Cg1 - all questions from past papers with answers

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Another recommendation is to upgrade to a Solid State Drive (SSD) which has no moving parts. Briefly explain why BYOdirect would recommend an SSD instead of a traditional hard disc drive.

Solid State Drive will (generally) have far faster access (read/write) speeds NOT just quicker / faster SSD less likely to fail

Briefly explain why Solid State Drives (SSD) do not suffer from this problem.

Solid State Drives can access data more quickly because there are no moving parts.

Giving one benefit for the user, explain how spooling is carried out on a computer when several documents need to be printed.

Spooling Data is stored on hard disc/in memory / stored in a queue 1 Document is printed when printer is free / in correct order 1 Benefit of spooling - User can carry on working / log off when waiting for job to print

Name one data structure which could store all the data for one member as a single item. only Explain why this data structure is suitable in this case.

The data structure which could store all three items of data for one member as a single item is a record 1 This data structure is particularly useful because it can store data of more than one type (1) and can be processed as one item by the computer (1)

Briefly describe the difference between Read Only Memory (ROM) and Random Access Memory (RAM), giving examples of what would be sensibly stored in each of these types of memory.

The difference between ROM and RAM is that in ROM the data is fixed during manufacture or is permanent and cannot be deleted or amended (1) whereas RAM is where data can be added, amended or deleted(1) Condone ROM is non-volatile and RAM is volatile without any explanation of meaning of non-volatile and volatile Example of data in ROM would be the boot strap loader, other systems software or hardware (system) settings / BIOS (1) Example of data in RAM would be a running program such as an application or the operating system. (1)

Explain how a binary search is used to locate an element called SearchValue in an array called SearchArray.

Calculate/determine mid Compare to middle element If not found, search lower or upper half 1 Repeat until found (or not present)

The organiser stores personal information about participants. The Data Protection Act gives participants the right to know what information is held about them. The organiser has notified the Information Commissioner and must comply with the eight principles of the Act. Two principles of the Data Protection Act are: • Data is fairly and lawfully processed • Data is processed for limited purposes State three other principles.

Data must be adequate, relevant and not excessive Data must be accurate and up to date Personal data stored for no longer than necessary Processed in line with your rights - individual can check and amend data Held securely Data can only be transferred outside EC to countries with adequate DPA

Customers of a supermarket can create an on-line account using the supermarket's web site. When they are logged onto their account they are able to view past orders, change contact and payment details and view the points balance on their loyalty card. Some of this data could be subject to accidental damage caused by the customer or by a supermarket employee. Define the term accidental damage. Give an example of accidental damage that could occur to data in the customer's account and briefly describe how the supermarket could prevent this problem.

...Accidental damage is when data is unintentionally amended or deleted (1) Examples of accidental loss for on-line supermarket accounts are: (1) Customer or supermarket employees deleting or amending contact details by accident Customer or supermarket employees deleting or amending payment details by accident Supermarket employees may incorrectly amend loyalty card points balance NOTE - not other type of accidental damage such as server crashes or floods, etc.... How the supermarket could prevent accidental damage: (1) Verify amendments or deletions on-line - "are you sure you want to ..." or double entry Customer has to confirm amendments or deletions in writing or by telephone Suitable staff training or clear customer instructions Make some data read only or restrict who can amend data.

The organiser of a sponsored walk uses an application package to help arrange the event. The package has a mail-merge facility and also the facility to use macros. Describe mailmerge and macros giving a suitable example of how the organiser might make use of each facility.

...Mail merge is taking data from an external source and combining it with a (standard) letter or document to form personalised letters. (Both ideas required for mark) (1) Suitable example of how the organiser might make use of mail merge - many suitable answers are acceptable but must be a sensible communication with all or most participants, examples include: Letter about walk arrangements to all participants Certificates of completion to all participants who completed. (1) A macro is the recording of key strokes which can then be replayed by clicking a button, menu item or allocated key combination. (Both ideas required for mark) (1) Suitable example of how the organiser might make use of macros - many suitable answers are acceptable but must be a sensible task that is performed more than once, examples include Inserting salutation on individual letters Performing a mail merge Inserting a special character such as ŵ for Welsh names or ñ for Spanish names Inserting a picture or graphic in a document

The Data Protection Act gives individuals the right to know what information is held about them. Companies that hold data about an individual must comply with the eight principles of the Act. Two principles are that personal information: • must be held securely • must not be transferred outside the European Community except to countries with adequate data protection legislation. State three other principles.

1. Data is fairly and lawfully processed 2. Data is processed for limited purposes 3. Data must be adequate, relevant and not excessive 4. Data must be accurate and up to date 5. Personal data stored for no longer than necessary 6. Processed in line with your rights

The Data Protection Act gives individuals the right to know what information is held about them. Companies that hold data about an individual must comply with the eight principles of the Act. Two principles are that personal information: • should not be stored for longer than necessary • should be processed in line with your rights meaning an individual can check and amend data stored about them. State three other principles.

1. Data is fairly and lawfully processed (and/or collected) 2. Data is processed for limited purposes 3. Data must be adequate, relevant and not excessive 4. Data must be accurate and up to date 5. Data must be held securely 6. Data can only be transferred outside EC to countries with adequate DPA

Define the computer terms: i) field (ii) record.

A field is a single item of data. A record is a collection of items all relating to an object (1) and is treated as a unit for processing

(iii) Describe in detail advantages of writing computer programs using user-defined subprograms.

A language that had many standard functions available would be better as the programmer would not have to write so much code. 1 Accept - because the standard function has already been tested/used ("for real") - less likely to have errors or probably been written by experts in the field

Philip has created a macro which enables him to print a section of the spreadsheet. Briefly explain the term macro and give a reason why Philip would create a macro.

A macro is a sequence of instructions defined as a single element. 1 One reason for using a macro in this case is because: 1 • it makes printing easier or printing is a commonly used process • instead of clicking several menu options to print the user only has to click one button / saves time

Two computer programmers are discussing different computer languages. One of the programmers writes programs in a low level language and the other writes programs in a high level language. Describe, giving a reason, a situation where a programmer may decide to use a low level programming language. Give one reason why most programmers prefer to use a high level programming language.

A programmer may decide to use a low level programming language because - there are many acceptable answers and many program situations could be given if they are correctly justified. Examples of acceptable answers are: Tasks connected with the running of the computer (operating system) (1) because execution speed is critical or size of code needs to be small(1) Embedded system (1) because size of code needs to be small or primitive processor with limited instruction set (1) Real time systems like controlling an aeroplane (1) because control is required over the hardware and they have to run fast and respond immediately (1) Computer games (1) because hardware producing graphics will need to be programmed and program has to run quickly (1) One mark for reason why some programmers prefer to use high level programming languages from: Easier to understand / learn / program as commands are more English like and identifiers can be long and meaningful Availability of powerful commands (NOT more powerful language) that perform quite complex tasks such as Msgbox in VB or the SORT clause in COBOL May reflect the nature of the problem (problem orientated) and can be easier to program a solution such as HTML for web pages, SQL for database applications Suitable for general program production Can be translated to run on different platforms

Some computer applications are written in low level computer languages while others are written in high level computer languages. (a) Describe, giving a reason, a situation where a programmer may decide to use a low level programming language as opposed to a high level language.

A programmer may decide to use a low level programming language because - there are many acceptable answers but most program situations could be given if they are correctly justified. One mark for situation and one mark for reason 2 Examples of acceptable answers: Tasks connected with the running of the computer (operating system) because execution speed is critical or size of code needs to be small Embedded system because size of code needs to be small or primitive processor with limited instruction set

Briefly describe serial and sequential file organisation and explain the most appropriate method of adding a record to each type of file.

A serial file is where records are not stored in any particular order 1 A sequential file is where records are stored in (primary key) order. To add to a serial file the new record is appended to the end of the file To add to a sequential file, a new file is made by copying the old file until an insertion is required then inserting the new record (1) and copying the rest of the file (1)

Many high level computer languages provide programmers with standard functions and also the facility to write user-defined subprograms. (i) Explain the term standard function giving an example.

A standard function is a function provided by a compiler or an interpreter (which is so common that it is worth providing as part of the language) 1 Examples include standard mathematical operations such as Square Root, random number generators or standard I/O routines such as a message box in VB

Briefly describe a useful report that the new computerised system could produce for the manager.

A useful report - many suitable answers but must be related to business, for example: 1 Number of sales made for each menu item - best and worst / trends / busy and quiet times Items that have not sold in last month Providing statistics of total sales, monthly sales, busiest periods, best selling items, etc... Which customers buy what - offers and deals

A garage that repairs and services cars, currently stores the details of the customers and their cars, on paper, in files which are kept in a small office in the workshop. One problem with the current paper-based system is that sometimes the required paperwork for a customer's car is lost. The garage owner wants to use a computerised database system to store details of the customers and their cars. (a) Briefly describe one other possible problem with the current paper-based system and describe how a computerised database system could solve this problem.

A. Difficult and/or time consuming to find customer details NOT just 'difficult to search' alone B. Paper based systems are difficult and/or time consuming to back up as each piece of paper will have to be copied NOT just 'difficult to back up' alone C. Time consuming to amend or create customer and/or car details D. Difficult to sort customer and/or car details (into a useable order) NOT just 'difficult to sort alone E. Writing can be illegible Solution (which must follow problem described above) A. Database would be easy to and quick to search for a customer and/or car details B. Easy to back up a computerised database C. It is easy to type data into a database or more likely use data previously stored data D. Database can quickly sort data into any order required E. Always able to read writing on screen or could print 'clean copies'

Compare in detail fixed and variable length records.

A. Fixed length record has same number of bytes in each record and same number of fields Variable length record has different number of bytes in each record or different number of fields B. Fixed length record is easier to program as it can be calculated know how much space will be required Variable length record makes it difficult to calculate how much space will be required C. Fixed length records are quicker to process (read/write) by computer as start and end locations are known Variable length records are slower to process (read/write) by computer as start and end locations have to be calculated at read/write time D. Fixed length record wastes storage space as fields have blank space Variable length record saves storage space as no blank space E. Fixed length record will truncate long fields Variable length record avoids truncation as each field can extend to accommodate any number of characters...

A take-away restaurant takes orders for home food deliveries over the telephone. The orders are written down on paper and given to the chef. The manager of the restaurant decides to computerise the ordering system. All the meals and prices will initially be entered into a database and customer addresses will be entered when they place their first order. (a) Briefly describe one possible problem with the current paper-based system and describe how a computerised database system could solve this problem.

A. They may not be able to read the hand writing on the order or the wrong address B. Order could be written down incorrectly C. Incorrect calculations D. The order could be lost and there is no other copy Solution (which must follow problem described above) (1) A. Order is printed or displayed on monitor in kitchen which is clear B. Computerised system would have validation / drop down lists, etc... to minimise errors C. Calculations will be accurate D. If printed and lost can easily print another

Lashes is a successful beauty salon that currently stores clients' details on paper which are kept at reception. It is difficult for a beauty therapist to find the required paperwork for a client's previous visits. The salon owner has purchased a database system to store all the clients' details. (a) Briefly describe one other possible problem with the current paper-based system and describe how the computerised database system could solve this problem.

A. client details on paper could become lost or illegible / are difficult to back up B. Time consuming to amend or create client details C. Difficult to sort client details (into a useable order) CONDONE Difficult to sort Solution (which must follow problem described above) A. Database would be easy to back up or print out clean paper copies NOT data is more secure on a computer B. It is easy to type data into a database or more likely use data previously stored data C. Database can quickly sort data into any order required

A bank allows customers to access their accounts on-line using the Internet. When they are logged onto the web site they are able to view their statements and make payments. The data in these accounts could be subject to accidental damage. Define the term accidental damage and give an example of accidental damage that could be caused to a customer's on-line bank account. Explain how the bank could prevent such accidental damage.

Accidental damage is when data is unintentionally amended or deleted 1 Examples of accidental loss for on-line bank accounts are: 1 • Customer deleting information such as statements • Bank employees deleting information by accident • Computer server crash / other hardware failure • Software / system failure • Money lost / gained during transfer How the bank could prevent accidental damage: 1 • Make account files and statements read only • Ask user for confirmation of amendments or deletions • Suitable staff training • Clear user instructions • Recovery procedures

Briefly describe how an accountant could communicate using their wireless laptop computer from a client's premises.

Accountant could communicate using the laptop computer from client's premises if they were given access to client's wireless router / network or if there was a 'hot spot' Mobile phone internet adapter (condone 'dongle') 1 Alternatively they could communicate using email or a messaging service

The second recommendation is to issue the accountants with laptop computers so that they can work at any desk in the office and also use the laptop computers when out of the office visiting clients. (i) Name the hardware required for the network and for each laptop computer to enable wireless communication between each laptop computer and the office network.

Additional hardware required for the network is a wireless router (switch) 1 Additional hardware for each laptop computer is a wireless network card (maybe built in)

Computer files can contain fixed length or variable length records. Describe one advantage of using fixed length records and one advantage of using variable length records.

Advantage of using fixed length records: Fixed length record is easier to program as it can be calculated know how much space will be required Fixed length records are quicker to process (read/write) by computer as start and end locations are known Advantage of using variable length records: Variable length record saves storage space as no blank space Variable length record avoids truncation as each field can extend to accommodate any number of characters

A company has written a new computer game. (a) The game was tested near the end of development. Name this method of testing and describe who would typically carry out this testing.

Alpha testing (1) which is usually carried out 'in-house' by developers/programmers (1) (or company employees / people employed by the company for the specific purpose of testing)

Three testing methods often used are alpha, beta and acceptance testing; briefly describe each of the three methods.

Alpha testing is the issue of the software to a restricted audience of testers within the developer's own company. Beta testing is when a version is released to a number of people external to the company e.g. privileged customers in exchange for their constructive comments. Acceptance testing is the testing carried out to prove to the customer / end user that the system works correctly.

Software is tested using alpha and beta testing. Describe when each type of testing is carried out and who would normally perform each type of testing.

Alpha testing is usually carried out 'in-house' by company employees (or people employed by the company for the specific purpose of testing) to test the functionality and takes place before beta testing. Beta testing comes after alpha testing when the software, which is usually close to the finished product, is released to a limited audience outside of the company and their comments recorded.

Apart from solving problems with the current paper-based system, describe an additional benefit the new computerised system will provide for the customer.

An additional benefit the new computerised system will provide for the customer - many suitable answers but must be as a result of installing a computerised database system and NOT solving problems with paper-based system For example Any MIS report about sales, money, profit Customer only has to give address once Order taking will be quicker Could store orders and customer could order 'the usual' Sending automated letters to regular customers or customers who have not visited for a while Customers may have loyalty card / Identify regular customers and could give discount

Why is analogue to digital conversion required for voice recognition?

Analogue to digital conversion will be required for voice recognition because voice is analogue and computers only accept digital input

Two components of maintenance documentation are annotated listing and data dictionaries. Briefly describe each of these components and state who might make use of this type of documentation.

Annotated listing is the program with comments or description of code. NOT Annotated program unless described Data dictionary is a (file / table containing) description of the structure of the data (held in a database) / variables used in the system. Maintenance documentation would be used by the original programmer or by different programmer.

Many people have a personal page on a social networking web site where they can communicate and share photographs with friends and family. Some people still prefer to write letters and send photographs using conventional post. (a) Briefly describe any benefits of using a social networking web site for this type of communication with friends and family.

Answers must be benefits when compared to conventional post and include: No cost other that Internet access which they have anyway or can be free in school or libraries Quicker to write on Internet and upload a picture than writing and posting a letter Very easy (more likely) for people to reply Can include video, sound, hyperlinks, etc... Pictures and information can be posted instantly Can be accessed from anywhere (mobile phone) as you do not need actual photos and/or letter No cost in developing pictures Saves resources (not cost again) such as paper and fuel to deliver parcel Can upload lots of information and photos - would be difficult/time consuming to do this by post Can make use of interactive features such as 'like', 'tag, etc... Uploaded files can be easily backed up Some people will communicate using this medium who would never write a letter (informal idea) Pictures can be downloaded and used or shared by (many) friends and family

Customers of an on-line travel agent can book hotels, flights, and many holiday extras using the agent's web site. When a booking is made a customer can log into their account and view and amend all their current bookings. (a) A password is required to log into a customer account. When a customer creates the password it has to be at least eight characters long and be a mixture of letters and digits. Describe two other rules that could be applied to the password in the future.

Any two of: Password must be changed regularly - once a month Can't use same password twice in a twelve month period Password cannot be a dictionary word Could insist on punctuation / upper case and lower case Not allowed to use own name / username / email address

Name an application where real time transaction processing is necessary. Explain how real time transaction processing operates in this case and give one reason why real time transaction processing is necessary.

Application - may be an example of: 1 A. Booking Systems B. Real time stock control How it works - Real time transaction processing is where records are updated immediately 1 Why necessary - Relevant one of: 1 A. Avoid double booking or selling same seat twice B. Stock can be re-ordered as it gets low

Name an application where real time control processing is necessary. Explain how real time control processing operates in this case and give one reason why real time control processing is necessary.

Application example (many others will be suitable) - Controlling temperature in an industrial process 1 How it works - As input changes it affects the output for example as temperature rises cooling devices are operated 1 Why necessary - Instant response is required for example to avoid accidents from overheating

Files stored using a certain operating system can have four different file attributes which are read-only, archive, system and hidden. State the attribute that would be the most suitable for the following. A file no longer in regular use but may be required some time in the future. [1] A file the user should not be able to alter. [1] A file only used by the operating system.

Archive (1) Read-only (1) System

Write down the shape used in the diagram to represent a data flow.

Arrow pointing to right

Customers can obtain quotations for car insurance by completing an on-line application form. Verification and validation are carried out on the data input. A quotation is immediately sent to them by email. (a) The customer has to create an account so that the insurance quotation can be stored and retrieved at a later date. As part of this process, the customer has to input a password which is verified. Describe one method of verification that could be applied to the password.

