fail yang menjadi tanda tanya
Based on Figure 20: / Berdasarkan Rajah 20:(a) Identify the type of computer threat which matches the symptoms.
Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.Trojan horseState two different examples of the threat. / Nyatakan dua contoh berlainan bagi ancaman itu.
] worm / virus(b) Describe two reasons why the computer may have been affected by the threat in (a).
Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).No antivirus / not update antivirus / visit risky website / etcSuggest two ways to prevent it.Cadangkan dua cara untuk mengatasinya.1. Back up your important files. At this point it is a good idea to take the time to back up your files. If possible, compile all of Your photos, documents, Internet favorites, etc., and burn them onto a CD or DVD or save them to some other external storage device. It is vital to note that these files cannot be trusted, since they are still potentially infected. (Actually, it’s good practice to back up your files on a regular basis so that if they do get infected, you might have an uninfected set you can restore.)2. Scan your machine. Since your computer (including its operating system) may be infected with a malicious program, it is safest to scan the machine from a live CD (or “rescue” CD) rather than a previously installed antivirus program. Many antivirus products provide this functionality. Another alternative is to use a web-based vir us removal service, which some antivirus software vendors offer (try searching on “online virus scan”). Or you could just try Microsoft’s web-based PC Protection Scan. The next best action is to install an antivirus program from an uncontaminated source such as a CD-ROM. If you don’t have one, there are many to choose from, but all of them should provide the tools you need.
Source Year Level
Bloom
SPM 2010
1. The following is a text on computer crime in a Television station broadcasting.
Berikut adalah teks mengenai jenayah computer di sebuah stesen siaran Telivision.
59
Aizat bertugas sebagai seorang penyunting di sebuah syarikat penerbitan rancangan television swasta.. Beliau menggunakan kepakarannya dalam bidang ICT untuk membuat suntingan terhadap rancangan-rancangan telivision tersebut bagi menjaga kualitinya sebelum disiarkan oleh stesen-stesen television. Tanpa kebenaran pihak syarikat tersebut Aizat telah membuat rakam salin terhadap rancangan television terbitan tersebut serta menjualnya di internet.Aizat works as an editor in a private television broadcasting. He uses his expertise in ICT for editing the television programs in order to preserve the quality before they were broadcast by the television station. Without company’s permission Aizat has made copies of the television programs and sell them via Internet.
Based on the text: /Berdasarkan teks itu:
State the computer crime that has been done by Aizat.
Nyatakan jenaya komputer yang telah dilakukan oleh Aizat.
Source Year Level
Bloom
PERLIS 2010
31. Ahmad’s School bought Antivirus software to enhance proficiency in computer security. That software is used for all computer related activities. Ahmad needs to ensure effective usage of that software. Figure 14 shows several activities by Ahmad.Sekolah Ahmad membeli perisian Antivirus bagi meningkat tahap keselamatan komputer di sekolahnya. Perisian tersebut telah digunakan untuk sebarang aktiviti yang melibatkan penggunaan komputer. Ahmad telah ditugaskan untuk memastikan penggunaan perisian tersebut secara berkesan. Rajah 14 menunjukkan sebahagian aktiviti yang dibuat oleh beliau.
FIGURE 14RAJAH 14
(a) What are the activities carried out by Ahmad?[3 marks]
Apakah aktiviti-aktiviti telah dilakukan oleh Ahmad ?[3 markah]
(b) Explain TWO impacts of the threats in Figure 14.[4 marks]
Terangkan DUA kesan ancaman yang telah disebut dalam Rajah 14.[4 markah]
Source Year Level
Bloom
UNKNOW60
Virus Found !! Brontok… Work.32 Trojan-Spy.Win32
All Virus has been deleted
N
31. While you are doing maintenance for the school’s computer, you found out that some
hardware from certain computers are missing and some computers start to display unusual
message.
Semasa anda sedang menyelenggara komputer di sekolah, didapati beberapa perkakasan
komputer telah hilang dan beberapa buah komputer menayangkan mesej yang pelik.
i. Explain 2 threats in the situation above.
Terangkan 2 ancaman-ancaman dalam situasi di atas. [4 marks]
ii. Suggest three approaches that you can apply to prevent them from reoccur.
