New Hall School The King John School: AS Level ICT Revision Guide
New Hall School The King John School: AS Level ICT Revision Guide
Summer 2003
Basic Examination Technique
Anything in the specification can be used as a question. Get a copy of the
specification and use it as a revision checklist. Specification can be obtained from
www.aqa.org.uk
Answer all the questions on the paper in the right order. Fill in the question numbers
on the front page of the exam paper.
Use correct English and not "text message language." Make sure your handwriting is
readable. Don't use correction fluid.
The best way to calm yourself down at the start of the exam is to read each question
twice.
If the question asks you about a certain scenario, make sure that your answer is
relevant to this scenario.
Use correct technical terms. Do not use trade names e.g. talk about a "Database
Management System" not "Access". Talk about a "Spreadsheet Package" and not
"Excel".
The INPUT (data) would be the card (magnetic stripe) and the pin number and
instructions entered via a keypad.
The PROCESS will be the computer doing a search (and possibly a calculation) to
ascertain the user's balance.
The OUTPUT (information) would be the balance, which will either appear on the
screen or be printed on a slip of paper (or both).
"If I only have £250 in my bank account, I haven't got enough money to pay my bills"
is KNOWLEDGE
The Quality and Importance of Data
Factors Influencing the Quality of Data
Information becomes less valuable over time (e.g. stock figures that are a week old
will probably be very unreliable). However, keeping information up-to-date is
expensive because there has to be more frequent data collection and more regular
input, processing and output. For example, consider how up-to-date the information
in the school's student database is. How often is this information updated? What
problems can be caused by out-of-date information? Why is it not updated more
frequently?
Good quality data can have a monetary value. Consider the value to Tesco of the data
that is generated by the Clubcard scheme.
The form in which the information is presented (e.g. tables, graphs, charts) can affect
its quality.
The problem with encoding information as data is that PRECISION can be lost.
If you wanted to find out which schools/colleges offered AQA AS Level ICT, the
direct source would be to write to each school and ask them. An indirect source
would be to ask AQA for a list of centres.
When a person buys a can of baked beans in a supermarket, the POS terminal records
the transaction. The direct use of this data is to bill the customer and to record the
transaction for stock control purposes. An indirect use of the data is for managers to
compare weekly sales totals or to analyse the popularity of certain products.
Capabilities and Limitations of ICT
N.B. When asked to describe advantages of ICT, answers like "quicker", "cheaper",
"more efficient" etc. are NEVER satisfactory.
Disadvantages include:
• Job losses
• Faults in software (bugs or badly designed programs) can cause chaos,
especially if an organisation has become over-reliant on ICT.
• GIGO (Data Validation can reduce the problem but not eliminate it)
• Information overload (e.g. people can be flooded with Email)
• Security problems (e.g. hacking, viruses)
• The initial investment for the equipment
The Home (e.g. teleworking, video games for entertainment, use of home computers
for multimedia CD ROMs, the Internet, E-mail, and so on)
Education (use of the Internet for research, distance learning, school web sites,
"Successmaker" for Maths)
Health Service (use of computers to model the effect of new drugs, robot surgeons,
GPS for blind people, databases of organ donors, expert systems for diagnosis)
Small Businesses (small businesses use ICT in a very different way to large ones)
Banking (direct debit, internet banking, ATMs, MICR, credit and debit cards, the
concept of the cashless society)
Consider the effect of ICT on the "technological underclass" (e.g. bank closures in
rural areas).
Communication Systems
You need to know the hardware and software necessary to access the Internet (web
browser, modem, telephone connection, computer or other device)
You need to have some examples of facilities/services that are available on the
Internet (e.g. information services, online banking, e-commerce, live events,
newsgroups, chat rooms, search engines).
You need to be able to describe the advantages and disadvantages of certain methods
of communication, especially e-mail, fax, video-conferencing.
Remember that "mobile phones" are not the answer to everything. You can
sometimes talk about "WAP phones".
Protecting ICT Systems
You should understand that many organisations are reliant on the quality of their data.
Consider the effect of a large loss of data by organisations such as an airline or a
bank.
Level One: Unauthorised access (e.g. someone who breaks into a system to be nosey
or just for the hell of it).
Level Two: Unauthorised access with a further intent (e.g. someone who breaks into
a network to steal money).
