Uploaded by Nabonita Naboni

question bank paper 1

advertisement
™
Cambridge IGCSE
INFORMATION AND COMMUNICATION TECHNOLOGY
Important past paper questions & marking scheme
S
R
.
h
t
i
j
n
a
2
1
Complete the following sentences using the most appropriate words from the list.
centre
double line space
footer
gutter
hanging
header
indented
justified
left
wrapping
(a) A margin between the main content of the page and the fold of a book is called a
(b) An area at the top of a page is called a
(c) Feature of word processing that causes text to flow around an image is called
(d) When text is aligned along both the left and right margins this is called
Question
Answer
Marks
1(a)
Gutter
1
1(b)
Header
1
1(c)
Wrapping
1(d)
Justified
2
h
t
ji
n
a
R
Three from, for example: SMS
Making/receiving a phone call Checking the time
Use appointments/calendar Taking pictures
Record sound
Bluetooth to share files
.
S
(b) Give two advantages of using a smartwatch rather than a smartphone.
2(b)
Two from:
More accessible/portable as it is on the wrist
Less chance of being lost/stolen/forgotten
Less chance of it being dropped as it is fastened to the wrist Can access simple apps easier
for example heart rate/timer
(c) Give two disadvantages of using a smartwatch rather than a smartphone.
2(c)
1
Smartphones and smartwatches can be used in everyday life. A smartwatch is a wearable computer
in the form of a wrist-watch.
(a) Apart from accessing the internet, give three other uses of a smartphone.
2(a)
1
Two from:
Smaller screen size therefore difficult to see
More difficult to enter the data
More difficult to access detailed apps for example, email
1
3
According to research carried out on passwords the top three most used passwords are 12345,
qwerty and sunshine.
Describe, using other examples, the difference between a weak password and a strong password.
Max three from:
Weak password is easy to guess
Weak passwords consist of all letters or all digits or all digits with one letter/all
letters with one digit//words found in a dictionary//Strong passwords use a
mixture of upper case, lower case, symbols and digits
Weak password is one that has less than 8 characters
Weak password has repeated characters
Weak password has characters next to each other on a QWERTY keyboard
Weak passwords are ones that are similar to the username
Weak passwords can use personal information
All of the examples given in the question are weak passwords
Max two from:
A good example of a strong password
A good example of a different weak password
2
A student is carrying out a scientific experiment to measure the temperature of a liquid as it cools
down. The student uses a sensor connected to a computer to read the temperature.
h
t
ji
(a) Give three advantages of using computers and sensors rather than the student taking the
temperature readings herself.
n
a
R
Three from:
Measurements can be taken continually
Safer to take the measurements
Measurements can be taken outside school hours
The computer will not forget to take readings
Readings are taken at a more consistent time interval
The computer reads the data more accurately
.
S
(b) Describe how the readings taken by the sensor are displayed on a graph using the computer.
Six from:
The data from the sensor is read/received by the computer
The data is converted to digital by the ADC
The software is opened on the computer
The graph type is loaded/selected
The data is uploaded to the graph
The graph is plotted/created
Axes/legend/title added
(c) Explain the differences between measurement systems and control systems.
Four from:
Measurement
Automatically detects changes in the environment
Measurement takes the readings and stores the result
Measures/reads physical quantities
Control
Changes the environment
Compares against preset value
Action taken depending on comparison to preset value
To gain full marks the description must have correct answers for both
measurement and control
4
3
There have been major issues regarding the accuracy of facial recognition systems for identifying
suspects by the police.
Tawara Airport has installed biometric security including facial recognition systems to help the
police recognise known criminals entering and leaving the country. Previously video was taken of
all passengers and then checked manually.
(a) Discuss the effectiveness of using facial recognition systems rather than the manual video
system to increase security in this way.
Eight from:
For
Face can be identified faster
Face can be identified by electronic comparison therefore relative higher level
of accuracy
Facial recognition can uniquely identify individuals
Can automatically compare faces from older images
System can work continuously but a human checker would need to take
breaks
Against
Dark glasses/facial hair/face coverings may cause the facial recognition
systems to not work
More difficult to change biometric data
Recognising a person can be slower as more checking is carried out
Harder to set up the facial recognition system
Takes longer to add new people to the system
Biometrics can use a lot of memory to store the data
Intrusive as personal details have to be stored
More likely to be affected by the environment
With the video system each frame needs to be checked with known images
which can lead to errors
.
S
n
a
R
h
t
ji
To gain full marks the discussion must have correct answers for both
for and against
(b) Give three examples of biometric data.
Three from:
Finger print
Hand print
Vein geometry
Retina
Iris
Speech/Voice
5
4
Instant messaging involves users sending text messages to each other.
Evaluate how you would use eSafety strategies in your own use of instant messaging.
