0% found this document useful (0 votes)
34 views7 pages

Y11 P1 Mid-Years MS

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views7 pages

Y11 P1 Mid-Years MS

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL)

IGCSE / CAMBRIDGE SECONDARY 2

INFORMATION AND COMMUNICATIONS TECHNOLOGY 1.5 Hours


(Paper 1)

YEAR 11 MID-YEAR EXAMINATION 2022/23

MARKING SCHEME
2

m20qp12q2
1. Tick (✓)...

m20qp12q6
2. A teacher …

a) Write down the file path to locate a document which is stored in the folder
Excamination_Marks.
\Work\Class_A1\Examination_Marks\
\Work – 1 mark
\Class_A1 – 1 mark
\Examination_Marks – 1 mark

b) Describe what is meant by .txt and .rtf file formats.


txt is a text file format – 1 mark
.rtf is a rich text format – 1 mark

c) Explain the differences between the two file formats.


Three from:
RTF has basic formatting (embolden, underline, etc.) while TXT is plain text
RTF is capable of paragraph formatting while TXT is not
RTF is capable of creating bulleted lists while TXT is not
RTF files can include images while TXT cannot
TXT takes up less memory while RTF takes up more memory

m20qp12q8
3. A headteacher ...

a) Explain the differences between a flat file database and a relational database
Two from:
A flat file database stores data in one table//a relational database uses multiple tables
In a relational database the tables are linked
In a relational database must have a primary key and a foreign key in the linked tables
3

Describe the steps the headteacher would need to take to create a relational database
from this data..
Four from:
Open database package
Select database tools
The teacher’s file and subject file would be imported to separate tables
A primary key is identified/set
The foreign key is identified in the subject table
Click/create/select relationships
The primary key is dragged to the foreign key
Save the database

m20qp12q9
4. Documents use headers...

S20qp13q2
5. Computers use...

a) Write down the type of interface shown.


Graphical User Interface

b) Write down two advantages of using this type of interface.


Two from:
User does not need to learn the commands
User-friendly
Can locate applications more rapidly

S20qp13q6
6. The secretary ...
a) For the following fields, write down the most appropriate data type. Each data type must
be different. For any numeric field, specify the type of number.
Gender
Boolean/text/string/alphanumeric
Membership_type
Text/alphanumeric/string
Year_joined
Numeric/integer/date
Note: each answer must be a different data type
4

7. Design an online data entry form which could be used to enter the details of one
member, using all the fields shown in the table.
Two marks for all field names given; one mark for five field names
Max six from:
Data fills the screen and it looks like an online form
Use of navigation buttons
Use of drop down lists for Type_of_membership or Year_joined or Gender
Use of text/character boxes
The Name_of_person, Contact_email and Contact_phone_no fields are
larger than the other fields
Use of a calendar for Date_of_birth
Use of submit/help buttons
Appropriate title

Write down three of the formatting features that have been used in the part of the spreadsheet
shown.
Three from:
Bold
Centre/right alignment
Text/word wrap
Merge and centre
Increase/decrease size of columns
Row height increased

b) Explain what the formula does.


IF(E3=“Y”,VLOOKUP(D3,J$3:K$5,2)*F3,0)
Six from:
If the member is attending/if E3 is equal to Y
Then locate the type of member using the value in D3 ...
... in the range J3 to K5
Return the corresponding value from the second column
Multiply the returned value by F3/the number attending
Otherwise display 0 in the cell

c) Describe the steps he would take to sort the data by type of member so that Junior
members are at the top of the list.
Three from:
Highlight A3 to H6/column A to column H/A2 to H6
Click Sort
Deselect/unselect/uncheck top row is headings if A3 to H6
used//select/check top row is heading if A2 to H6 used
Click on sort by Column D//Click on sort by Type of member
Sort A to Z/ascending
5

S20qp11q5
7. Phishing and pharming ...
Compare and contrast phishing and pharming.
Max four from:
Comparisons
Both use the internet
Both redirect the user to a fake website
Both can lead to fraud and identity theft
Both use websites that look legitimate
Personal data is compromised
Max four from:
Differences
With phishing emails are sent to the computer
In pharming malicious code is uploaded to the computer
In phishing clicking a link sends user to a fake website
In pharming the code redirects the user to a fake website without their
knowledge
The email in phishing appears to have come from a trusted source
Website in pharming appears to be genuine
In pharming spyware can be used to record key presses

Describe the methods which can be used to help prevent smishing.


Six from:
Avoid clicking on any unknown texts with links/Avoid clicking links in texts
from people you do not know.
Do not reply to text messages that have asked you about any of your
personal finances/details.
Report any suspicious activity.
Be on the lookout for messages that contain the number 5000 or any
number that is not a phone number as this is used by smishers.
If the text messages urge you for a quick reply then that is a clear sign of
smishing.
Do extensive research before replying to any message. There are plenty
websites that allow anyone to run searches based on a phone number and
see any relatable information about whether or not a number is legitimate.
Never call back a phone number that was associated with the text from an
unknown source.
If the message states ‘Dear user, congratulations, you have won.’ It is a
clear sign for smishing.
Check the time when the unknown message was sent.
If the text message was sent at an unusual time, then that is another sign of
smishing.
6

W20qp11q11
8) Tick (✓) whether the following items only appear in Technical documentation, only
appear in User documentation, or appear in both

8. An air-conditioning...
a) This device captures the temperature from the room.
Sensor

b) This device changes the data from the microprocessor into a form that can change the
speed of the fan.
Digital to Analogue Convertor/DAC

c) This output device operates the fan.


Actuator/motor

S22qp12q2
9. A computer-controlled glasshouse ….
Two from, for example:
Sprinkler
Lamp
Heater
Vents/Window openers/Motor
Actuator
7

S22ap11q12
10. Many company ….

a) For each of the following physical safety issues describe two ways of helping to prevent
them.
i) Fire
Fire
Two from:
CO2 fire extinguisher
Don’t overload sockets
Have fans/cooling system
Use Residual Circuit Breaker/RCB

ii) Electrocution
Electrocution
Don’t bring drinks close to computers
Cover/insulate live/bare wires common use of home computers is online gaming.

b) Describe three esafety measures which should be taken when playing games on the
internet.
Three from:
Report/block cyberbullies
Respect other players
Check game ratings for age
Reduce the amount of time spent gaming
Be careful of in-app purchases
Turn on privacy settings
Don’t use your real name//use a nick name
Don’t give away personal information

11. Bluetooth is ...

Four from:
Smart phone sends data to its Bluetooth connector
Data is converted to radio waves
The smartphone automatically detects nearby devices
The smartphone pairs to the other device if in range
The smartphone randomly chooses one of 79 possible channels
If the channel is in use, it randomly chooses another
The connection changes channels, every few seconds
Sends the radio wave to the other device

You might also like