Self Learning Activities
Self Learning Activities
Self Learning Activities
self
learning
activities
Semester 1, 2021/2022
SCO15
(PART 1)
NAME :
CLASS :
PART A
1. Computer system plays an important role in daily lives. The data inside the computer is
represented by bits 0 or 1.
a) Give the definition of operation and one (1) example of device used for the operation
in a computer system based in the following table. [6 marks]
Input
Output
Process
d) Draw the truth table for the Boolean Expression Y=A⊕B.C [3 marks]
A B C BC Y
1
2. (a) Figure 1 shows a network in a corporate office.
Figure 1
(i) X is a communication device that allows computers and mobile devices to transfer
and receive data without using any physical transmission media. Identify X.
[1 mark]
________________________________________________________
________________________________________________________
(ii) Y is a communication device that allows the network to connected to the Internet.
Identify Y. [1 mark]
________________________________________________________
________________________________________________________
(iii)Workstations are the personal computers used by employees at the office. What is
the suitable physical transmission media used to connect the workstations to the
switch? [1 mark]
________________________________________________________
________________________________________________________
(iv) Give one (1) advantage of using this network. [1 mark]
________________________________________________________
________________________________________________________
2
(b) Network architecture is the overall design of a computer network that describes how a
computer network is configured and what strategies are being used. State an
advantage for each architecture. [2 marks]
Architecture
i._____________________ ii._____________________
Advantage ______________________ ______________________
______________________ ______________________
______________________ ______________________
(c) State one (1) difference between Local Area Network (LAN) and Wide Area Network
(WAN). [2 marks]
LAN WAN
(d) State and explain two (2) disadvantages of the Internet. [4 marks]
Disadvantages Explanation
(i)
(ii)
Intranet Extranet
3
(f) Describe the following broadband Internet connection.
(i) Cable Internet Service [1 mark]
________________________________________________________
________________________________________________________
(ii) Fixed Wireless [1 mark]
________________________________________________________
________________________________________________________
(g) Give one (1) example of IPV4 address. State the smallest and the largest number that
can be used for IPv4. [3 marks]
________________________________________________________
________________________________________________________
________________________________________________________
(h) Differentiate between IPv4 and IPv6. [4 marks]
i) The Macau Scam works in various ways either as a phone call to ‘lucky draw
winners’, ransom demands for purported kidnapping and spoofing, where the
syndicate members pose as police personnel, Bank Negara officials or even bank
officers. Another method also sees scammers duping victims into paying a certain
amount of tax in order to claim prizes. [1 mark]
________________________________________________________
ii) Apple has been awarded more than USD $1 billion in damages as it prevailed in
its patent-infringement case against Samsung. The jury decided that the majority
of Samsung smartphones and tablets violate patents held by Apple including
features such as the zoom in and out innovation achieved by tapping the screen.
The jury also decided that Samsung's infringement was intentional and said the
firm's counter-suit for USD $399 million against Apple was without merit.
[1 mark]
________________________________________________________
iii) Sharing of software online is prohibited. Freeware and shareware programs are the
only programs that can be distributed online. Other software is not allowed to be
shared with other people over the Internet. [1 mark]
________________________________________________________
4
iv) Improving your home's energy efficiency with ENERGY STAR can help to lower
high energy bills, improve comfort and reduce greenhouse gas emissions.[1 mark]
________________________________________________________
b) i) Define netiquette. [2 marks]
________________________________________________________
________________________________________________________
ii) Give two (2) good practices to follow when using email. [2 marks]
1st practice
2nd practice
5. _______ 2. analysis
3.Design
4. _________
5
b) Given three different program segment written using different types of programming
language.
i) Identify the type of programming language used to write Code Segment 1[1 mark]
________________________________________________________
ii) State one (1) disadvantage of programming language of code segment 2. [1 mark]
________________________________________________________
________________________________________________________
iii) Name the type of translator used to convert Code Segment 2 to executable codes
[1 mark]
________________________________________________________
iv) Code Segment 3 does not need a translator. Give a reason to support this
statement. [2 marks]
________________________________________________________
________________________________________________________
6
PART B
1. a) McDonald’s self-service kiosks have finally made their appearance in Malaysia, after
already being available in other countries prior to the local roll-out. The new kiosks
will basically let you skip the counter and queue together, letting you place your
orders with minimal hassle. How this works is you order your Ala Carte meals or Sets
and then wait for your number to be called at the collection counter. Explain the
operations of information processing cycle to place your order using the kiosk.
[3 marks]
Operation Explanation
Input
Process
Output
b) Convert the following numbers to the stated number system. Show your calculations.
