Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
~Aastha Jain
Basics:
Q1. Ways in which personal data could be misused with prevention:
Ans. Ways in which it could be misused:
Username/ Passwords
Do not connect to network
If connected to network use dedicated lines
Physical security: use locks on computer room doors
Firewall
Q2. Advantages and disadvantages of using standalone laptop computers compared to using networked desktop computers.
Ans. Advantages:
Disadvantages
Disadvantages:
Workers can use own office so documents do not get lost in transit/bulky documents/equipment do not have to be
carried around
Company can call meeting at short notice
Employees can work from home
Company does not have to pay travelling expenses
Company does not have to pay hotel expenses
Company does not have to pay for conference room facilities
Travelling time is saved
Might be dangerous to fly/travel
Disabled people may find it difficult to travel
Disadvantages:
Q5. Advantages of using chip and pin systems over a magnetic stripe system.
You can get immediate feedback/interaction/you can ask questions immediately based on feedback
You know you have the right address/number
Laptop is not as portable as phone
Laptop is difficult to use on the move
Less impersonal/less risk of upsetting recipient/can detect emotions
Can make yourself understood more easily
Can be easier to get a connection
Q11. PCs come with a hard disc drive. Why are each of the following also used with PCs:
1. Magnetic tape: To make backups
2. CD R: To transfer data/programs from computer to computer/to save user data
3. DVD ROM: For companies to distribute software/movies/For users to install software/view multimedia
Q12. Why are the following used with PCs:
1. Pen drives: So that users can transfer data from one computer to another/back up files/security dongle
2. Blu-ray: To enable large high definition/quality video files to be recorded
3. Fixed hard disc drives: So that users can have quick access to their data/software/so that software can be stored
Q13. Advantages of email over fax:
Q14. The main memory in computers is becoming very large. Why is backing storage still need?
Q15. Describe the role of a proxy server when a LAN is connected to the internet:
Networks:
Q1. Advantages and disadvantages of having computers networked:
Ans. Advantages:
Share hardware/software
Share data/information
Electronic communication
Users can be more effectively controlled/monitored
Disadvantages:
Q2. Describe the advantages and disadvantages to the shops from shopping from home using the internet.
Ans. Advantages:
Disadvantages:
Q3. Describe the advantages and disadvantages to the customers from shopping from home using the internet.
Ans. Advantages:
Disadvantages:
1. Router: So that data can be transferred from one network to another/stores information about which computer is
connected to which network/receives data packets from an individual computer/it passes data packet to appropriate
switch/to reduce data collisions/it can connect LANs to the internet
2. Browser: To access the world wide web/view web pages/surf the net
3. Email: So that messages can be sent to people outside the network/home
4. ISP: In order to access the internet/email/to provide internet service
Check the last part of the URL/.gov, .ac, .ed, .sch should be reliable/.org, .co, .com are less reliable
See if responsible bodies have endorsed the site e.g. NGFL
Check the date of last update
Are any advertisements present
Are there links to and from the website to and from known reliable websites?
Checking the authors credentials
Too dangerous
Too expensive
Too large a time scale required
Wasteful of materials
Too vast a scale
Program listing
Programming language
Flowchart/algorithm
List of variables
File structure
Purpose of system/program
Input and output format
Hardware and software requirements
Sample runs
Known bugs
Validation rules
Range check
Check digit
Control total
Hash total
Invalid character check/type check
Picture/format check/input mask
Presence check
Existency check
Length check
Q8. Describe how an expert system for diagnosing diseases will be created andevaluated:
Medical diagnosis
Car engine fault diagnosis
Mineral/oil prospecting
Tax
Careers
Chess games
Animal/plant/rock classification/identification
Q10. Describe features that would help a user navigate between input forms.
Flight/pilot stimulation/training
Large scale chemical experiments
Design of fairground rides
Design of large buildings/bridges
Traffic control
Building fire stimulation
Car driving stimulations
Drug trials
Microwaves
Ovens
Washing machines
Dish washers etc.
Q14. Describe the inputs, outputs and processing involved in a house burglar alarm system.