Ask customer to type password twice 1 Compare both inputs to check that they are the same

Operating systems have different modes of operation. Batch processing can be used to produce electricity bills. Describe in detail how this mode of operation works and explain why it is the most suitable mode of operation in this case.

Batch processing could be used to produce electricity bills by collecting together the data, such as amount of electricity used this month for all customers to be billed, and using the customer file, with details such as tariff and payment method. This data can then be used with the billing application to produce the bills without any further human intervention. This could be carried out overnight or at any time when the computer resources are not in demand.

Describe any benefits for the company of the designers using a wireless network. [2]

Benefits for company: • Can work from anywhere in office/building (so could use any desk therefore more people could use less office space) • No need to transfer data - can send estimates and designs directly to printer. • Fewer computers required as one laptop instead of laptop and desk top computer.

The web site has a forum where customers can write reviews of hotels. Discuss in detail the benefits and drawbacks for the hotel owners and prospective hotel guests of this type of forum.

Benefits for hotel owners of this type of forum: Prospective guests can see honest reviews which might be good and are more trustworthy than hotel literature or holiday brochure NOT TWICE Hotel can advertise on web site Prospective hotel guests can book directly after reading review and increase business Hotel owner or manager can respond to a poor review explaining how problem has been rectified or how improvements were made showing other prospective hotel guests that they listen to guests Drawbacks for the hotel owners of this type of forum: One disgruntled guest could write unfair / bad / biased review and therefore deter other prospective hotel guests Disgruntled guests are more likely to leave a review than a satisfied guest so hotel may unfairly have more poor reviews than good Benefits for prospective hotel guests of this type of forum: Reviews might include tips about best rooms or rooms to avoid Reviews might include information about surrounding area or activities in the hotel area Reviews might be a more accurate description of hotel and activities at the hotel / first hand description / better insight Can ask specific questions Drawbacks for the prospective hotel guests of this type of forum: Reviews could be written by hotel owner or manager and give a false impression of hotel A disgruntled guest could write an unfair bad review not truly reflecting the hotel Web site may remove bad reviews if hotel spends a lot of money advertising on web site so prospective hotel guests do NOT get a true reflection of opinions

The number of people ordering their shopping on-line from supermarkets is growing every year. Describe benefits for the customers and benefits for the supermarket of shopping on-line compared with visiting the store.

Benefits for the customers of shopping on-line instead of visiting the store: • Save on travel costs • Less hassle that visiting store (possibly with family in tow) • Disabled customers may find it more convenient • Takes less time than visiting store • Search for offers • Save basket for next visit so it is easy to buy same items NOTE Answers must be benefit over visiting store and not just benefits on internet type answers Benefits for the supermarket of customers shopping on-line instead of visiting the store: • As more people shop on-line and less visit the stores supermarket could save on providing car parks for customers • Attract more or different customers • As more people shop on-line and less visit the stores supermarket could save by providing less checkouts and checkout staff required • Eventually supermarket could provide service from a warehouse saving on cost of large store • Analyse customer buying habits/trends to promote related products.

It is intended that each report will be sent to the pupil's home as an email attachment. Briefly describe a benefit and a potential problem with sending reports home in this way.

Benefits of sending the reports home using email • The school can save paper / resources by sending emails (environmental) NOT just cheaper alone • Email arrives same day / email arrives quicker than letter NOT just faster alone • Parents can reply very easily with questions / request appointment with teacher • Teacher can confirm receipt of delivery / read Problems of sending the reports home using email • Email could be deleted by pupil before parents read (Idea of privacy) • Could spread a virus (if no virus checker in place) • Not all parents check their email regularly or may not have access to email or package to open report / could be blocked as spam or junk email

Explain how a binary search is used to locate an element called SearchValue in an array called SearchArray.

Binary search (All these points may be shown on a diagram) • Locate middle element1 • If not found, search lower or upper half - idea of comparison, "if bigger" or "if smaller" 1 • Repeat until found (/ not present)

A bit is a binary digit either 1 or 0. Explain each of the computer terms byte and word.

Byte - a group of eight bits Word - a group of bits that can be manipulated as a single unit by the processor

Describe one feature of the user interface provided by an operating system which would be helpful for a novice user.

Candidates are expected to give a full answer which describes one of the following features which would be helpful for a novice user: • similar interface to other common operating systems • easy-to-use / easy-to-learn (qualified) • (extensive) help facility / useful error messages • robust / not easy to crash / error tolerant, etc. • graphical user interface with meaningful icons / avoid text input / drop-down menus • can be customised for beginner use One feature is the use of meaningful icons such as the recycle bin so the novice user could guess what it is used for, i.e. it's where deleted files go and user does not have to, learn and remember any commands

A large organisation with many offices throughout the country is upgrading its computer system. The new system has been designed and developed and is ready for installation. Discuss, with reasons, the suitability of different methods of changeover which could be considered by the organisation.

Changeover - One mark for description of method and then marks for each consideration of the method Direct "big bang" approach can be adopted - sudden change to new system Could be used where a failure would not be catastrophic Not used where a failure would cost lives or a lot of money Cheap to implement as no extra staffing costs If new system fails organisation have no system which could be costly or dangerous Parallel running - both systems running together for a time Safest option as if new system fails they still have existing system Expensive as require temporary staff or overtime for current staff to operate both systems Could cause confusion for staff and customers having two systems Phased changeover - part-by-part (by functionality) Suitable for different departments If new system fails the rest of the organisation can still function - not catastrophic (NOT TWICE) All staff can focus on one area to resolve any problems (NOT TWICE) Problems can be fixed quicker as more experts to resolve problem (NOT TWICE) Difficulties identified in one area can be resolved and managed in next area (NOT TWICE) Might cause problems in the changeover period when they need to communicate with each other and have different systems (NOT TWICE) Pilot changeover - part-by-part (by part of the organisation) Suitable for different offices If new system fails the rest of the organisation can still function - not catastrophic (NOT TWICE) All staff can focus on one area to resolve any problems (NOT TWICE) Problems can be fixed quicker as more experts to resolve problem (NOT TWICE) Difficulties identified in one area can be resolved and managed in next area (NOT TWICE) Might cause problems in the changeover period when they need to communicate with each other and have different systems (NOT TWICE) Example of an extended an answer (all four changeover methods considered - worth eight marks): The organisation could adopt the direct "big bang" approach which is when there is a sudden change to new system but care should be taken as a failure could not be catastrophic and possibly cost a lot of money or even worse people's lives. So this method would only be suitable where a system failure will not be expensive for example if it could be carried out over a weekend if the organisation is closed but not if they are offering a 24 hour life saving service like the ambulance service. This method is good as it is cheap to implement as there are no extra staffing costs. Parallel running is where both systems run together for a time, this is the safest option as if the new system fails they still have existing system which they can use. This method would be best where failure would be expensive or cost lives but it is expensive as the organisation would require temporary staff or pay overtime for current staff to operate both systems. It might cause confusion for staff and customers having two systems as they might not know which one to use or not have time to use both when busy. They could change different departments one at a time, this is called a phased changeover and is good because all staff can focus on one area to resolve any problems and problems can be fixed quicker as more experts are on hand to resolve the problem. A good point about this method is that any difficulties identified in one area can be resolved and managed in the next area so next department changeover should be smoother. A similar method is pilot changeover where different offices could be changed one at a time but may be useful where the offices are all over the country but it might cause problems in the changeover period when they need to communicate with each other and have different systems.

Explain why annotation is used in computer programs.

Comments used to make the program/code easier to understand (1) or help (other) programmers understand the program/code. (1)

The photographer wants to upload some of the images to a social networking web site. The site will only accept images in specified compressed file formats. Give two reasons why the web site will only accept compressed images.

Compressed images are quicker to upload Quicker to view web page with compressed images / pages load quicker Compressed image will take up less space (on the social web site's server) Server has limited space available

A professional photographer takes digital images and saves them on a computer. The images only are not compressed and use a large amount of memory. (a) A friend suggests that the files are compressed to save disc space. Give one reason why the photographer might not want to compress the images.

Compressing images may lose quality (particularly when printing)

A computer can be operated using voice input for commands. The same computer could be used to input a letter using vocabulary dictation. Discuss the problems associated with the use of voice input for vocabulary dictation. Explain why the use of voice input for commands is less prone to these problems.

Computer may not recognise two words that sound the same such as 'two' and 'to' but all commands will be distinct • Computer may not recognise vocabulary dictation due to user's voice being unclear as a result of a cold or sore throat but will have a better chance of recognising a command from a small set • Computer may not recognise colloquialisms or local dialect but should always recognise a word from a small set of distinct commands • Computer may not recognise vocabulary dictation as background noise is more likely to interfere with words used in everyday English/Welsh language compared to a word from a small set of distinct commands • Computer may not recognise proper nouns such as 'Nanyfyllon' • Limited number of commands so device can learn to recognise user very accurately compared to thousands of words in everyday English/Welsh language

There are various types of maintenance that will be required during the life-time of a computer program. (a) Name the type of maintenance that is required while the program is being used and an error is discovered. [1] (b) Name the type of maintenance that is required when the program has to be altered to run on a different operating system. [1] (c) Name the type of maintenance that is required when the performance of the program has to be enhanced.

Corrective Adaptive Perfective

The club has to comply with The Data Protection Act. They comply with two principles of the Act by processing the data for limited purposes only and keeping the data accurate and up to date. State four other principles of the Act that the club must comply with.

DPA - Any four of: 4x1 1. Data must be adequate, relevant and not excessive 2. Personal data stored for no longer than necessary 3. Processed in line with your rights - individual can check and amend data 4. Data can only be transferred outside EC to countries with adequate DPA 5. Data is fairly and lawfully processed 6. Held securely

The Data Protection Act gives individuals the right to know what information is held about them. Companies that hold data about an individual must comply with the eight principles of the Act. Two principles are that personal information is: • fairly and lawfully processed, • only processed for limited purposes. State three other principles.

DPA - Any three of 3x1 3. Data must be adequate, relevant and not excessive 4. Data must be accurate and up to date 5. Personal data stored for no longer than necessary 6. Processed in line with your rights - individual can check and amend data 7. Held securely 8. Data can only be transferred outside EC to countries with adequate DPA

The shop stores personal information about all previous customers. The Data Protection Act gives customers the right to know what information is held about them. The shop has notified the Information Commissioner and must comply with the eight principles of the Act. Two principles of the Data Protection Act are: • that personal information must be fairly and lawfully processed • that personal information must be held securely State three other principles.

Data is processed for limited purposes Data must be adequate, relevant and not excessive Data must be accurate and up to date Personal data stored for no longer than necessary Processed in line with your rights - individual can check and amend data Data can only be transferred outside EC to countries with adequate DPA

What type of object does the following shape represent? (Rectangle with the right side open)

Data store

Briefly describe a validation check that would sensibly be carried out on the number of bedrooms in a house. Give an example of invalid data that would be detected by this check.

Description of validation check Example of invalid data Type check - All entries should be digits Any non-integer Range check - number should be between sensible limits Any number outside limits described Presence check (accepted but not expected) Nothing in box

The designers will be able to use mobile internet access when in a client's home. Briefly describe one possible improvement in the service clients receive.

Designers could make use of access to the Internet to improve the service that they offer to the clients by, for example: 1 • accessing up to date appliance or accessory prices / products • availability of stock for more accurate estimates • being able to display kitchens with similar designs or features • searching for answers to client questions • looking at competitors prices

A firm of accountants currently use a number of stand-alone personal computers. They decide to update their computer system and employ a computer consultant to make recommendations about a possible new computer system. The consultant makes several recommendations. (a) (i) The first recommendation is to have a computer network using a star network topology. Draw a diagram that illustrates the star topology, giving one advantage of using a star network topology rather than other topologies.

Diagram with star in middle Advantage of star network topology 1 • Star has better security as switch is in control and message will not have to pass other stations • Star - If one cable / station breaks network can still operate - ring / repeater / station / bus breaks network is down

Some modern houses use a computer to automatically control the central heating by monitoring the house temperature and adjusting the central heating accordingly. Using the house temperature as an example, describe the difference between analogue and digital data and explain why conversion will be required for the computer to control the house temperature.

Difference - analogue is a continuous varying signal and digital consists of discrete bit patterns 1 Conversion is required because temperature is analogue data (1) and the computer will only accept digital input (1) and would therefore need converting to digital

A bank, which has branches in most towns and cities in Britain, requires a new computer system. They have employed a team of analysts to develop this new computer system. In order to understand the current system the analysts are going to carry out a thorough investigation. Discuss the different methods of investigation available to the analysts justifying their suitability for different situations. It is very important that the computer users, who will range from novices to experts, find the new system easy to use. Describe in detail the features you would expect to find in the human computer interface that the novice user would find useful and the features that the expert user would find useful.

Different methods of investigation available to the analysts and justification of their suitability for different situations: Study the existing system documentation Example of expansion - This is suitable for investigating current data storage requirements or data flow Carry out a questionnaire of bank staff Example of expansion - This is suitable because the bank staff are spread over a wide geographical area and there are many of them. (NOT TWICE) Carry out a questionnaire of bank customers Example of expansion This is suitable because the customers are spread over a wide geographical area and there are many of them. (NOT TWICE) Interview bank staff Example of expansion - This is suitable when the analysts require a lot of information from a small number of people such as selected bank staff (NOT TWICE) Interview bank selected bank customers Example of expansion - This is suitable when the analysts require a lot of information from a small number of people (NOT TWICE) such as selected customers Observe the current system in practice Example of expansion - This is suitable for gathering information first hand and not having to rely on what people tell you what they think is happening The description and justification of any of the methods could be extended with more detail and gain extra marks Features you would expect to find in the HCI that the novice user would find useful Should be intuitive / easy to learn • Should be easy to navigate • Could be graphical user interface for novice • Availability of shortcuts to initiate commands such as Explorer on desktop • Should be robust / uncrashable (NOT TWICE) • Could be similar to HCI of other packages in use etc (NOT TWICE) • Should have a good help facility / useful error messages / tutorials (NOT TWICE) • Can be customised for different users (NOT TWICE) • Clear well laid out interface (NOT TWICE) Features you would expect to find in the HCI that the expert user would find useful • Could be command line user interface for expert with availability of batch commands etc... • Availability of shortcuts such as ALT+?? • Should be robust / uncrashable (NOT TWICE) • Could be similar to HCI of other packages in use etc (NOT TWICE) • Should have a good help facility / useful error messages (NOT TWICE) • Can be customised for different users (NOT TWICE) • Clear well laid out interface (NOT TWICE)

A large organisation with offices throughout the country has employed a team of analysts to upgrade their existing computer systems. The team have designed and created new systems to replace the existing computer systems and are planning the changeover from the existing computer systems to the new systems. Describe in detail the different methods of changeover available to the team, clearly explaining the advantages and disadvantages of each method. Describe any benefits that using a team of analysts to carry out the changeover would have over an individual.

Direct "big bang" approach can be adopted - sudden change to new system Could be used where a failure would not be catastrophic Can be cheaper to implement New system is available immediately if required (NOT TWICE) Can be the least disruptive if implemented well New system may not work as well until staff are fully used to using it If new system fails organisation have no system which could be costly or dangerous Parallel running - both systems running together for a time Safest option as if new system fails they still have existing system Expensive as require temporary staff or overtime for current staff to operate both systems Could cause confusion for staff and customers having two systems New system is available immediately if required (NOT TWICE) Phased changeover - part-by-part (by functionality) Suitable for different departments All staff can focus on one area to resolve any problems (NOT TWICE) Problems can be fixed quicker as more experts to resolve problem (NOT TWICE) Difficulties identified in one area can be resolved and managed in next area (NOT TWICE) Might cause problems in the changeover period when they need to communicate with each other and have different systems (NOT TWICE) Slower to get new system up and running compared to some other methods (NOT TWICE) Pilot changeover - part-by-part (by part of the organisation) Suitable for different offices All staff can focus on one area to resolve any problems (NOT TWICE) Problems can be fixed quicker as more experts to resolve problem (NOT TWICE) Difficulties identified in one area can be resolved and managed in next area (NOT TWICE) Might cause problems in the changeover period when they need to communicate with each other and have different systems (NOT TWICE) Slower to get new system up and running compared to some other methods (NOT TWICE) Advantages of using a team of analysts compared with using an individual: Changeover should be completed quicker Different levels of experience and expertise so can carry out different tasks, for example senior analysts would be implementing a direct changeover More people have a more varied experience of businesses and changeovers

An on-line shop stores all its customers' email addresses electronically and often sends the same email to all customers. (i) What feature of the email package will allow the shop to send the same email to many customers? ii) Briefly describe what these emails might sensibly contain. iii)Briefly explain why some customers might not want to receive such emails from the shop.

Feature of the email package that will allow the shop to send the same email to many customers is a distribution list / send to many / send to group / mailing list Future emails might contain promotions about other products / special offers / product difficulties / surveys / newsletter Why some previous customers might not want to receive such emails is because they don't want junk email clogging up inbox / waste time reading

Many people, including children, use social networking web sites. The users have profiles on these sites where they can post personal information about themselves and describe their interests. These sites allow them to make new friends and share ideas, music and videos. Discuss the benefits and drawbacks of using social networking web sites.