7
c) Convert the following numbers to the stated number system. Show your calculations.
d) Identify the total number of bits for the following words using UNICODE information
coding scheme. [2 marks]
8
ii) Derive the truth table from the scenario. [4 marks]
9
(ii) V = A’.B + A.B’ [2 marks]
2. a) Siti works at BinaryIT Sdn. Bhd as IT officer and wants to setup office network for
her company. Her manager wants to setup a network which can expand the capacity
and number of computer connected up to 50 units before end of this year.
i) Suggest the most appropriate network architecture for that company. [1 mark]
________________________________________________________
ii) Give a reason for 2 a) ii). [2 marks]
________________________________________________________
________________________________________________________
10
c) Fill in the blanks with suitable classification of network. [2 marks]
Scenario Classification
i) Ahmad connect all his personal gadget and
devices via Bluetooth and Wi-Fi in his bedroom
ii) Ah Meng surfing Internet while he waiting his
turn to meet dentist at Putri Hospital
3. Computer ethics are the moral guidelines that shape the use of information systems and
computers meanwhile netiquette is the code of acceptable behaviors where users should
follow while online.
a) Decide whether the following scenarios are considered as plagiarism or not. [2 marks]
Scenario YES / NO
i. Ali copies some relevant articles, changes the titles and the authors’
names to his name and publishes the article on his own website.
ii. A motivator showed a book titled “World’s Great Leaders” written
by Steven Covey to students and shared stories about great leaders
mentioned in the book.
b) The table below shows a conversation between a secondary school’s student with his
class teacher in an instant messaging application.
Identify two (2) rules in netiquette that are against in the above conversation.
[2 marks]
_____________________________________________________________________
_____________________________________________________________________
4. a) Determine the System Development Life Cycle (SDLC) phase based on the following
activities in developing Student Registration System. [6 marks]
11
b) Paradigm can also be termed as method to solve some problem or do some task.
Programming paradigm is an approach to solve problem using some programming
language or also we can say it is a method to solve a problem using tools and
techniques that are available to us following some approach.
Procedural Object-Oriented
Programming language Programming language
Statement Translator
Convert one instruction of the source program at a time
into machine language and then immediately executed by the
computer or mobile
Converts the entire source program into machine language
before execute it.
12
SET 2
KOLEJ MATRIKULASI NEGERI SEMBILAN Section A Section B
SEMESTER / SESI: 01 - 2019 / 2020
NAMA SUBJEK : SAINS KOMPUTER Q1 : / 12 Q1 : / 28
EXERCISE POP A+ : SELARAS 2 Q2 : / 18 Q2 : / 13
MASA : 120 MINIT Q3: /4 Q3: /4
NAMA PELAJAR : Q4 : /8 Q4 : / 13 TOTAL :
KUMP. PRAKTIKUM : Total : / 42 Total : / 58 / 100
ARAHAN KEPADA CALON
Jawab semua soalan.
Kalkulator elektronik boleh digunakan.
b) Let’s Play
The total number of bytes for the above words is 20 bytes. [4 marks]
(i) State the number of characters that are represented by the above words.
_____________________________________________________________________________________
(ii) Identify the Information Coding Scheme which is mapped to these characters.
_____________________________________________________________________________________
(iii) State two (2) Information Coding Schemes apart from 1b) (ii).
_____________________________________________________________________________________
c) Differentiate between bit and byte in terms of usage. [2 marks]
_______________________________________________________________________________________________
_______________________________________________________________________________________________
d) Write the binary number which relates to the statement given. [2 marks]
Statement Binary number
e) Write the output Q for each of these logic gates, showing how the output (Q) algebraically relates to the inputs.
0 0 [2 marks]
(i) 1 0
0
(ii)
0
Q= Q=
2.
Networks may be classified according to a wide variety of characteristics, such as the medium used to transport the
data, communications protocol used, scale, topology, and organizational scope.
a) Define computer network. [1 mark]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
b) Answer the question below based on the statement below: [2 marks]
Description Answer
This hardware is a central connection device that connect multiple devices in a
(i)
single network and it send the signal to the intended recipient.
(ii) This cable consists of a single copper wire surrounded by 3 layers and CATV
network wiring often uses this cable.
13
c) Explain one (1) drawback of network. [1 mark]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
d) Distinguish between wired and wireless transmission network in terms of definition and give one (1) example of
each devices used. [4 marks]
Wired Network Wireless Network
Definition
Example of device
User or accessibility
h) IPv6 is the latest version of the Internet Protocol, which identifies devices across the internet so they can be
located. Every device that uses the internet is identified through its own IP address in order for internet
communication to work. Differentiate between IPv4 and IPv6 in term of number bits used for an IP address.
[2 marks]
IPv4 IPv6
i) Identify two (2) top-level domains (TLD) used in the domain name and state what is represented by each of them.
[2 marks]
Generic TLD Intended Purpose
(i) biz
(ii) net
3.
a) Good behavior and interaction between human and computer must be practice online and also offline. In computing
environment, it is known as computer ethics.
Give definition to computer ethics. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
b) Explain Information Accuracy. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
14
4.
a) Complete the System Development Life Cycle phase below. [2 marks]
(iv)
(i) Planning (ii) (iii) Design (v)
Implementation
SDLC Phase
(ii)
(v)
b) Based on phase of System Development Life Cycle below, suggest any one (1) major activities involved. [2 marks]
SDLC Phase Major activity
Planning
Design
Diagram 1
c) Define programming language. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
d) Programming languages are used by programmer to develop software or computerized system. State types of
programming languages based on Diagram 1. [1 mark]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
e) State translator use for C++. [1 mark]
__________________________________________________________________________________________________
SECTION B [58 marks]
1.
a) Hazim as a cashier at Mek D must being able to solve problems very quickly and having to lead a large group of
your crew at once, in order to complete the tasks at hand. Identify two (2) activities for each operation in the
Information Processing Cycle involved during order process till the payment paid by the customer. [4 marks]
i.
Process
ii.
i.