Cadangkan tiga pendekatan yang boleh diambil untuk mengelakkan ancaman di atas dari
berlaku. [3 marks]
Source Year Level
Bloom
PERLIS 2009
32. Bank XYZ Berhad has a computer network system to run their operations between its branches in Malaysia. An unknown man was seen entering the computer control room at its headquarters in Kuala Lumpur after office hours. The following day, the system administrator found that all data in the server were removed and a few computer hardware missing. It was also reported that the bank computer network was down.
Bank XYZ Berhad mempunyai sistem rangkaian komputer untuk melaksanakan operasi antara cawangannya di Malaysia. Seorang lelaki yang tidak dikenali telah dilihat memasuki bilik kawalan komputer ibu pejabatnya di Kuala Lumpur selepas waktu pejabat. Keesokan harinya, pentadbir sistem mendapati semua data dalam komputer pelayan telah dihapuskan dan beberapa perkakasan komputer telah hilang. Rangkaian komputer bank juga dilaporkan tidak berfungsi lagi.
a) Explain one possible threat done by the unknown man. [2 marks]Terangkan satu ancaman yang mungkin dilakukan oleh lelaki yang tidak dikenali itu.
b) After an investigation, the management found that the threats come from the lack of security procedure at the computer control room.Setelah siasatan dijalankan, pihak pengurusan mendapati bahawa ancaman itu berlaku disebabkan oleh kelemahan prosedur keselamatan di bilik kawalan komputer.
Explain two actions on human aspect on security procedure that should be taken by the management to increase security at the computer control room. [4 marks]Terangkan dua tindakan prosedur keselamatan dari aspek kemanusiaan yang boleh diambil oleh pengurusan untuk meningkatkan keselamatan di bilik kawalan komputer.
Source Year Level
Bloom
SPM 2007
1.3.3.1 Select the appropriate security measures to overcome the identified computer threats
Section A
4. Why do we need to backup our data? Mengapakah kita perlu membuat salinan data?
I To ensure that our data can still be used if the original is corruptedUntuk memastikan data kita boleh digunakan jika berlaku sesuatu terhadap asal.
II To ensure our files, program or disk that can be used if the original source is lost, damage or destroyed.
61
Boleh menggunakan fail, program atau cakera yang telah disalin jika sumber rosak hilang atau musnah.III To prevent our files or program from malicious software
Menghalang fail atau program daripada perisian yang tidak dikehendaki.IV To protect our files from viruses .
Menghalang fail daripada virus.A I and II B I and IIIC I, II and IIID I, II and IVA
Source Year Level
Bloom
PERLIS 2010
5. Table 1 shows security measures to overcome computer threats Jadual 1 menunjukkan langkah keselamatan untuk mengatasi ancaman komputer
XHuman aspects
Aspek kemanusiaan
YFirewall
Firewall
ZCryptography
Kriptografi
Based on Table 1, match the security measures with the following statements by writing X , Y or ZBerdasarkan Jadual 1, padankan langkah keselamatan dengan pernyataan berikut dengan menulis X , Y atau Z(i) To function in a network environment to prohibit unauthorized access to your computer via the Internet.
Berfungsi dalam rangkaian bagi menghalang capaian kepada komputer melalui Internet secara tidak sah.
(ii) As a security measure, make sure a computer room is always locked.
Sebagai langkah keselamatan, pastikan bilik komputer sentiasa berkunciY / X
Source Year Level
Bloom
KELANTAN
2010
06 Why do we need to backup our data ?Mengapakah kita perlu membuat salinan data ?
I To ensure that our data can still be used if the original is corruptedUntuk memastikan data kita boleh digunakan jika berlaku sesuatu terhadap data asal.
62
Table 1Jadual 1
II To ensure our files, program or disk that can be used if the original source is lost, damaged or destroyed.Boleh menggunakan fail, program atau cakera yang telah disalin jika sumber asal rosak hilang atau musnah.
III To prevent our files or program from malicious software Menghalang fail atau program daripada perisian yang tidak dikehendaki.
IV To protect our files from viruses . Menghalang fail daripada virus.
A I and II
B I and III
C I, II and III
D I, II and IV
Source Year Level BloomKL 2008
3(a) There are different threats to computer security. The threat in Figure 2 is categorised as ………………..
3(b)
The security measure described above are measures taken to prevent ……………….
