QNA
QNA
4. Which one of these is the maximum range of devices connected using a personal area
network?
Ans: 10 metres
5. Which one of these is the type of network formed when a Bluetooth mouse is connected
to a laptop?
Ans: PAN
b) Users may experience when using a wireless network and potential solutions to
prevent them happening.
Potential issue Hackers trying to gain access
Potential solution Regularly change wireless password
Potential issue Lack of signal
Potential solution Move closer to router, remove interference sources
8. Which one of these is an advantage of using a wired rather than a wireless network?
Ans: Lower lantency
b) Which of these processes prepares data for transmission across the Internet?
Ans: Data is split into packets
d) Give two reasons why some people do not have access to the Internet.
Ans: Cost
Remoteness
Rural location
Lack of infrastructure
Politics
Culture/ Religion
16. State one reason why a data packet contains the sender’s IP address.
Ans: So the receiver knows where to return the data
So firewalls can protect systems/ check for blocked addresses.
Requesting dropped packets (so that a request can be sent to the sender for the packet
to be resent if it gets lost/ corrupted).
20. The World Wide Web is stored on computers that are connected to the Internet.
State what is meant by the term ‘World Wide Web’.
Ans: Hyper-linked content
A collection of web pages (accessed via a browser)
A collection of documents formatted in HTML and accessed via HTTP
b) Which one of these is increased by using wired rather than wireless connectivity?
Ans: Bandwidth
c) Explain why Near-field Communication (NFC) is a better choice than Bluetooth for
making payments in a shop.
Ans: More secure because there is less chance of interception.
Or because it has shorter range.
27. Which of these should be used to pair a smartphone with a wireless speaker?
Ans: Bluetooth
28. Complete the sentence using the correct word from this list.
Global television stations broadcast using satellite technology.
34. State the type of anti-malware that prevents software from recording what a user types
on a keyboard.
Ans: Anti-spyware (anti-keylogger)
35. Complete the sentence using the correct words from this list.
Malicious USB devices can contain a virus, which is a type of malware that can intercept
data.
41. Give one benefit of using a network data speed of 1Gbps than 1 Mbps.
Ans: Data can be transferred/ sent/ received more quickly, it is faster.
Data Representation
Understand the difference between bitmap and vector
51. The image is represent by this binary pattern: 0100 1011 0100 0100
a) State the number of pixels in the image.
Ans: 16
54. State one advantage of using vector graphics rather than bitmap graphics.
Ans: Resolution quality is not reduced when enlarged, resized
Smaller file sizes
Transfer more quickly
Uses less bandwidth
57. An image has a width of 1064 pixels and a height of 1600 pixels.
It is resized to a width of 1000 pixels and a height of 1600 pixels.
Explain the effect of resizing the image using these settings.
Ans: The image will appear skewed because it is not in proportion.
The image will be distorted because only the width has been width.
58. Explain one benefit of increasing the number of bits used to represent each pixel in an
image.
Ans: You can create more colorful images because using more bits increase the number
of values/ representations.
Vector graphic use coordinates that can be recalculated when an image is resized.
61. Complete the sentence using the correct phrase from this list.
The colour depth of the image is 1-bit.
62. Explain why more storage is required when the sample rate for a sound is increased.
Ans: More bits are used because ore representations of the amplitude. OR
Increasing the same rate means that more samples will be taken and more data will be
generated because the amplitude of the sound at each sampling point is represented by
a fixed number of bits.
63. Explain the benefit of increasing the sample rate when recording the sound.
Ans:
64. Complete the sentence by using words from the list.
a) A sample of the amplitude of a sound is measured thousands of times every second.
More data available to represent each sample so better recreating of the original
sound
65. Computers use binary patterns to represent text, images and sound.
Draw one straight line from each type of data to what the binary pattern represents for
that type of data.
Text (Type of data) Characters (represent)
Images (Type of data) Pixels
Sound (Type of data) Amplitude
66. Which of the following is a common industry standard for encoding character data?
Ans: Unicode
69. State one reason why Unicode rather than ASCII is used to encode the text.
Ans: Unicode can represent more characters.
Russian/ cycillic characters not represented by ASCII
71. State the number of different characters that can be represented using 7-bit ASCII.
Ans: 128, 2 power 7.
Understand the use of appropriate file type and compression
Using file compression tools
Understand data/information are collected and used
73. Explain one reason why it is important to consider the intended purpose of an image
when selecting a file type.
