You are on page 1of 30

IGCSE ICT

1-Give advantages of using sensors rather than entering the data manually.

Faster to input data


more accurate data entry / no human error
Capture and entry is a single process
No need to pay staff to enter data

2-Describe the term Bluetooth.

Wireless communication / wireless connection


Short range / up to 10 meters
Radio waves
Unlicensed / anyone can set up connection
Relatively slow compared to other connections

3- Identify the risks to the data stored on a computer when connected to the internet
and for each give the actions that can be taken to reduce the risk.

Risk Action
Hackers Firewall
Passwords
Encryption
Install operating system security updates
Change default settings on routers
Identity theft / Anti-Adware / spyware / phishing
phishing / Dont reply to suspicious emails
spyware
Viruses Install anti-virus software
Update regularly
Treat unknown files / email attachments
with caution
Use a browser add-on to block known
attack sites

4-Describe the benefits of using a wired connection, rather than a wireless


connection, to access the network.

Benefit Explanation
Wired generally Better performance when
faster/bigger playing games
bandwidth than
wireless
Wired more Less risk of interference (from
reliable/stable other devices)
Wired not affected by Can be further away from the
walls etc. router
Wired simple to Very easy for beginners to set
configure up

5-Identify the advantages of buying clothes online rather than visiting a shop.
No need to leave home / travel to shops / take children shopping
No queuing
Online discounts / special offers / lower overheads passed to customers
Available 24/7
Know instantly if in stock
Immediate confirmation
Comparing prices with other retailers
Wider range of retailers/stock available
Ability to search for items

6-Identify the disadvantages of buying childrens clothes online rather than visiting a
shop.

Cant try clothes on / check goods / wrong items may be sent


Childrens clothing sizes often inconsistent
Cant judge quality
Bogus websites
No cash payments / you need a card or an account
Have to wait for goods to be delivered / cant have the goods immediately
Sales advice not available
Have to pay postage / delivery charge

7- Give facilities that could be provided on the website to help potential customers.
For each facility, give an advantage to the company and an advantage to the customer.

Facility Company adv. Customer adv.


email / contact us no need to make phones 24 / 7
FAQ / customer support cuts down on support staff no need for phone
pages requirement calls
sign-ups for newsletter gives targeted advertising receives offers,
/ Special offers... upgrade info etc.
search facility present active pages / easy to find what you
create need
specialized pages / present
tailored info to client
Method for customers Develops good customer Provides independent
to post comments e.g. relationships comments about the
forum, reviews Improve customer service goods
Customer history Target advertising Can quickly go back to
other items you have
looked at
Customer account More accurate entry Convenience
facility Improved security
Size guide Improved customer service Helps select the correct
size

8-When a product is ordered online the customers data is kept in a database. What are
the legal impacts on the website?

Data should be kept secure


Data should be accurate
Data should not be misused
Data should be collected fairly
Individuals should be able to see the data held about them
Data should be held for only as long as necessary
Data should only be used for the purpose for which it was collected
Data must be kept up-to-date

9-Identify the benefits of using a network in a school

Centrally manage student use


Share printers / peripherals
Staff can upload files to share with students
(Files to be shared) uploaded into central area / collaborative working
Access from any machine / roaming profile
Easy to install software / software only needs to be installed on server
Security centrally managed
Backup centrally managed
Communicate with other workstations without using the internet / internal email
Simultaneous access to the internet / only one internet connection needed
Terminals often cheaper than standalone machines

10-A school has set up an intranet as part of the network.


Identify the ways in which the intranet can be used by students or teachers.

Communicate with other workstations (via intranet)

Students:
can collect homework
can submit homework
Notice boards
Administration e.g. absence recording, pupils marks

Teachers:
Central area for accessing student data
Notice boards
Central area for administration documents
Central area for educational information
Can post homework for students

11- Identify health guidelines that should be included

Take regular breaks


Adjust seats to suit self / proper posture correct
Height / back support
Adjust monitor correct angle / not reflecting light / contrast
Use wrist rests / other ergonomic equipment provided / use wrist / hand exercises
Focus on a distant object to avoid eye strain

12- Students use the internet to research topics for school.


Discuss the factors that they should consider during their research and when
Using the information gathered in their own work.

When researching:

Should consider that not all information found on the internet is accurate
Check the reliability and validity of the author / use reliable websites
Compare information from several sources
Use websites recommended by teachers / other reliable people / trusted organizations
Recognize that some information may be biased
Consider relevance of the information provided

When using the information (e.g. in a report):

Copyright rules must be considered


Must get permission to use the information
Acknowledge source
Avoid plagiarism

13-Identify the positive effects on organizations resulting from the widespread use of
ICT.

Improved communication with customers / suppliers


Improved internal communication
Wider access to markets
New methods of production
Reduction in staff as IT takes over jobs
Flexible working (home working and hot-desking)
For staff reduces costs of office space / can select
Staff from wider area / may be able to hire cheaper staff
Improved image / brand awareness

14-Identify the negative effect on organizations resulting from the widespread use of
ICT.

Increased problems of data security


More competition from organizations from wider area
Increased training
Flexible working for staff more difficult to monitor / difficult to team build

15-ICT has also impacted on society. One effect is a widening gap between
Information rich and information poor societies.
Discuss the factors that have contributed to this widening gap

Lack of communication networks in some countries / regions restricts access


Cost of technology prohibitive for some societies / individuals
Link between economic development and ICT use
Access to digital technologies provides:

Access to more information about a wide range of topics


Better education / training leading to better jobs (gap reduction)
Access to up-to-date information e.g. news
Ability to share ideas with like-minded people
Those without access cant take advantage and fall further behind.
Impact on different groups (rich, poor, level of education, age, location)

16-Identify the device that can be used for both input and visual output

Touchscreen and information point


17- Give an example of a strong password. Explain why this password is strong

B! j2D? F 8a
Password 6 characters min length
Includes upper/lower case
Includes symbols/punctuation
Includes letters and numbers
Word not related to user / random (mix of characters)
Includes spaces

18-Identify the precautions that should be taken to protect passwords

Dont tell anyone


Dont write it down
Change regularly
Dont let anyone see you entering it
Use different passwords for different accounts
Don't click yes when prompted by a system
'Remember this password?' / don't enter your
Password when prompted suspiciously

19- State the ways in which access rights impact upon the user.

