SULIT
LEMBAGA PEPERIKSAAN
KEMENTERIAN PELAJARAN MALAYSIA
_________________________________
SIJIL PELAJARAN MALAYSIA 2010 3765/1
INFORMATION AND COMMUNICATION TECHNOLOGY
Kertas 1
Nov./ Dis
2 ½ jam Dua jam tiga puluh minit
________________________________________________________________
JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU
1. Tulis nombor kad pengenalan dan angka giliran anda pada semua buku jawapan.
2. Kertas soalan ini adalah dalam dwibahasa.
3. Soalan dalam banasa inggeris mendahului soalan yang sepadan dalam bahasa
Melayu.
4. Calon dibenarkan menjawab keseluruhan atau sebahagian soalan sama ada dalam
bahasa inggeris atau bahasa Melayu.
5. Kertas soalan ini mengandungi tiga bahagian : Bahagian A, Bahagian B dan Bahagian
C.
6. Jawapan untuk Bahagian A hendaklah ditulis diruang yang disediakan pada Helaian
Jawapan.
7. Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yang
dibekalkan.
8. Anda dibenarkan menggunakan kalkulator saintifik.
Kertas soalan ini mengandungi 14 halaman bercetak dan 0 halaman tidak bercetak.
[Lihat halaman sebelah
3765/1 © 2010 Hak Cipta Kerajaan Malaysia SULIT
1 | P a g e
SPM 2010 - ICT
Section A – [ 36 marks ]
Answers all questions. Write your answers in the spaces provided on the Answer Sheet.
Each answer carries one mark.
1. Figure 1 shows three technologies used in the generations of computers.
Based on Figure 1, write A, B or C to match the following :
A B C
Figure 1
(i) Second Generation : _________ (ii) Third Generation : ______________
2. Complete the following statement :
Information and Communication Technology is the use of computers,
(i) ___________________ devices and (ii) ___________________ applications for
processing, storing, retrieving, protecting and transmitting informationn from
anywhere at anytime.
3. Figure 2 show two input devices.
R S
Figure 2
Based on figure 2, state the type of input for :
(i) R :________________________ (ii) S : _________________________
4. State whether the following statement is True of False
Secondary storage is an internal memory that can be accessed
directly by the processor
2 | P a g e
5. Figure 3 shows part of a motherboard
Figure 3
Which of the components can be placed in one of the slots in figure 3
A B
C D
6. The following are features in application software
Identify application
(i) R : _______________________ (i) S : ________________________
7. State whether the following statement is True of False
When placing CPU onto a ZIF socket, Pin
1, as shown in Figure 4, can be placed
at any one of the four corners of the
socket.
Application Software
Pin 1
 Mail merge
 Macro
 Web page development
R
 Formula
 Date and currency
 Graphs and charts
S
3 | P a g e
8. State whether the following statement is True or False
Based on Figure 5, if computer X stops functioning, the entire
network stops
Figure 5
9. State whether the following statement is True or False
Transmission Control Protocol/Internet Protocol (TCP/IP) is the
network standard for Internet Communication
10. Figure 6 show the network design used for Batu Nilam Sdn. Bhd.
Figure 6
Based on Figure 6, X can be used on any size of network and transmits data to the
correct destination
State the name of device X : _____________________________________
11. State whether the following statement is True or False
Network Operating Systems organise and coordinate multiple
user access and resource sharing on a network.
12. Figure 7 shows the design of two different multimedia presentations.
Based on Figure 7, which is a linear multimedia presentation ? _________________
Presentation 1 Presentation 2
Page 1 Page 2 Page 3
Page 1
Page 2 Page 3
Hub
X
Modem
Internet
X
4 | P a g e
13. Table 1 shows the files used in developing a multimedia presentation.
Element Filenames
P
cat.jpg
goose.tiff
line.bmp
Q
m1.avi
p2.mpg
c4.mov
Table 1
Based on Table 1, identify the type of file in element:
(i) P : ______________________ (ii) Q : _________________________
14. Figure 8 shows a display of a piece of software.
Figure 8
Based on Figure 8, state the type of software : ___________________________
15. Which of the following are WYSIWYG web editors ?
I. Frontpage II. Notepad
III. Dreamweaver IV. Internet Explorer
A. I and III B. I and IV C. II and III D. II and IV
16. The following statements refer to tasks carried out in one phase of multimedia
production.