Source Year Level BloomSARAWAK
(A)2008
20. Table 4 shows three types of security procedures.Jadual 4 menunjukkan tiga jenis prosedur keselamatan.
A FirewallB Backup
63
FIGURE 2
prevent access by using locks, smartcard or password prevent portability by restricting the hardware from being
moved detect and guard all exits and record any hardware transported
C CryptographyBased on Table 4, write A , B , or C to the following statements:Berdasarkan Jadual 4, tulis A , B , atau C untuk pernyataan-pernyataan berikut:
(i) A process of transforming plaintext into ciphertext then back again.Adalah proses menukarkan teks biasa kepada kod rahsia dan kembali semula kepada asal.
(ii) A piece of hardware or software which function in a network environment to prevent some communications forbidden by security policy.Perkakasan atau perisian yang berfungsi untuk menghalang komunikasi terlarang oleh polisi
keselamatan dalam persekitaran rangkaian
Source Year Level
Bloom
UNKNOWN
2008
2. Table 1 shows the security measures taken to prevent computer threat.
Jadual 1 menunjukkan langkah keselamatan dalam menangani ancaman komputer.
Table 1Jadual 1
Based on Table 1, write A, B or C as a measure to solve the following problems :
Berdasarkan Jadual 1, tulis A, B atau C sebagai satu langkah untuk menyelesaikan masalah berikut:
(i) While you are surfing the Internet, your computer displays a lot of pop-up windows and disturbs your surfing.
Sewaktu kamu melayari internet, komputer kamu memaparkan banyak tetingkap pantulan dan mengganggu kamu.
(ii) You have spent a week typing your 24 pages of assignment. You are worried that something bad might happen to the computer which can cause you to lose data.
Kamu telah menghabiskan masa selama satu minggu untuk menaip tugasan sebanyak 24 muka surat. Kamu bimbang jika sesuatu yang tidak diingini akan berlaku terhadap komputer dimana menyebabkan kamu kehilangan data
A Data Backup
Sandaran Data
B Cryptography
Kriptografi
C Anti spyware
Anti Spyware
64
Source Year Level
Bloom
TERENGGANU 2009
11 Table 2 shows security measures to overcome computer threats.Jadual 2 menunjukkan langkah keselamatan untuk mengatasi ancaman
komputer.
X FirewallDinding Api
Y CryptographyKriptografi
Z Physical aspectsAspek fizikal
Table 2 Jadual 2
Based on Table 2, choose X , Y or Z for the statements given.Berdasarkan Jadual 2, pilih X, Y atau Z untuk pernyataan yang diberi.
(i) Functions in a network environment to prohibit unauthorized access to your
computer via the Internet.Berfungsi dalam rangkaian bagi menghalang capaian tanpa kebenaran kepada komputer melalui Internet.
(ii) As a security measure, make sure a computer room is always locked.Sebagai langkah keselamatan, pastikan bilik komputer sentiasa berkunci.
Source Year Level
Bloom
JOHOR 2009
7. Why do we need to backup our data?Mengapakah kita perlu membuat salinan data?
I To ensure that our data can still be used if the original is corruptedUntuk memastikan data kita boleh digunakan jika berlaku sesuatu terhadap asal.
II To ensure our files, program or disk that can be used if the original source is lost, damaged or destroyed.Boleh menggunakan fail, program atau cakera yang telah disalin jika sumber rosak hilang atau musnah.
III To prevent our files or program from malicious softwareMenghalang fail atau program daripada perisian yang tidak dikehendaki.
IV To protect our files from viruses .Menghalang fail daripada virus.
A I and IIB I and IIIC I, II and III
65
D I, II and IV
Source Year Level
Bloom
PAHANG
2009
2. Below are steps for scanning viruses. Arrange the steps in sequence.
Berikut merupakan langkah-langkah untuk mengimbas virus. Susun langkah mengimbas mengikut urutan yang betul.
I. Scan the selected file Imbas fail yang telah dipilih II. Choose an antivirus program Pilih program antivirusIII. Wait until the scanning process is finished and the result is displayed Tunggu proses pengimbasan sehingga selesaiIV. Select files or folders that need to be scanned Pilih fail atau folder yang hendak diimbas
A. IV, II, I and IIIB. III, I, II and IIIC. II, IV, I and IIID. I, II, III and IV
Source Year Lev
elBloom
PUTRAJAYA 2009
3. Table 1 shows the problems which commonly occur when user uses the computer.
Jadual 1 menunjukkan masalah-masalah yang sering dihadapi oleh pengguna ketika menggunakan komputer.
PWhile you are surfing the Internet, your computer displays a lot of pop-up windows and disturbs your surfing.
Ketika anda sedang melayari Internet, komputer anda mempamerkan banyak tetingkap pantulan dan mengganggu paparan anda.
