0% found this document useful (0 votes)
837 views274 pages

Theory Classified Mark Scheme

The document discusses different types of computers and their characteristics. It provides information about mainframe computers, laptop computers, desktop computers, and tablets. It compares the uses and features of mainframes, laptops, and desktops. It also contains multiple choice and true/false questions about types of computers and input devices.

Uploaded by

Patrick
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
837 views274 pages

Theory Classified Mark Scheme

The document discusses different types of computers and their characteristics. It provides information about mainframe computers, laptop computers, desktop computers, and tablets. It compares the uses and features of mainframes, laptops, and desktops. It also contains multiple choice and true/false questions about types of computers and input devices.

Uploaded by

Patrick
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 274

1

2
Unit 1 Hardware and Software Types of Computers Level 1

1
1 A mainframe computer [1]
B laptop computer [1]
C personal digital assistant [1]
D desktop computer [1]

2 3
Mainframe Laptop Desktop
Use
  

Entering data from a Biology survey while [1]



out of school

Massive transactions which need the use of


 [1]
many CPUs

Students who need to transport their [1]



computer from home to use in school

Personal use with better performance at [1]



lower cost

3 3
TRUE FALSE
() ()
Most modern laptop computers have webcams built in 
Desktop computers are not very portable 
All desktop computers have a touchpad built in 
Laptop computers are rarely supplied with a mouse. 

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks [2]

Mob. 0101 100 9465 3 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Types of Computers Level 1

4
Tick whether the following statements are true or false.

true false
(3) (3)

Tablet computers have touch screens. 3

Smartphones will only connect to the internet through Wi-Fi. 3

A tablet computer has a separate keyboard. 3

Smartphones use a touchpad. 3

[2]
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks

Mob. 0101 100 9465 4 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Types of Computers Level 2
1
14 Two advantages from:

Easy to carry/are portable


Usually have mobile phone in your possession
Can access Internet almost anywhere
Can access Internet on the move [2]

Two disadvantages from:

Easily lost
May have poorer signal
Display is smaller/keyboard is smaller
Content is more limited
Can be slower to access Internet
Batteries might run out
No mouse so can be more difficult to navigate [2]

2 6 (a) Two from:

Less likely to lose it


May have stronger signal
Display is larger/keyboard is larger
Content is not as limited
Can be faster to access internet
No problem with batteries running out
Has a mouse so is easier to navigate/use [2]

(b) Two from:

Don’t always have access to PC/there may be a power cut


Difficult to carry/not very portable/mobile phone is portable/Cannot access internet except in
the house
You have to buy extra hardware/router [2]

3 1 (a) PC/desktop [1]

(b) Laptop [1]

(c) Tablet [1]

(d) Smartphone [1]

Mob. 0101 100 9465 5 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Types of Computers Level 3

4
10 Seven from:

Mainframes/PCs/laptops needed for applications which require high speed processing


Mainframes/ PCs/laptops needed for applications which require greater internal memory capacity
Mainframes/ PCs/laptops needed for applications which require greater backing storage capacity
Mainframes/ PCs/laptops/tablet computers needed for applications which require bigger displays
Mainframes/ PCs/laptops needed for applications which require more manageable keyboards
Mainframes/ PCs/laptops needed for applications which require easy navigation from screen to
screen
Mainframes/ PCs/laptops have access to wider range of application software
Still need mainframes to carry out complex mathematical functions
Mainframes/ PCs/laptops are easier to monitor use [7]

5
16 Six from:
Advantages
– More portable than PC/laptop
– Can access internet in most places if they are part of a phone plan unlike PC/laptop
– Larger screen area than smartphones
– Carry resources round with them

Disadvantages
– Smaller screen area than laptop/PC
– Touch screen so keyboard can be more difficult to use compared to laptop/PC
– Not as portable as smartphone
– Cannot access internet in as many places if they are not part of a phone plan
– More difficult to produce complex worksheets than PC/laptop [6]

Mob. 0101 100 9465 6 Eng: Mohamed Mamdouh


7
Unit 1 Hardware and Software Input Devices Level 1

1
2 DVD RAM laser printer magnetic disc

number pad speakers trackerball [2]

1 A touch screen [1]


2 B scanner [1]
C video camera [1]
D sensor [1]

3 6 To input details from a bank card Joystick

To input data from a school register Chip reader

To input details of a product in a supermarket Optical mark reader

To control an object in a computer game Bar code reader


[4]

4 1 A Numeric keypad B Chip reader


C Remote control D Trackerball [4]

5 Bar code reader To enter hard copy images into a computer [1]
5
Microphone creating a piece of text [1]

Scanner selecting items from a menu [1]

Keyboard inputting data from a food item at a POS [1]

Mouse creating a voice over for a presentation [1]

4 Remote control to input data at a POS [1]


6
Electronic scales playing a video game [1]

Joystick Inputting text so it can be processed by a software package


[1]

Optical Character Reader an input device in a burglar alarm system [1]

Sound sensor to operate a multimedia projector [1]

Mob. 0101 100 9465 8 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Input Devices Level 1

7
2 Two from:
Touch screen
Microphone
Buttons
Keypad [2]

3
8 Inputting diagrams as they are being drawn Graphics tablet [1]

Inputting printed text to a computer to be


Optical Character Reader [1]
processed by another software package

Inputting moving pictures, often pre-recorded,


Video camera [1]
into a computer.

Used by a pilot to control a flight simulator Joystick [1]

2
9 MICR Trackerball Sensor
Use
  

Reading data from a cheque  [1]

Inputting the temperature of a greenhouse  [1]

People with limited motor skills using computers  [1]

For inputting the amount of humidity in a weather


 [1]
station

5 (a) MICR [1]


10
(b) a bar code reader [1]

(c) Chip reader [1]

Mob. 0101 100 9465 9 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Input Devices Level 1

Bar code
MICR OMR
Use reader
 


Inputting exam answers from a multi choice test paper  [1]

Inputting the account number from the bottom of a [1]



cheque
Inputting the ISBN from the back of a book  [1]

Inputting pencil marks from a school register  [1]

2
Web cam Keyboard Scanner
Use
  

Applications where text has to be created


 [1]
rather than copied

Inputting hard copy documents directly into a


 [1]
computer

Inputting moving pictures from a fixed


 [1]
position into a computer

Entering text into a word processing


 [1]
document

1 (a) Magnetic Ink Character Reader/Optical Character Reader [1]

(b) bar code reader [1]

(c) Optical Mark Reader [1]

(d) magnetic stripe reader/chip and PIN reader [1]

1 (a) Touchpad [1]

(b) Joystick/trackerball
oys

(c) Keyboard [1]

(d) scanner [1]

Mob. 0101 100 9465 10 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Input Devices Level 1

1 (a) Keyboard [1]

(b) Mouse [1]

(c) Temperature sensor [1]

(d) Joystick [1]

Question Answer Marks

1 (a) a bar code reader 1

(b) a microphone 1

(c) a magnetic ink character reader 1

(d) a retina scanner 1

Question Answer Marks

3 true false 2
(3) (3)
Answers to multiple choice exam papers can be read 3
using an Optical Mark Reader.
3
MICR reads the information on a credit card.

3
The chip on a credit card is read by a PIN reader.

3
An RFID chip can be used to track stock.

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks

Mob. 0101 100 9465 11 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Input Devices Level 1

Question Answer Marks

2 Magnetic 4
Optical Chip
Ink Bar code
Mark and PIN
Character reader
Reader reader
Reader (3)
(3) (3)
(3)
Debit card 3
Bank cheques 3
A candidate’s
responses for multi-
3
choice exam
questions
A label on a can of
3
soup

Mob. 0101 100 9465 12 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Input Devices Level 2

8 Four matched pairs from:

Chip reader
Bank/credit card account information/supermarket code

Bar code reader


Information from a product label/product identity number

Electronic scales
Weight of an item

Touch screen
Identification of product

Number pad
Bar code number when bar code reader cannot read bar code/the number of items

Magnetic stripe reader


Information about the customer [8]

8 Two from:

Optical Character Recognition/Reader


Text is read by scanner
Image compared with characters stored in computer
Converted to text for use with other software [2]

Utility bills/word processors/ANPR/identity cards [1]

Mob. 0101 100 9465 13 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Input Devices Level 2

10 (a) Any three from:

Name
Passport number
Date of birth
Place of birth
Nationality
Issue date
Expiry date
Facial characteristics/photograph/fingerprint/retina scan
Biometric measurements (face)
Signature
Gender
Place of issue [3]

(b) Any three from:


The chip is presented near a computer with a radio-frequency scanner
The scanning antenna puts out radio-frequency signals in a relatively short range.
It provides a means of communicating with the transponder/the RFID tag
The scanning device provides energy…
…so that the chips can broadcast the information in them
…for the computer to read [3]

(c) Any two from:

More secure than a traditional passport as biometric measurement data difficult to forge
Counterfeits can be more easily identified than non-RFID passports
More rapid flow at security check points/quicker than reading it manually [2]

1 (a) RFID reader [1]

(b) Optical Character Reader [1]

(c) Chip reader [1]

(d) Magnetic stripe reader [1]

Mob. 0101 100 9465 14 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Input Devices Level 2

10 (a) (i) Account number [1]


Bank/branch sort code [1]
Cheque number [1]

(ii) Three from:

Requires a special Magnetic Ink Character reader/scanner/Details are scanned


The magnetic ink on the cheque passes over a magnet in the reader/scanner which
charges/magnetises the ink
The MICR reader/scanner then reads the magnetic signal given out by the magnetic ink
characters on the cheque.
Each character produces a unique signal which is read and translated by the MIC reader
[3]

(b) Two from:

More difficult to forge


Even if overwritten/damaged can still be read by computer
Information is human readable [2]

10 (a) Two from:

Student id number/prompts for student number


date of birth
student name
Instructions on how to complete the form
Question numbers
Centre number
Centre name [2]

(b) Three from:

Dedicated scanner device shines a beam of light onto the form


Light is reflected back to sensors
Marks reflect less light so sensors used to identify position of marks
Computer compares these with correct answer positions [3]

(c) Three from:

If the marks don't fill the space completely they may not be read correctly/overfill the
space/smudged
If the marks are not in a dark enough pencil they may not be read correctly
If more than one lozenge shaded in result is invalidated
Only suitable for recording one out of a selection of answers, not suitable for text input
Have to use prepared forms which may be expensive
Examinations could consist of mainly multiple-choice questions changing the nature of what
is being tested [3]

Mob. 0101 100 9465 15 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Input Devices Level 2

Question Answer Marks

9(a) Any two from: 2


− The washing machine sends out (interrogation waves) radio signal to read the
data from the RFID
− They act as a passive transponder

Or
− The clothing has a battery (attached to the RFID)
− The radio signal is given out by the chip read by the receiver...
− ...using its antenna

9(b) Any two from: 2


− It stops material being incorrectly washed
− It stops coloured items of clothing being in the wrong wash
− It stops clothing of different material being washed with others
− It allows the wash cycle to be set automatically
− It will know the amount of water to use so won’t waste water

Question Answer Marks

16 OMR – Optical mark reader/recognition 4


Example – Lottery tickets/multiple choice answers/reads marks on papers
MICR – Magnetic ink character reader/recognition
Example – Cheques/reads the data from the bottom of bank cheques

Mob. 0101 100 9465 16 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Input Devices Level 3

19 To be marked as a level of response:

Level 3 (7–8 marks)


Candidates will address both aspects of the statement and discuss/consider greater security but
also possible lack of security.
The issues raised will be justified. There must be a reasoned conclusion.
The information will be relevant, clear, organised and presented in a structured and coherent
format.

Level 2 (4–6 marks)


Candidates will address both aspects of the statement and discuss/consider greater security but
also possible lack of security although development of some of the points will be limited to one
side of the argument.
There may be a conclusion.
For the most part the information will be relevant and presented in a structured and coherent
format.

Level 1 (1–3 marks)


Candidates may only address one aspect of the statement or give reasons why there is greater
security but also possible lack of security
Answers may be simplistic with little relevance.

Level 0 (0 marks)
Response with no valid content [8]

Examples of more secure:


Data more difficult to copy
Larger amount of information can be stored
Disabled people find it easier than signing
Reduces disputes at checkouts over validity of signature/Saves time at checkouts
Not affected by magnetic fields
Even when the card is stolen, the thief still needs the PIN, so it is much safer
Magnetic stripe reader had to be in a fixed location.
If the transaction did not take place near a terminal (in a restaurant, for example) the card had to
be taken away from the customer to the card machine.
It was easily possible for a dishonest employee to swipe the card surreptitiously through a cheap
machine...
...which would take a couple of seconds to record the information on the card and stripe
Even at the terminal, the criminal could bend down in front of the customer and swipe the card on
a hidden reader.
Illegal cloning of cards easy, and a common occurrence.
only the magnetic stripe can be copied, and a copied card cannot be used on a PIN terminal
The introduction of chip and PIN coincided with wireless data communications technology
becoming inexpensive and widespread
Wireless PIN pads were introduced that could be brought to the customer and used without the
card ever being out of sight
However, this would have been possible, had the technology been available, with magnetic stripe
cards
Chip and PIN and wireless together reduce the risk of cloning of cards by brief swiping.
Examples of not always secure because:
Cards can still be cloned
People can be careless when using their PIN.
Credit and debit card fraud has gone down with chip and pin
ATM fraud has gone up.
Hidden cameras sometimes are used to see which keys are pressed for the PIN.
The advent of chip and pin has also generated a rise in phishing

Mob. 0101 100 9465 17 Eng: Mohamed Mamdouh


18
Unit 1 Hardware and Software Output Devices Level 1

1 1 A CRT Monitor [1]


B TFT monitor [1]
C graph plotter [1]
D multimedia projector [1]

2 2
buzzer DVD R joystick [1]

magnetic tape plotter touch pad [1]

3 2 disc drive laser printer light pen [1]

Microphone TFT monitor web cam [1]

4 An inkjet printer is used to print high quality photographs [1]


4
A graphics tablet is used to input freehand drawings [1]

A keypad is used to input preset values into control systems [1]

A multimedia projector is used to show slides [1]

A joystick is used to control a flight simulator [1]

5 1 A microphone B speakers [1], [1]


C dot matrix printer D joystick [1], [1]

6 1 A Desktop computer [1]


B Inkjet printer [1]
C Optical disc [1]
D Trackerball [1]

7 1 A Laptop computer [1]


B Laser printer [1]
C Bar code reader [1]
D Graphics tablet [1]

8 1 (a) Two from:


Number pad
Keyboard
Microphone
Web cam
Touchpad [2]

(b) Screen [1]


Speaker [1]

Mob. 0101 100 9465 19 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Output Devices Level 1

8 3
Using Multipart stationery  [1]

Producing high quality printouts

Producing A0 printouts

CAD applications

Producing continuous printouts  [1]

Producing printouts of photographs

8 5 (a) The device used for switching channels on a television is called a remote control [1]

(b) A method of inputting answers from a candidate’s exam paper is called OMR [1]

(c) A printer which is suitable for producing large volumes of high quality
printout is called a laser printer [1]

9 3
Application
pplica

Produces very high quality printing where speed is not an issue Inkjet printer [1]

Production of continuous stationery where noise is not an issue Dot matrix printer [1]

Produces rapid, high quality and high volume printing Laser printer [1]

Produces very large printouts such as size A0 Graph plotter [1]

10 2
Graph Laser Dot matrix
Application plotter printer printer
  

Rapid, high quality and high volumes of output  [1]

CAD where large printouts are required such  [1]


as A0

Industrial environments such as car repair  [1]


companies

Printing on multipart forms  [1]

Mob. 0101 100 9465 20 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Output Devices Level 1

5 (a) The inbuilt device which moves the cursor when using a laptop is called
a touch pad [1]

(b) The device used for selecting an icon so a bar code label can be
printed in a supermarket is called a touch screen [1]

(c) The device used for controlling a pointer on a screen when the user
has limited motor skills is called a trackerball [1]

2
Web cam Keyboard Scanner
Use
  

Applications where text has to be created


 [1]
rather than copied

Inputting hard copy documents directly into a


 [1]
computer

Inputting moving pictures from a fixed


 [1]
position into a computer

Entering text into a word processing


 [1]
document

2 bar code rreader


eader joystick
joysti laser printer

PIN pad sca


scanner temperature sensor [2]

2 correct circles – 2 marks


1 correct circle – 1 mark

3
TRUE FALSE
() ()

A multimedia projector is used to output



slide shows.

A laser printer is a type of page printer. 

An inkjet printer cartridge lasts longer than


a laser printer toner cartridge producing 
the same output.

A dot matrix printer produces very high



quality printouts quickly.

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks [2]

Mob. 0101 100 9465 21 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Output Devices Level 1

1 (a) Touchpad [1]


11

(b) Joystick/trackerball
oys

(c) Keyboard [1]

(d) scanner [1]

4 (a) Dot matrix [1]


12

(b) TFT/LED/LCD (allow full names such as Thin-Film-Transistor) [1]

(c) 3D printer/3D inkjet printer [1]

(d) Touchscreen [1]

Question Answer Marks


13
2 impact non-impact 2

Dot matrix printer ✓


Inkjet printer ✓
Laser printer ✓
3D printer ✓

4 correct ticks 2 marks


2 or 3 correct ticks 1 mark
and 1 or 0 ticks no marks

Mob. 0101 100 9465 22 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Output Devices Level 1
Question Answer Marks
14
1(a) Any two from: 2
− Weighing scales
− Keyboard/key pad
− Bar code scanner/reader
− Chip reader/card reader
− Magnetic stripe reader
− Pin pad
− Light sensor (on conveyor belt)
− Touch screen

1(b) Any two from: 2


− Printer
− Screen/monitor
− Speaker/buzzer
− Warning light/lamp

15 Question Answer Marks

1(a) gr plotter 1

1(b) speaker 1

1(c) 3D printer 1

1(d) monitor 1

16 Question Answer Marks

1(a) Dot matrix printer 1

1(b) Ink Jet printer 1

1(c) La printer 1

1(d) printer 1

17 Question Answer Marks

3 true false 2
(3) (3)
CRT monitors use more power than TFT monitors 3
A touch screen can be used as an input device or an 3
output device
A dot matrix printer produces high quality graphics 3
A motor is an input device 3
4 correct answers - 2 marks
2 or 3 correct answers - 1 mark
0 or 1 correct answers - 0 marks

Mob. 0101 100 9465 23 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Output Devices Level 1

18 Question Answer Marks

1(a) Dot matrix printer 1

1(b) Ink Jet printer 1

1(c) Laser printer 1

1(d) 3D printer 1

Mob. 0101 100 9465 24 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Output Devices Level 2

1 6 Any three from:


– surgical and diagnostic aids
– prosthetics and medical products,
– tissue engineering
– artificial blood vessels
– designs of medical tools and equipment [3]

(d) Three from:

3D digital copy is made and put in the software.


Software slices the model into hundreds of layers.
Printer creates the model layer by layer.
Binds them together [3]

Question Answer Marks


2
16(a
16(a) two from: 2
Tablets can be customised to individual needs
Easier to change the percentages of drug in the tablet
Mass produced or small batches therefore reducing waste
Created as needed therefore reducing waste
Patient gets the drugs quicker

16(b
16(b) two from: 2
Cost of buying the printer is expensive
Materials are expensive
Can be used for illegal production of drugs
There are not many 3D printers created to date to do this

Mob. 0101 100 9465 25 Eng: Mohamed Mamdouh


26
Unit 1 Hardware and Software Memory and Storage Level 1

1 1 A CRT Monitor [1]


B TFT monitor [1]
C graph plotter [1]
D multimedia projector [1]

2 7 (i) A CD ROM is used to store music for sale

(ii) A blu-ray disc is used to store high definition films

(iii) A magnetic tape is used to store backups of file servers

(iv) A flash memory card is used to store photographs in a digital camera [4]

3 2 buzzer DVD R fixed hard disc [1]

joystick plotter touch pad [1]

5
4 RAM
RAM

This memory can only be read from not written to 

This memory is not volatile 

This memory is used to store the data the user is currently working on 

This memory is used to store the startup instructions of a computer 


[4]

1 A magnetic tape B flash memory card


5 C blu-ray disc D hard disc [4]

5
6 True False

A magnetic tape has faster data access than a DVD ROM.  [1]

A CD is used to store a two hour high definition movie.  [1]

A magnetic disc is used for online processing.  [1]

Pen drives are used to copy data from one computer to another.  [1]

7 1 A Desktop computer [1]


B Inkjet printer [1]
C Optical disc [1]
D Trackerball [1]

8 3 Two from:
Faster data access times
Faster data transfer rate
Stores more data [2]

Mob. 0101 100 9465 27 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 1

9 1 A Speakers [1]
B Web cam [1]
C Joystick [1]
D Memory stick [1]

2 Magnetic stripe [1]


10 Chip [1]

11 5
Pen drives are used to make backups on large company file servers.  [1]

Magnetic tapes use direct access when searching for records.  [1]

Fixed hard discs have slower access times than optical discs.  [1]

DVD RWs allow you to save new data to them  [1]

A CD has greater storage capacity than a DVD  [1]

12 1 (a) Two from:


Microphone
Keyboard
Mouse [2]

(b) Speakers [1]


Screen [1]

(c) Two from:


DVD drive
Internal hard disc drive
Pen drive [2]

13 3
Dot matrix printer printing on multipart stationery [1]

Chip reader reading information from the front of bank cards [1]

Magnetic tape drive making fileserver backup copies [1]

Bar code reader to read data from a product at a POS terminal [1]

14 2
Storing photos in a camera  [1]

Storing file server backups  [1]

Storing high definition movies  [1]

Storing large numbers of payroll records  [1]

Mob. 0101 100 9465 28 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 1

15 1 (a) Sensor [1]


Touchpad [1]

(b) Printer [1]


Screen [1]

(c) Pen drive [1]


DVD drive [1]

16 1 (a) Two from:

Joystick
Microphone
Tracker ball
Concept keyboard
Touch screen
Scanner
Digital camera
Graphics tablet
Webcam [2]

(b) Two from:

Hard disk drive


Optical disc drive
Flash memory card reader/writer
Solid State Drive [2]

(c) Two from:

Dot matrix printer


Laser printer
Inkjet printer
Speakers
Monitor [2]

17 3
Input Output Storage
device device device
  

Making a backup of work  [1]

Typing a document  [1]

Printing out student records  [1]

Reading details from a bar code  [1]

Making a soft copy for future use  [1]

Mob. 0101 100 9465 29 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 1

18 1 (a) Two from:

Touch screen
Microphone
(Push) button
Camera [2]

(b) One from:

(Flash) memory card reader [1]

(c) Three from:

Send emails
Send texts
Access website and send secure message [3]

19 3

Application Storage method

Theatre booking systems Hard disc [1]

Storing photographs in a camera for printing at a later time Flash memory card [1]

The most portable device used to transport data from Pen drive [1]
computer to computer

A disc used to sell music albums without video CD ROM [1]

20 5 (a) The input device used in flight simulation is a joystick [1]

(b) The type of memory used to store the work that the user is
currently working on is RAM [1]

(c) A medium used to backup data is magnetic tape [1]

21 1 (a) RAM [1]

(b) Motherboard [1]

(c) ROM [1]

(d) Sound card [1]

Mob. 0101 100 9465 30 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 1

3
22
input output backing storage
(9) (9) (9)

Motor 9

CD-R 9

Webcam 9

Printer 9 [4]

6
23
Fixed
Magnetic
Hard Blu-ray Memory card
Tape
Disk (9) (9)
(9)
(9)

Storing a database of books in a


9
school library

Storing photographs in a digital


9
camera

Companies distributing HD movies 9

[4]
Storing the back up of a file server 9

24 3 Tick whether the following statements are true or false.

true false
(3) (3)
ROM is Real Optical Memory. 3

RAM stores the instructions you are currently working on. 3

ROM stores the BIOS. 3

RAM allows the user to read and write data. 3


[2]
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks

Mob. 0101 100 9465 31 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 1

Mob. 0101 100 9465 32 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 1
Question Answer Marks
25
1 (a) a bar code reader 1

(b) a microphone 1

(c) a magnetic ink character reader 1

(d) a retina scanner 1

26 Question Answer Marks

3 true false 2

A portable hard drive is an example of


internal memory. ✓

Magnetic tape is used to store backups of


data. ✓

RAM is internal memory. ✓


ROM loses its data when the power is turned
off. ✓

4 correct ticks 2 marks


2 or 3 correct ticks 1 mark
and 1 or 0 ticks no marks

Question Answer Marks


27
1(a) a Blu-ray disc 1

1(b) 1

1(c) A magnetic tape 1

1(d) 1

Question Answer Marks


28
4 CD DVD Blu-ray 4
(3) (3) (3)
Stores lower quality audio files 3
Has the highest storage
3
capacity
The RAM version of this media
is used to record and play
3
recorded images at the same
time
Stores high definition movies 3

Mob. 0101 100 9465 33 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 1

29 Question Answer Marks

7 Tick 3
(9)
CPU means Computer Processing Unit
Data in RAM is not lost when the computer is turned off
ROM is Read Only Memory 9
A printer is an input device
A touch screen can be an input device and an output
9
device
The control unit is part of the CPU 9
The CPU is stored on the hard disk
A pen drive is an example of internal memory

Mob. 0101 100 9465 34 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 2

1 15 Two matched pairs from:

Companies selling their software/games


Cheap method of production/quick to access data

Making personal backups/transferring data (from one computer to another)


Cheap to buy/quicker to retrieve data/expensive to buy tape drives

Downloading/Copying media such as films/music


Faster/Easier to access individual scenes/tracks/ better or higher quality [4]

2 8 Four from:

Read only memory


Can be read from but not written to/can’t be changed/edited
Used to store BIOS/start up programs for computer
Used to store software that must not change e.g. games
Non-volatile/permanent (memory) [4]

3 14 (a) Two from:

A copy of file(s)
On an alternative medium
In case anything happens to original
Usually removed from the location of the computer [2]
(b) Six from:

Magnetic tape is less expensive per unit volume of memory


Tape is slower to access data than magnetic disc
Tape requires a special drive…
…but these often come as standard with file server
Tapes are easier to store
Tapes are easier to remove from premises if needed

One mark is available for a reasoned conclusion

4 8 Four from:
ROM cannot be changed/RAM can be changed
RAM can be read from and written to
ROM is read only memory and RAM is random access memory
ROM is non-volatile/RAM is volatile
RAM holds the work that is being currently done by the user
ROM holds instructions that need to be unchanged such as BIOS/program cycles in a washing
machine/program instructions in games [4]

Mob. 0101 100 9465 35 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 2
5 11 (a) Three from:
Animation such as cartoons/moving text
Sound such as voiceovers/special sound effects/music
Hyperlinks/hotspot to move between pages/sites
Video such as moving images/reasonable example
Rollovers to change images
Search box to find items on that site quickly [3]

(b) (i) Two from:


It is a copy of data
Leaving the original intact
Stored away from the original [2]

(ii) Two from:


Data could be corrupted on original medium
Data could be accidentally amended/overwritten on original medium
Data could be accidentally deleted from original medium
Data could be maliciously deleted/edited from original medium [2]

6 14 (a) Two from:


Pen drives are easier to carry than CDs
Most computers have USB ports not all have CD drives
Pen drives store more data than a CD [2]

(b) Two from:


Pen drives are more expensive than CDs
Pen drives are easier to lose than CDs
Saving directly to a pen drive can be problematical [2]

7 17 Four from:
If computer is switched off work in RAM goes but backing storage stores data for future use
Backing storage is cheaper than IAM per unit of memory so more cost effective to have both
IAM is bulkier than backing storage per unit of memory so more sensible to have both
IAM provides faster access than backing storage so as there has to be backing storage computer
needs IAS to speed up operations
Software package may be so large that it is physically impossible for RAM to store it
Data may need to be transferred from one computer to another and can’t do that with RAM [4]

Mob. 0101 100 9465 36 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 2

8 11 (a) Four from:

If computer is switched off, work in RAM is lost but backing storage stores data for future use
More likely that data is accidentally deleted in RAM
RAM is more expensive than backing storage per unit of memory
RAM is bulkier than backing storage per unit of memory
Software package may be so large that it is physically impossible for RAM to store it.
Operating system may be so large that it is physically impossible for ROM to store it.
Data may need to be transferred from one computer to another and can’t do that with RAM
[4]

(b) Four from:

Memory is needed which cannot be changed – ROM


Memory is needed which can be changed – RAM
Instructions that need to be unchanged have to be stored such as BIOS/ program cycles in a
washing machine/program instructions in games
There needs to be memory that holds the work that is being currently done by the user
There needs to be memory that holds the software that is being currently used by the user
Non-volatile memory is needed – ROM [4]

9 18 Three from:

In case original data is accidentally deleted


In case data is maliciously deleted
In case original data is corrupted
To recover a previous version of a file [3]

10 11 Any four from:


– ROM cannot be changed
– RAM can be read from and written to
– ROM is read only memory and RAM is random access memory
– ROM holds instructions that need to be unchanged, such as BIOS/program cycles in a
washing machine/program instructions in games
– RAM holds the work that is currently being done by the user [4]

Question Answer Marks


11
6(a) Any two from: 2
− Scan the pen drive for errors
− Medium is full
− Virus found on the file
− Bad sector/unable to save
− Device not recognised
− Read error

6(b) Differences 4

Max three from:


− Not every computer has a CD drive, but most PCs have a USB port
− A CDR can slip between papers and can be easily lost
− Pen drive are small and can easily slip out of a pocket
− Pen drive stores more data
− Pen drive is more robust
− Pen drive can be overwritten/edited/data erased
− Pen drive is solid state whereas CDR is optical

Similarities
− Pen drive and CDR are storage devices
− CDR and pen drive are portable

Mob. 0101 100 9465 37 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 2

12 Question Answer Marks

9 Any four from: 4


− ROM can only be read from whereas RAM can be read and written to
− ROM is non-volatile whereas RAM is volatile
− ROM stores the start-up instructions / boot file whereas RAM stores the
current instruction
− ROM is needed on boot up, whereas RAM is needed during processing /
storing data

13 Question Answer Marks

5(a) four from: 4


The SSD is lighter in weight than the HDD therefore the laptop will be lighter
and more portable
The speed of access in SSD is a lot quicker
The speed of data transfer in SSD is a lot quicker
There is less chance of the data becoming corrupted as it can save whilst the
laptop is moving
It is a smaller device therefore the laptop will be smaller/thinner
SSD uses less energy
Less chance of impact damage

5(b) three from: 3


As the elements are separate units there is more choice of devices/can be
replaced if fails
Can be easier to upgrade
Easier to reduce glare on screen as it is separate
Laptop more expensive for same performance
Lower chance of it being stolen/lost

14 Question Answer Marks

12(a) Six from: 6


Benefits
SSD is stored within the computer therefore Ananya has control over her
data/in cloud the control may be lost
SSD is a physical storage device in the laptop therefore is present at all
times/the cloud is external to the laptop
Once SSD is purchased there are no more costs/the cloud may have costs
for extra storage
There needs to be internet access when saving to the cloud/SSD does not
necessarily need internet
Transferring data to the SSD may take less time than cloud/low bandwidth
May be more difficult to find data on the cloud than with SSD
Easier to hack the cloud as the data is stored for a long period of time on
many servers/less easy to hack SSD as only security on the laptop

Drawbacks
With the cloud data can be accessed on several devices/SSD would have to
have some method of transferring it.
Extra storage can be set automatically on the cloud/SSD is a fixed size
SSD Device can easily be misplaced/damaged
Backups are automatic on the cloud/SSD you may have to set up

To gain full marks there needs to be both benefits and drawbacks

Mob. 0101 100 9465 38 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 3

1 17 Eight from:
– DVDs are used to hold very large files several Gb
– DVDs used to store films/movies
– DVD RWs useful for keeping generations of files
– DVDs discs can be used to store computer data
– DVD ROM used for applications which require the prevention of deletion of data
– DVD ROMs used by software companies for distributing software programs and data
– DVD ROMs used by film/movie distributors
– DVD R used in applications which require a single ‘burning’ of data
– DVD RW used for applications which require the updating of information/record over old
data
– DVDs have between five and ten times the capacity of CDs
– DVD RAM has the same properties as DVD RW but with quicker access
– DVD RAM data can be overwritten more easily
– DVDs are portable/can be transported from one computer to another
– DVD ROMs cannot have data changed [8]

2 11 Six from:

Optical discs such as CDs DVDs and Blu-ray discs…


…are read from and written to using a laser bea
Magnetic disks are read from and written to using read/write heads
Optical discs are more portable
Magnetic disks are more likely to spike
Optical discs are cheaper to buy
Magnetic disks store more data
Optical discs have slower access times
Optical discs have slower transfer rates
Optical discs can be more easily lost/stolen
Optical discs can be more easily scratched
Both store videos, music
Both use direct access [6]

Mob. 0101 100 9465 39 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 3

3
11 (a) Cloud is large groups of remote networked servers
They allow centralised data storage [2]

(b) Six from:

Disadvantages
Loss of control of the data…
…as the data is controlled by a data storage provider.
…the user needs to be able to trust the service provider and its staff.
…security issues with the storing of the data with the provider
…fire/flood/electricity spikes can affect data without the user knowing.
The data remains on the server for a length of time…
…easier to be hacked as more copies of it available…
…available for longer
…users must use strong passwords/authentication methods as hackers have longer time to
be able to crack the password…
…as several copies of the data are available
If data is not encrypted…
…can lead to security issues due to loss of control/hacking.
If connection is lost then the cloud cannot be accessed…
…data could be lost due to this.
If there is a mass/lot of data the data could be split over several servers…
…may have problems retrieving the data.
…may lead to security issues.
…data may be lost during the saving process.
Cost of using cloud is more expensive than buying a hard disk/SSD…
…most computers come with a hard disk/SS
Difficult to delete all copies of a file…
…as the data is stored/backed up several times.

