KMNS SC015 2023 - 2024 Question
KMNS SC015 2023 - 2024 Question
KMNS SC015 2023 - 2024 Question
S Untuk Kegunaan
C Pemeriksa For
0 Examiner’s Use
1 No. Markah
5 Soalan Mark
Question Pemeriksa KP /
No. Examiner KKP
1 25
2 18
3 13
4 12
5 4
6 8
JUMLAH
80
TOTAL
1
1 (a) Autonomous vehicles refer to vehicles that are capable of navigating and operating without
human intervention. This includes the ability to perceive the environment, make decisions, and
control the vehicle's movements.
Identify the activities or elements and devices for input, process, output and storage involved in
the autonomous vehicle above. [8 marks]
Operation Activity/Element Device
Input
Process
Output
Storage
(b) Numbering system is a systematic method for representing numbers using a particular
set of symbols.
i. Show the conversion of 1110 01012 to decimal. [3 marks]
ii. Find the missing number in the sequence given below. Show your answer in
decimal number system. [2 marks]
100102, 2310, 1000012, _______________
2
iii. Show the conversion of F116 to decimal. [3 marks]
iv. Convert the decimal number 15910 to a hexadecimal equivalent. Show the
steps. [2 marks]
3
vi) Show the conversion 100002 to a hexadecimal equivalent. Show the steps.
[2 marks]
(c) Information coding scheme is very important as without it, the machine
could interpret the given bytes as a different character than intended.
i. Differentiate between these two types of information coding scheme
based on the criteria given: [2 marks]
Context Use
Unicode EBCDIC
_________________________________________________________________
4
2 (a) Azlan will go to the nursery (X) if Azlan does not have a fever (A) and free
from flu (B). However, Azlan will be free from flu if Azlan takes medicine
(C) and always wears a mask outdoor (D).
5
ii. Draw the logic circuit. [5 marks]
6
3 (a) Mrs Shelly who works in IT department is asked to redesign the network located in
the office on the 2nd floor. The office originally has only three (3) PCs and one (1)
printer. Due to business expansion, the network needs to be redesigned so that all data,
information and software can be stored in a central storage, making it easier to be
managed and accessed. Other than that, three (3) PCs are added to the network together
with a communication device X that connects the network to the Internet.
ii. What would happen to the network if the central storage device is faulty?
[1 mark]
___________________________________________________________
iii. Draw the network architecture based on the scenario above. [5 marks]
7
Complete the table below by identifying the classification of network and the
ownership based on the statements given. [6 marks]
Statements Classification of Network
Network Ownership
i. Sara needs to access the
company central database
located in company main branch
in Pulau Pinang in order to
retrieve some data required for
the site visit that she is currently
in Sabah.
ii. This network has high data
transmit rate as the number of
computers linked together is
limited.
iii. In Happy Bookstore, three
computers (PC1, PC2, PC3)
share one printer which is
attached to PC3.
_______________________________________________________________
ii. Yusuf is now the human resource officer at Car Accessories House. Yusuf
has been given the responsibility to update employee information, such as
salaries, and to ensure that all employee information has been updated once
a year. However, the Employee Information System can only be accessed
by employees who have an account created by Yusuf. This is intended to
allow employees to update information such as their home address, phone
number, and latest e-mail address.
[2 marks]
_______________________________________________________________
8
(b) An IP address identifies any given device on a network. You might need it for online
gaming or remote desktop computing. You can find the IPv4 and IPv6 addresses of your
PC by using ipconfig as in FIGURE 1.
FIGURE 1
i. Give two (2) reasons for using IPv6 addressing scheme. [2 marks]
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
ii. Explain the relationship between IP address and domain name. [2 marks]
_______________________________________________________________
_______________________________________________________________
(c) DNS stands for Domain Name System, the phonebook of the Internet that
translates domain names to IP addresses. Explain the labelled sections in
the following URL:
B
A
D
https://www.upnm.edu.my
[4 marks]
C
A
B
C
D
9
5 “The data stolen can be anything from bank account information, online passwords,
passport numbers, driver's license numbers, social security numbers, medical records,
online subscriptions, and so on.”
(a) Identify area of computer ethic related to the situation above. [1 mark]
_______________________________________________________________
(b) Give one (1) suggestion to all consumers to avoid this situation. [1 mark]
_______________________________________________________________
FIGURE 2
Identify two (2) netiquette rules that she followed while using an e-mail based on
Figure 2. [2 marks]
__________________________________________________________________
__________________________________________________________________
10
6. The System Development Lifecycle (SDLC) is the cost-effective and time-efficient process
that development teams use to design and build high-quality software. The goal of SDLC is to
minimize project risks through planning so that software meets customer expectations during
production and beyond.
(a) Identify the phase in SDLC and its deliverables based on the given statement.
[8 marks]
Statement Phase Deliverable
(i) Developers will first outline the
details for the overall application,
alongside specific aspects, such Design
as its user interfaces.
11