0% found this document useful (0 votes)
16 views

Paper 1 SL MS

The document outlines various aspects of information technology, including compatibility issues when merging IT systems, functions of the control unit in CPUs, and the characteristics of data packets. It also discusses virtual machines, usability problems in voice recognition systems, and the importance of security measures in healthcare data management. Additionally, it covers methods for data loss prevention, automated letter generation using mail merge, and ethical considerations in using images in design.

Uploaded by

Bot 10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Paper 1 SL MS

The document outlines various aspects of information technology, including compatibility issues when merging IT systems, functions of the control unit in CPUs, and the characteristics of data packets. It also discusses virtual machines, usability problems in voice recognition systems, and the importance of security measures in healthcare data management. Additionally, it covers methods for data loss prevention, automated letter generation using mail merge, and ethical considerations in using images in design.

Uploaded by

Bot 10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Section A -

1. State two compatibility issues that may occur when two information technology (IT) systems
are merged. [2]
● Language differences / lexical differences present across datasets to be merged;
● Data representation differences / different data structures (e.g., date format,
incompatible file formats);
● Incompatible hardware;
● Incompatible operating systems / different software versions;

2. Identify three functions of the control unit (CU) in the central processing unit (CPU) [3]
● Decodes the instructions
● Control Signal Generation // controls all the other internal components of the CPU
● Timing and Sequencing // The CU manages the timing and order of operations,
ensuring that each step in the execution of an instruction happens in the correct
sequence and at the right time.
● Retrieves and stores data/addresses from RAM // writes or reads the data to/from the
location in RAM

3. State three pieces of information that a data packet must contain. [3]
● Destination Address
● Source Address
● Payload

4. Outline what is meant by a virtual machine. [2]


○ software emulation of a physical computer
○ creates an environment allowing users to run multiple operating systems on single
physical hardware host
○ abstracts the hardware components like CPU, memory, network devices, and storage
from the underlying physical hardware, enabling the sharing of these resources
among different virtual machines

5. Identify two usability problems that can occur in a voice recognition system. [2}
○ Accuracy Issues
○ Limited Vocabulary and Understanding.
○ Need Training

6. Outline the role of the memory data register in the machine execution cycle. [2]

First Mark: Awarded for stating that the Memory Data Register (MDR) is used to temporarily
hold data that is being transferred to or from the computer's main memory. (1 mark)
○ Second Mark: Awarded for explaining that the MDR interfaces between the CPU and
the memory, serving as a buffer that either stores data fetched from memory awaiting
to be processed by the CPU or holds data that the CPU is sending to memory. (1
mark)
7. Construct a truth table for the following logical expression. [3]
○ (A XOR B) AND NOT C

A B C A XOR B NOT C (A XOR B) AND NOT C

0 0 0 0 1 0

0 0 1 0 0 0

0 1 0 1 1 1

0 1 1 1 0 0

1 0 0 1 1 1

1 0 1 1 0 0

1 1 0 0 1 0

1 1 1 0 0 0

1 Mark for A XOR B column


1 Mark for NOT C
1 Mark for Final

8. Describe the steps involved in performing a binary search of an array. [4]

Award [4 max]

Example 1:
Calculate the index of the middle point in the array: (first + last)/2;
Compare item found with the one stored at middle point;
If greater than the value at the middle point, search the upper half of the array (right side) by
calling the binary search method again with a new first index (first = middle + 1);
If smaller than the value at the middle point, search the lower half of the array (left side) by
calling the binary search method with a new last (last = middle −1);
if found algorithm terminates;

Example 2:
Find the centre point of the array[ ];
Compare item to be found with the current name in array[ ];
If correct surname found => STOP;
Else if item to be found is greater than the current name in array eliminate lower half of array
from search and repeat algorithm;
Else if item to be found is less than the name in array eliminate upper half of array from
search and repeat algorithm;

Note: Allow a mark for provision for name not found;


9. Construct a trace table for the following algorithm [4]

A=3

B=7

loop while B >= A

A=A+1

output(B – A)

B=B-1

end loop

A B output

3 7

4 4

5 6 1

6 5 -1

1 mark for initialisation (Blue)

1 mark for A (yellow)

1 mark for B (green)

1 mark for output (pink)


Section B

Answer all questions.

