• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Identify two roles that a computer can perform in a network

Client;


Server/email server/ DNS server/file server;


Router;


Firewall;

Identify two reasons why patches may be necessary for an operating system


Identify two methods that can be used to obtain these patches

Allows bugs/error in operating system to be repaired;


Allows new features to be added to operating system (such as security updates, improving functionality, improving usability, etc.);


Allows compatibility issues to be improved;



a.


Automatic patches/updates sent (via internet);


User requested updates (via internet);


Patches sent on CD/DVD/memory stick;

Identify one common feature found in the user interface of application software to improve its usability.


Toolbars;


Menus;


Dialogue boxes;

Describe one method of implementation for a new computer system.

Parallel;


old system and new system are operated at the same time until the current system is proved to be successful;



Pilot;


the new (whole) system is operated in one branch/part of the organization before it is rolled out to the whole organization;



Direct;


the new system replaces the old system in an immediate switchover;



Phased;


the new system in phases / stages, gradually replaces parts of the old system until the current system is completely replaced by the new system;


In the context of the networked world, state the role of a client.



[1]a.


In the context of the networked world, state the role of a server.

piece of computer hardware or software that accesses a service made available by a server /


The role of a client is to access a service made available by a server by sending a request for service;



Note: the term client is to be understood only from the computing perspective, i.e. this is not a human.



a.


A program/host computer that awaits and fulfills requests from client programs (in the same or other computers) /


The role of a server is to fulfill requests from client programs (which can reside in the same or in other computers)



Note: the term server is to be understood only from the computing perspective, i.e. this is not a human.



b.

Identify one method of inputting data that can improve the accessibility of a computer system for some users.

Text-to-speech;


Voice recognition;


Braille keyboards;


Touch screen;


Input from scanner;

An application package used in an office includes a word processor. A secretary uses the word processor to create a text file.



The text file is automatically saved at regular periods while being edited.



All files created in this office contain information important to the business.



The office manager decides to buy and install new software and hardware.



Describe how a spellchecker checks whether a word in a text file is correctly spelt or not.



[2]a.


State one advantage of this feature.



[1]b.


Identify two additional features of a word processing package that could be useful for this office.



[2]c.


Outline the purpose of one application software package other than a word processing package that could be used in this office.



[2]d.


Outline the security measures that should be taken to prevent data loss.



[2]e.


Outline one problem that may arise from the installation of new hardware and software in the office.



[2]f.


The changeover to the new system can be achieved by either direct changeover or phased conversion.



Compare direct changeover and phased conversion.



[4]g.

Each word in the text file is compared with words in a dictionary (held in memory/online);


If the word is found in the dictionary it is correctly spelt / if the word is not found in the dictionary, spellchecker will recognize that it is incorrectly spelt;



a.


Award [1 max].


If power goes off, only the text typed after last (automatic) save is lost;



NOTE: accept responses that express evidence of just a partial loss of the file.



b.


Award up to [2 max].


Apply styles, effects;


Insert (tables/pictures/graphs/formulas/...);


Mail merge;


Macros;


Print;


etc.



c.


Award [1] for stating an application software package and [1] for stating its use in the office, up to [2 max].



Example answers


Spreadsheet;


For graphically presenting various data;



Database software;


For holding employees/customers data;



Web page creators/editors;


To create/manage the office’s web pages;


etc.



d.


Award up to [2 max].


Off site data storage;


Make backups regularly/periodically/frequently;



Prevent physical damage to the computers / Keep equipment in safe and dust-free places / Protect equipment from static electricity that can erase data or damage components / Protection during lightning and electrical storms;



Note: Accept any reasonable examples, but there should be more than one. The focus of the question is on data loss, and not in relation to security/hacking.



e.


Award [1] for stating a problem and [1] for an elaboration, up to [2 max].


Users/employees might be afraid of these changes (for various reasons);


And not willing to help in this change;



Data migration problems;


For example, different file formats so conversion must be performed;



Employee efficiency may drop;


As they learn to use the new system;



Issue of compatibility with legacy software/hardware;


So features of new software/hardware may not work correctly;



f.


Award [1] for outlining what is meant by direct changeover, [1] for outlining what is meant by phased conversion, and then [1] for an advantage or disadvantage of each, up to [2].



