1.
State the name of the first generation computer.Nyatakan nama komputer generasi pertama.
Explanation
The correct answer is ENIAC. The ENIAC (Electronic Numerical Integrator and Computer) is considered the first general-purpose electronic computer. It was developed during World War II and was used for calculating artillery firing tables. ENIAC was a massive machine, taking up an entire room, and used vacuum tubes for processing. It was capable of performing calculations much faster than previous mechanical computers. The other options mentioned, MARK I, UNIVAC, and MARK 1, were also early computers but not the first generation.
2.
Figure shows three technologies used in the generations of computers.Rajah menunjukkan tiga teknologi yang digunakan dalam generasi komputer.ABCBased on the figure, write A, B or C to match the following:Berdasarkan rajah itu, tulis A, B atau C untuk dipadankan dengan berikut: (i) Second Generation Generasi Kedua
Explanation
Based on the figure, technology C is matched with the second generation of computers.
3.
Figure shows three technologies used in the generations of computers.Rajah menunjukkan tiga teknologi yang digunakan dalam generasi komputer.ABCBased on the figure, write A, B or C to match the following:Berdasarkan rajah itu, tulis A, B atau C untuk dipadankan dengan berikut: (i) Third Generation Generasi Ketiga
Explanation
The figure shows three technologies used in the generations of computers. The question asks to match the technology with the third generation. Since the answer is A, it can be inferred that technology A is associated with the third generation of computers.
4.
Complete the following statement:Lengkapkan pernyataan berikut.Information and Communication Technology is the use of computers, (i) ...........................devices and (ii) ............................applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti (i) ……......................dan (ii) ............................. aplikasi untuk memproses ,menyimpan , mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa.(i)
Explanation
The correct answer is "electronic,elektronik,hardware,perkakasan". In the statement, it is mentioned that Information and Communication Technology involves the use of computers, devices, and applications. The word "electronic" and its translation "elektronik" refer to the use of electronic devices in ICT. Similarly, the word "hardware" and its translation "perkakasan" refer to the physical components of computers and devices used in ICT. Therefore, these words accurately complete the statement.
5.
Complete the following statement:Lengkapkan pernyataan berikut.Information and Communication Technology is the use of computers,(i) ...........................devices and (ii) ............................applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti (i) ……......................dan (ii) ............................. aplikasi untuk memproses ,menyimpan , mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa.(ii)
Explanation
Information and Communication Technology is the use of computers, software, devices and perisian applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.
6.
State whether the following statement is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu.Cyber law is a system of moral standards or values used as a guideline for computer users.Undang-undang siber adalah sistem moral piawai atau nilai-nilai yang digunakan sebagai panduan bagi pengguna komputer.
Correct Answer
B. False
Explanation
False. Cyber law is not a system of moral standards or values used as a guideline for computer users. It is a set of legal rules and regulations that govern the use of computers, the internet, and related technologies. These laws are designed to protect individuals and organizations from cybercrimes, such as hacking, identity theft, and online fraud.
7.
Table shows the characteristics of X and Y in computer usage guideline.Jadual menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaankomputer. XYMoral guidelines for computer users.Garis panduan moral untuk pengguna komputer.Rules for computer users.Peraturan-peraturan untuk pengguna komputer.No penalty or punishment.Tiada penalti atau hukuman.Penalties or punishments imposed.Penalti atau htLkuman dikenakan.Based on the table, state:Berdasarkan jadual itu, nyatakan: (i) X
Correct Answer
ethics
etika
computer ethics
etika komputer
Explanation
The table shows the characteristics of X and Y in computer usage guidelines. Based on the table, X is associated with ethics, which refers to the moral principles and values that guide computer users' behavior. This can also be referred to as etika or computer ethics in the context of computer usage guidelines.
8.
