anwer schemes ict spm 2007

Upload: yumi-sofri

Post on 05-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 Anwer Schemes Ict Spm 2007

    1/2

    ANWER SCHEMES ICT SPM 2007

    SECTION A

    1. i) A ii) B2. Object Oriented Programming3. Site Blocking4. i) A ii)B5. Message6. Output7. i) Bytes ii) Record8. i) B ii) C9. i) CPU socket ii) RAM slot10. i) Bus Topology ii) Star topology11. Wide Area Network (WAN)12. Graphics13. i) Z ii) X14. i) Design phase ii)Documentation phase15. program16. input device17. operators18. i) selection control ii) sequence control19. i)program design ii)Testing and debugging20. data21. i)field ii)record22. False23. False24. False25. True

    .

    SECTION B

    26. - Privacy law- Install utility software such as firewall, antivirus etc- Create password for data used- Erase history of website after browsed

    27.

    28.

    Network A (Intranet) Network B (Extranet)

    Only use internet technology Use internet and intranet technologies Everyone within company can access the

    information

    Only authorized user can access extranet

    Figure A Figure B

    The code of the software cannot bemodified

    The code of the software can be modified Software cannot be downloaded from the

    internet

    Software can be downloaded from the internet

    License is needed to use the software

    No license needed to use the software Need to purchase from vendor No need to purchase from vendor. Its freely used

  • 8/2/2019 Anwer Schemes Ict Spm 2007

    2/2

    29. a) - User can share the information over a network by anybody and this allows the ease of sharing

    data.

    - User can easily retrieve the information of the friends in database and also can modify any changes of

    information in data base.

    b) - The misuse of information by people who has bad intention to any friends in database.

    - As the data can be retrieved by other user theres a chance where the information could be wrongly

    modified by unethical user without authorization.

    30. - The content is more interactive as using of multimedia elements

    - The content of the encyclopedia is permanent and cannot be modified

    - Can store high end of multimedia elements such as video

    - The cost by using CD is cheaper

    - Can be used as references in future as its contents are permanent.

    SECTION C

    31. a) Star topology because:-

    - All the workstations will be connected to the hub and the server.

    - If one of the workstations fai ls, the network will still running as long as the hub is working

    - New workstation can be added to the hub and the server and this can ensure the ease of extending the

    network in future.

    b) i) Wireless Access Point allows the laptop to transfer data wirelessly to other wireless devices.

    ii) Modem - a device that enables a computer to transmit data over telephone or cable lines.

    iii) Router - a computer networking device that forwards data packets across a network toward their

    destinations, through a process known as routing

    32. a) Theft / Hacker

    b) i) Bank XYZ can use a firewall to prevent unauthorized access to its network system.

    ii) Bank XYZ can use lock, smartcard or password to access the system.

    iii) The bank can also detect and guards all exits and record any hardware transported.

    iv) The bank can also do a backup files by keeping the duplicated files in external storage such as in the

    external hard disk or thumb drive (choose only 2 points)

    33. a) Update button used for changing data on the library system

    b) Book ID Each book in the library must have unique number to differentiate the books.