Example answer:


Direct changeover, the old software and hardware is completely replaced, in one move, by the new software and hardware;


Phased conversion involves selecting one section in the office for the direct changeover and other sections will be switched when the first section selected is running satisfactorily. Eventually the whole office has been changed;


A phased conversion is less risky than a direct changeover as any problems that might arise will be isolated in only one section in the office;


Direct changeover means everyone in the organization has same software/hardware and so there are no compatibility issues;



g.

Outline what is meant by beta testing.

Involves sending sample software to the intended audience;


(Selected audience do not pay for this software);


To try/use the software product;


And give the feedback to the authors (which help in correcting bugs);

An application package used in an office includes a word processor.



The office manager decides to buy and install new software and hardware.



The changeover to the new system can be achieved by either direct changeover or phased conversion.



The new software allows basic text summaries and analysis to help check text files, including functions such as calculating word frequency.



Describe how a spellchecker checks whether a word in a text file is correctly spelt or not.



[2]a.


Outline one problem that may arise from the installation of new hardware and software in the office.



[2]b.


Compare direct changeover and phased conversion.



[4]c.


Identify one way of testing this software.



[1]d.

Each word in the text file is compared with words in a dictionary (held in memory/online);


If the word is found in the dictionary it is correctly spelt / if the word is not found in the dictionary, spellchecker will recognize that it is incorrectly spelt;



a.


Award [1] for stating a problem and [1] for an elaboration, up to [2 max].


Users/employees might be afraid of these changes (for various reasons);


And not willing to help in this change;



Data migration problems;


For example, different file formats so conversion must be performed;



Employee efficiency may drop;


As they learn to use the new system;



Issue of compatibility with legacy software/hardware;


So features of new software/hardware may not work correctly;



b.


Award [1] for outlining what is meant by direct changeover, [1] for outlining what is meant by phased conversion, and then [1] for an advantage or disadvantage of each, up to [4 max].



Example answer


In direct changeover, the old software and hardware is completely replaced, in one move, by the new software and hardware;


Phased conversion involves selecting one section in the office for the direct changeover and other sections will be switched when the first section selected is running satisfactorily. Eventually the whole office has been changed;


A phased conversion is less risky than a direct changeover as any problems that might arise will be isolated in only one section in the office;


Direct changeover means everyone in the organization has same software/hardware and so there are no compatibility issues;



c.


Award [1 max].


Debugging (Accept: white-box testing – i.e. structural testing/flow testing;


black-box testing / requirement testing);


User acceptance testing (alpha-testing) / Beta-testing;

Identify one advantage of direct observation.



[1]a.


Identify one disadvantage of direct observation.

Direct observation is systematic/structured process;


Direct observation allows that current computer system can be studied in its natural setting;


Direct observation provides a better understanding of the way computer system is used;


etc.



a.


Award [1] for a disadvantage up to [1 max].



Direct observation is susceptible to observer bias;


Direct observation also can affect the behavior of users/process being observed;


Direct observation is time consuming;


etc.

Outline what is meant by a database management system.



[2]a.


Outline one advantage of using beta testing prior to the release of a new product.

Database management system is an application software;


that allows users to define/create/maintain a database / provides (controlled) access to the data;


Examples of database applications are computerized library, inventory, flight reservation, etc.;



a.


Award [1] of using beta testing and [1] for an expansion up to [2 max].



Beta testing is done from the user/client perspective;


So, requirement mismatches can be easily identified;


The real users have an opportunity to test a new product before it is (publicly) released;


So, user acceptance is assured;


Any bugs identified could be (easily) fixed before the public release of the product;


So, quality of the product is enhanced;



b.

An international company is in the process of moving its Head Office from Europe to Asia.



Identify two possible compatibility issues as a part of data migration.



[2]a.


Outline how a virtual private network (VPN) will allow employees who are in Europe to communicate with the Head Office in Asia.



[2]b.


Outline one social issue associated with this process.

Language differences/different character set;


Different conventions of representing various data/currencies, dates, etc.;


Incompatible software/incompatible hardware;



a.


Award [1] for identifying how VPN will allow employees to communicate and [1]for a development up to [2 max].



VPN allows secure communication with the Head Office in Asia;


A VPN is the company’s private network that uses a public network (in this situation the Internet) to connect remote sites/employees together;


Privacy is protected using VPN tunneling;


VPN uses encrypted connections routed through the Internet from the company's private network (Europe)to the remote site in Asia (or employee);


Hiding IP addresses to prevent unwanted exposure and data leaks;


Data security is ensured by encryption – anyone intercepting the encrypted data cannot read it;



b.