10. The staff at a doctor's practice consist of a receptionist and a doctor.

The patient's medical records and payments, the doctor's appointment


calendar, and other important data are stored in a database on the central
computer.

(a) Outline one security measure that can be taken to prevent unauthorized
access to the patients' data stored on the central computer. [2]

● Implementation of strong password policies that require complex passwords


that must be changed on a regular basis. (1 mark)
● Use of multi-factor authentication (MFA) where users must provide multiple
proofs of identity such as a password and a one-time code sent to a mobile
device. (1 mark)
● Installation and regular updating of anti-virus and anti-malware software to
protect against unauthorized access from malicious software. (1 mark)
● Employing a firewall to monitor and control incoming and outgoing network
traffic based on predetermined security rules. (1 mark)
● Regularly updating the operating system and application software to ensure
security patches are applied. (1 mark)
● Limiting user access rights so that individuals can only access the data
necessary for their job role. (1 mark)
● Use of encryption for data both at rest within the database and in transit
between the database and end-users. (1 mark)

(b) (i) Identify one cause of data loss. [1]


● Hardware failure such as a hard drive crash. (1 mark)
● Human error such as accidental deletion of files. (1 mark)
● Software corruption or system crashes that lead to data becoming
inaccessible. (1 mark)
● Natural disasters such as fires, floods, or earthquakes that damage the
computer hardware. (1 mark)
● Cyber-attacks such as ransomware or other malware that can encrypt or
delete data. (1 mark)

● (ii) Describe one method that can be used to prevent data loss [2]
Regular backups of all critical data, which can be stored off-site or in the
cloud to ensure it can be recovered in case of data loss. (1 mark)
● Use of Uninterruptible Power Supplies (UPS) to prevent data loss due to
power outages or surges. (1 mark)
● Implementing disk mirroring or RAID (Redundant Array of Independent
Disks) systems to duplicate data across multiple drives, which ensures data
is not lost if one drive fails. (1 mark)
● Employing version control systems to keep track of changes and allow
rollback to previous versions in case of data corruption. (1 mark)
A new vaccine has been distributed that would be of benefit to some of the doctor's
patients. A large number of personalized letters need to be written to these patients,
inviting them to visit the doctor's practice to be vaccinated.

(c) Describe how these letters could be automatically


generated by a word processing application. [3]

● mail merge feature. (1 mark)


● Connect to a database or spreadsheet containing the details of the patients
who would benefit from the vaccine (1 mark)
● Design a template with placeholders for the personalized information (fields)
that will be replaced with the actual data from the database or spreadsheet
for each patient. (1 mark)

When the doctor visits a patient in their home, she needs to be able to access the
patient's medical records stored on the central computer in the practice.

(d) Outline two reasons for the use of a virtual private network (VPN)
in this situation. [4]

● Security:
○ data encryption provided by the VPN (1 Mark)
○ encryption protects sensitive data from unauthorized access.(1
Mark)
● Remote Access:
○ remote access capability provided by the VPN. (1 Mark)
○ allows the doctor to retrieve patient records as if they were on the
local network. (1 Mark)

A mobile data connection enables the doctor to access internet resources


while visiting patients in their homes. Sometimes the data transfer speeds are
slow.

(e) Explain why the speed of data transmission across a mobile network can
vary. [3]

● Signal Strength: The strength of the signal between the mobile device and
the cell tower can affect transmission speeds. Obstacles such as buildings,
natural terrain, or distance from the tower can weaken the signal, leading to
slower speeds. (up to 3 marks)

○ One mark for mentioning signal strength as a factor.


○ Up to two marks for explaining how obstacles, distance, or
environmental factors can weaken the signal and thus reduce
speed.

