SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
SKeMA trial serikota 2012 Section A
NO
SOALAN
JAWAPAN ITEM
1 Bangking 1
2 (i) True 2
(ii) True 3
3 (i) S 4
(ii) R 6
4 (i) E 7
(ii) D 8
5 (i) B 9
6 A 11
7 C 12
8 A 13
9 (i) False 14
(ii) False 15
10 (i) D 16
(ii) B 17
(iii) (I) 18
11 Extranet 19
12 L,J,H,M,I,K 20
13 C 21
14 (i) B 22
(ii) D 23
(iii) C 24
15 Testing 25
16 high 26
17 True 27
18 Object oriented 28
19 (I) X or Y 29
(II) Sequence 30
20 31
21 II , IV , I, III 32
22 C 33
23 (I) Update/insert/delete 34
(II) Book ID 35
24 (I) Form 34
(II) Report 35
25 File 36
1a. Based on figure 1, state a difference between the education before ICT and
education with ICT .
Merujuk kepada rajah 1, nyatakan perbezaan antara pendidikan tanpa ICT dan
dengan ICT.
Education before ICT Education with ICT
Teacher uses blackboard and chalk as
their teaching aids.
Teacher uses overhead projector as
one the teaching aids.
Teaching and learning is less
interesting.
Teaching and learning becomes
more interesting.
Student depends on teacher and books
only.
Student can do self access learning
*Choose any of the above suggested answer or other relevant answer.
[2 marks]
1b. List down TWO sectors that used ICT in daily life.
Senaraikan dua sektor yang menggunakan ICT di dalam kehidupan seharian.
Education, Banking, E-commerce or Industry.
(any two answers from the list above)
[2 marks]
27. a ) i) Keyboard
Papan Kekunci
ii) Printer
Pencetak
b) Diskette / Tumbdrive / CDR
Cakera Liut / Tumbdrive / CDR
28.
i)
[ 2 markah ]
1. Save cost 2. Easy to communicate 3. Can get more information
4. Share information 5. Printer sharing 6. File and program sharing 7. File and
information transfer
ii)
[ 2 markah ]
1. Online banking 2. Online payment 3. E-commerce 4. E-learning
SECTION B
29.
(a) (i) scanner
(ii) Digital camera
Any related answer is acceptable [2 marks]
(b) (i) Sony Sound Forge
(ii) Adobe Audition
(iii) Cool Edit Pro
(iv) Sound Recorder
Any related answer is acceptable [2 marks]
30. a. Phase M: problem analysis
Phase N: Coding [2 marks]
b.
i. Document the code thoroughly so the programs can be referred
and maintained easily.
ii. Write both the global and internal documentation, called
comments with the program code. These comments explain the
program’s purpose of the code statements within the program.
iii. Produce a detailed problem definition, flow chart or pseudo code
and the testing procedures.
iv. Produce a detailed description of the program, clear layouts of the
input and output records and a program listing.
v. Produce a user’s manual to aid users who are not familiar with the
computer system and program
31. a) (i)
1 mark = All elements are correct.
1 mark = All arrows and flow are correct.
a) (ii)
Meaning of Machine Cycle = For every instruction, the Control Unit in CPU repeats a
set of four basic operations consist of Fetching, Decoding, Executing and Storing.
(1 mark)
INPUT PROCESS OUTPUT
STORAG
E
Function of CPU: (1 mark)
•CPU or Central Processing Unit/ Processor/ Microprocessor is an electronic
component on a computer’s motherboard that interprets and carries out the basic
instructions that operate the computer.
•Fetching – the process of obtaining a program instruction or data item from memory
•Decoding – the process of translating a program instruction into signal that the
computer can execute
•Executing – the process of implementing the instructions in a program
•Storing – the process of writing the result to the storage or memory
b) (i) Student A = Spreadsheet (1 mark)
Student B = Presentation (1 mark)
(ii) Function of Spreadsheet software =
• is an application that allows users to organize and manipulate data in rows and
column and cells on which you can insert formulae, labels and perform automatic
recalculations.
• It produces worksheets that require repetitive calculations – budgeting,
maintaining a grade book, balancing accounts, tracking investment, calculating
loan payment, estimating project cost and preparing financial statements.
(1 mark)
Function of Presentation software = is an application that allows users to create
visual aids for presentations to communicate ideas, messages, and other information
to an audience. (1
mark)
32.
a) Type = Copyright Infringement (state=1 mark)
Explanation (1 mark) :
• Copyright Infringement is defined as a violation (an action to break the
law) of the rights secured by a copyright.
• Copyright Infringement occurs when you break the copyright laws such as
copying movies
Another example = Illegal copying and selling books, tapes, video, computer programs.
(1 mark)
b.) (i) Way used = Cyber Laws (1 mark)
(ii) The needs for Cyber Laws:
• Cyber law are made to force people to be good, because individuals are
more controlled by their passion and education alone cannot make them
good, so laws were created to scare people in being good.
• To give protection against the misuse of computers and computer criminal
activities such as unauthorized use of programmes, illegal transmission of
data or messages over computers, hacking and cracking of computer
systems and networks.
• Integrity and security Information
• Legal status of online transactions
• Privacy and confidentially of information
• Intellectual property rights
• Security of government Data
(2 marks)
33.
a) Foreign key = SocietyID in Student table (1 mark)
Primary key Foreign key
• Primary key must have unique value • Foreign key may have duplicate value.
• Primary key is a field that contains a
value uniquely identifies each record
in the table.
• Is a field in a relational table that
matches the primary key column of
another table
(2 marks)
b.) Table =
• Stores collections of information about specific topic.
• A collection of computer data that is organized, defined and stored as rows and
columns. In non-relational systems, a table is called a file.
(define =1 mark)
Query =
• Request specific data from database.
• A query is essentially a question. Access looks at all the records in the table or tables
you have specified, finds those match the criteria you have defined, and displays them
in a datasheet.
(State =1 mark ; define = 1 mark)