Six from:
I block unwanted messages/suspicious users…
…and report the sender
Before using the messaging system, I check how to block and report
unwanted users…
…this stops predators
I never arrange to meet strangers alone
I always tell a responsible adult if I plan to meet someone
I always meet in a public place
I avoid giving away personal information
I report abusive messages from a sender of the messages
I report cyber-bullying
When sending messages I always use appropriate language
If someone messages me with private and personal information about
themselves I respect their confidentiality/privacy
I always read carefully the messages before I send
I avoid sarcasm
I am not offensive when replying
I carefully check that I am replying to the correct person
I do not enable my location when messaging
5
h
t
ji
n
a
R
Discuss the moral implications which need to be considered when creating an ICT solution.
Four from:
What may be immoral in some cultures may be acceptable in others
Just because something is immoral doesn't mean that it is illegal
The ICT solution can cause distress to others/be offensive
Becomes immoral if the person gains from their actions
.
S
Max two marks for examples:
Not creating a website full of false facts/news
Not including obscene/offensive/inappropriate/extreme/blasphemy
/discriminatory content
Not creating a video solution that earns you money by stating false facts/lies
Not creating an ICT solution that coerces people to give money
Invasion of privacy
6
Use of smartphones to access the internet has increased by over 200% in the past five years.
Compare the use of smartphones to access the internet with the use of desktop computers to
access the internet. Your answer must include similarities and differences.
Six from:
Similarities
Both can use Wi-Fi to access the internet
Both can access the internet use hotspots
Both can use Bluetooth Tethering to allow access to the internet
Differences
Desktops
More websites will work with the desktop
Larger keyboards to type in a web address
Larger screens to see the whole webpage
6
More stable and reliable connections
Tends to be a clearer layout to make it easier to access the internet
More accessible information
A desktop can connect to the internet via an ethernet cable
Smartphones
Access the internet from more locations
Easier to look things up on the go
Screen/keyboard built into the device therefore easier to access websites A
smartphone can use mobile data/4G/3G to access the internet
A smartphone is more portable therefore you can access the internet while
travelling
To gain full marks the comparison must have correct answers for both
similarities and differences
(b) Describe the advantages and disadvantages of using a multimedia presentation rather than
a web page on the school website.
Six from:
Advantages
Easier to display to parents
Can take less time to display the information
Quicker to change/update content of the multimedia presentation
More control over the layout of the presentation as not using a third party
browser
More control over the sound in the presentation as using own equipment
People viewing the Multimedia Presentation will be school based
Can be viewed without internet access
.
S
h
t
ji
n
a
R
Disadvantages
The multimedia presentation is only available in the school during school time
whereas a web page can be used in other places
The visitor may not see the whole presentation
The multimedia presentation may not include sound due to being shown in
the school
Multimedia presentations can require expensive hardware to produce and
view
Multimedia seen by less people
Multimedia more expensive software needed to produce the presentation
More specialist training needed to produce it
To gain full marks the description must have correct answers for both
advantages and disadvantages
Due to data protection laws, personal data should be kept confidential and secure.
(b) Explain why personal data should be kept confidential and secure.
Six from:
The data will have the name/medical information attached therefore it needs
protecting
The data is confidential as it links directly to the person
The data will be sensitive
To prevent blackmail/bullying from using medical results
To prevent fraud from using financial information
To prevent identity theft using contact details
To avoid the doctor’s surgery getting fined if it got made public
The doctor’s surgery’s reputation would suffer
Patients would lose trust
7
7
A research student is undertaking a study of endangered animals in the Amazon rainforest. She
is using a drone to replace surveys carried out on foot. A drone is a remote-controlled flying vehicle.
Describe the benefits and drawbacks of using a drone to monitor the animals in the rainforest.
Six from:
Benefits
Safer to use drones than human life being risked in forest areas
Drones can gain a better overall view of the forest than the human
Drones can be used in areas that would not be accessible to humans
Drones can cover a greater area than a human in the time available
Data from the drone can be automatically uploaded to computer system
May change animal behaviour if humans are used//Less invasive for the
animals
Drawbacks
Damp conditions/environment/weather may cause issues with the electronics
Difficult to navigate in the tree areas
Noise/sight of the drone may affect the animals
More chance of collision/bird attack
If drone crashes it could be difficult to find/retrieve
Potential danger to other animals/birds
h
t
ji
To gain full marks the description must have correct answers for both
benefits and drawbacks
8
n
a
R
Smartphones use a Graphical User Interface (GUI).
(a) Give three benefits of using a GUI.
.
S
Three from:
Quick to enter commands
Easy to enter commands
Do not have to learn commands
Less errors as commands not typed
Works with a touch screen
Intuitive
Easy to select options/tasks
9
Workers in an office log onto the office computer network using a password.
(a) Aaron is using his name as his password.
Give two reasons why this is not a good idea.
Two from:
Password is too short
Easy to guess
Contains personal information
Doesn’t contain a mixture of uppercase, lowercase letters, numbers, and
symbols
Contains repeated letters
(b) One method that hackers use to find people’s passwords is to install key-logging spyware onto
computers.
