It Syllabus Cape
It Syllabus Cape
It Syllabus Cape
oInformationio n
CAPE
o lo
®
c h n
TeTechnologymat
f
In echo r
n
tio atioT
fo rm SYLLABUS
SPECIMEN PAPER
MARK SCHEME
SUBJECT REPORTS
Macmillan Education
4 Crinan Street, London, N1 9XW
A division of Macmillan Publishers Limited
Companies and representatives throughout the world
www.macmillan-caribbean.com
The author has asserted their right to be identified as the author of this work in accordance with the
Copyright, Design and Patents Act 1988.
LIST OF CONTENTS
This syllabus is arranged into TWO Units, each made up of three Modules.
SYLLABUS
INFORMATION TECHNOLOGY
CXC A4/U2/21
The Pro-Registrar
Caribbean Examinations Council
Caenwood Centre
37 Arnold Road, Kingston 5, Jamaica
INTRODUCTION .................................................................................................................... 5
RATIONALE .......................................................................................................................... 1
AIMS…................................................................................................................................. 2
GLOSSARY...........................................................................................................................36
Please note that the syllabus has been revised and amendments are indicated by italics.
Please access relevant curated resources to support teaching and learning of the syllabus at
https://learninghub.cxc.org/
For access to short courses, training opportunities and teacher orientation webinars and workshops
go to our Learning Institute.
PLEASE NOTE
This icon is used throughout the syllabus to represent key features which teachers and
learners may find useful.
The Caribbean Examinations Council offers three types of certification at the CAPE® level. The first is
the award of a certificate showing each CAPE® Unit completed. The second is the CAPE® Diploma,
awarded to candidates who have satisfactorily completed at least six Units, including Caribbean
Studies. The third is the CXC® Associate Degree, awarded for the satisfactory completion of a
prescribed cluster of ten CAPE® Units including Caribbean Studies, Communication Studies and
Integrated Mathematics. Integrated Mathematics is not a requirement for the CXC® Associate Degree
in Mathematics. The complete list of Associate Degrees may be found in the CXC® Associate Degree
Handbook.
For the CAPE® Diploma and the CXC® Associate Degree, candidates must complete the cluster of
required Units within a maximum period of five years. To be eligible for a CXC® Associate Degree, the
educational institution presenting the candidates for the award, must select the Associate Degr ee of
choice at the time of registration at the sitting (year) the candidates are expected to qualify for the
award. Candidates will not be awarded an Associate Degree for which they were not registered.
RATIONALE
The Information Technology Syllabus for the Caribbean Advanced Proficiency Examination (CAPE®)
reflects the belief that Information Technology is essential to the economic and social development
of the region. The widespread use of Information Technology, the tools and techniques for inputting,
processing, storing, outputting, transmitting and receiving information, which was made possible
because of improvements in computer and telecommunications technology, has significantly changed
society. An interestingly large proportion of business transactions is now performed over computer
networks. The Internet and multimedia computers have had a significant impact on the ways in which
people work, learn, communicate, conduct business, and seek entertainment. The increased
integration of computer and telecommunications technology has led to an increased globalisation of
the world economy, evident in greater individual, corporate and transnational trade activities;
movement of finance, and access to market. Moreover, as the world becomes increasingly involved in
the practice of technology, the activities which were once thought of as far-fetched are becoming more
routine. Consequently, there is a heightened awareness of the role of technology in solving problems.
This wide spread use of technology implies that we must know how to use the technology, not only
from a purely technical point of view, but it also means that we must be conscious of the impact of
Information Technology. In particular, we must be made aware that the appropriate use of
Information Technology can help solve the problems that we are facing in our daily lives, whether they
be of an economic, social or personal nature, and that Information Technology provides opportunities
for economic development, as well as for further integration of the region. However, the misuse of
Information Technology also raises a number of ethical, legal and political issues, ranging from
questions concerning privacy of information about individuals, to intellectual property rights. This
course, through authentic, learner-centred teaching and assessment approaches, presents students
with advanced ideas in the Information Technology and allied fields, including the practices and
implications for using technology in everyday activities.
In keeping with the UNESCO Pillars of Learning, this course of study will contribute to the development
of a person who will learn to be, learn to know, learn to do, learn to live together, and learn to
transform oneself and society. In order for the Caribbean to effectively increase its participation in the
information economies and societies, it is essential that Caribbean people become familiar with this
technology. The Information Technology syllabus is based on objectives, skills and content which will
cultivate the attributes of the Ideal Caribbean Person as articulated by CARICOM. That is, a Caribbean
person who demonstrates multiple literacies, as well as independent and critical thinking, and
questions the beliefs and practices of the past and brings this to bear on the innovative application of
science and technology to problem-solving. Such a person will inevitably demonstrate a high level of
self-confidence and self-esteem, a positive work ethic, and display and nurture creative imagination in
the economic and entrepreneurial spheres and other areas of life. Consequently, students who pursue
this course of study will develop critical skills and competencies, including, communicative,
collaborative and creative skills.
2. develop an awareness of the importance of using reliable and ethical information sources and
services;
3. develop an awareness of the nature and sources of information and objective measures to
gathering and processing information;
7. develop an awareness of the cultural, ethical, legal and political considerations associated
with Information Technology;
8. develop competence in solving real-life problems, using the tools and techniques of the
computer and computer-related technologies;
10. develop creative, collaborative, communicative and critical thinking skills using appropriate
Information and Communication Technologies (ICTs); and,
11. prepare students for tertiary level studies and employment in technology-oriented professions.
- recall and grasp the meaning of basic facts, concepts and principles of Information
Technology;
- identify real-life problems for which Information Technology solutions are appropriate and
beneficial; and,
- assess Information Technology usage patterns to establish legal compliance, ethical and
cultural suitability.
- identify and recognise the relationships among the various components of Information
Technology and their impact on society; and,
- recognise the limitations and assumptions of data gathered in an attempt to solve a problem.
- make reasoned judgements and recommendations based on the value of ideas and
information and their implications;
In order to be successful, students should spend at least 50 hours of the 150 hours per Unit in a
computer lab or on a computer at home or in the workplace.
GENERAL OBJECTIVES
3. develop an understanding and appreciation of data, information and knowledge, and the
distinction among them;
6. describe the criteria for selecting Including: bias, accuracy, cultural context,
information sources; completeness, currency of information, refereed
and un-refereed sources, characteristics of
information on the Internet.
8. identify ways of representing data Data: including character, string, numeric, aural
and information; and, and visual.
9. justify the tools used in Information Hardware, (for example modem) software and
Technology. communication tools; advantages and
disadvantages; tools associated with the
Internet including on- line services; search
engines; VoIP, SMS Discussion Forum/Board
telnet, ftp (upload/download), message board,
mailing list, social media tools, web-conferencing
tools, cross-platform messaging tools.
RESOURCES
Daley, B. Computers are your Future, New Jersey: Pearson Prentice Hall,
2008.
Duncan, O’Neil Information Technology and Computer Science for CAPE and
College Students, LMH Publishing Limited, Jamaica, 2017.
Heathcote, P. A Level Computing, Letts, London: Letts,
Long, L. and Long, N. Computers: Information Technology in Perspective, New J.
2005.
Computers: Information Technology in Perspective, New
Jersey: Prentice Hall, 2012.
Misty E. Vermaat, Susan L. Sebok Discovering Computers, digital Technologies, Data and Devices
Cengage Learning, 2018.
Shelly, G., Cashman, T., and Discovering Computers, New York: International Thompson
Vermaat, M. Publishing Company, 2014.
Electronic Resource
https://learninghub.cxc.org/
GENERAL OBJECTIVES
4. develop an awareness of the structure of the Internet and its standards and protocols.
2. describe the relationship among the Relationship among the components: hardware,
components in an Information software, data, procedures, users, network.
System;
3. describe the purpose, functions and Hardware (input, output, storage, processor and
types of hardware; peripheral devices);
4. describe the purpose, functions and Purpose, functions and types of software
types of software; including application, system (operating
systems, language translators, and utilities);
software; embedded systems (monitoring and
control systems);
5. discuss the importance of data and Nature and structure of information at various
information; decision making levels: strategic, tactical,
operational; structured, semi-structured and
unstructured.
6. distinguish among different types of Differences among the types of HCI including
HCI; forms, menu, command line, natural language,
graphical user interface (GUI), speech and direct
manipulation.
7. evaluate different types of HCI; Basic principles and guidelines for evaluating
HCI’s: ease of use, ease of learning, ease of
navigation, alignment, use of colour.
