worksheet complete set 180111

65
Panitia ICT SMK Kanowit 2011 Learning Area One – ICT and Society 1.1 – Introduction to ICT. 1.1.1 – Overview of ICT. 1.1.1.1 – Define ICT 1.1.1.2 – Describe the brief evolution of computers 1 ICT is defined as Information is defined as Communication is defined as Technology is defined as First Generation (1940-1956) Technology: Problems: Scientists: Example: Second Generation (1956 - 1963) Technology: Advantages: Scientists: Third Generation (1964-1971) Technology: Advantages: Scientist

Upload: girlfrida

Post on 25-Jun-2015

5.182 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

Learning Area One – ICT and Society1.1 – Introduction to ICT.1.1.1 – Overview of ICT.1.1.1.1 – Define ICT

1.1.1.2 – Describe the brief evolution of computers

1

ICT is defined as

Information is defined as

Communication is defined as

Technology is defined as

First Generation (1940-1956)Technology:

Problems:

Scientists:

Example:

Second Generation (1956 - 1963)Technology:

Advantages:

Scientists:

Third Generation (1964-1971)Technology:

Advantages:

Scientist:

Page 2: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

1.1.2 – ICT in everyday life: Education, Industry, Banking, and Commerce1.1.2.1 – List the usage of ICT in everyday life.

Education

1. Students can use computer as references tool and browse internet for information

2.

Industry

1.

2.

Banking

1.

2.

Commerce

1.

2.

1.1.2.2 – State the differences between computerised and non-computerised systems.

Field Non- Computerised Computerised

Education

1. Students listen mainly to teacher explanation.

2.

1. Students can use internet to search for information and do not rely mainly on teacher.

2.

2

Fourth Generation (1971 - present)Technology:

Advantages:

Scientists:

Example:

Fifth Generation (Present & beyond)Technology:

Page 3: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

Banking

1.

2.

1.

2.

Industry

1.

2.

1.

2.

Commerce

1.

2.

1.

2.

1.1.2.3 – State the impact of ICT on society.

3

Positive Impact

Negative Impact

Page 4: Worksheet complete set 180111

Good examples:Bad examples:1.1.

2. 2.

Panitia ICT SMK Kanowit 2011

1.2 – Computer Ethics and Legal Issues1.2.1 – Definition 1.2.1.1 – Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.

4

Computer Ethics is a

Code of Ethics:

Definition:

Intellectual property refers to

______________________________________

______________________________________

______________________________________

_____________________. These works are

____________________

______________________________________

______________________________

Computer Crimes

Any criminal activity ________________________

__________________________________________

________________________________________

There are 4 types of computer crimes:

Privacy in IT refers to

Information privacy is described as

Cyber law refers to

Page 5: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

1.2.1.2 – Differentiate between ethics and law.

Ethics Law

Keywords Explanations Keywords Explanations

Moral standards

As a rule to control computer users

Computer users are free to follow or ignore the codes of ethics

Must follow

Depends on country and state where the crime is committed

Universals

Crime

1.

2.Examples

1.

2.

5

Definition of Ethics

Definition of Law

Similarity between ethics and law

1.

2.

Page 6: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

1.2.1.3 – State the need for Intellectual property laws

1.2.2 – Privacy1.2.2.1 – List ways to protect privacy.

6

Why do we need intellectual property law???

Privacy is threatened through …

Ways to protect privacy

Page 7: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

1.2.2.2 – State authentication and verification methods / technologies

Methods Pictures Name Functions / Explanation

Biometric Devices

Analyses the features that exist in the coloured tissue surrounding the pupil.

Scanning of retina and analyzing the layer of blood vessels at the back of the eye.

This method is commonly used in bank operation and business transactions.

7

Authentication is a process

Page 8: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

1.2.3 – Controversial Contents and Control1.2.3.1 – List the effects of controversial content on society (pornography & slander)

Pornography

Impacts????

Slander

Examples

1.2.3.2 – Describe the process of filtering to control access to controversial contents.

Methods Website / site blocking

How???

Uses lists of banned words.

If filter search found any words listed, it will stop downloading and block the page.

Rated by RSACI for the content of the website.

Browser is set to accept pages with certain levels of ratings.

8

Verification is the act of

Examples

Methods of verification

Page 9: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

1.2.4 – Computer Crimes1.2.4.1 – Explain the need for Cyber Law.

