Group 2 - Theory Revision-12.1.23

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

1. a. Complete the following sentences.

____/[7]

i. Set of rules used to upload files and folders on the server are called

_______________________________________________________________________

ii. Name given to the IP address of the server where the website is present on the internet is
called ______________________________________________________________

iii. The process of changing the quality of an image by reducing or increasing the pixels is
called ______________________________________________________________

iv. A collection of fields containing information about one data subject is called

_______________________________________________________________________
v. A communication method that wirelessly connects a mobile phone to a car, to allow

hands-free use of the mobile phone is ___________________________________.

vi. The device that can produce prosthetic limbs is called a

___________________________.

vii. A direct data entry device that is most suited to track livestock on a farm

____________________________.

b. Circle the names of three devices which are used for input. ____/[3]

CD writer Laser printer Pen drive Mouse

Speaker Touch screen Remote control Wide format printer

c. Name two input devices present on a smartphone. ____/[2]

Input Device 1:

_______________________________

Input Device 2:

______________________________
d. Complete each sentence below using the most appropriate item from the list. ____/[4]

a bridge a hub a keyboard a microphone a mouse

a printer a router a scanner a sensor a switch

(a) A network device which broadcasts data passing through it is called

_______________________________________________________________________
(b) A network device that connects a LAN with the internet is called

_______________________________________________________________________

(c) A network device that connects a LAN to another LAN using the same protocol is called

_______________________________________________________________
(d) A network device that learns which devices are connected to which ports is called

_______________________________________________________________

e. Tick two ways of reducing the risk of health problems caused by continuous use of computers
____/[2]

Statement (✓)
i. Look away from the screen from time to time

ii. Use a keyboard instead of a mouse

iii. Position your chair so that you are looking straight at the
screen
iv. Work without a break

v. Keep the screen as bright as you can

vi. Grip the mouse tightly

2. a. Identify the type of Interface: [1]

_______________________________________________________________________
b. Smartphone with touchscreen use similar type of Interface with post-WIMP interface. Give
two features of post-WIMP interface. ____/[2]

1. _______________________________________________________________________

2. _______________________________________________________________________

c. Why are generic file formats needed? ____/[1]

_______________________________________________________________________

_______________________________________________________________________

d. A student is creating a presentation and wishes to use the following image as a logo.

Name the two editing techniques that transform Image A to Image B ____/[2]

1. ____________________________________________________________________

2. ____________________________________________________________________

3.a. Complete the sentences about encryption. Use the terms from the list. ____/[4]
Some of the terms in the list will not be used. You should only use a term once.

algorithm cipher delete key plain

private public standard understood unreadable

The data before encryption is known as ________________________ text.

To scramble the data, an encryption ________________________, which is a type

of ________________________, is used.

The data after encryption is known as ________________________. text.

b. Explain what is meant by SPAM. ____/[2]

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
_______________________________________________________________________

_______________________________________________________________________

c. Describe how a Knowledge Base is created for a chess game expert system. ____/[3]

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

4. a. State the most appropriate sensor that would be used in the given applications.
____/[3]

Monitoring humidity in a greenhouse

Monitoring the air quality in an airplane

Monitoring the weight of people in an


elevator.

b. Most companies have laws governing email content to protect people against the misuse
of emails. Give three examples of these laws. ____/[3]

i) _____________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

ii) ____________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

iii) ____________________________________________________________________

_______________________________________________________________________
_______________________________________________________________________

c. Give two reasons why internet searches to find relevant information is not always fast?
____/[2]
i) _____________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

ii) ____________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

5. Alice enters a URL into a web browser to access RockICT music company’s website.

a. State what URL represents. ____/[1]

U_______________________ R_______________________ L____________________

b. She enters the following URL:

i. Identify what Part 1 and Part 2 represent in this URL. ____/[2]

Part 1__________________________________________________________________

Part 2__________________________________________________________________

ii. Describe what is meant by https. ____/[2]

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

c. Describe Wiki and its use as a means of communication. ____/[2]