10. explain the purpose and functions of Definition, purpose, functions, examples and
network components; types of networks including local area network
(LAN), wide area network (WAN), metropolitan
area network (MAN); virtual private network
(VPN); mobile networks; Internet; Intranet;
Extranet; configuration; topologies;
transmission media: (wired versus wireless):;
Wifi; hotspots; network security; firewalls.
UNIT 1
MODULE 2: INFORMATION SYSTEMS (cont’d)
13. configure simple networks; Use designs to set-up and configure a simple
network; network typology (bus, ring, star);
routers, hubs, Ethernet cables, Service Set
Identifier (SSID), WAN, LAN, firewalls, wired
security, wireless security: MAC filtering, WPA2,
WPA3, AES, password/network key, router
password.
14. describe steps to troubleshoot a Commands: Ipconfig, Ping, nslookup; Speed test,
variety of wired and wireless Firewall configurations, IP address, DNS,
network issues; Gateway, Physical connections, status lights.
15. compare the various features Features including, speed, efficiency, portability,
associated with the components of maintainability, storage, transmission.
Information Systems;
16. compare various security Physical access control versus logical access
mechanisms; control measures and devices; including
passwords (characteristics of an effective
password - not obvious, length, mixed case,
alphanumeric); authentication, encryption,
swipe or key cards, biometric; data integrity.
17. explain the meaning of terms For example, data security, passwords,
related to the security of authentication, encryption, data corruption.
Information Systems;
18. describe the structure of the Browser, hyperlinks, home page, World Wide
internet as interconnected Web (WWW), web page versus web site;
hypertext documents; and, Hypertext Transfer Protocol (HTTP), universal
resource locator (URL), hypertext markup
language (HTML), extensible markup language
(XML); Domain Name Resolution (IP address,
domain name).
To facilitate students’ attainment of the objectives of this Module, teachers are advised to engage
students in the teaching and learning activities listed below.
2. Engage students in an activity to use the Internet, computer magazines, textbooks and other
information sources to research relevant concepts from the Module to be included in the
glossary of terms which was started for Module 1. This could form the basis of an in-class
discussion.
3. Engage students in collaborative activities where they identify two examples of a HCI and
make a presentation comparing and contrasting those interfaces.
4. Present the scenario of a person driving a car and interacting with the instruments on the
dashboard to students. Engage students in a discussion on the scenario for them to deduce
key points about HCI.
5. Present different stimuli (for example, videos, images, photographs) to students for them to
identify how HCI is used in different organisations (for example, restaurants, hospitals,
recording studios, security firms, scientific labs) and by the student (for example, tablets,
gaming consoles, cell phones, web pages) and evaluate these designs based on a set of
identified criteria.
7. Invite resource persons with experience in the innovative use of Information Technology in
business to speak on relevant issues. This also could be facilitated virtually or students could
watch videos on the topic.
RESOURCES
Daley, B Computers are your Future, New Jersey: Pearson Prentice Hall,
2008.
Duncan, O’Neil Information Technology and Computer Science for CAPE and
College Students, LMH Publishing Limited, Jamaica, 2017.
Shelly, G., Cashman, T. and Discovering Computers, New York: International Thompson
Vermaat, M. Publishing Company, 2014.
Electronic Resources
Bourgeois, David T.; Smith, James L.; Wang, Shouhong; and Mortati, Joseph, "Information Systems
for Business and Beyond" (2019). Open Textbooks.
https://digitalcommons.biola.edu/open-textbooks/1
https://learninghub.cxc.org/
GENERAL OBJECTIVES
2. develop an appreciation for the value and importance of information to solve problems; and,
2. describe the stages of the Stages: including define the problem, analyse
problem-solving process; the problem, identify and evaluate possible
solutions, select and justify the optimal solution,
implement, and evaluate and review.
4. explain the criteria for selecting Criteria for rejecting or accepting a piece of
information that can be used to information, including bias, accuracy, cultural
solve real-life problems; context, completeness, currency of information,
refereed and un-refereed sources,
characteristics of information on the Internet.
6. explain the various stages of the Including feasibility study, analysis, design,
system development life cycle development, implementation, review;
(SDLC), and software engineering deliverables/output of each stage including
system proposal, project plan, various diagrams
and charts, information system (software) test
plans, conversion plans, documentation
including user and technical manuals.
8. describe data flow diagrams (DFD); Define DFD; identify and describe the four
symbols (elements); entity, process, data store,
data flow; identify and describe the various
levels of DFDs including context level and level 1
detailed DFD.
To facilitate students’ attainment of the objectives of this Module, teachers are advised to engage
students in the teaching and learning activities listed below.
2. Present different scenarios to students to emphasise that most if not all problems have an
information component. For example, the information the farmer would need to get rid of the
pest affecting his crop would be the type of pest, what are its natural enemies, what would be
the effect on his crop of using a particular pesticide or a natural enemy of the pest. Have
students identify the information component in each scenario.
3. Organise field trips to business places for students to observe how Information Technology is
used to address problems faced by the organisation.
4. Invite professionals, artists, and others to make presentations to students to give additional
perspectives on issues relevant to their studies. Encourage students to make presentations to
persons outside of the school system, who can evaluate or comment on the presentations as
well as answer the students’ questions.
5. Use a physical activity, such as a sport, to demonstrate how the use of information can be an
effective tool or mechanism in ensuring a desired outcome, such as improved performance or
success over competitors. Students could also view a video of an athlete sharing their game
plan that assured their success after the event.
6. Develop a set of scenarios in which there are either opportunities or problems encountered by
an organisation. Students are required to (a) identify a problem, (b) formulate a problem
statement, (c) suggest two possible solutions, and (d) recommend one of the solutions and
justify the choice.
7. Adopt a single DFD notation style and have students complete several exercises to become
familiar with that style, for example, Gane and Sarson. Present data flow diagramming errors
and have students label these with the relevant terms. For example, black hole - process with
only input data flow, a process with only output data flow from it; data stores or external
entities that are connected directly to each other, in any combination; incorrectly labelling
data flow or objects, some examples are:
8. Work in groups to address problem-solving through the development of algorithms and the
use of pseudocode to solve those problems. This activity should ensure that all elements are
practiced.
RESOURCES
Daley, B. Computers are your Future, New Jersey: Pearson Prentice Hall,
2008.
Duncan, O’Neil Information Technology and Computer Science for CAPE and
College Students, LMH Publishing Limited, Jamaica, 2017.
Shelly, G., Cashman, T., and Discovering Computers, New York: International Thompson
Vermaat, M. Publishing Company, 2014.
Electronic Resource
www.w3schools.com
https://learninghub.cxc.org/
GENERAL OBJECTIVES
2. demonstrate the skills needed to construct a database and organise and manage data within
a database; and,
3. develop an appreciation of the evolution and importance of data storage and formats of data
retrieval.
1. differentiate among terms used For example, fields, records, tables, files, database
in Information Management; and database management system.
2. explain how data storage and Concept of the terms; brief history of storage devices;
formats of data retrieval have (from text-based to multimedia); volumes of data to
changed over time; be stored; compression utilities; access method and
speed.
3. explain the advantages of using a Advantages including speed, efficiency, cost; data
database approach compared to quality: completeness, validity, consistency,
using traditional file processing; timeliness and accuracy; data handling, data
processing.
4. describe the different types and File types including master and transaction files.
organisation of files and
databases; File organisation including serial, sequential, indexed
sequential, random or direct; Database organisation
including hierarchical, relational, network and
object-oriented.
5. explain how files and databases Uses: including store, organise, search, retrieve;
are used in organisations; eliminate redundancies; data mining, data marts
and data warehouses.
6. use data flow diagrams (DFD) to Use of symbols for data stores, processing, data flow
document the flow of and external entities; context level DFD and first
information within an level detailed DFD; Use of symbols, context level DFD
organisation; and first level detailed DFD to illustrate the
information flow.
7. explain how the growth of the Including the demands for information (by
Internet impacts data handling; customers and suppliers); data mining, data
warehousing; interfacing websites and data
processing; underlying databases.
8. explain how the absence of data Including loss of revenue, sales, competitive
quality, accuracy, and timeliness advantage, customers; poor decision-making;
impacts organisations; missed opportunities; impact on problem solutions.
10. explain normalisation rules to First normal form (1NF): removal of attribute
remove normal form violations; redundancy and anomalies; second normal form
(2NF): repeating groups of data (or attributes); third
normal form (3NF): partial and non-key
dependencies.
12. apply techniques to create entity Keys: primary, foreign and composite (or compound
relationships diagrams; and, or concatenated); relationships (one to one, one to
many); entity- relationship diagrams (ERD).
