rmmict.files.wordpress.com · Web viewSMK RAJA MUDA MUSA BESTARI JAYA SELANGOR (INTRODUCTION OF...

44
1 SMK RAJA MUDA MUSA BESTARI JAYA SELANGOR (INTRODUCTION OF ICT) NAMA : …………………………………………… TINGKATAN : …………………………………….. 1.1 Introduction to Information Technology 1.1.1 Overview of Information and Communication Technology (ICT) [email protected] ( http://rmmict.blogspot.com )

Transcript of rmmict.files.wordpress.com · Web viewSMK RAJA MUDA MUSA BESTARI JAYA SELANGOR (INTRODUCTION OF...

1

SMK RAJA MUDA MUSABESTARI JAYA SELANGOR

(INTRODUCTION OF ICT)

NAMA : ……………………………………………

TINGKATAN : ……………………………………..

1.1 Introduction to Information Technology 1.1.1 Overview of Information and Communication Technology (ICT)1.1.1.1 Define ICT.1.1.1.2 Describe the brief evolution of computers.

SECTION A

1. State the name of the first generation computer. [email protected] ( http://rmmict.blogspot.com )

2

Nyatakan nama komputer generasi pertama (SPM 2008)

……………………

2. Figure 1 shows three technologies used in the generations of computers Rajah 1 menunjukkan tiga teknologi yang digunakan dalam generasi komputer.

(SPM 2010)

Based on Figure 1, write A, B or C to match the following:

Berdasarkan Rajah l, tulis A, B atau C untuk dipadankan dengan berikut: (i) Second Generation /

Generasi Kedua ...................

(ii) Third Generation / Generasi Ketiga …………….

Figure 1 / Rajah 1

3.. Complete the following statement: / Lengkapkan pernyataan berikut.Information and Communication Technology is the use of computers,( i) ...........................devices and( ii) ......;:......................applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti(i) ……......................dan aplikasi( ii) ............................. untuk memproses ,menyimpan , mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa.

(SPM 2010)

4. The computers for this generation use magnetic drums as storage media and are large in size, taking up entire room. They use a great deal of electricity, generating a lot of heat, which is often the cause of malfunctions. Komputer-komputer generasi ini menggunakan drum magnetik sebagai media simpanan yang besar dalam ukuran sehingga memuatkan satu bilik. Ia juga menggunakan banyak tenaga elektrik, menghasilkan banyak haba dan kerap menyebabkan kerosakan.

[email protected] ( http://rmmict.blogspot.com )

3

(Hulu Perak 2012)

Name the technology used for this generation of computers. Namakan teknologi yang digunakan dalam generasi komputer ini.

………………………………..

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce1.1.2.1 List the usage of ICT in everyday life.SECTION A

1. In an advanced ICT modemization, but there are positive and negative effects on the use of ICT. Which ofthe following non-negative impact on the use of ICT on society.Di dalam arus pemodenan ICT yang maju, nqmttn terdapat kesan posittf dan juga kesan negatif terhadap penggunaan ICT. Antara berikut yang-manakah bukan kesan negative terhadap penggunaan ICT terhadap masyarakat.

(Kelantan 2012)

A. Personal information will be easily exposed and this will make no privacy of

personal information.Maklumat peribadi seseorang akan mudah terdedah dan ini akanmembuatkan tiada privasi terhadap maklumat diri.

B. Unethical use ofICT will lead to computer crime.Penggunaan ICT yang tidak beretika akon menyebabkan berlakunyajenayah komputer

C. A person can get various information from various sources.Seseorang boleh mendapatkan pelbagai maklumat daripada pelbagaisumber

D. Some users of ICT as a waste of time but might be limited solely entertainment.Sebahagian pengguna ICT membuang masa kerana hanyalah mencarihiburan semata-mata.

2. Complete the following statement: Lengkapkan pernyataan berikut:

Table 1 is regarding to the use of ICT in everyday life. Jadual 1 merujuk kepada penggunaan TMK dalam kehidupan seharian.

(MERSING JOHOR 2012)

All transactions are done by computers Semua traksaksi dilakukan dengan komputer

[email protected] ( http://rmmict.blogspot.com )

4

Transaction can be done anytime and anyplace Transaksi boleh dilaksanakan bila-bila masa dan di mana-mana

Example of transactions is electronic funds transfer Contoh transaksi adalah pemindahan wang elektronik

Table 1 / Jadual 1

Table 1 refer to the use of ICT in ______________________ sector. Jadual 1 merujuk kepada penggunaan ICT dalam sector _______________.

1.1.2.2 State the differences between computerised and non-computerised systems.

SECTION B

1. Figure 6 shows a situation in a banking system. / Rajah 6 menunjukkan situasi di dalam sistem bank. (Kedah 2012)

Figure 6 / Rajah 6

Based on Figure 6:/Berdasarkan Rajah 6:

(a) State the difference between system A and system B.Nyatakan perbezaan di antara sistem A dan sistem B.

[2 marks][2 markah]

[email protected] ( http://rmmict.blogspot.com )

System A System B

Sistem B

5

1.1.2.3 State the impact of ICT on society.

SECTION A

1. Which of these is an impact of slander towards society?Yang manakah kesan kepada fitnah terhadap masyarakat?

(P.Pinang 2012)A Closer relationship / Hubungan lebih rapatB Trust among people / Kepercayaan di antara manusiaC Higher moral behaviour / Perlakuan moral lebih tinggi.D Bad reputation of people / Reputasi buruk pada seseorang.

