Question Bank with appropriate answers as expected by CIE
1. Explain the difference between the following -
a. RAM & ROM -
RAM stands for Random Access Memory. RAMis used to temporarily store
information that is currently in use by the computer. This can include anything
from word documents to videos.
RAM can be read from and written to and so the information stored in RAM can
change all the time (it depends what tasks you are using the computer for).
RAM is a fast memory. Data can be written to and read from RAM very quickly.
RAM is generally measured in GB (Gigabytes). RAM is Volatile Memory. This
means that information stored in RAM is deleted as soon as the computer is
turned off. The more RAM you have installed in your computer -- the faster
it can perform. You can open and use more programs at the same time
without slowing the computer down.
ROM stands for Read Only Memory. ROM is used to permanently store
instructions that tell the computer how to boot (start up). It also loads
the operating system (e.g. Windows). These instructions are known as the
BIOS (Basic input/output system) or the boot program. Information stored
in ROM is known as READ ONLY. This means that the contents of ROM
cannot be altered or added to by the user. ROM is fast memory. Data
stored in ROM can be accessed and read very quickly. ROM is Non-Volatile
memory. This means that stored information is not lost when the computer
loses power.
b. CLI & GUI -
CLI - Command Line Interface. A command line interface is an older style
operating system where users type in commands using keyboard.
Command Line Interface's do not make use of images, icons or
graphics. All the user is sees is a plain black screen like the one to the
right. Because they use no graphics they require very little computer
power.Commands have to be entered precisely without spelling mistakes
or else the operating system will return an error. Remembering commands
and the exact way to enter them can be difficult and so Command Line
Interface Operating Systems are considered hard to use.
GUI - Graphical User Interface.GUI's are visual (graphical) interfaces and
they are more popular than CLI's because they are very easy to use. The
graphics do need more computer power. Instead of typing in commands, the
user can use a mouse to point and click objects on the screen.The main
features of a GUI are Windows, Icons, Menus and Pointers.Graphical
user interfaces require more computer power. Less chance of users making
errors (Just clicking icons).
2. State the advantages and disadvantages of using tablets/Smart Phones/Laptops
for accessing the Internet rather than using a Personal Computer/Desktop?
Advantages
Disadvantages
3. Benefits of using Robots –
4. Optical Discs and Magnetic Tapes are both used for storing data. State their
uses and the reason?
5. What is Optical Card Readers (OCR) with examples?
6. Difference between Intranet & Internet?
Explain the term Extranet
An extranet is a private network that enterprises use to provide trusted third
parties -- such as suppliers, vendors, partners, customers and other businesses --
secure, controlled access to business information or operations.
7. Students can use CD’s or pen drives for storing their work. Give three reasons
why students may prefer to use pen drives.
8. a. Explain what is meant by GPS.
(a) Any three from: – Global Positioning System – space-based navigation system
– typically four satellites must be visible to the receiver – calculates the distance
from a receiver to the satellite – calculates the position of the receiver
(b) Give two examples of the use of GPS.
used in cars to calculate routes – used by walkers to locate position on
hills/mountains – used by runners to calculate distance run – used by farmers for
tractor navigation/soil evaluation/livestock control/yield monitoring – used in
satellite navigation systems for ships – used in tracking aircraft
9. Johann is going on holiday to a different country. He will need to take his
passport. He has a new type of passport which has an RFID chip in it. He will be
passing through automated passport control gates.
(a) Describe what an RFID chip consists of. [
– an integrated circuit… – …which contains an aerial… – …which receives and
transmits data
(b) Describe how RFID will be used as he passes through passport control.
He places his passport against the RFID reader – he stands in front of a
scanner/fingerprint scanner is used – his facial characteristics/fingerprints are
compared with… – …those stored on the RFID chip
10. The students want a printed record of the computer readings as they are
taken. They want to put the printer inside the greenhouse. Their teacher has
suggested a dot matrix printer. The students suggested an inkjet printer.
Give two reasons why the teacher has suggested a dot matrix printer.
Give two reasons why the students have suggested an inkjet printer
11. Biometric methods are increasingly being used to authorise user access to
computer systems.
(a) Explain, giving examples, why biometric methods are considered to be a more
secure method of authorising access to a network than using id and passwords.
