jsu finalyear f4 2015
TRANSCRIPT
![Page 1: Jsu Finalyear f4 2015](https://reader036.vdocuments.net/reader036/viewer/2022083005/563db7b4550346aa9a8d2d3f/html5/thumbnails/1.jpg)
JADUAL SPESIFIKASI UJIAN
Final Year Form 4 2015 (Paper 1)
ITEM QUEST. CRITERIA ASPECTDIFFICULTY LEVEL
EASY MEDIUM HIGHSECTION A (Answer all)
1 1 (i) 1.1.1.2 Describe the brief evolution of computers ● MATCHING2 1 (ii) 1.1.1.2 Describe the brief evolution of computers ● MATCHING
3 2 1.2.1.1 MCQ
4 3 (i) 1.2.2.1 List ways to protect privacy ● TRUE/FALSE
5 3 (ii) 1.2.2.2 ● TRUE/FALSE
6 4 1.2.3.1 ● STATE
• Pornography
• Slander
7 5 1.2.4.2 ● STATE
8 6(i) 1.3.2.1 ● MATCHING
9 6(ii) 1.3.2.1 ● MATCHING
10 7 1.3.3.2 ● MCQ
11 8 2.1.1.2 ● TRUE/FALSE
12 9 2.1.2.1 ● FIB
13 10 2.1.3.1 Explain the function of ASCII code ● FIB14 11 2.1.5.1 ● STATE
15 12 2.3.2.1 ● MCQ
16 13 2.3.3.1 ● STATE
17 14 2.2.1.1 ● MATCHING
18 15 2.2.2.1 ● MATCHING
QUESTION TYPE
Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law
State authentication and verification methods / technologies
List effects of controversial contents on society :
Explain briefly the computer crimes below : Fraud, Copyright Infringement, Thef, Attacks
Explain briefly the different threats to computer security : Malicious code, Hacking, Nature / environment, Theft
Explain briefly the different threats to computer security : Malicious code, Hacking, Nature / environment, Theft
Apply the correct security procedures. Antivirus, Anti-Spyware, Cryptography, Firewall, Data backup, Human aspects
State the meaning of input, processor, output and storage
State the relation of data representation : bit, byte and character
Describe the units of clock speed measurement: MHz, GHz
Differentiate between the types and usage of application software (word processing, spreadsheet, presentation, graphic)
Differentiate between the types and usage of utility programs (file management, diagnostic and file compression)
Identify the input devices used for text, graphic, audio and video
Identify the output devices used for text, graphic, audio and video
![Page 2: Jsu Finalyear f4 2015](https://reader036.vdocuments.net/reader036/viewer/2022083005/563db7b4550346aa9a8d2d3f/html5/thumbnails/2.jpg)
ITEM QUEST. CRITERIA ASPECTDIFFICULTY LEVEL
EASY MEDIUM HIGHQUESTION
TYPE19 16 2.2.4.1 ● MATCHING
20 17 2.3.1.1 ● STATE
21 18(i) 2.3.4.1 ● TRUE/FALSE
22 18(ii) 2.3.4.1 ● TRUE/FALSE
23 19(i) 3.1.5.2 ● MATCHING
24 19(ii) 3.1.5.2 ● MATCHING
25 20(i) 3.1.3.1 ● STATE
26 20(ii) 3.1.3.1 STATE
27 21(i) 3.1.4.1 ● FIB
28 21(ii) 3.1.4.1 FIB
29 22(i) 3.3.1.2 ● STATE
30 22(ii) 3.2.2.1 STATE
31 23 3.4.2.1 ● MCQ
32 24(i) 3.1.5.2 ● STATE
33 24 (ii) 3.3.2.1 State the functions of various client software. ● STATE
34 25(i) 3.2.2.2 ● MATCHING
35 25(ii) 3.2.2.2 ● MATCHING
36 25(iii) 3.2.2.2 ● MATCHING
TOTAL
SECTION B (Answer all) Task Word26 (i) 1.2.1.2 Differentiate between ethics and law ● State 2
(ii) 1.2..4.1 Explain the need for cyber law. ● Give 2
Explain types and functions of: Primary storage (RAM, ROM), Secondary storage (magnetic medium, opical medium, flash memory)State the various types of OS used on different platforms
Differentiate between proprietary and open source software
Differentiate between proprietary and open source software
Differentiate between the three types of network topology
Differentiate between the three types of network topology
Define types of computer networks: Local Area Network (LAN), Metropolitan Area Network (MAN), Wide Area Network (WAN)
Define types of computer networks: Local Area Network (LAN), Metropolitan Area Network (MAN), Wide Area Network (WAN)
Define two types of network architecture: Client/Server, Peer-to-Peer
Define two types of network architecture: Client/Server, Peer-to-Peer
Name various Network Operating System Software
Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP), Coaxial and Fibre Optic CableCrimp and test UTP cable : Straight cable, Crossed cable
Differentiate between the three types of network topology
Identify various types of wireless transmission media such as infrared, radio wave and satelliteIdentify various types of wireless transmission media such as infrared, radio wave and satellite
Identify various types of wireless transmission media such as infrared, radio wave and satellite
![Page 3: Jsu Finalyear f4 2015](https://reader036.vdocuments.net/reader036/viewer/2022083005/563db7b4550346aa9a8d2d3f/html5/thumbnails/3.jpg)
ITEM QUEST. CRITERIA ASPECTDIFFICULTY LEVEL
EASY MEDIUM HIGHQUESTION
TYPE27 (i) 2.1.1.1 Define computer system ● Define
(ii) 2.1.1.3 ●
28 (i) 2.3.1.3 State the different interfaces of OS ● Identify, justify
(ii) 2.3.4.1 ● Differentiate
29 (i) 3.1.5.2 ●
(ii) 3.1.5.2 ● Differentiate
30 (i) 3.2.1.1 ●
(ii) 3.2.1.2 State the function of the following ●
SECTION C (Q1 - compulsory, choose Q2 or Q3) Task Word31 (i) 3.1.2.1 ● Give 2
(ii) 3.1.7.1 ● Identify, justify
(iii) 3.1.4.1 ● name, define
32 (i) 2.3.2.1 ● Identify, justify
(ii) 2.3.3.1 ●
33 (i) 1.3.1.1 Define computer security ● Define
(ii) 1.3.2.1 ● Identify, justify
(iii) 1.3.2.2 ●
TOTAL 25 10 7
Describe the information processing cycle which includes input, process, output and storage using a block diagram.
Draw a block diagram
Differentiate between proprietary and open source software
Differentiate between the three types of network topology
Identify 2 topologi
Differentiate between the three types of network topology
Identify the devices needed in computer network communication
Identify 2 devices
State the function
State the importance of computer networks and communications
Describe the types of network communications technology
Define two types of network architecture: Client/Server, Peer-to-Peer
Differentiate between the types and usage of application software (word processing, spreadsheet, presentation, graphic)
Differentiate between the types and usage of utility programs (file management, diagnostic and file compression)
Identify 2, differentiate 2
Explain briefly the different threats to computer security : Malicious code, Hacking, Nature / environment, Theft
Explain briefly the different threats to computer security : Malicious code, Hacking, Nature / environment, Theft
Explain another threats