SPM 2009 SECTION B
Sepanjang tahun ni, saya tak buat ujian bertulis kat pelajar ICTL, tapi...buat ujian praktikal. Ia dijalankan secara berkumpulan sebab kurang komputer yang berfungsi..Pada, 17 November lepas, saya sempat pilih pelajar yang cemerlang dari Tingkatan 2 mengikut kemahiran ICT...Berikut adalah senarai nama pelajar yang berjaya :
A) Ms Word
Kedudukan | Nama Pelajar | Tingkatan |
Pertama | Amirul Hafizuddin Zahari Hilmi Shahrin Mohd Ghazali | 2 Cerdas |
Kedua | Nur Asyura Rahmat Nur Fatin Umairah Md Sharifudin | 2 Canggih |
Ketiga | Nur Liyana Aida Zainudin Wahidah Amalin Ezani | 2 Cekal |
B) Ms Excel
Kedudukan | Nama Pelajar | Tingkatan |
Pertama | Nur Asyura Rahmat Nur Fatin Umairah Md Sharifudin | 2 Canggih |
Kedua | Loi Jean Lai Mei Chi | 2 Cerdas |
Ketiga | Najihah Ismail Wan Nur Izzatul Nasuha Wan Ruzaidi | 2 Cekal |
C) Adobe Photoshop 7.0
Kedudukan | Nama Pelajar | Tingkatan |
Pertama | Wan Azhafiz Wan Ishak Najib bin Mazlan | 2 Cekal |
Kedua | Wan Nur Izzatul Nasuha Wan Ruzaidi Najihah Binti Ismail | 2 Cekal |
Ketiga | Amirul Hafizuddin Zahari Hilmi Shahrin Mohd Ghazali | 2 Cerdas |
D) Laman Web – Ms Front Page 2003
Kedudukan | Nama Pelajar | Tingkatan |
Pertama | Nur Liyana Aida bt Zainuddin Wahidah Amalin Ezani | 2 Cekal |
Kedua | Mohamad Faiz Fakiran Sazrul Hasif Ruhadi Wan Ahmad Najmi Wan Zakaria | 2 Canggih |
Ketiga | Muhammad Naqeeb Azman Amir Asyraf Jaafar Abdul Muzil Mohd Nasiruddin | 2 Cekal |
TRIAL ICT 2009
ANALYSIS LEARNING AREA FOR SECTION B
catatan : Yang di 'bold' tu, lain sikit dari yang lepas-lepas...
NEGERI | NO. SOALAN & LEARNING AREA | BENTUK SOALAN |
Pulau Pinang | 26. ICT | Define computer Theft and example of activity that reflects computer Theft Define hacking dan give example of hacking |
| 27. NETWORK | Define client and server Explain peer to peer |
| 28. MULTIMEDIA | Differences of linear and non linear interactivity Give example |
| 29. IS | Define primary key and foreign key |
| 30. PROGRAMMING | Name phases Explain activities involved in documentation phases |
NEGERI 9 | 26. MULTIMEDIA | Identify non linear multimedia and give your reason State concepts in authoring tools |
| 27. COMPUTER SYSTEM | State and give the meaning of input State function secondary storage |
| 28. PROGRAMMING | Identify the operator used ( logical and mathematical operator ) Differ the operator used ( logical and mathematical operator ) |
| 29. ICT | Differ between assembling the car manually and robotic Give impact using robot |
| 30. IS | Define DBMS State 3 advantages using DBMS |
PAHANG | 26. ICT | State advantanges when the manangement changed the system from non computerized to computerized system State disadvantanges when the manangement changed the system from non computerized to computerized system |
| 27. COMPUTER SYSTEM | State function of system software Differ between GUI and command line |
| 28. NETWORK | Name the colours of the given wire. Name type and usage of cable given in the diagram (cross cable ) |
| 29.MULTIMEDIA | Identify the multimedia team Give role of project matter |
| 30. PROGRAMMING | Name and describe design phase Draw flowchart to calculate the area of a rectangle |
| 26. ICT | Explain the major ethical issue. Explain why intellectual property law is needed… |
| 27. COMPUTER SYSTEM | Explain how the computer work Differ the function of primary and secondary storage |
| 28. NETWORK | IP in network Explain one way to test network connection |
| 29. IS | Interrelation among 5 IS components of online ticketing system |
| 30.IS | Data type Logical expression |
JOHOR | 26. NETWORK | Name type of network Disadvantages of WAN |
| 27.MULTIMEDIA | Type of interactivity and differences |
| 28. PROGRAMMING | State translator State 2 differ interpreter and compiler |
