jan 2021 exam paper Flashcards
Jacky is a student living in shared accommodation with other students.
The student accommodation has access to a shared network with internet access.
The students use both wired and wireless connections to the network.
(a) Identify two benefits of using a wired connection rather than a wireless
connection to a shared network.
Signals are stable / reliable (1)
Signals do not diminish over distance (1)
Signals are not subject to interference (from objects such as walls
/ other wireless devices) (1)
(Usually) have greater bandwidth than wireless connections (1)
More secure than wireless connections / Less risk of hackers (1)
Faster transmission speeds (uploading / downloading speeds) (1)
Identify two benefits of using a wireless connection rather than a wired
connection to a shared network.
Easier to connect/ give access to guest users/ larger
number of users/devices can connect (1)
Portability/ signal is available anywhere (within range of
router) (1)
No risks caused by trailing wires (1)
No additional wires/ cabling (1)
Jacky travels to college by train and uses her laptop to do internet research
during her journey.
The train company provides a free internet connection, however Jacky prefers to
set up a personal area network (PAN) between her laptop and mobile phone.
(i) Explain one advantage of using a PAN to connect to the internet.
A faster connection speed via PAN connection (1) because fewer
users sharing the bandwidth/connection (1)
Improved security (1) because it uses secure cellular data
connection / train connection will be public/prone to
vulnerabilities network (1)
Will be able to set system to download what she needs i.e. pay up
front for cellular data (1) because she is unlikely to be able to
download large files across a public / shared network (1)
Automatic synchronise data (downloads / uploads) (1) so that this
can be done between many devices at the same time (1)
Portability (1) so that she can establish a connection wherever /
whenever (1)
No extra cables needed (1) because she can connect through the
use of Bluetooth (1)
Explain one disadvantage of using a PAN to connect to the internet.
Cost implications of using cellular data (1) because she may
run out of data & have to ‘top up’ which can be expensive (1)
Uses cellular data allowance (1) which will use up data
available for other activities (1)
Limited signal range (1) because she is confined to maximum
10 meters / if devices are further away from each other (1)
Data can drop out/ Unstable connection (1) because there can
be interference with radio signals/ going through blackspots
(1)
Slow data transfer (1) which can cause problems when
downloading larger files (1)
Battery used up quickly (on mobile devices) (1) so Jacky
would not be able to connect to the Internet (1)
Jacky’s friend has a tablet computer. Jacky would like to give her friend access to
the PAN.
(iii) Describe the steps that they need to follow to allow the friend to gain access.
Bluetooth
Turn on Bluetooth (1)
Jacky would need to allow new connections (1)
The friend needs to search for/find the device/ network (1)
Pair devices/ enter code (1)
Jacky would need to accept the pairing (1)
Wi-Fi
Jacky needs to turn on wireless (1)
Allow others to join/ share connection (1)
The friend needs to search for/find the device/ network (1)
Jacky needs to tell the friend the password (1)
The friend needs to enter the password (1)
The friend needs to ‘join’ the network (1)
The laptop has many utility programs installed.
Explain the purpose of the two given utility programs.
Disk cleanup
Software firewall
Disk clean-up – designed to free up disk space/ increase
performance (1) by removing unnecessary files/ programs
(temporary files, cached webpages, items in Recycle bin) (1)
Software firewall - ensure security (1) by stopping/ monitoring
incoming and outgoing traffic (1)
) Jacky uses proprietary software for her word processing and spreadsheet
based college assignments. The software is out of date and Jacky is considering
replacing it with open source software.
Discuss the implications of installing open source rather than proprietary
application software.
User experience
* similarities/differences between existing software and new software. the
interfaces and functions of the software likely to be different and could
cause problems for Jacky.
* differences are likely to be greater with open source rather than upgrading
to same type of proprietary software.
* there may not be as many features included with open source, which may
make it difficult to carry out specific tasks / tasks she currently does in a
particular way
* training on open-source software may be difficult to find
* can report bugs so the community can release patches as soon as
possible.