Drawbacks of using social networking web sites • People may not be telling the truth and difficult to detect with no face to face contact • May come into contact with people trying to sell illegal material such as drugs / weapons / pornography / paedophiles • Site may be used for 'cyber bullying' • People may give out personal information such as age and telephone number • Lack of 'real' social contact may lead to losing social skills • RSI / posture / eye problems from prolonged computer use • Distraction from 'real work' / can become addicted to sites • May download virus • Information may be inaccurate or misleading • Information may be from parties with other reasons such as retailers suggesting their product • Prospective employers, etc, can use it to vet applicants Benefit of using social networking web sites • Can chat with or make new friends with similar interests • Can reunite old friends / allow distant friends/family to communicate • Can set up and join 'interest' groups / organise events • Some people find it easier to talk to strangers particularly about personal issues • Other children may know other 'good web sites' • Can chat with or make new friends from all over the world (only once) • Can find out information and receive answers to questions • Can be cheaper to talk using this method compared to the telephone - must be justified It is possible to make new friends on these web sites that you would never meet as they might live abroad and they might have similar interests to you which people in your area don't have. Some people on these sites may not be telling the truth and might lie about their age and as you cannot see them it is difficult to know who is lying and who is not whereas if you were speaking to them you could guess how old they were. If you spend all of your time on these web sites you will miss 'real' social contact with friends and real people and this may lead to not knowing how to behave in real society as people can get away with saying something on-line that they would never say face-to-face.

It is important that the client's email address is input correctly. Describe a suitable verification check that could be carried out on the client's email address. Briefly explain how this verification check would identify a mistake.

Email address is entered twice and they are compared If match email address is verified if no match then email address is rejected

Validation and verification checks are carried out on employee data being entered into a computer system. (a) Using an example of acceptable data describe a suitable validation check for each of the items of data below. In each case give an example of invalid data that would be detected by the check. A different validation check must be used in each case. [4] Employee salary Employee mobile telephone number

Employee salary Description Example of invalid data Type check - Entry should be real/currency for example 21045.89 or £21045.89 Any invalid data that check described would detect Presence check for example £21045.89 Nothing in box Condone Range check entry should be between two set limits for example 0 and 250000 Any invalid data that check described would detect Description Example of invalid data Format check entry should be ### ####### or similar for example 07971 123456 Any invalid data that check described would detect Length check entry should be 11 characters or similar for example 07971 123456 Any invalid data that check described would detect Type check - all entries should be integer for example 07971 123456 Any invalid data that check described would detect Presence check for example 07971 123456 There is nothing in the box Condone range check - every character should be in range 0 to 9 for example 07971 123456 Any invalid data that check described would detect

Many people use the Internet to download music files. Many of these files are legally available for free download, others can be legally purchased while some are downloaded illegally without payment. Discuss the effect these different types of music download have on people working in the music industry and people who download music. You should include in your answer a discussion of: • the ethical and legal issues • the effects on employment • any possible social and economic changes

Ethical and legal issues • Many of the files are corrupt when music is downloaded illegally without payment • people who download music may download a virus along with the music file when music is downloaded illegally without payment • The people who download the music illegally without payment are criminalised as they are committing an offence and can fined or possibly imprisoned Effects on employment • Record shops lose business and make less money and might have to reduce staff numbers • Employment in the record companies that promote the artists changes as they will require employees to set up and maintain web sites where music is legally purchased and downloaded • Employment in the record companies that promote the artists will be reduced as their income is reduced when music is downloaded illegally without payment • Free downloads can benefit artists as it is publicity • New artists can promote themselves without using record company by making music legally available for free download • New artists will need users to legally purchase and download some music to survive • Established artists can promote an album with one free download or samples of songs • The artists who produce the music do not receive any revenue which is particularly difficult for new artists when music is downloaded illegally without payment Social and economic changes • Downloads can be cheaper than buying CDs • Record companies save cost of producing media such as CD - songs are cheaper than traditional media • All artists can give away a song and receive feedback and reviews • People who download music get free music which saves them money when they legally download for free • People who download music can download in a format suitable for portable players - do not need to 'rip' (convert) CDs • Artists can release new albums quickly for example before a tour for legal download purchase • People who download music can hear sample of music before buying • People who download music illegally might then buy some or attend a concert • People who download music do not have a physical copy of music if computer crashes and all data is lost • Music can easily be copied and made available for others to copy

Give examples of what would be sensibly stored in each of these types of memory.

Example of data in ROM would be the boot strap loader, other systems software or hardware (system) settings / BIOS 1 Example of data in RAM would be a running program such as an application or the operating system.

What do two rectangles represent in a data flow diagram?

External entity

Briefly describe the type of information that the Freedom of Information Act relates to.

FOIA - information about public organisations such as where money is being spent

Name the protocol that would be best suited for the situations described below. (i) Copying a file from one location to another via the Internet. [1] (ii) Transferring multimedia web pages over the Internet.

FTP (File Transfer Protocol) HTTP (Hypertext Transfer Protocol)

State the most suitable protocol for each of the following uses: (i) copying a file from one location to another via the Internet; [1] (ii) transferring multimedia web pages over the Internet; [1] (iii) transferring emails between computer systems.

FTP (File Transfer Protocol); HTTP (Hypertext Transfer Protocol); SMTP (Simple Mail Transfer Protocol)/ Accept POP or POP3 (Post Office Protocol) / IMAP (Internet Message Access Protoc

Briefly describe the most suitable use for: • File Transfer Protocol (FTP); • Simple Mail Transfer Protocol (SMTP); • Hypertext Transfer Protocol (HTTP).

FTP would be used when copying a file from one location to another via the Internet/network. SMTP would be used when transferring emails between computer systems. HTTP would be used to transfer (multimedia) web pages over the Internet

Describe, giving a reason, a different feature of a high-level language that could be used for creating a graphical user interface.

Feature of a high-level language that would make it suitable for creating graphical user interface and reason • Ability to add buttons, menus, frames, etc.. to allow creation of easy to use interface / attractive interface / familiar interface / meet client specification • Ability to use colours, icons, images, etc... to create GUI that looks or attractive / familiar / meet client specification • Ability to create or use events for buttons, menus, etc... as GUIs are event driven

Different high-level programming languages have features which make them suitable for writing a variety of computer applications. (a) Describe, giving a reason, a feature of a high-level language that could be used for creating web pages.

Feature of a high-level language that would make it suitable for creating web pages and reason One mark for feature and one mark for reason 2x2 • Ability to insert hyperlinks because navigation between pages will be required • Ability to format text and graphics or ability to create style sheets to make the pages more interesting / appealing / ensure web site meets client specification • Ability to include platform independent code to allow code to be run on any machine that displays the web page • Ability to include/embed video and/or animation to make web site more interesting / appealing / ensure web site meets client specification / view immediately • Ability to include/embed sound to make web site more interesting / appealing / ensure web site meets client specification / play music

Computer files can contain fixed length or variable length records. Discuss the differences between these record types.

Fixed length record has same number of bytes in each record and same number of fields Variable length record has different number of bytes in each record or different number of fields Fixed length records are easier to program as it can be calculated know how much space will be required Variable length record makes it difficult to calculate how much space will be required Fixed length records are quicker to process (read/write) by computer as start and end locations are known Variable length records are slower to process (read/write) by computer as start and end locations have to be calculated at read/write time Fixed length record wastes storage space as fields have blank space Variable length record saves storage space as no blank space Fixed length record will truncate long fields Variable length record avoids truncation as each field can extend to accommodate any number of characters

Angharad is building her own personal computer. She has to decide which type of secondary storage devices to use. She considers the use of a floppy disc drive and a hard disc drive. Recommend two other secondary storage devices that Angharad could use. Compare the speed of access of these devices and describe a typical use for each device.

Flash memory stick to transfer large files such as database project or use for back up (suitable use - not twice) Flash memory sticks access time is the fastest CD/DVD writer to transfer (large) files such as films music albums or use for back up (suitable use - not twice) CD/DVD writer as CD/DVD access is quite fast External hard drive to use for back up (suitable use - not twice) External hard drive writer as External hard drive access is quite fast Tape drive for back up (suitable use - not twice) Tape drive is probably cheapest per byte but access time is the slowest One secondary storage device that Angharad could use is a flash memory stick which can be used to transfer large files such as a database project from your PC to school. Another secondary storage device that she might install would be a DVD writer as this could be used to back up your photos even though it might take more than one DVD. The DVD device has quite fast access when reading but can be slow to write whereas the flash memory stick generally has faster read and write access than a DVD device.

The client data will have to be input into the new computerised database system. Some items of data have validation and verification checks applied to them. (i) One item of data that is validated is the client's date of birth. Describe a suitable validation check that could be carried out on the client's date of birth, for example 21/02/1985. Give an example of invalid data that would be detected by this check. [2]

Format check - check date is in correct format ##/##/#### Length check - check data has 10 characters 21/A2/1984 or 2/3/84 2/3/84 or 21/123/1984 Presence check to reject data where required fields have been left blank (there has to be something input) There is nothing in the box Range check to ensure data is between sensible limits day between 1 and 31 month between 1 and 12 year for example between 1900 and 2010 Any one or all of above NOTE - not other random limits or description of a length check which is a contradiction 42 13 1842 Type check to ensure that a item is of integer type; all entries should be digits or / Bob or 160j

The data is collected lawfully and will not be held longer than necessary. Describe four other ways in which the Data Protection Act will apply to the data stored by Power Motors.

Four ways in which the Data Protection Act will apply to the data stored by Power Motors 1x4 Owner will have to register with Information Commissioner Personal data can only be used or disclosed for its intended purpose Data must be adequate, relevant and not excessive Data is up to date and accurate Customers can view and amend data if incorrect Security measures should be in place to prevent unauthorised access to the data Data can only be transferred outside EC?? to countries with adequate data protection

A computer's hard disc can become fragmented. Explain the term fragmentation and briefly describe the effect that fragmentation will have on disc access.

Fragmented - files are split up and stored on different parts of the disc Disc fragmentation will slow down disc access speed

Explain the difference between the use of global and local variables.

Global variable - can be used (changed/altered) anywhere in the program Local variable - can only be used (changed/altered) in the procedure where it is declared

State a suitable use for the following protocols: HTTP (Hypertext Transfer Protocol); FTP (File Transfer Protocol); IMAP (Internet Message Access Protocol).

HTTP - transferring (multimedia) web pages over the Internet 1 FTP - copying a file from one location to another via the Internet 1 IMAP - transferring emails (NOT messages) between computer systems (via the internet)

Bluetooth is a wireless technology for exchanging data over short distances. The driver's mobile phone can communicate with the car's audio system using a Bluetooth interface. Before any communication can take place the devices have to handshake. Explain the role of handshaking. The devices then communicate using wireless communication protocols. Explain the computer term protocol.

Handshake is the exchange of signals between devices to establish their readiness to communicate Protocol is a standard set of rules to ensure the proper transfer or information

Name the computer term for "the exchange of signals between devices to establish their readiness to communicate."

Handshaking

Many homes now have several computers connected using a wireless network. (a) Briefly describe the hardware required to set up a wireless network in the home.

Hardware required for each computer / laptop would be wireless network interface card/device (1) Hardware required for network would be a wireless router (or switch) CONDONE hub (1)

The company also want to allow employees to make a wireless connection to the network using their laptop computers. Describe the hardware that will be required to connect to the wireless network.

Hardware required for laptop would be wireless network card (accept adapter) Hardware required for network would be a wireless router (or switch)

The company needs to update their computer system and have employed an IT consultant to recommend a new computer system. The recommendation is to install a wireless network in the office and issue all the kitchen designers with new laptop computers. (i) Briefly describe the hardware required to connect each laptop computer to the wireless network.

Hardware required for laptops would be wireless network cards 1 Hardware required for network would be a wireless router (or switch) 1 Accept Wireless Access Point (Not WAP alone)

Many companies use email and the Internet to run their business. Some companies allow their employees unlimited access to the Internet and email for personal use while other companies allow limited access to the Internet and email for personal use. Explain how a company could limit access to the Internet and how they could limit access to email. Explain why some companies allow unlimited access to the Internet and email for personal use and why other companies limit access to the Internet and email for personal use. Companies are concerned about the health and safety issues relating to prolonged computer use. Describe preventative measures a company could use to reduce the chance of the health of the employees being affected by prolonged computer use.

How the company could limit access to the Internet and email. How could they limit Email access? • Filter all emails not allowing certain email providers through - yahoo.com, etc • Only allow emails from known trusted sources • Don't allow attachments • Employees have to sign an 'email use policy' or code of conduct (NOT TWICE) • Restrict access to email software during working hours (NOT TWICE) How could they limit Internet access? • Restrict access to specified categories of web sites • Employees have to sign an 'Internet use policy' or code of conduct (NOT TWICE) • Restrict access to Internet browser during working hours (NOT TWICE) Why allow unlimited access to the Internet and email for personal use and why limit the access to the Internet and email for personal use. Unlimited Internet access is good because: • Staff feel respected and trusted and therefore will not use when they should be working • Staff can access all sites and could research products • Staff can access all sites and could check up on competitors prices, products, offers, etc... Unlimited email access is good because: • Save cost of private phone calls Unlimited Internet access is bad because: • Use up band width downloading songs etc... • Staff will use the Internet work time and not carry out productive work (NOT TWICE) • Could publish sensitive or embarrassing company information on Internet • May access inappropriate sites which may offend colleagues due to their racist or chauvinist content (NOT TWICE) • May access illegal sites and put company in compromising situation (company could be prosecuted?) (NOT TWICE) Unlimited email access is bad because: • Use up server space with personal emails • Staff will use work time sending emails and not carry out productive work (NOT TWICE) • Could email sensitive company information to competitors • May receive or send inappropriate emails which may offend colleagues due to their racist or chauvinist content (NOT TWICE) • May receive or send illegal email and put company in compromising situation (company could be prosecuted?) (NOT TWICE) Preventative measures the company could use to reduce the chance of the health of the employees being affected by prolonged computer use. Preventative measures Use of safety screens / frequent breaks (fears of radiation from monitors) • Ensure employees have frequent eye checks / safety screen / correct lighting (eyestrain / headache) • Ergonomically / well designed chair, desk, etc (back / neck / posture problems) • Ergonomically / well designed keyboard / wrist rest (Concern for RSI)

Why is it good programming practice to use constants in computer programs?

It is good programming practice is use constants in computer programs because if you want to change the value of the constant you only have to change it once at the top and its value will be updated throughout the whole program

Briefly describe how John could reduce the storage requirements of his photographs so that he could email them.

John could use compression software to compress the photographs / convert them to another format such as JPEG which require less storage space.

A ticket agency posts thousands of letters to customers informing them of future events. Name a feature of a word processing package which could be used to produce these letters and briefly describe how these personalised letters are produced.

Mail merge (1) is taking data from an external source (1) and combining it with a standard letter (1) to form personalised letters.

A school teacher has to prepare end of year reports for over a hundred pupils. Each report has to include the pupil's name and address and a grade for each subject being studied. All the data required for the reports is stored on the school's computer system. (a) Name the facility of a word processor that could be used to combine this data to produce completed reports.

Mail-merge

Customers of an on-line auction web site access their accounts using the Internet. When they are logged onto the web site they are able to view items for sale, place a bid for an item, make payments and leave customer feedback. These accounts could be subject to malicious damage. Define the term malicious damage and give an example of malicious damage that a customer could suffer with an on-line auction account, explain how the auction web site could prevent malicious damage.

Malicious damage: • Deliberately deleting or altering data 1 Example of malicious damage: • Hacker / virus deleting or altering a customer's information / placing an unauthorised bid • A customer deleting or altering another customer's information • An employee deleting or altering a customer's information 1 Prevent malicious damage: • Firewall • Username and password (security questions) to enter system • Restricted access rights for company employees i.e. must not be allowed to amend or delete customer files • Restricted access rights for customers i.e. customers can only access their data • Virus checker

Using examples, describe in detail the role of the operating system in managing computer resources.

Manages peripherals such as input and output devices Communicates with and sends data output to a printer / monitor / other valid output device Communicates with and receives data input to a keyboard / mouse / other valid input device Spooling Data is stored on hard disc/in memory / stored in a queue Document is printed when printer is free / in correct order Benefit of spooling - User can carry on working / log off when waiting for job to print Manages backing store Ensures that data is stored and can be retrieved correctly from any disc drive Creates and maintains Filing system such as FAT or NTFS (accepted but not expected) Organise files in a hierarchical directory structure. File compression The amount of data is reduced and the file is made smaller Compression is used to save disc space Disc de-fragmentation Fragmented files are split up and stored on different parts of the disc Disc fragmentation will slow down disc access speed Disc de-fragmentation is when file parts are physically re-arranged (re-organised, moved, re-ordered) on disc (into the order required for access) Manages memory (RAM) Ensures programs / data do not corrupt each other Ensures all programs and data including itself is stored in correct memory locations Manages processes Ensures different processes can utilise the CPU and do not interfere with each

Describe in detail the role of the operating system in managing the resources of a computer.

Manages the resources Manages peripherals such as input and output devices Communicates with and sends data output to a printer / monitor / other valid output device Communicates with and receives data input to a keyboard / mouse / other valid input device Manages printing using spooling Data is stored on hard disc/in memory / stored in a queue Document is printed when printer is free / in correct order Benefit of spooling - User can carry on working / log off when waiting for job to print Manages backing store Ensures that data is stored and can be retrieved correctly from any disc drive Creates and maintains Filing system such as FAT or NTFS (accepted but not expected) Organise files in a hierarchical directory structure. File compression The amount of data is reduced and the file is made smaller Compression is used to save disc space Disc de-fragmentation Fragmented files are split up and stored on different parts of the disc Disc fragmentation will slow down disc access speed Disc de-fragmentation is when file parts are physically re-arranged (re-organised, moved, re-ordered on disc (into the order required for access) Manages memory (RAM) Ensures programs / data do not corrupt each other Ensures all programs and data including itself is stored in correct memory locations Manages processes Ensures different processes can utilise the CPU and do not interfere with each other or crash On a multi-tasking O/S ensure that all tasks appear to run simultaneously Manages security Allows creation and deletion of user accounts Allows users to logon and change passwords

Describe in detail the role of the operating system in: • managing the resources of a computer system • providing an interface between the user and the hardware.

