SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP
1 (a) Predictions about the size of the hole in the ozone layer, modeling of global warming and the effects of
greenhouse gases are examples of the uses of information technology in science field.
(i) Name the category of computer that suits to perform the activities mentioned above.
[1 mark]
_________________________________________________________________________
(ii) Discuss the capabilities of the category of the computer based on your answer in 1(a)(i)
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(b) Discuss one of the benefits for applying information technology in the role of scientist work and
research.
[2 marks]
______________________________________________________________________________
______________________________________________________________________________
2 (a) Identify the operation of IPOS which involved in the following scenario.
[2 marks]
i.
Light is captured through the camera lenses and transformed
to create a digital image.
ii.
You press the remote control button to triggers the signal to
switch the television channel.
(b) En. Imran has subscribed for MaximusONE Plan with 8GB data which provides only internet plan with
unlimited talk & text to any number, every day. He has used 68% of his quota in day 20. Calculate the
exact number of his balance data in MB.
[2 marks]
(c) Complete the following number sequence in hexadecimal number.
[1 mark]
1010 10112 1310 1016 _____16 110012
(d)
This coding scheme supports a huge diversity of characters from
throughout the world. That’s why; this coding scheme became the
most commonly used in recent technologies.
PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP
(i) Identify the suitable coding scheme based on the above statement.
[1 mark]
_________________________________________________________________________
(ii) Give 2 (two) characteristics of coding scheme stated in 2 (d).
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(f) Write down the outputs for Z1, Z2, and Z3 in the Figure 1 below.
[3 marks]
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
(g) In order to lose weight effectively, experts always give the following tips:
Do not avoid breakfast
Drink plenty of water
Live an active life
Draw a logic circuit based on the above statement.
[ 4 marks]
Z1= ______
Z3= ______
Z2= ______
Figure 1
PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP
3 Figure 2 shows the physical components of the computer. Answer the following questions based on Figure 2.
Figure 2
(a) (i) Identify component P which function is to hold many components of the system..
[1 mark]
_________________________________________________________________________
(ii) State two (2) of the basic components of P.
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(iii) Define each of the components mentioned in 3(a)(ii).
[2 marks]
(b) Component Q is the heart of any computer.
(i) State the function of component Q.
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(ii) Machine cycle have four (4) basic operations, which occur in component Q. Explain the step in
machine cycle which involved ALU.
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
P
Q
R
S
PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP
(iii) The results produced will be stored in memory. Name the type of memory involves in this last steps
of machine cycle
[1 mark]
_________________________________________________________________________
_________________________________________________________________________
(iv) Explain the type of memory mentioned in 3(b)(iii)
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(c) (i) Identify component R and its type of storage.
[2 marks]
Component R Type of storage
(d) (i) Identify Component S which is an adapter card that is use to connect other computers through
telephone lines.
[1 mark]
_________________________________________________________________________
(ii) Besides component S, identify other types of adapter card that enables a computer to connect to
other computers and peripherals.
[1 mark]
_________________________________________________________________________
(e) All airports nowadays use self check-in kiosk to facilitate their passengers.
Figure 3
PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP
(i) State each input and output device used in computer kiosk as in Figure 3.
[ 2 marks]
Input device Output device
4 (a) Identify the function of Operating System based on the situation below.
[3 marks]
Situation Function of OS
Ahmad has bought a new device to be added to
his complete computer system.
Ahmad can control the data entry and how
information is displayed on his computer screen.
Ahmad would like to share resources such as
software and hardware with his roommate.
(b) Identify the types of Utility program based on the function below.
[2 marks]
Utility function Types of Utility Program
Detect computer files whose contents are
scattered across several locations on the hard
disk, and move the fragments to one location
to increase efficiency.
Shrink the size of disk content in order to
increase the capacity of the disk.
(c) (i) List two (2) examples of documents that can be produced by using word processing software.
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(ii) Give two (2) usages of spreadsheet software.
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(iii) Give one (1) example for each of the of application software below.
[2 marks]
Application Software Proprietary Open Source
Presentation
Database
PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP
5 (a) Ali wants to set up a network in his office and he has bought a laser printer and 5 computers with a
