Sei sulla pagina 1di 10

Answer all questions.

QUESTION 1
A medical centre uses a computer system to manage both patients’ data and appointments. This
system, which is used by the doctors, nurses and secretaries, has two unordered files: a patients’
file and an appointments’ file, both of which can only be accessed sequentially. Every
evening the following processing takes place:
● a list of appointments for the next day is printed out
● reminders are sent by SMS text messages to the patients’ mobile devices.
Outline the pseudocode that the processing must follow when the system sends out the text
reminders. [5]
Describe two different methods that the medical centre could use that would allow datato be
restored should it be lost for any reason. [4]

The medical centre is concerned about the privacy of the data it is storing and has to make
decisions concerning:

● access to the data stored on this system


● storing the data locally or through the use of a cloud service

Discuss the issues that should be considered before making these decisions. [6]

Mark scheme

Iterate through the appointments file;

Check for correct day;

Repeat for each appointment on that day;

Using the patient ID for that appointment;

Iterate through the patients file until record for that ID found; Retrieve phone number and send
out SMS;

Two methods

Backup; Data files on a regular basis;


Printed copies; Printouts can be kept of transactions;

Transaction Log file; Written for each transaction can be used to restore;( second server and
cloud use)

Privacy

There are 2 possible issues here: who has what level of access to the data in the

hospital and whether storing in the cloud is safer than storing locally.

Official access to the data [3 max]:

Access to this sensitive data must be restricted.

Only those directly concerned can be able to access it.

Even less people should be able to edit it.

Therefore access levels should be set up, with strong levels of authentication. Physical access
to servers should be controlled if using the local system;

Data security [3 max]:

Is the data safer stored locally or on the cloud?

Cloud service providers are professionals – they should have stronger security than a hospital
system.

What track record / reputation does the cloud service provider has?

If patient data could be sold/inspected, then both the patient and hospital could suffer serious
consequences.

Is the cloud governed by appropriate privacy laws?

Is it located internationally or is it governed by the laws of the country in question?

Could be intercepted in transmission;


QUESTION 2

A new computerized system is being planned for a school library.

(a) Describe one method by which systems requirements can be obtained from the
stakeholders. [2]


(b) Outline one reason for providing a prototype for this new system. [2]

Answer
Award [2] for one method that is suitable for the given scenario.

Answers may include:



Interviews could be held (with the librarian/stakeholders); To establish the functions required by the system;

Direct observation could be made of the users/students using the present system;

To gain an insight on how the library is being used;

è3è

(b) Allows stakeholders to gain an idea of how the system would be/work/look; so they can provide feedback /
suggest improvements;

Identify one method of inputting data that can improve the accessibility of a computer

system for some users.

Text-to-speech; 


Voice recognition; Braille keyboards; Touch screen; Input from scanner; 


Outline what is meant by beta testing. 



QUESTION 3

When a customer buys a book in the book shop, the salesperson at the point of sale uses a
scanning device to input a barcode from the book. The barcode is sent to the central computer
where the barcode of each book and the corresponding price are held in a database on a disk.

When the price is found, it is sent to the point of sale computer where all necessary calculations
are performed, details of the transaction are stored on a local disk and a receipt is printed out.

(a) Construct a system flow chart for the system described above. [5]

At the point of sale there are peripheral devices other than the scanning device and printer.

(b) Outline the purpose of one other possible peripheral device in this scenario. [2]

The customers can also buy books online. A customer can select a book, and then enter their
name, address and credit card number. This data is stored on the book shop’s central computer in
a database of customer orders.

Identify two sources of risk to personal data in this online system. [2]

State two measures that the book shop can take to address the risks identified

in the previous part .

Outline the consequences to the customer if their data is not adequately protected. [2]

Keyboard;

To type in some additional data;

Or to type in barcode data when it is not possible to scan;

Magnetic card reader;



Used when a credit card is used;

Microphone;

To call the next customer; To call manager;

Monitor;

So the salesman can see the information/data on the screen;

Visual display;

So the customer can read the information/data on the display;

"
Speakers;

For customers to hear information;

For shop assistants to bring another item the customer may wish to buy; [2]

[5]

9. (a)

4. (ii) Award up to [2 max].