Each user has a profile


Restricts access to certain programs
Restricts access to certain data / files
Restricts access to certain parts of the system
Restricts what a user can do on the system e.g. installing software

20-Benefits of being in a network

Set access rights


Share / transfer documents / files / folders / data
Share peripherals /appropriate stated piece of hardware
Sharing internet connection / only 1 internet connection needed (1)
Security can be centrally managed / management of firewall, antivirus etc.
User account control (not access rights)
Central monitoring of every machine
Central control of backup
Files (to share) can be uploaded centrally
Central software administration / software can be installed and updated easily / faster
May be cheaper to buy network version of software
Can use any workstation / hot-desking
Communicate with other workstations without using the internet / internal email
Intranet

21-How large RAM will help better performance in entertainment use.

Multimedia takes up a lot of storage space / RAM


RAM temporarily holds data and instructions for the software
Large RAM means less swapping with the hard disk OR small RAM means more swapping
with the hard disk
Large RAM helps multimedia run smoothly
Larger RAM allows multitasking
Providing faster access to software and data than hard drive

22-Explain the purpose of a software license.

Gives the right / permission to use /download the software


If the user has a license it is legal to use the software / it is illegal without a license
License shows that the software has been obtained legally /bought
To acknowledge the author of the software
Software producer / owner will receive payment
Will be able to take legal action if anyone copies the software without permission /
prevents illegal copying / piracy

23-Identify the precautions that should be taken to help stay safe on the internet.

Dont give out personal information, unless you are sure of the recipient
Use copy lists with care
Use social networking sites with care
Make use of privacy settings (public/private) / use block lists / filters
Dont post pictures/text detailing your location
Dont link to friends of friends.
Be careful about arranging physical meetings

24-Discuss the advantages and disadvantages of downloading and streaming

Downloading:
Entire video must be saved on users computer system initially
Often very large files
Need large storage
Can view whenever user wants
Can keep the files for as long as they want
May be able to edit
Dont need to have internet access once saved

Streaming:
Dont have to store the files on computer
Can start watching as soon as streaming begins
Must view when being streamed
Need internet access
Rely on good signal
Quality may be affected by buffering

25- What type of software maintains environmental conditions?

Control software

26- Describe ways of reducing the risk of unauthorized access.

Install a firewall: A shield that will prevent hackers / prevents the network being 'seen'
Accessing data from outside the network / Access via the internet

Encryption: Data is meaningless to anyone trying to view the data.


Scrambled information
Meaningless to unauthorized viewers / without key / password
Cannot be read without decryption

WEP / WPA / WPA2: Is the key to access the Wi-Fi


Signal is meaningless to anyone who intercepts it
Scrambled / encrypted signal
Key is a long list of randomly generated letters and numbers

Installing anti-virus Software: Prevents Trojans / spyware from stealing data

27- Stored data are vulnerable. Define the risks and actions regarding it.

Risk Method
Anti-virus software / antimalware
Virus / malware Treat unknown files / email
attachments with caution
Backup
Accidental deletion / Access rights
accidental damage / Password on files
accidental corruption Read only files
File recovery software
Backup
Malicious damage Access rights
Password on files
Physical problems
Backup
E.g. fire, flood
Hardware or software
malfunction (must be Backup
specific item)

28- Describe the impact of ICT on people working in manufacturing

Many unskilled jobs lost / more skilled jobs created


Jobs taken over by robots / CAD systems / CAM systems
Jobs have changed e.g. maintaining systems
Employees need to be retrained to cope with new systems
New jobs have been created
Job migration to take advantage of high skill areas
Safer working conditions / better working environment

29- Describe the impact of ICT on people working in education.

Teachers job changed due to new methods, e.g. availability of information requiring
facilitation of learning
CAL / Learning platforms / use of VLE
Interactive white boards/ other new technology in classrooms
Management Information systems

30- Describe the impact of ICT on people working in retail.

Move to internet shopping has reduced number of shop workers


Increase in jobs in on line retail.
Example of how technology changes the role of retail staff
New business opportunities due to wider online market
31- The internet gives people access to a huge amount of information.
The internet is not regulated; this has benefits and drawbacks.
One drawback is that the information might not be reliable.
Give the ways in which a user could check the reliability of information.

Check other sources of information


Ask an expert
Use more than one website
Use trusted sources, e.g. government sites
Use books / magazines
Use other forms of digital media e.g. reference CDs/DVDs
Look and feel of the site e.g. poor spelling and grammar
Check that the date is recent

32- Discuss the benefits and other drawbacks of the lack of internet regulation.

Benefits: All information is open to the world via the internet so any corruption done by
organization or authority can be easily found out and they cant hide it. When bad things
happen people can write blogs on the web, communicate with people who have the same
thoughts and take action and steps accordingly. People are open to share their opinion on
the internet and say what they feel, there is no restriction applied on their subject of
speech. They can express their mood with people and be open-minded with the world to
share their expressions.

Drawbacks: Information found on the internet is not reliable due to any regulation. Fake
and phishing sites have a tendency and chance to be established on the internet and
victimize other people. Inappropriate information is spread throughout the internet which
is prohibited for some countries but they are not being maintained. Anonymity in the
internet opens a road of communication between criminals and terrorists.

33- Benefits of storing data on USB flash drive.

Portable / easy to carry


Very strong / difficult to break/Solid state device
Can be used to transfer data between machines / access data on different machines
Most computers have USB ports
Widely available / relatively inexpensive
Encrypted USB available/can be encrypted

34- Drawbacks of storing data on USB flash drive.