Advantages
The data is accessible anywhere…
…helps to migrate data from one device to another.
…helps to synchronise data.
Don’t have to buy storage devices…
…some devices do not have hard disks/storage
…the cloud can be used for all storage requirements.
More storage space than using physical devices…
…the cloud has lots of storage
Don’t have to manage the storage…
…the service provider manages the storage
…user does not have to worry about security measures as service provider secures data.
Allows many users to access the data…
...as the data is stored centrally.
Only pay for the storage you use…
…much of the space on the hard disk may be wasted. [6]

A mark can be awarded for a reasoned conclusion.


If one side of the argument i.e. all advantages/disadvantages then 3 marks max.
If both sides have been addressed but without expansions/comparisons then 4 marks max.

Mob. 0101 100 9465 40 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Memory and Storage Level 3

4 Question Answer Marks

16 To be marked as a level of response: 8

Level 3 7–8 marks


Candidates will give reasoned benefits and drawbacks. The issues raised
will be justified. There will be a reasoned conclusion. The information will be
relevant, clear, organised and presented in a structured and coherent format.

Level 2 4–6 marks


Candidates will give both benefits and drawbacks. The issues raised may be
justified. There may be a conclusion. For the most part the information will be
relevant and presented in a structured and coherent format.

Level 1 1–3 marks


Candidates may only give either benefits or drawbacks. Candidate might not
give reasons. Answers may be simplistic with little or no relevance

Level 0 0 marks
Response with no valid content

Question Answer Marks


5
16 Examples
Drawbacks
Loss of control of the data«
«as the data is controlled by a data storage provider
«the user needs to be able to trust the service provider and its staff
«security issues with the storing of the data with the provider
«fire/flood/electricity spikes can affect data without the user knowing
If data is not encrypted«
«can lead to security issues due to loss of control/hacking
If connection is lost then the cloud cannot be accessed«
«data could be lost due to this
If there is a mass/lot of data the data could be split over several servers«
«may have problems retrieving the data
«may lead to security issues
«data may be lost during the saving process
Cost of storing data may be higher than physical methods«
«most computers have storage so don’t need to purchase one
«private clouds can be expensive
Difficult to delete all copies of a file«
«as the data is stored/backed up several times

Benefits
The data is accessible anywhere«
«helps to migrate data from one device to another
«helps to synchronise data
Don’t have to buy storage devices«
«some devices do not have hard discs/storage
«cheaper than buying storage devices
«the cloud can be used for all storage requirements
More storage space than using physical devices«
«the cloud has lots of storage
Don’t have to manage the storage«
«the service provider manages the storage
«user does not have to worry about security measures as service provider
secures data
Allows many users to access the data«
... as the data is stored centrally
Only pay for the storage you use«
«much of the space on the hard disc may be wasted
The data is regularly backed up

Mob. 0101 100 9465 41 Eng: Mohamed Mamdouh


42
Unit 1 Hardware and Software Software Level 1

1 3

True
True Fa

Presentation software is used to create slide shows.  [1]

All laptop computers have touch screens.  [1]

Spreadsheet software can be used to produce databases.  [1]

An Internet browser is used by web designers to test web pages.  [1]

Motors are input devices.  [1]

3
2
True Fa

A numeric keypad is used to type a letter 

Word processing software is used to monitor physical variables 

A laser printer works best in an industrial environment 

A palmtop computer is easier to carry than a laptop computer 

Sensors are used to input data to a microprocessor 


[5]

3 3
True Fa

Database software is the best software to use to write letters. 

DTP software is used to create models. 

Palmtop computers are bigger than PCs. 

Graph plotters are used to output car designs. 

A dot matrix printer is used to print magazines. 


[5]

Mob. 0101 100 9465 43 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 1

4 3

h
hardware
ardware s

virus checker  [1]

keyboard  [1]

chip  [1]

mobile phone  [1]

4
5
True False
a a

OMR is used to read data from multi choice question [1]


papers. a

[1]
OCR is used to read data from word processed documents. a

[1]
DTP is used to create financial models. a

[1]
Regular use of computers improves your eyesight. a

6 3

Software
oftw

Word processing/DTP Typing a letter [1]

Spreadsheet Calculating profit and loss [1]

Web browser Viewing pages on the internet [1]

Presentation Creating a slide show [1]

Mob. 0101 100 9465 44 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 1

7 14 (i) OMR [1]

(ii) An icon [1]

(iii) A keyboard [1]

8 15 (a) Sound – there might be other noises – e.g. roadworks, masking the sound of a car [1]

Light – Anybody could break the beam not just cars/direct sunlight may affect readings [1]

(b) Measurement is the monitoring of physical variables without the microprocessor taking action
[1]

Control is when the microprocessor takes action depending on sensor readings [1]

9 4
Hardware Software

Spreadsheet  [1]

Digital camera  [1]

Bar code reader  [1]

Web page authoring program  [1]

10 6 (a) Command Line Interface/CLI [1]

(b) Graphical User Interface/GUI [1]

11 3
true false

Computer programs are examples of hardware. 

A Command Line Interface is a form of operating system. 

A tablet computer is larger than a desktop computer. 

A compiler is an example of applications software. 

4 correct answers – 2 marks


2 or 3 correct – 1 mark
1 correct – 0 marks [2]

Mob. 0101 100 9465 45 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 1

12 1 (a) RFID reader [1]

(b) Optical Character Reader [1]

(c) Chip reader [1]

(d) Magnetic stripe reader [1]

13 2 (a) Graphical User Interface or GUI [1]

(b) An icon is a picture/image


Used as a shortcut to a program/application [2]

(c) Click/tap on it
Use a pointer/gesture/mouse/enter key/pointing device [1]

14 2 (a) Command line interface/CLI


[1]

(b) One from:

more difficult to edit entered commands


need to know the commands
Incorrect commands can affect the operation of the computer.
Syntax needs to be exact for the program to work. [1]

(c) Tick whether the following statements are true or false.

true false
(3) (3)

A GUI involves the use of windows and menus. 3

User interaction with a GUI is intuitive. 3

A GUI takes up a lot of memory and resources. 3

Users have to learn a list of system commands in order


3
to use a GUI.
[2]
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks

Mob. 0101 100 9465 46 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 1
15 Question Answer Marks

1(a)
a) ardware 1

1(b) Software 1

1(c) Mic one 1

1(d) Hard disk drive 1

Question Answer Marks


16
2 true false 2
(✓) (✓)

An actuator is an item of software. ✓


Hardware is the physical components of a computer system. ✓
Software controls the operation of the computer. ✓
Spreadsheet is an example of systems software. ✓

2 marks for 4 correct ticks


1 mark for 3 or 2 correct ticks
0 marks for 1 or 0 correct ticks

Question Answer Marks


17
2 application system 2
(3) (3)
Linker 3
Database management systems 3
Photo-editing software 3
Compiler 3
4 correct answers - 2 marks
2 or 3 correct answers - 1 mark
0 or 1 correct answers - 0 marks

18 Question Answer Marks

1(a)
1(a) Sys 1

1(b) Applicati 1

1(c)
1(c printer 1

1(d)
1(d compiler 1

Mob. 0101 100 9465 47 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 2

1 14 Three from:

A CLI only allows you to type in commands


With CLI syntax has to be precise
Commands difficult to edit once entered
Have to learn a lot of commands exactly/have to be familiar with the commands [3]

2 17 (a) Two from:

Lawful protection....
......given to authors/software companies and publishers
Relates to the software the author/publisher/company created/published
Prohibits purchaser from making unlimited copies/lend it to others/change the software/sell it
without the company’s permission [2]

(b) Two from:

Encryption of the execution code requires a key to run


Use of a dongle
Registration system requiring the typing in of a registration code
“Guards” are hardware or software modules that monitor the running program and
ensure that it has not been tampered with in any way
Activation code which can be used only on a limited number of machines [2]

Mob. 0101 100 9465 48 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 2

3 13 Four from:

With a CLI Instructions must be typed to get a computer to carry out an action
With a GUI you just click on an icon
With a GUI icons represent applications
With a CLI you have to remember the exact path and name of application
With a CLI it is more important that users understand how a computer works
With a GUI menus are offered to help choose an action
With CLI have to learn/understand comments [4]

4 12 (a)

Text

Integers
[1]
Sound 

Decimal numbers
[1]
Video 

Graphics

(b) Two from:


Microphone
Sound card
Speakers [2]

(c) Two matched pairs from:


Desk Top Publishing
Producing the layout/template of the brochure

Database
List of characters/actors

Spreadsheet
Prices/list of refreshments and costs

Word processing
Type/enter/create/produce the text for the brochure/don’t allow write (up) the information

Image editing software/graphics package


To prepare images for inclusion in brochure [4]

Mob. 0101 100 9465 49 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 2

5 15 (a) Up to two from:


Save photos to memory card
Insert memory card to computer
Copy photos to a new folder/desktop/hard disc
Connect camera lead to computer
Import/upload photos

Up to two from:
Load word processing package/open document
Insert image from folder/copy and paste/drag and drop
Edit/position the image

If camera is phone-based/web-enabled allow email/SMS for 1 mark

Maximum of three marks [3]


(b) Two from:
Internet
Create own using a painting/drawing package
CD of images
Clipart library [2]

(c) Four from:


Laser is cheaper to buy than a dot matrix
Laser is faster at printing than other two for this task
Laser has a better quality printout than dot matrix
Laser has a larger paper tray than inkjet
Laser doesn’t need to change cartridges as often as an inkjet [4]

6 2
CLI GUI
() ()

Instructions have to be typed. 

Applications are represented by icons. 

Options are chosen from a menu. 

Many instructions have to be memorised. 

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks [2]

Mob. 0101 100 9465 50 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 2

7 2 (a) Command line interface/CLI


[1]

(b) One from:

more difficult to edit entered commands


need to know the commands
Incorrect commands can affect the operation of the computer.
Syntax needs to be exact for the program to work. [1]

(c) Tick whether the following statements are true or false.

true false
(3) (3)

A GUI involves the use of windows and menus. 3

User interaction with a GUI is intuitive. 3

A GUI takes up a lot of memory and resources. 3

Users have to learn a list of system commands in order


3
to use a GUI.
[2]
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks

Mob. 0101 100 9465 51 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 2

Question Answer Marks


8
15 An three from: 3
A window plus reasonable example
An icon/buttons/tabs plus reasonable example
A menu/drop down menu plus reasonable example
Pointer (to point to items on the menu) plus reasonable example

Mob. 0101 100 9465 52 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 3

1 18 Four from:
Save pictures from clipart/Internet/scanned images/digital camera
Load word processing software
Insert images
Edit images
Insert spreadsheet
Position chart/images/spreadsheet
Create chart
Type in text
Edit/format text
Save chart
Insert chart/ copy and paste chart
Edit chart [4]

2 18 To be marked as a level of response:

Level 3 (7–8 marks)


Candidates will describe in detail at least two types of user interface
Detailed reasons why a keyboard is used with CLI systems will be given
Detailed reasons why pointing devices are used with GUI systems
Detailed reasons why different input devices relating to other different types of user interface are
used may be given
Descriptions of different types of pointing device
The information will be relevant, clear, organised and presented in a structured and coherent
format
Specialist terms will be used correctly and appropriately

Level 2 (4–6 marks)


Candidates will describe at least two types of user interface
Reasons why a keyboard is used with CLI systems will be given
Reasons why pointing devices are used with GUI systems
Reasons why different input devices relating to different types of user interface are used may be
given
Different types of pointing device will be listed
For the most part, the information will be relevant and presented in a structured and coherent
format
Examples will be given and will be mostly appropriate
Specialist terms will be used appropriately and for the most part correctly

Level 1 (1–3 marks)


Candidates will identify at least one user interface
Input devices may be in the form of a list
There will be little or no use of specialist terms
Errors of grammar, punctuation and spelling may be intrusive

Level 0 (0 marks)
Response with no valid content

Examples

Command Line Interface


With a CLI Instructions must be typed to get a computer to carry out an action
keyboard is used to type
Typing is key component of CLI
With CLI syntax has to be precise
Devices other than a keyboard would be less accurate when entering text

Mob. 0101 100 9465 53 Eng: Mohamed Mamdouh


Unit 1 Hardware and Software Software Level 3

Graphical User Interface


With a GUI you just click on an icon
With a GUI icons represent applications
Separate windows are used for different pieces of work/software
With a GUI menus are offered to help choose an action
Moving a mouse enables users to manoeuvre a pointer around a screen
A mouse can be used to drag windows/icons around a screen
People with physical disabilities can use a trackerball to manoeuvre the pointer around a screen
Pointing devices are easier to control a pointer/menu selection/icon clicking
Joysticks can be used to mimic the behaviour of a mouse
Buttons on the mouse enable users to select icons
Buttons on a mouse enable users to see menus on a screen
Touchscreen can be used to directly select options from a screen [8]

Question Answer Marks


3
14 To be marked as a level of response: 8

Level 3 (7–8 marks):


Candidates will give reasoned similarities and differences. There will be a reasoned
conclusion. They will relate the answer to both CLI and GUI. The information will be
relevant, clear, organised and presented in a structured and coherent format.

Level 2 (4–6 marks):


Candidates will expand on similarities/differences relating the answer to both GUI
and CLI. Some of the points may be one sided. There may be a conclusion. For the
most part, the information will be relevant and presented in a structured and
coherent format.

Level 1 (1–3 marks):


Candidates only list a difference/similarity. Candidates only refer to GUI or CLI.
Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid content

Answers may make reference to, for example:


Post GUI allows the use of pinching, scrolling, expanding
Post GUI allows the use of touch screen but a CLI does not allow for this
Icons speed up finding instructions, CLI you have to type out the commands in full
No editing in CLI
If a mistake is made in CLI it could have major consequences whereas GUI has less
impact
Due to graphics GUI uses a lot of memory, CLI is a lot smaller program
Loss of memory slows down the operations of the computer
GUI cannot operate properly if memory is low
The loss of memory affects kinds of applications that can be run
GUI more user friendly CLI the commands have to be memorised
GUI has a more varied use on other devices not just computers
In a CLI several commands have to be typed in rather than one command in GUI
CLI commands have to be typed in every time the same command is run
GUI sometimes have CLI embedded within them

CLI and GUI both carry out file management CLI and GUI use similar utilities
Both are operating systems
Both control the hardware and software

Mob. 0101 100 9465 54 Eng: Mohamed Mamdouh


55
56
Unit 2 Networks Types of Networks Level 1

1 7

Internet
Internet I

is a network of computer networks  [1]

exists usually within one organisation  [1]

anybody can access it  [1]

can be expanded to become an extranet  [1]

4
2
This type of network usually requires the use of
 [1]
WiFi

Usually is cabled and often housed in a single


 [1]
building

Covers a large area and is often connected


 [1]
using a router

Requires the use of Wireless Access Points


 [1]
(WAPs)

3 3
TRUE FALSE
(3) (3)

A WAN usually connects a number of LANs. 3

A LAN is usually found on one building. 3

A WAN is a Wireless Area Network. 3

The internet is an example of a WLAN. 3

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks [Max. 2]

Mob. 0101 100 9465 57 Eng: Mohamed Mamdouh


Unit 2 Networks Types of Networks Level 1

Mob. 0101 100 9465 58 Eng: Mohamed Mamdouh


Unit 2 Networks Types of Networks Level 2

1 16 Three from:

Limited area of network


Strength of signal is weaker
Easier to hack into/less secure
Physical obstacles can interfere with signal/can cause disconnection [3]

2 17 Four from:

Internet is network of networks/intranet doesn’t have to be a network of networks


Internet is global
Intranet is within one organisation
Intranet is private/Internet is public
Intranets tend to be policed/managed
Intranet has an extra layer of security
Data found in an intranet is likely to be more reliable/relevant than that found on the Internet
Internet has more information than an intranet [4]

3 14 Four from
Internet is network of networks/intranet doesn’t have to be a network of networks
Internet is global
Intranet is within one organisation
Intranet is private/internet is public
Intranets tend to be policed/managed
Intranet has an extra layer of security
Data found in an intranet is likely to be more reliable/relevant than that found on the Internet
Internet has more information than an intranet [4]

4 8 LAN
Two from:
– LAN is a Local Area Network
– LAN covers a small area/one building
– A school network is a LAN

WAN
Two from:
– WAN is a wide area network
– WAN covers a large geographical area/worldwide
– The Internet is a WAN
– A WAN consists of connected LANs

WLAN
Two from:
– WLAN is a wireless local area network
– Uses wireless technology to transmit data
– Uses Wireless Access Points (WAPs) connected to a wired network [6]

5 17 Three from:

It is possible to prevent employees accessing undesirable websites


They can ensure that available information is specific to their needs
It is easier to make sure confidential messages stay within the company
There is less chance of company computers being hacked [3]

Mob. 0101 100 9465 59 Eng: Mohamed Mamdouh


Unit 2 Networks Types of Networks Level 2
6 10 Four from:

WiFi technology enables local area network…


… and Internet connection
Using WiFi, a laptop or desktop computer can connect to a network's wireless router
Bluetooth connects two devices together
Usually Bluetooth peripherals are powered by batteries that need to be charged or replaced
WiFi covers a larger distance than Bluetooth
WiFi requires more than ten times more bandwidth than Bluetooth [4]

7 15 LAN uses cables to transmit data whereas a WLAN uses wireless technology to transmit data
(1 mark)

Advantages (2 marks)
Any two from:
cheaper as less cabling is required
new workstations can be sited anywhere
different devices can be connected easily

Disadvantages (2 marks)
Any two from:
– limited area of network
– strength of signal is weaker
– easier to hack into/less secure
– physical obstacles can interfere with signal/can cause disconnection
– slower data transmission rates [5]

Mob. 0101 100 9465 60 Eng: Mohamed Mamdouh


Unit 2 Networks Types of Networks Level 2

8 Question Answer Marks

5 Any two from: 2


Secure the wireless router/network with a strong password
Do not broadcast the wifi security key/SSID
Enable WPA encryption
Disable remote administration to the router
Enable user management
Change from the default SSID
Use MAC address filtering/change the router IP address
Use wireless security software

Question Answer Marks


9
7 Any three from: 3
Private/confidential data stays within a company/organisation/school
To store relevant/up to date information about the organisation available to
workers
To facilitate communication/collaboration between workers/students/teachers
Make it easier to access company specific applications.
Restrict access to certain sites of the internet/regulate access to the internet
Restrict access for certain employees

Question Answer Marks


10
6 Any four from: 4
The internet is a public network whereas an intranet is a private
network/restricted access
An intranet is policed or managed whereas the internet has no rules
The data on an intranet is moderated whereas the internet is not moderated
An intranet is more secure than the internet
Internet has greater amount of information than an intranet

Mob. 0101 100 9465 61 Eng: Mohamed Mamdouh


Unit 2 Networks Types of Networks Level 3

1 Question Answer Marks

16 To be marked as a level of response: 8

Level 3 (7–8 marks):


Candidates will give reasoned advantages and disadvantages. There will be a
reasoned conclusion. They will relate the answer to both Bluetooth and WiFi. The
information will be relevant, clear, organised and presented in a structured and
coherent format.

Level 2 (4–6 marks):


Candidates will expand on advantages/disadvantages relating the answer to both
Bluetooth and WiFi. Some of the points may be one sided. There may be a conclusion.
For the most part the information will be relevant and presented in a structured and
coherent format.

Level 1 (1–3 marks):


Candidates only list an advantage/disadvantage. Candidates only refer to Bluetooth or
WiFi. Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid content

Answers may make reference to, for example:


Bluetooth is more useful when transferring data between two devices whereas WiFi is
more suited to full scale networks
Bluetooth does not buffer
The devices connected via Bluetooth should be near to each other whereas WiFi has a
larger range
Less data tends to be transferred with Bluetooth
Bluetooth uses a lower bandwidth
Eg sound data (phones) or file transfer (computers)
WiFi has better security than Bluetooth
Cost of Bluetooth is cheaper than WiFi
Bluetooth has a shorter password
Bluetooth devices are battery operated which needs to be replaced or recharged but
WiFi do not necessarily use batteries
To connect to the network need a Bluetooth adapter but WiFi needs a WiFi adapter, a
wireless router and a wireless access point
Bluetooth range is approx. 20m whereas WiFi is approx. 100m
Bluetooth is simple to use and setup but WiFi is more complex
Bluetooth/Wifi are both wireless can’t fall over the wires/move around the house
Saves money (on cables) as both do not require wires
Bluetooth is more energy efficient than wifi
in some cases 3% of the energy

Mob. 0101 100 9465 62 Eng: Mohamed Mamdouh


63
Unit 2 Networks Network Requirements Level 1

1 2 Bridge DVD R Light pen [1]

Magnetic tape Printer Switch [1]

2 1 A microphone B speakers [1], [1]


C dot matrix printer D joystick [1], [1]

3 2 hub CD ROM graph plotter [1]

magnetic disc router trackerball [1]

4 2 Two from:
Bridge
Hub
Switch
Router
Proxy server
Network card [2]

5 6 Two from, descriptions of:


e.g.:
Optical fibre broadband
Increased bandwidth
Fourth generation mobile telecommunications [2]

6 3
TRUE FALSE
() ()
WLAN stands for Wide Local Area Network 
A WAN often requires the use of a router 
The internet is a WAN 
A LAN usually covers a smaller area than a WAN 

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks [2]

Mob. 0101 100 9465 64 Eng: Mohamed Mamdouh


Unit 2 Networks Network Requirements Level 1

7 1 (a) Router/Broadband modem [1]

(b) Switch [1]

(c) Hub [1]

(d) Bridge [1]

8 Question Answer Marks

2 2
true false
(✓) (✓)
A router is required to allow a LAN to connect to the internet ✓
A web browser displays a web page ✓
An intranet has restricted access ✓
ISP means Internal Service Provider ✓

4 correct answers 2 marks


2 or 3 correct answers 1 mark
1 or 0 answers no marks

9 Question Answer Marks

5(a) two from: 2


Request made by entering a web address/URL or clicking on a link
Retrieves code from the server/resources downloaded
Interprets the code as a web page/uses page resources to build page
The web page is displayed/renders page to view

5(b) six from: 6


An intranet has restricted access/private network therefore public cannot gain
access/the internet is public access
The intranet is protected by passwords/More chances of hacking on the
internet
The intranet has reduced unauthorised access to material
The material may be sensitive on the intranet
Intranet only used in the organisation/internet is world wide
An intranet will only contain relevant information for the company
The company has more control of data on an intranet
An intranet is policed or managed/the internet has no rules
The data on an intranet is moderated/the internet is not moderated

Mob. 0101 100 9465 65 Eng: Mohamed Mamdouh


Unit 2 Networks Network Requirements Level 2

1 16 (a) Three from:

Can act as a web server


Can act as a buffer (between Internet and LAN)
Server passes on requests to the Internet
Passes the requested web pages to individual computers
Can cache/store the webpages
Subsequent requests for that/those web page(s) are responded to more quickly
Can be used to monitor Internet usage
Can block certain sites [3]

(b) Three from:

Connects a LAN to a WAN


Connects a LAN to the Internet
Forward data packets to the individual computers on a network
Hold the addresses of each computer on the network [3]

2 13 (a) Two from:


Switched hub
Has many computers connected to it
Can learn/store addresses of each computer in that part of the network
Can direct data to specific computers/devices [2]

(b) Two from:


Connects network/computers to the internet
Uses IP addresses
Transfers data between networks
Connects LANs/networks together [2]

3 10 (a) (i) Two from:


LAN is a Local Area Network
LAN covers a small area/one building
A school network is a LAN [2]

(ii) Two from:


WAN is a wide area network
WAN covers a large geographical area/worldwide
The Internet is a WAN
A WAN consists of connected LANs [2]

(b) Router/modem/cable [1]

Mob. 0101 100 9465 66 Eng: Mohamed Mamdouh


Unit 2 Networks Network Requirements Level 2

4 11 Four matched pairs from:

Modem/Router
To connect the network to the internet

Hub/Switch
To connect the computers to form a network

(Internet) browser
To access the bank’s website/to search on different websites/allow access to internet (if not given
elsewhere)

ISP (contract)
To access the internet/to provide internet services

Telephone line
To connect the router to the internet [8]

5 10 Three from:

Can act as a web server


Can act as a buffer between internet and LAN
Server passes on requests to the internet
Passes the requested web pages to individual computers
Can cache/store the webpages
Subsequent requests for that/those web page(s) are responded to more quickly
Can be used to monitor internet usage [3]

6 15 Three matched pairs from:


A hub
Broadcasts data to all computers/devices in a network

A bridge
Passes data to another network

A switch
Passes data to specific computers/devices in a network

A proxy server
Retrieves web pages and passes them to the computer that requested it/caches web pages [6]

7 9 Four from:
Access to the internet
Email address
Router to connect to the internet
Domain name to have own website
Email security software
Web space to create own website
Storage space to save data in the cloud
DNS service to convert URLs to IP addresses
Firewall to block unauthorised traffic [4]

Mob. 0101 100 9465 67 Eng: Mohamed Mamdouh


Unit 2 Networks Network Requirements Level 2

8 8 Any four from:

Router
The network software in the original computer determines that the destination computer is on a
different network...
...using IP addresses
Data is sent to the switch/hub and then passed to router
the router then passes it to the router of the other network
that router passes it to the switch/hub…
…to the destination computer

Bridge
The computer sends the data to the bridge via the hub/switch…
...using MAC addresses
if the protocol/MAC address is same, bridge passes data to the other network
Bridge passes it to the switch/hub…
…to destination computer with correct MAC address [4]

9 6 Four descriptions from:

Phone call
Text message
Email
Social network site
Blog/microblog
Video call [4]

10 8 (a) http:// – this is a protocol/transfer protocol/hypertext transfer protocol [1]


www.bbc.com – this is the website address contains domain name, domain type and
country code/server [1]
weather – this is the folder name [1]
2193733 – this is the resource or the filename [1]

(b) Two from:

If using a web browser, only the URL is needed.


If a URL is typed in a web browser the website is found straight away.
Resource may not be on search engine index yet, therefore cannot be found.
In the search engine the user needs to know what is on the website for the keywords.
Not sharing information with a search engine if you type in a URL [2]

Mob. 0101 100 9465 68 Eng: Mohamed Mamdouh


Unit 2 Networks Network Requirements Level 2

11 15 (a) Two from:

Routers inspect/read the IP address of the data packets sent to it


Sends the data packet to a switch with that IP address
It may use the MAC address of the switch to do that by converting the IP to a MAC using
ARP…
…until it finds the corresponding switch [2]

(b) WiFi

Any two from:

Can connect to the internet from any room in a house


No cables
Can be used on multiple devices [2]

Satellite

Any two from:

This is broadband
Useful for general use of the internet
(Connects via satellites so) better coverage
Can be used almost anywhere in the world [2]

3G/4G

Any two from:

Used in mobile devices laptops/tablets/smartphones


Connects wireless through the 3G or 4G network
Allows access on the move
Allows access even if no WiFi available
Not affected by rain or snow as satellite communication [2]

Question Answer Marks


12
3 true false 2
(3) (3)
A hub is a central computer. 3
A router connects a LAN to the Internet. 3
A bridge connects a WAN to a LAN. 3
A switch connects computers in a network. 3
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
0 or 1 correct – 0 marks

Mob. 0101 100 9465 69 Eng: Mohamed Mamdouh


Unit 2 Networks Network Requirements Level 2

13 Question Answer Marks

15 Any two from: 2


− Spam could contain viruses
− Spam could contain spyware that record your key depressions«
− ...this could send messages out to alert others that the email address is live
− Spam can fill up your inbox
− Spam may have links to fraudulent websites

Question Answer Marks


14
2(a) a hub 1

2(b) a router 1

2(c) a bridge 1

2(d) a switch 1

15 13 Internet Service Provider/provides Internet access – 1 mark

Two from:

Often offers web space to create own website


Provides email address
Router to connect to the internet
Domain name to have own website
Storage space to save data in the cloud
DNS service to convert URLs to IP addresses [3]

16 Question Answer Marks

5(a) two from: 2


Request made by entering a web address/URL or clicking on a link
Retrieves code from the server/resources downloaded
Interprets the code as a web page/uses page resources to build page
The web page is displayed/renders page to view

5(b) six from: 6


An intranet has restricted access/private network therefore public cannot gain
access/the internet is public access
The intranet is protected by passwords/More chances of hacking on the
internet
The intranet has reduced unauthorised access to material
The material may be sensitive on the intranet
Intranet only used in the organisation/internet is world wide
An intranet will only contain relevant information for the company
The company has more control of data on an intranet
An intranet is policed or managed/the internet has no rules
The data on an intranet is moderated/the internet is not moderated

Mob. 0101 100 9465 70 Eng: Mohamed Mamdouh


71
Unit 2 Networks Gains of Internet Level 1

1 7 (a)
Companies do not have to buy any equipment

Companies can arrange the meeting for any time of day

It is safer as employees do not have to travel  [1]

Companies do not have to pay hotel expenses  [1]

Employees don’t have to carry so many documents with them  [1]

Employees are paid less

(b)
Video conferences can only last a short time

Employees are unable to see who they are talking to

It is difficult to call international meetings because of time differences  [1]

There is sometimes a time lag between video and sound  [1]

It is difficult to share documents

Legal documents may need to be signed  [1]

2 4 Two from:
Send an email
Send an SMS/text message
Use instant messaging
Send a fax
Leave a message on voicemail
Make a phone call
Use VOIP
Send an alert on the company intranet/website
Social networking
Video conference [2]

3 4
It is easy to keep in immediate contact with friends  [1]

You can share photographs with friends  [1]

You can do internet banking using a social networking site  [1]

You can access everybody’s personal details  [1]

Mob. 0101 100 9465 72 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 1

4 4
Blog Microblog Wiki
  

Very restricted on size of post  [1]

Allows readers to edit posts  [1]

Entries are not usually in chronological order  [1]

Very difficult to customise  [1]

5 2
Email Fax
() ()
Transmission of messages is relatively slow 
When received can be edited using a word processor 
Can have attached sound files 
The message is basically an image 

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks [2]

Mob. 0101 100 9465 73 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 2

1 10 Four from:

Weblog
Usually one author
Personal opinions on a number of topics/personal thoughts
Can be an electronic diary
Others can comment
Only author can edit entries [4]

2 10

True False

A file is a collection of related records  [1]

A field is one item of data such as name or address  [1]

The same value can occur several times within a key field  [1]

A record is the complete data about one student  [1]

3 6 Three from:

Allows users to keep in contact/communication/connect with friends


Allows user to send messages to more than one friend/to people overseas
Can search for people who you’ve fallen out of touch with/people with similar interests
Can arrange meetings/events/visits to cinemas/theatre with whole group
Can show photographs to whole group/share photographs/music/videos
Can create and share personal profile
You can follow actions/thoughts of others
Can write comments on other’s posts
Can have privacy controls
Can lead to cyber bullying [3]

4 16 (a) Microphone to input voices of participants/speak to other participants [1]


Speakers to output voices to participants/hear other participants [1]
Web cam to input/capture video/images of participants/documents [1]

(b) Four from:


Workers can use own office so documents do not get lost in transit
Bulky documents/equipment do not have to be carried around
Sensitive documents less likely to be lost/stolen
Company can call meeting at short notice
Might be dangerous to fly/travel [4]

Mob. 0101 100 9465 74 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 2

5 20 Two advantages from:


Can reach more people
Easier to update
Can have multimedia which would attract more customers/eye-catching [2]

Two disadvantages from:


More expensive to start up/pay programmers/developers
More expensive to maintain
Need specialist equipment to start with
May not reach target audience [2]

6 12 (a) Two from:


Router
Web cam
Microphone
Network card
Speakers [2]

(b) Four from:


Takes time/costs money to learn new technology/to be trained
Difficult to have international meetings because of time differences
Initial cost of hardware (and software)
Equipment can break down/power cuts can stop conference
Poor strength of signal/time lag/lip sync can be a problem/connection can be lost
Loss of personal/social contact [4]

7
17 Three matched pairs from:

Sound
Spoken introduction by head/voiceover the presentation/background music/school
choir/band/orchestra

Animation
Text effects/cartoon representing school activities

Video
Introduction by head/school play/choir/band/orchestra/sports activities

Hyperlinks
Move to another page in the website [6]

8 11 Three from:
– It is a form/type of blog
– Shorter in length than a normal blog
– Consist of short sentences
– Posts are called microposts
– Accessed by subscribers [3]

Mob. 0101 100 9465 75 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 2
9 16 Four from:

Easy to keep in immediate contact with friends/make new friends


Easy to communicate to more than one friend/to communicate with people overseas
Can search for people who you’ve fallen out of touch with
Easy to arrange meetings/visits to cinemas/theatre
Can share photographs/videos/images/opinions/views [4]

10 18 To be marked as a level of response:

Level 3 (7–8 marks):


Candidates will address both aspects of the question and discuss/consider different
advantages/disadvantages. The issues raised will be justified. There will be a reasoned
conclusion. The information will be relevant, clear, organised and presented in a structured and
coherent format.