Table shows the characteristics of X and Y in computer usage guideline.Jadual menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaankomputer. XYMoral guidelines for computer users.Garis panduan moral untuk pengguna komputer.Rules for computer users.Peraturan-peraturan untuk pengguna komputer.No penalty or punishment.Tiada penalti atau hukuman.Penalties or punishments imposed.Penalti atau htLkuman dikenakan.Based on the table, state:Berdasarkan jadual itu, nyatakan: (ii) Y
Correct Answer
law
undang-undang
cyber law
undang-undang siber
Explanation
The table shows the characteristics of X and Y in computer usage guidelines. It states that X has "No penalty or punishment" while Y has "Penalties or punishments imposed." Based on this information, we can infer that Y is related to law and specifically cyber law, as it involves penalties and punishments for violations in the context of computer usage.
9.
Computer ethics refers to theEtika Komputer merujuk kepada​I study about moral principal for computer user. kajian mengenai nilai moral untuk pengguna komputer.II custom that guides human behavior in cyber world. budaya yang membimbing tingkah laku manusia dalam dunia siber.III regulation that must be obeyed by the public. peraturan yang perlu dipatuhi oleh orang awam.IV knowledge about what is good and what is bad when using computer. pengetahuan mengenai apa yang baik dan apa yang buruk apabila menggunakan komputer.
Correct Answer
B. I, II and IV
Explanation
The correct answer is I, II and IV. This is because computer ethics refers to the study of moral principles for computer users, the customs that guide human behavior in the cyber world, and the knowledge about what is good and what is bad when using a computer. Regulation that must be obeyed by the public is not specifically mentioned in the given explanation.
10.
Figure shows how cryptography works.Rajah menunjukkan bagaimana kriptografi berfungsi.Based on the figure, name H :Berdasarkan rajah itu, namakan H :
Correct Answer
cipher text
Explanation
Based on the figure, the label "H" corresponds to the term "cipher text". The figure likely illustrates the process of cryptography, where plain text is transformed into cipher text using encryption algorithms. The cipher text is the result of the encryption process and is typically unreadable without the corresponding decryption key.
11.
Figure shows information on two types of authentication methods.Rajah menunjukkan maklumat tentang dua jenis kaedah pengesahan.Based on the figure, state the name ofBerdasarkan rajah itu, namakan(i) P
Correct Answer
call back system
callback system
Explanation
The correct answer is "call back system" or "callback system". This is because the figure shows information about two types of authentication methods, and one of them is represented by a diagram that depicts a process where the system calls back to the user to verify their identity. This method is commonly known as a call back system or callback system.
12.
Figure shows information on two types of authentication methods.Rajah menunjukkan maklumat tentang dua jenis kaedah pengesahan.Based on the figure, state the name ofBerdasarkan rajah itu, namakan(ii) Q
Correct Answer
biometrics
biometrik
Explanation
The figure provides information on two types of authentication methods, and based on the information given, the name of the second authentication method is "biometrics" or "biometrik".
13.
Figure shows part of an algorithm for a web page filter.Rajah menunjukkan sebahagian daripada algoritma penapisan laman web.State the filtering method used in the algorithm.Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.
Correct Answer
keyword blocking
Explanation
The algorithm in the figure is using the method of keyword blocking. This means that it filters web pages by blocking access to those that contain specific keywords.
14.
Complete the following statement:Lengkapkan pernyataan berikut: Ahmad want to control the access to the controversial contents before his kids use the Internet. Ahmad decides to use ________________ process. He lists the websites that he will block with Internet-filtering software. Ahmad mahu mengawal akses kepada kandungan kontroversi sebelum anaknya menggunakan Internet. Ahmad memutuskan untuk menggunakan proses ________________. Beliau menyenaraikan laman-laman web yang hendak disekat dengan menggunakan perisian tapisan Internet.
