Cambridge International A Level Information Technology Answers to Student’s Book Third-party websites and resources referred to in this publication have not been endorsed by Cambridge International Education. The questions, example answers, marks awarded and/or comments that appear in this book were written by the authors. In examination, the way marks would be awarded to answers like these may be different. 12 IT in society Activity 12a The use of a credit card involves the temporary loan of the amount from the issuing bank, so the buyer does not need to have enough funds to cover the cost of buying the goods. The use of a debit card requires that funds be taken from the buyer’s account, so the buyer must have enough funds in the account to pay for the goods. Activity 12b 1 A distributed ledger database is spread across several computing devices or nodes on a peer-to-peer network. Every node has an identical copy of the database. 2 A blockchain will contain details of the previous transactions and a record of the latest transaction. It also has a timestamp and the key needed to access it. Activity 12c 1 Digital currencies are decentralised and there is no authority that regulates them. They are peer-to-peer and use blockchains stored on every node on the network. Transactions cannot be reversed and are anonymous. 2 All nodes verify the transactions and they cannot be reversed. Activity 12d They are irreversible. Many users remain anonymous and may not return mistaken payments because they cannot be traced. Activity 12e 1 It is an electronic contract encoded in a blockchain as a distributed ledger. The details in the blockchain ensure that the contract conditions are met before any money is transferred. 2 The contract details can be seen by all participants at any time and cannot be altered without the consent of all the parties involved in the contract. Activity 12f 1 A collection of data, which can be numbers representing values or be collections of descriptions, images, documents or files. 2 Artificial neural networks can automatically create new relationships in very large collections of data as they learn from the data being processed. Activity 12g 1 Data mining only works with very large amounts of data, where overall trends and patterns can be discovered. 2 Working with vast amounts of data requires much computing power that uses expensive computing devices and storage systems and requires highly skilled personnel to operate. Cambridge International AS Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd 1 Activity 12h Web 2.0 emphasises the use of content created by users and is cloud-based using web browsers. Websites using Web 2.0 allow interaction between users, who can label or tag images, videos or other websites to draw the attention of other users. Because all users can add content, it has encouraged discussion and debate. Activity 12i IM does not normally use end-to-end encryption and can be stored unencrypted on the provider’s servers for some time so may be accessed by third parties. Activity 12j A one-time password (OTP) can be set by text message to a (smart)phone when the user tries to log in to the account. The OTP has to be entered by the user to complete the login process. Activity 12k 1 The sender and recipient do not have to be online at the same time. An email message is sent to a server, where it is stored and then sent on (forwarded) to the recipient when requested. 2 The @ character separates the local address, which is user’s unique identifier, from the domain section. The domain section gives the name of the organisation that holds the user’s email box. The domain section shows the top-level domain and may indicate the country of origin. 3 Webmail can be used from any computing device with internet access. There is no need for a user to carry a computing device when travelling because many hotels and cafes have computers that customers can use. Any compatible web browser can be used and there is no need to set up or configure a dedicated email client or app, which can be quite difficult. 4 Webmail can be read by third parties if the connection is not secure. Webmail can be analysed by the same automatic systems that check user web activity, so using webmail can expose confidential messages to unauthorised people. Activity 12l Social media can expose and display the views and behaviour of employees and prospective employees. Employees can make good or bad comments about their employer, which may be seen by a wide audience and can have an effect on the employer’s business. The employer may not approve of their comments nor be able to answer. Employers can gather background information about prospective employees from their social-media posts. Activity 12m 1 Most platforms do not carry out background checks on users applying for an account/profile, so people can set up an account with false details. Often, only a valid email address is required. 2 There are so many contacts that children can make that it is very difficult for parents to check them all. Parents cannot watch their children all the time so some unwanted contact can occur when they are not overseeing their children’s access to social media. Children do not always report inappropriate contacts to parents. Activity 12n Personal information can be made public, or can be used for fraud or blackmail. Posts by others can be anonymous and may be critical or hurtful and seen by all contacts. Cyberbullying and stalking can cause depression, low selfesteem and physical insecurity. Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Activity 12o VAR interrupts the flow of game with pauses while decisions are reviewed. The decisions of the on-field referee can be reviewed, changed, reversed or over-ruled, which removes some of the enjoyment and spontaneity of the game. The use of VAR can be intrusive and ‘too clinical’, which takes away the fast-flowing action aspects of the game. Activity 12p The surgeon can wear a headset with head-up displays and overlays of cameras that zoom into the eye. Augmented reality can enhance the information that is given to the surgeon about the positioning and placing of surgical instruments within the eye. Surgical instruments and tools can be precisely controlled by movements of the surgeon’s hands inside robotic gloves. Activity 12q People can access online banking from home with no need to travel to a bank. Speech recognition and text-to-speech software have enabled visually impaired people to have access to online banking systems. Physically disabled people can also use this software as well as adapted input devices such as sip-and-puff to control the computing devices. Activity 12r 1 Data can be shown in graphs and charts and can determine trends in the financial growth of the business. Spreadsheets can be used, with, for example, the application of ‘what-if’ and ‘goal seek’ facilities, to determine the possible outcomes of different financial decisions. The display of financial data in a visual form can be easier to understand. Data mining of sales data can show which goods or services contribute most or least to the business’s profits. 