Thursday, April 1, 2010
Form 4 IR : Exercises
1. 10011110011
2. 1111000111000
3. 1101010001111011
4. 101010101110110101
5. 10110101101101101010
6. 1100010010010010010010
Convert from base 16 to base 2 :
1. 14
2. 2B
3. 3C2
4. 4A
5. 1E2
6. DF2
7. E5F
8. 2A1D
Tuesday, March 2, 2010
Form 4 IR : Exercise
1. What is cyber crime ?
2. State the meaning of phishing.
3. What is authentication ?
4. Differentiate between first computer generation, second generation and third generation. Give 2 differences.
5. Line up the seven internet browser.
6. Give 2 differences between operating system (OS) and application software.
7. Draw the block cycle diagram with the examples.
Thursday, January 14, 2010
Form 5 IR (2010) : Exercise - Friday 16 Jan 2010
1 (Prk).
As an ICT student, you are given a task to develop a multimedia project. In order to do this project, you need some hardware and editing software.
2. (Prk)
An Audio-Visual Room has been equipped with 10 computers and a hub. As an ICT coordinator, you are required to set up a small network in the room.
a) Based on the situation given above, suggest a suitable topology and give one of its advantages.
b) Give two advantages of using a networking rather than a stand-alone pc.
c) Define Extranet.
3. (Phg)
Steven uses his computer daily. Lately he faces some system problem. Some of his files keep on duplicating itself. It is probably caused by viruses. In order to solve this problem, he needs to install an antivirus software.
a. What is an antivirus software?
b. Give ONE example of antivirus software.
c. State TWO effects if a computer is infected by viruses other than the one mentioned above.
d. Suggest TWO ways to prevent a computer from being infected by viruses?
4. (Kdh)
Ahmadi is setting up a network in computer lab as shown in.
a. List two devices needed to set up the computer network.
b. Give the usages of a straight cable and a crossed cable.
Friday, January 8, 2010
Form4 IR (2010) : 1.1.1.1 Define ICT - exercises
1. ICT means .......................................
2. What are the requirements of ICT ? Give 3 requirements.
3. State 3 tools of information transmition.
4. Describe the purpose of information.
5. Give 3 technology of communication.
6. State 2 aids to extend communication.
7. What are the tools that can be used to spread information?
Form 5 IR - Homework !
1. State the function of fingerprint scanner.
.................................................................................................................
3. This is the combination of Os and 1s that represent character 'K' in ASCII coding scheme.
0 1 0 0 1 0 1 1
How many bites are used to represent character 'K' ?
........................................
5. Which feature is available in spreadsheet software ?
A. Drop cap B. Lookup
C. Create Indexes D. Query
6. This statements shows about a utility program.
Usage : a) Provides functions to delete, copy, move, rename and view files.
b) Formats and copies disks
c) Checks the amount of used or free program space on a storage medium.
Based on the statement above, which type of utility is being described ?
A. diagnostic B. back up
C. file management D. data recovery
7. State one feature of proprietary software that does not apply to open source software.
..........................................................
12. Which of the following have a non-linear multimedia presentations ?
i. Movies ii. Computer games
iii. Television advertisement iv. Web page browser
A. i and ii B. i and iii
C. ii and iv D. iii and iv
.. must be submited before enter class on week 2.
Wednesday, October 28, 2009
Question : Area 2 (Comp Sys)
Q2 : State two functions of CPU
Q3 : State one example of device output apart from monitor and one device input apart from mouse and keyboard.
Q4 : Sate one function of RAM
Q5 : State two differences between hard disk and RAM
Answer :
Q2 : i) directs electronic signal / data movements between the components of a comp.
ii) coordinate electronic signal / data movements between the components of a comp.
iii) executes arithmetic operations.
iv) executes logical operations.
v) fetch, decodes and executes instructions given.
vi) process data / information
vii) control the flow of data
Q3 : printer, plotter, LCD projector. joy stick, touch screen, light pen.
