Академический Документы
Профессиональный Документы
Культура Документы
: : :
___________________________________________ 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
Answer Sheet Question No. No. Soalan 1 2 (i) (ii) 3 4 5 (i) (ii) 6 (i) (ii) 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 (i) (ii) Candidate's Answer Jawapan Calon Vacuum tubes C A B C TRUE TRUE Fingerprint reader/ fringerprint recognition Hand geometry reader/Iris scanner/Signature verification system TRUE TRUE D A A FRGH Encryption/Encrypting B B D TRUE TRUE American Standard Code for Information Interchange Network/networking/computer network/computer networking B C A Spreadsheet C B LAN WAN Satellite A Coaxial Twisted pair Marks Markah 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
(i) (ii)
(i) (ii)
(i) (ii)
3
36 Section B
3765/1
Jawapan (a) Data backup (1M) A data backup is a duplication of a file, program or disk that can be used if the original source is lost, damaged or destroyed. (1 M)
Markah
JUMLAH
2 4 2
26 (b)
b)-To secure data from the failure of hardware (hard disk fail,failure of motherboard) -To backup data from being attack by virus,worm ,spyawre etc * Choose any two
27 (a)
1 1 4 2 1 1
27 (b)
28 (a)
28 (b)
server
4 2
client
SULIT
3765/1
29 (a)
Figure 5a: Command Line Interface Figure 5b: Graphical user interface/ GUI GRAPHICAL USER INTERFACE
1 1
i. User have to memorize all the syntax to issue command ii. Difficult to use iii. Not user friendly iv. Take a long time to learn
i. User does not have to memorize all the syntax to issue command ii. Easy to use iii. User friendly iv. Take a short time to learn
2 4
30 (a) 30 (b)
*Accept any of these combination of DOS and GUI X : hub/swich/ router Y: modem X: network device that is used for connecting wired computers or device on a Local Area Network (LAN). Y: a device that convert digital signals from your computer into analog signals to send over the phone line (MODulation) and converts the phones analog signal into digital for the computer (DEModulation).
Section C
1 1 1 1 4
No. Soalan
Jawapan
Markah
JUM
31 (a)
i. Malicious code virus, Trojan horse, worm, logic bomb, trapdoor and backdoor (2M) ii. Theft - software theft, hardware theft (2M) iii. Nature / Environment Flood, Fire, Earthquakes, storms and tornados, Excessive Heat, Inadequate Power Supply (2M) iv. Hacking- computer security hacker, academic hacker, hobby hacker *Choose any two it is importants that the computer and the data they store are accessible and available when needed. (1M) Users take measures to protect their computers and data from lost,damage and misused.(1M) safely remove virus from your computer or pen drive. (1M) etc (any relevant answer) Utility is a type of system software that allows a user to perform maintenance-type tasks usually related to managing a computer, its devices or its programs.
31 (b)
32 (a)(i)
SULIT
3765/1
32 (a)(ii)
* choose any two of utility programs Usage: Anti virus is a program that protects a computer against viruses. (1m) Example: AVG antivirus, kapersky etc (1m) Usage: Use to manage files on a disk. (1m) File manager Example: Window explorer etc (1m) Usage: Remove redundant elements, gaps and unnecessary data from a computer storage space. (1m) Example: Winzip, Win RAR etc (1m) Usage: Compile technical information about a computer hardware and softwares. (1m) Example: Norton Utilities etc (1m) * Choose any two as stated on 32 (a)(ii) Ping 192.168.10.7
2
Virus protection
32 (b)
Data compression
Diagnostic utility
33 (a)
* jika [ping] sahaja 1m 33 (b) request time out Komputer yg tlibat: PC 2 PC 5 PC 6 Jika 3 betul (2m) Jika 1 @ 2 betul (1m)
4 7 1
33 (c)
Reasons: i) Same IP add between Pc2 and Pc 5 ( 1 m ) ii) Wrong IP number for PC 6 ( 1 m)