1. A customer uses a bank card to purchase a product at a supermarket checkout. The checkout operator uses a number of devices to input data about the customer and the product. Identify these input devices and for each one describe a different item of data that will be input. matched pairs: Chip reader Bank/credit card account information/supermarket code Bar code reader Information from a product label/product identity number Electronic scales Weight of an item Touch screen Identification of product Number pad Bar code number when bar code reader cannot read bar code/the number of items Magnetic stripe reader Information about the customer 2. (a) Describe batch processing of data, using the processing of bank cheques as an example. (a) Data/cheques are collected together during the course of the day Data/cheques are then processed all at once Data/cheques are processed overnight Dank accounts updated following morning No human intervention (b) Explain why the booking of airline tickets using batch processing would not be a good idea. (b) It might lead to double booking Customer would not be sure booking has been successful Would take a long time to receive confirmation/ticket Processing would take a long time… … would cost company money grade 9 3. Describe the drawbacks of using a command line interface (CLI) operating system. A CLI only allows you to type in commands With CLI syntax has to be precise Commands difficult to edit once entered Have to learn a lot of commands exactly/have to be familiar with the commands 4. Optical discs and magnetic tapes are both used to store computer data. Give uses of optical discs and for each use give a reason why they are preferred to magnetic tapes. matched pairs: Companies selling their software/games Cheap method of production/quick to access data Making personal backups/transferring data (from one computer to another) Cheap to buy/quicker to retrieve data/expensive to buy tape drives Downloading/Copying media such as films/music Faster/Easier to access individual scenes/tracks/ better or higher quality grade 9 5. Iqbal wants to test the new computerised payroll system he would like to introduce to his company. No company worker is paid less than $100 and no worker is paid more than $500. Explain what is meant by the following three types of test data using examples of the wages paid to workers. Normal Abnormal Extreme Normal data – data within a (given) range/appropriate for that data type Example – any wage between $100 and $500 Abnormal data – data outside the range/of the wrong data type Example – any wage less than $100 or greater than $500 or text example Extreme data – data on the boundaries of the range Example – $100 or $500 6. The head teacher of a school is concerned that students may be hacking into the exam scores database to change their marks. Other than passwords, describe ICT methods that could be used to prevent this from happening. Biometric methods – unique so only authorized users will have access Encryption makes it difficult for unauthorised users to read data Firewall – makes it difficult for unauthorised computers to access the system Disconnect records computer from network – limit access physically Access levels – only users with appropriate permissions can access data grade 9 7. Discuss the use of blogs and social networking sites as means of communication. Blog is public/anyone can see it Blog is online diary/personal opinions Viewers can only add comments on blogs/authors can reply to comments Only author can edit blog Social networking sites might only be available to friends of user Social networking site enable users to send messages to small group of ‘friends’ to arrange meetings Friends can respond more quickly to messages within the group to confirm availability Easier to share photographs with others Social networking sites can lead to seclusion from society Social networking sites can lead to cyber bullying 8. Explain why computer systems have both backing storage and RAM. If computer is switched off work in RAM goes but backing storage stores data for future use More likely that data is accidentally deleted in RAM RAM is more expensive than backing storage per unit of memory RAM is bulkier than backing storage per unit of memory RAM provides faster access than backing storage Software package may be so large that it is physically impossible for RAM to store it. Data may need to be transferred from one computer to another and can’t do that with RAM grade 9 9. (a) Doctors often use expert systems to help them to diagnose illnesses. Name components of a typical expert system. User interface Rules base Knowledge base Inference engine (b) Name other applications which involve the use of expert systems. Engine car fault diagnosis Prospecting Tax Careers Chess games Animal/plant classification 10. Name and describe validation checks which could be carried out on a 16-digit credit card number when it is typed into a computer. pairs: Length check Checks there are exactly 16 characters Invalid character/type check Checks all characters entered are digits Check digit Single digit calculated from other digits appended to these, computer carries out fresh calculation on digit and compares answer with original check digit. Existency check Is the card number on the database grade 9 11. Describe how the following health problems can arise due to the use of computers. Give a different cause for each. RSI in the wrists RSI in the fingers Headaches Back pain RSI (Repetitive strain injuries) in the wrists – caused by repetitive typing/prolonged gripping of mouse RSI in the fingers – caused by repetitive clicking of mouse Headaches – staring at the screen for too long Back pain – sitting in the same position for long periods 12. A bank is looking into a variety of security measures to protect its customers’ data. Describe types of authentication technique they could use and for each give a benefit and a