Q
You are surfing the Internet to do your school assignment. When you want to download a file, your computer does not allow it to happen.
Anda sedang melayari internet untuk melakukan tugasan sekolah anda. Apabila anda ingin memuat turun sebuah fail, komputer anda tidak membenarkan anda berbuat demikian.
Table 1 Jadual 1
Based on Table 1, state the security measures that can be taken to solve the problem:
Berdasarkan Jadual 1 , Nyatakan langkah keselamatan yang boleh diambil bagi menyelesaikan masalah tersebut:
(i) P (ii) Q
66
Source Year Level
Bloom
KELANTAN
2009
1. Companies use …………………to protect network resources from outsiders and
to restrict employees’ access to sensitive data such as payroll or personnel records.
Syarikat-syarikat korporat menggunakan ........................ untuk melindungi sumber rangkaian syarikat
terutamanya data sensitif seperti pendapatan pekerja atau rekod peribadi daripada capaian oleh orang
luar dan pekerja dalaman.
A. Antivirus antivirus
B. anti – spyware anti - spyware
C. cryptography kriptografi
D. firewall firewall
Source Year Level
Bloom
PERLIS 2009
Section B
6. Figure 2 shows a type of security measure. / Rajah 2 menunjukkan satu langkah keselamatan
Figure 2 / Rajah 2Based on Figure 2, / Berdasarkan Rajah 2,(i) State the type of security measure used. / Nyatakan langkah keselamatan yang digunakan.(ii) Suggest an activity on human aspect security measure that can be carried out by an organization.Cadangkan satu aktiviti yang boleh dilaksanakan di dalam sesebuah organisasi untuk meningkatkan keselamatan dari aspek manusia.Data Backup / Sandaran Data/Salinan DataOrganisational User Self Awareness / Kesedaran Diri Pengguna Dalam Organisasi
Source Year Level
Bloom
JOHOR 2010
67
5. Figure 1shows the computer security threatRajah 1 menunjukkan ancaman keselamatan komputer.
Based on Figure 1, / Berdasarkan Rajah 1, (i) State the type of computer threat. / Nyatakan jenis ancaman komputer.(ii) Identify the type of security measure that can be done to prevent the threat in (i). / Kenalpasti langkah keselamatan yang boleh dilakukan untuk mengelak ancaman di (i).Natural Disaster / Bencana alam
Human Aspect / Aspek kemanusiaan
Source Year Level
Bloom
JOHOR 2010
26 Based on Situation 1, answer the following question:Berdasarkan Situasi 1, jawab soalan-soalan berikut:
Situation 1 Situasi 1
a. List two examples of computer threat is mentioned in the situation above? Senaraikan jenis ancaman komputer yang disebutkan dalam situasi di atas.
[2 marks]
b. State two things that Haziq can do to enhance the security of his data while accessing the Internet. Nyatakan dua perkara yang boleh dilakukan oleh Haziq untuk meningkatkan lagi keselamatan data beliau semasa melayari internet. [2 marks]
Source Year
Level
Bloom
GOMBAK 20068
Haziq likes to access the internet. One day, while surfing the internet, his computer starts to run a little weird. He noticed that the modem LEDs were blinking even after he has stopped surfing. His system seemed to get slow and suddenly reboots. Haziq is sure that somebody has logged onto his computer.
Haziq gemar melayari internet. Pada suatu hari, semasa Haziq sedang melayari internet, beliau mendapati komputer beliau tidak laju seperti biasa. Beliau juga mendapati bahawa ‘LED’ pada modem berkelip walaupun beliau tidak lagi melayari internet. Komputer beliau juga ‘reboot’. Haziq pasti terdapat pengguna lain yang telah memasuki sistem komputernya.
8
26. Statement below shows a situation. Penyataan di bawah merupakan satu situasi.
a. Explain the kind of computer threat that Mamat has created? [2 marks]Jelaskan jenis ancaman komputer yang telah dicipta oleh Mamat? [2 markah]
b. State two ways to avoid this threat from spreading into your computer? [2 marks]Nyatakan dua cara untuk mengelakkan ancaman ini merebak ke dalam komputer anda.
Source Year Level
Bloom
UNKNOWN
2009
This section consists of five questions. You are required to answer all questions.Bahagian ini mengandungi lima soalan. Anda dikehendaki menjawab semua soalan.