Give two methods that could be used to safely enter passwords even if key-logging spyware
has been installed on a computer.
8
Two from:
Use drop-down lists
Use biometric passwords
Use one use tokens/OTP
Use a device instead of a password
10 The secretary of a sports club is setting up a database of members to replace the current manual
system. He will need to create a database structure.
(a) Describe the steps involved in setting up and testing the database structure before it can be
used in the new system.
11 The secretary of a sports club is setting up a database of members to replace the current manual
system. He will need to create a database structure.
(a) Describe the steps involved in setting up and testing the database structure before it can be
used in the new system.
Max three from:
Load the database software
Set up tables
Set up field names
Set up primary/foreign key fields
Set up relationships
Set up the field types/properties/formatting/data types
Set up the validation routines
Set up input forms
Set up queries/reports
Type in/import records
Create a test strategy/plan
n
a
R
Max three from:
Test using normal, abnormal, and extreme data
If errors are found, make corrections
Re-test the database structure
Test with live data
.
S
h
t
ji
12 In June 2000 the London Millennium Bridge opened to the public but closed shortly afterwards for
repairs. The bridge was swaying as people walked across it. Before bridges are built, computer
models are produced and the models are tested.
Explain why computer models are used before building a bridge.
Four from:
Fewer errors in final version of real item as errors would have been resolved
in model
Saves money as it saves on resources
Safer to run a computer model rather than risking human life
Different scenarios/what ifs can be carried out which may happen in real life/to
experiment
To build the bridge and test it would be impracticable due to cost/time
13 A club has many members. The secretary of the club wants to keep details of the club members
in a database.
(a) Describe the benefits and drawbacks of storing membership details on a computer database.
Six from:
Benefits
Membership details can be searched very quickly as there are many
members
Membership details can be quickly edited/updated
The data in the database can be backed up easily
Easier to create an archive of past members
More secure with a valid reason
Can be used as a source for mail merging
Less errors as data does not have to be re-written
Reduces the time as data does not have to be re-written
Drawbacks
Need IT skills to use the software/computer
Need to have to additional equipment which is expensive
Can take up a lot of storage space/memory in the computer
Expensive to buy software
Expensive to secure the system as it contains personal data
Training staff on how to use the software will be time consuming
Training could be expensive for the club
h
t
ji
To gain full marks the description must have correct answers for both
benefits and drawbacks
(b) The secretary collects data from the members on paper-based forms.
n
a
R
Describe five features of a well-designed paper-based data capture form.
Five from:
Adequate space for response//Individual character boxes
Fonts/font size should be easy to read
Instructions how to complete form
Logical order of questions
Questions spaced out
Appropriate white space
Questions should be clear and understandable
.
S
14 In 2019 Cambridge recorded the highest temperature for July in the UK. The data was collected
automatically using sensors by a weather station and sent to a computer.
Discuss the advantages and disadvantages of using sensors to collect data rather than humans
collecting the data.
Eight from:
Advantages
Readings are taken at a more consistent time interval
The sensor reads the data more accurately
Safer as humans do not need to take the measurements
Computers can analyse the data continuously
Readings taken more frequently
Multiple variables can be monitored at the same time
Disadvantages
Sensors can malfunction due to the temperature
If sensors malfunction this could lead to incorrect readings
Sensors could be stolen
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
15 Many organisations store data in the cloud.
(a) Explain what is meant by the ICT term cloud.
Three from:
Cloud consists of large groups of remote networked servers
They allow centralised data storage
Offsite data storage/servers owned by a third party
Accessed from any internet compatible device
Access from anywhere with an internet connection
(b) Explain the issues of storing data in the cloud.
Six from:
Loss of control of the data as the data is controlled by a data storage provider
Data can be affected without the user knowing
The data remains on the server for a long time therefore more chance of it
being hacked
Many copies of the data made therefore easier to compromise
Users must use strong passwords/authentication methods as hackers have
longer time to be able to crack the password
If internet connection is lost, then the cloud cannot be accessed
If internet connection is lost when data is saved, then data could be lost
A subscription needs to be paid whereas an HDD is one fee
Difficult to delete all copies of a file as it is in multiple locations
h
t
ji
n
a
R
As our use of the cloud increases, new ways of accessing it safely need to be developed.
(c) The use of typed passwords is being replaced by biometric methods.
.
S
Discuss the benefits and drawbacks of using biometric methods.
Eight from:
Benefits
Faster way of accessing systems
Cannot forget the biometric data
Must be physically at the device to access it
More secure as it uses unique data
Difficult to copy/forge
Drawbacks
Invasion of privacy
User may not know they have logged off
Biometrics may change therefore data will need to be kept up to date
Expensive method/technology to set up
Environment can affect measurements
Over usage can affect the measurements
Difficult to reset once compromised
Difficult to set up
Time consuming to set up as measurements must be taken
Facial coverings/changes can prevent system from working
To gain full marks the discussion must have correct answers for both
benefits and drawbacks
Sensors are placed in the river to check the water level. If the water level in the river rises more
than 5m above normal river levels, a flood barrier is raised to safeguard the village. The flood barrier
remains raised until the water level drops to normal levels.