1.2.4.2 – Explain briefly the computer crimes: Fraud, Copyright infringement, Theft, Attacks.

1.3 – Computer security 1.3.1 – Definition1.3.1.1 – Define computer security

9

For:

For:

For:For:

For:

Computer Crimes Definition Example

Computer security means

Needs for Cyber Law

Page 10: Worksheet complete set 180111

Types of computer security

Panitia ICT SMK Kanowit 2011

1.3.2 – Security Threats1.3.2.1 – Explain briefly the different threats to computer security: Malicious code, Hacking, Natural disaster,

theft.

1.3.3 – Security Measures1.3.3.1 – Select the appropriate security measures to overcome the identified computer threats1.3.3.2 – Apply the correct security procedures: antivirus, anti-spyware, cryptography, firewall, data backup,

human aspect

Identify and write the appropriate security procedures in the SECURITY column and the security threats in the THREATS column.

Situation THREATS SECURITYAhmad’s has asked his secretary, Minah, to send an email to his business partner in Japan. Minah tries to read Ahmad’s email.

Every two weeks Harry would save a copy of his files from his laptop to his external hard disk in case his computer breaks down.

10

Security Threats

Malicious Code Hacking Natural Disaster Theft

Definition: Definition: Definition: Definition:

Examples: Examples: Flood Fire Earthquakes

Examples:

Page 11: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

One day, Karim found out his files has been corrupted. He needs to scan using appropriate utility.

While using the internet, Flora founds out that some of her private information showed up in an unknown browser.

Daisy is a software engineer. One day, she found out that on her computer pops out a message that writes “An unknown source is trying to by-pass your security system”Bank safe vault is one of the restricted areas in the office. Only authorized personal are allow to enter.

Questions 1. Copyright infringement is defined as a violation of the rights secured by Copyright Act.

a. Give two examples of copyright infringement.

b. Security measures are the precautionary measures taken towards possible dangers or damages. State the appropriate security measures to overcome the identified computer threats for:

i. Data lost

ii. Hiding information.

2. Which of the following are biometric devices?I. Hand geometry

II. Callback SystemIII. Retinal ScanningIV. Signature Verification System

A. I, II and IIIB. I, II and IVC. I, III and IVD. II, III and IV

11

Page 12: Worksheet complete set 180111

INPUT

PROCESS

OUTPUT

STORAGE

Description of Information Processing Cycle

Panitia ICT SMK Kanowit 2011

Learning Area Two – Computer System.

2.1 – System Concept2.1.1 – Overview of computer systems2.1.1.1 – Define computer systems

2.1.1.2 – State the meaning of input, processor, output and storage.

2.1.2.3 – Describe the information processing cycle which includes input, output, process and storage.

12

COMPUTER SYSTEM

Page 13: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

2.1.2 – Data Representation2.1.2.1 – State the relationship of data representation: Bit, byte, and character.

2.1.3 – Introductory to binary coding2.1.3.1 – Explain the function of ASCII code

Functions:

13

MACHINE CYCLE

Fetch

_______ bits 1 byte _______ character

ASCII: American _______________________________________________________________________

____________________________________________________________________________________

1.

2.

Page 14: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

Criteria ASCII EBCDIC Unicode

Number of bits in a byte

Usage

Supported languages

Example

2.1.4 – Data measurement2.1.4.1 – State the units of data measurement.

Term Abbreviation Approx. size Exact Amount Index power

Bit -- -- -- --

Byte -- -- -- --

KB

Megabyte

GB

Terabyte 240

2.1.5 – Clock Speed Measurement2.1.5.2 – State the units of clock speed measurement.

Unit used : __________________________________ = ____________ cycle per second

Term Abbreviation Cycle per second

Megahertz

Gigahertz GHz

2.2 – Hardware

14

Motherboard

Types of hardware

Page 15: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

2.2.1 – Input Devices2.2.1.1 – Identify the input devices used for text, graphics, audio and video

Types Picture Name Other examples

Text

1.

2.

Graphics

1.

2.

Audio

1.

2.

Video

1.

2.

2.2.2 – Output devices2.2.2.1 – Identify the output devices used for text, graphics, audio and video

Output Device Text graphics audio video

Monitor

Speaker

2.2.3 – Motherboard

15

Page 16: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

2.2.3.1 – Identify the location of the central processing unit (CPU), expansion slot, expansion cards, RAM slot, ports and connectors on the motherboard.

