Self Learning Activities

Download as pdf or txt
Download as pdf or txt
You are on page 1of 101

COMPUTER SCIENCE

self
learning
activities
Semester 1, 2021/2022
SCO15
(PART 1)

NAME :
CLASS :

LABUAN MATRICULATION COLLEGE


SET 1

PART A

1. Computer system plays an important role in daily lives. The data inside the computer is
represented by bits 0 or 1.

a) Give the definition of operation and one (1) example of device used for the operation
in a computer system based in the following table. [6 marks]

Operation Definition Example of Device

Input

Output

Process

b) i) How many bits in 12 bytes. [1 mark]


________________________________________________________
________________________________________________________
ii) State two (2) common coding scheme. [2 marks]
________________________________________________________
________________________________________________________
c) Identify the number of bits used by EBCDIC coding scheme to represent the sentence
below: [1 mark]
Introduction to Computer SCIENCE
___________________________________________________________
___________________________________________________________

d) Draw the truth table for the Boolean Expression Y=A⊕B.C [3 marks]

A B C BC Y

1
2. (a) Figure 1 shows a network in a corporate office.

Figure 1

(i) X is a communication device that allows computers and mobile devices to transfer
and receive data without using any physical transmission media. Identify X.
[1 mark]
________________________________________________________
________________________________________________________
(ii) Y is a communication device that allows the network to connected to the Internet.
Identify Y. [1 mark]
________________________________________________________
________________________________________________________
(iii)Workstations are the personal computers used by employees at the office. What is
the suitable physical transmission media used to connect the workstations to the
switch? [1 mark]
________________________________________________________
________________________________________________________
(iv) Give one (1) advantage of using this network. [1 mark]
________________________________________________________
________________________________________________________

2
(b) Network architecture is the overall design of a computer network that describes how a
computer network is configured and what strategies are being used. State an
advantage for each architecture. [2 marks]

Architecture

i._____________________ ii._____________________
Advantage ______________________ ______________________
______________________ ______________________
______________________ ______________________

(c) State one (1) difference between Local Area Network (LAN) and Wide Area Network
(WAN). [2 marks]

LAN WAN

(d) State and explain two (2) disadvantages of the Internet. [4 marks]

Disadvantages Explanation
(i)

(ii)

(e) Differentiate between Intranet and Extranet. [2 marks]

Intranet Extranet

3
(f) Describe the following broadband Internet connection.
(i) Cable Internet Service [1 mark]
________________________________________________________
________________________________________________________
(ii) Fixed Wireless [1 mark]
________________________________________________________
________________________________________________________

(g) Give one (1) example of IPV4 address. State the smallest and the largest number that
can be used for IPv4. [3 marks]
________________________________________________________
________________________________________________________
________________________________________________________
(h) Differentiate between IPv4 and IPv6. [4 marks]

Criteria IPv4 IPv6


Address length
(number of bits)
Number system
used to represent
address

3. a) Identify types of computer ethics given below.

i) The Macau Scam works in various ways either as a phone call to ‘lucky draw
winners’, ransom demands for purported kidnapping and spoofing, where the
syndicate members pose as police personnel, Bank Negara officials or even bank
officers. Another method also sees scammers duping victims into paying a certain
amount of tax in order to claim prizes. [1 mark]
________________________________________________________
ii) Apple has been awarded more than USD $1 billion in damages as it prevailed in
its patent-infringement case against Samsung. The jury decided that the majority
of Samsung smartphones and tablets violate patents held by Apple including
features such as the zoom in and out innovation achieved by tapping the screen.
The jury also decided that Samsung's infringement was intentional and said the
firm's counter-suit for USD $399 million against Apple was without merit.
[1 mark]
________________________________________________________
iii) Sharing of software online is prohibited. Freeware and shareware programs are the
only programs that can be distributed online. Other software is not allowed to be
shared with other people over the Internet. [1 mark]
________________________________________________________

4
iv) Improving your home's energy efficiency with ENERGY STAR can help to lower
high energy bills, improve comfort and reduce greenhouse gas emissions.[1 mark]
________________________________________________________
b) i) Define netiquette. [2 marks]
________________________________________________________
________________________________________________________
ii) Give two (2) good practices to follow when using email. [2 marks]

1st practice

2nd practice

4. a) System Development Life Cycle (SDLC) is a series of phases to create a system to


meet user requirements.
1. __________

5. _______ 2. analysis

3.Design
4. _________

Figure 2 Phases in SDLC

i) State one (1) main activity of phase 1 [1 mark]


________________________________________________________

ii) List two (2) type of testing involve in phase 4 [2 marks]


________________________________________________________
________________________________________________________
iii) Name phase 5 and state the purpose [3 marks]
________________________________________________________
________________________________________________________
________________________________________________________

5
b) Given three different program segment written using different types of programming
language.

Code Segment 1 Code Segment 2 Code Segment 3

i) Identify the type of programming language used to write Code Segment 1[1 mark]
________________________________________________________
ii) State one (1) disadvantage of programming language of code segment 2. [1 mark]
________________________________________________________
________________________________________________________
iii) Name the type of translator used to convert Code Segment 2 to executable codes
[1 mark]
________________________________________________________

iv) Code Segment 3 does not need a translator. Give a reason to support this
statement. [2 marks]
________________________________________________________
________________________________________________________

6
PART B

1. a) McDonald’s self-service kiosks have finally made their appearance in Malaysia, after
already being available in other countries prior to the local roll-out. The new kiosks
will basically let you skip the counter and queue together, letting you place your
orders with minimal hassle. How this works is you order your Ala Carte meals or Sets
and then wait for your number to be called at the collection counter. Explain the
operations of information processing cycle to place your order using the kiosk.
[3 marks]

Operation Explanation

Input

Process

Output

b) Convert the following numbers to the stated number system. Show your calculations.

i) DEC16 to decimal. [3 marks]

ii) 3678 to hexadecimal. [3 marks]

7
c) Convert the following numbers to the stated number system. Show your calculations.

i) 11000112 to hexadecimal. [3 marks]

ii) D1D16 to binary. [3 marks]

d) Identify the total number of bits for the following words using UNICODE information
coding scheme. [2 marks]

Words Total Number of Bits


The best never rest!

Adab itu lebih tinggi dari Ilmu

e) A sprinkler(S) is ON if temperature alarm(T) is ON or cooler alarm(C) is ON or vent


alarm (V) is OFF and cooler alarm (C) is ON.

i) Derive the Boolean expression from the scenario. [2 marks]


_________________________________________________________

8
ii) Derive the truth table from the scenario. [4 marks]

(f) Draw the logic circuit based on the Boolean expression.

(i) X= L’.F + F’.A [5 marks]

9
(ii) V = A’.B + A.B’ [2 marks]

2. a) Siti works at BinaryIT Sdn. Bhd as IT officer and wants to setup office network for
her company. Her manager wants to setup a network which can expand the capacity
and number of computer connected up to 50 units before end of this year.

i) Suggest the most appropriate network architecture for that company. [1 mark]
________________________________________________________
ii) Give a reason for 2 a) ii). [2 marks]
________________________________________________________
________________________________________________________

ii) State two (2) disadvantages this network architecture. [2 marks]


________________________________________________________
________________________________________________________
b) All computers at Maideen Hypermarket connected together and shared hardware such
as printer, exchange data and information among themselves in small area.

i) State the classification of network based on scenario above. [1 mark]


________________________________________________________
ii) Describe network classification based on b) i). [2 marks]
________________________________________________________
________________________________________________________

10
c) Fill in the blanks with suitable classification of network. [2 marks]

Scenario Classification
i) Ahmad connect all his personal gadget and
devices via Bluetooth and Wi-Fi in his bedroom
ii) Ah Meng surfing Internet while he waiting his
turn to meet dentist at Putri Hospital

3. Computer ethics are the moral guidelines that shape the use of information systems and
computers meanwhile netiquette is the code of acceptable behaviors where users should
follow while online.

a) Decide whether the following scenarios are considered as plagiarism or not. [2 marks]

Scenario YES / NO
i. Ali copies some relevant articles, changes the titles and the authors’
names to his name and publishes the article on his own website.
ii. A motivator showed a book titled “World’s Great Leaders” written
by Steven Covey to students and shared stories about great leaders
mentioned in the book.

b) The table below shows a conversation between a secondary school’s student with his
class teacher in an instant messaging application.

Student X GIVE ME A SAMPLE PROJECT A.S.A.


Teacher Y You may get sample of previous project from our school library.
Student X But, Sir, I WaNt it NOWWWWWWW!

Identify two (2) rules in netiquette that are against in the above conversation.
[2 marks]
_____________________________________________________________________
_____________________________________________________________________

4. a) Determine the System Development Life Cycle (SDLC) phase based on the following
activities in developing Student Registration System. [6 marks]

Activity SDLC Phase


The project team develop system using propose software.