(b) Explain why the data from the sensors cannot be read directly by the computer and name the
device that needs to be used so that the computer can read the data.
Data from sensor is in analogue form
Computer only reads digital data
Analogue to Digital Convertor
(c) Describe how a microprocessor uses the data from the sensors to raise and lower the flood
barrier.
Six from:
Microprocessor reads the data from the ADC
Microprocessor stores pre-set value
Microprocessor compares current water level with preset value
If the current water level is greater than the pre-set value …
… the microprocessor sends a signal ...
… to the DAC to convert data to analogue
… signal sent to an actuator
Actuator raises the flood barrier
Continual process
16 Computers are being used in offices.
h
t
ji
n
a
R
Describe how the use of computers has affected the work of employees and their working patterns.
Max five from:
The use of computers has reduced the number of office staff
Computers can help office staff to be more productive
More employees are working from home due to the increase in technology
Computers can cause less productivity due to distractions
Workers could be working longer hours
De-skilling of staff
Increase in training for staff as they need to learn new skills
Increase in the number of blue-collar workers/supervisors
Increase in the number of maintenance staff/technicians
Higher security issues due to networking
Less people work in offices
.
S
Max two marks:
Increase in part time/job sharing/compressed hours/flexible working/working
from home
Computers have allowed staff to work part-time/compressed hours/job
sharing/flexible working/working from home
17 rtf and pdf are file types.
(a) Describe what is meant by an rtf and a pdf file type.
rtf
Text file with formatting/generic text files
pdf
Standard/generic image file
(b) Explain the differences between the two file types.
9
Three from:
pdf their layout and formatting stay the same, regardless of which
device/operating system/application being used whereas rtf formatting can
change
pdf take up less memory for the same size of document
pdf files are compressed
pdf the formatting can be more complex whereas rtf has basic formatting
pdf are harder to edit
pdf generic image format
rtf can be read by most word processing editors
rtf is a generic text format
18 Proofreading is often confused with visual verification.
Describe the differences between proofreading and visual verification.
Two from:
Visual verification refers to the original document whereas proofreading does
not need to refer to the original document
Proofreading is checking spelling and grammar errors whereas visual
verification does not check for errors
Visual verification checks that the data has been copied correctly
h
t
ji
19) Network devices are used in computer systems.
Complete each sentence by identifying the most appropriate network device
n
a
R
(a) The network device that is used to transmit the data along an analogue
telephone line is a
Modem
(b) The network device that connects a LAN to a WAN is a
Router
(c) The network device that allows data to be directed to a specific
computer on a LAN is a
Switch
(d) The internal network device that allows a computer to connect to a LAN
is a
Network interface Card/NIC
.
S
15
Four from:
Click on the shape/logo A
Slide the corners in to reduce the size of the shape/logo
Keep the aspect ratio//type in the height and width
Fill the shape/logo with black
Highlight the text
Reduce the size of the text
Change the colour of the text to white
Click on the image/train
Reduce the height and width//reduce the size of the image/train
20) A library is considering the way it issues books. The librarians are planning to use RFID rather
than bar codes.
Describe the advantages of using RFID rather than bar codes.
Four from:
RFID are faster to read than bar codes
RFID scanning is more accurate than bar codes
RFID does not need line of sight to read but bar code does
RFID will read the data if the reader is further away
RFID can scan multiple items at the same time
RFID allows greater security
RFID can store more data than a bar code
RFID tags can be rewritten, so can be reused
RFID tags are more robust as bar codes will not scan if damaged
h
t
ji
n
a
R
21) Laptop computers use Solid State Drives (SSD) rather than Hard Disc Drives (HDD).
Describe two disadvantages of using an SSD rather than an HDD in a laptop computer.
.
S
They tend to have a more limited number of read and writes
More expensive per Gb than HDD
22) A patient has an injury and the doctor treating him needs to find out information about the patient.
Most of the data he needs to collect is personal data.
The data collected is protected by data protection legislation. Most data protection acts include the
principle that data should be kept confidential and secure.
(a) List four other principles of a typical data protection act.
Four from:
Data should be fairly and lawfully processed//Data should be processed in a transparent manner
Data should only be processed for the stated purpose
Data should be adequate, relevant and not excessive/limited
Data should not be kept longer than necessary
Data should be processed in accordance with the data subject’s rights
Data should be collected for specific purposes
Data should only be further processed for archive purposes which is compatible with the initial
purposes
Data kept for archiving should safeguard the rights and freedoms of individuals
Explicit consent required for processing sensitive data
Data subjects are allowed access to their personal data
Data should be accurate and kept up to date
Data should not be transferred to another country unless they have adequate protection
Parental consent required for processing personal data of children including online services
16
23) Explain why personal data should be kept confidential and secure.
