jsu finalyear f4 2015

6
JADUAL SPESIFIKASI UJIAN Final Year Form 4 2015 (Paper 1) ITEM QUEST. CRITERIA ASPECT DIFFICULTY LEVEL EASY MEDIUM HIGH SECTION A (Answer all) 1 1 (i) 1.1.1.2 Describe the brief evolution of co 2 1 (ii) 1.1.1.2 Describe the brief evolution of co 3 2 1.2.1.1 4 3 (i) 1.2.2.1 List ways to protect privacy 5 3 (ii) 1.2.2.2 6 4 1.2.3.1 • Pornography • Slander 7 5 1.2.4.2 8 6(i) 1.3.2.1 9 6(ii) 1.3.2.1 10 7 1.3.3.2 11 8 2.1.1.2 12 9 2.1.2.1 13 10 2.1.3.1 14 11 2.1.5.1 15 12 2.3.2.1 16 13 2.3.3.1 17 14 2.2.1.1 18 15 2.2.2.1 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law State authentication and verification methods / technologies List effects of controversial contents on society : Explain briefly the computer crimes below : Fraud, Copyright Infringement, Thef, Attacks Explain briefly the different threats to computer security : Malicious code, Hacking, Nature / Explain briefly the different threats to computer security : Malicious code, Hacking, Nature / Apply the correct security procedures. Antivirus, Anti- Spyware, Cryptography, Firewall, State the meaning of input, processor, output and storage State the relation of data representation : bit, byte and Explain the function of ASCII Describe the units of clock speed measurement: MHz, GHz Differentiate between the types and usage of application software (word processing, spreadsheet, presentation, graphic) Differentiate between the types and usage of utility programs (file management, diagnostic and file compression) Identify the input devices used for text, graphic, audio and Identify the output devices used for text, graphic, audio and

Upload: zahrisal

Post on 04-Jan-2016

215 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Jsu Finalyear f4 2015

JADUAL SPESIFIKASI UJIAN

Final Year Form 4 2015 (Paper 1)

ITEM QUEST. CRITERIA ASPECTDIFFICULTY LEVEL

EASY MEDIUM HIGHSECTION A (Answer all)

1 1 (i) 1.1.1.2 Describe the brief evolution of computers ● MATCHING2 1 (ii) 1.1.1.2 Describe the brief evolution of computers ● MATCHING

3 2 1.2.1.1 MCQ

4 3 (i) 1.2.2.1 List ways to protect privacy ● TRUE/FALSE

5 3 (ii) 1.2.2.2 ● TRUE/FALSE

6 4 1.2.3.1 ● STATE

• Pornography

• Slander

7 5 1.2.4.2 ● STATE

8 6(i) 1.3.2.1 ● MATCHING

9 6(ii) 1.3.2.1 ● MATCHING

10 7 1.3.3.2 ● MCQ

11 8 2.1.1.2 ● TRUE/FALSE

12 9 2.1.2.1 ● FIB

13 10 2.1.3.1 Explain the function of ASCII code ● FIB14 11 2.1.5.1 ● STATE

15 12 2.3.2.1 ● MCQ

16 13 2.3.3.1 ● STATE

17 14 2.2.1.1 ● MATCHING

18 15 2.2.2.1 ● MATCHING

QUESTION TYPE

Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law

State authentication and verification methods / technologies

List effects of controversial contents on society :

Explain briefly the computer crimes below : Fraud, Copyright Infringement, Thef, Attacks

Explain briefly the different threats to computer security : Malicious code, Hacking, Nature / environment, Theft

Explain briefly the different threats to computer security : Malicious code, Hacking, Nature / environment, Theft

Apply the correct security procedures. Antivirus, Anti-Spyware, Cryptography, Firewall, Data backup, Human aspects

State the meaning of input, processor, output and storage

State the relation of data representation : bit, byte and character

Describe the units of clock speed measurement: MHz, GHz

Differentiate between the types and usage of application software (word processing, spreadsheet, presentation, graphic)

Differentiate between the types and usage of utility programs (file management, diagnostic and file compression)

