DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
LG/APR 2009/BEL260/250
CONFIDENTIAL
>
UNIVERSITI TEKNOLOGI MARA
FINAL EXAMINATION
COURSE
PREPARATORY COURSE FOR MUET /
MAINSTREAM ENGLISH II
COURSE CODE
BEL260/250
EXAMINATION
APRIL 2009
TIME
3 HOURS
INSTRUCTIONS TO CANDIDATES
1.
This question paper consists of two (2) parts : PART A (14 Questions)
PART B (1 Question)
2.
Answer ALL questions from all parts in the Question Paper.
3.
Fill in the details below:
UiTM STUDENT CARD NO.
:
PROGRAMME/CODE
:
PART
:
ENGLISH LANGUAGE GROUP :
NAME OF LECTURER
Do not bring any material into the examination room unless permission is given by the
invigilator.
Please check to make sure that this examination pack consists of:
i)
the Question Paper
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 14 printed pages
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
2
LG/APR 2009/BEL 260/250
PART A: READING COMPREHENSION (20 MARKS)
INFORMATION TRANSFER (5 MARKS)
Study the table below and circle the correct answers to the questions that follow.
PRE-TRAVEL VACCINES
WHO SHOULD BE
DISEASE
SCHEDULE
VACCINATED?
Typhoid
Caused by the bacteria
salmonella typhi
•
•
Spread
through
contaminated food or
water - such as food
prepared in unsanitary
conditions
•
Individuals who work closely or
live with a typhoid carrier
•
Travellers to locations where
typhoid fever is common such
as Asia, South America and
Africa
•
The inactivated typhoid vaccine
is administered to children
above the age of two, whereas
the live typhoid vaccine is
administered to children aged
six and above
•
Children who are one year old
and above
•
Children and adults travelling to
countries with a high risk of
Hepatitis A like Africa, Eastern
Europe, certain parts of Asia
and Central America
Two types of vaccines:
inactivated
(injection)
and live (oral)
Hepatitis A
-
•
Caused by a virus and
can result in severe liver
diseases
Spread very easily most
often
through
contaminated food and
water or by close
contact with an infected
person
•
•
Individuals who deal with
Hepatitis A in laboratory work or
research
Individuals with
disease
chronic
liver
•
A single dose of the
inactivated
typhoid
vaccine for two weeks
before travelling
•
The live typhoid vaccine
is given in four doses,
every two days, with the
last dose taken at least
a week before travelling
•
Travellers should be
vaccinated at least a
month prior to their trip
•
Those
who
are
vaccinated less than a
month before a trip
should get an immune
globulin injection for
additional protection
•
The best is to get two
doses of vaccination for
lasting protection
Adapted from Health Today, October 2008
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
3
LG/APR 2009/BEL 260/250
QUESTION 1
Those at risk of contracting Hepatitis A are
a)
children with a high risk of liver disease
b)
individuals with chronic fever
c)
children who are thirteen months old and above
d)
individuals who work closely with typhoid carriers
(1 mark)
QUESTION 2
Why should travellers get an immune globulin injection?
a)
To avoid getting liver disease
b)
To further strengthen one's immunity
c)
To prevent work related diseases
d)
To improve one's health
(1 mark)
QUESTION 3
The following statements are true except
a)
Hepatitis A which is caused by a virus can be spread through food and water.
b)
Age is an important factor to consider when administering typhoid vaccines.
c)
Typhoid fever is commonly found in Asia, South America and Africa.
d)
The virus called salmonella typhi is the cause of typhoid.
(1 mark)
QUESTION 4
A dose of Hepatitis A vaccine does not provide permanent protection.
a)
TRUE
b)
FALSE
c)
NOT STATED
(1 mark)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
4
LG/APR 2009/BEL 260/250
QUESTION 5
Which of the following inferences are false?
I
Before planning a holiday, it is important to get yourself vaccinated.
