/ National
Qualifications

Guidance on the use of past paper questions

The questions below identify additional support questions from Intermediate 2 Past Papers 2011 to 2013.

Not all topic/areas of study will appear every year due to the sampling techniques used in producing question papers.


Software Design and Development Unit

·  Computational constructs and concepts (explaining code, writing code, data types and structures, algorithm specification)

IS Int2
2011 / 8 Explain what is meant by a Boolean data type. 1
15 (c) When setting up the new database, the field called Price (£) is created using a real data type.
Explain what is meant by a “real” data type. 1
Comp Int2
2013 / 14 A supermarket chain, Tesda, allows customers to use self service tills
(b) As the customer adds items to a bag, a program calculates the total weight of the bag. If this bag weighs more than 5 kg a beeping sound is made.
(ii) Part of the algorithm used to generate the beeping sound is shown below:
LINE 1 REPEAT
LINE 2 SET total weight TO total weight + item weight
LINE 3 IF total weight >5 THEN
LINE 4 SEND beep TO speakers
LINE 5 END IF
LINE 6 UNTIL no more items
Name the type of loop used in the algorithm above. 1
(c) The store manager wants a program to calculate when a 2 for 1 promotion should be made available to shoppers. A promotion is offered when the following conditions are met:
•  300 items or more are left in stock
•  remaining days are less than 10 days
Part of the algorithm is shown below:
LINE 1 SET remaining days TO sell by date – todays date
LINE 2 IF ______THEN
LINE 3 start 2-for-1 promotion
LINE 4 END IF
(i) Complete line 2 of the algorithm. 2
Comp Int2
2013 / 15 A truck haulage company is planning a program to calculate and display journey times.
(b) The calculation for the journey time is:
Distance divided by Speed add Break Times
(i) Using a high level language with which you are familiar, write a line of code for this calculation. 2
(ii) State a suitable variable type for the journey time. 1
(c) The programmers decide to use pre-defined functions in the code.
Describe one benefit of using pre-defined functions. 1
Comp Int2
2012 / 16 An international language school uses a mainframe computer system to process candidates’ exam results from 50 different countries. A program is being created to analyse these results.
(d) One of the program’s tasks is to calculate the total number of candidates for all 50 countries. Part of the design is shown below.
LINE 1 SET overall total TO zero
LINE 2
LINE 3 RECEIVE country total FROM keyboard
LINE 4 SET overall total TO overall total + country total
LINE 5 END FOR
LINE 6 SEND overall total TO display
Complete step 2 of the design. 1
Comp Int2
2011 / 11. A program has been created to allow student details to be stored.
(a) State the variable type that should be used to store the address of a student. 1
(b) State one method a programmer could use to make the program readable. 1
12. The following is a line of pseudocode used to calculate the volume of a cuboid:
SET volume TO height multiplied by length squared
Using an appropriate high level language with which you are familiar, write program code for this step of the pseudocode above. 1
13. Each contestant in the game show “Total Knockout” must compete in five events.
A program has been created to calculate the total and average points for each contestant.
The pseudocode for part of this program is shown below.
LINE 1 REPEAT 5 TIMES
LINE 2 GET event points FROM keyboard
LINE 3 SET total TO total + event points
LINE 4 END REPEAT
LINE 5 calculate average points
LINE 6 SEND total and average points TO DISPLAY
(a) Name one other design notation that could have been used. 1
(b) Lines 2 and 4 are the beginning and the end of a fixed loop.
Explain why a fixed loop is used here. 1
(c) Using a high level language with which you are familiar, write the line of program code for line 5 of the algorithm. 2
(d) The names of 50 contestants have to be stored.
State the data structure that should be used to store all the contestants’ names. 1
(e) The program design is updated to display an error message if the points entered are not in the range 5 to 25 inclusive. Line 2 of the algorithm is refined to include the conditional statement shown below.
IF (points<5) AND (points>=25) THEN
display error message
END IF
(i) Identify two mistakes made in the above pseudocode. 2
(ii) Name the standard algorithm that is used to check that values entered are within a correct range. 1
(iii) The program is to be tested using 8 and 21 as examples of normal test data for the points.
State two numbers that should be used for extreme test data. 2