Easy to lose
Can easily transfer/pick up viruses
Corrupt if incorrectly disconnected

35- Why backup should be made

Accidental damage: Data may be accidently overwritten / erased / corrupted


Deliberate damage: Malware/viruses may damage the data
System / hardware failure
Physical problems e.g. data may be lost due to fire / flood / computer theft
36- What decisions should be made before creating a backup

Which software to use for backup


Media/device (determined by total file size)
Where to keep the backup e.g. away from computer
Can it be stored securely e.g. encryption/passwords
What files to back up e.g. find/ select
How often to make a backup
Can it be automated?
Who has access to backup / how many copies should be kept
When to run the backup

37- What do the bars of the barcode represent?

Item/product number
Item/product code
Item/product ID
Item/product reference

38- What do the parts of the barcode represent?

Country of origin
Product ID/info
Manufacture Id
Check digit

39- Benefits of using barcodes/reader

Saves time as items will be processed faster


Less time spent queuing
Accurate bills/no (human) errors
Itemized bills/purchased items identified

40- How barcode adds item to sale?

Barcode input> Information sent to database> Item found> Price identified> Price
displayed> Receipt printed

41- Why microchip is better than magnetic stripe?

Reason Extension
Better encryption/ you can read a magnetic
More difficult to steal data from a chip
stripe on a tape reader/PIN is needed
Data can be more easily updated on a chip / Has built in processing power/ greater
updated during transaction memory/storage
More difficult to corrupt data/damage a Chip protected by plastic coating/ magnetic
chip stripe affected by stray fields/ scratches

42- What is the info that is shown by project management software?

Timeline / Completion date/time to complete the project


Task breakdown/order of tasks
Staff/Resources needed

43- Methods, advantages and disadvantages of laser and inkjet printer.

Method Benefit Drawback


Laser draws patterns
on drum Expensive to
Very fast
Electrostatic pattern purchase
Laser High quality
attracts toner color options are
It is quiet
Toner fused onto more expensive
paper
Good quality Relatively slow
Color printing is compared to laser
Ink sprayed onto
Inkjet readily available Can smudge
paper
Relatively cheap to Cost per page more
purchase than laser

44- How a network can be configured so that the files accessed can be maintained
according to users relevancy?

Set up user names / log-ins and passwords


Set profiles
Assign privileges / Access rights / Access permissions
Folder/File level passwords/File encryption

45- Items to reduce health risks on computer usage

Suitable lighting
Wrist rests
Adjustable chairs/chairs with lumbar support/ergonomic furniture or chairs
Swiveling/adjustable screens
Screen glare shields
Foot rests
Ergonomic mouse
RCD/Residual current device

46- Actions to reduce health risks on computer usage

Posture:
Adjust chairs to suit them/ sit with correct posture
Adjust angle/height of monitor

Eye Strain:
Adjust brightness/contrast of screen
Adjust font/icon size
Regularly focus on distant objects
Position monitor to reduce reflection / adjust blinds to reduce reflection
Sit at a suitable distance from monitor
Attending regular eye examinations

47- What are the rights people have on Data Protection Act that a company regulates?

See the data on request


Know who stores your personal data/opt out of sharing data
Have errors corrected
Prevent processing for direct marketing
Object to processing causing damage or distress
Object to decisions made by automated means
Claim compensation for damages caused by breach of the Act
48- Benefits of company and employee of working at home.

Employee Company

Can have representatives based around the


Less travelling reduces stress
country/reduced costs of visiting clients

Saving from reduced office space / less


Can use travelling time to do other things
office space needed

Flexibility/managing workload Savings equipment costs

Staff may be more productive due to less


Reduced cost of travel (to head office)
stress/more relaxed

49- Benefits of Wi-Fi over Bluetooth

Not restricted to being next to PC / Wi-Fi has wider range


Much faster data transfer rate
Wi-Fi is more secure

50- Requirements to connect to the internet

Router/ Gateway/ Modem


URL / IP address
ISP/telephone number/broadband/dial up
Web browser software
Telephone line/cable/satellite link
Communication software (to set up initially)

51- Purpose of key in wireless network

Is a security method
Prevents unauthorized access to the router/gateway/modem/ network / Wi-Fi connection
Key is used to encrypt data (during transmission across the network)

52- Methods of communication via the internet.

Methods Reason Example


Message sent very quickly
Email Formal letters to office
with many files
Immediate feedback; live Make phone calls to
VoIP/ Multimedia chat
interaction customers
Video conference/ Instant Setup virtual meetings/ Communicate with head
relay chat discussion office
Chat with people of same
Forum Chat forums of science
hobby/ profession
Notify about upcoming and
News group/ mailing list Latest news updates
latest topics on interests
IM Send quick message To family/ friends
Know updates about friends/
Social Networking Sites RSS (Rich Site Summary)
family

53- How phishing attacks are carried out?

Bogus emails sent, requesting personal data


Recipient (believing email is genuine) provides personal data (via hyperlink or email)
Data is then used for identity theft / fraud

54- What factors should be considered before copying info from the internet?

Is the information up to date


Is the information biased?
Is the information accurate?
Is the source / information reliable/ verifiable?
Is the information at the right level / understandable / relevant?
Are there copyright restrictions on the use of the materials?

55- What actions should be taken when using info from the internet?

Copyright rules/ Acknowledge sources / bibliography / references


Avoid plagiarism / Dont Copy and paste / Write in your own words

56- ICT can be used in many ways to enhance students learning.


Using the internet for research is one way in which students learning is enhanced.
Using examples, describe other ways in which ICT can be used to enhance
Students learning

CAL:
Learners working independently / at own pace / in own time / may be outside school
Use for reinforcement / drill and practice / instant feedback

Control technology:
Provides hands on experience / analysis of data

Simulations:
Safely carry out experiments / vary situations

VLE:
Access to materials
Upload work
Download assignments

Communication methods:
Emailing teachers

Use of modern technologies:


Smart phones / pads

Use of the internet (not for research):


Communicating with students in other countries
Better understanding of other cultures
Learning languages Revision sites
Revision sites

57- What is meant by icon?