drawback. matched triples: User ID and password Benefit – each user ID could be unique/only user will know the password/data can only be accessed by person who knows the password/Password can be changed frequently to avoid hackers guessing them/Unsuccessful logins can throw you out of the system Drawback – user might forget password/keylogging software can be used to intercept it Biometrics Benefit – each user has unique biometrics Drawback – equipment is expensive to buy/may be difficult or expensive to get equipment to user Magnetic/chip card with PIN Benefit – Hacker needs to have the card and know the PIN Drawback – can lose the card/can forget PIN TAN Benefit – Always changing so a hacker would not be able to use it even if they intercepted it when user typed it in. Drawback – need to have card and remember PIN and use it within a short period of time. grade 9 13. Describe how the components of an expert system are used to help a doctor to diagnose an illness. Symptoms are entered using the user interface User interface displays questions... ...based on previous responses User answers questions using user interface inference engine compares symptoms compares symptoms with those in the knowledge base compares symptoms using rules base… …matches of symptoms are found User interface/screen displays possible diagnoses/illnesses/probabilities 14. A bank uses a chip and PIN system at its ATMs. A customer withdraws cash by inserting their bank card. Write down the steps involved in the computer processing of the transaction. The customer is asked to type in their PIN The (ATM) checks to see if the card is valid The customer is asked which language/currency they require The bank account details are read from the chip Customer is asked if they want a receipt The typed PIN number is compared with that stored in the chip If they are the same the transaction proceeds If they are not the same the customer is asked to re-enter PIN If three failed attempts transaction rejected and card withheld The customer is asked which service is required The customer selects required service (cash) The customer is asked how much money they want to withdraw The customer’s account is checked to see if it has sufficient funds The amount is checked against the card limit If there are sufficient funds (and the amount is within the card limit) the transaction is authorised/if not transaction is rejected The amount is deducted from the customer account The bank notes are issued The card is returned (by the computer) If required receipt is printed. grade 9 15. A house has a microprocessor controlled burglar alarm. (a) Identify three input devices which would be used in this system to feed data back to the microprocessor. Temperature sensor Infra red sensor/Movement sensor/camera/motion sensor light sensor Pressure sensor/pad Contact switch Sound sensor/microphone key pad/touch screen Biometric devices (b) Describe how a microprocessor would use these devices to detect the presence of an intruder and what action it would take. Microprocessor checks input from the user is authentic Microprocessor (continually) monitors sensors. If light/infra red sensor reading changes If movement sensor activated... If contact switch activated... If pressure greater than pre-set value..... If sound greater than pre-set value..... If temperature greater than pre-set value.... Microprocessor sends signal to sound alarm Microprocessor sends signal to flashing light/house lights. Microprocessor sends signal automatically to police Microprocessor automatically sends message/calls/texts owner 16. Mobile telephones (cellphones) are used for accessing the internet. Give advantages and disadvantages of using a mobile telephone rather than using a laptop computer to access the internet. advantages: More likely to have it with you Can access internet from greater number of places Easier to use while on the move disadvantages: Display is more difficult to see/display screen is smaller Keyboard is smaller so more difficult to type Some sites do not have full facilities for mobile phone grade 9 17. Describe what a virus is and what effect it may have on the data on a hard disc. A piece of program code Which replicates itself Fills up hard disc making it unusable Deletes data/changes data (from hard disc) Makes software/operating system unusable 18. Discuss the benefits and drawbacks of students using the internet to carry out research. Internet is not regulated Danger of accessing inappropriate websites. Can take long time to find required information Have to have internet connectivity/computer/phone line/modem Internet tends to be up to date Internet has vast amounts of information/wide range of information Faster to search only if referring to use of search engine Can access biased/inaccurate/unreliable websites Lack of expertise can lead to inefficient searching Easy to plagiarise information 19. A group of car mechanics wants to have an expert system to help them with their work in diagnosing car engine faults. Describe how such a system would be created. Data is gathered/collected from experts Knowledge base is designed/created A structure to relate each item in the database / knowledge base is created An interrogation technique to access the data is created A user interface/method of displaying the results/method of inputting data/ input screen/output screen is designed/created The inference engine is designed/created The rules base is designed/created The system is tested grade 9 20. Describe online processing of data, using the booking of airline tickets as an example. User/customer is in direct contact with the main computer/CPU Appears that nobody else can access system at that point/processing is almost immediate Computer asks customer for details of flight Computer asks for personal details of passengers Computer searches for matching flights Computer may display list of seats available Computer may ask customer to select a