Manages the resources Manages peripherals such as input and output devices Communicates with and sends data output to a printer / monitor / other valid output device Prioritises printing tasks or jobs Communicates with and receives data input to a keyboard / mouse / other valid input device Adds new hardware/device Consistency of interface between applications - all applications have a similar interface - in the 'File' menu option you always find 'Save As', 'Open', etc... in Word and Excel Spooling Data is stored on hard disc / in memory / stored in a queue Document is printed when printer is free / in correct order Benefit of spooling - User can carry on working / log off when waiting for job to print Manages backing store Ensures that data is stored and can be retrieved correctly from any disc drive Creates and maintains Filing system such as FAT or NTFS (accepted but not expected) Organise files in a hierarchical directory structure. File compression The amount of data is reduced and the file is made smaller Compression is used to save disc space Disc de-fragmentation Fragmented files are split up and stored on different parts of the disc Disc fragmentation will slow down disc access speed Disc de-fragmentation is when file parts are physically re-arranged (re-organised, moved, reordered) on disc (into the order required for access) Manages memory (RAM) Ensures programs / data do not corrupt each other Ensures all programs and data including itself is stored in correct memory locations Manages processesEnsures different processes can utilise the CPU and do not interfere with each other or crash On a multi-tasking O/S ensure that all tasks appear to run simultaneously Accept adds new/loads new applications/programs Boots up system or runs programs on start up Manages security Allows creation and deletion of user accounts Allows users to logon and change passwords Typical features of the user interface provided by the operating system Provides graphical user interface with meaningful icons / avoid text input / drop-down menus Provides a command line interface Allows customisation of interface e.g. change desktop colours / layout Allows access to system settings such as hardware Allows copying / deleting / moving / sorting / searching of files or folders Allows creation of shortcuts Controls security using passwords or access permissions Allows user to have more than one window open Allows user to switch between tasks (programs/windows) Provides user with (extensive) help facility / useful error messages Provides user with virus checker Provides user with firewall Checks internet for updates

Name, giving reasons, the most suitable secondary storage medium for making a backup copy of a large school's file server (800 Gigabytes). Your answer should make reference to: • speed of access; • cost per unit of storage; • portability.

Medium - Magnetic tape / tape streamer Speed of access reason - Access to tape is serial and therefore slow but access speed is not most important factor for back up as they are rarely used Cost per unit of storage reason - Tape is relatively cheap compared with other secondary storage mediums Portability reason - Tape is physically small and can be easily stored off site OR Medium - Removable (external) hard disc drive (Condone RAID system) Speed of access reason - Access to removable hard disc is fast and therefore backed up data can be accessed quickly (directly) if required Cost per unit of storage reason - Removable hard disc is quite expensive compared with other secondary storage mediums but if direct access is required the extra cost is justified Portability reason - Removable hard disc is physically quite small and can be easily stored off site OR Medium - Remote site which could be server on web provided by commercial third party or consortium of schools or local authority sharing facility at remote location Speed of access reason - Very fast transfer achievable (depending on network speed) for both back up and restore Cost per unit of storage reason - Depending on service being provided could be cheaper or more expensive than either tape or removable disk Portability reason - No physical medium required on school site

Teachers often attend conferences where they are given large amounts of information such as past examination papers, example coursework and administration forms on paper. The conference providers decide to distribute this information electronically at the conference. Describe, with justification, two possible methods for distributing this information electronically to teachers.

Method - give out information on CD/DVD Justification - any one of: • Easy to access and use as teachers are familiar with CD/DVD technology • these are very cheap per unit of storage • can easily be carried and are robust Method - give out information on a pen drive (or teacher copy to their own pen drive) Justification - any one of: • can hold large amount of data • quite cheap per unit of storage • can easily carried and are robust Method - upload information to the Internet Justification - any one of: • this can be done in teacher's own time after the conference • can be free in school or cheap at home • teachers do not need to carry and possibly lose a physical medium Method - connect wirelessly to network at conference and download or FTP Justification - any one of: • no cost to teacher • no device to carry and possibly lose but will need laptop computer

John has nearly a thousand digital photographs stored on his home personal computer. He is concerned that they will be lost if the computer is stolen or damaged. (a) The capacity of John's hard disc is 160 gigabytes. Name the most suitable storage medium to back up the entire hard disc. Justify your choice of storage medium.

Most suitable storage medium to back up the entire hard disc is removable/portable or external hard disc drive. 3 Justification of Removable (external) hard disc drive: • Speed of access reason - Access to removable hard disc is fast and therefore backed up data can be accessed quickly (directly) if required / compare speed to other device • Cost per unit of storage reason - Removable hard disc is quite cheap compared with other secondary storage mediums • Portability reason - Removable hard disc is physically quite small and can be easily stored off site OR Suitable storage medium to back up the entire hard disc is to upload to a third party storage provider Justification of uploading to a third party storage provider: • Medium - Remote site which could be server on web provided by commercial third party or consortium of schools or local authority sharing facility at remote location • Speed of access reason - Very fast transfer achievable (depending on network speed) for both back up and restore • Cost per unit of storage reason - Depending on service being provided could be cheaper or more expensive than either tape or removable disk • Portability reason - No physical medium required on school site

Many portable devices use a touch screen. The screen allows users to input data or select an option on the screen. The same screen also provides output. Explain why this is a suitable method of input and output for such devices.

No need for two separate methods, one for input and one for output therefore device can be kept small • Whole screen can be used for multimedia applications such as watching videos or playing games because the screen is relatively large • Touch screen is easy to use and users may be familiar with concept • Touch screen is very versatile and it can be a keyboard or used to display icons • Touch screen is very versatile as it could be set up as to look and feel like any interface user is familiar with When the whole screen on the device is used for both input and output it is possible to play games using the full screen which can be far bigger and therefore a lot better for game playing than if half the device is taken up by a small keyboard being used for input.

A hairdressing salon currently stores the details of their clients on paper which is kept at reception. One problem with the current system is that sometimes the required paperwork for a client is lost. (a) Briefly describe two other possible problems with the current paper-based system and describe how a computerised database system could solve these problems.

Other possible problems with the current paper-based system: A. Difficult and/or time consuming to find client details NOT just 'difficult to search' alone B. Paper based systems are difficult and/or time consuming to back up as each piece of paper will have to be copied NOT just 'difficult to back up' alone C. Time consuming to amend or create client details D. Difficult to sort client details (into a useable order) NOT just 'difficult to sort alone E. Writing on paper can be difficult to read due to poor hand writing or paper degradation Solution (which must follow problem described above) A. Database would be easy to and quick to search for a client details B. Easy to back up a computerised database C. It is easy to type data into a database or more likely use data previously stored data D. Database can quickly sort data into any order required E. Database on screen always consistent and does not degrade

Using an example from the algorithm, describe in detail the purpose of selection in computer programs.

Purpose of selection is to execute a selected piece of code (1), Biggest = Num2 in this case, if a condition, Num2 > Biggest in this case, is true

Briefly describe each of the three types of maintenance perfective, adaptive and corrective.

Perfective - is when the performance/functionality of the program has to be enhanced. Adaptive - is when the program has to be altered e.g. to run on a different operating system. Corrective - is while the program is being used and an error is discovered and corrected.

Many people now believe that: "The Internet has changed the way in which people live their lives and life will never be the same again." Explain how individuals make use of chat rooms and social networking websites and how this has changed their social life.

Positive effect on social life Can make new friends with similar interests Can make new friends from all round the world not just local area Can reunite old friends Can chat with distant friends or family Can chat with people with similar interests Can chat/socialise with many people at the same time Can share pictures etc Some people don't have many 'real' friends and might be more confident on-line and have many 'cyber friends' Can be a completely different person on-line with a different social standing for example a good gamer would have respect from on-line community that he/she would not have in real life Disabled or elderly people may find it more convenient to use than going out which might be difficult Can set up and join 'interest' groups / organise events / parties Some people find it easier to talk to strangers particularly about personal issues instead of friends, family or doctor Can play games Cheaper to communicate using social web sites compared to phone so save money Share school / study resources / help with homework (effects social life) Negative effect on social life May not go out as often and meet real people which could lead to deterioration in communication skills People may be more likely to lie or exaggerate as no face to face contact or give out Information that might be inaccurate or misleading May come into contact with people trying to sell illegal material such as drugs / weapons / pornography / paedophiles Someone can access your account and delete stuff or pretend to be you ('Fraping' - Facebook rape) People go out less People create false accounts and use them inappropriately People can develop addictive behaviour or become dependant and use the sites continuously May become victim of 'cyber bullying' May become victim of 'cyber stalking' People may gain access to personal information which could be used against them Could develop heath problems from prolonged computer use such RSI / posture / eye problems Could become obese / less fit as on computer for prolonged periods and therefore not walking or exercising Could become distracted from family and friends and become isolated Individual's information, pictures, socialising can be seen by prospective employers etc... who could use it to vet applicants or landlords to check on prospective tenants

Briefly describe RAM cache memory and explain why it is used.

RAM cache memory is (a part of main store) between the CPU and (separate from) the rest of memory. The use of cache memory can greatly reduce processing time.

Power Motors is a successful used car dealer. Currently the details about the cars for sale, cars sold and customers are stored in paper files in the office. The business is moving to a larger site. Currently, paper files are often misplaced and customers cannot be contacted. With the expansion of the business the owner believes that the problems with the current paper-based system will increase. (a) Briefly describe two other possible problems with the current paper-based system and describe how a computerised database system could solve these problems.

Problems 1x2 A. Difficult and time consuming to find car or previous sales or produce a report NOT just 'difficult to search' B. Time consuming to amend or create car and previous sales details NOT just 'difficult to amend' C. Difficult to sort car and previous sales details into a useable order NOT just 'difficult to sort' D. Paper would have to be photocopied or rewritten to provide backup NOT just 'difficult to backup' Solutions (which must follow problem described) 1x2 A. Database would search very quickly and accurately / produce meaningful report B. It is easy to type data into a database or more likely use previously stored data C. Database can quickly sort data into any order required D. Databases are easy to backup and restore

Describe in detail the procedures the store should adopt to ensure that data can be restored after damage has occurred.

Procedures the store should adopt to ensure that data are restored after damage has occurred Servers should be backed up at regular intervals 1 Backups should be stored in a secure location / off site 1 'Cloud computing'

Using an example from the algorithm, describe in detail the purpose of repetition in computer programs.

Purpose of loop is to repeatedly execute selected code (1), input Num2 in this case, until a condition is satisfied

Describe in detail the purpose of repetition in computer programs.

Purpose of repetition is to repeatedly execute selected code (1) until a condition is satisfied

Computers have both ROM and RAM memory. (a) Briefly describe the difference between these types of memory.

ROM means that the data is fixed during manufacture or is permanent and cannot be deleted or amended whereas RAM is where data can be added, amended or deleted. 2 Condone ROM is non-volatile and RAM is volatile without any explanation of meaning of non-volatile and volatile

Describe four different risks that prolonged computer use can have on a user's health, describing how the risk can be reduced in each case.

RSI - use ergonomically / well designed keyboard / wrist rest or straps • Eye strain or headaches - frequent eye checks / safety screen / correct lighting / correct distance from monitor / looking at something else other than monitor regularly • Back or neck problems - sitting correctly / ergonomically / well designed chair, desk, etc... • Radiation from monitors - use of safety screens / frequent breaks (fears of radiation from monitors) • Possible epileptic fit - warnings on software or avoid games, web sites, packages etc... that could trigger a fit • Could become addicted - limit access / go out more / do something else

State the most suitable data type for the storage of: the mark awarded to each dive a single letter to represent gender the name of the competitor

Real Character (accept char) String

Real time control processing could be used to control the temperature of a chemical in an industrial process. Briefly describe how the temperature is maintained at a specified value and explain why real time control processing is the most suitable mode of operation.

Real time control processing could be used by a chemical plant to control temperature by continuously monitoring (1) the temperature which is input to the system. These Inputs are processed immediately (1) and the output is adjusted accordingly this means that accidents can be avoided (1).

Real time transaction processing could be used for booking seats for a sporting event. Describe in detail what happens when a seat is booked and explain why real time transaction processing is the most suitable mode of operation.

Real time transaction processing could be used by a stadium selling tickets because as a seat is booked, other users are locked out (1), the record is updated immediately (1) and availability of that seat on that date is immediately removed/changed this avoids double booking (1) a seat.

Real time transaction processing could be used for booking seats at a theatre and real time control processing could be used to control temperature in an industrial process. Describe in detail how each mode of operation works and in each case explain why it is the most suitable mode of operation.

Real time transaction processing could be used by a theatre selling tickets because as a seat is booked, the record is updated immediately and availability immediately decreases by one this avoids double booking a seat. Real time control processing could be used by a nuclear power station to control reactor temperature by continuously monitoring the temperature which is input to the system. These Inputs are processed immediately and output adjusted accordingly this means that accidents can be avoided.

New cars often have a voice recognition system to operate the driver's mobile phone and the car's audio system. (a) The systems have a set of pre-defined commands and can also be configured to recognise new commands or contact names for the mobile phone. Describe in detail why many car drivers find voice recognition systems useful and describe why other car drivers might choose not to use the system even when it is available.

Reason some car drivers find for voice input for commands useful: • Car driver can operate audio device without hands leaving the steering wheel / touching device • Car driver can operate audio device without eyes leaving the road / looking at device • System would have a limited set of commands so easy for car driver to learn • System would not have any commands that sound the same so would recognise most commands • System would allow car driver to create their own distinct commands and contact names for the mobile phone so driver can use system all the time not just for some functions • Allows mobile phone to used legally while driving / not have to stop car to make a call Reason why many car drivers might never use the system: • The driver will have to learn the pre-existing commands which will take time • The driver will have to teach the system to understand new commands which will take time • The driver will have to learn how to set up the system which might be difficult or will take time • Some drivers have used poor systems or are scared of new technology and feel that it is not worth the effort • The software may not recognise commands as background noise is more likely to interfere with words in a car • The driver might have a cold or sore throat and the system will not recognise the commands • The driver might have a speech impediment and will not be confident to use the system or it may not recognise the commands

A health and fitness club stores personal details of members. These include members' email addresses and subscription payment details. (a) The club sends emails to its members about forthcoming events and fitness classes. Give two reasons, apart from cost, why the club prefers to use email instead of using conventional post and describe one problem that may arise for the club from using email in this way.

Reasons - any two of: 2x1 • The club can save paper / resources by sending emails (environmental) • Email arrives same day / email arrives quicker than letter NOT just faster alone • Send same email to many people at same time - Make members' email addresses a group and send the same email to the group / use of address book / send to all • Members can reply very easily with questions / request health or fitness sessions • Additional information e.g. video, hyperlink, etc (about health or fitness sessions) could be embedded or sent as an attachment • Confirm receipt of delivery / read Problem for the club - any one of: 1x1 • Could spread virus(es) • Member may not access email regularly • Not all members have access to email • Members may no read email as assume it is spam / might be filtered as spam

Apart from sharing hardware, describe in detail two reasons why the consultant might recommend installing a network.

Reasons for installing a network 2x1 Accountants can share software such as application packages Accountants can share data such as notes on clients Accountants always have same settings / desktop regardless of which machine they use Easier for technician to maintain as only install one copy of software on server or can manage network from console. (Accepted but not expected) All stations could have Internet access / access to firm's Intranet for research Accountants can communicate with clients or each other using the network / using email access Stations can be monitored for security or management information

A company has several computers they want to connect using a network. They are undecided whether to use a star topology or a bus topology network. (i) Recommend, with reasons, which network topology they should use. Explain why they should not adopt the other topology.

Reasons to recommend a star network. o If one cable (condone workstation) breaks network can still operate o Data has to pass through hub (sent direct to workstation) so better security NOT just 'more secure' without explanation o Easier to extend star / add new stations Reasons not to recommend a star network o Lot of expensive cabling required (1) as each station is connected directly to a switch (1) NOT just 'expensive' alone o Expense of buying switch o Switch has to be configured and/or managed o If switch / hub goes down network will fail Reasons to recommend a bus network o Cheap and relatively easy to set up (NOT TWICE) Reasons not to recommend a bus network o Difficult to extend bus / add new stations (NOT TWICE) o Response time can deteriorate with many users (many collisions) NOT bus is slower or star is faster o Break in bus or main cable idea - all network down (NOT single workstation down or break in cable) o All data is broadcast so security can be compromised

State the most appropriate data structure for storing all the personal information about each student. Explain why this data structure is the most suitable.

Record Most suitable because data stored about a pupil contains different data types (1) and a record can be processed as a single unit (1) (read or written in one operation)

State the data structure that would be most suitable to store all the data required for the estimate, briefly describing why it is the most suitable data structure.

Record (1) because it is capable of storing several different data types

State the data structure that would be most suitable to store all the data required for the customer and the apartment they purchased, briefly describing why it is the most suitable data structure.

Record (1) because there is more than one data type to store

State the data structure that would be most suitable to store the customer and phone information, briefly describing why it is the most suitable data structure.

Record (1) because there is more than one data type to store

Computer files can be organised in serial or sequential order. Briefly describe each of these types of file organisation.

Records are not stored in any particular order in serial files (1) but in sequential files records are stored in order(1), which is usually on the primary key field.

The computer system in a large manufacturing company has grown over the last twenty years. New parts have been added and old parts of the system updated. The result is a system that has many faults and incompatibilities. The management of the company think that replacing this old system may help improve their company's productivity. The company employ a team of analysts to carry out a feasibility study. Describe the possible results of the feasibility study that would influence the management of the company in deciding whether to replace their computer system or not. Describe any advantages of using a team of analysts compared with using an individual. The management decide to upgrade the computer systems and instruct the analysts to carry out a thorough investigation of the current system and produce a design for a new system. Describe in detail the processes used during investigation and design. Describe in detail any documentation that would be produced during investigation and design.

