1. The head teacher of a school wants to build a weather station. She wants to use a

computer to collect the results.

List three sensors that would be needed. [3]

2. Tick True or False next to each statement describing encryption. [4]

True / False
Encryption prevents hackers from understanding the data.
Encryption destroys viruses.
Encryption prevents unauthorised access to computer systems.
Encryption is the scrambling of data.

3. A group of car mechanics wants to have an expert system to help them with their work in diagnosing car engine faults.

Describe how such a system would be created. [5]

4. Describe online processing of data, using the booking of airline tickets as an example. [4]

5. A manager of a new company has just purchased some computers. She wishes to connect these computers together to form a LAN. [6]

Name and describe three network devices she might need to have in order to achieve this.

6. A teacher has developed a new system for keeping a record of student examination marks on her laptop and wishes to test it. Each examination is marked out of 50.

Identify three types of test data she could use and describe each type using an example. [6]

Type 1

Description

Type 2

Description

Type 3

Description

7. Schools are concerned with the possibility that students are using the schools’ internet connections to access undesirable sites.

Name and describe two security methods the schools could use to prevent this from

happening. [4]

Method 1

Description

Method 2

Description

8. Describe four features of a graphical user interface (GUI). [4]

9. Robots are now used on many car production lines.

Describe how their use has affected the nature of employment in the car industry. [6]

10. A test is marked out of 20 and recorded as an integer. Tick whether each of the following marks is an example of abnormal data or extreme data. [4]

Abnormal / Extreme
20
21
Twenty
0

11. Name three network devices and for each one describe what it does. [6]

Name:

Description:

Name:

Description:

Name:

Description:

12. Tick which of the following statements apply to traditional LANs and which apply to

WLANs. [4]

LANs / WLANs
Uses wireless technology to transmit data
Faster transmission of data
Greater security
Is cheaper as there is less cabling

13. Explain why computer systems have both backing storage and RAM. [3]

14. Below is a diagram of a river running past a chemical factory. The same types of sensor, connected to a computer in the factory are placed at A and B to monitor pollution of the river by the factory.

(a)  Name three sensors which would need to be placed at both A and B. [3]

(b)  Describe how the computer would monitor the level of pollution in the river. [5]

15. (a) Doctors often use expert systems to help them to diagnose illnesses.

Name four components of a typical expert system. [4]

(b) Name two other applications which involve the use of expert systems. [2]

16. Name and describe three validation checks which could be carried out on a 16-digit credit card number when it is typed into a computer. [6]

Name:

Description:

Name:

Description:

Name:

Description:

17. A bank is looking into a variety of security measures to protect its customers’ data.

Describe three types of authentication technique they could use and for each give a benefit and a drawback. [9]

Technique 1:

Benefit:

Drawback:

Technique 2:

Benefit:

Drawback:

Technique 3:

Benefit:

Drawback:

18. Gita has employed Johann, a systems analyst, to create a new database system for her car sales business. She only sells cars made by Rock and only the models Feisty, Mendo and Galactica in red, blue or gold. Most of the cars have air conditioning but some do not. She sells 3, 4 and 5 door cars.

(a) Give a reason why would it not be sensible to have a Make field in the database. [1]

(b) Complete the design table below giving the field names which would be used in the database and describing the most appropriate validation check which could be carried out on each field. [7]

Field name / Validation check
Model

(c) Discuss verification and validation. [6]

19. Spreadsheets are often used to produce computer models.

Discuss the benefits and drawbacks of computer modelling. [4]

20. An examination is marked out of 100 and the mark is recorded as an integer. Tick whether each of the following marks is an example of abnormal data or normal data. [4]

Abnormal / Normal
101
21
Thirty
99

26. Tick whether the following statements apply to Blogs or apply to Wikis.

Blogs / Wikis
Usually in some form of chronological order
Usually many contributors and authors
Usually personal
Postings tend to be short in length

27. Describe how the components of an expert system are used to help a doctor to diagnose an illness. [6]

28. A bank uses a chip and PIN system at its ATMs. A customer withdraws cash by inserting their bank card. Write down the steps involved in the computer processing of the transaction. [6]

29. A house has a microprocessor controlled burglar alarm.

(a) Identify three input devices which would be used in this system to feed data back to the microprocessor. [3]

(b) Describe how a microprocessor would use these devices to detect the presence of an intruder and what action it would take. [5]

30. Ahmed has asked Anna, a systems analyst, to create a new database system for his video rental business. He rents out films in DVD and blu-ray formats only. Here are some of the questions that customers ask:

Have you got the film ‘The King’s Speech’ in blu-ray format?

Have you any films which are shorter than 2 hours?

Have you any Harry Potter films released since 2005?

(a) Complete the design table below filling in the field names and data types using the most appropriate data type to create a database which would answer these questions. [6]

Field name / Data type
Text

(b) Part of the design process is setting an appropriate field length for each field.

Explain why this is so important. [2]

(c) Anna will provide two types of documentation when the system is implemented.

