receive - This area is password protected

advertisement
1. A customer uses a bank card to purchase a product at a supermarket checkout. The
checkout operator uses a number of devices to input data about the customer and the
product.
Identify these input devices and for each one describe a different item of data that
will be input.
matched pairs:
Chip reader
Bank/credit card account information/supermarket code
Bar code reader
Information from a product label/product identity number
Electronic scales
Weight of an item
Touch screen
Identification of product
Number pad
Bar code number when bar code reader cannot read bar code/the number of items
Magnetic stripe reader
Information about the customer
2. (a) Describe batch processing of data, using the processing of bank cheques
as an example.
(a)
Data/cheques are collected together
during the course of the day
Data/cheques are then processed all at once
Data/cheques are processed overnight
Dank accounts updated following morning
No human intervention
(b) Explain why the booking of airline tickets using batch processing would not be a good
idea.
(b)
It might lead to double booking
Customer would not be sure booking has been successful
Would take a long time to receive confirmation/ticket
Processing would take a long time…
… would cost company money
grade 9
3. Describe the drawbacks of using a command line interface (CLI) operating system.
A CLI only allows you to type in commands
With CLI syntax has to be precise
Commands difficult to edit once entered
Have to learn a lot of commands exactly/have to be familiar with the commands
4. Optical discs and magnetic tapes are both used to store computer data.
Give uses of optical discs and for each use give a reason why they are preferred to
magnetic tapes.
matched pairs:
Companies selling their software/games
Cheap method of production/quick to access data
Making personal backups/transferring data (from one computer to another)
Cheap to buy/quicker to retrieve data/expensive to buy tape drives
Downloading/Copying media such as films/music
Faster/Easier to access individual scenes/tracks/ better or higher quality
grade 9
5. Iqbal wants to test the new computerised payroll system he would like to introduce to his
company. No company worker is paid less than $100 and no worker is paid more than
$500. Explain what is meant by the following three types of test data using examples of the
wages paid to workers.
Normal
Abnormal
Extreme
Normal data – data within a (given) range/appropriate for that data type
Example – any wage between $100 and $500
Abnormal data – data outside the range/of the wrong data type
Example – any wage less than $100 or greater than $500 or text example
Extreme data – data on the boundaries of the range
Example – $100 or $500
6. The head teacher of a school is concerned that students may be hacking into the exam
scores database to change their marks.
Other than passwords, describe ICT methods that could be used to prevent this from
happening.
Biometric methods – unique so only authorized users will have access
Encryption makes it difficult for unauthorised users to read data
Firewall – makes it difficult for unauthorised computers to access the system
Disconnect records computer from network – limit access physically
Access levels – only users with appropriate permissions can access data
grade 9
7. Discuss the use of blogs and social networking sites as means of communication.
Blog is public/anyone can see it
Blog is online diary/personal opinions
Viewers can only add comments on blogs/authors can reply to comments
Only author can edit blog
Social networking sites might only be available to friends of user
Social networking site enable users to send messages to small group of ‘friends’ to
arrange
meetings
Friends can respond more quickly to messages within the group to confirm availability
Easier to share photographs with others
Social networking sites can lead to seclusion from society
Social networking sites can lead to cyber bullying
8. Explain why computer systems have both backing storage and RAM.
If computer is switched off work in RAM goes but backing storage stores data for future
use
More likely that data is accidentally deleted in RAM
RAM is more expensive than backing storage per unit of memory
RAM is bulkier than backing storage per unit of memory
RAM provides faster access than backing storage
Software package may be so large that it is physically impossible for RAM to store it.
Data may need to be transferred from one computer to another and can’t do that with
RAM
grade 9
9. (a) Doctors often use expert systems to help them to diagnose illnesses.
Name components of a typical expert system.
User interface
Rules base
Knowledge base
Inference engine
(b) Name other applications which involve the use of expert systems.
Engine car fault diagnosis
Prospecting
Tax
Careers
Chess games
Animal/plant classification
10. Name and describe validation checks which could be carried out on a 16-digit credit
card number when it is typed into a computer.
pairs:
Length check
Checks there are exactly 16 characters
Invalid character/type check
Checks all characters entered are digits
Check digit
Single digit calculated from other digits appended to these, computer carries out fresh
calculation
on digit and compares answer with original check digit.