Results of the feasibility study that would influence the management of the company in deciding whether to replace their computer system: • The possible costs of a new system • Is it technically possible - too difficult to produce • Can it be completed in a realistic time frame • Benefits of new system • Disruption to business during changeover Advantages of using a team of analysts compared with using an individual: • Job should get done quicker • More minds - more ideas • More people have a more varied experience of businesses and systems Processes used during investigation and design: • Consulting current documentation (to investigate current data storage requirements or data flow) • Carry out a questionnaire of staff / customers (because they may be spread over a wide geographical area and there are many of them) • Interview staff / customers / employees (suitable when analyst requires a lot of information from a small number of people such as selected staff) • Observing current system in practice (suitable for gathering information first hand and not having to rely on what people tell you what they think is happening) • Design data structures • Design and write algorithms • Design HCI • Producing data flow diagrams • Recommend suitable hardware Documentation that would be produced during investigation and design: • Detailed system requirements / objectives of the new system • Data flow diagrams • Algorithms • HCI designs • Data structures designs

The operating system of a personal computer has to manage resources and provide an only interface between the user and the hardware. (i) Describe the role of the operating system when managing resources.

Role of the O/S when managing the resources: • Manages peripherals such as input and output devices Communicates with and sends data output to a printer / monitor / other valid output device Communicates with and receives data input to a keyboard / mouse / other valid input device • Manages backing store Ensures that data is stored and can be retrieved correctly from any disc drive Creates and maintains Filing system such as FAT or NTFS (accepted but not expected) • Manages memory (RAM) Ensures programs / data do not corrupt each other Ensures all programs and data including itself is stored in correct memory locations • Manages processes Ensures different processes can utilise the CPU and do not interfere with each other or crash On a multi-tasking O/S ensure that all tasks appear to run simultaneously

Personal computers are usually fitted with a hard disc drive but are now unlikely to be fitted with a floppy disc drive. Name two other secondary storage devices that are commonly used on personal computers and describe a typical use of each device. Compare the speed of access of these two devices.

Secondary storage devices are: Flash memory stick to transfer large files such as database project or use for back up (suitable use - not twice) Flash memory sticks access time is the fastest CD/DVD writer to transfer (large) files such as films music albums or use for back up (suitable use - not twice) CD/DVD writer as CD/DVD access is quite fast, not as fast as hard disc or flash memory External hard drive to use for back up (suitable use - not twice) External hard drive access is fast Tape drive for back up (suitable use - not twice) Tape drive is probably cheapest per byte but access time is the slowest One secondary storage device is a flash memory stick which can be used to transfer large files such as a database project from your PC to school. Another secondary storage device would be a DVD writer as this could be used to back up your photos even though it might take more than one DVD. The DVD has quite fast access when reading but can be slow to write whereas the flash memory stick generally has faster read and write access than a DVD.

Briefly describe why a sequential file is the most suitable for storing details about each customer.

Sequential file is the most suitable because customer records are processed in order or it is easier/quicker to search a sequential file for a record

An electricity supply company uses serial and sequential files. The amount of electricity used by each customer is read from their electricity meter and stored in a serial file called the transaction file. The details about each customer and their previous electricity usage are stored in a sequential file called the master file. (a) Briefly describe why a serial file is the most suitable for storing the amount of electricity used.

Serial file is the most suitable because meter readings are not taken in any order

A gas supply company uses serial and sequential files. The amount of gas used by each customer is read from their gas meter and stored in a serial file called the transaction file. The details about each customer and their previous gas usage are stored in a sequential file called the master file. (a) Briefly describe why sequential file organisation is the most suitable for the master file and why serial file organisation is the most suitable for the transaction file.

Serial file is the most suitable because meter readings are not taken in any order 1 Sequential file is the most suitable because customer records are processed in order or it is easier/quicker to search a sequential file for a record

An employment agency recruits employees for businesses. The Agency is responsible for paying the employees, calculating tax and national insurance. Each employee is paid a different hourly rate. The employee pay details, including their hourly rate are stored in a master file. The number of hours each employee works each month is entered and stored in a transaction file. At the end of each month the hours worked by the employee and the hourly rate are used to calculate the month's pay, tax and national insurance. (a) Briefly describe why sequential file organisation is the most suitable for the master file and why serial file organisation is the most suitable for the transaction file.

Serial file most suitable because hours worked are entered in no particular order. 1 Sequential file most suitable because employee records need to be accessed in order for update process.

Explain how spooling is carried out when a user prints several documents at the same time. Give one benefit for the user of spooling.

Spooling is carried out on a computer when a user wants to print several documents by: storing the documents in a queue (1) and then the documents are printed when printer is free (1) this has the benefit of allowing the user to carry on working or even log off when waiting for documents to print (1).

Two search algorithms are binary search and linear search. (a) Explain how a linear search algorithm would determine whether an item called SearchValue is present in an array called SearchArray.

Starting at the beginning of the array SearchValue is compared to every consecutive item in SearchArray (1) until either an item matches (1) SearchValue or the end of the array is reached(1).

Colin owns a small painting and decorating company. Colin visits a client's house to give an estimate for a painting job. Estimates are stored on his laptop computer. (a) For each of the following data items name the most suitable data type for storing: the client's phone number the number of whole days it should take to complete the job, the area to be painted in square metres, for example 13∙5, whether the client receives a discount, for example TRUE.

String Integer Real Boolean

A global company with staff and offices situated around the world decide to upgrade their current computer systems. A team of analysts have been employed to investigate the existing computer systems. Describe in detail the different methods of investigation the team could use, giving benefits and drawbacks of each method. Describe the benefits of using a team of analysts to carry out the investigation rather than an individual analyst.

Study the existing system documentation - This is suitable for investigating current data storage requirements or data flow Benefits Team can see how current system 'should' be operating Inexpensive method of gather lots of information fairly quickly Can identify storage requirements Drawbacks Staff may not be following procedures in documentation and may be using system in their own way Documentation may be out of date and not updated to reflect system changes Carry out a questionnaire of staff - This is suitable because the bank staff are spread over a wide geographical area and there are many of them. Benefits Relatively cheap to produce for a large number of people Can be distributed worldwide Results can be available very quickly / could be completed on-line so Drawbacks Have to be designed by experts or information could be unusable People are 'too busy' and may not complete People may not give correct answers Cannot collect detailed information / only limited answers Interview staff - This is suitable when the analysts require a lot of information from a small number of people such as key staff Benefits Can gather large amount of detailed information Can make judgements on validity of information from personal contact or body language Can ask 'follow up' or 'open ended' questions to gather more detailed information in selected areas Staff can suggest or request improvements Drawbacks Time consuming and expensive to carry out Has to be carried out by trained interviewer or closed questions written by experts Difficult to analyse large amount of information Difficult to analyse wide variety of information Observe the current system in practice - This is suitable for gathering information first hand Benefits Can actually see what is really happening / first hand and do not have to rely on what people tell you what they think is happening Drawbacks Very time consuming and therefore expensive to carry out Staff may feel like they are being watched and therefore behave differently so do not actually see what goes on every day Cost of sending analysts around the world. Advantages of using a team of analysts compared with using an individual: • Job should get done quicker • Different levels of experience and expertise so can carry out different tasks like a junior analyst would not interview a senior manager • More people have a more varied experience of businesses, computer systems and ideas

Another item of data that is validated is the customer's postcode. Describe a different suitable validation check that could be carried out on the customer's postcode, for example CX99 2QW, giving an example of invalid data that would be detected by this check.

Suitable checks Example of invalid data Presence check Nothing in box Format check to ensure that a data item matches a previously determined pattern; for example, data must only contain digits and match determined pattern ### ######## CF 3EW, CF123 5WED Length check to ensure that the data entered are of a reasonable length; for example, postcode must be between 7 and 9 characters long CF 3EW, CF123 5WED

When an order is placed data is entered into the new computerised system. Validation checks will be applied to the data. One item of data that is validated is the total number of each menu item ordered. Describe a suitable validation check that could be carried out in this case. Give an example of invalid data that would be detected by this check.

Suitable checks Example of invalid data Presence check Nothing in box Range check to ensure data is between sensible limits for example 0 and 9 12000, -23 Type check to ensure that a data item is of a particular type; for example, all entries should be digits Bob or 160j

The customer's email address is validated. Describe a different suitable validation check that could be carried out on the customer's email address giving an example of invalid data that would be detected by this check.

Suitable checks Example of invalid data Format check email address has a string followed by and @ sign another string followed by a dot and another string followed by a dot followed by a string Any invalid data that check described would detect for example abcxyz&efg.uk Presence check - these has to be something input There is nothing in the box

Another item of data that is validated is the customer's postcode. Describe a suitable validation check, other than a presence check, that could be carried out on the customer's postcode, for example CX99 2QW, giving an example of invalid data that would be detected by this check.

Suitable checks Example of invalid data Format check to ensure that a data item matches a previously determined pattern; for example, data must only contain digits and match determined pattern ### ######## CF 3EW, CF123 5WED Length check to ensure that the data entered are of a reasonable length; for example, postcode must be between 7 and 9 characters long CF 3EW, CF123 5WED

One item of data that is validated is the client's telephone number. Describe a suitable validation check that could be carried out on the client's telephone number giving an example of invalid data that would be detected by this check.

Suitable checks Example of invalid data Presence check to reject data where required fields have been left blank (there has to be something input) There is nothing in the box Length check to ensure that the data entered are of a reasonable length; for example, telephone number must be between 9 and 20 characters long 12345 or 123456789123456789123456789 Format check to ensure that a data item matches a previously determined pattern; for example, data must only contain digits and match determined pattern ### ######## 1234d56 or 74 Type check to ensure that a data item is of a particular type; for example, all entries should be digits B or #

The number of whole years since the driver made an insurance claim is validated. Describe a suitable validation check that would be carried out on the number of whole years giving an example of invalid data that would be detected by this check.

Suitable checks Example of invalid data Range check entries must be between sensible limits for example 0 - 60 -1 or 74 Type check - all entries should be integer B or # Presence check - these has to be something input There is nothing in the box

The customer and car data will have to be input into a new computerised database system. Some items of data have validation checks applied to them. One such check is a presence check. (i) One item of data that is validated is the car's engine size. Describe a suitable validation check, other than a presence check, that could be carried out on the car's engine size, for example 1600, giving an example of invalid data that would be detected by this check.

Suitable checks Example of invalid data Range check to ensure data is between sensible limits for example 0 and 9999 12000, -23 Type check to ensure that a data item is of a particular type; for example, all entries should be digits Bob or 160j

Who would usually produce a data flow diagram during analysis of a system?

Systems analyst

A school has an intranet. The school also has a web site on the Internet. Give an example of the type of information that would be found on their Internet web site. Also give an example of a different type of information that would be found on their intranet. In each case identify the audience most likely to find the information useful.

Teachers and pupils would find the information on its intranet useful Example of information on Intranet • Internal job adverts • School holiday dates • Forthcoming events for staff such Christmas party • Internal telephone directory • Forms and documents for administration Parents, teachers, pupils, prospective parents, teachers or pupils, general public would find the information on its Internet web site useful Example of information on the school's Internet web site • Contact details • Most recent inspection report • Mission statement

What is the purpose of the address carried by the address bus?

The address identifies where the data is being sent/retrieved or where data is stored.

Three different modes of operation in computer systems are real time control processing, real time transaction processing and batch processing. For each of the above modes of operation describe an application for which it would be the most suitable. In each case describe in detail the mode of operation and explain why it is the most suitable.

The following points are required but need to be described in full and make a coherent answer to achieve the top mark band. Real time transaction processing: could be used by a theatre selling tickets when record is accessed other users are locked out the record is updated immediately avoids double booking Real time control processing: could be used to control temperature continuously monitoring Inputs are processed immediately output is adjusted immediately accidents can be avoided or states such as temperature can be maintained whole system can be automated with a few operatives monitoring Batch processing: could be used to produce electricity bills / payroll collecting all the data which can then be used with the billing application to produce the bills can be carried out overnight without any further human intervention / resources available explanation of master update with transaction jobs can wait in a queue until they are processed Example answer worth maximum marks: Real time transaction processing could be used by a theatre selling tickets because as a seat is booked, other users are locked out (1), the record is updated immediately and availability of that seat on that date is immediately removed/changed this avoids double booking a seat. Real time control processing could be used by a chemical plant to control temperature by continuously monitoring the temperature which is input to the system. These Inputs are processed immediately and the output is adjusted immediately this means that accidents can be avoided. The whole system can be automated but a few operatives will be required to monitor and react if limits are reached or exceeded. Batch processing could be used to produce electricity bills by collecting together all the data such as amount of electricity used this month for all customers to be billed, and using the customer file, with details such as tariff and payment method. This data can then be used with the billing application to produce the bills without any further human intervention. This could be carried out overnight or at any time when the computer resources are not in demand.

The storage required for each picture is about 3 megabytes. The approximate storage required to store all John's photographs is calculated below. 3 megabytes x 1000 = 3000 megabytes (approximately 3 gigabytes) John wants to send all of his photographs to his friend Alison. Alison has told him that 3 gigabytes is too big to send using e-mail and has suggested that John sends them using conventional mail. (i) Name, giving reasons, the most suitable medium to send the photographs to Alison using conventional mail.

The most suitable medium to send the photographs to Alison is a DVD (1) because DVDs have large capacity 4.7 Gb (for the price) (1) and are quite difficult to damage so could survive being sent in the post.(1)

Another item of data that is validated is the condition of the vinyl record which can be either new, good or poor. Describe a different suitable validation check that could be carried out on this data. Do not use any of the three validation checks used in part (i).

The only suitable check is a look-up check where the user is presented with a limited list of acceptable input, new, good or poor in this case.

Systems analysts often carry out an initial investigation of a problem as part of a detailed feasibility study. Describe the purpose of a feasibility study. Briefly describe the activities and outcomes of a feasibility study.

The purpose of a feasibility study is to decide whether a solution is possible (and how it may be completed) or to decide whether the current system can be replaced / is worth replacing. Activities and outcomes • Observing / using the current system in operation • Consulting current documentation • Carry out a questionnaire of staff / customers • Interview staff / customers / employees • A description of the problem / detailed system requirements /a requirements specification is produced • Different possible methods of solution identified • Storage requirements are considered • Different types of HCI considered • Hardware requirements will be considered • Legal, social and environmental issues are considered • Whether the project is technically feasible - does the technology/skills exist to complete the project • Whether the project can be completed in the time scale - acceptable or projected time scale for the solution produced • Whether the project can be completed on budget - the projected cost of the solution • Involves a cost-benefit analysis to decide if a solution is affordable • Training requirements for staff on the new system are considered The purpose of a feasibility study is to decide whether a solution is possible and how it may be completed. Activities carried out during initial investigation for a feasibility study will be studying the current system in operation and consulting any current documentation. The outcomes of the study will include a description of the problem including detailed system requirements and different possible methods of solution will be identified and the chosen method justified. They will have to decide whether the project can be completed in an acceptable time scale and produce a time plan. Probably the most important outcome is a cost / benefits analysis to determine whether the project can be completed on budget and produce a projected cost for the solution. The data requirements including the amount of data and storage required should be considered and possibly which HCI is most suitable.

People who are unable to use a keyboard are able to use computers with voice recognition software. An adapted email package will accept vocabulary dictation for writing the email and also voice input for commands. The voice recognition software makes mistakes when the user is dictating the email but rarely misinterprets a command. (a) Explain, with examples, why the software might misinterpret more words when being used for vocabulary dictation than when being used for command input.

The software for vocabulary dictation may not recognise two words that sound the same (1) for example 'two' and 'to' (1) whereas for command input the system would not have any commands that sound the same (1). The software may not recognise colloquialisms or local dialect (1) for example 'cwtch' (1) whereas for command input the system would not use these types of words (1). The software may not recognise strong accents (British or foreign) (1) whereas for command input the system would only have clearly distinct words (1). (NOT TWICE) The software may not recognise user if he/she has a cold or sore throat (speech impediment) (1) whereas for command input the system would only have clearly distinct words (1). (NOT TWICE) The software may not recognise vocabulary dictation because background noise is more likely to interfere with words used in everyday English/Welsh language (1), for example if using a laptop in a public place like a train (1), whereas for command input the system would make less mistakes as there are less words to understand and they will be distinct from each other (1). The software may not recognise proper nouns (1) that are not in any dictionary such as (place names) 'Nantyfyllon' (1) whereas for command input the system would have a list of pre-defined words (1). The vocabulary dictation software may not recognise two words that sound the same for example 'two' and 'to' but all the commands would be different words that do not sound the same for example 'send', 'save, or 'spell check'. Also some words are only used in certain areas of the country like 'cwtch' or 'hadaway' being used in Wales or Scotland so the vocabulary dictation software may not recognise local dialect, this would not be the case for command input as it would only need to recognise a list of pre-defined command words.

Computer files can be organised in serial or sequential order. (a) Briefly describe how records are added to a serial file and added to a sequential file.

To add to a serial file the new record is appended to the end of the file (1) To add to a sequential file, a new file is made by copying the old file until an insertion is required then inserting the new record (1) and copying the rest of the file (1)

Briefly describe how records are added to a serial file and how records are added to a sequential file.

To add to a serial file the new record is appended to the end of the file (1) To add to a sequential file, a new file is made by copying the old file until an insertion is required then inserting the new record (1) and copying the rest of the file (1)

Describe in detail how the transaction file and the master file are used to produce a pay slip for every employee. You may use a clearly labelled diagram if you wish.

Transaction file is sorted into same order as old master file 1 Each transaction record is read and used to update corresponding record from old master file 1 New master record is written to new master file and pay slip is output 1 After last transaction record is processed, remaining old master records are read from old master file and written to new master file

Describe two different situations where a linear search will generally perform faster than a binary search. Describe one situation where a binary search will generally perform faster than a linear search.

Two different situations where a linear search will generally perform faster than a binary search are: 1. when the number of items to be searched is very small (1) 2. the SearchValue is one of the first data items in the SearchArray (1) One situation where a binary search will generally perform faster than a linear search is when there is a large sorted set of data (1)

There can be drawbacks of using a social networking web site for this type of communication as it can be viewed by people other than friends or family. Stating why they might view the information, briefly describe two other types of people, other than friends or family, who might use the information from a personal page on a social networking web site.