2 The prices and availability of stocks, shares and goods from all around the world can be tracked and shown to traders in real time. The prices of stocks and shares can be automatically tracked and bought or sold at predetermined prices. This is much faster than can be carried out by human traders. Alerts can be sent if trading prices or the numbers of trades exceeds set limits. Trends and patterns in trading can be determined using data mining. Activity 12s The teacher is not physically present with the student but is contacted if there are urgent questions that the student needs answering, so immediate feedback is not possible. The learning by the student may be adversely affected if there is a delay in the teacher’s response. Activity 12t The tutorial can be taken at any time and from anywhere with an internet connection, so the student has control of when the tutorial is taken. Students can work at their own pace so can control their own progress through the tutorial. Activity 12u 1 Using a CD-ROM does not require access to the internet. CD-ROMs are robust so can be used in workshop environments. 2 Networked courses can be made accessible to employees and not to the public. Closer control is possible over what is available and how and when it is presented as the course is restricted to the company network. Activity 12v Any two from: Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Teachers and students need access to a reliable internet connection with sufficient bandwidth to carry the video and audio data. An unreliable internet connection will disadvantage students because they will miss out on the teaching. Technical problems may make the experience less satisfactory, for example video and audio may become out of synchronisation and disrupt the lesson. The teacher and student are not physically present together. This will reduce the interaction between them and may allow students to become distracted or demotivated in lessons. The teacher may find it more difficult to monitor and assess individual students during lessons. Activity 12w Any two from: Teachers and students can be geographically separated and still have lessons. Students and teachers can interact with others from all around the world to enhance their experiences of other cultures. Lessons can be recorded and reviewed at another date to reinforce learning. Students who are unable to attend school in person can be included in lessons and so keep up with their studies in line with other students. Practice questions 1 Governments cannot regulate or control cryptocurrencies (1) because they are not centralised (1). Unregulated currencies can create money (1) in an unpredictable and irresponsible manner (1), which can undermine the value of the real money (1). Undermining the value of a currency can lead to price rises and inflation (1). 2 There is no need to place any trust in the other parties involved, for example the seller (1), because the large amount of money involved (1) can be placed with a third party in an escrow account (1). This account can be set up to automatically pay out to the seller (1) only when the painting has been delivered to the buyer (1) and cannot be taken back by the seller (1). 3 Dealers and the other people involved in the use of cryptocurrencies are anonymous (1) so cannot be traced or have their credentials checked (1). Because of the anonymity, incorrectly addressed payments cannot be recovered (1) and the recipients of incorrectly addressed payments cannot be forced to repay them (1). Losing the access key (1) means that the cryptocurrency is lost and cannot be retrieved (1). 4 There are no regulations governing how (1) or for what reason the data is being mined (1). People do not have the opportunity to give or withhold their consent to the use of their data (1), as required by data protection laws (1). People do not know what their data is being used for (1) or who will have access to it (1). 5 A traditional diary is handwritten and cannot be easily and clearly edited or corrected for errors (1), and it can be lost along the way (1). A blog can reach many people at once (1) and is available to viewers at any time (1). Blogs can be updated regularly and allow viewers to follow the progress of the student (1). Blogs can contain images and videos, whereas a traditional, handwritten hardcopy diary cannot (1). Viewers may add comments or suggestions to a blog but not to a traditional diary (1). A blog can be created and updated from a mobile device (1). 6 Chat rooms can be set up to include only those who are invited so are private (1) and can be used for their own employees to discuss developments and ideas (1). Customers can be invited to discuss new products in real time (1), so providing instant feedback on their new product (1). Customers and employees don’t have to move from their current task (1) so discussions can be carried on with less disruption to their work (1). Text-only chat rooms do not provide non-verbal feedback (1) and there is often little control over the content of the text that is posted, so inappropriate comments may be made (1). There is a possibility of malware (1) being transmitted as chat rooms are not set up with security in mind. 7 SMTP (1) is used to send the email to the email server (1) of the recipient. The server determines the domain to which the email has to be sent (1) and sends it over the internet to the domain’s email server (1). The recipient Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd server receives the email (1) and determines the user from the local address of the email (1). It places the email in the inbox of the recipient (1), where it waits until collected by the recipient’s smartphone using IMAP (1). 8 Teachers are required to learn new skills that allow them to use computing devices and IT software (1) and to prepare materials for use on computers (1). Teachers customise their lessons or materials more for individuals than for whole classes (1). Teachers guide and teach learners how to find and use information (1) and to verify the information that is found (1), rather than to learn vast amounts of facts given out by the teacher. Individual learning means that teachers can give each learner more help than in traditional classroom teaching (1). 9 Voice control can be used while carrying out manual tasks so there is no need to stop or wash hands (1) when giving commands. Natural language can be used (1) and there is no need to remember long, precise commands (1) or to type precise instructions (1). Remote-control devices are no longer required (1). Voice-controlled devices are always listening and audio may be sent to central servers for interpretation (1) so may capture personal and confidential information (1). This can be accessed by third parties and may be used for fraud or blackmail (1). 10 Students do not regularly meet teachers in person (1) so receive less feedback (1) and may become less motivated to complete tasks (1). Visual and computer-based materials can be stimulating aids that enhance engagement (1) in lessons and the motivation of students. Students can work at their own pace (1) and repeat topics as and when they wish (1), which reduces pressure from their peers to keep up (1). Students working alone may lack the self-motivation to complete the tasks (1). 