26. Puan Maria is the examination secretary at SMK Bunga Raya Putri Jaya. One day, she found that certain data in the school server were missing and the other had been modified.
Puan Maria adalah setiausaha peperiksaan di SMK Bunga Raya Putri Jaya. Pada suatuhari, dia mendapati data- data tertentu dari komputer pelayan sekolah telah hilang dan ada yang telah diubahsuai .
a) State TWO threats that cause the problems faced by Puan Maria.
Nyatakan DUA ancaman yang boleh menyebabkan masalah yang dihadapi oleh Puan Maria
b) State TWO security measures that Puan Maria can take to safeguard against these threats.
Nyatakan DUA langkah keselamatan yang boleh diambil oleh Puan Maria untukmelindungi dari ancaman-ancaman berikut.
Source Year Level
Bloom
KEDAH 2009
26. Based on statements below:
Berdasarkan
penyataan di
bawah:
69
Maniam writes a computer program that interacts with the operating system.
The program randomly erases files and displays weird messages. He plans to
distribute the programs via e-mail.
Maniam menulis program komputer yang dapat berinteraksi dengan sistem
pengoperasian. Program tersebut memadam fail-fail dan memaparkan mesej-
mesej yang aneh secara rawak. Dia merancang untuk menyebarkan program
tersebut melalui mel elektronik.
Mamat writes a computer program that interacts with the operating system. The program randomly erases files and displays weird messages. He plans to distribute the programs via e-mail.
Mamat menulis program komputer yang dapat berinteraksi dengan sistem pengoperasian. Program tersebut memadam fail-fail dan memaparkan mesej-mesej yang aneh secara rawak. Dia merancang untuk menyebarkan program tersebut melalui mel elektronik.
Statement 2 Pernyataan 2
a) Explain the kind of computer threat that Maniam has created? [2 marks]
Jelaskan jenis ancaman komputer yang telah dicipta oleh Maniam? [2 markah]
b) State two ways to avoid this threat from spreading into your computer? [2 marks]
Nyatakan dua cara untuk mengelakkan ancaman ini merebak ke dalam
komputer anda. [2 markah]
Source Year Level BloomHULU LANGAT 2009
26.
Based on situation above; Berdasarkan situasi di atas;
(i) What do you think is the cause of this problem and determines the appropriate measures to overcome this threat
Pada fikiran anda apakah penyebab kepada masalah ini dan kenalpasti kaedah yang sesuai untuk mengatasi ancaman ini. [2 marks]
(ii) What do you think is the cause of this problem and determines the appropriate measures to overcome the threat on Situation 2.
Pada fikiran anda apakah penyebab kepada masalah ini dan kenalpasti kaedah yang sesuai untuk mengatasi ancaman dalam Situasi 2.
70
Situation 1
Your computer displays strange behavior. For instance, you discover that “assignment.doc” has suddenly been renamed to “assignment.exe”.
Komputer anda menunjukkan paparan yang pelik. Sebagai contoh, anda mendapati fail ”assignment.doc” tiba-tiba telah ditukar nama kepada ”assignment.exe”.
Situation 2
Laila has to send a document file containing confidential information by e-mail to her manager. One day, she found that the file had been accessed by an unauthorized user.
Laila perlu menghantar satu fail dokumen yang mengandungi maklumat sulit kepada pengurusnya melalui e-mel. Satu hari, dia mendapati fail tersebut telah dibuka oleh pengguna yang tidak dibenarkan.
[2 marks]Source Year Lev
elBloom
PUTRAJAYA 2009
Section C
32. Bank XYZ Berhad has a computer network system to run their operations between its branches in Malaysia. An unknown man was seen entering the computer control room at its headquarters in Kuala Lumpur after office hours. The following day, the system administrator found that all data in the server were removed and a few computer hardware missing. It was also reported that the bank computer network was down.
Bank XYZ Berhad mempunyai sistem rangkaian komputer untuk melaksanakan operasi antara cawangannya di Malaysia. Seorang lelaki yang tidak dikenali telah dilihat memasuki bilik kawalan komputer ibu pejabatnya di Kuala Lumpur selepas waktu pejabat. Keesokan harinya, pentadbir sistem mendapati semua data dalam komputer pelayan telah dihapuskan dan beberapa perkakasan komputer telah hilang. Rangkaian komputer bank juga dilaporkan tidak berfungsi lagi.
a) Explain one possible threat done by the unknown man. [2 marks]Terangkan satu ancaman yang mungkin dilakukan oleh lelaki yang tidak dikenali itu.
c) After an investigation, the management found that the threats come from the lack of security procedure at the computer control room.Setelah siasatan dijalankan, pihak pengurusan mendapati bahawa ancaman itu berlaku disebabkan oleh kelemahan prosedur keselamatan di bilik kawalan komputer.