● Network Congestion: The number of users simultaneously accessing the


network can lead to congestion. During peak usage times, more users
share the same bandwidth, which can result in slower data transmission for
everyone. (up to 3 marks)
○ One mark for identifying network congestion as a factor.
○ Up to two marks for explaining how high user volume can
overwhelm network capacity and slow down transmission speeds.
● Bandwidth Limitations: The available bandwidth of the network and any
data caps imposed by the service provider can influence the speed. Once a
data cap is reached, the provider may throttle the speed, decreasing the
data transmission rate. (up to 3 marks)
○ One mark for mentioning bandwidth limitations or data caps.
○ Up to two marks for explaining how reaching data limits can lead to
throttling and slower speeds.

● Technology and Infrastructure: The type of mobile network technology (e.g.,


3G, 4G, 5G) and the quality of the network infrastructure can cause
variations in speed. Newer technologies and well-maintained networks
typically offer faster and more reliable connections. (up to 3 marks)
○ One mark for identifying the type of mobile technology and
infrastructure as factors.
○ Up to two marks for explaining how advancements in technology
and infrastructure quality can lead to speed variations.

11. A systems analyst has been employed to make proposals on how to improve the current
operation of a design company.

To achieve this, the analyst decided to carry out interviews.

(a) (i) Identify one other method of obtaining information from the
end-users. [1]

● Phone interviews
● Online surveys
● Focus groups
● Observation
● Document analysis
● Online user forums or communities

(ii) Outline one advantage of using the method identified in part (a)(i) in
preference to interviews. [2]

● Phone interviews: Similar to face-to-face interviews, phone


interviews involve speaking with end-users over the phone. This
method allows for more flexibility in scheduling and can be useful
when face-to-face meetings are not possible.
● Online surveys: An analyst can create and distribute online surveys
to gather information from end-users. Surveys can be designed to
collect quantitative data through multiple-choice questions or
qualitative data through open-ended questions. Online surveys are
efficient for reaching a large number of end-users and can be easily
analyzed.
● Focus groups: Focus groups involve gathering a small group of
end-users together to discuss specific topics or issues related to the
design company. The analyst moderates the discussion and
encourages participants to share their thoughts, opinions, and
experiences. Focus groups allow for group dynamics and interactions
among participants, leading to rich insights.
● Observation: By directly observing end-users in their work
environment, the analyst can gain insights into their daily tasks,
challenges, and workflows. This method involves watching and
documenting how end-users interact with the current systems and
processes, which can provide valuable information for improvement.
● Document analysis: The analyst can review existing documents,
such as user manuals, support tickets, or feedback forms, to gather
insights into end-users' experiences and pain points. Analyzing these
documents can help identify recurring issues and areas for
improvement.
● Online user forums or communities: Participating in online forums
or communities related to the design industry can provide the analyst
with valuable information. By engaging with end-users in these
platforms, the analyst can ask questions, seek feedback, and gain
insights into their needs, preferences, and challenges.

(b) Outline the purpose of prototypes. [2]


● Proof of Concept: Prototypes allow designers and developers to validate the feasibility of
their ideas and concepts.
● User Feedback and Testing: Prototypes provide an opportunity to gather feedback from
end-users and stakeholders early in the design process.
● Iterative Design: Prototyping facilitates an iterative design process where designers can
quickly make changes, enhancements, and refinements based on user feedback and testing
results.
● Communication and Collaboration: Prototypes serve as a communication tool between
designers, developers, stakeholders, and end-users
● Investor and Stakeholder Engagement: Prototypes can be used to attract investors, secure
funding, and engage stakeholders.
● Risk Reduction: Prototyping allows designers to identify and mitigate potential risks and
issues early in the development process.