2.2.4 – Storage

16

Ports

Page 17: Worksheet complete set 180111

OS Platform

Example Example Example

Panitia ICT SMK Kanowit 2011

2.2.4.1 – Explain types and functions of primary storage (RAM and ROM) and secondary storage (magnetic medium, optical medium, flash memory)

Primary storage is located at _______________________________________________

What is ROM?____________ Only Memory: memory whose contents can be accessed and read but ______________ be changed. The memory of a ROM is ________________________ which means the program and data will not be __________________.

Types of ROM:

What is RAM?Random _____________________ Memory: memory whose contents can be _________________, read and ______________. The memory of a RAM is ________________________ which means the program and data will be __________________.

2.3.1 – Operating System (OS)2.3.1.1 – State the various types of OS used on different platforms.

2.3.1.2 – State the functions of OS

17

PROM EPROM EEPROM

Page 18: Worksheet complete set 180111

Functions of OS

Panitia ICT SMK Kanowit 2011

2.3.1.3 – State the different interfaces of OS

2.3.2 – Application Software

18

Page 19: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

2.3.2.1 – State the types of application software (word processing, spreadsheet, presentation, graphic)2.3.2.2 – Describe the uses of application software.

Types Examples Functions / Usages

Word processor

Microsoft Excel Corel Quattpro Pro Sun StarOffice Calc

Provides pre-defined presentation format Applying special effects to the slide transition. Enhance text, charts and graphical images.

Edit digital non-text information such as photo and drawings

Draw pictures using various tools such as brush and pen

Modifying contrast and brightness Adding special effects

2.3.3 – Utility program2.3.3.1 – Differentiate between the types and usage of utility programmes (file managements, diagnostics, and

file compression)

Types Examples Functions / Usages

File managements

1.

2.

1.

2.

Diagnostics

1.

2.

1.

2.

File Compression

1.

2.

1.

2.

2.3.4 – Proprietary and Open Source Software.

19

Page 20: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

2.3.4.1 - Differentiate between proprietary and open source

Criteria Proprietary Open Source

Advantages

1.

2.

3.

1. It is Free2.

3.

Disadvantages

1. User need to buy the product key (license key) in order to use

1.

2.

3.

Example for application software

1. Microsoft Office 20102.

1.

2.

Example for OS

1.

2.

1. Ubuntu2.

Learning Area 3 – Computer Network and Communications

20

Page 21: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

3.1 – Basic Concepts of Computer Networks and Communications3.1.1 – Definition3.1.1.1 – Define computer networks3.1.1.2 – Define communication

3.1.2 – Importance of Computer Network.3.1.2.1 – State two importance of computer networks and communication in the following fields

3.1.3 – Types of Network3.1.3.1 - Define types of Computer network.

a. ______________ Area __________________.

b. __________________ network compare to ___________ and WAN.

c. Operated within a limited _________________________________________.

d. Devices connected usually are less than ____________________________.

e. Hardware used: ______________________________, ________________________________,

________________________________, _____________________________________.

f. Transmit data at a very _______________ speed.

a. ___________________ Area _________________________.

b. Located at ____________________ cities such as _________________________.

c. Used ____________________________________ as transmission media.

d. Can be collections of ______________.

21

Education E-Business

E-Commerce E-Banking

LAN

MA

WA

Computer network is

Communication is

Page 22: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

a. ________________________ Area __________________________.

b. ______________________ network of all. An example is __________________________.

c. Generally it covers large ______________________ such as a state, ________________ or

___________________.

d. A group of _____________ or ____________ or a mixture of ____________.

e. Uses transmission media such as _________________________________________________.

f. Need ___________________ to connect two or more network.

3.1.3.2 – Differentiate between the three types of computer network.

Criteria LAN MAN WAN

Network size

Number of computers

Transmission media types

Speed

Cost

3.1.4 – Network Architecture3.1.4.1 – Define two types of network architecture.

Network Architecture Client/Server Peer-to-Peer

Definition

Cabling cost

Network usage

Ease to manage

Software needed

3.1.5 – Network Topology.