seat (Customer selects seat from those available and) computer flags seat as booked Computer asks customer to complete payment details Computer checks details are valid by communicating with customer’s bank Computer checks if sufficient funds Airline’s database is updated immediately Number of seats available reduces by number booked Prevents double booking Confirmation/e-ticket may be sent to customer by email 21. Schools are concerned with the possibility that students are using the schools’ internet connections to access undesirable sites. Name and describe security methods the schools could use to prevent this from happening. Proxy server The proxy server can restrict the web sites students can access/can block access to sites with objectionable material Firewall Limits the computers (using IP address) that can access the system/that can be accessed from within the school Applying parental guidance settings. Can block undesirable topics 22. Describe features of a graphical user interface (GUI). Window – an area on the screen that displays information for a specific program. Icon represents a folder or a program – can be seen within a window or freestanding on screen Menus – contains lists of options for a certain program/software Pointing device/Pointer – used to select menu options/icons/close/open windows grade 9 23. A head teacher wishes to publicise school activities to make his school better known in the neighborhood. He could do this by using the school’s website or producing a magazine using DTP to be delivered by hand. Discuss the advantages and disadvantages of each method. Advantages of DTP (Desktop publishing) Can be sure every local family gets to see it Not everybody has a computer/internet/modem Can read it anywhere/not limited to where computer is. Disadvantages of website Can’t be sure every local family gets to see it Not everybody has a computer/internet/modem Can’t read it anywhere/ limited to where computer is. Disadvantages of DTP Takes time to physically distribute by hand Might need to pay somebody to distribute by hand Costs of ink/paper/printing Not as easy to update Not interactive/hyperlinks No animation/video No sound Advantages of website No costs of ink/paper/printing Easier to update Interactive/hyperlinks Animation/video Sound 24. Robots are now used on many car production lines. Describe how their use has affected the nature of employment in the car industry. Car workers have been made unemployed Car workers have had to be retrained Car workers have become deskilled More technical staff have been employed Work areas are cleaner There is a healthier environment Workers have a safer environment Fewer manual tasks grade 9 25. Ali wants to back up his data. (a) Give reasons why making backups is necessary. Data could be corrupted on original medium Data could be accidentally amended/overwritten on original medium Data could be accidentally deleted from original medium Data could be maliciously deleted from original medium (b) Ali thinks that making backups will prevent his data from getting viruses. Describe what a virus is and explain why Ali is wrong. Virus is a piece of programming code Which replicates itself... Can fill up storage medium making it unusable Deletes data/change data Makes software/operating system unusable If the original medium has a virus the backup will have it as well/backup will have no effect on the hard disc so it is still susceptible to viruses 26. Describe differences between a blog and a wiki. Blog usually has a single author/ a Wiki usually has many authors Blog is usually in reverse chronological structure/ a Wiki has a structure determined by content and users Blog is usually personal/someone’s opinion/ a Wiki is usually objective Can’t edit a blog/ a Wiki can be edited/ Can only add comments to a blog grade 9 27. Describe the benefits and drawbacks to companies of using video conferencing. Benefits: Can call meeting at short notice No need to pay travelling expenses Can work from home Employees will save time travelling Do not have to pay hotel expenses Do not have to pay for conference room facilities Safer as participants do not have to travel Don’t have to transport/carry equipment/lots of documents/documents don’t get lost in transit Drawbacks: Takes time/costs money to learn new technology/to be trained Difficult to have international meetings because of time differences Initial cost of hardware (and software) Equipment can break down/power cuts can stop conference Poor strength of signal/time lag/lip sync can be a problem/ connection can be lost Loss of personal/social contact Legal documents cannot be signed 28. A greenhouse is controlled by a microprocessor. (a) Other than a light sensor name sensors used in the greenhouse. Temperature Humidity Moisture pH (b) Explain why computers are unable to read the data directly from these sensors and name the device which would enable them to do so. Sensor measures analogue Computer works in digital Analogue to digital converter (c) Describe how the microprocessor uses data from the light sensor. microprocessor compares light reading with preset value if lower than pre-set value microprocessor sends signal to switch on light bulb if higher than pre-set value microprocessor sends signal to switch off light bulb process is continuous/ monitoring of sensors is continuous grade 9 29. Computers are used in supermarkets at point of sales terminals. When paying for goods the customer inserts the bank card into the chip reader. (a) Identify items of data contained in the chip on a bank card. Card number PIN Expiry date Type of card/issuer Security number (b) Describe checks that would be carried out using information on the card before the bank is asked to authorise the transaction. Card is valid/card number exists Card is in date PIN entered matches that on card Checks if card is stolen (c) Describe five steps which would be carried out by the computers at the