SlideShare a Scribd company logo
1 of 6
Download to read offline
PEJABAT PELAJARAN WP PUTRAJAYA
                                 WP PUTRAJAYA
              ____________________________________________________________




PEPERIKSAAN PERCUBAAN
SIJIL PELAJARAN MALAYSIA
SEPTEMBER
TAHUN 2010
                                                Two Hour and Thirty Minutes
                                                   Dua Jam Tiga Puluh Minit


INFORMATION AND COMMUNICATION
TECHNOLOGY
                                                              3765/1
PAPER 1




                   SKEMA JAWAPAN




          Kertas soalan ini mengandungi 6 halaman bercetak.




                                  1
SECTION A

 Questions                Candidate’s Answer                 Score
    No.
 1.             User Identification                                  1
 2.             D. Copyright Infringement                            2
 3.     (i)     B                                                    3
        (ii)    A                                                    4
 4.             2.00 GHz / 2000 MHz                                  5
 5.             S                                                    6
 6.     (i)     P - Spreadsheet                                      7
        (ii)    Q – Graphic Editor                                   8
 7.     (i)     False                                                9
        (ii)    True                                                 10
 8.             Peer To Peer                                         11
 9.     (i)     Ring Topology                                        12

         (ii)   Troubleshooting is easy when one of the              13
                nodes fails.
                          or

                Repair or remove the failing nodes and the
                network will continue to function.

10.             Wireless Network Interface Card                      14
                or
                Wireless NIC
11.      (i)    Q                                                    15
         (ii)   R                                                    16
12.             True                                                 17
13.             C                                                    18
14.      (i)    Icon                                                 19
         (ii)   Timelines                                            20
15.      (i)    Implementation                                       21
         (ii)   Programmer                                           22
16.             True                                                 23
17.             Structured                                           24
18.             Compiler                                             25
19.             Mathematical                                         26
20.      (i)    Selection                                            27
         (ii)   String                                               28
21.      (i)    Coding                                               29
         (ii)   Problem Analysis                                     30
22.             Procedures                                           31
23.             Database Management System                           32
24.      (i)    Transaction Processing Systems (TPS)                 33
         (ii)   Executive Information System (EIS)                   34
25.      (i)    StudentID                                            35
         (ii)   StudentID                                            36

                                        2
SECTION B

26
(a) Two advantages when the management changed the system from A to B.
                                                                                       2M
      i) Faster productions
      ii) Can take over jobs that are dangerous to the human                           Any TWO
      iii) More reliable                                                               relevant
      iv) can work continuously with no need for breaks.                               answers
      v) can repeat a task accurately time and again without losing accuracy

      Two disadvantages when the management changed the system from A to B.
(b)                                                                                    2M
      i) High Cost
      ii) High maintenance                                                             Any TWO
      iii) Employment                                                                  relevant
      iv) Less flexible                                                                answers

27

(a)
               FILE MANAGEMENT                              DIAGNOSTIC

          Ø Meaning :                                Ø Meaning :
            i. FM is a utility program that            i. Compiles technical
            performs functions related to              information about hardware
            files and disk management                  and some software               2M
            ii. A computer program that                ii. Prepares report outlining
            provides a user interface to               problems
            work with file systems
                                                     Ø Example :
          Ø Example:                                   The various types of
            Image viewer displays                      information that can be
            contents of graphics file when             obtained from the
            you double click on it.                    Resources tab.



(b)             FILE MANAGEMENT                                DIAGNOSTIC

          Ø Usage :                                     Ø Usage:
            i. Speeding up interaction with               Determine the resource
            files.                                        usage of the hardware        1M
                                                          components within your
              ii. The most common operations              system.
              on files are create, open, edit,
              view, print, play, rename, move,                                          1M
              copy, delete, attributes,
              properties, search/find, and                                             Salah
              permissions.                                                             satu
                                                                                       membawa
             iii. Typically files are displayed in                                     1m
                                               3
a hierarchy.

             iv. File managers may contain
             features inspired by web
             browsers, including forward and
             back navigational buttons.