Ans. Inputs:
Pressure pad
Light sensors
Temperature sensors
Contact switches/push switch
Input keypad
Pass number input to keypad
Zones selected
Sound sensor
Infrared sensor/proximity sensor
Motion sensor/movement sensor
Digital/video camera
Processing:
Output:
Interview: Can change script to suit circumstances/more likely to get truthful responses
Observation: Can gain broader overview of processes
Examining documents: Can follow data flow more easily/informs input/output format design
Questionnaires: Better for busy people/dont have time to prearrange appointments/quicker to get every employees
response
Field name/type/length
Key field
Validation check/rules
Q21. Describe actions which might need to be taken as a result of testing a system:
Data/file structures
Validation routines
Purpose of system
Limitations of system
Hardware and software requirements
Contact details of manufacturer/support network
Q24. Describe what is meant by live data and how it is used to test a system:
Program coding
Program flowcharts
System flowcharts
File structures
List of variables
Validation routines
Drawbacks:
Q27. Why is setting a field length such an important part of computer modelling?
If its too short abbreviations would be needed making the field contents difficult to interpret
Steps questions:
Q1. Describe how the computer will automatically identify overdue books and send out letters to the borrowers. It is 27 th May
today.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Q2. The bar code number is scanned into the computer system when the item is sold. Describe the computer processing that
would then take place in order for the number in stock to be updated.
Ans. The bar code field in the data file is read/record by record/until a match is found with the bar code entered/the
corresponding number in stock is read/one is subtracted from this number/written back to file/no. in stock checked with
reorder quantity/if <= reorder quantity/then reordered or flagged.
Q3. When a customer pays for an item, chip and pin technology may be used. Describe the steps involved in a customer
transaction.
PIN is entered
Pin read from chip
Numbers compared
If identical, transaction is authorised
If not identical, transaction is refused
Customer bank contacted by computer/automatically
Card details checked for not stolen
Account checked for sufficient funds
If card stolen or insufficient funds then transaction is rejected
If card not stolen and sufficient funds then transaction is authorised
Money deducted from customer account
Money credited to supermarket account
Items receipt printed out
Q7. Describe the online processing of data, using the booking of airline tickets as an example:
Q2. Safety problems due to computers with what happens and prevention:
1.
2.
3.
4.
Q5. Describe some authentication techniques and give benefits and drawbacks of each:
Q11. Security methods school can use so all students dont have access to everything/sites with undesirable content:
Proxy server: The proxy server can restrict the web sites students can access/can block access to sites with
objectionable material
Firewall: Limits the computers (using IP address) that can access the system/that can be accessed from within the
school
Applying parental guidance settings: Can block undesirable topics
Authentication techniques such as user names and passwords identify the user to the system
Without authentication anybody would be able to access data
Hackers would be able to amend/delete data without being prevented
Would have to rely on other methods such as firewalls to prevent unauthorised access.
Others:
Q1. Robotics are now used in the production of motor cars. Describe the effects this had on the workers who used to
manually produce cars.
Increased unemployment
Have had to retrain
Increased employment(Introduction of new jobs in the IT field)
Less noise/more pleasant environment
Safer environment
Less heavy lifting/healthier work
Workers can be deskilled
Disadvantages:
Q2. Put formula in cell(s) without typing when it is already present in one cell:
Highlight the cell in which the formula is/copy/highlight range of cells in which you want the formula/paste
Highlight the cell in which the formula is/using fill handle or little black cross or cross in bottom right hand corner of
a cell/drag down till required cell
Highlight the cell in which the formula is/highlight range of cells in which you want the formula/click on fill/click on
down
Q4. Features of a relational database which are not found in a flat file:
Q6. Advantages and disadvantages of using mobile phones to access internet over a PC:
Advantages:
Disadvantages:
Easily lost
May have poorer signal
Display is smaller/keyboard is smaller
Content is more limited
Batteries may run out
No mouse so can be more difficult to navigate
Q7. How can two flat files be combined to form a relational database?
The personal details file and test results would be saved as separate tables
Primary key/key field(s)/foreign key would be identified
The primary key would be used to link the two tables together
Q8. Features of presentation software not in printed copy with use (school presentation):
1.
2.
3.
4.