Four from:
The person can be identified from the data
The data is confidential as it links directly to the person
If someone gets access to the data then they can use the information
to attack the person
If not kept confidential and secure it could lead to home burglaries as
people post holiday details on social media
If not kept confidential and secure it could lead to the chance of users
suffering physical harm
Protects sensitive data
24
h
t
ji
2193733.pdf
b) Write down only the part of the URL which is the folder where the teaching guide is
stored.
igcse-ICT-0417
n
a
R
c) Write down only the part of the URL which is the domain name.
www.cambridgeinternational.org
.
S
d) Explain what is meant by https.
Secure internet protocol
25
=VLOOKUP(F2,A2:B9,2,0)
Four from:
Looks up F2/Airport name
Looks up in the range A2:B9/Code and
Name Finds the corresponding value from
the 2nd column
Displays the value in G2
Finds exact match
26) Before the spreadsheet can be used, data needs to be entered to test the spreadsheet.
There are three types of test data: normal, abnormal and extreme.
Explain what is meant by these three types of test data
Normal
Data that is within the boundary of acceptability
Abnormal
Data that is outside the boundary/limit of acceptability/incorrect data
Extreme
Data on the edge of acceptability
(c) Explain, using examples, the differences between a function and a formula.
Max two from:
Formula
A formula is a statement written by the user
A formula is an equation
A formula can contain values/references to cells/defined names
A formula can contain functions
One mark
Examples =A1+B1, =SUM(A2:B2)
Max two from:
Function
A function is a named piece of code designed to calculate specific values
Functions are used inside formulas
A function is a built in/predefined operation
One mark
Examples SUM/AVERAGE etc
.
S
h
t
ji
n
a
R
The completed file could have been created using a database.
Describe two reasons why databases are used in certain applications rather than spreadsheets.
Two from:
A database can use queries
A database can use relationships
Referential integrity can be enforced in a database
Easier to create forms on a database
Easier to create reports on a database
Better user security
Data is easier to manage in a database
A database can reduce data duplication
27) The prolonged use of computers can cause several health problems particularly when
sitting down
and using monitors.
Discuss the strategies that you have developed to minimise health risks which only relate to
sitting
down and using a monitor.
Eight from:
Use of the monitor
Using a flat screen monitor can reduce eye strain and headaches
I turn the monitor 90 deg to the window to reduce the glare on the screen
If I turn the monitor this can cause problems with the layout of the room
I need to buy a monitor that could tilt to reduce neck ache
I close the window blinds to avoid glare on monitor/headaches
I should not use rooms with more than one window but this could be difficult
I could use a matt screen to prevent glare/headaches
I use a flat screen monitor as there is less flicker therefore reduces the chance of an epileptic seizure/eye
strain/headaches
I keep the screen clear of dust to reduce static and eye strain
I could have my eyesight tested regularly
Brightness of the room should equal the brightness of the screen to prevent eye strain
Enable blue light filter/blue light glasses to prevent eye strain
I could set night light on the computer to prevent eye strain
I sit at arms length from the screen to prevent eye strain
Sitting down
I use an ergonomic chair/standing desk to reduce back and neck pains
I sit with correct posture to help reduce back and neck pain
I use a footrest to reduce DVT/improve posture
If there are wheels on the chair for easy movement I should be careful to avoid injury problems with the chair
moving
backwards
Maximum of six marks if candidate only mention strategies for either sitting down or using a monitor
n
a
R
h
t
ji
28) A car manufacturing company uses computer-controlled robots to manufacture its cars.
Discuss the advantages and disadvantages to the company of using computer-controlled robots
rather than using humans to manufacture the cars.
Six from:
Advantages
Robots can work in sterile/harmful areas which are dangerous for humans
Humans would need protective clothing which would cost the company more money
Robots can more easily be used for transferring large delicate items
Robots can work 24/7
Cheaper in the long run
Higher productivity
More accurate/precise engineering
More frequent checking of the equipment
Fewer workers are needed therefore lowering costs
Production of the cars is more consistent
Disadvantages
Expensive to buy robots
Maintenance is expensive
Requires backup systems, which are expensive
They replace skilled workers, leading to de-skilling
They need constant observation which increases the cost of maintenance crews
To gain full marks the discussion must have correct answers for both advantages and disadvantages
.
S
29) Different methods can be used to analyse a system.
Discuss the benefits and drawbacks of analysing a system by observing staff rather than looking
at the current systems documentation.
