LEARNING AREA 1 - 2009
1. Figure 1 shows one type of biometric device.
Based on Figure 1,
(i) State the name of the device
(ii) State the function of the device.
2. Figure 2 shows part of an algorithm for a web page filter.
Y
Downloading Banned Stop
page words in Downloading
page?
N
Continue
1
Figure 2
Rajah 2
State the filtering method used in the algorithm.
.
1. Write the words that would complete the following statement.
Buying books from an online shop and selling shoes on an internet auctions site are both
example of …………………………..
SPM 2008
1. State the name of the first generation computer.
2. Laila has to send a document file containing confidential information by e-mail to her
manager.
What Laila has to do to prevent unauthorized access to the contents of the file?
A. Back up the file
B. Encrypt the file
C. Install firewall
D. Scan the file for viruses.
3. Complete the following statements by filling in the blanks:
A …………… (i) ………….. level programming language uses codes, ………. (ii)
………. and is machine dependent.
4. Electronic mail is one of the most popular services on the internet. It makes business
managers and administrators more productive by allowing them to share information,
ideas and opinions easily.
In relation to electronic mail, state two example in each case which can be considered as:
(a) Ethical
[2 mark]
(b) Law Breaking
[2 mark]
2
5. Figure 11 is an excerpt from a daily newspaper.
Based on the excerpt on Figure 11:
(a) Describe two suitable security measures that should be taken by the bank to prevent
computer crime.
[4 mark]
(b) Explain why bank clients should be protected under the Malaysian Cyber Law?
[3 mark]
3
LEARNING AREA 1 - 2007
1. Figure 1 shows several generations of computer technology.
Match A, B or C with the following generations of computer technology.
(i) 1st Generation Computer
(ii) 2nd Generations Computer
2. Figure 2 shows methods of Internet Filtering.
Internet Filtering
Keyword Blocking X Web Rating System
Figure 2
Rajah 2
X is ………………………………………………………………………………………
4
3. Table 1 shows types of computer crimes.
A Computer Fraud
B Computer theft
C Computer attack
Table 1
Based on Table 1, write A, B or C to categorise the following activities:
(i) E-mail hoaxes, false claims of expertise on certain fields.
(ii) Tap into data transmission lines and intentional transfer of payments to the wrong
account.
4. Figure 3 shows how cryptography works
Encrypt Decrypt
Plaintext Enkrip H Dekrip Plaintext
Figure 3
Name H.
5. A series of step by step instructions telling the computer exactly what to do is called a
………………………………………………………………………………………………
Write True or False for the following statements:
1. Cyber law is a system of moral standards or values used as a guideline for computer
users.
6. The following is a statement on information privacy.
5
“ Information privacy refers to the right of individuals and organizations to
deny or restrict the collection and use the information about them.”
Shelly, 2006
Based on the statement, list four ways of making personal data more private.
[4 marks]
7. Bank XYZ Berhad has a computer network system to run their operations between its
branches in Malaysia. An unknown man was seen entering the computer control room at
its headquarters in Kuala Lumpur after office hours. The following day, the system
administrator found that all data in the server were removed and a few computer
hardware missing. It was also reported that the bank computer network was down.
(a) Explain one possible threat done by the unknown man
[2 marks]
(b) After an investigation, the management found that the threats come from the lack of
security procedure at the computer control room.
Explain two actions on human aspect on security procedure that should be taken by
the management to increase security at the computer control room.
[4 marks]
6
SPM 2010
1. Complete the following statement :
Information and Communication Technology is the use of computers , (i) ………………
devices and (ii)…………………………. applications for processing , storing, retrieving,
protecting and transmitting information from anywhere at anytime.
2. Figure 14 is a pie chart showing how students of SMK Taman Gembira communicate
with their friends.
letters
SMS
Based on Figure 14:
(a) State one reason why the students choose email to letters. [1 mark]
email
(b) State three reasons why email is better than Short Messaging System using
handphone. [3 mark]
32. Figure 20 shows symptoms of a computer problem.
Screen displays unusual messages
Files become corrupted
Files mysteriously appear
Based on Figure 20 :
(a) Identify the type of computer threat which matches the symptoms
7
State two different examples of the threat. [3 marks]
(b) Describe two reasons why the computer may have been affected by the threat in (a)
Suggest two ways to prevent it. [4 marks]