Past paper Q & A's (June 2016) Flashcards

1
Q

If a media station is portable - what is the one thing that affects its portability

A

Its’ size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name one device that is needed to connect a media station to a WiFi Network

A
Any one from:
• Router
• WiFi Adapter 
Accept ‘Dongle’ for WiFi
Adapter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name one advantage to users of streaming videos

A

Video can be viewed sooner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain why the quality of video being streamed is reduced when more people connect to the network and browse the web.

A

Limited bandwidth is
available (1) meaning there
is more demand for WiFi (1)

Data has to be shared (1)
meaning there is reduced
data available to represent
video (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List two ways of stopping other people from connecting to your network.

A
Any two from:
• Password / passcode
• Hide SSID/Name
• MAC address filtering / block devices
• Disable WiFi
• Set up timed access
Allow: Only have Ethernet connections / Do not
provide network points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List two devices that can be used with a media station

A
Any two from:
• Television / TV
• Projector
• Monitor
• Earphones / Headphones
• Speakers
• Keyboard
• Remote (control) / Controller
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is meant by the term ‘Copyright’

A

(A legal) protection (for the creator/owner) of

work / data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give one method of blocking inappropriate videos on a media station

A
Any one from:
• Enable filtering / safe search settings
• Only allow certain sites
• Black list / white list
• Parental control/browser settings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List three personal digital devices that can receive email

A
Any three from:
• Smartphone
• Laptop / netbook
• Tablet
• Desktop / PC
• Smartwatch
• Smartglasses
• Portable media player
• (Smart) television
• Games console
• Single Board Computer (SBC)
• PDA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe POP3

A

Post Office Protocol 3 (POP3) deletes emails from the server after delivery to device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the protocol that keeps a copy of each email on the server.

A
Any one from:
IMAP
IMAP4
Internet Mail Access
Protocol Interim Mail
Access Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
What is best  to use when collaborating with others  to create a web page?
A. Blog
B. Forum
C. RSS
or
D. Wiki
A

D. WIKI
(A wiki is a website that allows users to collaborate (work together) to create the content. The pages of a wiki can be edited by everyone (or those who have the password) so that different people can add to the page, edit things, fix errors, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a business environment, why might you also need to provide leaflets with the same information as your website to a customer/client?

A
To make sure people get
the information (1)
if they
don’t have access to the
page/internet (1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which one of these reduces the security risks of data when making online payments through a a web-browser:
A. Browser
B. Digital Certificate
C. RSS
D. SMTP
A

B. Digital Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

State one benefit of a business using a third-party payment system

A
Any one from:
• Cheaper (than a merchant account)/
   reduced costs
• Increases customer trust
• No need to design their own payment
   system
• Reduces work for the business / Third
   Party Payment Processor checks the
    payment details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List three card details required when paying online using a bank card

A
Any three from:
• CCV
• (Cardholder’s) name
• Card number
• Expiry date
• Start date
• Credit/Debit
• Card Type (VISA/MasterCard/AMEX etc.)
Accept:
• Account number
• Verified by Visa password
17
Q

Give one known security risk of paying using NFC (Near Field Communication)

A

No PIN is required to make a payment

18
Q

Give one feature of NFC (Near Field Communication) payment systems that reduces the security risk to data

A

Any one from:
• Needs to be close to reader
• Limited to small amounts/transactions

19
Q

Explain one advantage of photoblogging rather than email to share photos

A

An explanation such as:
1. Users can comment/like (the photos) (1),
raising their profile / increasing interest
(1)
2. Less data is used (sharing them) (1)
reducing costs (1)
3. Incorrect email addresses cannot be used
(1) due to typos made /
people changing email address (1)
4. Photoblogging allows one central location
to be accessed (1) so no need to send
them to each recipient (1)
5. Can set to auto upload the photographs
(1) saving time (1)
6. Some people do not use email (1) so
would not see the photos (1)
7. Quicker to view the photos (1) because
the thumbnails are displayed first (1)
8. Some email services restrict the size of
attachments (1) so may have to send in
batches / may be bounced back (1)

20
Q

How can photoblogging reduce security of people in the photographs ?

A
A description to include:
• Sharing/Tagging/Commenting (1) could
mean others/strangers see images of
them. (1)
OR
• GPS (tagging) / identifiable features in
the photo (1) could mean
others/strangers know their location. (1)
21
Q

Before uploading photographs of children, give two actions you can take to reduce the risk to the children’s privacy.

A
Any two from:
• Remove the GPS ‘tag’ / metadata /
location (data) (from the images)
• Ask (parents’) permission
• Blur children’s faces / location features
• Choose photos where children/features
are unrecognisable/absent
• Setting up privacy/accounts/passwords
for the blog.
Allow:
• Don’t put children’s names on the photos.
22
Q
What can be used to collect transactional data?
A. Search Engine
B. Cookies
C. Comments
or
D. Debit card
A

B. Cookies

23
Q

When transactional data is collected by a company from their users - Give two examples of transactional data that can be collected.