Network Interface Card (NIC) built in.
(i) What is computer network?
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(ii) State other two (2) things that Ali must have in order to setup the network.
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(b) Farish plans to hold a network soccer games competition with his three roommates during weekend.
Each of them will use their own laptop to participate in the competition.
(i) Suggest the most suitable type of network architecture for them.
[1 mark]
_________________________________________________________________________
(ii) Justify your answer in 5(b) (i)
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(iii) Draw and label a topology layout if Farish wishes to use star topology.
[4 marks]
(iv) State the difference between the type of network that Farish use and the internet.
_________________________________________________________________________
_________________________________________________________________________
6 (a) State one (1) similarity between intranet and extranet compared to internet.
[ 2 marks]
______________________________________________________________________________
______________________________________________________________________________
PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP
(b) (i) Suggest the best type of internet connection for the following situation.
[3 marks]
Internet Connection Situation
This connection is useful for serving remote or sparsely
populated areas. Service can be disrupted in extreme
weather conditions.
This connection use technology that converts electrical
signals carrying data to light and sends the light through a
special cable about the diameter of a human hair.
This connection is established and maintained for limited
time duration.
(ii) Name two (2) Internet Service Provider.
[ 2 marks]
_________________________________________________________________________
_________________________________________________________________________
(c)
(i) What is the function of IP address?
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(ii) Give one (1) example of the other representation of IP address.
[1 mark]
_________________________________________________________________________
(iii) Suggest a solution for the problem in the above statement.
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
7 (a) (i) Identify the component of the web address segment below:
[ 2 marks]
Web address segment Component
permohonan-matrikulasi-kpm-sesi.html
http://
/2015/07/
www.malaysiatercinta.com/
“ The world is officially ran out of the 4.3 billion available IPv4 addresses
in February 2011. Yet, hundreds of millions of people are still to come
online, many of whom will do so in the next few years.. “
Statement from: http://www.internetsociety.org/
PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP
(ii) Name two (2) web browsers that can be used to access the web address above.
[ 2 marks]
_________________________________________________________________________
_________________________________________________________________________
(b) State the difference between the two (2) types of web page navigation.
[3 marks]
Type A: Type B:
(c) (i) Explain the two (2) ways of searching the information through the internet.
[ 2 marks]
_________________________________________________________________________
_________________________________________________________________________
(ii) Give one (1) example for each of the information search tool in 7(c)(i)
[ 1 mark]
_________________________________________________________________________
_________________________________________________________________________
(d) Differentiate between the two types of Internet services below.
[2 marks]
Instant Messaging Message Board
(e) State the similarity between the two types of website below.
[2 marks]
Blog Online Social Network
8 (a) Give two (2) netiquettes that can be applied if someone would like to send a complaint e-mail to Internet
Service Provider due to bad quality of internet speed.
[2 marks]
______________________________________________________________________________
______________________________________________________________________________
PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP
(b) (i) Which area of computer ethic is involves if someone wants to protect a new development of
computer programs.
[1 mark]
_________________________________________________________________________
(ii) Which areas of computer ethics is involve if someone tries to get information from a computer
server in a campus local area network.
[1 mark]
_________________________________________________________________________
(iii) Which areas of computer ethics is involve if an Eco-font is used to save more ink while printing.
[1 mark]
_________________________________________________________________________
(c) Numerous types of services are offered through the use of online banking.
(i) Explain one (1) risk of becoming an online banking user?
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(ii) State one (1) way of how Banking protects customer from the risk mentioned in 8(c)(i).
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(d) Suggest the appropriate solution for each of the computer threats below.
[3 marks]
Risk Solution
A program enters into your computer to
monitors your online activities or installs
programs without your consent for profit or to
capture personal information.
Web sites that make software available online for
download for free or in exchange for users who
uploaded software.
Sudden power spikes in computer lab lead to data
in volatile memory not being saved to permanent
storage.
END OF QUESTIONS

