Past Year Questions
Past Year Questions
Chapter 1
Section A
1. State two examples of each of the following communications media and arrange all
the given examples in ascending order of their transmission distances. (2013)
(i) Wired communcation media
(ii) Wireless communication media
[6 marks]
2. You are required to develop a school Web page. Describe how each of the following
Web development tools could be used to create the Web page. (2014)
(i) Mark-up language
[2 marks]
(ii) Programming language
[2 marks]
(iii) Scripting language
[2 marks]
4. (a) A company has used an intranet in all its offices and intends to establish extranet to
Pos Malaysia. (2016)
(i) State the difference between intranet and extranet.
(ii) State two benefits of using extranet for customers of Pos Malaysia.
(b) A local area network (LAN) which was set up at a school computer laboratory is
shown in the diagram below.
[1 mark]
(iii) Name device Y.
[1 mark]
(iv) Identify device Z which connects mobile users to the Internet.
[1 mark]
5. A computer network used by WXY Group is shown in the diagram below. (2017)
(a) Based on the diagram above, state thecategory of computer network between:
(i) The Accounting Department and the Human Resource Department at WXY
Bhd.,
[1 mark]
(ii) WXY Bhd. and WXY Pte. Ltd.
[1 mark]
(b) Differentiate the network characteristics between (a)(i) and (a)(ii).
[4 marks]
6. Two types ofcomputer storages, X and Y, are shown in the diagrams below. (2018)
7. An accounting student decides to buy a computer for his personal use. In order to save
cost, he needs to buy the computer components and assembles them himself. After he
successfully assembles the computer, the student needs to proceed with the following
steps: (2019)
Step 1- Formatting the hard disk
Step 2- Installing software Z
Upon completing the installation of software Z, the student installs three other
softwares as follows:
• Software A- Word processor
• Software B- Electronic spreadsheet
• Software C- Presentation
(a) Name the type ofsoftware Zand states three main functions ofthe software.
[4 marks]
(b) State two purposes of installing software B and software C if the student is to
complete his accounting assignment.
[4 marks]
Section B
(a) Redraw and explain the above diagram to show the concept of convergence of
technology.
[6 marks]
(b) Describe the characteristics oftechnological convergence with reference to smart
phone.
[3 marks]
(c) Discuss three positive impacts of convergence of technology towards e-learning
applications.
[6 marks]
Chapter 2
Section A
2. Describe three areas of multimedia application usage, and state one example of each
of the application. (2013)
[6 marks]
3. The Internet banking and mobile banking usage percentages between the year 2003 to
2009 are shown in the graph below. (2014)
(a) State two examples for each of the data and information given in the above graph.
[4 marks]
(b) Describe the knowledge that can be obtained from the above graph.
[4 marks]
(a) State three actions that O should take to avoid being the victim of cyberstalking
and cyberbullying.
[3 marks]
(b) Explain three technical methods to control Internet threats.
[6 marks]
8. MyKad and electronic wallets are two examples of smart cards. (2017)
(a) State three applications that can be embedded in MyKad.
[3 marks]
(b) List three advantages of using MyKad as a smart card.
[3 marks]
(c) Describe the benefits of electronic wallets in daily life.
[2 marks]
Jejak IT: An online IT learning centre conducted by the State Library of Selangor. The
centre offers TI related e-books and learning packages. Users can subscribe and make
payment online for the services.
Initiative 2:
E-Melaka: The state government utilised cyber cafes as training centres to educate the
rural citizen about ICT literacy. Approximately, 25,000 rural citizens were trained at the
cyber cafes.
Give the analysis of the initiatives above, then copy the table below and complete it.
[4 marks]
10. The privacy of users' personal information is very important to be protected from
data intrusion in cyberspace. (2019 & 2018/U)
(a) Describe two ways users can safeguard the privacy of their personal information
from being trespassed.
[2 marks]
(b) Explain three effects to the users if data intrusion occurs.
[6 marks]
11. Aconceptual illustrations of malicious codes attack types is shown in the diagram
below. (2020 & 2019/U)
X Y
(a) Explain the types of malicious codes for X and Y.
[4 marks]
(b) Explain one effect of malicious code in Ytowards the computer.
[2 marks]
12. The example of an email received by a user is shown in the diagram below.
(2021 & 2020/U)
Section B
1.
(a) Ethics involving the use of computers are referred to as computer ethics. (2014)
(b) Acollege student has logged in a library information system using a librarian's ID
and password. He then altered the return date of the book that he had borrowed.
2. An e-commerce application is one of the effective methods in the selling and buying
of products. (2016)
(a) What is the meant by e-commerce?
[2 marks]
(b) State three types of e-commerce models that could be offered to customers in the
selling and buying of products.
[3 marks]
(c) Sketch a diagram to describe the hardware and communication devices required
to set up the e-commerce.
[4 marks]
(d) Discuss the advantages of having e-commerce for each of the following:
(i) Organisation
(ii) Consumer
[6 marks]
3. (2017)
(a) Encryption is a technique to protect information which is transmitted via the Internet.
Explain two implications if the information is transmitted without encryption.
[4 marks]
(b) Malicious usage and malicious software could cause threats to computer
systems.
(i) Differentiate between malicious usage and malicious software.
[4 marks]
(ii) Give three examples of malicious software.
[3 marks]
(iii) State four measures to protect computer systems from malicious software.
[4 marks]
5. A smartphone has Internet capability which increases productivity and makes our life
easier. (2020 & 2019/U)
(d) State two input and two output components of a smartphone.
[4 marks]
(e) Describe three pre-installed applications or Internet capability of a smartphone.
[6 marks]
(f) Asmartphone could be used as an enabler in the agriculture industry.
(i) Describe one application on how to market local fruits in terms of data to be
input, processed, output, and communicated using a smartphone.
[4 marks]
(ii) State one impact ofthe described application.
[1 mark]
(a) The computers at a school library are connected with a bus topology. The school is
considering to provide a new multimedia computer lab using a star topology. As a
networking consultant, you are required to prepare a network architecture diagram for
the connection between the library and the multimedia lab networks by using the
following information:
Location Number of nodes Additional peripheral
Library 5 units 1 unit of printer
1 unit of printer
Multimedia Lab 10 units 1 unit of scanner 1 unit of database 1 unit of router
1 unit of switch
Draw and label a new architecture that connects both network.
[6 marks]
(b) A multimedia company has been awarded a project to develop a corporate video.
(i) Name three factors that could affect the video quality of the corporate video.
[2 marks]
(ii) Describe a protocol that may be used to upload the 7 GB video to a client's office
located in Toronto, Canada.
[2 marks]
(iii) Describe two ethical issues that need to be considered in developing the corporate
video.
[4 marks]