II
Anyone who has fallen sick while on holiday should be vaccinated.
III
Vaccination is the best protection for those who get fever.
IV
When visiting countries that have a high risk of typhoid and Hepatitis A, vaccines are
advisable.
a)
I and III
b)
I, II and ill
c)
III and IV
d)
I and IV
(1 mark)
PASSAGE I (8 MARKS)
Read the passage below and answer the questions that follow.
I
Obesity in children has reached epidemic levels. Experts estimate that 15 per
cent
of children are overweight and another 15 per cent are at risk of
becoming overweight. Two-thirds of these overweight children will become
overweight adults. With the rise in childhood obesity, treatment is an important
goal for all parents. The usual routes to getting overweight children to slim
5
down are exercise programmes, behavior modification and sometimes
medication. However, there is a new type of treatment to consider- reading.
II
A recent study found that after reading a book with the underlying message of
getting healthy through physical activity and good nutrition, girls aged between
nine and 13 showed a slight decrease in their body mass index (BMI). The
10
book in question is Lake Rescue, part of the Beacon Street Girls series that
tackles issues like cyber bullying and divorce. In this book, an overweight girl
goes to an outdoor adventure camp with her class. Although worried about
being picked on for being heavy, she finds a role model who teaches her
about becoming healthier through eating right and trying new activities.
© Hak Cipta Universiti Teknologi MARA
15
CONFIDENTIAL
CONFIDENTIAL
III
5
LG/APR 2009/BEL 260/250
"It's a soft- sell message that seems to get through," says Alexandra Russell, a
medical student at the Duke University School of Medicine in Durham, North
Carolina, and lead author of the study presented at the Obesity Society's
annual scientific meeting in Phoenix, Arizona recently.
IV
Participants in the study were 64 obese girls who enrolled in Duke's Healthy
20
Lifestyle programme. They were divided into three groups and were tracked for
one to three months. The first group did not read any books while the second
group read books that did not deal with health and weight-loss issues. The
third group of participants was given Lake Rescue to read. As a result, the first
group increased its BMI scores by 0.05%, the second group brought down its
25
BMI scores by 0.17%, while the third group which read Lake Rescue reduced
its BMI scores by 0.33%. Even though the numbers shown are not significant,
the fact that they were able to lose weight is more important. It is the first step
in reversing the trend and that might be enough to kickstart them into adopting
a healthier lifestyle. Shifting to a healthy living approach encourages positive
30
behavior and attitudes that support health, wholeness and well-being.
V
Russell attributes the BMI reduction in the second group of girls to the fact that
they were reading instead of watching TV. Although paediatric obesity is a
complex issue with many contributing factors, Russell believes that something
as simple as a book could help. More kids are overweight today than ever
35
before, and reading possibly might be the means to help them. What parents
can learn from this is that children can change their behaviour, to some extent,
by subtle influences like storybooks. In other words, parents do not really have
to lecture their children about eating right.
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
VI
LG/APR 2009/BEL 260/250
6
The next step, Russell adds, would be to embark on a healthy lifestyle
40
programme which would also include boys. The boys, as well as the girls, need
proper treatment to help them to live more healthy lives. Healthy living choices
nourish the mind, body and spirit. To achieve this goal, friends and family
members can be great motivators. Starting at home, parents can play their
roles in shaping their children's lifestyles and behaviours.
45
Adapted from The Star, November 2008
QUESTION 6
What do the following words and phrases refer to?
a)
a book (line 8)
:
b)
who (line 14)
:
c)
the second group (line 25)
d)
the means (line 36)
(2 marks)
QUESTION 7
Though the amount of weight lost by the participants in the study was not great, why were
the results considered important?
(2 marks)
QUESTION 8
Write T if the statement is TRUE, and F if the statement is FALSE in the space provided.
a)
Exercise, behaviour modification, medication and reading are
frequent treatments for overweight children.
b)
The girls aged between nine and 13 who read books showed a minimal
decrease in their body mass index (BMI).