Contenu connexe

Similaire à Prepspm 1516 kmpp

Computing_Year 10_Track 1_Student Paper.pdf
Computing_Year 10_Track 1_Student Paper.pdfComputing_Year 10_Track 1_Student Paper.pdf
Computing_Year 10_Track 1_Student Paper.pdf
raheeema suleman
 
Q 1-3 Chapter 1Q 4 Chapter 2Q 5-6 Chapter 3Q 7- 8 Ch.docx
Q 1-3  Chapter 1Q 4      Chapter 2Q 5-6  Chapter 3Q 7- 8  Ch.docxQ 1-3  Chapter 1Q 4      Chapter 2Q 5-6  Chapter 3Q 7- 8  Ch.docx
Q 1-3 Chapter 1Q 4 Chapter 2Q 5-6 Chapter 3Q 7- 8 Ch.docx
makdul
 
Challenging Question
Challenging QuestionChallenging Question
Challenging Question
fizahPhd
 
2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette
hazirma
 

Similaire à Prepspm 1516 kmpp (20)

Computing_Year 10_Track 1_Student Paper.pdf
Computing_Year 10_Track 1_Student Paper.pdfComputing_Year 10_Track 1_Student Paper.pdf
Computing_Year 10_Track 1_Student Paper.pdf
 
Output Devices In-Class Worksheet (Hard)
Output Devices In-Class Worksheet (Hard)Output Devices In-Class Worksheet (Hard)
Output Devices In-Class Worksheet (Hard)
 
Knowing about Computer 4
Knowing about Computer 4Knowing about Computer 4
Knowing about Computer 4
 
12o Φ.Α. 2.4.2
12o Φ.Α. 2.4.212o Φ.Α. 2.4.2
12o Φ.Α. 2.4.2
 
2010
20102010
2010
 
Exercise 2
Exercise 2Exercise 2
Exercise 2
 
2009
20092009
2009
 
A Hierarchically-Layered Multiplayer Bot System for a First-Person Shooter
A Hierarchically-Layered Multiplayer Bot System for a First-Person ShooterA Hierarchically-Layered Multiplayer Bot System for a First-Person Shooter
A Hierarchically-Layered Multiplayer Bot System for a First-Person Shooter
 
Q 1-3 Chapter 1Q 4 Chapter 2Q 5-6 Chapter 3Q 7- 8 Ch.docx
Q 1-3  Chapter 1Q 4      Chapter 2Q 5-6  Chapter 3Q 7- 8  Ch.docxQ 1-3  Chapter 1Q 4      Chapter 2Q 5-6  Chapter 3Q 7- 8  Ch.docx
Q 1-3 Chapter 1Q 4 Chapter 2Q 5-6 Chapter 3Q 7- 8 Ch.docx
 
Challenging Question
Challenging QuestionChallenging Question
Challenging Question
 
Technology in the classroom survey
Technology in the classroom surveyTechnology in the classroom survey
Technology in the classroom survey
 
Qam64
Qam64Qam64
Qam64
 
2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Know about Computer 1
Know about Computer 1Know about Computer 1
Know about Computer 1
 
Journal
JournalJournal
Journal
 
Minicurso Objective-C LinguÁgil 2011 (parte2)
Minicurso Objective-C LinguÁgil 2011 (parte2)Minicurso Objective-C LinguÁgil 2011 (parte2)
Minicurso Objective-C LinguÁgil 2011 (parte2)
 
CU3 FAILING
CU3 FAILING CU3 FAILING
CU3 FAILING
 
Output Devices Homework Worksheet
Output Devices Homework WorksheetOutput Devices Homework Worksheet
Output Devices Homework Worksheet
 
Output Devices In-Class Worksheet (Easy)
Output Devices In-Class Worksheet (Easy)Output Devices In-Class Worksheet (Easy)
Output Devices In-Class Worksheet (Easy)
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 

