KMNS SC015 2023 - 2024 Question

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

SC015 SC015

Computer Science 1 Sains Komputer 1


Semester I Semester I
Session 2023/2024 Sesi 2023/2024
2 hours 2 jam
No. Matrik No. Kad Pengenalan No. Tempat Duduk
Matric No. Identity Card No. Seat No.

(Isikan maklumat dengan lengkap)

KOLEJ MATRIKULASI NEGERI SEMBILAN


NEGERI SEMBILAN MATRICULATION COLLEGE

PRA PEPERIKSAAN SEMESTER PROGRAM MATRIKULASI


PRE MATRICULATION PROGRAMME SEMESTER EXAMINATION

JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU.


DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE TOLD TO DO SO.

S Untuk Kegunaan
C Pemeriksa For
0 Examiner’s Use
1 No. Markah
5 Soalan Mark
Question Pemeriksa KP /
No. Examiner KKP
1 25
2 18
3 13
4 12
5 4
6 8
JUMLAH
80
TOTAL

Kertas soalan ini mengandungi 11 halaman bercetak.


This question paper consists of 11 printed pages.
© Kolej Matrikulasi Negeri Sembilan

1
1 (a) Autonomous vehicles refer to vehicles that are capable of navigating and operating without
human intervention. This includes the ability to perceive the environment, make decisions, and
control the vehicle's movements.
Identify the activities or elements and devices for input, process, output and storage involved in
the autonomous vehicle above. [8 marks]
Operation Activity/Element Device

Input

Process

Output

Storage

(b) Numbering system is a systematic method for representing numbers using a particular
set of symbols.
i. Show the conversion of 1110 01012 to decimal. [3 marks]

ii. Find the missing number in the sequence given below. Show your answer in
decimal number system. [2 marks]
100102, 2310, 1000012, _______________

2
iii. Show the conversion of F116 to decimal. [3 marks]

iv. Convert the decimal number 15910 to a hexadecimal equivalent. Show the
steps. [2 marks]

v. Show the conversion of EAF016 to a binary number. [2 marks]

3
vi) Show the conversion 100002 to a hexadecimal equivalent. Show the steps.
[2 marks]

(c) Information coding scheme is very important as without it, the machine
could interpret the given bytes as a different character than intended.
i. Differentiate between these two types of information coding scheme
based on the criteria given: [2 marks]

Context Use
Unicode EBCDIC

ii. Calculate number of bits used in ASCII to represent the following


phrase: [1 mark]
INTERNATIONAL INNOVATION

_________________________________________________________________

4
2 (a) Azlan will go to the nursery (X) if Azlan does not have a fever (A) and free
from flu (B). However, Azlan will be free from flu if Azlan takes medicine
(C) and always wears a mask outdoor (D).

Derive Boolean expression based on the logic statement above. [8 marks]

(b) Based on Boolean expression Z = (XY)’ (Y Y)’


i. Construct a truth table. [5 marks]

5
ii. Draw the logic circuit. [5 marks]

6
3 (a) Mrs Shelly who works in IT department is asked to redesign the network located in
the office on the 2nd floor. The office originally has only three (3) PCs and one (1)
printer. Due to business expansion, the network needs to be redesigned so that all data,
information and software can be stored in a central storage, making it easier to be
managed and accessed. Other than that, three (3) PCs are added to the network together
with a communication device X that connects the network to the Internet.

i. Identify the network architecture based on the scenario above.


[1 mark]
____________________________________________________________

ii. What would happen to the network if the central storage device is faulty?
[1 mark]
___________________________________________________________

iii. Draw the network architecture based on the scenario above. [5 marks]

7
Complete the table below by identifying the classification of network and the
ownership based on the statements given. [6 marks]
Statements Classification of Network
Network Ownership
i. Sara needs to access the
company central database
located in company main branch
in Pulau Pinang in order to
retrieve some data required for
the site visit that she is currently
in Sabah.
ii. This network has high data
transmit rate as the number of
computers linked together is
limited.
iii. In Happy Bookstore, three
computers (PC1, PC2, PC3)
share one printer which is
attached to PC3.

4 (a) Identify the type of network standard based on the scenarios:


i. TS Berhad has created an application called OhMyShopping. This
application makes it easier for customers to make purchases online and it
can only be accessed by creating OhMyShopping account. [2 marks]

_______________________________________________________________

ii. Yusuf is now the human resource officer at Car Accessories House. Yusuf
has been given the responsibility to update employee information, such as
salaries, and to ensure that all employee information has been updated once
a year. However, the Employee Information System can only be accessed
by employees who have an account created by Yusuf. This is intended to
allow employees to update information such as their home address, phone
number, and latest e-mail address.
[2 marks]

_______________________________________________________________

8
(b) An IP address identifies any given device on a network. You might need it for online
gaming or remote desktop computing. You can find the IPv4 and IPv6 addresses of your
PC by using ipconfig as in FIGURE 1.

FIGURE 1
i. Give two (2) reasons for using IPv6 addressing scheme. [2 marks]
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________

ii. Explain the relationship between IP address and domain name. [2 marks]
_______________________________________________________________
_______________________________________________________________

(c) DNS stands for Domain Name System, the phonebook of the Internet that
translates domain names to IP addresses. Explain the labelled sections in
the following URL:
B
A
D

https://www.upnm.edu.my
[4 marks]
C
A
B
C
D

9
5 “The data stolen can be anything from bank account information, online passwords,
passport numbers, driver's license numbers, social security numbers, medical records,
online subscriptions, and so on.”
(a) Identify area of computer ethic related to the situation above. [1 mark]
_______________________________________________________________

(b) Give one (1) suggestion to all consumers to avoid this situation. [1 mark]
_______________________________________________________________

(c) FIGURE 2 illustrates a snippet of an email from a candidate to a company


where she applied for a job position.

FIGURE 2
Identify two (2) netiquette rules that she followed while using an e-mail based on
Figure 2. [2 marks]
__________________________________________________________________
__________________________________________________________________

10
6. The System Development Lifecycle (SDLC) is the cost-effective and time-efficient process
that development teams use to design and build high-quality software. The goal of SDLC is to
minimize project risks through planning so that software meets customer expectations during
production and beyond.
(a) Identify the phase in SDLC and its deliverables based on the given statement.
[8 marks]
Statement Phase Deliverable
(i) Developers will first outline the
details for the overall application,
alongside specific aspects, such Design
as its user interfaces.

(ii) Handling residual bugs that have


not been patched before launch
Troubleshooting
or resolving new issues that
report
come out due to user reports.

(iii) Help to secure the funding and


resources they need to ensure
their plan could be executed.

(iv) Testing is done to ensure quality


and to validate the tests against
the customer requirements to
make sure the product satisfies
the customers’ needs.

(v) Perform a functional assessment


and finalize the client's or users'
needs for the system in
development

11

You might also like