Explain two actions on human aspect on security procedure that should be taken by the management to increase security at the computer control room. [4 marks]Terangkan dua tindakan prosedur keselamatan dari aspek kemanusiaan yang boleh diambil oleh pengurusan untuk meningkatkan keselamatan di bilik kawalan komputer.
Source Year Level
Bloom
SPM 2007
31. Figure 11 is an excerpt from a daily newspaperRajah 11 adalah petikan daripada akhbar harian.
Figure 11 Rajah 11
71
MALAYSIA NEWS.COMYOUR DAILY NEWSPAPER
24 OCT 2008RM5.00
Online TheftBank Employee Charged
Kuala Lumpur 23 Oct. A bank employee was charged in the high court yesterday for breaking into the bank computer system and electronically transferring RM1.2 million to his personal bank account. The HOT Bank employee was charged…
Kecurian Atas TalianKakitangan Bank DidakwaKuala Lumpur 23 Okt. Seorang pekerja bank telah didakwa di mahkamah tinggi semalam di atas kesalahan memecah masuk ke dalam system computer bank dengan memindahkan wang berjumlah RM1.2 juta secara elektronik untuk dimasukkan ke dalam akaun bank peribadinya. Pekerja HOT Bank itu telah didakwa…
Based on the excerpt on Figure 11Berdasarkan petikan dalam Rajah 11
(b) Describe two suitable security measures that should be taken by the bank to prevent computer crime.Terangkan dua langkah keselamatan yang sesuai yang patut diambil oleh pihak bank untuk mengatasi jenayah computer itu
b) Explain why bank clients should be protected under the Malaysian Cyber Law?Mengapa pelanggan bank harus dilindungi di bawah Undang-undang Siber Malaysia?
Source Year Level
Bloom
SPM 2008
1.3.3.2 Apply the correct security procedures. i. Antivirus, ii. Anti-Spyware, iii. Cryptography, iv. Firewall, v. Data backup and vi. Human aspects
Section A
7. State whether the following statement is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu.Anti-spyware is a software that we use to protect the computers from spyware.Anti-spyware ialah perisian yang kita gunakan untuk melindungi komputer daripadaspyware.TRUE / BENAR
Source Year Level
Bloom
TERENGGANU 2010
8. Table 1 shows statements about a process of hiding information by altering the actual information into different representation.Jadual 1 menunjukkan pernyataan mengenai satu proses yang menyembunyikan maklumat sebenar dengan menukarkan dalam bentuk persembahan yang lain.
Sahent works as a manager in a finance company. He wants to send a top secret report to Fahmi who is working in another branch. Sahent asks Joanan, his secretary, to send this report to Fahmi. When Joana tries to read the report, she finds out that the report has been encrypted.
Sahent bekerja sebagai seorang pengurus di syarikat kewangan. Beliau ingin menghantar sebuah laporan yang amat sulit kepada Fahmi yang bekerja di cawangan lain. Sahent meminta setiausahanya, Joana untuk menghantar laporan tersebut kepada Fahmi. Apabila Joana ingin membaca laporan itu, dia mendapati bahawa laporan tersebut telah dikripkan.
Table 1Based on Table 1 : / Berdasarkan Jadual 1:
Name the Process to the encrypted text in the report.Namakan prosess pada laporan yang dikripkan.ENCRYPTION
Source Year Level
Bloom
SELANGOR 2010
9. Based on Figure 2 , state the method of security measure used.Berdasarkan Rajah 2, nyatakan kaedah langkah keselamatan yang diigunakan.
72
Figure 2Rajah 2CRYPTOGRAPHY
Source Year Level
Bloom
PERAK 2010
10. Rearrange the procedures in scanning virus. Susun semula prosedur mengimbas virus.
I. Scan the selected file / Imbas fail yang dipilihII. Choose an antivirus in the program / Pilih program antivirusIII. Wait while the program is scanning and the result is display Tunggu sehingga program membuat imbasan dan keputusan dipaparkanIV. Select file/ folder/drive that need to be scan /Pilih file yang ingin diimbas
E. I, II, III, IV F. II, IV, I, IIIG. III, I, IV, II H. IV, II, I, III
Source Year Level
Bloom
PERAK 2010
11. Write True or False for the following statement Tuliskan Benar atau Palsu pada pernyataan berikut
Anti Spyware is a program to scan and remove virus from computer system.Anti Spyware adalah satu program untuk mengimbas dan membuang virus dari sistem komputer.F
Source Year Level
Bloom
KELANTAN
2010
Figures 2 show types of security measures in computer security.Rajah 2 menunjukkan jenis langkah-langkah keselamatan di dalam keselamatan komputer.
