Topic 1 test [239 marks]
1. [Maximum mark: 2]
(a) State one benefit of using software-as-a-service (SaaS). [1]
(b) State one drawback of using software-as-a-service (SaaS). [1]
2. [Maximum mark: 2]
Describe the pilot running method for the implementation of a new
system. [2]
3. [Maximum mark: 2]
Describe the purpose of user acceptance testing. [2]
4. [Maximum mark: 2]
Identify two methods of providing user documentation. [2]
5. [Maximum mark: 2]
Outline one method that can be used to deliver user training. [2]
6. [Maximum mark: 2]
State two usability issues that could occur when using a cell phone
(mobile phone). [2]
7 [M i k 2]
7. [Maximum mark: 2]
Identify two methods that can be used to improve the accessibility of a
computer system for users. [2]
8. [Maximum mark: 2]
(a) State one benefit of using software-as-a-service (SaaS). [1]
(b) State one drawback of using software-as-a-service (SaaS). [1]
9. [Maximum mark: 2]
Describe the pilot running method for the implementation of a new
system. [2]
10. [Maximum mark: 2]
Describe the purpose of user acceptance testing. [2]
11. [Maximum mark: 2]
Identify two methods of providing user documentation. [2]
12. [Maximum mark: 2]
Outline one method that can be used to deliver user training. [2]
13. [Maximum mark: 1]
Define the term peripheral. [1]
14. [Maximum mark: 2]
State two usability issues that could occur when using a cell phone
(mobile phone). [2]
15. [Maximum mark: 2]
Identify two methods that can be used to improve the accessibility of a
computer system for users. [2]
16. [Maximum mark: 2]
State two compatibility issues that may occur when two information
technology (IT) systems are merged. [2]
17. [Maximum mark: 2]
Identify two usability problems that can occur in a voice recognition
system. [2]
18. [Maximum mark: 15]
The staff at a doctor’s practice consist of a receptionist and a doctor.
The patients’ medical records and payments, the doctor’s appointment calendar,
and other important data are stored in a database on the central computer.
(a) Outline one security measure that can be taken to prevent
unauthorized access to the patients’ data stored on the central
computer. [2]
(b.i) Identify one cause of data loss. [1]
(b.ii) Describe one method that can be used to prevent data loss. [2]
A new vaccine has been distributed that would be of benefit to some of the
doctor’s patients. A large number of personalized letters need to be written to
these patients, inviting them to visit the doctor’s practice to be vaccinated.
(c) Describe how these letters could be automatically generated by
a word processing application. [3]
When the doctor visits a patient in their home, she needs to be able to access the
patient’s medical records stored on the central computer in the practice.
(d) Outline two reasons for the use of a virtual private network
(VPN) in this situation. [4]
A mobile data connection enables the doctor to access internet resources while
visiting patients in their homes. Sometimes the data transfer speeds are slow.
(e) Explain why the speed of data transmission across a mobile
network can vary. [3]
19. [Maximum mark: 15]
A systems analyst has been employed to make proposals on how to improve the
current operation of a design company.
To achieve this, the analyst decided to carry out interviews.
(a.i) Identify one other method of obtaining information from the
end-users. [1]
(a.ii) Outline one advantage of using the method identified in part
(a)(i) in preference to interviews. [2]
(b) Outline the purpose of prototypes. [2]
A software company has been employed to program and implement a new
system proposed by the systems analyst.
(c) Explain why software testing is important at all stages of
implementation. [3]
Using images in design may have ethical considerations.
(d) Explain one ethical problem associated with using images. [3]
Images are sometimes larger than the limit placed on email attachments. For
example, a 60 MB image file needs to be sent by email without losing quality, but
a file larger than 10 MB cannot be uploaded as an attachment.
(e.i) Describe how large image files can be sent by email. [3]
(e.ii) State one other hardware or software problem associated with
the use of images. [1]
20. [Maximum mark: 15]
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.
