anwer schemes ict spm 2008
TRANSCRIPT
-
8/2/2019 Anwer Schemes Ict Spm 2008
1/4
ANWER SCHEMES ICT SPM 2008
SECTION A
1. ENIAC, UNIVAC
2. B
3. i) C ii)D
4. False
5. C
6. A
7. i) DOS ii) GUI
8. i) Server ii) Star topology
9. NIC (Network Interface Card)
10.i) Fibre optic cable ii) Data transmission
11. D
12.True
13. D
14. Design phase
15. operators
16.i) low ii) symbols
17.True
18.i)program design ii)pseudocode
19.D
20. i) problem analysis phase ii) coding phase
21. i) R ii) S
22.i) Information Systemii) Data
23. i) database ii) foreign key24. i) X=record ii) Y=field
25. Analysis phase
.
SECTION B
-
8/2/2019 Anwer Schemes Ict Spm 2008
2/4
26.a) - sending warning about viruses to other computer users- asking permission before sending any business advertisements to others
b) - sending a computer virus via e-mail- hacking into your schools database to change your examination results.- selling pirated software in a night market
27. a)
b) Two advantages of topology B
- The troubleshooting is easy if theres a node fails.
- The maintenance is low as we only replace the failure node.
28. a) Two type of network communication technology used in SCC:
- Extranet
- Intranet
b)
Y (Extranet) Internet
- uses internet and
intranet technology
- uses internet technology
only
- Serves extended
enterprises, including
defined set of
customers or suppliers
or other partners
- Serves everybody`
- With firewall - With/without firewall
- Tight security - Low security
*choose any one
answer
29. a) constant = exchange_rate (write exactly how it is written in the question)
Reason it is because the value of exchange_rate will never change and remain
constant.
Topology A (star topology) Topology B (ring topology)- The data will be transmitted through a
central host where all the nodes are
connected to the central host
- The data will be transmitted directly to
two neighboring nodes
-
8/2/2019 Anwer Schemes Ict Spm 2008
3/4
b) control structure used = sequence control
Reason the statements of the program are executed one by one in consecutive
order.
30. a) field CoCu
b)
SECTION C
31. a) - The bank should set up a firewall to permit limited access from in or outside the
network perimeters or from certain user or certain activities. It will implement
security policy as it will prevent some communication forbidden.
- The bank should do cryptography to hide the information by altering the actual
information into different representation. The cryptosystem depend on a key such as
password to encrypt or decrypt the message.
b) - To ensure the privacy and the confidentiality of information of bank clients. The
information of all clients should be classified and only authorized people of the bank and
the owner can access the information.
- To give a legal status of online transactions. The bank clients who use online
transaction will be facing many risk especially from hacker. The legal status willmake sure only the authorized and verified user can access the account online.
32. a) Two types of computer network used by Syarikat Kerjasama Sdn Bhd are:-
i) Local Area Network - LAN is a group of computers and network devices connected
together usually within the same building and in Syarikat Kerjasama the
computers are connected to each other in a single building
ii) Wide Area Network - WAN generally covers large distances such as states, countries
or continents. Syarikat Kerjasama is located in Malaysia and Syarikat Maju Pte Ltd is
located in Singapore. Therefore the use WAN to connect with each other.
b) The types of communication technology used between both companies are:
i) Internet - Through the Internet, Syarikat Kerjasama has access to global information
and instant communication with Syarikat Maju Pte Ltd in Singapore and other
people around the world.
ii) Extranet It is a private network that uses Internet technology and public
telecommunications system to securely share relevant information with authorized
Clas
s
Stu_I
d
Name Positio
n
CoCu
P4A S001 Zulkifli Membe
r
Computer Club
P4C - - - -
S5A - - - -
The result will show the information
of COMPUTER CLUB only. Refer to
Query given Figure 10(c).
Leave these two rows em
-
8/2/2019 Anwer Schemes Ict Spm 2008
4/4
parties. With this technology, only authorized people from Syarikat Kerjasama
and Syarikat Maju in Singapore can access the website of both companies.
33. a) Three data type for the first three data item:
i) integer (for receipt number) ii) string (for cashiers name) iii) double (for date)
b)
Markah:Receipt num + cashiers name = 1 markDate + Fare = 1 mark
Tajuk coupon = 1 markGambar rajah keseluruhan yg menunjukkan output kupon = 1 mark
All the best utk SPMsaya tahu semua boleh buatyang terbaiksaya doakan adik-adik saya berjaya
dengan semerlang dunia akhiratCikgu annur
Receipt num:
1
Smart Cab Coupon
Cashiers name:
Date:
Fare:
Thank you for your
ride!
Wajib ada
Wajib ada
Ni takde pon takpe.
Kena letak tajuk couponkalau tak takut nnt
pemeriksa boleh tanya apa yg menunjukkan ianya
adalah kupon?. Tapi make sure tengok soalan
camneikut nama seperti dalam soalan.