To facilitate students’ attainment of the objectives of this Module, teachers are advised to engage
students in the teaching and learning activities listed below.
1. Choose a single scenario to which students can easily relate, such as a library system or
student registration system, and use it throughout the Module to develop understanding of
the specified concepts and techniques.
2. Ask students to complete several exercises on the normalisation process involving the use of
standard notations to remove normal form violations.
3. Compile a glossary of terms using the Internet, computer magazines, textbooks and other
information sources. This should be added to the list compiled for the previous Modules. The
glossary should be included on the class web page or wiki and could form the basis of an in-
class discussion.
5. Have students work in small groups to develop and use diagrams, digital stories, games, class
social media page, class website or wikis to represent or host the concepts and relationships
contained in the Specific Objectives.
RESOURCES
Duncan O’Neil Information Technology and Computer Science for CAPE and
College Students, LMH Publishing Limited, Jamaica, 2017.
Shelly, G., Cashman, T., and Discovering Computers, New York: International Thompson
Vermaat, M. Publishing Company, 2014.
Electronic Resources
www.w3schools.com
https://learninghub.cxc.org/
GENERAL OBJECTIVES
1. explain reasons for the use of IT Enhanced speed, accuracy, reliability, efficiency,
tools; flexibility, communication, presentation of
information, integration of processes, decision
making; storage and retrieval of large volumes of
data; manageability of task; external and
internal demands from users (including: clients,
competitors, suppliers and employees).
3. use online productivity tools to solve Create, format, and share (read only, edit mode)
real life problems; online tools (word processing, spreadsheet,
database, presentation, web sites and pages).
5. justify the use of IT tools to solve Criteria for selection including the nature of the
real-life problems; solution, type of analysis required (calculations,
formatting, graphing), type of data, type of
storage, type of access method, type of
processing, type of reports (detailed, summary,
preformatted, ad hoc).
6. use the most appropriate format to Format including text, graphics, sound, video,
display or present information; graphs, charts and tables.
8. justify the acceptance or rejection of Criteria for distinguishing between reliable and
a piece of information; unreliable information sources: accuracy, timely
corrections and updates, uses verifiable sources,
comprehensive, validity, integrity, bias or
objectivity, scope of coverage (breadth and
depth), authority, accessibility, currency,
reference to other sources, relevance,
consistency.
10. develop form enabled web pages; HTML form elements, Scripting (client side
Scripting to validate form input), Cascading Style
Sheets (CSS).
11. describe web development For example, JSON, Ionic and flask.
frameworks; and,
To facilitate students’ attainment of the objectives of this Module, teachers are advised to engage
students in the teaching and learning activities listed below.
1. Compile a glossary of terms using the Internet, computer magazines, textbooks and other
information sources using the guidelines for selecting information. The glossary should be
included on the class web page or wiki and could form the basis of an in-class discussion.
2. Have students collaborate to engage in research on a selected software package. The group
may demonstrate one feature of software to the whole class using audio-visual aids. Special
attention should be paid to features that make the software uniquely suited to the given task.
3. Have students collaborate to use presentation packages like PowerPoint to prepare and
present information on selected topics to the class. Using the guidelines for creating the tools
used, another group will observe the presentation and provide feedback. Students should then
review their work and post the final version on the class webpage or wiki.
4. Have students participate in an emerging technology showcase activity. Students (individually
or in small groups) based on an agreed schedule will prepare to creatively showcase an app of
the day or a tool of the day. They should include how the app or tool could be used to solve
real life problems.
5. Have students use computer-based or online tools to prepare and share relevant information
on key concepts in the Module with the class. These should be posted on the class webpage.
RESOURCES
Electronic Resources
www.w3schools.com
https://learninghub.cxc.org/
https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-
interaction-2nd-ed/wearable-computing
GENERAL OBJECTIVE
1. develop an understanding of the potential risks as well as strategies for mitigating these in
Information Technology;
2. develop an awareness of laws and policies associated with information systems; and,
3. develop an awareness of the ethical, legal and social considerations associated with
information technology.
Politics.
3. discuss how Information System Hardware, software, network, users, procedures and
components can be exposed to data. System misuse and abuse; system failure:
threats, vulnerabilities, attacks and defective hardware, software glitches or bugs;
compromises in organisations; threats posed by Bring Your Own Device (BYOD)
policies, disruptions from natural disasters and other
hazards; the pros and cons of encryption; difficulties
experienced by organisations in the disposal of
obsolete equipment.
4. evaluate legal and ethical Including laws, procedures, guidelines; the misuse of
considerations and policies related information, such as manipulation of information to
to the handling and management give false representations, identity theft; invasion of
of information assets; privacy; phishing, pharming.
5. examine various other computer Computer security risks including Internet and
security, health and safety, and network attacks, unauthorised access and use;
environmental risks; hardware theft and vandalism; software and
information theft,
9. examine the issue of plagiarism and Definition of plagiarism, forms of plagiarism (e.g.
its implications; word-for-word, paraphrasing, failure to cite,
incorrect citation, claiming sole ownership),
digital media as intellectual property.
11. examine the social implications of Social media; cyberbullying; cybercrime; online
interacting in an online games; adult content.
environment;
Implications for example addictions, financial
loss, psychological and physical.
12. examine the expanding role of Non-human interactions for business operations
machine interactions with (for example, robots, chatbots, video tellers in
individuals/customers; and, customer service, banking, reservations, billing,
queries).
13. evaluate the expanding role of Definition and role of wearable computing.
wearable computing devices.
Wearable computing devices, examples and
applications: stand-alone, frontend/backend
systems, location based, internet based).
To facilitate students’ attainment of the objectives of this Module, teachers are advised to engage
students in the teaching and learning activities listed below.
1. Engage students to work in groups to search and find resource materials relevant to different
topics in this Module. These should be peer reviewed using agreed criteria. Those that meet
the requirements should be placed on the class webpage.
2. Invite resource persons with the relevant expertise to share their experience with issues such
as threats, risks, vulnerabilities, countermeasures, handling and managing information
technology assets, health and safety and plagiarism.
3. Use case studies to demonstrate concepts such as threats, countermeasures, computer crimes,
internet entertainment, copyright, patent and trademark laws.
4. Use concept maps and concept frames to organise and illustrate the interrelationships
between various pieces of information.
6. Have students obtain brochures from vendors and service providers and review them based on
the relevant criteria. Students will share their feedback with the class.
RESOURCES
Duncan, O’Neil Information Technology and Computer Science for CAPE and
College Students, LMH Publishing Limited, Jamaica, 2017.
Shelly, G., Cashman, T., and Discovering Computers, New York: International Thompson
Vermaat, M. Publishing Company, 2014.
Electronic Resources
https://learninghub.cxc.org/
https://www.interaction-design.org/literature/book/the-encyclopedia-of-human-computer-
interaction-2nd-ed/wearable-computing
Candidates’ performance will be reported as an overall grade and a grade on each Module. The
scheme of assessment will comprise two components, one external and one internal.
Paper 031
The aim of the project is to develop candidates’ appreciation for and use of the problem-solving
process.
Requirements
Candidates are required to identify and examine a problem in their own environment which requires
an Information Technology based solution. Candidates should define the problem, collect data
relevant to that problem, identify and examine options and present the selected solution with
justification. The candidates should ensure that the selected solution is an Information Technology
based solution. The student should produce a report of no more than 1500 words. Students are
encouraged to work in groups.
The aim of the project is to provide opportunity for the candidates to demonstrate proficiency in the
use of Information Technology tools to solve real-life problems and have an appreciation for the
factors that mitigate against and manage risk associated with Information Technology.
Requirements
Candidates are expected to implement an Information Technology based solution, which should
include either a database or a website, to an identified problem in their environment and present that
A School-Based Assessment Record Sheet will be sent each year to schools submitting students for the
examinations.
All School-Based Assessment Record Sheets must be submitted online using the SBA data capture
module of the Online Registration System (ORS). A sample of assignments will be requested by CXC®
for moderation purposes. This sample must be electronically submitted. These samples will be
reassessed by CXC® Examiners who moderate the School-Based Assessment. Teachers’ marks may be
adjusted as a result of moderation. The Examiners’ comments will be sent to schools.
Copies of the students’ submissions must be retained by the school until three months after
publication by CXC® of the examination results.
ASSESSMENT DETAILS
External Assessment
The external assessment consists of written papers. They are externally set and externally assessed.
Together the Paper 01 and 02 contribute 80 per cent, and the Paper 032 contributes 20 per cent of
of the final mark.