State the name of the phase. ______________________________________
 Take pictures using a digital camera
 Download pictures from the Internet
 Edit pictures using an image editor
5 | P a g e
17. Table 2 shows the criteria of two generations of low-level programming languages
X
Human readable notation
Use sysmbolic instruction code
Y
Instrcutions can be executed directly by CPU
Uses binary number
Table 2
Based on Table 2, name the generation of programming language for :
(i) X : _________________________ (ii) Y : _________________________
18. Table 3 shows the characteristics of a piece of software, S, is used to run written in
a programming language.
S
 Read statement and convert to object code
 Execute line by line
Table 3
Based on Table 3, S is ______________________
A. an assember B. a compiler
C. an interpreter D. a translator
19. Write the correct words to complete the following statement :
During the execution of a program the value of a (i) ______________________
can be changed the value of a (ii) __________________ cannot be changed.
20. Figure 9 shows an incomplete program.
Dim Name as X
Dim PI as Y
Name = “Ali”
PI = 3.142
Figure 9
Based on Figure 9, identify :
(i) X : _______________________ (ii) Y : _____________________
6 | P a g e
21. Figure 10(a) and 10 (b) shows partial flowcharts of two programs
Figure 10 (a) Figure 10 (b)
Identify the control structure used in :
(i) Figure 10 (a) : _________________________________
(ii) Figure 10 (b) : _________________________________
22. Figure 11 shows the data hierarchy in an information system.
Bit
Byte
H
Record
I
Database
Figure 11
Based on figure 11, state the name of :
(i) H : ______________________ (ii) I : _____________________
23. Complete the following statement:
A group of programs that allows users to add, update, access, manage and
analyse the contents of a database is known as a _____________________
Print N3
Get Mark
Print
“Fail”
Mark>=4
0
Print
“Pass”
False
True
READ Number 1
Number 2
N3 = Number 1
+
Number 2
7 | P a g e
24. Figure 12 shows the relationship between two tables of an information system
Figure 12
Based of Figure 12, from STUDENT table, state the function of :
(i) primary key
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
(ii) foreign key
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
25. Figure 13 shows a database screen
Figure 13
Based on Figure 13, which of the following describes the screen?
A. Form B. Switchboard C. Report D. Design view
STUDENT
Student ID
Name
Gender
Class ID
CLASS
Class ID
Location
Student ID S007
Student SUSILA A/P RAMASAMY
Gender FEMALE
MyKad Number 901111-00-5122
Address 67, JALAN LABU LABI
Email Address rafas09@yahoo.com
Tel Number 07-33432555
Photo
Add Delete
e
Find
Photo
8 | P a g e
Section B [ 20 marks ] - Answer all questions.
26. Figure 14 is a pie chart showing how
students of SMK Taman Gembira
communicate with their friends.
Figure 14
Based on Figure 14 :
(a) State one reason why the students choose email to letters
_____________________________________________________________
(b) State three reason why email is better than Short Messaging System using
handphone.
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
27. Figure 15 shows a user interface of a program used in Holborn Restaurant to
calculate the yearly bonus for their employees. The employees who have been
working for at least three years will be given a bonus of RM1 000.