supermarket and at the customer’s bank to complete the transaction. Customer bank contacted Bank looks up customer account number Checks available balance Checks daily (card) limit If insufficient funds then transaction is rejected If sufficient funds then transaction is authorised Money deducted from customer account Money credited to supermarket account grade 9 30. (a) State what is meant by OMR and OCR. Optical Mark Recognition/Reader Optical Character Recognition/Reader (b) Compare and contrast the use of OMR, OCR and a keyboard as methods of data entry. OCR and OMR are quicker methods of entering data compared to a keyboard OMR has limited uses such as exam answers OMR can be used in school registers Optical Character Recognition is more prone to errors OCR can be used by utility companies to read meters/to make entered text editable Keyboard is used to input data manually/typing Keyboard can be more accurate than OCR/less accurate than OMR Keyboard and OCR can input text more easily than OMR Pre printed stationery is required for OMR Specialised equipment is required for OCR/OMR 31. Describe what is meant by pharming. installing malicious code on a PC or server user is redirected to bogus website user accesses websites which look authentic but belong to the fraudster/hacker are used to gain bank/personal details 32. Name items of hardware, other than a PC, needed to conduct a video conference. Projector/large screen Webcam/video camera Speakers/headphones Microphone Router/modem grade 9 33. A geography teacher wants to build a weather station. She wants to use a computer to Collect the results. (a) Describe physical variables which would be measured. Descriptions of: Temperature Pressure Sunlight Humidity Rainfall (b) The geography teacher wants to create a model to demonstrate basic weather forecasting to her students. Describe features of a spreadsheet which make it suitable for modelling purposes. Descriptions of: Uses text and numbers Performs automatic recalculation Performs whatifs Replicates formulae Formulae/functions Can have absolute and relative cell references/named cells or ranges Graphs/charts (c) Describe other uses of modelling. descriptions from: Simulations Mathematical models Scientific models Civil engineering models Financial models Flight/pilot simulation/training Large scale chemical experiments Design of fairground rides Traffic control Building fire simulation (d) Give reasons, other than reducing timescale, why computer models are sometimes used rather than the real thing. Some situations are/real thing might be dangerous/model is less dangerous Cost of building real thing may be expensive grade 9 Real thing may waste raw materials/natural resources Easier to change data/variables Costs less to change data/variables The real thing may be impossible to access/create Real thing may be on too vast a scale Extremes which can’t be tested in real life can be tested using models 34. Aftab owns a company which has a small number of computers. He wants to connect the computers into a network. He does not wish to connect the computers to the internet but he does want the workers to be able to communicate within the company. (a) Name a network device used to connect the computers together. Hub/switch/bridge (b) Name an item of software used to send messages between the computers. Email software/IM software (c) What is the name given to this type of network? LAN/intranet (d) Give reasons why Aftab may not want his workers to access the internet. They may waste time playing games/going on social network sites/updating their blog/ online shopping/banking/surfing They could access undesirable sites They could download viruses/malware Could make the company susceptible to hackers grade 9 35. A company owns several stores which offer internet shopping to customers. (a) Give advantages to the company of internet shopping. Fewer staff needed – less spent on wages Fewer shops needed – less spent on rates/rent/utilities Less actual cash handled – fewer robberies Less money spent on security staff Potentially larger customer base (b) Give disadvantages to the company of internet shopping. Initial cost of hardware/software is expensive Need to retrain staff Less customer loyalty/loss of customers/more difficult to sell other services/product due to lack of personal touch Costs of system maintenance Greater costs due to more delivery staff 36. The head teacher wants to replace the current printed school magazine with one slide show available on a number of machines in a computer room at parents’ evenings. Name features available in a slideshow not available in a hard copy magazine. For each one say how it could be used in the school’s slideshow. matched pairs from: Sound Spoken introduction by head/voiceover the presentation/background music/school choir/band/orchestra/sound effects when changing/opening a slide Animation Text effects/cartoon representing school activities Video Introduction by head/school play/choir/band/orchestra/sports activities Hyperlinks Move to another slide Slide transitions To keep the viewer’s attention 37. Describe methods of verification and explain why verification is needed. Visually comparing typed in data with original source Computer compares two versions of the typed in data Data may be entered/copied inaccurately Check needs to be carried out to ensure accurate data entry Validation may not pick up that although the data is acceptable it may still be incorrect grade 9 38. Describe what is meant by phishing. Fraudster sends an e-mail which appear to be authentic Is sent by a fraudster posing as a bank/organisation in order to get the target's bank details/personal details 39. Students at a school use the internet to research their work. Discuss the reliability of information found on the internet. Internet is not policed so information is not necessarily reliable Anybody can have a website so information is not necessarily reliable