SC015 2 SULITNo. Matrik..............................................................No. Kad Pengenalan..................................................SULITINSTRUCTIONS TO CANDIDATE: This question paper consists of 6 questions. Answer all questions in the space provided. The use of non-programmable scientific calculator is permitted. ARAHAN KEPADA CALON: Kertas soalan ini mengandungi 6 soalan. Jawab semua soalan di ruang yang disediakan. Penggunaan kalkulator saintifik yang tidak boleh diprogramkan dibenarkan.
SC015 31(a) Identify two (2)activities for input, process, and output operations based on the scenario below. After a long day at work, Sarah decides to order dinner using her favorite food delivery app. She opens the app and selects a large pepperoni pizza and a garlic bread then typing her delivery address. Once confirmed, the app saves her order details temporarily and sends a notification to the restaurant. Moments later, Sarah receives a message on her phone confirming her order and the estimated delivery time. [6 marks] Operation Activities Input i. The app accept the menu (e.g., pizza, garlic bread) chosen by user. ii. The app receive the delivery address from user. Process i. The app calculates the total cost based on the selected items. ii. The app checks with the restaurant for item availability. Output i. The app sends a confirmation notification to the user. ii. The app displays the estimated delivery time on the screen. (b) Convert 1010102into the decimal number. Show your calculation. [4 marks] 1 0 1 0 1 0 25242322212032 16 8 4 2 1 1 X 32 0 X 16 1 X 8 0 X 4 1 X 2 0 X 1 32 + 0 + 8 + 0 + 2 + 0 = 1010102= 4210
SC015 4(c) Convert AF1D16into a decimal number. Show your calculation [4 marks] A F 1 D 1631621611604096 256 16 1 10 X 4096 15 X 256 1 X 16 13 X 1 40960 + 3840 + 16 + 13 = AF1D16= 4482910(d) Convert BD16into the binary number. Show your calculation. [5 marks] B (11) D (13) 23222120232221208 4 2 1 8 4 2 1 1 0 1 1 1 1 0 1 BD16= 101111012
SC015 5(e) Answer the following questions: P Q Used in older versions of Windows or early HTML pages for basic text encoding. Found in IBM mainframe computers or legacy financial transaction systems. (i) Describe how Prepresenting a character in acomputer. [2 marks] P uses 8 bits to represent a character. (ii) Differentiate between Pand Qcoding schemes based on the context of use. [4 marks] P: widely used on all types of computer and operating systems that use the Latin alphabet. Q: Mainly used in legacy IBM mainframes and IBM midrange computer operating systems. 2(a) You want to watch a movie tonight either at home or at cinema (Z). You will watch at the cinema if you have free time this evening (A) or if the movie is available for streaming, you will watch at home (B) only. In addition, you must also have snacks to enjoy while watching (C) or not have other activities that conflict with movie time (D'). Otherwise, you won't be watching the movie tonight. Draw a logic circuit from the above scenario. [5 marks]
SC015 73(a) Identify the suitable network architecture for each of the given scenarios. [2 marks] ScenarioNetwork architectureUser A uploads a music file to the network. User B searches for and downloads the file directly from User A's device. Peer-to-peer In an online food ordering system, a user selects items on an app and clicks "Submit Order." The app sends a request to the host, which processes the order and returns a confirmation and delivery time. Client/Server (b) In a family of four, a home file-sharing network uses a technology that allows each family member to share and access files directly from each other's devices over the internet, without relying on a central server. The mother shares work documents and family photos from her Windows laptop, the father manages finances from his Windows desktop, the teenage son captures photos and videos on his Android smartphone, and the teenage daughter works on school projects using her iOS tablet. Each family member installs a file-sharing app, creating a shared folder for automatic syncing. Sketch and label the complete network architecture based on the given scenario. [6 marks]
SC015 8(c) Differentiate between Local Area Network (LAN) and Wide Area Network (WAN) based on network coverage and network ownership. [4 marks] Scenario Network coverage Network ownership A multinational company with offices in Kuala Lumpur, London, and New York uses this classification of network to connect their internal networks. Employees across all offices can access the same resources and communicate seamlessly through emails or video calls. Large geographical area. Owned by multiple organizations or service providers. Imagine an office with 10 computers, a shared printer, and a server connected via Ethernet cables. Employees can share files, print documents, and access a common database, all over the same network. Small geographical area. Owned by a single organization. (d) Give one (1)example of the largest WAN. [1 mark] The Internet
