Term
[image]
The data logger contains input, output and storage components
Identify one component that is used for input.
Identify one component that is used for output.
Identify one component that is used for storage.
|
|
Definition
One from:
Input
heart rate sensor (1)
buttons (1)
on/off switch (1)
Output:
One from:
LCD/screen (1)
Speaker (1)
Storage:
flash memory card (1)
built-in data logger (1) |
|
|
Term
The computerised data logger contains an analogue to digital converter.
Explain why this is needed.
[image] |
|
Definition
Two from:
- sensors produce/send analogue (data) (1)
- computers only use/read digital (data) (1)
OR One mark only for response similar to:
(data) needs to be changed/converted so computer can use/see it. (1) |
|
|
Term
Describe one difference between computer monitoring and computer control.
[image] |
|
Definition
One difference from:
- use of feedback in control (1) monitoring only records data (1)
- response to data in control eg switch on/off/adjust actuator (1) but no response in monitoring (1)
- in monitoring the computer takes no action (1) control computer takes action (1).
|
|
|
Term
Discuss the impact of the increased use of ICT on the way people spend their leisure time. |
|
Definition
impacts could be:
use of microprocessor controlled devices for household chores freeing time for other activities
use of microprocessor controlled devices for entertainment eg TV, radio, games consoles, set top boxes
use of computers for research/leisure/games/making contact with others
health related use of ICT in eg monitoring, measuring health parameters/training/keep fit
security/personal alarms
mobile phones/PDA/smart phone usage for eg contacts/games/etc as ICT “relaxes” the boundary between solitary and social activities
ability of ICT to facilitate spontaneous or short-notice meetings may increase time spent in social rather than solitary activities.
increase in range of activities eg TV, games, negative impacts eg:
less exercise due to increased use of eg PCs, games consoles, internet
alternative activities eg sports, walking, etc are “crowded out” and no longer feature in leisure time use i.e. ICT is substituted for these activities
quality of an experience via the use of an ICT alternative may be inferior than the real thing |
|
|
Term
Describe two differences between email and instant messaging. |
|
Definition
|
|
Term
Give one benefit and one drawback of using text messages to communicate with friends. |
|
Definition
|
|
Term
Sarbjit plans to use video conferencing to keep in contact with his business colleagues.
Identify three devices Sarbjit must have in his computer system so he can set up a video
conference. Give a reason for having each one. |
|
Definition
Three devices from:
1. video/web camera (1) for sending/capturing image of himself (1) 2. microphone (1) to capture sound/voice (1) 3. monitor (1) to display image of other participant(s) (1) 4. speakers/headphones (1) to hear other participant(s) (1) 5. network card (NIC) (1) to connect to a network (1) 6. router (1) to connect to internet (1) |
|
|
Term
Complete the table below by stating the most suitable type of software application for each of the
tasks shown.
[image] |
|
Definition
|
|
Term
A user name and password are required to access the computers on a school network.
(a) What is the purpose of the user name?
(b) What is the purpose of the password? |
|
Definition
User name
identifies user (to system) (1)
sets up access rights/profile (1)
allows access to the user files/folders (1)
Password
security (1)
ensures that only the user can access the system (1) |
|
|
Term
Explain, using examples, what is meant by the term malicious software. |
|
Definition
Examples from:
virus, spyware/keyloggers, malware, adware, Trojan, worm
Explaination from:
enters a computer without the consent of user/owner
capturing data without the knowledge/consent of the user
intended to do harm to host computer/files (1) |
|
|
Term
Describe two ways a school can try to prevent malicious software affecting its computers |
|
Definition
Two descriptions from:
. ban the use of USB flash memory drives/floppy disks/other external devices (1) to stop malware being brought in (1)
. install/use anti-virus/other preventive software (1) to scan files as they arrive (1) to scan files on the system (1)
. restrict use of external email (1) to avoid malware in attachments (1)
. restrict web sites access (1) to avoid sites which carry malware (1)
. user policies (1) instruct user not to download files unless from known/safe source (1)
. firewall (1) to control data flow in/out of a network (1) |
|
|
Term
Many companies store the personal details of their customers.
How does the Data Protection Act attempt to protect the rights of the customers. |
|
Definition
The DPA states that anyone collecting personal information must:
1. fairly and lawfully process it
2. process it only for limited, specifically stated purposes
3. use the information in a way that is adequate, relevant and not excessive
4. use the information accurately
5. keep the information on file no longer than absolutely necessary
6. process the information in accordance with your legal rights
7. keep the information secure
8. never transfer the information outside the UK without adequate protection |
|
|
Term
Students in a school use netbooks for their work.Tick one box in each row to show whether each device is used for storage, input or output. The first one has been done for you
[image] |
|
Definition
|
|
Term
Explain one advantage of using a netbook rather than a desktop computer for school work. |
|
Definition
One explanation of advantages from:
1. portable/small/lightweight - can be carried and used anywhere
2. use batteries/do not need mains electricity supply - can be used away from buildings/mains electricity /while moving/travelling
3. have wireless networking/WiFi - can connect to the internet while away from main base/home/travelling. |
|
|
Term
Give two disadvantages of using a netbook, rather than a desktop computer, for school
work. |
|
Definition
Two disadvantages from:
1. can be easily lost/misplaced/dropped (resulting in loss of schoolwork)
2. difficult to see/read (schoolwork)
3. difficult to type/use (schoolwork)
4. no optical drive fitted internally/ need an external device /cannot use CDs/DVDs (to save backup work)
5. battery life may be short/limited/need frequent recharges/may shut down when needed (may lose work) |
|
|
Term
A USB flash memory drive may be used for storing a backup of a file.