Correct Answer
site blocking
sekatan laman
website blocking
web site blocking
sekatan laman web
sekatan laman sesawang
Explanation
Ahmad wants to control the access to controversial content on the Internet for his kids. To do so, he decides to use a process called site blocking or website blocking. He lists the websites that he wants to block using internet-filtering software. This process will prevent his children from accessing the controversial content on those websites. The term "site blocking" refers to the action of blocking specific websites or web pages, while "sekatan laman" and "sekatan laman web" are the translations of "site blocking" in the Malay language. "Sekatan laman sesawang" is another possible translation for "web site blocking".
15.
Complete the following statement:Lengkapkan pernyataan berikut: Ah Chong want to control the access to the controversial contents before his kids use the Internet. Ah Chong chooses ________________ process. He sets the browser to only accept pages with certain level of ratings. Ah Chong mahu mengawal akses kepada kandungan kontroversi sebelum anaknya menggunakan Internet. Ah Chong memilih proses ________________. Beliau menetapkan pelayar web agar hanya menerima halaman yang mempunyai tahap penilaian tertentu.
Correct Answer
web rating system
sistem penarafan laman
sistem penarafan laman web
sistem penarafan laman sesawang
sistem penarafan web
webrating system
Explanation
Ah Chong wants to control the access to controversial content before his kids use the Internet, so he chooses the process of setting the browser to only accept pages with a certain level of ratings. This process is known as a web rating system or sistem penarafan laman web in Malay. It allows Ah Chong to filter out inappropriate or controversial content and ensure that his kids only access websites that have been rated as suitable for their age and preferences.
16.
Figure shows the display of an internet filtering software.Rajah menunjukkan paparan pada satu perisian penapisan internet. Based on the figure, state the method used.Berdasarkan rajah itu, nyatakan kaedah yang digunakan.
Correct Answer
site blocking
sekatan laman
website blocking
web site blocking
sekatan laman web
sekatan laman sesawang
Explanation
The correct answer is "site blocking" or "sekatan laman" or "website blocking" or "web site blocking" or "sekatan laman web" or "sekatan laman sesawang". This method refers to the act of preventing access to certain websites or web pages. The internet filtering software displayed in the figure is likely designed to block or restrict access to specific sites, allowing users to control and regulate internet content.
17.
Table shows the steps of using anti-virus software which is not in thecorrect sequence.Jadual menunjukkan langkah-langkah penggunaan perisian anti-virus yang tidak mengikut urutan yang betul.Step 1 and 3 are given.Langkah 1 dan 3 diberi.Choose anti virus software.Pilih perisian anti virus.J 1Take necessary action.Ambil tindakan yang perlu.KScan the selected area.Imbas kawasan yang dipilih.L 3Select area to be scanned.Pilih kawasan yang akan diimbas.M What is the sequence number for K?Apakah nombor urutan bagi K?
Correct Answer
4
four
empat
Explanation
The question asks for the sequence number for step K. Looking at the given steps, step K is "Scan the selected area" which corresponds to "Imbas kawasan yang dipilih" in the table. Since step K is the third step in the correct sequence, the sequence number for K is 3. However, the answer options provided are 4, four, and empat, which are all incorrect. Therefore, the correct answer is not available.
18.
Table shows the steps of using anti-virus software which is not in thecorrect sequence.Jadual menunjukkan langkah-langkah penggunaan perisian anti-virus yang tidak mengikut urutan yang betul.Step 1 and 3 are given.Langkah 1 dan 3 diberi.Choose anti virus softwarePilih perisian anti virusJ 1Take necessary actionAmbil tindakan yang perluKScan the selected areaImbas kawasan yang dipilihL 3Select area to be scannedPilih kawasan yang akan diimbasM What is the sequence number for M?Apakah nombor urutan bagi M?
Correct Answer
2
two
dua
Explanation
The correct sequence for using anti-virus software is as follows:
1. Choose anti-virus software
2. Select area to be scanned
3. Take necessary action
4. Scan the selected area
Therefore, the sequence number for M is 2.