_______________________________________________________________________

_______________________________________________________________________
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

6. The spreadsheet shows two tables Employees and Rates.

a. The last two characters of the Payroll Number specify the employee’s Pay Code. Write
down the function in cell C3, which will extract the Pay Code from the Payroll Number

____/[3]

_______________________________________________________________________

_______________________________________________________________________
b. In cell D3, enter a function to lookup for the Pay Rate from the Rates table. Make sure you
make use of absolute and relative referencing so that function can be replicated down with
convenience. ____/[5]

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

c. Describe what do you understand by the following terms: ____/[3]

i. <!DOCTYPE html>

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

ii. Extranet

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

iii. Ethical Hacking

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

7. Mr George owns a number of garages that sell and service luxury cars. He is looking for
ways to use ICT to improve the way the businesses operate and also make a profit. Mr
George wants to improve the servicing of cars. The customers will register their car on the
website for servicing using their car registration no.

a. How will the car be allowed to enter the garage without human intervention? ____/[4]

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________
_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

b. An expert system can be used to help diagnose a fault in a car during the service. Explain
how would this system work. ____/[5]

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

8. Validation, Verification and Proofing are used to ensure data accuracy. Discuss the
importance and necessity of each technique. ____/[7]

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

9. Computers are used in libraries to keep records of books and borrowers.


This is part of the database of books in a library:
ISBN Title Author_Name Paperback_or_ Borrower_no
Hardback
9780593057049 Gone Tomorrow Lee Child P 864752
9781858683416 The World of the Jane O’Neill H 673257
Brontës
9780747591054 Harry Potter and the J K Rowling H 489323
Deathly Hallows
9780091765132 Old Bear stories Jane Hissey H 489323
This is part of the borrower’s database:
Borrower_number Borrower_name Borrower_Email Borrower_Phone_No
673257 Giovanni Benitez [email protected] 02 34 45 67
489323 Sarbjit Chandra [email protected] 24 17 39 81
a. Give most suitable data-types for the following fields: ____/[3]
Field Name Data Type
ISBN
Paperback_or_Hardback
Borrower_Phone_No
b. Give three advantages of using relational database over flat-file database. ____/[3]
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
c. Identify the Primary and Foreign key in Book’s table. ____/[2]

Primary Key: ____________________________________________________________

Foreign Key: ____________________________________________________________

d. A one-to-many relationship needs to be created between the two tables. Describe how you
will create the relationship by clearly mentioning the primary and foreign keys to be used
from both the tables. ____/[4]

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

e. What would be the output of the following query? ____/[2]

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
_______________________________________________________________________

10. a Explain the meaning of the following terms used in document production. ____/[3]

Orphan: _______________________________________________________________

______________________________________________________________________

______________________________________________________________________

Section Break:__________________________________________________________

______________________________________________________________________

______________________________________________________________________

Hanging Paragraph: ____________________________________________________

______________________________________________________________________

______________________________________________________________________

b. A permanent account number (PAN) is a ten-digit number, issued by the Indian Income Tax
Department. The PAN structure for personal holders is as follows:
XXXPXDDDDX
where X stands for upper case alphabets from A-Z
D stand for digits from 0-9
and P is uppercase alphabet P
i) Give the most appropriate data type that should be assigned to PAN ____/[1]

_______________________________________________________________________

ii) Format check is a suitable validation check that can be used. Give an example of data that
would FAIL the Format Validation Check. ____/[1]

_______________________________________________________________________

iii) Give another suitable validation check that can be used on PAN. ____/[1]

_______________________________________________________________________

iv) Give an example of data that would PASS the validation check that you have specified in
step ii. ____/[1]

_______________________________________________________________________
11. a. Describe the concept of a bookmark and methods of creating a bookmark within a web
page. ____/[3]

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

b. Write down the CSS code to add a green colour background to a table. ____/[3]

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

c. The following icons are used in various application software that you have used.

Write down the most appropriate meaning for each icon. ____/[3]

Icon Meaning

You might also like