Level 2 (4–6 marks):


Candidates will address both aspects of the question and discuss/consider different
advantages/disadvantages although development of some of the points will be limited to one side
of the argument. There will be a conclusion. For the most part the information will be relevant and
presented in a structured and coherent format.

Level 1 (0–3 marks):


Candidates may only address one side of the argument, and give basic advantages and
disadvantages. Answers may be simplistic with little or no relevance.

Examples of advantages:
– workers can use own office so documents do not get lost in transit/bulky documents/
equipment do not have to be carried around
– company can call meeting at short notice
– company does not have to pay travelling expenses
– company does not have to pay hotel expenses
– company does not have to pay for conference room facilities
– travelling time is saved
– might be dangerous to fly/travel
– disabled people may find it difficult to travel

Examples of disadvantages:
– takes time to train employees
– difficult to call international meetings because of time differences
– initial cost of hardware
– equipment can break down
– strength of signal/bandwith/lipsync can be a problem/connection can be lost/power cuts
– loss of personal/social contact with other workers
– takes time for workers to learn new technology
– cannot sign legal documents [8]

Mob. 0101 100 9465 76 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 2

11 9 (a) Any two from:

Both involve you being assigned a fax (phone) number


Both can involve use of a hard copy original
Both require the use of a phone line [2]

(b) Any three from:

Physical faxing requires purchase of a fax machine/electronic faxing requires use/purchase


of a computer/scanner
Physical faxes can be picked up by anyone/electronic faxing goes straight to your email
address
Physical faxes – phone-line could be busy/engaged – electronic faxes – phone line never
registers as busy/engaged
Physical faxes – must have paper and can get paper jams
Electronic fax is quicker to arrive than physical [3]

12 13 (a) Any two from:

HyperText Transfer Protocol


HTTP is a communication protocol used on the internet to allow communication between two
computers (devices)
HTTP is an application protocol/set of rules
HTTP is the foundation of data communication for the World Wide Web [2]

(b) Any two from:

HTTP is not secure/HTTPS is secure…


…uses SSL/HTTP does not use SSL
HTTPS transmits data over the internet in an encrypted form/HTTP transmits data over the
internet in an unencrypted form
HTTPS requires additional processing power in its servers which could result in slowdown of
responses [2]

13 14 Any four from:

Computer might be infected with spyware detecting key presses which slows down data transfer
speeds over the internet
Computer might be infected with viruses taking up memory and limiting bandwidth.
If the computer’s memory is close to full, data transfer speed over the internet can slow down
considerably
The search might be too general giving irrelevant information as well as relevant information
Search providers add targeted marketing adverts from companies to the search results/ your
search results are gathered to target further marketing/advertising [4]

14 14 Three from:

Used advanced searches


Use Boolean operands…
…use + and – to limit results to only key words
Use speech marks around key phrases
Use the specific web address [3]

Mob. 0101 100 9465 77 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 2

15 3
Internet Intranet
() ()

A public computer network 

It is easier to protect sensitive data from hackers 

The content is more easily controlled 

Exists within a single organisation only 

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks [2]

16 7 (a) Two from:

Voice over Internet Protocol


A set of rules that enable people to use the Internet to make telephone calls/talk each other
Sends voice data in packets using IP [2]

(b) Two from:

Microphone
Speakers/headphones
Headset [2]

17 13 FTP
File Transfer Protocol/is used to transfer files from one computer to another (1 mark)

Differences
Three from:
HTTP is used to access the world wide web/web sites
FTP is used to download from file servers whereas http is used to download from web servers
FTP – files are transferred from one device to another and copied into memory
HTTP transfers the contents of a web page into a browser for viewing.
FTP upload is used in cases when the file size is very large
HTTP upload is used for smaller files. [4]

18 5 (a) Four from:

Real time collaboration/communication


Multiple users are connected to the internet.
See the same screen at all times in their web browsers
Allows: texting, for example of the car details
VOIP, for example, the delegates discussing the car range
Full motion video to show the car being test driven [4]

(b) Three from:

Webcams/cameras
Large monitors/projector
Microphones
Speakers/headphone [3]

Mob. 0101 100 9465 78 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 2

19 10 (a) Four from:

Agree the date and time of the conference

Either
Contact an audio conferencing provider …
…for organiser’s PIN
…for participant’s PIN
Give the PIN to each participant
at the start of the conference organiser types in his PIN
Each participant dials the number and enters the PIN

or
the organiser phones/contact the first participant
the organiser phones/contact subsequent participants
puts them on hold…
…until all participants have been contacted
joins the participants together/joins the conference [4]

(b) Four from:

It is needed for network security


It controls the incoming and outgoing network traffic.
A firewall establishes a barrier between a trusted, secure internal network and the Internet
It logs incoming and outgoing traffic
It stops malicious traffic
It prevents computers connecting to unwanted sites
It prevents untrusted/unrecognised computers accessing data on the system

20 Question Answer Marks

8(a) Any three from: 3


− Video/digital camera/webcam
− Microphone
− Keyboard
− Large screen/monitor/data projector
− Remote control
− Speakers/headphones

8(b) Any four from: 4


− A conference held over the internet using TCP/IP connections
− Examples webinars/webcasts/VOIP
− Can be point to point (VOIP) or multicast
− Allows text communication
− Allows voice communication
− Allows video communication
− Uses a web browser

Mob. 0101 100 9465 79 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 2

21 Question Answer Marks

5(a) Any six from: 6


− User telephones the bank telephone centre
− System asks for the long number on the credit / debit card / sort code and
account number / customer ID number
− The user taps out on the phone keypad / speaks the number
− System asks for certain characters in a password
− The user taps out the characters asked for
− System rejects the password
− The user re-enters the characters
− After three attempts the telephone connection drops
− System asks other security answers
− The user taps it in / speaks the answer
− System asks which service you require / options given
− Users tap in the number (transfer from one account to another)
− System asks number of account transfer from
− User taps in account number
− System connects with the bank account
− System asks for number of account transfer money to
− User taps in account number
− System asks amount to transfer
− User taps in the amount
− System asks when the transfer should happen
− The user taps in the date
− System ask you to confirm it/sends a text message / send email

5(b) Any four from: 4


− Sort code
− PIN
− Debit card number
− Bank account number
− Valid from
− Expires end

Question Answer Marks


22
15 An four from: 5
Advantages
Helps to prevent illegal materials from being shown
Helps to prevent pornography (for minors)
Helps to prevent discussion groups that incite hatred, racism, etc
Ensure copyright laws are enforced
Remove the Dark Net
Safeguards the vulnerable

Any four from:


Disadvantages
Unsuitable material is easily available in other ways
The rise of mobile communications lessens the impact of the internet
Freedom of speech is restricted
Very difficult to enforce as the internet spans continents

Maximum 5 marks

Mob. 0101 100 9465 80 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 2

Question Answer Marks


23
9(a)(
9(a)(i) two from: 2
Regularly updated
Website or web page
Run by an individual or small group/owner can only edit it
Written in an informal or conversational style
Online journal/diary/personal opinions

9(a)(ii) Any two from: 2


A website or database
Collaboration by a community of users/members of a group
Allowing any member to add and edit content.

9(a)(iii) Any two from: 2


Voice Over Internet Protocol
Method for the delivery of voice communications over Internet /Internet
Protocol/ IP networks
Examples: IP/internet/broadband telephone/broadband phone service.

9(b) Phishing Pharming Smishing 4


(3) (3) (3)
The sending of fraudulent 3
emails appearing to come from
legitimate companies in order to
steal passwords
Redirecting users to a bogus 3
website that looks authentic
Security attack where user is 3
tricked into downloading a virus
on to a cell phone
As the user types details they 3
are stored by the criminal

Question Answer Marks


24
10(a) Five from: 6
A moderated forum is checked/maintained by a moderator/administrator
Moderated forums can reduce freedom of speech/can be biased/Un-
moderated forum allows people to post what they like
The moderated forum does not allow inappropriate comments to be posted
on the site
Examples of inappropriate language: racist, offensive, swear words,
phishing attempts, spam, abusive, unrelated comments – Minimum of 2
examples gains a mark
In a moderated forum those who continually break the rules are banned
Un-moderated tend to be used for spam attacks or phishing attacks
Moderated may be more expensive as they have to appoint a moderator
Posting of moderated comments are delayed as they have to be checked

One from
Both are interactive websites
Both are discussions
Both require networked computers

To gain full marks at least one comparison/similarity is required

Mob. 0101 100 9465 81 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 3
1 18 Six from:

Blog is public/anyone can see it


Blog is online diary/personal opinions
Viewers can only add comments on blogs/authors can reply to comments
Only author can edit blog
Social networking sites might only be available to friends of user
Social networking site enable users to send messages to small group of ‘friends’ to arrange
meetings
Friends can respond more quickly to messages within the group to confirm availability
Easier to share photographs with others
Social networking sites can lead to seclusion from society
Social networking sites can lead to cyber bullying [6]

2 9 Five from:

Video conferencing is a method of visual and audio communication between people at separate
locations
Webcams/small video cameras are used to input faces of participants
Large monitor/projector to output faces of participants
Microphones are used to input voices of participants
Speakers are used to output voices of participants
Router/broadband modem used to connect to internet
Video conferencing software needed to link participants
Employees are connected on-line/may need to access the Internet/WAN to work
Images of the employees appear on the screen in real time
Software is needed in each computer to operate the conference
Employees can be heard by all the other employees in the conference
You can take part wherever you are [5]

3 17 Seven from:

Danger of accessing inappropriate websites


Can take long time to find required information
Have to have internet connectivity/computer/phone line/modem
Internet tends to be up date
Internet has vast amounts of information/wide range of information
Speed of search only if referring to use of search engine
Can access biased/inaccurate websites
Lack of expertise leads to inefficient searching
Easy to plagiarise information [7]

4 19 Six from:
Mobile phones/laptops are portable, PCs are not
Keyboard on mobile phone is smaller/difficult to type
Mobile phone display is smaller than laptop or PC
Mobile phone may not be able to access certain sites
Signal is likely to be more reliable with PC/laptops as they can be cabled
Slower to access the internet with mobile phone
May not always be able to access the internet using a mobile phone or laptop
More likely to have a mobile phone with you
Can access the internet from greater number of places with a mobile phone
Easier to use a mobile phone while on the move
Some sites do not have full facilities for mobile phones [6]

Mob. 0101 100 9465 82 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 3

5 18 Six from:

Fax
Personal data more likely to be intercepted by another office worker
Quicker to receive message than using post
Document with signature is legally acceptable via fax
Documents can be lower quality when received
Email
Personal data less likely to be intercepted by another office worker
No need to do printouts therefore more secure
Attached documents are better quality in attachment
Email is more environmentally friendly
Email attachments can be edited by recipient easier than fax/post
Multimedia attachments can be sent by email
Quicker to receive message than using post
You can send from anywhere there is an internet connection by email
Easier to send to several recipients at the same time using email
Has a lower running cost such as paper/ink than fax
More people have access to email than fax machines
You cannot send solid objects by email
Post
Received more slowly by recipient
Attached documents are better quality in post
Multimedia documents can be sent by post
Solid objects can be sent by post
You can send from anywhere
Document with signature is legally acceptable
Don’t have to worry about equipment being faulty
More people have access to post than fax machines
One mark can be awarded for a reasoned conclusion [6]

6 19 Six from:
Internet is not regulated
Danger of accessing inappropriate websites.
Can take long time to find required information
Have to have internet connectivity/computer/phone line/modem
Internet tends to be up to date
Internet has vast amounts of information/wide range of information
Can access biased/inaccurate/unreliable websites
Lack of expertise can lead to inefficient searching
Easy to plagiarise information [6]

7 16 Seven from:

Advantages
No danger of accessing inappropriate information
Relevant information can be found quite quickly
Don’t have to worry about having to have internet connectivity/computer/phone line/modem
Book will be less biased/more reliable as teacher has recommended it
Index makes searching more efficient

Disadvantages
Book has limited amounts of information
Can be slower to find relevant information than using a search engine
Books can go out of date quickly/difficult to update a book
Books don’t have multimedia to help explain information
Easier to detect plagiarism

A mark is available for a reasoned conclusion [7]

Mob. 0101 100 9465 83 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 3

8 19 To be marked as a level of response:

Level 3 (7–8 marks)


Candidates will address both aspects of the statement and discuss/consider greater security but
also possible lack of security.
The issues raised will be justified. There must be a reasoned conclusion.
The information will be relevant, clear, organised and presented in a structured and coherent
format.

Level 2 (4–6 marks)


Candidates will address both aspects of the statement and discuss/consider greater security but
also possible lack of security although development of some of the points will be limited to one
side of the argument.
There may be a conclusion.
For the most part the information will be relevant and presented in a structured and coherent
format.

Level 1 (1–3 marks)


Candidates may only address one aspect of the statement or give reasons why there is greater
security but also possible lack of security
Answers may be simplistic with little relevance.

Level 0 (0 marks)
Response with no valid content [8]

Examples of more secure:


Data more difficult to copy
Larger amount of information can be stored
Disabled people find it easier than signing
Reduces disputes at checkouts over validity of signature/Saves time at checkouts
Not affected by magnetic fields
Even when the card is stolen, the thief still needs the PIN, so it is much safer
Magnetic stripe reader had to be in a fixed location.
If the transaction did not take place near a terminal (in a restaurant, for example) the card had to
be taken away from the customer to the card machine.
It was easily possible for a dishonest employee to swipe the card surreptitiously through a cheap
machine...
...which would take a couple of seconds to record the information on the card and stripe
Even at the terminal, the criminal could bend down in front of the customer and swipe the card on
a hidden reader.
Illegal cloning of cards easy, and a common occurrence.
only the magnetic stripe can be copied, and a copied card cannot be used on a PIN terminal
The introduction of chip and PIN coincided with wireless data communications technology
becoming inexpensive and widespread
Wireless PIN pads were introduced that could be brought to the customer and used without the
card ever being out of sight
However, this would have been possible, had the technology been available, with magnetic stripe
cards
Chip and PIN and wireless together reduce the risk of cloning of cards by brief swiping.

Examples of not always secure because:


Cards can still be cloned
People can be careless when using their PIN.
Credit and debit card fraud has gone down with chip and pin
ATM fraud has gone up.
Hidden cameras sometimes are used to see which keys are pressed for the PIN.
The advent of chip and pin has also generated a rise in phishing

Mob. 0101 100 9465 84 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 3

9 19 To be marked as a level of response:

Level 3 (7–8 marks)


Candidates will describe in detail the reliability and unreliability of at least two methods of
preventing unauthorised access to data.
Examples will be given and will be appropriate.
The information will be relevant, clear, organised and presented in a structured and coherent
format.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will describe the reliability or otherwise of methods of preventing unauthorised access
to data.
For the most part, the information will be relevant and presented in a structured and coherent
format.
Examples will be given and will be mostly appropriate.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates will identify some of the methods of preventing unauthorised access to data.
Answers may be in the form of a list.
There will be little or no use of specialist terms.
Errors of grammar, punctuation and spelling may be intrusive.

Level 0 [0 marks]
Response with no valid content

Examples of reliability of methods


User id and Password will…
…prevent users who do not know the password from gaining access
…will reject users who try to guess passwords (usually after 3 attempts)
Strong passwords using a mixture of alphabetic, alphanumeric and special characters…
…will be difficult to guess
Biometrics are unique and are almost impossible to duplicate…
…only the user who has those characteristics can access the laptop
Using biometrics means that passwords don’t have to be remembered
Laptops can now come with fingerprint scanner
Laptops can have built in retina identification

Examples of lack of reliability


Strong passwords can be difficult to remember
…can be easily forgotten
…can be easily disclosed to any user
Software for retina scan can malfunction
User can have fingerprints affected by injury/cut on a finger
Laptops with this technology tend to cost more
Low cost fingerprint technology tends to be inaccurate
Fingerprints can be copied by expert thieves [8]

Mob. 0101 100 9465 85 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 3

10 18 To be marked as a level of response:

Level 3 (7–8 marks):


Candidates will address both aspects of the question and discuss/consider different
benefits/drawbacks. The issues raised will be justified. There will be a reasoned conclusion.
The information will be relevant, clear, organised and presented in a structured and coherent
format.

Level 2 (4–6 marks):


Candidates will address both aspects of the question and discuss/consider different
benefits/drawbacks although development of some of the points will be limited to one side of
the argument. There will be a conclusion. For the most part the information will be relevant
and presented in a structured and coherent format.

Level 1 (1–3 marks):


Candidates may only address one side of the argument, and give basic benefits and
drawbacks. Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid content [8]

Mob. 0101 100 9465 86 Eng: Mohamed Mamdouh


Unit 2 Networks Gains of Internet Level 3

11 Question Answer Marks

17 To be marked as a level of response: 8

Level 3 7–8 marks


Candidates will give reasoned advantages and disadvantages. The issues
raised will be justified. There will be a reasoned conclusion. The information
will be relevant, clear, organised and presented in a structured and coherent
format.

Level 2 4–6 marks


Candidates will give both advantages and disadvantages. The issues raised
may be justified. There may be a conclusion. For the most part the
information will be relevant and presented in a structured and coherent format.

Level 1 1–3 marks


Candidates may only give either advantages or disadvantages. Candidate
might not give reasons. Answers may be simplistic with little or no relevance

Level 0 0 marks
Response with no valid content

The following are examples only

Examples for advantages of social networking


Increase the number of friends worldwide
Send and receive live images instantaneously
Real time information sharing
Common groups can be formed more easily i.e. friends or social grouping and
these keep in contact
easier to advertise
«to a larger number of people
easier to publicise events/activities
«music videos
Speed of news increases
Similar interests can contact each other

Examples for disadvantages of social networking


Reduces face to face communication/relationships
Problem with sarcasm increases as it appears as rudeness
Cyber-bullying increases
Grooming increases
Harder to ignore people
Risks of fraud increases
Risks of identity theft increases
Risks of burglary as holiday reporting increases
Time wasting increases
Invasion of privacy increases
Addiction to social networking
Needs the internet
Needs computer/device

Mob. 0101 100 9465 87 Eng: Mohamed Mamdouh


88
Unit 2 Networks Network Risks Level 1

1 9

True
True Fa

Using a password always prevents unauthorised access to data 

A strong password is one that is difficult for a hacker to guess 

Giving your password to a friend is a good idea in case you forget it. 

If you forget your user id you can still gain access to data using your

password.
[4]

2 8

Spam Pharming

is the sending of several emails at once  [1]

requires malicious code to be downloaded  [1]

re-directs the user to a fake website  [1]

is the sending of unsolicited messages  [1]

3 3

True False

Viruses can be transmitted by opening e-mail attachments. 

MICR is used to read data from bar codes 

Hard discs can store more data than Blu-ray discs 

Regular use of computers can cause headaches 

[4]

Mob. 0101 100 9465 89 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 1
4 9 Two from:
Do not download software/music/games from unknown/untrusted sources/(only) download files
from reputable sources
Do not open email (attachments) from unknown/untrusted sources
Do not use media from unknown sources [2]

5 4 (a) Phishing [1]

(b) Pharming [1]

(c) Spam [1]

(d) Smishing [1]

Mob. 0101 100 9465 90 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

1 13 (a) Three from:

A piece of programming code/software/program/script


It replicates itself
Attaches itself to files
Corrupts/deletes files/data
Can corrupt or erase the contents of the hard disk
Can completely fill the hard disk/memory making it unusable/slows down operations
Makes software/operating system unusable
One mark is available for an accurate description of method of transmission [3]

(b) Three from:

Regularly update antivirus/use/install antivirus


Only use storage media from known sources
Only accept software/download software from known/trusted websites
Only visit trusted websites
Only open attachments from known sources/people you know [3]

2 15 Four from:

phishing is done by email


can invite you to go to a website/respond to an email
pharming is done by installing malicious code on a PC or server
redirects a genuine website’s traffic to the fraudulent website [4]

3 9 (a) Four from:


Illegal accessing of data
Unauthorised access to data/computer system
Usually remotely
Two max.

Deletion of data
Amending/changing of data
Copying and distributing data
Using data for fraudulent purposes
Three max. [4]

(b) Four max from two descriptions:

Allocating User ID and one of password/PIN/Memorable data to network users


Password/PIN/Memorable data has to be entered before access is gained
Password/PIN can be changed frequently to avoid hackers guessing them
Unsuccessful logins can throw you out of the system

Allocating each user a Magnetic stripe/smart card/electronic key/bar code system/ID card
Card/key has to be read before access is gained
Prevents people without cards accessing system

Biometric data has to be used to enter the network


Fingerprint/retina/iris/face/voice recognition used as input
Biometric data is difficult to replicate
Biometric data is used because it is unique
Data is compared with those stored on the system.

Firewall is installed in the network


Only allows known computers to access network/prevents unknown computers
accessing network
Only allows known or trusted programs to communicate across the firewall/with the computer
[4]

Mob. 0101 100 9465 91 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2
4 14 Four from:
Phishers send an e-mail…
… asking for a customer’s details
appears to be from the bank/says that the bank needs the information
asks the customer for password, card or account number
Three max.

So that they can use these details to log on to bank website


Access account and transfer funds
Two max. [4]

5 14 (a) Three from:


Hackers may read the data and pass it on/find out embarrassing details and pass it on
Hackers may delete the data/remove accounts
Hackers may amend the data/change how much money they have in their account
Hackers may create new accounts to defraud the bank
Transfer money from customer’s accounts to hacker’s own account [3]

(b) Three from:


Usernames identify the customer to the system/Passwords – customers can’t access the
system if they don’t know the password/unauthorised users will not know the
password/memorable data – only people who know the memorable data will be able to
access the account

Biometric methods are used because they are unique to each customer so only customer
with specific biometric features can access that account

TAN – only customers with the phone that the TAN has been sent to and know the password
can access the account

Two factor authentication – only people with device, card and PIN can access the account

Magnetic stripe/smart card/Dongle/card with chip – prevents people without


cards/readers/dongle accessing system [3]

6 15 (a) Two from:


Fewer printers are needed
Fewer scanners are needed
Can access work from any computer
Data can be shared between computers/data can be accessed by one computer from
another more easily
Software can be shared/updated more easily
All computers can access the internet /through one connection [2]

(b) Three from:

Greater risk of hackers


Greater risk of viruses
The significant cost of extra equipment
When the network is down, cannot use network computers/can still use standalones
Print queues can be long [3]

(c) Six from:


Advantages
Laptops can be transported from room to room more easily
Safer – won’t trip over loose cables
Can use laptops outside the classroom if required
Can be used even if there’s a power cut

Disadvantages
Laptops may be more expensive than network PCs.
Display is smaller
Laptops will need recharging periodically
Have to be in range of a network point

One mark available for reasoned conclusion


Must have at least one advantage and disadvantage to gain full marks [6]

Mob. 0101 100 9465 92 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

7 12 (a) Can transfer money out of account/Can create bogus account/Can transfer money into
bogus account [1]

(b) Three from:


Fewer bank employees, so less paid out in wages
Fewer banks needed – less spent on rates/rent
Less actual cash handled – fewer robberies
Less money spent on security staff
More customers attracted by lower interest rates on loans/higher interest rates on saving
accounts [3]

8 13 Four from:
May make friends with inappropriate people
Cannot be sure the person you are communicating with is the same as the images you have
seen.
Can become preoccupied with sites and not do other tasks/perform poorly academically
Can swap coursework/homework inappropriately
Lose person to person social skills/spend less time with family/friends
Prone to cyber bullying
Continual use results in lack of exercise, causing health problems [4]

9 19 Four from:
Phishing involves fraudster sending an e-mail…
…whereas pharming involves fraudster/hacker installing malicious code on a pc or server
Both involve trying to obtain personal details

Phishing
Email appears to be authentic
Is sent by a fraudster posing as a bank/organisation

Pharming
User is redirected to bogus website
User accesses websites which look authentic
But belong to the fraudster/hacker [4]

Mob. 0101 100 9465 93 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

10 9 (a) Two from:


Make their file/work read only
Password encrypt their file/work
Grant people access to their file/work without permission to edit
Make their file/work hidden [2]

(b) Modem/router [1]

(c) Two from:


Email
Instant messaging
VOIP
Video conferencing [2]

(d) Advantage
Unauthorised users won’t be able to understand data/only person/computer with key can
understand data

Disadvantage
The data can still be deleted/if the person encrypting the data accidentally deletes the
encryption key the data will be unreadable [2]

11 10 (a) Issue – heavy equipment falling injuring users [1]


Prevention – sturdy tables/place heavy equipment in centre of tables [1]

Issue – fire might be caused [1]


Prevention – CO2 extinguisher/don’t overload sockets/have fans/cooling system [1]

(b) Three from:


A piece of programming code/software/program/script
It replicates itself
Attaches itself to files
Corrupts/deletes files/data
Can corrupt or erase the contents of the hard disk
Can completely fill the hard disk/memory making it unusable/slows down operations
Makes software/operating system unusable
One mark is available for an accurate description of method of transmission [3]

(c) Three from:


Software that gathers data from computers without the user realising
It monitors and records all key presses
It sends this information back to the hacker who sent it out
Used to gain personal details of users [3]

Mob. 0101 100 9465 94 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2
12 16 Three matched pairs (with a different method for each one) from:
Data could be amended
Use a username and password so that only the person who knows these can access the data
Use biometrics so that only that person who has those characteristics can access the data
Use a firewall which prevents unknown computers accessing a network

Data could be deleted


Use a username and password so that only the person who knows these can access the data
Use biometrics so that only that person who has those characteristics can access the data
Use a firewall which prevents unknown computers accessing a network

Data could be read and passed on


Encryption so that data is unreadable to unauthorised users [6]

13 12 (a) Two from:

Can be sure every parent/student gets a copy


Easier to target who the head wants to get it
Not every home has a computer/internet access [2]

(b) Three from:

Cost of delivery/paying someone to deliver


Costs school extra to print copies/ink costs
Extra cost if colour is included
Cannot use multimedia
More difficult to amend/update
Limited to parents of school children [3]

14 11 (a) Two from:


Electronic junk mail/sending of unsolicited emails
Sent to everybody on a mailing list/many emails sent at once
Can slow down networks
Can fill up the receiver’s mail box and therefore hard disk [2]

(b) Four from:


Phishing
Fraudster sends an e-mail which appear to be authentic
is sent by a fraudster posing as a bank/organisation
provides a link to a bogus website

Pharming
installing malicious code on a pc or server
user is redirected to bogus website
user accesses websites which look authentic
website belongs to the fraudster/hacker [4]

Mob. 0101 100 9465 95 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2
15 12 (a) three from:
Network cards
Modem/Router
Hub/switch
Cables
Telephone line [3]

(b) Three from:

Using social networks


Booking tickets
Playing educational games
Watching videos/music
Send/receive emails
Create a blog/description of blogging
Researching current affairs/school work
Looking at the news
Reading ebooks/books online [3]

(c) Two from:


Copy onto removable storage medium
At regular intervals
Store the medium away from the computer
Make incremental backups [2]

(d) Two from:


User id can sometimes be easily guessed
Passwords can be hacked with key logging software
Passwords can be hacked by using random password generators

Four from:
Question is asked such as mother’s maiden name/customer’s birthplace/date of birth
Question selected can be difficult to answer by hacker.
Answers can be intercepted by hacker
Using a chip and pin reader with bank card to generate a one off transaction code which user
enters into online banking
Bank issues a one off transaction code to the user’s phone which user enters into online
banking
Even if hacker intercepts code is no use to him/her as can only be used once
Inconvenient as have to keep reader and card with you if you want to bank remotely
Using fingerprint scanner to capture digital image of fingerprint
Each fingerprint is virtually unique/ Each retina is unique/ Each iris is virtually unique
Fingerprint scanners can be inaccurate
Fingerprints can alter when people do sustained heavy manual work
Civil liberty issues
Using a retina scanner to detect retina pattern
Cataracts/astigmatism can affect accuracy of reading
Equipment cost is high
Using a digital camera to record image of the iris
High quality images of an iris can be used to ‘fool’ the system
Biometrics are nearly impossible to forge [6]

Mob. 0101 100 9465 96 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2
16 8 (a) Three from:

To save printing costs of reports


To ensure test results, etc. are received by parents
To allow immediate feedback to parents after tests/exams
To keep parents up to date with child’s progress/targets [3]

(b) User id – in order to identify the user to the system/in order for system to assign privileges [1]

Password – in order to allow access to the system if it matches user name [1]

17 11 Three from:

To cause data to be scrambled/encoded


Protects sensitive data…
…from being understood if it falls in to the wrong hands
Only user/computer with key can understand data [3]

18 6 Three from:

Is a means of identifying yourself to a system


Something you know such as PIN/password
Something belonging to you such as a bank card
Something unique about you such as a biometric feature [3]

19 15 (a) Four from:

Can use the final part of a URL to identify reliability


.ac, .gov, .org are usually fairly reliable
If information matches that from reliable sites or reliable/authenticated text books
If responsible bodies have endorsed the site information will be reliable
If it has links to other reliable sites then information will be reliable
If site has testimonials it is likely to be reliable
If the author’s credentials are good it is likely to be reliable [4]

(b) Three from:

If site has excessive advertising it could be unreliable


If the advertising is related only to its own products it could be unreliable
If the date of the last update was a long time ago it is likely to be unreliable
If it has links to other unreliable sites it could be unreliable [3]

(c) Four from:

An intranet is a computer network


Exists usually within one organisation/school
Meets the internal needs of an organisation/school
Can be expanded to become an extranet
Intranet is private
Intranets tend to be policed/managed
Intranet has an extra layer of security
Data found in an intranet is likely to be more relevant to the students’ needs [4]

Mob. 0101 100 9465 97 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

20 5 Any four from:

Know how to block and report unwanted users,


Never arrange to meet anyone alone
Always tell an adult first when arranging to meet someone
Always meet in a public place
Avoid inappropriate disclosure of personal data/set privacy settings/Avoid giving email address or
phone number when chatting
Avoid inappropriate disclosure of your own name/Avoid giving your full name
Avoid giving your address
Avoid giving your school name
Avoid displaying a picture in school uniform
Do not display pictures taken at home/Do not display pictures taken of the school with the name
attached/Do not send pictures/videos of yourself to strangers
Ensure that the person you are befriending has very secure privacy settings
Check profiles before contacting people
Verify person’s contact details with other trusted people/friends [4]

21 6 Good example of a strong password – (1 mark)

Good example of a weak password – (1 mark)

Any two from:

Weak password is easy to guess/strong password is difficult to guess


Weak passwords consist of all letters or all digits or all digits with one letter/all letters with one
digit
Weak password is one that has few characters
Strong password uses mixture of upper case letters, digits and punctuation marks
Weak password has repeated characters
Weak password has characters next to each other on a QWERTY keyboard
Weak passwords are ones that are similar to the user name
Weak passwords are passwords that relate to the user [4]

22 5 Four from:

Information must be processed fairly and lawfully


Information collected must be processed for limited purposes
Information collected must be adequate, relevant and not excessive
Information collected must be accurate and up to date
Information must not be held for longer than is necessary
Information must be processed in accordance with the individual’s rights
Information should not be transferred outside the area of the Act unless adequate levels of
protection exist. [4]

23 6 Four descriptions from:

Phone call
Text message
Email
Social network site
Blog/microblog
Video call [4]

Mob. 0101 100 9465 98 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2
24 8 Four from:

Stores IP addresses
IP address is a unique identifier set up by network manager/ISP
Can change but should match the network it’s on
IP address consists of 4 numbers separated by full stops
Stores MAC addresses
6 pairs of hexadecimal digits
MAC address is usually hard coded by manufacturer, never changes [4]

25 9 (a) Three from:

Encrypting the password


Ask for memorable information, such as mother's maiden name
Changing passwords very regularly
Use TANs
Only being asked for or providing a limited number of characters from the password
Twin factor authentication [3]

(b) Three from:

Save travelling expenses


Saves time travelling/queuing
Elderly/disabled people don't have to travel
No embarrassment having to ask for loans face to face
Can bank when banks are closed
Use it anywhere there's an internet connection [3]

26 4 (a) a (computer) virus [1]

(b) encryption [1]

(c) https/SSL/TLS [1]

(d) a digital certificate [1]

Mob. 0101 100 9465 99 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

27 5 (a) Max two from:


A virus is a piece of software/program code that infects a computer
…attaches itself to files
…and has the ability to replicate itself.