A small image used to represent and run a function or an application.

58- What facilities are used to make find a desired file easily?

Sort / rearrange the folders into alphabetical / date order


Use search facility by typing in a part of the folders name
Enable file preview / extra-large icons

59- Give the solutions to back-pain and RSI due to computer usage.

Backache:
- Ergonomic / adjustable furniture
- Adjust seat angle / height / Lumbar adjustment
- Foot / neck / back rests
- Correct posture in chair

RSI:

- Wrist rests / gel pads


- Ergonomic keyboard / mouse
- Correct posture
- Hand / wrist / finger exercises

60-(a) Customers of a shopping website enters their info in an online form which is
automatically saved into the websites database. What is the benefit of this type of
data capture for the website?

Dont need staff to enter data


Makes customers responsible for / reduces data entry errors
Data entry forms can make it more likely that valid data is entered

60-(b) What are the benefits of the customers due to their info being saved?

Dont need to re-enter data (personal details)/ fewer data entry errors
Can take advantage of one click ordering
Can be sent offers/promotions

61- How a person can track the delivery route of their online ordered product?

They use the order number of their transaction to view the route of delivery

62- How an online shopping site could use the data of their customers transaction log?

Can target advertising / offers based on previous sales trends / patterns


Can analyze data to help planning / stock control / pricing
Could sell data to third party to get money

63- Define Intranet.

Network with private/restricted access


Used by members of a single organization

64- Advantage of virtual meeting over face-to-face meetings.

Meetings can be at short notice


No need to pay travelling / hotel costs
People dont lose time travelling / are only away from desks during meeting time

65- Disadvantages of Virtual meeting.

Technical problems may occur / have to be able to connect reliably to the internet
Physical items cant readily be exchanged
Time differences may be an issue
Difficult to study body language / eye contact difficult
Team building / social interaction is more difficult

66- How username and password increases security of an account?

Extra step in login process


Need to know username as well as the password
Makes it harder to guess / see
Reduces possibility of automated attacks

67- Concerns and steps for unrestricted access to internet.

Concern:
May access inappropriate sites
May illegally download music / videos
May download malware
May meet unpleasant characters in chat rooms / be subject to cyber bullying May pass on
personal information
May become addicted to internet activity

Steps:
Use parental control software
Use antivirus software
Restrict / block access to sites via functionality of web browser / filter software / ISP /
blacklist
Password protect the administrative account

68- The use of computers and other digital devices has both positive and negative
effect on peoples lifestyle.
Discuss the positive and negative effects of digital devices on peoples lifestyles.

Positive Impact:
Technology is improving many aspects of everyday life e.g. communication must have
skills to benefit
Communication improves contact with family and friends
Can make friends with people from different backgrounds using chat rooms / SNS
Technology use linked to improvement in reading skills / hand eye coordination
Technology offers wider educational opportunities
Availability of valuable sources of information online e.g. health information / fitness
information / exercise techniques / government websites
Can work from home / changes in working patterns

Negative Impact:

Time spent on computer rather than socializing / leads to lack of social skills
Time spent on computer rather than exercising / could lead to health issues
Time spent on entertainment / games rather than doing homework / work
Health problems arising from using computers e.g. back problems / RSI
May lose sleep as technology takes over life / addictive / may lead to problems at work /
school

69- Advantage of wired network over wireless.

Wired connections usually faster


Wired connections less affected by distance from the hub
Wired connections not affected by obstacles
Wired connections are less affected by the number of users
Wired connections dont suffer from interference from other devices / more stable
Wired connections are potentially more secure

70- The network administrators of a community centre are concerned about the
security of data on the network.
Describe the concerns that the network administrators may have and identify steps
they can take to reduce the risks to the security of data.

Concerns:
- Unauthorized access to data e.g. hackers
- Accidental loss of data
- Malicious damage
- Virus infection
- Physical problems e.g. natural disaster
- Hardware malfunction

Methods to reduce risks:

- Set up user names and passwords


- Set up access rights
- Firewall
- Encryption
- Centralized backup
- Backup to external devices / stored off-site / fireproof safe
- Anti-virus software
- Anti-malware software
71- Difference between RAM and ROM

RAM ROM
RAM is volatile must be constantly refreshed ROM is permanent
/ lost when computer is switched off
RAM can be read and written to ROM is read only / only EPROM can be
erased

RAM is faster than ROM ROM is cheaper / Less expensive than RAM

RAM microchips are supplied as modules ROM microchips are installed in the
(several chips on a small board) plugged motherboard
into the motherboard

72- A message is displayed on the screen-Printer is out of paper. How this message
is generated.

The sensor in the printer detects there is no paper, then it sends signal to the OS, then OS
generates the message that is displayed on the screen.

73- How CAD helps to improve designs.

Image can be rotated


Accurate measurements / precise details / use precision tools
Easily change variables
View / create in 3D
See what the designs would look like on a model / preview final product
Add / edit material effects / patterns / textures / color
Use library of shapes
Vector graphics / unlimited zoom
Resize / edit / erase component
Multiple light sources
Can send items to 3D printer

74- How settings can be adjusted for the visually impaired ones

Screen resolution
Display settings / brightness
Font size / icon size
Use magnifier / zoom in
Use narrator / audio description
Speech recognition
Enlarged On-screen keyboard
Calibrate color / change color scheme
Adjust thickness of blinking cursor
Adjust thickness of focus rectangle
Adjust thickness of windows border
Mouse settings
75- How anti-virus works?

Compare files coming into the computer against known virus codes (signatures) / database
of virus files
Monitors programs for suspicious behavior
Quarantines / flags as dangerous
Scans computer / media for malicious files alerts user if issues identified

76- How to reduce virus spread?

