0% found this document useful (0 votes)
353 views8 pages

Pra PSPM 2023 - 2024

The document discusses several topics related to computer systems and information processing: 1. It describes the basic components and functions of a computer system, including input, processing, output, and data storage. 2. It discusses logic gates and Boolean expressions, providing examples of how logic circuits can represent decision-making processes. 3. It proposes a network architecture using surveillance cameras to enable real-time monitoring and efficient data storage at an airport. 4. It differentiates between user access levels at an online bus ticketing company and recommends suitable network infrastructures for business expansion. 5. It identifies areas of computer ethics related to energy efficiency, software licensing, and intellectual property from scenarios provided.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
353 views8 pages

Pra PSPM 2023 - 2024

The document discusses several topics related to computer systems and information processing: 1. It describes the basic components and functions of a computer system, including input, processing, output, and data storage. 2. It discusses logic gates and Boolean expressions, providing examples of how logic circuits can represent decision-making processes. 3. It proposes a network architecture using surveillance cameras to enable real-time monitoring and efficient data storage at an airport. 4. It differentiates between user access levels at an online bus ticketing company and recommends suitable network infrastructures for business expansion. 5. It identifies areas of computer ethics related to energy efficiency, software licensing, and intellectual property from scenarios provided.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
  • Understanding Computer Systems: Includes tasks on converting numerical systems and understanding computer system elements such as input and output processes.
  • Logical Gates and Expressions: Tasks related to building and analyzing logic gates with Boolean expressions.
  • Network Security Architecture: Examines the application of network architecture principles to enhance security systems.
  • Company AiBas Network Accessibility: Discusses network accessibility issues within Company AiBas and includes tasks on domain name alternatives and extensions.
  • Computer Ethics: Covers guidelines and moral questions involving the use of computer systems with practical scenario analyses.
  • Online Marketplace SDLC: Involves defining software development life cycle activities and deliverables for an online marketplace platform project.

1. A computer system is a set of integrated devices that input, output, process, and store data and information.

It's currently built around at least one digital processing device.

(a) Sarah is interested in understanding how the information processing cycle is applied for petrol
purchasing at a modern petrol station by using a credit card as the method of payment. Help her clarify
the different stages of the processes involved. Provide a detailed explanation about the input, process,
output and storage activities.

[6 marks]

Operation Activity

Input

Process

Output

Storage

(b) Convert 110101011102 to decimal. Show your calculations.

[4 marks]

(c) Convert A10B16 to decimal. Show your calculations.

[4 marks]

1
(d) Convert 15FB16 to binary. Show your calculations.

[4 marks]

(e) Both these text files contain exactly the same contents. One is stored using the ASCII character set and
the other in UNICODE. Explain the difference in size used to store both files.

32KB
64KB

[2 marks]
_________________________________________________________________________________
_________________________________________________________________________________

2. A logic gate is a device that acts as a building block for digital circuits. Most electronic devices we use today
will have some form of logic gates in them. Answer the following questions below.

(a) Dhiya is at a coffee shop and she wants to buy a drink. She has three options: coffee or tea. She has
certain preferences that will help her make her decision:

She prefers coffee over tea.


If she chooses tea, she will add honey to it.

Based on Dhiya’s preferences, derive a Boolean expression that represents her decision-making
process for choosing a drink?

2
Use the following variables.
Y = Drink chosen
C = Dhiya chooses coffee
T = Dhiya chooses tea
A = Dhiya adds honey to her tea
[4 marks]

(b) Construct a truth table based on a Boolean expression below.

Z= A⊕ B+C
[8 marks]

3
(c) Hafiz is at the library. He wants to borrow a book to help him do his research for his assignment. In
order to do so, he must have a library membership and the book he wants is available on the rack. He
also needs to be sure that the librarian is not away from the library’s counter.

Based on the scenario above, draw a simple logic circuit along with the list of variables you use to
indicate your logic circuit.
[4 marks]

3. (a) In the security office of a busy airport terminal, the security team is tasked with monitoring the waiting
area to ensure the safety and security of passengers. There are six surveillance cameras strategically
placed throughout the waiting area to monitor customer activities. The security team needs to access
these camera feeds in real-time, review recordings, and control the cameras as needed to respond to
security incidents.
The security office also has a centralized computer system with high processing power and storage
capabilities that can handle video data efficiently. The team needs a network architecture to connect
the cameras to this central system and enable the security personnel to monitor and manage the
surveillance efficiently.