What is a backup? |
|
Definition
|
|
Term
Explain one reason why a USB flash memory drive is suitable for storing backups. |
|
Definition
One explanation of an advantage from:
1. portable - can be stored away from netbook/computer
2. small - easily stored
3. large enough memory - to store large/many files
4. ease of use - no special software needed/can simply plug in the device. |
|
|
Term
Vaneesa is a school student. She often uses chat rooms from home to keep in contact with other
students.
Give four precautions that Vaneesa should take when using chat rooms. |
|
Definition
Four from:
1. never give out personal details eg school information, telephone numbers, favourite places to visit
2. be wary of discussing/revealing the address/(general) area in which you live
3. never use a (revealing) photograph of yourself
4. check who you are in contact with/only talk to people you know
5. never arrange to meet a contact that you do not already know
6. never allow yourself to be persuaded to indulge in any activity that worries you
7. report any suspicious activity to parents / adults / responsible people. |
|
|
Term
Vaneesa uses her netbook for accessing chat rooms, often for long periods of time.
State two health problems that Vaneesa might develop as a result of this, and how she could
avoid them. |
|
Definition
Two from:
RSI - appropriate precaution e.g. regular breaks, correct positioning of hardware items/chairs
eye problems - appropriate precaution e.g. regular breaks, correct positioning of hardware items/chairs, appropriate screen resolution/brightness, use external monitor
back and neck problems - appropriate precaution e.g. regular breaks, correct seating position/placing of netbook
wrist problems - appropriate precaution e.g. regular breaks, correct positioning of netbook for typing/use of external keyboard/mouse and rests, use external keyboard. |
|
|
Term
Steve has been asked to create a presentation to show how to use the different settings on a
digital camera.
Describe how three different multimedia features could be used to enhance this presentation. |
|
Definition
Three descriptions from:
1. (use of) sound - for background music,sound effects
2. animation sequences - to demonstrate actions, to move text/images
3. video/movie sequences/images - to show use of device
4. voice output - for a narrative, output recorded interviews with users
5. (hyper)links - to link with websites about mobile phones, move between sections/parts/slides of the presentation
6. slide transitions - to change slides automatically,
make transitions more appealing to audience. |
|
|
Term
Airport staff use ICT to security check passengers and their baggage before they are allowed
on a flight.
What ways can ICT be used in airport security. |
|
Definition
ICT use:
1. use of RFID in baggage for tracking bags
2. CCTV cameras recording people in the airport
3. facial recognition
4. software
5. machine readable ID/passports cross check with databases of people/wanted persons
6. use of biometrics
7. use of body scanners
8. remote check in/pre boarding passes printed at home, with checks on the person.
|
|
|
Term
Airport staff use ICT to security check passengers and their baggage before they are allowed
on a flight.
What is the impact on passengers of the use of ICT in security. |
|
Definition
Impacts include:
1. ability of reserve seats/check availability
2. effect on privacy/rights of the individual
3. delays at check in by security checks/check in may be faster
4. slow throughput at security
5. safety impacts. |
|
|
Term
A computer’s operating system uses a Graphical User Interface (GUI).
State three features of a GUI, giving one benefit of each. |
|
Definition
Three from:
1. windows/dialog boxes e.g. easy to use/navigate
2. icons e.g. no language skills needed to understand
3. menus e.g. simple to navigate for options
4. pointer/mouse e.g. to select/choose items
5. help feature e.g. no need for knowledge/manual
6. drag & drop e.g. can move objects around easily
7. toolbars e.g. easy to find/grouping of tools/options
8. screen resembles desktop e.g. familiar working environment.
|
|
|
Term
Describe how data encryption is used to keep information safe from unauthorised users. |
|
Definition
Two from:
1. data is scrambled
2. key used to encrypt/decrypt
3. data cannot be understood unless decrypted/have key. |
|
|
Term
Bert and Theresa have a number of appliances in their home that contain embedded systems.
What are the features of an embedded system. |
|
Definition
Features of an embedded system:
1. real time operation
2. dedicated to specific tasks/functions
3. inbuilt sub-functions e.g. different spin speed/temperature combinations
4. embedded program cannot be changed by user
5. no need for user to change embedded program
6. require little memory to run
7. require no keyboard or other peripherals other than e.g. basic input buttons. |
|
|
Term
Identify two sensors that would be used in the washing machine. |
|
Definition
Two from:
1. pressure
2. temperature
3. water level
4. tilt switch. |
|
|
Term
What are the benefits and drawbacks of using appliances with embedded systems. |
|
Definition
Answers may include:
1. references to freeing time for other purposes
2. automatic control of events/tasks
3. energy saving settings
4. programmable settings
5. storing frequently used settings
6. use of leisure time
7. cost
8. difficult to repair/ not user repairable
9. features are included that may not be required by most users. |
|
|