2. ICT has brought many positive impacts on society.ICT membawa banyak kesan positif terhadap masyarakat. (Wilayah 2012)

Figure 1/ Rajah 1

Based on Figure 1, state one positive impact of ICT on society Berdasarkan Rajah 1, nyatakan kesan positif ICT kepada masyarakat

I. Lower communication cost because people can save time and resourcesKos komunikasi yang rendah kerana manusia boleh menjimatkan masa dan sumber

II. Inappropriate online communication with unknown person through the Internet Berkomunikasi dalam talian dengan orang yang tidak dikenali melalui Internet

III. Effective sharing of information and opinions [email protected] ( http://rmmict.blogspot.com )

6

Perkongsian maklumat dan pendapat yang efektif

IV. Effective sharing slander and false contentPerkongsian fitnah dan penipuan kandungan yang efektif

A. I and II B. I and III C. II and IV D. III and IV

1.2 Computer Ethics and Legal Issues1.2.1 Definition1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.

SECTION A

1. Computer ethics refers to the / Etika Komputer merujuk kepada (Kedah 2012)

I study about moral principal for computer user.kajian mengenai nilai moral untuk pengguna komputer.

II custom that guides human behavior in cyber world.budaya yang membimbing tingkah laku manusia dalam dunia siber.

III regulation that must be obeyed by the public.peraturan yang perlu dipatuhi oleh orang awam.

IV knowledge about what is good and what is bad when using computer.pengetahuan mengenai apa yang baik dan apa yang buruk apabila menggunakan komputer.

A I, II and III / I, II dan III B I, II and IV / I, II dan IVC I, III and IV / I, III dan IV D II, III and IV / II, III dan IV

2.. Table 1 shows the characteristics of X and Y in computer usage guideline.Jadual l menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaan komputer.

(SPM 2011)X Y

Moral guidelines for computer users.

Garis panduan moral untuk penggLrna komputer.

Rules for computer users.Peraturan-peraturan untuk

pengguna komputer.

No penalty or punishment.Tiada penalti atau hukuman.

Penalties or punishments imposed.Penalti atau htLkuman dikenakan.

Table 1 / Jadual 1lBased on Table 1, state: / Berdasarkan Jadual I . nyatakan:

[email protected] ( http://rmmict.blogspot.com )

7

(i) X ……………………………………………(ii) Y ……………………………………………

3. Table I below shows the number of terms of security threats.Jadual I di bawah menunjukkan beberapa istilah ancaman keselamotan.

(Kelantan 2012)

A Piracy / Cetak rompakB Natural disaster / Bencana AlamC Malicious code / Kod HasadD Hacking / Pengodam

Tabel I /Jadual I

Ahmad had downloaded the songs online and make copies for sale to thepublic……..Ahmad telah memuat turun laguJagu di atas talian dan membuat salinanuntuk dijual kepada orang ramai………

4. Figure 2 shows Intellectual Property types.Rajah 2 menunjukkan jenis-jenis Harta Intelek. (Wilayah 2012)

Figure 2 / Rajah 2

Based on Figure 2, state X and Y. Berdasarkan Rajah 2, nyatakan X dan Y.

[email protected] ( http://rmmict.blogspot.com )

X Y

Intellectual propertyHarta Intelek

8

X: …………………………………….Y: …………………………………….

SECTION B

1. Figure 6 shows a situation in a banking system. / Rajah 6 menunjukkan situasi di dalam sistem bank.

(Kedah 2012)

Figure 6 / Rajah 6

Based on Figure 6:/Berdasarkan Rajah 6:State two reasons why bank clients who use system B should be protectedunder the Malaysian Cyber Law.Nyatakan dua sebab mengapa pelanggan bank yang menggunakan sistem Bharus dilindungi di bawah Undang-undang Siber Malaysia.

[2 marks][2 markah] …………………………………………………………………………………………………. …………………………………………………………………………………………………. ………………………………………………………………………………………………….

1.2.1.2 Differentiate between ethics and law.

SECTION A

1. State whether the following statement is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu

(P..Pinang 2012)

We need computer ethics and laws to guide users from misusing the computer.Kita memerlukan etika dan undang-undang komputer sebagai panduan kepadapengguna supaya tidak menyalahgunakan komputer.

……………………[email protected] ( http://rmmict.blogspot.com )

System A

Sistem A

System B

Sistem B

9

2. Choose the false statement about ethics and lawPilih penyataan yang salah tentang etika dan undang-undang.

(Wilayah 2012)Ethics Law

A. Universal / universal Depend on country / Bergantung kepada sesebuah negara

B. Crime / Jenayah Immoral / Todak bermoralC. Free to follow / Bebas diikuti Must follow / Mesti diikutiD. Guide the users / Panduan

kepada penggunaControl the users / Mengawal pengguna

1.2.1.3 State the need for intellectual property laws.1.2.2 Privacy 1.2.2.1 List ways to protect privacy.

SECTION A

1. Table 1 shows terms of computer ethics and legal issues.Choose the correct term for each given statement.

(Wilayah 2012)

Jadual 1 menunjukkan istilah bagi etika komputer dan isu-isu perundangan.Pilih istilah yang betul bagi setiap pernyataan berikut.

IntellectualProperty

Privacy ComputerCrime

Table 1 / Jadual 1

i. Protect ideas, inventions, unique names, business models, industrial processes, computer program codes and more.

