Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 7

Answer Sheet

Name
IC No
Question
No.
1.
2.
3.
4.
5
6
7
8
9
10
11
12
13 i )
ii )
iii )
14 i)
ii)
15 i)
ii)
iii)
16 i)
ii)
17 i )
ii )
18 i)
ii)
iii)
19. i )
ii)
iii )
20
21
22
23
24
25

Form:
Candidates Answer
B
D
D
A
B
B
C
B
C
C
A
A
S
R
Q
Iris scanning
Fingerprint recognition
Q
S
R

R
S
R
T

RJ45 connector
Network Interface Card/NIC
Cable stripper
radio waves
Microwaves
Infrared

False
True
True
False
True
True
TOTAL MARKS

Marks
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
23
25
26
27
28
29
30
31
32
33
34
35
36

Scheme Section B
1. a)
Copyright infringement is defined as a violation of the rights secured by
Copyright Act.
Pelanggaran hakcipta bermaksud pencabulan ke atas hak-hak yang
dilindungi oleh Akta Hakcipta..
Give TWO examples of copyright infringement
Berikan DUA contoh pelanggaran hakcipta
i.
ii.

Copying movie, software or CDs illegally


Selling pirate software
(any releven answers)

Mark
(1 mark for each correct answer)
b) i. Hand geometry scanning
ii. Iris scanning
Mark
(1 mark for each correct answer)
2.

Computer theft is defined as the unauthorised use of another persons property


with the intention to deny the owner the rightful possession of that property or its
use.
Examples of computer theft include:
transfer of payments to the wrong accounts
tap into data transmission lines on database at no cost
divert goods to the wrong destination

Mark
(Define 1 mark, Example 1 mark)
b.

Hacking is a source of threat to security in computer. It is defined as unauthorised


access to the computer system by a hacker.
Examples of computer hacking include:
virus,
Trojan horse
logic door
trapdoor and backdoor
worm
many others.
Mark
(Define 1 mark, Example 1 mark)

3.
a. X = Network Card , Y = Hub/Switch/Router
Mark
(1 mark for each correct answer)
b.

Function of X is provides connection between the computer and the networks


communications media OR supplies the basic addressing system used to get data
from PC to PC across a network.
Function of Y is control the flow of data on a network.

Mark
(1 mark for each correct answer)
4.

i)

Two differences of user interfaces applied for both software H


Command-line Interface

Dimensio
n

Graphical-User
Interface

User type commands or


presses special keys on the
keyboard

A way to
enter data

User interact with


menus and visual
images such as
buttons and other
graphical objects to
issue commands

Not user-friendly
Difficult to use because
they require exact spelling,
grammar

Userfriendly

User friendly
Easy to use user
can choose the
command by
clicking a mouse

Mark
(1 mark for each correct answer)

ii)

One type of software I and its function


Software I is Application Software
o One type of Software I is (either one refer table)

Function of any Software I


Application
Function
Software Type
Word
- Enables user to create, edit, format and print textual
Processing
documents
Spreadsheet

Help users to produce information in the form of grid


of columns and rows

Presentation

Enables user to create transparencies, slides and


handouts for presentation
Allows user to create visual aids for presentation to
communicate ideas messages and other information to
a group

Graphic

Enables user to edit digital representation or non-text


information such as drawings, charts or photographs.

Mark
(1 mark for the software name and any one type of it, 1 mark for the function of the
software type stated)
5.

a) Reason:
PC1 and PC2 have the same IP address, 192.168.1.5 and therefore the network has
IP conflict. All the computers in a network must have different IP addresses so
that they are able to communicate with each other.
OR
The subnet masks for both PCs have been configured incorrectly. The subnet
mask used for both PCs is invalid. It should be 255.255.255.0
Mark (2 mark for correct answer)
b)

Computer

IP address
(any 192.168.1.x
except 192.168.1.1)

Subnet Mask

PC1

192.168.1.2

255.255.255.0

PC2

192.168.1.3

255.255.255.0

Mark (1 mark for each correct answer)

Scheme Section C
Question 31
(a)

(b) - Interprets and carries out basic instructions that operate a computer
- Control unit directs and coordinates operations in computer
- Arithmetic logic unit (ALU) performs arithmetic, comparison and logical operations
(c)
Component B
Any machine that feeds data into a
computer.
Examples : keyboard, webcam, mouse
Allow user to enter raw data into a
computer
Provides communication between the user
and the computer
Capable of converting data into a form
which can be recognized by the computer

Component C
A piece of hardware uses to present
information to the user.
Example : monitor, speaker, printer.
Capable of delivering or showing
information to user.
Serves as an interface between the
computer and the user
Takes machine coded output results from
the processor and convert them into a form
that can be used by human beings.

(d)
- Speaker
- Liquid Crystal Display (LCD) Projector
Question 32
(a)
i . Ring Topology
ii. Star Topology
iii. Bus Topology
(b)
- A star network generally requires more cable
- If the hub fails, the entire network also fails
- Bottlenecks can occur because all data must pass through the hub
- Expensive to install
- Network speed decreases when the number of nodes fails.
- Troubleshooting is difficult when one of the nodes fails
- A host must be installed to control the network.
(c)
Types
Structure

Connection between nodes


Host failure
Nodes Failure
Ease of troubleshooting
Ease of adding or removing
nodes
Number of nodes when
extending network

Topology A (Ring)
All computer and other
devices are connected in a
circle.
Yes
Network will fail
Network will fail
Depends on backbones
Difficult

Topology C (Bus)
Consist a single central
cable (backbone) and all
computers and other devices
connect it
No
Network can still run
Network can still run
Difficult
Easy

Limited

Many

Question 33
(a)
Application software is a computer program or a suite of computer programs that
performs a particular function for the user.
Example: Word star, Dbase, Microsoft Excel, Microsoft Access.
(b)

System Software
Enables the computer to function properly
Compulsory each computer must have a
system software to function
Each computer only needs one system
software
Independent system software can
function without an application software
Provides the environment in which the
application run

Application Software
Enables users to work efficiently with
documentation such as letters, accounting
reports and presentations
Optional depends on usage and needs.
Without an application software, the
computer is still able to function.
Each computer can have more than one
application software
Dependent application software cannot
work without system software
Provides the environment to enable users to
accomplish specific tasks.

(c)
- The AVG Antivirus in Computer X is an antivirus program, will protects computer X
against viruses by identifying and removing any computer viruses found in the computer
memory, on storage media or incoming e-mail files.

You might also like