(a) State two technologies that are required to provide a virtual
private network (VPN). [2]
(b) Identify two factors that may affect the speed of data
transmission. [2]
(c) Explain why data compression would be used when data is
transmitted. [3]
A large amount of sensitive data is stored online and needs to be protected.
(d) Outline how encryption is used to protect data. [2]
(e) Describe the role of a firewall. [2]
Employees are increasingly working from home.
(f ) Discuss the social impacts of this changed work pattern on
employees. [4]
21. [Maximum mark: 15]
An organization needs to improve its current computer systems. The systems are
legacy systems with a large number of end users.
(a) Identify two issues concerning the roles of end users that must
be considered in relation to the new system. [2]
(b) Outline the meaning of the term “legacy system”. [2]
(c) Identify one method of gathering requirements from end users. [1]
The organization needs to use existing data in the new system.
(d) Explain one problem that may occur during data migration. [3]
A decision needs to be made on whether to use parallel running or a direct
changeover method of implementation.
(e) Explain one advantage of using parallel running instead of a
direct changeover. [3]
(f ) End users will require training in the use of the new system.
(f.i) Identify one method of training for end users. [1]
(f.ii) Evaluate the advantages and disadvantages for the end user of
the method of training identified in (f )(i). [3]
22. [Maximum mark: 4]
A student posts images and videos on a public website of her friends at a party.
(a) Outline one ethical issue with the student posting these images
and videos. [2]
(b) Outline one technical issue that may prevent the images and
videos from being viewed. [2]
23. [Maximum mark: 4]
A company is using a prototyping approach as part of their software
development process.
(a) Outline one advantage of prototyping. [2]
(b) Outline one situation in which the use of a prototype is not the
best approach. [2]
24. [Maximum mark: 15]
An international organization is moving its offices from Africa to Europe. All of its
data will need to be moved to a new system.
(a.i) Define the term data migration. [1]
(a.ii) Outline two issues that could arise concerning data migration. [4]
(b) Outline two aspects of change management that need to be
considered, other than data migration. [4]
The organization will continue to maintain the legacy system.
(c) Explain one problem of maintaining legacy systems. [3]
(d) Explain why parallel running is an expensive changeover
method. [3]
25. [Maximum mark: 2]
State two compatibility issues that may arise when international
businesses merge. [2]
26. [Maximum mark: 2]
Outline one reason why accurate user documentation is necessary for
a system. [2]
27. [Maximum mark: 15]
A business’s computer system needs to be updated.
(a.i) Identify one stakeholder to be considered when planning the
new system. [1]
(a.ii) Outline one consequence of not including all stakeholders in
the design of the new system. [2]
(b) Describe two appropriate techniques to gather the information
needed to find a suitable solution for the updated system. [4]
(c) Outline one reason testing should take place at every stage of
the development process. [2]
The new system is now ready for implementation.
(d) Evaluate two methods the business could use to implement the
new system. Include the benefits and drawbacks of each. [6]
28. [Maximum mark: 2]
Identify two roles that a computer can perform in a network. [2]
29. [Maximum mark: 2]
Describe one method of implementation for a new computer system. [2]
30. [Maximum mark: 1]
Identify one common feature found in the user interface of application
software to improve its usability. [1]
31. [Maximum mark: 4]
(a) Identify two reasons why patches may be necessary for an
operating system. [2]
(b) Identify two methods that can be used to obtain these patches. [2]
32. [Maximum mark: 4]
Compare direct changeover with parallel running as a method of
implementation. [4]
33. [Maximum mark: 15]
A school has a local area network (LAN) connecting its computers and peripheral
devices. The LAN also provides access to the internet.
(a) Describe the role of a router in this network. [3]
Users have been troubled by slow speeds when accessing the internet.
(b) Outline two reasons why there might be a reduction in data
transmission speed at certain times. [4]
(c) Outline two measures that the school could take to safeguard
its data from unlawful access via the internet. [4]
(d) The inventory of office supplies used in the school is stored on
the computer as a single file.
