Archive for October, 2012

October 7, 2012

ICT Note (Booklet Size) – New Version

A compact note for ICT students that are going to take SPM exam, in booklet size (A4 size that can fold into half). A small and light book that easy to bring anywhere…

Form 5 (Chapter 1 – Chapter 6)

ICT NOTE 2.0    (modified 22/09/2013)

Form 4 (Chapter 1 – Chapter 3)


October 6, 2012

Analysis SPM of Subject ICT for year 2007, 2008, 2009, 2010 and 2011 (Section B & C)

Analysis SPM 2007, 2008, 2009, 2010 & 2011 (Section B)






26. ICT & Society

Ways of making personal data more private

26. ICT & Society

State 2 examples for ethical & law breaking


26. Computer Systems

Type of software ;

Open source & proprietary software.

Reason choose the type of software.

26.  ICT & Society

Reason choose email

3 reasons why email better than sms

26. Multimedia

Medium of delivery used & give 2 advantages of it


27. Computer Systems

Differences between open source & closed source

27. Network

Differences on how data being transmitted between ring topology & star topology.

2 advantages of ring topology

27. Network

State the name of the type of network architecture

Give one feature of the type of network.

Sketch the network architecture.

27. Programming

State the data type used.

Identify the control structure & justify the answer.



27.  Network

Explain the structure of the network in figure shown

28. Network

Differences between internet & intranet

Differences between topologies & network architecture

28. Network

State type of network communication technology from the statement given & give reason

Differentiate between extranet & internet.

28. Multimedia

Identify the type of web editor

Give 2 reasons why interface web editor attracted more students than interface text editor.

28.  Network

Explain the type of network

Suggest the type of network communication technology & justify the answer

28.  ICT & Society

State 2 ways that causes pop-up messages appear on the computer screen

State 2 kinds of serious damages if user ignore the message

29. Information Systems

List 2 uses of the information from database.

State problems that may arised by shared data.

29. Programming

Identify the element in program as a constant & give reason.

Identify control structure is used in the flow chart & give reason.

29. Programming

State the data type used in a program and give a reason.

Why numerator declared as a constant and give a reason.

29. Multimedia

2 advantages using the type of web editor shown in figure.

User interface principle – suggest 2 ways to improve the design in the figure shown

29.  Computer Systems

Suggest a type of software to be used & give a reason why choose it.


30. Multimedia

List advantages of using encyclopedia stored on CD

30. Information Systems

Identify the suitable fields

Complete the query results with the data from the table given.

30. Information Systems

Group the attributes into 2 tables & draw a line to show the relationship between the tables.

State the type of relationship.

30. Information Systems

Example of components in IS. Describe the interrelation between the components

30. Information Systems

Identify attributes of the table given


Analysis SPM 2007, 2008, 2009, 2010 & 2011 (Section C)

31. Network

Propose wired network topology

Identify hardware to provide internet access & the function

31. ICT & Society

Describe 2 suitable security measures to prevent computer crime.

Why bank clients should be protected under Malaysian Cyber Law.

31. Network

State the name of the computer that is not configured to be in the network (IP address) & justify the answer.

Explain 2 causes of the outcome of the ping process from PC

31. Programming

Draw a flow chart based on the user interface given.

31. Programming

Identify the input & output

Write the formula used

Sketch a design of input interface

32. ICT & Society

Explain computer threat

Explain actions on human aspect on security procedure to increase security at the computer control room.

32. Network

Describe 2 types of computer network. Describe types of network communication technologies.

32. Programming

Identify 2 variables

Write the pseudo code for the program

32. ICT & Society

Identify the type of computer threats

Give 2 examples of computer threats

Give 2 reasons why computer affected by computer threat & suggest 2 ways to prevent it

32. Computer Systems

Type of utility program used & give 2 advantages of it

Explain how student transfer that file using the same storage medium to another computerand open the file for editting

33. Information Systems

Data manipulation – Identify & explain

Primary key- Identify & justify

33. Information Systems

State the data type for the data item required for the coupon system.

Create the output of the coupon used.

33. Information Systems

Prepare a report design


33. Programming

State 4 activities in phase program analysis

Identify the type of error & justify the answer.

33. Multimedia

Sketch the screen design for main menu page

Explain 2 user interface used in the design of the page.