spm-learnng area 1

10
LEARNING AREA 1 - 2009 1. Figure 1 shows one type of biometric device. Based on Figure 1, (i) State the name of the device (ii) State the function of the device. 2. Figure 2 shows part of an algorithm for a web page filter. Y N Downloadin g page Banned words in page? Stop Downloadin Continue

description

compilation of learning area 1 ICT

Transcript of spm-learnng area 1

Page 1: spm-learnng area 1

LEARNING AREA 1 - 2009

1. Figure 1 shows one type of biometric device.

Based on Figure 1,

(i) State the name of the device

(ii) State the function of the device.

2. Figure 2 shows part of an algorithm for a web page filter.

1

Y

N

Downloading page

Banned words in

page?

Stop Downloading

Continue

Page 2: spm-learnng area 1

Figure 2Rajah 2

State the filtering method used in the algorithm..

1. Write the words that would complete the following statement.

Buying books from an online shop and selling shoes on an internet auctions site are both example of …………………………..

SPM 2008

1. State the name of the first generation computer.

2. Laila has to send a document file containing confidential information by e-mail to her manager.What Laila has to do to prevent unauthorized access to the contents of the file?

A. Back up the fileB. Encrypt the fileC. Install firewallD. Scan the file for viruses.

3. Complete the following statements by filling in the blanks:

A …………… (i) ………….. level programming language uses codes, ………. (ii) ………. and is machine dependent.

4. Electronic mail is one of the most popular services on the internet. It makes business managers and administrators more productive by allowing them to share information, ideas and opinions easily.

In relation to electronic mail, state two example in each case which can be considered as:

(a) Ethical [2 mark]

(b) Law Breaking [2 mark]

2

Page 3: spm-learnng area 1

5. Figure 11 is an excerpt from a daily newspaper.

Based on the excerpt on Figure 11:

(a) Describe two suitable security measures that should be taken by the bank to prevent computer crime.

[4 mark]

(b) Explain why bank clients should be protected under the Malaysian Cyber Law? [3 mark]

3

Page 4: spm-learnng area 1

LEARNING AREA 1 - 2007

1. Figure 1 shows several generations of computer technology.

Match A, B or C with the following generations of computer technology.

(i) 1st Generation Computer

(ii) 2nd Generations Computer

2. Figure 2 shows methods of Internet Filtering.

Figure 2Rajah 2

X is ………………………………………………………………………………………

4

Internet Filtering

Keyword Blocking Web Rating SystemX

Page 5: spm-learnng area 1

3. Table 1 shows types of computer crimes.

A Computer Fraud

B Computer theft

C Computer attack

Table 1

Based on Table 1, write A, B or C to categorise the following activities:

(i) E-mail hoaxes, false claims of expertise on certain fields.

(ii) Tap into data transmission lines and intentional transfer of payments to the wrong account.

4. Figure 3 shows how cryptography works

Encrypt DecryptEnkrip Dekrip

Figure 3

Name H.

5. A series of step by step instructions telling the computer exactly what to do is called a ………………………………………………………………………………………………

Write True or False for the following statements:

1. Cyber law is a system of moral standards or values used as a guideline for computer users.

6. The following is a statement on information privacy.

5

Plaintext PlaintextH

Page 6: spm-learnng area 1

Based on the statement, list four ways of making personal data more private.

[4 marks]

7. Bank XYZ Berhad has a computer network system to run their operations between its branches in Malaysia. An unknown man was seen entering the computer control room at its headquarters in Kuala Lumpur after office hours. The following day, the system administrator found that all data in the server were removed and a few computer hardware missing. It was also reported that the bank computer network was down.

(a) Explain one possible threat done by the unknown man [2 marks]

(b) After an investigation, the management found that the threats come from the lack of security procedure at the computer control room.

Explain two actions on human aspect on security procedure that should be taken by the management to increase security at the computer control room.

[4 marks]

6

“ Information privacy refers to the right of individuals and organizations to deny or restrict the collection and use the information about them.”

Shelly, 2006

Page 7: spm-learnng area 1

SPM 2010

1. Complete the following statement :Information and Communication Technology is the use of computers , (i) ………………devices and (ii)…………………………. applications for processing , storing, retrieving, protecting and transmitting information from anywhere at anytime.

2. Figure 14 is a pie chart showing how students of SMK Taman Gembira communicate with their friends.

Based on Figure 14:

(a) State one reason why the students choose email to letters. [1 mark]

(b) State three reasons why email is better than Short Messaging System using handphone. [3 mark]

32. Figure 20 shows symptoms of a computer problem.

Based on Figure 20 :

(a) Identify the type of computer threat which matches the symptoms

7

letters

SMS

email

Screen displays unusual messages

Files become corrupted

Files mysteriously appear

Page 8: spm-learnng area 1

State two different examples of the threat. [3 marks]

(b) Describe two reasons why the computer may have been affected by the threat in (a)

Suggest two ways to prevent it. [4 marks]

8