Anybody can publish their understanding of a topic so information is not necessarily reliable If site has excessive advertising it could be unreliable If the advertising is related only to its own products it could be unreliable The final part of a URL can help to identify reliability… … .ac, .gov, .org are usually fairly reliable Can compare information from sites to see if it is reliable If site is endorsed by reliable/reputable people/organisations it can be accepted as being reliable If it has links to other reliable sites it is usually reliable If it has testimonials it is likely to be reliable If the author’s credentials are good it is likely to be reliable If information is comparable to information from reliable/authenticated/text books it is likely to be reliable If the date of the last update was a long time ago it is likely to be unreliable 40. Give benefits of using social networking sites. Easy to keep in immediate contact with friends/make new friends Easy to communicate to more than one friend/to communicate with people overseas Can search for people who you’ve fallen out of touch with Easy to arrange meetings/visits to cinemas/theatre Can share photographs/videos/images/opinions/views grade 9 41. Aftab owns a company which has a small network of computers. (a) Give advantages of having computers networked. (a) Only one printer is needed Only one scanner is needed Data can be shared between computers/data can be accessed by one computer from another more easily Software can be shared/updated more easily All computers can access the internet through one connection He wants to connect the computers to the internet. (b) Name the device he would need to be able to do this. (b) Router/modem (c) Give benefits and drawbacks of connecting to the internet. (c) Advantages – from: Can communicate with other companies by email Can use the internet to place orders Can use the internet to buy materials Can hold video conferences Can create own website to publicise company Disadvantages – from: Workers may access undesirable sites Workers may waste time playing games/going on social network sites/updating their blog/ online shopping/banking Viruses/malware could be downloaded Could make the company susceptible to hackers grade 9 42. Many banks offer internet banking. To access this online service customers have to log on to the system. (a) Explain why authentication techniques are necessary. Authentication techniques such as user names and passwords identify the user to the system Without authentication anybody would be able to access data Hackers would be able to amend/delete data without being prevented Would have to rely on other methods such as firewalls to prevent unauthorised access. (b) Customer data is encrypted. Explain what encryption is and why it is used. Causes data to be scrambled/encoded Requires an encryption key/software to encrypt Requires a decryption key/encryption software to decrypt Results in data which is not understandable/readable Protects sensitive data… … from being understood if it falls in to the wrong hands 43. The growth of the internet has led to many new developments. Explain what the following terms mean. Spyware Spam Social networking site Spyware Software that gathers data from computers without the user realising It monitors and records all key presses It sends this information back to the hacker who sent it out Spam Electronic junk mail/sending of unsolicited emails Sent to everybody on a mailing list/many emails sent at once Can slow down networks Can fill up the receiver’s mail box and therefore hard disk Social networking site Online communities of like minded users Enables users to share photos Enables users to communicate with each other Enables users to organise meetings grade 9 Allows users to set up profiles 44. Sarbjit has a desktop computer at home which he uses for internet banking. (a) Identify other computer systems he could use to do internet banking when away from home. Smart phone Laptop with internet access Tablet computer (b) Discuss the advantages and disadvantages to banks of using internet banking. Advantages: Fewer bank tellers so less paid out in wages Less actual cash handled – fewer robberies Have access to a wider customer base Fewer branch offices needed – less spent on rates/rent/utilities Less money spent on security staff Disadvantages Initial cost of hardware/software is expensive Need to retrain staff Loss of customers/more difficult to sell other services due to lack of personal touch Costs of system maintenance 45. a. Give advantages to bank customers of using ATMs rather than going to the bank to withdraw cash. No embarrassment of not having sufficient funds Less time spent queuing Can get money any time of day or night Own bank may be further to travel to than nearest ATM Can use most ATMs/does not have to be own bank Have choice of languages so is easier to understand/be understood grade 9 b. Some mobile telephones (cell phones) can be used to make video calls. Describe advantages of making video calls rather than sending messages by email. You get immediate feedback You know you have the right person/don’t have to worry that you’ve got the wrong email address You can ask questions immediately based on feedback/carry out an interactive conversation Less impersonal/less risk of upsetting recipient Can make yourself understood more easily You can see the other person’s reaction 46. Explain to a computer how to draw a square. Repeat must be used. 47. How do satellite systems and space technologies relate to ICT? Navigation, communication, spying, business, etc. 48. What are the main effects on ICT on the society? Quicker solutions, lower cost, dangers of misuse. 49. How is ICT used at the workplaces? Quicker solutions, lower cost, dangers of misuse. grade 9 50. Explain systems analysis and design. Problem formulation, data collection, design of the system, implementation, maintenance, etc. grade 9