11 The initial costs of the equipment and software, and their on-going maintenance costs, are high to provide CBT lessons (1). The production of good quality materials for CBT can be expensive in terms of software and storage systems (1) and the time taken for teachers to prepare them is high (1). Customising lessons for individual students requires teachers to learn new skills (1) and they may have to be trained, which will cost money (1). Specialist technicians may need to be employed to maintain the software and equipment (1) and these can be expensive. Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd 13 New and emerging technologies Activity 13a 1 Floors are usually flat and horizontal so the structure has a low centre of gravity to avoid tipping over. It also has fittings for sensors and power sockets for recharging. The robot that cleans windows needs a structure that distributes the weight of the components around it, and it does not need a power socket as it is likely to have a fixed power line. It does not need sensors to locate itself around a floor but only to determine the window size. 2 The AI needs to determine its position in relation to objects on the floor or in its way. It needs to determine whether or not its waste storage is full and if the on-board cleaning materials (if any) are adequate or need refilling. Also, the status of its batteries has to be monitored and the time remaining before it needs a recharge has to be calculated. The AI needs to determine the shortest distance to the power-charging socket and the process of connecting each time. Activity 13b 1 The human shape is not suited to any specific task but is able to carry out many different tasks. Such as shape would be wasteful of resources to design, create, maintain and operate for a single, specific task. 2 Many humans find humanoid robots disturbing and cannot relate to them. They may prefer to discuss matters with real humans. Activity 13c 1 Sidewalks, pavements and roads are already crowded with pedestrians or other vehicles and may not be wide enough. People will have to take avoiding action and may put themselves in more danger, for example stepping off a sidewalk into traffic. Unexpected hazards such as road or highway maintenance may not appear on the navigation maps used by the drones. Drones that have been disabled by malfunctions or accidents will cause further hazards. 2 They can be used instead of staff to deliver medicines to patients on set schedules. They can operate continuously, for example to resupply bedding and other goods to rooms or storage areas. Activity 13d 1 Machine translation has no human input. 2 CAT has human input so can take into account the dialects and unusual spellings found in old documents. Machine translation may translate out of context and so change the meaning of the text. Activity 13e 1 Local cultures have different rules on what is acceptable and what is not, so wordings must reflect this. 2 One from: Dress code in the images Expressions on the faces of characters Hand gestures by the characters. Activity 13f The original hologram needs specialised and expensive laser-based equipment to create. The holograms are too complex to recreate cheaply so there is no profit to be made from the counterfeiting. Activity 13g Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Sunlight contains ultraviolet light, which can erase the rewritable discs because it affects the polymers used to store data. Commercial discs are manufactured by pressing techniques and do not use the polymers so are not affected. Activity 13h Additive manufacturing deposits layers of material on to other layers and builds up the structure, whereas subtractive manufacturing removes, drills out or cuts off material, to leave the structure shape behind. Activity 13i For home printing, the components would have to be supplied to home users in bulk, which would mean that they could be stolen or misused. There is less control over the dosage and construction of the drugs so patients could be at risk. Activity 13j 1 These are some of the technologies used: Smartglasses are made by 3D printing to produce the complex shapes in one solid object, without joins. Smartglasses may use Wi-Fi, 4G or 5G connections to a central assistance centre or to search for information about the local area or environment. The internal operations of the smartglasses may use Bluetooth® connections to a smartphone or retinal implants to access the internet. 2 These are typical uses by tourists: Smartglasses can access the internet to gather information about an area and display it as an overlay on tourist attractions. Smartglasses can aid in navigation of areas and can be connected to a smartphone for uploading images and commentary in real time to social media. Activity 13k 1 A device has to be worn on the body, like a watch or smartglasses, to qualify as ‘wearable’. Being carried, for example inside a coat worn on the body, is not enough. 2 A smartwatch uses sensors that detect physical parameters such as heart rate. The data from the sensors is either recorded or sent to other devices, for instance using Bluetooth, for later analysis. A smartwatch is very portable so can be worn without hindering the athlete. The data can be compared over time to indicate how the athlete can adjust their training to improve performance. Activity 13l Use of Bluetooth to connect over short distances, for example to a smartphone. Use of 5G to connect to mobile communications systems, for example mobile/cell phone systems. Use of USB connections, for example to a laptop. Activity 13m Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Use of AI requires a great deal of processing power. Need for vast amounts of data storage. May make use of holographic or 4G storage systems. Need for high-speed communications systems. These are needed to analyse vast quantities of data. Practice questions 1 Social-media posts are analysed by AI to extract data, for example about likes (1), names of brands mentioned (1) and viewing history (1). These are matched (1) to advertisers or to companies’ products and advertisements, and these are inserted into news feeds and listings that users look at (1). 2 Augmented reality allows the clothes to be overlaid (1) on the person and viewed on a tablet or smartphone (1). The sizes are adjusted automatically by the AR system to suit the shopper (1), who can also try different colours and styles (1). There is no need to keep visiting the changing rooms, to change clothes in a public area or to allow others to see the results (1). The AR can be used to show the clothes in different scenarios (1). 3 The robotic device cannot be fully automated or autonomous as, currently, AI is not sufficiently developed (1). A remote surgeon is in control but is dependent upon the images from the devices (1), which are not as good as the human eye at ‘taking in’ all the details (1). The network delay (latency) means that very precise actions or movements may be slightly delayed and the feedback to the surgeon is slow (1). Any actions in the case of emergencies (1) or unexpected problems are difficult to deal with (1). 