Dont download from unreliable / untrustworthy sites


Dont click on links in emails unless you trust the sender
Dont open email attachments unless you trust the sender
Enable browser security / site blocking options
Dont use portable storage devices from unreliable sources
Don't give users admin privileges / ability to install software
Install / use a hardware firewall

77- How people can work together in a network?

Save a file to a central location so all have access / can make changes
Use network messaging system to provide comments securely
Will have access to the same software version no compatibility issues
Can use collaboration / team-working software to maintain document honesty / control
multiple accesses
Can use version control / logging software to keep track of versions / changes

78- How checkboxes in a list can be used to search desired object quickly

The user can select the desired features


Fewer results will be produced / wont need to look through so many / will only be given
an appropriate list
The search will be much faster / save time
No typing errors

79- Why reviews in a site have to be handled carefully?

The reviews may not be genuine / may have been made up


Writers may be biased
Writers may be expressing personal opinions
Poor reviews may have been removed

80- Many students at the college have mobile devices such as smartphones or tablet
Computers. Some staff believe that using these devices enhances learning, others
disagree. Discuss the advantages and disadvantages of allowing students to use mobile
devices in the college.

Advantages
Will be able to use the device as a research tool / search internet.
Students can access the internet anywhere on the site / not necessarily restricted to a
classroom / not all rooms have computers.
Students can access the internet in their free time not just during lesson.
Can carry on using device at home.
May have office applications installed which can be used to make notes.
College may not have enough / many computers.
Data can be transferred to cloud storage.
Have friends as contacts so can share resources
Many education apps available to aid learning.
Can take advantage of QR codes on learning materials from published resources in college.

Disadvantages
May use device at an inappropriate time.
May use device for inappropriate actions.

81- Students at College are aged between 11 and 16.


The college wants students to stay safe when using the internet.
Discuss the advice the college could give to students.

-Be careful when posting personal information online


-Think carefully before posting photos or videos of yourself. Once online its possible that
anyone can see them and may be able to download them. They are not your property
anymore.
-Keep the privacy settings on social networking sites as high as possible.
-Be wary when communicating with people you dont know. Remember that not everyone
online is who they say they are
-Dont meet up with people youve met online. Speak to your parents/other responsible
adult about people suggesting you do
-Think carefully about what you say before you post something online. Remember that
what you say may be misinterpreted or may offend others.
-Respect other peoples views, even if you dont agree with someone elses views doesnt
mean you need to be rude
-If you see something online that make you feel uncomfortable, unsafe or worried: leave
the website, turn off your computer if you want to and tell a trusted adult immediately.
-Cyber-bullying, tell a trusted adult immediately.

82- Advantage of using design view in web designing rather than code view

No need to learn code


Less likely to make mistakes using design view
Can see the page as it will look /WHAT YOU SEE IS WHAT YOU GET
Easier to rearrange items / make changes to a page
Easier to clone / reuse page components

83- State the facilities provided by ISP for web publishing

ISP will host/store website on their web server


ISP provides a web server to host/store website
ISP provides tools to move/upload website (1) to web server
ISP offers management tools / online development services to help create web page
ISP offers rental / purchasing / managing / provision, of domain names

84- What facilities are used to attract customers to a website?

Posts on social network sites


Adding details to search engine listing
Add keywords/ Meta tags (Description of a link) to website
Adding details to directories e.g. yellow pages
Creating a blog / posting on other peoples blogs
Ads or pop-ups on other companys websites
Using targeted emails
Pay for position on search engine

85- What features are necessary for online shops to provide?

Store customer data


Access to a database of products
Shopping cart / checkout facility
A secure payment system
Automated / email confirmation system
Terms and conditions / legal obligations

86- Advantages of using digital reference books rather than hard copy books.

Searching for information is usually quicker


Easier to carry about / store as are lighter / smaller
Easier to replace if lost or damaged
Quality of graphics is usually better
May include moving images / video / audio
Environmentally friendly

87- Advantage of computerized data logging rather than manual data logging.

Advantage
Human comfort / safety for employees cold / raining outside, spoil meal times,
unsociable hours, less dangerous, cannot work 24/7 etc.
More Accurate / more precise readings Reduced / no human error
Cheaper save on wages
Consistent time after time / day after day
Faster / Quicker

Disadvantage
Equipment failure - data logging equipment / transmitting of data / ICT equipment failure
Costs high initial set up cost / more expensive to buy equipment and set up

88- What is podcast?

A series of digital media files. Often released episodically. Often downloaded through web
/ downloaded to a computer/mobile device to watch/listen to.

89- Difference between data and information with examples

Data has no context/no meaning/not interpreted


Data is raw / unorganized facts/just characters
When data is processed, organized or presented in a
context, so as to make it useful it becomes information
Suitable examples of data (where the meaning/context is
not clear)
73, 56, 47, 33, 12
Information has a context and therefore meaning (i.e.
data with a context)
Information is interpreted data
Suitable examples of information

The ages of five people in a house are 73, 56, 47, 33, 12

90- Advantage of Plasma screen over normal screen (CRT)

More robust
Shock resistant
Portable
Thinner / lighter
Better quality
Less glare / reflection

91- Show all the network topologies.

Fully Connected Network Star Network Topology


Topology

Mesh Network
Topology

Bus Topology Ring Topology

92- Why passwords should be changed regularly and why passwords must be entered
twice.

Someone who have known the password or seen to enter wont have access anymore
Twice input is needed to resolve data entry mistake and for verification

93- Hardware and software needed to connect to the internet?

Hardware: Modem / ISDN (Integrated Services Digital Network) / Router / Modem cable /
WiFi / NIC.
Software: Communication software / Browser software / Driver software for hardware.

94- Difference between validation and verification.

Validation: Check by computer that is the data allowable or not


Verification: Check with source document to make sure the data entered is correct.

95- What devices are used in POS terminals?