Output
ii.
b) Chinese characters are usually represented in Big5 Code, Guo Biao (GB) and Unicode. Describe two (2)
characteristics for Unicode coding systems. [2 marks]
Characteristic Unicode
Number of bits
Number of characters
c) Determine whether the given hexadecimal number 10B16 is odd or even number. [2 marks]
15
d) Find the missing number in the sequence given below.2216, 2816, _____, 3416 [3 marks]
e) Logic gates are devices that are used in electronic circuits, in which the inputs and outputs represent the
statements of Boolean algebra.
(i) Derive Boolean expression based on the following statement.
• You have a buzzer in your car that sounds when your keys are in the ignition and the door is open. [2 marks]
(ii) Derive Boolean expression and construct truth table based on scenario below.
To stay fit and healthy, experts always give the following tips:
Exercise regularly
Have enough sleep
Do not eat fast food [6 marks]
(iii) Derive Boolean expression, construct truth table and draw logic circuit based on scenario below.
Aini is going to watch a movie only if her sister is around but she needs to finish her homework first. [7
marks]
16
Logic Circuit:
(iv) I can be proud of myself if I study hard and does not do badly in sport.
Derive Boolean expression based on the above statement. [2 marks]
2. a) XYZ company is a small company that consists of five computers and one printer. Suggest to XYZ company which
network architecture they can choose to connect and share resources among them and justify your answer. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
b) Draw the network based on your answer above. [2 marks]
Network Ownership
17
g) Identify the classification of network based on the following descriptions: [2 marks]
Description Classification of network
3.
a) Sophia types in “GOOD MORNING EVERYBODY, HOW ARE YOU TODAY????”
State whether the behaviour is acceptable or not acceptable and justify your answer. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
b) Identify and state the area of computer ethics based on the following scenario. [2 marks]
4.
a) Determine the System Development Life Cycle (SDLC) phase based on the following activities in developing a
website. [6 marks]
Activity SDLC Phase
(ii) Give one (1) Programming Language example for Procedural Programming. [1 mark]
___________________________________________________________________________________________
(iii) State one (1) approach to solve the programming problems can be used by programmer other than Procedural
Programming and Object-Oriented Programming. [1 mark]
___________________________________________________________________________________________
(iv) Give one (1) example Programming Language for Procedural Programming. [1 mark]
___________________________________________________________________________________________
18
SET 3
1.
a. Information processing cycle refers to the sequence of events in processing information.
It consists of four (4) operations. Describe one (1) of the operation. [2 marks]
b. Bit and Byte are two (2) data representation in a computer. Explain bit. [2 marks]
Answer :
e. Fill in the table below about coding scheme Unicode in terms of number of bits used to
represent a character and the number of characters that can be represented. [2 marks]
Number of bits used to represent a
character
19
f. Draw the symbol for each of the logic gate below. Each logic gate contain two (2) inputs.
[3 marks]
Logic gate Symbol
NAND
XOR
XNOR
2.
a. Explain the concept of data sharing in this network architecture shown in Figure 1.
[2 marks]
Figure 1
20
b. Figure 2 shows a network for small business.
Figure 2
c. Identify one (1) communication device and one (1) transmission media from Figure 2.
[2 marks]
d. Describe one (1) of the communication device and one (1) transmission media mentioned
in 2(c). [2 marks]
21
f. Explain about client/server in a network architecture. [2marks]
22
k. An Internet Protocol address is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. There are two (2)
standards for IP addresses:
Give one (1) example for each standard of IP address. [2 marks]
l. Describe the purpose of IP address and its relationship to domain name. [2 marks]
3.
a. Users of social networking website include children and teenagers. Therefore it is
important for them to be aware of netiquette rules.
i. Define the term netiquette. [2 marks]
ii.
b. Suggest two (2) effective ways in creating awareness to users about netiquette. [2 marks]
i.
ii.
23
4.
a.
i. Explain what is System Development Life Cycle. [2 marks]
ii. What is the purpose of last phase in System Development Life Cycle? [2 marks]
ii. Give one (1) characteristic of one of the programming languages you have mentioned
in 4(b)(i). [1 mark]
c. Programming paradigm refers to the way in which computer language looks at the
problem to be solved. There are 3 types of programming paradigm; Procedural, Object
Oriented and Logic.
Explain object oriented paradigm. [2 marks]
24
This section consists of 4 questions. Answer all questions.
1.
a. Rishi needs pocket money and calls her father to bank in RM300 into his saving account.
After her father had agreed and done the transaction, he went to the Bank Kmpk Berhad to
withdraw money from the ATM machine. He received 6 pieces of RM50 notes. Identify
two(2) activities involved for Input and Output operations in the information processing
cycle during the withdrawal process. [4 marks]
Input i.
ii.