Level Three: Unauthorised access to modify data (e.g. someone who breaks into a
network to plant a virus, which corrupts data).
The computer misuse act is not used as much as it should be because many businesses
(e.g. financial institutions) do not want to acknowledge that their systems are
vulnerable. If it became public knowledge that their systems had been hacked, the
bad publicity could affect their share price.
When you buy a piece of software, you do not own the software itself. What you own
is a licence to use this software on one computer at a time (a single user licence).
Software companies can guard against software piracy by the use of registration
numbers, dongles, or by trying to make disks or CDs "impossible" to duplicate.
Organisations should have policies to ensure that they are always fully licenced.
3. Health and Safety
There are several laws governing health and safety at work. Organisations can be
sued by their employees if they are guilty of not following guidelines. Consider the
example of the HSBC bank. Remember to refer to IT health and safety problems
only!
Why was the data protection Act introduced? (Because of privacy concerns about
large amounts of personal data being held. Because computers can store vast
quantities of data and process it very quickly. Consider the case of James Wiggins)
What sort of data does it cover? (personal data on living and identifiable individuals
that will be automatically processed)
What is the data register? Anyone wishing to hold personal data must say what
data will be held, who the data will be passed on to, how long the data will be held
for, the purpose for which the data is held, the sources from which it will be
obtained).
What is the role of the Information Commissioner? (to maintain the register, to
spread information about the DPA, to encourage organisations to introduce codes of
practice, to consider complaints and to prosecute offenders).
What are the rights of data subjects? (the right to see information, the right to have
errors corrected, the right to complain, the right to compensation)
What are the Exemptions from the Act? (payrolls, pensions, national security,
recreational, electoral roll, tax, credit reference agencies).
Data Capture
You need to understand methods of data capture, such as voice data entry, scanners
and OCR, MICR, magnetic stripes, smart cards, OMR, barcodes, keyboards.
• What is it?
• What does it do?
• What equipment is required?
• When would it be appropriate to use this method?
• What are the advantages and disadvantages?
When you fill in a form on a web site they want your real e-mail address. There is
usually a validation check on the e-mail address, which means that
[email protected] will usually be accepted. However, some clever companies
then send an e-mail to the address given to VERIFY its accuracy.
You need to be able to name and describe different validation checks (i.e. you must
know what each one does):
• Presence check
• Range check
• Format check
• Uniqueness check
• Look-up list
• Length check
• Type check
• Check digit check
Databases
Advantages of Databases:
• Data Redundancy (the same data entered over and over again takes up
unnecessary space and can slow down the performance of the database)
• Data Inconsistency (if the same thing is entered repeatedly, mistakes will
inevitably be made
• Time spent entering data (faster if the same data does not have to be entered
repeatedly)
• Ease of updating (e.g. what happens if someone changes her name?)
Systems Software
There are two types of systems software – Housekeeping Utilities and Operating
Systems.
Housekeeping utilities are tools to ensure the smooth running of the system e.g. virus
checkers, disk checkers, disk defragmenters.
The Operating System is software that provides a platform for applications to run.
Tasks of the operating system include:
• Memory management
• Resource Allocation
• Interrupt Handling
• Backing Store Management
• Providing the user with an interface
Applications Software
Applications Software
• Word Processors
• Spreadsheet Software (not "a spreadsheet")
• Database Software (not "a database")
• Graphics Software (or "drawing application")
• Image Editing Application
• Presentation Graphics Software
• E-mail Client
• Web Browser
• DTP (a desktop publishing application)
• Web authoring software
Spreadsheets
E-Mail Clients
Understand the difference between a stand-alone e-mail client and web mail.
Web Browsers
Understand the difference between the "world wide web" and "the Internet".
Presentation Graphics
Software like Microsoft Access can be used to generate applications (e.g. stock-
control or booking applications) without the need for programming.
RDBMS systems can also be used to print off high-quality reports. The user can
define how the information is formatted.
Processing Different Types of Data
You should understand that different types of data are stored and processed in
different ways:
You should understand the importance of distributing information in the right format
e.g. charts/graphs, tables, text, e-mail, sound, presentation. Think about the
advantages and disadvantages of each.
Modes of Processing
Transaction Processing Data for each transaction is processed very shortly after
the transaction occurs. Each transaction is completed
before the next one is begun.