Interview the client regarding details of the system.

Make changes to the system when it is necessary.

The programmer team tests the functionality of an entire system.

Sketching the idea using storyboard to view flow of system.


Request approval for developing a new system (Student
Registration System).

11
b) Paradigm can also be termed as method to solve some problem or do some task.
Programming paradigm is an approach to solve problem using some programming
language or also we can say it is a method to solve a problem using tools and
techniques that are available to us following some approach.

Briefly discuss one difference between Procedural Programming language paradigm


and Object-Oriented Programming language paradigm. [2 marks]

Procedural Object-Oriented
Programming language Programming language

c) A translator is a programming language processor that converts a computer program


from one language to another.

Identify the translator based on the statement given . [3 marks]

Statement Translator
Convert one instruction of the source program at a time
into machine language and then immediately executed by the
computer or mobile
Converts the entire source program into machine language
before execute it.

Converts program written in assembly language to machine


code.

12
SET 2
KOLEJ MATRIKULASI NEGERI SEMBILAN Section A Section B
SEMESTER / SESI: 01 - 2019 / 2020
NAMA SUBJEK : SAINS KOMPUTER Q1 : / 12 Q1 : / 28
EXERCISE POP A+ : SELARAS 2 Q2 : / 18 Q2 : / 13
MASA : 120 MINIT Q3: /4 Q3: /4
NAMA PELAJAR : Q4 : /8 Q4 : / 13 TOTAL :
KUMP. PRAKTIKUM : Total : / 42 Total : / 58 / 100
ARAHAN KEPADA CALON
Jawab semua soalan.
Kalkulator elektronik boleh digunakan.

SECTION A [42 marks]


1.
a) Information is a processed, organized or classified data which is useful for the receiver. Define information
processing cycle. [2 marks]
_______________________________________________________________________________________________
_______________________________________________________________________________________________

b) Let’s Play
The total number of bytes for the above words is 20 bytes. [4 marks]
(i) State the number of characters that are represented by the above words.
_____________________________________________________________________________________
(ii) Identify the Information Coding Scheme which is mapped to these characters.
_____________________________________________________________________________________
(iii) State two (2) Information Coding Schemes apart from 1b) (ii).
_____________________________________________________________________________________
c) Differentiate between bit and byte in terms of usage. [2 marks]
_______________________________________________________________________________________________
_______________________________________________________________________________________________

d) Write the binary number which relates to the statement given. [2 marks]
Statement Binary number

Maximum binary number in 5-bit binary number.

Second large binary number in 6-bit binary number.

e) Write the output Q for each of these logic gates, showing how the output (Q) algebraically relates to the inputs.
0 0 [2 marks]

(i) 1 0
0

(ii)
0

Q= Q=

2.
Networks may be classified according to a wide variety of characteristics, such as the medium used to transport the
data, communications protocol used, scale, topology, and organizational scope.
a) Define computer network. [1 mark]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
b) Answer the question below based on the statement below: [2 marks]
Description Answer
This hardware is a central connection device that connect multiple devices in a
(i)
single network and it send the signal to the intended recipient.
(ii) This cable consists of a single copper wire surrounded by 3 layers and CATV
network wiring often uses this cable.
13
c) Explain one (1) drawback of network. [1 mark]
__________________________________________________________________________________________________
__________________________________________________________________________________________________

d) Distinguish between wired and wireless transmission network in terms of definition and give one (1) example of
each devices used. [4 marks]
Wired Network Wireless Network

Definition
Example of device

e) Define Internet. [2 marks]


__________________________________________________________________________________________________
__________________________________________________________________________________________________

f) Explain benefit of Internet in business field. [2 marks]


__________________________________________________________________________________________________
__________________________________________________________________________________________________

g) Differentiate between Intranet and Extranet in terms of user or accessibility. [2 marks]


Intranet Extranet

User or accessibility

h) IPv6 is the latest version of the Internet Protocol, which identifies devices across the internet so they can be
located. Every device that uses the internet is identified through its own IP address in order for internet
communication to work. Differentiate between IPv4 and IPv6 in term of number bits used for an IP address.
[2 marks]
IPv4 IPv6

i) Identify two (2) top-level domains (TLD) used in the domain name and state what is represented by each of them.
[2 marks]
Generic TLD Intended Purpose
(i) biz

(ii) net

3.
a) Good behavior and interaction between human and computer must be practice online and also offline. In computing
environment, it is known as computer ethics.
Give definition to computer ethics. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
b) Explain Information Accuracy. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________

14
4.
a) Complete the System Development Life Cycle phase below. [2 marks]

(iv)
(i) Planning (ii) (iii) Design (v)
Implementation

SDLC Phase
(ii)
(v)

b) Based on phase of System Development Life Cycle below, suggest any one (1) major activities involved. [2 marks]
SDLC Phase Major activity
Planning
Design

Diagram 1
c) Define programming language. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
d) Programming languages are used by programmer to develop software or computerized system. State types of
programming languages based on Diagram 1. [1 mark]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
e) State translator use for C++. [1 mark]
__________________________________________________________________________________________________
SECTION B [58 marks]
1.
a) Hazim as a cashier at Mek D must being able to solve problems very quickly and having to lead a large group of
your crew at once, in order to complete the tasks at hand. Identify two (2) activities for each operation in the
Information Processing Cycle involved during order process till the payment paid by the customer. [4 marks]
i.
Process
ii.

i.
Output
ii.

b) Chinese characters are usually represented in Big5 Code, Guo Biao (GB) and Unicode. Describe two (2)
characteristics for Unicode coding systems. [2 marks]
Characteristic Unicode
Number of bits
Number of characters

c) Determine whether the given hexadecimal number 10B16 is odd or even number. [2 marks]

15
d) Find the missing number in the sequence given below.2216, 2816, _____, 3416 [3 marks]

e) Logic gates are devices that are used in electronic circuits, in which the inputs and outputs represent the
statements of Boolean algebra.
(i) Derive Boolean expression based on the following statement.
• You have a buzzer in your car that sounds when your keys are in the ignition and the door is open. [2 marks]

(ii) Derive Boolean expression and construct truth table based on scenario below.
To stay fit and healthy, experts always give the following tips:
 Exercise regularly
 Have enough sleep
 Do not eat fast food [6 marks]

(iii) Derive Boolean expression, construct truth table and draw logic circuit based on scenario below.
Aini is going to watch a movie only if her sister is around but she needs to finish her homework first. [7
marks]

Boolean Expression: _____________________


Truth table:

16
Logic Circuit:

(iv) I can be proud of myself if I study hard and does not do badly in sport.
Derive Boolean expression based on the above statement. [2 marks]

2. a) XYZ company is a small company that consists of five computers and one printer. Suggest to XYZ company which
network architecture they can choose to connect and share resources among them and justify your answer. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
b) Draw the network based on your answer above. [2 marks]

c) Give one (1) service provided by a server to their client. [1 mark]


__________________________________________________________________________________________________
d) Give one (1) difference between peer-to-peer and client-server network architecture. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
e) The most obvious difference between local area network (LAN) and wide area network (WAN) is the area
coverage. Explain that statement. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________
f) Give one (1) different between Local Area Network (LAN) and Wide Area Network (WAN) in term of network
ownership. [2 marks]
LAN WAN

Network Ownership

17
g) Identify the classification of network based on the following descriptions: [2 marks]
Description Classification of network

The ATMs of Lloyds Bank all over UK are connected via a


common network to allow communication.
The employers of Berjaya Bhd. share their data in an office.

3.
a) Sophia types in “GOOD MORNING EVERYBODY, HOW ARE YOU TODAY????”
State whether the behaviour is acceptable or not acceptable and justify your answer. [2 marks]
__________________________________________________________________________________________________
__________________________________________________________________________________________________

b) Identify and state the area of computer ethics based on the following scenario. [2 marks]

Scenario Area of Computer Ethics


Plagiarism – A student copy and paste information from various
online document to create his/her research without crediting the
original author or resources.
A school send all old computer and communication device to the
scrap shop.

4.
a) Determine the System Development Life Cycle (SDLC) phase based on the following activities in developing a
website. [6 marks]
Activity SDLC Phase

Form website development team.


Train the users to use the new website.
Interview the clients regarding details of the website.
Developing website’s storyboard.
Priorities website project request.
Make changes to the website when it is necessary.
b)
A programming paradigm is an approach to solve the programming problems.
(i) Explain (1) one differentiate between Procedural Programming and Object-Oriented Programming. [4 marks]
Procedural Programming Object-Oriented Programming

(ii) Give one (1) Programming Language example for Procedural Programming. [1 mark]
___________________________________________________________________________________________
(iii) State one (1) approach to solve the programming problems can be used by programmer other than Procedural
Programming and Object-Oriented Programming. [1 mark]
___________________________________________________________________________________________
(iv) Give one (1) example Programming Language for Procedural Programming. [1 mark]
___________________________________________________________________________________________

18
SET 3

SECTION A [55 marks]

This section consists of 4 questions. Answer all questions.