Max three from:


Causes computer to crash/shut down
It can delete/corrupt data/files
Causes the computer operations to run slowly/become unusable
Makes software/OS unusable
Fills up the computer memory/hard disk
Can corrupt/erase contents of hard disk [4]

(b) Three from:


Scan the pen-drive as it is inserted into his computer
Use an anti-virus software to scan his computer hard drive
Do not use media from an unknown source
Install/download up-to-date anti-virus software and activate/update anti-virus software/use
up-to-date antivirus [3]

(c) Two from:


Identify the virus using anti-virus software/scan the file
Option given to delete or quarantine the file
Software quarantines the virus infected file so the virus cannot be activated
Delete the virus/clean/disinfect the file
Check the quarantined file to see if it is safe to open [2]

28 14 (a) Three from:


Only use websites recommended by the teacher
Only use websites ending in .gov, .ac, .org, .edu
Use a learner friendly search engine
Use appropriate search conditions [3]

(b) Three from:


Only email people already known to you/do not reply to spam emails
Think before opening an email from an unknown person
Never email the school’s name
Never use personal details in emails
Never send a picture of the student in school uniform
Only use contact us from a known website
Scan all attachments before downloading them/do not open attachments from unknown
people
Check the email address is correct before sending
Check the content of the email before sending [3]

Mob. 0101 100 9465 100 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

29 8 Six from:

Examples

Advantages
Biometrics are unique…
…so others cannot sign people in/whereas with password/card systems someone else can sign
you in.
Fingerprints/eyes are always with you…
…but a password/card can be lost.
Cannot be forgotten passwords can be forgotten
The user has to be present therefore more secure.
Typing in passwords can lead to errors on data entry…
…biometrics tend to be more reliable.
More difficult to forge…
…passwords can be copied/cards can be stolen.

Disadvantages
Personal liberty infringement…
…fingerprints/biometric must be stored.
Method is slower to enter system than passwords.
Equipment and setup is more expensive than producing cards.
The time taken to set up a store of fingerprints/eye prints can be a long time…
…quicker to set up a database of passwords.
If the finger is damaged/dirty it cannot be read passwords can be more reliable.
If dark glasses are worn retina cannot be read passwords are more reliable
If a voice is not understandable on a voice recognition system may not work.
Facial hair can stop facial recognition passwords are more reliable

A mark can be awarded for a reasoned conclusion


If one side of the argument i.e. all advantages/disadvantages then 3 marks max.
If both sides have been addressed but without expansions/differences then 4 marks max [6]

Mob. 0101 100 9465 101 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

30 14 (a) Smishing

One from:

Never text back to unknown sender


Never respond to any of these types of texts
Never click on any links within the text message
Never give out personal information in a text
Don’t allow your mobile phone number to be included in call lists
Blocking unfamiliar texters/numbers [1]

Pharming:

One from:

Use up to date anti-virus/anti-pharming/anti-spyware software


Check address bar for strange web addresses
Keeping DNS servers patched and up to date
Use up to date firewall services on DNS servers [1]

(b) One from:

A small text file sent/downloaded to a user’s web browser when they visit a web site [1]

Two from:

Store information about the visit and are used the next time the user visits the site
Remember the user’s details
Remember the user’s preferences
Remember items a user bought
Remember passwords
Remember what they searched for
Target products
Offers a tailored experience for users [2]

31 6 (a) Unauthorised access to computer systems with the intention of causing harm [1]

Two examples from:

Editing files/data
Deleting files/data
Installing viruses
Exposing weaknesses of the system [2]

(b) Three from:

Usernames and strong passwords to stop remote and local logins


Use different passwords for different accounts
Biometric systems to ensure the official user is present
Electronic dongles which only allow login when the dongle is plugged in
Dedicated computers which are the only ones allowed to log in [3]

7 Three from:
32
Spelling errors
Information requested that the bank would not ask for e.g. password and username/personal
information
Not personalised – name or part of account number
Hyperlink not usually given
Inconsistency i.e. manager and Chief Customer Officer

Allow examples of the data from the email [3]

Mob. 0101 100 9465 102 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

Question Answer Marks


33
6(a) Any three from: 3
Spam email may contain viruses/spyware/malware/key loggers«
«an example of what viruses/spyware/malware/key loggers/pharming can do
If you open and reply to spam emails then the spammer knows the email
address is active
Spam can fill up the inbox

6(b) Any four from: 4


Check the name of sender matches the content of the email
Check any URL link matches the content of the email
Might contain grammar/spelling mistakes
Check plain text
Check the message is not an image
Check if the message is asking for personal information
Might contain unexpected attachments
Urgent/too good to be true
Not address the user by name/generic name used
Might be in your SPAM emails/alerted by service provider

Question Answer Marks


34
9(a) Any two from: 2
Replicates itself and can fill the computer’s memory/hard disc with unwanted
data
Can communicate with other systems
Causes computer to crash
It can delete/corrupt data
Causes the computer operations/system/processes to run slowly/become
unusable
Makes software/OS unusable
Can corrupt/erase contents of hard disc

9(b) Any three from: 3


Run up to date anti-virus software/Install anti-virus software
Do not download files/attachments from email addresses that you do not
recognise
Do not download files/games/software from untrusted/unfamiliar website
Scan all emails before opening
Check/scan attachments to emails for viruses
Avoid opening spam emails

Mob. 0101 100 9465 103 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

Question Answer Marks


35
13(a) Any two from: 2
− A key-logger records the key strokes of a person using the computer
− Transfers / transmits the data back to the supervisor / manager
− The supervisor can then monitor what the employee has been doing / how
hard they have been working

13(b) Any three from: 3


− Monitoring phone call usage
− Monitoring emails
− Monitoring the time spent on and websites visited
− Monitoring the use of printers / number of copies
− Monitoring where employees log in / log out
− Monitoring when employees log in / log out
− Monitoring failed log ins
− Monitor the amount of storage space used
− Monitoring where they send data to print

Question Answer Marks


36
8 Unauthorised access to computer systems 1 mark 2

Any one from: 1 mark


Data on the computer system can be corrupted, edited, deleted, viruses
added
Data on the computer system can be copied/stolen/misused
Data on the computer system can be accessed/read

Mob. 0101 100 9465 104 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

Question Answer Marks


37
9 Any three from: 3
She has not much space left on her hard disk even though she had
previously
Her computer is performing routine tasks a lot more slowly.
Pop ups keep appearing on her screen at random.
Her friends keep telling her that emails about strange things are being sent
by her
Random reboots
Software errors
Recycle bin not working
Computer hanging
Anti-virus stops working

38 Question Answer Marks

10(a) Any three from: 3


Use of strong passwords
Do not use pet names
Do not use personal information
Do not use birthdates
Do not use a password they have used before
Do not use company name

10(b) Any three from: 3


Conforms to company rules
Hard to guess
Stop shoulder surfing
Hard to crack

10(c) Double data entry 1

Question Answer Marks


39
7 Four from: 4
Be vigilant of others attempting to gain access to your data
Use up to date internet security software«
«antivirus, anti-spyware, firewall
Avoid giving out personal data (not name)
e.g. password, home address, email, age, (mobile)phone number
Be aware of addiction e.g. playing for too long
Be aware of hidden costs«
«read terms and conditions
Play authorised games that have a licence/trusted sites
Choose a user name that does not contain personal information
Use strong passwords
Keep the game up to date
Do not use identifiable images

Mob. 0101 100 9465 105 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 2

40 Question Answer Marks

8(a) three from: 3


Scrambling of data
Converting data into an unreadable form
Protects sensitive data
Requires an encryption key/decryption key/key to encrypt data
Requires a decryption key/encryption key/public or private keys to decrypt
data

8(b) two from: 2


Allows people/organisations/computers to exchange secure information over
the internet
Uses a PKI (Public Key Infrastructure)
Unique key used by the sender and receiver

Question Answer Marks


41
9 Three from: 3
Scrambling of data
Data cannot be understood by humans if intercepted
Requires the use of an encryption key/ public key/ key to encrypt
Requires the use of a decryption key/key/encryption key to decrypt
Protects sensitive data

Mob. 0101 100 9465 106 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 3

1 17 Four from:

Biometric methods – unique so only authorized users will have access


Encryption makes it difficult for unauthorised users to read data
Firewall – makes it difficult for unauthorised computers to access the system
Disconnect records computer from network – limit access physically
Access levels – only users with appropriate permissions can access data [4]

2 19 Five from:

Causes data to be scrambled/encoded


Requires an encryption key/software to encrypt
Requires a decryption key/encryption software to decrypt
Results in data which is not understandable/readable

Benefits:
Protects sensitive data…
…from being understood if it falls in to the wrong hands
Only user/computer with key can understand data

Drawbacks
Data can still be deleted from system
Criminals can use encryption to keep incriminating material secure [5]

3 5 Three matched pairs from:

User ID and one of password/PIN/Memorable data

Password/PIN/Memorable data has to be entered before access is gained/Password/PIN can be


changed frequently to avoid hackers guessing them/Unsuccessful logins can throw you out of the
system

Magnetic stripe/smart card/electronic key/bar code system/ID card

Has to be read before access is gained/Prevents people without cards accessing system

Biometric data

Fingerprint/retina/iris/face/voice recognition used as input/Biometric data is difficult to replicate/is


used because it is unique/compared with those stored on the system

Firewall

Only allows known computers to access network/prevents unknown computers accessing


network [6]

Mob. 0101 100 9465 107 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 3

4 11 Five from:
Anybody can set up a website (claiming to be factually accurate) so information is not necessarily
reliable/accurate
Some commercial sites are bound to be biased
If site has excessive advertising it could be unreliable
If the advertising is related only to its own products it could be unreliable
Can use the final part of a URL to identify reliability
.ac, .gov, .org are usually fairly reliable
Compare information from reliable sites or reliable/authenticated text books (to see if it is reliable)
See if responsible bodies have endorsed the site
Does it have links to other reliable sites/unreliable sites?
If site has testimonials it is likely to be reliable
If the date of the last update was a long time ago it is likely to be unreliable
If the author’s credentials are good it is likely to be reliable [5]

5 14 (a) Six from:

Biometric methods use unique data


User ids and passwords can be copied/stolen/forgotten
Cannot copy biometric data
Only the person with particular biometric features can access the network
Anybody who has the password can access a network

Max three from


Fingerprints can be used to identify an individual
Retina scans can be used to identify an individual
Facial characteristics can be used to identify an individual
Voice recognition software can be used to identify an individual [6]

(b) Three from:

The necessary software/equipment is more expensive to purchase


Takes longer to match data
If individual gets ill/background noise can make voice unintelligible to system
With certain illnesses retina scans stop working
Injuries to fingers can cause biometric device to fail to recognise you.
Could be wearing contact lenses which would stop retina scan working [3]

6 15 Six from:

avoid using information from sites that have excessive advertising


avoid using sites where the information from sites where advertising is related only to its own
products…
avoid sites where the date of the last update was a long time ago…
avoid using wikis/sites which the user can edit
avoid using blogs/sites which are clearly the owner’s point of view/social networking sites
Avoid using sites which have grammatical/spelling mistakes
Don’t just rely on using first website you come to in the results of using a search engine

use information from sites where responsible bodies have endorsed the site/sites which have
links to other reliable sites/sites which have testimonials
use sites where the author’s credentials are good
use sites which have .ac… , .gov, .edu as the final part of the URL/only use
government/academic sites
Compare information from different sites/ reliable/authenticated text books to see if the results are
similar
Ask teachers for advice on a site

Mob. 0101 100 9465 108 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 3

7 14 Six from:

Internet is not policed so information is not necessarily reliable


Anybody can have a website so information is not necessarily reliable
Anybody can publish their understanding of a topic so information is not necessarily reliable
If site has excessive advertising it could be unreliable
If the advertising is related only to its own products it could be unreliable
The final part of a URL can help to identify reliability…
… .ac…, .gov, .org government/academic sites are usually fairly reliable
If site is endorsed by reliable/reputable people/organisations it can be accepted as being
reliable/If it has links to other reliable sites/ sites which have testimonials it is usually reliable/If it
has testimonials it is likely to be reliable
If the author’s credentials are good it is likely to be reliable
If information is comparable to information from reliable/authenticated text books it is likely to be
reliable
If the date of the last update was a long time ago it is likely to be unreliable
Sites which have grammatical/spelling mistakes are likely to be unreliable
Compare information from different sites/text books to see if the results are similar
If it has been recommended by teachers it is likely to be reliable [6]

Mob. 0101 100 9465 109 Eng: Mohamed Mamdouh


Unit 2 Networks Network Risks Level 3

8 Question Answer Marks

17(a) Any six from 6


Never open/download attachments/links from people you do not know«
«as they may contain viruses/allows others to know the email address is live
Never open emails from unknown sources«
«as they may contain viruses
Scan all emails using an up to date anti virus«
«as new viruses are always being created
Keep the number of contacts to a minimum«
«as some viruses send emails to all names in your contacts list
Do not use auto reply to emails«
«allows others to know the email address is live
As the email may be sent to people who should not see it«
«do not use reply all
«check names that you are replying to
When replying always use a subject«
«as people may not open emails without this as they think they are spam
When replying remove extra information that was sent«
«to stop others seeing things they shouldn’t
Watch sarcasm as it is not conveyed on the messaging
Use netiquette
Use a spam filter«
«clear SPAM regularly
Do not reply to spam emails«
«as the spammer can see that your email address is live
Do not give personal details in the email
Do not reply to emails from unknown sources

17(b) Any two from, for example 2


Family name
Gender
Nationality
Religion
Address
Phone number
date of birth
Email address
Bank details
Medical history
Ethnic origin
Membership of a political party
Criminal activity
Membership of a trade union

17(c) Any five from 5


Use of strong passwords
Regularly changing passwords
Not replying to emails where personal data is asked for«
«unless you are sure of the recipient
Use of different passwords for different emails/logins
On social media not giving full name, picture etc.
Setting social media to private
Use an alias on online gaming
Only send personal data on protected sites using https
Using encryption techniques/TLS/SSL/Digital certificates

Mob. 0101 100 9465 110 Eng: Mohamed Mamdouh


111
112
Unit 3 Application and Effect of ICT Processing Level 1

1 9 Two from:
Buying tickets
Online shopping
Online banking
Any control application
Automatic stock control
(EFT) POS system [2]

2 12
Producing the payroll

Producing utility bills.

Printing credit card statements.

Paying for goods using EFTPOS.  [1]

Processing bank cheques overnight

A microprocessor controlled greenhouse.  [1]

Mob. 0101 100 9465 113 Eng: Mohamed Mamdouh


114
Unit 3 Application and Effect of ICT Banking Level 1

1 10
Higher charges can be made
They have fewer bad risks
Less paid out in wages as fewer staff need to be employed  [1]
Lower costs as fewer buildings need to be rented  [1]
A wider customer base is available  [1]
Mistakes are never made.
Less actual cash handled so there are fewer robberies  [1]
The initial cost of hardware is cheap

Mob. 0101 100 9465 115 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Banking Level 1

2 10
Higher charges can be made
They have fewer bad risks
Less paid out in wages as fewer staff need to be employed  [1]
Lower costs as fewer buildings need to be rented  [1]
A wider customer base is available  [1]
Mistakes are never made.
Less actual cash handled so there are fewer robberies  [1]
The initial cost of hardware is cheap

3 5 (a) The type of processing used for processing cheques is called batch [1]

(b) The type of access used on a magnetic disc is called direct [1]

(c) An item of hardware which is used to open a window is called a motor [1]

4 13


Initial purchase of hardware and software is expensive  [1]

Bank workers will have to be paid more

Extra buildings will be need to be rented

System maintenance costs may be high  [1]

Cost of lighting and electricity will be higher

More cashiers will need to be employed

More security staff will need to be employed

Redundancy payments will need to be made to cashiers who are


 [1]
now unemployed

5 5 (a)

The type of processing used for updating bank accounts at


ATMs is called online
[1]
(b)

The type of access used on a magnetic tape is called serial

[1]
(c)

The type of software which is used to create printed


magazines is called DTP

[1]

Mob. 0101 100 9465 116 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Banking Level 2

1 16 (a) Two from:


(Cannot) deposit cash
(Cannot) withdraw cash
(Cannot) deposit cheques with most banks [2]

(b)
What is the name of the fourth planet from the Sun?

What is your favourite place?  [1]

How many miles is it from New York to Washington?

What is your mother’s maiden name?  [1]

Who is the prime minister of Australia?

What is the capital of France?

(c) Two from:


Initial cost of hardware/software (is expensive)
Need to retrain staff
Loss of customers/more difficult to sell other services – due to lack of personal touch
System maintenance may be/is expensive/cost of system maintenance [2]

(d) Three from:


Causes data to be scrambled/encoded
Requires an encryption key/software to encrypt
Requires a decryption key/encryption/key/software to decrypt
Results in data which is not understandable/readable
Protects sensitive data…
… from being understood if it falls in to the wrong hands [3]

Mob. 0101 100 9465 117 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Banking Level 2

2 17 (a) Three from:


Customers can pay bills
Customers can amend/create standing orders/direct debits
Customers can order a new PIN
Customers can stop a cheque
Customers can see recent/pending transactions
Customers can apply for a loan
Have access to up-to-date bank statements/can check account balances
Can transfer funds between the customer’s different accounts
Can amend personal details [3]

(b) Withdraw cash/pay in cash [1]

(c) Three from:


Fewer bank tellers so less paid out in wages
Less actual cash handled – fewer robberies
Have access to a wider customer base
Fewer branch offices needed – less spent on rates/rent/utilities
Less money spent on security staff [3]

(d) Three from:


Initial cost of hardware/software is expensive
Need to retrain staff
Loss of customers/more difficult to sell other services due to lack of personal touch
System maintenance may be expensive/costs of system maintenance [3]

9 (a) Four from:


3
The bank account details are read from the chip
The (ATM) checks to see if the card is valid
The customer is asked which language/currency they require
The customer is asked to type in their PIN
The typed PIN number is compared with that stored in the chip…
…if they are the same the transaction proceeds
…if they are not the same the customer is asked to re-enter PIN
If three failed attempts transaction rejected and card withheld
The customer is asked which service is required
Customer is asked if they want a printed balance/onscreen balance
If yes, signal sent to print balance/message sent to screen giving balance
The customer is asked if further services are required [4]

(b) Three from:

Checks whether card is stolen/account number exists


Customer account number is searched
Balance field is read/is calculated
Message sent to ATM giving balance [3]

Mob. 0101 100 9465 118 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Banking Level 2
4 9 (a) Two from:

Sort code
Account/bank card number
3 digits from password/passcode
Memorable date/mother’s maiden name/favourite place/answer to security question/place
born
Date of birth [2]

(b) Three from:

Transfer money to a different account


Pay bills
Amend/create standing orders/direct debits
Order a new PIN
Stop a cheque
Can ask about recent/pending transactions
Can apply for a loan
Can check account balances
Can transfer funds between accounts
Can amend personal details [3]

Question Answer Marks


5
10(b) Any three from: 3
Using standard paper cheques
The cheques are sent to the clearing bank/centre
The amount is read using OCR
The city code/bank code/branch code/sort code/cheque number/account
number is read using MICR
Sort the cheques into bank code order
The cheque is scanned using OCR and stored
Amount is written onto the cheque using magnetic ink

or
Using digitally image/scanned cheques
The cheques are sent to the bank clearing system/centre from a
smartphone/ATM machine
Details of the amount and payee are sent electronically
The sort code/account number/unique coding number/UCN is encoded as text
The cheque details and encoded MICR are read using OCR and stored

For both methods


Check signature correct/cheque correct
Date of cheque is checked
Amount is checked
Payer recognised

6 Question Answer Marks

12 An three from: 3
The card may be read accidently
Only small amounts can be withdrawn
More chance of fraud if card is stolen/lost
May not be able to use the ATM as not everyone will be contactless due to
cost
Devices can read the cards wirelessly to steal money

Mob. 0101 100 9465 119 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Banking Level 2
Question Answer Marks
7
9(a) three from: 3
Magnetic stripe reader
Chip reader
Contactless reader/RFID reader/NFC reader
Using a manual/physical imprint card reader

Question Answer Marks


8
9(b) three from: 4
Advantages
Saves time rather than travelling to the shops/No waiting in queues therefore
saves time shopping
Saves cost of travelling to the shops
Orders can be repeated at the touch of a button
Schedule in advance/choose time for delivery
Can shop worldwide
Shop 24/7
Shop from anywhere there is an internet connection
Overall wage bill decreases
Smaller/fewer shops needed reduces costs
More customers from around world

Any three from:


Disadvantages
Extra costs for delivery/tax
With fruit and vegetables customer cannot choose the ripest/best goods
Takes time to order
Problems if items are forgotten/alternative goods delivered
Need a computer/device and stable internet connection
Need online payment method
Takes time to deliver
Need to be in when the goods arrive
Loses loyalty
Increased delivery drivers (therefore more expensive)

To gain full marks candidates need at least one advantage/disadvantage.

Maximum 4 marks

Mob. 0101 100 9465 120 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Banking Level 3
1 8 (a) Five from:

Account number
Sort code
Expiry date
Amount to withdraw
PIN
Card limit
Choice of language
Receipt required (Y/N) [5]
(b) Six from:

No embarrassment of not having sufficient funds


Less time spent queuing
Can get money any time of day or night
Own bank may be further to travel to than nearest ATM
Can use most ATMs/does not have to be own bank
Have choice of languages so is easier to understand/be understood

When getting cash late at night may be susceptible to mugging


Machine may be out of order/run out of cash
Can only be given denominations in the machine
Limit to the amount that can be withdrawn

Must have at least one advantage and one disadvantage to gain full marks

One mark can be awarded for a reasoned conclusion [6]

2 10 Seven from:
– The customer is asked to type in their PIN
– The ATM checks to see if the card is valid/in date/stolen
– The customer is asked which language/currency they require
– The bank account details are read from the chip
– Customer is asked if they want a receipt
– The typed PIN number is compared with that stored in the chip
– If they are the same the transaction proceeds
– If they are not the same the customer is asked to re-enter PIN
– If three failed attempts transaction rejected and card withheld
– The customer is asked which service is required
– The customer is asked how much money they want to withdraw
– The amount is checked against the card limit
– If transaction is authorised, transaction is completed/if transaction is not authorised,
transaction is rejected
[7]

Mob. 0101 100 9465 121 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Banking Level 3

3 Question Answer Marks

16 To be marked as a level of response: 8

Level 3 (7–8 marks):


Candidates will give reasoned advantages and disadvantages. The issues
raised will be justified. There will be a reasoned conclusion. The information
will be relevant, clear, organised and presented in a structured and coherent
format.

Level 2 (4–6 marks):


Candidates will give both advantages and disadvantages. The issues raised
may be justified. There may be a conclusion. For the most part the
information will be relevant and presented in a structured and coherent
format.

Level 1 (1–3 marks):


Candidates may only give either advantages or disadvantages. Candidate
might not give reasons. Answers may be simplistic with little or no relevance

Level 0 (0 marks)
Response with no valid content

The following are examples only:


Due to laptops/tablets/smart phones banking can take place on the move
therefore there is no need to go to a bank
Fewer banks are available to customers
Non IT literate user/ users without equipment will have less access to banking
Need to purchase a computer
Need internet/broadband connection
There is a chance of bank fraud due to devices being used
There is little physical money
Physical money cannot be withdrawn or deposited
Could mismanage account/make a mistake by pressing wrong button
Requires stable internet connection, to ensure is doesn’t disconnect midway
through a transaction
Available 24/7
Available anywhere your computer can get an internet connection
Saves customers money by not having to travel to the branch
Saves customers time by not having to travel to the bank or stand in queues.

Mob. 0101 100 9465 122 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Banking Level 3

Question Answer Marks


4
14 Five from: 6
Disadvantage
The cost of producing new cards
The cost of producing new readers
The cost of re-writing the ATM software
They are liable to fraud therefore compensate customers...
...Increasing costs
Less money removed at transaction therefore potentially more small
transactions
...Increased administration
...Increased hardware use

Five from:
Advantage
The cards last longer as they are not in contact with the machine
Attracts new customers
Reducing the cost of replacement cards
Reduction in fraud as less money taken out
Cards not retained therefore less cost for replacements
The transactions are faster

A mark can be awarded for a reasoned conclusion

If one side of the argument i.e. all advantages/disadvantages then 5 marks


maximum

Mob. 0101 100 9465 123 Eng: Mohamed Mamdouh


124
Unit 3 Application and Effect of ICT Online Booking Level 1
1 3

TRUE
TRUE FA

Withdrawing money from an ATM is an example of batch processing  [1]

The processing of bank cheques is an example of batch processing  [1]

Booking a theatre ticket is an example of online processing  [1]

Producing utility bills is an example of online processing  [1]

Mob. 0101 100 9465 125 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Online Booking Level 2

1 18 (a) Three from:


Is credit card number valid/exists
Does name entered match that on system
Is expiry/start date valid/matches date stored on system
Does security code/CVV entered match that stored on system
Is there available credit/funds
Checks for unusual spending patterns
Is card blocked/reported stolen/lost [3]
(b) Four from:
Looks up required date of performance
Checks that seats are available
Flags seats as being booked
Stores name of customer with seats booked
Sends email confirmation/text
Prints tickets ready to post or to be collected/sends electronic version of ticket
Deducts number of seats booked from number of seats available/reduces number of seats
available (by one) [4]

2 7 Three from:

It might lead to double booking


Customer would not be sure booking has been successful
Would take a long time to receive confirmation/ticket
Processing would take a long time which would cost company money [3]

5 Four from:
3
Air flight tickets
Theatre tickets
Holiday booking
Cinema tickets
Rail tickets
Hotel room booking
Restaurant table/seat booking
Football match booking
Concert/performance booking [4]

Mob. 0101 100 9465 126 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Online Booking Level 2

Question Answer Marks


4
11(a) Four from: 4
The programmer will not be familiar with the workings of the theatre/to
understand the requirements of the system
The solution may be easy for the programmer to use but not the users/make
it user friendly
The theatre manager is paying the programmer
The theatre manager may want enhancements that the programmer has not
thought of
The progress of the solution needs to be checked with the theatre manager
«in case the he/she changes his mind
The budget needs to be discussed (as it may involve purchasing new
hardware/software)
The timescale needs to be discussed

11(b) four from: 4


Speeds up the booking process
Customers may not have to travel to the theatre so save money in travelling
Customers may not have to travel to the theatre so save time in
travelling/queuing
Postage costs could be reduced
Can make/cancel/change a booking at any time
Can book several shows at same time
Booking can be carried out anywhere

13 Five from: 5
5 A list of performances/shows is displayed
Customer selects a performance/show
A list of dates/times is displayed
Customer selects a date/time
A plan of the seats are displayed
A customer selects the number of seats to book/number of people
A customer selects the location of the seats
Displays the payment page/shows the booking information
Customer selects checkout

To gain full marks there must be at least one input and at least one output

Mob. 0101 100 9465 127 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Online Booking Level 3
1 16 (a) Six from:

Computer database is searched for matching departure airport


Computer database is searched for matching arrival airport
If flight on correct date found
Search if seats/tickets available
If so flags seat as booked
Reduces number of seats/tickets available by one
e-ticket details are output
e-ticket details sent by travel agent to customer [6]

(b) Three from:


e.g.:
Theatres
Cinemas
Football clubs/stadia
Holiday booking company [3]

2 13 Four from:
Uses transaction/online processing for booking seats/tickets
The customer enters the number of seats/tickets they want.
The customer selects the performance they want.
The customer selects the time of the performance they want.
The customer selects the date of the performance they want.
Computer searches database to check for availability of seat.
Customer selects seat/ticket.
Customer confirms seat/ticket.
Seat marked as unavailable
Customer enters contact details.
Customer enters payment details.
Seat/ticket booked in customer’s name
booking reference is generated.
bar code/QR code/e-ticket generated
transaction completed [4]

3 17 To be marked as a level of response:

Level 3 (7–8 marks):


Candidates will address both the similarities and the differences between cheques and debit
cards and discuss/consider different benefits/drawbacks.