Biometric methods use unique data
User ids and passwords can be copied/stolen/forgotten
Cannot copy biometric data
Only the person with particular biometric features can access the network
Anybody who has the password can access a network
Max three from
Fingerprints can be used to identify an individual
Retina scans can be used to identify an individual
Facial characteristics can be used to identify an individual
Voice recognition software can be used to identify an individual [6]
(b) Give three disadvantages of using biometric methods compared to user id and
passwords.
12. Advantages of using Presentation Software as against Desktop Publishing
(DTP)?
13. State the fullforms of generic file terms and the usage of files with the stated
extensions.
.txt – .txt file extension is used for the Plain Text File. This file format is created for all
word processing programs. It allows us to create a text-based document without using
font style, formatting, and text colors.
.rtf – A file with the .RTF file extension is a Rich Text Format file. While a normal text file
stores only plain text, RTF files can include extra information about font style,
formatting, images, and more.
.docx –.docx file extension is used by Microsoft Word to save a variety of documents
such as letters, resumes, and essays.
.csv – CSV stands for Comma Separated Values. A CSV file is a plain text file that stores tables and
spreadsheet information. The contents are often a table of text, numbers, or dates. CSV files can be
easily imported and exported using programs that store data in tables.
.css – Cascading Style Sheets (CSS) is a stylesheet language used to describe the presentation of a
document written in HTML or XML (including XML dialects such as SVG, MathML or XHTML). CSS
describes how elements should be rendered on screen, on paper, in speech, or on other media.
.pdf – Portable Document Format (PDF),is a file format used to present documents, including
text formatting and images, in a manner independent of application software, hardware, and
operating systems. Such files cannot be edited.
.bmp – he BMP file format, also known as bitmap image file, device independent bitmap (DIB)
file format and bitmap, is a raster graphics image file format used to store bitmap digital images,
independently of the display device
.jpg – JPG is a widely used compressed image format for containing digital images. It is the most
common image format used in digital cameras, different operating systems and on the Internet. A
compression ratio of 10:1 can be applied in JPG images without losing significant details. That
results in smaller file size which allows sharing and storing of images easier. T
.gif – GIF stands for Graphics Interchange Format. GIF is a raster file format designed for relatively
basic images that appear mainly on the internet. Each file can support up to 8 bits per pixel and can
contain 256 indexed colors. GIF files also allow images or frames to be combined, creating basic
animations.
.png – PNG is short for Portable Network Graphic, a type of raster image file. It's particularly
popular file type with web designers because it can handle graphics with transparent or
semi-transparent backgrounds.
14. Role of Proxy Server in a Network –
15. Purpose of a Router –
16. Aftab and his family have three computers in their home. He wants to connect
the computers to the internet. Explain why he would:
Router: So that data can be transferred from one network to the other.
Browser: To access the world wide web/view web pages/surf the net
Email: so that he can send messages to people outside the network.
ISP: stands for Internet Service Provider – He will need the same to access
internet/email.
17. Describe two recent developments in ICT which have improved the quality and
speed of communication using the internet.
Two from, descriptions of:
e.g.:
Optical fibre broadband
Increased bandwidth
Fourth generation mobile telecommunications [2]
54.Explain the terms Video Conferencing, Audio Conferencing and Web
Conferencing
Audio conferencing is where two or more people in different locations use technology
like a conference bridge to hold an audio call. Audio conferencing is different from a
traditional phone in in that all participants dial into a central system that connects them
instead of directly dialing each other. Audio conferencing aims at achieving
communications and collaboration simultaneously. Many audio conferencing products
may also come with online collaboration elements standard or optional, like
screen-sharing capabilities, to further enhance the value of audio meetings. Audio
conferences often require a special dial-in code in addition to the phone number to help
keep out uninvited users. Some conference systems even allow for the use of an
individualized audio pin that identifies specific users to further identify audio conference
participants.
24. Describe the advantages of using Video Conferencing over Face to Face
conferencing?
18. A school keeps records of every student including details of their name,
address, phone and date of birth. Using this information define the terms File,
Field and record
19. Describe what is meant by a key field, using examples of student data.
Three from:
One mark for:
The key field in a database of student records would be the student id
Two from:
A field which contains unique data
It is used to identify the record
Used to create relationships between tables [3]
20. What is meant by Blog?
21. Describe methods of preventing hacking other than passwords?
22. Describe Blogs and Social Networking sites as a mode of communication?
23. Explain the working of a Microprocessor controlled heating system?
24. A school uses computer controlled greenhouse to grow plants
25. An office has a microprocessor controlled central heating system.
(a) Name and describe, in detail, the use of two input devices in such a system
(b) Describe how the microprocessor would keep the temperature of the office at
a constant
19°C.