The paper will consist of 45 multiple-choice items, 15 from each Module. All questions are
compulsory and knowledge of the entire Syllabus is expected. The paper will assess the
candidate’s knowledge across the breadth of the Syllabus.
2. Mark Allocation
The paper is worth 45 marks, with each question being allocated 1 mark.
3. Question Type
Questions may be presented using diagrams, data, graphs, prose or other stimulus material.
The paper is worth 90 marks, each module being allocated 30 marks, comprising of two
questions being allocated 15 marks each.
3. Question Type
Each question presents a situation based on concepts in the Module and consists of three or
four sub-questions. The required responses to a sub-question may range in length from one
sentence to two paragraphs.
4. Award of marks
Marks will be awarded for knowledge and comprehension, application and analysis and
synthesis and evaluation.
This paper has three questions. Candidates are required to answer all questions.
6. Mark Allocation
7. Question Type
Each question is based on concepts in the Module and consists of sub-questions. The required
responses to a sub-question may range in length from one sentence to two paragraphs.
8. Award of marks
Marks will be awarded for knowledge and comprehension, application and analysis and
synthesis and evaluation.
School-Based Assessment is an integral part of student assessment in the course covered by this
syllabus. It is intended to assist students in acquiring certain knowledge, skills and attitudes that are
associated with the subject. The activities for the School-Based Assessment are linked to the syllabus
and should form part of the learning activities to enable the student to achieve the objectives of the
syllabus. Students are encouraged to work in groups.
During the course of study for the subject, students obtain marks for the competence they develop
and demonstrate in undertaking their School-Based Assessment assignments. These marks contribute
to the final marks and grades that are awarded to students for their performance in the examination.
The guidelines provided in this syllabus for selecting appropriate tasks are intended to assist teachers
and students in selecting assignments that are valid for the purpose of School-Based Assessment. The
guidelines provided for the assessment of these assignments are intended to assist teachers in
The Caribbean Examinations Council seeks to ensure that the School-Based Assessment scores are
valid and reliable estimates of accomplishment. The guidelines provided in this syllabus are intended
to assist in doing so.
Candidates’ total School-Based Assessment mark for any Unit should be divided in three and allocated
to each Module equally. Students are encouraged to work in small groups to complete the SBA.
Fractional marks should not be awarded. Wherever the Unit mark is not divisible by three, then:
(b) when the remainder is 2, one of the marks should be allocated to Module 2 and the other
mark to Module 3.
(a) The activities related to Project work should be integrated into the course so as to
enable candidates to learn and practise the skills of undertaking a successful project.
(b) Some time in class should be allocated for general discussion of project work. For
example, discussion of how data should be collected, how data should be analysed
and how data should be presented.
(c) Class time should also be allocated for discussion between teacher and students, and
student and student.
2. Management of Project
(a) Planning
An early start to planning project work is highly recommended and the schedule of
the dates for submission should be developed by teachers and candidates.
(b) Length
The length of the report of the project should be 1500 words for Unit 1 and 600–700
words for Unit 2 excluding diagrams, graphs, tables and bibliographies.
(c) Guidance
Candidates are not expected to work on their own. The teacher is expected to give
appropriate guidance at all stages of project work, for example, chapters to read,
alternative procedures to follow and other sources of information.
(d) Authenticity
Teachers are required to ensure that all projects are the candidates’ work. A
recommended procedure is to:
(ii) ask candidates to describe procedures used and summarise findings either
orally or written; and,
Solution (2 marks)
• Selection of the MOST feasible solution 2 marks
• Selection of a solution 1 mark
UNIT 2
SOLUTION
Implementation of the IT based solution (12 marks)
• Appropriate use of IT tools (1 mark)
- Appropriate use of ALL tools 1 mark
• Human Computer Interface
- Logical and user friendly navigation with appropriate labelling 2 marks
- Limited navigation available with appropriate labelling 1 mark
• Appropriate use of feature tools
• Selection and appropriateness of ALL relevant features 2 marks
1 mark
CAPE® candidates may reuse any moderated SBA score within a two-year period. In order to assist
candidates in making decisions about whether or not to reuse a moderated SBA score, the Council will
continue to indicate on the preliminary results if a candidate’s moderated SBA score is less than 50 per
cent in a particular Unit. Candidates reusing SBA scores should register as “Resit candidates” and must
provide the previous candidate number when registering.
Resit candidates must be entered through a school, approved educational institution or the local
Registrar’s office.
External Assessment
Paper 01
Multiple Choice
(1 hour 30 minutes) 15 15 15 45 30
(30) (30) (30) (90)
Weighting
Paper 02 30 30 30 90
Essay
50
(2 hours 30 minutes)
(50) (50) (50) (150)
Alternative to the SBA-Paper
032
(1 hour 30 minutes)
and 20 20 20 60 20
School-Based Assessment
Paper 031
Weighted Module
Total 100 100 100 300 100
define state concisely the meaning of a word or This should include the
term defining equation/formula
where relevant.
design plan and present with appropriate Where hypotheses are stated
practical detail or when tests are to be
conducted, possible outcomes
should be clearly stated and/or
the way in which data will be
analysed and presented.
evaluate weigh evidence and make judgements The use of logical supporting
based on given criteria reasons for a particular point of
view is more important than
the view held; usually both
sides of an argument should be
considered.
record write an accurate description of the full This includes the values for any
range of observations made during a variable being investigated;
given procedure where appropriate, recorded
data may be depicted in graphs,
histograms or tables.
INFORMATION TECHNOLOGY
Unit 1 Paper 01
Unit 1 Paper 02
Unit 1 Paper 032
Unit 2 Paper 01
Unit 2 Paper 02
Unit 2 Paper 032
TEST CODE 02129010
SPEC 2020/02129010
CARIBBEAN E XAM I NAT I O N S COUNCIL
CARIBBEAN ADVANCED PROFICIENCY EXAMINATION®
INFORMATION TECHNOLOGY
UNIT 1 – Paper 01
1 hour 30 minutes
SPECIMEN PAPER
READ THE FOLLOWING INSTRUCTIONS CAREFULLY.
1. This test consists of 45 items. You will have 1 hour and 30 minutes to answer them.
2. In addition to this test booklet, you should have an answer sheet.
3. Do not be concerned that the answer sheet provides spaces for more answers than there are
items in this test.
4. Each item in this test has four suggested answers lettered (A), (B), (C), (D). Read each item
you are about to answer and decide which choice is best.
5. On your answer sheet, find the number which corresponds to your item and shade the space
having the same letter as the answer you have chosen. Look at the sample item below.
Sample Item
The best answer to this item is “spreadsheet and database software”, so (A) has been shaded.
6. If you want to change your answer, erase it completely before you fill in your new choice.
7. When you are told to begin, turn the page and work as quickly and as carefully as you can.
If you cannot answer an item, go on to the next one. You may return to that item later.
8. You may do any rough work in this booklet.
9. You may use silent, non-programmable calculators to answer questions.
02129010/CAPE/SPEC 2020
-2-
1. Which of the following refers to the Items 4-5 refer to the following options.
transmitting and receiving of data, from
voice to video across a distance via a (A) data
communication channel? (B) wisdom
(C) information
(A) Protocol (D) knowledge
(B) Modem
(C) Network Match EACH item below with ONE of the
(D) Telecommunications options above. Each option may be used
once, more than once or not at all.
2. Which of the following sequences lists 4. The temperatures at three different locations
the data storage devices in order of the in- across the country were recorded. The
creasing size of the device? temperatures recorded are an example of
8. Miss Jane prepared a practice exam for her class on her personal computer and would like to make
this file available on the Internet for her students to download. Which of the following tools should
she use to make this file available online?
(A) FTP
(B) Telnet
(C) Newsgroup
(D) Internet Relay Chat
9. A large tanker, carrying toxic waste, overturns on a major highway. The Office of Disaster
Management needs to inform drivers and the surrounding communities of the disaster. Which of
the following information sources is the MOST appropriate to use for sending out the information?
(A) Website
(B) Television
(C) Newspaper
(D) Social media
Item 10 refers to the following diagram.
(A) Telnet
(B) Channel
(C) Receiver
(D) Transmitter
11. As one of his references, a student used a 14. What is software engineering?
text book that was written in 1982. Which
of the following characteristics of informa- (A) A discipline which is concerned
tion sources can be challenged by his tutor. with all aspects of software
programming.
(A) Cost (B) A discipline which is concerned
(B) Reliability with all aspects of software
(C) Coverage production.
(D) Currency (C) A discipline which is concerned
with all aspects of software
integration.