(Question 11 continued)

A software company has been employed to program and implement a new system
proposed by the systems analyst.
(c) Explain why software testing is important at all stages of implementation. [3]

● Detecting and Fixing Bugs: Testing helps identify and uncover software defects,
bugs, and errors.
● Ensuring Functionality and Quality: Testing verifies that the software meets the
specified requirements and functions as intended.
● Validating System Integration: During implementation, various software
components, modules, or subsystems are integrated to form a cohesive system.
● Assessing Performance and Scalability: Testing allows for evaluating the
performance of the software under different conditions and workloads.
● Verifying Security and Compliance: Testing is essential for validating the security of
the software and ensuring that it adheres to relevant standards, regulations, or
industry best practices.
● Enhancing User Experience: Testing is critical for ensuring a positive user
experience.
● Building Confidence and Trust: Thorough testing instills confidence in the
software's reliability and performance.
Using images in design may have ethical considerations.

(d) Explain one ethical problem associated with using images. [3]

● Copyright Infringement: One of the primary ethical concerns is the unauthorized


use or reproduction of copyrighted images. Using images without proper permission
or licensing can infringe upon the rights of the original creators or owners. Designers
must ensure they have the necessary rights or licenses to use images and respect
copyright laws.
● Plagiarism: Using images without proper attribution or claiming them as one's own
work is a form of plagiarism. It is unethical to present someone else's work as your
own, whether it's an entire image or elements within it. Designers should give credit to
the original creators and obtain permission when necessary.
● Misrepresentation and Deception: Images can be manipulated or altered to
misrepresent reality, deceive viewers, or manipulate emotions. This can lead to
ethical dilemmas, especially in advertising or journalism, where truthfulness and
transparency are expected. Designers should be mindful of presenting images
accurately and ethically, avoiding misleading or deceptive practices.
● Stereotyping and Bias: Images can perpetuate stereotypes, reinforce biases, or
marginalize certain groups of people. Designers need to be aware of the potential
impact of their image choices and avoid using visuals that perpetuate harmful
stereotypes or promote discrimination. Embracing diversity, inclusivity, and cultural
sensitivity in image selection is essential.
● Exploitation and Objectification: Using images that exploit or objectify individuals,
particularly women or marginalized groups, is ethically problematic. Designers should
be conscious of how their image choices may reinforce harmful societal norms,
objectify individuals, or contribute to the perpetuation of harmful beauty standards.
● Privacy and Consent: Using images of individuals without their consent or invading
their privacy can raise ethical concerns. Designers should respect privacy rights and
obtain appropriate consent when using images that feature identifiable individuals.
This is particularly relevant when working with personal or sensitive data.
● Cultural Appropriation: Appropriating images from specific cultures or communities
without proper understanding, respect, or permission can be seen as disrespectful
and ethically problematic. Designers should exercise cultural sensitivity and avoid
appropriating or misrepresenting cultural elements in their designs.
● Environmental Impact: Using images that contribute to environmental harm or
promote unsustainable practices can also be considered an ethical issue. Designers
should consider the environmental impact of their image choices, such as using
images that promote eco-friendly practices or avoiding visuals that support
environmentally harmful industries.
Images are sometimes larger than the limit placed on email attachments. For example, a 60
MB image file needs to be sent by email without losing quality, but a file larger than 10MB
cannot be uploaded as an attachment.

(e) (i) Describe how large image files can be sent by email. [3]

● File Compression: Use file compression software or tools to reduce the size of the
image file without compromising its quality. You can compress the image file into a
more compact format, such as ZIP or RAR. This can significantly reduce the file size,
making it easier to send as an email attachment. However, note that some email
providers may still have limitations on the maximum compressed file size.
● Cloud Storage Links: Instead of attaching the large image file directly to the email,
upload the file to a cloud storage service like Google Drive, Dropbox, or OneDrive.
Once uploaded, generate a shareable link for the file and include it in the email. This
way, the recipient can access and download the file from the cloud storage service
without any size limitations. Ensure that the cloud storage account has sufficient
space to accommodate the large image file.
● File Transfer Services: There are specialized file transfer services designed for
sending large files. These services allow you to upload your image file to their servers
and generate a secure download link. You can then include the download link in the
email for the recipient to access and download the file. Examples of such services
include WeTransfer, SendSpace, or Filemail.
● FTP (File Transfer Protocol): If you have access to an FTP server, you can upload
the large image file to the server and provide the recipient with the FTP server details,
including the login credentials and file location. The recipient can then use an FTP
client to connect to the server and download the file. FTP is suitable for larger files
and is commonly used for file transfers.
● Splitting the File: If none of the above methods are feasible, you can split the large
image file into smaller parts using file splitting software. This divides the file into
several segments, each below the attachment size limit. You can then send each
segment as a separate email attachment, and the recipient can reconstruct the
original file using file merging software.