4 In answering this question, there are two main aspects to be considered. There is the impact on the patient and the impact on the health care givers, such as doctors, surgeons and nurses. Also, positive and negative impacts must be included. Impacts on the patients include: Continual monitoring of body parameters even when discharged/not in a hospital (1) so health can be checked over time by doctors (1). Health can be checked remotely by doctors (1) so they are alerted to problems more quickly (1). Patients have to wear the device all the time (1) and this can be difficult or uncomfortable for some (1). Impacts on the health care providers include: Can collect more data about patients’ conditions/physical parameters (1) so have more understanding of the patients’ condition and can provide better care (1). Can monitor patients while they are away from the health centre/hospital (1), which frees up space for other patients (1). Doctors do not have to monitor patients as this can be done by support staff (1), so doctors can treat more urgent cases (1). Have more data to analyse and understand (1), which can take more time away from patient care (1). Heath care facilities monitor many devices (1) so require more computing facilities (1), which can add to their costs (1). 5 Both benefits and drawbacks must be included in a good answer. Some benefits are: Robotic devices can perform repetitive tasks (1) for long periods of time without a deterioration in performance (1), unlike humans. Robotic devices can work continuously without breaks (1) apart from routine maintenance (1). Production lines do not stop for shift changes of workers (1) because robotic devices only need monitoring by technicians (1). Overall production costs are lower than when many manual workers are employed (1), even though the running costs and maintenance of robotic devices is high (1). Customised automobiles can be produced (1) with unique features/colours (1) for individual customers because the production line robots can be programmed to pick/assemble specific parts or use different paint colours (1) on a per vehicle basis (1). Some drawbacks are: Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Robotic devices need maintenance and replacement of parts (1), which can mean that specialised technicians are required (1). These are individually more expensive than manual workers (1) and require special, expensive training (1). Robotic devices need a constant supply of raw materials (1) and if this is interrupted by supply problems (1) they cannot produce anything because the devices can (usually) only perform single tasks without reprogramming (1). Robotic devices cannot respond to sudden changes (1) because they need reprogramming to handle any alterations in the task (1). 6 Both benefits and drawbacks must be included in a good answer. Some benefits are: Instruction manuals can be automatically made available in different languages (1). Manuals can be automatically translated if not immediately available (1) in the required language for a region (1). Different regional dialects can be catered for (1) without having to completely translate the manual over again (1). Some drawbacks are: Instruction manuals contain technical language (1), which must be checked by humans (1). This adds to the time and cost of their creation (1). Humans must check that the translated instructions are safe to use (1) and do not contain errors that might result in damage to the TV set or the user (1). This adds to the cost of production (1). Instruction manuals contain technical language, which may need individual translation as the terms may not exist in language databases (1). 7 The answer to this question should include both positive and negative impacts. Some positive impacts are: Counterfeiting can be reduced (1) because holographic images are difficult and expensive for forgers to recreate (1). Customers can be reassured that products carrying a holographic label are genuine (1) so they will buy only genuine products (1). Holographic imaging in presentations can attract investors (1) because it is innovative (1). Advertising presentations at commercial events can use objects and designs without having to physically move them to the event (1), which is cheaper than transporting them (1). Holographic images on business cards can store more information than traditional business cards (1). Some negative impacts are: Objects for sale cannot be physically handled or examined (1) and colours may not be easy to recreate as holograms (1) so sales may be lower (1). The lighting conditions needed for reproducing holographic images of objects can be difficult to recreate in marketing venues (1). The cost of producing and printing holographic images can be prohibitive for small companies (1). 8 These are some suggested answers: Not all materials from computing devices, for example plastic cases, can be recycled (1) so these have to be burnt or put into landfill (1). Burning plastics can generate dangerous compounds (1) that can leak into the atmosphere (1) or water supplies (1). Components such as plastics do not degrade quickly (1) so pose a threat to wildlife and ecosystems for a long time (1). Components dumped in landfill can leak dangerous chemicals or rare metals into the ground (1) and these can poison crops and people (1). Dangerous metals and compounds leaked into the ground can enter the food chain (1) and become concentrated in the food we eat (1). Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd 14 Communications technology Activity 14a 1 Three from: Data transfer speeds over LANs are (usually) higher than those over WANs. LANs use devices such as switches and bridges that work at layer 2 of the TCP/IP model, whereas WANs use, for example, routers that work at layer 3. LANs develop fewer faults/problems with devices than WANs because LANs have fewer devices. LANs have fewer data transmission errors than WANs because WANs use a large number of connections over public telecommunications systems. A LAN is usually owned and maintained by a single organisation whereas a WAN may use systems owned by many different organisations. LANs are cheaper to maintain and upgrade than WANs because the devices are in a relatively small area compared to those in WANs. 2 LANs use these protocols: Ethernet (strictly speaking, this is a technology) Wi-Fi (strictly speaking, this is a technology) TCP/IP Protocols for specific services, for example HTTP, HTTPS, FTP, IMAP, SMTP, Telnet, etc. 3 WANs use these protocols: High-level Data Link Control (HDLC) Point-to-Point Protocol (PPP) Frame relay. Activity 14b There is no central storage of resources such as files so there is no easy way to locate specific resources. The network can become very busy/overloaded/congested with traffic when many nodes request resources from other nodes, which reduces its performance