Based on Figure 15 :
(a) State an appropriate data type for the variable „Identity Card No.‟
_____________________________________________________________
State one reason for your answer
_____________________________________________________________
(b) Identify the control structure used in the program
_____________________________________________________________
Justify your answer
_____________________________________________________________
e-mail
letters
SMS
Program to Calculate Yearly Bonus
Employee Name Zaki Abdullah
Employee’s ID E 0435
Identity Card No 721011-00-0043
Year of experience >= 3 years
Bonus : RM
Yes No
Compute
Bonus
0.00
9 | P a g e
28. Figure 16 shows the location of the headquartes and branches of Company X.
Company Z is a customer of Branch R.
Figure 16
Based on Figure 16
(a) Explain the type of network for Company X to connect its headquarters with
all its branches.
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
(b) (i) Suggest the type of private network communication technology to be
used between Branch R and Companay Z
______________________________________________________
(ii) Justify your answer
______________________________________________________
______________________________________________________
Branch K
Kuching
Branch R
Kota Kinabalu
Headquarters
Kuala Lumpur
Branch C
Ipoh
Branch P
Phuket
10 | P a g e
29. Figure 17 shows a web page in a web editor
Figure 17
Based on Figure 17 :
(a) State two advantages of using this type of web editor.
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
(b) Based on user interface principles, give two modifications which would
improve the design
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
HOME
NEWS
BLOG
LINKS
CONTACT US
SEARCH
WRAPPER
DOWNLOAD
News
Download
Vote
Result
FAQ
11 | P a g e
30. Figure 18 shows the interrelation of five main components of an online ticketing
system for a cinema.
Figure 18
Based on Figure 18 :
(a) State one example of component:
(i) B : ______________________ (ii) C : _______________________
(b) Describe the interrelation between Component A and Component E.
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
COMPONENT A
Customer
COMPONENT B
___________________
COMPONENT C
___________________
COMPONENT D
Customer’s name, identity
card number, credit card
number, date
COMPONENT E
User guide
12 | P a g e
Section C – [ 14 marks ]
Answer two questions only.
(i) Question 31 and (ii) Either Question 32 or Question 33.
31. Figure 19 shows the user interface of a program to calculate monthly income of a
car salesman in Friendly Car Company Sdn. Bhd. The monthly income is the total of
a basic salary and 5% commision of his monthly sales.
Figure 19
Based of Figure 19, draw a complete flow chart of the program which includes a
formula to calculate the commision and the monthly income.
Friendly Car Company
Monthly Income of Salesman
Name of Salesman
Basic Salary
Monthly Sales
Monthly Income
Calculate
Reset Exit
13 | P a g e
32. Figure 20 shows symptoms of a computer problem
Figure 20
Based on figure 20 :
(a) Identify the type of computer threat which mathces the symptoms
_____________________________________________________________
State two different examples of the threat
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
(b) Describe two reasons why the computer may have been affected by the
threat in (a)
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
Suggest two ways to prevent it
_____________________________________________________________
_____________________________________________________________
Screen displays unsual messages
Files become corrupted
Files mysteriously appear
14 | P a g e
33. Table 4 shows text and grading range for all subjects in Sekolah Menengah
Kebangsaan Pelita
Sekolah Menengah Kebangsaan Pelita requests a group of students
to develop a School Examination Information System (SEIS).
Ahmad is given the task of program analysis and Ravi is given
program testing and debugging. The grading rang for all subjects in
the school is shown in Table 4
Range of marks Grade
80-100 A
70-79 B
60-69 C
50-59 D
40-49 E
0 - 39 G
Table 4
Based on the text
(a) State four activities which will be performed by Ahmad in program analysis.
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________
(b) Ravi tested the system and entered the mark 69 and the output is grade D.
(i) What type of error is this ?
______________________________________________________
(ii) Justify your answer.
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________________________________________________

More Related Content

PDF
ULC Computer Solved Paper.
DOC
Pt epp ict 6-q1
PDF
PDF
Ms excel
DOC
Computer System Servicing Prelim Examination 2018
ULC Computer Solved Paper.