(ii) State one other hardware or software problem associated with the use
of images. [1]

● Insufficient Storage
● Inadequate Processing Power
● Display Quality and Calibration
● Incompatible Hardware Devices

● File Format Compatibility


● Software Performance and Stability
● Data Loss or Corruption
● Software Bugs and Vulnerabilities
● License and Copyright Compliance
12. There are 20 gymnasts who took part in a gymnastics competition. Competitors were assessed
by 8 judges who each awarded a score in a range from 0-10. The judges were numbered 0-7.
The competitors' names are stored in the one-dimensional array NAMES, and their scores are
stored in the two-dimensional array SCORES (see Figure 1).
For example, the score that Judge 4 awarded to Mary Tann (NAMES [ l J) is 8.9 and can be found in
SCORES (l] [4].

(a) State the judge who awarded the highest score to the competitor Tea Fox. [1]

Answer: 3

The highest attainable score in gymnastics is 10.0.

(b) Construct an algorithm that determines and outputs the number of times the highest
attainable score was awarded in this competition. [4]

- Search through the 2D array to find highest score (which is =10) - use of any
applicable loop (nested for loop for ex) - 2 marks - a correct row and column loop
- Declaration of the variable that represents the count of the highest score and
increment by 1
- If statement with the correct condition (highest attainable score = 10.0)
- Output of the count of the highest score

For example (use of nested for loop):

highest_score_count = 0

for n in 0 to 19:

for j in 0 to 7:

If SCORES[ n ] [ j ] = 10.0

highest_score_count += 1

OUTPUT highest_score_count

WHILE LOOP example:

n=0

j=0

WHILE n < len(SCORES):

WHILE j < len (SCORES [n] ):

If SCORES[ n ] [ j ] = 10.0:

highest_score_count += 1

j+=1

n+=1

j=0
A competitor's final score is calculated by ignoring the highest and the lowest mark
awarded and averaging the remaining marks.
For example, the highest mark awarded to Lilly Bush was 7.9, and the lowest mark was 6.9,so her
final score was(7.2+ 6.9 + 6.9 + 6.9 +6.9 + 7.2)/6.

(c) Construct an algorithm in pseudocode to output the name and the final score for
every competitor. [10]

Answer:
2 marks - for looping through 2D array (rows and columns)
1 mark - finding min score (if statement) - searching through all the scores
1 mark - finding max score - searching through all the scores
1 mark - assigning min score to a variable, such as minScore
1 mark - assigning max score to a variable, such as maxScore
1 mark - for calculating total and average
1 mark - for subtracting max_Score / min_Score from total_Score or any valid alternative calculation
1 mark - for correct use of row index and column index throught the solution
1 mark - for outputting name and score with correct indices

Allocation of marks may vary according to the solution of the student.


Example:

for n in range 0 to 19:

gymnast_scores = SCORES[n] #gymnast_scores can be replaced by SCORES[ n ] [ j ]

min_Score = SCORES[n][0]

max_Score = SCORES[n][0]

total_Score = 0

for j in range 0 to 7:

total_Score = total_Score + gymnast_scores[ j ] // total_Score += SCORES [ n ][ j ]

If gymnast_scores[ j ] < min_Score:

min_Score = gymnast_scores [ j ] // min_Score = SCORES [ n] [ j ]

else if gymnast_scores [ j ] > max_Score:

max_Score = gymnast_scores [ j ] // max_Score = SCORES [ n] [ j ]

total_Score -= minScore

total_Score -= maxScore

OUTPUT NAMES[n] , total_Score/6 (#can also be assigned to finalScore or equivalent)

You might also like