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
c)
7
LG/APR 2009/BEL 260/250
There were 64 children involved in Duke's Healthy Lifestyle programme,
and they were subjected to different conditions.
d)
Russell suggests that parents do not have to lecture their children to
change their social behaviour because reading a book could really help.
(2 marks)
QUESTION 9
What does "It's a soft-sell message that seems to get through" (line 16) mean?
(2 marks)
PASSAGE II (7 MARKS)
It's not news that identity thefts - defined as the use or attempted use of an
account or some identifying information without the owner's permission - are
rampant across Asia. Although there is no official count of the victims in Asia,
Rommel W. Chua of Online Fraud Asia which records and tries to eliminate
online crimes in Asia, says that at least one in 50 Asians who go online
become victims of identity crime. He says more and more people are
complaining of having their personal information stolen in the online forums
and message boards he monitors. No wonder. We live in an age where
everything from tax records to credit card data reside in databases that can
be hacked, phished or pharmed by anyone with
sinister motives and
10
enough know-how.
It is true that consumers have grown savvier - cyber streetwise, if you will.
We shred financial documents and unsolicited, pre-approved credit card
offers; check credit card reports regularly, keep PINs and passwords as
private as possible, delete e-mail from unknown senders as soon as it arrives
© Hak Cipta Universiti Teknologi MARA
15
CONFIDENTIAL
CONFIDENTIAL
III
8
LG/APR 2009/BEL 260/250
and frequently update antivirus, firewall and spam-blocking software. But for
every scam we manage to foil, the crooks are hard at work thinking up of
novel ways to use technology to rip us off. Just as the majority of us have
become aware of phishing, where fraudsters send out bogus e-mails in the
hope of scaring or enticing the naive into giving up personal information at
20
fake websites that resemble those of legitimate businesses - along comes a
new scam utilizing new technology.
IV
Creative thieves are now switching their efforts to "vishing", which uses Voice
over Internet Protocol (VoIP) phones instead of a misdirected Web link to
steal user information. Vishing is a sophisticated phone scam from traditional
25
web-based phishing attacks. The scam is so new that police forces are yet to
obtain statistics on the number of victims. The crooks get their victims to dial
a VoIP phone that can recognize telephone keystrokes. Lulled by the
familiarity of a typical bank's answering service, even web-savvy people obey
the computer generated voice instruction to enter their credit card number
30
using the phone keypad. Once the consumer enters his credit card number,
the visher has the information necessary to place false charges on the
victim's card. Vishing operations are cheap and easy to set up, making them
an ideal scam. Anyone can anonymously pay for a telephone number for a
specific regional exchange anywhere else in the world.
V
35
Common sense is the first line of defense, as credit card companies will
normally address you by your first and last name in any communication. So,
being addressed by your full name should raise the alarm that the message
might be a vishing attempt. You should also never call a telephone number
provided in a phone call or an e-mail. Instead, immediately call the telephone
40
number on the back of your credit card company or on your bank statement.
If the call is legitimate, then your credit card company or bank will have a
record of the problem and will be able to assist you.
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
VI
9
LG/APR 2009/BEL 260/250
Spyware is another big problem. At its most harmless, it is merely an
annoyance, spawning unwanted advertising, like pop-ups. In its more
45
immoral form, it can arrive as a "Trojan downloader", a programme that lies
dormant in a computer, only to perk up later to retrieve and install a
destructive code under a hacker's direction. Among the most treacherous
new cons: "keystroke-logging", in which software planted on a computer
(perhaps via a virus) records everything a user types and passes it back to
50
an identity thief. Then there are "screen scrapers", which can snatch and
send images of what is on-screen. The programmes can also track your
online habits by recording keystrokes, passwords and even your PIN.