Output i.
ii.
b. Convert the following numbers to the stated number system. Show your calculation.
i. A1D16 to decimal. [2 marks]
25
ii. 7410610 to hexadecimal. [2 marks]
c. The hexadecimal (base 16) number system provides us with a shorthand method of
working with binary numbers.
i. 10111002 to hexadecimal [2 marks]
26
d. Coding Scheme is the combination of the 0's and 1’s that represent characters.
i. Identify the number of bits used by EBCDIC coding scheme to represent the
sentence below :
I LOVE MALAYSIA
[2 marks]
ii. Give one (1) difference between ASCII and Unicode coding schemes. [2 marks]
ASCII Unicode
27
e.
ii. Derive the Boolean Expression from the above scenario. [1 marks]
28
f. Given a Boolean Expression of Y = A+ B + (B’ + C’). Answer the following questions.
i. Draw the logic circuit based on the Boolean Expression. [5 marks]
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
29
2.
a. Draw a client/server network architecture that consists of three (3) computers and one
(1) printer. [6 marks]
b. Based on the given scenario, identify and state the classification of network and its area
of coverage. [4 marks]
Scenario Classification of network Area of coverage
3.
a. Identify the suitable area of computer ethics that has been neglected based on the given
scenarios. [2 marks]
Scenario Area of computer ethics
30
b. Identify and state whether the given scenario is ethical or non-ethical behavior while
using the social media. [2 marks]
Scenario Ethical / Non-ethical
4.
a. Fill in the table below with the most suitable phase and major activity in system
development life cycle (SDLC). [5 marks]
Activities Phase
31
c. High level languages can be compiled or interpreted. Identify the translator based on the
given statement below. [1 mark]
A program that translates a high level language into machine language and executed it
line by line.
.
d. Machine language does not need a translator. Give reasons to support this statement.
[1 mark]
e. Give one (1) difference between Procedural Paradigm and Logic Paradigm. [2 marks]
32
SET 4
Statement Operation
(i) Thumb drives are popular for this
operation.
(ii) The speed of RAM will determine
how fast this operation.
(iii) Nowadays, many people use a
touch screen to perform this
operation.
(iv) Two choices of this operation either
soft copy or hard copy.
EBCDIC Unicode
(i). (i).
(ii). (ii).
(d) Draw the logic symbols based on the descriptions given below.
[4 marks]
33
Description Logic Symbol
FIGURE 1
______________________________________________________________
______________________________________________________________
(d) Describe the classification of network shown in FIGURE 2.
[2 marks]
BANK SUKASUKI
KUALA LUMPUR
KANGAR
IPOH
KOTA
BHARU KUANTAN
FIGURE 2
______________________________________________________________
______________________________________________________________
34
(e) As the boom of Internet and technology changes us as a society, it also makes
learning more efficient and less costly for student.
(i) State two (2) benefits of Internet that impacted to you as a student.
[2 marks]
________________________________________________________
________________________________________________________
(ii) Give two (2) disadvantages of Internet that impacted to you as a
student.
[2 marks]
________________________________________________________
________________________________________________________
(f) Identify the network that uses internet technologies based on the given
statements.
[2 marks]
(g) Broadband Internet service truly is the most used form of Internet access
because of its high access speeds.
(i) State one (1) factor that will decrease the speed of a broadband
Internet connection.
[1 mark]
________________________________________________________
(ii) Describe one (1) type of broadband connection that is installed at a
permanent location such as home or an office.
[2 marks]
________________________________________________________
______________________________________________________
(iii) Name one (1) broadband connection that is utilized in remote zones
of Sabah and Sarawak.
[1 mark]
________________________________________________________
(h) An Internet Protocol address (IP address) is a numerical label assigned to each
device connected to a computer network that uses the Internet Protocol for
communication.
35
(ii) Given the following IP address
255.130.277.1
(a) Identify the area of computer ethics based on the given scenario.
[4 marks]
(b) Netiquette should be used during email, social networking sites, and even
instant messaging or chat rooms.
(i) Your cousin asked for your fabulous zucchini cake recipe at the last
family function. While you're sending it to him, you decide to e-mail it
to all 500 people in your address book as well. Identify the netiquette
sin that have been committed based on the given scenario.
[1 mark]
________________________________________________________
(ii) What is wrong with the following text message that John is sending to
his mother? :
36
(iv) Why is it important to use the rules of netiquette in digital
communications?
[2 marks]
________________________________________________________
________________________________________________________
4. (a) The design phase consists of two major activities which are acquired hardware
and software (if necessary) and develop all of the details of the new or modified
information system.
State four (4) activities involved in acquire hardware and software (if
necessary)
[4 marks]
Activity 1
Activity 2
Activity 3
Activity 4
X
FIGURE 3
_______________________________________________________
37
SECTION A [58 marks]
BAHAGIAN A [58 markah]
1 (a) Ahmad would like to browse and find information on courses offered by
Malaysian Universities on the Internet.
Describe one (1) activity involved for input and output operations in the
information processing cycle during the browsing process.
[4 marks]
Input
Output
(b) The numbering system and representation used by a computer is binary and
hexadecimal numbering systems.
38
(iii) Convert C3F16 to binary number. Show your calculation.
[4 marks]
(i) Below is an incomplete logic circuit for the control system. Redraw the
logic circuit using the correct logic gates. Note the output of the
dark/light sensor is ‘1’ (true, high, on) when it is light. The lights must be
turned during the dark of night.
[3 marks]
39
Redraw:
(ii) Write Boolean Expression for the logic circuit that controls the street
lighting system.
[3 marks]
_______________________________________________________
(iii) Write a truth table for the logic circuit that controls the street lighting
system.
[4 marks]
(iv) It is night time, the manual switch is off and the timer is ‘on’. Will the
street lights be on or off ?