1.
a. Information processing cycle refers to the sequence of events in processing information.
It consists of four (4) operations. Describe one (1) of the operation. [2 marks]

b. Bit and Byte are two (2) data representation in a computer. Explain bit. [2 marks]

c. State a reason why we need to use hexadecimal number. [1 mark]

d. Convert 1010110012 to hexadecimal number. [3 marks]

Answer :

e. Fill in the table below about coding scheme Unicode in terms of number of bits used to
represent a character and the number of characters that can be represented. [2 marks]
Number of bits used to represent a
character

Number of characters that can be


represented

19
f. Draw the symbol for each of the logic gate below. Each logic gate contain two (2) inputs.
[3 marks]
Logic gate Symbol

NAND

XOR

XNOR

2.
a. Explain the concept of data sharing in this network architecture shown in Figure 1.
[2 marks]

Figure 1

20
b. Figure 2 shows a network for small business.

Figure 2

c. Identify one (1) communication device and one (1) transmission media from Figure 2.
[2 marks]

d. Describe one (1) of the communication device and one (1) transmission media mentioned
in 2(c). [2 marks]

e. State one (1) advantage of network to KMPk. [1 marks]

21
f. Explain about client/server in a network architecture. [2marks]

g. Explain about Local Area Network in a network architecture. [2 marks]

h. Define the Internet. [2 marks]

i. State the benefit of the Internet for students. [2 marks]

j. Describe the following types of Broadband Internet connection [4 marks]


Broadband Internet connection Description

Digital Subscriber Line (DSL)

Fiber to the premises (FTTP)

22
k. An Internet Protocol address is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. There are two (2)
standards for IP addresses:
Give one (1) example for each standard of IP address. [2 marks]

l. Describe the purpose of IP address and its relationship to domain name. [2 marks]

3.
a. Users of social networking website include children and teenagers. Therefore it is
important for them to be aware of netiquette rules.
i. Define the term netiquette. [2 marks]

ii. List two (2) rules of netiquette. [2 marks]


i.

ii.

b. Suggest two (2) effective ways in creating awareness to users about netiquette. [2 marks]
i.

ii.

c. Knowledge and practice of ethics is a way of protecting the rights to an invention


and information. Give one (1) reasons why a product must have an IP. [2 marks]

23
4.
a.
i. Explain what is System Development Life Cycle. [2 marks]

ii. What is the purpose of last phase in System Development Life Cycle? [2 marks]

b. Programming language is a set of words, abbreviations, and symbols that enables a


software developer to communicate instructions to a computer or mobile device.
i. List two (2) types of programming language. [2 marks]

ii. Give one (1) characteristic of one of the programming languages you have mentioned
in 4(b)(i). [1 mark]

c. Programming paradigm refers to the way in which computer language looks at the
problem to be solved. There are 3 types of programming paradigm; Procedural, Object
Oriented and Logic.
Explain object oriented paradigm. [2 marks]

d. Describe about compiler. [2 marks]

SECTION B [55 marks]

24
This section consists of 4 questions. Answer all questions.

1.
a. Rishi needs pocket money and calls her father to bank in RM300 into his saving account.
After her father had agreed and done the transaction, he went to the Bank Kmpk Berhad to
withdraw money from the ATM machine. He received 6 pieces of RM50 notes. Identify
two(2) activities involved for Input and Output operations in the information processing
cycle during the withdrawal process. [4 marks]
Input i.

ii.

Output i.

ii.

b. Convert the following numbers to the stated number system. Show your calculation.
i. A1D16 to decimal. [2 marks]

25
ii. 7410610 to hexadecimal. [2 marks]

c. The hexadecimal (base 16) number system provides us with a shorthand method of
working with binary numbers.
i. 10111002 to hexadecimal [2 marks]

ii. 2AB16 to binary. [2 marks]

26
d. Coding Scheme is the combination of the 0's and 1’s that represent characters.
i. Identify the number of bits used by EBCDIC coding scheme to represent the
sentence below :
I LOVE MALAYSIA
[2 marks]

ii. Give one (1) difference between ASCII and Unicode coding schemes. [2 marks]

ASCII Unicode

27
e.

A basic requirement to register SC301: Computer Science course is: A student


must pass (SP101: Basic Programming) and (SD102: Basic Database) courses.
However, this requirement does not apply for those who have passed (SJ401:
Java course)

i. Derive the truth table from the above scenario. [4 marks]

ii. Derive the Boolean Expression from the above scenario. [1 marks]

28
f. Given a Boolean Expression of Y = A+ B + (B’ + C’). Answer the following questions.
i. Draw the logic circuit based on the Boolean Expression. [5 marks]

ii. Complete the truth table. [4 marks]

A B C B’ C’ A+B (B’+C’) A+ B + (B’ + C’)

0 0 0

0 0 1

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1

29
2.
a. Draw a client/server network architecture that consists of three (3) computers and one
(1) printer. [6 marks]

b. Based on the given scenario, identify and state the classification of network and its area
of coverage. [4 marks]
Scenario Classification of network Area of coverage

i. A cafe creates a public wifi


network that allow customers to
connect to the Internet

ii. Business and government


entities effectively work using
this network that allow them to
quickly exchange the data
between the employees,
suppliers, clients in different
geographical locations.

3.
a. Identify the suitable area of computer ethics that has been neglected based on the given
scenarios. [2 marks]
Scenario Area of computer ethics

i. Madam Jannah as the Head Department of IT in


Tulus Suci Sdn. Bhd. make a decision to replace old
CRT monitors which consume high power
consumption to LCD monitors. This is to reduce the
use of electricity and minimize carbon footprint.

ii. Dato Nasriq Ikmal is the CEO in Tulus Suci Sdn


Bhd. He has gazetted that the company has restrict
their staff from misuse the company computer for
things that do not relate to their work scope.

30
b. Identify and state whether the given scenario is ethical or non-ethical behavior while
using the social media. [2 marks]
Scenario Ethical / Non-ethical

i. Nyelea just finished watching Fast & Furious Presents:


Hobbs & Shaw at the GSC Aman Central. On her way back
home, she has updated about the whole movie on her twitter.

ii. Ariyan wants to send a whatsapp message to her Physics


lecturer regarding her Physics assignment. She used all
capital letters in her message.

4.
a. Fill in the table below with the most suitable phase and major activity in system
development life cycle (SDLC). [5 marks]
Activities Phase

1 Provide ongoing assistance for an information system and


its users after the system is implemented.

2 En Adam review and prioritize the project request from


the management.

3 System analysts use a variety of research techniques to


identify all the hardware and software requirements of the
new or modified system.

4 User must be trained properly on the system’s


functionality.

5 Sketching the idea using storyboard to view flow of


system.

b. Programming languages are used by programmers to develop software or computerized


systems.
Identify the types of programming language to write the codes in program 1 and
program 2:
[2 marks]

31
c. High level languages can be compiled or interpreted. Identify the translator based on the
given statement below. [1 mark]

A program that translates a high level language into machine language and executed it
line by line.
.

d. Machine language does not need a translator. Give reasons to support this statement.
[1 mark]

e. Give one (1) difference between Procedural Paradigm and Logic Paradigm. [2 marks]

-END OF QUESTION PAPER-

32
SET 4

SECTION A [59 marks]


BAHAGIAN A [59 markah]

This section consists of 4 questions. Answer all questions.


Bahagian ini mengandungi 4 soalan. Jawab semua soalan.

1. (a) Identify the operation involved in an information processing cycle based on


the given statement.
[4 marks]

Statement Operation
(i) Thumb drives are popular for this
operation.
(ii) The speed of RAM will determine
how fast this operation.
(iii) Nowadays, many people use a
touch screen to perform this
operation.
(iv) Two choices of this operation either
soft copy or hard copy.

(b) Describe the importance of using binary system in a computer.


[2 marks]
______________________________________________________________
______________________________________________________________
(c) Describe two (2) features of the following coding systems.
[4 marks]

EBCDIC Unicode
(i). (i).

(ii). (ii).

(d) Draw the logic symbols based on the descriptions given below.
[4 marks]

Description Logic Symbol


The output is "true" if either, but not both, of the inputs, are
"true." The output is "false" if both inputs are "false" or if
both inputs are "true."

The output is "false" if both inputs are "true." Otherwise, the


output is "true."

Its output is "true" if both inputs are "false." Otherwise, the


output is "false."

33
Description Logic Symbol

Its output is "true" if the inputs are the same, and"false" if


the inputs are different.

2 (a) Define network.