All private information must be encrypted;

Transmission channel must be protected by encryption;

Logging on to the system must be secured (to prevent intruders);

Dual data back-up system in case of accidental deletion; [2] 


5. (iii) Award up to [2 max]. Details stolen; 



Used for fraudulent purposes; 

Contact details could be shared; Used for junk mail/fraud; 

Personal details stolen;

For identity theft; 

QUESTION 4

An examination office of a university must securely store students’ examination papers and their
grades. The office keeps the documentation of past students for two years. After two years the
office only stores the student grades. All documentation of current students is frequently
accessed for other operations and the volume of the data increases quickly.

To better support its operations, the office is creating a new system to provide this storage.

(a) Identify two aspects of the data that need to be taken into account during the planning

of the new system. [2]


(b) Describe how direct observations on the current system may provide information to

help propose a suitable new system. [3]


A prototype of the new system is created to present to the examination office.

(c) Describe the purpose of this prototype. [3]

The examination office needs to upgrade the computing resources for their operations, and this
will require data migration.

(d) Discuss two possible problems that may occur during data migration. [4]


(e) Outline one economic aspect that the examination office needs to take into account to


support parallel running. 


Award up to [2 max] for two aspects: The type of access needed;

For example read only/read write/online or offline;


Access rights;

For example, data available only for administrators / different permissions for students;

Frequency of access;

Some data (of non-current students) are not frequently accessed and can be archived;

Other data (of current students) are frequently used, subject to a variety of operations;

Quantity/size of the data;



For example should not exceed storage capacity of the new system;

Type/nature/format;

For example incompatibility issues; [2]

Award up to [3 max].

Quick/first hand/realistic information on data/software/hardware/users/procedures in the current system;

Help better understand positive and negative features of the current system (for example problems in accessing
or validating data/user errors/security issues, etc.);

Which can be used when specifying requirements of the new system (keep/improve positive and change
negative features); [3]

Award up to [3 max].

Prototype is used to ensure all essential functions/operations of the system are present/meets the needs of the
users;

Prototype is used to speed up development process;

Positive user’s feedback helps in refining the acceptable prototype in order to develop the complete system/
product;

Or else a further prototype should be created in order to develop the satisfactory system/product;

etc. [3]

6. (d) Award [1] for identifying a problem and [1] for a discussion, for two problems, 

up to [4 max]. 

Data loss/data corruption;

When moving data, from one storage device to another (via network/ cables or transferred by people),
data could be corrupted/lost and not useful anymore; 

Incompatibility of data formats;

Necessary to translate from one format to another, to be able to use the data in the new system which
causes delays/performance issues in business/office operation; [4] 

7. (e) Award up to [3 max]. 

Example answer 1 

Two systems are running simultaneously so that operations are not disrupted;

This is a costly operation;

Because both systems and all their resources should be maintained / More staff should be hired; 

Example answer 2 

Safe way of validating the new system;

Running two systems could be cheaper;

Than losing all data in case of failure; [3] 


QUESTION 5


Describe the use of beta testing.

8. It is when an application/program is tested/ to get feedback (for errors/improvements);



By releasing it to the general public/users/stakeholders before final release; [2] 


Identify two causes of data loss.

Award up to [2 max].

Natural disaster/power failure;

Accidental deletion;

Malicious activities (hacking/theft/viruses);

Hardware/software/system failure;

Bad integration/migration of systems/data;

Transmission error;

Lossy compression when the original no longer available only the modified version; [2] 



Identify two reasons for releasing a software update.
Award up to [2 max].

To patch any vulnerabilities/bugs/cyberspace threats;

To provide improved functionality/new functions/usability/maximize efficiencies;

To generate income for the software company/to innovate and stay ahead of other software companies;

To ensure compatibility with other (updated) technologies

Outline one problem of maintaining legacy systems.


Outline the use of a failover system


.



Potrebbero piacerti anche