Weitere ähnliche Inhalte

Andere mochten auch

Wilayah persekutuan-scheme
Wilayah persekutuan-schemeWilayah persekutuan-scheme
Wilayah persekutuan-schemeAyuMohamad
 
Kota tinggi-question
Kota tinggi-questionKota tinggi-question
Kota tinggi-questionAyuMohamad
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-schemeAyuMohamad
 
Selangor scheme
Selangor schemeSelangor scheme
Selangor schemeAyuMohamad
 
Wlayah persekutuan-question
Wlayah persekutuan-questionWlayah persekutuan-question
Wlayah persekutuan-questionAyuMohamad
 
Selangor question
Selangor questionSelangor question
Selangor questionAyuMohamad
 
Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012AyuMohamad
 
Seri kota-question
Seri kota-questionSeri kota-question
Seri kota-questionAyuMohamad
 

Andere mochten auch (8)

Wilayah persekutuan-scheme
Wilayah persekutuan-schemeWilayah persekutuan-scheme
Wilayah persekutuan-scheme
 
Kota tinggi-question
Kota tinggi-questionKota tinggi-question
Kota tinggi-question
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-scheme
 
Selangor scheme
Selangor schemeSelangor scheme
Selangor scheme
 
Wlayah persekutuan-question
Wlayah persekutuan-questionWlayah persekutuan-question
Wlayah persekutuan-question
 
Selangor question
Selangor questionSelangor question
Selangor question
 
Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012Marking scheme-trial-ict-2012
Marking scheme-trial-ict-2012
 
Seri kota-question
Seri kota-questionSeri kota-question
Seri kota-question
 

Ähnlich wie Seri kota-scheme

Sample Paper 2 Class XI (Computer Science)
Sample Paper 2 Class XI (Computer Science)Sample Paper 2 Class XI (Computer Science)
Sample Paper 2 Class XI (Computer Science)Poonam Chopra
 
Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 FarhanAhmade
 
Building a Computer Science Pathway for Endorsements
Building a Computer Science Pathway for EndorsementsBuilding a Computer Science Pathway for Endorsements
Building a Computer Science Pathway for EndorsementsHal Speed
 
Building a Computer Science Pathway for Endorsements
Building a Computer Science Pathway for EndorsementsBuilding a Computer Science Pathway for Endorsements
Building a Computer Science Pathway for EndorsementsWeTeach_CS
 
Computer Application II.docx
Computer Application II.docxComputer Application II.docx
Computer Application II.docxVictor Onwong'a
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examgiquickly
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exambubyslyke
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examginistays
 
Ict mock exam paper 1 a combined
Ict mock exam paper 1 a combinedIct mock exam paper 1 a combined
Ict mock exam paper 1 a combinedGary Tsang
 
Sample Question Paper IP Class xii
Sample Question Paper IP Class xii Sample Question Paper IP Class xii
Sample Question Paper IP Class xii kvs
 
Bis 220 final exams
Bis 220 final examsBis 220 final exams
Bis 220 final examsexamzking
 
Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%eriks23
 
S3 Data Processing Pre-Waec Examination (First Half)
S3 Data Processing Pre-Waec Examination (First Half)S3 Data Processing Pre-Waec Examination (First Half)
S3 Data Processing Pre-Waec Examination (First Half)Ejiro Ndifereke
 

Ähnlich wie Seri kota-scheme (20)

Set5 ict-question
Set5 ict-questionSet5 ict-question
Set5 ict-question
 
Set1 ict-question
Set1 ict-questionSet1 ict-question
Set1 ict-question
 
Sample Paper 2 Class XI (Computer Science)
Sample Paper 2 Class XI (Computer Science)Sample Paper 2 Class XI (Computer Science)
Sample Paper 2 Class XI (Computer Science)
 
Mca 5 yr 2013
Mca 5 yr 2013Mca 5 yr 2013
Mca 5 yr 2013
 
Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021
 
Building a Computer Science Pathway for Endorsements
Building a Computer Science Pathway for EndorsementsBuilding a Computer Science Pathway for Endorsements
Building a Computer Science Pathway for Endorsements
 
Building a Computer Science Pathway for Endorsements
Building a Computer Science Pathway for EndorsementsBuilding a Computer Science Pathway for Endorsements
Building a Computer Science Pathway for Endorsements
 
Computer Application II.docx
Computer Application II.docxComputer Application II.docx
Computer Application II.docx
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Ict mock exam paper 1 a combined
Ict mock exam paper 1 a combinedIct mock exam paper 1 a combined
Ict mock exam paper 1 a combined
 
Sample Question Paper IP Class xii
Sample Question Paper IP Class xii Sample Question Paper IP Class xii
Sample Question Paper IP Class xii
 
Bis 220 final exams
Bis 220 final examsBis 220 final exams
Bis 220 final exams
 
Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%Bis 220 final exam 30 30 correct answers 100%
Bis 220 final exam 30 30 correct answers 100%
 
S3 Data Processing Pre-Waec Examination (First Half)
S3 Data Processing Pre-Waec Examination (First Half)S3 Data Processing Pre-Waec Examination (First Half)
S3 Data Processing Pre-Waec Examination (First Half)
 
Bis 220 final
Bis 220 finalBis 220 final
Bis 220 final
 
Bis 220
Bis 220 Bis 220
Bis 220
 

Mehr von AyuMohamad

Mehr von AyuMohamad (15)

Soalan percubaan-ict-ting5-2012
Soalan percubaan-ict-ting5-2012Soalan percubaan-ict-ting5-2012
Soalan percubaan-ict-ting5-2012
 
Topology
TopologyTopology
Topology
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
Hardware
HardwareHardware
Hardware
 
Contoh rpm rpt
Contoh rpm rptContoh rpm rpt
Contoh rpm rpt
 
Networks
NetworksNetworks
Networks
 
Module networks
Module networksModule networks
Module networks
 
Module multimedia
Module multimediaModule multimedia
Module multimedia
 
Contoh rph
Contoh rphContoh rph
Contoh rph
 
Hsp ict 2006
Hsp ict 2006Hsp ict 2006
Hsp ict 2006
 
Skype
SkypeSkype
Skype
 
Web Application_Facebook
Web Application_FacebookWeb Application_Facebook
Web Application_Facebook
 
Web application
Web applicationWeb application
Web application
 
Sgdm3043 1
Sgdm3043 1Sgdm3043 1
Sgdm3043 1
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Seri kota-scheme