Two other people, other than friends or family, who might use the information from a personal page include: Fraudsters looking for personal information to create a false identity / answer security questions Police investigating a crime may look for contacts and pictures of suspected criminal Police investigating a crime may look for contacts and pictures of crime victim Prospective (or current) landlord to check if prospective tenant is a 'party animal' Prospective (or current) employer might view a personal page to look at prospective employee's social life Companies who want to target people with marketing material (could be spam) Lawbreakers looking for images (perhaps of children) that they could sell Predator/stalker gathering personal information Opponents or bullies (political / interviewees / sporting) looking for information to use against person (or aggravate) Hackers looking for computer or email information

A company that employs many computer programmers requires them to sign a code of conduct. Give two reasons why most companies would find a code of conduct useful.

Two reasons why most companies would find a code of conduct useful: May concentrate the minds of employees on the issues It ensures that staff are aware that some activities are unacceptable May form basis for legal sanction / disciplinary action Alternatively Related to programmers' code of conduct: writing documentation that is intentionally confusing or inaccurate intentionally introducing bugs with the intent of later claiming credit for fixing the bugs, or to stimulate the uptake of later versions writing viruses stealing sensitive company data not to use the code or ideas for personal gain confirming that the current legislation is being complied with not to divulge new innovative technologies to competitors

The operating system of a desk top computer manages resources and provides an interface between the user and the machine. Describe four features of the user interface provided by the operating system.

Typical features of the user interface provided by the operating system • Provides graphical user interface (Windows Icons Menu Pointer) • Provides a command line interface • Allows customisation of interface e.g. change desktop colours / layout • Allows access to system settings such as hardware • Allows copying / deleting / moving / sorting / searching of files or folders • Allows creation of shortcuts • Controls security using passwords or access permissions • Allows user to have more than one window open • Allows user to switch between tasks (programs/windows) • Provides user with error/warning/help messages

Using examples, describe in detail the role of the operating system in providing an interface between the user and the hardware.

Typical roles of the user interface provided by the operating system • Provides user interface with meaningful icons / avoid text input / drop-down menus • Provides a command line interface • Allows customisation of interface e.g. change desktop colours / layout • Allows access to system settings such as hardware • Allows copying / deleting / moving / sorting / searching of files or folders • Allows creation of shortcuts • Controls security using passwords or access permissions • Allows user to have more than one window open / run more than one program • Allows user to switch between tasks (programs/windows) • Provides user with error/warning/help messages

The hard disc on the photographer's computer is 2 terabytes (2000 gigabytes). Describe in detail the procedures the photographer could adopt to ensure that his images are restored if the computer was destroyed.

Use tape or an external/ removable hard disc drive 1 Regularly (periodically) copy all his images (or images added since last back up) to the portable medium. 1 This medium should then be stored in a fire proof safe or stored at another location. 1 Need to purchase a new hard disc and copy all the images from the portable medium back onto the new hard disc. 1 OR Could purchase disc space from third party on the Internet. 1 Regularly upload all his images (or images added since last back up) to the web site 1 This is secure in case of disaster as is stored at another location. 1 Need to purchase a new hard disc and download all the images from the web site back onto the new hard disc. 1 Example answer worth 4 marks The photographer will need a suitable device and medium to hold 2000 gigabytes. The device will have to be portable such as a tape drive, an external hard disc drive or a removable hard disc drive. He should regularly like once a week (periodically) copy all his images (or images added since last back up) to the portable medium. This medium should then be stored in a fire proof safe or stored at another location. If there was a disaster and the hard disc destroyed, the photographer could purchase a new hard disc and copy all the images from the portable medium back onto the new hard disc.

Explain why most programmers would prefer to use a language that had many standard functions available to a language that did not have any. [1]

Using user-defined subprograms: 4 • are easier to write than one large program • make a large program more readable • are easier to test in isolation • may reflect the top-down structure of the solution • can be written by Individuals or small teams • allow large programs to be easily built from small sections • can be replaced with upgraded versions • can be reused in other programs • may already exist for problem An advantage is that it is to easier write small pieces of code that perform specific tasks and then put them all together to solve the big problem rather than try and write a large program in one go. An advantage is that if you want to improve the performance of a program you can swap an existing subprogram with an updated version without having to re-write the rest of the code.

Data being stored on a computer in an estate agent's office is subject to validation checks. (a) Briefly describe when validation checks are carried out and their purpose.

Validation checks are carried out when data is being entered 1 The purpose of validation checks is to detect errors or check the data is reasonable / sensible

Part of the process to set up the new database system is to input all the current data. The new system will verify and validate some of the data input. (i) Briefly describe the purpose of data verification and data validation.

Validation is the automatic checking of data entered into a computer / checks data is reasonable / detects errors in data. 1 Verification ensures that data is consistent / has not been corrupted.

Why is absolute referencing used?

When a cell is absolutely referenced it means that the reference does not change when the cell is replicated.

Files stored on a hard disc can be compressed using data compression software. Briefly describe what happens to a file when it is compressed and explain why data compression is used.

When a file is compressed the amount of data is reduced and the file is made smaller 1 OR could give an example of a method such as replace frequently occurring character combinations by a single character, for example replace 'th' with the digit 0. Data compression is used to save disc space

Files stored on a hard disc drive can be compressed. Briefly describe what happens to a file when it is compressed and explain why data compression is used.

When a file is compressed the file is made smaller (and the amount of data is reduced) 1 OR could give an example of a method such as replace frequently occurring character combinations by a single character, for example replace 'th' with the digit 0. Data compression is used to save storage space / speed up transfer over a network

Briefly describe what happens to a file when it is compressed and give one reason for compressing a file.

When a file is compressed the file is made smaller (and the amount of data may be reduced) 1 OR could give an example of a method such as replace frequently occurring character combinations by a single character, for example replace 'th' with the digit 0. One reason for compressing a file is to save storage space / upload to a web site / speed up transfer over a network / send as email attachment

A gas company has an intranet, extranet and an Internet web site. (a) Describe who would be most likely to use the company's intranet and web site, briefly describing how access is provided to each.

Who would be most likely to access and how that individual is given access to their intranet and web site: An intranet is only accessible by authorised people within the company (with a login and password e.g. employees) 1 An Internet web site is accessible by everyone (customers or employees) with no access restrictions

Files on the hard drive of a personal computer are stored in a hierarchical directory structure. Explain why this type of structure is used and, using a diagram, show how files might be organised in a typical hierarchical directory structure used on a personal computer.

Why this type of structure is used - Any 1 of: 1 • More convenient / easier / faster to find / access files • Store related files in a logical way / same directory • Can use the same file name in different directories • Shows path to file / structure

The wireless network allows portable devices such as laptop computers to connect to the network. Describe another type of wireless device that could be connected, giving a typical use of this device on the network.

Wireless device and a typical use - many acceptable answers but use must be sensible, for example: Mobile phone / tablet / PDA (1) to browse web, play games, listen to music, check emails, etc...(1) Television (1) to download films (1) Camera (1) to upload pictures (1) Games console (1) to play multi player games Printer (1) to share resource wirelessly

In each case name the component of the Central Processing Unit (CPU) whose function is: (i) to manage the execution of instructions; [1] (ii) to process and manipulate data; [1] (iii) to temporarily store data or control information used for a specific purpose.

control unit 1 (ii) arithmetic and logic unit 1 (iii) register for example Program Counter, MAR, NIR or sequence control register

Diagrams like these are often used in discussion with users. Give one reason why this is the case.

idea of power of diagrams to convey complexity / make easy to understand / picture is worth a 1000 words 1 • central importance of data in computer-based information systems

Give one reason why a systems analyst would use this type of diagram.

idea of power of diagrams to convey complexity / make easy to understand 1 • A picture worth is a thousand words, etc.

Describe in detail why programmers use self documenting identifiers.

self documenting identifiers are used to make programs easier to read (1) by different programmer / same programmer at a later date

State the most appropriate organisation for the following files: unsorted transaction file; master file.

serial Sequential

A kitchen design company has a large office in the centre of a city. The company currently have a network of computers connected using a bus topology. There is a workstation on each desk, a server and several specialised printers for printing the kitchen designs. Designers from the company visit a client's home to design a kitchen and create an estimate for a project. All the data is stored on a laptop computer. The designer returns to the office and transfers the estimate and design from the laptop computer to the workstation on his desk and prepares them for printing. (a) Describe two possible drawbacks of using a bus network.

• Difficult to extend bus / add new stations • Response time can deteriorate with many users many collisions • Break in bus - all network down

Describe two features of a Human Computer Interface (HCI) which would be helpful for a beginner.

• similar interface to other common packages • easy-to-use / easy-to-learn (qualified) • (extensive) help facility / useful error messages • attractive use of colour / layouts, fonts, etc. • robust / not easy to crash / error tolerant, etc. • graphical user interface / windows icons mouse pointers / avoid text input • should have menus / drop-down menus • can be customised for beginner use (can't score twice with below) One feature which would be helpful is that there is similarity between packages, for example, similar menu options in the same menu, such as 'Save As' in the 'File' menu. One feature which would be helpful is the ability to click on icons like the C: drive to view the contents to perform operations and not have to type commands that a beginner would not know.

The Data Protection Act applies to data stored by the supermarket. The supermarket, which has notified the Information Commissioner, ensures that their data is fairly and lawfully processed and processed for limited purposes. State four other principles of the Act that will apply to the data stored by the supermarket.

Data must be adequate, relevant and not excessive Data must be accurate and up to date Personal data stored for no longer than necessary Processed in line with your rights - individual can check and amend data Held securely Data can only be transferred outside EC to countries with adequate DPA

Two resources managed by the operating system are the processor and memory. Briefly describe the role of the operating system in managing these resources of a personal computer.

...Typical roles of the user interface provided by the operating system 2 Provides user interface with meaningful icons / avoid text input / drop-down menus Can provide a command line interface Allows customisation of interface e.g. change desktop colours / layout Allows access to system settings such as hardware Allows copying / deleting / moving / sorting / searching of files or folders Allows creation of shortcuts Controls security using passwords or access permissions Allows user to have more than one window open Allows user to switch between tasks (programs/windows) Provides user with error/warning/help messages The description of any of the points could be extended with examples and/or more detail and gain an extra mark. Example answer worth two marks - create shortcut with extension One feature of the user interface provided by the operating system is to allow the creation of shortcuts. The user can create a shortcut to a commonly used application or visited web site on the desk top.

Giving an example in each case, define the computer terms bit and byte.

A bit is a single digit (in a binary number) for example 0 or 1 A byte is a group of eight bits for example 11000010 A correct description of a bit and byte without examples is worth 1 mark.

Another recommendation is to upgrade to a processor with a word size of 64 bits instead of the standard 32 bits. Briefly explain why BYOdirect would recommend this upgrade.

A computer with a larger word size generally will run faster.

Disc access times on a personal computer can increase when the disc is nearly full to capacity. Describe in detail why saving a large file to a disc that is nearly full might be slower than saving a large file to a nearly empty disc.

A nearly full disc might: (together idea required) not have enough space together to store a large file OR not have enough consecutive (idea required - might not be consecutive depending on interleave) blocks together so files are split up (fragmented) and stored on different parts of the disc OR read/write heads have to move to locate file parts which is slower

Some computer applications are written in low level computer languages. Describe, giving a reason, a situation where a programmer may decide to use a low level programming language as opposed to a high level language.

A programmer may decide to use a low level programming language because - there are many acceptable answers and many program situations could be given if they are correctly justified. One mark for situation and one mark for reason 2 Examples of acceptable answers are: Tasks connected with the running of the computer (operating system) because execution speed is critical or size of code needs to be small Embedded system because size of code needs to be small or primitive processor with limited instruction set Real time systems like controlling an aeroplane as control is required over the hardware and they have to run fast and respond immediately. Computer games because hardware producing graphics will need to be programmed and program has to run quickly...

The ticket agency has the email address of most customers and is going to inform them of future events using email. Briefly describe the facility provided by an electronic mail system that would allow the same email to be sent to thousands of customers. Describe one advantage and one disadvantage for the agency of communicating with customers using email compared with conventional post.

A suitable description of a distribution list where email addresses are stored as a group and can be sent the same email in one operation (other names are acceptable such as 'group' with clear description) 1 One advantage for the agency of communicating with customers using email compared with conventional post - - any one of: 1x1 The agency can save paper / resources / money by sending emails (environmental) Arrives quicker than letter so could advertise last minute ticket availability / deals NOT just faster than mail or speed alone MUST say why it is an advantage Additional information e.g. video, hyperlink, etc (about event) could be embedded or sent as an attachment One disadvantage for the agency of communicating with customers using email compared with conventional post - - any one of: 1x1 Could spread virus(es) Email may be considered as 'spam' and filtered by software / ISP and never read Customer may not access email regularly

Define the computer term word. Give an advantage of a computer using a large word size compared with a computer using a small word size.

A word is a group of bits that can be addressed / transferred / manipulated as a single unit by the CPU. A computer using a larger word size would generally operate faster.

State the type of cell referencing that should be used for the Adult Age, B2 used in the formula that will allow the formula to be replicated in column C for many names.

Absolute

An on-line music store allows customers to download music, movies and other files. When logged in, customers are able to view past downloads and change contact and payment details. Without suitable preventative measures, some of this data could be subject to accidental or malicious damage. (a) Define each of the terms accidental and malicious damage. Describe who is likely to cause each type of damage to data stored at the on-line music store.

Accidental damage is when data is unintentionally amended or deleted 1 People likely to cause accidental damage to data stored at the on-line music store are customers or store employees deleting or amending data by accident 1 Malicious damage is when data is intentionally amended or deleted 1 People likely to cause malicious damage to data stored at the on-line music store are hackers (or similar) or disgruntled store employees deleting or amending data on purpose

Some hand held devices use handwriting recognition as a method of input. Describe advantages and disadvantages of using handwriting recognition on such devices.

Advantages and disadvantages of using handwriting recognition on these devices: 3 Advantages No need to learn a new method of input as can already write - less intimidating for new users Quicker than other methods of input such as typing using on-screen keyboard Disadvantages Very poor hand writing will not be recognised Can take a long time to 'train' the device to recognise user's handwriting Some words will not be recognised and still require another method of input Require a fairly large screen to be able to write Powerful device required for the processing involved to recognise hand writing Difficult to use when walking, driving, on a bus or train, etc... May require a special pen or stylus which could easily be lost and system becomes unusable Handwriting might change, for example, if rushing and therefore not recognised...

Describe three advantages of using a star network topology compared with a bus or ring topology.

Advantages of a star network - Any three of: If one cable breaks network can still operate (NOT workstation) 1 Faults can be easier to detect 1 Data has to pass through hub (sent direct to workstation) so better security NOT just 'more secure' without explanation 1 Easier to extend star / add new stations

The operating system on a personal computer provides an interface between the user and the hardware and manages the resources. (a) Briefly describe the role of the operating system in providing an interface between the user and the hardware.

Advantages of variable: Variable length record saves storage space as no blank space Variable length record avoids truncation as each field can extend to accommodate any number of characters

Three testing methods often used are alpha, beta and acceptance testing. Briefly describe who would carry out each of the three methods.

Alpha testing is the issue of the software to a restricted audience of testers within the developer's own company. 1 Beta testing is when a version is released to a number of prospective customers or general public in exchange for their constructive comments. 1 Acceptance testing is the testing carried out by the customer to ensure that the system works correctly.

Some of the data input into the new computerised database system is validated. (i) One item of data that is validated is the number of vinyl records delivered to the shop. A presence check and a type check are carried out on this data. Describe another suitable validation check that could be carried out, giving an example of invalid data that would be detected by this check.

Another suitable check would be a range check to ensure data is between set limits for example data input must be between 1 and 100 1 Example of invalid data would be 125

Files stored using a certain operating system can have four different file attributes which are read-only, archive, system and hidden. Briefly describe a reason for setting a file attribute to: read-only; archive; system; hidden.

Answer can be any reason that clearly demonstrates the use of the attribute or a good example could gain the mark. A reason for setting a file attribute to read-only is when the user should not be able to alter the file. A reason for setting a file attribute to archive is when the file no longer in regular use but may be required sometime in the future (for example a legal document or tax records that have to kept for a minimum number of years) A reason for setting a file attribute to system is when the file is only used by the operating system (for example a device driver) A reason for setting a file attribute to hidden is when the user should not be able to see the file (for example many files are hidden in Windows as the user cannot view or amend them if you view certain directories)

A computing consultancy firm has been given the task of completely upgrading the computer systems of a national retail company. A team of analysts will investigate the current system and implement a new system. Describe in detail the different methods of investigation available to the team, clearly explaining the advantages and disadvantages of each method.

Benefits Team can see how current system 'should' be operating Inexpensive method of gathering lots of information fairly quickly Can identify storage requirements Drawbacks Staff may not be following procedures in documentation and may be using system in their own way Documentation may be out of date and not updated to reflect system changes Carry out a questionnaire of staff - This is suitable because the staff might be spread over a wide geographical area and there are many of them. Benefits Relatively cheap to produce for a large number of people Can be distributed worldwide Could be completed on-line so results can be available very quickly Drawbacks Have to be designed by experts or information could be unusable People are 'too busy' and may not complete People may not give correct answers Interview staff - This is suitable when the analysts require a lot of information from a small number of people such as key staff Benefits Can gather large amount of detailed information Can make judgements on validity of information from personal contact or body language Can ask 'follow up' or 'open ended' questions to gather more detailed information in selected areas Drawbacks Time consuming and expensive to carry out Has to be carried out by trained interviewer or closed questions written by experts Difficult to analyse large amount of information Difficult to analyse wide variety of information Observe the current system in practice - This is suitable for gathering information first hand Benefits Can actually see what is really happening and do not have to rely on what people tell you what they think is happening Drawbacks Very time consuming and therefore expensive to carry out Staff may feel like they are being watched and therefore behave differently so do not actually see what goes on every day Cost of sending analysts around the world.