28
(a)             S is a web browser. Two functions are
                a) Retrieve and view internet-based information
                b) Interact with servers.                                            2M
                c) View electronic documents.
                d) Download and upload information
(b)             T is email client. One function is
                a) To create email messages.
                b) To send email messages.                                           2M
                c) To receive email messages.
                d) To forward email messages.
                e) To store email messages.

29
(a)   i. Linear interactivity                                                        1M
      ii. Non-interactivity                                                          1M

(b)    i. Allow user to interact with the content according to what the user want.
       ii. User can control the progress using button or links.                      2M
       iii. Provide two-way communication.

30
(a) 2 Tables                                                                         1M

      Student Info and Book Info                                                     1M
(b)

                   Student Info                      Book Info

                    StudentID                        StudentID                       2M
                                                                                     (nama
                                                                                     jadual
                                                                                     1M,
                                                                                     primary
                                                                                     key 1M)




                                           4
SECTION C

31
(a) Describe two suitable security measures that should be taken by the bank to
    prevent computer crime.

         a) Prevent access by using locks, smart card or password                           1M

         b) Firewall (prevent hacking) – a piece of hardware or software which              1M
            function in a networked environment to prevent some communications
            forbidden by security policy

         c) Human Aspects is the hardest aspects to give protection to, the most
            common problem is the lack of achieving a good information security             1M
            procedure. There are three ways of security :
            i)    Organization Self Awareness (some threat could also come
                  from within the organization and not just from outside)                   1M
            ii)   Organization User Self Awareness (provide employee with
                  adequate training and the importance of security and control)


      Why bank clients should be protected under the Malaysian Cyber Law?
(b)
      The bank clients should be protected under the Malaysian Cyber Law because:           1M
      The customer is made to feel secure about the bank protecting their money and         1M
      the bank takes responsibility and will prosecute criminals for their wrong doing.     1M

           OR

      Deter possible criminal activities such as hacking, transaction fraud, etc, so that
      all the criminal activities can be brought to justice/court.

           OR

      Steps undertaken to ensure the security of online transaction and so, maintain
      customer confidentiality.

32

(a) Step 1
    Right click on the Local Area Network icon.                                             1M
    Then click on Properties.

      Step 2
      Click on Internet Protocol (TCP/IP) icon.                                             1M
      Then click the properties button.

      Step 3
      The Internet Protocol (TCP/IP) Properties window will appear.                         1M
      Click Use the following IP address.
                                             5
Step 4
      Key in Subnet mask : 255 . 255 . 255 . 0
      Subnet mask specifies the size of the network.                                1M

      Step 5
      Key in IP address : 192 . 168 . 1 . 25
                                                                                    1M
      Step 6
      Key in Default gateway : 192 . 168 . 1 . 1
                                                                                    1M
      Step 7
      Restart the computer before the setting take effect.                          1M

33
(a) Pseudo code;                                                                    4M
                                                                                    If all
         Answer:                                                                    statement
                                                                                    was
         Begin                                                                      complete

         Request student ic_number, student_mark                                     1M
         If student_mark is more than 50 then                                        1M
            Print congratulation message

         Else
                                                                                     1M
            Print motivational message
                                                                                    Begin,
         End if                                                                     End If &
                                                                                    End ada
         End                                                                        1M
(b)
       Syntax errors
          • A syntax error is caused by wrong spelling in command and
             declaration. Other syntax errors include case sensitive, punctuation
             and wrong word command
                                                                                    4M
          • They either show up as you type the program code, or if you have
            turned off the automatic syntax error check, the syntax errors show     1 point
                                                                                    give 1
            up when you try to run or compile the program.
                                                                                    mark
          • When syntax error is located, a message is displayed on the
            screen.

          • The programmer must review and correct all syntax errors.