Pt epp ict 6-q1
Ms excel
Computer System Servicing Prelim Examination 2018

Similar to 2010 (20)

DOC
Set5 ict-question
DOCX
ICT Form 4 MAY 2015 test paper
DOC
Set1 ict-question
PDF
ICT Model Questions
PPTX
Computer general questions
ODP
Information systems a revision
DOC
Set3 ict-question
DOCX
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
PDF
Microsoft Office Crack Download Free latest Version 20252025
PDF
Adobe InDesign Crack – Full Version Free Download 2025
PDF
Adobe Illustrator Crack Free Download 2025 update version
PDF
Adobe Illustrator Crack Free Download 2025 latest version
PDF
KMSAuto++ 1.9.9 Free Download 2025 Crack
PDF
Adobe XD Crack latest Version 2025 Free Download
PDF
Adobe Audition Crack Latest Version free download 2025
PDF
Wondershare Filmora Crack Free Download latest update version 2025
PDF
Bt0062 fundamentals of it model question paper
PDF
GCE O/L ICT
DOC
Wilayah persekutuan-scheme
DOCX
Computer science important short questions ICS Part 1
Set5 ict-question
ICT Form 4 MAY 2015 test paper
Set1 ict-question
ICT Model Questions
Computer general questions
Information systems a revision
Set3 ict-question
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
Microsoft Office Crack Download Free latest Version 20252025
Adobe InDesign Crack – Full Version Free Download 2025
Adobe Illustrator Crack Free Download 2025 update version
Adobe Illustrator Crack Free Download 2025 latest version
KMSAuto++ 1.9.9 Free Download 2025 Crack
Adobe XD Crack latest Version 2025 Free Download
Adobe Audition Crack Latest Version free download 2025
Wondershare Filmora Crack Free Download latest update version 2025
Bt0062 fundamentals of it model question paper
GCE O/L ICT
Wilayah persekutuan-scheme
Computer science important short questions ICS Part 1
Ad

More from Nasran Syahiran (20)

DOC
Element of-multimedia
DOC
Types usage-of-information-system
DOC
Programming mind-mapping
DOC
Program development-phases
DOC
Phases multimedia-team
DOC
Information development-phases
DOC
Multimedia mind-mapping
PDF
HURAIAN SUKATAN PELAJARAN KURIKULUM BERSEPADU SEKOLAH MENENGAH (KBSM)
DOC
Rancangan tahunan tingkatan 5
DOC
Rancangan tahunan tingkatan 4
DOC
F5 learning-area-6-information-system
PDF
Bidang pembelajaran-6-3
PDF
Bidang pembelajaran-6-2
PDF
Bidang pembelajaran-6-1
PDF
Bidang pembelajaran-5-3
PDF
Bidang pembelajaran-5-2
PDF
Bidang pembelajaran-5-1
PDF
Bidang pembelajaran-4-3
Element of-multimedia
Types usage-of-information-system
Programming mind-mapping
Program development-phases
Phases multimedia-team
Information development-phases
Multimedia mind-mapping
HURAIAN SUKATAN PELAJARAN KURIKULUM BERSEPADU SEKOLAH MENENGAH (KBSM)
Rancangan tahunan tingkatan 5
Rancangan tahunan tingkatan 4
F5 learning-area-6-information-system
Bidang pembelajaran-6-3
Bidang pembelajaran-6-2
Bidang pembelajaran-6-1
Bidang pembelajaran-5-3
Bidang pembelajaran-5-2
Bidang pembelajaran-5-1
Bidang pembelajaran-4-3
Ad

Recently uploaded (20)

PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
IP : I ; Unit I : Preformulation Studies
PPTX
Education and Perspectives of Education.pptx
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
International_Financial_Reporting_Standa.pdf
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
semiconductor packaging in vlsi design fab
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
HVAC Specification 2024 according to central public works department
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Share_Module_2_Power_conflict_and_negotiation.pptx
IP : I ; Unit I : Preformulation Studies
Education and Perspectives of Education.pptx
Cambridge-Practice-Tests-for-IELTS-12.docx
My India Quiz Book_20210205121199924.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
International_Financial_Reporting_Standa.pdf
What’s under the hood: Parsing standardized learning content for AI
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
semiconductor packaging in vlsi design fab
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Computer Architecture Input Output Memory.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
AI-driven educational solutions for real-life interventions in the Philippine...