The Internet has allowed many software production companies to reduce the size of their offices as computer programmers do not have to be in the office to write programs and can be situated anywhere in the world. Describe the benefits for the company of this arrangement.

Benefits for the company of being able to employ programmers from a wide geographical area are: can employ the best skilled or best suited programmers labour costs might be a cheaper in different countries the work ethic might be different and programmers might be prepared to work harder and longer to meet deadlines work is being completed 24/7 can employ programmers from same country as client as would have better understanding of law/culture/users of that country Benefits for the company of being able to employ programmers who do not require an office are: Cost saving on office floor space required (rent) Cost saving on car parking space required Cost saving on office facilities such as chairs, desks, canteen Cost saving servicing offices such as cleaners, security, maintenance Cost saving on office energy such as lighting and heating (bills) Company can expand very easily just by employing more programmers with no need for capital expenditure on offices Cost of travelling could be saved (so could pay less) if company is paying to travel to meetings etc... No time spent travelling so more time working

The school will send the reports to parents or guardians as an email attachment. Describe three benefits of sending the reports in this way compared to posting them using conventional post

Benefits of sending the reports home using email compared to conventional post - MUST have comparison idea for mark 3 No postage costs with email so the school can save money on postage costs (NOT just cheaper alone) Less time consuming / Less labour intensive to send many emails compared to printing reports, placing in envelopes and posting (NOT just faster alone) No printing with email so the school can save paper / resources by sending emails (environmental) Reply is easy with email so parents can reply with confirmation of receipt so no need to post or give to pupil to return to school office Parents can reply with questions / comments without having to telephone school or write letter Parents can access reports even if away from home Reports could contain hyperlinks or pictures for parents

Users of a social networking web site can post personal information, post messages, share music and share videos. Discuss the benefits and drawbacks of using social networking web sites for these purposes.

Benefits of using social networking web sites to post personal information, messages, share music and videos Can contact friends from all over the country / world Can send messages to many friends at once Can be quicker and/or cheaper to share photos, music and video Can be cheaper to talk using this method to communicate compared to the telephone - must be justified Can set up and join 'interest' groups Can invite people to meetings/parties Sharing music by new or unknown bands can increase their popularity Can obtain answers to questions and solve problems Drawbacks of using social networking web sites to post personal information, messages, share music and videos: Information may be inaccurate or misleading / people may not be telling the truth and difficult to detect with no face to face contact May come into contact with people trying to sell illegal material such as drugs / weapons / pornography / paedophiles Site may be used for 'cyber bullying' People may give out personal information such as age and telephone number which can be used for identity fraud Lack of 'real' social contact may lead to losing social skills May download virus Prospective employers, landlords, partners might view site and find information or see photographs that might have been meant only for friends Could be inadvertently sharing copyright material and therefore breaking the law Information on page can be used by journalists or police if user is involved in a crime When information or a photo is posted it is 'out there' forever even when removed by owner

Users of the web site are able to indicate that they like the advertised product and tell their on-line friends that they like the product. The users are also able to dismiss an advert indicating that they are not interested. Give one drawback of this method of advertising. Describe the benefits of advertising in this way for: • the companies • users of the social networking web sites.

Benefits to the company Adverts are only shown to people who might be interested based on their: Location Age Birthday Sex Keywords Education Workplace Relationship Interests Language If a user 'Likes' a product company can target with similar products If user is not interested in product company can save money by not targeting with similar products If user tells a friend then friend is more likely to trust another friend and look at advert for product Friends of user might have similar likes and dislikes and be interested in same product Companies can build up a relationship with users over time which might increase brand loyalty Advert could be link to company web site so can make instant purchase Users could talk enthusiastically and start a discussion about the advert and generate more interest Benefits for the user of the social networking Users only see adverts for products that they might be interested in so save time looking Advertisers paying social networking web site pay the bills so using site is free Drawback for user of the social networking is: that they might feel that they are being watched or don't like their personal information being used in this way advert may contain link that could download tracking cookie / virus Drawback for company of the social networking is that they might receive negative recommendations and lose custom users might find advert annoying (or spam) and ignore it (develop negative attitude to company)

The company release the game without payment to customers who have previously purchased games. These customers play the game to test it. Name this type of testing and give a benefit for the company and a benefit for the customer testing the game of using this method of testing.

Beta testing (1) has benefit for company as they get constructive comments from prospective / typical customers (1) and testers benefit as they get a free game to play before anyone else (1) (accept kudos idea)

The Human Computer Interface (HCI) on many devices such as mobile telephones uses a touch screen. Explain why a touch screen is suitable for such devices.

Candidates are expected to give full reasons which describe why this is a suitable HCI for such devices. 4 Touch screen is intuitive and easy to use and users may be familiar with concept Whole screen on the device can be used for input such as a large keyboard for example (poor eyesight and avoiding small physical keyboard which is difficult for some people to use) Whole screen on the device can be used for output to watch films Touch screen is very versatile and it can be a keyboard / used to display icons Touch screen is very versatile and it can be used for interactive multimedia applications such as playing games No need for a method for input and one for output therefore device can be kept small / less weight Touch screen has no moving parts to fail or break Users can easily zoom in on small text or to see more detail... Example of extended answer worth four marks is: Touch screens are very intuitive and people are used to them and know how to use them. When the whole screen on the device is used for both input and output it is possible to play games using the full screen which can be far bigger and therefore a lot better for game playing than if half the device is taken up by a small keyboard being used for input. The whole screen can also be used for input by touching icons or a large keyboard could be displayed. Watching videos using the whole screen is better than on a smaller screen where half the device is a keyboard. Touch screen does not have any little buttons which can be fiddly to use particularly if you have big fingers whereas you can zoom the keyboard on a touch screen also the buttons sometimes break.

Compare the amount of memory required to store an employee forename, for example Gareth, compared with the single letter code for their pay scale, for example B.

Characters are stored in one byte (1) while a string will require a byte for each character in the string (1) Could be answered using an example 'B' would take one byte so Gareth would take 6 bytes

Describe how the club could use a feature of an email application to send the same email to all members

Club could create (and populate) a distribution list which is a group/list/set of ALL members' email address (then the same email can be sent as one operation / to all the group / at the same time)

Briefly describe the circumstances in which each of the two types of maintenance corrective and adaptive would typically be carried out. [2] Corrective Adaptive

Corrective - is usually carried out when a bug in the program has been identified. Adaptive - is usually carried out to reflect external changes or operate with new hardware / OS

The ticket agency stores personal information about customers and must comply with the eight principles of the Data Protection Act. State two principles of the Act that the ticket agency must comply with.

DPA in summary - Any two of: 2x1 Data must be adequate, relevant and not excessive Data must be accurate and up to date Personal data stored for no longer than necessary Processed in line with your rights - individual can check and amend data Held securely Data can only be transferred outside EC to countries with adequate DPA Data is fairly and lawfully processed Data is processed for limited purposes

The Data Protection Act applies to the customer data stored by BYOdirect. BYOdirect, which has notified the Information Commissioner, ensures that their data is held securely and not stored for longer than necessary. State three other principles of the Act that will apply to the data stored by BYOdirect.

Data is fairly and lawfully processed Data is processed for limited purposes Personal data shall be adequate, relevant and not excessive Data must be accurate and up to date Processed in line with your rights - individual can check and amend data Data can only be transferred outside EC to countries with adequate DPA

State four other principles of the Act that will apply to the data stored by the club.

Data is fairly and lawfully processed Held securely Personal data stored for no longer than necessary Personal data shall be adequate, relevant and not excessive Data must be accurate and up to date Data can only be transferred outside EC to countries with adequate DP legislation

A mobile hairdresser visits clients' homes. She currently stores the clients' personal details and styling history on paper in a ring binder and client appointments in a diary. The stylist has purchased a laptop computer to store all the clients' details and all her appointments. (a) State the most appropriate software that could be used to store the information.

Database / electronic diary / spreadsheet

Describe in detail how the disc access speed of a nearly full disc could be increased.

Disc could be defragmented which means moving parts of a file (closer) together (1) (on same track if possible) to reduce read/write head movement (1) and therefore reduce access times.

A supermarket stores information about customers and their purchases. They regularly send the same email to thousands of customers. (i) Briefly describe the facility provided by an electronic mail system that would allow the same email to be sent to thousands of customers.

Distribution list to which customers email addresses are added

An on-line insurance company communicates with its customers by allowing them to log in to the company's web site. Customers can use the on-line system to view and update their personal records. They can also send a secure message to the company. Describe any drawbacks of this on-line system for the customer. Describe in detail any benefits for the insurance company of this on-line system

Drawbacks for the customer include: Customer has to spend time inputting details when updating Accounts could be hacked and personal details stolen Data could be deleted or amended on purpose by a third party Customers might change the data in error Customer might have to wait for answer to messages Customer cannot speak to human if there is a problem Customer has to pay for printing costs if they print the documents Benefits for the company include: No printing costs for insurance documents (Not twice) Smaller premises required as no printers or paper required Save money as no physical documents to move (Fewer employees) Customer can buy cheaper insurance from these companies as lower overheads No postage costs of insurance documents Customer receives new or updated documents very quickly No accessible office space or shop required for face to face contact Fewer employees as no call centre or face to face contact Fewer employees as messaging is more efficient use of employee time than telephone or face to face contact Company receives feedback very quickly such as errors in document

Describe a suitable verification check that could be carried out on the telephone number and describe how this check detects input errors.

Enter twice and compare (must have compared idea) (1) and if no match then telephone number might contain input errors (1) OR Enter twice and compare (must have compared idea) (1) and if match then OK (1)

Giving a reason, describe the advantage of using fixed length records compared with using variable length records.

Fixed length records are quicker to process (read/write) (1) by computer as start and end locations are known (1) OR Fixed length records are easier to program (1) as do not have to deal with field or record delimiters (1)

Records can be fixed or variable length. Describe two advantages of using fixed length records and two advantages of using variable length records.

Fixed length records are quicker to process (read/write) by computer as start and end locations are known Fixed length records are easier to program / estimate storage requirements as it can be calculated how much storage space will be required

Explain the term fragmentation and briefly describe the effect that fragmentation will have on disc access.

Fragmented - files (NOT data) are split up and stored on different parts of the disc Disc fragmentation will slow down disc access speed

The performance of a hard disc drive on a personal computer can be impaired when the amount of data stored on the disc is close to the disc's capacity and files on the disc can become fragmented. (a) Briefly explain the term fragmentation and explain in detail how defragmenting a file will improve the access time.

Fragmented - files (NOT data) are split up and stored on different parts of the disc (1) Defragmentation will put parts of a file close together (1) (on same track if possible) to reduce read/write head movement and therefore reduce access times (1)

Describe the hardware required by a device, for example, a laptop computer and the hardware required by a network to enable a wireless connection to be made between a device and a network.

Hardware required to make a wireless connection to a network would be wireless network card and a wireless router (or switch) - Both required for one mark

Describe why this type of diagram is useful in helping to explain a computer system. (data flow diagram)

Idea of power of diagrams to convey complexity / 1 picture worth 10000 words etc

A business uses serial and sequential files. Describe serial file and sequential file organisation explaining how a record is added to each type of file. Give an example how each type of file could be used in a business. [7]

In a sequential file the records are stored in order (1) (usually primary key field) while in a serial file the records are not stored in any order (1) (or order of arrival). To add to a serial file the new record is appended to the end of the file (1). To add to a sequential file, a new file is made by copying the old file until an insertion is required then inserting the new record (1) and copying the rest of the file (1) Suitable example of sequential file Suitable example of serial file

Another use of cache is storing internet pages temporarily on the computer's hard disc drive. Briefly describe the advantage of utilising this type of cache.

Internet or web cache has advantage of: view previously viewed page to speed up viewing (as they are read from disc which (is usually) quicker that downloading them again) storing 'pre-fetched' pages (from information provided with page being viewed other pages are downloaded and cached in anticipation that the user might view them) storing pages in anticipation of not having internet access in future so pages can still be viewed

Describe in detail the role of the operating system in managing computer resources

Manages peripherals such as input and output devices Communicates with and sends data output to a printer / monitor / other valid output device Communicates with and receives data input to a keyboard / mouse / other valid input device Spooling Data is stored on hard disc/in memory / stored in a queue Document is printed when printer is free / in correct order Benefit of spooling - User can carry on working / log off when waiting for job to print Manages backing store Ensures that data is stored and can be retrieved correctly from any disc drive Creates and maintains Filing system such as FAT or NTFS (accepted but not expected) Organise files in a hierarchical directory structure File compression The amount of data is reduced and the file is made smaller Compression is used to save disc space Disc de-fragmentation Fragmented files are split up and stored on different parts of the disc Disc fragmentation will slow down disc access speed Disc de-fragmentation is when file parts are physically re-arranged (re-organised, moved, re-ordered) on disc (into the order required for access) Manages memory (RAM) Ensures programs / data do not corrupt each other Ensures all programs and data including itself is stored in correct memory locations Manages processes Ensures different processes can utilise the CPU and do not interfere with each other or crash On a multi-tasking O/S ensure that all tasks appear to run simultaneously

The operating system on many computer systems such as personal computers, large mainframe computers or hand held devices has to manage the resources of the system. Describe in detail the role of the operating system in managing the resources.

Manages peripherals such as input and output devices (including spooling - not hand held device) Communicates with and sends data output to a printer / monitor / other valid output device Communicates with and receives data input to a keyboard / mouse / other valid input device Data is stored on hard disc / in memory / stored in a queue Document is printed when printer is free / in correct order Benefit of spooling - User can carry on working / log off when waiting for job to print Manages backing store Ensures that data is stored and can be retrieved correctly from any disc drive Creates and maintains filing system such as FAT or NTFS (accepted but not expected) Organise files in a hierarchical directory structure. Manages memory (RAM) Ensures programs / data do not corrupt each other Ensures all programs and data including itself is stored in correct memory locations Manages processor Ensures different processes can utilise the CPU and do not interfere with each other or crash On a multi-tasking O/S ensure that all tasks appear to run simultaneously

Files can be compressed to increase the available storage space on a disc. Briefly describe one method of compressing a file.

Many compression (lossy and lossless) methods exist but candidate must briefly describe a method that would make the file smaller 1 Examples include: Compress a text file is to replace frequently occurring character combinations by a single character, for example replace 'th' with the digit 0. Replace long strings of one's or zero's with a number for example 0000000000000000000000000000000 with 33. Approximate all shades of blue in a photograph with lots of blue sky to one shade of blue and only store this for the whole sky instead on individual colours for every pixel.

Customers can enter their current meter readings using the gas company's extranet. Describe one other service the company could offer customers using their extranet. Describe two effects on employment within the company that could be caused by customers using the extranet to enter their own meter readings.

Many other services the company could offer customers using their extranet exist but examples are: 1x1 View previous and current bills / energy use / predict future bills / pay bills Change personal details such as telephone number Send secure emails / messages / forms to company Could target or offer new tariffs/deals to customers Book heating service The effect on the employment within the company: Company will require employees to set up and maintain their intranet, extranet and Internet web site 1 Company will require fewer employees to take and/or enter customer meter readings

Describe in detail why many mobile devices make use of a touch screen.

No need for two separate methods, one for input and one for output therefore device can be kept small Touch screen is intuitive and easy to use and users may be familiar with concept - icons and clicking Whole screen on the device can be used for output so can use whole screen to watch films (or other media) Touch screen can be used as a keyboard or for handwriting recognition Ability to zoom in by clicking or 'pinch and stretch' Can be made to look like a traditional desk top or any interface with icons etc... Some people find very small physical keyboard difficult to use Can play interactive games by touching the screen Less moving parts (such as buttons) so not susceptible to damage by dust or mechanical wear - robust

Draw a diagram to show how the six dive scores for each of the competitors might sensibly be stored in a two-dimensional array.

One mark for each correct dimension Competitor Name Bob Jane Fred Dive Num 1 8.3 9.4 8.9 ... 2 9.0 9.2 9.1 ... 3 7.5 9.6 8.6 ... 4 8.4 ... ... ... 5 7.9 6 8.7 MUST have 6 columns/rows to indicate number of dives MUST have at least two names/numbers on other dimension One mark for each dimension

Describe three problems that might arise with the museum's current paper-based system when the museum opens the extension. In each case describe how a computerised database system could solve the problem

One mark for problem, one mark for solution. Solution must follow problem. Problems with the current paper-based system: A. Difficult and/or time consuming to find member details when entering museum NOT just 'difficult to search' alone B. Paper based systems are difficult and/or time consuming to back up as each piece of paper will have to be copied NOT just 'difficult to back up' alone C. Difficult and time consuming to amend/add member details D. Writing on paper can be difficult to read due to poor hand writing or paper degradation (NOT just 'difficult to read' alone) Solution (which must follow problem described above) A. Database would be easy to and quick to search for a client details B. Easy to back up a computerised database C. It is easy to overwrite / amend / update data in a database D. Database on screen always consistent and does not degrade

A dental practice currently stores patients' details on paper which are kept in a filing cabinet. It is time consuming for the receptionist to find the required paperwork for a patient and sometimes difficult to read the handwriting. The dentist has purchased a computerised database system to store all the patients' details. (a) Briefly describe one other possible problem with the current paper-based system and describe how the new database system could solve this problem.

One other possible problem with the current paper-based system: A. patient details on paper are time consuming to back up as need to be copied B. Time consuming to amend or create patient details C. Difficult to sort patient details into a useable order NOT just difficult to sort D. Patient records could be lost or filed in wrong place Solution (which must follow problem described above) A. Database would be easy to back up NOT data is more secure on a computer B. It is easy to type data into a database and possibly have combo boxes, etc... C. Database can quickly sort data into any order required D. Patient records would be backed up or filed in incorrect location

Thirty Three to Forty Five is a shop that sells new and second hand vinyl records. The manager of the shop has replaced a paper-based system, for storing information on current stock, with a computerised database system. Thirty Three to Forty Five has benefited from using this new system in many ways. (a) Describe two problems with the old paper-based system and explain how the computerised database system should have solved these problems.