12. What is the name of the first electronic (D) A discipline which is concerned
computer? with all aspects of software
modification.
(A) Abacus
(B) ENIAC
(C) ARPANET 15. The decimal equivalent of the ASCII
(D) Calculator representation for ‘E’ is 69. What is the
ASCII decimal representation for ‘A’?
18. Which of the following types of HCI is 22. Which of the following terms is used to
typically used by customers to order food describe connectivity that has been extended
through a drive-through lane at a fast food to another entity?
restaurant?
(A) Internet
(A) Menu-driven (B) Intranet
(B) Command-line (C) Extranet
(C) Graphical user (D) Ethernet
(D) Direct
23. Which of the following protocols forms
part of a URL?
19. To convert a document from text into a
coded text, ensuring data security, it is (A) TCP/IP
BEST to use (B) HTTP
(C) SMTP
(A) encryption (D) TCP
(B) biometrics
(C) access logs
(D) file transfer protocol Item 24 refers to the following scenario.
25. What type of user interface is commonly 30. Which of the following statements about
utilized by mobile phones? web pages are TRUE?
26. When Janis, a new computer user, installed (A) I and II only
a program and attempted to use it, she was (B) I and III only
confused because all she saw on the screen (C) II and III only
was a green bar with 5 evenly spaced words. (D) I, II and III
When she clicked on each of them, a list of
additional words was displayed.
31. Which of the following could correctly
Which HCI is Janis MOST likely using? represent “read name” as part of a flow
chart?
(A) Graphic user
(B) Menu-driven
(C) Event-driven read
(A)
(D) Command-line name
(A) Radio
(B) Satellite
(C) Microwave
(D) Fibre optic cable GO ON TO THE NEXT PAGE
02129010/CAPE 2020/SPEC
-7-
33. The review stage in problem-solving 34. Which of the following statement(s) is/are
TRUE about algorithms?
(A) involves defining a problem
(B) focuses on collecting data from I. Clearly defined and unambiguous
users II. Infinite number of steps
(C) involves finding the cost of III. Problem-solving strategy
implementing the system
(D) examines the system to see if any (A) II only
changes are required (B) I and III only
(C) II and III only
(D) I, II and III
35. Above is a copy of a Gantt chart used Item 36 refers to the following diagram.
by a group of students to guide them in
completing a project. How many TOTAL
days will it take to complete tasks 2,3 and
4?
(A) 4
(B) 5
(C) 6
(D) 11
37. Which of the following DFDs depicts the correct flow of data as it relates to student data being stored
in a student information system?
I Student
(B) Name, id Accept details
Student Student file
student
info
Student
data
(C) Student Name, id details Student file
entry
clerk
I
data
(D) Student file Name, id Student Name, id
entry
Name, id Accept
student
clerk
info
FOR J FROM 20 to 15 DO
WRITE J
END FOR
39. Into which of the following paradigms are the programming languages C++ classified?
(A) Declarative
(B) Functional
(C) Procedural
(D) Object-oriented
40. Which of the following is the correct pseudocode for the algorithm?
41. To gather information from 700 users about Item 43 refers to the diagram below.
the usefulness of a particular system, which
of the following tools would be MOST
efficient?
(A) Investigation
(B) Observation
(C) Questionnaires
(D) Interviews
02129010/CAPE 2020/SPEC
- 11 -
N Y
(A) A = 4, B = 1
(B) A = 10, B = 3
(C) A = 10, B = 6
(D) A = 10, B = 11
45. What control structures are used in the data flow diagrams shown?
I. Loop
II. Sequence
III. Selection
(A) I only
(B) II only
(C) I and III only
(D) II and III only
END OF TEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
02129010/CAPE 2020/SPEC
CARIBBEAN EXAMINATIONS COUNCIL
INFORMATION TECHNOLOGY
UNIT 1 – Paper 02
2 hours 30 minutes
SPECIMEN PAPER
5. If you need to rewrite any answer and there is not enough space to do so on the
original page, you must use the extra lined page(s) provided at the back of this
booklet. Remember to draw a line through your original answer.
6. If you use the extra page(s) you MUST write the question number clearly
in the box provided at the top of the extra page(s) and, where relevant,
include the question part beside the answer.
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
SECTION I: FUNDAMENTALS OF INFORMATION TECHNOLOGY
1. (a) Distinguish between ‘data’ and ‘information’. Give ONE example of EACH.
i ..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
[3 marks]
(b) The manager of the Nutritional Centre in the Health Ministry would like to conduct
research on the eating habits of students in schools.
(i) State TWO sources of information that the manager can use to assist with her
research and provide ONE characteristic of each source.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
escribe FOUR characteristics common to all of the information sources listed in (a) (i).
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[4 marks]
(ii) Describe TWO characteristics that the manager can use in selecting information
corresponding to this research.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[4 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(c) Describe FOUR steps that the manager would take to present the findings and carry out
the recomendations of this research, using the automated information processing cycle.
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
[4 marks]
Total 15 marks
2. (a) Data and information can be represented by various methods. For each of the following
outputs, draw a labeled sketch to illustrate the representation
(i) Graphical
(ii) Analogue
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
[4 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(b) A friend doing research on professional careers is told to use the Internet to find sources
of information. The Internet has several research tools.
(i) State, with reasons, THREE Internet research tools that your friend could use.
E in .................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[6 marks]
(ii) Suggest THREE fields that are suitable for a career in Information Technology.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[3 marks]
(iii) Recommend TWO professional organisations that the friend may find useful.
.................................................................................................................................
E n .................................................................................................................................
.................................................................................................................................
E n .................................................................................................................................
[2 marks]
Total 15 marks
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
SECTION II: INFORMATION SYSTEMS
(a)
Explain TWO important roles of users as components of an information system. functions
of an operating system.
i ..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
[4 marks]
..............................................................................................................................................
E in ..............................................................................................................................................
[1 mark]
i ..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
[6 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(d) Harry is the senior systems administrator in a large organization. The computer network
comprises several servers, each running a major system. His job requires that he and his
team operate the computer systems quickly, to resolve (troubleshoot) any problem in the
shortest possible time.
(i) Identify ONE type of HCI that would be MOST appropriate for the job that Harry is
required to do. Justify your response.
.....................................................................................................................................
E n .....................................................................................................................................
.....................................................................................................................................
E n .....................................................................................................................................
[2 marks]
(ii) Explain what type of network Harry could use to remotely access the computer
network.
.................................................................................................................................
E n .................................................................................................................................
.................................................................................................................................
E n .................................................................................................................................
[2 marks]
Total 15 marks
4. Computer networks help businesses organize their IT resources for maximum use and effective
management.
(a) An organization wishes to configure a network of five computers and one printer in
the HR department.
(i) Draw a diagram to represent a network topology that would allow the computers and
printer to be connected in such a way that the failure of any one of the computers
(or its connection) will not affect the function of the network as a whole.
[5 marks]
(ii) Identify the topology drawn in (a) (i) and state why it would be able to prevent
network failure in the event that one computer (or its connection) fails.
................................................................................................................................
................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[2 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(b) A major concern facing individuals and companies is the security of their IT systems and
data. Explain the following concepts.
(i) Encryption
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[2 marks]
(ii) Authentication
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[2 marks]
(c) Distinguish between ‘logical access control’ and ‘physical access control’ measures. Give
ONE example of EACH.
i ..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
i ..............................................................................................................................................
E in ..............................................................................................................................................
[4 marks]
Total 15 marks
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
SECTION III: INFORMATION AND PROBLEM-SOLVING
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[1 mark]
(ii) Outline ONE difference between a ‘context level data flow diagram’ and a ‘Level
1 data flow diagram’.
................................................................................................................................
.................................................................................................................................
................................................................................................................................
.................................................................................................................................
[2 marks]
(iii) Draw the symbols used in DFDs to represent EACH of the following.
Data flow
Process
External entities
Data stores
[4 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(b) A payroll system involves the payroll clerk entering the hours worked by weekly paid
employees. This results in the calculation of the net pay and the printing of payslips. The
payslips are given to the employees and the payroll database is updated.
[8 marks]
Total 15 marks
6. (a) Repetition is one of the control constructs that may be used in developing algorithms.
Describe TWO other control structures that can be used in developing an algorithm.
i ..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
[4 marks]
sum = 0
counter = 0
for x = 1 to x = 20
if x mod 3 = 0
counter = counter +1
sum = sum + x
x = x+1
z = sum/counter
print counter print z
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[4 marks]
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[2 marks]
[5 marks]
Total 15 marks
END OF TEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
02129020/CAPE/SPEC 2020
‘‘*’’Barcode Area”*”
Sequential Bar Code
- 19 -
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
EXTRA SPACE
If you use this extra page, you MUST write the question number clearly in the box provided.
