Mock Exam
Mock Exam
General Instructions: -
Marks
Obtaine
d
Max
2 4 4 4 4 2 4 4 2 2 4 4 2 5 3 4 3 4 2 2 4 5 2 3 2 2 2 4 4 4 3
Marks
1 Write any two internal hardware devices and its usage. [2]
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
2 There are two types of software: applications and system.
[4]
Tick (✓) the most appropriate type of software for each of the following.
Applications Syste Usage
(✓) m (✓)
Device
driver
Linker
Photo-
editing
software
Spreadshee
t
3 The use of laptop computers and tablet computers by people on the move is becoming
[4]
very popular. Describe four advantages of using a tablet computer rather than a laptop
computer.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
4 Ahmed is taking a gap year between his studies and will be travelling through Kenya. He
[4]
needs to remain in contact with his parents and is considering using either a Smart phone
or VoIP.
Describe the benefits of using each of these communication methods to stay in contact
with his parents.
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
VoIP: ---------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
5 Robots are used in many car production lines.
[4]
Discuss how their use has affected the nature of employment in the car production
industry.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
6 Facial recognition is an example of biometrics. Direct data entry devices can be in three
[2]
forms. One is biometrics. The second is contactless where the item being read does not
touch the reader. The third is physical where the item being read does touch the reader.
Tick (✓) whether the following are the most appropriate examples of biometrics or
contactless or physical direct data entry.
Magnetic stripe
Retina scan
Voice recognition
(d) The action of sending text messages to fraudulently obtain another person’s bank
details is called ______________________________
8 Most data protection acts include the principle that data should be stored securely.
[4]
List four other principles of a typical data protection act.
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
9 Explain how Optical Character Recognition is used before the computer processes the
[2]
data.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
1 Describe two drawbacks of setting up and using video-conferencing.
0 [2]
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
1 There are several security issues surrounding the use of smartphones. These include
1 [4]
Smishing and pharming. Describe different security measures that can be put into place to
stop Smishing or pharming attacks.
(a) Smishing ____________________________________________________________
____________________________________________________________________
____________________________________________________________________
1 Bank cheques are sometimes used to pay bills. Name four pieces of information that the
2 [4]
bank’s computer may read from the bank cheque.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
1 Give two disadvantages of using 3D printers for this purpose.
3 [2]
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
1 When using the internet, it is easy to accidently give your personal details to others.
4 [5]
a) Give two examples of personal data.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
b) Describe three ways of protecting your personal data when using the internet.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
1 The developers have used the results from the model to choose a computer-controlled
5 [3]
flood defense system. It will have a barrier which can open or close. Describe the role of
the microprocessor in such a system.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
1 Maryam has been advised by her teacher that she needs to be aware of e-safety.
6 [4]
Describe the e-safety issues that she should be aware of before she publishes web page.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
1 Websites that start HTTPS are secure websites. They use encryption when the data is
7 [3]
transferred. Explain what is meant by encryption.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
1 The Mansa Cricket Club (MCC) is considering setting up an online forum to allow users to
8 [4]
post comments. Compare and contrast a moderated forum with an un-moderated forum.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
1 Explain why copyright legislation is needed for images.
9 [2]
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
2 There are two types of documentation, user and technical. Tick the elements that are part
0 [2]
of User documentation, Technical documentation or Both.
User Technical
documentation documentation Both
() () ()
Program listing
Input format
Error messages
Hardware requirements
A large organization is introducing a new computer system. Compare and contrast pilot [4]
2
1 implementation with phased implementation of the new system.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
2 Expert systems are used by doctors.
2 [3]
(a) Describe how an expert system can be used to diagnose illnesses
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
[2]
(b) Name two other applications of expert systems.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
2 Using computers can lead to a number of physical safety issues. Describe two of these
3 [2]
types of issue.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
The traffic controller is considering changing to a number plate recognition system on all
[3]
2 traffic lights. State the advantages and disadvantages of using RFID technology rather
4 than number plate recognition.
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
2 A router is used in networks. Describe how a router routes data packet.
5 [2]
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
2 An office worker is about to open an attachment but is worried it might contain a computer
6 [2]
virus. Explain what is meant by a computer virus.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
2 Geographic Information Systems (GIS) use satellites. Describe, using an example, how
7 [2]
GIS can be used.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
2 A programmer is developing a presentation of a new ICT solution for a conference and
8 [4]
needs to consider the audience. Using examples, explain why presentations and ICT
solutions have to consider the type of audience.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
2 Repetitive Strain Injury (RSI) is one of the health problems associated with the prolonged
9 [4]
use of computers. (a) Describe RSI and what causes it. (b) State two strategies for
preventing RSI.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------
3 Name two output devices that could be used with VR systems in this environment. Name
0 [4]
two input devices that could be used with VR systems in this environment.
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
3 IT technicians are setting up a new file server for a school. Describe the benefits and
1 [3]
drawbacks of using a command line interface (CLI) rather than a graphical user interface
(GUI) to set up a new file server.
-----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------------