[1 mark]
________________________________________________________
40
(e) The system, after some time, is adapted in Taiping district. Because of the
frequent rainy season, the system has to be changed accordingly. In the new
system, the light will turn on automatically when it gets dark or raining. The on
and off switch has been removed completely as well as the timer. So, now the
new system only depends on the rain sensor and darkness sensor.
(b) Identify the type of network architecture for the following statement.
[4 marks]
41
Statement Type of network architecture
(ii) By using torrent, all the computers are
connected on the internet. One computer
can upload any file in the network and
other computers start downloading the
files. Also, every computer can upload
parts of the file if that computer has
already downloaded some chunks of the
file.
(c) The network is usually be classified into two categories. Name and describe
the classification of the network based on the given criteria.
[4 marks]
Description
State one (1) example of an issue appropriate for the following IP types.
[2 marks]
Copyright Trademarks
42
(c) Midah has joined a new software company in Kuala Lumpur and has been
assigned the task of developing an internal communications system. She
begins the task by assessing how the system will help in efficiently coordinating
the projects that the company handles and in determining the feasibility of the
system.
Translator X
Translator Y
FIGURE 4
Give one (1) example of programming language for each translator X and
translator Y.
[2 marks]
______________________________________________________________
______________________________________________________________
43
(b) Name one (1) other translator mentioned in 4(a).
[1 mark]
_____________________________________________________________
(c) FIGURE 5 (i) and FIGURE 5(ii), shows types of programming paradigm.
FIGURE 5 (i)
FIGURE 5 (ii)
(ii) State the difference of paradigm between FIGURE 5(i) and FIGURE
5(ii).
[2 marks]
44
SET 5
SC015 CONFIDENTIAL
1 Info graphic given below shows the credit card payment process. There are four (4)
operations involved during this process.
(a) Identify the operation of information processing cycle based on steps given.
[2 marks]
Step Operation
4
7
45
SC015 CONFIDENTIAL
(i) Give one (1) benefit of using hexadecimal digits to represent data in
computers.
[1 mark]
________________________________________________________
________________________________________________________
(c) The information coding scheme is a standard which tells the user's machine
which character represents which set of bytes.
(i) What is the benefit of using Unicode over ASCII to the user?
[2 marks]
________________________________________________________
________________________________________________________
(ii) How many bits would it take to represent the following phrase using
the ASCII code?
#sweet_dreams
[2 marks]
________________________________________________________
________________________________________________________
________________________________________________________
46
SC015 CONFIDENTIAL
(d) Name the logic gate based on the descriptions given below.
[3 marks]
(a) Identify the most suitable communication device from the given statement.
[3 marks]
47
SC015 CONFIDENTIAL
(c) Give one (1) example of Local Area Network (LAN) and Wide Area Network
(WAN).
[2 marks]
LAN WAN
(d) Billions of home and business users around the world access a variety of
services on the Internet using computers and mobile devices.
Intranet Extranet
48
SC015 CONFIDENTIAL
(e) Today’s network connects terminals, devices and computers from many
different manufacturers across many types of networks.
State the type of broadband Internet connection for the scenarios given:
[3 marks]
Type of Broadband
Scenario
Internet Connection
A type of Internet connection that transmits
digital signals on existing standard phone
lines.
A type of internet connection that involves
sending signal from an earth-based
reflective dish to another earth-based
station.
Ahmad connect his laptop to the phone and
utilize the data plan on his phone to access
the Internet
(f) IP address much like the postal service to send data to a computer or device
at a specific destination.
(i) Identify whether the following IPv4 address is valid or invalid based on
the IP below.
10.257.0.104
[1 mark]
________________________________________________________
49
SC015 CONFIDENTIAL
(iv) Specify the Top Level Domain (TLD) for the associated organization.
[2 marks]
Military Organizations
Network providers or
commercial companies
(b) State two (2) ways how matriculation students can apply green computing in
their daily life.
[2 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
(c) Instant messaging, email and discussion boards are an example of internet
services available on Internet that require ethics to ensure it is able to
function well.
Give your opinion why netiquette is very important for Internet user.
[2 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________
(d) State the most suitable Intellectual Property rights to protect the following
items.
[3 marks]
50
SC015 CONFIDENTIAL
4 (a) There are five (5) phases of System Development Life Cycle. State the
appropriate phase in the blank space given.
[4 marks]
Example of Programming
Code
Language
Load z, r0
Load x, r1
Load y, r2
Add r1, r2, r3
Sub r0, r2, r0
Store r0, b
int x= sc.nextInt ( );
________________________________________________________
________________________________________________________
51
SC015 CONFIDENTIAL
1 (a) Alif Aziz loves to do online shopping because he can compare and choose
the product with the lowest price. There are many online shopping apps
today. The infographic below shows the transaction happened during online
shopping.
Based on given info graphic, discuss the operations of information processing
cycle involved.
[4 marks]
Operation Explanation
Input
Storage
52
SC015 CONFIDENTIAL
(b) (i) Show the conversion of the binary number 1111102 to hexadecimal
number with the steps clearly.
[3 marks]
53
SC015 CONFIDENTIAL
(c) Ghani has subscribed SkyTone Plan with 8192 MB data which provides
only Internet plan with unlimited talk and messages to any number, every day.
He has used 75% of his quota in day 20.
