Вы находитесь на странице: 1из 7

LEARNING AREA 1 - 2009

1. Figure 1 shows one type of biometric device.


Based on Figure 1,
(i) State the name of the device
(ii) State the function of the device.
2. Figure 2 shows part of an algorithm for a web page filter.
Figure 2
Rajah 2
1
Y
N
Downloadin
g page
Banned
words in
page?
Stop
Downloadin
g
Continue
State the filtering method used in the algorithm.
.
1. rite the words that would complete the following statement.
Buying boo!s from an online shop and selling shoes on an internet auctions site are both
e"ample of ##########..
SPM 2008
1. State the name of the first generation computer.
2. $aila has to send a document file containing confidential information by e%mail to her
manager.
hat $aila has to do to prevent unauthori&ed access to the contents of the file'
(. Bac! up the file
B. )ncrypt the file
*. +nstall firewall
,. Scan the file for viruses.
-. *omplete the following statements by filling in the blan!s.
( ##### (i) ####.. level programming language uses codes, ###. (ii)
###. and is machine dependent.
/. )lectronic mail is one of the most popular services on the internet. +t ma!es business
managers and administrators more productive by allowing them to share information,
ideas and opinions easily.
+n relation to electronic mail, state two e"ample in each case which can be considered as.
(a) )thical
02 mar!1
(b) $aw Brea!ing
02 mar!1
2. Figure 11 is an e"cerpt from a daily newspaper.
2
Based on the e"cerpt on Figure 11.
(a) ,escribe two suitable security measures that should be ta!en by the ban! to prevent
computer crime.
0/ mar!1
(b) )"plain why ban! clients should be protected under the 3alaysian *yber $aw'
0- mar!1
LEARNING AREA 1 - 2007
1. Figure 1 shows several generations of computer technology.
3
3atch A, B or C with the following generations of computer technology.
(i) 1
st
4eneration *omputer
(ii) 2
nd
4enerations *omputer
2. Figure 2 shows methods of +nternet Filtering.
Figure 2
Rajah 2
X is #################################
-. 5able 1 shows types of computer crimes.
A *omputer Fraud
B *omputer theft
C *omputer attac!
4
+nternet Filtering
6eyword Bloc!ing eb 7ating System X
5able 1
Based on 5able 1, write A, B or C to categorise the following activities.
(i) )%mail hoa"es, false claims of e"pertise on certain fields.
(ii) 5ap into data transmission lines and intentional transfer of payments to the wrong
account.
/. Figure - shows how cryptography wor!s
)ncrypt ,ecrypt
Enkrip Dekrip
Figure -
8ame H.
2. ( series of step by step instructions telling the computer e"actly what to do is called a
####################################
rite True or False for the following statements.
1. *yber law is a system of moral standards or values used as a guideline for computer
users.
9. 5he following is a statement on information privacy.
Based on the statement, list four ways of ma!ing personal data more private.
0/ mar!s1
5
:lainte"t
:lainte"t
H
Information privacy refers to the right of iniviuals an organi!ations to
eny or restrict the collection an use the information a"out them.#
$helly, %&&'
;. Ban! <=> Berhad has a computer networ! system to run their operations between its
branches in 3alaysia. (n un!nown man was seen entering the computer control room at
its head?uarters in 6uala $umpur after office hours. 5he following day, the system
administrator found that all data in the server were removed and a few computer
hardware missing. +t was also reported that the ban! computer networ! was down.
(a) )"plain one possible threat done by the un!nown man
02 mar!s1
(b) (fter an investigation, the management found that the threats come from the lac! of
security procedure at the computer control room.
)"plain two actions on human aspect on security procedure that should be ta!en by
the management to increase security at the computer control room.
0/ mar!s1
$() %&*&
*. *omplete the following statement .
+nformation and *ommunication 5echnology is the use of computers , (i) ######
devices and (ii)##########. applications for processing , storing, retrieving,
protecting and transmitting information from anywhere at anytime.
%. Figure 1/ is a pie chart showing how students of S36 5aman 4embira communicate
with their friends.
6

letters

SMS
email
Based on Figure 1/.
(a) State one reason why the students choose email to letters. 01 mar!1
(b) State three reasons why email is better than Short 3essaging System using
handphone. 0- mar!1
-2. Figure 2@ shows symptoms of a computer problem.
Based on Figure 2@ .
(a) +dentify the type of computer threat which matches the symptoms
State two different e"amples of the threat. 0- mar!s1
(b) ,escribe two reasons why the computer may have been affected by the threat in (a)
Suggest two ways to prevent it. 0/ mar!s1
7

letters

SMS
email
Sreen displa!s unusual
messages
"iles #eome orrupted
"iles m!steriousl! appear

Вам также может понравиться