Award [1] for identifying an issue and [1] for an expansion up to [2 max].



Employees who will not be willing to move to Asia;


Lost jobs / finding new job / income decreased;



Employees who will move to Asia;


Personal or family issues during the period of moving or in a new environment / finances and cost of living / services such as schools, hospitals, transport / language problems;



c.

Identify one cause of data loss.



[1]a.


Describe one way offsite storage can be used to prevent data loss.



[2]b.

Any malicious activity;


Natural disasters;


Human error;



a.


Award [2 max].


Internet backup service could automatically back up (all important) data files;


to a remote server that could be accessed/controlled over the internet;



Copies of all important data files (backup) could be placed on two separate hardware devices;


which are placed in two different physical locations;



A remote file server could be set up;


for uploading all important data files;

An organization is implementing a new computer system.



The management considered phased conversion and direct changeover as methods of implementation.



Identify two organizational issues related to the implementation of the new system.



[2]a.


Evaluate these two methods of implementation.



[5]b.


State one type of testing that involves users.



[1]c.i.


Identify three consequences of inadequate testing.



[3]c.ii.


Discuss the social and ethical issues associated with the introduction of a new computer system.



[4]d.

Technology issues / issues of software compatibility / hardware compatibility;



a.


Award [5 max]


Direct changeover:


is the cheapest and quickest/the old system is completely switched for the new one;


this is straight forward but also the most risky / nothing to fall back on;


no need to keep data duplicates;


it allows the organization to change the system when most convenient;


the employees have very little time in order get use to the new system as the change is instantaneous;


there is a period of time when neither systems are operational;



Phased conversion:


method where the old system is still in use but parts of the new system or modules are introduced, involves bringing in the new system one step at a time;


less risky than direct changeover; less risky that the whole system will go wrong/if something happens, it will only affect the specific part;


takes a lot of time;


employees have enough time for training/to get use to the new system / are introduced to the changes in small stages;


Employees/users could ask for changes which then hold up the installation of the next phase which helps improving the system;



b.


Award [1 max]


User acceptance test;


Beta testing;



c.i.


Award [3 max]


Can lead to software which is not appropriate for the purpose it was intended/can lead to the system not meeting user requirements;


Can lead to (undiscovered) bugs in software/errors in the system;


Can lead to end user dissatisfaction;


Can lead to reduced (employee) productivity;


Can lead to decreased reliability of the organization;



c.ii.


Award [4 max]


Personal/professional development of all employees must be considered;


Physical safety (of all users);


Ergonomic standards (human-computer components);


Human dignity of all users;


The new system might be designed to replace some staff;


Code of ethics (system resources should not be used without approval);

Many health agencies are using simulations in an attempt to understand how their resources could be used in the future. With many countries experiencing aging populations, health agencies have worked with computer scientists to develop simulations that will enable them to manage their resources more effectively.



One of the key features of these simulations is the development of “what-if” models.



The following variables can be considered as part of a model to be used to simulate the management of an aging population:



quality of health education


lifestyle choices such as smoking


residential region.


Describe the main features of a “what-if” model.



[4]a.


Identify three other variables that could be included in this model.



[3]b.


Explain the ethical issues that may arise from the collection of information for this model.



[5]c.


Explain why the model would be converted to a simulation.



[3]d.

Data is entered into a rule-based environment;


The rules may be kept the same and the nature of the data input may be varied;


Or the data that is input may remain the same and the rules may be varied;


Which allows for a range of possible scenarios to be investigated;



a.


Award [3 max].


Life expectancy;


Gender;


Availability of life-extending treatments;


Genetic information;



Allow other appropriate answers.



b.


Award [5 max].



Example answer:


One ethical issue is invasion of privacy;


to get the best quality model;


sensitive personal data will need to be collected;


trade-off between the benefits of this model and level of intrusion into people's lives;


especially if the data is being shared with third parties;



c.


Award [3 max].


Simulation may be used to handle uncertainty and provide ranges of expected outputs; e.g. repeatedly inputting data drawn from random samples of plausible input values;


To look at the predicted spread of outcomes over time (consider the use of simulation in the analysis of queues);



A simulation is considered to be a representation of a model over time;


This means that the simulation can be used over a longer period of the development life cycle;


It can be used to assist with stages such as the implementation stage;

A group of programmers are involved in creating a new software product. They create many new sub-programs but also use existing sub-programs within the product.