54
SC015 CONFIDENTIAL
(i) Ben Amir is using Windows 10 for his operating system in his
computer. Identify the most appropriate coding scheme.
[1 mark]
________________________________________________________
55
SC015 CONFIDENTIAL
(f) (i) Draw the logic circuit represented by the logic statement.
[5 marks]
A
D
B
E
56
SC015 CONFIDENTIAL
2 (a) State two (2) differences between Peer-to-Peer and Client Server
architecture.
[4 marks]
(b) Razak wants to set –up his office network. He needs to install all of the
following devices and peripherals. Draw a peer-to-peer architecture layout if
Razak needs to setup 2 computers, 2 laptops, 1 printer and 1 scanner.
[4 marks]
57
SC015 CONFIDENTIAL
(c) Identify two (2) rules of netiquette that online user should follow when using
Instagram.
[2 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
4 (a) (i) Determine the System Development Life Cycle (SDLC) phase based on the
conversation given.
[3 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________
58
SC015 CONFIDENTIAL
(b) (i) Explain one (1) difference between Procedural Programming and Object
Oriented Programming.
[2 marks]
(b) (ii) The figure below shows the program segment of three different languages that
have been used to calculate the sum of two numbers.
Identify the type of translator that translates the following program. State ‘NONE’ if a
translator is not relevant.
[ 3 marks]
Program A to Program B.
Program C to Program A.
Program C to Program B.
59
EXTRA BONUS (1)
INSTRUCTIONS TO CANDIDATE:
Each question has four answer options. For each question, choose the best answer.
B Green Computing
C Software Piracy
D Information privacy
2 Identify the netiquette rules which has been violated based on the following
statement.
B Be polite
3 State the appropriate phase in System Development Life Cycle (SDLC) for the
activity below.
A Planning
B Analysis
C Design
D Implementation
4 Select the correct translator based on the activity.
“Convert the entire source program into machine language before executing it”
A Assembler
B Compiler
C Interpreter
D Translator
SECTION B [36 marks]
Each question has four answer options. For each question, choose the best answer.
1 After you press SEND icon in WhatsApp, “the application communicates with
the servers to send the message and displays it in the current conversation.”
2 Complete the following number sequence and give your answer in hexadecimal
and binary number systems.
A 100110112
B 11010012
C 111110102
D 1010110011102
4 Complete the following number sequence.
5 How many bytes represented in the following phrase, according to ASCII coding
scheme?
A 18
B 17
C 16
D 19
6 What is the value of Y1 and Y2 if A = on, B = off, C= on, D = on.
A Y1= On Y2 = Off
B Y1= On Y2 = On
D Y1= Off Y2 = On
A 0
B 1
C 01
D 10
8 “The alarm (Y) will ring if either the door (A) or the window (B) are opened and
the alarm switch (C) must be ON state.”
Based on the statement, choose the correct boolean expression in order to make
the alarm rings.
A Y= A.B +C
B Y= A+B+C
C Y= A+B.C
D Y= ( A+B ) . C
9 A corridor lamp (L) will light up based on the condition of switch A and switch B.
It will only light up (ON) if the 2 switches are in different states. But if the
switches are in the same state either both are ON or OFF, the corridor lamp will
not light up (OFF). Choose the suitable logic circuit that can represent this
scenario.
B
C
10 Rashdan with his five friends move to the new rent house. They are students in
one of the prestigious university at Kuala Lumpur. They are planning to connect a
simple network in house with low-cost budget and they can access every data
from their shared computer network. What is the disadvantage of their network
architecture planning?
A If one of the computers in their network is broken or have fault, all the
other computer can’t be online or share network for each other.
B Their network shares equal responsibility and capabilities that will make
sharing hardware such as printer, data or information difficult to setup.
D Rashdan and his friends have to use same password on each computer in
their network.
11 Zalooraa Enterprise is the well-known online fashion and design shopping. There
are thousands or maybe millions online transaction per month and make their
online network congested. In their Information Technology (IT) Department, their
network administrator needs to maintain a few server such as file server, e-
commerce server, print server, web server, firewall server and exchange email
server. Choose the correct statement for this type of network architecture.
C This type of network architecture can’t have more than one server.
D The online buyers can access to the printer network in this company
without any restrictions and security measures.
12 Which of these examples determine the area of coverage in Local Area Network?
III. Malaysia
A I, II, III
B I, II, IV
C II, III, IV
D I, II, III, IV
B II , IV
C I, II , III
D I, III , IV
B System Analyst
C Programmers
D Deputy Director
16 En. Saiful has interview the clients regarding details of the website that he wants
to build. The most suitable System Development Life Cycle (SDLC) phase for
this activity is _______
A Analysis
B Planning
C Documentation
D Implementation
17 Which of the following are the TRUE descriptions of assembly language?
A I and II
B II and III
C I and III
D II and IV
Compiler Interpreter
II. Translate the source code line by Translate the entire source code
line at a time before execute it
IV. Display errors after compilation, all Display errors of each single
at the same time instruction
Table 1
A. I and II
B. II and III
C. III and IV
D. I and IV
END OF QUESTIONS
EXTRA BONUS (2)
PRE PSPM KMS SC015 2020/2021
Assalamualaikum and good day madam. This is Amirah from practicum 123. When is
the due date to submit the multimedia 60s video task?