Existency check
Is the card number on the database
grade 9
11. Describe how the following health problems can arise due to the use of computers. Give a
different cause for each.
RSI in the wrists
RSI in the fingers
Headaches
Back pain
RSI (Repetitive strain injuries) in the wrists – caused by repetitive typing/prolonged gripping
of mouse
RSI in the fingers – caused by repetitive clicking of mouse
Headaches – staring at the screen for too long
Back pain – sitting in the same position for long periods
12. A bank is looking into a variety of security measures to protect its customers’ data.
Describe types of authentication technique they could use and for each give a benefit
and a drawback.
matched triples:
User ID and password
Benefit – each user ID could be unique/only user will know the password/data can only
be
accessed by person who knows the password/Password can be changed frequently to
avoid
hackers guessing them/Unsuccessful logins can throw you out of the system
Drawback – user might forget password/keylogging software can be used to intercept it
Biometrics
Benefit – each user has unique biometrics
Drawback – equipment is expensive to buy/may be difficult or expensive to get
equipment to user
Magnetic/chip card with PIN
Benefit – Hacker needs to have the card and know the PIN
Drawback – can lose the card/can forget PIN
TAN
Benefit – Always changing so a hacker would not be able to use it even if they
intercepted it when
user typed it in.
Drawback – need to have card and remember PIN and use it within a short period of time.
grade 9
13. Describe how the components of an expert system are used to help a doctor to diagnose
an illness.
Symptoms are entered using the user interface
User interface displays questions...
...based on previous responses
User answers questions using user interface
inference engine compares symptoms
compares symptoms with those in the knowledge base
compares symptoms using rules base…
…matches of symptoms are found
User interface/screen displays possible diagnoses/illnesses/probabilities
14. A bank uses a chip and PIN system at its ATMs. A customer withdraws cash by inserting
their bank card. Write down the steps involved in the computer processing of the
transaction.
The customer is asked to type in their PIN
The (ATM) checks to see if the card is valid
The customer is asked which language/currency they require
The bank account details are read from the chip
Customer is asked if they want a receipt
The typed PIN number is compared with that stored in the chip
If they are the same the transaction proceeds
If they are not the same the customer is asked to re-enter PIN
If three failed attempts transaction rejected and card withheld
The customer is asked which service is required
The customer selects required service (cash)
The customer is asked how much money they want to withdraw
The customer’s account is checked to see if it has sufficient funds
The amount is checked against the card limit
If there are sufficient funds (and the amount is within the card limit) the transaction is
authorised/if
not transaction is rejected
The amount is deducted from the customer account
The bank notes are issued
The card is returned (by the computer)
If required receipt is printed.
grade 9
15. A house has a microprocessor controlled burglar alarm.
(a) Identify three input devices which would be used in this system to feed data back to
the microprocessor.
Temperature sensor
Infra red sensor/Movement sensor/camera/motion sensor
light sensor
Pressure sensor/pad
Contact switch
Sound sensor/microphone
key pad/touch screen
Biometric devices
(b) Describe how a microprocessor would use these devices to detect the presence of an
intruder and what action it would take.
Microprocessor checks input from the user is authentic
Microprocessor (continually) monitors sensors.
If light/infra red sensor reading changes
If movement sensor activated...
If contact switch activated...
If pressure greater than pre-set value.....
If sound greater than pre-set value.....
If temperature greater than pre-set value....
Microprocessor sends signal to sound alarm
Microprocessor sends signal to flashing light/house lights.
Microprocessor sends signal automatically to police
Microprocessor automatically sends message/calls/texts owner
16. Mobile telephones (cellphones) are used for accessing the internet.
Give advantages and disadvantages of using a mobile telephone rather than using
a laptop computer to access the internet.
advantages:
More likely to have it with you
Can access internet from greater number of places
Easier to use while on the move
disadvantages:
Display is more difficult to see/display screen is smaller
Keyboard is smaller so more difficult to type
Some sites do not have full facilities for mobile phone
grade 9
17. Describe what a virus is and what effect it may have on the data on a hard disc.
A piece of program code
Which replicates itself
Fills up hard disc making it unusable
Deletes data/changes data (from hard disc)
Makes software/operating system unusable
18. Discuss the benefits and drawbacks of students using the internet to carry out research.
Internet is not regulated
Danger of accessing inappropriate websites.
