Jan 2020 exam paper Flashcards
Fulmill is an inner-city suburb. Fulmill Community Group (FCG) has been set up to
encourage local people to become involved in the community.
FCG produces a newsletter providing local news and information. The newsletter is
currently printed to be collected from local shops. FCG is considering replacing the
printed copy with an online version.
(a) (i) Give two drawbacks for members of the community of replacing the printed
copy with an online version. (2 marks)
Not everyone will:
* have the necessary IT literacy skills (1)
* have access to IT facilities / internet (1)
* be able to afford IT equipment (1)
* if site went down no access to online version (1)
* might be more difficult to read if accessing on a mobile
device (1)
(ii) Give two benefits for members of the community of replacing the printed
copy with an online version.
- improves availability for those who are housebound / opens
up availability to a wider/younger audience / more inclusive
(1) - e-newsletter can be viewed wherever/whenever to suit
members of the community (1) - enables readers to share stories/items (with
friends/followers) (1) - digital features can be incorporated (e.g. videos, links, social
media sharing buttons) (1) - quicker updates on events
- accessibility features for visually impaired (zoom feature)
- benefits to the environment (1) - if the response clearly
refers to ‘environmental issues for the community, e.g.
because people don’t cause litter in the community by
throwing away the newsletter / printed copy’.
(b) Kerry is a member of FCG. She has a BITMAP image that she wants to include in
the FCG newsletter.
She is going to send the image as an email attachment. FCG has asked Kerry to
convert the file into JPEG format.
(i) Explain one benefit to FCG of converting the file from BITMAP (.bmp) format
to JPEG (.jpg) format.
- the file size will be reduced (1)
- the image will be compressed (1)
- the e-newsletter will render more quickly (1)
- it will be faster to download/ upload the image/email (1)
- it is less likely that it will be rejected by the FCG’s’ email
provider (1)
(ii) Explain one drawback to FCG of converting the file from BITMAP (.bmp)
format to JPEG (.jpg) format.
- the quality of the JPEG images will not be as good (as
bitmap) (1) and the JPEG may appear pixelated/ distorted
(1)
Two protocols used to control the data transmission of emails are Simple Mail
Transfer Protocol (SMTP) and Internet Message Access Protocol (IMAP).
Explain the roles of SMTP and IMAP in the transmission of emails.
SMTP – manages outgoing emails / used for sending emails (1)
from server to server (1) until it reaches its recipients (mail) server
(1)
IMAP – used for receiving emails/ incoming emails (1) stores
emails on server (1) allowing access from multiple
devices/synchronises email across devices (1)
Kerry has antivirus software installed on her computer.
Kerry keeps the antivirus software up to date.
Describe how keeping the antivirus software up to date reduces the risks of
viruses on the computer.
- to recognise and handle new virus strains (1)
- New viruses are constantly being created / virus threat is
constantly evolving (1) - Content is compared against (an existing) database of virus
definitions (1) - If new virus is not in existing list, it will not be detected (1)
- antivirus software developers constantly monitor the threat
landscape (1) - antivirus software developers will update the definitions
database when any new virus is found (1)
FCG is considering setting up an online community on a social media site.
Discuss how FCG can ensure that the social media site provides a positive user
experience for the online community. (8marks)
The page / group /website must provide a ‘good’ user experience:
* must be easy to use / intuitive – users’ familiarity / knowledge of using
social networking will range widely. Users will not be active/keep using if
they encounter problems/ difficulties
* must be accessible on different platforms
* meet the needs of all users. Accessibility – may be users with special
accessibility requirements, must ensure these are built in
* update the page regularly with current content
* availability of the site (no downtime)
The online community must be set up so that:
* a moderating team oversees that ‘rules of behaviour’ are set and
adhered to
* users are aware of what is/isn’t acceptable to post to avoid any offence /
inappropriate material being posted
* the privacy of users is given high priority. Need to consider who is going
to be given access. Can be ‘closed group’ or extended so that anyone
can access
* users are aware of potential dangers of using social media
* take measures to ensure the security of users’ data. Users must be
confident that the security has been given high priority when setting up
Bassett’s college has a local area network (LAN) that can be accessed by students
on-site and remotely.
(a) Access to the server room is restricted by a keypad entry system. A four-digit code
is issued to authorised users on a weekly basis.
The college is considering changing to an ID card entry system.
Explain two ways in which an ID card entry system makes access to the server
room more secure than a keypad entry system.
- Unauthorised users can see / guess the four-digit number as it is
being entered into the key pad (1) an ID card system does not
provide this visual detail, reducing the risk of unauthorised
access (1) - Authorised entry can only be gained by physically having the
card (1) therefore unauthorised users would need to
steal/copy/borrow the card (1) - ID cards have in built ‘technology’ (1) making them difficult to
copy/requiring specialist equipment to enable copying (1) - Authorised users should/will be aware of the risks/outcomes of
lending cards to others (1) reducing the likelihood of them
passing on their cards (1) - If ID card is lost / stolen the college can deactivate the card (1)
preventing anyone finding the card gaining access (1) - An ID card is unique to each individual (1) can monitor who
accesses the server room / which provides evidence of whose ID
entered the server room (1) - An ID card often includes a photo of the person to whom it has
been issued (1), providing a means of checking that the user of
the card is the person authorised to do so (1
Students gain access to the college network with usernames and passwords.
Describe the process used by the system to authenticate passwords and allow
access to the system.
- Database of usernames and passwords created (1)
- on entry password matched the username (1)
- access allowed if they are the same/match (1)
- re-enters password if no match / access denied (1)
- system allows limited number of attempts (1)
- account locked when unsuccessful attempts exceeds attempts
allowed (1)
Students often use the college network to help them work collaboratively
on projects.
