You are on page 1of 3

JADUAL SPESIFIKASI UJIAN

Final Year Form 4 2015 (Paper 1)


ITEM QUEST.

DIFFICULTY LEVEL
EASY MEDIUM HIGH
SECTION A (Answer all)
Describe the brief evolution of computers

Describe the brief evolution of computers

Define Computer Ethics, Code of Ethics,


Intellectual Property, Privacy, Computer
Crime and Cyber Law
CRITERIA ASPECT

QUESTION
TYPE

1
2
3

1 (i)
1 (ii)
2

1.1.1.2
1.1.1.2
1.2.1.1

MATCHING
MATCHING
MCQ

3 (i)

1.2.2.1

List ways to protect privacy

TRUE/FALSE

3 (ii)

1.2.2.2

State authentication and verification


methods / technologies

TRUE/FALSE

1.2.3.1

List effects of controversial contents on


society :

STATE

Pornography
Slander
7

1.2.4.2

Explain briefly the computer crimes below :


Fraud, Copyright Infringement, Thef, Attacks

STATE

6(i)

1.3.2.1

MATCHING

6(ii)

1.3.2.1

Explain briefly the different threats to


computer security : Malicious code, Hacking,
Nature / environment, Theft
Explain briefly the different threats to
computer security : Malicious code, Hacking,
Nature / environment, Theft

MATCHING

10

1.3.3.2

MCQ

11

2.1.1.2

TRUE/FALSE

12

2.1.2.1

FIB

13
14

10
11

2.1.3.1
2.1.5.1

FIB
STATE

15

12

2.3.2.1

Apply the correct security procedures.


Antivirus, Anti-Spyware, Cryptography,
Firewall, Data backup, Human aspects
State the meaning of input, processor, output
and storage
State the relation of data representation : bit,
byte and character
Explain the function of ASCII code
Describe the units of clock speed
measurement: MHz, GHz
Differentiate between the types and usage of
application software (word processing,
spreadsheet, presentation, graphic)

MCQ

16

13

2.3.3.1

Differentiate between the types and usage of


utility programs (file management, diagnostic
and file compression)

STATE

17

14

2.2.1.1

MATCHING

18

15

2.2.2.1

Identify the input devices used for text,


graphic, audio and video
Identify the output devices used for text,
graphic, audio and video

MATCHING

ITEM QUEST.

CRITERIA ASPECT

19

16

2.2.4.1

20

17

2.3.1.1

Explain types and functions of: Primary


storage (RAM, ROM), Secondary storage
(magnetic medium, opical medium, flash
memory)
State the various types of OS used on different

DIFFICULTY LEVEL
EASY MEDIUM HIGH

QUESTION
TYPE
MATCHING

STATE

platforms
21

18(i)

2.3.4.1

Differentiate between proprietary and open


source software

TRUE/FALSE

22

18(ii)

2.3.4.1

Differentiate between proprietary and open


source software

TRUE/FALSE

23

19(i)

3.1.5.2

MATCHING

24

19(ii)

3.1.5.2

Differentiate between the three types of


network topology
Differentiate between the three types of
network topology

MATCHING

25

20(i)

3.1.3.1

Define types of computer networks: Local


Area Network (LAN), Metropolitan Area
Network (MAN), Wide Area Network (WAN)

STATE

26

20(ii)

3.1.3.1

Define types of computer networks: Local


Area Network (LAN), Metropolitan Area
Network (MAN), Wide Area Network (WAN)

27

21(i)

3.1.4.1

Define two types of network architecture:


Client/Server, Peer-to-Peer

28

21(ii)

3.1.4.1

Define two types of network architecture:


Client/Server, Peer-to-Peer

29

22(i)

3.3.1.2

Name various Network Operating System


Software

30

22(ii)

3.2.2.1

31

23

3.4.2.1

Identify various types of cables such as


Unshielded Twisted Pair (UTP), Shielded
Twisted Pair (STP), Coaxial and Fibre Optic
Cable
Crimp and test UTP cable : Straight cable,
Crossed cable

32

24(i)

3.1.5.2

33

24 (ii)

3.3.2.1

34

25(i)

3.2.2.2

35

25(ii)

3.2.2.2

36

25(iii)

3.2.2.2

SECTION B (Answer all)


26
(i)
(ii)

STATE

FIB
FIB

STATE
STATE

MCQ

Differentiate between the three types of


network topology
State the functions of various client software.

STATE

STATE

Identify various types of wireless transmission


media such as infrared, radio wave and
satellite
Identify various types of wireless transmission
media such as infrared, radio wave and
satellite

MATCHING

MATCHING

Identify various types of wireless transmission


media such as infrared, radio wave and
satellite

MATCHING

TOTAL
1.2.1.2
1.2..4.1

Differentiate between ethics and law


Explain the need for cyber law.

Task Word
State 2
Give 2

ITEM QUEST.
27

28

29

30

CRITERIA ASPECT

DIFFICULTY LEVEL
EASY MEDIUM HIGH

QUESTION
TYPE
Define

(i)

2.1.1.1

Define computer system

(ii)

2.1.1.3

Describe the information processing cycle


which includes input, process, output and
storage using a block diagram.

Draw a block
diagram

(i)

2.3.1.3

State the different interfaces of OS

Identify, justify

(ii)

2.3.4.1

Differentiate between proprietary and open


source software

Differentiate

(i)

3.1.5.2

(ii)

3.1.5.2

Identify 2
topologi
Differentiate

(i)

3.2.1.1

Differentiate between the three types of


network topology
Differentiate between the three types of
network topology
Identify the devices needed in computer
network communication

Identify 2
devices

(ii)

3.2.1.2

State the function of the following

State the
function
Task Word
Give 2

Identify, justify

name, define

Identify, justify

Q1 - compulsory, choose Q2 or Q3)


31
(i)
3.1.2.1 State the importance of computer networks
and communications
(ii)
3.1.7.1 Describe the types of network
communications technology
(iii)
3.1.4.1 Define two types of network architecture:
Client/Server, Peer-to-Peer
32
(i)
2.3.2.1 Differentiate between the types and usage of
application software (word processing,
spreadsheet, presentation, graphic)

33

(ii)

2.3.3.1

Differentiate between the types and usage of


utility programs (file management, diagnostic
and file compression)

Identify 2,
differentiate 2

(i)

1.3.1.1

Define computer security

Define

(ii)

1.3.2.1

Explain briefly the different threats to


computer security : Malicious code, Hacking,
Nature / environment, Theft

Identify, justify

(iii)

1.3.2.2

Explain briefly the different threats to


computer security : Malicious code, Hacking,
Nature / environment, Theft

Explain another
threats

TOTAL

25

10

You might also like