Observation
The analyst sees it with their own eyes
Get a complete picture of the whole system
Cheaper as it does not take the worker away from work
Description of the Hawthorne effect
The quality and accuracy of information is highly dependent on the skill of the observer
Examining documents
Can see exact details of inputs, processing and outputs
Saves time as there could be copies of previous analysis
Allows the analyst to predict the size of the new system by analysing the amount of data
Very time consuming to look through all the documents
Very expensive to pay for an analyst to look through all the documents
To gain full marks the discussion must have correct answers for both observation and
examining documents
h
t
ji
30) A librarian in a college department library is entering data into a student borrowers’ file. As
the data
is entered it needs to be verified.
n
a
R
(a) Describe the two types of verification.
One mark for naming the verification and one mark for explanation
Visual verification
Person enters the data it is read through and corrected as needed using the original copy
Double data entry
One from:
Person types the data then retypes the data from the original copy/source
Person types the data and another types the data from the original copy/source
.
S
(b)Explain, using examples, why it is necessary to carry out validation as well as verification for
this system.
Max three from:
Not all errors are found by validation and verification separately
Source document may contain errors
Verification only checks that data is copied correctly
Verification does not check if data is reasonable/sensible
Validation checks are carried out automatically by the computer
Max two examples:
Correct appropriate example of a verification check
e.g. data supplied by the borrower is incorrect on the source document and was copied
Correct appropriate explanation of an example of a validation check
e.g. (Number of books borrowed is 1 misread as a 7; in a range check of 1
–10)
31) Spam is associated with ICT systems. (a) Explain what is meant by the term spam.
Two from:
Spam is junk mail, Sent in large numbers to inboxes, Unwanted/unsolicited emails, Fills the
inbox, Used for advertising, Used for phishing/spreading malware
32) Describe the ways that a user can recognise spam and methods to help prevent it
Max four from:
Multiple spelling/grammatical errors
Asked to carry out tasks immediately
Asking to click on a link
Does not ask for you by name
Stored in a SPAM folder
Email asks for personal information
Large amount of repeated emails from same user
Lots of other similar email addresses in the send to box
Max four from:
Use a spam filter
Not filling your details on online form
Not replying to spam emails
Not having an auto reply set
Not consenting to marketing when providing details to a company
Do not give email address
33) Explain what is meant by cloud storage and how it is used.
n
a
R
Six from:
What it is:
Cloud storage involves storing data in a remote physical
location
Online storage platform
Cloud storage systems use hundreds of interlinked data
servers
Storage system that requires access to the internet
How is it used:
User accesses the cloud storage using the internet
Cloud data can be accessed from any device
Clients send files to a data server
The server is maintained by a cloud provider
Data can be shared with other users
Cloud storage automatically backs up data
If one server fails there are others used as backup
Users pay a monthly/annual fee for storage used
To gain full marks the explanation must have correct answers
for both what it is and how it is used
.
S
h
t
ji
34) Describe two issues related to the security of data in the
cloud.
Two from:
Easier to hack as data is always available
Lose control of your data
More than one copy available to access therefore security is
reduced
More difficult to delete all copies of the data
A company uses corporate house style within the headers and footers in its documents.
(a) Explain what is meant by corporate house style.
Two from:
A set of rules
House style states how all documents and written communication should be formatted
Consistency across all documents in the portfolio of the company
Used to promote the company
Controls how the colours/font style/font size/font type/position of logo/justification of text/position and style
of address
details to be used
– 1 mark for any two items
35) Write down two examples of system software.
Two from:
Compiler
Linker
Operating system
Utilities
Device driver
Interpreter
h
t
ji
36) The internal memory of a computer consists of both ROM and RAM.
(a) Describe the terms ROM and RAM.
Four from:
ROM
Read Only Memory
Non-volatile//Data is not lost when the computer is switched off
Used to store the startup instructions/BIOS
RAM
Random Access Memory
Volatile//Data is lost when the computer is turned off
Stores the current running program/instruction
RAM can be written to and read from
To gain full marks the description must have correct answers for both
ROM and RAM
(b) Modern laptop computers use Solid State Drives (SSD) rather than Hard Disk Drives (HDD).
State three advantages of using SSDs rather than HDDs in a laptop computer.
Three from:
The startup of the laptop is faster
SSDs consume less power than HDD so conserves battery power
Reduces the weight of the laptop as SSD is lighter
Makes the laptop more compact
.
S
37)
n
a
R
38) The World Wide Web (WWW) is often mistaken for the internet.
(a) Explain the differences between the WWW and the internet.
Four from:
WWW is a collection of information pages/websites/web pages
WWW is part of the internet
WWW is accessed through the internet
WWW is a service on the internet
Internet is a global network of networks/Wide Area Network
Internet is the infrastructure
To gain full marks the description must have correct answers for both
WWW and the internet
(b) The web address for Cambridge IGCSE is:
https://www.cambridgeinternational.org/IGCSE
Describe the following parts of the web address.
https://
One from:
This is the hypertext transfer protocol secure
Set of rules/protocol to transfer web pages securely
cambridgeinternational
The domain name
.org
One from:
The top-level domain name
Registered as an organisation
/IGCSE
The folder/sub-directory in which the work is stored on Cambridge
International’s server
.