Adapted from Reader's Digest, November 2007
QUESTION 10
Give the meaning of the following words as used in the passage.
a)
sinister (line 10)
:
b)
savvier(line 12)
:
c)
ideal (line 34)
:
d)
legitimate (line 42)
:
(2 marks)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
10
LG/APR 2009/BEL 260/250
QUESTION 11
Write T if the statement is TRUE, and F if the statement is FALSE in the space provided.
a)
Rommel W. Chua claims that 50% of Asians have had
their
personal information stolen from the online forums and message
boards.
b)
The more online users try to keep their details as confidential as
possible, the harder the crooks are at work thinking up new ways to
use technology to cheat us.
c)
"Vishing" is not the latest technique in computer scams.
d)
Computer users should only rely on their common sense to protect
their online personal transactions.
(2 marks)
QUESTION 12
"The scam is so new that police forces are yet to obtain statistics on the number of victims"
(lines 26 - 27).
What inference can we make about the police from this statement?
(1 mark)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
11
LG/APR 2009/BEL 260/250
QUESTION 13
Identify the correct statement.
a)
"Screen scrapers" is a gadget used by the online users to keep their personal
information safe whenever they are logged on to the Internet.
b)
A "Trojan downloader" is a software that will be activated once the online users keyin their PIN.
c)
"Keystroke-logging" allows an identity thief to have access to everything that is typed
online by a user.
d)
Voice over Internet Protocol (VoIP) recognizes any user's voice.
(1 mark)
QUESTION 14
"...even web-savvy people obey the computer generated voice instruction..." (lines 29-30).
Why?
(1 mark)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
12
LG/APR 2009/BEL 260/250
PART B: WRITING (20 MARKS)
QUESTION 1
All university students must be encouraged to find course-related jobs during the long
semester break. Give your opinion. You should write at least 350 words.
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
© Hak Cipta Universiti Teknologi MARA
13
LG/APR 2009/BEL 260/250
CONFIDENTIAL
CONFIDENTIAL
14
LG/APR 2009/BEL 260/250
(20 marks)
END OF QUESTION PAPER
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
>
UNIVERSITI TEKNOLOGI MARA
FINAL EXAMINATION
COURSE
PREPARATORY COURSE FOR MUET /
MAINSTREAM ENGLISH II
COURSE CODE
BEL260/250
EXAMINATION
APRIL 2009
TIME
3 HOURS
INSTRUCTIONS TO CANDIDATES
1.
This question paper consists of two (2) parts : PART A (14 Questions)
PART B (1 Question)
2.
Answer ALL questions from all parts in the Question Paper.
3.
Fill in the details below:
UiTM STUDENT CARD NO.
:
PROGRAMME/CODE
:
PART
:
ENGLISH LANGUAGE GROUP :
NAME OF LECTURER
Do not bring any material into the examination room unless permission is given by the
invigilator.
Please check to make sure that this examination pack consists of:
i)
the Question Paper
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 14 printed pages
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
2
LG/APR 2009/BEL 260/250
PART A: READING COMPREHENSION (20 MARKS)
INFORMATION TRANSFER (5 MARKS)
Study the table below and circle the correct answers to the questions that follow.
PRE-TRAVEL VACCINES
WHO SHOULD BE
DISEASE
SCHEDULE
VACCINATED?