Question No.
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
02129020/CAPE/SPEC 2020
‘‘*’’Barcode Area”*”
Sequential Bar Code
02129020/CAPE/KMS 2020
C A R I B B E A N E X A M I N A T I O N S C O U N C I L
INFORMATION TECHNOLOGY
UNIT 1 – Paper 02
SECTION I
Question 1
[3 marks]
(b) (i) Any two sources could include: books, journals, magazines,
newspapers, online libraries, electronic databases, web
sites, people.
(1 mark + 1 mark) [Any 2 x 1 mark]
[4 marks]
3
02129020/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 1 – Paper 02
KEY AND MARK SCHEME
Total 15 marks
4
02129020/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 1 – Paper 02
KEY AND MARK SCHEME
Question 2
Sketch – 2 x 1 mark
Labels – 2 x 1 mark
(2 x 2 marks = 4 marks)
TOTAL 15 marks
5
02129020/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 1 – Paper 02
KEY AND MARK SCHEME
SECTION II
INFORMATION SYSTEMS
Question 3
(2 marks)
(ii) A Virtual private network (VPN) (1 mark); it provides a user
with a secure connection to a company network.
TOTAL 15 marks
7
02129020/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 1 – Paper 02
KEY AND MARK SCHEME
Question 4
or
[2 marks]
[4 marks]
8
02129020/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 1 – Paper 02
KEY AND MARK SCHEME
Question 4 cont’d
TOTAL 15 marks
9
02129020/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 1 – Paper 02
KEY AND MARK SCHEME
SECTION III
Question 5
(ii)
a)
b)
c)
d)
Question 5 cont’d
(d) An example:
Payroll Clerk
Transaction-Information/Payroll Detail
Payslip
Employee Payroll
System
Payroll Database
Entities – 2 marks
Process – 1 mark
Datastore – 1 mark
Data flows – 2 marks
Accuracy (including flows) – 2 marks [8 marks]
TOTAL 15 marks
11
02129020/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 1 – Paper 02
KEY AND MARK SCHEME
Question 6
6 [1 mark]
63 [1 mark]
Sum=0
Counter=0
x=x+1
No
Yes
Yes z=sum/count
X mod
X=20? Print count
3=0? Print z
No
Counter=counter+1
x=x+1
Sum= sum+x
INFORMATION TECHNOLOGY
SPECIMEN PAPER
1 hour 30 minutes
5. If you need to re-write any answer and there is not enough space to do so on
the original page, there are two extra pages provided at the back of this booklet.
Remember to draw a line through your original answer and correctly number
your new answer in the box provided.
6. If you use extra pages you MUST write your registration number and question
number clearly in the boxes provided at the top of EVERY extra page.
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
Answer ALL questions.
1. With reference to a problem that you have researched, answer the following questions.
(a) Write a problem statement that can be the basis of developing an Information Technology
based solution.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[3 marks]
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[4 marks]
(c) Other than surveys, describe TWO tools or instruments that you can use for data gathering
in order to properly analyze the problem.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[4 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(d) Choose ONE of the instruments described in 1 (c) and discuss TWO advantages and ONE
disadvantage of this instrument when compared with surveys.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[9 marks]
Total 20 marks
2. (a) Based on the problem statement in 1 (a), discuss THREE possible solutions.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[9 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(b) State FIVE factors that you should consider to determine an optimal solution.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[5 marks]
(c) For any THREE of the factors stated in 2 (b), discuss the implication/impact of EACH for
one of your possible solutions.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[6 marks]
Total 20 marks
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
3. Once the solutions have been evaluated, one should be selected as the optimal or MOST feasible
solution.
(a) Describe the approach that you would take in order to select the most feasible solution.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[4 marks]
(b) It is said that “the selection of the optimal solution is based on a prevailing factor such as
cost at the given point in time”. Discuss this statement.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[4 marks]
GO ON TO THE NEXT PAGE
02129032/CAPE 2020/SPEC
‘‘*’’Barcode Area”*”
Sequential Bar Code
-9-
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(c) You are required to produce a report which includes the problem statement and analysis
of the possible solutions.
(i) Which software application would be MOST appropriate? Justify your response.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[3 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(ii) Discuss THREE word processing features that would enhance the organisation
and structure in the presentation of the report.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[9 marks]
Total 20 marks
END OF TEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
02129032/CAPE 2020/SPEC
‘‘*’’Barcode Area”*”
Sequential Bar Code
02129032/CAPE/KMS 2020
C A R I B B E A N E X A M I N A T I O N S C O U N C I L
INFORMATION TECHNOLOGY
Question 1
a) A problem statement should answer the following questions
4 marks
c) Other tools can include
i. Interviews
ii. Observations
iii. Review of literature/documents Any two – 1 mark
each
Description of the tool
Full description of tool 2 marks each
Partial description 1 mark
4 marks
9 marks
Total 20 marks
3
02129032/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 1 – Paper 032
KEY AND MARK SCHEME
Question 2
6 marks
Total 20 marks
4
02129032/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 1 – Paper 032
KEY AND MARK SCHEME
Question 3
b) Discussion 4 marks
UNIT 2 – Paper 01
1 hour 30 minutes
SPECIMEN PAPER
READ THE FOLLOWING INSTRUCTIONS CAREFULLY.
1. This test consists of 45 items. You will have 1 hour and 30 minutes to answer them.
2. In addition to this test booklet, you should have an answer sheet.
3. Do not be concerned that the answer sheet provides spaces for more answers than there are
items in this test.
4. Each item in this test has four suggested answers lettered (A), (B), (C), (D). Read each item
you are about to answer and decide which choice is best.
5. On your answer sheet, find the number which corresponds to your item and shade the space
having the same letter as the answer you have chosen. Look at the sample item below.
Sample Item
The best answer to this item is “spreadsheet and database software”, so (A) has been shaded.
6. If you want to change your answer, erase it completely before you fill in your new choice.
7. When you are told to begin, turn the page and work as quickly and as carefully as you can.
If you cannot answer an item, go on to the next one. You may return to that item later.
8. You may do any rough work in this booklet.
9. You may use silent, non-programmable calculators to answer questions.
02229010/CAPE/SPEC 2020
-2-
Items 1–2 refer to the following database. Item 5 refers to the symbol below.
8. Normalization is used to
4. Normal forms do NOT affect databases in
terms of I. save storage space
II. minimize data redundancy
(A) integrity III. increase security
(B) security
(C) consistency (A) I only
(D) performance (B) II only
(C) I and II only
(D) II and III only
9. Which of the following is NOT a benefit Item 11 refers to the following tables.
of a database approach?
BOOKS TABLE
(A) Improved data integrity Field Name Data Type Description
(B) Program independence
Book ID Number
(C) Less memory usage
(D) Integrated data Book Title Text
Author ID Number
Num pages Number
Item 10 refers to the following table named
LIST.
AUTHORS TABLE
StudentID StudentFName StudentLName Grade
Field Name Data Type Description
21 Jan Smith C
Author ID Number
5 Kerry Walls C
Firstname Text
13 John Todd B
Lastname Text
23 Eli Hunte A
Biography Text
Query: SELECT STUDENTFNAME Email Text
FROM LIST WHERE STUDENTFNAME
CONTAINS ‘e’
11. The field “Author ID” in the Books table
Using the data in the table and the query is a
above, how may records will be extracted?
(A) foreign key
(A) 1 (B) primary key
(B) 2 (C) candidate key
(C) 3 (D) secondary key
(D) 4
Contact
12. Which of these SQL type commands will remove “Melissa Simmons” from the table?
13. Which SQL command would return the names of all persons in the table born before 01 January
1991?
14. Which of the following functional 15. A table is said to be in first normal form if
dependencies are redundant?
(A) it contains no non-key dependencies
I. ModelNo → Manufacturer (B) it contains no partial dependencies
II. ModelNo, ChassisNo → Year (C) it contains no repeating attributes
III. ModelNo → Year or groups of attributes
(D) every determinant in the relation is
(A) I and II only a candidate key
(B) I and III only
(C) II and III only
(D) I, II and III
Item 16 refers to the following table. 17. Which one of the following would be
considered a primary source of information?
