La1 - ICT & Society

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ustaz Kopmputer
U
Ustaz Kopmputer
Community Contributor
Quizzes Created: 1 | Total Attempts: 121
Questions: 18 | Attempts: 121

SettingsSettingsSettings
La1 - ICT & Society - Quiz


Questions and Answers
  • 1. 

    State the name of the first generation computer.Nyatakan nama komputer generasi pertama.

    Correct Answer
    MARK I
    ENIAC
    UNIVAC
    MARK 1
    Explanation
    The correct answer is ENIAC. The ENIAC (Electronic Numerical Integrator and Computer) is considered the first general-purpose electronic computer. It was developed during World War II and was used for calculating artillery firing tables. ENIAC was a massive machine, taking up an entire room, and used vacuum tubes for processing. It was capable of performing calculations much faster than previous mechanical computers. The other options mentioned, MARK I, UNIVAC, and MARK 1, were also early computers but not the first generation.

    Rate this question:

  • 2. 

    Figure shows three technologies used in the generations of computers.Rajah menunjukkan tiga teknologi yang digunakan dalam generasi komputer.ABCBased on the figure, write A, B or C to match the following:Berdasarkan rajah itu, tulis A, B atau C untuk dipadankan dengan berikut: (i)        Second Generation           Generasi Kedua

    Correct Answer
    C
    Explanation
    Based on the figure, technology C is matched with the second generation of computers.

    Rate this question:

  • 3. 

    Figure shows three technologies used in the generations of computers.Rajah menunjukkan tiga teknologi yang digunakan dalam generasi komputer.ABCBased on the figure, write A, B or C to match the following:Berdasarkan rajah itu, tulis A, B atau C untuk dipadankan dengan berikut: (i)        Third Generation           Generasi Ketiga

    Correct Answer
    A
    Explanation
    The figure shows three technologies used in the generations of computers. The question asks to match the technology with the third generation. Since the answer is A, it can be inferred that technology A is associated with the third generation of computers.

    Rate this question:

  • 4. 

    Complete the following statement:Lengkapkan pernyataan berikut.Information and Communication Technology is the use of computers, (i) ...........................devices and (ii)  ............................applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti (i) ……......................dan (ii)  ............................. aplikasi untuk memproses ,menyimpan , mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa.(i) 

    Correct Answer
    electronic
    elektronik
    hardware
    perkakasan
    Explanation
    The correct answer is "electronic,elektronik,hardware,perkakasan". In the statement, it is mentioned that Information and Communication Technology involves the use of computers, devices, and applications. The word "electronic" and its translation "elektronik" refer to the use of electronic devices in ICT. Similarly, the word "hardware" and its translation "perkakasan" refer to the physical components of computers and devices used in ICT. Therefore, these words accurately complete the statement.

    Rate this question:

  • 5. 

    Complete the following statement:Lengkapkan pernyataan berikut.Information and Communication Technology is the use of computers,(i) ...........................devices and (ii)  ............................applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.Teknologi Maklumat dan Komunikasi adalah penggunaan komputer, peranti (i) ……......................dan (ii)  ............................. aplikasi untuk memproses ,menyimpan , mencapai semula, melindungi dan menghantar maklumat dari mana-mana tempat pada bila-bila masa.(ii) 

    Correct Answer
    software
    perisian
    Explanation
    Information and Communication Technology is the use of computers, software, devices and perisian applications for processing, storing, retrieving, protecting and transmitting information from anywhere at anytime.

    Rate this question:

  • 6. 

    State whether the following statement is True or False.Nyatakan sama ada pernyataan berikut Benar atau Palsu.Cyber law is a system of moral standards or values used as a guideline for computer users.Undang-undang siber adalah sistem moral piawai atau nilai-nilai yang digunakan sebagai panduan bagi pengguna komputer.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    False. Cyber law is not a system of moral standards or values used as a guideline for computer users. It is a set of legal rules and regulations that govern the use of computers, the internet, and related technologies. These laws are designed to protect individuals and organizations from cybercrimes, such as hacking, identity theft, and online fraud.

    Rate this question:

  • 7. 

    Table shows the characteristics of X and Y in computer usage guideline.Jadual menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaankomputer. XYMoral guidelines for computer users.Garis panduan moral untuk pengguna komputer.Rules for computer users.Peraturan-peraturan untuk pengguna komputer.No penalty or punishment.Tiada penalti atau hukuman.Penalties or punishments imposed.Penalti atau htLkuman dikenakan.Based on the table, state:Berdasarkan jadual itu, nyatakan: (i)  X

    Correct Answer
    ethics
    etika
    computer ethics
    etika komputer
    Explanation
    The table shows the characteristics of X and Y in computer usage guidelines. Based on the table, X is associated with ethics, which refers to the moral principles and values that guide computer users' behavior. This can also be referred to as etika or computer ethics in the context of computer usage guidelines.