Software Design and Development Unit

·  Software development – design, testing, documentation

Comp Int2
2011 / 10. Normal and extreme data are used to test a computer program.
State one other type of test data that should be used to test the program. 1

Software Design and Development Unit

·  Low level operations and computer architecture

Comp Int2
2013 / 1 Convert the decimal number 27 into an 8 bit binary number. 2
3 Name two parts of a processor. 2
6 State one difference between machine code and a high level language. 1
15 (c) Programmers often use pre-defined functions in the code.
Describe one benefit of using pre-defined functions.” 1
Comp Int2
2012 / 1 Name the part of the processor that temporarily stores data and program instructions. 1
13 A program written in a high level language must be translated.
Describe one benefit to the programmer of using an interpreter rather than a compiler to translate the program code. 1
Comp Int2
2011 / 14 Antiques can be bought and sold on the BargainSearch website.
(b) The reserve price of a vase is £42·50.
State how a real number such as 42·50 would be represented in the computer. 1
(c) A computer program is written in a high level programming language to keep track of the bids for each antique.
(ii) State one advantage of writing the program in a high level language rather than in machine code. 1
(iv) The completed program is compiled.
Describe how a compiler translates a high level language program into machine code. 1

Information Systems Design and Development Unit

·  Database design, structures, links and operations

InfoSys Int2
2011 / 13 Explain what is meant by the term foreign key. 1
17 (a) Explain what is meant by the term “flat file database”. 1

(c) James Main cannot remember which books he has borrowed from the library.
The librarian enters the query James Main into the Member Name field.
(i) Explain what is meant by a “query”. 1
(ii) Explain why this query for James Main will not show all the information
about books he has borrowed using his membership card. 1
(iii) State a query that would find all the books borrowed by James Main. 1
InfoSys Int2
2012 / 2 French schools use the following database to help pupils find pen pals in Britain

(a) State the most appropriate field type for the French Speaker field. 1
(b) State the most appropriate field type for the School field. 1
(c) The ID field is a primary key. Explain the purpose of a primary key in a database. 1
3 A library database is shown below.

(b) The Fine field is an example of a real data type. Explain what is meant by a “real” data type. 1
InfoSys Int2
2013 / 7 Information from a database about the planets is shown below

(b) A user searches the database for Water State = Solid and Diameter (km) > 7000.
State how many records would be listed in the search results. 1
(c) The Water State field could have a restricted choice validation check performed upon it. Explain what is meant by a restricted choice validation check. 1
10 Stelling Co is a company selling cameras. Here is a portion of the database they keep on their stock.

The product ID field is the primary key.
(a) Explain the purpose of a primary key. 1
(d) Stelling Co receives several orders from each customer over a period of time.
Customer details are stored in a CUSTOMER table and details of orders placed are stored in an ORDER table.
State the relationship that exists between the CUSTOMER table and the ORDER table. 1

Information Systems Design and Development Unit

·  website design, structures and links, and coding

Comp Int2
2012 / 17 Dave owns a company called Classic Cars.
(g) Dave decides to advertise his company using a website.

(i) When a user clicks on the graphic of the car, another page on Dave’s website is shown.
Name this navigation feature. 1
(ii) Dave adds a video clip to the website.
State why high bandwidth is recommended for viewing this video clip. 1
(iii) Apart from cost, state one advantage to Dave of using e-mail to communicate with customers. 1