(i) Identify appropriate network architecture that should be used by security teams.
[ 1 mark]
_______________________________________________________________________________

(ii) State the advantages of network architecture that you have identified in Question 3(a)(i) in terms
of real-time monitoring and data storage.
[ 2 mark]
_______________________________________________________________________________

_______________________________________________________________________________

4
(ii) Illustrate the network architecture that you have identified in Question 3(a)(i).
[ 4 mark]

(b) Sazariani are working as an IT consultant for a small business that is planning to expand its operations.
The business currently has a single office location, and they are considering opening a existing office
in a different city. As an IT consultant, Sazariani need to advise them on the network infrastructure
they should set up for their existing and new offices.

Provide recommendations on network type would be suitable for the existing office and the new
office in a different city with the ownership aspect.
[ 4 marks]

Network Classification Ownership

Existing office

New Office

5
4. (a) Company AiBus provides an online bus ticketing service for customers to search and purchase bus
tickets all over Malaysia. All staff, partners and customers need to register an account, so that they
can access the online system but limited to the levels as labeled A, B, and C in the Figure 1.

AiBas Sdn Bhd

C B A

Figure 1

Based on Figure 1 above, differentiate between A and B in terms of accessibility of information by


users in Company AiBus.
[4 marks]

A B

(b) An IP address (Internet Protocol address) is a numerical label assigned to each device participating
in a computer network that uses the Internet Protocol for communication.

(i) Explain one (1) reason why an IPv6 address is composed of 128 bits, whereas an IPv4 address
contains 32 bits.
[2 marks]
_______________________________________________________________________________
_______________________________________________________________________________

(ii) Write one (1) example of a domain name that replaces the need for an IP address when accessing
a website
[2 marks]
_______________________________________________________________________________

(iii) Provide an example of a domain name that combines an educational gTLD (Generic Top-Level
Domain) and a ccTLD (Country Code Top-Level Domain) within the Top-Level Domain
[2 marks]
_______________________________________________________________________________

6
5. (a) Computer ethics is the set of moral guidelines that govern the use of computers and information systems.

Based on the provided scenario, identify areas of computer ethics that are relevant to the situation.
[3 marks]

Scenario Areas of computer ethic

(i) EcoTech Solutions has designed its office space with


energy efficiency in mind. They use LED lighting and
install motion sensors to ensure that lights are only active
when necessary.

(ii) SecureTech Solutions has implemented rigorous


procedures for software procurement and licensing. They
ensure that all software used within the company is acquired
legally, and all necessary licenses are obtained. This
includes both proprietary and open-source software.

(iii) HarmonySounds Records ensures that all artist


contracts clearly outline the ownership and rights associated
with the music created. These contracts specify how
royalties are distributed, and the company respects the
artists' creative control over their work.

(b) Imagine you are participating in an online discussion forum for a class project. One of your classmates,
who has a different opinion, has posted a strongly worded response to your initial post.

Posting : What are your opinions of using social media among youngsters today?
Alia : I found it has good benefits to youngsters including connection, learning and creativity.
Keifli : I found it sucks. HATE IT!
Irdina : For me, social media has become an integral part of the lives of young people today, with a
significant impact on their behavior, social interaction, and mental health.
Keifli : What a stupid opinion, Irdina! Hdgggsishjhkjowjkoj

(i) Give two (2) rules of netiquette that should be applied by Keifli when participating in an online
discussion forum.
[2 marks]
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

(ii) Suggest one feedback should Keifli respond to his friend posting.
[1 mark]
_______________________________________________________________________________
_______________________________________________________________________________

7
6. You are a project manager in WebTech Sdn. Bhd., and you've been assigned to oversee the creation of an
online marketplace platform for a client. The client's vision is to build a comprehensive platform that
connects buyers and sellers, offering a wide range of products with advanced search and recommendation
features.

(a) Identify the suitable SDLC phase for activities below:


[ 3 marks]

Activities details Phase

(i.) Your web designers work on creating a visually appealing


and user-friendly interface. They focus on layout,
navigation, and the overall user experience, ensuring that
it meets the client's vision.

(ii.) You analyze the e-commerce landscape, studying


competitors and industry trends. This research will provide
insights into what features will make the online
marketplace stand out.

(iii.) Your development team begins building the online


marketplace platform based on the design specifications.
This includes coding the application, setting up the
database structure, and integrating various features.

(b.) For every deliverable that produce from the planning phase, give the suitable activities for each
of them.
[ 4 marks]

Planning phase

Deliverable Main Activity

(i.) Estimate and allocate the budget required


for each resource, taking into account
labor costs, equipment, and any other
associated expenses.

(ii.) Review the project's goals and objectives


to ensure they align with the business
requirements.

(iii.) Evaluate the project requirements


against the defined criteria and prioritize
them accordingly.

(iv.) Determine the roles and skills required


for the project, such as project manager,
developers, designers, testers, etc.

END OF QUESTIONS
KERTAS SOALAN TAMAT

You might also like