73
ATTACK DWWDFN ALGORITHM
PLAIN TEXT
CHIPER TEXT
Figure 2Rajah 2Based on Figure 2, identify YBerdasarkan Rajah 2, kenalpasti YfirewallSource Year Lev
elBloom
KELANTAN
2010
4. Table 1 shows security measures to overcome computer threatsX Human aspectsY FirewallZ Cryptography
Based on Table 1, match the security measures with the following statements by writing X , Y or Z
(i) To function in a network environment to prohibiting unauthorized access to your computer via the Internet.
(ii) As a security measure, make sure a computer room is always locked.
Source Year
Level
Bloom
PAHANG 2008
5. Figure 5 shows the process of cryptography. State whether the process shown is True or False.
Rajah 5 menunjukkan proses pelaksanaan kriptografi. Nyatakan sama ada susunan proses yang ditunjukkan Benar atau Palsu.
Figure 5 Rajah 5
2 State whether the following statements are True or False.
74
ChipertextTeks Siber
PlaintextTeks Biasa
ChipertextTeks Siber
Table 1
(i) We can control access to pornography by turning on the firewall in the computer.
(ii) A firewall is a hardware or software that is used to protect your computer against people or programs that try to connect to your computer without invitation.
Source Year Level BloomSARAWAK (A) 2009
3 Figure 1 shows the process of cryptography.
Figure 1
Based on Figure 1, identify
(i) X(ii) Y
Source Year Level BloomSARAWAK (A) 2009
8. Below are steps for scanning viruses. Arrange the steps in sequence.Berikut merupakan langkah-langkah untuk mengimbas virus. Susun langkah mengimbas mengikut urutan yang betul.
I Scan the selected filemengimbas fail yang telah dipilih
II Choose an antivirus programPilih program antivirus
III Wait until the scanning process is finished and the result is displayedTunggu proses pengimbasan sehingga selesai
IV Select files or folders that need to be scannedPilih fail atau folder yang hendak diimbas
A IV, II, I and IIIB III, I, II and IIIC II, IV, I and IIID I, II, III and IV
Source Year Level
Bloom
PAHANG
2009
4. Encryption and decryption are processes that involve in a ________________. An encrypted ordinary text is called ____________. A reversing process in order to retrieve the message sent is called ______________. Enkrepsi dan dekrepsi adalah proses yang berkaitan dalam____________. Enkrepsi juga dikenali sebagai ____________. Manakala proses menterjemah semula untuk mengetahui mesej yang dihantar pula dikenali sebagai________________
Source Year Level
Bloom
WPKL 2009
Plaintext Ciphertext PlaintextX Y
75
4. Cryptography is process associated with _________ and ________ . Kriptografi adalah proses yang berkaitan dengan _________ dan _________.
A. Encryption and TransformingB. Encryption and DecryptionC. Decryption and TransformingD. Decryption and Controlling
Source Year Level
Bloom
PUTRAJAYA 2009
3. Table 1 shows several security measures that can be used to protect computers and data. Match the given statements with the answers.
Jadual 1 menunjukkan beberapa ukuran keselamatan yang digunakan untuk melindungi komputer dan data. Padankan pernyataan yang diberi dengan jawapan.
Table 1 Jadual 1(i) A process of hiding information by altering the actual information into different representation.
Proses menyembunyikan maklumat dengan mengubahsuai maklumat sebenar kepada perwakilan yang berbeza.
(ii) A program that protects a computer against viruses. Satu program yang melindungi komputer daripada virus.
(iii) A piece of software which functions in a networked environment to prevent forbidden communications by the security.
Sejenis perisian yang fungsinya dalam persekitaran rangkaian untuk mencegah komunikasi terlarang
oleh keselamatan.