The issues raised will be justified. There will be a reasoned conclusion. The information will be
relevant, clear, organised and presented in a structured and coherent format.

Level 2 (4–6 marks):


Candidates will address both the similarities and the differences between cheques and debit
cards and discuss/consider different benefits/drawbacks although development of some of the
points will be limited to one side of the argument.

There may be a conclusion. For the most part the information will be relevant and presented in a
structured and coherent format.

Level 1 (1–3 marks):


Candidates may only address one side of the argument, and give basic benefits and
drawbacks. Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid content [8]

Mob. 0101 100 9465 128 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Online Booking Level 3

Question Answer Marks


4
14 To be marked as a level of response: 8

Level 3 (7–8 marks):


Candidates will give reasoned advantages and disadvantages. There will be a
reasoned conclusion. They will relate the answer to both advantages and
disadvantages. The information will be relevant, clear, organised and presented
in a structured and coherent format.

Level 2 (4–6 marks):


Candidates will expand on advantages/disadvantages relating the answer to both
advantages and disadvantages. Some of the points may be one sided. There
may be a conclusion. For the most part the information will be relevant and
presented in a structured and coherent format.

Level 1 (1–3 marks):


Candidates only list an advantage/disadvantage. Candidates only refer to either
advantages or disadvantages. Answers may be simplistic with little or no
relevance.

Level 0 (0 marks)
Response with no valid content

Answers may make reference to, for example:


Advantages
Simple to use as all have to do is hold the phone by the reader
No swiping of a card so less damage to the card
Faster method than swiping the card
No PIN
No signature
Stops shoulder surfing
As the credit card does not have to be physically present it cannot be stolen
The credit card number is not used in transactions
«stores do not gain access to names and numbers
No tracking of the data as there is no card
Several cards can be stored and selected
Everyone carries a phone nowadays
Doesn’t matter if you forget credit/debit card

Disadvantages
Need a compatible phone
Not available online
Stores need the reader
May be issues with connectivity as a phone is used
Hackers accessing the phone signal
Phones can run out of battery
There is a limit on how much can be paid
Older people may not have phones
More difficult for older people to use

Mob. 0101 100 9465 129 Eng: Mohamed Mamdouh


130
Unit 3 Application and Effect of ICT Libarary Level 1
1 5
Fewer books can be borrowed.

Libraries can stay open longer.


[1]
More information is more easily available to borrowers. 

More people work at the library.

Nobody borrows books any more.


[1]
The librarian is automatically notified when books are late. 

Mob. 0101 100 9465 131 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Libarary Level 2
1 8 (a) Three from:

The books database is searched to find the accession number


The fingerprint scan is converted into digital data patterns
The computer then maps points on the fingerprints and uses those points…
…to search for similar patterns in the (borrower) database.
Matching record is found
The membership number is retrieved
Record is checked to see if number of books allowed is not exceeded/are fines due?
The membership number is written to the file against the accession number in the books
database
The accession number is written against membership number in the borrower file. [3]

(b) Two from:

Accession number is compared with those on book file


Matching record is found
Record is flagged as returned/changed to returned
The accession number is deleted against membership number in the borrower file/borrower
is recorded as having borrowed one less book
Computer calculates if book has been returned overdue [2]

Question Answer Marks


2
6(a)
6( ny two from: 2
− Magnetic stripe
− RF / RFID
− Chip
− Bar code

6(b)
6( ny two from: 2
− Fingerprint / Thumbprint
− Retina scan
− Voice
− Hand print
− Iris scan
− Face scan / recognition

6(c) two matched pairs: 4


− Book file«
− «This consists of all data on the books in the library

− Borrowers file«
− «This contains all the details of the students

− Loans file«
− «This acts as a link between the book and borrowers file. It contains the
details of the date borrowed and return date

6(d) [date_borrowed] 2

1 mark for [date_borrowed]


1 mark for +14

Mob. 0101 100 9465 132 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Libarary Level 2

3 11(a) Direct data entry device Tick 3

Bar code reader 3


Magnetic Ink Character Reader
Magnetic stripe readers 3
Keyboard
Mouse
RFID chip reader 3

11(b) Six from: 6


Converts the image of the thumbprint into a code
Searches for the code in its database«
...until a matching record is found
...or error returned
Reads the number of books from the borrowers record/on loan
if less than 6 transaction continues«
...otherwise error message produced
Searches the books table for the book code data
...until a matching book record is found
...flag as book as being borrowed
...produces error message if no match
Updates the borrowers table
Updates the books table

Mob. 0101 100 9465 133 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Libarary Level 3

1 14 Six from:
Borrower:
Advantages:
Saves cost of travelling to the library
Saves time of travelling to library
More likely to be able to borrow a particular book/library has more copies
Will not be fined for going over borrowing period
Disadvantages:
Might not have finished reading book when it disappears
Have the expense of buying the correct hardware

Library:
Advantages:
Saves cost of salaries as some staff have been made redundant
Librarians will have more time to spend on other duties
Don’t have to worry about books not being returned
Disadvantages:
Will lose income from not collecting fines [6]

Mob. 0101 100 9465 134 Eng: Mohamed Mamdouh


135
Unit 3 Application and Effect of ICT Retail Level 3
1 16 Six from:
Advantages
Less danger of mugging
Don’t have to waste time travelling/queuing
Don’t have to spend money on travelling to shops
Greater choice of goods
Can shop when shops are closed
Easier to search and find what you are looking for
Comparison websites will find you the cheapest option
Goods may be cheaper as shops have less staff to pay/less premises to rent
Don’t have to pay car parking charges
Don’t have to pay for shopping bags
Vouchers/special deals are often only available online/online discounts

Disadvantages
Lack of socialising/social contacts
Hackers may intercept data and defraud customer
Deprived of personal touch
Cannot see/feel goods in reality
More vulnerable to phishing/pharming
Goods sometimes don’t arrive/substitute goods may be sent/take longer to arrive/may be
delivered to wrong address
Shipping charges
ISP costs/Possible high connection charges
Initial cost of equipment/phone line
Postal costs of returning items

One mark available for reasoned conclusion


Must have at least one advantage and disadvantage to gain full marks [6]

2 13 Five from:

Advantages:
Don’t have to spend money on travelling to shops
Goods may be cheaper as shops have less staff to pay/less premises to rent
Don’t have to pay car parking charges
Don’t have to pay for shopping bags
Vouchers/special deals are often only available online
Comparison websites will find you the cheapest option/can compare prices more easily

Disadvantages:
May have to pay delivery charges
Postal costs of returning items
Initial cost of equipment/phone line
ISP costs/Possible high connection charges

Must have at least one advantage and disadvantage to gain full marks.

One mark is available for a reasoned conclusion [5]

Mob. 0101 100 9465 136 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Retail Level 3
3 12 Six from:

Initial cost of hardware/software is expensive


Fewer staff needed – less spent on wages
Fewer shops needed – less spent on rates/rent/utilities
Potentially larger customer base
Need to retrain staff
Less customer loyalty/loss of customers/more difficult to sell other services/products due to lack
of personal touch
Costs of system maintenance
Greater costs due to more delivery staff/vans [6]

4 12 Eight from:
Advantages:
An online shop costs less to set up and run.
Reduced overheads in an online shop
Reduced cost on wages as less shop staff needed
Customers can be better targeted…
…for example: It’s also much cheaper, for example, to send a marketing message by email to
1000 customers than it is to send 1000 newsletters by post.
A local business can become nationwide or even international.
An online shop can be updated instantly and as often as you like…
…for example, to promote a ‘deal of the day’ on your front page, without the need for expensive
printed display material.
Can target products and services at specific groups based on buying data.
Business can be promoted through search engines.

Disadvantages:
In order for an online shop to work it needs constant development.
Shops need to understand tax and import/export issues if they become international.
Need to re-train staff to use the online system
The cost of setting up/maintain a website
Costly to re-train
Drop in customer loyalty therefore fewer customers
Need to pay more delivery drivers
Need to buy more delivery vehicles to deliver goods to customers

A mark can be awarded for a reasoned conclusion.


If one side of the argument, i.e. all benefits/drawbacks then 4 marks max.
If both sides have been addressed but without expansions/comparisons then 6 marks max. [8]

Mob. 0101 100 9465 137 Eng: Mohamed Mamdouh


138
Unit 3 Application and Effect of ICT Control System Level 1
1 2 Two from:
Motor
Light
Heater
Monitor
Printer
Graph plotter
LED display
LCD display
Buzzer [2]

2 5 Two from:
Control
Measuring
Spreadsheet [2]

3 1 (a) Three from:

Temperature sensor
Light sensor
Humidity sensor
Number pad [3]

(b) Three from:

Sprinkler
Heater
Light
Motor [3]

4 4
Modelling Control Measurement
Use
  

The maintaining of growing conditions in  [1]


a greenhouse

Simulating car driving  [1]

Monitoring the environment  [1]

Using what ifs  [1]

Mob. 0101 100 9465 139 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Control System Level 2
1 12 (a) Two from

Keypad to input required temperature


Sensor to input current temperature of the room [2]

(b) Four from:

Microprocessor stores required temperature as preset value


Compares temperature from sensor to pre-set temperature
If temperature is lower than preset value microprocessor sends a signal to turn heater on
If higher than preset value microprocessor sends a signal (to the actuator) to turn heater off
If values are equal microprocessor does nothing
Wait set period of time before looping [4]

2 11 (a) Four from:

Sensors are used to monitor patient’s vital signs


…such as temperature, blood pressure, pulse, sugar levels (2 required for mark)
Sensors send data/signals back to computer
ADC converts analogue signals from sensors…
…to digital so that computer can understand/read the data
Graphs are output
Inputs are compared to acceptable range of values
If higher/lower warning signal is triggered [4]

3 11 (b) Four from:

Readings can be taken more frequently


Nurses can get tired and forget to take readings/nurses are so busy they might not be able to
take readings regularly
Computer readings are more accurate/human errors are reduced
More than one variable can be measured at any one time
Results can be analysed automatically/Charts are produced automatically
Automatic warnings can be generated/faster to react
Nurses are free to do other tasks
Reduces chances of nurses being exposed to contagious diseases
Reduced cost of wage bill/fewer nurses will be needed [4]

4 18 Five from:

Microprocessor controlled devices do much of housework


Do not need to do many things manually
Do not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washed
Can leave their home to go shopping/work at any time of the day
Greater social interaction/more family time
More time to go out/more leisure time/more time to do other things/work
Are able to do other leisure activities when convenient to them
Can lead to unhealthy eating due to dependency on ready meals
Can lead to laziness/lack of fitness
Can encourage a healthy lifestyle because of smart fridges analysing food constituents
Microprocessor controlled burglar alarm provides a sense of security
Do not have to leave home to get fit
Manual household skills are lost/deskilling regarding household tasks [5]

Mob. 0101 100 9465 140 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Control System Level 2
5 8 (a) Two from:
Temperature sensor
Number pad
Remote control
Touch screen [2]

(b) Three from:


Microprocessor stores required temperature as preset value
Microprocessor receives temperature from sensor
Microprocessor compares temperature from sensor to pre-set temperature
If temperature is lower than preset value microprocessor sends a signal to the actuator…
…. to turn heater on
If higher than preset value microprocessor sends a signal to turn heater off [3]

6 15 (a) Sound – there might be other noises – e.g. roadworks, masking the sound of a car [1]

Light – Anybody could break the beam not just cars/direct sunlight may affect readings [1]

(b) Measurement is the monitoring of physical variables without the microprocessor taking action
[1]

Control is when the microprocessor takes action depending on sensor readings [1]

7 8 (a) Two from:


Temperature sensor
Light sensor
pH sensor
O2 sensor
CO2 sensor [2]

(b) Two from:


There are no output control devices
The computer is not acting as a result of the input
The output has no effect on the input [2]
(c) Spreadsheet/database [1]

(d) DTP/Word processing/Presentation/web authoring software/database [1]

(e) Four from:


Sensors are placed in the river
The sensors feedback/sends data to computer
Data is converted from Analogue to Digital/sent through an ADC
Graphs are automatically produced by computer…
Graphs/charts are plotted against time [4]

Mob. 0101 100 9465 141 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Control System Level 2

8 14 Three from:
Can monitor continuously/readings can be taken more frequently
Nurses can get tired and forget to take readings/nurses are so busy they might not be able to
take readings regularly
Computer readings are more accurate/human errors are reduced/Computers are more accurate
More than one variable can be measured at any one time
Results/data can be analysed automatically/Charts are produced automatically
Automatic warnings can be generated/faster to react
Nurses are free to do other tasks
Reduces chances of nurses being exposed to contagious diseases
Reduced cost of wage bill [3]

9 7 (a) Temperature [1]


Time [1]

(b) Five from:


Microprocessor switches heater on
Microprocessor receives data from temperature sensor
Temperature of oven is compared with pre-set value by microprocessor
If higher microprocessor switches heater off
If lower microprocessor leaves heater on
Time is constantly monitored by microprocessor
Time elapsed/finish time is compared to pre-set time by microprocessor
If equal then heater is switched off by microprocessor…
…microprocessor causes buzzer to sound [5]

10 7 (a)

Pressure sensor  [1]

Oxygen level sensor

Wind speed sensor

Sound sensor  [1]

Body sensor

Moisture sensor

Infra-red sensor  [1]

Touch sensor

(b) Five from:

Microprocessor checks input from the user is authentic


Microprocessor continually monitors sensors.

If infra-red sensor reading changes


If pressure greater than pre-set value...
If sound greater than pre-set value...
Microprocessor sends signal to sound alarm
Microprocessor sends signal to flashing light/house lights.
Microprocessor automatically sends message/calls/texts owner [5]

Mob. 0101 100 9465 142 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Control System Level 2

11 7 (a)
Pressure sensor  [1]

Height sensor

Wind speed sensor

Sound sensor

Temperature sensor  [1]

Moisture sensor  [1]

Cold sensor

Detergent sensor

(b) Five from:

Microprocessor stores pre-set values


Reads data from sensors
Microprocessor compares readings with pre-set value
If temperature is at or above the pre-set value microprocessor sends a signal to turn the
heater off
If temperature is below pre-set value microprocessor sends a signal to turn the heater on
At start of cycle, microprocessor sends a signal to open valve to let in water
If water level reached microprocessor sends a signal to switch off valve
If pressure is above preset value microprocessor sends a signal to sound alarm
Microprocessor checks pressure reading and calculates the amount of water to use [5]

Mob. 0101 100 9465 143 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Control System Level 2
12 7 (a) Temperature [1]
Light [1]

(b) Five from:


– Light source placed one side of/outside the beaker
– Light sensor placed other side of/inside the beaker
– Temperature sensor placed inside the beaker
– Sensors connected to the ADC/computer
– Heat source placed below beaker until colour change occurs
– The sensors feed back data to microprocessor/computer
– Data is converted from Analogue to Digital
– Readings are printed out/displayed/ Graphs are automatically produced by computer…
– ...light plotted against temperature/time [5]

13 12 Five from:

Computer checks the input from the user is authentic.


Computer is programmed with pre-set values.
Computer reads data from the sensors.
If the light sensor is activated…
If the contact switch is activated…
If pressure greater than pre-set value…
If sound greater than pre-set value…
If temperature greater than pre-set value…
If the movement sensor is activated…
Computer sends signal to sound the alarm.
Computer sends signal automatically to the police station/alarm company/security company.
Computer sends signal the flashing lights/house lights.
Computer sends message/text/calls automatically to the owner. [5]

Mob. 0101 100 9465 144 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Control System Level 2

14 Question Answer Marks

7(a)
a) proximit sensor 1

7(b) Any three from: 3


− Sat nav/GPS to help the driver travel between two points
− Auto-parking systems
− Automatic windscreen wipers that operate automatically
− Cruise control
− Lane drift systems
− Automatic braking systems/ABS
− Tyre deflation alert
− Automatic lights/lights that shine round corners
− Frost warning system
− Fuel level indicator
− Hand-brake alert
− Airbag systems
− Automatic maintenance alert
− Expert diagnostic systems
− Auto-gear change systems

7(c) Advantages 6

Max four from:


− The journey becomes a lot safer as the driver uses the devices to help, whilst they
focus on driving
− If the driver falls asleep then the car remains in control
− If the temperature is colder outside then the windscreen clears quickly
− The ABS stops the driver sliding on ice
− Automatic (full beam) lights stop other drivers getting dazzled
− Automatic lights (full beam) shows the road ahead in different conditions
− Cost of repair reduced as it tells the driver of problems immediately.
− The GPS can guide the driver on shortest/quickest route

Disadvantages
Max four from:
− The driver relies too heavily on the device and can become over reliant/You are
legally responsible for the car
− The device may fail and put the driver/pedestrians in danger
− Sometimes the device is more of a hindrance than a help e.g. parking sensors in
traffic jams
− Can increase the price of the car
− Very difficult for the driver to repair the car himself
− GPS can take the driver a long way out of his way when trying to avoid hold ups
− The driver can believe the GPS and drive into the river/narrow road.
− Air bags can accidentally trigger is there is a small collision/they have a life span
− Excessive number of devices/devices left activated can lead to battery drain

Allow one mark can be awarded for a reasoned conclusion.

Mob. 0101 100 9465 145 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Control System Level 2

Question Answer Marks


15
14(a) Five from: 5
The data from the sensor is compared to the pre-set value
The pre-set value is set to show the minimum distance of the worker
If the values are the same/lower«
«the microprocessor sends a signal«
«to the actuator to stop the motor/robot
The microprocessor starts a timer
After a short while the microprocessor restarts the robot
The microprocessor stops the timer
If the values are different/higher
«the microprocessor does nothing/robot keeps moving
The process is continuous

14(b) Any three advantages: 4


Overall wage bill is reduced as there are fewer workers
Productivity is higher/the robot can work all day long therefore is more
efficient
It has a set path/route to follow which means that staff know when it is due
GPS can be used to show where it is in the building
Less expensive in the long run/doesn’t get paid
Less mistakes are made/more accurate
Allow humans to do more skilled work
Greater consistency
Work 24/7/without breaks

Any three disadvantages:


The cost of buying/set up robot is expensive
It can only carry out one task
Stairs can be a problem
Payload size can be an issue
Expensive to maintain (only if Less expensive in the long run
has not been given)
Replace labour, leads to increased redundancy payments

Maximum 4 marks.

Mob. 0101 100 9465 146 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Control System Level 2

Question Answer Marks


16
15(a) Measurement Expert 6
Control (only) systems
(3) (3) (3)
Computerised glasshouse 3
Burglar alarm 3
Chess games 3
Automatic washing machines 3
Recording weather conditions 3
Monitoring air pollution 3

15(b) An analogue to digital convertor is used to convert analogue data to digital 2


data
Data from the sensor is input in analogue form
Computers only understand digital data

15(c) Knowledge base 4


Inference engine
Rules base
User interface

17 6 Four from:

Microprocessor controlled devices do much of the housework


Do not need to do many things manually
Do not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washed
Can leave their home to go shopping/work at any time of the day
Greater social interaction/more family time
More time to go out/more leisure time/more time to do other things/work
Are able to do other leisure activities when convenient to them
Can encourage a healthy lifestyle because of smart fridges analysing food constituents
Do not have to leave home to get fit [4]

Mob. 0101 100 9465 147 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Control System Level 3

1 17 Five from:
Microprocessor is programmed with pre-set values
Microprocessor starts cycle at specified time
Microprocessor reads data from sensors
Checks contact switch on door is closed
If it isn’t microprocessor will not start the cycle/if it is microprocessor starts cycle
Microprocessor compares sensor readings with pre-set value
If temperature is above pre-set value, microprocessor switches off heater
If temperature is below pre-set value, microprocessor switches on heater
If pressure is greater than preset value, microprocessor sounds alarm
Microprocessor checks pressure reading and calculates the amount of water to use
At start of cycle, microprocessor opens valve to let in water
If water level reached, microprocessor switches off valve
Microprocessor ends cycle at specified time [5]

2 6 Six from

Microprocessor stores required temperature as preset value


Microprocessor stores cooking time/start time as preset value
End times as preset values
Microprocessor subtracts cooking time from end time
Microprocessor compares the result with current time
If the current time and the start/calculated time are the same microprocessor switches on heater
Microprocessor compares temperature from sensor to pre-set temperature
If temperature is lower than preset value microprocessor sends a signal to actuators…
…to turn heater on
If higher than preset value microprocessor sends a signal to actuators…
…to turn heater off
Microprocessor compares current time with end time/start time preset value
If current time is less than end time preset value then cycle continues else…
…microprocessor sounds buzzer/beeper [6]

Mob. 0101 100 9465 148 Eng: Mohamed Mamdouh


149
Unit 3 Application and Effect of ICT Measurement System Level 1
1 5 Three from:

Temperature
Blood pressure
Glucose level
Rate of respiration
Level of oxygen in the patient’s blood [3]

2 5
Measurement
Control
only

Automatic cookers 

Weather stations 

Microwave ovens 

Automatic washing machines 

[4]

3 13
Patients are always cured.

Patient records can be sorted into order more easily.  [1]

Doctors can find patient records more quickly.  [1]

Patients’ medicines are never lost.

Fewer doctors are needed.

Nurses don’t have to be paid as much.

Takes up less filing space  [1]

Mob. 0101 100 9465 150 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Measurement System Level 2

1 10 (a) Three from:


Humidity
Temperature
Pressure
(Sun)light
Rainfall [3]

(b) (i) Sensor measures analogue data


Computer works in digital [1]

(ii) Analogue to digital converter [1]

(c) Three from:


Computer can take readings during holidays
Computer (readings) are more accurate
Students might forget to take readings/readings can be taken at regular intervals
Readings can be taken more frequently
Readings can be taken any time of day or night
Can produce graphs more quickly/automatically [3]

2 5 Three from:
Sensors take more accurate readings
Possibly less danger to students
Students could lose concentration and forget taking some readings
More readings can be taken in a short period of time
Results can be automatically/more quickly produced
Graphs are automatically produced [3]

3 15 (a) Three from:


Microprocessor controlled devices do much of housework
Do not need to do many things manually
Do not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washed
Can leave their home to go shopping/work at any time of the day
Greater social interaction/more family time
More time to go out/more leisure time/more time to do other things/work
Are able to do other leisure activities when convenient to them
Microprocessor controlled burglar alarm provides a sense of security
Do not have to leave home to get fit
Can encourage a healthy lifestyle because of smart fridges analyzing food constituents [3]

(b) Three from:


Can lead to unhealthy eating due to dependency on ready meals
Can lead to laziness/lack of fitness
Manual household skills are lost
These may malfunction and, because the individual has left the device unattended, this can
lead to fires/damage to the house [3]

Mob. 0101 100 9465 151 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Measurement System Level 2

4 7 (a) Three from:

Temperature sensor
Light sensor
pH sensor
O2 sensor
CO2 sensor [3]
(b) Two from:

Need to know values in unpolluted part of river


Need to know values in polluted part of river
Need to place sensors in river above factory
Need to place sensors in river below factory [2]

(c) Five from:

The sensors feed back/send data to microprocessor/computer


Data is converted from Analogue to Digital/sent through an ADC
Readings from above the factory are compared with those from below factory…
...by the computer/microprocessor
Differences/results are printed out
Graphs are automatically produced by computer showing values from below and above
factory…
...plotted against time
Process is continuous [5]

5 9 (a) Temperature [1]


Time [1]

(b) Five from:

The sensor feeds back data to computer


Data is converted from Analogue to Digital
Readings are stored in a spreadsheet/software package
Graphs are automatically produced by computer…
...plotted against time
Calculations performed on spreadsheet to show rate of cooling
Graphs examined to see general overview of rate of cooling [5]

Mob. 0101 100 9465 152 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Measurement System Level 2

6 11 (a) One from:


Moisture/humidity (sensor)
Temperature (sensor)
Wind Speed (sensor)
Wind direction (sensor)
Light (sensor) [1]

(b) Four from:


Data is read by the sensors.
The data is converted to digital data/using the ADC.
The data is sent to the microprocessor/computer (in the ground base unit)…
…using a satellite link.
…by radio waves
Graphs/results are automatically produced by computer.
Graphs are plotted against time.
Data is saved in the computer for later use. [4]

(c) Three from:


Cheaper sending up a weather balloon than using an aircraft due to fuel for example.
Fewer errors as the aircraft movement/heat could affect the data from the sensors.
If the air balloon is checking wind speed it is floating/constant speed therefore more
accurate.
Safer, in the event of severe/extreme weather conditions due to the weather balloon not
being manned.
The weather balloon will allow weather to be monitored in a fixed location. [3]

Question Answer Marks


7
10(a) Any three from: 3
− Cheaper than building the real thing
− Quicker to see results rather than building it
− Safer than building the real thing
− Easier to change variables in the model/can use what ifs

10(b) Any four from: 4


− The sensors are out in the bay therefore there is a faster response to floods
− Safer as flood watchers are not put in danger from rising waters
− Data collected is more accurate
− The data readings can be taken more frequently
− Data collection can be continuous
− The town's people can be alerted faster of the danger
− Predictions can be made from the data easily

Question Answer Marks

10(c) five from: 5


− The microprocessor reads the data from the sensor
− The microprocessor has a set of pre-set values stored
− The microprocessor compares the readings from the sensors with the pre-set
values
− If higher the microprocessor sends a signal«
− «to the actuator to close the barrier
− If lower the microprocessor sends a signal«
− «to the actuator to open the barrier

Mob. 0101 100 9465 153 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Measurement System Level 2

8 Two from:

Can lead to unhealthy eating due to dependency on ready meals


Can lead to laziness
Lack of fitness/exercise
Manual household skills are lost [2]

Mob. 0101 100 9465 154 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Measurement System Level 3

1 14 Four from:
Microprocessor controlled devices do much of housework
Do not need to do many things manually
Do not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washed
Can leave their home to go shopping/work at any time of the day
Greater social interaction/more family time
More time to go out/more leisure time/more time to do other things/work
Are able to do other leisure activities when convenient to them
Can lead to unhealthy eating due to dependency on ready meals
Can lead to laziness/lack of fitness
Can encourage a healthy lifestyle because of smart fridges analyzing food constituents
Microprocessor controlled burglar alarm provides a sense of security
Do not have to leave home to get fit
Manual household skills are lost [4]

2 17 Any six from:


Positive:
– microprocessor controlled devices do much of the housework
– do not need to do many things manually
– do not need to be in the house when food is cooking
– do not need to be in the house when clothes are being washed
– can leave their home to go shopping/work at any time of the day
– greater social interaction/more family time
– more time to go out/more leisure time/more time to do other things/work
– are able to do other leisure activities when convenient to them
– can encourage a healthy lifestyle because of smart fridges analysing food constituents
– do not have to leave home to get fit

Negative
– can lead to unhealthy eating due to dependency on ready meals
– can lead to laziness/lack of fitness
– microprocessor controlled burglar alarm provides a sense of security
– manual household skills are lost

one mark is available for a reasoned conclusion [6]

Mob. 0101 100 9465 155 Eng: Mohamed Mamdouh


156
Unit 3 Application and Effect of ICT ANPR Level 2

1 10 (a) The car registration number [1]

(b) Two from:

Car owner's name


Car driver's name
Height of vehicle
Colour of vehicle
Credit/debit card details
Make of car/model of car
Length of vehicle [2]

(c) Two from:

As the car arrives a camera takes a snapshot of the number plate as an image
Stores it in a file
Software identifies where number plate is in image and crops that part of the image
The OCR software converts the registration number to numbers/letters [2]

(d) Three from:

The number plate is compared…


…with those stored on the customer file
When a matching record is found
The name of the customer is read
The name is merged into the message
And a signal is sent to screen to display the appropriate part of the message [3]

2 17 Four from:

the system has cameras/CCTV


The images and the text from the number plate are captured by the camera
Infrared lighting is used so it can be used in all weathers/at night
The system uses optical character recognition
The licence/number plate is checked against its database to find the car owner’s details [4]

Mob. 0101 100 9465 157 Eng: Mohamed Mamdouh


158
Unit 3 Application and Effect of ICT Employment Level 1

1 4 (a) job sharing [1]

(b) part-time working [1]

(c) working flexible hours [1]

(d) working compressed hours [1]

Mob. 0101 100 9465 159 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Employment Level 2

1 7 (a) Two from:

Payroll workers
Typing pool workers
Car production workers
Checkout operators
Bank workers [2]

(b) Two from:

Website designers
Computer programmers
Delivery drivers in retail stores
Computer maintenance staff
Robot maintenance staff [2]

Question Answer Marks


2
13(a) 3
Job description tick
(✓)
Car production workers
Delivery drivers ✓
Payroll workers
Programmers ✓
Typists
Website designers ✓

13(b) Compressed hours 4

Any two from:


− The worker completes the normal working hours per week«
− «but works for fewer days
− For example, a 40-hour week compressed into 4 days not 5

Flexible hours

Any two from:


− Workers complete the same number of hours over a working week«
− «but can choose when to start and end in agreement with the manager
− Allows for workers to complete the school run or miss rush hour

Question Answer Marks


3
5 Any three from: 3
Part time working
Job-sharing
Compressed hours
Flexible hours/flexi-time

Mob. 0101 100 9465 160 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Employment Level 3
1 10 Five from:

Max four from:


e.g.
Fewer secretaries needed – computers provide much of the secretarial expertise once provided
by a secretary
Fewer general office staff needed – workload has been reduced by the storage capacity of
computers
Computerised accounting packages – fewer accountants needed
Stock control used to require specialists but is now done through computerised checkout systems
Security systems – computerised security gates have caused a reduction in the number of people
employed for store security
Automated return and issue systems in libraries have led to a number of library staff being made
redundant
Production lines are now operated by robots reducing the number of jobs available to production
line workers

Max four from:


Increase in employment of ICT systems/network maintenance workers
Increase in employment of robot maintenance workers
Increase in employment of programmers
Increase in employment of web designers
Increase in employment of computer operators
Increase in employment of van drivers by online retail industries
More workers needed to manufacture robots [5 max]

Mob. 0101 100 9465 161 Eng: Mohamed Mamdouh


162
Unit 3 Application and Effect of ICT Robotics Level 1
1 9
True Fa

Robots never take breaks. 

More workers are employed.

Faster cars are produced.

Standard of the product is more consistent. 

Robots never break down.

Robots don’t need paying. 

No humans are needed.

Greater productivity.  [4]

2 10

Redundancy payments to former workers are expensive  [1]

The cars produced are not of a consistent standard

Robots are unable to think for themselves  [1]

Robots do not go on strike

Robots are expensive to buy  [1]

Mistakes are never made.

Maintaining robots costs money  [1]

Car workers have to be paid more

Mob. 0101 100 9465 163 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Robotics Level 1
3 9


Once bought robots do not have to be paid

They have to do less hazardous jobs 

They don’t need to lift heavy loads 

They can become deskilled

It can lead to unemployment

They work in a cleaner/healthier working environment 

They can work whenever they want

They get a massive pay rise

[3]

4 14 1 mark for each correct tick

Robots produce the same standard every time. 

Robots don’t cost very much to buy.

Robots don’t need programming to perform a task.

Robots are more accurate. 

Workers are no longer employed.

Robots don’t take breaks. 

