Вы находитесь на странице: 1из 4

Schema BK2 2015

Section A
ANSWER SHEET

Question No. Candidate's Answer Marks


No. Soalan Jawapan Calon Markah
1 D 1
2 D 2
3 A 3
4 A 4
5 B 5
6 A 6
7 D 7
8 D 8
9 D 9
10 C 10
i. TRUE 11
11
ii. TRUE 12
12 Audio input 13
i. Q 14
13 ii. P 15
iii. R 16
14 Proprietary / closed software 17
i. TRUE 18
15
ii. TRUE 19
i. R 20
16
ii. P 21
i. Q 22
17 ii. P 23
iii. R 24
i. audio 25
18
ii. graphic 26
i. Notepad, word pad, ms word 27
19 ii. Adobe premier, sony vegas, movie maker, 28
pinnacle etc
i. B 29
20
ii. A 30
i. P 31
21
ii. Q 32
22 B 33
23 D 34
24 TCP/IP 35
25 D 36
Section B
26.
a) P- Primary storage, Q- Secondary storage [2 marks]
P- Storan primer, Q- Storan sekundar. . [2 markah]

b)
Primary Storage Secondary Storage,
Storan primer Storan sekundar
Holding data / Information Holds data / information Holds data / information
Memegang data/ Maklumat permanently temporarily
Pegang data/ maklumat Pegang data/ maklumat
secara kekal secara sementara

[2 marks]
[2 markah]

27

a. Computer theft is defined as the unauthorised use of another person’s property with the intention
to deny the owner the rightful possession of that property or its use.

Examples of computer theft include:

 transfer of payments to the wrong accounts


 tap into data transmission lines on database at no cost
 divert goods to the wrong destination
Mark
Define – 1 mark
Example – 1 mark

b. Hacking is a source of threat to security in computer. It is defined as unauthorised access to the


computer system by a hacker.

Examples of computer hacking include:


 virus,
 Trojan horse
 logic door
 trapdoor and backdoor
 worm
 many others.
Mark
Define – 1 mark
Example – 1 mark

28.
a) Name : Cable stripper [1]
Function : To cut and strip cables. [1]
b) Name : Crimp tool [1]
Function : To crimp RJ-45 connectors [1]
29. a.
linear interactivity non-linear interactivity
the user interacts with the multimedia allows the user to interact with the content
application without controlling the progress of according to what the user wants from the
the content. content. In other words, it is a two-way
communication.

b. The advantages of using N.

 Can changed or modified


 Can updated easily and is cheaper

30

a. i. Pornography
ii. Slander

b. i. Fingerprint Recognition
ii. Iris Scanning

Section C

31

a.
INPUT OUTPUT

. .

STORAGE

.
Input – 1 mark
Output – 1 mark
Storage – 1 mark

b. Input is any data or instructions that we enter into the computer system for processing.
Keyboard, mouse, scanner, barcode reader and digital camera are some example of input
devices.

Meaning – 1 mark
Example – 1 mark

c.
Primary storage Secondary storage
It stores data and programs that can be It stores data and programs for future use.
accessed directly by the processor.
RAM is volatile which means the programs It is non-volatile, which means that
and data in RAM are lost when the computer it does not need power to maintain
is powered off. the information stored in it.

1 Difference – 1 mark
Total – 2 marks

32.
a) can link - 192.168.1.201 [1]
cannot link -
192.168.1.200 [1]
190.168.1.202 / 192.166.1.202 / 192.168.33.202 [1]

b) - Same IP address [1]. No two PC in a network can have the same IP address. [1]
- Different class / subclass in IP addressing [1]. Shows that the PCs belong to different networks,
therefore cannot link. [1]