and means that requests for resources often fail. No central control means that administration is more difficult and nodes can join or leave at any time, which can disrupt the network for users. Activity 14c A VPN sets up a secure connection across the internet that uses public telecommunications systems. The VPN can be set up to require authentication by the home user to protect the company network from unauthorised users and can use encryption to protect the data being exchanged. Activity 14d There are several types of physical network topology used in LANs: bus, ring, star, tree, mesh and hybrid. You should sketch each one and against each add notes about its structure and advantages and disadvantages over the others. Suitable resources include: Network Topology: 6 Network Topologies Explained & Compared (www.comparitech.com) Types of Network Topology (www.geeksforgeeks.org) Activity 14e A Wi-Fi extender picks up wireless signals from a WAP and re-broadcasts the signals on different frequencies, whereas a WAP has a wired connection into a network and provides wireless access to the network. Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Activity 14f Company LAN to internet Two sections of a small LAN in a company Two separate sections of a company LAN Activity 14g Streamed movies (video and audio) are sent in packets across the internet. The packets take different routes to reach the viewer so arrive at different times and, sometimes, out of order. Buffering allows the movie application to collect the packets quicker than it shows them to the viewer, giving time to reorder the packets and gather ones that may have gone missing. The viewer is able to watch the movie without interruption. Activity 14h Servers provide services such as email, network security, and file and document storage to the company’s employees. Servers enable the administration of network resources and security to be centralised. Activity 14i NAS is network-attached storage, which means that storage devices such as hard disks are connected to a network and can only be accessed remotely. Activity 14j Many virtual servers can be run on one physical server, reducing the use of physical space. The use of virtual servers allows the hardware to be upgraded more easily without service interruption as multiple instances of the server can be run and use can be easily switched between servers if one set of hardware is switched off. Activity 14k Co-axial cable needs no special skills or tools and so is cheap to install and maintain. It is less susceptible to electrical interference and cross-talk than twisted pair cables so data is transferred reliably. Activity 14l 1 Telnet is not secure and gives almost total access to control of the devices. 2 HTTPS is often used. Most devices have a built-in web server for their administration and this requires login from a web browser with access to the configurations options. Task 14a 1 Pinging www.google.com and google.com produces different IP addresses. The IP address of these is also subject to change. At the time of writing, www.google.com was 172.217.168.14 and google.com was 142.250.179.228. Note that Google could consider repeated pings to be a nuisance. 2 The exact response returned by tracert will depend on your computer and your location. 3 Some hops in tracert are shown as stars because the router has not responded to the pings within the time limit. The first ping sets the time-to-live (TTL) to 1. When the first router receives the ping, it reduces the TTL by 1, and because the new TTL is 0 it returns an error with its IP address in an ICMP message. Tracert repeats the ping, this time with a TTL of 2. Router 1 reduces the TTL by 1, and forwards to router 2. Router 2 reduces the Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd TTL and, because it is now 0, returns its IP address. This process is repeated until either the final destination is reached or the maximum allowed TTL is reached. If no answer is heard from a ping, tracert displays the *. Task 14b A typical arp display is: This will have a list of addresses shown below in columns. The first column is the IP address, the second column the MAC address associated with the IP address, and the last column the status of the IP address. Dynamic addresses are assigned by a DHCP server when the host, in this case a laptop, starts up and may change, while the static ones are fixed. Activity 14m 1 Most firewalls block connections that originate from outside the network, so active mode FTP is blocked because the server sets up the data connection. Firewalls can be configured to block the ports that FTP uses. 2 There is no need to set up an account and usernames and passwords are not required for access. Activity 14n 1 Unlike TCP, UDP does not provide error management or acknowledgment of packets as it is more important for packets to continually arrive than for missing ones to be requested again. The loss of a few packets in a video or audio stream goes unnoticed so the overheads of checking packets are not required. 2 Some uses of UDP are: The Domain Name System (DNS) used for looking up addresses. The Dynamic Host Configuration Protocol (DHCP) for assigning network addresses. The Routing Information Protocol for distributing routing data between routers. The Simple Network Management Protocol (SNMP) for managing devices such as routers on a network. Activity 14o 1 The network address is different; one is 192.168.12 and the other is 192.168.14, which means that they are on logically different networks so cannot communicate. 2 One of these options: A router could be used to direct network traffic between the two networks. The network address of one laptop could be changed to the same network address as the other. Task 14c The displayed details and the format of the tables will depend upon the specific computer. A typical output from the command will include a list of the interfaces, and an IPv4 and IPv6 route table. Any fixed routes may also be shown. Activity 14p 1 The best route would be network A to router 1 to router 4 to network B. 2 The metric would be 2 because there are two routers on the path. 3 The route chosen by RIP does not take bandwidth, for example, into account. Router 4 may be on a lowbandwidth connection, so a better, faster route could be via routers 2 and 3 if they are on high-bandwidth communication systems. Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Activity 14q 1 It is easier to visualise and understand if the model layers are represented as being in a stack. 2 The services provided by each set of protocols can be grouped by function. Each function can be altered/amended/changed without affecting the other sets of functions. 