Melindungi idea, ciptaan, nama-nama unik, model perniagaan, proses perindustrian, kod program komputer dan lain-lain.…………………………………….

ii. The right of individuals and companies to deny or restrict the collection and use of data and information about them.Hak individu dan syarikat dalam menafikan atau membataskan penggunaan data dan maklumat tentang mereka.…………………………………….

2. Choose the correct answer. Pilih jawapan yang betul.

(Hulu Perak 2012)Intellectual Property /

Harta IntelekPrivacy / Privasi

Copyright / Hak cipta

[email protected] ( http://rmmict.blogspot.com )

10

The right of individuals to control the collection and use of information about themselves refers to the right of _____________________________. Hak individu untuk mengawal pengumpulan dan penggunaan maklumat mengenai diri mereka merujuk kepada ___________________________.

SECTION B

1. The following is a statement on information privacy. Pernyataan berikut berkaitan keperibadian maklumat

(SPM 2007)

Based on the statement, list four ways of making personal data more private. Berdasarkan pernyataan, senarai empat cara untuk menjadikan data peribadi lebih peribadi

i) ………………………………………………………………………………………….ii) ………………………………………………………………………………………….

iii) …………………………………………………………………………………………. iv) ………………………….……………………………………………………………….1.2.2.2 State authentication and verification methods/technologies.

SECTION A

1. Figure 1 shows one type of biometric device. / Rajah 1 menunjukkan satu jenis peranti biometrik.

(SPM 2009 )

Based on Figure l, / Berdasarkan Rajah 1,

(i) State the name of the device. / Nyatakan nama peranti itu.…………………………………………………………………………………………

(ii) State the function of the device / Nyatakan fungsi peranti itu.……………………………………………………………………………………………………………………………………………………………………………………

2. Figure I5(a) and Figure I5(b) show biometric authentication methods.Rajah I5(a) dan Rajah 15(b) menunjukkan kaedah pengesahan biometrik.

(Kelantan 2012)

[email protected] ( http://rmmict.blogspot.com )

“Information privacy refers to the right of individuals and organisations to deny or restrict the collection and use the information about them”Keperibadian maklumat merujuk kepada hak individu dan organisasi untuk menafi atau mengelakkan hasil dan maklumat mereka digunakan.

11

Figure 15(a) / Rajah 15(a) Figure 15(b) / Rajah 15(b)

Based on Figure l5(a) and Figure I 5(b) state the method usedBerdasarkan Rajah 15 (a) dan Rajah I5(b), nyatakan kaedah yang digunakan.

(i) Figure 15(a) / Rajah 15(a) …………………………………………..(i) Figure 15(b) / Rajah 15(b) …………………………………………..

3. Example used in verification methods is except ________________Contoh yang digunakan dalam Kaedah verikfikasi kecuali ______________

(Pahang 2012)A Identification Card /Kad Pengenalan diriB Security Token / Keselamatan tokenC Cell Phone / Telefon bimbitD Fingerprint Recognition / Pengesahan cap jari

4. State whether the following is True or False.Nyatakan sama ada penyataan berikut Benar atau Palsu.

(Perlis 2012)

(i) A fingerprint is an imprint made by the pattern of the skin on the pad of a human finger.Cap jari adalah cap yang dibuat melalui satu corak dari tapak jari kulit manusia.…………………………

5. Figure 1 shows three authentication and verification methods. Rajah 1 menunjukkan tiga kaedah pembuktian dan pengesahan.

(Trengganu 2012)

[email protected] ( http://rmmict.blogspot.com )

12

Figure 1 / Rajah 1 Based on Figure 1, write A, B or C to match the following statements: Berdasarkan Rajah 1, tuliskan A, B atau C untuk memadankan pernyataan

berikut:

(i) This method provides the ability to deliver a signature to an organisation. Kaedah ini menyediakan kebolehan untuk menghantar tandatangan kepada organisasi. ..………..

(ii) This method requires users to place their hand onto a scanner surface. Kaedah ini memerlukan pengguna untuk meletakkan tangan ke ataspermukaan pengimbas. …………..

6. Figure 1 shows information on two types of authentuication methods.Rajah 1 menunjukkan maklumat tentang dua jenis kaedah pengesahan

(SPM 2012)

Based on figure 1 , state the name of / berdasarkan rajah 1, namakani. P ……………………………….. ii. Q ….……………………………

1.2.3 Controversial Contents and Control1.2.3.1 List effects of controversial contents on society:• Pornography • SlanderSECTION A

1. Table 2 shows the effects of controversial content on society.Jadual 2 menunjukkan kesan-kesan isu kontroversial dalam masyarakat.

[email protected] ( http://rmmict.blogspot.com )

Authentication methodsKaedah pengesahan

P QTaxi services booking /

tempahan perkhidmatan teksi

Purchase using credit card / pembelian menggunakan kad kredit

- Retinal scanning / pengimbasan retina- voice recognition / Pengecaman suara

13

(Wilayah 2012)

Table 2 / Jadual 2

State the type of controversial content on society.Nyatakan jenis bagi isu kontroversial dalam masyarakat……………………………………………………….

SECTION B

1.