S
n
a
R
h
t
ji
(39) Global Positioning Systems (GPS) are used for many different applications.
(a) Describe how GPS is used by a smartphone to pinpoint its location.
Four from:
The location of the smartphone is calculated using GPS software
Signal is transmitted by the satellite
Signal is sent almost continuously
The data is saved in the smartphone
The coordinates of the smartphone are shown on the smartphone screen
(b) Give three other examples of the use of GPS.
Three from, for example:
Real time aircraft/ship/drone position
Tracking delivery/stolen vehicles
Ploughing fields
Surveying
Military
Sat-nav in vehicle to reach a destination
40) Tawara School is presenting a concert. For previous concerts the booking of tickets was carried
out manually using pen and paper. For this concert they are going to use an online booking system.
(a) Discuss the advantages and disadvantages of Tawara School using an online booking system
rather than the manual system.
Eight from:
Advantages
Prevents double booking/overbooking
The booking staff can see immediately if the concert is fully booked
Bookings can be made 24×7
Usually cheaper as lower/fewer overheads
Booking staff can more easily see the seats that are available
Disadvantages
Requires the school to purchase expensive hardware
Setting up is more expensive
Maintenance is more expensive
Internet access is needed to run the booking system therefore the cost may
be increased
More reliant on hardware
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
h
t
ji
(b) Identify the most appropriate method of implementation of the new online booking system in
this scenario.
Direct changeover
n
a
R
(c) Explain, giving reasons, why your answer to part (b) is the most appropriate method of
implementation for this scenario.
Three from:
Benefits are immediate
Cheaper as there is only one set of staff
Less chance of the new system being faulty as it is thoroughly tested
Only one system in operation therefore data is not duplicated
.
S
(41) Employees working in an office use computers for prolonged periods of time.
(a) Describe three items that an employee should be provided with to help reduce the health
problems related to prolonged use of computers.
Three from, for example:
Wrist rest
Ergonomic keyboards
Ergonomic chairs
Footrests
Ergonomic mouse
LCD/TFT/LED/anti-glare screens
Voice activated software
Adjustable monitors
(b) The office must be a safe working environment.
State two physical safety issues that might exist from the introduction of computers.
Two from:
Tripping over trailing cables
Fire caused by overheating computers
Fire caused by overloaded sockets
Electrocution caused by spilling drinks on the computer
Electrocution caused by touching live wires
Injuries caused by equipment falling
42) A touch screen is both an input device and an output device. Touch screens are used on many
devices. A tablet computer uses a touch screen.
Describe the advantages and disadvantages of using a touch screen rather than a monitor and
keyboard for the tablet computer.
Six from:
Advantages
The footprint of the computer will be smaller
Fewer peripherals needed therefore saves money
Makes the computer lighter
Easier to select icons
Disadvantages
If the screen is damaged, then the device cannot be used to input data
Keyboards and monitors can be replaced more easily
Large fingers could mis-key data therefore more errors on data entry
Screens can become dirty more easily therefore affects reading of data
To gain full marks the description must have correct answers for both
advantages and disadvantages
h
t
ji
n
a
R
43) When creating an ICT solution, the legal, moral, ethical and cultural implications have to be
considered. Choose the most appropriate implication that matches the descriptions given below.
(a) Ensuring that copyright laws have been followed.
Legal
(b) Not giving information about the ICT solution to another company.
Ethical
.
S
44) The systems analyst is planning to create a relational database. Discuss the advantages and disadvantages
of creating a relational database rather than a flat file database.
Six from:
Advantages
Service details only need to be entered once into the database
Mistakes are less likely to happen when entering data if it already exists
Uses data redundancy
Data can be accessed using key fields
Uses data flexibility
Uses data integrity
Uses data consistency
Better security due to user level access control
Caters for future requirements
Disadvantages
Relational databases can be more complex
Requires training to set up
Harder to set up
Requires a data administrator therefore increasing the costs
To gain full marks the discussion must have correct answers for both
advantages and disadvantages
45) Arjun uses the internet to carry out research for his work. Describe two drawbacks of Arjun using the
internet for research.
Two from:
Information can be unreliable
Unregulated so anyone can post anything
More difficult to find what you are looking for
Vast amount of information//Information overload
Information can be biased/inaccurate
Its slower to find relevant information
Data may be out of date
46) Arjun is a member of the family. He uses the internet to carry out research and send work to
his office. Describe three other ways he could make appropriate use of the internet.
Three from:
Email
Online chat//Instant message
VOIP
Online conference
Streaming music/video/TV on demand
Gaming
Use of the Cloud
Newsgroups
FTP
h
t
ji
n
a
R
47) A computer consists of both hardware and software.
(a) Define the term hardware.
The physical components of the computer
(b) Give two examples of internal hardware devices.