3 Conceptual models organise the protocols by features and functions and help to show how they work together. Activity 14r 4G provides greater bandwidth and this allows more data to be transferred in a given time, so the video can be in higher resolution or HD without freezing or jerky motion. Activity 14s Low latency means minimal delay in the exchange of data so commands and responses are almost in real time. Activity 14t A satellite in geosynchronous orbit has an orbital period (the time taken to orbit the Earth) that is exactly the same as the time taken for the Earth to turn once on its axis, which is 23 hours, 56 minutes and 4 seconds. Seen from the Earth’s surface, the satellite will return to precisely the same location in the sky after one day. The inclination (tilt) and eccentricity (deviation from a perfect circle) determine whether or not the satellite remains still in the sky or appears to move on a figure-of-eight path. A geostationary orbit is a special case of a geosynchronous orbit where the satellite is in orbit over the equator of the Earth (the Earth’s equatorial plane) and should appear to remain in exactly the same position all the time. In practice, due the Earth not being a perfect sphere and due to the gravitational effects of other celestial objects, satellites in a geostationary orbit may still appear to move slightly over time, so they carry small amounts of thruster fuel to allow them to keep their position. Ground stations can move their antennae to keep focused on the satellite. Activity 14u 1 Communication is by microwave links, which travel in straight lines and are blocked by obstacles such as hills or buildings. 2 Rain clouds can absorb satellite TV signals and reduce the signal strength to below the usable level so the TV data is not received. Activity 14v A suitable table would be: Fingerprint recognition Medium High Medium High High Facial recognition Low High Medium Medium Medium Iris patterns High Medium Low Medium High Retinal patterns High Low Low High High Voice recognition Low Low High Medium Medium Keystroke patterns Low High High Low Low Handwritten signature recognition Medium Medium Medium Medium Medium Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Activity 14w 1 A threat is any factor that is not under the control of the owner, administrator or users of the system and that has an adverse, or negative, effect on the system. 2 Physical threats include: Vandalism of equipment/devices preventing them from functioning. Theft of devices resulting in the loss of services/function. Fire or flood damage preventing an IT system from functioning. Electrical disturbances, such as power loss or fluctuations, causing component damage. Practice questions 1 Advantages include the sharing of peripherals such as printers (1) between the many devices and having control of the printing (1), so it can restrict what is printed, the number of printouts and who is allowed to print (1). However, if the printers are some distance from the user (1), others may see the printouts before the user collects them (1) and this reduces the security of documents (1). Document storage can be centralised (1) on a file server (1). This increases security (1), makes updating the documents easier (1) and makes them available to all company users (1). House styles are easier to enforce with centralisation of documents (1). Backups can be centrally organised and maintained (1). Emails can be sent and access to the internet can be controlled with mail and proxy servers (1). A single internet access can be shared and controlled with firewalls (1), DMZs and proxy servers. Since storage and devices can be accessed remotely (1), security can be administered and monitored centrally, but setting up and monitoring the security of data can be more difficult. 2 A network policy should cover these aspects: Access and security (1) to control what users and devices can and cannot access and do (1). Define what applications can be used (1), what they can access on the network (1) and how important they are on the network (1). How network traffic should flow/be routed (1). How the policies should be implemented/enforced (1). 3 a b 4 Marks could be awarded for ease of use, for example: The use of NFC systems does not require any extensive training (1) since all that is needed is a tap by a smartphone/device (1). Marks could be awarded for valid examples, such as: NFC-enabled tags worn by nurses/doctors (1) can pick up data from and identify a patient (1) using a similar tag on the patient (1). Access to patient records is faster (1), reducing consultation times (1). 5 Marks could be awarded for: The web browser on the laptop sends a request (1) to the web server (1). The web server and web browser send each other requests and responses with authentication details (1). The web browser requests the required pages (1) and the server responds with the relevant pages/content (1). This is repeated (1) until the browser has all the information required to display the pages (1). 6 a b To provide the rules (1) to enable them to exchange data (1). Reliable protocols send a message to notify the sender whether or not data packets have arrived (1), but unreliable protocols do not (1). Up to 6 marks may be awarded from: WANs usually cover large geographical areas (1), whereas LANs are usually restricted to a few buildings or to a campus (1). WANs make use of public telecommunications systems (1) whereas LANs do not usually do so (1). WANs use different protocols from LANs (1) to allow network traffic to travel over different types of communication media (1). A WAN may be made up of numerous LANs (1). Up to 6 marks may be awarded from: Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd There are more nodes on WANs (1) so there is more opportunity for unauthorised users to intercept the data (1). Data on LANs can be protected from unauthorised users (1) by firewalls or other security systems (1). 7 Three from: An email client and an email server (1) A web browser and a web server (1) A laptop printing from a word processor to a networked printer (1) A smartphone posting photographs to a social-media platform (1). 8 a b 9 a b 10 Two from: Static routing tables require time and expertise to set up (1). Small errors in static routing tables can cause immense disruption to networks (1). Any network congestion/problems/node failures are not automatically dealt with (1). Two from: No control over the route taken by packets across the networks (1). Network traffic/congestion can be increased because routers exchange information (1). Network latency can be increased because each router has additional computation to carry out to determine the best route to use (1). The address must be unique so as to identify only one device on the network (1), else IP packets cannot be sent to/from the laptop (1). Ways that an IP address could be assigned to the laptop are: Manually assigned by the user (1). Assigned by DHCP from a DHCP server when it joins the network (1). A script kiddie is an unskilled individual (1) who writes scripts and program code, or uses other people’s scripts or codes, to attack computer networks and systems (1). ii A cracker is a person who gains access to networks/applications by taking advantage of security flaws (1). Crackers often do not have the skills to create their own software applications (1). b Each type of perpetrator has different skills and methods of attack (1) so resources can be directed at these if the perpetrator type is known (1). a i Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd 15 Project management: answers Activity 15a 1 The project objectives are the deliverables, which are: the product to be constructed, the time taken by the project (duration), the measures of success of the project, and the project documentation. 