SC015 94(a) Identify the suitable type of network based on the accessibility of information. [2 marks] DescriptionType of networkAt Tech Solutions, employees access the company’s network to find internal documents, policies, and a calendar of events. Only employees with company credentials can log in, ensuring that sensitive information remains private. Intranet Tech Solutions is collaborating with a partner firm on a project. They set up an extranet where both employees and the partner's team can log in to share project updates and documents. This network allows limited access for the partner while keeping other internal information secure. Extranet (b) Describe the characteristics of IPv4 and IPv6 below. [4 marks] IPv4IPv6Characteristics 32-bit, written as four decimal numbers separated by dots 128-bit, written in hexadecimal, separated by colons Example 1.2.3.4 1:2:3:4:5:6:7:8
SC015 10(c) The following is an address of a Web page: https://www.mybank.biz.th/accounts/index.cfm (i) Give one (1)advantage of using this type of protocol. [2 marks] https more secure using SSL. (ii) State the purpose of this Website. [1 mark] Business (iii) Identify the origin country of the Website. [1 mark] Thailand (iv) Give another example of generic Top-level Domain (gTLD). [1 mark] .com (v) Give another example of country code Top-level Domain (ccTLD). [1 mark] .my 5(a) Identify the area of computer ethics based on the given scenario. [2 marks] ScenarioArea of Computer EthicsImran shares a viral post claiming some food is dangerous to consume without verifying it, spreading misinformation and causing unnecessary panic among friends. Information accuracy Iman sells customers' personal data from a marketing database to a third party without permission, violating their privacy and trust. Information privacy
SC015 11(b) Identify the appropriate netiquette rules to be applied when dealing with the given scenario. [4 marks] ScenarioNetiquette RulesIn an online gaming forum, Irham insults another player by calling them "noob" and using insulting terms after losing a match, creating a hostile environment. Be polite, avoid offensive language. Irfan replies to a blog post with an angry comment, attacking the author personally instead of discussing the topic. This leads to a heated argument in the comments section. Avoid posting flames. Irdina posts a sarcastic comment about a serious news article, but many readers take it literally, leading to confusion and hurt feelings among the community. Be careful when using sarcasm and humor Irshad sends a group email about an event in all capital letters, making it seem like they are shouting at everyone, which annoys the recipients. Do not use all capital letters, which is the equivalent of SHOUTING!
SC015 126Identify the phase of the System Development Life Cycle based on the given activities. [8 marks] ActivitiesPhaseInvolves creating a blueprint for the system. This includes defining the architecture, data models, and user interfaces. The goal is to have a detailed plan that guides developers in building the system. Design Gathering Requirements: Engaging with stakeholders to collect and document what the system needs to do. Analysis Developing the Project Plan: This includes defining project goals, scope, resources, and timelines. Planning Coding the System: Writing the software code based on the design specifications. Implementation The team provides user training, maintains the system, and ensures it is secure. They monitor for any issues, implement updates, and address security threats as they arise. Support and Security Developers write the code and build the system according to the design specifications. They also conduct testing to identify and fix any issues before the system goes live. Implementation The project team defines the goals and scope of the project. They assess the feasibility of the project and create a plan that outlines what needs to be done, who will do it, and how long it will take. Planning The team gathers and analyzes the requirements for the system. They engage with stakeholders to understand what features and functionalities are needed. This helps ensure that the final product meets user expectations. Analysis END OF QUESTION PAPER KERTAS SOALAN TAMAT