  • 1. SKeMA trial serikota 2012 Section A NO SOALAN JAWAPAN ITEM 1 Bangking 1 2 (i) True 2 (ii) True 3 3 (i) S 4 (ii) R 6 4 (i) E 7 (ii) D 8 5 (i) B 9 6 A 11 7 C 12 8 A 13 9 (i) False 14 (ii) False 15 10 (i) D 16 (ii) B 17 (iii) (I) 18 11 Extranet 19 12 L,J,H,M,I,K 20 13 C 21 14 (i) B 22 (ii) D 23 (iii) C 24 15 Testing 25 16 high 26 17 True 27 18 Object oriented 28 19 (I) X or Y 29 (II) Sequence 30 20 31 21 II , IV , I, III 32 22 C 33 23 (I) Update/insert/delete 34 (II) Book ID 35 24 (I) Form 34 (II) Report 35 25 File 36
  • 2. 1a. Based on figure 1, state a difference between the education before ICT and education with ICT . Merujuk kepada rajah 1, nyatakan perbezaan antara pendidikan tanpa ICT dan dengan ICT. Education before ICT Education with ICT Teacher uses blackboard and chalk as their teaching aids. Teacher uses overhead projector as one the teaching aids. Teaching and learning is less interesting. Teaching and learning becomes more interesting. Student depends on teacher and books only. Student can do self access learning *Choose any of the above suggested answer or other relevant answer. [2 marks] 1b. List down TWO sectors that used ICT in daily life. Senaraikan dua sektor yang menggunakan ICT di dalam kehidupan seharian. Education, Banking, E-commerce or Industry. (any two answers from the list above) [2 marks] 27. a ) i) Keyboard Papan Kekunci ii) Printer Pencetak b) Diskette / Tumbdrive / CDR Cakera Liut / Tumbdrive / CDR 28. i) [ 2 markah ] 1. Save cost 2. Easy to communicate 3. Can get more information 4. Share information 5. Printer sharing 6. File and program sharing 7. File and information transfer ii) [ 2 markah ] 1. Online banking 2. Online payment 3. E-commerce 4. E-learning SECTION B
  • 3. 29. (a) (i) scanner (ii) Digital camera Any related answer is acceptable [2 marks] (b) (i) Sony Sound Forge (ii) Adobe Audition (iii) Cool Edit Pro (iv) Sound Recorder Any related answer is acceptable [2 marks] 30. a. Phase M: problem analysis Phase N: Coding [2 marks] b. i. Document the code thoroughly so the programs can be referred and maintained easily. ii. Write both the global and internal documentation, called comments with the program code. These comments explain the program’s purpose of the code statements within the program. iii. Produce a detailed problem definition, flow chart or pseudo code and the testing procedures. iv. Produce a detailed description of the program, clear layouts of the input and output records and a program listing. v. Produce a user’s manual to aid users who are not familiar with the computer system and program 31. a) (i) 1 mark = All elements are correct. 1 mark = All arrows and flow are correct. a) (ii) Meaning of Machine Cycle = For every instruction, the Control Unit in CPU repeats a set of four basic operations consist of Fetching, Decoding, Executing and Storing. (1 mark) INPUT PROCESS OUTPUT STORAG E
  • 4. Function of CPU: (1 mark) •CPU or Central Processing Unit/ Processor/ Microprocessor is an electronic component on a computer’s motherboard that interprets and carries out the basic instructions that operate the computer. •Fetching – the process of obtaining a program instruction or data item from memory •Decoding – the process of translating a program instruction into signal that the computer can execute •Executing – the process of implementing the instructions in a program •Storing – the process of writing the result to the storage or memory b) (i) Student A = Spreadsheet (1 mark) Student B = Presentation (1 mark) (ii) Function of Spreadsheet software = • is an application that allows users to organize and manipulate data in rows and column and cells on which you can insert formulae, labels and perform automatic recalculations. • It produces worksheets that require repetitive calculations – budgeting, maintaining a grade book, balancing accounts, tracking investment, calculating loan payment, estimating project cost and preparing financial statements. (1 mark) Function of Presentation software = is an application that allows users to create visual aids for presentations to communicate ideas, messages, and other information to an audience. (1 mark) 32. a) Type = Copyright Infringement (state=1 mark) Explanation (1 mark) : • Copyright Infringement is defined as a violation (an action to break the law) of the rights secured by a copyright. • Copyright Infringement occurs when you break the copyright laws such as copying movies Another example = Illegal copying and selling books, tapes, video, computer programs. (1 mark) b.) (i) Way used = Cyber Laws (1 mark) (ii) The needs for Cyber Laws: • Cyber law are made to force people to be good, because individuals are more controlled by their passion and education alone cannot make them good, so laws were created to scare people in being good. • To give protection against the misuse of computers and computer criminal activities such as unauthorized use of programmes, illegal transmission of data or messages over computers, hacking and cracking of computer systems and networks.
  • 5. • Integrity and security Information • Legal status of online transactions • Privacy and confidentially of information • Intellectual property rights • Security of government Data (2 marks) 33. a) Foreign key = SocietyID in Student table (1 mark) Primary key Foreign key • Primary key must have unique value • Foreign key may have duplicate value. • Primary key is a field that contains a value uniquely identifies each record in the table. • Is a field in a relational table that matches the primary key column of another table (2 marks) b.) Table = • Stores collections of information about specific topic. • A collection of computer data that is organized, defined and stored as rows and columns. In non-relational systems, a table is called a file. (define =1 mark) Query = • Request specific data from database. • A query is essentially a question. Access looks at all the records in the table or tables you have specified, finds those match the criteria you have defined, and displays them in a datasheet. (State =1 mark ; define = 1 mark)