Robots can think for themselves.

Robots never make mistakes.


[3]

Mob. 0101 100 9465 164 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Robotics Level 2
1 9 Three from:

Car production is more consistent/robots produce the same standard every time
Cost – once bought they do not have to be paid/fewer employees so lower costs/don’t have to
pay robots wages/lower running costs
No industrial disputes
Greater productivity
Greater accuracy/robots are more accurate
Can work in hazardous/extreme conditions/can lift heavier loads
Robots don’t take breaks/can work 24 hours a day 7 days a week/can work continuously [3]

11 Five from:
2 Anybody can set up a website (claiming to be factually accurate) so information is not necessarily
reliable/accurate
Some commercial sites are bound to be biased
If site has excessive advertising it could be unreliable
If the advertising is related only to its own products it could be unreliable
Can use the final part of a URL to identify reliability
.ac, .gov, .org are usually fairly reliable
Compare information from reliable sites or reliable/authenticated text books (to see if it is reliable)
See if responsible bodies have endorsed the site
Does it have links to other reliable sites/unreliable sites?
If site has testimonials it is likely to be reliable
If the date of the last update was a long time ago it is likely to be unreliable
If the author’s credentials are good it is likely to be reliable [5]

3 19 Three from:

Putting wheels on cars


Painting car bodies
Welding parts on a car body
Carrying car windscreens/doors
Moving goods in an automatic warehouse
Placing engine block into body
Installing transmission system [3]

Mob. 0101 100 9465 165 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Robotics Level 2

4 14 (a) For example


Video camera to inspect the finished product [1]
Light sensors used to detect position of the car [1]
Pressure sensor to make sure the car part is gripped correctly [1]

(b) Three from:

Running costs are cheaper than paying humans a wage.


Robots can operate continuously.
Cars are built to a more consistent standard.
Robots are more accurate.
Can be used in hazardous conditions.
Greater productivity [3]

(c) Three from:

If a change is made in the manufacturing process the robot needs to be re-programmed.


If a robot makes a mistake it will continue to make the same mistake.
Expensive to set up/maintain
Robots are not capable of performing tasks autonomously without guidance from
humans/they cannot think for themselves.
If they break down then they are difficult/impossible to repair.
If the robot breaks down the whole process stops.
The abilities of robots are suitable only for simple activities in which no major difficulties are
met. [3]

Question Answer Marks


5
16(a) Any three from: 3
− Safer as humans could be injured in rock falls
− Easier to replace a robot rather than train a miner
− Robots do not require wages hence it is cheaper in the long run
− Robots work 24/7 / continuously
− Robots can work in hazardous conditions
− Robots produce greater productivity

16(b) Any two from: 2


− Any changes needed to the mining equipment/rock type requires a
reprogramming of the system
− Reprogramming takes time
− Reprogramming can increase the cost
− Setting up the robot in the mine will be dangerous for humans
− Expensive to maintain/repair
− Initial cost of the robot is expensive

Mob. 0101 100 9465 166 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Robotics Level 2

6 Question Answer Marks

5 4
Tripping over loose wires.

Heavy equipment falling


Health off tables and injuring
people.

Safety Clicking a mouse


repetitively causing RSI.

Overloading sockets
causing fire.

7 Question Answer Marks

7(a) five from: 7


Advantages
Robots can work in environments where humans would have difficulty i.e.
cooler and less light
Can work without breaks/non-stop/can work 24/7
Less expensive in the long run
Overall wage bill is reduced as there are fewer workers
Productivity is higher
Less mistakes are made/more accurate
Allow humans to do more skilled work than picking the tablets
Greater consistency

Any four from:


Disadvantages
Expensive to maintain (only if Less expensive in the long run
has not been given)
Expensive to purchase/set up
Replace labour, leads to increased redundancy payments
If the bar code damaged the human would read the number but robot cannot
think for itself

A mark can be awarded for a reasoned conclusion

Maximum 7 marks.

7(b) six from: 6


Can be read at a greater distance
Don’t need to be positioned in line of sight
Can be updated easier
Read at faster rate
More reusable/more robust
Larger storage capacity
Greater security
Cannot misread if RFID grouped together

Mob. 0101 100 9465 167 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Robotics Level 3
1 18 Seven from:

Car production is more consistent/robots produce the same standard every time
Cost – once bought they do not have to be paid/fewer employees so lower costs/don’t have to
pay robots wages/lower running costs
No industrial disputes
Greater productivity
Greater accuracy/robots are more accurate
Can work in hazardous/extreme conditions/can lift heavier loads
Robots don’t take breaks/can work 24 hours a day 7 days a week/can work continuously
Robots have to be reprogrammed when there is a small change/can’t think for themselves
Robots need programming in order to be adaptable
Expensive start up costs – redundancy payments
Expensive start up costs – have to spend money on training workers to use robots
Expensive start up costs – buying of robots/programming of robots
Computer crash would halt production
Maintenance/repair costs can be expensive [7]

2 16 Five from:

Advantages
Safer environment
Don’t need to lift heavy loads/Fewer manual tasks to do
Cleaner/healthier working environment
Can lead to retraining to improve skills
More technical jobs available

Disadvantages
Can lead to unemployment
Deskilling can occur

One mark is available for a reasoned conclusion [5]

Mob. 0101 100 9465 168 Eng: Mohamed Mamdouh


169
Unit 3 Application and Effect of ICT Emerging Technology Level 1

1 Question Answer Marks

2(a) a 3D printer 1

2(b) artific intelligence 1

2(c
2(c) robot 1

2(d) biometr 1

Mob. 0101 100 9465 170 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Emerging Technology Level 2

1 9 (a) Two from:


Wand or joystick
Treadmill
Pressure mats
Data gloves
Headset/head mounted displays/Head mounted device(HMD)
Goggles
Steering/gaming wheels/consoles
Pedals
Paddles
Cameras
Motion sensors [2]

(b) Two from, for example:


Virtual museums
Virtual theme parks
Design of sports clothing
Flight simulation
Battlefield/combat simulation
Virtual tours
Medical training
Walkthroughs
Driving simulation

Any reasonable answers [2]

Question Answer Marks


2
3(a) Two from: 2
Create prosthetics
Create dental implants
Create customised tablets
Create skeletal model
Create blood vessels
Create anatomical models for surgery

3(b) Two from: 2


Create MRI scan images
Create ultrasound images
Create 3D views of our internal organs

Mob. 0101 100 9465 171 Eng: Mohamed Mamdouh


172
Unit 3 Application and Effect of ICT Navigation Level 2

1 7 (a) Any three from:


– Global Positioning System
– space-based navigation system
– typically four satellites must be visible to the receiver
– calculates the distance from a receiver to the satellite
– calculates the position of the receiver [3]

(b) Any two from:


– used in cars to calculate routes
– used by walkers to locate position on hills/mountains
– used by runners to calculate distance run
– used by farmers for tractor navigation/soil evaluation/livestock control/yield monitoring
– used in satellite navigation systems for ships
– used in tracking aircraft [2]

2 7 Any four from:

Destination B is input by driver


Position of motor vehicle at A is calculated using GPS…
…using data transmitted from 3/4 satellites
Algorithm calculates shortest distance from A to B (going through C)
Algorithm calculates distance from A to B not going through C
Makes allowances for traffic in town C
Takes into account average road speeds…
…using traffic/speed sensors on road
Takes into account regular updates of traffic conditions
Takes into account max. speed on the road/type of road [4]

Mob. 0101 100 9465 173 Eng: Mohamed Mamdouh


174
Unit 3 Application and Effect of ICT Health & Safety Level 1
1 10


Back ache from bad posture

Electrocution from touching bare wires  [1]

Fire from overloading electric sockets  [1]

Headaches from staring at the screen continuously

Injury caused by tripping over trailing wires  [1]

RSI in the fingers

2 8
Electrocution from touching bare wires

Fire from overheating of equipment

Fire from overloading of sockets

Neck pain due to bad positioning of the screen  [1]

RSI due to continuous typing  [1]

Sight problems from staring at the screen continuously  [1]

3 3
Look away from the screen from time to time  [1]

Use a keyboard instead of a mouse

Position your chair so that you are looking straight at the screen.  [1]

Work without a break.

Keep the screen as bright as you can

Grip the mouse tightly

Mob. 0101 100 9465 175 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Health & Safety Level 1

4 Question Answer Marks

5 4
Tripping over loose wires.

Heavy equipment falling


Health off tables and injuring
people.

Safety Clicking a mouse


repetitively causing RSI.

Overloading sockets
causing fire.

Question Answer Marks


5
13 Prolonged use of the keyboard 6
RSI/carpal tunnel syndrome

Any one from:


Use a wrist rest
Regular breaks to relax the hands
Stretching exercises
Use of an ergonomically designed keyboard

Looking at a monitor for a long period of time


Eye strain/headache/dry eyes

Any one from:


Resting the eyes by looking in the distance
Cutting down on glare
Making sure the screen is at eye level
Use of blue screen technology
Use of flat screen technology

Sitting too long in one position


Back problems/DVT

Any one from:


Foot rest
Taking breaks
Ergonomic/adjustable chair

Mob. 0101 100 9465 176 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Health & Safety Level 1

Question Answer Marks


6
6 Image Safety issues Minimise the risk 8

Tripping over trailing Any one from:


wires/cables Use covered cable
runs
Tie cables to wall
Cover cables with
carpet
Use wireless
Organise wires
Electrocution from Any one from:
spilling drinks Do not take
drinks/food into
computer room
Keyboard covers

Fire from overloaded Any one from:


sockets One plug per
socket/reduce the
load on the socket
Use of RCB
Fire from Any one from:
overheating Use of CO2 fire
extinguishers
Fans and cooling
from open
windows/good
ventilation

Mob. 0101 100 9465 177 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Health & Safety Level 2
1 18 Two problems from:
Headaches
Eyestrain
Backache

Two matching methods from:


Use anti-glare screen (headaches/eyestrain)
Take regular breaks (all)
Use straight backed chair/ergonomic/maintain good posture (backache) [4]

2 17 Three matched pairs from:

Headaches/eyestrain
From staring at screen continuously

RSI in fingers
From continual typing/repetitive clicking of mouse

RSI in wrists
From repetitive clicking of mouse/continual typing

Backache
From sitting in same position all day [6]

3 16 (a) 1 mark for each correct answer


physical safety is the need to prevent accidents with computers
e-safety is the need to take sensible precautions when using the internet [2]

(b) Any three from:


– only use websites recommended by teachers
– only use a student friendly search engine
– only email people already known
– think before opening an email from an unknown person
– never email the school’s name or a picture in school uniform
– know how to block and report unwanted users in chat rooms
– never give out any personal information online
– never arrange to meet anyone alone
– always tell an adult first and meet in a public place
– never use real name when playing games online [3]

Mob. 0101 100 9465 178 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Health & Safety Level 2

4 10 Matched pairs:
Eye problems/strain
Take regular breaks/use no-flicker screens/LCD/TFT screens/have eyes tested
regularly/turn the brightness down/use blue screen/screen filters/blue glasses
Back pain
Use ergonomic chairs/use foot rests/regular breaks/sit with good posture/height
adjustable chairs
RSI/finger pains
Ergonomic keyboards/regular breaks/less use of mouse/use trackerballs/wrist rest
RSI/wrist pains
Hands-free/less use of the mobile phone/wrist rest
Headaches
Anti-glare screens/matt finish screens/regular breaks/ use no-flicker screens/LCD/TFT
screens/have eyes tested regularly/turn the brightness down/use blue screen/screen
filters/blue glasses
Deep Vein Thrombosis (DVT)
Use foot rests/standing up
Neck pain
Regular breaks/good posture/document holder
Hearing loss/damage
Turn your headphone volume down [6]

Mob. 0101 100 9465 179 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Health & Safety Level 3

1 7 Safety issues are usually caused by accidents [1]


Health issues are those caused by continuous use of computers [1]

Max four from:

Health issues are caused by-


Max three from:
Bad posture
Incorrect positioning of equipment
Not taking regular breaks
Continuously staring at a monitor
Repetitive clicking/typing

Safety issues are caused by –


Max three from:
Having trailing wires
Overloading sockets
Allowing drinks near equipment
Placing heavy equipment in an unsafe position on a table/desk [4]

Question Answer Marks


2
15 Advantages 6
Max four marks:
− If the screen is 90 degrees to the window it reduces the glare/eye strain
− If you use a screen filter/blue glasses eye strain is reduced
− If LCD/TFT screens are used then eye strain is reduced
− If my eye is level with the top of the screen it will reduce eye strain/neck ache
− If I take breaks from excessive clicking on the mouse/keyboard this reduces
RSI
− Using voice activated systems reduces RSI
− If I use a wrist rest/an ergonomic mouse it will reduce RSI
− If I use an ergonomic chair it will reduce back ache
− If I do not use the computer for long periods of time this will reduce
− RSI/back ache/ eye strain/Carpel syndrome/Cubital syndrome/Neck pain/DVT

Disadvantages
Max four marks:
− Turning the screen can reduce your ability to see clearly on the screen
− Laptops can be difficult to ensure the screen is 90 degrees as the whole unit
needs to be moved
− The cost of safety equipment can be expensive
− Using voice activated systems can be prone to many errors which may
increase RSI correcting them
− Users can become over-reliant on equipment
− With laptops/screens it can be difficult to position it so the eye level is at the
top of the screen
− Taking breaks every hour can increase the work time

A mark can be awarded for a reasoned conclusion

Mob. 0101 100 9465 180 Eng: Mohamed Mamdouh


Unit 3 Application and Effect of ICT Health & Safety Level 3

Question Answer Mark


3
10(a) Max 3 marks for the problems 6
Max 3 marks for the strategies of solving the associated problems

for example:

using the computer for a long period of time can affect my eyes/cause
headaches...
...take regular breaks to help with eye strain/headaches

hunching over the computer for a long period of time gives back ache/neck
ache...
...Using an ergonomic chair could stop this

Typing for a long period of time or by resting wrists on the table gives RSI...
...therefore a wrist rest/ergonomic keyboard is needed to reduce this.

Eye strain can be caused by looking at the screen too long«


«this is solved by placing a screen filter/using TFT technology

10(b) Any three matched pairs, for example: 6


− Tripping over loose wires«
− «tie them to the walls or under carpet / use cable runs / use wireless

− Heavy equipment falling«


− «sturdy tables needed / heavy equipment placed in centre of table

− Electrocution caused by spilt drinks / food«


− «do not take drinks to computer

− Fire from overloaded sockets«


− «use CO2 fire extinguisher
− ...don’t use 4 way adapters
− «keep the computer room well ventilated

Mob. 0101 100 9465 181 Eng: Mohamed Mamdouh


182
183
Unit 4 Software Life Cycle Analysis Level 2

1 14 (a) Four from:

Users of the current system will be interviewed


Users of the current system will be asked to complete questionnaires
Users of the current system will be observed using the system
Existing documents will be examined
Management will be interviewed
Management will be asked to complete questionnaires [4]
(b) Four from:

Inputs of the current system


Outputs from the current system
Processing in the current system
Problems/limitations with the existing system/improvements required
The user requirements
The information requirements [4]

2 13 (a) Three matched pairs:

Interview
Manager

Questionnaire
Drivers

Observation
Secretaries [6]
(b) Three from:

Data type for each field


Appropriate field names
Validation rules
Field lengths
Field descriptions [3]

Mob. 0101 100 9465 184 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Analysis Level 2

3 16 Matched sections

Interview

Advantage
The user is more open and honest with the answers
Questions can be added to/extended
Questions can be modified
Can see body language/facial expressions

Disadvantage
Time consuming to complete all the interviews
Expensive due to analyst’s time
Not anonymous
Can give answers that they think the interviewer wants
May not be available at the time the analyst is available

Questionnaire

Advantage
Faster to complete all questionnaires
Cheaper to produce questionnaires than pay/employ an interviewer
Individuals can remain anonymous therefore they are more truthful.
More people can answer the questionnaire than can be interviewed.
They can fill it in in their own time.

Disadvantage
Tend not to be popular with users
Too inflexible cannot ask follow up questions
Users tend to exaggerate their responses as they are anonymous.
As it’s anonymous people may not take it seriously.
Cannot expand on their answers/limited in their responses

Examining documents of the existing system

Advantage
Information can be obtained which is not possible using other methods.
Can see the scale of the problem easily

Disadvantage
Time consuming to go through the documents
Expensive method as the analyst will have to spend time going through documents.

Observation

Advantage
Reliable data
Better overall view of the whole system/all the inputs and outputs of the system
Inexpensive method as the analyst is only watching the workers.

Disadvantage
Hawthorne effect (describe) [6]

Mob. 0101 100 9465 185 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Analysis Level 2

Question Answer Marks


4
12(a) Observation 3
Questionnaire
Examination of documents

12(b) Any two matched pairs: 4


− The interviewee may be uneasy with the questioning«
− «.as it is not anonymous
− Time consuming to interview all the users«
− «the interviewers are carried out one at a time
− Both the interviewee and the interviewer have to be free at the same time«
− «which can cause time problems
− May be a language problem«
− «this increases the time explaining all sections
− May give an answer they think the interviewer is trying to elicit«
− «the interviewer could be biased/leading questions
− Disillusioned workers may give an answer that jeopardises the project«
− «they could give a biased view/too vocal
− They cannot give the answer they want«
− «as the interview is not anonymous/due to peer pressure
− Costly to the employers«
− «time for the worker being off job

Mob. 0101 100 9465 186 Eng: Mohamed Mamdouh


187
Unit 4 Software Life Cycle Design Level 2

1 17 Five from:
Adequate space for response/individual character boxes
Fonts/font size should be easy to read
Instructions how to complete form/clearly labelled field names
Logical order of questions
Questions spaced out/group relevant fields together
Not too much text
Sensible colour scheme
Use of tick boxes
Strikethroughs
Appropriate white space/fills the page [5]

Mob. 0101 100 9465 188 Eng: Mohamed Mamdouh


189
Unit 4 Software Life Cycle Testing Level 2

16 Normal data – data within a (given) range/appropriate for that data type [1]
1 Example – any wage between $100 and $500 [1]

Abnormal data – data outside the range/of the wrong data type [1]
Example – any wage less than $100 or greater than $500 or text example [1]

Extreme data – data on the boundaries of the range [1]


Example – $100 or $500 [1]

2 13 (a) Three from:

Observation
Interview
Questionnaire
Examining documents [3]

(b)

Field name Data type

First_name
irst [1]

Family_name/second_name Text [1]

Phone number Text [1]

Worker_ID
orke [1]

Wage
age curre [1], [1]

(c) Three matched pairs from:

A letter followed by five digits


This should be accepted by system

Two letters followed by four digits


This would be rejected by format check

Six digits
This would be rejected by format check

Six letters
This would be rejected by format check

Fewer or greater than 6 characters


This would be rejected by a length check

(1 mark for item, 1 mark for reason) [6]

Mob. 0101 100 9465 190 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Testing Level 2

4
3 normal
normal abn extreme

18 

21 

twenty 

20 
[4]

4 (a) Normal data [1]


4
(b) Abnormal data [1]

(c) Extreme data [1]

(d) Live data [1]

Question Answer Marks


5
4(a) Abnormal 1

4(b) Extreme 1

4(c) No 1

4(d) Live (data) 1

Mob. 0101 100 9465 191 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Testing Level 3
1 15 Six from:

Testing modules with abnormal data


Testing modules with data that is outside the range
Testing modules with data that is of the wrong type/format/length
Testing modules with normal data
Testing modules with data that is within the range
Testing modules with data that is of the correct type/format/length
Testing modules with extreme data
Testing modules with data that is at the boundaries/ends of the range
After testing each module thoroughly…
…testing the whole syste
Description of user testing
Testing with live data [6]

Mob. 0101 100 9465 192 Eng: Mohamed Mamdouh


193
Unit 4 Software Life Cycle Implementation Level 1

1 2
Direct
Parallel Pilot
Change-
running running
over
 


All of the old and new systems run at the same


 [1]
time

If the system fails in one branch the rest of the


 [1]
company is not affected

The new system has to be completely free of


 [1]
errors before implementation

The benefits of the new system are available


 [1]
immediately

2 4
Parallel Pilot Direct
Company running running changeover
  
[1]
A company with several branches wishes to

test a new system in one branch only.

A small company that can only afford to [1]


spend a small amount of money on 
implementing the new system.
[1]
If the whole system fails, the company wishes

to return to the original existing system.
[1]
A company that wants the quickest method of

implementation.

Mob. 0101 100 9465 194 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Implementation Level 2

1 13 (a)
Field name Data type

Hard_disc_size Integer [1]

Separate_Number_pad Boolean [1]

Cost
ost Curr [2]

Type_of_Computer
ype_of_ [2]

(b) Five from:

Direct changeover – new system replaces existing system immediately/overnight


Parallel running – new system runs alongside/together with existing system
Parallel running – there is always the old system to fall back on in the event of the new
system failing/information is not lost/always a second copy/Direct changeover – if things
go wrong lose all data/old system is not available
Direct changeover – benefits are immediately available
Parallel running is more expensive to implement than direct changeover....
....more expensive as two sets of workers have to be employed
Direct changeover – less likelihood of errors as system will have been fully tested
Direct changeover is a quicker method of implementation than parallel running
Direct changeover – training is more difficult to organise
Parallel running – training can be gradual [5]

2 19 (a) Three from:


Normal data
Abnormal data
Extreme data
Live data [3]

(b) Benefit – cheaper as only one set of workers needed [1]


Drawback – have no backup system to fall back on [1]

(c) Four descriptions from:


Pharmacist can save queries about details of medicines
Pharmacist can create reports of stock
Pharmacist can create charts of sales
Pharmacist can sort medicine records
Pharmacist can enter data using Input forms
Pharmacist can derive costs of re-ordering medicines using calculated fields
Description of how two tables could be linked by the pharmacist [4]

Mob. 0101 100 9465 195 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Implementation Level 2

3 11 (a) Two matched pairs from:

Interview users of the existing system


Asking questions about the system face to face/in person

Distribute questionnaires to users of the existing system


Asking questions about the system in hard copy form

Observation of the existing system/workers in action


To see all aspects of the system/whole overview to see how system works

Examining documents about the current system


To see inputs and outputs to the system [4]

(b) Four from:


Data capture forms
Screen layouts
Report layout
Screen displays
Validation routines
Data/file structures [4]

(c) Two matched pairs from:

Parallel running
There is always the old system to fall back on in the event of the new system failing/training
can be gradual

Phased implementation
You still have most of old system to fall back on/training can be gradual

Pilot running
Only one branch is affected if new system fails/other branches can learn from the branch’s
experiences [4]

Mob. 0101 100 9465 196 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Implementation Level 2

4 11 Three matched triples from:

Direct changeover [1]


New system replaces existing system immediately/overnight [1]
A small organisation which can afford to lose data/where system needs to be up and running
very quickly/where the new system has been thoroughly tested [1]

Parallel running [1]


New system runs alongside/together with existing system [1]
An organisation with large amounts of data which would take too long to re-enter / cannot
afford to lose data/where time taken/cost to implement is not an issue/where the new system
needs to be thoroughly tested [1]

Phased implementation [1]


New system is implemented part by part [1]
An organisation where there are clearly defined separate processes/where the new system
needs to be thoroughly tested [1]

Pilot running [1]


(Whole) system is implemented in one branch/one office (at a time) [1]
An organisation where there are several branches all doing the same work)/where the new
system needs to be thoroughly tested [1]

[9 max]

5 5 Parallel running

Any one from:

If the new system fails then the old system is still running.
There is always a backup of the whole system. [1]

Direct Changeover

Any one from:

Saves on the costs as less personnel


Saves the time of implementing the new system
Advantages are immediate [1]

Phased Implementation

Any one from:

If the new system fails then most of the old system still in place.
Possible to see if part of the new system works before proceeding [1]

Mob. 0101 100 9465 197 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Implementation Level 2

6 Question Answer Marks

11 1 mark for method, 1 mark for appropriate advantage. 6

Parallel running...
...has a backup of the data

Pilot running...
...only affects one branch if system goes wrong/other branches can learn from the
branch's mistakes

Phased implementation...
...if system fails still have most of old system to fall back on
«staff can be trained gradually

7 Question Answer Marks

7(a) two from: 2


The whole system should have been tested
The operator should have checked the meter reading against the previous
one
The bill should have been checked before it was sent
Linkages between modules should have been tested

7(b) three from: 3


Less expensive as the old system is removed before new one starts with
parallel there are two systems
There is only one set of workers but with parallel there are two sets and
therefore more expensive
Benefits are immediate but the parallel old system is phased out when new
system is working
Don’t need to maintain integrity of duplicate set of data, parallel running has
two sets of data.

Mob. 0101 100 9465 198 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Implementation Level 3
1 9 Eight from:

Parallel running – There is always the old system to fall back on in the event of the new system
failing/information is not lost/always a second copy/Direct changeover – If things go wrong lose
all data/ old system is not available
Direct changeover – benefits are immediately available
Parallel running is more expensive to implement as two sets of workers have to be employed
Direct changeover – less likelihood of errors as system will have been fully tested
Direct changeover is quicker to implement than parallel running
Direct changeover – training is more difficult to organise
Parallel running – training can be gradual

Direct changeover would be more suitable as company probably would not be able to afford to
use parallel running
Direct changeover would be more suitable as the company needs it to be implemented quickly

Must have at least one mark for reason for choice in order to gain full marks [8]

Mob. 0101 100 9465 199 Eng: Mohamed Mamdouh


200
Unit 4 Software Life Cycle Documentation Level 1

1 4
User Technical Both
  

Systems flowchart  [1]

How to save a document  [1]

List of variables  [1]

The purpose of the system  [1]

Question Answer Marks


2
3 4
technical user both
(✓) (✓) (✓)
Error messages ✓
Hardware requirements ✓
Program listing ✓
Purpose of the system ✓

Question Answer Marks


3
11 User Technical 5
Both
documentation documentation
(3)
(3) (3)
Purpose of the
3
system

Program listing 3

Input format 3

Error messages 3

Hardware
3
requirements

Mob. 0101 100 9465 201 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Documentation Level 2

1 13 (a)
Field name Data type

Name
ame

Gender
ender B [1, 1]

Species
peci [1]

Weight (kg) Numeric [1]

Adoption cost Currency [1]

(b) Technical [1]

Two from:

Program listing
Programming language
Flowchart/algorithm
List of variables
File structure
Purpose of the system/program
Input format or example
Output format or example
Hardware requirements
Software requirements
Sample runs/test runs
Known bugs/possible errors
Validation rules
Limitations of the system [2]

User [1]

Two from:

How to load software/install/run software


How to save a file
How to search
How to sort
How to print
How to add records
How to delete/edit records
Purpose of the system/program (only if not mentioned in technical documentation)
Input format or example (only if not mentioned in technical documentation)
Output format or example (only if not mentioned in technical documentation)
Hardware requirements (only if not mentioned in technical documentation)
Software requirements (only if not mentioned in technical documentation)
Sample runs (only if not mentioned in technical documentation)
Error messages (only if not mentioned in technical documentation)
Error handling
Limitations of the system
Tutorials
Troubleshooting guide/Contact details/help line/FAQ [2]

Mob. 0101 100 9465 202 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Documentation Level 2

2 15 (a)
Field name Data type

Artist_name
rtis

CD_title text [1]

Price
rice Curr [1], [1]

Date_recorded/Year_recorded
ate_ [1], [1]

Number_of_tracks
umber_o [1], [1]

(b) Three matched pairs from:

Normal data
One of:
greater than or equal to 20 and less than or equal to 90

Abnormal data
One of:
greater than 90 or less than 20

Extreme data
One of:
90, 20 [6]

(c)
purpose of the system

limitations of the system

program coding  [1]

system flowcharts  [1]

hardware and software requirements

file structures  [1]

list of variables  [1]

frequently asked questions

Mob. 0101 100 9465 203 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Documentation Level 2
3 11 (a) Appropriate spacing for each field [1]
Forward/backward buttons/save(submit) – must have at least two navigation aids [1]
Information fills the page AND is clearly a screen form [1]

Title [1]
Author’s name [1]

Four from:
Reference number/ISBN/Publisher/Picture of cover/Dewey number/Genre or
Category/fiction or non-fiction/target age group/picture of author/date [2]

Three from:
Published/revision date/summary of contents/no. of copies/cost price/selling price
Number of pages/hardback or softback [1]

Maximum of five marks

(b) Fixed hard/magnetic disc [1]

Two from:
Fast data access
Stores a lot of data
Cannot be misplaced [2]

(c) Three from:


Firewalls to only allow authorised computers to use the system
User name/id and password will prevent users who do not know the password from accessing
the system
Biometric methods – fingerprints/retina scans are unique
Description of twin factor system [3]

(d) Three from:


Parallel running is running the old and new system together
Direct changeover is stopping the old system and starting the new one immediately
Phased implementation – new system is implemented part by part
Pilot running – system is implemented in one branch/office (at a time) [3]

Mob. 0101 100 9465 204 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Documentation Level 2

(e) (i) Two from:


How to load software/ run software/install software
How to save a file
How to search
How to sort
How to print
How to add records
How to delete/edit records
Purpose of the system
Input format or example
Output format or example
Hardware requirements
Software requirements
Sample runs/test runs
Limitations of the system
Troubleshooting guide/contact details/help line/faqs
Error messages/handling
Tutorials [2]

(ii) Two from:


Program coding/listing
Name of program language
System flowchart
Program flowchart/algorithm
List of variables
File structure
Purpose of the program
Purpose of the system (only if not mentioned in user documentation)
Input format or example (only if not mentioned in user documentation)
Output format or example (only if not mentioned in user documentation)
Hardware requirements (only if not mentioned in user documentation)
Software requirements (only if not mentioned in user documentation)
Sample runs/test runs (only if not mentioned in user documentation)
Limitations of the system (only if not mentioned in user documentation)
Known bugs
Validation routines [2]

4 7 (a) Normal data – data within a (given) range/appropriate for that data type [1]
Example – any wage between $200 and $800 [1]
Abnormal data – data outside the range/of the wrong data type [1]
Example – any wage less than $200 or greater than $800 or text such as “two hundred” [1]
Extreme data – data on the boundaries of the range [1]
Example – $200 or $800 [1]

(b) Four from:

Technical documentation has to be produced for systems analysts/programmers


Technical documentation to know how to improve/update the system
Technical documentation to know how to repair system
Technical documentation to know how to maintain the system
User documentation so that the user can understand the system
User documentation so that the user can learn/knows how to operate/use/access the system
User documentation so that the user can overcome problems/errors

Must gain at least one mark for each of user and technical to gain full marks [4]

Mob. 0101 100 9465 205 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Documentation Level 2

5 13 (a)
Field name Data type

Film_title Text/alphanumeric
ext

Format/blu-ray/DVD
ormat/b [1], [1]

Rental_Cost
ental_Co [1], [1]

Name_of_director Text/alphanumeric
ext

(b) Four from:


set up a query
rental cost < 3
select appropriate fields to include in report
create an appropriate report title
set up a header
set up a footer
use appropriate alignment within fields
Select appropriate font/font size for heading
Select appropriate font/font size for field names
Select appropriate font/font size for field contents [4]

6 13 (a) Two from:

Designed to help programmers/systems analysts…


…to improve a system
…to maintain a system
…to upgrade a system [2]

(b) Four from:

Program coding/listing/piece of code


Name of program language
System flowchart
Program flowchart/algorithm/pseudocode/DFD
List of variables
File structure
Purpose of the program
Purpose of the system
Input format or example
Output format or example
Hardware requirements
Software requirements
Sample runs/test runs
Limitations of the system
Known bugs
Validation routines [4]

Mob. 0101 100 9465 206 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Documentation Level 3

1 Question Answer Marks

14(a) Designed to help programmers/systems analysts – 1 mark 2

Any one from:


«to improve a system
«to maintain a system
«to upgrade a system

14(b) two from: 2


To help the user understand how the new system works
To help the user to learn how to use the new system
Technical documentation may be too complex for the user to understand
To help the user deal with problems

Mob. 0101 100 9465 207 Eng: Mohamed Mamdouh


208
Unit 4 Software Life Cycle Evaluation Level 1
1 11 1. Collect information about the existing system.
2. Design a file structure.
3. Develop the new system.
4. Implement the new system.
5. Evaluate the new system.