Can take long time to find required information
Have to have internet connectivity/computer/phone line/modem
Internet tends to be up to date
Internet has vast amounts of information/wide range of information
Faster to search only if referring to use of search engine
Can access biased/inaccurate/unreliable websites
Lack of expertise can lead to inefficient searching
Easy to plagiarise information
19. A group of car mechanics wants to have an expert system to help them with their work in
diagnosing car engine faults.
Describe how such a system would be created.
Data is gathered/collected from experts
Knowledge base is designed/created
A structure to relate each item in the database / knowledge base is created
An interrogation technique to access the data is created
A user interface/method of displaying the results/method of inputting data/ input
screen/output
screen is designed/created
The inference engine is designed/created
The rules base is designed/created
The system is tested
grade 9
20. Describe online processing of data, using the booking of airline tickets as an example.
User/customer is in direct contact with the main computer/CPU
Appears that nobody else can access system at that point/processing is almost
immediate
Computer asks customer for details of flight
Computer asks for personal details of passengers
Computer searches for matching flights
Computer may display list of seats available
Computer may ask customer to select a seat
(Customer selects seat from those available and) computer flags seat as booked
Computer asks customer to complete payment details
Computer checks details are valid by communicating with customer’s bank
Computer checks if sufficient funds
Airline’s database is updated immediately
Number of seats available reduces by number booked
Prevents double booking
Confirmation/e-ticket may be sent to customer by email
21. Schools are concerned with the possibility that students are using the schools’ internet
connections to access undesirable sites.
Name and describe security methods the schools could use to prevent this from
happening.
Proxy server
The proxy server can restrict the web sites students can access/can block access to
sites with
objectionable material
Firewall
Limits the computers (using IP address) that can access the system/that can be
accessed from
within the school
Applying parental guidance settings.
Can block undesirable topics
22. Describe features of a graphical user interface (GUI).
Window – an area on the screen that displays information for a specific program.
Icon represents a folder or a program – can be seen within a window or freestanding on
screen
Menus – contains lists of options for a certain program/software
Pointing device/Pointer – used to select menu options/icons/close/open windows
grade 9
23. A head teacher wishes to publicise school activities to make his school better known in the
neighborhood. He could do this by using the school’s website or producing a magazine using
DTP to be delivered by hand.
Discuss the advantages and disadvantages of each method.
Advantages of DTP (Desktop publishing)
Can be sure every local family gets to see it
Not everybody has a computer/internet/modem
Can read it anywhere/not limited to where computer is.
Disadvantages of website
Can’t be sure every local family gets to see it
Not everybody has a computer/internet/modem
Can’t read it anywhere/ limited to where computer is.
Disadvantages of DTP
Takes time to physically distribute by hand
Might need to pay somebody to distribute by hand
Costs of ink/paper/printing
Not as easy to update
Not interactive/hyperlinks
No animation/video
No sound
Advantages of website
No costs of ink/paper/printing
Easier to update
Interactive/hyperlinks
Animation/video
Sound
24. Robots are now used on many car production lines.
Describe how their use has affected the nature of employment in the car industry.
Car workers have been made unemployed
Car workers have had to be retrained
Car workers have become deskilled
More technical staff have been employed
Work areas are cleaner
There is a healthier environment
Workers have a safer environment
Fewer manual tasks
grade 9
25. Ali wants to back up his data.
(a) Give reasons why making backups is necessary.
Data could be corrupted on original medium
Data could be accidentally amended/overwritten on original medium
Data could be accidentally deleted from original medium
Data could be maliciously deleted from original medium
(b) Ali thinks that making backups will prevent his data from getting viruses.
Describe what a virus is and explain why Ali is wrong.
Virus is a piece of programming code
Which replicates itself...