Other possible problems with the current paper-based system: A. Difficult and/or time consuming to find stock details NOT just 'difficult to search' alone B. Paper based systems are difficult and/or time consuming to back up as each piece of paper will have to be copied NOT just 'difficult to back up' alone C. Time consuming to amend or create new stock details D. Difficult to sort stock details (into a useable order for example best selling records) NOT just 'difficult to sort alone E. Employees hand writing might be illegible / paper deteriorates and can become illegible Solution (which must follow problem described above) A. Database would be easy to and quick to search for stock details B. Easy to back up a computerised database C. It is easy to type data into a database or more likely to use data previously stored data D. Database can quickly sort data into any order required E. Writing on screen can easily be read and clear printed reports produced

The new system will verify and validate some of the data input. It is important that the patient's telephone number is input correctly. (i) Describe a suitable validation check that could be carried out on the patient's telephone number giving an example of invalid data that would be detected by this check.

Presence check to reject data where required fields have been left blank (there has to be something input) There is nothing in the box Length check to ensure that the data entered are of a reasonable length; for example, telephone number must be between 9 and 20 characters long 12345 or 123456789123456789123456789 Format check to ensure that a data item matches a previously determined pattern; for example, data must only contain digits and match determined pattern ### ######## 123456 or 74 Type check to ensure that all entries are digits B or #

What type of object does the a rectangle with curved corners represent?

Process

What type of object does the rounded box in the diagram represent?

Process...

Explain why programmers use meaningful identifiers.

Programmers use meaningful identifiers so that the program is easier to read by other programmers or the same programmer at a future date

Many operating systems provide a Graphical User Interface (GUI). Briefly describe three features of a GUI that allow the user to make effective use of the computer.

Provides meaningful icons such as recycle bin Provides menus / dropdown lists for easy choices Allows creation of shortcuts / hotkeys Allows copying / deleting / moving / sorting / searching of files or folders Allows easy navigation of folders Allows customisation of desktop such as change colours and layout Allows user to have more than one window open Allows user to switch between windows Allows user to copy data between windows (applications) Provides user with error/warning/help messages

Using an example from the algorithm, describe in detail the purpose of selection in computer programs.

Purpose of selection is to execute a selected piece of code (1), if a condition is satisfied or true (1)

Computers utilise different types of cache memory. Two traditional types are RAM cache and disc cache. Describe in detail each type of cache memory.

RAM cache is memory between the CPU and main memory (sometimes referred to as L2 or L3 cache) where sections of (recently or frequently used) data and/or programs are stored Disc cache is a section of main memory between the CPU and disc where data recently read from disc or about to be written to disc is (temporarily) stored (before being transferred RAM).

A small business is expanding and moving to new premises. They have to decide which of the three network topologies bus, star or ring they should install. Give reasons why they should install a star network topology and why they should not install a bus or a ring topology.

Reasons to install a star network If one cable breaks (NOT computer) network can still operate Can be easier to detect faults (as can ping each station directly) Data has to pass through hub (sent direct to workstation) so better security NOT just 'more secure' without explanation Easier to extend star / add new stations Reasons to NOT install a ring network Expensive cabling (as cable carries power for repeater) If a repeater fails or ring is broken (NOT computer) then network will fail Can be difficult to add new stations (NOT TWICE) Reasons NOT to install a bus network Difficult to extend bus / add new stations (NOT TWICE) Response time can deteriorate with many users (many collisions) NOT bus is slower or star is faster Break in bus or main cable idea - all network down (NOT single workstation down or break in cable) All data is broadcast so security can be compromised (NOT TWICE)

State the data structure that would be most suitable to store all the data required for a property, briefly describing why it is the most suitable data structure.

Record (1) because there is more than one data type to store (1)

State the most appropriate data structure for storing all the personal information about each competitor.

Record.

One recommendation is to upgrade from the standard 4 gigabytes of RAM to 8 gigabytes. Briefly describe the role of RAM in a personal computer and explain why BYOdirect recommends this upgrade.

Role of RAM is to temporarily store data/programs currently in use and programs (1). They would recommend more RAM as this will improve the performance of the PC (1) - tasks will be completed more quickly

Explain the role of the following line of code from the algorithm. [1] if multiplier < 1 then

Role of line 'if multiplier < 1 then' is test if input is positive (greater than zero) 1 Checks if multiplier is less than one

Another recommendation is to upgrade from the standard 1 terabyte hard disc drive to a 4 terabyte hard disc drive. Briefly describe the role of the hard disc drive in a personal computer and explain why BYOdirect would recommend this upgrade.

Role of the hard drive is to store data and programs 1 They would recommend a bigger hard disc drive so that the PC will be able to: (Any one of) 1x1 hold more data which will be required if storing many large files such as videos (must be qualified) store all future data without having to be upgraded again (future proofing)

Name the most suitable data type for the storage of the following data about a company employee: the forename of the employee a single letter code for their pay scale whether the employee is a member of the company pension plan, for example TRUE; the proportion of their pay that they contribute to the pension plan, for example 8.5; the number of whole years in the company pension plan.

String Character Boolean Real Integer

An estate agency uses a computer system to store information about properties that it has for sale. Name the most suitable data type for the storage of the following: [5] the type of property, for example terrace; ......................... the number of bedrooms, for example 3; ......................... a single letter code to indicate the council tax band, for example B; ......................... distance to nearest train station in miles, for example 12·5; ......................... whether or not an offer has been made for the property, for example TRUE.

String Integer Character Real Boolean

A college stores data about students. Name the most suitable data type for the storage of the following data: the surname of the student; . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [1] a single letter code indicating whether they are male or female; . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [1] whether or not the student is entitled to receive free meals; . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [1] the number of whole days the student is absent; . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [1] their average exam mark. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

String 1 Character 1 Boolean 1 Integer 1 Real

A manufacturing company has a large production site and many administration offices throughout the country. They are intending to upgrade their existing computer systems and have employed a team of analysts. The analysts will investigate the current system and develop a new system. Describe in detail the different methods of investigation available to the team, clearly explaining the advantages and disadvantages of each method. Maintenance documentation will be produced and delivered with the new system. Describe the purpose and contents of maintenance documentation.

Study the existing system documentation - This is suitable for investigating current data storage requirements or data flow Benefits Team can see how current system 'should' be operating Inexpensive method of gathering lots of information fairly quickly Can identify storage requirements Drawbacks Staff may not be following procedures in documentation and may be using system in their own way Documentation may be out of date and not updated to reflect system changes Carry out a questionnaire of staff - This is suitable because the staff might be spread over a wide geographical area and there are many of them. Benefits Relatively cheap to produce for a large number of people Can be distributed worldwide Could be completed on-line so results can be available very quickly Drawbacks Have to be designed by experts or information could be unusable People are 'too busy' and may not complete People may not give correct answers Interview staff - This is suitable when the analysts require a lot of information from a small number of people such as key staff Benefits Can gather large amount of detailed information Can make judgements on validity of information from personal contact or body language Can ask 'follow up' or 'open ended' questions to gather more detailed information in selected areas Drawbacks Time consuming and expensive to carry out Has to be carried out by trained interviewer or closed questions written by experts Difficult to analyse large amount of information Difficult to analyse wide variety of information Observe the current system in practice - This is suitable for gathering information first hand Benefits Can actually see what is really happening and do not have to rely on what people tell you what they think is happening Drawbacks Very time consuming and therefore expensive to carry out Staff may feel like they are being watched and therefore behave differently so do not actually see what goes on every day Cost of sending analysts around the country Contents of Maintenance documentation is: Algorithms for all code which are an unambiguous list of instructions to solve a problem (is the code in pseudo code or flowcharts) Annotated listing which is the program code with comments. Data dictionary is a file or printout containing descriptions of, and other information about, the structure of the data (held in a database) used in the system. A record of all updates and changes made to the system.

The client's data will have to be input into the new computerised system. Validation checks will be carried out on some of the data input. (i) Describe a suitable validation check that could be carried out on the client's postcode giving an example of invalid data that would be detected by this check.

Suitable checks Example of invalid data Presence check to reject data where required fields have been left blank (there has to be something input) There is nothing in the box Length check to ensure that the data entered are of a reasonable length; for example, postcode must be between 7 and 10 characters long CF2 1Q CF233 3ERD Format check to ensure that a data item matches a previously determined pattern; for example, data must only contain characters and digits and match determined pattern for example AA## #AA CF2X 3AB

Describe a different suitable validation check that could be carried out on the date of a client's appointment giving an example of invalid data that would be detected by this check.

Suitable checks Example of invalid data Presence check to reject data where required fields have been left blank (there has to be something input) There is nothing in the box Range check - days must be between 1 and 31, months between 1 and 12, year must be in future but not more than one year 23/13/2014 Format check to ensure that a data item matches a previously determined pattern; for example, data must only contain digits and match determined pattern for example ##/##/#### 232/04/2014 Length check to ensure that the data entered are of a reasonable length; for example, date must have 10 characters 2/4/2014 Condone - Type check to ensure that a data item is of a particular type; for example, all entries should be digits or slash MUST deal with delimiter such as slash, space, colon etc... B3/04/2014

One item of data that is validated is the total number of whole years that they have been a member. Describe a suitable validation check that could be carried out in this case. Give an example of invalid input data that would be detected by this check.

Suitable checks Presence check Range check to ensure data is between sensible limits for example 0 and 99 Type check to ensure that a data item is of a particular type; for example, all entries should be digits Example of invalid data Nothing in box 12000, -23 Bob or 160j

An accountant who works from home has very important data stored on a personal computer that changes daily. Describe a suitable procedure, fully justifying any hardware required, for the accountant to safely and securely back up the data.

Suitable storage medium is an external hard disc drive. (Condone removable drive) Data should be backed up at the end of every day. (Condone weekly - do not accept any longer periods) Justification of external hard disc drive: Speed of access - Very fast transfer which is important as daily updates Cost per unit of storage - external hard disc is quite cheap per byte of storage Portability reason - external hard disc is physically quite small and can be easily stored securely and safely for example in a fire proof safe

There are many different high level programming languages. Give a suitable use for the following type of programming languages: mark-up; visual; procedural.

Suitable use for a mark-up language is creating web pages 1 Suitable use for visual language is writing applications that require a GUI or for a visual environment such as Windows, Mac or mobile devices OR create a visual game like using Scratch 1 Suitable use for procedural language is writing any general application such as pay roll, data handling, etc...

A secondary school uses their computer system to prepare reports for every pupil. Each report has to include the pupil's contact details and a comment from each subject teacher. (a) Describe in detail how the contact details and the teacher comments could be stored and combined to produce completed reports.

Teacher comments and pupil contact data could be entered (stored) in a database (condone spreadsheet) (1) and a standard report could be created with fields for the data (1) then the mail merge facility (1) of the word processor used to produce reports 3 OR alternate answer Teacher comments and pupil contact data could be entered (stored) in a database (1) and a standard report could be created with fields for the data (1) then the DBMS could be used to merge the data and produce reports (1)

Discuss the differences between fixed and variable length records.

The difference between fixed and variable length records is that a fixed length record has same number of bytes in each record (and same number of fields) but a variable length record has different number of bytes in each record (or different number of fields). Fixed length record is easier to program as it can be calculated to know how much storage space will be required Variable length record makes it difficult to calculate how much storage space will be required Fixed length records are quicker to process (read/write) by computer as start and end locations are known Variable length records are slower to process (read/write) by computer as start and end locations have to be calculated at read/write time Fixed length record wastes storage space as fields have blank space Variable length record saves storage space as no blank space Fixed length record will truncate long fields Variable length record avoids truncation as each field can extend to accommodate any number of characters Example of an extended answer worth six marks: The difference between fixed and variable length records is that a fixed length record has same number of bytes in each record but a variable length record has different number of bytes in each record. Fixed length records are easier to program as it can be calculated to know how much storage space will be required but a variable length record makes it difficult to calculate how much storage space will be required. Fixed length records are quicker to process (read/write) by computer as start and end locations are known but variable length records are slower to process (read/write) by computer as start and end locations have to be calculated at read/write time. Fixed length record wastes storage space as fields have blank space whereas variable length record saves storage space as no blank space.

The supermarket saves money by communicating with customers using email rather than conventional post. Briefly describe two other advantages of using email rather than conventional post.

The supermarket can save resources by sending emails - MUST be environmental saving NOT cost Email arrives same day so could advertise sales or promotions that last one or two days / email arrives quicker than letter NOT just faster alone Additional information e.g. video, hyperlink, etc (about products) could be embedded or sent as an attachment

Describe two different reports that the computerised database system could produce that would have been time consuming to produce with the old paper-based system.

Two different reports - many suitable answers but must be related to business, for example: 2x1 Number of sales made each week/month/year Days or times when most sales are made Any report about sales' trends - genre Find an individual sale for returns Any stock report like alphabetical list / best or worst selling records / total stock

Briefly describe two possible problems with the current paper-based system and describe how the new computer system could solve these problems.

Two other possible problems with the current paper-based system: A. Difficult or time consuming to search for a specific client NOT just search B. Client details on paper could be lost and are time consuming to back up as paper has to be copied (idea required) - not just 'lost' C. Time consuming to amend client details on paper or paper becomes messy after several alterations and may require a new sheet D. Difficult to sort client details or appointments into a usable order - today's appointments in time order. Solutions (which must follow problem described above) A. Database can quickly search for client on different criteria B. Database would be easy to back up NOT data is more secure on a computer C. It is easy to update a record in a database and possibly have combo boxes, etc D. Database can quickly sort data into any order required

Employees at the ticket agency have access to personal customer information and all employees have to sign a code of conduct. Give two reasons why the ticket agency would ask employees to sign a code of conduct.

Two reasons why the agency would ask employees to sign a code of conduct 2x1 It ensures that staff are aware that some activities are illegal / unacceptable May form basis for legal sanction / disciplinary action

A small business has purchased a new computer system which is supplied with documentation. The documentation includes: • User documentation • Maintenance documentation • Back up and recovery procedures • Health and safety risks arising from computer use and reducing the risks. Describe the typical contents of each of the above pieces of documentation.

User documentation User documentation would describe how to use the system to the new users of the system. Contents of user documentation include: Detailed instructions on how to navigate (find features), input data, produce reports etc... Actions to take when error messages are produced. Installation guide. Maintenance documentation Maintenance documentation would be used by the original developer or by different programmer at a future date. Contents of maintenance documentation include: Algorithms for all code which are an unambiguous list of instructions to solve a problem (is the code in pseudo code or flowcharts) Annotated listing which is the program code with comments. Data dictionary is a file or printout containing descriptions of, and other information about, the structure of the data (held in a database) used in the system. System testing. Back up and recovery procedures Describe how and when data is (or should) be backed up and how to recover the data in event of loss. Contents of back up and recovery procedures documentation include: When data is backed up Where data is backed up Clerical procedures to follow after back up, for example how to securely store backed up data Instructions or steps to recover data after loss Health and safety issues arising from computer use Describes health and safety issues arising from computer use and how to avoid them Contents of health and safety issues arising from computer use documentation include: Risk of RSI - use ergonomically / well designed keyboard / wrist rest or straps Risk of Eye strain or headaches - frequent eye checks / safety screen / correct lighting / correct distance from monitor / looking at something else other than monitor regularly Question Answer Mark Risk of Back or neck problems - sitting correctly / ergonomically / well designed chair, desk, etc... Risk of Radiation from monitors - use of safety screens / frequent breaks (fears of radiation from monitors) Risk of Possible epileptic seizure - warnings on software or avoid games, web sites, packages etc... that could trigger a seizure.

One item of data that is verified is the member's postcode. Describe a suitable verification check that could be carried out on the member's postcode and describe how this check would detect input errors.

one verification check that could be carried out on the postcode is by entering twice and compare OR post code is entered and compared to a stored list of valid postcodes - must have compared idea This check will detect input errors as if they match post code is verified if no match then post code might contain input errors

Give three reasons why a low level language is the most suitable language type for this application.

size of code - needs to be small to be stored in ROM on embedded chip in microwave control over the hardware - embedded systems like controlling a microwave require control over the hardware run fast - real time systems like controlling a microwave require immediate response so has to run fast

David has numerous photographs and videos stored on his home computer. They occupy approximately 20 gigabytes of his hard disc. Compare the suitability of using multiple writable DVDs to back up David's photographs and videos with backing them up on an external hard disc. Your answer should refer to speed of access, cost per unit of storage and durability. David decides to use a third storage method for this backup which has an advantage over the two methods described above. Describe a suitable method, giving the advantage.

speed of access Slower than external hard disc Faster than multiple writable DVDs cost per unit of storage Cheaper than external hard disc More expensive than multiple writable DVDs for storing 20 Gbytes Durability More robust than external hard disc External hard drive is more likely to fail as mechanical or brake if dropped Example answer - worth five marks: Multiple DVDs would be good as they would be a lot cheaper than buying an external hard disc; they are slower to access but as it is only for back up and used infrequently this will not be an issue. They are stronger than an external hard disc which could brake if dropped. I would use a 32 gigabyte USB pen drive as it is faster to access than both the others.

Briefly describe how records are added to a serial file and how records are added to a sequential file.

To add to a serial file the new record is appended to the end of the file 1 To add to a sequential file, a new file is made by copying the old file until an insertion is required then inserting the new record (1) and copying the rest of the file (1)

Why should algorithms be written with meaningful identifiers?

To make the program easier to understand (NOT read) by programmers


Set pelajaran terkait

Marketing Final 3, 14, 15, 16Change Culture is communicated through four ways, including Stories. Which of the following is an example of this type of story? Group of answer choices having a contractor solve the problem creatively by rotating the brick

View Set

SPHR - All topics, terms to definitions

View Set

Ch. 1 Intro to Pharmacology prepU

View Set

Introduction to Computers: Fill in the Blank

View Set