Past Paper Monday 23rd May 2011 - Morning Flashcards

1
Q

State what is meant by a storage device? (1)

A

Storage: device used to store data (in binary format

for processing later).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State what is meant by a Input Device? (1)

A

Input: device used to enter data into the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State what is meant by a Output Device? (1)

A

Output: device used to present information/the result

of processing to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which storage technique would be most suitable for handheld device used by students for field work, and why? (2)

A
  • Solid state.
  • Quick access (for instant on)/not sensitive to being
    moved around while used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which storage technique would be most suitable for storage drives on the school’s main file server, and why? (2)

A
  • Magnetic.

- Very Large capacity/relatively cheap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which storage technique would be most suitable for videos of the school production to be given to parents, and why? (2)

A
  • Optical
  • Cheap/Portable/Universally readable by a most
    computers and dedicated video disc players.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The school wants the computer system to be more accessible to students with disabilities. Describe, with examples, input and output devices which are available for students with disabilities. (6)

A

Input devices:
- Puff-suck switch: allows mobility impaired users to
control eg clicking a mouse, by sucking or blowing
through a tube.
- Simplified/concept keyboards eg for Braille, or larger
keys.
- Eye tracking input – Camera is used to follow the
users eye movements and use these to control eg
movement of mouse on screen.
Output device:
- Braille printer – print documents on paper in braille as
raised bumps. Some braillers have plastic bumps
which can be raised or lowered by software, so output
does not have to be on paper.
- Text to speech.
- Screen magnifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A shop uses a database with a DBMS to keep records of its stock. Explain what is meant by a DBMS? (3)

A
  • A Database Management System/Used to manage the database.
  • May use SQL/allows database to be queried.
  • Provides facilities for creating tables/inserting data/viewing data/reporting.
  • Allows data structure to be independent of the program.
  • Allows relationships to be created between tables/Maintains integrity.
  • Provides security features/levels of access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe a ‘Form’ and give one example of how it would be used in the shop’s database. (3)

A

Form: (2)
- An input screen.
- Allowing chosen data items to be displayed and edited.
- Uses texboxes/drop down lists/checkboxes etc…
- When edited, the changes are updated in the database
Example: (1)
- Suitable example from shop eg enter new products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe a ‘Report’ and give one example of how it would be used in the shop’s database. (3)

A

Report: (2)
- An output of the data in a database.
- A snapshot of the data at a given time/when printed.
- Of specified fields/Laid out in a specified format.
- Aggregates may be calculated and displayed.
Example: (1)
- Suitable example from shop eg weekly sales.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe HTML? (2)

A
  • HyperText Mark-up Language.
  • Text file containing the text to be displayed…
  • … uses tags which indicate how to display it.
  • … location of pictures/other elements to include.
  • … and hyperlinks to other locations/URLS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the importance of HTML in the creation of web pages? (2)

A
  • Web browser used to interpret the file and display the data correctly.
  • Because it is an open/accepted standard…
  • … data will display correctly on all browsers.
  • … which conform to the standard.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What file format would be used to store a high resolution image as a desktop background? (1)

A

JPG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What file format would be used to store a sheet of music which is ready to be printed in the correct format. (1)

A

PDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What file format would be used to store a short video extract. (1)

A

MPEG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What file format would be used to store a compressed collection of 200 plain text files containing lyrics. (1)

A

ZIP

17
Q

What file format would be used to store an audio recording. (1)

A

MP3

18
Q

Explain the importance of compressing files when transmitting them via the internet? (2)

A
  • It reduces the size of the file which needs to be
    transmitted.
  • Shortens download time.
  • Reduces Internet traffic (and hence probability of lost
    packets).
  • Allows multimedia files to be streamed.
19
Q

Describe the difference between lossy and lossless compression and give an example of where each would be used. (4)

A

Lossy:
- In lossy compression, when the data is uncompressed it is not exactly the same as the original.
- But the difference is so small that it cannot normally
be noticed.
Example:
- Eg music files(mp3), large resolution images for displaying on small screens.
Lossless:
- In lossless compression, when the data is uncompressed it is restored completely to the original file.
Example:
- Eg compressed text files.

20
Q

Describe the Antivirus Utility? (2)

A

Antivirus:
- Scans the computer periodically.
- To check if any software has been installed which contains code that may harm the computer.
- Removes/quarantines these programs / notifies the user.
- Prevents these programs from being installed.
- Protects the computer by preventing important files
(eg the boot sector or operating system) from being
changed.

21
Q

Describe the Disk Defragmenter? (2)

A

Disk defragmenter:

  • Moves (parts of) of files around so that all parts of a file are stored together (allowing files to be accessed more quickly).
  • Free space is collected together (allowing large files to be saved easily).
22
Q

Explain why hexadecimal numbers are often used to represent binary numbers. (2)

A
  • Hex numbers are shorter/more memorable than equivalent binary numbers..
  • … and can easily be converted to and from binary…
  • … as each hex digit corresponds to 4 binary digits (accept diagram).
23
Q

A program is used to calculate the circumference of a bicycle wheel using the wheel diameter.

BEGIN
  CONSTANT Pi = 3.14
  INPUT WheelSize
  Circumference = Pi * WheelSize
  OUTPUT Circumference
END

The code uses one constant and two variable, state the names of the constant and the variables. (2)

A
  • Constant: Pi.

- Variables: WheelSize, Circumference.

24
Q

Explain one difference between a constant and a variable? (2)

A
  • The value of a constant is set when the constant is declared.
  • The value of a variable is set while the program is running.
25
Q
BEGIN
  CONSTANT Pi = 3.14
  INPUT WheelSize
  Circumference = Pi * WheelSize
  OUTPUT Circumference
END

The data type of the WheelSize is integer and the data type of Circumference is real number. Explain the difference between an integer and a real number. (2)

A

A number has no physical meaning and is in fact just a mathematical concept. Computers need to be able to represent numbers however. This is done using Integers. A Integer represents a whole number with no decimal points.

26
Q

A large company with 200 employs uses a local area network (LAN) which includes all computers in its head office. Describe the security measures and network polices which can be used to safeguard the security and privacy of the company’s data on the network. (6)

A
  • Physical security measures – computers/servers in locked rooms, lock down cables for laptops.
  • Firewalls – allow only authorized access to the network / only authorised users/programs to share data out of the network.
  • User groups/access levels – different users are given rights to different data according their responsibility/need to protect privacy.
  • Passwords enforced. Should be strong and changed regularly. Ensures privacy and protects files being accessed by malicious hackers.
  • Encryption of data on network.
  • WiFi access security if they use WiFi.
  • Get employees to sign an acceptable use policy as part of their contract to ensure they do not put the data at risk of corruption/abide by data protection legislation/do not give the data to third parties etc.
27
Q

A dog that is 5 years old is equivalent to a 42 year old human. Sebastian is writing a program which converts the age of a dog to the equivalent age for a human.
- The program uses the following method:
- The user inputs age of the dog in years.
- If the age is 2 or less, the human equivalent is 12 times the age.
- If the age is more than 2, the human equivalent is 24 for the first 2 years, plus 6 for every additional year.
= Write an algorithm to calculate and output the human equivalent of the age of a dog using the method described. (5)

A
Example:
 BEGIN
   Input RealAge
   IF RealAge 2
- Works out extra years (real age – 2) …
- … multiply by 6
- … adds 24 (for the first 2 years).