2 Objectives are decided during the initiation stage. Activity 15b 1 SMART objectives are Specific, Measurable, Achievable, Realistic and Time-sensitive (or alternatively Specific/Strategic, Measurable, Attainable, Relevant/Resourced and Time-limited). 2 A deadline is the time at which a project, stage or task must be completed. Activity 15c 1 Project creep is the addition of extra features or user requirements as the project proceeds, which were not included in the original planning. 2 Poor management or poor communications between stakeholders and team, so that decisions are not made in time or do not take into account the project constraints. Activity 15d Testing the game Fourth Writing the test report Fifth Designing the game Second Writing the user guide Sixth Coding the game Third Writing the test report Seventh Releasing the game Last Planning the project First Activity 15e 1 Information overload can produce poor decision-making because all the information is not understood or seen. Team members may become demotivated because they receive too much irrelevant information and do not have time to read or understand it, which may also affect their decision-making. Too much information can prevent team members from achieving their goals and objectives. 2 Ways to reduce information overload include: Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Group-related tasks Prioritising tasks Completing smaller tasks first Avoiding multi-tasking Turning off unnecessary alerts Filtering emails Checking emails less frequently. Activity 15f 1 The diary can be accessed from anywhere using the internet so can be used on a desktop, laptop or mobile device. Diaries can be shared between the manager and team members and appointments and meetings scheduled more easily. Reminders and alerts can be sent automatically to those involved. Schedules can be rearranged automatically if changes are required and everyone can be alerted to the changes. 2 The diary must be kept up to date and all changes or appointments logged and read, and this can take up valuable time. Sharing requires all users to be online and updating the diaries regularly. Too many alerts may lead to information overload and important appointments may be missed. The privacy settings must be configured accurately to avoid loss of privacy or confidential meetings being alerted to everyone. Activity 15g 1 A possible chart would be: 2 A Gannt chart shows the chart visually, making it easier to understand which tasks are dependent on each other and which can be carried out concurrently. 3 Task 6 is concurrent with tasks 3 and 4. Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Activity 15h 1 A chart could be as in the sketch. The Start and End points are not always required. 2 Student’s own answers. 3 The critical path has a duration of 1 + 3 + 4 + 4 + 4 + 6 + 5 days, which is 27 days. Activity 15i 1 A suitable PERT chart with the total and free floats is shown below. 2 The critical path is tasks 1 4 7 6 5 9 12. Practice questions 1 Project scoping involves gathering as much information (1) as possible about the objectives (1) and what needs to be done to meet them (1). The type of work (1), the methods to be used (1) and who will do the work (1) are researched and documented (1). The project risks (1) and constraints (1) are analysed and documented. The costings and budget (1) are also included in a scope. 2 Acceptance criteria help the project manager to decide when a project is finished (1) because they state what must be complete to consider the project over (1). Everyone involved in the project (including the project manager, the team members and the stakeholders (1)) is satisfied and agreed (1) that the project is over when the Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd acceptance criteria are met. There is no room of interpretation if the acceptance criteria are clear (1) so there are no arguments about the end of the project (1). 3 a b Total float is the time that a task can be delayed (1) without affecting the duration (1) of the whole project (1). Free float is the time that an individual (1) task can be delayed without affecting the early start (1) of its successor task(s) (1). Tasks on the critical path must have a total float of zero (0) because any delay at all (1) of any task on the critical path will delay the completion of the whole project (1) by the same amount of time as the task delay (1). 4 PMS has features that can allow collaboration with team members in real time (1) so that everyone is kept up to date with the project (1). Documents can be shared (1) so that important project documentation is seen and can be edited by all (1). Costs can be managed and resources allocated and re-allocated as necessary during the project (1). Risks and constraints can be managed and their effects monitored throughout the project (1). Reports can be generated (1) and automatically sent to selected team members as required (1). Links to diary software can alert managers and team members to upcoming milestones, overruns or other project events (1). However, the use of PMS can be expensive and may not be economical for smaller projects (1). Small projects may become more complex if using PMS and may take much longer (1). There is a risk of information overload or too many alerts and these can delay or distract team members from actual work on their tasks (1). 5 Using the CPM can take a lot of time and effort (1) and in very large projects there may be several critical paths, which makes understanding the whole project difficult (1). In large, complex projects, where PMS shows several critical paths, choosing which is ‘most’ critical is not easy and usually has to be carried out manually (1). Task durations may not always be accurate and there is no allowance for this or for errors in CPM (1). Changes to the PERT chart or network diagram during the project (1) mean that the critical path may change and the CPM calculations have to be redone (1). 6 A chart could be as in the sketch. Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd 16 System life cycle Activity 16a 1 Each stage depends on the results or deliverables from the previous stage, and the last (maintenance) stage is used to refine the specifications/designs to make improvements to the product, which has to go through the process again. 