Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
67 views8 pages

Figure 1 Shows One Type of Biometric Device.: Learning Area 1 - 2009

This document contains sample questions from past SPM exams on learning area 1, which covers basic concepts in information and communication technology. The questions test knowledge of topics like computer generations, encryption, internet filtering, cyber crimes, programming languages, privacy issues, security procedures, and computer threats. For example, one question asks students to identify a biometric device from an image and state its function. Another asks students to explain security measures a bank should take to prevent computer crimes.

Uploaded by

Hafiza Shamsuri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views8 pages

Figure 1 Shows One Type of Biometric Device.: Learning Area 1 - 2009

This document contains sample questions from past SPM exams on learning area 1, which covers basic concepts in information and communication technology. The questions test knowledge of topics like computer generations, encryption, internet filtering, cyber crimes, programming languages, privacy issues, security procedures, and computer threats. For example, one question asks students to identify a biometric device from an image and state its function. Another asks students to explain security measures a bank should take to prevent computer crimes.

Uploaded by

Hafiza Shamsuri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 8

LEARNING AREA 1 - 2009

1. Figure 1 shows one type of biometric device.

Based on Figure 1,

(i) State the name of the device

(ii) State the function of the device.

2. Figure 2 shows part of an algorithm for a web page filter.

Y
Downloading Banned Stop
page words in Downloading
page?

N
Continue

1
Figure 2
Rajah 2

State the filtering method used in the algorithm.


.
1. Write the words that would complete the following statement.

Buying books from an online shop and selling shoes on an internet auctions site are both
example of …………………………..

SPM 2008

1. State the name of the first generation computer.

2. Laila has to send a document file containing confidential information by e-mail to her
manager.
What Laila has to do to prevent unauthorized access to the contents of the file?

A. Back up the file


B. Encrypt the file
C. Install firewall
D. Scan the file for viruses.

3. Complete the following statements by filling in the blanks:

A …………… (i) ………….. level programming language uses codes, ………. (ii)
………. and is machine dependent.

4. Electronic mail is one of the most popular services on the internet. It makes business
managers and administrators more productive by allowing them to share information,
ideas and opinions easily.

In relation to electronic mail, state two example in each case which can be considered as:

(a) Ethical
[2 mark]

(b) Law Breaking


[2 mark]

2
5. Figure 11 is an excerpt from a daily newspaper.

Based on the excerpt on Figure 11:

(a) Describe two suitable security measures that should be taken by the bank to prevent
computer crime.
[4 mark]

(b) Explain why bank clients should be protected under the Malaysian Cyber Law?
[3 mark]

3
LEARNING AREA 1 - 2007

1. Figure 1 shows several generations of computer technology.

Match A, B or C with the following generations of computer technology.

(i) 1st Generation Computer

(ii) 2nd Generations Computer

2. Figure 2 shows methods of Internet Filtering.

Internet Filtering

Keyword Blocking X Web Rating System

Figure 2
Rajah 2

X is ………………………………………………………………………………………

4
3. Table 1 shows types of computer crimes.

A Computer Fraud

B Computer theft

C Computer attack

Table 1

Based on Table 1, write A, B or C to categorise the following activities:

(i) E-mail hoaxes, false claims of expertise on certain fields.

(ii) Tap into data transmission lines and intentional transfer of payments to the wrong
account.

4. Figure 3 shows how cryptography works

Encrypt Decrypt
Plaintext Enkrip H Dekrip Plaintext

Figure 3

Name H.

5. A series of step by step instructions telling the computer exactly what to do is called a
………………………………………………………………………………………………

Write True or False for the following statements:

1. Cyber law is a system of moral standards or values used as a guideline for computer
users.

6. The following is a statement on information privacy.


5
“ Information privacy refers to the right of individuals and organizations to
deny or restrict the collection and use the information about them.”

Shelly, 2006

Based on the statement, list four ways of making personal data more private.
[4 marks]

7. Bank XYZ Berhad has a computer network system to run their operations between its
branches in Malaysia. An unknown man was seen entering the computer control room at
its headquarters in Kuala Lumpur after office hours. The following day, the system
administrator found that all data in the server were removed and a few computer
hardware missing. It was also reported that the bank computer network was down.

(a) Explain one possible threat done by the unknown man


[2 marks]

(b) After an investigation, the management found that the threats come from the lack of
security procedure at the computer control room.

Explain two actions on human aspect on security procedure that should be taken by
the management to increase security at the computer control room.
[4 marks]

6
SPM 2010

1. Complete the following statement :


Information and Communication Technology is the use of computers , (i) ………………
devices and (ii)…………………………. applications for processing , storing, retrieving,
protecting and transmitting information from anywhere at anytime.
2. Figure 14 is a pie chart showing how students of SMK Taman Gembira communicate
with their friends.

letters

SMS

Based on Figure 14:

(a) State one reason why the students choose email to letters. [1 mark]
email

(b) State three reasons why email is better than Short Messaging System using
handphone. [3 mark]

32. Figure 20 shows symptoms of a computer problem.

 Screen displays unusual messages

 Files become corrupted

 Files mysteriously appear

Based on Figure 20 :

(a) Identify the type of computer threat which matches the symptoms

7
State two different examples of the threat. [3 marks]

(b) Describe two reasons why the computer may have been affected by the threat in (a)

Suggest two ways to prevent it. [4 marks]

You might also like