| 29.IS | State components of IS and state the function of the components of IS |
| 30. COMPUTER SYSTEM | Name type of System Software and function |
PERAK | 26.ICT | Suggest device for networking State methods of authentication that can be used to protect their data from unauthorized user access. |
| 27. COMPUTER SYSTEM | Name interface ( command line and GUI ) Differ the interface |
| 28. MULTIMEDIA | State one hardware used List concepts in authoring tools |
| 29. PROGRAMMING | State control structures used Differ control structures used |
| 30. IS | Importance of primary key Benefit of using database |
TRIAL ICT 2009
ANALYSIS LEARNING AREA FOR SECTION C
Catatan : Soalan yang di ‘bold’ itu adalah soalan yang ada kelainan sikit dari yang lepas-lepas.
NEGERI | NO. SOALAN/ LEARNING AREA | BENTUK SOALAN |
PULAU | 31. COMPUTER SYSTEM | Complete the computer Blok diagram State meaning of input and give an example Differentiate between primary and secondary storage. |
| 32. PROGRAMMING | State level of programming language State 2 generations under high level programming language Explain 2 generation under high level programming language and give examples |
| 33. NETWORK | Name topology State one possible reason that causes a network using topology A fail to function Give disadvantages of topology B Give advantages of topology C |
JOHOR | 31. PROGRAMMING | Design an input interface for the program Identify variable and constant from the given coding Differ between variable and constant |
| 32. NETWORK | Type of network used. Decsribe type of network Differ between bas and star |
| 33. IS | State primary key for given table and justify your answer State data type for the given field Explain the differ of Cust_ID in Customer_table and Cust_ID in Order_table |
| 31. IS | Explain the importance of Program_ID and ID in PARTICIPANT table ( primary key) Draw report to display the programs joined by all club members |
| 32. PROGRAMMING | Draw flow chart ( 7 m ) |
| 33. NETWORK | Explain Type of network (WAN) Explain differ between ring and bas topologies |
PERAK | 31. ICT | Explain computer crime stated in situation given. (copyright infringement) Explain 2 reasons why we need cyber law in computing |
| 32. PROGRAMMING AND NETWORK | Explain symbols used in flow chart Explain intranet |
| 33. MULTIMEDIA AND IS | Type of web editor used by given situation
( web base ) Design interface report. |
NEGERI 9 | 31. NETWORK | Identify two communication devices to set up network Explain the function of 2 devices Explain type of network architecture
( peer to peer ) |
| 32. MULTIMEDIA | Definition of multimedia State two differ between CD based and Web based Explain 2 user interface principles that can be applied to develop an interesting multimedia presentation. |
| 33. PROGRAMMING | State translation method of programming language Explain the translation method of programming language Differ between the translation methods used. |
PAHANG | 31. NETWORK | Suggest a suitable topology from given situation and justify your answer ( Star ) Explain advantages using network rather than a stand alone. |
| 32. IS | Name FieldX and describe your answer. Draw relationships between Customer_data table and Customer_contact table. |
| 33. PROGRAMMING | State 3 input for the given Draw a flow chart for the program |
31. ICT AND SOCIETY | Security measures: - Describe the suitable security measures to prevent computer crime KBKK question: Why bank clients should be protected under Malaysian Cyber Law. |
32. NETWORK | Types of computer network - describe ( from the diagram given ) Types of network communication technologies: - describe |
33. INFORMATION SYSTEM | Data type for the data item required for the coupon system. Create the output of the coupon used. |
Nota IT ©Template Blogger Green by Dicas Blogger.