HVAC Specification 2024 according to central public works department

2010

  • 1. SULIT LEMBAGA PEPERIKSAAN KEMENTERIAN PELAJARAN MALAYSIA _________________________________ SIJIL PELAJARAN MALAYSIA 2010 3765/1 INFORMATION AND COMMUNICATION TECHNOLOGY Kertas 1 Nov./ Dis 2 ½ jam Dua jam tiga puluh minit ________________________________________________________________ JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU 1. Tulis nombor kad pengenalan dan angka giliran anda pada semua buku jawapan. 2. Kertas soalan ini adalah dalam dwibahasa. 3. Soalan dalam banasa inggeris mendahului soalan yang sepadan dalam bahasa Melayu. 4. Calon dibenarkan menjawab keseluruhan atau sebahagian soalan sama ada dalam bahasa inggeris atau bahasa Melayu. 5. Kertas soalan ini mengandungi tiga bahagian : Bahagian A, Bahagian B dan Bahagian C. 6. Jawapan untuk Bahagian A hendaklah ditulis diruang yang disediakan pada Helaian Jawapan. 7. Jawapan untuk Bahagian B dan Bahagian C mesti ditulis pada buku jawapan yang dibekalkan. 8. Anda dibenarkan menggunakan kalkulator saintifik. Kertas soalan ini mengandungi 14 halaman bercetak dan 0 halaman tidak bercetak. [Lihat halaman sebelah 3765/1 © 2010 Hak Cipta Kerajaan Malaysia SULIT
  • 2. 1 | P a g e SPM 2010 - ICT Section A – [ 36 marks ] Answers all questions. Write your answers in the spaces provided on the Answer Sheet. Each answer carries one mark. 1. Figure 1 shows three technologies used in the generations of computers. Based on Figure 1, write A, B or C to match the following : A B C Figure 1 (i) Second Generation : _________ (ii) Third Generation : ______________ 2. Complete the following statement : Information and Communication Technology is the use of computers, (i) ___________________ devices and (ii) ___________________ applications for processing, storing, retrieving, protecting and transmitting informationn from anywhere at anytime. 3. Figure 2 show two input devices. R S Figure 2 Based on figure 2, state the type of input for : (i) R :________________________ (ii) S : _________________________ 4. State whether the following statement is True of False Secondary storage is an internal memory that can be accessed directly by the processor
  • 3. 2 | P a g e 5. Figure 3 shows part of a motherboard Figure 3 Which of the components can be placed in one of the slots in figure 3 A B C D 6. The following are features in application software Identify application (i) R : _______________________ (i) S : ________________________ 7. State whether the following statement is True of False When placing CPU onto a ZIF socket, Pin 1, as shown in Figure 4, can be placed at any one of the four corners of the socket. Application Software Pin 1  Mail merge  Macro  Web page development R  Formula  Date and currency  Graphs and charts S
  • 4. 3 | P a g e 8. State whether the following statement is True or False Based on Figure 5, if computer X stops functioning, the entire network stops Figure 5 9. State whether the following statement is True or False Transmission Control Protocol/Internet Protocol (TCP/IP) is the network standard for Internet Communication 10. Figure 6 show the network design used for Batu Nilam Sdn. Bhd. Figure 6 Based on Figure 6, X can be used on any size of network and transmits data to the correct destination State the name of device X : _____________________________________ 11. State whether the following statement is True or False Network Operating Systems organise and coordinate multiple user access and resource sharing on a network. 12. Figure 7 shows the design of two different multimedia presentations. Based on Figure 7, which is a linear multimedia presentation ? _________________ Presentation 1 Presentation 2 Page 1 Page 2 Page 3 Page 1 Page 2 Page 3 Hub X Modem Internet X