22

Page 23: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

3.1.5.1 – State three types of network topologies: Bus, Ring, Star

Definition: structure or configuration of ______________________ for ____________________.

Topology Diagram

3.1.5.2 - Differentiate between the three types of network topology

Aspect Ring Topology Star Topology Bus Topology

Host failure

Node Failure

Structure

Ease of adding/removing nodes

Ease of troubleshooting

Number of nodes when extending network

Connection between nodes

Host existence

3.1.6 - Protocol

23

Page 24: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

3.1.6.1 Define Transmission Control Protocol / Internet Protocol (TCP/IP) as protocol to facilitate communication over computer network.

3.1.7 – Internet, Intranet, Extranet.3.1.7.1 – Describe the types of network communications technology (Internet, Intranet, Extranet)

Criteria Internet Intranet Extranet

Definition

Usage

Services

Accessibility

Security

3.2 – Hardware Requirements

24

Definition: Protocol is ………..

Importance of protocol:

TCP/IP:

Page 25: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

3.2.1 – Devices 3.2.1.1 – Identify the function of the devices needed in computer network communication.3.2.1.2 – State the function of the devices needed in computer network communication.

Diagram Device Name Function

Diagram Device Name Function

3.2.2 – Medium

25

From router

To MODEM

Page 26: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

3.2.2.1 – Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP), Coaxial and Fibre Optic Cable.

3.2.2.2 – Identify various types of wireless transmission media.

3.3 – Software Requirements.3.3.1 – Server Software3.3.1.1 – Define Network Operating System.

3.3.1.2 – Name various Network Operating System Software.

26

1

2

3

4

Network Operating System or known as __________ allows to ____________________ computers

and peripheral to a ______________________________.

Most frequently used with ______________ and ____________________ but also have application

to larger _____________________________________________.

It is not the same as the ____________________________________________ provided by some

existing __________________________________________.

It is specifically written to keep __________________________ running at

__________________________________________________.

Page 27: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

3.3.2 – Client Software3.3.2.1 – State the functions of various client software.

Client Software Function Example

Web Browser

1.

2.

3.

1. Internet Explorer (IE)

2.

3.

E-mail client

1. 1. Outlook Express

2.

Network Utilities

1.

2.

1. Ping

2.

Network File Manager

1.

2.

1. Network Neighbourhood

2.

3.4 – Setting Network Facilities

27

1. Window NT

2.

3.

4.

NOS

Page 28: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

3.4.1 – Installation of Network Interface Cards (NIC)

28

This is a

Step 1a: Place your

___________________________________ in the

PCI of your computer

Step 1b: Window will ____________________ that

it has found new hardware

Step 1c: The “Found New Hardware Wizard” will

then ___________________.

Click __________ to continue

Step 2a: Select “CD-ROM Drives” and click “Next”

to ________________. Window will find suitable

_____________ for your device.

Page 29: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

3.4.1.2 – Install drivers for NIC (for WinXP)

29

Step 2b: The NIC driver is now properly installed.

__________________ the computer to complete

the installation.

Step 1: Windows will indicate a new hardware found after the NIC has been inserted into its slot. Click Next to continue.

Step 2: Select “Search for the best driver for my device (recommended)” and click “________________” to continue

Step 3: Select “CD-ROM Drives” and click “Next” to continue. Windows will now search for the best driver for your device.

Page 30: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

3.4.2 – Cable Crimping and Testing3.4.2.1 – Crimp and test UTP cable (Straight / crossed cable).

3.4.3 – Configuration and Testing Network.

30

Step 4: Windows will locate the correct driver for your device and indicate that it is now ready to install the driver. Click “Next” to continue.

Step 4: The NIC driver is now properly __________________________.

TOOLS

2 types

From PC to PC From PC to hub/switch/router

Page 31: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

3.4.3.1 – Configure the work station to join a Local Area Network: IP address, Subnet Mask, Server name. Test the network connection.

3.4.3.2 - Steps to test a network connection:

3.4.4 Share Data3.4.4.1 – Create a share folder.

Questions

31

IP is _________________________________________________________.

Subnet mask specifies __________________________________ of the network.

_________________________________ are used to connect other network and the

_____________________________________________

1.

2.

3.

4.

1.

2.

3.

4.

