You are on page 1of 6

Mid Year Marking Key 2015

(a) Three from:


Temperature sensor
Light sensor
Humidity sensor
Number pad

[3]

(b) Three from:


Sprinkler
Heater
Light
Motor

[3]

Complete the table by identifying the most appropriate device for each use.
Device

Use
printing on multipart stationery
reading information from the front of bank cards
making fileserver backup copies
to read data from a product in a supermarket

[4]

3 Thee advantages from:


Advantages
Less danger of mugging
Dont have to waste time travelling/queuing
Dont have to spend money on travelling to shops
Greater choice of goods
Can shop when shops are closed
Easier to search and find what you are looking for
Comparison websites will find you the cheapest option
Goods may be cheaper as shops have less staff to pay/less premises to rent
Dont have to pay car parking charges
Dont have to pay for shopping bags
Vouchers/special deals are often only available online/online discounts

Any three from


Disadvantages
Lack of socialising/social contacts
Hackers may intercept data and defraud customer
Deprived of personal touch
Cannot see/feel goods in reality
More vulnerable to phishing/pharming
Goods sometimes dont arrive/substitute goods may be sent/take longer to arrive/may be
delivered to wrong address
Shipping charges
ISP costs/Possible high connection charges
Initial cost of equipment/phone line
Postal costs of returning items
One mark available for reasoned conclusion
Must have at least one advantage and disadvantage to gain full marks

[6]

Problem Description of how electrocution might be caused


Prevention RCB installed/dont allow liquids near computers
Problem trailing cables trips users up
Prevention create ducts/cover cables with carpets etc.
Problem heavy equipment falling injuring users
Prevention sturdy tables
Problem Description of how fire might be caused
Prevention CO2 extinguisher/dont overload sockets

1 mark for each problem (2 max)


5

Two from:
Windows
Icons
Menus
Pointer/Pointing device

[2]


Text
Integers
Sound

[1]

[1]

Decimal numbers
Video
Graphics

(b) Two from:


Microphone
Sound card
Speakers

[2]

(c) Two matched pairs from:


Desk Top Publishing
Producing the layout/template of the brochure
Database
List of characters/actors
Spreadsheet
Prices/list of refreshments and costs
Word processing
Type/enter/create/produce the text for the brochure/dont allow write (up) the information
Image editing software/graphics package
To prepare images for inclusion in brochure

[4]

Two from:
Send an email
Send an SMS/text message
Use instant messaging
Send a fax
Leave a message on voicemail
Make a phone call
Use VOIP
Send an alert on the company intranet/website
Social networking
Video conference

[2]

8
Software

Task
Typing a letter
Calculating profit and loss
Viewing pages on the Internet
Creating a slide show
[4]

9 (a) Two from:


Can be sure every parent/student gets a copy
Easier to target who the head wants to get it
Not every home has a computer/internet access

[2]

(b) Three from:


Cost of delivery/paying someone to deliver
Costs school extra to print copies/ink costs
Extra cost if colour is included
Cannot use multimedia
More difficult to amend/update
Limited to parents of school children

[3]

10 three from:
May make friends with inappropriate people
Cannot be sure the person you are communicating with is the same as the images you have
seen.
Can become preoccupied with sites and not do other tasks/perform poorly academically
Can swap coursework/homework inappropriately
Lose person to person social skills/spend less time with family/friends
Prone to cyber bullying
Continual use results in lack of exercise, causing health problems
[4]

11 (a) Two from:


Switched hub
Has many computers connected to it
Can learn/store addresses of each computer in that part of the network
Can direct data to specific computers/devices

[2]

(b) Two from:


Connects network/computers to the internet
Uses IP addresses
Transfers data between networks
Connects LANs/networks together

[2]

12 (a) Two from:


Hackers may read the data and pass it on/find out embarrassing details and pass it on
Hackers may delete the data/remove accounts
Hackers may amend the data/change how much money they have in their account
Hackers may create new accounts to defraud the bank
Transfer money from customers accounts to hackers own account

[3]

(b) Three from:


Usernames identify the customer to the system/Passwords customers cant access the
system if they dont know the password/unauthorised users will not know the
password/memorable data only people who know the memorable data will be able to
access the account
Biometric methods are used because they are unique to each customer so only customer
with specific biometric features can access that account
TAN only customers with the phone that the TAN has been sent to and know the password
can access the account
Two factor authentication only people with device, card and PIN can access the account
Magnetic stripe/smart card/Dongle/card
cards/readers/dongle accessing system

with

chip

prevents

people

13 (a) Two from:


Humidity
Temperature
Pressure
(Sun)light
Rainfall

without
[3]

[3]

(b) (i) Sensor measures analogue data


Computer works in digital

[1]

(ii) Analogue to digital converter

[1]

(c) Three from:


Computer can take readings during holidays
Computer (readings) are more accurate
Students might forget to take readings/readings can be taken at regular intervals
Readings can be taken more frequently
Readings can be taken any time of day or night
Can produce graphs more quickly/automatically

[3]

14 (a) Sound there might be other noises e.g. roadworks, masking the sound of a car
Light Anybody could break the beam not just cars/direct sunlight may affect readings

[1]
[1]

(b) Measurement is the monitoring of physical variables without the microprocessor taking action [1]
Control is when the microprocessor takes action depending on sensor readings
15 (a) Two from:
Temperature sensor
Number pad
Remote control
Touch screen

[1]

[2]

(b) Three from:


Microprocessor stores required temperature as preset value
Microprocessor receives temperature from sensor
Microprocessor compares temperature from sensor to pre-set temperature
If temperature is lower than preset value microprocessor sends a signal to the actuator
. to turn heater on
If higher than preset value microprocessor sends a signal to turn heater off
[3]
16

A file is a collection of records/all the students names, addresses, phone


numbers and dates of birth
A field is one item of information/name/address/phone number/date of birth
A record is all the information about one student/name, address, phone
number and date of birth of one student

17

PEN DOWN

BACKWARD

140

LEFT

90

PENDOWN

REPEAT

REPEAT

FORWARD

50

FORWARD

60

RIGHT

72

RIGHT

90

END REPEAT

END REPEAT

PENUP
One mark for every line except the square then one mark per two instructions

[8]

18 (a) 3

[1]

(b) 5

[1]

(c) Three from:


The personal details file and test results files would be saved as separate tables
Primary key/key field(s)/foreign key would be identified
The Unique ID number set to primary key would be used to link the tables together

[3]

(d) Two from:


Data does not have to be typed in twice
Quicker to enter/update/edit data
Fewer errors are likely
Reduces storage requirements

[2]

19

(a) Three from:


Descriptions of:
Temperature
Pressure
Sunlight
Humidity
Rainfall

[3]

(b) Three from:


Descriptions of:
Uses text and numbers
Performs automatic recalculation
Performs whatifs
Replicates formulae
Formulae/functions
Can have absolute and relative cell references/named cells or ranges
Graphs/charts

[3]

(c) Three descriptions from:


Simulations
Mathematical models
Scientific models
Civil engineering models
Financial models
Flight/pilot simulation/training
Large scale chemical experiments
Design of fairground rides
Traffic control
Building fire simulation

20 Four from:
User/customer is in direct contact with the main computer/CPU
Appears that nobody else can access system at that point/processing is almost immediate
Computer asks customer for details of flight
Computer asks for personal details of passengers
Computer searches for matching flights
Computer may display list of seats available
Computer may ask customer to select a seat
(Customer selects seat from those available and) computer flags seat as booked
Computer asks customer to complete payment details
Computer checks details are valid by communicating with customers bank
Computer checks if sufficient funds
Airlines database is updated immediately
Number of seats available reduces by number booked
Prevents double booking
Confirmation/e-ticket may be sent to customer by email
21

Four from:
Cheques are collected together
During the course of the day
Cheques are then processed all at once
Cheques are processed overnight
Bank accounts updated following morning
No human intervention

[3]

[4]

[3]

You might also like