Information Systems Design and Development Unit

·  media types, including file size calculations

Comp Int2
2013 / 13 A local sport centre issues membership cards.
(d) Each membership card requires 1·6 Megabytes of storage.
Calculate the storage requirements for 1,500 membership cards in Gigabytes.
Show all working. 2
Comp Int2
2012 / 24 Nihal is creating a website for a local cycling shop to advertise mountain bikes for sale and cycling skills courses.
(b) Nihal takes photographs for the website using his digital camera
(ii) Each photograph has a file size of 2·4 Mb. The digital camera memory card has a capacity of 2 Gb.
Calculate how many images can be stored on the memory card.
Show all working. 2
(iv) Nihal’s photographs are saved as JPEG files. JPEG files use lossy compression.
Explain what is meant by lossy compression. 1
Comp Int2
2011 / 14 (a) Kamila is selling her antique vase. She has taken a black and white photograph of the vase. The photograph measures 2 inches by 3 inches and has a resolution of 800 dpi.
(i) Calculate the storage requirements of the photograph in Kilobytes.
Show all working. 3

Information Systems Design and Development Unit

·  Information system development – purpose, features, user interface, testing, etc

InfoSys Int2
2011 / 25. Scots Ancestors Ltd is an Internet company that helps customers trace their ancestors.
The company used web authoring software to create their website making use of icon-based features and web tools.
(a) State one reason why “icon-based” features are easy to use. 1
(b) The contacts page of their website is displayed using the Voyager Internet Browser.

(i) Identify one navigation feature present in the Voyager Internet Browser. 1
(ii) Explain the purpose of the navigation feature you identified in part (i). 1
(iii)The hyperlink tool was used in creating the Scots Ancestor Ltd contacts page.
Identify a hyperlink in the above web page. 1

Information Systems Design and Development Unit

·  Technical implementation (hardware, software, storage, networking and connectivity)

Comp Int2
2013 / 4 State an appropriate storage medium for storing a two hour movie. 1
Comp Int2
2012 / 22 The McTavish family connects their three computer systems and a printer wirelessly within their home.
(b) State one additional hardware requirement for setting up this network. 1
(c) State one advantage of using a wireless connection compared to a cabled connection. 1
(e) The family access the Internet to stream video.
State the type of Internet connection required for this task. 1
(f) Describe one software security feature the parents could use to prevent the children accessing inappropriate content on the Internet.
(g) Explain what the family should do to avoid accidentally downloading computer viruses from the Internet. 1

Information Systems Design and Development Unit

·  Security, legal and environmental issues

InfoSys Int2
2013 / 9 Each team in the Lowland Hockey League must register players’ details with the administrators of the league at the start of the season.
(c) The Lowland Hockey League must comply with the Data Protection Act.
(i) In terms of the Data Protection Act, identify the data controller in this situation. 1
(ii) State two responsibilities of the data controller. 2
16 (c) One of the club members suspects that the website has been hacked. The club has decided to install additional security software and update their virus protection software.
(i) State the legislation that would have been broken by hacking into the golf club website. 1
(ii) The additional security software continually checks network activity to see if anyone is trying to hack into the website. Explain the effect this would have on system performance. 2
(iii) Explain why virus protection software needs to be updated regularly. 1
InfoSys Int2
2012 / 5 State one offence made illegal by the Computer Misuse Act (1990). 1
10 Naz runs a shop that sells mobile phones. He is considering introducing a computerised information system.
(b) Naz wishes to store the personal details of his customers.
(i) State the legislation that aims to prevent companies misusing personal information. 1
(ii) Describe what this legislation requires Naz to do before storing any personal information. 1
InfoSys Int2
2011 / 14. Dox.com uses a range of software in different departments within their organisation
(e) Describe one area of health and safety regulations, relating to using computers at work, that Dox.com should consider. 1
Comp Int2
2013 / 2 Anti-virus software is used to keep your computer free from viruses. Define a computer virus. 1
13 A local sport centre issues membership cards.
(c) The sports centre must comply with the Data Protection Act.
State two ways in which the sports centre staff could breach the Data Protection Act. 2
Comp Int2
2012 / 3 John’s computer is infected by a virus.
(a) Describe one way in which a computer virus could be spread. 1
(b) State the law that is broken by deliberately spreading a computer virus. 1
Comp Int2
2011 / 20 A website has been created for Lowland High School.
(f) The Head Teacher only wants staff to have access to the reports page.
State one software security measure that could be taken to ensure that only staff can access this web page. 1
(h) State one reason why the school may require Internet filtering. 1

Page 2