5 in correct order = 5
Any 4 in the right order = 4 marks
Any 3 in the right order or position = 3 marks
Any 2 in the right order or position = 2 marks
Collect information… first (the rest wrong) or Evaluate the system last (the rest
wrong) = 1
Just having one item in correct position (except collect or evaluate) = 0 [5]

2 4

Evaluation Analysis

Identifying user and information requirements  [1]

Comparing the new system with the original task [1]



requirements

Carry out research on the current system  [1]

Identifying any limitations of the new system  [1]

3 9 (a) A flowchart [1]

(b) Analysis [1]

(c) Hacking [1]

(d) A password [1]

Mob. 0101 100 9465 209 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Evaluation Level 1

4 5 (a) The software used to find information on the internet is a search engine [1]

(b) The software which is a component of an expert system is an inference engine [1]

(c) The type of software used to create financial models is a spreadsheet [1]

5 Question Answer Marks

4 Design Implementation Evaluation 4


(3) (3) (3)
Comparing the outcomes with the 3
original task requirements
Change over to the new system 3
Identifying any limitations and 3
necessary improvements to the
system
Selecting validation routines 3

Mob. 0101 100 9465 210 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Evaluation Level 2
8 (a)
1 Analysis Design Evaluation
Activity
  

Interviewing the users of the new system  [1]

Interviewing the users of the existing system  [1]

Planning the validation routines  [1]

Examining existing documents  [1]

(b) Three names and descriptions from:

Parallel running
Current system and new system run alongside each other

Pilot running
New system introduced in one branch and other branches continue with old system

Direct changeover
New system replaces old system immediately/overnight

Phased implementation
New system is introduced one module/step at a time [6]

(c) Three from:


Program listing
Name of program language
Flowchart/algorithm
List of variables
File structure
Purpose of the system/program
Purpose of the program
Input format or example
Output format or example
Hardware requirements
Software requirements
Sample runs/test runs
Known bugs
Validation routines
Limitations of the system [3]
(d) Three from:
How to load software/ run software/install software
How to save a file
How to search
How to sort
How to print
How to add records
How to delete/edit records
Troubleshooting guide/contact details/help line/FAQs
Error messages/handling
Tutorials [3]

2 6 Two from:
Compare the final solution with the user requirements
Identify any limitations of the new system
Identify any further improvements to the new system
Analyse feedback from users of the new system
Compare test results from the new system with the old system [2]

Mob. 0101 100 9465 211 Eng: Mohamed Mamdouh


212
Unit 4 Software Life Cycle Expert System Level 1

1 10 (a)


Graph plotter

Inference engine 

Interactive input screen 

Knowledge base 

Rules base 

Scanner

Spreadsheet

Web cam
[4]

(b) Two from:

Medical diagnosis
Prospecting
Tax
Careers
Chess games
Animal/plant classification/identification [2]

2 4 (a) The most suitable storage medium for storing data on a bank card is a chip [1]

(b) The tool which searches for matches in a knowledge base an inference engine [1]

(c) An optical disc which can have data updated is a DVD RW [1]

(d) Multi part stationery is used with a dot matrix printer [1]

3 13 Three from:

Knowledge base
Rules base
Inference engine
Interactive user interface [3]

Mob. 0101 100 9465 213 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Expert System Level 2

1 13 (a)
Word processor

Spreadsheet

Rules base 

Search engine

Inference engine 

Control software

Knowledge base 

Presentation software
[3]

(b) Three from:

Prospecting
Tax
Careers
Chess games
Animal/plant classification/identification [3]

Question Answer Marks


2
8(a) 2
tick
(✓)
Control unit
Graphics program
Inference engine ✓
RFID
Rules base ✓
Search engine

8(b) Any three from: 3


− An expert system may help the doctor make a more accurate diagnosis
− An expert system uses data from many experts therefore it contains more
knowledge than a single doctor
− Cheaper than regularly re-training the doctor
− The expert system's knowledge may be more up to date than the knowledge of a
single doctor
− Cheaper than employing many specialists
− The diagnoses given are more consistent

Mob. 0101 100 9465 214 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Expert System Level 3

1 11 Five from:
Anybody can set up a website (claiming to be factually accurate) so information is not necessarily
reliable/accurate
Some commercial sites are bound to be biased
If site has excessive advertising it could be unreliable
If the advertising is related only to its own products it could be unreliable
Can use the final part of a URL to identify reliability
.ac, .gov, .org are usually fairly reliable
Compare information from reliable sites or reliable/authenticated text books (to see if it is reliable)
See if responsible bodies have endorsed the site
Does it have links to other reliable sites/unreliable sites?
If site has testimonials it is likely to be reliable
If the date of the last update was a long time ago it is likely to be unreliable
If the author’s credentials are good it is likely to be reliable [5]

2 17 (a) Five from:


Current system is observed:
Mechanics/potential users interviewed
Mechanics/potential users given questionnaires
Gather information from manufacturers/about current system/from experts
Existing documents examined
Inputs, outputs and processing of the current system determined
Problems with current system identified
User and information requirements identified
System specification decided
Knowledge base designed
Inference engine designed
Rules base designed
User interface designed
Hardware chosen [5]

(b) Two from:


Medical diagnosis
Mineral prospecting
Tax
Careers
Chess games
Animal/plant classification/identification
Computer fault diagnosis [2]

Mob. 0101 100 9465 215 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Expert System Level 3
3 17 (a) Five from:
System/User interface asks questions...
...based on previous responses
Inference engine compares data
Compares data with that held in the knowledge base...
...using rules base
Matches to the symptoms are found [5]

(b) Two from:


Mineral prospecting
Tax
Careers
Chess games
Animal/plant classification/identification
Computer fault diagnosis [2]

4 15 Five from:
Data is gathered/collected from experts
Knowledge base is designed/created
A structure to relate each item in the knowledge base is created
An interrogation technique to access the data is created
A user interface/method of displaying the results/method of inputting data/input screen/output
screen is designed/created
The inference engine is designed/created
The rules base is designed/created
The system is tested [5]

5 14 (a) Five from:

Data is gathered/collected from experts


Knowledge base is designed/created
A structure to relate each item in the database/knowledge base is created
An interrogation technique to access the data is created
A user interface/method of displaying the results/method of inputting data/input
screen/output screen is designed/created
The inference engine is designed/created
The rules base is designed/created
The system is tested [5]

(b) Two from:

Prospecting
Tax
Careers
Chess games
Animal/plant classification/identification [2]

Mob. 0101 100 9465 216 Eng: Mohamed Mamdouh


Unit 4 Software Life Cycle Expert System Level 3
6 16 (a) Six from:

Uses interactive interface/interactive interface asks questions about geological profile


Answers to questions are typed in
geological profile is typed in
Further questions are asked based on previous responses
expert system analyses data
inference engine compares data…
…compares data with that held in the knowledge base...
...using rules base
matches are found
Probabilities of oil being present are suggested
Depths of likely deposits are suggested
Predictions of geological strata above the deposits of oil are output [6]

(b) Two from:

Medical diagnosis
Car engine fault diagnosis
Computer fault diagnosis [2]

7 13 (a) Any four from:


– data is entered using keyboard/touch screen
– uses interactive interface/asks questions...
– ...based on previous responses
– inference engine compares data
– compares data with that held in the knowledge base...
– ...using rules base
– matches are found
– system suggests probable illnesses [4]

(b) Any two from:


– Car fault diagnosis
– Prospecting
– Tax
– Careers
– Chess games
– Animal/plant classification/identification [2]

Question Answer Marks


8
8 Any five from: 5
Enter data into/use the interactive user interface
Questions are asked about the car engine fault
The user answers the questions/Yes or No answers to the questions are typed
in
Further questions are asked based on the previous answers
The inference engine compares data
Compares data with that held in the knowledge base«
«using the rules base/set of rules«
«until it finds a match/matches found
System suggests probabilities/possible solutions
The explanation system explains how the solutions were arrived at

Mob. 0101 100 9465 217 Eng: Mohamed Mamdouh


218
219
Unit 5 Practical in Theory Access

1
9 (a) (i) Alphanumeric/text [1]

(ii) Boolean/logical [1]

(iii) Numeric/integer [1]

(b) Format/picture/length [1]

19 (a) Three from:


2 Normal data
Abnormal data
Extreme data
Live data [3]

(b) Benefit – cheaper as only one set of workers needed [1]


Drawback – have no backup system to fall back on [1]

(c) Four descriptions from:


Pharmacist can save queries about details of medicines
Pharmacist can create reports of stock
Pharmacist can create charts of sales
Pharmacist can sort medicine records
Pharmacist can enter data using Input forms
Pharmacist can derive costs of re-ordering medicines using calculated fields
Description of how two tables could be linked by the pharmacist [4]

8 (a) Visual verification [1]


3 Double data entry [1]

(b) Range: Number_in_Stock [1]


Length: Area_code [1]
Check digit: Serial_number [1]

Mob. 0101 100 9465 220 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

11 (a) Appropriate spacing for each field [1]


4 Forward/backward buttons/save(submit) – must have at least two navigation aids [1]
Information fills the page AND is clearly a screen form [1]

Title [1]
Author’s name [1]

Four from:
Reference number/ISBN/Publisher/Picture of cover/Dewey number/Genre or
Category/fiction or non-fiction/target age group/picture of author/date [2]

Three from:
Published/revision date/summary of contents/no. of copies/cost price/selling price
Number of pages/hardback or softback [1]

Maximum of five marks

(b) Fixed hard/magnetic disc [1]

Two from:
Fast data access
Stores a lot of data
Cannot be misplaced [2]

(c) Three from:


Firewalls to only allow authorised computers to use the system
User name/id and password will prevent users who do not know the password from accessing
the system
Biometric methods – fingerprints/retina scans are unique
Description of twin factor system [3]

(d) Three from:


Parallel running is running the old and new system together
Direct changeover is stopping the old system and starting the new one immediately
Phased implementation – new system is implemented part by part
Pilot running – system is implemented in one branch/office (at a time) [3]

Mob. 0101 100 9465 221 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

(e) (i) Two from:


How to load software/ run software/install software
How to save a file
How to search
How to sort
How to print
How to add records
How to delete/edit records
Purpose of the system
Input format or example
Output format or example
Hardware requirements
Software requirements
Sample runs/test runs
Limitations of the system
Troubleshooting guide/contact details/help line/faqs
Error messages/handling
Tutorials [2]

(ii) Two from:


Program coding/listing
Name of program language
System flowchart
Program flowchart/algorithm
List of variables
File structure
Purpose of the program
Purpose of the system (only if not mentioned in user documentation)
Input format or example (only if not mentioned in user documentation)
Output format or example (only if not mentioned in user documentation)
Hardware requirements (only if not mentioned in user documentation)
Software requirements (only if not mentioned in user documentation)
Sample runs/test runs (only if not mentioned in user documentation)
Limitations of the system (only if not mentioned in user documentation)
Known bugs
Validation routines [2]

11 (a) Fixed hard/magnetic disc [1]


5
(b) The World of the Brontës [1]

(c) Paperback or Hardback [1]

(d) Alphanumeric/Text [1]

(e) Each item of data in the field is unique [1]

(f) Jane O’Neill [1]

(g) Check digit [1]

Mob. 0101 100 9465 222 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

(h) Two from:


(Invalid) character check/type check to check only digits have been entered
Length check to ensure only 6 characters are entered
Presence check to ensure a borrower number is entered [2]

(i) Three advantages from:


Phone call can last a long time
Can send same email to lots of people at same time
Can send advertising literature as an attachment
Borrower may be not available to answer phone
Phone line may be busy [3]

One disadvantage from:


Cannot be sure borrower has received the message
Can be using a computer when other librarians want to use it for other purposes [1]

(j) Six from:


Bar code reader/Magnetic stripe reader is quicker to enter data than keyboard
Bar code reader/Magnetic stripe reader is more accurate when entering data than keyboard
If bar code/is missing/damaged, it is difficult to enter data
Easier to damage a bar code than a magnetic stripe/chip
Chip reader can input more information than magnetic stripe or bar code
Chip/stripe/bar code readers have to be bought/keyboard comes with the computer
Continuous use of mouse/keyboard can cause RSI

One mark is available for a reasoned conclusion [6]

(k) User id identifies user to the system [1]


Password prevents unauthorised user from accessing data/must match the one that the
system stores for that user name [1]

7 (a) Four from:


6
(i) 4 [1]

(ii) Engine size [1]

(iii) Make [1]

(iv) Maximum speed [1]

(b) Engine size Make

Maximum speed Registration number [1]

(c) It is the only unique field [1]

(d) Two from:


Parallel running
Direct changeover
Phased implementation
Pilot running [2]

Mob. 0101 100 9465 223 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

7 12 (a) (i) Joyce Alonzo and Aftab Ali [1]

(ii) Maria Jones [1]

(iii) David Senior [1]

(b) Visual verification/visually comparing data entered with original [1]


Double data entry/entering data twice and the computer compares them [1]

(c) (i) Range (check)/lookup (check) [1]

(ii) (Invalid) character (check)/type (check) [1]

(iii) Length (check) [1]

8 13
Patients are always cured.

Patient records can be sorted into order more easily.  [1]

Doctors can find patient records more quickly.  [1]

Patients’ medicines are never lost.

Fewer doctors are needed.

Nurses don’t have to be paid as much.

Takes up less filing space  [1]

15 (a) Text/alphanumeric [1]


9 Number/currency [1]
Date/number [1]
Number/integer [1]

(b) Price (Rs) must be >=120 and <=255


1 mark for >=120 and 1 for ‘and <=255’ [2]

(c) (i) Year_released < 2007 OR Price (Rs) >= 145

1 mark for Year_released


1 mark for <2007
1 mark for Price (Rs)
1 mark for >= 145
1 mark for OR [5]

(ii) 1,2,4,5 if answer to (i) is correct – apply follow through if answer to part (i) is incorrect

-1 for each incorrect or missing/additional id number down to a minimum of 0 [2]

Mob. 0101 100 9465 224 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

10 13 (a)
Field name Data type

Film_title Text/alphanumeric
ext

Format/blu-ray/DVD
ormat/b [1], [1]

Rental_Cost
ental_Co [1], [1]

Name_of_director Text/alphanumeric
ext

(b) Four from:


set up a query
rental cost < 3
select appropriate fields to include in report
create an appropriate report title
set up a header
set up a footer
use appropriate alignment within fields
Select appropriate font/font size for heading
Select appropriate font/font size for field names
Select appropriate font/font size for field contents [4]

14 (a) .csv/.txt/.rtf [1]

11 (b) Text/alphanumeric [1]


Text/alphanumeric [1]
Text/alphanumeric [1]
Numeric/Integer [1]
Date [1]

(c) Two matched pairs:

Student_Id [1]
It would make sure that it would consist of two letters followed by 6 digits [1]

joined_the_school [1]
It would make sure that it would consist of two digits, a slash, two digits, a slash followed by
4 digits [1]

(d) All 5 correct fields – 2 marks


4 correct fields – 1 mark
fewer than 4 correct fields – 0 marks
Additional fields lose 1 mark each down to a minimum of 0 marks [2]

Three from:

Appropriate spacing for each field


Forward and backward buttons
Drop down boxes for joined_school field/calendar to choose dates from
Information fills the page [3]

Mob. 0101 100 9465 225 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

12
11 (a) Field
one item of information [1]
name/address/phone number/date of birth/tutor group/student id [1]

File
a collection of records [1]
all the students names, addresses, phone numbers, dates of birth, forms, student ids [1]

Record
A collection of fields [1]
All the information about one student/More than one of: name, address, phone number, date
of birth, tutor group of one student, student ids [1]

(b) Three from:

One mark for:


The key field in a database of student records would be the student id

Two from:
A field which contains unique data
It is used to identify the record
Used to create relationships between tables [3]

12 (a) Range check – two from:


13 Checks that data lies within a set range
In this database a range check could be performed on the Number_of_passengers or
Ticket_prices fields
Number_of_passengers should be in the range 135 to 375/Ticket_prices have to be in the
range $500 to $1200

Format check – two from:


Checks that data follows a set format
The Flight_number is in a specific format
The Flight_number must be two letters followed by three digits

Length check – two from:


Data must be a specific length – no more no less
Length check could be carried out on Departure_ Airport_Code or Destination_Airport_code,
Departure_ Airport_Code/Destination_Airport_code must be exactly three characters [6]

(b) Text data- Flight_number/Departure_ Airport_Code/Destination_Airport_code [1]


Numeric data - Number_of_passengers/Ticket_prices [1]

Mob. 0101 100 9465 226 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

14 12 (a) 8 [1]

(b) 5 [1]

(c) E3000 [1]

(d) Computer_type [1]

(e) Format check [1]


Must have one letter … [1]
… followed by 4 digit [1]

(f) Two from:


– Data in RAM can be lost if computer shuts down/volatile
– Data in RAM can be corrupted
– Data in RAM can be accidentally deleted
– RAM is relatively very expensive per unit of memory [2]

12 (a) Price – currency/fixed point decimal [1]


15 Length – integer [1]

(b) Two from:

Set it up as a text field


With drop-down menu/lookup table…
…containing A, B, C and Fre

OR

Create/Set up a validation rule


Set parameters to A OR B OR C OR Free [2]

(c) Six from:

Create a query using data in table


Select fields to be printed…
…select Film_name, Director, Price ($) and Length (min
Set up query design
Length (min) > 110
Save the query
Create report using this query
Insert header/footer
Select appropriate font/font size for heading
Select appropriate font/font size for field names
Select appropriate font/font size for field contents [6]

Mob. 0101 100 9465 227 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

16 4
Text
Numeric Date
(alphanumeric)
 


A student’s name  [1]

How many times a student has been late to


 [1]
a lesson

The amount of money it costs to travel to


 [1]
school

When the end of term is  [1]

17 12 (a) 1 mark for each correct answer

Field name Validation check

Product_name None

Bar_code Check digit/length check

Re_orde
Re_order_level check

Last_ordered_date Range check/format check


[6]

(b) 1 mark for each correct answer


– visual verification/checking
– visual comparison of data entered with source document

– double data entry


– data is typed in twice by one typist/data is typed in by two operators and computer
compares versions [4]

(c) Any three from:


– direct changeover – new system replaces existing system immediately/overnight
– parallel running – new system runs alongside/together with existing system
– phased implementation – new system is implemented part by part
– pilot running – system is implemented in one branch/one office (at a time) [3]

Mob. 0101 100 9465 228 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

18 11 (a) Appropriate spacing for each field (1 mark)


Forward/backward buttons/save (submit) - must have at least two navigation aids. (1 mark)
Candidate attempts for information to fill the page AND is clearly a screen form (1 mark)

All six of the given fields – 3 marks


Five of the given fields – 2 marks
Four of the given fields – 1 mark
Each additional field other than those given minus 1 mark, to a mark of zero of fields [6]

(b) (i) format/picture check


must consist of one letter, three digits, space, three letters [2]

(ii) range check


must be >=140 and <=180 [2]

(c) Engine_size > 1.4 OR Parking_sensors = “Y”

1 mark for Engine_size


1 mark for > 1.4
1 mark for Parking_sensors
1 mark for = “Y”
1 mark for OR [5]

(d) K674 TUV


R123 AZN
U283 BBV
K943 SCG

2 marks is all four registrations are shown and correct.


1 mark if all five registrations shown [2]

11 (a) Price… – 1 mark


19 …descending order – 1 mark [2]

(b) Year_released… – 1 mark


…ascending order – 1 mark [2]

(c) Year_released<2010 AND Price<8.99

Year_released – 1 mark
<2010 – 1 mark
AND – 1 mark
Price – 1 mark
<8.99 – 1 mark [5]

(d) Erasure, Jimmy Smith

1 mark if only one of these given


Minus 1 for each additional artist, to a mark of zero [2]

Mob. 0101 100 9465 229 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

20 12 (a) Six from;

As it stands the form is not fit for purpose.


On the one hand:
The fields which require completion are all included.
Fields are clearly labelled
The space allowed for data entry is more than adequate
On the other hand the form could be improved by having:
Appropriate space for each field
Screen more spread out
Larger font for field names
Drop down list for Number of adults, Number of children, Number of infants (1 mark each,
2 max.)
Drop down list for date of return/date of departure
Drop down list for Class
Separate drop down lists for dd/mm/yyyy
Navigation buttons could be included to move between records
Drop down list for Number of adults, Number of children, Number of infants (1 mark each,
2 max.) [6]

(b) Three from:

A format check ensures that data is in a specific format…


…such as two digits for day, two digits for month and four digits for year
In the table above the date would be rejected by this check as it has one digit for the month
in one example two in the other
In the table above the date would be rejected by this check as it has two digits for the day in
one example and one in the other [3]

21 12 (a)
Field name Data type

Name Text/alphanumeric
ext

Studentid
tudentid Text/alp [1],[1]

Gender Boolean [1]

Height Integer [1]

Staying on/Leaving Boolean/Logical [1],[1]

(b) Two matched pairs:

Gender
M for male, F for female

Staying on to 6th form /Leaving


S/6 for Staying on to 6th form, L for Leaving [4]

(c) Studentid… – 1 mark


…Ascending – 1 mar [2]

Mob. 0101 100 9465 230 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

22
11 (a) Two from:

Use a check digit


Single digit calculated from other digits appended to these,
Computer carries out fresh calculation on digits and compares answer with original check
digit. [2]

(b) Limit check/range check – 1 mark


Reorder_level <=100 – 1 mark
He probably omitted/forgot the = sign – 1 mark [3]

(c) Use a format check – 1 mark


Supplier_code should be 2 letters followed by 3 digits – 1 mark [2]

(d) Barcode – text/alphanumeric [1]


Supplier_code – text/alphanumeric [1]
Contents – text/alphanumeric [1]
Price – (number), currency [1]
Reorder_level – (number), integer [1]
Weight – (number), decimal [1]

23 15 (a) Four from:


Open/load database/select menu database tool
Select create relationships
Select/insert/drag tables A/Venue details and B/Concert details
Venue ID in table A/Venue details is selected as the primary key/key field
Location ID in table B/Concert details is selected as the foreign key
Venue ID and Location ID are linked
A one to many relationship is created [4]

(b) Two from:


All records are stored in one place/table.
Easier to understand/comprehend
Easier to setup
Simple sorting/searching can be carried out.
Filters are easier to set up [2]

Mob. 0101 100 9465 231 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

24 10 (a) Four from:

Enter data into/use the interactive user interface


Questions are asked by the system
The user answers the questions
With yes or no answers
Further questions are asked based on the previous answers
The inference engine compares data
Compares data with that held in the knowledge base…
…using the rules base/set of rules
System produces probabilities/possible types of animal [4]

(b) Two from:

Oil prospecting/rock classification


Medical diagnosis
Car engine fault diagnosis
Chess
Tax systems [2]

(c)
Field Name Validation Check

Animal_ID Format check/Presence check

Name_of_animal Presence check/type check/character check

Animal_endangered? Character check/type check

Years_on_register Range check [4]

(d) Four from:

Three max
A header and footer may be on every page to show consistency.
Don’t have to type it in on every page…
…saves tim
…reduces errors

Three max
What is in that section of document/title of the sub-section
Author of the document
The page number
The version
The date
File name/path
Company logo/name

To gain full marks candidates must have an example and explanation. [4]

Mob. 0101 100 9465 232 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

25 11 (a) Product_ID [1]

(b) Product_ordered [1]

(c) 1231 [1]

(d) 1 mark for each correct answer


1235, 1236 [2]

(e) Two from:

(=)[Quantity]*[Unit_price]
1 mark for [Quantity] *
1 mark for [Unit_price] [2]

Question Answer Marks


26
15 One mark for creating a query/report 3

Two from:
[Max_temp]-[Min_temp]

1 mark for [Max_temp]–


1 mark for [Min_temp]

Question Answer Marks

12(a) Any three from: 5


27 − Heading
− Suitable line spacing
− Fills the page and looks like a paper based form
− Tick box/radio buttons for gender/activity
− Character boxes
− Use of white space
− Signature

And

1 mark for three correct fields or 2 marks for all five correct fields

12(b) Any four from: 4


− Drop down box for the activities
− Drop down box for gender
− Search button for house number and post code
− Use of hyperlinks to link to home website
− Use of buttons (2 marks max for naming buttons)

Mob. 0101 100 9465 233 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access
Question Answer Marks

9(a) Any four from: 4


− Open database
− Create new table of pupil data
− Create new table of examination data
− Select primary and foreign keys
− Link the two database tables using a primary/foreign key...
− «and a foreign/primary key
− Set up the relationship
− Import the data for the pupils from the pupil records
− Import the data from the examinations from the examination boards

9(b) 4
Field name Data type

Examination_ID Text

Name_of_subject Text

Examination_level Boolean

Date_of_exam Date

9(c)
c) Date_of_exam>26/06/2 8 or Date_of_exam>=27/06/2018 2

1 mark for Date_of_exam


1 mark >26/06/2018 or 1 mark >=27/06/2018

9(d) 1 mark for name of suitable check and 1 mark for description of suitable check 4

Examination_ID
Length check
The data must be exactly 6 digits /characters

Date_of_exam
Range check
The dates must be a range specified

Or

Format check/picture check


Must be in the form 2 digits slash 2 digits slash 4 digits

Mob. 0101 100 9465 234 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access
Question Answer Marks

28 8(a) Field name Data type 4

Membership_number
er mber
Member_name Text
Membership_fee_paid Boolean
Telephone_number Text
Expiry_date_of_membership Date
Membership_fee_amount Currency

8(b) Membership_number > 200 OR Expiry_date_of_membership < 01/01/2017 5

1 mark for Membership_number


1 mark for > 200
1 mark for OR
1 mark for Expiry_date_of_membership
1 mark for < 01/01/2017

8(c) Benefits 6

Max five from:


− Membership details can be searched / sorted very quickly
− «useful if there are hundreds of members

− Membership details can be easily edited«


− «by searching for a record then changing / adding / deleting

− The data in the database can be backed up easily«


− «therefore preserving the records
− «creating an archive of past members

− Far more secure than other methods«


− «can be password protected

− Can be used as a source for mail merging«


− «saves re-writing the database

− Re-writing the data each time it is used would cause errors


− Re-writing the data each time it is used could take a lot of time

Drawbacks

Max five from:


− Need IT skills
− Need to have to correct software
− Can take up a lot of storage space / memory in the computer
− The software could be expensive to buy
− Training on how to use the software«
− «could be expensive for the club

One mark available for a reasoned conclusion

Mob. 0101 100 9465 235 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Access

Question Answer Marks

29 14(a) Book_ID 1

14(b) Borrower_ID 1

14(c) One to Many/Many to One 1

14(d) Any two from: 2


Data is only stored once/avoids data duplication
Saves storage space
Complex queries can be carried out using several tables
Better security
Avoids inconsistent records/less errors

14(e) Field name Data type 4

Cost_of_Book Numeric/currency/real/fixed point decimal


Borrower_name Text/alphanumeric
Telephone_contact Text/alphanumeric
Date_due _Back Date/(date/time)

Question Answer Marks


30
12(c) Price<$200.00 AND Connectivity=4G 5

Price 1 mark
<$200.00 1 mark
AND 1 mark
Connectivity 1 mark
=4G 1 mark

Mob. 0101 100 9465 236 Eng: Mohamed Mamdouh


237
Unit 5 Practical in Theory Excel

1 12 (a) Three from:

Either
It looks through (the cells) A2 to B12 in Sheet 1
Compares with the contents of C8/RUS (in Sheet 2)

Or
It reads the contents of C8/RUS (in Sheet 2)
Compares with the contents of A2:B12 in Sheet 1

until it finds the first matching value


It records the corresponding value from column 2 of the range A2:B12 in Sheet 1
C8 (in Sheet 2) contains RUS
Produces /records Russia [3]

(b) America [1]

(c) Four from:

It reads the contents of D8 (female)


Sees if it is male
It isn’t, so it ignores the next condition
It reads the contents of E8 – 22.01
Sees if it is greater than the contents of $D$4 – 20.70
It is, so it sets produces/records “yes” [4]

(d) No [1]

(e) Three from:

Some situations are/real thing might be dangerous/ model is less dangerous


Cost of building real thing may be expensive
Real thing may waste raw materials/natural resources
Easier to change/modify
Costs less to change data/variables
The real thing may be impossible to access/create
Real thing may be on too vast a scale
It may take a long time to obtain results from the real thing
Extremes which can’t be tested in real life can be tested using models [3]

Mob. 0101 100 9465 238 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

2 14 (a) Three from:

Either
It looks through (the cells) A2 to B9 in Sheet 1
Compares with ’E’/the contents of B2 (in Sheet 2)

Or
It reads the contents of B2 (in Sheet 2)
Compares with the contents of A2:B9 in Sheet 1

until it finds the first matching value


It records the corresponding value from column 2 of the range A2:B9 in Sheet 1
B2 (in Sheet 2) contains E
Produces /records Edinburgh [3]

(b) London [1]

(c) Three from:

It looks through (the contents of) C9 to C18….