Prepspm 1516 kmpp

  • 1. PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP 1 (a) Predictions about the size of the hole in the ozone layer, modeling of global warming and the effects of greenhouse gases are examples of the uses of information technology in science field. (i) Name the category of computer that suits to perform the activities mentioned above. [1 mark] _________________________________________________________________________ (ii) Discuss the capabilities of the category of the computer based on your answer in 1(a)(i) [2 marks] _________________________________________________________________________ _________________________________________________________________________ (b) Discuss one of the benefits for applying information technology in the role of scientist work and research. [2 marks] ______________________________________________________________________________ ______________________________________________________________________________ 2 (a) Identify the operation of IPOS which involved in the following scenario. [2 marks] i. Light is captured through the camera lenses and transformed to create a digital image. ii. You press the remote control button to triggers the signal to switch the television channel. (b) En. Imran has subscribed for MaximusONE Plan with 8GB data which provides only internet plan with unlimited talk & text to any number, every day. He has used 68% of his quota in day 20. Calculate the exact number of his balance data in MB. [2 marks] (c) Complete the following number sequence in hexadecimal number. [1 mark] 1010 10112 1310 1016 _____16 110012 (d) This coding scheme supports a huge diversity of characters from throughout the world. That’s why; this coding scheme became the most commonly used in recent technologies.
  • 2. PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP (i) Identify the suitable coding scheme based on the above statement. [1 mark] _________________________________________________________________________ (ii) Give 2 (two) characteristics of coding scheme stated in 2 (d). [2 marks] _________________________________________________________________________ _________________________________________________________________________ (f) Write down the outputs for Z1, Z2, and Z3 in the Figure 1 below. [3 marks] ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ (g) In order to lose weight effectively, experts always give the following tips: Do not avoid breakfast Drink plenty of water Live an active life Draw a logic circuit based on the above statement. [ 4 marks] Z1= ______ Z3= ______ Z2= ______ Figure 1
  • 3. PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP 3 Figure 2 shows the physical components of the computer. Answer the following questions based on Figure 2. Figure 2 (a) (i) Identify component P which function is to hold many components of the system.. [1 mark] _________________________________________________________________________ (ii) State two (2) of the basic components of P. [2 marks] _________________________________________________________________________ _________________________________________________________________________ (iii) Define each of the components mentioned in 3(a)(ii). [2 marks] (b) Component Q is the heart of any computer. (i) State the function of component Q. [2 marks] _________________________________________________________________________ _________________________________________________________________________ (ii) Machine cycle have four (4) basic operations, which occur in component Q. Explain the step in machine cycle which involved ALU. [2 marks] _________________________________________________________________________ _________________________________________________________________________ P Q R S
  • 4. PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP (iii) The results produced will be stored in memory. Name the type of memory involves in this last steps of machine cycle [1 mark] _________________________________________________________________________ _________________________________________________________________________ (iv) Explain the type of memory mentioned in 3(b)(iii) [2 marks] _________________________________________________________________________ _________________________________________________________________________ (c) (i) Identify component R and its type of storage. [2 marks] Component R Type of storage (d) (i) Identify Component S which is an adapter card that is use to connect other computers through telephone lines. [1 mark] _________________________________________________________________________ (ii) Besides component S, identify other types of adapter card that enables a computer to connect to other computers and peripherals. [1 mark] _________________________________________________________________________ (e) All airports nowadays use self check-in kiosk to facilitate their passengers. Figure 3
  • 5. PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP (i) State each input and output device used in computer kiosk as in Figure 3. [ 2 marks] Input device Output device 4 (a) Identify the function of Operating System based on the situation below. [3 marks] Situation Function of OS Ahmad has bought a new device to be added to his complete computer system. Ahmad can control the data entry and how information is displayed on his computer screen. Ahmad would like to share resources such as software and hardware with his roommate. (b) Identify the types of Utility program based on the function below. [2 marks] Utility function Types of Utility Program Detect computer files whose contents are scattered across several locations on the hard disk, and move the fragments to one location to increase efficiency. Shrink the size of disk content in order to increase the capacity of the disk. (c) (i) List two (2) examples of documents that can be produced by using word processing software. [2 marks] _________________________________________________________________________ _________________________________________________________________________ (ii) Give two (2) usages of spreadsheet software. [2 marks] _________________________________________________________________________ _________________________________________________________________________ (iii) Give one (1) example for each of the of application software below. [2 marks] Application Software Proprietary Open Source Presentation Database