[2 marks]
______________________________________________________________
______________________________________________________________
(b) Describe the importance of communication device in a network.
[2 marks]
______________________________________________________________
______________________________________________________________
(c) Identify the network architecture shown in FIGURE 1 and give one (1)
characteristic of the network.
[2 marks]

FIGURE 1
______________________________________________________________
______________________________________________________________
(d) Describe the classification of network shown in FIGURE 2.
[2 marks]

BANK SUKASUKI
KUALA LUMPUR

KANGAR

IPOH

KOTA
BHARU KUANTAN
FIGURE 2

______________________________________________________________
______________________________________________________________

34
(e) As the boom of Internet and technology changes us as a society, it also makes
learning more efficient and less costly for student.

(i) State two (2) benefits of Internet that impacted to you as a student.
[2 marks]
________________________________________________________
________________________________________________________
(ii) Give two (2) disadvantages of Internet that impacted to you as a
student.
[2 marks]
________________________________________________________
________________________________________________________
(f) Identify the network that uses internet technologies based on the given
statements.
[2 marks]

The network that uses internet


Statements
technologies
This network includes electronic publishing of
organizational materials such as telephone
directories, event calendars, procedure manuals
and job postings.
This network allows customers to access their
network such as schedule pickups and track
shipped packages.

(g) Broadband Internet service truly is the most used form of Internet access
because of its high access speeds.

(i) State one (1) factor that will decrease the speed of a broadband
Internet connection.
[1 mark]
________________________________________________________
(ii) Describe one (1) type of broadband connection that is installed at a
permanent location such as home or an office.
[2 marks]
________________________________________________________
______________________________________________________
(iii) Name one (1) broadband connection that is utilized in remote zones
of Sabah and Sarawak.
[1 mark]
________________________________________________________
(h) An Internet Protocol address (IP address) is a numerical label assigned to each
device connected to a computer network that uses the Internet Protocol for
communication.

(i) Give two (2) examples of IP address in the same network.


[2 marks]
________________________________________________________
________________________________________________________

35
(ii) Given the following IP address

255.130.277.1

Determine whether the above address is valid. Explain your reason.


[3 marks]
________________________________________________________
________________________________________________________
(iii) State one (1) similarity between IP address and domain name.
[1 mark]
________________________________________________________
________________________________________________________
3 Computer ethics is a concept in ethics that addresses the ethical issues and
constraints that arise from the use of computers, and how they can be mitigated or
prevented.

(a) Identify the area of computer ethics based on the given scenario.
[4 marks]

Scenario Area of Computer Ethics


Clearing your history files when you are
finished browsing
Sending email chain for purposes other than
official business
Creating more recyclable products
Examining the information

(b) Netiquette should be used during email, social networking sites, and even
instant messaging or chat rooms.

(i) Your cousin asked for your fabulous zucchini cake recipe at the last
family function. While you're sending it to him, you decide to e-mail it
to all 500 people in your address book as well. Identify the netiquette
sin that have been committed based on the given scenario.
[1 mark]
________________________________________________________
(ii) What is wrong with the following text message that John is sending to
his mother? :

Running L8 2nite BTS B4N


[1 mark]
_______________________________________________________

(iii) Why should Calvin revise the following message? :

I WILL BE HOME AFTER THE GAME


[2 marks]
________________________________________________________
________________________________________________________

36
(iv) Why is it important to use the rules of netiquette in digital
communications?
[2 marks]
________________________________________________________
________________________________________________________

4. (a) The design phase consists of two major activities which are acquired hardware
and software (if necessary) and develop all of the details of the new or modified
information system.
State four (4) activities involved in acquire hardware and software (if
necessary)
[4 marks]

Activity 1

Activity 2

Activity 3

Activity 4

(b) A programming language is used in computer programming to implement the


algorithm. It consists of instruction that produces various kind of output.

(i) Define High-Level Programming Language.


[2 marks]
________________________________________________________
________________________________________________________
(ii) Name two (2) Low Level Programming Language.
[2 marks]
________________________________________________________
________________________________________________________
(iii) Identify X shown in FIGURE 3.
[1 mark]

X
FIGURE 3

_______________________________________________________

(iv) State the function of X.


[ 2 marks]
________________________________________________________
________________________________________________________

37
SECTION A [58 marks]
BAHAGIAN A [58 markah]

This section consists of 4 questions. Answer all questions.


Bahagian ini mengandungi 4 soalan. Jawab semua soalan.

1 (a) Ahmad would like to browse and find information on courses offered by
Malaysian Universities on the Internet.

Describe one (1) activity involved for input and output operations in the
information processing cycle during the browsing process.
[4 marks]

Input

Output

(b) The numbering system and representation used by a computer is binary and
hexadecimal numbering systems.

(i) Show the conversion of 20010 to binary number.


[3 marks]

(ii) Show the conversion of 10110102 to decimal number.


[3 marks]

38
(iii) Convert C3F16 to binary number. Show your calculation.
[4 marks]

(c) Give two (2) advantages of using Unicode.


[2 marks]
______________________________________________________________
____________________________________________________________
(d) A local systems designer has developed a system to control street lights. The
street lights can be turned on manually, or by the use of a timer, so long as a
light sensing unit indicates that it is dark.

(i) Below is an incomplete logic circuit for the control system. Redraw the
logic circuit using the correct logic gates. Note the output of the
dark/light sensor is ‘1’ (true, high, on) when it is light. The lights must be
turned during the dark of night.
[3 marks]

39
Redraw:

(ii) Write Boolean Expression for the logic circuit that controls the street
lighting system.
[3 marks]

_______________________________________________________

(iii) Write a truth table for the logic circuit that controls the street lighting
system.
[4 marks]

(iv) It is night time, the manual switch is off and the timer is ‘on’. Will the
street lights be on or off ?
[1 mark]
________________________________________________________

40
(e) The system, after some time, is adapted in Taiping district. Because of the
frequent rainy season, the system has to be changed accordingly. In the new
system, the light will turn on automatically when it gets dark or raining. The on
and off switch has been removed completely as well as the timer. So, now the
new system only depends on the rain sensor and darkness sensor.

(i) Write a Boolean Expression to visualize the new system.


[2 marks]
________________________________________________________
(ii) Draw a logic circuit for the new system.
[2 marks]

2 (a) Differentiate between a peer-to-peer network and client-server network.


[2 marks]

Peer-Peer Network Client-Server Network

(b) Identify the type of network architecture for the following statement.
[4 marks]

Statement Type of network architecture

(i) In-home or in a small office, computers


can be simply connected and share data
and resources equally with each other.

41
Statement Type of network architecture
(ii) By using torrent, all the computers are
connected on the internet. One computer
can upload any file in the network and
other computers start downloading the
files. Also, every computer can upload
parts of the file if that computer has
already downloaded some chunks of the
file.

(iii) Offers centralized control and is designed


for secure operations.

(iv) All files are stored in a central location and


all connected user can access all these
shared data.

(c) The network is usually be classified into two categories. Name and describe
the classification of the network based on the given criteria.
[4 marks]

Criteria Apple Factory Maxis Network


Name of
classification

Description

3 (a) Knowledge and practice of ethics is a way of protecting the right to an


invention and information.

State one (1) example of an issue appropriate for the following IP types.
[2 marks]

Copyright Trademarks

(b) Describe the meaning of “Use appropriate language” based on netiquette


rules.
[2 marks]
______________________________________________________________
______________________________________________________________

42
(c) Midah has joined a new software company in Kuala Lumpur and has been
assigned the task of developing an internal communications system. She
begins the task by assessing how the system will help in efficiently coordinating
the projects that the company handles and in determining the feasibility of the
system.

(i) Based on the above scenario, determine which step of System


Development Life Cycle (SDLC) is Midah likely in.
[1 mark]
________________________________________________________
(ii) Suggest to Midah, one (1) activity involved to determine the feasibility
of the system.
[2 marks]
________________________________________________________
________________________________________________________
(d) Determine the SDLC step based on the following activities.
[3 marks]

Activity SDLC Step


(i) To address the usability needs of website
visitors, Jasmine ensures that visitors would be
able to easily locate what they need on the
website. She avoids flashy graphics and chooses
a font with high readability.
(ii) The system is periodically evaluated and updated
as needed.
(iii) Breaking the system modules into smaller
programs and allocating these programs to the
members of the system development team.

4. (a) FIGURE 4 shows the process of two types of translators.

Translator X
Translator Y

FIGURE 4

Give one (1) example of programming language for each translator X and
translator Y.
[2 marks]
______________________________________________________________
______________________________________________________________

43
(b) Name one (1) other translator mentioned in 4(a).
[1 mark]
_____________________________________________________________

(c) FIGURE 5 (i) and FIGURE 5(ii), shows types of programming paradigm.