A B C D
1 First Name Last Name Gender Score (A) Newspapers
(B) Catalogs
2 Karen Richards F 25 (C) Diaries
3 Nicole Smith F 50 (D) Books
4 John Adams M 32
5 Don James M 38
18. IT tools are typically used to
16. After the spreadsheet has been sorted in
descending order according to score, it will I. reduce human errors
appear as II. speed up the process time of
transactions
III. store and retrieve large volumes of
(A) A B C D
data
1 First Name Last Name Gender Score
2 Nicole Smith F 50 (A) I and II only
3 Don James M 38 (B) I and III only
4 John Adams M 32 (C) II and III only
5 Karen Richards F 25 (D) I, II and III
21. Which of the following reports are used in 25. A connection to a web page is through
organizations?
(A) an email
I. Ad hoc (B) a browser
II. Summary (C) a hyperlink
III. Preformatted (D) a home page
29. What is the correct HTML syntax for 33. What is the name given to someone
creating a hyperlink for the O.K. Photo who uses a network to destroy or harm
website? computers for political reasons?
(A) McAfee
(B) Mozilla
(C) Auto CAD
(D) Adobe Dreamweaver
Items 36–37 refer to the following choices 40. Which of the following is an example of
below. malware?
(A) Hacking
37. XYZ Software Developers has approached (B) Phishing
an employee of its major competitor (C) Authoring
to coerce him into leaking information (D) Plagiarism
about their latest software projects being
undertaken.
42. Mr T had his computer system plugged
38. A firewall is BEST described as a into a device that offered protection to
his PC. While working at home on the
(A) wall that makes a server room machine one day, he did not realize that
fireproof there was an electrical outage until he
(B) wall that keeps out intruders and attempted to turn on the television. Which
prevents fire of the following devices did Mr T MOST
(C) computer program that protects likely have his computer system plugged
users from viruses in to?
(D) computer program that protects a
computer system from malware (A) UPS
(B) Power strip
(C) Surge protector
39. Which of the following would be used by a (D) Voltage regulator
company to identify a product that has been
officially registered and legally restricted to
the use only by the owner or manufacturer? 43. To perform a backup of a document
created during the day, it is BEST to perform
(A) Patent a partial backup of
(B) Copyright
(C) Trademark (A) all files on the system
(D) Intellectual property (B) all files changed during the day
(C) all files changed during that week
(D) all program files changed during
the day
44. In the main town of your country there are people selling DVD’s with movies that are currently in
the cinema. These movies are not the original and are being sold for less. Which of the following
terms is the name given to the unauthorized copying and distribution of software?
(A) Copyright
(B) Computer fraud
(C) Software piracy
(D) Intellectual property right
45. Harry has been using the computer consistently over the last couple of days. He now realizes that
he is affected by back pain, neck pain along with pain in other parts of his body. Which of the
following terms describes the health risk that is MOST likely to affect him?
END OF TEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
02229010/CAPE 2020/SPEC
CARIBBEAN EXAMINATIONS COUNCIL
INFORMATION TECHNOLOGY
UNIT 2 – Paper 02
2 hours 30 minutes
SPECIMEN PAPER
5. If you need to rewrite any answer and there is not enough space to do so on
the original page, you must use the extra lined page(s) provided at the back of
this booklet. Remember to draw a line through your original answer.
6. If you use the extra page(s) you MUST write the question number clearly
in the box provided at the top of the extra page(s) and, where relevant,
include the question part beside the answer.
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
NOTHING HAS BEEN OMITTED.
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i[2 marks]
i(b) State THREE reasons why normalisation should be used in the design of the database.
..............................................................................................................................................
E in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i[3 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(c) Explain what is meant by the term ‘3NF’, highlighting the benefit it brings to a database.
............................................................................................................................................
E in ............................................................................................................................................
i ............................................................................................................................................
E in ............................................................................................................................................
............................................................................................................................................
E in ............................................................................................................................................
[3 marks]
(d) Using standard notation, write the 3NF for the ModuleResult relation, ensuring that the
primary key attribute(s) is/are underlined. The structure of the database is shown below:
E in ............................................................................................................................................
E in ............................................................................................................................................
i ............................................................................................................................................
E in ............................................................................................................................................
............................................................................................................................................
E in ............................................................................................................................................
n[3 marks]
(e) Draw an Entity-Relationship diagram between three relations given the fields in Part (d)
.
EE in
[4 marks]
Total 15 marks
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
2. (a) A database developer may use various strategies for organizing data.
Explain ONE method in which data is organized and accessed using the Direct Access
strategy.
.............................................................................................................................................
..............................................................................................................................................
............................................................................................................................................
es[2 marks]
................................................................................................................................
................................................................................................................................
ONE datastore
................................................................................................................................
................................................................................................................................
TWO dataflows
................................................................................................................................
................................................................................................................................
[4 marks]
(ii) Draw a Level 1 DFD with no more than three processes, to depict the flow of data
in the POS system described above.
[6 marks]
(iii) The management of the supermarket has decided to allow some of its loyal
customers to pay at the end of the month, rather than at the time when the items
are purchased. Suggest ONE change that should be made to the DFD. Justify
your response.
.................................................................................................................................
.................................................................................................................................
es
.................................................................................................................................
.................................................................................................................................
[3 marks]
Total 15 marks
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
SECTION II: USE OF INFORMATION TECHNOLOGY TOOLS
3. Ms Singh works as a receptionist at a dentist’s office. She takes dental appointments from patients
in person but mostly on the telephone, and writes these in a large appointment book on her desk.
Telephone calls are made to patients one day in advance to remind them of their appointment
date. Paper receipts for payments of services done are provided to patients, with a copy kept
by Ms Singh to assist in providing weekly reports on income and any expenses made. She is
considering using information tools to automate her tasks.
(a) Discuss TWO reasons why Ms. Singh would consider using information tools to automate
the tasks.
.
EE in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
EE in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
[4 marks]
(b) There are a variety of communication software to access and communicate with remote
information sources. State TWO communication methods that Ms Singh can utilize.
Justify your answer.
EE in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
EE in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
[4 marks]
(c) A school will be having a barbecue at the end of the school year. Identify TWO software
applications and describe fully how the use of these applications could assist the school
with planning the barbecue.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
..............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
..............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
[4 marks]
(d) For the scenario below, identify the MOST appropriate format to present the information.
Justify your choice.
Chris Bravo told the architect that he wanted a two-storey house with a kitchen, a study,
a laundry room, a two-car garage, two patios, an entertainment room with its own bathroom,
and five bedrooms, each with its own bathroom. All bedrooms with bathrooms should be
on the top floor. All other rooms should be downstairs. The architect must submit this
information to the Town Planning department for approval.
.............................................................................................................................................
.............................................................................................................................................
..............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
[3 marks]
Total 15 marks
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
4. At ABC International Airport, large volumes of data are stored, retrieved and transmitted daily in
relation to flights, passengers and other aspects of the airport’s business.
(a) Explain how the absence of EACH of the following may affect the airport’s business:
(i) Updates
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[2 marks]
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[2 marks]
(iii) Accessibility
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[2 marks]
(b) Outline TWO appropriate information sources which can be used to retrieve information
or disseminate information to passengers at ABC International Airport.
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
EE in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
EE in ..............................................................................................................................................
[4 marks]
(c) Identify TWO emerging technologies and describe how ONE technology identified may
assist a visually challenged person.
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
EE in ..............................................................................................................................................
i ..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
EE in ..............................................................................................................................................
[5 marks]
Total 15 marks
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
SECTION III: SOCIAL, ORGANISATIONAL AND PERSONAL ISSUES
5. (a) Cyber terrorism is one of the criminal activities aided by computer systems.
(i) Identify THREE other types of computer crimes that are likely to occur in a school
or university.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[3 marks]
(ii) Discuss TWO strategies that may be implemented to prevent computer crimes.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[6 marks]
(b) In order to protect the private information of all employees, the Human Resources
department of an organization has created a policy for its employees to follow when
handling private information.
Outline TWO privacy protection guidelines that this policy may contain.
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
EE in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
EE in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
[4 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(c) State TWO ways in which Information Technology has impacted education in the last five
years.
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
EE in ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
..............................................................................................................................................
E in ..............................................................................................................................................
i ..............................................................................................................................................
[2 marks]
Total 15 marks
.............................................................................................................................................
.............................................................................................................................................
..............................................................................................................................................
............................................................................................................................................
.............................................................................................................................................
............................................................................................................................................
..............................................................................................................................................
.............................................................................................................................................
[2 marks]
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[2 marks]
(i) Using your example in Part (i) above, explain the implications of plagiarism.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[2 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(c) Consumers should be aware of the security, health and safety, and environmental risks
associated with computer use.
