Thursday, November 26, 2009

SPM 2009 SECTION B

Friday, November 20, 2009

Senarai Pemenang ICTL

Sepanjang tahun ni, saya tak buat ujian bertulis kat pelajar ICTL, tapi...buat ujian praktikal. Ia dijalankan secara berkumpulan sebab kurang komputer yang berfungsi..Pada, 17 November lepas, saya sempat pilih pelajar yang cemerlang dari Tingkatan 2 mengikut kemahiran ICT...Berikut adalah senarai nama pelajar yang berjaya :

A) Ms Word

Kedudukan

Nama Pelajar

Tingkatan

Pertama

Amirul Hafizuddin Zahari

Hilmi Shahrin Mohd Ghazali

2 Cerdas

Kedua

Nur Asyura Rahmat

Nur Fatin Umairah Md Sharifudin

2 Canggih

Ketiga

Nur Liyana Aida Zainudin

Wahidah Amalin Ezani

2 Cekal

B) Ms Excel

Kedudukan

Nama Pelajar

Tingkatan

Pertama

Nur Asyura Rahmat

Nur Fatin Umairah Md Sharifudin

2 Canggih

Kedua

Loi Jean

Lai Mei Chi

2 Cerdas

Ketiga

Najihah Ismail

Wan Nur Izzatul Nasuha Wan Ruzaidi

2 Cekal

C) Adobe Photoshop 7.0

Kedudukan

Nama Pelajar

Tingkatan

Pertama

Wan Azhafiz Wan Ishak

Najib bin Mazlan

2 Cekal

Kedua

Wan Nur Izzatul Nasuha Wan Ruzaidi

Najihah Binti Ismail

2 Cekal

Ketiga

Amirul Hafizuddin Zahari

Hilmi Shahrin Mohd Ghazali

2 Cerdas

D) Laman Web – Ms Front Page 2003

Kedudukan

Nama Pelajar

Tingkatan

Pertama

Nur Liyana Aida bt Zainuddin

Wahidah Amalin Ezani

2 Cekal

Kedua

Mohamad Faiz Fakiran

Sazrul Hasif Ruhadi

Wan Ahmad Najmi Wan Zakaria

2 Canggih

Ketiga

Muhammad Naqeeb Azman

Amir Asyraf Jaafar

Abdul Muzil Mohd Nasiruddin

2 Cekal

Saturday, November 14, 2009

Selamat pekse untuk semua calon SPM dan STPM




Thursday, November 12, 2009

Lu fikir lah sendiri Section B...

TRIAL ICT 2009

ANALYSIS LEARNING AREA FOR SECTION B


catatan : Yang di 'bold' tu, lain sikit dari yang lepas-lepas...


NEGERI

NO. SOALAN & LEARNING AREA

BENTUK SOALAN

Pulau Pinang

26. ICT

Define computer Theft and example of activity that reflects computer Theft

Define hacking dan give example of hacking


27. NETWORK

Define client and server

Explain peer to peer


28. MULTIMEDIA

Differences of linear and non linear interactivity

Give example


29. IS

Define primary key and foreign key


30. PROGRAMMING

Name phases

Explain activities involved in documentation phases

NEGERI 9

26. MULTIMEDIA

Identify non linear multimedia and give your reason

State concepts in authoring tools


27. COMPUTER SYSTEM

State and give the meaning of input

State function secondary storage


28. PROGRAMMING

Identify the operator used ( logical and mathematical operator )

Differ the operator used ( logical and mathematical operator )


29. ICT

Differ between assembling the car manually and robotic

Give impact using robot


30. IS

Define DBMS

State 3 advantages using DBMS

PAHANG

26. ICT

State advantanges when the manangement changed the system from non computerized to computerized system

State disadvantanges when the manangement changed the system from non computerized to computerized system


27. COMPUTER SYSTEM

State function of system software

Differ between GUI and command line


28. NETWORK

Name the colours of the given wire.

Name type and usage of cable given in the diagram (cross cable )


29.MULTIMEDIA

Identify the multimedia team

Give role of project matter


30. PROGRAMMING

Name and describe design phase

Draw flowchart to calculate the area of a rectangle

PENANG GIRL

26. ICT

Explain the major ethical issue.