Page 32: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

1. Figure 1 shows a network configuration.

Figure 1

a. Based on Figure 1, explain why PC 1 and PC 2 are not able to communicate with each other. [4 marks]

b. Re-configure by drawing the network so that PC 1 and PC 2 can communicate with each other. Then filled the table below for the new configuration.

Computer IP address Subnet MaskPC 1PC 2

2.

Figure 2a. Figure 2 shows three computers connected through a school LAN. Based on the figure, identify the

computers that able to communicate with each other. Justify your answer. [ 3 marks]

32

PC 1IP address: 192.168.1.5Subnet Mask: 255.255.253.0Gateway: 192.168.1.1

PC 2IP address: 192.168.1.5Subnet Mask: 255.255.253.0Gateway: 192.168.1.1

INTERNET

ADSL MODEMIP address: 192.168.1.1Subnet Mask: 255.255.255.0

Computer AIP address: 192.168.1.36Subnet Mask: 255.255.255.0Gateway: 192.168.1.1

Computer BIP address: 192.168.1.110Subnet Mask: 255.255.255.0Gateway: 192.168.1.1

Computer CIP address: 192.168.1.36Subnet Mask: 255.255.250.0Gateway: 192.168.1.1

ADSL MODEMIP address: 192.168.1.1Subnet Mask: 255.255.255.0

Page 33: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

b. There is one computer that unable to communicate with the other computer in the network. Identify that computer. Then identify the problem and re-configure the computer so that it can communicate with the other computers in the network. [3 marks]

3. SMK Sri Bahagia has been given new equipments for the school computer laboratory as in Table 1.

Based on Table 1, answer the following questions.a. As the school network administrator, you are asked to suggest a suitable network topology to Pn.

Malsiah, the school principal. Justify your answer. [4 marks]

b. You are also asked to suggest a suitable network architecture. Justify your answer. [3 marks]

4. Your friend, Mr. Ali is looking for your advice on the network communication technologies that he wishes to set up in his company.

a. Give 2 advantages and 2 disadvantages of the two network communication technologies. [4 marks]

b. Give 2 services, with the examples, provided by the internet to Mr. Ali. [ 4 marks]

33

20 desktops 1 modem1 switch 1 routerLAN cables A server

Table 1

Page 34: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

Learning Area Four – Multimedia4.1 – Multimedia Concepts4.1.1 – Definition of Multimedia4.1.1.1 – Define multimedia

4.1.2 – Multimedia in various of fields4.1.2.1 – Identify the use of multimedia in various fields

Fields Example Usage

Education

Business

Art

Medicine

4.1.3 – Interactivity of multimedia4.1.3.1 – Differentiate between the characteristics of linear and non-linear multimedia.

Types File format ExampleText Notepad, Microsoft Words

Audio

Video *.mov, *.avi

Animations

Graphics Paint, Photoshop

34

Multimedia is a

Interactivity refers to

Page 35: Worksheet complete set 180111

Medium of delivery

Application Quality

Production Time

Production Cost

Up-to-Date

Panitia ICT SMK Kanowit 2011

Linear Criteria/Characteristics Non-Linear

User interaction with application

User control over the application

Application flow / arrangement

Example

4.1.4 – Medium of delivery4.1.4.1 – Compare and contrast the mediums of delivery for multimedia applications.

4.1.5. – Multimedia Elements4.1.5.1 – Identify the multimedia elements

35

Page 36: Worksheet complete set 180111

Audio editor Example:

Text editor Example:

Graphics and image editor Example:

Video and animation editor Example:

Panitia ICT SMK Kanowit 2011

4.2 – Hardware and software4.2.1 – Hardware4.2.1.1 – Identify the hardware that can be used to produce multimedia products.

4.2.2 – Editing Software4.2.2.1 – Identify editing software that can be used to be produce multimedia elements

4.2.3 – Authoring Tools4.2.3.1 – Define the various concepts in authoring tools

Criteria Time Frame Concepts Icon Concepts Card ConceptsConcepts Uses visual icon in a

structural frameworkWay of presentation Uses frames that

represents the timeSpecial features Pages are arranged like

stack of cardsExamples Adobe flash

36

Page 37: Worksheet complete set 180111

Multimedia Production Team

Panitia ICT SMK Kanowit 2011

4.2.4 - Web editor4.2.4.1 – Describe and give examples of web editors

4.3 – Multimedia development4.3.1 – User interface Principles4.3.1.1 – State the user interface principles4.3.1.2 – Apply suitable user interface principles in a project

Match the user interface principles with the correct statements

Consistency Can move around the system: menus, help

Clarity Enable user to search keyword or glossary

Context Make their own personal learning

Navigation Harmony and same applies to all screen

Search Clearness of labels on all icons

Personalisation Provides support system / help files

Learnability Can navigate through all sections without limitation

Flexibility Each part should be relevant to the title

4.3.2 – Development Team4.3.2.1 – State the role of each member in a development team.