Ans: It may not be possible for others you share the file with to open/ edit the file
because they might not have the same application software/ same applications software
are only able to open certain file types.
The file size of the image may need to be as small as possible because it’s going to be
used on a website.
75. An image will be used in a web page accessed by users with slow connections.
Which one of these would make the image fit for purpose?
Ans: Compressing
76. Which one of these is a reason for compressing files before uploading them?
Ans: Speeds up file transfer
79. Emily wants to let other access her file, but not edit the content.
State the type of file permission that Emily should set.
Ans: Read only/ view/ comment
80. State one file permission that prevents others from editing a file.
Ans: Read only / view
83. How we behave and stay safe online is taught in schools across the world.
Protecting location (Online concern) Disabling GPS tagging (Suggested method)
Protecting identity (Online concern) Using a pseudonym (Suggested method)
Avoiding copyright issues (Online concern) Taking original photos (Suggested
method)
88. Give two ways to reduce the environmental impact of the disposal of smartphones.
Ans:
1. Reduce use of toxic materials/ use eco-friendly materials.
2. Reuse (e.g. give to a friend/ school etc) / Sell
3. Repair rather than replace
4. Reduce carbon footprint (by not shipping waste to other countries)
5. Depose at specialist, e-waste sites/ Extract precious and non-renewable materials
6. Encourage manufacturers to support older models for longer
7. Encourage owners to not to upgrade all the time.
89. The environment can be harmed by the use and disposal of digital technologies.
Give two ways that the manufacture of digital technologies can harm the environment.
Ans: Removal of habitats/ damage caused by mining for components.
Removal of water sources used to cool factories.
Pollution generated by factories.
Pollution from shipping of components.
Power usage in production using non-renewable energy.
90. Explain one way in which the manufacture of digital devices damages the environment.
Ans:
b) Explain why it is important to use data from secondary sources in addition to primary
sources.
Ans: This avoids (personal) bias/ provides more opinions and ideas because
secondary sources are created by others.
Comparison can be made (against primary data) so it increases reliability to improve
validity.
98. Complete the sentence using the correct word from the list.
Analysis is used to find patterns in data.
102. Which one of these provides an interface between the computer and the user?
Ans: Operating system
103. Which one of these makes it possible for a user to enter data using a mouse?
Ans: Operating system
104. Which one of these does the operating system provide to the user?
Ans: Interface
107. Joanna is a sports coach. She shares a training video with an athlete online.
Give the type of untility software she should use before she uploads the file and the
reason why.
Type of utility software: Compression
Reason: Transfer to the server takes less time/ each file has its size reduced.
108. Draw one straight line from each example of ultility software to the correct purpose.
Compression software Reduce file sizes
Back-up software Create copies of files
Anti-malware Protect from viruses
109. Draw one straight line from each hardware component to its correct purpose.
Central processing unit (hardware component) Executes instructions (purpose)
Main memory (hardware component) Stores executing programs
Secondary storage Keeps programs and data indefinitely
110. Draw one straight line from each storage device to the correct reason for use.
Hard-disk drive Most cost efficient for large storage
Optical disc drive Not affected by power surges
Solid state drive Not affected by vibrations
112. Which one of these is the reason why ROM rather than RAM is used to store startup
instructions in a computer?
Ans: The instructions must not be lost when the power is turned off
113. Logic gates can be used to display the flow of information and decisions made by a
central processing unit (CPU).
a) Identify the logic gates.
Ans: Not gate/ AND gate
b) State the term used when referring to a CPU having more than one processing unit.
Ans: Multi/ Multiple – Cores
c) State the type of memory that stores the program needed to load the operating
system.
Ans: ROM/ Non-volatile/ Primary
117. State two reasons why read only memory (RAM) is used to store a computer’s start-
up instructions.
Ans:
121. Random-Access Memory (RAM) can retain data only while a power supply is
connected. State the term for this type of memory.
Ans: Volatile
b) Give two reasons why solid-state is the best choice of storage for portable music
players.
Ans: They have no moving parts
They use less energy/ power
They are not affected by movement
They are smaller (in size)
They are lighter
123. Which of these is a benefit of the type of media used by solid-state drives?
Ans: Energy efficient
125. Many modern desktop computers still use magnetic storage-based hard drives to
store the operating system and main programs.
a) Give one advantage of this type of storage.
Ans: cheaper than solid state
Low cost per byte
Reliable
Ease of availability
Wide range of capacities