                                               6

More Related Content

Similar to ICT Putrajaya 2010

Ict mock exam paper 1 a combined
Ict mock exam paper 1 a combinedIct mock exam paper 1 a combined
Ict mock exam paper 1 a combined
Gary Tsang
 
Selangor scheme
Selangor schemeSelangor scheme
Selangor scheme
AyuMohamad
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-scheme
AyuMohamad
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-scheme
AyuMohamad
 
Chapter 3 instruction level parallelism and its exploitation
Chapter 3 instruction level parallelism and its exploitationChapter 3 instruction level parallelism and its exploitation
Chapter 3 instruction level parallelism and its exploitation
subramaniam shankar
 

Similar to ICT Putrajaya 2010 (20)

Final report
Final reportFinal report
Final report
 
Ict mock exam paper 1 a combined
Ict mock exam paper 1 a combinedIct mock exam paper 1 a combined
Ict mock exam paper 1 a combined
 
Integratedbook
IntegratedbookIntegratedbook
Integratedbook
 
seee
seeeseee
seee
 
Selangor scheme
Selangor schemeSelangor scheme
Selangor scheme
 
Additonal project details
Additonal project detailsAdditonal project details
Additonal project details
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-scheme
 
Seri kota-scheme
Seri kota-schemeSeri kota-scheme
Seri kota-scheme
 
Midgard 2 - The cloud you can control
Midgard 2 - The cloud you can controlMidgard 2 - The cloud you can control
Midgard 2 - The cloud you can control
 
Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021 Question Paper Code 065 informatic Practice New CBSE - 2021
Question Paper Code 065 informatic Practice New CBSE - 2021
 
mago3D, A Brand-New Web Based Open Source GeoBIM Platform
mago3D, A Brand-New Web Based Open Source GeoBIM Platformmago3D, A Brand-New Web Based Open Source GeoBIM Platform
mago3D, A Brand-New Web Based Open Source GeoBIM Platform
 
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
 
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
 
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
 
2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]2011 updated titles [ skiveprojects ]
2011 updated titles [ skiveprojects ]
 
Software proposal sample_project_3-_complex_saa_s_application_by_swproposal_com
Software proposal sample_project_3-_complex_saa_s_application_by_swproposal_comSoftware proposal sample_project_3-_complex_saa_s_application_by_swproposal_com
Software proposal sample_project_3-_complex_saa_s_application_by_swproposal_com
 
Explaining Pres Actions
Explaining Pres ActionsExplaining Pres Actions
Explaining Pres Actions
 
Dlf2
Dlf2Dlf2
Dlf2
 
Chapter 3 instruction level parallelism and its exploitation
Chapter 3 instruction level parallelism and its exploitationChapter 3 instruction level parallelism and its exploitation
Chapter 3 instruction level parallelism and its exploitation
 
GeoAlberta keynote
GeoAlberta keynoteGeoAlberta keynote
GeoAlberta keynote
 

More from dean36

ICT Perak 2010
ICT Perak 2010ICT Perak 2010
ICT Perak 2010
dean36
 
ICT Melaka 2010
ICT Melaka 2010ICT Melaka 2010
ICT Melaka 2010
dean36
 
ICT Wilayah Persekutuan 2010
ICT Wilayah Persekutuan 2010ICT Wilayah Persekutuan 2010
ICT Wilayah Persekutuan 2010
dean36
 
ICT Putrajaya 2010
ICT Putrajaya 2010ICT Putrajaya 2010
ICT Putrajaya 2010
dean36
 
ICT Perak 2010
ICT Perak 2010ICT Perak 2010
ICT Perak 2010
dean36
 
ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010
dean36
 
ICT Melaka 2010
ICT Melaka 2010ICT Melaka 2010
ICT Melaka 2010
dean36
 
ICT Kelantan 2010
ICT Kelantan 2010ICT Kelantan 2010
ICT Kelantan 2010
dean36
 
ICT Kedah 2010
ICT Kedah 2010ICT Kedah 2010
ICT Kedah 2010
dean36
 
ICT Johor 2010
ICT Johor 2010ICT Johor 2010
ICT Johor 2010
dean36
 
Latihan 7
Latihan 7Latihan 7
Latihan 7
dean36
 
Latihan 6
Latihan 6Latihan 6
Latihan 6
dean36
 
Latihan 3
Latihan 3Latihan 3
Latihan 3
dean36
 
Latihan 2
Latihan 2Latihan 2
Latihan 2
dean36
 
Jawapan 3
Jawapan 3Jawapan 3
Jawapan 3
dean36
 
Jawapan 2
Jawapan 2Jawapan 2
Jawapan 2
dean36
 
Jawapan 1
Jawapan 1Jawapan 1
Jawapan 1
dean36
 
Latihan 1
Latihan 1Latihan 1
Latihan 1
dean36
 
Jawapan 4
Jawapan 4Jawapan 4
Jawapan 4
dean36
 
Latihan 4
Latihan 4Latihan 4
Latihan 4
dean36
 

More from dean36 (20)