  • 5. 4 | P a g e 13. Table 1 shows the files used in developing a multimedia presentation. Element Filenames P cat.jpg goose.tiff line.bmp Q m1.avi p2.mpg c4.mov Table 1 Based on Table 1, identify the type of file in element: (i) P : ______________________ (ii) Q : _________________________ 14. Figure 8 shows a display of a piece of software. Figure 8 Based on Figure 8, state the type of software : ___________________________ 15. Which of the following are WYSIWYG web editors ? I. Frontpage II. Notepad III. Dreamweaver IV. Internet Explorer A. I and III B. I and IV C. II and III D. II and IV 16. The following statements refer to tasks carried out in one phase of multimedia production. State the name of the phase. ______________________________________  Take pictures using a digital camera  Download pictures from the Internet  Edit pictures using an image editor
  • 6. 5 | P a g e 17. Table 2 shows the criteria of two generations of low-level programming languages X Human readable notation Use sysmbolic instruction code Y Instrcutions can be executed directly by CPU Uses binary number Table 2 Based on Table 2, name the generation of programming language for : (i) X : _________________________ (ii) Y : _________________________ 18. Table 3 shows the characteristics of a piece of software, S, is used to run written in a programming language. S  Read statement and convert to object code  Execute line by line Table 3 Based on Table 3, S is ______________________ A. an assember B. a compiler C. an interpreter D. a translator 19. Write the correct words to complete the following statement : During the execution of a program the value of a (i) ______________________ can be changed the value of a (ii) __________________ cannot be changed. 20. Figure 9 shows an incomplete program. Dim Name as X Dim PI as Y Name = “Ali” PI = 3.142 Figure 9 Based on Figure 9, identify : (i) X : _______________________ (ii) Y : _____________________
  • 7. 6 | P a g e 21. Figure 10(a) and 10 (b) shows partial flowcharts of two programs Figure 10 (a) Figure 10 (b) Identify the control structure used in : (i) Figure 10 (a) : _________________________________ (ii) Figure 10 (b) : _________________________________ 22. Figure 11 shows the data hierarchy in an information system. Bit Byte H Record I Database Figure 11 Based on figure 11, state the name of : (i) H : ______________________ (ii) I : _____________________ 23. Complete the following statement: A group of programs that allows users to add, update, access, manage and analyse the contents of a database is known as a _____________________ Print N3 Get Mark Print “Fail” Mark>=4 0 Print “Pass” False True READ Number 1 Number 2 N3 = Number 1 + Number 2
  • 8. 7 | P a g e 24. Figure 12 shows the relationship between two tables of an information system Figure 12 Based of Figure 12, from STUDENT table, state the function of : (i) primary key _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ (ii) foreign key _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ 25. Figure 13 shows a database screen Figure 13 Based on Figure 13, which of the following describes the screen? A. Form B. Switchboard C. Report D. Design view STUDENT Student ID Name Gender Class ID CLASS Class ID Location Student ID S007 Student SUSILA A/P RAMASAMY Gender FEMALE MyKad Number 901111-00-5122 Address 67, JALAN LABU LABI Email Address rafas09@yahoo.com Tel Number 07-33432555 Photo Add Delete e Find Photo
  • 9. 8 | P a g e Section B [ 20 marks ] - Answer all questions. 26. Figure 14 is a pie chart showing how students of SMK Taman Gembira communicate with their friends. Figure 14 Based on Figure 14 : (a) State one reason why the students choose email to letters _____________________________________________________________ (b) State three reason why email is better than Short Messaging System using handphone. _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ 27. Figure 15 shows a user interface of a program used in Holborn Restaurant to calculate the yearly bonus for their employees. The employees who have been working for at least three years will be given a bonus of RM1 000. Based on Figure 15 : (a) State an appropriate data type for the variable „Identity Card No.‟ _____________________________________________________________ State one reason for your answer _____________________________________________________________ (b) Identify the control structure used in the program _____________________________________________________________ Justify your answer _____________________________________________________________ e-mail letters SMS Program to Calculate Yearly Bonus Employee Name Zaki Abdullah Employee’s ID E 0435 Identity Card No 721011-00-0043 Year of experience >= 3 years Bonus : RM Yes No Compute Bonus 0.00