Typhoid
Caused by the bacteria
salmonella typhi
•
•
Spread
through
contaminated food or
water - such as food
prepared in unsanitary
conditions
•
Individuals who work closely or
live with a typhoid carrier
•
Travellers to locations where
typhoid fever is common such
as Asia, South America and
Africa
•
The inactivated typhoid vaccine
is administered to children
above the age of two, whereas
the live typhoid vaccine is
administered to children aged
six and above
•
Children who are one year old
and above
•
Children and adults travelling to
countries with a high risk of
Hepatitis A like Africa, Eastern
Europe, certain parts of Asia
and Central America
Two types of vaccines:
inactivated
(injection)
and live (oral)
Hepatitis A
-
•
Caused by a virus and
can result in severe liver
diseases
Spread very easily most
often
through
contaminated food and
water or by close
contact with an infected
person
•
•
Individuals who deal with
Hepatitis A in laboratory work or
research
Individuals with
disease
chronic
liver
•
A single dose of the
inactivated
typhoid
vaccine for two weeks
before travelling
•
The live typhoid vaccine
is given in four doses,
every two days, with the
last dose taken at least
a week before travelling
•
Travellers should be
vaccinated at least a
month prior to their trip
•
Those
who
are
vaccinated less than a
month before a trip
should get an immune
globulin injection for
additional protection
•
The best is to get two
doses of vaccination for
lasting protection
Adapted from Health Today, October 2008
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
3
LG/APR 2009/BEL 260/250
QUESTION 1
Those at risk of contracting Hepatitis A are
a)
children with a high risk of liver disease
b)
individuals with chronic fever
c)
children who are thirteen months old and above
d)
individuals who work closely with typhoid carriers
(1 mark)
QUESTION 2
Why should travellers get an immune globulin injection?
a)
To avoid getting liver disease
b)
To further strengthen one's immunity
c)
To prevent work related diseases
d)
To improve one's health
(1 mark)
QUESTION 3
The following statements are true except
a)
Hepatitis A which is caused by a virus can be spread through food and water.
b)
Age is an important factor to consider when administering typhoid vaccines.
c)
Typhoid fever is commonly found in Asia, South America and Africa.
d)
The virus called salmonella typhi is the cause of typhoid.
(1 mark)
QUESTION 4
A dose of Hepatitis A vaccine does not provide permanent protection.
a)
TRUE
b)
FALSE
c)
NOT STATED
(1 mark)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
4
LG/APR 2009/BEL 260/250
QUESTION 5
Which of the following inferences are false?
I
Before planning a holiday, it is important to get yourself vaccinated.
II
Anyone who has fallen sick while on holiday should be vaccinated.
III
Vaccination is the best protection for those who get fever.
IV
When visiting countries that have a high risk of typhoid and Hepatitis A, vaccines are
advisable.
a)
I and III
b)
I, II and ill
c)
III and IV
d)
I and IV
(1 mark)
PASSAGE I (8 MARKS)
Read the passage below and answer the questions that follow.
I
Obesity in children has reached epidemic levels. Experts estimate that 15 per
cent
of children are overweight and another 15 per cent are at risk of
becoming overweight. Two-thirds of these overweight children will become
overweight adults. With the rise in childhood obesity, treatment is an important
goal for all parents. The usual routes to getting overweight children to slim
5
down are exercise programmes, behavior modification and sometimes
medication. However, there is a new type of treatment to consider- reading.
II
A recent study found that after reading a book with the underlying message of
getting healthy through physical activity and good nutrition, girls aged between
nine and 13 showed a slight decrease in their body mass index (BMI). The
10
book in question is Lake Rescue, part of the Beacon Street Girls series that
tackles issues like cyber bullying and divorce. In this book, an overweight girl
goes to an outdoor adventure camp with her class. Although worried about
being picked on for being heavy, she finds a role model who teaches her
about becoming healthier through eating right and trying new activities.
© Hak Cipta Universiti Teknologi MARA
15
CONFIDENTIAL
CONFIDENTIAL
III
5
LG/APR 2009/BEL 260/250
"It's a soft- sell message that seems to get through," says Alexandra Russell, a
medical student at the Duke University School of Medicine in Durham, North
Carolina, and lead author of the study presented at the Obesity Society's
annual scientific meeting in Phoenix, Arizona recently.