… to see if they contain the code E/contents of B
Counts all the cells where there is a match
Cell B2 contains the code E
Produces/records the answer 2 [3]

(d) 1 [1]

(e) Three from:

It reads the contents of B9 (0) and checks if it is greater than 0…


…if it is it records
If it is not greater than 0 it records N
In this case it produces/records N [3]

(f) N [1]

Mob. 0101 100 9465 239 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

3 15 (a) Three from:

Either
It looks through (the cells) A2 to B9 in Sheet 1
Compares with ’USA’/the contents of C3 (in Sheet 2)

Or
It reads the contents of C3 (in Sheet 2)
Compares with the contents of A2:B9 in Sheet 1

until it finds the first matching value


It records the corresponding value from column 2 of the range A2:B9 in Sheet 1
C3 (in Sheet 2) contains USA
Produces /records America [3]

(b) Thailand [1]

(c) Two from:

It totals the contents


Of cells D3 to F3 [2]

(d) Three from:

It looks through the contents of D4 to F4…


…to see if they are not equal to N
It counts the number of cells that are not
Produces/records 2 [3]

(e) 3 [1]

(f) Three from:

Creating a model of a real system (such as a cockpit)…


…in order to study the behaviour of the system/pilot reactions
Is able to predict/react to the behaviour of the system or pilot
The cockpit simulation has all the controls normally found in an actual cockpit
Creating models of situations that pilots might meet in real life/Creates whatif scenarios [3]

Mob. 0101 100 9465 240 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

12 (a) E5 [1]
4

(b) Any of A1:B6, C1:G1, B8, E8 [1]

(c) 7 [1]

(d) = C2*F2 or = C2* (E2–D2) [1]

(e) 1 mark per point

Highlight F2 and click copy


Highlight F3:F6 and click paste

OR

Highlight F2 and manoeuvre to bottom right hand corner of F2


Using fill handle/little black square/cross drag down to F6/double click on fill handle/little
black square/cross

OR

Highlight F2:F6
Click on fill then down [2]

12 (f) Three from:


5
Real thing may be too expensive to build/cost of rebuilding/repairing is expensive
Real thing requires too large a time scale/it may take a long time to obtain results from the
real thing
Real thing would be too wasteful of materials
Real thing is too vast a scale
Easier to modify/change date/variables
Costs less to change data/variables
The real thing may be impossible to access/create
Real thing may be too dangerous
You can test predictions more easily/model can make predictions more accurately
You can ask many what if questions which would be impractical in real life [4]

6 7 (a) =SUM(B3:D3) or =B3+C3+D3 [1]

(b) =MAX(B3:B6) [1]

Mob. 0101 100 9465 241 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

7 7 (a) A1/A2/A4/A5/A6/A7/B2/C2/D2/E2 [1]

(b) D5 [1]

(c) 5 [1]

(d) Any cell in range B4:D7 [1]

(e) = C5 – B5 [1]

8 7 (a) 5 [1]

(b) Any cell in the range B3:D6 [1]

(c) A1 or any cell in ranges A2:E2 or A3:A6 [1]

(d) = b4–c4
b–c formula [1]
Row 4 [1]

(e) = if(c5 > 150, “Yes”, “No”)


Correct syntax of if() [1]
C5 > 150 [1]
“Yes”, “No” [1]

Mob. 0101 100 9465 242 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

9 8 (a) Range check [1]

(b) (i) 0, 25 or 80 [1]

(ii) 0 or 80 [1]

(iii) 87 [1]

(c) =if(C2>=45,”Pass”,”Fail”)

Correct syntax of if() [1]


C2>=45 [1]
“Pass”,”Fail” [1]

(d) Three from:


Click on D2 and manoeuvre to bottom right hand corner of cell
Until black cross appears
Drag black cross down to D32

Or

Right click on D2 select copy from menu


Select D3 to D32
Right click and click on paste

Or

Highlight cells D2 to D32


Click on Fill
Click on down [3]

(e) Two from:


Cost of building real thing may be expensive
Real thing may waste raw materials/natural resources
Easier to change data/variables
Costs less to change data/variables
The real thing may be impossible to access/create
Real thing may be on too vast a scale
Extremes which can’t be tested in real life can be tested using models [2]

10 13 (a) Four from:

Countif functions have a range and a criteria argument


In this example the range is A2:A10
The criterion is <31
It searches through the range A2:A10
Counts the number of cells/values…
…that contain numeric values
…that have a value less than 3
Returns/displays that count. [4]
(b) (i) 4 [1]

(ii) Two from:

9-4 is 5
But this 5 now includes the blank cells/includes those who haven’t worked at all
The blank cells are not greater than 33 but are still included [2]

Mob. 0101 100 9465 243 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

11 9 (a) two from:

Visual verification
Visually comparing the data on screen…
…with the source document

OR

two from:

Double data entry


Data is typed in twice by one typist
Data is typed in by two operators
Computer compares versions [2]

(b) Type in =d3/c3 [1]


*100 [1]

OR OR

Type in =d3/c3 in e3 [1]


Set the format to % [1]

(c) Three from:

Click on E3
Manoeuvre to bottom right hand corner of cell
Until black cross appears
Black cross dragged down to E22

Or three from:

Right click on E3
Select copy from menu
Select E4 to E22
Right click and click on paste [3]

(d) Two from:

Less dangerous to use a model


Real thing may represent too large a time scale/ it may take a long time to obtain results from
the real thing - genetics etc. Too large a time scale required
Real thing may be wasteful of materials
Real thing may be on too vast a scale
Easier to change data/variables
The real thing may be impossible to access/create
You can test predictions more easily/model can make predictions more accurately
You can ask many whatif questions which would be impractical in real life [2]

Mob. 0101 100 9465 244 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

12 13 (a) Four from:

This formula searches for values in the range A1:A6…


…which match the criterion >29
It totals the values…
…in the corresponding cells of the SUM range…
…B1:B6. [4]

(b) >31<35 is not a valid logical test [1]

=SUMIF(D2:D10,">31",F2:F10) [1]
– (minus sign) [1]
SUMIF(D2:D10,">=35",F2:F10) [1]

13 10 (a) C5 [1]

(b) 8 [1]

(c) =b2*c2 [1]

(d) =sum(d2:d6)
Sum() [1]
D2:D6 [1]

(e) Three from:

Easier to modify/change data/variables


Costs less to change data/variables
The real thing may be impossible to create
You can test predictions more easily/model can make predictions more accurately
You can ask many what if questions which would be impractical in real life
Results are obtained more quickly [3]

Mob. 0101 100 9465 245 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

14 14 (a) Four from:

Tests to see whether the condition A1>12 is true or false


If the condition A1>12 is true the function will return “strong”
If the condition A1>12 is false, the function will test if A1>6 is true or false
If the condition A1>6 is true the function will return “medium”
If the condition A1>6 is false the function will return “weak” [4]

(b) Should be A1<=6 [1]


Should be A1<=12 [1]
Should be “strong” (second speech mark missing) [1]
Should be two right-hand brackets [1]

(c) Three from:

Simulations
Mathematical models
Civil engineering models
Flight/pilot simulation/training
Design of fairground rides
Traffic control
Building fire simulation
Weather forecast models
Population modelling [3]

Mob. 0101 100 9465 246 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

15 10 (a) Any three from:

either:
– it looks through the cells A2 to B8
– compares with the contents of E2/BB

or:
– it reads the contents of E2/BB
– compares with the contents of A2:B8

– until it finds the first matching value


– it records the corresponding value from column 2 of the range A2:B8
– E2 contains BB
– produces /records Bed and breakfast [3]

(b) Flights only [1]

(c) Any three from:


– it looks through the cells B12 to B22
– it adds the contents of C12 to C22 where…
– …the corresponding value of B12 to B22 is equal to E2
– there are 28 days [3]

(d) 21 [1]

(e) INT(F2/7)

INT (1 mark)
F2/7 (1 mark) [2]

(f) F2-(G2*7)

F2- (1 mark)
(G2*7) (1 mark) [2]

(g) 1 mark for each correct tick

what ifs 

queries

automatic recalculation 

internet browsing

animation

data replication 

emails

changing fonts
[3]

Mob. 0101 100 9465 247 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

[1]
16 12 (a) B4*C4

(b) =$B$1*D4 or =D4*$B$1 or =B$1*D4 or =D4*B$1

1 mark for B1
1 mark for correct absolute referencing B$1 or $B$1
1 mark for *D4 or D4*
Minus 1 mark per incorrect or added operator [3]

(c) Any three from:

When formulae are replicated/copied/dragged down/fill down…


…some cell references must remain unchanged
If it wasn’t used when the formula in E4 was replicated down it would multiply by B2, B3 etc.
These cells are either blank or contain values not equal to 25%/need to be 25% [3]

(d) SUM(F4:F8) [1]

17 17 (a) (i) Host nations/Venues/Country [1]

(ii) Number of times hosted [1]

(iii) The number of times Countries that have hosted the Commonwealth Games [1]

(b) Bar/column chart [1]

18 14 (a) Three from:

Looks through the (contents of cells) H4 to H24


See if they are equal to (the contents of cell) B4/’AF’
It totals the contents of the corresponding cells from I4 to I24
Produces the result 65 [3]

(b) =SUMIF($H$4:$H$24,B8,$I$4:$I$24)

= SUMIF($H$4:$H$24, – 1 mark
B8, – 1 mark
$I$4:$I$24) – 1 mark [3]

(c) =COUNT(I4:I24)

COUNT – 1 mark
(I4:I24) – 1 mark

OR

=COUNTA(I4:I24)
COUNTA – 1 mark
(I4:I24) – 1 mark [2]

Mob. 0101 100 9465 248 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

19 12 (a) =Countif(B$2:B$23,D5)

Countif – 1 mark
(B2: – 1 mark
B23, – 1 mark
Absolute referencing – 1 mark
D5) – 1 mark [5]

(b) A24 – 1 mark


B24 – 1 mark
D15 – 1 mark [3]

20 7 (a) = IF (B3>75, “pass”, “fail”)


1 mark IF ( )
1 mark parameter B3>75,
1 mark “pass”, “fail” [3]

Mark deducted for any additional elements down to 0 marks

(b) Normal data is data that is within the range/right data type. [1]

Abnormal data is data that is outside the range/wrong type. [1]

Extreme data is data that is on the edge of acceptability. [1]

21 16 (a) Four from:

To test the balance is negative change the values in the outgoings so the total is larger than
the total income
Test each individual outgoing so it is larger than 100/abnormal testing
Test each individual outgoing so it is equal to 100/extreme testing
Test so the total outgoing is equal to total income
Type in a negative income
Type in a negative outgoing
Test each individual outgoing so it is less than 100/normal testing
Test using live data [4]

(b) Three from:

Use conditional formatting…


…to check cell content greater than 100
…in the range B4 to B8
Use shading/highlighting cells…
Set up a validation check…
…range check 0–100
If outside the range displays an error message [3]

Mob. 0101 100 9465 249 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

22 Question Answer Marks

13(a) SUMIF(B$3:H$3,B$3,B4:H4) or SUMIF(B$3:H$3,E$3,B4:H4) or 4


SUMIF(B$3:H$3,F$3,B4:H4)

1 mark for SUMIF()


1 mark for B3:H3,
1 mark for B$3 or E$3 or F$3
1 mark for ,B4:H4

13(b) AVE B4:H4) 2


1 mark for AVERAGE()
1 mark for B4:H4

13(c) two from: 2


Click on the average mark
Select increase/decrease decimal
Keep until you reach 2 decimal places

or
Select the average mark
Format cell
Select 2 decimal places

13(d) VLOOKUP(I4,$N$ 11,2,TRUE) 4

1 mark VLOOKUP()
1 mark for I4, N4:O11,
1 mark for 2, TRUE
1 mark for correct use of $

Mob. 0101 100 9465 250 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel
Question Answer Marks
23
11(a) COUNTIF($B$6:$B$69,D6) 4

1 mark for COUNTIF


1 mark for (B6:B69,
1 mark for D6)
1 mark for correct use of absolute and relative cell referencing and the formula
works

11(b) Highlight the cell E6 and copy the contents of the cell 3
Highlight cells E7 to E15
Paste the formula

Or

Click on cell E6
Move to bottom RH corner (of E6) select fill handle«
«Drag down to E15

Or

Highlight E6 to E15
select fill«
«then select down

Or

Click on cell E6
Move to bottom RH corner of E6
Double click on the fill handle

11(c) (E6:E9)/SUM(E6:E15))*100 4

1 mark for SUM(E6:E9)


1 mark for SUM(E6:E15)
1 mark for extra brackets, and ‘/’
1 mark for *100

24 Question Answer Marks

11(a) Max two from: 3


− Select range/(A6 to B14)
− Click on the name box/select define name
− Type/enter in the name of the range

And

1 mark for an example of a suitable name

11(b) VLOOKUP(B18, named range,2) 4

1 mark for VLOOKUP( )


1 mark for B18,
1 mark for use of named range from part (a)
1 mark for ,2

Mob. 0101 100 9465 251 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

Question Answer Marks


25
7(a) =IF(D2>=C2,”well done”,”needs improvement”) 3

1 mark for IF(D2>=C2,


1 mark for “well done”,
1 mark for “needs improvement”)

7(b) four from: 4


− Faster than editing each individual letter
− Fewer errors than retyping the data
− The data can be used for other applications
− The report template can be easily adapted for other mail merges
− Consistency in the reports
− Error checking only needs to be carried out once (on the data and the
template)
− Reduces the time taken to write out all the reports separately

7(c) three from: 3


− Spell check the master document
− Grammar check the master document
− Check consistency of the text
− Check merge fields are in the correct places
− Check the template and merge fields matches the house style
− Proof reading the data in the data source/check the data is correct
− Check the data source exists
− Validate the data in the data source

Mob. 0101 100 9465 252 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

Question Answer Marks


26
11(a) For example: 5
=IF(B2>=75,"Making progress", IF(B2>=50,"Satisfactory",IF(B2>=0,"Needs
improvement")))

or
=IF(B2>=75,"Making progress", IF(B2>=50,"Satisfactory","Needs
improvement"))

or
=IF(B2<=49,"Needs improvement", IF(B2<=74,"Satisfactory","Making
progress"))

1 mark for IF(«)


1 mark for B2>=75,
1 mark for B2>=50, / 1 mark for B2<=49,
1 mark for second IF(«)
1 mark for all of the outputs being correct;

Question Answer Marks

11(b)(i) Test data 4

e.g. any number between 75 and 100


e.g. any number between 50 and 74
Either 0 or 49
Either 50 or 74

11(b)(ii) Any two from: 2


To prove the system works as designed
So that the system can be implemented correctly/modify the system if errors
show up
Trapping all errors
Meets the user’s expectations/requirements

11(c) three from: 3


Select cells A1 to B21
Insert chart/click on the chart icon
Select bar chart
Add/edit titles/label the axes/legend

Mob. 0101 100 9465 253 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

Question Answer Marks

27 10(a) three from: 3


VLOOKUP looks at the value in A9
A9 is the lookup value
$A$4:$B$6 – this is the lookup range
2 is the index value

or any three from:


It looks up value of A9
In the range $A$4:$B$6
And retrieves the corresponding value
In the second column of the range

10(b)
10(b) 5%/ 1

10(c) For example (($E$3*C9)*D9) or 500*C9*D9 3

1 mark for $E$3


1 mark for *C9
1 mark for *D9

10(d) Absolute referencing 1 mark 3

Any two from:


If the formula is dragged down the column/replicated
Then the cell reference (associated with the $) does not change
So the user does not need to type in each formula separately

10(e) Three from: 3

Either
Highlight cells D9 / E9 / D9 and E9
Right click and copy
Highlight cells D10 to D16/ E10 to E16
Right click and paste formulas
Check values are correct

Or
Highlight cells D9 / E9 / D9 and E9
Move to bottom right of cell D9/E9
Click the black square/drag handle«
«Drag down to row 16
Check values are correct

Or
Highlight cells D9 / E9 / D9 and E9
Fill down...
...to cell D16/E16
Check values are correct

Or
Highlight cells D9 / E9 / D9 and E9
Move to bottom right of cell D9/E9
Double click/click F4 on the keyboard the black square/drag handle
Check values are correct

Mob. 0101 100 9465 254 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Excel

28 16 (a) .txt

Two from:
Text file with very little/no formatting/used by a variety of text editors
Can be opened by any software package that reads text/generic text format
Any formatting is lost when saved [2]

(b) .gif

Two from:
Graphic interchange format
Bitmap graphic format/GIF files use data compression to reduce the file size
Image format that will allow still or moving images to be stored [2]

(c) .pdf

Two from:
Portable document format
Makes it possible to display text and graphics in the same fixed layout on any computer
screen
Reduces file size of read only document for transmission [2]

29 9 (a) Four from:

Searches for the value 38


38 is the lookup value
Searches in the range A2:C10
It returns the value that is contained in the third column of the range...
…and on the same row as the lookup value…
…if it’s an exact match of 38 [4]

(b) Four from:

There is no return value/FALSE/0…


…to force an exact match
The data is not sorted on column D
So only an approximate match will be made
First four items in column D are sorted so as soon as it gets to D6 it’s is no longer sorted…
…so it doesn’t get to 33…
So formula will return David [4]

Mob. 0101 100 9465 255 Eng: Mohamed Mamdouh


256
Unit 5 Practical in Theory Word

1 15 (a) Up to two from:


Save photos to memory card
Insert memory card to computer
Copy photos to a new folder/desktop/hard disc
Connect camera lead to computer
Import/upload photos

Up to two from:
Load word processing package/open document
Insert image from folder/copy and paste/drag and drop
Edit/position the image

If camera is phone-based/web-enabled allow email/SMS for 1 mark

Maximum of three marks [3]

(b) Two from:


Internet
Create own using a painting/drawing package
CD of images
Clipart library [2]

(c) Four from:


Laser is cheaper to buy than a dot matrix
Laser is faster at printing than other two for this task
Laser has a better quality printout than dot matrix
Laser has a larger paper tray than inkjet
Laser doesn’t need to change cartridges as often as an inkjet [4]

18 Four from:
2 Save pictures from clipart/Internet/scanned images/digital camera
Load word processing software
Insert images
Edit images
Insert spreadsheet
Position chart/images/spreadsheet
Create chart
Type in text
Edit/format text
Save chart
Insert chart/ copy and paste chart
Edit chart [4]

Mob. 0101 100 9465 257 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Word

3 12 Six from:

Load/open web authoring package


Create tables
Take photo using digital camera/ordinary camera or video camera
Upload from camera
Save the image/video
Load webpage
Import/copy and paste/insert image into document/embed image source into markup
Position the image/resize image/edit image
Type text/import text files
Edit/format text
Insert spreadsheet
Insert/copy data from spreadsheet
Paste data into table
Create chart from spreadsheet
Edit chart
Insert chart/ copy and paste chart
Upload web page to internet [6]

1 Flip
4 Crop
Resize
Use of word/text wrap
Change of font type/face
Change of font size [6]

1 Six from:
5
Indent
Bold
Subscript
Superscript
Underline
Text highlight
Italic
Fully justified
Border [6]

16 Any five from:


6
Change the font type to make it more informal/appealing
Change the font size bigger
Simplify the language
Make the heading centred
Make the font size for the heading larger than the body text
Add interesting/relevant images
Bold/underline/highlight/italicised keywords
Bold/underline/highlight headings
Line spacing after paragraphs/in paragraphs
Colour text to emphasise keywords/headings
Change the existing border to a more interesting/relevant border [5]

Mob. 0101 100 9465 258 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Word

7 18 Any four from:

When you want to apply different formatting in the same page without disrupting the formatting of
the whole page.
When you want to use columns in a page, and have different amounts of columns on the same
page.
When you want to use a heading across the whole page but the text below is in several columns.
When you don't want headers on pages with a title, but you do want them on other pages.
If you didn't have them, each page would have the same header.
To enable page orientation to change between 2 pages. [4]

16 Four from:
8
The letter will be more personal/can have the member’s name on it
The letter will be of better quality and look more professional
Easier to target team members of specific sports
Easier to identify how many letters to print
Address labels are easier to produce using the data from the database [4]

20 Each paragraph has been indented on the first line [1]


9 Each occurrence of Cambridge Primary has been emboldened [1]
The line spacing has been increased [1]
The text has been fully justified [1]

4
10 TRUE FALSE
(3) (3)

To set the page to landscape you select page


3
orientation.

The gutter margin is only on the left hand side of


3
the page.

A widow is where the last line of a paragraph


3
appears as the first line of text on a new page.

When you lock aspect ratio the width changes


3
automatically as the height is increased.

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
0 or 1 correct answer – 0 marks [Max. 2]

7 (a) Two from:


11 Proofreading often involves reading through the document without referring to the original
source document.
This is to check for errors in the typing/spelling/grammar.
Verification involves reading through the document but referring to the original source
document.
Verification can involve one person reading the document and a second one re-reading the
document.
Proofreading does not involve two people keying in the same data for the computer to
compare the versions. [2]

Mob. 0101 100 9465 259 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Word

12 9 Three from:

The language/dialect used in checking the spelling/grammar could be different e.g. English(US).
Names/proper nouns might be highlighted as an error but are acceptable.
If no suggestions are given
Similar sounding words need to be checked, i.e. where, were, wear.
The grammar might be too complex for the grammar checker to cope with. [3]

Question Answer Marks


13
11(a) 1 mark for each: 5
Insert a table
Select/Enter 4 columns and 5 rows

Any three from:


Highlight/select the top row and click on merge cells
type in heading Populations of Indian Cities
highlight the heading/text/first row and click on bold
highlight the heading/text/first row and click centre text
type in subheading(s)
highlight the sub-headings and click on italics
Type in cities in appropriate cells
Select borders

11(b) Any two from: 2


Right click in the row/table
Click insert rows
Draw the rows
Select the table and click layout tab
Tab on the last row

Question Answer Marks


14
7 Gutter – A margin placed on the fold of a book // A margin between the page 4
margin and the fold of a book

Header – This is an area at the top of every page

Widow – When the last line of the paragraph is the first line of a new page

Wrapping – Text is written around an image in a word processed document

Mob. 0101 100 9465 260 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Word
Question Answer Marks
15
10(a) Max two from: 5
− Appropriate field spacing
− Use of white space and is clearly a hard copy membership card
− Size of photograph – not too small
− Title of the Leisure Centre
− Additional elements like bar code/ signature

And

1 mark for the photograph

And

1 mark for three items o r 2 marks for all five items

10(b) Any five from: 5


− Create a master document (membership card)
− Create/use a data source
− Check the membership cards for errors
− Place tags in the document
− Link the fields with the tags
− Select the records to merge
− Merge the records and save
− Check the data on the cards is correct
− Preview/Print the cards

Question Answer Mark


16
4(a) point 1

4(b) page orientation 1

4(c) gutter 1

4(d) orphan 1

Mob. 0101 100 9465 261 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Word

Question Answer Marks


17
7(a) =IF(D2>=C2,”well done”,”needs improvement”) 3

1 mark for IF(D2>=C2,


1 mark for “well done”,
1 mark for “needs improvement”)

7(b) four from: 4


− Faster than editing each individual letter
− Fewer errors than retyping the data
− The data can be used for other applications
− The report template can be easily adapted for other mail merges
− Consistency in the reports
− Error checking only needs to be carried out once (on the data and the
template)
− Reduces the time taken to write out all the reports separately

7(c) three from: 3


− Spell check the master document
− Grammar check the master document
− Check consistency of the text
− Check merge fields are in the correct places
− Check the template and merge fields matches the house style
− Proof reading the data in the data source/check the data is correct
− Check the data source exists
− Validate the data in the data source

Mob. 0101 100 9465 262 Eng: Mohamed Mamdouh


263
Unit 5 Practical in Theory Share Point
1 13 (a) Two from:

A URL is a Uniform Resource Locator


Is the unique address for a file that is accessible on the Internet
It consists of a protocol usually http or https
Then a domain name that identifies a specific computer on the Internet
Then a pathname that specifies the location of a file in that computer. [2]

(b) Three from:

http://www.cie.org.uk/gcseict/giraffe.htm
When the giraffe image is clicked on
The user would be redirected to the part of the CIE website
This website contains the giraffe web page [3]

2 18 Three matched pairs from:

Content layer
Content can consist of text or images [2]

Presentation layer
This layer is defined by the CSS or styles to indicate how elements are displayed [2]

Behaviour layer
This layer of a Web page allows interaction [2]

3 17 Five from:

In h1 colour should be color


In h1 sans serif should be sans-serif
In h1 18 px should be 18px (no space)
In h2 color: 000000 should be color: #000000/color: #000
In h2 Times New Roman should be “Times New Roman”/’Times New Roman’
In h2 centre should be center [5]

4 17 Six from:

Missing </a> on fourth line


Missing </td> on fourth line
Missing a in <href> on sixth line
. instead of : after mailto
, instead of ? in front of subject
Extra > in subject line of email
<a> instead of </a> on eighth line [6]

Mob. 0101 100 9465 264 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Share Point

5 17

Heading 1 mark
Images of Iceland 1 mark
Hyperlinks to an external page 1 mark
Link to a movie 1 mark
Buttons 1 mark
Fills the page 1 mark
Home (page) button 1 mark
Link to a sound file 1 mark
Hyperlink to an email address or contact 1 mark
Information about the trip – 2 marks

Departure
Arrive home
Hotel name
Whale watching
Contact us

At least 3 points = 1 mark


All points = 2 marks
Must have the correct details

Maximum of 6 marks [6]

Mob. 0101 100 9465 265 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory Share Point

Question Answer Marks


6
13(c) four from: 4
− She should not display pictures of herself in school uniform
− She should not display personal details
− She should not identify the school
− She should make sure the picture is not too revealing
− She should use appropriate language
− Should not post her email address/contact details
− Allow she should be aware of identity theft
− Allow she should be aware of online sexual exploitation
− Aware that everyone has access to published data

Question Answer Marks

7 12(a) behaviour content presentation 4


(3) (3) (3)
To format whole web pages 3
Consists of navigation pointers. 3
Defined by the CSS 3
To enter scripting language to a web 3
page

12(b) Any two from: 4


HyperText Transfer Protocol Secure
Secure version of HTTP
All data is encrypted
Secure protocol identifier

Any two from:


Uniform Resource Locator
A reference/identify to a resource on the WWW/internet
Used as a simple way of addressing a resource

Question Answer Marks


8
10(a) An anchor is a link within the web page/It is the destination 1 mark 3

Any two from:


Example media file, image in a hyperlink
Used to move (quickly) to the top of the page
Used to link to another web page
Used to link to a media file
Used to link to a program
Used to link to an image

10(b
10(b) id="Top"></a> 3
<a href=”#Top”>top</a>

Any three from:


1 mark for <a id=”Top”>
1 mark for <a href=
1 mark for “#Top”>
1 mark for both </a>

10(c) A web browser views information on the internet/Views webpages/websites 1

Mob. 0101 100 9465 266 Eng: Mohamed Mamdouh


267
Unit 5 Practical in Theory General

1 3

Software
oftw

Word processing/DTP Typing a letter [1]

Spreadsheet Calculating profit and loss [1]

Web browser Viewing pages on the internet [1]

Presentation Creating a slide show [1]

2 4
Software
oftw

Measuring program monitoring atmospheric pressure [1]

Control program keeping temperature constant in a greenhouse [1]

Spreadsheet Modelling personal finances [1]

Presentation software Creating a slide show [1]

Search engine finding information on the internet [1]

3 1 1. It minimises the window


2 It reduces the size of the window
3. It closes the window
4. It goes to the home page
5. It goes to favourites/feeds/history/adds to favourites
6. It allows you to search [6]

4 14 Four from:
– Place/organise in folders
– Sort the emails
– Flag for importance
– Delete from phone
– Delete from server
– Search/filter emails
– Archive emails [4]

Mob. 0101 100 9465 268 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory General

5 2
Modelling Database Word Processing
Use
  

Writing a letter  [1]

Flight simulation  [1]

Storing student records in a school  [1]

Producing a business card  [1]

6 15 .txt is a text (file) used by a variety of text editors (1 mark)

.rtf is rich text (format) for a rich text file that is readable by most word processing software
(1 mark)

Any three from:

RTF has many more features than TXT.


RTF is capable of basic font formatting while TXT isn’t.
RTF is capable of paragraph formatting while TXT isn’t.
RTF is capable of creating bulleted lists while TXT isn’t.
RTF files can include images while TXT cannot.
.TXT takes up less memory [5]

7 17 Stage 1 reflected through the Y axis (1 mark)

Stage 2 rotated through 90° (clockwise) about the origin (1 mark)

Stage 3 reflected about the Y axis (1 mark)


Filled with black colour (1 mark) [4]

8
15 Generic file formats are those that when files are saved in that format they can be used in
different types of application software – 1 mark

Three from:

A .txt file can be imported into any text editor/ word processing/DTP package
A .csv file can be imported into any spreadsheet
A .jpg/.gif/.png file can be used in most bitmap image editing software
A .pdf can be used in any document format reader
A .rtf can be used in any word processor and retains some formatting
A .css can be opened in any text editor
A .htm can be opened by any web browser [4]

Mob. 0101 100 9465 269 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory General

9 16 (a) .txt

Two from:
Text file with very little/no formatting/used by a variety of text editors
Can be opened by any software package that reads text/generic text format
Any formatting is lost when saved [2]

(b) .gif

Two from:
Graphic interchange format
Bitmap graphic format/GIF files use data compression to reduce the file size
Image format that will allow still or moving images to be stored [2]

(c) .pdf

Two from:
Portable document format
Makes it possible to display text and graphics in the same fixed layout on any computer
screen
Reduces file size of read only document for transmission [2]

10 7 (a) As well as the recipient this sends a copy of the email to the email addresses listed after
cc [1]

(b) bcc is the same as cc except that the recipient is unaware that copies have been sent [1]

(c) This sends a message that has been received to another email address [1]

(d) This is a group of email addresses that are given a group name so that the sender only
needs to type in one name to send an email to several recipients at once [1]

(e) A file that is sent attached to/with the email [1]

11 15 (a) Jpeg –

Joint photographics experts group – 1 mark


Commonly used for lossy compression for digital images/Used for complex
images/photographs/used for saving storage space/used for increasing transmission
speed/reduced download time (particularly with web pages) – 1 mark [2]

(b) Png

Portable network graphics/raster graphics file format – 1 mark


Uses lossless data compression/Used for transferring logos or images with no colour
gradient – 1 mark [2]

12 16 The shape has been filled with black/dark colour – 1 mark


It’s height has been increased whilst leaving the width as the original – 1 mark
It has been rotated through 180°/reflected about the base – 1 mark [3]

Mob. 0101 100 9465 270 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory General

13 4
true false
(9) (9)

If capital letters are used in emails, it is considered ‘shouting’. 9

You should always use coloured text and coloured


9
backgrounds in emails.

You should reply to all spam emails. 9

bcc means blind carbon copy. 9 [2]

4 correct answers – 2 marks


2 or 3 correct answers – 1 mark
1 correct – 0 marks

Question Answer Marks


14
12(a) All elements (they must be correct) - 1 mark 5

Any three from:


Appropriate use of header/footer
Size of headings and sub-headings
Size of logo box/position of the logo/watermark
Use of annotation

Leave sufficient space for presentation content/images – 1 mark

12(b) three from: 3


Data/multimedia projector
Speakers
Monitor
Printer

15 Question Answer Marks

6 Length check 4
Range check
Type check/Character check
Format check/Picture check

16 Question Answer Marks

4(a)
a) rop 1

4(b) Resize 1

4(c) T Wrapping 1

4(d) Rot 1

Question Answer Marks


17
14(a) Double data entry 2
Visual verification

14(b) Any one from: 2


− Visual verification involves the data being compared with the original copy
− Double entry involves re-entering the data
Any one from:
− Proofreading only involves reading through the document
− Proofreading is looking for spelling mistakes/grammar

Mob. 0101 100 9465 271 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory General

Question Answer Marks


18
3 4
Icon Meaning
Home

Next Slide

Final Slide

Print

Question Answer Marks


19 4(a) 2
ICT

1
2

1 mark writing practical/theory or classwork/homework in level 1


1 mark for writing practical/theory or classwork/homework in level 2

or
1 mark for three correct boxes, for example 1, 2 and 2

4(b) For example: 1


ICT\Theory\Classwork\input_devices.rtf

Must be follow through from part (a)

Question Answer Marks


20
8 Any four from: 4
Use of corporate/same colours
Same font
Same style of font
Margins and white space look similar therefore showing it is part of the same
company
Graphics are similar
Logos are the same
Language used is the same on all documents within the group
Position of the images are the same
Blackline at the top with contact details
Same type of icon
Icons in same place on a white background
Use of branding

Mob. 0101 100 9465 272 Eng: Mohamed Mamdouh


Unit 5 Practical in Theory General

21 Question Answer Marks

13(a) three from: 3


Observation of the users
Interviewing the manager
Questionnaires given out to users
Examination of existing documents

13(b) three from: 3


Text
Static images
Moving images/animation/video
Sound

Question Answer Marks

22 6(a) two from: 2


Click on the image
Move the pointer to the (right hand) corner of the image
Click LH mouse button and drag to new size
or
Click on the image
Click on size
Type in the dimensions
Select maintain aspect ratio

6(b) Cropp tool/crop 1

6(c) two from: 2


Click on the image
Select format picture
Select compress image/change the resolution
Select email and OK
or
click on image
save as a different file type/jpg

Question Answer Marks

23 4 Tick 3
(3)
Compare with source document 3
Carry out a range check on the data
Only accept alphabetic characters
Get a second person to read through the document 3
Ensure the data is 100% accurate
Type in the data twice and compare versions 3
Calculate a check digit
Check spelling

Mob. 0101 100 9465 273 Eng: Mohamed Mamdouh

You might also like