A
Any two from:
• Browser
• Operating System
• IP Address
• Location
• If/when visited page previously
• Pages visited previously
• Links followed (next page visited)
24
Q

Give one way a business can use transactional data they collect from their users

A
Any one from:
• Analyse which pages/photographs that
are clicked/visited are popular/not.
• Targeted marketing (e.g. Launching an
app to send to smartphone users)
• Personalisation (e.g. Mobile version of
page, accessibility settings, including user
details in welcome message)
25
Q

State three implications of a lack of access to the internet

A

Any three positive and/or negative implications related
to:
• Shopping (e.g. may miss out on ‘online only’
deals / better ‘personal’/face-to-face experience
when shopping in the high street)
• Health (e.g. can’t see health information online /
less time spent in front of a screen reduces
health risks such as eye strain)
• Money management (e.g. more convenient to
bank online / not at risk from hackers)
• Travel / Leisure (e.g. no access to online booking
systems so may miss out on tickets)
• Work (e.g. can’t use professional networks)
• Education (e.g. reduced access to multimedia
learning materials / less distraction from studies)
• Communication (e.g. likely to socialise more in
person, can’t socialise online using email/social
media)
• Entertainment (e.g. can’t catch up on TV shows,
limits choice/less variety of programmes, can’t
download/stream films).
• News and Information (e.g. can’t access latest stories)

26
Q
Which of these is a type of mobile phone connectivity?
A. SSID
B. MAC
C. GSM
D. WEP
A

C - GSM

Global System for Mobile Communications

27
Q

Describe how you can use a smartphone to speak to someone if you cannot access the mobile phone network.

A

A description to include:
You could use WiFi (1) with VoIP / Video call
(1)
Use WiFi (1) calls/calling/VoLTE (1)

28
Q

What is meant by the term World Wide Web

A

(Hyper)linked/Connected/A network of (1)

documents/pages/content/(web)sites (1)

29
Q

What is meant by the term ‘internet’

A

Award 2 marks for:
‘a network of networks’
(connected networks)

30
Q

What is a WPA key used for?

A

WiFi Protected Access (WPA) key is used for:

Encryption

31
Q

Give one feature of a smartphone that can be upgraded to enhance the user experience

A
Any one from:
• Operating System
• Apps
• Storage (e.g. SD card)
• Energy efficiency/consumption
• Security features
• Camera
• Audio output/speakers
• Screen
32
Q

Describe one way that smartphones can be used with wearable computers to monitor the health and fitness of individuals

A
Devices can be connected
(1) using wireless
technology (1), to record
movement/biometrics (1)
using sensors (e.g.
GPS/accelerometers/ heart
rate monitor) (1)
‘movement’ = ‘steps’ etc.
‘biometrics’ = ‘heart rate’
33
Q

Give 3 positive and 3 negative impacts on the environment of the use of digital devices

A

+Positives
Paper versus e-paper for books, emails vs letters (fuel costs for delivery and use of paper), downloads versus
physical products, reduction of the need to travel (to meetings / to shops) through the use of video conferencing /
VoIP, online workspaces. Recycling of old devices for use in less economically developed areas. ‘Smart home’
devices, Digital devices used to monitor pollution levels / increase communication about ‘green’ issues (e.g. wildlife
‘counting’ apps, social networking used to spread agenda of environmental ‘activist’ groups, etc)

Negatives

Materials / consuming resources for construction of devices and peripherals, (e-waste) toxins / landfill, power
requirements / battery life / efficiency, servers’ cooling systems, renewable sources, destroying habitat for (wired)

34
Q

Give two features of a social network that could be used to publicise a video

A
Any two from:
• Liking
• Sharing
• Tagging
• Commenting
35
Q
Which word describes a video that's been watched by lots of people over a short period of time?
A. Digital
B. Tagged
C. Viral
D. Open sourced
A

C - Viral

36
Q

Name two ways of responding to inappropriate comments from a social network user

A
Any two from:
• Report
• Block
• Delete/Remove
• Ignore
37
Q

Describe a process that can be used to reset a (forgotten) password

A
Example response:
Use forgot password link(1) 
 to receive an email (1)
with a link to a temporary
password / sms with a
code (1)
 that needs to be
changed/entered (1)
38
Q

Why should staff not check social networking profiles at work?

A
Explanation to include two from:
• Being distracted (1) impacts on work
health and safety / learning (1)
• It is unprofessional (1) leading to
negative impact on business / poor
reputation of the business (1)
• Possible impact on staff health (1) for
which the employer is responsible (1)
• The content may be visible (1) to
children/parents/colleagues (1)
39
Q

Discus the impact of widespread use on the availability, accuracy and control of online information about an individual

A

Availability
An organisation can learn about their candidates and employees to protect the organisation’s reputation.
The linked, searchable nature of online information leads to information being readily accessible.
‘Digital footprint’ – information is permanently recorded.
Individuals can use social and specialist business networks to promote themselves or their views.
Accuracy
Others could post misleading information about an individual without them knowing.
People’s opinions/habits change, but an old opinion / action might still exist online.
Control
Possibility for others to share (with and without permission) leading to unintended audiences.
Makes us more considerate of what we post online.
Personal information should not be available to others – impacts on individuals right to privacy.
Difficult to get archived/legacy data/information removed.
Data Protection Act means individuals have a level of control over what data is held about them and safeguards for
organisations.
Impact (+ve / -ve) on:
Employment opportunities, reputation, relationships