Source Year Level
Bloom
PERAK 2009
5. Figure 3 shows how cryptography works.Rajah 3 menunjukkan bagaimana kriptografi dilaksanakan.
Figure 3 Rajah 3Name H : Namakan : H
Source Year Level
Bloom
SPM 2007
2. Laila has to send a document file containing confidential information by e-mail to her manager. What Laila has to do to prevent unauthorised access to the contents of the file?
76
PlaintextTeks biasa H
PlaintextTeks biasa
EncryptEnkrip
DecryptDekrip
A. Data backupB. CryptographyC. AntivirusD. Firewall
Laila perlu menghantar satu fail dokumen yang mengandungi maklumat sulit kepada pengurusnya melalui e-mel. Apakah yang perlu dilakukan oleh Laila untuk menghalang capaian tidak sah ke atas kandungan fail itu?
A. Back up the file Menbuat sandaran bagi fail ituB. Encrypt the file Mengenkrip failC. Install firewall Memasang tembok apiD. Scan the file for viruses Scan the file for viruses
Source Year Level
Bloom
SPM 2008
Section B
1. PC02’s user scanned the hard disk using antivirus software. The result is shown in Figure 12(c).Pengguna PC02 mengimbas cakera keras menggunakan satu perisian antivirus. Hasil pengimbasanditunjukkan dalam Rajah 12(c).
Figure 12(c) / Rajah 12(c)
Based on Figure 12(c),Berdasarkan Rajah 20(c),State the action can be taken by the user of PC02. Justify your answer.Nyatakan tindakan yang boleh diambil oleh pengguna PC02. Berikan justifikasi anda.Action taken: Move to vaultJustification:The antivirus will quarantines the infected file.Quarantine is a separate area of hard disk that holds the infected file until the infection can be removed. This ensures other files will not be infected.
Source Year Level
Bloom
PAHANG
2010
2. Read the following situation:Baca situasi berikut:
77
(a) (i) What was happened to the club member’s list file?Apakah yang berlaku pada fail senarai nama ahli kelab ICT?
(ii) What should Nelly do before she open the file?Apakah yang perlu dilakukan oleh Nelly sebelum membuka fail tersebut?
(b) (i) State the step should be taken by Nelly to prevent this problem?Nyatakan langkah yang perlu diambil oleh Nelly untuk mencegah masalah ini?
(ii) Based on b (i), give one example of utility software that can be use.Berdasarkan b (i), berikan satu contoh perisian utiliti yang boleh digunakan.
(a) (i) The file has being infected/ attacked by virus.(ii) Scanning the thumb drive using antivirus software.
(b) (i) The computer in ICT room must be install antivirus software to preventdata or files for being infected/attacked by viruses.
(ii) Kaspersky /Avira / Norton Anti Virus/any relevant anti virus
Source Year Level
Bloom
PERLIS 2010
26 Copyright Infringement is defined as a violation of the rights secured by Copyright
78
Act.(a) Give TWO examples of Copyright Infringement. [ 2 marks ]
(b) Security measures are the precautionary measures taken towards possible dangers or damages. State the appropriate security measures to overcome the identified computer threats:
(i) Data Lost
(ii) Hiding information [ 2 marks ]
Source Year
Level
Bloom
PAHANG 2008
Section C
1. Based on the situation below, answer the following questions.
David always spends his leisure time surfing the Internet. He usually downloads proprietary software and MP3 songs and sells them to his friends. He uses his ICT knowledge to get the unauthorized serial number for the software. One day, he finds that his computer is getting slow and keeps on duplicating files. David selalu meluangkan masa lapangnya untuk melayari Internet. Dia sering memuat turun perisian hakcipta dan lagu-lagu MP3 untuk dijual kepada rakan-rakannya. David menggunakan kepakarannya dalam bidang ICT untuk mendapatkan nombor siri yang tidak sah untuk mengaktifkan perisian yang telah dimuat turun. Pada suatu hari komputer David menjadi perlahan dan sering membuat salinan fail tertentu secara berulang.
a. How can David prevent his computer from the problem in (b) in the future?
Bagaimanakah David dapat mengatasi masalah komputer yang dihadapi di (b) pada masa akan datang?___________________________________________________________
b. Other than the threat you mentioned in (b), give another computer threat
that could affect David’s computer.
Selain daripada ancaman yang dinyatakan di(b), berikan satu lagi ancaman lain yang mungkin berlaku kepada komputer David.
_______________________________________a) install antivirus / scan files for viruses before downloading
b) spyware/hackers
Source Year Level
Bloom
MELAKA
2010
79
80