(a) Two matched pairs from:
Number pad/touch screen/remote control
For the user to input the required temperature
Temperature sensor
To input current temperature of the room/office [4]
(b) Four from:
Microprocessor receives temperature from temperature sensor
Microprocessor stores required temperature/19 as preset value
Compares temperature from sensor to pre-set temperature/19
If temperature is lower than preset value/19 microprocessor sends a signal to the
actuator…
…to turn heater on
If higher than preset value/19 microprocessor sends a signal to turn heater off
Wait set period of time before looping/process is continuous [4]
26. What are Expert Systems, How do they work? State some examples where
expert systems are used?
27. How does an Expert System work?
28. Examples of an Expert System are:
● Diagnosing a patient’s illness
● Searching for oil and mineral reserves
● Chess games
● Identification of plant and animal species
● Diagnosing faults with cars
29. What are the two types of documentation a system analyst would suggest?
Technical Documentation includes
Program Listing
Programming Language
Flowchart/Algorithm
List of variables
File Structure
Purpose of the system/program
Hardware/Software Requirements
Input/output Formats
Sample test runs
Known bugs/Possible errors
Validation Rules
Limitations of the system
User Documentation
How to load software/run software
How to open/save a file
How to search/sort
How to Print
How to add/edit/delete record
30. What is meant by Software Copyright? What is the action taken if the law is
broken?
31. Explain Batch Processing? Why is Batch Processing not suitable for booking
airline tickets?
32. Advantages of Online shopping / ecommerce?
33.
34. Difference between Parallel running and Direct Changeover.
35. Explain Normal, Abnormal and Extreme types of testing data?
36. Explain 2 methods used frequently for Validation & Verification?
37. Types of Validation
38. Explain what is Virus? What does it do? How can Virus be prevented?
39. Explain EFTPOS and How this system works?
40. State the advantages of using Chip & Pin systems over Magnetic Strips?
41. Explain the terms Phishing, Pharming, Smishing, & Spam.
Phishing:
Pharming:
Smishing:
Spam:
42. When sending documents companies sometimes use email and sometimes
use ordinary post. Give two reasons stating the need for each.
43.
44.
45.
(a) Describe the differences between physical safety and e-safety when using
computers.
Physical safety is the need to prevent accidents with computers e-safety is the
need to take sensible precautions when using the internet
(b) Describe three measures which should be taken in order to maintain e-safety.
- Only use websites recommended by teachers – only use a student friendly
search engine
– only email people already known
– think before opening an email from an unknown person
– never email the school’s name or a picture in school uniform
– know how to block and report unwanted users in chat rooms
– never give out any personal information online
– never arrange to meet anyone alone
– always tell an adult first and meet in a public place – never use real name when
playing games online
Three from:
The necessary software/equipment is more expensive to purchase
Takes longer to match data
If individual gets ill/background noise can make voice unintelligible to system
With certain illnesses retina scans stop working
Injuries to fingers can cause biometric device to fail to recognise you.
Could be wearing contact lenses which would stop retina scan working [3]
46. Differentiated between Moderated and Unmoderated forums
47. State five points of the Data Protection Act.
● Data must only be kept if it is necessary for the business / organisation
(e.g. a store shouldn't keep details of your political or religious views - they
don't need to know this!)
● Data must be accurate and kept up-to-date (it is the duty of the business /
organisation to make sure the data has no errors)
● Data must not be kept longer than necessary (e.g. you can't keep a
customer's details forever - only whilst they are still your customer)
● Data must be kept secure (e.g. databases should be encrypted, firewalls
should be used for networks, etc.)
● Data must not be transferred to any country that does not have a similar
data protection laws
48. Describe the three development layers.
Content Layer -The actual text and imagery, how it is structured and linked
together is called the content layer. This will generally be created using HTML
Presentation Layer - The presentation layer defines the format of a page through
styling elements. This will maintain the consistency in the choices of fonts,
colours, sizes and page styling. This is normally done through the creation of a
cascading style sheet and applying it to one or multiple pages.
Behavioural Layer - Real time interactive or dynamic content on a site that
provides user with something to do is often generated using Javascript and this is
the behavior layer. This may include image galleries, forms, the setting of
multimedia element sizes or adding a live clock, video or music track.