Can fill up storage medium making it unusable
Deletes data/change data
Makes software/operating system unusable
If the original medium has a virus the backup will have it as well/backup will have no
effect on the hard disc so it is still susceptible to viruses
26. Describe differences between a blog and a wiki.
Blog usually has a single author/ a Wiki usually has many authors
Blog is usually in reverse chronological structure/ a Wiki has a structure determined by
content
and users
Blog is usually personal/someone’s opinion/ a Wiki is usually objective
Can’t edit a blog/ a Wiki can be edited/ Can only add comments to a blog
grade 9
27. Describe the benefits and drawbacks to companies of using video conferencing.
Benefits:
Can call meeting at short notice
No need to pay travelling expenses
Can work from home
Employees will save time travelling
Do not have to pay hotel expenses
Do not have to pay for conference room facilities
Safer as participants do not have to travel
Don’t have to transport/carry equipment/lots of documents/documents don’t get lost in
transit
Drawbacks:
Takes time/costs money to learn new technology/to be trained
Difficult to have international meetings because of time differences
Initial cost of hardware (and software)
Equipment can break down/power cuts can stop conference
Poor strength of signal/time lag/lip sync can be a problem/ connection can be lost
Loss of personal/social contact
Legal documents cannot be signed
28. A greenhouse is controlled by a microprocessor.
(a) Other than a light sensor name sensors used in the greenhouse.
Temperature
Humidity
Moisture
pH
(b) Explain why computers are unable to read the data directly from these sensors and
name the device which would enable them to do so.
Sensor measures analogue
Computer works in digital
Analogue to digital converter
(c) Describe how the microprocessor uses data from the light sensor.
microprocessor compares light reading with preset value
if lower than pre-set value microprocessor sends signal to switch on light bulb
if higher than pre-set value microprocessor sends signal to switch off light bulb
process is continuous/ monitoring of sensors is continuous
grade 9
29. Computers are used in supermarkets at point of sales terminals. When paying for goods the
customer inserts the bank card into the chip reader.
(a) Identify items of data contained in the chip on a bank card.
Card number
PIN
Expiry date
Type of card/issuer
Security number
(b) Describe checks that would be carried out using information on the card before
the bank is asked to authorise the transaction.
Card is valid/card number exists
Card is in date
PIN entered matches that on card
Checks if card is stolen
(c) Describe five steps which would be carried out by the computers at the supermarket
and at the customer’s bank to complete the transaction.
Customer bank contacted
Bank looks up customer account number
Checks available balance
Checks daily (card) limit
If insufficient funds then transaction is rejected
If sufficient funds then transaction is authorised
Money deducted from customer account
Money credited to supermarket account
grade 9
30. (a) State what is meant by OMR and OCR.
Optical Mark Recognition/Reader
Optical Character Recognition/Reader
(b) Compare and contrast the use of OMR, OCR and a keyboard as methods of data
entry.
OCR and OMR are quicker methods of entering data compared to a keyboard
OMR has limited uses such as exam answers
OMR can be used in school registers
Optical Character Recognition is more prone to errors
OCR can be used by utility companies to read meters/to make entered text editable
Keyboard is used to input data manually/typing
Keyboard can be more accurate than OCR/less accurate than OMR
Keyboard and OCR can input text more easily than OMR
Pre printed stationery is required for OMR
Specialised equipment is required for OCR/OMR
31. Describe what is meant by pharming.
installing malicious code on a PC or server
user is redirected to bogus website
user accesses websites which look authentic
but belong to the fraudster/hacker
are used to gain bank/personal details
32. Name items of hardware, other than a PC, needed to conduct a video conference.
Projector/large screen
Webcam/video camera
Speakers/headphones
Microphone
Router/modem
grade 9
33. A geography teacher wants to build a weather station. She wants to use a computer to
Collect the results.
(a) Describe physical variables which would be measured.
Descriptions of:
Temperature
Pressure
Sunlight
Humidity
Rainfall
(b) The geography teacher wants to create a model to demonstrate basic weather
forecasting to her students.
Describe features of a spreadsheet which make it suitable for modelling
purposes.