1 (a) Identify three (3) netiquette rules that had been followed by Amirah based on FIGURE 1
[3 marks]
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
[ 1 mark]
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
(c) State two (2) ways on how green computing can be applied in the education field.
[ 4 marks]
PRE PSPM KMS SC015 2020/2021
Term Explanation
Green
Computing
2 (a) There are five (5) phases in the System Development Life Cycle ( SDLC).
State the appropriate phase starting from A to D in the space given.
[4 marks]
A : ______________________________________________________________________
B : ______________________________________________________________________
C : ______________________________________________________________________
D :______________________________________________________________________
(b) State the example of programming language based on the following codes:
[3 marks]
PRE PSPM KMS SC015 2020/2021
LOAD BASEPAY
ADD OVERPAY
STORE GROSSPAY
FIGURE 3
[1 mark]
_________________________________________________________________________
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
[1 mark]
_________________________________________________________________________
1 (a) Wafa as a cashier at MekDoNet restaurant, must be able to solve problems very quickly
and manage to handle customers at once, in order to complete the tasks at hand.
Identify one (1) activity for each operation in the Information Processing Cycle involved
during order process till the payment paid by the customer
[3 marks]
Operation Explanation
Input
Process
Output
(b) Convert the following numbers to the stated number system. Show your calculations.
PRE PSPM KMS SC015 2020/2021
[5 marks]
(c) Convert the following numbers to the stated number system. Show your calculations.
[5 marks]
(d) The Korean Hangul syllabary occupies the Unicode range from AC00 (decimal 44032) to
D7A3 (decimal 55171).
[2 marks]
Characteristic Unicode
Number of byte
Number of characters
(e) In order for Ahmad to register Data Structure (C1), he must pass two prerequisite courses,
Fundamental Programming (C2) and Object Oriented Programming (C3). However he can
straight away register Data Structure (C1) if he passed Advanced Programming (C4).
[2 marks]
_________________________________________________________________________
PRE PSPM KMS SC015 2020/2021
[4 marks]
[5 marks]
PRE PSPM KMS SC015 2020/2021
[2 marks]
0 0 0 1 1 0 0 0 1
0 0 1 1 0 1 0 1 ____
0 1 0 1 1 0 1 1 0
0 1 1 1 0 ____ 0 1 0
1 0 0 0 1 0 0 _____ 1
1 0 1 0 0 0 0 0 1
1 1 0 0 1 0 ____ 1 0
1 1 1 0 0 0 0 0 1
2 (a) Draw a peer-to-peer network architecture that consists of four (4) workstations, one (1)
printer and one (1) scanner.
[6 marks]
PRE PSPM KMS SC015 2020/2021
(b) Based on the given scenario, identify and state the type of network and its advantage.
[3 marks]
A university campus
consists of an academic
building, library,
administrative office and
student resident office.
3 (a) Show one (1) example of a situation in Facebook where the following online netiquette
rules are NOT complied
[2 marks]
(b) Point out one (1) risk of inaccurate information associated with weather forecasting in the
aviation industry.
[2 marks]
_________________________________________________________________________
_________________________________________________________________________
(b) Matahari College decided to develop an information system that involves maintaining
databases and generates result of students in the college. The system also needs to produce
reports such as reports on performance of students for every semester, statistics of students
that were dismissed and etc. Currently all activities involving results of student, producing
reports and maintaining students’ data are done manually.
State the appropriate phase in System Development Life Cycle (SDLC) for the following
activities in developing the information system.
[5 marks]
4 (a) Identify the appropriate paradigms of programming languages for the following statements
[3 marks]
(b)
Based on the given items, classify the most appropriate type of language translator.
[2 marks]
TASM
Visual BASIC
END OF QUESTIONS
EXTRA BONUS (3)
NAME : TUTORIAL:
LECTURER NAME :
MATRIC NUMBER IDENTITY CARD NUMBER
M S
SC015
Computer Science
Semester 1
2020/2021
1 ½ hours
TRIAL TEST
COMPUTER SCIENCE
1 ½ HOURS
1
Name : ……………………………….… Class :...................... Lecturer :......................................
1. (a) Azlan wants to transfer money to his brother by using CimbClicks website.
Identify one (1) activity for each operation in the Information Processing Cycle involved during
his transaction.
[3 marks]
Operation Activity
Process
Output
Storage
2
(iv) Calculate the final result.
41 + FF16 x 1012 = ________2
[3 marks]
(c) Differentiate between ASCII and Unicode in terms of range of values that can be
represented by each coding scheme. [2 marks]
ASCII Unicode
2. (a) Based on the Boolean Expression, Y = A⊕C’ + (B.A)’ , answer the following question.
3
(ii) Draw the logic circuit for 2(a)(i). [5 marks]
3 (a) (i) With millions of people working and learning from home during the pandemic Covid-19,
Mr. Kamara plans to set up his mini office network at home. He needs to install all of the
following devices and peripherals. Draw a peer-to-peer architecture layout if Mr.Kamara
needs to set up 2 workstations, 2 laptops and 1 wireless printer.
[4 marks]
_____________________________________________________________________
4
3 (b) RNB is an entrepreneur company. To compete with other competitors, the Chief Executive
Officer (CEO) has ensured that their office is equipped with a network connection that allows
sharing of resources and information within the company.
