Вы находитесь на странице: 1из 4

NAMA NO.

KAD PENGENALAN ANGKA GILIRAN

: : :

___________________________________________ 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2

Answer Sheet Question No. No. Soalan 1 2 (i) (ii) 3 4 5 (i) (ii) 6 (i) (ii) 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 (i) (ii) Candidate's Answer Jawapan Calon Vacuum tubes C A B C TRUE TRUE Fingerprint reader/ fringerprint recognition Hand geometry reader/Iris scanner/Signature verification system TRUE TRUE D A A FRGH Encryption/Encrypting B B D TRUE TRUE American Standard Code for Information Interchange Network/networking/computer network/computer networking B C A Spreadsheet C B LAN WAN Satellite A Coaxial Twisted pair Marks Markah 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

(i) (ii)

(i) (ii) (i) (ii) (i) (ii)

(i) (ii)

(i) (ii)

SULIT (iii) Fiber optic

3
36 Section B

3765/1

No. Soalan 26 (a)

Jawapan (a) Data backup (1M) A data backup is a duplication of a file, program or disk that can be used if the original source is lost, damaged or destroyed. (1 M)

Markah

JUMLAH

2 4 2

26 (b)

b)-To secure data from the failure of hardware (hard disk fail,failure of motherboard) -To backup data from being attack by virus,worm ,spyawre etc * Choose any two

27 (a)

Figure 1a: primary storage Figure 1b: secondary storage


i. can store program and data ii. as a secondary storage iii. as an alternative storage

1 1 4 2 1 1

27 (b)

28 (a)

* Choose any two client/server network Because more than 20 computers

28 (b)

server

4 2

client

3756/1 2011 JPN Pahang

[Lihat sebelah SULIT

SULIT

3765/1

29 (a)

Figure 5a: Command Line Interface Figure 5b: Graphical user interface/ GUI GRAPHICAL USER INTERFACE

1 1

29 (b) COMMAND LINE INTERFACE

i. User have to memorize all the syntax to issue command ii. Difficult to use iii. Not user friendly iv. Take a long time to learn

i. User does not have to memorize all the syntax to issue command ii. Easy to use iii. User friendly iv. Take a short time to learn

2 4

30 (a) 30 (b)

*Accept any of these combination of DOS and GUI X : hub/swich/ router Y: modem X: network device that is used for connecting wired computers or device on a Local Area Network (LAN). Y: a device that convert digital signals from your computer into analog signals to send over the phone line (MODulation) and converts the phones analog signal into digital for the computer (DEModulation).
Section C

1 1 1 1 4

No. Soalan

Jawapan

Markah

JUM

31 (a)

i. Malicious code virus, Trojan horse, worm, logic bomb, trapdoor and backdoor (2M) ii. Theft - software theft, hardware theft (2M) iii. Nature / Environment Flood, Fire, Earthquakes, storms and tornados, Excessive Heat, Inadequate Power Supply (2M) iv. Hacking- computer security hacker, academic hacker, hobby hacker *Choose any two it is importants that the computer and the data they store are accessible and available when needed. (1M) Users take measures to protect their computers and data from lost,damage and misused.(1M) safely remove virus from your computer or pen drive. (1M) etc (any relevant answer) Utility is a type of system software that allows a user to perform maintenance-type tasks usually related to managing a computer, its devices or its programs.

31 (b)

32 (a)(i)

3756/1 2011 JPN Pahang

[Lihat sebelah SULIT

SULIT

5 Virus protection, File manager, Data compression, Diagnostic utility

3765/1

32 (a)(ii)

* choose any two of utility programs Usage: Anti virus is a program that protects a computer against viruses. (1m) Example: AVG antivirus, kapersky etc (1m) Usage: Use to manage files on a disk. (1m) File manager Example: Window explorer etc (1m) Usage: Remove redundant elements, gaps and unnecessary data from a computer storage space. (1m) Example: Winzip, Win RAR etc (1m) Usage: Compile technical information about a computer hardware and softwares. (1m) Example: Norton Utilities etc (1m) * Choose any two as stated on 32 (a)(ii) Ping 192.168.10.7
2

Virus protection

32 (b)

Data compression

Diagnostic utility

33 (a)

* jika [ping] sahaja 1m 33 (b) request time out Komputer yg tlibat: PC 2 PC 5 PC 6 Jika 3 betul (2m) Jika 1 @ 2 betul (1m)
4 7 1

33 (c)

Reasons: i) Same IP add between Pc2 and Pc 5 ( 1 m ) ii) Wrong IP number for PC 6 ( 1 m)

3756/1 2011 JPN Pahang

[Lihat sebelah SULIT

Вам также может понравиться