Compatibility
* will the open source software be compatible with existing operating
systems/hardware? Likely that just upgrading proprietary software wouldn’t
cause (as many) issues.
* may have to find ways of making the new software work on/with current
systems, which can be time-consuming, or require additional support.
* compatibility of document formats – sharing files with others may be
difficult, if they are not saved using portable formats. Documents sent by
others may be saved in proprietary formats, making it difficult to access
work, which may affect files generated by the college.
Cost
* purchase cost of open source is generally free or very cheap
* community support for open source is usually cost free whereas proprietary
support can be expensive
Support
* open source software is often created and maintained by a community
rather than by a company, support and development may be sporadic or
stop/change without providing support for existing versions
* proprietary software usually comes with a variety of training
facilities/support
Customisation
* open source software provides access to the source code, which provides
scope for the user to set it up to fully meets needs.
* vulnerable to malicious users who can view and exploit vulnerabilities if
software not updated regularly
Miguel owns a company that produces software for primary school children.
He works in an office with other programmers to do this.
They use PCs in the office and Miguel uses a laptop when visiting schools to
demonstrate the software to the children.
Each device has:
* a graphical user interface (GUI)
* an optional command line interface (CLI)
* a single-user multi-tasking operating system (OS)
* a hard disk drive (HDD).
(a) Explain the purpose of a user interface.
Provides a method for a user to communicate/interact/navigate
with the computer system / hardware & software (1)
in order to carry out tasks/ control the computer/ device
(1)
using icons/menus / entering commands (1)
Provides a user-friendly method (1) for the user to interact with
the system (1)
Explain two benefits of using a GUI rather than a CLI.
Commands do not have to be typed (1) which can lead to
errors/is time consuming (1)
Explain two reasons why a single-user multi-tasking OS would be installed on
each office PC.
Employees would not need extra training (1) because they are
likely to be familiar with this OS (1)
Improve productivity/efficiency (1) because the user runs
multiple applications /perform multiple tasks simultaneously
(1)
Only one user would need to access the PC at any one time (1)
as employees would have their work stored locally on their HDD
(1)
No additional costs (1) because it is the standard OS that comes
with each PC / laptop (1)
Employees would not need extra training (1) because they are
likely to be familiar with this OS (1)
Improve productivity/efficiency (1) because the user runs
multiple applications /perform multiple tasks simultaneously
(1)
Only one user would need to access the PC at any one time (1)
as employees would have their work stored locally on their HDD
(1)
No additional costs (1) because it is the standard OS that comes
with each PC / laptop (1)
Computer theft (1) because someone could break into the office
and walk away with the PC (1)
Malicious damage (1) by someone deleting or editing malicious
data on purpose (1)
introducing viruses/malware (1) via an external device (1)
Accidental damage (1) employee could spill drink and ruin the
hard disk drive / power surge leading to computer crashing /
overwriting/ deleting files (1)
Hardware/ system failure/ damage (1) HDD could encounter
problems and employees may not be able to access data (1)
Natural disaster (1) caused by fire/ floods/ etc
Miguel is considering moving to a cloud storage system. One benefit of this
would be to reduce the threats when storing data to their hard disk drives.
Discuss how moving to a cloud storage system would impact Miguel and the
other programmers.
Positive impacts
The data would be held in a central storage area, accessible by all of the
computers/users.
Programmers/Miguel:
* may be able to access/share each other’s files/designs to offer
advice and help to each other
* access their own files from different devices if needed.
* synchronise across all devices being used when updates are made
* beneficial to Miguel as he visits clients/uses a laptop & PC
* may be able to introduce flexibility of working from
home/remotely for all programmers
* can access files in the event of hard drive failure
The business would benefit as:
* productivity would increase when file sharing
* may be able to allow some working from home leading to a
reduction in office overheads
* costs because there would be no need to purchase expensive
hardware, software licences and updates, IT technicians to
maintain the system.