Outline why a sub-program is considered an example of abstraction.



[2]a.


Evaluate the use of designing and developing different parts of software products concurrently.



[3]b.


Outline one way in which users can be informed of software updates.



[2]c.

A sub-program is a named section of code that performs a specific task (in a program) / can be called by name / referred by the identifier when needed;


without knowing the details (of code and data structures) as these are wrapped / hidden within the sub-program;



a.


Award [3 max]



different stages (of programming) (Accept examples!) run simultaneously (rather than consecutively);


this decreases product development time / decreases the time to market;


leading to improved productivity/reduces costs;


however, it requires more resources/more software developers;



b.


Award [2 max]



A message can be sent to the user (When the software is installed and registered, the user provides an email address / phone number);


With a link to the update;



notifications/alerts are sent to the computer (a cookie is placed on the user's computer which communicates with the software developer);


about automatic updates;



(when the program is run) it queries a URL the program developer has built in to check whether the current version matches the latest version;


if not, notifications/alerts are sent;



c.

An airline has a server that holds the flight database. Passengers can check in using a number of self-service client kiosks located in the airport.



Define the term client.



[1]a.i.


Define the term server.



[1]a.ii.


Explain the functions performed by the server in this situation.



[4]b.

A client is a simple application or a whole system that accesses services being provided by a (remote) computer/server;



a.i.


Award [1 max].


A server is a computer / software which manages access to a centralized resource or service in a network.


A server is a computer/software that provides data to other computers/clients in a network;



a.ii.


Award [4 max].



the central computer receives requests from the kiosks/terminals at the check-in desks/mobile phones;


can manage several clients simultaneously (in order, each providing a different set of services);


makes sure that the request is valid by accessing its database;


processes the request;


sends information to the kiosk;


all requests/information are sent over the network connection;



b.

Compare direct changeover with parallel running as a method of implementation.


there is no extra cost;


for running two systems/for extra salaries (no need to increase the number of employees);



benefits can be gained immediately;


because new system is better than the old;



if there is a bug in the new system;


there is not a second system to fall back on/could be disastrous for the company;



employees will need to be capable of using the new system immediately;


without training/with training in advance but not on the system

Define the term peripheral.

A piece of hardware / a hardware device that is externally connected or attached / remotely connected or attached (to the computer system);



Example answer


A peripheral is an external (computer) device that is connected to a computer, such as a keyboard;


Website developers need to consider a range of usability factors when designing a website.



A company promotes its products online. To make a purchase, customers are required to register with the company and provide data like their name, date of birth, age, gender and email address. Once registered, more than one customer is able to access the server to retrieve and modify their data at the same time.



Identify two usability factors that need to be considered in the design of a website.



[2]a.


Outline one reason why visual displays on a computer screen can create difficulties for some people.



[2]b.


State where the customer data is held during the process of modifying their data.



[1]c.i.


Explain how the operating system ensures that each customer’s data is secure when multiple users are accessing the data at the same time.



[4]c.ii.


The company is considering sharing its customers’ data with marketing organizations.



Explain why there could be ethical issues for the company when sharing its customers’ data.



[6]d.

complexity / simplicity / amount of effort to get a result / number of errors with the time taken to move past them;


readability / comprehensibility / reading or writing speed;


learnability / time to accomplish tasks on the first use;


effectiveness ( user performance);


efficiency (time needed to complete a task);



a.


Award [2 max].


Award marks for the reason/accessibility issue arising from visual / hearing impairments / cognitive disabilities, and not only for users with disabilities but also for those using mobile devices (alternative browsing devices such as TVs, watches, etc.), or those with slow network connections.



Visual display design is not logical;


workflows are not simple, and do not require as few interactions as possible to complete;



Visual display design is not consistent;


navigation, header, footer, and main content are not always in the same places;



Visual display design is not usable as possible;


tools are not easy to use, processes are not broken down into logical steps;



People with poor eye-sight/color blind can have difficulties to distinguish;


because of the way graphics, words and directions are used / combinations of some colours (e.g., red and green);



b.


Award [1 max].


RAM/primary memory;


It's held by the process/thread handling the customer access, which may be in RAM or in other storage if the process is swapped out while handling the access;



c.i.


Award [4 max].