IV
Participants in the study were 64 obese girls who enrolled in Duke's Healthy
20
Lifestyle programme. They were divided into three groups and were tracked for
one to three months. The first group did not read any books while the second
group read books that did not deal with health and weight-loss issues. The
third group of participants was given Lake Rescue to read. As a result, the first
group increased its BMI scores by 0.05%, the second group brought down its
25
BMI scores by 0.17%, while the third group which read Lake Rescue reduced
its BMI scores by 0.33%. Even though the numbers shown are not significant,
the fact that they were able to lose weight is more important. It is the first step
in reversing the trend and that might be enough to kickstart them into adopting
a healthier lifestyle. Shifting to a healthy living approach encourages positive
30
behavior and attitudes that support health, wholeness and well-being.
V
Russell attributes the BMI reduction in the second group of girls to the fact that
they were reading instead of watching TV. Although paediatric obesity is a
complex issue with many contributing factors, Russell believes that something
as simple as a book could help. More kids are overweight today than ever
35
before, and reading possibly might be the means to help them. What parents
can learn from this is that children can change their behaviour, to some extent,
by subtle influences like storybooks. In other words, parents do not really have
to lecture their children about eating right.
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
VI
LG/APR 2009/BEL 260/250
6
The next step, Russell adds, would be to embark on a healthy lifestyle
40
programme which would also include boys. The boys, as well as the girls, need
proper treatment to help them to live more healthy lives. Healthy living choices
nourish the mind, body and spirit. To achieve this goal, friends and family
members can be great motivators. Starting at home, parents can play their
roles in shaping their children's lifestyles and behaviours.
45
Adapted from The Star, November 2008
QUESTION 6
What do the following words and phrases refer to?
a)
a book (line 8)
:
b)
who (line 14)
:
c)
the second group (line 25)
d)
the means (line 36)
(2 marks)
QUESTION 7
Though the amount of weight lost by the participants in the study was not great, why were
the results considered important?
(2 marks)
QUESTION 8
Write T if the statement is TRUE, and F if the statement is FALSE in the space provided.
a)
Exercise, behaviour modification, medication and reading are
frequent treatments for overweight children.
b)
The girls aged between nine and 13 who read books showed a minimal
decrease in their body mass index (BMI).
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
c)
7
LG/APR 2009/BEL 260/250
There were 64 children involved in Duke's Healthy Lifestyle programme,
and they were subjected to different conditions.
d)
Russell suggests that parents do not have to lecture their children to
change their social behaviour because reading a book could really help.
(2 marks)
QUESTION 9
What does "It's a soft-sell message that seems to get through" (line 16) mean?
(2 marks)
PASSAGE II (7 MARKS)
It's not news that identity thefts - defined as the use or attempted use of an
account or some identifying information without the owner's permission - are
rampant across Asia. Although there is no official count of the victims in Asia,
Rommel W. Chua of Online Fraud Asia which records and tries to eliminate
online crimes in Asia, says that at least one in 50 Asians who go online
become victims of identity crime. He says more and more people are
complaining of having their personal information stolen in the online forums
and message boards he monitors. No wonder. We live in an age where
everything from tax records to credit card data reside in databases that can
be hacked, phished or pharmed by anyone with
sinister motives and
10
enough know-how.
It is true that consumers have grown savvier - cyber streetwise, if you will.
We shred financial documents and unsolicited, pre-approved credit card
offers; check credit card reports regularly, keep PINs and passwords as
private as possible, delete e-mail from unknown senders as soon as it arrives
© Hak Cipta Universiti Teknologi MARA
15
CONFIDENTIAL
CONFIDENTIAL
III
8
LG/APR 2009/BEL 260/250
and frequently update antivirus, firewall and spam-blocking software. But for
every scam we manage to foil, the crooks are hard at work thinking up of
novel ways to use technology to rip us off. Just as the majority of us have
become aware of phishing, where fraudsters send out bogus e-mails in the
hope of scaring or enticing the naive into giving up personal information at
20
fake websites that resemble those of legitimate businesses - along comes a
new scam utilizing new technology.