    Rate this question:

  • 8. 

    Table shows the characteristics of X and Y in computer usage guideline.Jadual menunjukkan ciri-ciri X dan Y dalam garis panduan penggunaankomputer. XYMoral guidelines for computer users.Garis panduan moral untuk pengguna komputer.Rules for computer users.Peraturan-peraturan untuk pengguna komputer.No penalty or punishment.Tiada penalti atau hukuman.Penalties or punishments imposed.Penalti atau htLkuman dikenakan.Based on the table, state:Berdasarkan jadual itu, nyatakan: (ii)  Y

    Correct Answer
    law
    undang-undang
    cyber law
    undang-undang siber
    Explanation
    The table shows the characteristics of X and Y in computer usage guidelines. It states that X has "No penalty or punishment" while Y has "Penalties or punishments imposed." Based on this information, we can infer that Y is related to law and specifically cyber law, as it involves penalties and punishments for violations in the context of computer usage.

    Rate this question:

  • 9. 

    Computer ethics refers to theEtika Komputer merujuk kepada​I     study about moral principal for computer user.      kajian mengenai nilai moral untuk pengguna komputer.II    custom that guides human behavior in cyber world.      budaya yang membimbing tingkah laku manusia dalam dunia siber.III   regulation that must be obeyed by the public.      peraturan yang perlu dipatuhi oleh orang awam.IV  knowledge about what is good and what is bad when using computer.     pengetahuan mengenai apa yang baik dan apa yang buruk apabila menggunakan komputer.

    • A.

      I, II and III

    • B.

      I, II and IV

    • C.

      I, III and IV

    • D.

      II, III and IV

    Correct Answer
    B. I, II and IV
    Explanation
    The correct answer is I, II and IV. This is because computer ethics refers to the study of moral principles for computer users, the customs that guide human behavior in the cyber world, and the knowledge about what is good and what is bad when using a computer. Regulation that must be obeyed by the public is not specifically mentioned in the given explanation.

    Rate this question:

  • 10. 

    Figure shows how cryptography works.Rajah menunjukkan bagaimana kriptografi berfungsi.Based on the figure, name H :Berdasarkan rajah itu, namakan H :

    Correct Answer
    cipher text
    Explanation
    Based on the figure, the label "H" corresponds to the term "cipher text". The figure likely illustrates the process of cryptography, where plain text is transformed into cipher text using encryption algorithms. The cipher text is the result of the encryption process and is typically unreadable without the corresponding decryption key.

    Rate this question:

  • 11. 

    Figure shows information on two types of authentication methods.Rajah menunjukkan maklumat tentang dua jenis kaedah pengesahan.Based on the figure, state the name ofBerdasarkan rajah itu, namakan(i) P

    Correct Answer
    call back system
    callback system
    Explanation
    The correct answer is "call back system" or "callback system". This is because the figure shows information about two types of authentication methods, and one of them is represented by a diagram that depicts a process where the system calls back to the user to verify their identity. This method is commonly known as a call back system or callback system.

    Rate this question:

  • 12. 

    Figure shows information on two types of authentication methods.Rajah menunjukkan maklumat tentang dua jenis kaedah pengesahan.Based on the figure, state the name ofBerdasarkan rajah itu, namakan(ii) Q

    Correct Answer
    biometrics
    biometrik
    Explanation
    The figure provides information on two types of authentication methods, and based on the information given, the name of the second authentication method is "biometrics" or "biometrik".

    Rate this question:

  • 13. 

    Figure shows part of an algorithm for a web page filter.Rajah menunjukkan sebahagian daripada algoritma penapisan laman web.State the filtering method used in the algorithm.Nyatakan nama kaedah penapisan yang digunakan dalam algoritma itu.

    Correct Answer
    keyword blocking
    Explanation
    The algorithm in the figure is using the method of keyword blocking. This means that it filters web pages by blocking access to those that contain specific keywords.

    Rate this question:

  • 14. 

    Complete the following statement:Lengkapkan pernyataan berikut:                                                                                                                       Ahmad want to control the access to the controversial contents before his kids use the Internet.  Ahmad decides to use ________________ process.  He lists the websites that he will block with Internet-filtering software. Ahmad  mahu mengawal akses kepada kandungan kontroversi sebelum anaknya menggunakan Internet.  Ahmad memutuskan untuk menggunakan proses ________________.  Beliau menyenaraikan laman-laman web yang hendak disekat dengan menggunakan perisian tapisan Internet. 