OS (memory management function) allocates / deallocates memory to each process/customer task, and guarantee each customer task the resources it needs to run correctly;


moves processes back and forth between main memory and secondary memory during execution to prevent overwriting / accidental interchange;


OS (hardware memory protection- part of an OS) isolates/protects customer’s data/applications;


and control access rights to the specified memory area (for example, prevents write access to the memory which is not allocated to the process/ customer task);


and protects data / applications when in memory / RAM from malicious code (prevents attempts to execute the contents of the partition/ allocated memory);



c.ii.


Award [6 max].


privacy of customer/ person data;


company needs to gain permission from customer;


customer would need to be able to view all data details;


customer must be informed about all uses that will be made of data;


customer must be informed to whom data will be disclosed.


legal issues to do with unauthorized disclosure of customer data;

Outline one feature of a word processor that could reduce the amount of typing required when writing letters.



[2]a.


State the purpose of technical documentation provided with software.



[1]b.

Auto-correct/short sequences/codes;


can be used to represent longer phrases;



Mail merge;


allows production of many letters by only typing the (body of a) letter once;



Voice recognition;


allows easy entry of text;



a.


Award [1 max].


Technical documentation explains how to install software;


Technical documentation describes the hardware configuration/operating system needed(to install this software);

A medical centre uses a computer system to manage both patients’ data and appointments. This system, which is used by the doctors, nurses and secretaries, has two unordered files: a patients’ file and an appointments’ file, both of which can only be accessed sequentially.



Every evening the following processing takes place:



a list of appointments for the next day is printed out


reminders are sent by SMS text messages to the patients’ mobile devices.


Outline the pseudocode that the processing must follow when the system sends out the text reminders.



[5]a.


Describe two different methods that the medical centre could use that would allow data to be restored should it be lost for any reason.



[4]b.


The medical centre is concerned about the privacy of the data it is storing and has to make decisions concerning:



access to the data stored on this system


storing the data locally or through the use of a cloud service.


Discuss the issues that should be considered before making these decisions.



[6]c.

Iterate through the appointments file;


Check for correct day;


Repeat for each appointment on that day;


Using the patient ID for that appointment;


Iterate through the patients file until record for that ID found;


Retrieve phone number and send out SMS;



Example:





Note: Candidates are not requested to construct the (algorithm in) pseudocode.



a.


Award [1] for method and [1] for description – only accept TWO methods.


Mark as [2] and [2].



Backup;


Data files on a regular basis;



Printed copies;


Printouts can be kept of transactions;



Transaction Log file;


Written for each transaction can be used to restore;



Accept any reasonable methods described including second server and cloud use.



b.


There are 2 possible issues here: who has what level of access to the data in the hospital and whether storing in the cloud is safer than storing locally.



For each of these 2 issues award [3 max] as follows:


Award [1] for identifying the issue.


Award [1] for some valid development of the issue.


Award [1] for a suitable discussion.



Example answers could include reference to the following but this is not an exclusive list. Award marks for any two reasonable issues discussed – one of which is access and the other security.



Official access to the data [3 max]:


Access to this sensitive data must be restricted.


Only those directly concerned can be able to access it.


Even less people should be able to edit it.


Therefore access levels should be set up, with strong levels of authentication.


Physical access to servers should be controlled if using the local system;



Data security [3 max]:


Is the data safer stored locally or on the cloud?


Cloud service providers are professionals – they should have stronger security than a hospital system.


What track record / reputation does the cloud service provider have?


If patient data could be sold/inspected, then both the patient and hospital could suffer serious consequences.


Is the cloud governed by appropriate privacy laws?


Is it located internationally or is it governed by the laws of the country in question?


Could be intercepted in transmission;



c.

A new computerized system is being planned for a school library.



Describe one method by which systems requirements can be obtained from the stakeholders.



[2]a.


Outline one reason for providing a prototype for this new system.

Answers may include:


Interviews could be held (with the librarian/stakeholders);


To establish the functions required by the system;



Direct observation could be made of the users/students using the present system;


To gain an insight on how the library is being used;



a.


Allows stakeholders to gain an idea of how the system would be/work/look;


so they can provide feedback / suggest improvements;

Outline why a prototype would be used to demonstrate the proposed system to the client.

To provide feedback on the efficiency or design of the product;


To give an idea or feel of the final product;


To encourage dialogue between the developers and the client;


Clients can identify errors or omissions in the design;

Outline one method of collecting information from stakeholders concerning the requirements for a new system.

I