2 A smartphone consists of many components that work together to take in data, process it and output information for a user. 3 An air traffic control system comprises all the hardware including radar, sensors on the ground, runway lighting and indicators, computer software, and people who use the system. For example: The computer hardware in the control towers The software for monitoring the air and ground traffic The sensors and systems that gather data from around the airport runways, taxi-ways and gate areas The local and remote radar systems that supply data to the computer systems The radio equipment and the software for using it for communications between the aircraft and the controllers and other services on/in the airport and central air traffic control The air traffic controllers who use the systems The support personnel who carry out administrative and other tasks. Activity 16b 1 A feasibility study determines whether or not the project can be done by the company, for example whether it has the skills, personnel and resources to carry it out, whether it is financially worth the investment and can be completed on time. 2 The analysis stage provides the information about the current system that is used as a basis for the planning and designs of the new system. It discovers the problems with the current system and enables the creation of the specifications needed to create the replacement. Activity 16c Customers who eat at a restaurant Workers in a factory assembling computer monitors Managers in a bank End users of an accounting system Delivery drivers of a parceldelivery service Designers of a new set of system reports Borrowers of books from a library Activity 16d It contains the details of what the client who is asking for the new system wants it to be able to do. Without it, the developers would not know what features and functions to include. Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Activity 16e 1 Documents would be printed at the end of the rental process. Use the symbol that indicates a multi-page document or more than one document: These represent the rental agreements and documents that it is necessary for the driver to carry with the car. They would appear here: Documents could also be produced as a printed list to display the cars available for the customer. Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd 2 The system should check if the user has an account. If not, as is the case here (it’s a new user), the account has to be created, and then the username and password have to be checked to allow login. An example flowchart could be as shown. Activity 16f Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Activity 16g 1 A format check can be applied to ensure that it has two parts separated by an @ symbol. 2 Validation checks only that the email address conforms to the correct format. It does not/cannot check that it is accurate/right. Entering the email address twice allows the computer to check by comparing the two entries that the user has entered an accurate address because it is unlikely that a user will make the same mistake twice and it allows the computer to check to see whether or not the user has made spelling errors. Activity 16h 1 Three text fields should be used that only allow numbers and that check the range of values. Because the values of 2 m and 2 mm use different unit scales, sometimes forms ask that all values be input as mm or convert them to mm before submitting them. 2 a b c Any value from 0 up to 2000 mm would be valid or normal. In practice, in this example, the doors are unlikely to be very small, but 0 to 2000 would be a sensible range. The validation routine could be set as >0 and <2001, which allows values from 1 to 2000. Extreme data is still valid data and examples would be 1 or 2 and 1999 or 2000. Strict interpretation of extreme data would be 1 and 2000. Abnormal data would be any value outside the range of 1 to 2000 mm, e.g. 0 or 2001. Activity 16i 1 When replacing a stock control system in a supermarket, parallel running would be the best choice because there is a need to check that the new system accurately monitors the stock by comparing the outputs with those of the current system. 2 When replacing the user accounts system of an online bookshop, parallel running would be the best choice to ensure that the user accounts are managed correctly. By comparing the account details and their management, the shop owners can be sure that the details are safe, secure and accurate. 3 Changing from local, hard disk storage of company documents to cloud-based storage should be carried out by direct changeover. All the documents must be in the same place and be immediately accessible after the change. 4 Replacing the workflow system for taking and fulfilling orders in a mobile (cell) phone store should be done by direct changeover so that all the workers are following the same pattern of work. 5 Replacing the booking system for rail tickets in a travel company with many branches should be done by pilot implementation because each branch can be changed over without the others. This allows the users to be trained and to try out the new system and for any problems to be fixed before the other branches change over. 6 Replacing the operating systems of desktop computers in the offices of a multinational company should be done by phased implementation. Introducing the new OS in some offices before others allows problems to be fixed and users to be trained in stages. 7 Replacing the manual counter services in the branches of a bank with automatic teller machines in the foyer should be done by pilot implementation so that the new system can be tried out, for example for customer acceptance, problems and training, before fully replacing counter services. 8 Installing 5G mobile services in cities would use pilot implementation is some areas to determine whether or not the system is viable, economic and technically possible. Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd Activity 16j 1 It is corrective maintenance. 2 The steps are: Diagnose the problem by seeing the problem as it occurs. Locate the cause of the error by testing the app’s code. Amend the code. Test the code. Test the app on smartphones to see if it works correctly. Ask end users to test the app. Record the tests, results and outcomes for the client/owner and developers of the app. Activity 16k Adaptive maintenance corrects errors or problems that occur when new hardware is installed, when an OS is updated, or when changes have to be made to meet new regulations. Perfective maintenance is carried out to improve the system so that end users experience more features or better performance from it. Activity 16l 1 A gaming app may have many different component parts, such as user interfaces for login and for gaming, a game engine, a score table and a facility for online gaming, which could be developed and tested simultaneously and brought together near completion time. A note-taking app would be much simpler and a rough prototype could be made, tested and discarded and the next prototype made quickly. 2 There must continual, frequent communications between the developers and clients so that the process can be fast. Prototypes must be tested and feedback quickly given by the client so that developers can start on the next prototype as soon as possible to amend or add features/functions. This process is iterative so, to keep the timescales small, communications must be good. Practice questions 1 A suitable DFD could be: Cambridge International A Level Information Technology © Brian Gillinder / Hodder & Stoughton Ltd