    Correct Answer
    site blocking
    sekatan laman
    website blocking
    web site blocking
    sekatan laman web
    sekatan laman sesawang
    Explanation
    Ahmad wants to control the access to controversial content on the Internet for his kids. To do so, he decides to use a process called site blocking or website blocking. He lists the websites that he wants to block using internet-filtering software. This process will prevent his children from accessing the controversial content on those websites. The term "site blocking" refers to the action of blocking specific websites or web pages, while "sekatan laman" and "sekatan laman web" are the translations of "site blocking" in the Malay language. "Sekatan laman sesawang" is another possible translation for "web site blocking".

    Rate this question:

  • 15. 

    Complete the following statement:Lengkapkan pernyataan berikut:                                                                                                                        Ah Chong want to control the access to the controversial contents before his kids use the Internet.  Ah Chong chooses ________________ process.  He sets the browser to only accept pages with certain level of ratings. Ah Chong mahu mengawal akses kepada kandungan kontroversi sebelum anaknya  menggunakan Internet. Ah Chong memilih proses ________________.  Beliau menetapkan pelayar web agar hanya menerima halaman yang mempunyai tahap penilaian tertentu.

    Correct Answer
    web rating system
    sistem penarafan laman
    sistem penarafan laman web
    sistem penarafan laman sesawang
    sistem penarafan web
    webrating system
    Explanation
    Ah Chong wants to control the access to controversial content before his kids use the Internet, so he chooses the process of setting the browser to only accept pages with a certain level of ratings. This process is known as a web rating system or sistem penarafan laman web in Malay. It allows Ah Chong to filter out inappropriate or controversial content and ensure that his kids only access websites that have been rated as suitable for their age and preferences.

    Rate this question:

  • 16. 

    Figure shows the display of an internet filtering software.Rajah menunjukkan paparan pada satu perisian penapisan internet. Based on the figure, state the method used.Berdasarkan rajah itu, nyatakan kaedah yang digunakan.

    Correct Answer
    site blocking
    sekatan laman
    website blocking
    web site blocking
    sekatan laman web
    sekatan laman sesawang
    Explanation
    The correct answer is "site blocking" or "sekatan laman" or "website blocking" or "web site blocking" or "sekatan laman web" or "sekatan laman sesawang". This method refers to the act of preventing access to certain websites or web pages. The internet filtering software displayed in the figure is likely designed to block or restrict access to specific sites, allowing users to control and regulate internet content.

    Rate this question:

  • 17. 

    Table shows the steps of using anti-virus software which is not in thecorrect sequence.Jadual menunjukkan langkah-langkah penggunaan perisian anti-virus yang tidak mengikut urutan yang betul.Step 1 and 3 are given.Langkah 1 dan 3 diberi.Choose anti virus software.Pilih perisian anti virus.J   1Take necessary action.Ambil tindakan yang perlu.KScan the selected area.Imbas kawasan yang dipilih.L   3Select area to be scanned.Pilih kawasan yang akan diimbas.M What is the sequence number for K?Apakah nombor urutan bagi K?

    Correct Answer
    4
    four
    empat
    Explanation
    The question asks for the sequence number for step K. Looking at the given steps, step K is "Scan the selected area" which corresponds to "Imbas kawasan yang dipilih" in the table. Since step K is the third step in the correct sequence, the sequence number for K is 3. However, the answer options provided are 4, four, and empat, which are all incorrect. Therefore, the correct answer is not available.

    Rate this question:

  • 18. 

    Table shows the steps of using anti-virus software which is not in thecorrect sequence.Jadual menunjukkan langkah-langkah penggunaan perisian anti-virus yang tidak mengikut urutan yang betul.Step 1 and 3 are given.Langkah 1 dan 3 diberi.Choose anti virus softwarePilih perisian anti virusJ  1Take necessary actionAmbil tindakan yang perluKScan the selected areaImbas kawasan yang dipilihL  3Select area to be scannedPilih kawasan yang akan diimbasM What is the sequence number for M?Apakah nombor urutan bagi M?

    Correct Answer
    2
    two
    dua
    Explanation
    The correct sequence for using anti-virus software is as follows:
    1. Choose anti-virus software
    2. Select area to be scanned
    3. Take necessary action
    4. Scan the selected area
    Therefore, the sequence number for M is 2.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 27, 2014
    Quiz Created by
    Ustaz Kopmputer
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.