0% found this document useful (0 votes)
383 views12 pages

AS Level IT Paper 3 Theory Exam 2024

The document is a 12 page exam for the Cambridge International AS & A Level Information Technology exam. It contains 3 questions about Near Field Communication, uses of break statements, functions and comments in JavaScript code, and describing the Agile method used to develop software.

Uploaded by

Sonia Vasnani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
383 views12 pages

AS Level IT Paper 3 Theory Exam 2024

The document is a 12 page exam for the Cambridge International AS & A Level Information Technology exam. It contains 3 questions about Near Field Communication, uses of break statements, functions and comments in JavaScript code, and describing the Agile method used to develop software.

Uploaded by

Sonia Vasnani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
  • Instructions and Information
  • Question 1: NFC Communication
  • Question 2: JavaScript Code Usage
  • Question 3: Agile Development Method
  • Question 4: Lossy Compression
  • Question 5: Animation Properties
  • Question 6: Data Flow Diagram Symbols
  • Question 7: Access Control Strategies
  • Question 8: Cryptocurrencies
  • Question 9: Botnet Attacks
  • Question 10: Alpha Testing Process
  • Question 11: Virtual Servers

Cambridge International AS & A Level

* 9 0 5 5 7 1 7 8 3 5 *

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory February/March 2024

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 70.
● The number of marks for each question or part question is shown in brackets [ ].

This document has 12 pages.

DC (SL) 329206/3
© UCLES 2024 [Turn over
2

1 Near Field Communication (NFC) is a communication method.

Describe how NFC can be used by mobile devices.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2024 9626/32/F/M/24


3

2 Explain why break statements, functions and comments are used in JavaScript code.

(a) Break statements

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Functions

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(c) Comments

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2024 9626/32/F/M/24 [Turn over


4

3 Describe the Agile method used to develop software.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2024 9626/32/F/M/24


5

4 Justify the use of lossy compression when storing and using bitmap images.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2024 9626/32/F/M/24 [Turn over


6

5 Objects in computer animations have properties.

Describe the following properties.

(a) Orientation

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Transparency

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2024 9626/32/F/M/24


7

6 Draw three different symbols used in a data flow diagram (DFD). For each symbol, state its
purpose.

Symbol 1

Purpose 1

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Symbol 2

Purpose 2

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Symbol 3

Purpose 3

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]
© UCLES 2024 9626/32/F/M/24 [Turn over
8

7 Many companies have access control strategies to protect their data.

Explain how the use of an access control strategy can minimise the risks to computer data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2024 9626/32/F/M/24


9

8 Discuss the benefits and drawbacks of the use of cryptocurrencies by individuals.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2024 9626/32/F/M/24 [Turn over


10

9 Botnets are software applications that are connected together over the internet.

Describe how botnets attack computer systems.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2024 9626/32/F/M/24


11

10 Alpha testing is carried out in the final stages of software development.

Describe the process of alpha testing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2024 9626/32/F/M/24 [Turn over


12

11 Discuss the benefits and drawbacks of using virtual servers for hosting websites.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2024 9626/32/F/M/24

Common questions

Powered by AI

Cryptocurrencies offer individuals benefits such as lower transaction fees compared to traditional banking, especially for cross-border payments, and increased financial privacy due to decentralized and generally non-identified transactions. They provide access to a new asset class with potential for high returns. However, drawbacks include high volatility, making them a risky investment, and regulatory uncertainties that can affect their value and legality. The lack of a central authority also means less consumer protection against fraud and theft compared to conventional financial systems.

Alpha testing is an early stage of testing in the software development process performed by internal staff to identify bugs before releasing the product to external users. Its primary objectives are to evaluate the application's functionality, reliability, and overall user experience under controlled conditions. Developers conduct alpha testing by simulating real-world usage, allowing teams to detect and rectify significant issues before they escalate. This phase typically includes both functional testing and usability testing, ensuring the product meets predefined requirements and standards.

Virtual servers offer several benefits, including cost-effectiveness, as multiple virtual servers can run on a single physical server, thus saving on hardware costs. They allow for easy scalability and resource allocation, enabling website hosts to adjust computing power as needed without investing in new hardware. Virtual servers provide flexibility for testing and development environments and enhanced security through isolation from other users. However, potential drawbacks include performance limitations due to shared physical resources, which may lead to slower response times under heavy loads, and dependency on the underlying physical server’s reliability and bandwidth.

Lossy compression for bitmap images reduces file size by permanently eliminating certain data, which can enhance storage efficiency and decrease transmission time, especially important for web use. This compression allows large files to become manageable and facilitates quicker uploading and downloading over the internet. However, it causes a loss of image quality, as some original data is irretrievably lost, leading to artifacts or reductions in image fidelity. Despite this, the balance between reduced file size and acceptable quality loss often justifies its use for images like JPEGs, where perfect reproduction is less critical.

In JavaScript, break statements are used to exit a loop prematurely when a certain condition is met, improving code efficiency and control flow. Functions encapsulate code for specific tasks, promoting reusability and organization by allowing the same code block to be executed multiple times with different inputs. Comments are included to explain code logic, making it easier to understand and maintain by providing context or notes to other developers or future reference.

Botnets are networks of compromised computers controlled by malicious actors, often used to perform coordinated cyberattacks. They operate by infecting systems with malware, allowing attackers to control these 'zombie' computers remotely. Botnets are typically used for Distributed Denial of Service (DDoS) attacks, where multiple systems flood a target's network with traffic, exhausting resources and causing service outages. They can also be used for spamming, data theft, or spreading additional malware. The distributed nature of botnets makes them formidable and challenging to dismantle.

Access control strategies safeguard data by ensuring that only authorized individuals have access to specific information systems or data. They implement security protocols that define who can view or use resources within an organization, minimizing the risk of data breaches. Strategies like role-based access control (RBAC) assign permissions based on the user’s role within the organization, thereby limiting unnecessary access to sensitive data. This layer of security prevents unauthorized data access, reduces the likelihood of internal threats, and ensures compliance with data protection regulations.

Agile methodology is an iterative approach to software development that emphasizes flexibility, customer collaboration, and responsiveness to change. It involves breaking a project into small increments called sprints, which allow for frequent reassessment of project direction and priorities. Agile focuses on delivering functional pieces of a product incrementally, enabling teams to gather feedback quickly and make adjustments to better meet user needs. This approach contrasts with traditional methodologies that involve complete planning before execution, allowing for innovation and adaptive planning throughout the development lifecycle.

NFC allows mobile devices to communicate with each other by establishing radio communication when devices are in close proximity, typically less than 10 cm. It is commonly used for contactless payments, data exchange, and settings automation. For example, NFC can facilitate mobile payments by bringing a phone close to a payment terminal, where the device transmits payment information securely. It also enables devices to exchange files or connect to other wireless devices without manual configuration by simply touching them together.

You might also like