Statement 1 / Pernyataan 1 (P.Pinang 2012)

Based on Statement 1, answer the following questions:Berdasarkan Pernyataan 1, jawab soalan-soalan berikut:

a) State the controversial content that stated in Statement 1. Justify youranswer.Senaraikan satu kandungan kontroversi yang dinyatakan dalam

pernyataanJustifikasikan jawapan anda. [2 marks][2 markah]……………………………………………………………………………………………………………………………..…………………………………………………………………………………………..

b) Give two negative impacts of Ali’s action to the fast food company.Berikan 2 kesan negatif perbuatan Ali terhadap syarikat makanan segera

[email protected] ( http://rmmict.blogspot.com )

Lead to sexual addiction.Mendorong ketagihan seks.

Lead to perversionMendorong sifat penyumbalewengan

Increase in rape casesPeningkatan kadar kes rogol

14

tersebut. [2 marks][2 markah]

…………………………………………………………………………………………..…………………………………………………………………………………………..

1.2.3.2 Describe the process of filtering to control access to controversial contentsSECTION A

1. Figure 2 shows part of an algorithm for a web page filter.Rajah 2 menunjukkan sebahagian daripada algoritma penapisan laman web.

(SPM 2009)

Figure 2 / Rajah 2

State the filtering method used in the algorithm. Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.………………………………………………..

2 Complete the following statement:/ Lengkapkan pernyataan berikut:(Kedah 2012)

[email protected] ( http://rmmict.blogspot.com )

15

Ahmad and Ah Chong want to control the access to the controversial contents before their kids use the Internet. Ahmad decides to use _______(i)_________ process. He lists the websites that he will block with Internet-filtering software. Ah Chong chooses ______(ii)__________ process. He sets the browser to only accept pages with certain level of ratings.Ahmad dan Ah Chong mahu mengawal akses kepada kandungan kontroversi sebelum anak mereka menggunakan Internet. Ahmad memutuskan untuk menggunakan proses ______(i)__________. Beliau menyenaraikan laman-laman web yang hendak disekat dengan menggunakan perisian tapisan Internet. Ah Chong memilih proses ______(ii)__________. Beliau menetapkan pelayar web agar hanya menerima halaman yang mempunyai tahap penilaian tertentu.

(i)(ii)

3. State whether the following statements is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu

(Kelantan 2012)

Site blocking is aprivate combination of character associated with a username……………..Sekatan laman web adalah kombinasi rahsia aksara berkoitan dengannama pengguns……………….

4. Figure 2 shows the display of an internet filtering softwareRajah 2 menunjukkan paparan pada satu perisian penapisan internet

(SPM 2012)

[email protected] ( http://rmmict.blogspot.com )

FILTERING SETTINGS

Restricted List

http://www.seperti.comhttp://www.jalan.com

ADD REMOVE EXIT

16

Figure 2 / Rajah 2

Based on Figure 2 , state the method usedBerdasarkan rajah 2 nyatakan kaedah yang digunakan

…………………………………………………………….

SECTION B1. Figure 16 below is an example of Internet filtering used by Puan Asiah to control

access of certain website.Rajah 16 merupakan contoh Internet filtering yang digunakan oleh Puan Asiah untuk mengawal capaian kepada laman web tertentu. (Wilayah 2012)

Figure 16 / Rajah 16

Based on Figure 16 : / Berdasarkan Rajah 16:a. State two other methods beside mention above that can be used to

controlaccess of controversial content

[email protected] ( http://rmmict.blogspot.com )

Chat, Sex

17

Namakan dua kaedah lain selain yang dinyatakan di atas yang boleh digunakan untuk mengawal kandungan kontroversi [2 marks][2 markah]....................................................................................................................................................

b. Explain why does Puan Asiah need to prevent her son from accessing the content.

Terangkan kenapa Puan Asiah perlu menghalang anaknya daripada memasuki kandungan tersebut. [2 marks][2 markah]................................................................................................................................................................................................................................................................ ................................................................................................................................

SECTION C

1. Figure ……. below shows issues on controversial contents.Rajah… dibawah menunjukkan isu kandungan kontroversial

(Perlis 2012)

[email protected] ( http://rmmict.blogspot.com )

18

Figure 12 / Rajah 12(a) (i) What is pornography? / Apakah maksud pornografi?

................................................................................................................................

.....................................................................................................................

........... .........................................................................................................

.......................(ii) Give two impact of controversial content on Malaysia society

Beri dua impak kandungan controversial dalam masyarakat Malaysia.

.....................................................................................................................

...........

................................................................................................................................

[3 marks][3 markah]

(b) Give two preferred method of to limit access on the internet to filter pornography content, and explain briefly.Berikan dua cara yang sesuai untuk mengurangkan pencapaian ke

internetbagi menyaring bahan lucah and terangkan dengan ringkasnya......................................................................................................................

................................................................................................................................

................................................................................................................................................................................................................................................................

...........[4 marks][4 markah]

1.2.4 Computer Crimes1.2.4.1 Explain the need for Cyber Law.

SECTION A

[email protected] ( http://rmmict.blogspot.com )

19

1. Cyber law is a system of moral standards or values used as a guideline for computer users. (T/F)Undang-undang Cyber adalah sistem standard moral atau nilai-nilai yang digunakan sebagai pedoman bagi pengguna komputerTRUE / FALSE (SPM 2007)

2. Which of the following are related to the computer laws? Manakah yang berikut berkait dengan undang-undang komputer?

(Selangor 2012)

I. Depend on country and state where the crime is committed Bergantung kepada negara dan negeri di mana jenayah berlaku

II. Prevent misuse of computers Untuk mengelakkan penyalahgunaan komputer

III. Act as guideline to computer users Panduan kepada pengguna komputer

IV. Can be applied anywhere Boleh digunakan di mana-mana

A. I and II B. I and III C. II and IV D. III and IV

SECTION C

1. The following is a text on computer crime in television station broadcasting. Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.

