Analysis SPM of year 2007, 2008, 2009, 2010, 2011 & 2012 (Section B)
2007 |
2008 |
2009 |
2010 |
2011 |
2012 |
26. ICT & Society
Ways of making personal data more private |
26. ICT & Society
State 2 examples for ethical & law breaking
|
26. Computer Systems
Type of software ; Open source & proprietary software. Reasons choose the type of software. |
26. ICT & Society
Reason choose email 3 reasons why email better than sms |
26. Multimedia
Medium of delivery used & give 2 advantages of it
|
26. Information Systems
State type of key and justify the answer. State the type of relationship and justify the answer. |
27. Computer Systems
Differences between open source & closed source |
27. Network
Differences on how data being transmitted between ring topology & star topology. 2 advantages of ring topology |
27. Network
State the name of the type of network architecture Give one feature of the type of network. Sketch the network architecture. |
27. Programming
State the data type used. Identify the control structure & justify the answer.
|
27. Network
Explain the structure of the network in figure shown |
27. Computer Systems
State the coding scheme used. List three functions of coding scheme used. |
28. Network
Differences between internet & intranet
|
28. Network
State type of network communication technology from the statement given & give reason Differentiate between extranet & internet. |
28. Multimedia
Identify the type of web editor Give 2 reasons why interface web editor attracted more students than interface text editor. |
28. Network
Explain the type of network Suggest the type of network communication technology & justify the answer |
28. ICT & Society
State 2 ways that causes pop-up messages appear on the computer screen State 2 kinds of serious damages if user ignore the message |
28. Multimedia
Explain the web editor used. Give 2 disadvantages of using the web editor. |
29. Information Systems
List 2 uses of the information from database. State problems that may arised by shared data. |
29. Programming
Identify the element in program as a constant & give reason. Identify control structure is used in the flow chart & give reason. |
29. Programming
State the data type used in a program and give a reason. Why numerator declared as a constant and give a reason. |
29. Multimedia
2 advantages using the type of web editor shown in figure. User interface principle – suggest 2 ways to improve the design in the figure shown |
29. Computer Systems
Suggest a type of software to be used & give a reason why choose it.
|
29. Programming
State the statement use to declare “Name” and justify the answer. State the statement use to declare “Interest Rate” and justify the answer. |
30. Multimedia
List advantages of using encyclopedia stored on CD |
30. Information Systems
Identify the suitable fields Complete the query results with the data from the table given. |
30. Information Systems
Group the attributes into 2 tables & draw a line to show the relationship between the tables. State the type of relationship. |
30. Information Systems
Example of components in IS. Describe the interrelation between the components |
30. Information Systems
Identify attributes of the table given |
30. ICT & Society
Propose the most suitable floor to place the computer and justify the answer. Explain why did not choose other floors.
|
Analysis SPM of year 2007, 2008, 2009, 2010, 2011 & 2012 (Section C)
2007 |
2008 |
2009 |
2010 |
2011 |
2012 |
31. Network
Propose wired network topology Identify hardware to provide internet access & the function |
31. ICT & Society
Describe 2 suitable security measures to prevent computer crime. Why bank clients should be protected under Malaysian Cyber Law. |
31. Network
State the name of the computer that is not configured to be in the network (IP address) & justify the answer. Explain 2 causes of the outcome of the ping process from PC |
31. Programming
Draw a flow chart based on the user interface given. |
31. Programming
Identify the input & output Write the formula used Sketch a design of input interface |
31. Network
Propose the network topology to be used and justify the answer. Draw the design for the network.
|
32. ICT & Society
Explain computer threat Explain actions on human aspect on security procedure to increase security at the computer control room. |
32. Network
Describe 2 types of computer network. Describe types of network communication technologies. |
32. Programming
Identify 2 variables Write the pseudo code for the program |
32. ICT & Society
Identify the type of computer threats Give 2 examples of computer threats Give 2 reasons why computer affected by computer threat & suggest 2 ways to prevent it |
32. Computer Systems
Type of utility program used & give 2 advantages of it Explain how student transfer that file using the same storage medium to another computer and open the file for editing |
32. Programming
Draw a flow chart of a computer program that reads API of an area based on the table shown. |
33. Information Systems
Data manipulation – Identify & explain Primary key- Identify & justify |
33. Information Systems
State the data type for the data item required for the coupon system. Create the output of the coupon used. |
33. Information Systems
Prepare a report design
|
33. Programming
State 4 activities in phase program analysis Identify the type of error & justify the answer. |
33. Multimedia
Sketch the screen design for main menu page Explain 2 user interface used in the design of the page. |
33. Multimedia
Based on the statement given design a storyboard for the main page which should include all the five elements of multimedia. |