37

Text-based:

Example:

What You See Is What You Get (WYSIWYG):

Example:

Page 38: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

Multimedia Production Team

Specialise in Scope of work

Project Manager Leading the multimedia team

Research on the content of a multimedia program

Graphics editing

Audio-video technician

Educational strategies and planning

Writes program codes (scripting) Combines the multimedia elements

4.3.3 – Multimedia production phase4.3.3.1 – Describe the phases in multimedia productions

38

Page 39: Worksheet complete set 180111

Contrast

Simplicity

Proximity

Repetition

Alignment

Emphasis

Usage of different types of multimedia elements

Arrangement of the elements

Simple and easy way of presentation

Concept of grouping similar elements

Create a focus point on the screen

Concept of repetition the same texture, colour, size and font

Panitia ICT SMK Kanowit 2011

Multimedia production phase

Descriptions Example of activity

Interview clients to find out their needs

Write problem statement and proposal

Ali uses flow chart draft the flow of his multimedia application.

Ali uses storyboard to sketch the interface of the page.

Implementation phase

A checklist is used to test the multimedia program.

It is also to fix any error found.

James chooses a group of selected users to evaluate and give feedback to his multimedia program using Evaluation Form.

Publishing phase

Match the screen design principles with the correct statement

39

Page 40: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

Questions

1. Halim has listed a number of things he should do to complete a multimedia project entitled “My school” as shown in Table 1. He uses authoring tool software to make his project more effective and interesting.

Collect pictures of the school, hostels, classes, field and canteen. Modify the school badge image so that it can be animated. Record the school anthem. Insert the school objectives, motto and school history into different screens.

Note: Files to be used are hostel.bmp, principal.jpg, bagde.gif and song.mp3

Table 1Based on Table 1,

I. What is the name of the animated file used by Halim?

II. Halim wants to record his voice as background narration. Give one suitable device to carry out this task.

III. Name two missing multimedia element that is not in the files used by Halim.

IV. From your answer in 1 (c), give one suitable file extension for each elements you have mentioned.

2. Study the following table carefully. Then answer the questions based on Table 2.

Phase Description

X The multimedia developers interview the client to find out their needs and write the problem statement and a proposal.

Y The multimedia developers will design a flow chart and storyboard.

Z The multimedia developers will use a checklist to test the multimedia program. If there are errors, he will fix the program.

Table 2a) Identify phase X, Y and Z.

b) From your answer in 2 (a), what are the missing phases?

c) State one example activity for each of the missing phases from your answer in 2 (b).

3. User interface principles are:I. Clarity

II. ColourfulIII. ConsistencyIV. Wide screen

A. I and IIB. II and IVC. I and IIID. III and IV

40

Page 41: Worksheet complete set 180111

Level of programming language

Low-level programming language

Example: Example:

High-level programming language

Example: Example: Example:

Panitia ICT SMK Kanowit 2011

Learning Area Five – Programming.

5.1 – Basic programming concepts5.1.1 – Define program and programming language5.1.1.1 – State the definition of program

5.1.1.2 – State the definition of programming language

5.1.2 – Levels and generations of programming language

41

A computer program is

A programming language is

Page 42: Worksheet complete set 180111

Structured approach

Approach: Programs are drawn in ____________________

Smaller sections of each program are known as _____________________A program may have a __________________ or several ________________________Example of structured programming languages:

Beneficial for:

Object-oriented approachApproach: The object have _____________________with one another

Combines ____________ with functions to create ____________________Example of structured programming languages:

Beneficial for:

Panitia ICT SMK Kanowit 2011

5.1.3 – Programming Language Approaches5.1.3.1 – Define structured approach in programming

5.1.3.2 – Define object-oriented approach in programming

5.1.3.3 – Differentiate between structured approach and object oriented approach in programming