FIGURE 5 (i)

FIGURE 5 (ii)

(i) Identify the type of programming paradigm in FIGURE 5(i) and


FIGURE 5(ii).
[2 marks]
FIGURE 5(i): _____________________________________________
FIGURE 5(ii): ____________________________________________

(ii) State the difference of paradigm between FIGURE 5(i) and FIGURE
5(ii).
[2 marks]

FIGURE 4(i) FIGURE 4(ii)

END OF QUESTION PAPER

44
SET 5
SC015 CONFIDENTIAL

SECTION A [55 marks]

This section consists of 4 questions. Answer all questions.

1 Info graphic given below shows the credit card payment process. There are four (4)
operations involved during this process.

(a) Identify the operation of information processing cycle based on steps given.
[2 marks]

Step Operation
4
7

45
SC015 CONFIDENTIAL

(b) Number system is a way of representing numbers. When we type some


letters or words, the computer translates them in numbers as computers can
understand only numbers. Three commonly used number systems are binary,
decimal and hexadecimal.

(i) Give one (1) benefit of using hexadecimal digits to represent data in
computers.
[1 mark]
________________________________________________________
________________________________________________________

(ii) Convert the decimal number 351 to binary number.


[3 marks]

(c) The information coding scheme is a standard which tells the user's machine
which character represents which set of bytes.

(i) What is the benefit of using Unicode over ASCII to the user?
[2 marks]
________________________________________________________
________________________________________________________

(ii) How many bits would it take to represent the following phrase using
the ASCII code?
#sweet_dreams
[2 marks]
________________________________________________________
________________________________________________________
________________________________________________________

46
SC015 CONFIDENTIAL

(d) Name the logic gate based on the descriptions given below.
[3 marks]

Description Logic Gate Name


(i) The output of this gate is true if both inputs
are the same (both true and both false).

(ii) The output of this gate is true if either input is


true (or both of them are true).

(iii) The output of this gate is true when the input


is false and vice versa.

2 A communication device is a hardware device capable of transmitting an analog or


digital signal over the telephone, other communication wire, or wirelessly

(a) Identify the most suitable communication device from the given statement.
[3 marks]

Statement Communication Device

A device that connects the network to


the Internet Service Provider

A device that holds IP address and send


data to the devices according to its IP
Address

A device that connects wired network to


wireless network

(b) Define peer-to-peer architecture.


[2 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

47
SC015 CONFIDENTIAL

(c) Give one (1) example of Local Area Network (LAN) and Wide Area Network
(WAN).
[2 marks]

LAN WAN

(d) Billions of home and business users around the world access a variety of
services on the Internet using computers and mobile devices.

(i) Define Internet.


[2 marks]
________________________________________________________
________________________________________________________
________________________________________________________

(ii) Explain how Internet usage decreases productivity of employees in an


organization.
[2 marks]
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________

(iii) Describe briefly the level of access of Intranet and Extranet.


[2 marks]

Intranet Extranet

48
SC015 CONFIDENTIAL

(e) Today’s network connects terminals, devices and computers from many
different manufacturers across many types of networks.
State the type of broadband Internet connection for the scenarios given:
[3 marks]

Type of Broadband
Scenario
Internet Connection
A type of Internet connection that transmits
digital signals on existing standard phone
lines.
A type of internet connection that involves
sending signal from an earth-based
reflective dish to another earth-based
station.
Ahmad connect his laptop to the phone and
utilize the data plan on his phone to access
the Internet

(f) IP address much like the postal service to send data to a computer or device
at a specific destination.

(i) Identify whether the following IPv4 address is valid or invalid based on
the IP below.

10.257.0.104
[1 mark]
________________________________________________________

(ii) Give one (1) reason for your answer.


[1 mark]
________________________________________________________
________________________________________________________

(iii) Explain the relationship between an IP address and domain name.


[2 marks]
________________________________________________________
________________________________________________________
________________________________________________________
________________________________________________________

49
SC015 CONFIDENTIAL

(iv) Specify the Top Level Domain (TLD) for the associated organization.
[2 marks]

Organization Top Level Domain

Military Organizations
Network providers or
commercial companies

3 (a) Define computer ethics.


[2 marks]
______________________________________________________________
______________________________________________________________

(b) State two (2) ways how matriculation students can apply green computing in
their daily life.
[2 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

(c) Instant messaging, email and discussion boards are an example of internet
services available on Internet that require ethics to ensure it is able to
function well.
Give your opinion why netiquette is very important for Internet user.
[2 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________

(d) State the most suitable Intellectual Property rights to protect the following
items.
[3 marks]

The contour of Coca Cola bottle


i)

ii) Mickey Mouse cartoon series

The tagline “Just Do It” by Nike


iii)
Company

50
SC015 CONFIDENTIAL

4 (a) There are five (5) phases of System Development Life Cycle. State the
appropriate phase in the blank space given.
[4 marks]

(i) Phase III ________________________________________________


(ii) Phase V ________________________________________________
(iii) Phase II ________________________________________________
(iv) Phase I ________________________________________________

(b) A program is a series of instructions that directs a computer to perform


tasks that created by a programmer using a programming language.

(i) Define programming language.


[2 marks]
________________________________________________________
________________________________________________________

(ii) State the example of programming language based on the following


codes:
[ 3 marks]

Example of Programming
Code
Language
Load z, r0
Load x, r1
Load y, r2
Add r1, r2, r3
Sub r0, r2, r0
Store r0, b

Scanner sc=new Scanner(System.in);


System.out.print (“Enter a number “);

int x= sc.nextInt ( );

1000 1110 1101 10101


10101 1101 11111 1111

(iii) Describe the function of interpreter [2 marks]

________________________________________________________

________________________________________________________

51
SC015 CONFIDENTIAL

SECTION B [55 marks]

This section consists of 4 questions. Answer all questions.

1 (a) Alif Aziz loves to do online shopping because he can compare and choose
the product with the lowest price. There are many online shopping apps
today. The infographic below shows the transaction happened during online
shopping.
Based on given info graphic, discuss the operations of information processing
cycle involved.

[4 marks]

Operation Explanation

Input

Storage

52
SC015 CONFIDENTIAL

(b) (i) Show the conversion of the binary number 1111102 to hexadecimal
number with the steps clearly.
[3 marks]

(ii) Following is an example of a valid IPv6 address that uses


hexadecimal numbers:

0210 : A05 : 0000 : 0000 : 0000 : 0000 : 3257 : 9652

Show the steps to convert the underlined numbers to a form that


computer can process.
[3 marks]

53
SC015 CONFIDENTIAL

(c) Ghani has subscribed SkyTone Plan with 8192 MB data which provides
only Internet plan with unlimited talk and messages to any number, every day.
He has used 75% of his quota in day 20.

(i) Calculate his balance data in decimal number.


[2 marks]

(ii) Show the conversion of the answer in 1 (c)(i) to hexadecimal.


[3 marks]

54
SC015 CONFIDENTIAL

(d) The combinations of 0s and 1s that represent characters are defined by


patterns called a coding scheme.

(i) Ben Amir is using Windows 10 for his operating system in his
computer. Identify the most appropriate coding scheme.
[1 mark]
________________________________________________________

(ii) Gayas Bank is using mainframe to keep their customers’ account


data. Identify the most appropriate coding scheme to be used by
Gayas Bank.
[1 mark]
________________________________________________________

(e) “A sprinkler (S) is ON if


either temperature alarm (T) is ON and cooler alarm (C) is ON
or vent alarm (V) is OFF and cooler alarm (C) is ON”

(i) Derive the truth table from the above scenario.


[4 marks]

(ii) Derive the Boolean expression based on the above scenario.


[2 marks]
________________________________________________________
________________________________________________________

55
SC015 CONFIDENTIAL

(f) (i) Draw the logic circuit represented by the logic statement.

X = 1 if ( B is NOT 1 AND S is NOT 1) OR ( P is NOT 1 AND S is 1)

[5 marks]

(ii) A system logic gates is shown below.

A
D
B
E

Determine the Boolean expression for each outputs D, E and Q in


terms of the inputs A, B and C.
[3 marks]

Label Boolean Expression


D

56
SC015 CONFIDENTIAL

2 (a) State two (2) differences between Peer-to-Peer and Client Server
architecture.
[4 marks]

Peer-to-Peer Client Server

(b) Razak wants to set –up his office network. He needs to install all of the
following devices and peripherals. Draw a peer-to-peer architecture layout if
Razak needs to setup 2 computers, 2 laptops, 1 printer and 1 scanner.
[4 marks]

(c) Explain the benefit of using Enterprise Private Network (EPN).


[2 marks]
______________________________________________________________
______________________________________________________________

57
SC015 CONFIDENTIAL

3 (a) Identify areas of computer ethics based on the following situation.


[2 marks]

Situations Areas of computer ethics


Kumar receive an email message from
someone requesting to verify his online
banking account and financial information.
Employees of KMM may use computers in
the premises only for purposes in which they
have been authorized.