(N.Sembilan 2012)

Nora works as an editor in one of the larger private television broadcasting in Malaysia. She uses her expertise in ICT for editing the television programs in order to preserve the quality before they were broadcast by the television station. Without company’s permission Nora has made copies of the television programs and sells it via Internet.Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran televisyen swasta yang terbesar di Malaysia. Nora menggunakan kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa pengetahuan majikannya.

Based on the text: / Berdasarkan teks itu:

Explain why cyber laws are important for television station broadcasting.Terangkan mengapa undang-undang siber adalah penting untuk stesen penyiaran televisyen. [2 marks] [2 markah]

[email protected] ( http://rmmict.blogspot.com )

20

...............................................................................................................................

.

................................................................................................................................

...............................................................................................................................

.

1.2.4.2 Explain briefly the computer crimes below: • Fraud • Copyright Infringement • Theft • AttacksSECTION A

1. Figure 1 showing example of computer crime. Rajah 1 menunjukkan contoh jenayah komputer. (Pahang 2012)

. Figure 1 / Rajah 1

Based on figure 1, state types of computer crimes in : Berdasarkan rajah 1, nyatakan jenis jenayah komputer di :

(i) X …………………………………………(ii) Y …………………………………………

2. Fill in the blanks with the correct word. Isi tempat kosong dengan perkataan yang betul.

(Terengganu 2012)[email protected] ( http://rmmict.blogspot.com )

X Y

21

(i) Activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data is called _____________ . Aktiviti-aktiviti yang diambil untuk mengganggu peralatan sistem komputer, mengubah pemproses kawalan atau data yang tersimpan rosak dipanggil ____________.

(ii) Transfering of payments to the wrong accounts is an example of _____________ . Pemindahan bayaran bagi akaun-akaun salah ialah satu contoh _____________ .

SECTION B1. Figure 8 shows issues and concern among internet users.

Rajah 8 menunjukkan isu –isu dan kebimbangan dikalangan pengguna internet.

Figure 8 / Rajah 8(a) The above concerns and issues show the need of ....................

Kebimbangan dan isu-isu di atas menunjukkan keperluan kepada........................ [1 mark][1 markah]

(b) Explain one of the computer crime which involve Legal status of Online Transaction.

Terangkan satu daripada jenayah computer yang berkaitan dengantransaksi atas talian.....................................................................................................................

................................................................................................................................

................................................................................................................................

...........[3 marks][3 markah]

2. (a) What is computer crime?Apa maksud jenayah computer? (Perlis 2012)

[email protected] ( http://rmmict.blogspot.com )

Integrity And Security Of Information

Legal Status Of Online Transaction

Privacy And confidentially

Of Information

Security Of Government

Data

22

................................................................................................................................

................................................................................................................................

[2 mark ][2 markah]

(b) Figure 7 shows examples of computer crimeRajah 7 menunjukkan contoh jenayah computer

FigFigure7 / Rajah 7

State two methods on how to prevent computer crimes?Nyatakan dua cara bagi mengatasi jenayah computer?.....................................................................................................................

................................................................................................................................

................................................................................................................................

...........[2 mark ][2 markah]

[email protected] ( http://rmmict.blogspot.com )

23

SECTION C

1. The following is a text on computer crime in television station broadcasting. Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen.

(N.Sembilan 2012)

Nora works as an editor in one of the larger private television broadcasting in Malaysia. She uses her expertise in ICT for editing the television programs in order to preserve the quality before they were broadcast by the television station. Without company’s permission Nora has made copies of the television programs and sells it via Internet.

Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran televisyen swasta yang terbesar di Malaysia. Nora menggunakan kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa pengetahuan majikannya.

Based on the text: / Berdasarkan teks itu:(a) State the computer crime that has been done by Nora.

Nyatakan jenayah komputer yang telah dilakukan oleh Nora.……………………………………………………. [1 marks][1markah]

1.3 Computer Security1.3.1 Definition1.3.1.1 Define computer security.SECTION A1. Write True or False for the following statement : Tuliskan Benar atau Palsu pada pernyataan berikut:

(Pahang 2012)

Computer security means protecting strangers to read our e-mail or use our computer to attack other systems.

Keselamatan komputer bermakna melindungi orang yang tidak dikenali untuk membaca e-mel atau menggunakan komputer kita untuk menyerang sistem

lain.………………………….

[email protected] ( http://rmmict.blogspot.com )

24

1.3.2 Security Threats1.3.2.1 Explain briefly the different threats to computer security:• Malicious code • Hacking • Natural disaster • Theft SECTION A

1. Table I below shows the number of terms of security threats.Jadual I di bawah menunjukkan beberapa istilah ancaman keselamotan.

(Kelantan 2012)

A Piracy /Cetak rompakB Natural disaster / Bencana AlamC Malicious code / Kod HasadD Hacking / Pengodam

Tabel 1 /Jadual 1

Mr. Farid has made copies of all company data to be stored in a safe place to avoid flooding……..En. Farid telah membuat salinan terhadap semua data syarikatnya untukdisimpan di tempat yang selamat bagi mengelakkan dari banjir……..