Explain two features of the college network that students can use to work
collaboratively.
- A shared area can be set up in which documents can be saved
/ stored centrally with updated filenames (1) allowing others to
access/edit /comment on the documents (1) - Version control can be maintained (1) to ensure that all users
are working on the same version of the document (1) - Manage groups (1) so only invited members of the group will
have access to the group resources (1) - (As they are working on the same network), users will have
access to the same software (version) (1) no compatibility issues
(1) - Will be able to use real-time communication software (virtual
meetings /chat facilities) (1) without having to be in the same
physical location (1) - co-authoring features provided by applications running on the
network (1) which will enable students to work together in real
time (1) - students can set up a group calendar/project plan for the project
(1) which will help them monitor progress and meet deadlines
(1)
Many students use personal laptops to access the college network. This can have
implications for the security of data stored on the network.
Discuss systems and procedures that the college and students could use to
keep data on the network secure, when students access the network using their
personal laptops.
Procedures to prevent threats to storage data
* Acceptable use of IT policies eg network wifi login
* Up to date antivirus/ antimalware on college network and laptops
* Ban/ encrypt USBs/ portable media
* Firewall on the network
* Health check for laptops
* Regular backups
Procedures for preventing unauthorised access to the personal laptops
* Firewall installed on the laptops in addition to the network to prevent
unauthorised access
* Password protection / multi-factor authentication on the laptop,
prevents unauthorised access
Procedures for preventing unauthorised access to the network via personal
laptop
* Set up appropriate access levels on network for staff/students
* File permissions on network for staff/students
* Techniques for preventing other threats to data stored on the laptops
being transferred to college network e.g. Anti-virus / malware
software installed on laptop
* VPN
Physical methods to protect data stored on personal laptops
* Physical access to laptops. Students must take responsibility for
‘looking after’ the laptops e.g. locked away overnight, never left
anywhere others can access them
* Students should use external storage devices with caution, applying
the same sort of physical access controls to storage devices e.g. USB
drives / external hard drives
Joe runs a small company. The company is moving to a purpose-built office.
Joe has asked an IT expert for advice about suitable IT systems. The IT expert has
proposed several alternative solutions.
One solution is to set up a local area network (LAN) that will provide:
* wired connections for five PCs
* a file server
* a backup server
* two networked printers
* secure internet access
* wireless access for laptops and other mobile devices.
(a) Draw a diagram to show the setup of the LAN.
The diagram should include:
* the devices used by the system
* the connections between the devices
* annotations indicating the devices and the types of connections
The proposed LAN has five PCs with wired connections.
Explain two implications of using a wired rather than a wireless connection.
- Signal is constant/reliable/stable (1) not affected by
interference/walls/other devices (1) - Signal does not deteriorate over distance (as much) (1)
reduce the need for boosters (1) - More secure (1) because it is not as easily intercepted/ no
need to set up encryption/WPA/WEP etc (1) - Restrict movement / no mobility / cables have to be laid (1)
PC must stay where the connection point is (1) - Wired connections are faster (transmission speeds) than
wireless connections (1) allowing large files to download
faster (1) - Health & Safety risks (1) trailing cables / tripping hazards etc
(1)
A network operating system will be installed on the file server. One role of a
network operating system is to manage security.
Describe two other roles of a network operating system.
Networking (1)
Manages communication (protocols) within the network and
externally (1) to govern and control data transmission (1) as well
as managing and maintaining the network using utility
programmes (1)
Memory management (1)
Allocates space/memory to files/programs/clipboard items that
are running/open (1) decides how much each process will get
process will get memory and at what time (1) monitors each
memory locations status i.e. free/allocated (1)
Multi-tasking (1)
Allocates each task a slice of processor time (1) keeps a track of
where the user is in each task (1) and goes from one to the other
without losing information (1)
Device drivers (1)
Driver receives signals from/ communicates with hardware (1)
translates signals so software (OS & applications) can understand
(1) when a signal is received from hardware OS it is held by a
buffer / instruction put into a queue until resources available (1)
) One other proposal is to use cloud storage for backup rather than using an
on-site server.
Discuss the implications for the company of using cloud storage for backup rather
than an on-site server.
Answers will be credited according to the learner’s demonstration of
knowledge and understanding of the material, using the indicative content
and level descriptors below. The indicative content that follows is not
prescriptive. Answers may cover some/all of the indicative content but
should be rewarded for other relevant answers.
Learners discuss the implications for the company of using cloud storage
for backup rather than a local server.
Cloud based backup
* Stored / managed by third party
* Stored offsite
* cost must be weighed up
* pay only for what is used – if need increased storage, can pay for extra.
* environmental issues
* must ensure have security protocols in place which comply with the GDPR
* giving a third party access to secure data introduces extra risk
* there may be security concerns with using online services, as these are
often targeted by hackers because of their ‘high profile’ nature
* backup performance is dependent on the quality and availability of an
internet connection
* can be set up to automatically back up / sync with mobile devices, ensuring
that latest information is available to those that need it. This also improves
security – if any device lost/stolen data will be available on server
* likely to have more robust disaster recovery in place
* access remotely
* Large storage capacity
Onsite server
* company has complete control, in particular control over security of data
* cost to be weighed up – cost of server / may need to employ IT staff to run
the system
* if extra capacity is needed will need to purchase additional server
* no reliance on internet connection
* cannot be accessed remotely / cannot auto sync with mobile devices unless
additional systems put in place e.g. VPN
* offsite storage of backups should be considered
* natural disasters, e.g. fire / flood