Q4 : i) store data temporarily
ii) store data / information / commands for processing
Q5 : i) access time - slower / faster
ii) data stored - permanent / temporary
iii) storage capacity - bigger / smaller
Questions : Area 5 (Programming) - 29 okt 09
Every year, Puan Jamilah, the Senior Assistant of Co-curriculum SMK Sungai Sala, has to prepare a report of the co-curriculum membership according to each class. She has problems in collecting and processing data such as name, identity card number, school registration number, class, society, sport/games and uniform unit.
The students can also change their society and sport/games membership every year. Thus, Puan Jamilah has to double-check manually the latest membership of each student in order to produce a valid report
Task : Discuss what the project is about and do the following steps to help Puan
Jamilah to prepare a report
a) Suggest a suitable title for this project
b) State your reason
c) Identifying project requirements - List all the data that you have identified from the above situation
d) Classifying project requirements. Fill in the field names and relevant data in the table
Question 2 :
What are the 2 methods that executed program in programming and explain briefly.
Question 3 :
Explain two importance of programming language
Question 4 :
What do you understand about coding ?
Question 5 :
State two importance of documentation in a program.
Answers :
Question 2 :
answer : i)compilation (pengkompilan) - process to translate the whole program before execution.
ii)interpretation (pentafsiran) - process to translate and execute the program source code line by line.
Question 3 :
answer : i) as a comm language between human and computer
ii) to solve problems
iii) as a language that instruct the comp in executing daily task
Question 4 :
answer : translating a solution algorithm into a programming language and than typing the programming language code into the computer.
Question 5 :
Answer : i) for maintenance purposes
ii) for editing / upgrading program specification
iii) easier to the programmer to find out the programming error
iv) helps programmer to understand the system flow in the program
v) reduces the amount of time a new programmer spends learning about existing programs
vi) helps the programmer to check variable, subroutine or function that cause logic or syntax errors.
Thursday, September 24, 2009
Revision - spm 2009 : 25 Sept 09
Sila study soalan ini - discuss by group.
Questions :
1. Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification.
( a ) Give Two types of computer security [ 2 Marks ]
( b ) Security measures are precautionary measures taken towards possible
dangers or damages. State the appropriate security measures to
overcome the identified computer threats:
( i ) Data Backup [ 1 Mark ]
( ii ) Cryptography [ 1 Mark ]
( iii ) Antivirus [ 1 Mark ]
2. A system software is a program that controls or maintains the operations of a computer and its devices. A system software also serves as the interface between the user, the application software and the computer’s hardware. Two types of system software is utility program and operating system.
( a ) Define operating system and give two example of operating system.
[ 3 Marks ]
( b ) State two differences between operating system and utility program.
[ 2 Marks ]
Sceme :
1.
(a) hardware security, software security/data security,network security
(b) (i) Data Backup is a program of file duplication. Backups of data applications are necessary so that they can be recovered in case of an emergency.
(ii) Cryptography is a process of hiding information by altering the actual information into different representation.
(iii) An antivirus program protects a computer against viruses by identifying and removing any computer.
2. ( a ) An operating system is a set of programs that coordinates all the activities among
the computer hardware devices. In most cases, the operating system is installed and
resides on the computer’s hard disk. Examples, Linux, Windows XP, Unix etc
Wednesday, June 24, 2009
Form5 : Exercises 25Jun2009
2. Define the meaning of data
Bit
Byte
Field
Record
File
3. Select a correct term from the option given which suitable the statement below.
I. A group of usually eight bits that a computer operated on as a single unit.
………………………...
II. A group of characters such as a name or number.
………………………..
III. The smallest unit of data that a system can handle.
……………………….
IV. A set of related data grouped together.
……………………….