(c) Identify two (2) rules of netiquette that online user should follow when using
Instagram.
[2 marks]
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

4 (a) (i) Determine the System Development Life Cycle (SDLC) phase based on the
conversation given.
[3 marks]

Situation Phase SDLC


“We are conducting interviews with the
actual user in identifying problems with the
current system”
“Many activities involved. For instance, we
are developing the program and test it
before delivering to the users”.
“We are evaluating the software send by the
vendors before purchasing”.

(ii) Explain one (1) advantage of parallel conversion compared to direct


conversion. [2 marks]

______________________________________________________________

______________________________________________________________

______________________________________________________________

58
SC015 CONFIDENTIAL

(b) (i) Explain one (1) difference between Procedural Programming and Object
Oriented Programming.
[2 marks]

Procedural Programming Object Oriented Programming

(b) (ii) The figure below shows the program segment of three different languages that
have been used to calculate the sum of two numbers.

LDA 104 0010 0001 0000 0100 cin>>a;


ADD 105 0001 0001 0000 0101 cin>>b;
STA106 0011 0001 0000 0110 sum=a+b;
Program A Program B Program C

Identify the type of translator that translates the following program. State ‘NONE’ if a
translator is not relevant.
[ 3 marks]

Program Type of Translator

Program A to Program B.

Program C to Program A.

Program C to Program B.

END OF QUESTION PAPER

59
EXTRA BONUS (1)

EXAMPLE FOR OBJECTIVE QUESTIONS

INSTRUCTIONS TO CANDIDATE:

This question paper consists of 2 Sections: SECTION A and SECTION B


with 22 questions.

Answer all questions.

The use of electronic calculator is permitted.


SECTION A [4 marks]

Each question has four answer options. For each question, choose the best answer.

1. Select the correct area of computer ethics based on the scenario.


“The student downloaded and used the Windows illegally”
A Information accuracy

B Green Computing

C Software Piracy

D Information privacy

2 Identify the netiquette rules which has been violated based on the following
statement.

“LET’S MEET TODAY”


A Do not use all the capital letter

B Be polite

C Be forgiving of others mistake

D Avoid posting flames

3 State the appropriate phase in System Development Life Cycle (SDLC) for the
activity below.

“Convert the old system to the new system all at once”

A Planning

B Analysis

C Design

D Implementation
4 Select the correct translator based on the activity.

“Convert the entire source program into machine language before executing it”

A Assembler

B Compiler

C Interpreter

D Translator
SECTION B [36 marks]

Each question has four answer options. For each question, choose the best answer.

1 After you press SEND icon in WhatsApp, “the application communicates with
the servers to send the message and displays it in the current conversation.”

What the operations are involves in the process above?

A Input and output

B Process and storage

C Process and output

D Output and storage

2 Complete the following number sequence and give your answer in hexadecimal
and binary number systems.

1012, _______16, 101002, ________2, 3716, 5016

A A16 and 100011

B B16 and 100011

C C16 and 10100

D D16 and 10100

3 Convert ACE16 to binary number system.

A 100110112

B 11010012

C 111110102

D 1010110011102
4 Complete the following number sequence.

1E16, 2016, ________, 2716, _________, 3216

A 2116 and 1C16

B 2216 and 1D16

C 2316 and 2C16

D 2416 and 1E16

5 How many bytes represented in the following phrase, according to ASCII coding
scheme?

A 18

B 17

C 16

D 19
6 What is the value of Y1 and Y2 if A = on, B = off, C= on, D = on.

A Y1= On Y2 = Off

B Y1= On Y2 = On

C Y1= Off Y2 = Off

D Y1= Off Y2 = On

7 What is the output Y of this logic circuit if A = 1, B = 1, and C = 1

A 0

B 1

C 01

D 10
8 “The alarm (Y) will ring if either the door (A) or the window (B) are opened and
the alarm switch (C) must be ON state.”

Based on the statement, choose the correct boolean expression in order to make
the alarm rings.

A Y= A.B +C

B Y= A+B+C

C Y= A+B.C

D Y= ( A+B ) . C

9 A corridor lamp (L) will light up based on the condition of switch A and switch B.
It will only light up (ON) if the 2 switches are in different states. But if the
switches are in the same state either both are ON or OFF, the corridor lamp will
not light up (OFF). Choose the suitable logic circuit that can represent this
scenario.

B
C

10 Rashdan with his five friends move to the new rent house. They are students in
one of the prestigious university at Kuala Lumpur. They are planning to connect a
simple network in house with low-cost budget and they can access every data
from their shared computer network. What is the disadvantage of their network
architecture planning?

A If one of the computers in their network is broken or have fault, all the
other computer can’t be online or share network for each other.

B Their network shares equal responsibility and capabilities that will make
sharing hardware such as printer, data or information difficult to setup.

C There will be a security problem because their network is vulnerable to


unauthorize access and used.

D Rashdan and his friends have to use same password on each computer in
their network.
11 Zalooraa Enterprise is the well-known online fashion and design shopping. There
are thousands or maybe millions online transaction per month and make their
online network congested. In their Information Technology (IT) Department, their
network administrator needs to maintain a few server such as file server, e-
commerce server, print server, web server, firewall server and exchange email
server. Choose the correct statement for this type of network architecture.

A There is one or more centralized control over shared resources

B All computers on the network are servers

C This type of network architecture can’t have more than one server.

D The online buyers can access to the printer network in this company
without any restrictions and security measures.

12 Which of these examples determine the area of coverage in Local Area Network?

I. Sekolah Menengah Tun Mamat, Tangkak

II. Perpustakaan Awam Jasin

III. Malaysia

IV Pejabat Pendaftaran Negara, Muar

A I, II, III

B I, II, IV

C II, III, IV

D I, II, III, IV

13 Which of the following statements shows a good code of ethics in schools?

A Sending an email during school time to friends.

B Using the school equipment for students` personal use.

C Using own hand phone to call a friend during lunch break.

D Doing an English assignment in the computer lab during Chemistry


period.
14 Siti called a customer service to report on computer failure. They have identified
the problem and found that the customer still has a warranty. Identify what are the
action should be taken by the customer service in order to establish to a good
rapport with the customer?

I. Allow the customer to speak without interruption.

II. Check the customer ID product for warranty.

III. Refer to customer by name whenever possible.

IV. Personalize the call by periodically asking question unrelated to the


computer.
A I ,II

B II , IV

C I, II , III

D I, III , IV

15 These are the personnel involved in Implementation Phase in System


Development Life Cycle (SDLC) except
A Web Developers

B System Analyst

C Programmers

D Deputy Director

16 En. Saiful has interview the clients regarding details of the website that he wants
to build. The most suitable System Development Life Cycle (SDLC) phase for
this activity is _______
A Analysis

B Planning

C Documentation

D Implementation
17 Which of the following are the TRUE descriptions of assembly language?

I. Codes are longer than machine language.

II. Instructions written in mnemonics and abbreviations.

III. Assembly language is not portable as it is tied to one specific computer


architecture.

IV Instructions are hard to learn compared to machine language.

A I and II

B II and III

C I and III

D II and IV

18 Table 1 shows the types of translator used in programming language.


Choose the CORRECT statement for both translators.

Compiler Interpreter

I. Execution time is fast Execution time is slow

II. Translate the source code line by Translate the entire source code
line at a time before execute it

III. Example: Qbasic Example: javac

IV. Display errors after compilation, all Display errors of each single
at the same time instruction

Table 1

A. I and II

B. II and III

C. III and IV

D. I and IV

END OF QUESTIONS
EXTRA BONUS (2)
PRE PSPM KMS SC015 2020/2021

Nama : ………………………………………... Praktikum : …………..

SECTION A [19 marks]

This section consists of 2 questions. Answer all questions.

Assalamualaikum and good day madam. This is Amirah from practicum 123. When is
the due date to submit the multimedia 60s video task?

it's written in the form (analysis phase), which is on 12 December 2020

alright madam, thank you! sorry for the inconvenience 😊


you’re most welcome 🙂
FIGURE 1

1 (a) Identify three (3) netiquette rules that had been followed by Amirah based on FIGURE 1

[3 marks]

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

(b) Explain the importance of Computer Ethics.

[ 1 mark]

_________________________________________________________________________

_________________________________________________________________________

_________________________________________________________________________

(c) State two (2) ways on how green computing can be applied in the education field.

[ 4 marks]
PRE PSPM KMS SC015 2020/2021

Term Explanation

Green
Computing

2 (a) There are five (5) phases in the System Development Life Cycle ( SDLC).
State the appropriate phase starting from A to D in the space given.

[4 marks]

A : ______________________________________________________________________

B : ______________________________________________________________________

C : ______________________________________________________________________

D :______________________________________________________________________

(b) State the example of programming language based on the following codes:

[3 marks]
PRE PSPM KMS SC015 2020/2021

Code Example of Programming


Language

LOAD BASEPAY
ADD OVERPAY
STORE GROSSPAY

10011000 10010110 10010100

public static void main (String[] args)


{
System.out.println(“Hello PSPM!”);
}

(c) Answer the following question based on FIGURE 3.