Identify the input devices used for text, graphic, audio and video

Identify the output devices used for text, graphic, audio and video

Page 2: Jsu Finalyear f4 2015

ITEM QUEST. CRITERIA ASPECTDIFFICULTY LEVEL

EASY MEDIUM HIGHQUESTION

TYPE19 16 2.2.4.1 ● MATCHING

20 17 2.3.1.1 ● STATE

21 18(i) 2.3.4.1 ● TRUE/FALSE

22 18(ii) 2.3.4.1 ● TRUE/FALSE

23 19(i) 3.1.5.2 ● MATCHING

24 19(ii) 3.1.5.2 ● MATCHING

25 20(i) 3.1.3.1 ● STATE

26 20(ii) 3.1.3.1 STATE

27 21(i) 3.1.4.1 ● FIB

28 21(ii) 3.1.4.1 FIB

29 22(i) 3.3.1.2 ● STATE

30 22(ii) 3.2.2.1 STATE

31 23 3.4.2.1 ● MCQ

32 24(i) 3.1.5.2 ● STATE

33 24 (ii) 3.3.2.1 State the functions of various client software. ● STATE

34 25(i) 3.2.2.2 ● MATCHING

35 25(ii) 3.2.2.2 ● MATCHING

36 25(iii) 3.2.2.2 ● MATCHING

TOTAL

SECTION B (Answer all) Task Word26 (i) 1.2.1.2 Differentiate between ethics and law ● State 2

(ii) 1.2..4.1 Explain the need for cyber law. ● Give 2

Explain types and functions of: Primary storage (RAM, ROM), Secondary storage (magnetic medium, opical medium, flash memory)State the various types of OS used on different platforms

Differentiate between proprietary and open source software

Differentiate between proprietary and open source software

Differentiate between the three types of network topology

Differentiate between the three types of network topology

Define types of computer networks: Local Area Network (LAN), Metropolitan Area Network (MAN), Wide Area Network (WAN)

Define types of computer networks: Local Area Network (LAN), Metropolitan Area Network (MAN), Wide Area Network (WAN)

Define two types of network architecture: Client/Server, Peer-to-Peer

Define two types of network architecture: Client/Server, Peer-to-Peer

Name various Network Operating System Software

Identify various types of cables such as Unshielded Twisted Pair (UTP), Shielded Twisted Pair (STP), Coaxial and Fibre Optic CableCrimp and test UTP cable : Straight cable, Crossed cable

Differentiate between the three types of network topology

Identify various types of wireless transmission media such as infrared, radio wave and satelliteIdentify various types of wireless transmission media such as infrared, radio wave and satellite

Identify various types of wireless transmission media such as infrared, radio wave and satellite

Page 3: Jsu Finalyear f4 2015

ITEM QUEST. CRITERIA ASPECTDIFFICULTY LEVEL

EASY MEDIUM HIGHQUESTION

TYPE27 (i) 2.1.1.1 Define computer system ● Define

(ii) 2.1.1.3 ●

28 (i) 2.3.1.3 State the different interfaces of OS ● Identify, justify

(ii) 2.3.4.1 ● Differentiate

29 (i) 3.1.5.2 ●

(ii) 3.1.5.2 ● Differentiate

30 (i) 3.2.1.1 ●

(ii) 3.2.1.2 State the function of the following ●

SECTION C (Q1 - compulsory, choose Q2 or Q3) Task Word31 (i) 3.1.2.1 ● Give 2

(ii) 3.1.7.1 ● Identify, justify

(iii) 3.1.4.1 ● name, define

32 (i) 2.3.2.1 ● Identify, justify

(ii) 2.3.3.1 ●

33 (i) 1.3.1.1 Define computer security ● Define

(ii) 1.3.2.1 ● Identify, justify

(iii) 1.3.2.2 ●

TOTAL 25 10 7

Describe the information processing cycle which includes input, process, output and storage using a block diagram.

Draw a block diagram

Differentiate between proprietary and open source software

Differentiate between the three types of network topology

Identify 2 topologi

Differentiate between the three types of network topology

Identify the devices needed in computer network communication

Identify 2 devices

State the function

State the importance of computer networks and communications

Describe the types of network communications technology

Define two types of network architecture: Client/Server, Peer-to-Peer

Differentiate between the types and usage of application software (word processing, spreadsheet, presentation, graphic)

Differentiate between the types and usage of utility programs (file management, diagnostic and file compression)

Identify 2, differentiate 2

Explain briefly the different threats to computer security : Malicious code, Hacking, Nature / environment, Theft

Explain briefly the different threats to computer security : Malicious code, Hacking, Nature / environment, Theft

Explain another threats