Descriptions of:
Uses text and numbers
Performs automatic recalculation
Performs whatifs
Replicates formulae
Formulae/functions
Can have absolute and relative cell references/named cells or ranges
Graphs/charts
(c) Describe other uses of modelling.
descriptions from:
Simulations
Mathematical models
Scientific models
Civil engineering models
Financial models
Flight/pilot simulation/training
Large scale chemical experiments
Design of fairground rides
Traffic control
Building fire simulation
(d) Give reasons, other than reducing timescale, why computer models are
sometimes used rather than the real thing.
Some situations are/real thing might be dangerous/model is less dangerous
Cost of building real thing may be expensive
grade 9
Real thing may waste raw materials/natural resources
Easier to change data/variables
Costs less to change data/variables
The real thing may be impossible to access/create
Real thing may be on too vast a scale
Extremes which can’t be tested in real life can be tested using models
34. Aftab owns a company which has a small number of computers. He wants to connect the
computers into a network. He does not wish to connect the computers to the internet but he
does want the workers to be able to communicate within the company.
(a) Name a network device used to connect the computers together.
Hub/switch/bridge
(b) Name an item of software used to send messages between the computers.
Email software/IM software
(c) What is the name given to this type of network?
LAN/intranet
(d) Give reasons why Aftab may not want his workers to access the internet.
They may waste time playing games/going on social network sites/updating their blog/
online
shopping/banking/surfing
They could access undesirable sites
They could download viruses/malware
Could make the company susceptible to hackers
grade 9
35. A company owns several stores which offer internet shopping to customers.
(a) Give advantages to the company of internet shopping.
Fewer staff needed – less spent on wages
Fewer shops needed – less spent on rates/rent/utilities
Less actual cash handled – fewer robberies
Less money spent on security staff
Potentially larger customer base
(b) Give disadvantages to the company of internet shopping.
Initial cost of hardware/software is expensive
Need to retrain staff
Less customer loyalty/loss of customers/more difficult to sell other services/product due
to
lack of personal touch
Costs of system maintenance
Greater costs due to more delivery staff
36. The head teacher wants to replace the current printed school magazine with one slide show
available on a number of machines in a computer room at parents’ evenings.
Name features available in a slideshow not available in a hard copy magazine. For
each one say how it could be used in the school’s slideshow.
matched pairs from:
Sound
Spoken introduction by head/voiceover the presentation/background music/school
choir/band/orchestra/sound effects when changing/opening a slide
Animation
Text effects/cartoon representing school activities
Video
Introduction by head/school play/choir/band/orchestra/sports activities
Hyperlinks
Move to another slide
Slide transitions
To keep the viewer’s attention
37. Describe methods of verification and explain why verification is needed.
Visually comparing typed in data with original source
Computer compares two versions of the typed in data
Data may be entered/copied inaccurately
Check needs to be carried out to ensure accurate data entry
Validation may not pick up that although the data is acceptable it may still be incorrect
grade 9
38. Describe what is meant by phishing.
Fraudster sends an e-mail
which appear to be authentic
Is sent by a fraudster posing as a bank/organisation
in order to get the target's bank details/personal details
39. Students at a school use the internet to research their work.
Discuss the reliability of information found on the internet.
Internet is not policed so information is not necessarily reliable
Anybody can have a website so information is not necessarily reliable
Anybody can publish their understanding of a topic so information is not necessarily
reliable
If site has excessive advertising it could be unreliable
If the advertising is related only to its own products it could be unreliable
The final part of a URL can help to identify reliability…
… .ac, .gov, .org are usually fairly reliable
Can compare information from sites to see if it is reliable
If site is endorsed by reliable/reputable people/organisations it can be accepted as being
reliable
If it has links to other reliable sites it is usually reliable
If it has testimonials it is likely to be reliable
If the author’s credentials are good it is likely to be reliable
If information is comparable to information from reliable/authenticated/text books it is
likely to be
reliable
If the date of the last update was a long time ago it is likely to be unreliable
40. Give benefits of using social networking sites.
Easy to keep in immediate contact with friends/make new friends
Easy to communicate to more than one friend/to communicate with people overseas
Can search for people who you’ve fallen out of touch with
Easy to arrange meetings/visits to cinemas/theatre
Can share photographs/videos/images/opinions/views
grade 9
41. Aftab owns a company which has a small network of computers.
(a) Give advantages of having computers networked.