FIGURE 3

(i) Identify X shown in FIGURE 3

[1 mark]

_________________________________________________________________________

(ii) State the function of X

[2 marks]

_________________________________________________________________________

_________________________________________________________________________

(iii) Give one (1) example of X


PRE PSPM KMS SC015 2020/2021

[1 mark]

_________________________________________________________________________

SECTION B [51 marks]

This section consists of 4 questions. Answer all questions.

1 (a) Wafa as a cashier at MekDoNet restaurant, must be able to solve problems very quickly
and manage to handle customers at once, in order to complete the tasks at hand.

Identify one (1) activity for each operation in the Information Processing Cycle involved
during order process till the payment paid by the customer

[3 marks]

Operation Explanation

Input

Process

Output

(b) Convert the following numbers to the stated number system. Show your calculations.
PRE PSPM KMS SC015 2020/2021

[5 marks]

(i) ADAB16 to decimal

(ii) 757810 to hexadecimal

(c) Convert the following numbers to the stated number system. Show your calculations.

[5 marks]

(i) 1111012 to hexadecimal.


PRE PSPM KMS SC015 2020/2021

(ii) 11110116 to binary.

(d) The Korean Hangul syllabary occupies the Unicode range from AC00 (decimal 44032) to
D7A3 (decimal 55171).

Describe two (2) characteristics for Unicode coding systems.

[2 marks]

Characteristic Unicode

Number of byte

Number of characters

(e) In order for Ahmad to register Data Structure (C1), he must pass two prerequisite courses,
Fundamental Programming (C2) and Object Oriented Programming (C3). However he can
straight away register Data Structure (C1) if he passed Advanced Programming (C4).

(i) Derive the Boolean expression from the above scenario.

[2 marks]

_________________________________________________________________________
PRE PSPM KMS SC015 2020/2021

(ii) Derive the truth table from the above scenario.

[4 marks]

(f) Given a Boolean expression of Y = NOT(NOT A AND C OR B AND NOT C )


Answer the following questions.

(i) Draw the logic circuit based on the Boolean expression.

[5 marks]
PRE PSPM KMS SC015 2020/2021

(ii) Complete the truth table.

[2 marks]

A B C NOT NOT NOT A B AND NOT A AND C OR Y


A C AND C NOT C B AND NOT C

0 0 0 1 1 0 0 0 1

0 0 1 1 0 1 0 1 ____

0 1 0 1 1 0 1 1 0

0 1 1 1 0 ____ 0 1 0

1 0 0 0 1 0 0 _____ 1

1 0 1 0 0 0 0 0 1

1 1 0 0 1 0 ____ 1 0

1 1 1 0 0 0 0 0 1

2 (a) Draw a peer-to-peer network architecture that consists of four (4) workstations, one (1)
printer and one (1) scanner.

[6 marks]
PRE PSPM KMS SC015 2020/2021

(b) Based on the given scenario, identify and state the type of network and its advantage.

[3 marks]

Scenario Type of Network Advantage

A bank consists of many


branches located throughout
the country.

A university campus
consists of an academic
building, library,
administrative office and
student resident office.

3 (a) Show one (1) example of a situation in Facebook where the following online netiquette
rules are NOT complied

[2 marks]

Situation where Netiquette Rule is NOT


Netiquette Rule
complied

Respect others’ privacy


PRE PSPM KMS SC015 2020/2021

(b) Point out one (1) risk of inaccurate information associated with weather forecasting in the
aviation industry.

[2 marks]

_________________________________________________________________________

_________________________________________________________________________

(b) Matahari College decided to develop an information system that involves maintaining
databases and generates result of students in the college. The system also needs to produce
reports such as reports on performance of students for every semester, statistics of students
that were dismissed and etc. Currently all activities involving results of student, producing
reports and maintaining students’ data are done manually.

State the appropriate phase in System Development Life Cycle (SDLC) for the following
activities in developing the information system.

[5 marks]

Activity SDLC Phase

Developing the storyboard.

Train the users.

Eliminates errors in the running system.

Interview the client regarding details of the


system.

Form a project development team

4 (a) Identify the appropriate paradigms of programming languages for the following statements

[3 marks]

Statement Programming Language Paradigm


PRE PSPM KMS SC015 2020/2021

Break a big problem into several pieces


and work on each piece separately.

Create one thing that has its own data and


set of responsibilities.

Express facts and rules about problems


within a system of formal logic.

(b)
Based on the given items, classify the most appropriate type of language translator.

[2 marks]

Item Type of Language Translator

TASM

Visual BASIC

END OF QUESTIONS
EXTRA BONUS (3)

NAME : TUTORIAL:
LECTURER NAME :
MATRIC NUMBER IDENTITY CARD NUMBER
M S

SC015
Computer Science
Semester 1
2020/2021
1 ½ hours

PERAK MATRICULATION COLLEGE


MINISTRY OF EDUCATION MALAYSIA

TRIAL TEST

COMPUTER SCIENCE
1 ½ HOURS

DO NOT OPEN THIS BOOKLET UNTIL YOU ARE TOLD TO DO SO

Question Number Mark


1 /14
2 /13
3 /8
4 /12
5 /9
6 /14

Total Mark /70

1
Name : ……………………………….… Class :...................... Lecturer :......................................

Answer​ all​ questions.

1. (a) Azlan wants to transfer money to his brother by using CimbClicks website.
Identify ​one (1) activity for each operation in the Information Processing Cycle involved during
his transaction.
[3 ​marks​]

Operation Activity

Process

Output

Storage

(b) Show your working for below questions.


(i) Convert 7410​10​ to hexadecimal. [2 ​marks​]

(ii) Convert 2AD​16​ to binary. [2 ​marks​]

(iii) Find the missing value.


64​16​, ________​16​, 12C​16​, 190​16 [2
​ ​marks​]

2
(iv) Calculate the final result.
41 + FF​16​ x 101​2​ = ________​2
[3 ​marks]​

(c) Differentiate between ASCII and Unicode in terms of range of values that can be
represented by each coding scheme. [2 ​marks​]

ASCII Unicode

2. (a) Based on the Boolean Expression, ​Y = A​⊕​C’ + (B.A)’​ , answer the following question.

(i) Construct the truth table. [8 ​marks]​

3
(ii) Draw the logic circuit for ​2(a)(i)​. [5 ​marks]​

3 (a) (i) With millions of people working and learning from home during the pandemic Covid-19,
Mr. Kamara plans to set up his mini office network at home. ​He needs to install all of the
following devices and peripherals. Draw a peer-to-peer architecture layout if Mr.Kamara
needs to set up 2 workstations, 2 laptops and 1 wireless printer.
[4 ​marks​]

(ii) State ​one (1)​ benefit of using peer-to-peer architecture. [1 ​mark]​

_____________________________________________________________________

4
3 (b) RNB is an entrepreneur company. To compete with other competitors, the Chief Executive
Officer (CEO) has ensured that their office is equipped with a network connection that allows
sharing of resources and information within the company.

(i) Explain the classification of network used in RNB office. [1 ​mark]​


________________________________________________________________________
________________________________________________________________________

(ii) In next two (2) years, RNB Company is planning to expand their network into several offices
located in every state. Describe the suitable classification of network that can be used in their
future offices. [2 ​marks]​
_________________________________________________________________________
_________________________________________________________________________

4 (a) Netiquette is the code of acceptable behaviors where users should follow while online.
List ​three (3)​ rules of netiquette. [3​ marks]​
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

(b) Why is netiquette very important for Internet users? [2 ​marks]​


__________________________________________________________________________
__________________________________________________________________________

(c) Knowledge and practice of ethics is a way of protecting rights to an invention and information.
i. Give the definition of Intellectual Property (IP).
[2 ​marks]​
________________________________________________________________________
________________________________________________________________________

ii. State the suitable type of Intellectual Property based on the following statements:
[3 ​marks​]

Statement Intellectual Property

i. Dr. Rishi invention on fire prevention system.

ii. BNR Enterprise company name.

iii An E-Book titled “ I LOVE KMPk”

5
(d) Computer ethics are the moral guidelines that shape the use of information systems and
computers. Identify the appropriate area of computer ethics based on the following scenarios.
[2​ marks​]
Scenario Area of Computer Ethics

(i) Someone copies a well-known book to the web and


encourages others to read it.

(ii) Ahmad finds information solely on Wikipedia to


write a report.