2. Table 1 shows the threats to computer security Jadual 1 menunjukkan ancaman kepada keselamatan komputer

(Pahang 2012)

J WormK HackingL Nature / environment M Theft

Table 1 / Jadual 1Based on table 1, write J, K, L or M for suitable statement below:Berdasarkan jadual 1, tulis J, K, L atau M untuk pernyataan yang sesuai di bawah:

(i) A program that can pass on the malicious code to other programs by modifying them……………….

Satu program yang boleh memindahkan kod berniat jahat kepada program-program lain dengan mengubah mereka……………….

(ii) Computer is used to steal goods and information.……………….

[email protected] ( http://rmmict.blogspot.com )

25

Komputer digunakan untuk mencuri barang-barang dan maklumat…………

3. State whether the following is True or False.Nyatakan sama ada penyataan berikut Benar atau Palsu.

(Perlis 2012) (i) A fingerprint is an imprint made by the pattern of the skin on the pad of a

human finger………Cap jari adalah cap yang dibuat melalui satu corak dari tapak jari kulit manusia………..

(ii) Email with spam features is a service that receives email messages from unrecognized sources……………..Email dengan spam merupakan satu perkhidmatan menerima pesananemail dari sumber yang tidak diketahui………….

4. Match the statements (a) and (b) with the security threats in Table 1.Padankan kenyataan (a) dan (b) dengan ancaman keselamatan dalam Jadual 1. (P.Pinang

2012)

Security Threats / Ancaman KeselamatanMalicious Kod / Kos Hasad

Hacker / PenggodamTheft / Kecurian

Table 1 / Jadual 1

i. ________________ is the illegal taking of another person's property without that

person's permission________________ adalah pengambilan secara haram harta orang lain

tanpakebenaran.

ii. _______________ is any program code or script that is intended to causeundesired effects, security breaches or damage to a system._______________ adalah sebarang kodaturcara atau skrip yang bertujuanUntuk menyebabkan kesan luar jangka, pencerobohan sekuriti ataukerosakan pada sistem.

[email protected] ( http://rmmict.blogspot.com )

26

SECTION B

1. Figure 12 shows a pop-up message to computer users.Rajah l2 menunjukkan mesej pop-up kepada pengguna-pengguna komputer

(SPM 2011)

Figure 12 / Rajah 12Based on Figure 12: / Berdasarkan Rajah 12:(a) State two ways that causes the pop-up message to appear on the

computer screen.Nyatakan dua cara yang menyebabkan mesej pop-up itu terpapar diskrin komputer.………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

[2 markah]

(b) State two kinds of serious damages if a user ignore the message.Nyatakan dua jenis kerosakan serius .iika pengguna mengabaikan mesej itu.………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

[2 markah]

2. Figure l8 below shows symptoms of a computer problem.Rajah 18 di bowah menunjukkan simptom pada sebuah komputer (Kelantan

2012)

O Screen displays unusual messages / [email protected] ( http://rmmict.blogspot.com )

27

Skrin memaparkan mesej pelikO Files become corrupted / Fail menjadi rosakO Files mysteriously appear / Muncul fail yang menjadi tanda tanya

Figure 18 / Rajah I8Based on the figure above; / Berdasarkan rajah di atas ;

a) Identify thetype of computer threat which matches the symptoms.Kenalpasti jenis ancaman komputer yang berpadanan dengan simptom itu.State one different examples of the threat.Nyotakan satu contoh berlainan bagi ancaman itu. (2m)i. …………………………ii. …………………………

SECTION C

1. Figure 20 shows symptoms of a computer problem Rajah 20 menunjukkan simptom pada sebuah komputer.

(SPM 2010)

- Screen displays unusual messagesSkrin memaparkan mesej pelik

- Files become corruptedFail menjadi rosak

- Fies mysteriously appearMuncul fail yang menjadi tanda Tanya

Figure 20 / Rajah 20

Based on Figure 20: / Berdasarkan Rajah 20:(a) Identify the type of computer threat which matches the symptoms.

Kenal pasti jenis ancaman komputer yang berpadanan dengan simptom itu.i. ………………………………….State two different examples of the threat. / Nyatakan dua contoh berlainan bagi ancaman itu.ii. …………………………………iii. …………………………………

(b) Describe two reasons why the computer may have been affected by the threat in (a).Huraikan dua sebab mengapa komputer tersebut dijangkiti- oleh ancaman di (a).Suggest two ways to prevent it.Cadangkan dua cara untuk mengatasinya....................................................................................................................................................................................................................................................................................................

[email protected] ( http://rmmict.blogspot.com )

28

2. Figure 11 is an excerpt from an online newspaper.Rajah 11 menunjukkan petikan daripada akhbar atas talian

(Kedah 2012)

Figure 11 / Rajah 11Based on Figure 11:/ Berdasarkan Rajah 11:

Explain another two types of threats that may harm the government web site.Terangkan dua jenis ancaman lain yang mungkin memudaratkan tapak web kerajaan.

[4 marks][4 markah]……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

[email protected] ( http://rmmict.blogspot.com )

KUALA LUMPUR: More laws will be introduced soon to tackle cyber intrusion.

Deputy Information, Communications and Culture Minister Dato’ Joseph Salang Gandum said this move followed the attacks on 198 websites, including government portals, by the "Anonymous" hacker group last week.