  • 6. PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP 5 (a) Ali wants to set up a network in his office and he has bought a laser printer and 5 computers with a Network Interface Card (NIC) built in. (i) What is computer network? [2 marks] _________________________________________________________________________ _________________________________________________________________________ (ii) State other two (2) things that Ali must have in order to setup the network. [2 marks] _________________________________________________________________________ _________________________________________________________________________ (b) Farish plans to hold a network soccer games competition with his three roommates during weekend. Each of them will use their own laptop to participate in the competition. (i) Suggest the most suitable type of network architecture for them. [1 mark] _________________________________________________________________________ (ii) Justify your answer in 5(b) (i) [2 marks] _________________________________________________________________________ _________________________________________________________________________ (iii) Draw and label a topology layout if Farish wishes to use star topology. [4 marks] (iv) State the difference between the type of network that Farish use and the internet. _________________________________________________________________________ _________________________________________________________________________ 6 (a) State one (1) similarity between intranet and extranet compared to internet. [ 2 marks] ______________________________________________________________________________ ______________________________________________________________________________
  • 7. PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP (b) (i) Suggest the best type of internet connection for the following situation. [3 marks] Internet Connection Situation This connection is useful for serving remote or sparsely populated areas. Service can be disrupted in extreme weather conditions. This connection use technology that converts electrical signals carrying data to light and sends the light through a special cable about the diameter of a human hair. This connection is established and maintained for limited time duration. (ii) Name two (2) Internet Service Provider. [ 2 marks] _________________________________________________________________________ _________________________________________________________________________ (c) (i) What is the function of IP address? [2 marks] _________________________________________________________________________ _________________________________________________________________________ (ii) Give one (1) example of the other representation of IP address. [1 mark] _________________________________________________________________________ (iii) Suggest a solution for the problem in the above statement. [2 marks] _________________________________________________________________________ _________________________________________________________________________ 7 (a) (i) Identify the component of the web address segment below: [ 2 marks] Web address segment Component permohonan-matrikulasi-kpm-sesi.html http:// /2015/07/ www.malaysiatercinta.com/ “ The world is officially ran out of the 4.3 billion available IPv4 addresses in February 2011. Yet, hundreds of millions of people are still to come online, many of whom will do so in the next few years.. “ Statement from: http://www.internetsociety.org/
  • 8. PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP (ii) Name two (2) web browsers that can be used to access the web address above. [ 2 marks] _________________________________________________________________________ _________________________________________________________________________ (b) State the difference between the two (2) types of web page navigation. [3 marks] Type A: Type B: (c) (i) Explain the two (2) ways of searching the information through the internet. [ 2 marks] _________________________________________________________________________ _________________________________________________________________________ (ii) Give one (1) example for each of the information search tool in 7(c)(i) [ 1 mark] _________________________________________________________________________ _________________________________________________________________________ (d) Differentiate between the two types of Internet services below. [2 marks] Instant Messaging Message Board (e) State the similarity between the two types of website below. [2 marks] Blog Online Social Network 8 (a) Give two (2) netiquettes that can be applied if someone would like to send a complaint e-mail to Internet Service Provider due to bad quality of internet speed. [2 marks] ______________________________________________________________________________ ______________________________________________________________________________
  • 9. PRE-PSPM SEMESTER 1 SESSION 2015/2016 KMPP (b) (i) Which area of computer ethic is involves if someone wants to protect a new development of computer programs. [1 mark] _________________________________________________________________________ (ii) Which areas of computer ethics is involve if someone tries to get information from a computer server in a campus local area network. [1 mark] _________________________________________________________________________ (iii) Which areas of computer ethics is involve if an Eco-font is used to save more ink while printing. [1 mark] _________________________________________________________________________ (c) Numerous types of services are offered through the use of online banking. (i) Explain one (1) risk of becoming an online banking user? [2 marks] _________________________________________________________________________ _________________________________________________________________________ (ii) State one (1) way of how Banking protects customer from the risk mentioned in 8(c)(i). [2 marks] _________________________________________________________________________ _________________________________________________________________________ (d) Suggest the appropriate solution for each of the computer threats below. [3 marks] Risk Solution A program enters into your computer to monitors your online activities or installs programs without your consent for profit or to capture personal information. Web sites that make software available online for download for free or in exchange for users who uploaded software. Sudden power spikes in computer lab lead to data in volatile memory not being saved to permanent storage. END OF QUESTIONS