Explain why intellectual property law is needed


27. COMPUTER SYSTEM

Explain how the computer work

Differ the function of primary and secondary storage


28. NETWORK

IP in network

Explain one way to test network connection


29. IS

Interrelation among 5 IS components of online ticketing system


30.IS

Data type

Logical expression

JOHOR

26. NETWORK

Name type of network

Disadvantages of WAN


27.MULTIMEDIA

Type of interactivity and differences


28. PROGRAMMING

State translator

State 2 differ interpreter and compiler


29.IS

State components of IS and state the function of the components of IS


30. COMPUTER SYSTEM

Name type of System Software and function

PERAK

26.ICT

Suggest device for networking

State methods of authentication that can be used to protect their data from unauthorized user access.


27. COMPUTER SYSTEM

Name interface ( command line and GUI )

Differ the interface


28. MULTIMEDIA

State one hardware used

List concepts in authoring tools


29. PROGRAMMING

State control structures used

Differ control structures used


30. IS

Importance of primary key

Benefit of using database

Friday, November 6, 2009

Logo-logo Rasmi













Lu fikir lah sendiri Section C ...

TRIAL ICT 2009

ANALYSIS LEARNING AREA FOR SECTION C


Catatan : Soalan yang di ‘bold’ itu adalah soalan yang ada kelainan sikit dari yang lepas-lepas.

NEGERI

NO. SOALAN/ LEARNING AREA

BENTUK SOALAN

PULAU PINANG

31. COMPUTER SYSTEM

Complete the computer Blok diagram

State meaning of input and give an example

Differentiate between primary and secondary storage.


32. PROGRAMMING

State level of programming language

State 2 generations under high level programming language

Explain 2 generation under high level programming language and give examples


33. NETWORK

Name topology

State one possible reason that causes a network using topology A fail to function

Give disadvantages of topology B

Give advantages of topology C

JOHOR

31. PROGRAMMING

Design an input interface for the program

Identify variable and constant from the given coding

Differ between variable and constant


32. NETWORK

Type of network used.

Decsribe type of network

Differ between bas and star


33. IS

State primary key for given table and justify your answer

State data type for the given field

Explain the differ of Cust_ID in Customer_table and Cust_ID in Order_table

PENANG GIRL

31. IS

Explain the importance of Program_ID and ID in PARTICIPANT table

( primary key)

Draw report to display the programs joined by all club members


32. PROGRAMMING

Draw flow chart ( 7 m )


33. NETWORK

Explain Type of network (WAN)

Explain differ between ring and bas topologies

PERAK

31. ICT

Explain computer crime stated in situation given. (copyright infringement)

Explain 2 reasons why we need cyber law in computing


32. PROGRAMMING

AND NETWORK

Explain symbols used in flow chart

Explain intranet


33. MULTIMEDIA

AND IS

Type of web editor used by given situation

( web base )

Design interface report.

NEGERI 9

31. NETWORK

Identify two communication devices to set up network

Explain the function of 2 devices

Explain type of network architecture

( peer to peer )


32. MULTIMEDIA

Definition of multimedia

State two differ between CD based and Web based

Explain 2 user interface principles that can be applied to develop an interesting multimedia presentation.


33. PROGRAMMING

State translation method of programming language

Explain the translation method of programming language

Differ between the translation methods used.

PAHANG

31. NETWORK

Suggest a suitable topology from given situation and justify your answer ( Star )

Explain advantages using network rather than a stand alone.


32. IS

Name FieldX and describe your answer.

Draw relationships between Customer_data table and Customer_contact table.


33. PROGRAMMING

State 3 input for the given

Draw a flow chart for the program

SPM 2008 Section C

31. ICT AND SOCIETY

Security measures:

- Describe the suitable security measures to prevent computer crime

KBKK question: Why bank clients should be protected under Malaysian Cyber Law.

32. NETWORK

Types of computer network

- describe ( from the diagram given )

Types of network communication technologies:

- describe

33. INFORMATION SYSTEM

Data type for the data item required for the coupon system.

Create the output of the coupon used.

Putera Bongsuku, Ammar..

Putera Bongsuku, Ammar..
Baru 4 hari..,.

Ammar

Ammar
Masa ni umur dia 2 tahun.

Taman Jepun

Taman Jepun
Ni dekat kolam ikan ...bestnya ammar main air ni, ...sejuk...

Ammar dah 4 tahun ni..

Ammar dah 4 tahun ni..
adduhh, beratlah ammar..

ICT Students 2007

ICT Students 2007
Lawatan Belajar ke Submarine Cable Telekom, Cherating

Nota IT ©Template Blogger Green by Dicas Blogger.

TOPO