Each of the office supplies in the inventory (such as paper, ink,
toner, printers, pens, staplers, pencils and scissors) has a unique
ID number, name, maximum quantity, minimum quantity and
remaining quantity.
Outline the steps in an algorithm that would output a list of
supplies with the quantity to be ordered. [4]
34. [Maximum mark: 3]
(a) Outline one feature of a word processor that could reduce the
amount of typing required when writing letters. [2]
(b) State the purpose of technical documentation provided with
software. [1]
35. [Maximum mark: 6]
An airline has a server that holds the flight database. Passengers can check in
using a number of self-service client kiosks located in the airport.
(a.i) Define the term client. [1]
(a.ii) Define the term server. [1]
(b) Explain the functions performed by the server in this situation. [4]
36. [Maximum mark: 15]
Website developers need to consider a range of usability factors when designing
a website.
(a) Identify two usability factors that need to be considered in the
design of a website. [2]
(b) Outline one reason why visual displays on a computer screen
can create difficulties for some people. [2]
A company promotes its products online. To make a purchase, customers are
required to register with the company and provide data like their name, date of
birth, age, gender and email address. Once registered, more than one customer is
able to access the server to retrieve and modify their data at the same time.
(c.i) State where the customer data is held during the process of
modifying their data. [1]
(c.ii) Explain how the operating system ensures that each customer’s
data is secure when multiple users are accessing the data at the
same time. [4]
(d) The company is considering sharing its customers’ data with
marketing organizations.
Explain why there could be ethical issues for the company
when sharing its customers’ data. [6]
37. [Maximum mark: 15]
An organization is implementing a new computer system.
(a) Identify two organizational issues related to the
implementation of the new system. [2]
The management considered phased conversion and direct changeover as
methods of implementation.
(b) Evaluate these two methods of implementation. [5]
(c.i) State one type of testing that involves users. [1]
(c.ii) Identify three consequences of inadequate testing. [3]
(d) Discuss the social and ethical issues associated with the
introduction of a new computer system. [4]
38. [Maximum mark: 3]
(a) Identify one cause of data loss. [1]
(b) Describe one way offsite storage can be used to prevent data
loss. [2]
39. [Maximum mark: 1]
Define the term peripheral. [1]
40. [Maximum mark: 2]
Outline one method of collecting information from stakeholders
concerning the requirements for a new system. [2]
41. [Maximum mark: 2]
Outline why a prototype would be used to demonstrate the proposed
system to the client. [2]
42. [Maximum mark: 2]
Identify two ways that user documentation may be provided. [2]
43. [Maximum mark: 15]
A large mail order company is concerned about the security of its stored data.
(a) Describe two possible causes of data loss. [4]
(b) Outline two backup strategies that may be used to limit data
loss. [4]
The company decides to improve its service by introducing a new user interface
for its customers and has developed this interface to the point that it needs to be
tested by users who are outside of the company.
(c) Explain why beta testing is used to gather feedback for the new
user interface. [3]
(d) Outline one consequence of not involving end-users in the
design and testing stages. [2]
(e) Identify two features that could be used to improve the
accessibility of the new user interface. [2]
44. [Maximum mark: 2]
Direct observation is a technique used by a system analyst to determine user
requirements for updating a computer system.
(a) Identify one advantage of direct observation. [1]
(b) Identify one disadvantage of direct observation. [1]
45. [Maximum mark: 6]
An international company is in the process of moving its Head Office from
Europe to Asia.
(a) Identify two possible compatibility issues as a part of data
migration. [2]
(b) Outline how a virtual private network (VPN) will allow
employees who are in Europe to communicate with the Head
Office in Asia. [2]
(c) Outline one social issue associated with this process. [2]
46. [Maximum mark: 4]
(a) Outline what is meant by a database management system. [2]
(b) Outline one advantage of using beta testing prior to the release
of a new product. [2]
© International Baccalaureate Organization, 2024