Structured approach Differences Object-oriented approach

Uses

Emphasize

Suitable for

42

Page 43: Worksheet complete set 180111

Translator

Assembler

Is a computer program that Example of assembler:

Interpreter

Translator method: It is interpreted and executed in ______________________ when the user execute it

Execute ____________ by _________ until the end of the program.Example:

Weakness:

Compiler

Translator methods:

Advantages: Example:

Panitia ICT SMK Kanowit 2011

5.1.4 – Translator5.1.4.1 – Describe the translation method of programming using assembler, interpreter and compiler

43

Page 44: Worksheet complete set 180111

Basic Elements

Panitia ICT SMK Kanowit 2011

5.1.5 – Basic elements in programming

5.1.5.1 – Differentiate between constants and variables

Constant Differences Variable

CharacteristicsThe value may change at any time during the course of the program

Usage

1. Const Pi = 3.1422. Const Speed = 30

3.

4.

Example (declaration in Visual Basic 6)

1. Dim Speed as Integer

2.

3.

5.1.5.2 – Differentiate between data types: Boolean, integer, double, strings and date

Data types Description Example Integer

Any number value that may and could contain a fractional part.

“Kuala Lumpur”“23 is larger than 20”“Today is Monday”

Consists of a TRUE or FALSE value. It is usually used to store status

Contains date and time value

44

Page 45: Worksheet complete set 180111

BEGIN

END

BEGIN

END

Panitia ICT SMK Kanowit 2011

5.1.5.3 – Differentiate between mathematical and logical (Boolean) operators.Operators Functions Operators Example Mathematical

+, -, ×, ÷

Logical operators perform logical operations such as checking the condition of two Boolean values

Extra: Operators Description Operator Example

A > BC >= D

5.1.5.4 – Differentiate between sequence control and selection control

Identify the types control structure below.

Differences

Execution flow

Usage

Symbols difference

45

Page 46: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

5.2 – Program Development5.2.1 – Program Development phases5.2.1.1 – Describe the five main phases in program development

Phases of Program Development

Multimedia production phase

Descriptions Example of activity

Interview clients to find out their needs

Write problem statement and proposal

Coding Phase

46

Coding

Page 47: Worksheet complete set 180111

Begin

>= 50?

Request marks

Print “You have fail your ICT examination.”

End

Print “You have pass your ICT examination.”

No

Yes

Panitia ICT SMK Kanowit 2011

Questions1. Wan Mazlan is a programmer. He had made a program that can tell the user whether they can enter an

entertainment park or not. The following are the source code.

if height_boy > 162 then enter = TRUE

if height_girl > 155 then enter = TRUE

else,

enter = FALSE

Figure 1Based on the programming above, answer the following questions.a. (i) Can height_boy and height_girl be declared as constant?

(ii) Justify your answer. [3 marks] b. (i) Identify the data types used

(ii) Give one difference for the data types you have mentioned in b(i). [4 marks]

2. Figure 2 (a) is the source code while 2(b) is the flow chart for the ICT Result program.

Figure2(a)

47

Private Sub CommandCheck_Click()

Dim marks As Double, response As String

marks = TextMark.Text

If (marks >= 50) Then

response = MsgBox(“You have pass your ICT examination”, vbOKOnly, “Pass”)

Else

response = MsgBox(“You have fail your ICT examination”, vbOKOnly, “Fail”)

End If

Page 48: Worksheet complete set 180111

Begin

Request numbers of working days.

Calculate total salary:(RM 12.50 x number of working

days)

Print total salary

End

Panitia ICT SMK Kanowit 2011

Figure 2 (b)Based on Figure 2(a) and 2(b), answer the following questions:

i. States which phase comes after the process in Figure 2(a).

ii. Design the output interface for both of the outcomes. [7 marks]

2. Find the correct pair of data types.A. Const Height = 123.8 (Integer)B. Const Members = 34233 (Double)C. Const Input_Status = TRUE (Currency)D. Const Address = “Kuala Lumpur” (String)

3. Study the flow chart below carefully.

Diagram 3

Based on Diagram 3, answer the following questions:

i. There are mistakes in the flow chart above. Identify them by re-drawing with the correct symbol.[2 marks]

ii. What is the outcome of the salary if:a. The number of working days is six (6) days? [1 mark]b. The salary is now RM 15 and the working days are five (5) days? [1 mark]

48

Page 49: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

Learning Area Six – Information Systems6.1 – Concepts of Information Systems6.1.1 – Definition6.1.1.1 – Give the meaning of data, information and information systems.