Receipt printer
Screen
Keypad
Weighing scales
Barcode reader
Card reader

96- Advantage of POS systems for customers and shops.

Customer: Shorter queues / itemized bills / accurate bills / quicker data entry
Shops: Less crime / increased security
Automatic stock order
Up to date sales information/ buying patterns
Fewer staff; Fewer errors / more accurate
Quicker as the data is entered by sensors / reader
More profit as less time needed for large amount of customers
Easier to change product details
No need to price products

97- Why files are compressed?

Takes up less memory because many files in one file


Quicker to download because many files in one file
Size reduced because many files in one file

98- Why computers are used to collect data from experiments?

Computer responds instantly to changes


Fewer staff so cost is less
Works 24 hours per day everyday
Keep people away from dangerous processes
More accurate and fewer errors
Can log data
Can analyze data and are more reliable
Can use range of sensors

99- What are the roles of CPU (Central Processing Unit)

Performs or carries out calculations and logical operations.


Control unit co-ordinates input and output
Immediate access store / memory control storage for data programs.

100- What types of backing storage are used by computers.


Zip drives; Jazz drives; Tape drives; memory sticks; CDROM-RW; Hard drive

101- What are the tasks performed by the operating system.

Input and output control; Error handling; Resource allocation; Providing a User Interface;
Allows user to command the computer; File handling

102- What is the purpose of feedback in a control unit?

Ensures system remains stable / operates within level

IP Address Format
IPv4 (Internet protocol version 4) is a 32-bit IP address grouped by 8 bits and represented in
decimal format known as dotted decimal notation. Each bit in the octet has a value, where
0 value 255.

Network Host

32 Bits

192 168 0 10

8 Bits each
103- What is the purpose of a server, router, wireless access point.

Server: Security / file serving / file sharing between users in a network


Router: Directs signals to specified route to connect computers.
WAP: Transmits and receives radio signals

104- Types of pointing devices.

Mouse; Joystick; Tracker ball; Track pad; Graphics tablet

105- Types of scanners with specialty.

Hand-held scanner: Reads the image while being dragged over it.
Flatbed scanner: The image is laid flat on the scanners surface.
Sheet-fed scanner: Reads the image as the paper goes through the sheet feeder.
106- Difference between OCR Versus MICR.

OCR and MICR both read printed characters.


OCR uses reflected light where MICR uses magnetic field patterns.
OCR recognizes handwriting and different types of printed text but MICR only recognizes
specially shaped characters.

107- Vulnerability of Magnetic stripe card.

It is affected by electromagnetic radiation and the data can be copied and edited.

108- How digital photos and videos can be viewed?

Saved on a computer, so backup is easier and more reliable.


Sent by email
Displayed on a wide variety of devices, such as smartphones and TV screens
Broadcast over the internet such as on-demand TV programmes.
But some drawbacks following it are that users store more photos and longer videos so
more backing storage is needed.
High-quality photos and videos can be large files. Sent by email or broadcast over internet
they use more bandwidth and slow the network.

109- Properties of Sensors.

Sensors are used to input environmental data such as light intensity, pressure and
temperature.
Each sensor detects only one type of data.
Sensors usually produce a low analogue voltage which must be converted to a digital signal
for the computer using an ADC.

110- Audio devices and related technology.

Touch-tone telephone: It makes a different beep depending on the button pressed. On the
end of the line, a computer inputs the beep and determines which button has been
pressed.
Microphone is the basic means of audio input.
Voice recognition software enables the computer to know who is talking but not what has
been said.
Speech recognition is often used for voice command systems. The speaker is identified and
spoken words recognized as commands.
Natural language processing uses speech recognition to interpret natural language. It can
be used to dictate a letter or give instructions to computer.
Speech synthesis is when a computer reproduces a human speech. The voice is computer
generated, most likely by a text-reading program that reads aloud an electronic
document.

111- Ad/Dis of Audio input.

Ad: People speak to the computer and do not need to learn to operate the keyboard.
Dis: Voice and speech recognition software has to be trained to recognize each persons
speech. This can be lengthy process.
Voice and speech recognition is not accurate because people pronounce words differently.
112- Types of monitors and their description.

Visual Display Unit (VDUs) vary with different styles and resolution along with color and
quality.
(Picture element/ pixels are not same as screen dots, because some software packages
use pixels that are bigger than the resolution.
Graphics card are video/ display cards built into the system unit, it controls the signals
going to the monitor. High quality graphics card can produce clear graphics very quickly.

Cathode Ray Tube (CRT): They are bulky, heavy power consuming and gets heated up
quickly.
Liquid Crystal Display (LCD): They are flat and lighter than CRT. They are compact and
consume less power compared to CRT.
Plasma Display: They have clear graphics and bright output.
Electroluminescent Displays: They have potential to support very large flexible displays.
Touch Screen: It has two-way interface, so it can be used as both input and output device.
The touch screen is classified by two types:
The capacitive touch screen detects position of the skin touching it where the screen has
been discharged. The upper layer is made up of glass.
The resistive touch is made up of soft layer and they detect it by the changes in electric
charge when internal charged and conductive layers are pressed together. It works with
anything including skin.
Multimedia Projector: They are used to display image on a larger separate screen for view
of larger audience.
Interactive Whiteboard: They are large, touch-sensitive panels. Some use touch screen
technology but others use optical curtains which operates by detecting breaks in the
curtain.

113- Types and uses of printers.

Printers are used to produce printout or hardcopy.


An impact printer strikes through inked ribbon into the paper and non-impact uses other
methods without placing an impact on the paper (non-striking method).

Dot-matrix is an impact printer with print head that is a matrix of steel pins. The pins
strike a carbon ribbon making patterns of dot on the paper. (Monochrome)
Inkjet printers spray tiny dots of ink into the paper. They produce good quality output
and are quieter. (Monochrome and color)
Laser printers use laser light to make patterns on a drum. The drum transfers ink to the
paper and then the heating fuses the ink and paper together. They are more expensive
than inkjet with excellent quality and faster output. (Monochrome and color)
Thermal printers use heated wires to mark dots on the surface of a heat-sensitive paper.