5 (a) Explain ​one (1) ​importance of the System Development Life Cycle.
[2 ​marks]​
__________________________________________________________________________
__________________________________________________________________________

(b) List ​two (2)​ peoples involved in the System Development Life Cycle. [2 ​marks]​

__________________________________________________________________________
__________________________________________________________________________

(c) MySejahtera is an application developed by the Government of Malaysia to assist in monitoring


Covid-19 outbreak in the country by enabling users to assess their health risk against Covid-19.
Assume you have been appointed as the Project Manager for MySejahtera application.
Identify the most appropriate SDLC phase for each scenario given. ​[5 ​marks]​
Scenario SDLC phase

(i) MySejahtera application is monitored to ensure it


works properly. The system performance and
security are reviewed from time to time.

(ii) Project leaders will approve project requests


and classified according to the importance of the
system requested.

(iii) System Analyst and project members list the


requirements component of the computer for their
needs.

(iv) System Analysts will prepare a proposal to


recommend a solution for the system.

(v) Create user manuals and allow users to access


printed or online user manuals for reference.

6
6 (a) Give ​two (2)​ characteristics of low-level programming language. [2​ marks​]
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

(b) Explain the Object-oriented paradigm and give ​one (1) example of programming language
used in the Object-oriented paradigm.
[3​ marks​]
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

(c) What is the function of the translator?


[2 ​marks]​
__________________________________________________________________________
__________________________________________________________________________

(d) Figure 1 shows the program segments of three different program segment written using
different types of programming languages.

​ ​Programming Language A

​ Programming Language B

Programming Language C
Figure 1

7
(i) Identify the type of translator that translates the following program.
[2 ​marks​]

Programming Language Type of Translator

Programming Language A to Programming Language C

Programming Language B to Programming Language C

(ii) Give ​three (3)​ major advantages of writing a ​Programming A​ rather than programs in
​ Programming B​ and ​Programming C
[3 ​marks]​
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

(e) State ​one (1) ​difference between logic programming and procedural programming.
[2 ​marks]​

Logic Programming Procedural Programming

Prepared by : Checked by :
Nooraini Abu Bakar Amal Zunnairah Abu Bakar
Sarmila Marlini Mohd. Rufin
Indrani Gopal
Mazni Kohlit

END OF QUESTIONS

8
EXTRA BONUS (4)
SC015 CONFIDENTIAL
Computer Science
Semester I
Session 2020/2021
1 hour 30 minutes

Name :
Matric No :
Tutorial :

KOLEJ MATRIKULASI MELAKA


KEMENTERIAN PENDIDIKAN MALAYSIA

IQUA

COMPUTER SCIENCE 1
1 hours 30 minutes

DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE TOLD TO DO SO.

INSTRUCTIONS TO CANDIDATE:
This question paper consists of 6 questions.
Answer all questions in the space provided MARK SHEET
in this question paper.
The use of electronic calculator is permitted. For Examiner Use

Question No Marks

1
2
3
4
5
6

TOTAL

This question paper consists of 11 printed pages.


© Kolej Matrikulasi Melaka
SC015 CONFIDENTIAL

1 (a) Farhana loves to do online shopping because she can compare and choose
the product with the lowest price. There are many online shopping apps
today. The infographic below shows the transaction happened during online
shopping.
Based on given infographic, discuss the operations of information processing
cycle involved.

[3 marks]

Operation Explanation

Input

Process

Storage

2
SC015 CONFIDENTIAL

(b) (i) Show the conversion of the binary number 101101102 to hexadecimal
number with the steps clearly.
[3 marks]

(ii) Following is an example of a valid IPv6 address that uses


hexadecimal numbers:

0210 : B0C5 : F090 : 6A05 : 0000 : 0020 : 3257 : 9652

Show the steps to convert the underlined numbers to a form that


computer can process.
[3 marks]

3
SC015 CONFIDENTIAL

(c) Convert B2D816 to decimal

[3 marks]

2. (a) Calculate the total number of bits for the following words using Unicode
information coding scheme.
[2 marks]

Words Total Number of Bits

SNAPCHAT

4
SC015 CONFIDENTIAL

(b) “A sprinkler (S) is ON if


either temperature alarm (T) is ON and cooler alarm (C) is ON
or vent alarm (V) is OFF and cooler alarm (C) is ON”

(i) Derive the truth table from the above scenario.


[4 marks]

(ii) Derive the Boolean expression based on the above scenario.


[2 marks]

________________________________________________________

________________________________________________________

(c) (i) Draw the logic circuit represented by the logic statement.

X = 1 if ( B is NOT 1 AND S is NOT 1) OR ( P is NOT 1 AND S is 1)

[5 marks]

5
SC015 CONFIDENTIAL

(ii) A system logic gates is shown below.

A
D
B
E

Determine the Boolean expression for each outputs D, E and Q in


terms of the inputs A, B and C.
[3 marks]

Label Boolean Expression

6
SC015 CONFIDENTIAL

3 (a) State two (2) differences between Peer-to-Peer and Client Server
architecture.
[4 marks]

Peer-to-Peer Client Server

(b) Differentiate Local Area Network (LAN) and Wide Area Network (WAN)
based on area of coverage.
[2 marks]

LAN WAN

(c) Give one (1) example of Local Area Network (LAN).


[ 1 mark]
_____________________________________________________________

4 (a) Define computer ethics.


[2 marks]
______________________________________________________________

______________________________________________________________

7
SC015 CONFIDENTIAL

(b) Identify areas of computer ethics based on the following situation.


[3 marks]

Situations Areas of computer ethics


Shelly receive a WhatsApp message from
someone she doesn’t know requesting to
verify her online banking account and
financial information.
Employees of KMM may use computers in
the premises only for purposes in which they
have been authorized.

Tom could not find the way to the office on


his first day of work even though he followed
the directions from Google website.

(c) Give one (1) importance of netiquette.


[2 marks]
______________________________________________________________

______________________________________________________________

______________________________________________________________

(d) Identify two (2) rules of netiquette that online user should follow when
communicating in a discussion post in Facebook groups.
[2 marks]
______________________________________________________________

______________________________________________________________

______________________________________________________________

______________________________________________________________

______________________________________________________________

(e)
From: [email protected]
To: [email protected]
Subject: <none>
Oi,why I am X offred JOB.
YOU ARE SUPPOSED TO HELP ME !!!!
I HATE YOU!!!!!
8
SC015 CONFIDENTIAL

Identify three (3) netiquette rules that must be followed when writing a formal
e-mail to an organization. [3 marks]
______________________________________________________________

______________________________________________________________

______________________________________________________________

______________________________________________________________

______________________________________________________________

5 (a) Each System Development Life Cycle (SDLC) phase often appears
sequentially

i) Name Phase 3 and Phase 4 in System Development Life Cycle.


[2 marks]
________________________________________________________

________________________________________________________

ii) State one major activity in Phase 3.


[2 marks]
________________________________________________________

________________________________________________________

(b) Determine the System Development Life Cycle (SDLC) phase based on the
conversation given.
[3 marks]

Situation Phase SDLC


“We are conducting interviews with the
actual user in identifying problems with the
current system”

“Many activities involved. For instance, we


are developing the program and test it
before delivering to the users”.

“We are evaluating the software send by the


vendors before purchasing”.

9
SC015 CONFIDENTIAL

(c) Explain one (1) advantage of parallel conversion compared to direct conversion.
[2 marks]

______________________________________________________________

______________________________________________________________

______________________________________________________________

6 (a) A program is a series of instructions that directs a computer to perform tasks


that created by a programmer using a programming language.

(i) Define programming language.


[2 marks]
________________________________________________________

________________________________________________________

(ii) State the example of programming language based on the following


codes:
[ 3 marks]

Example of Programming
Code
Language
Load z, r0
Load x, r1
Load y, r2
Add r1, r2, r3
Sub r0, r2, r0
Store r0, b

Scanner sc=new Scanner(System.in);


System.out.print (“Enter a number “);

int x= sc.nextInt ( );

1000 1110 1101 10101


10101 1101 11111 1111

(iii) Describe the function of interpreter [2 marks]

________________________________________________________

________________________________________________________

10
SC015 CONFIDENTIAL

(b) Explain one (1) difference between Procedural Programming and Object
Oriented Programming.
[2 marks]

Procedural Programming Object Oriented Programming

(c) The figure below shows the program segment of three different languages that
have been used to calculate the sum of two numbers.

LDA 104 0010 0001 0000 0100 cin>>a;


ADD 105 0001 0001 0000 0101 cin>>b;
STA106 0011 0001 0000 0110 sum=a+b;
Program A Program B Program C

Identify the type of translator that translates the following program. State ‘NONE’ if a
translator is not relevant. [ 3 marks]

Program Type of Translator

Program A to Program B.

Program C to Program A.

Program C to Program B.

d) Determine the most suitable programming paradigm based on the scenario given.
[ 2 marks]

Scenario Programming Paradigm


Vicky is currently developing a system
which will be able to assist a doctor to
diagnose patient symptoms.
Siew Lan plans to use again her objects
codes to develop a Library Management
System.

END OF QUESTION PAPER

11

You might also like