(a)
Only one printer is needed
Only one scanner is needed
Data can be shared between computers/data can be accessed by one computer
from another more easily
Software can be shared/updated more easily
All computers can access the internet through one connection
He wants to connect the computers to the internet.
(b) Name the device he would need to be able to do this.
(b) Router/modem
(c) Give benefits and drawbacks of connecting to the internet.
(c)
Advantages – from:
Can communicate with other companies by email
Can use the internet to place orders
Can use the internet to buy materials
Can hold video conferences
Can create own website to publicise company
Disadvantages – from:
Workers may access undesirable sites
Workers may waste time playing games/going on social network sites/updating their
blog/
online shopping/banking
Viruses/malware could be downloaded
Could make the company susceptible to hackers
grade 9
42. Many banks offer internet banking. To access this online service customers have to log on
to the system.
(a) Explain why authentication techniques are necessary.
Authentication techniques such as user names and passwords identify the user to the
system
Without authentication anybody would be able to access data
Hackers would be able to amend/delete data without being prevented
Would have to rely on other methods such as firewalls to prevent unauthorised
access.
(b) Customer data is encrypted. Explain what encryption is and why it is used.
Causes data to be scrambled/encoded
Requires an encryption key/software to encrypt
Requires a decryption key/encryption software to decrypt
Results in data which is not understandable/readable
Protects sensitive data…
… from being understood if it falls in to the wrong hands
43. The growth of the internet has led to many new developments.
Explain what the following terms mean.
Spyware
Spam
Social networking site
Spyware
Software that gathers data from computers without the user realising
It monitors and records all key presses
It sends this information back to the hacker who sent it out
Spam
Electronic junk mail/sending of unsolicited emails
Sent to everybody on a mailing list/many emails sent at once
Can slow down networks
Can fill up the receiver’s mail box and therefore hard disk
Social networking site
Online communities of like minded users
Enables users to share photos
Enables users to communicate with each other
Enables users to organise meetings
grade 9
Allows users to set up profiles
44. Sarbjit has a desktop computer at home which he uses for internet banking.
(a) Identify other computer systems he could use to do internet banking when away
from home.
Smart phone
Laptop with internet access
Tablet computer
(b) Discuss the advantages and disadvantages to banks of using internet banking.
Advantages:
Fewer bank tellers so less paid out in wages
Less actual cash handled – fewer robberies
Have access to a wider customer base
Fewer branch offices needed – less spent on rates/rent/utilities
Less money spent on security staff
Disadvantages
Initial cost of hardware/software is expensive
Need to retrain staff
Loss of customers/more difficult to sell other services due to lack of personal touch
Costs of system maintenance
45. a. Give advantages to bank customers of using ATMs rather than going to the bank to
withdraw cash.
No embarrassment of not having sufficient funds
Less time spent queuing
Can get money any time of day or night
Own bank may be further to travel to than nearest ATM
Can use most ATMs/does not have to be own bank
Have choice of languages so is easier to understand/be understood
grade 9
b. Some mobile telephones (cell phones) can be used to make video calls.
Describe advantages of making video calls rather than sending messages by email.
You get immediate feedback
You know you have the right person/don’t have to worry that you’ve got the wrong email
address
You can ask questions immediately based on feedback/carry out an interactive
conversation
Less impersonal/less risk of upsetting recipient
Can make yourself understood more easily
You can see the other person’s reaction
46. Explain to a computer how to draw a square.
Repeat must be used.
47. How do satellite systems and space technologies relate to ICT?
Navigation, communication, spying, business, etc.
48. What are the main effects on ICT on the society?
Quicker solutions, lower cost, dangers of misuse.
49. How is ICT used at the workplaces?
Quicker solutions, lower cost, dangers of misuse.
grade 9
50. Explain systems analysis and design.
Problem formulation, data collection, design of the system, implementation, maintenance,
etc.
grade 9
Download