Ict Faq

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

INFORMATION AND COMMUNICATION TECHNOLOGY

(0417) IMPORTANT QUESTIONS IN PAPER 1


Q1) Definition of file field and record.

A file is a collection of records/all the student’s names, addresses, phone


numbers and dates of birth
A field is one item of information/name/address/phone number/date of birth
A record is all the information about one student/name, address, phone
number and date of birth of one student

Q3) Maintaining Privacy Security Measures


Authentication technique/User ID and Passwords/PIN/memorable data
Advantage
Only person who knows password can access data
Disadvantage
Key logging software can detect key presses/passwords can be intercepted by
expert hackers/user can forget password
Encryption
Advantage
Data is scrambled into unreadable form/only person/computer with key can
understand data
Disadvantage
Data can still be deleted from system
Firewall
Advantage
Only allowed users/computers can access data
Disadvantage
It is not necessarily the hacker that is excluded but the computer/hackers might
use an acceptable computer
Digital certificates
Advantage
Only computer with certificate can access data
Disadvantage
Can be expensive to purchase
Anti-Spyware
Advantage
Prevents spyware from invading your computer and gaining personal
information
Disadvantage
Doesn’t work for all invasions/needs to be continually updated
TANs
Advantage
Is a double layer of security
Disadvantage
PIN can be forgotten/if misused can generate wrong TAN
Q12) Double Entry / Proof Reading
Two from:
Visual verification/checking
Read through data on screen
Compare with source document [2]
Two from:
Double data entry
Data is typed in twice by one typist
Data is typed in by two operators
Computer compares versions
If different freezes/sounds buzzer

Q13) Describe navigation aids that would be part of a well-designed on-screen input form.
Back/previous record button/arrow/facility
Forward/next record button/arrow/facility
New record button/arrow/facility
Submit/save button/facility
First record button/facility
Last record button/facility
Exit button/return to homepage button/facility
Move to top of page if long form
Search facility

Q19) Give advantage and disadvantage of using a Blog.


advantage from:
She can update it more regularly
More personal
Can be used as a diary
More interactive
disadvantage from:
Has to be continually updated
Animation/video/sound more difficult to incorporate
It’s possible for people she might not want (e.g. outside school) to see her blog
Not everyone she would want to see it might have the internet
Q26) Sensors Required in Burglar Systems
Temperature sensor
Infra-red sensor/Movement sensor/camera/motion sensor
light sensor
Pressure sensor/pad
Contact switch
Sound sensor/microphone
key pad/touch screen
Biometric devices
Q27) Control of the microprocessor in burglars
Microprocessor checks input from the user is authentic
Microprocessor (continually) monitors sensors.
If light/infra-red sensor reading changes
If movement sensor activated...
If contact switch activated...
If pressure greater than pre-set value....
If sound greater than pre-set value....
If temperature greater than pre-set value....
Microprocessor sends signal to sound alarm
Microprocessor sends signal to flashing light/house lights.
Microprocessor sends signal automatically to police
Microprocessor automatically sends message/calls/texts owner

Q28) Discuss Validation Verification


Validation is the checking that data is reasonable or acceptable
Verification is checking that data has been accurately copied from one medium to another.
Verification does not check that data is correct
If original data is incorrect it will still be incorrect after it has been copied accurately
Validation does not check that data is correct
If, for example, data is incorrect but within a given range, a range check won’t reject it
Validation will pick up errors that verification does not
Verification will pick up errors that validation does not
Verification can sometimes be carried out by the user
Validation is always carried out by the computer

Q29) Spreadsheets are often used to produce computer models.


Discuss the benefits and drawbacks of computer modeling.
Benefits
Real thing may be too expensive to build
Real thing requires too large a time scale
Real thing would be too wasteful of materials
Real thing is too vast a scale
Easier to change data/variables
Costs less to change data/variables
The real thing may be impossible to access/create
Real thing may be too dangerous
You can test predictions more easily/model can make predictions more accurately
you can ask many what if questions which would be impractical in real life
Drawbacks
Can never allow for all eventualities
Difficult to exactly recreate a lifelike situation
Hardware and software may be expensive
Workers will need to be trained to use the system
Q33) List four items which would need to be included in this design of the file structure of
the new system.
Field name
Field type
Key field
Field length
Validation check/rules

Q34) Advantages of Internet Shopping to customers


Less danger of mugging
Can shop when shops are closed
Doesn't have to spend time queuing/going around different shops/travelling to shop/can
compare prices at different shops more easily
Can look at wide range of shops
No travelling expenses/don’t waste fuel
Easier to search and find what you’re looking for

Q35) Disadvantage of Internet Shopping for Customers


Lack of socializing/social contacts
Hackers may intercept data and defraud customer/steal identity
Deprived of personal touch
Phone bills can increase
Without broadband other family members cannot use the phone
Cannot see/feel goods in reality/goods delivered may not be the same standard as those
ordered
More vulnerable to phishing/pharming
More vulnerable to viruses
Goods may not be delivered/can’t check the standard of goods before buying
May be hidden costs such as delivery charges

Q36) Examples of Other Computer Models


Financial Model
Simulations
Mathematical models
Scientific models
Civil engineering models

Q38) Give reasons why employer may not want his workers to access the internet
They may waste time playing games/going on social network sites/updating their blog/ on-
line
shopping/banking/surfing
They could access undesirable sites
They could download viruses/malware

You might also like