  • 10. 9 | P a g e 28. Figure 16 shows the location of the headquartes and branches of Company X. Company Z is a customer of Branch R. Figure 16 Based on Figure 16 (a) Explain the type of network for Company X to connect its headquarters with all its branches. _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ (b) (i) Suggest the type of private network communication technology to be used between Branch R and Companay Z ______________________________________________________ (ii) Justify your answer ______________________________________________________ ______________________________________________________ Branch K Kuching Branch R Kota Kinabalu Headquarters Kuala Lumpur Branch C Ipoh Branch P Phuket
  • 11. 10 | P a g e 29. Figure 17 shows a web page in a web editor Figure 17 Based on Figure 17 : (a) State two advantages of using this type of web editor. _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ (b) Based on user interface principles, give two modifications which would improve the design _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ HOME NEWS BLOG LINKS CONTACT US SEARCH WRAPPER DOWNLOAD News Download Vote Result FAQ
  • 12. 11 | P a g e 30. Figure 18 shows the interrelation of five main components of an online ticketing system for a cinema. Figure 18 Based on Figure 18 : (a) State one example of component: (i) B : ______________________ (ii) C : _______________________ (b) Describe the interrelation between Component A and Component E. _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ COMPONENT A Customer COMPONENT B ___________________ COMPONENT C ___________________ COMPONENT D Customer’s name, identity card number, credit card number, date COMPONENT E User guide
  • 13. 12 | P a g e Section C – [ 14 marks ] Answer two questions only. (i) Question 31 and (ii) Either Question 32 or Question 33. 31. Figure 19 shows the user interface of a program to calculate monthly income of a car salesman in Friendly Car Company Sdn. Bhd. The monthly income is the total of a basic salary and 5% commision of his monthly sales. Figure 19 Based of Figure 19, draw a complete flow chart of the program which includes a formula to calculate the commision and the monthly income. Friendly Car Company Monthly Income of Salesman Name of Salesman Basic Salary Monthly Sales Monthly Income Calculate Reset Exit
  • 14. 13 | P a g e 32. Figure 20 shows symptoms of a computer problem Figure 20 Based on figure 20 : (a) Identify the type of computer threat which mathces the symptoms _____________________________________________________________ State two different examples of the threat _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ (b) Describe two reasons why the computer may have been affected by the threat in (a) _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ Suggest two ways to prevent it _____________________________________________________________ _____________________________________________________________ Screen displays unsual messages Files become corrupted Files mysteriously appear
  • 15. 14 | P a g e 33. Table 4 shows text and grading range for all subjects in Sekolah Menengah Kebangsaan Pelita Sekolah Menengah Kebangsaan Pelita requests a group of students to develop a School Examination Information System (SEIS). Ahmad is given the task of program analysis and Ravi is given program testing and debugging. The grading rang for all subjects in the school is shown in Table 4 Range of marks Grade 80-100 A 70-79 B 60-69 C 50-59 D 40-49 E 0 - 39 G Table 4 Based on the text (a) State four activities which will be performed by Ahmad in program analysis. _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ _____________________________________________________________ (b) Ravi tested the system and entered the mark 69 and the output is grade D. (i) What type of error is this ? ______________________________________________________ (ii) Justify your answer. _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________