4. Define the meaning of hardware as one of the information system components.
5. Give the meaning of software as one of the information system components.
6. Identify the generations under low-level of programming languages with examples
7. State two differences between compiler and interpreter
8. State the definition of computer programme
9. State the definition of programming language
10. Ali wants to produce a multimedia presentation entitled “ Patriotic Month”. He need to insert real assembly scene, principal speech and pictures scanned from the school magazines. State three hardware needed to carry out this task.
Tuesday, June 16, 2009
Form 5 ik1 & 5ik2 : Exercise - Answer questions
1. Biometric technology is .....
2. Computer ethics is ....
3. Antivirus program is ....
4. Privacy is ....
5. Pornography is ....
6. Phishing is ....
7. Spyware is ....
8. What is virus ? Virus is ....
9. Communication is ....
10. E-commerce is ....
Thursday, May 21, 2009
Form 5 : Exercise (Revision) - 22May09
2. Modify image of “Visit Malaysia 2009” logo so that it can be animated.
3. Record the “Malaysia Truly Asia” song.
4. Insert the images, song and animated object
Question 1:
According to the situation above :
Aina has listed a number of things she should do in Table 3 to complete a multimedia project entitled “ Places of Interest in Malaysia”. She uses authoring tool software to make her project more effective and interesting.
(a) Aina wants to edit the song of “Malaysia Truly Asia”. Give an example of an editor.
(b) State all types of multimedia elements used in the project.
(c) Explain the rule of multimedia in education
Question 2 :
a). The …………………………………… design approach enables a programmer to package the data and program( or procedure) into a single unit, called an object.
b). The transfer of information from sender, across a distance, to a receiver , it refers to …………………………………… However the computers are able to communicate each other by using the ………………………..... It is a standard that sets the rules computers must follow in communicating.
c). M are used to interpret and execute program line by line directly from its source code.
M refers to ……………………………………………………..……………………………….
Question 3 :
a. Which of the following combination of multimedia elements and its standard format file is correct?
A. Audio ------- .dat
B. Video ------- .doc
C. Audio ------- .wav
D. Graphic ------- .http
b. Shahreen wants to record New Version of National Anthem from a television programme and use it as audio source in her presentation. What is the most suitable software for audio editor?
A. Frontpage
B. Notepad
C. SoundForge
D. Moviemaker
Thursday, May 7, 2009
Form 5 & Form 4 : SPM Question (Exercises) - 8 May 09
Essay writing (Describe) :
1. Differentiate between ethics and laws
2. Differentiate between topology (star) and topology (bus).
3. Differentiate between two computer types between LAN and WAN.
Form 4 & Form 5 : Questions - Exercises.
Questions :
Essay writing
1. Differentiate between ethics and laws
( 7 Points)
2. Differentiate between topology (star) and topology (bus).
( 7 Points)
3. Differentiate between two computer types between LAN and WAN.
Saturday, May 2, 2009
Form 5 : Revision Questions - Mei 2009
i)unit arimetik dan logik
ii)unit kawalan.
2. Berikan dua perbezaan antara ROM dan RAM.
3. Nyatakan perbezaan storan primer dan storan sekunder (primary & secondary storage)
4. Nyatakan satu fungsi perisian MS Excel.
5. Jelaskan dua kesan penggunaan perisian MS Excel terhadap budaya kerja seorang guru.
6. Nyatakan dua perbezaan antara teknologi perisian MS Word dan mesin taip.
7. Anda merupakan setiausaha Persatuan Kelab Komputer sekolah anda. Kelab Komputer ingin mengadakan satu ceramah tentang 'Kelebihan Hamparan Elektronik' yang akan di Makmal Multimedia. Selaku setiausaha anda telah menyediakan beberapa catatan untuk diterangkan kepada perserta seminar. Segala catatan tadi akan diubah dan dimasukkan ke dalam komputer untuk memudahkan penerangan anda nanti.
a) Berikan 2 ciri fungsi hamparan elektronik dan nyatakan 2 contoh perisian hamparan elektronik.
b) Jelaskan 2 kesan penggunaan perisian hamparan elektronik
c) Terangkan bagaimana setiausaha kelab dapat menyampaikan ceramah beliau dengan lebih menarik.
d) Nyatakan alatan-alatan tambahan yang boleh digunakan untuk membantu setiausaha kelab dalam ceramahnya.
