4

Click here to load reader

Marking scheme-trial-ict-2012

Embed Size (px)

Citation preview

Page 1: Marking scheme-trial-ict-2012

ICT TRIAL EXAM 2012 Marking Scheme For Section A

Question No. CHIPS Answer Marks1. C 1 2. False 2 3. i) J 3 ii) M 4 4. i) Computer fraud 5 ii) Copyright infringement 6 5. D 7 6. i) 220 8 ii) 1000000 9 7. i) B 10 ii) A 11 8. i) LAN 12 ii) Peer-to-peer 13 9. True 14 10. i) N 15 ii) Extranet 16 11. i) Fiber optic 17 ii) e-commerce, e-business 18 12. i) L 19 ii) N 20 13. False 21 14. B 22 15. Clarity 23 16. D 24 17. i) P 25 ii) Q 26 18. i) Double 27 ii) Area 28 19. RM 240 29 20. False 30 21. i) Procedure 31 ii) People/human/user 32 22. C 33 23. False 34 24. Query 35 25. Modify 36

TOTAL MARKS

Page 2: Marking scheme-trial-ict-2012

Marking Scheme Section B Trial Exam 2012

26. a. Cyber Law

b. Fraud – Having attention to take advantage over or causing loss to the

other people, mainly on monetary basis through the use of computer eg email hoaxes, programme fraud, investment scheme, sales promotion, hacking

1 mark

Fraud – 1m Definition of fraud – 1m Example of fraud – 1m

27 a. A- Presentation B - Graphic

b. 2 Characteristics of OS • software provided for use, modification and redistribution • software that any programmer can download from the Internet for • free and modify with suggested improvements.the only

qualification is that changes can't be copyrighted

1 mark 1 mark

Any 2 2 marks

28 a. B - Coaxial Cable C – Fiber optic

b. No cost for physical medium - Data can be sent to unlimited people – no network - Data can be transmitted faster - Wider area of coverage

1 mark 1 mark

Any 2

2 marks

29 a. Testing The multimedia developers will use a checklist to test the multimedia program. If there are any errors, the programmer will fix the program.

b. Navigation/ interface / content. Navigation –navigation aids and consistency Interface – casper principles are used Which are contrast, proximity, emphasis and repetition Content – the goals of the program, text, graphics, audio, video, animation, language used and how informative the program is.

1 mark 1 mark for description

Any one and explanation

2 marks.

30 a. Approach A – Structured approach Approach B - Object –oriented approach

b. A Differences B Uses a top down design model

Uses Uses object

Programmer divides programming problem into module

Emphasize The programmer packages the data and function into single unit , object

Medium programming project

Suitable for Large programming project

1 mark 1 mark

Any two differences (2 Pairs) for 2

marks

Page 3: Marking scheme-trial-ict-2012

Marking Scheme Section C Trial Exam 2012

31. (a) Someone – perpetrators

- Category of perpetrators

Category Description Hacker Someone who accesses a computer or network

illegally. They often claim the intent of their security breaches is to improve security. They have advanced computer skills.

Cracker Someone who accesses a computer or network illegally, but has the intent of destroying data, stealing information, or other malicious action. They have advanced computer skills.

Script Kiddie Someone who has the same intent as a cracker but does not have the technical skills and knowledge. They are often teenagers.

Corporate Spy

Someone who is hired to break into a specific computer and steal its proprietary data and information.

Unethical Employee

Employees who break into their employers’ computers for a variety of reasons.

Cyber Extortionist

Someone who uses e-mail as a vehicle for extortion or libeling.

Cyber Terrorist

Someone who uses the Internet or network to destroy or damage computers for political reasons.

Perpetrators -1 m

1 category – 1m 1 discription – 1m

Total = 3marks

31. (b) Describe 2 ways how people to protect their computer (through human aspects)

• User should be identified and authenticated • Users should disable file and printer sharing on Internet

connection. • Users should implement physical access control (looked

doors, windows and equipment) • Users should use passwords, possessed objects and

biometrics. • Any reasonable answer – action take by the human/user.

Any two and give

briefly explanation.

4 marks

(what action should take by the human)

32. Input Processing Output

Customer name Model of the car Price of the car Down Payment Number of Years for the loan Annual Interest percentage

Loan = Price – Down Payment Monthly Instalment = (((Loan x (Annual Interest Percentage / 100)) x Number of Years + Loan) / (Number of Years x 12)

Monthly Installment

Input – any 4 input for

4 marks Processs – 2 formula

for 2 marks Output – 1 output

For 1 marks

Total = 7 marks

Page 4: Marking scheme-trial-ict-2012

33.

33.

(a) (i) Fill (ii) Mak(iii) Writ

Friend’Friend IDName Address Date of B

(b) Create a

FRIE NAM ADD DAT

in the fields ke relationshite PK and FK

’s Info D (PK)

irth

a form

FRIE

END ID

ME

DRESS

TE OF BIRT

into the tableip ( one to mK

END’S INFO

TH

A0

HA

NoTa25

15

e many)

PhoTeleFrie

ORMATION

001

ASNUL BIN

o. 3 Lorongaman Kg Pa5200 Kuanta

5.05.1994

ne Numberephone Numend ID (FK)

N FORM

N AWANG

g 70, adang 2, an.

ber

G

Field i(any 3

Field i(all Cor

Label PKmake rel

Total =

Form TAny 3 FSample

Draw for

Total =

in table 1 3) – 1 m in table 2 rrect)– 1m K & FK andlationship – 1m

= 3 marks

Title – 1m Fields – 1m

data – 1 m rm in box – 1m

= 4 marks