Printers use different types of paper, for example:

Single sheets of A4 paper.


Continuous paper is perforated and can be easily separated into single pages.
Pre-printed stationery has information on the paper before computer printing. For
example, the name and address of the company
114- Ad/dis of printers.

Advantages of printers:
A printout is useful if no computer is available.
Disadvantages:
Printing is slow and expensive compared with electronic communications.
Paper is bulky and deteriorates in storage.
Printed materials are more difficult to access and distribute, e.g. digital photos can be
emailed and viewed on a multimedia projector .

115- Define plotter.

A plotter draws lines on paper using colored pens. A flatbed/ roller bed plotter holds the
paper still while the pens move. Other plotters move the pens from left to right while the
paper moves forwards and backwards. An upright plotter uses very long sheets of paper.
Plotters are used in computer-aided design. Plotters are usually more expensive to buy
and slower than printers, but much larger sheets can be printed.

116- What is a Multi-function device (MFD).

MFDs combine a printer, scanner and communications link to function as a printer,


scanner, and photo-copier or fax machine. MFDs are much less expensive to buy than all
the individual devices and use less space on the desktop. It is cost effective to replace
them more frequently with modern technology. However, if part of the device is faulty,
all the functions may be unavailable. If one function is being used, then the other
functions are unavailable for other users.

117- Use of speakers.

Many computers have speakers. Headphones are two small speakers built into a headset.
Sound is needed, for example, to play music and for speech synthesis (computer produces
human speech).

118- Use of sound cards and actuators.

Sound cards

A sound card controls all input and output of audio. Audio input through a microphone
and output through speakers are usually analogue and the sound card handles their
conversion into digital signals processed by the computer. It also handles digital audio
input, e.g. from multimedia applications.

Sound cards have features such as:


Polyphony plays more than one sound or voice independently at the same time.
Output through one or more sound channels, e.g. mono, stereo (2 channels), or
quadraphonic (4 channels).
Surround sound or 3D audio.
Improves the clarity of compressed audio files, e.g. mp3.
Built-in memory for faster sound processing.
USB, optical and other ports to connect to DVD recorders and other devices.
MIDI (Musical Instrument Digital Interface) to connect to electronic instruments.
Actuators

In control applications, computers make events happen using actuators, e.g. heaters and
motors. A buzzer is an actuator that, for example, warns when the microwave has cooked
our dinner. Actuators can perform physical tasks such as controlling a robot or operating a
digger. This can be dangerous for people if their presence is not detected by the
computer.

119- Bits and bytes.

Bit (binary digit) patterns in memory and on backing storage represent, e.g. characters,
numbers, graphics and sounds. A byte stores 8 bits, each of which can be either 1 or 0.
Different computers access one, two, four or more bytes of data at a time. If a computer
can read/write four bytes at once, this is 32-bit computing.

Flash memory is a type of ROM that can be written to and read from and is used for the
BIOS (basic input/output system) in PCs. This makes sure the computer starts up as it
should and that all the parts of the computer work together.

120- Magnetic tapes.

A magnetic tape stores a great quantity of data but read/write is slow because it is serial
access the tape is read from the beginning to find the data needed. Magnetic tape
cartridges are often used for backup.

121- Types of software.

Applications software

Office productivity software helps you do office tasks and includes:


Word processing software, e.g. Microsoft Word. Helps you prepare documents that
include text and pictures. You can edit the text, change the font and size, check your
spelling and grammar, print, and save and retrieve documents.
Desktop publishing (DTP) software, e.g. Microsoft Publisher. Handles page layout better
than word processing software.
Spreadsheet software, e.g. Microsoft Excel. Performs calculations on tables of numbers
arranged in rows and columns with related headings and charts. If a number is changed,
the spreadsheet automatically recalculates.
Database software, e.g. Microsoft Access. Used to maintain records, e.g. a library stores
the name, address and membership number of borrowers. A database can search these
records and print reports.
Presentation software, e.g. Microsoft PowerPoint, helps you prepare and give a
multimedia presentation to an audience. This could include: slides with text, graphics,
hyperlinks and notes for the speaker.
Project management software, e.g. Microsoft Project, is used to track the timelines of
all the tasks that have to be done to complete a project, e.g. when constructing a
building. Timelines are displayed in a Gantt chart.
16Chapter 3: Software
Web browser software, communications software and web authoring software
Using web browser software, e.g. Mozilla Firefox, you can access websites by entering
their web address or URL (uniform resource locator) or clicking on hyperlinks.
Using a search engine, e.g. Google, you can search the Web by entering keywords.
Email is accessed using:
an email client running on your own computer, e.g. Microsoft Outlook.
Webmail, that is, email accessed using a web browser.
Web authoring software, e.g. Adobe Dreamweaver, is used to create and update
websites. A website is a structured collection of web pages written in HTML (Hypertext
Markup Language).

Image and sound editing software


Graphics software, e.g. Adobe Photoshop, is used to create and retouch, crop and resize
images.
Video editing software, e.g. Microsoft Movie Maker, is used to edit videos imported from
digital cameras and camcorders. You can insert titles, transitions, voiceovers and sound
effects, and save the video in different formats, e.g. mp4.
Audio editing software, e.g. Audacity, is used to create and edit music and sounds. You
can record live music and input digital sound files, insert voiceovers, and change pitch and
tempo.

Control software
Control software is used to monitor and control external devices, e.g. robots, and ICT
systems, for purposes such as air conditioning in large buildings. Computers do this using
sensors and actuators. Sensors are devices that can measure variables such as pressure,
temperature and humidity. Actuators make changes under the control of the computer
some examples are motors, pumps and heaters.