(ii) In next two (2) years, RNB Company is planning to expand their network into several offices
located in every state. Describe the suitable classification of network that can be used in their
future offices. [2 marks]
_________________________________________________________________________
_________________________________________________________________________
4 (a) Netiquette is the code of acceptable behaviors where users should follow while online.
List three (3) rules of netiquette. [3 marks]
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
(c) Knowledge and practice of ethics is a way of protecting rights to an invention and information.
i. Give the definition of Intellectual Property (IP).
[2 marks]
________________________________________________________________________
________________________________________________________________________
ii. State the suitable type of Intellectual Property based on the following statements:
[3 marks]
5
(d) Computer ethics are the moral guidelines that shape the use of information systems and
computers. Identify the appropriate area of computer ethics based on the following scenarios.
[2 marks]
Scenario Area of Computer Ethics
5 (a) Explain one (1) importance of the System Development Life Cycle.
[2 marks]
__________________________________________________________________________
__________________________________________________________________________
(b) List two (2) peoples involved in the System Development Life Cycle. [2 marks]
__________________________________________________________________________
__________________________________________________________________________
6
6 (a) Give two (2) characteristics of low-level programming language. [2 marks]
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
(b) Explain the Object-oriented paradigm and give one (1) example of programming language
used in the Object-oriented paradigm.
[3 marks]
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
(d) Figure 1 shows the program segments of three different program segment written using
different types of programming languages.
Programming Language A
Programming Language B
Programming Language C
Figure 1
7
(i) Identify the type of translator that translates the following program.
[2 marks]
(ii) Give three (3) major advantages of writing a Programming A rather than programs in
Programming B and Programming C
[3 marks]
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
(e) State one (1) difference between logic programming and procedural programming.
[2 marks]
Prepared by : Checked by :
Nooraini Abu Bakar Amal Zunnairah Abu Bakar
Sarmila Marlini Mohd. Rufin
Indrani Gopal
Mazni Kohlit
END OF QUESTIONS
8
EXTRA BONUS (4)
SC015 CONFIDENTIAL
Computer Science
Semester I
Session 2020/2021
1 hour 30 minutes
Name :
Matric No :
Tutorial :
IQUA
COMPUTER SCIENCE 1
1 hours 30 minutes
DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE TOLD TO DO SO.
INSTRUCTIONS TO CANDIDATE:
This question paper consists of 6 questions.
Answer all questions in the space provided MARK SHEET
in this question paper.
The use of electronic calculator is permitted. For Examiner Use
Question No Marks
1
2
3
4
5
6
TOTAL
1 (a) Farhana loves to do online shopping because she can compare and choose
the product with the lowest price. There are many online shopping apps
today. The infographic below shows the transaction happened during online
shopping.
Based on given infographic, discuss the operations of information processing
cycle involved.
[3 marks]
Operation Explanation
Input
Process
Storage
2
SC015 CONFIDENTIAL
(b) (i) Show the conversion of the binary number 101101102 to hexadecimal
number with the steps clearly.
[3 marks]
3
SC015 CONFIDENTIAL
[3 marks]
2. (a) Calculate the total number of bits for the following words using Unicode
information coding scheme.
[2 marks]
SNAPCHAT
4
SC015 CONFIDENTIAL
________________________________________________________
________________________________________________________
(c) (i) Draw the logic circuit represented by the logic statement.
[5 marks]
5
SC015 CONFIDENTIAL
A
D
B
E
6
SC015 CONFIDENTIAL
3 (a) State two (2) differences between Peer-to-Peer and Client Server
architecture.
[4 marks]
(b) Differentiate Local Area Network (LAN) and Wide Area Network (WAN)
based on area of coverage.
[2 marks]
LAN WAN
______________________________________________________________
7
SC015 CONFIDENTIAL
______________________________________________________________
______________________________________________________________
(d) Identify two (2) rules of netiquette that online user should follow when
communicating in a discussion post in Facebook groups.
[2 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
(e)
From: [email protected]
To: [email protected]
Subject: <none>
Oi,why I am X offred JOB.
YOU ARE SUPPOSED TO HELP ME !!!!
I HATE YOU!!!!!
8
SC015 CONFIDENTIAL
Identify three (3) netiquette rules that must be followed when writing a formal
e-mail to an organization. [3 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
5 (a) Each System Development Life Cycle (SDLC) phase often appears
sequentially
________________________________________________________
________________________________________________________
(b) Determine the System Development Life Cycle (SDLC) phase based on the
conversation given.
[3 marks]
9
SC015 CONFIDENTIAL
(c) Explain one (1) advantage of parallel conversion compared to direct conversion.
[2 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________
Example of Programming
Code
Language
Load z, r0
Load x, r1
Load y, r2
Add r1, r2, r3
Sub r0, r2, r0
Store r0, b
int x= sc.nextInt ( );
________________________________________________________
________________________________________________________
10
SC015 CONFIDENTIAL
(b) Explain one (1) difference between Procedural Programming and Object
Oriented Programming.
[2 marks]
(c) The figure below shows the program segment of three different languages that
have been used to calculate the sum of two numbers.
Identify the type of translator that translates the following program. State ‘NONE’ if a
translator is not relevant. [ 3 marks]
Program A to Program B.
Program C to Program A.
Program C to Program B.
d) Determine the most suitable programming paradigm based on the scenario given.
[ 2 marks]
11