Name each type of documentation and for each one give two items which would be

included. [6]

Name:

Item 1:

Item 2:

Name:

Item 1:

Item 2:

31. Describe what is meant by a blog and a wiki.

(a) Blog [2]

(b) Wiki [2]

32. Tick TRUE or FALSE next to each statement to indicate if it is an example of online

processing. [4]

True / False
Withdrawing money from an ATM
Producing utility bills
Booking a plane ticket
Producing payslips

33. The head teacher of a school wants to build a weather station. She wants to use a

computer to collect the results

(a) Describe three reasons why she wants to use a computer rather than allow students to collect the results. [3]

(b) The results will be stored in a spreadsheet. The head teacher wants a word processed report. The report will contain a description of the weather and will use the spreadsheet results. Describe how the report will be created. [5]

(c) Spreadsheet data is often used for modelling purposes. Give three reasons other than reducing danger why computer models are sometimes used rather than the real thing. [3]

34. A supermarket uses POS terminals. The stock levels in the supermarket are updated automatically. Describe the steps involved in updating the stock level of a product when the bar code is read. [5]

35. John owns a small company. He wishes to replace the existing computerised system with a new one. He has employed a systems analyst, Iqbal, to plan this.

(a) Iqbal will need to collect information about the existing system. Describe three

methods he could use to do this. [3]

(b) Iqbal has completed the Analysis of the existing system. Describe three items of file structure which he would need to design for the new system. [3]

(c) After a system is designed it will be implemented. Describe each of the following

methods of implementation. [4]

-  Direct changeover

-  Parallel running

-  Phased implementation

-  Pilot running

36. OMR, OCR and MICR are methods of direct data entry.

Describe each method, giving an example of an application where each might be used.

(a) OMR [3]

(b) OCR [3]

(c) MICR [3]

37. A company uses robots to manufacture cars.

(a) Give three advantages to the company of using robots rather than humans to

manufacture cars.[3]

(b) Give three disadvantages to the company of using robots rather than humans to

manufacture cars.[3]

38. Jasvir and her family have three computers in their home. She wants to connect the

computers to create a network and access the internet. List four additional items she would

need to set up this system. Your answers must include hardware and software. [4]

39. An automatic washing machine is controlled by a microprocessor.

(a) Other than a temperature sensor, name two sensors used in the machine. [2]

(b) Explain why computers are unable to read the data directly from these sensors and name the device which would enable them to do so. [3]

(c) Describe how the microprocessor uses data from the temperature sensor. [3]

40. Describe two methods of data verification. [4]

41. Tick TRUE or FALSE next to each statement to indicate if it is an example of batch

processing. [4]

True / False
Paying for goods at an EFTPOS terminal
Booking a holiday using a computer
Producing credit card bills
Processing cheques

42. A school uses a computer-controlled greenhouse to grow plants.

(a) Name three sensors that would be used in the greenhouse. [3]

(b) Describe the computer processing that is required to maintain the correct growing

conditions. [5]

(c) Describe three advantages of using computers rather than students to control the

growing conditions. [3]

43. A school has a computer system for monitoring student records. It has a file for storing personal details and a file for storing test results. Here is part of the test results file.

Unique ID number / Name / History result / Geography result / Maths result
1022 / Me Won Li / 55 / 46 / 65
1026 / John Brown / 76 / 49 / 47
1029 / Javir Sidhu / 54 / 59 / 23

(a) How many records are shown in the file above? [1]

(b) How many fields are shown? [1]

(c) Describe how the two files could be combined to form a relational database. [3]

(d) Give two reasons why a relational database system would be used rather than having two flat files. [2]

44. Alan owns a small company. He wishes to replace the existing computerised system with a new one. He has employed a systems analyst, José, to plan this.

(a) José will collect information about the existing system and design the new system. Tick whether the following statements are TRUE or FALSE.

True / False
Defining a field length is part of the design of the file structure
Screen layouts are designed before the system is implemented
The new system is evaluated before it is designed
The existing system is analysed before the new system is designed

(b) Name and describe three types of test data which are used when testing a system. [3]

(c) After the system has been implemented it will be evaluated. Tick four activities which José will need to carry out as part of the evaluation. [4]

Tick
Produce user documentation
Design the new system
Compare the solution with the original task requirements
Analyse the existing system
Identify any limitations of the system
Identify any necessary improvements to the system
Analyse the users’ responses to the results of testing the system
Produce technical documentation

(d) Part of José’s job will be to produce both technical and user documentation for the new system. For each type of documentation give two reasons why it is needed. [4]

Technical documentation

Reason 1:

Reason 2:

User documentation

Reason 1:

Reason 2:

45. Aftab and his family have three computers in their home. He wants to connect the

computers into a network.

(a) Name an item of hardware used to connect the computers to the internet. [1]

(b) Name an item of software used to send messages over the internet. [1]

(c) Name an item of software used to access websites. [1]

(d) Apart from hardware and software, what else would be needed to provide access to the internet? [1]

46. Online banking and ATMs are used by many customers.

(a) Describe how the following three methods are used to make sure that data is secure. [6]

Encryption

Passwords

Biometric data

(b) Give three advantages to the bank of using online banking. [3]

(c) Give three advantages to the customer of using online banking. [3]

47. Discuss the advantages and disadvantages of video conferencing compared to face to face meetings. [6]

48. Explain the difference between phishing and pharming. [3]

Phishing

Pharming

49. Computers are used to manage data in schools. Name the different methods used to input personal data about students and their attendance and discuss the advantages and disadvantages of these. [7]