Educational software
A wide range of educational software supports teaching and learning, e.g. Star French
helps you learn French, and Spex Classic helps with teaching design and technology

122- Types of software license.

Software is copyrighted. It is illegal to use it without a software lisence. Types of license


are:
Licensed software. Purchasers buy the right to use it.
Public domain software is free and has no restrictions on its use but you might not be
given the source code.
Open source. Licenses are free and you have access to the source code and are allowed
to modify it.
Shareware is licensed software that is initially free to try out. However, you must pay
for a license if you decide to make regular use of it.
Creative Commons licenses help software producers communicate the rights they keep
for themselves and the rights they give to others.

123- Connections to the internet.

Narrowband users dial up their ISP using a telephone. Data is transmitted at speeds up
to 56 Kbps. This is slow but inexpensive.
Broadband is data transmission using:
ADSL (Asymmetric Digital Subscriber Line), which provides speeds up to 100Mbps and a
continuous connection to the Internet;
Cable technology;
Mobile telephone networks, e.g. 3G.
TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of rules used on the
Internet to define how computers communicate with each other. It is a universal standard
that enables hardware and different operating systems to communicate.

124- Types of IP.

Each computer on the Internet has a unique IP (Internet Protocol) address, e.g.
196.161.232.4. The IP address could be static (it remains the same every time you
connect) or it could be dynamic (it changes each time you connect).

125- Difference of web and internet.

The Internet and the Web are not the same. The Internet is the network and the Web is
the multimedia services that run on it.

126- Ad/dis of static IP.

Advantages of Static IP -

Stability In case of applications such as authenticated services on web servers and


file downloads the connection should be stable. In static IP a small interruption in the
connection usually does not terminate the packet exchange with the service.
Hosting Since there is no change of IP address, this is suitable for applications which
use Voice over Internet Protocol (VOIP),gaming applications, and Virtual Private
Network(VPN).
Preferred address for servers Static IP addresses is ideal if your computer acts as a
server. The reason is it gives your file server relatively faster file uploads and
downloads.
Convenient remote access When you remotely connect to a computer you need not
worry about the changes in the IP address during the connected session. Also when
you connect to your computer through applications such as remote desktop, you need
not be bothered about losing the IP address.
Reduced down time The IP never resets. In other words your computer need not
send any request for renewal. This makes it an ideal choice for seamless connectivity.

Disadvantages -

Security Static IP Address could be a security risk as the IP address is constant.


There is a greater chance of hacking the website. Also you cannot easily change the
Static IP once it has been hacked. This makes your system very susceptible to
continuous attack. It is imperative to put preventive measures in place before
obtaining a static IP such as Internet security suites and router firewalls.
Uptime static IPs are preferred for hosting servers and file transfer protocol sites. So
the servers have to be on all the time to host these functions. The cost of constantly
running a server is exorbitant.
Configuration The process to set a static IP is manual and relatively complex.
Occasionally, external software is required for this purpose. Also several consumer
level ISPs lack support for static IPs.
Keeping pace with technology The field of computers is rapidly changing. It is
possible that a static IP computer running a server becomes obsolete in the near
future. It is relatively complex to transfer the server settings from a static IP
computer to a new computer. It is wise to invest in an easily upgradable computer to
run a static IP server.
127- Ad/dis of Dynamic IP.

Advantages of Dynamic IP Address:

Security Computers having Dynamic IP address have relatively lower security risk (as
your computer is assigned a new IP address each time you log on).
Lower cost -Cost effective as compared to the static kind of address
Automatic network configuration The user does not have to do the network
configuration. That is taken care of.

Disadvantages of Dynamic IP Address:

Security issues DHCP (Dynamic Host Configuration Protocol) automation can be


significant security threat in case of a rogue DHCP server. This server is not in the
control of the network personnel. If any user connects to it, information over that
connection can be intercepted and looked at. Thus network security and user privacy is
violated.
Network Failure If only a single DHCP server is in place, its failure causes a system
wide issue. In case of server failure, any connected computers that dont already have
an IP address will try and fail to obtain one. Computers which already have an IP address
before the servers failure will try to renew it, which will cause the computer losing its
IP address.
Less Reliable Note that Dynamic IP addressing should not be used for VOIP, VPN,
playing online games as Dynamic IP addressing is less reliable then Static IP addressing
and could cause the service to disconnect while you are on a VOIP, VPN or gaming.

128- What are cookies?

Cookies are saved on your hard disk by websites and contain personal information that can
be accessed by the website.
Use a cookie manager to block cookies or remove them using a browser.

129- How payroll system works.

Employees each have their own swipe card and their unique employee number is recorded
on it. The amount of hours they work is recorded on the swipe card by recording when
they arrive (clock in) and when they leave (clock out). All this information is input into
the ICT system each day.

Validation checks are made on all the data input and the validated data is written to the
unsorted transaction file. Data that does not change every week is saved on the old
master file.

The payroll program matches an employees transaction file record with the
corresponding old master file record. The hours worked are calculated from the clock in
and clock out times on the sorted transaction file. The hourly rate of pay is found on the
old master fi le so that gross pay can be calculated. Tax details on the old master file are
used to calculate deductions from the gross pay to arrive at net pay. The cumulative totals
on the master file are amended (updated); e.g. the tax paid will be added to the total tax
paid this year, and a new master file record is created. Backups of files are
automatically generated so that corresponding copies of the sorted transaction files and
old master files can be used to restore the current files. The ancestral backup system can
be used to provide three levels of backup.
Validation checks help ensure that data is reasonable.
Chapter 12: Applications a and effects of ICT
Payroll is a batch processing system because:
All the data to be processed is available before processing begins.
There is no need to process the data immediately.
The system can be run off line.

130- Uses of stock control.

Performance of staff can be monitored by checking the number of items sold at each
checkout.
Rate of sales can be used to increase stock of popular goods.
Pattern of sales can show what needs to be stocked at certain times of the year.
Extent of theft from the supermarket can be calculated.

You might also like