Online Processing Processing takes place almost immediately (e.g. airline
booking).
Interactive Processing Processing is immediate (or psuedo-real time) and there
is interaction with the user e.g. the controls of a plane.
Batch Processing Data is collected over a period of time. It is processed in
batches of a set size. The batches are processed without
human intervention. The batch processing is scheduled
for a certain time. Batch processing can take place when
computers would otherwise be idle. Batch processing is
suitable for large quantities of documents of the same
type.
Storage Devices
When you are asked to give "a medium" or "media", this means a storage device.
Consider the advantages and disadvantages of floppy disks, Hard Disk Drives, Zip
Disk, Magnetic Tape, Microfiche.
N.B. A disk is not software, although it can be a medium for supplying software!
Backup
Storage devices are used for backup. When asked about backup, it might be useful to
ask yourself the following questions:
N.B. The type of organisation is important when choosing a backup system. A large
multinational corporation is not going to backup their transactions onto a floppy
disk!
Output
You need to know about VDUs (monitors), plotters and different types of printer
(laser, inkjet, dot matrix). Speakers are also output devices.
Networks
You should be able to explain the difference between a LAN and a WAN and to give
an example of each.
You should understand the difference between parallel and serial transmission (serial
transfers one bit at a time).
You need to understand the difference between a "server based network" and a "Peer-
to-peer" network. You need to understand the advantages and disadvantages of each.
You need to understand the different types of "Network Topology". You should
understand the differences between a RING, BUS and STAR network. You should be
able to draw a diagram of each.
User Interfaces
When thinking about interfaces, consider things like ATM machines, cashpoints and
planes as well as computers.
GUIs are increasingly popular because they have a range of features to facilitate speed
of learning and ease of use including:
When designing a data entry form, interface design considerations could be:
If applications have a "common user interface", it can increase speed of learning and,
therefore, reduces training costs. The ability to import/export data between integrated
applications is not an advantage of the interface!
4. Many market research firms use questionnaires as a means of gathering raw data
for companies about the popularity of their products.
(a) Explain why Information Technology is widely used in market research. (4)
(b) Once the data has been collected, it can be used to give the clients information
about their products. Explain the difference between information and data in this
context. (4)
5. (a) State the three levels of offence under the Computer Misuse Act of 1990.
Illustrate each answer with a relevant example. (6)
(b) Describe four separate measures that can be taken to prevent accidental or
deliberate misuse of data on a stand-alone computer system. (8)
6. The use of Information Technology equipment has brought Health and Safety risks
for employees. Describe four such risks, and the measures that an employer should
take to protect their employees from them. (8)
7. The owner of a small newsagent uses a computer to manage her orders and
deliveries. Every week she copies the files onto a number of floppy disks and puts the
disks into a drawer next to the computer.
(a) State three problems that may be caused by this method of backup (3)
(b) Describe a more appropriate backup procedure (1)
(a) State two different types of network that would be suitable. (2)
(b) (i) Give two advantages of this change for the manager. (2)
(ii) Give two advantages of this change for his customers. (2)
(a) State two items of data that should be printed on the data capture document before
it is given to the meter reader. (2)
(b) Describe two validation checks that should be performed when the data is read
into the computer system. (4)
(c) How is it still possible for incorrect data to be stored in the computer system? (2)
(d) Since the company has a large number of accounts, the billing process is run
overnight at regular times. Explain why batch processing would be appropriate. (3)
10. Many schools and colleges use local area networks of personal computers to
allow their students to access packages and to store their files. Most students word
process their assignments and use packages to assist their learning. Some students
also learn to use database packages, and others write large programs for project work.
(a) List three of the main functions performed by a network operating system.
(b) After logging onto the network, students are presented with a personalised
graphical user interface (GUI).
(i) State two main features of a GUI. (2)
(ii) Explain why a GUI is preferable to a command line interface. (2)
(iii) Explain a benefit for the students of having a personalised GUI. (2)
(c) The college needs to upgrade the version of the word processing package currently
in use. However the network manager asks the management to wait until the end of
the academic year. State two reasons why this is a sensible request. (2)
11. Describe three reasons why a building society might experience problems if they
had a flat file database system. (6)
12. Data protection legislation was introduced into the UK in 1984; it has since been
superseded by the 1998 Act.