8. Suu Wit sedang membuat kajian mengenai internet sebagai sebahagian dari kerja kursus di sekolah. Dia menyenaraikan istilah-istilah berikut untuk difahami dengan lebih mendalam.
A. www
B. penggodaman (hacking)
C. kelucahan (phonography)
D. rangkaian komputer dan telekomunikasi
a. Jelaskan maksud www yang dikenalpasti oleh Su Wit.
b. Nyatakan bagaimana aktiviti B di atas boleh dilaksanakan menggunakan internet dan terangkan kesannya terhadap sistem komputer.
c. Huraikan bagaimana perkara C yang digariskan oleh Su Wit dikaitkan dengan internet dan nyatakan kesannya terhadap pelajar.
d. Dengan contoh yang jelas, huraikan bagaimana penggunaan sistem D dapat mempengaruhi kehidupan manusia.
Wednesday, April 22, 2009
Form 5 : Exercise (Information System)
1. Give the meaning of data
2. What is information ?
3. Define the meaning of information system
4. State 3 usages of Information System in education
5. Give 3 usages of Information System in business
6. State 3 usages of Information System in management
Monday, February 23, 2009
Form 5ik1 & 5ik2 : Translator (Exercises) 25feb09
1. Describe briefly the meaning of program with at least two examples.
2. Translator is a third party that translated the high-level language into machine language before the computer can understand and execute the instructions in the program. State 3 types of translator.
3. Explain briefly about assembler. Give at least 2 examples.
4. Explain briefly about interpreter. Give at least 2 examples.
5. Explain briefly about compiler. Give at least 2 examples.
Monday, February 9, 2009
Form 5ik1 & 5ik2 : Exercise - Pra SPM (A) ktanB

Answer all questions :
1. In general, ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. What is a definition of ethic in computing ?
2. In our daily lives, we are surrounded by things that are protected by Intelectual Property. What is a definition of intellectual property ?
3. State two requirements for intellectual property laws.
4. Normally a router is use to access internet from a workstation to other place.
a) State two Internet services.
b) Explain the advantage of Internet to the students.
5. Web-base and CD-based are the medium of delivery for multimedia applications. State two differences between Web-based and CD-based.
Thursday, February 5, 2009
Form5 : Exercise (b07ked)
Attention to all students Form 5ik1 and 5ik2..
Answer all question in A4 paper, pass up on Monday 9Feb09 before 11am. State name, class and date.
1. Operating System(OS) is a set of program that schedules tasks, allocates storage and presents a default interface to the user between applications.
List 3 examples of Operating System.
2. Give one example of low-level programming language.
3. Ahmadi is setting up a network in computer lab. List two devices needed to set up the computer network.
4. Give the usages of a straight cable and a crossed cable.
5. Adam works as a manager in a finance company. He was asked to send a top secret report to Maria in another branch. Adam asked Lina to send this report. When Lina tries to read the report she found out that the report has been encrypted.
i. Why does Adam encrypt the report?
ii. What is the term given to the encrypted text in the report?
iii. What do Adam and Maria need to have in order to create and read the report?
Thursday, January 8, 2009
Form4 : Exercise 1.1.1.1
1. ICT means .......................................
2. What are the requirements of ICT ? Give 3 requirements.
3. State 3 tools of information transmition.
4. Describe the purpose of information.
5. Give 3 technology of communication.
6. State 2 aids to extend communication.
7. What are the tools that can be used to spread information?
Wednesday, January 7, 2009
Form5 : Exercise 5.1.1 (Program & Prg Language)
Q1 : State the definition of program and give 3 examples of program.
Q2 : What is programming language and state 3 examples of program language.
Q3 : Give 2 differentiations between program and programming language.