6.1.2 – Usage of information systems in various fields6.1.2.1 – State the usage of information system in education, business and management.

Fields

Education

1.

2.

Business

1.

2.

Management

1.

2.

6.1.3 – Information System Components6.1.3.1 – List the Information System components6.1.3.2 – Define each of the Information System components

Hardware ProcedureEnd users who uses the system and information system personnel who creates the system.

49

Data Information Information System

Definition Definition Definition

Page 50: Worksheet complete set 180111

Software

Types of Information System

Usage:

Usage:

Usage:

Usage:

Usage:

Panitia ICT SMK Kanowit 2011

6.1.3.3 – Describe the interrelation between information system components using a diagram.

6.1.4 – Types of Information Systems6.1.4.1 – List five types of Information systems6.1.4.2 – State the usage of each types of information system.

50

Description:

Page 51: Worksheet complete set 180111

Bit

Record

Field

Byte

Fields

Database

Panitia ICT SMK Kanowit 2011

6.1.5 – Hierarchy of Data6.1.5.1 – Define bit, byte, field, record and file

6.1.5.2 – State the hierarchy of data

6.2.1 – Definition6.2.1.1 – Define database and Database Management System (DBMS)

51

Page 52: Worksheet complete set 180111

Benefits of using database

Specific category of information in a table.Field

Record

File

Panitia ICT SMK Kanowit 2011

6.2.1.2 – List the benefits of using database

6.2.2 – Features6.2.2.1 – State the relationship between attribute (field), row (record) and relation (file)

Name Age

Class

Amirullah 13 1ASarah 15 3CChai Leng 16 4S1

52

Database Management

System

Provides an interface between the database and the user

Page 53: Worksheet complete set 180111

Primary key???The field that ___________________________________________________It must not have __________________ value.Each table must have at least ____________ primary key.It is also known as ___________________________.

Foreign key???The field that ___________________________________________________It can have __________________ value.It is ______________________________________ in other tables.It is also known as ___________________________.

Panitia ICT SMK Kanowit 2011

6.2.2.2 – Define the primary key and foreign key

6.2.2.3 – State the importance of the primary key.

6.2.2.4 – Differentiate between the primary key and foreign key.

Primary key Property Foreign keyUsage

Null valueDuplicate

6.2.2.5 – State the importance of the relationship between the primary key and foreign key.

6.2.3 – Database Objects6.2.3.1 – Define the following database objects / tools: Table, form, query, report

Database Object Definition

Table

Form

53

Page 54: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

Query

Report

6.2.4 – Data Manipulation6.2.4.1 – List the basic operations of data manipulation6.2.4.2 – State the usage of basic operations in data manipulation

Basic operation of data manipulation

Usage

Sort

To remove record(s) from the database

Filter

6.3 – Database Development6.3.1 – Phases of System Development6.3.1.1 – Describe the phases of System Development

System Development phase

Descriptions Example of activity

Interview clients to find out their needs

Write problem statement and proposal

Ali chooses the data he has collected during his interview.

Ali draft out the table contains necessary data.

54

Page 55: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

Implementation phase

It involves the system developer and users

It is to ensure the quality of a database.

James documents all the information from source code to user manual to troubleshooting information.

Maintenance phase

Involves three types of maintenance:o

o

o

55

Page 56: Worksheet complete set 180111

Panitia ICT SMK Kanowit 2011

QuestionsTable 1 shows two tables created in COCU Information System at SMK Dato’ Setia. Figure 2 shows a Simple Query Wizard. Figure 3 shows a query design to retrieve information based on a certain criteria.

Table 1 Figure2

Figure 3

a) Based on Table 1 and Figure 2, state one more field that should be moved to the list P in Figure 9 to view the grades of the co curriculum activities for each student. Justify your answer. [3 marks]

b) Based on the query design in Figure 10, complete the query result below to show the information obtained. [ 3 marks]

Class Stu_ID Name Position CoCu

c) Based on Table 1, Figure 2, and Figure 3, state the name of the phase in System Development. Justify your answer. [3 marks]

56