ICT Perak 2010
ICT Perak 2010ICT Perak 2010
ICT Perak 2010
 
ICT Melaka 2010
ICT Melaka 2010ICT Melaka 2010
ICT Melaka 2010
 
ICT Wilayah Persekutuan 2010
ICT Wilayah Persekutuan 2010ICT Wilayah Persekutuan 2010
ICT Wilayah Persekutuan 2010
 
ICT Putrajaya 2010
ICT Putrajaya 2010ICT Putrajaya 2010
ICT Putrajaya 2010
 
ICT Perak 2010
ICT Perak 2010ICT Perak 2010
ICT Perak 2010
 
ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010ICT Negeri Sembilan 2010
ICT Negeri Sembilan 2010
 
ICT Melaka 2010
ICT Melaka 2010ICT Melaka 2010
ICT Melaka 2010
 
ICT Kelantan 2010
ICT Kelantan 2010ICT Kelantan 2010
ICT Kelantan 2010
 
ICT Kedah 2010
ICT Kedah 2010ICT Kedah 2010
ICT Kedah 2010
 
ICT Johor 2010
ICT Johor 2010ICT Johor 2010
ICT Johor 2010
 
Latihan 7
Latihan 7Latihan 7
Latihan 7
 
Latihan 6
Latihan 6Latihan 6
Latihan 6
 
Latihan 3
Latihan 3Latihan 3
Latihan 3
 
Latihan 2
Latihan 2Latihan 2
Latihan 2
 
Jawapan 3
Jawapan 3Jawapan 3
Jawapan 3
 
Jawapan 2
Jawapan 2Jawapan 2
Jawapan 2
 
Jawapan 1
Jawapan 1Jawapan 1
Jawapan 1
 
Latihan 1
Latihan 1Latihan 1
Latihan 1
 
Jawapan 4
Jawapan 4Jawapan 4
Jawapan 4
 
Latihan 4
Latihan 4Latihan 4
Latihan 4
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