"We have to set up stronger cyber security measures and ensure that government websites are protected from such activities in the future."

(Straits Time; 21 June, 2011)

KUALA LUMPUR:Lebih banyak undang-undang akan diperkenalkan tidak lama lagi bagi mengatasi gangguan siber. Timbalan Menteri Penerangan Komunikasi dan Kebudayaan Dato’ Joseph Salang Gandum mengatakan bahawa tindakan ini berikutan daripada serangan ke atas 198 laman sesawang termasuk portal kerajaan oleh kumpulan penggodam “Anonymous” minggu lepas.

“Kita perlu menetapkan langkah-langkah keselamatan siber yang lebih kukuh dan memastikan laman-laman web kerajaan dilindungi pada masa akan datang.

(Straits Time; 21 Jun ,2011)

29

3. Statement 2 shows computer security risk.Pernyataan 2 menunjukkan risiko keselamatan komputer.

(Pahang 2012)

Statement 2Pernyataan 2

Based on statement 2, / Berdasar kepada pernyataan 2,

State who is someone? Explain one category of someone.Nyatakan siapa seseorang? Huraikan satu daripada kategori seseorang……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

1.3.3 Security Measures1.3.3.1 Select the appropriate security measures to overcome the identified computer threats1.3.3.2 Apply the correct security procedures: • Antivirus • Anti-Spyware • Cryptography • Firewall • Data backup • Human aspectsSECTION A

1. Figure 3 shows how cryptography works Rajah 3 menunjukkan bagaimana kriptografi bekerja.

(SPM 2007)

Name H : / Namakan H : …………………………………………………………………

[email protected] ( http://rmmict.blogspot.com )

Plaintext H PlaintextEncrypt Decrypt

Amirul need to submit his multimedia presentation on tomorrow morning. While working on his computer, he discover some of files missing and some altered. He realize that someone have accessed his computer, who commit or responsible to wrong doing.

Amirul perlu menghantar persembahan multimedia pada keesokan hari. Semasa membuat kerja di komputer, dia mendapati beberapa fail telah hilang. Dia menyedari seseorang telah mengakses ke komputernya, orang yang bertanggungjawab membuat kesalahan.

30

2. Table 2 shorws the steps of using anti-virus software which is not in thecorrect sequence.Jadual 2 menunjukkan langkah-lamgkah penggunaan perisian anti-virus yang tidak mengikut urutan yang betul.

(SPM 2011)Complete the step. Step 1 and 3 are given.Lengkapkan langkah itu. Langkah I dan 3 diberi.Choose anti virus software/Pilih perisian anti virus (i) 1 Take necessary action /Ambil tindakan yang perlu (ii) ..……Scan the selected area /Imbas kawasan yang dipilih (iii) 3Select area to be scanned /Pilih kawasan yang akan diimbas (iv) ……..

Table 2 /Jadual 2(ii) ………… (iv) …………

3. Figure 1(a) and Figure 1(b) show the problems faced when surfing the internet.Rajah 1(a) dan Rajah 1(b) menunjukkan masalah yang dihadapi semasa

melayari internet.

Figure 1(a) Figure 1(a) Rajah 1(b) Rajah 1(b)Based on Figure 1(a) and Figure 1(b), match the problems above according to the correct security measures:Berdasarkan Rajah 1(a) dan Rajah 1(b), padankan masalah di atas berdasarkan langkah keselamatan yang betul:(i) Figure 1(a) /Rajah 1(a) …………………………..(ii) Figure 1(b) / Rajah 1(b) …………………………..

[email protected] ( http://rmmict.blogspot.com )

31

4. State whether the following statement is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu.

(P.Pinang 2012)

A firewall can be either software-based or hardware-based and is used tohelp keep a network secure.Tembok api boleh berasaskan perisian atau berasaskan perkakasan danDigunakan untuk membantu menjaga keselamatan rangkaian.………………………..

SECTION B

1. Figure l8 below shows symptoms of a computer problem.Rajah 18 di bawah menunjukkan simptom pada sebuah komputer

(Kelantan 2012)O Screen displays unusual messages /

Skrin memaparkan mesej pelikO Files become corrupted /

Fail menjadi rosakO Files mysteriously appear /

Muncul fail yang menjadi tanda tanya

Figure 18 / Rajah 18Based on the figure above; / Berdasarkan rajah di atas ;Explain one ways to prevent it.Huraikan satu cara untuk mengatasinya.

(2 marks/2markah)

……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

2. Figure 6 shows a security procedure done by Affendi. Rajah 6 menunjukkan prosedur keselamatan yang dilaksanakan oleh Affendi

[email protected] ( http://rmmict.blogspot.com )

32

(Trengganu 20Figure 6 / Rajah

Based on Figure 6, / Berdasarkan Rajah 6, (a) Name the security procedure.

Namakan prosedur keselamatan tersebut. [1 mark] …………………………………………………………………………………………………

(b) State the steps taken to apply this security procedure. Nyatakan langkah –langkah yang diambil bagi menggunakan prosedurkeselamatan ini. [3

marks] …………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

SECTION C

[email protected] ( http://rmmict.blogspot.com )

33

1. Figure 11 is an excerpt from an online newspaper.Rajah 11 menunjukkan petikan daripada akhbar atas talian

(Kedah 2012)

Figure 11 / Rajah 11Based on Figure 11: /Berdasarkan Rajah 11:Describe the security measure that should be taken to protect governmentwebsite from the specified threat.Huraikan langkah keselamatan yang perlu diambil untuk melindungi tapak web kerajaan daripada ancaman yang dinyatakan.