IV
Creative thieves are now switching their efforts to "vishing", which uses Voice
over Internet Protocol (VoIP) phones instead of a misdirected Web link to
steal user information. Vishing is a sophisticated phone scam from traditional
25
web-based phishing attacks. The scam is so new that police forces are yet to
obtain statistics on the number of victims. The crooks get their victims to dial
a VoIP phone that can recognize telephone keystrokes. Lulled by the
familiarity of a typical bank's answering service, even web-savvy people obey
the computer generated voice instruction to enter their credit card number
30
using the phone keypad. Once the consumer enters his credit card number,
the visher has the information necessary to place false charges on the
victim's card. Vishing operations are cheap and easy to set up, making them
an ideal scam. Anyone can anonymously pay for a telephone number for a
specific regional exchange anywhere else in the world.
V
35
Common sense is the first line of defense, as credit card companies will
normally address you by your first and last name in any communication. So,
being addressed by your full name should raise the alarm that the message
might be a vishing attempt. You should also never call a telephone number
provided in a phone call or an e-mail. Instead, immediately call the telephone
40
number on the back of your credit card company or on your bank statement.
If the call is legitimate, then your credit card company or bank will have a
record of the problem and will be able to assist you.
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
VI
9
LG/APR 2009/BEL 260/250
Spyware is another big problem. At its most harmless, it is merely an
annoyance, spawning unwanted advertising, like pop-ups. In its more
45
immoral form, it can arrive as a "Trojan downloader", a programme that lies
dormant in a computer, only to perk up later to retrieve and install a
destructive code under a hacker's direction. Among the most treacherous
new cons: "keystroke-logging", in which software planted on a computer
(perhaps via a virus) records everything a user types and passes it back to
50
an identity thief. Then there are "screen scrapers", which can snatch and
send images of what is on-screen. The programmes can also track your
online habits by recording keystrokes, passwords and even your PIN.
Adapted from Reader's Digest, November 2007
QUESTION 10
Give the meaning of the following words as used in the passage.
a)
sinister (line 10)
:
b)
savvier(line 12)
:
c)
ideal (line 34)
:
d)
legitimate (line 42)
:
(2 marks)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
10
LG/APR 2009/BEL 260/250
QUESTION 11
Write T if the statement is TRUE, and F if the statement is FALSE in the space provided.
a)
Rommel W. Chua claims that 50% of Asians have had
their
personal information stolen from the online forums and message
boards.
b)
The more online users try to keep their details as confidential as
possible, the harder the crooks are at work thinking up new ways to
use technology to cheat us.
c)
"Vishing" is not the latest technique in computer scams.
d)
Computer users should only rely on their common sense to protect
their online personal transactions.
(2 marks)
QUESTION 12
"The scam is so new that police forces are yet to obtain statistics on the number of victims"
(lines 26 - 27).
What inference can we make about the police from this statement?
(1 mark)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
11
LG/APR 2009/BEL 260/250
QUESTION 13
Identify the correct statement.
a)
"Screen scrapers" is a gadget used by the online users to keep their personal
information safe whenever they are logged on to the Internet.
b)
A "Trojan downloader" is a software that will be activated once the online users keyin their PIN.
c)
"Keystroke-logging" allows an identity thief to have access to everything that is typed
online by a user.
d)
Voice over Internet Protocol (VoIP) recognizes any user's voice.
(1 mark)
QUESTION 14
"...even web-savvy people obey the computer generated voice instruction..." (lines 29-30).
Why?
(1 mark)
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
12
LG/APR 2009/BEL 260/250
PART B: WRITING (20 MARKS)
QUESTION 1
All university students must be encouraged to find course-related jobs during the long
semester break. Give your opinion. You should write at least 350 words.
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL
CONFIDENTIAL
© Hak Cipta Universiti Teknologi MARA
13
LG/APR 2009/BEL 260/250
CONFIDENTIAL
CONFIDENTIAL
14
LG/APR 2009/BEL 260/250
(20 marks)
END OF QUESTION PAPER
© Hak Cipta Universiti Teknologi MARA
CONFIDENTIAL