Two from:
Processor
Motherboard
Video/graphic card
Sound card
(c) Define the term software.
One from:
Programs for controlling the operation of a computer
Programs for processing of electronic data
Program/data/applications
(d) There are two types of software: system and applications. Give two examples of applications software.
Two from for example:
Word processing
Spreadsheet
Database
Presentation
.
S
48) Tawara Tours has created a new online booking system to allow customers to book holidays. The
system was written using modules.
(a) Describe how the new system could be tested prior to it becoming operational.
Six from:
Each module is tested separately
Modules are tested by the programmers
Modules/system are tested with live data
Errors and problems are noted
Improvements are made to the module
The module/system is retested
Modules are combined and tested together
System is tested as a whole
System is tested to meet the user’s requirements
49) As a student you often use a computer screen. This could be a screen on a desktop computer, a
laptop computer or even a smartphone.
Evaluate your use of computer screens, in terms of health risks, and explain any strategies you
use to minimise these health risks
Eight from:
Advantages
Prevents double booking
The customer can see immediately when the holiday has been booked
Bookings can be made 24/7
No need to travel to the booking office/queue up so saves time
Can be booked from any location
Saves cost of travelling to the booking office
Tickets are usually sent online and therefore paperless//Saves printing and
postal costs
Usually cheaper as lower/fewer overheads
Customers can more easily see the tours that are available
Disadvantages
Setting up is expensive//maintenance is expensive
Internet access is needed to run the booking system therefore the cost may
be increased
More reliant on server/network
Booking mistakes can be more easily made
Mistakes are more difficult to rectify due to the speed of booking
If the system crashes during the booking the booking may not be made
To gain full marks there must be at least one advantage and one
disadvantage
.
S
h
t
ji
n
a
R
50) Robots are used to spray paint cars in a car production company.
(a) Describe two other jobs that robots can perform in car production.
Two from, for example:
Fit windscreens, Fit the wheels, Welding body panels, Move cars from one place to another
Fit engines
(b) When the spray paint can is empty it needs to be refilled. There is a sensor in the can which
measures the amount of paint.
Describe the use of the sensor and microprocessor in this application.
Six from:
The depth of the paint is read by the sensor
The depth of paint is sent from the sensor to the ADC/microprocessor
The digital data from the ADC is read by the microprocessor
The microprocessor compares this data to the minimum depth of the
paint/preset value
If the data is less than the minimum depth/preset value, the microprocessor
sends a signal to the actuator
If the data is more than the minimum depth/preset value microprocessor does
nothing
Process is continuous
(c) Discuss the advantages and disadvantages of the introduction of robots rather than employing
humans to spray paint the cars.
Six from:
Advantages
They can work in areas where it would be harmful for humans
They can work 24/7
Cheaper in the long run
Higher productivity
The finish is more consistent
Disadvantages
Expensive to purchase
Skills can be lost
Expensive to maintain/reprogram
Expensive to start up//train staff to operate the robots
To gain full marks there must be at least one advantage and one
disadvantage
51) Explain the differences between a VLOOKUP function and a LOOKUP function.
Three from:
LOOKUP allows for horizontal and vertical searching whereas VLOOKUP
allows for vertical searching
LOOKUP does not require an index value/only works on the second
row/column whereas VLOOKUP requires an index value
LOOKUP usually only works when the data is sorted
VLOOKUP only returns data to the right of the searched column
VLOOKUP user can select either an approximate or exact match to the
lookup value
.
S
h
t
ji
n
a
R
52) Describe safety measures that should be taken by gamers to ensure their data is safe other
than using strong passwords.
Six from:
Use anti-spyware/up to date antivirus software
Play the games with the firewall operational
Play only with authorised versions of games which you have purchased from
the correct sources and for which you have a licence
Download/buy files and new software from reputable sources
Do not forget to delete your account details when you are not playing again
Keep the game software up to date.
When disposing of your gaming device ensure all of your personal information
has been deleted.
Choose a username that does not reveal any personal information
Be aware of criminals buying or selling ‘property’ that exists inside a computer
game, in the real world
53) A student is working on a project on the World Games. He has produced some information but has
decided to produce a second layout including a table. The original layout and the new layout are
shown.
2021 World Games, This will be the 11th World Games, a major international multi-sport event, for sports,
or disciplines, within a sport, that were not contested in the Olympic Games.
Dates: Thu, 15 Jul 2021 – Sun, 25 Jul 2021, Location: Legion Field, Birmingham, Alabama, United States
Host city: Birmingham, Alabama, United States, Opening ceremony: July 15
Closing ceremony: July 25
Main venue: The New Birmingham Stadium
Explain, step by step, how the table was created, without the text being entered by hand.
Four from:
Load the document
Highlight the text
Click Insert then Table
Select Convert text to table
Click on 2 columns
Click separate by :
Click ok
.
S
n
a
R
h
t
ji
.
S
n
a
R
h
t
ji
Download