* scalable storage to suit needs
Negative impacts
Increased reliance on internet
Increased security risks:
* transmission of data via the internet makes it more vulnerable to
attack hacking/virus etc
* introduction of a ‘third party’ may potentially increase risks
May need to train staff in:
*new working practices e.g. saving / sharing data
*new threats to data/security and how to avoid/overcome them
Cost:
* payment for cloud storage
* user support initial & ongoing
* training
Glenda is a member of the sales staff. She works remotely from home using
a laptop provided by SchFurn.
(i) Every week the sales staff and the office manager hold a meeting using voice
over internet protocol (VoIP).
Codecs are used as part of VoIP.
Describe the use of codecs when using VoIP.
- Uses algorithms (1)
- The codec digitises an analogue signal/ encodes (1)
- This is compressed (1)
- Splits into internet packets (1)
- These are transmitted/transferred (1)
- When received they are uncompressed (1)
- decodes (1)
- User and receiver need to have the same codec (1)
- Determines quality (1)
- Encrypting for security (1)
A VPN supports the ability of sales staff, such as Glenda, to work remotely.
Discuss the implications to SchFurn of using a VPN to allow sales staff to
work remotely
The company should have policies set in place to guide staff and also
monitor adherence to the policies for remote working and access to
systems and data.
Remote workers must adhere to the company’s IT policy, e.g. limit
activities to ones that can be carried out remotely, working in public
places.
VPNs need to be kept up to date to ensure data is kept secure and private
using encryption.
Advantages:
* a VPN is protected by encryption and security to help keep data private
and secure, even when using a non-secure/open network which will
prevent unauthorised access to his laptop
* a VPN allows secure remote online connection anywhere / anytime,
giving greater flexibility
* can use public/shared networks securely, which could save money
compared to paying for high-speed mobile data connections
* a VPN ensures security of data by restricting access to only authorised
users, by giving individual usernames and passwords
Disadvantages:
* There could be a decrease in internet connection because it is rerouted
and encrypted via a VPN server
* The remote worker might need to install client software on their
device(s) - training required
* Some VPN providers are not legitimate and might sell data / not
trustworthy
* Connections could drop out
* Cost implications
* Training implications
SchFurn holds data about employees and client sales. Legislation is in place to
ensure this data is protected.
Discuss the relevant legislation that protects this data, including the company
and employee responsibilities.
Computer Misuse Act 1990
The company must make sure procedures are in place to:
* stop unauthorised access to their computer system/designs/data
* stop (hackers) intent on committing a further crime by
stealing/modifying/deleting data or introducing malware/spyware
* failure to comply can lead to fines/penalties depending on the offence
Employees must follow company policies to make sure
* they adhere to strict rules on the use of company emails
* follow guidelines on the use of company/personal social media
Data Protection Act 1998 / Data Protection Act 2018 (incorporating the
GDPR)
Company responsibilities should be established following UK Information
Commissioner’s Office (ICO) guidelines including:
* nominating a data controller for the company who will determine what data
to collect and how it is processed
* applying for permission with the Information Commissioner to store/use
personal data
* declaring to the Information Commissioner the information that will be stored
and how it will be used (personal or sensitive)
* abiding to the eight principles of data protection
* compliance with the Data Protection Act 1988 (losing employee or client data
could result in a breach of the act, leaving the company vulnerable to legal
claims or a fine imposed by the ICO)
* establishing employee responsibilities
* establishing which type of corporate data can be processed on portable
devices
* how to encrypt and secure access to the corporate data
* how the corporate data should be stored on portable devices
* how and when the corporate data should be deleted from the portable
devices
* how the data should be transferred from the portable device to the company
servers
Employee responsibilities:
* ensure that work data will not be merged with personal data
* ensure that non-employees, such as family members who use the portable
device, do not access work data
* only process corporate personal data for corporate purposes
* take adequate care to minimise the loss/theft of the devices