ICT Putrajaya 2010

  • 1. PEJABAT PELAJARAN WP PUTRAJAYA WP PUTRAJAYA ____________________________________________________________ PEPERIKSAAN PERCUBAAN SIJIL PELAJARAN MALAYSIA SEPTEMBER TAHUN 2010 Two Hour and Thirty Minutes Dua Jam Tiga Puluh Minit INFORMATION AND COMMUNICATION TECHNOLOGY 3765/1 PAPER 1 SKEMA JAWAPAN Kertas soalan ini mengandungi 6 halaman bercetak. 1
  • 2. SECTION A Questions Candidate’s Answer Score No. 1. User Identification 1 2. D. Copyright Infringement 2 3. (i) B 3 (ii) A 4 4. 2.00 GHz / 2000 MHz 5 5. S 6 6. (i) P - Spreadsheet 7 (ii) Q – Graphic Editor 8 7. (i) False 9 (ii) True 10 8. Peer To Peer 11 9. (i) Ring Topology 12 (ii) Troubleshooting is easy when one of the 13 nodes fails. or Repair or remove the failing nodes and the network will continue to function. 10. Wireless Network Interface Card 14 or Wireless NIC 11. (i) Q 15 (ii) R 16 12. True 17 13. C 18 14. (i) Icon 19 (ii) Timelines 20 15. (i) Implementation 21 (ii) Programmer 22 16. True 23 17. Structured 24 18. Compiler 25 19. Mathematical 26 20. (i) Selection 27 (ii) String 28 21. (i) Coding 29 (ii) Problem Analysis 30 22. Procedures 31 23. Database Management System 32 24. (i) Transaction Processing Systems (TPS) 33 (ii) Executive Information System (EIS) 34 25. (i) StudentID 35 (ii) StudentID 36 2
  • 3. SECTION B 26 (a) Two advantages when the management changed the system from A to B. 2M i) Faster productions ii) Can take over jobs that are dangerous to the human Any TWO iii) More reliable relevant iv) can work continuously with no need for breaks. answers v) can repeat a task accurately time and again without losing accuracy Two disadvantages when the management changed the system from A to B. (b) 2M i) High Cost ii) High maintenance Any TWO iii) Employment relevant iv) Less flexible answers 27 (a) FILE MANAGEMENT DIAGNOSTIC Ø Meaning : Ø Meaning : i. FM is a utility program that i. Compiles technical performs functions related to information about hardware files and disk management and some software 2M ii. A computer program that ii. Prepares report outlining provides a user interface to problems work with file systems Ø Example : Ø Example: The various types of Image viewer displays information that can be contents of graphics file when obtained from the you double click on it. Resources tab. (b) FILE MANAGEMENT DIAGNOSTIC Ø Usage : Ø Usage: i. Speeding up interaction with Determine the resource files. usage of the hardware 1M components within your ii. The most common operations system. on files are create, open, edit, view, print, play, rename, move, 1M copy, delete, attributes, properties, search/find, and Salah permissions. satu membawa iii. Typically files are displayed in 1m 3
  • 4. a hierarchy. iv. File managers may contain features inspired by web browsers, including forward and back navigational buttons. 28 (a) S is a web browser. Two functions are a) Retrieve and view internet-based information b) Interact with servers. 2M c) View electronic documents. d) Download and upload information (b) T is email client. One function is a) To create email messages. b) To send email messages. 2M c) To receive email messages. d) To forward email messages. e) To store email messages. 29 (a) i. Linear interactivity 1M ii. Non-interactivity 1M (b) i. Allow user to interact with the content according to what the user want. ii. User can control the progress using button or links. 2M iii. Provide two-way communication. 30 (a) 2 Tables 1M Student Info and Book Info 1M (b) Student Info Book Info StudentID StudentID 2M (nama jadual 1M, primary key 1M) 4
  • 5. SECTION C 31 (a) Describe two suitable security measures that should be taken by the bank to prevent computer crime. a) Prevent access by using locks, smart card or password 1M b) Firewall (prevent hacking) – a piece of hardware or software which 1M function in a networked environment to prevent some communications forbidden by security policy c) Human Aspects is the hardest aspects to give protection to, the most common problem is the lack of achieving a good information security 1M procedure. There are three ways of security : i) Organization Self Awareness (some threat could also come from within the organization and not just from outside) 1M ii) Organization User Self Awareness (provide employee with adequate training and the importance of security and control) Why bank clients should be protected under the Malaysian Cyber Law? (b) The bank clients should be protected under the Malaysian Cyber Law because: 1M The customer is made to feel secure about the bank protecting their money and 1M the bank takes responsibility and will prosecute criminals for their wrong doing. 1M OR Deter possible criminal activities such as hacking, transaction fraud, etc, so that all the criminal activities can be brought to justice/court. OR Steps undertaken to ensure the security of online transaction and so, maintain customer confidentiality. 32 (a) Step 1 Right click on the Local Area Network icon. 1M Then click on Properties. Step 2 Click on Internet Protocol (TCP/IP) icon. 1M Then click the properties button. Step 3 The Internet Protocol (TCP/IP) Properties window will appear. 1M Click Use the following IP address. 5
  • 6. Step 4 Key in Subnet mask : 255 . 255 . 255 . 0 Subnet mask specifies the size of the network. 1M Step 5 Key in IP address : 192 . 168 . 1 . 25 1M Step 6 Key in Default gateway : 192 . 168 . 1 . 1 1M Step 7 Restart the computer before the setting take effect. 1M 33 (a) Pseudo code; 4M If all Answer: statement was Begin complete Request student ic_number, student_mark 1M If student_mark is more than 50 then 1M Print congratulation message Else 1M Print motivational message Begin, End if End If & End ada End 1M (b) Syntax errors • A syntax error is caused by wrong spelling in command and declaration. Other syntax errors include case sensitive, punctuation and wrong word command 4M • They either show up as you type the program code, or if you have turned off the automatic syntax error check, the syntax errors show 1 point give 1 up when you try to run or compile the program. mark • When syntax error is located, a message is displayed on the screen. • The programmer must review and correct all syntax errors. 6