[3 marks] [3 markah]

…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

2. The following is a text on computer crime in television station broadcasting. Berikut adalah teks mengenai jenayah komputer di sebuah stesen siaran televisyen. (N.Sembilan 2012)

[email protected] ( http://rmmict.blogspot.com )

KUALA LUMPUR: More laws will be introduced soon to tackle cyber intrusion.

Deputy Information, Communications and Culture Minister Dato’ Joseph Salang Gandum said this move followed the attacks on 198 websites, including government portals, by the "Anonymous" hacker group last week.

"We have to set up stronger cyber security measures and ensure that government websites are protected from such activities in the future."

(Straits Time; 21 June, 2011)

KUALA LUMPUR:Lebih banyak undang-undang akan diperkenalkan tidak lama lagi bagi mengatasi gangguan siber. Timbalan Menteri Penerangan Komunikasi dan Kebudayaan Dato’ Joseph Salang Gandum mengatakan bahawa tindakan ini berikutan daripada serangan ke atas 198 laman sesawang termasuk portal kerajaan oleh kumpulan penggodam “Anonymous” minggu lepas.

“Kita perlu menetapkan langkah-langkah keselamatan siber yang lebih kukuh dan memastikan laman-laman web kerajaan dilindungi pada masa akan datang.

(Straits Time; 21 Jun ,2011)

34

Nora works as an editor in one of the larger private television broadcasting in Malaysia. She uses her expertise in ICT for editing the television programs in order to preserve the quality before they were broadcast by the television station. Without company’s permission Nora has made copies of the television programs and sells it via Internet.Nora bertugas sebagai seorang penyunting di salah satu stesen penyiaran televisyen swasta yang terbesar di Malaysia. Nora menggunakan kepakarannya dalam bidang ICT untuk tugas penyuntingnya bagi menjaga mutu dan kualiti penyiaran. Nora turut membuat salinan semua rakaman rancangan televisyen di stesen tersebut dan menjualnya di Internet tanpa pengetahuan majikannya.

Based on the text: /Berdasarkan teks itu:

Explain TWO ways from the human aspect to prevent the above crime.Terangkan DUA cara dari aspek kemanusiaan untuk mencegah jenayah di atas.

(4marks)(4markah)……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

3 . Statement 2 shows computer security risk.Pernyataan 2 menunjukkan risiko keselamatan komputer.

(Pahang 2012)

[email protected] ( http://rmmict.blogspot.com )

Amirul need to submit his multimedia presentation on tomorrow morning. While working on his computer, he discover some of files missing and some altered. He realize that someone have accessed his computer, who commit or responsible to wrong doing.

Amirul perlu menghantar persembahan multimedia pada keesokan hari. Semasa membuat kerja di komputer, dia mendapati beberapa fail telah hilang. Dia menyedari seseorang telah mengakses ke komputernya, orang yang bertanggungjawab membuat kesalahan.

35

Statement 2Pernyataan 2

Based on statement 2, / Berdasar kepada pernyataan 2,

Describe two ways, how people aspects can protect their computer in (a)?Jelaskan dua cara, bagaimana aspek manusia boleh melindungi komputer mereka dalam (a)?

[4 marks][4 markah]……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

SEMAKANTarikh Topik / Sub topik Tanda

tangan Guru

Catatan

1.2 Introduction to Information Technology

1.1.2 Overview of Information and [email protected] ( http://rmmict.blogspot.com )

36

Communication Technology (ICT)1.1.2.1 Define ICT.1.1.1.3 Describe the brief evolution

of computers.

1.1.2 ICT In Everyday Life: Education, Banking,Industry and Commerce1.1.2.1 List the usage of ICT in everyday life.1.1.2.2 State the differences between computerised and non-computerised systems.1.1.2.3 State the impact of ICT on society.

Tarikh

1.2 Computer Ethics and Legal Issues

1.2.1 Definition1.2.1.1 Define Computer Ethics, Code of Ethics,Intellectual Property, Privacy, Computer Crime and Cyber Law.1.2.1.2 Differentiate between ethics and law.1.2.1.3 State the need for intellectual property laws.

1.2.2 Privacy1.2.2.1 List ways to protect privacy.1.2.2.2 State authentication and verification methods/technologies.

1.2.3 Controversial Contents and Control1.2.3.1 List effects of controversial contents on society: • Pornography • Slander1.2.3.2 Describe the process of filtering to control access to controversial contents.

Topik / Sub topic

Tanda tangan Guru

Catatan

1.2.4 Computer Crimes1.2.4.1 Explain the need for Cyber Law.1.2.4.2 Explain briefly the computer crimes below:• Fraud • Copyright Infringement • Theft • Attacks

[email protected] ( http://rmmict.blogspot.com )

37

1.3 Computer Security1.3.1 Definition1.3.1.1 Define computer security.

1.3.2 Security Threats1.3.2.1 Explain briefly the different threats to computer security:• Malicious code • Hacking • Natural disaster • Theft

1.3 Computer Security1.3.3 Security Measures1.3.3.1 Select the appropriate security measures to overcome the identified computer threats1.3.3.2 Apply the correct security procedures: • Antivirus • Anti-Spyware • Cryptography • Firewall • Data backup • Human aspects

[email protected] ( http://rmmict.blogspot.com )