.................................................................................................................................
.................................................................................................................................
[2 marks]
(ii) State THREE health and safety risks associated with extensive computer use.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[3 marks]
(iii) Describe TWO data protection mechanisms that a company may use to secure its
information assets when communicating over a network.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
[4 marks]
Total 15 marks
END OF TEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
02229020/CAPE/SPEC 2020
‘‘*’’Barcode Area”*”
Sequential Bar Code
- 18 -
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
EXTRA SPACE
If you use this extra page, you MUST write the question number clearly in the box provided.
Question No.
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
...........................................................................................................................................................................
02229020/CAPE/SPEC 2020
‘‘*’’Barcode Area”*”
Sequential Bar Code
02229020/KMS/CAPE 2020
C A R I B B E A N E X A M I N A T I O N S C O U N C I L
INFORMATION TECHNOLOGY
UNIT 2 – PAPER 02
SECTION I
INFORMATION MANAGEMENT
Question 1
(c) The third normal form (1 mark); columns that are not fully
dependent (1 mark) on the primary key (1 mark) in a table are
removed. (3 marks)
Student
1 1
M M
ModuleResult StudentGrade
[4 marks]
TOTAL 15 marks
3
02229020/KMS/CAPE 2020
INFORMATION TECHNOLOGY
UNIT 2 – Paper 02
KEY AND MARK SCHEME
Question 2
CASHIER CUSTOMER
1 2 3
Item Item Id Receipt
CUSTOMER Scan Calculate Print
Details
Barcode Total Receipt
Item
Receipt Info
Data
Question 2 cont’d
TOTAL 15 marks
5
02229020/KMS/CAPE 2020
INFORMATION TECHNOLOGY
UNIT 2 – Paper 02
KEY AND MARK SCHEME
SECTION II
USE OF INFORMATION TECHNOLOGY TOOLS
Question 3
2 + 2 marks
[4 marks]
6
02229020/KMS/CAPE 2020
INFORMATION TECHNOLOGY
UNIT 2 – Paper 02
KEY AND MARK SCHEME
Question 3 cont’d
Word Processor:
Desktop Publishing:
Presentation:
Spreadsheet:
Database:
2 x 2 marks = [4 marks]
Format – 1 mark
Full justification – 2 marks
Partial – 1 mark [3 marks]
TOTAL 15 marks
7
02229020/KMS/CAPE 2020
INFORMATION TECHNOLOGY
UNIT 2 – Paper 02
KEY AND MARK SCHEME
Question 4
(iii) Accessibility
Question 4 cont’d
(c) Examples
TOTAL 15 marks
9
02229020/KMS/CAPE 2020
INFORMATION TECHNOLOGY
UNIT 2 – Paper 02
KEY AND MARK SCHEME
SECTION III
Question 5
(a) (i)
Hacking
Spamming
Phishing
Identity Theft
3 × 1 = [3 marks]
(ii)
Secure computer (1 mark) – use antivirus tools and
other security software (1 mark) to protect computer
from virus and other software-based attacks. (1 mark)
(b)
Disclosure of Private Information (1 mark) - Do not disclose
private information of any staff members to unauthorised
persons. (1 mark)
Question 5 cont’d
(c)
New technology such as smart phones (1 mark) facilitate
learning at anytime or place (1 mark)
Total 15 marks
11
02229020/KMS/CAPE 2020
INFORMATION TECHNOLOGY
UNIT 2 – Paper 02
KEY AND MARK SCHEME
Question 6
(c) (i)
Dumping of electronic waste
Poisoning from exposure to computer electronic waste
High energy consumption Any 2 = [2 marks]
(ii)
Computer addiction/ excessive use of computers may lead
to addiction and related health issues. (1 mark)
(iii)
Encryption (1 mark) – all data should be encrypted
before they are transmitted across a network so that
it is more difficult for hackers to intercept and
access data (1 mark)
Total 15 marks
TEST CODE 02229032
SPEC 2020/02229032
CARIBBEAN E XAM I NAT I O N S COUNCIL
INFORMATION TECHNOLOGY
SPECIMEN PAPER
1 hour 30 minutes
5. If you need to re-write any answer and there is not enough space to do so on
the original page, there are two extra pages provided at the back of this booklet.
Remember to draw a line through your original answer and correctly number
your new answer in the box provided.
6. If you use extra pages you MUST write your registration number and question
number clearly in the boxes provided at the top of EVERY extra page.
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
Answer ALL questions.
1. With reference to an Information Technology problem which you have researched, answer the
following questions.
(a) Write a problem statement which can be the basis of developing a solution.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[2 marks]
(b) Identify TWO tools that you could use to perform a thorough analysis of the problem
stated in (a). Provide clear justification for your answer.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[6 marks]
(c) For EACH of the TWO tools identified in 1 (b), specify ONE advantage and ONE
disadvantage.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[4 marks]
(d) Based on the facts you gathered in your research using the tools stated above, briefly
explain AT LEAST TWO causes of the problem.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[2 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(e) (i) After the analysis of the problem, suggest THREE other steps that should be taken to
solve the problem identified.
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
[3 marks]
(ii) Give THREE reasons why these steps are necessary to assist you in solving the
problem.
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
[3 marks]
Total 20 marks
2. The introduction of an Information Technology solution usually has an impact on the organization
in which it is implemented.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[4 marks]
(b) For your solution described in 2 (a), discuss TWO of the likely impacts it may have on
the organization.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[4 marks]
GO ON TO THE NEXT PAGE
02229032/CAPE 2020/SPEC
‘‘*’’Barcode Area”*”
Sequential Bar Code
-6-
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(c) State the tools that you would use to implement the solution stated in 2 (a) and for EACH
tool, explain the main features that you would use. Provide justification for the use of the
features mentioned.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[6 marks]
(d) Describe the human computer interface (HCI) that would be appropriate for your solution.
Provide a sketch (a form or a webpage).
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[6 marks]
Total 20 marks
GO ON TO THE NEXT PAGE
02229032/CAPE 2020/SPEC
‘‘*’’Barcode Area”*”
Sequential Bar Code
-8-
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
3. Your working solution should have included at least three entities or three webpages.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[3 marks]
(b) Users obtain information from the database or website. For your chosen application, write
ONE example for obtaining information. Your example must include:
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[6 marks]
(c) Recommend TWO operating systems, for EACH of the following, that would be suitable
for your solution if it was installed on
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
[2 marks]
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
........................................................................................................................................
[2 marks]
DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA DO NOT WRITE IN THIS AREA
(d) Discuss TWO challenges that can be encountered on implementing your solution on one
of the devices stated in Part (c).
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[4 marks]
(e) State TWO features and ONE integrity check which you would implement in your solution.
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
..............................................................................................................................................
[4 marks]
Total 20 marks
END OF TEST
IF YOU FINISH BEFORE TIME IS CALLED, CHECK YOUR WORK ON THIS TEST.
02229032/CAPE 2020/SPEC
‘‘*’’Barcode Area”*”
Sequential Bar Code
02229032/CAPE/KMS 2020
C A R I B B E A N E X A M I N A T I O N S C O U N C I L
INFORMATION TECHNOLOGY
Question 1
i. Interviews
ii. Surveys
iii. Observations
iv. Review of literature/documents 1 mark each (x2)
4 marks
d) Two causes of the problem identified 1 mark each
2 marks
3
02229032/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 2 – Paper 032
KEY AND MARK SCHEME
Examples:
To ensure that all possible are considered
To ensure the solution addresses the problem
To eliminate impossible solutions
To cater to the users involved
3 x 1 mark
6 marks
Total 20 marks
4
02229032/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 2 – Paper 032
KEY AND MARK SCHEME
Question 2
Total 20 marks
5
02229032/CAPE/KMS 2020
INFORMATION TECHNOLOGY
UNIT 2 – Paper 032
KEY AND MARK SCHEME
Question 3
This question would suggest that a Database or Webpage solution is
expected.
a) Three entities or Webpages listed
Example: Database: Customer, Orders, Supplies
Website: Homepage, Order Page, Contact us
3 x 1 mark
b) Database or Website
one or more entities or web pages
1 mark
two or more fields
2 marks
Database Example
SELECT OrderDescription, OrderQuantity from Order WHERE Order
No. = ‘111’
OUTPUT: Onions 20
Carrots 05
Garlic 10
Website Example
View list of orders for 7 April 2022
HOMEPAGE Order Button
Total 20 marks
Caribbean Examinations Council
Prince Road, Pine Plantation Road,
St Michael BB11091
Tel: (246) 227 1700
Email: [email protected]