Group 2 - Theory Revision-12.1.23
Group 2 - Theory Revision-12.1.23
Group 2 - Theory Revision-12.1.23
____/[7]
i. Set of rules used to upload files and folders on the server are called
_______________________________________________________________________
ii. Name given to the IP address of the server where the website is present on the internet is
called ______________________________________________________________
iii. The process of changing the quality of an image by reducing or increasing the pixels is
called ______________________________________________________________
iv. A collection of fields containing information about one data subject is called
_______________________________________________________________________
v. A communication method that wirelessly connects a mobile phone to a car, to allow
___________________________.
vii. A direct data entry device that is most suited to track livestock on a farm
____________________________.
b. Circle the names of three devices which are used for input. ____/[3]
Input Device 1:
_______________________________
Input Device 2:
______________________________
d. Complete each sentence below using the most appropriate item from the list. ____/[4]
_______________________________________________________________________
(b) A network device that connects a LAN with the internet is called
_______________________________________________________________________
(c) A network device that connects a LAN to another LAN using the same protocol is called
_______________________________________________________________
(d) A network device that learns which devices are connected to which ports is called
_______________________________________________________________
e. Tick two ways of reducing the risk of health problems caused by continuous use of computers
____/[2]
Statement (✓)
i. Look away from the screen from time to time
iii. Position your chair so that you are looking straight at the
screen
iv. Work without a break
_______________________________________________________________________
b. Smartphone with touchscreen use similar type of Interface with post-WIMP interface. Give
two features of post-WIMP interface. ____/[2]
1. _______________________________________________________________________
2. _______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
d. A student is creating a presentation and wishes to use the following image as a logo.
Name the two editing techniques that transform Image A to Image B ____/[2]
1. ____________________________________________________________________
2. ____________________________________________________________________
3.a. Complete the sentences about encryption. Use the terms from the list. ____/[4]
Some of the terms in the list will not be used. You should only use a term once.
of ________________________, is used.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
c. Describe how a Knowledge Base is created for a chess game expert system. ____/[3]
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
4. a. State the most appropriate sensor that would be used in the given applications.
____/[3]
b. Most companies have laws governing email content to protect people against the misuse
of emails. Give three examples of these laws. ____/[3]
i) _____________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
ii) ____________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
iii) ____________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
c. Give two reasons why internet searches to find relevant information is not always fast?
____/[2]
i) _____________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
ii) ____________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
5. Alice enters a URL into a web browser to access RockICT music company’s website.
Part 1__________________________________________________________________
Part 2__________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
a. The last two characters of the Payroll Number specify the employee’s Pay Code. Write
down the function in cell C3, which will extract the Pay Code from the Payroll Number
____/[3]
_______________________________________________________________________
_______________________________________________________________________
b. In cell D3, enter a function to lookup for the Pay Rate from the Rates table. Make sure you
make use of absolute and relative referencing so that function can be replicated down with
convenience. ____/[5]
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
i. <!DOCTYPE html>
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
ii. Extranet
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
7. Mr George owns a number of garages that sell and service luxury cars. He is looking for
ways to use ICT to improve the way the businesses operate and also make a profit. Mr
George wants to improve the servicing of cars. The customers will register their car on the
website for servicing using their car registration no.
a. How will the car be allowed to enter the garage without human intervention? ____/[4]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
b. An expert system can be used to help diagnose a fault in a car during the service. Explain
how would this system work. ____/[5]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
8. Validation, Verification and Proofing are used to ensure data accuracy. Discuss the
importance and necessity of each technique. ____/[7]
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
c. Identify the Primary and Foreign key in Book’s table. ____/[2]
d. A one-to-many relationship needs to be created between the two tables. Describe how you
will create the relationship by clearly mentioning the primary and foreign keys to be used
from both the tables. ____/[4]
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
10. a Explain the meaning of the following terms used in document production. ____/[3]
Orphan: _______________________________________________________________
______________________________________________________________________
______________________________________________________________________
Section Break:__________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
b. A permanent account number (PAN) is a ten-digit number, issued by the Indian Income Tax
Department. The PAN structure for personal holders is as follows:
XXXPXDDDDX
where X stands for upper case alphabets from A-Z
D stand for digits from 0-9
and P is uppercase alphabet P
i) Give the most appropriate data type that should be assigned to PAN ____/[1]
_______________________________________________________________________
ii) Format check is a suitable validation check that can be used. Give an example of data that
would FAIL the Format Validation Check. ____/[1]
_______________________________________________________________________
iii) Give another suitable validation check that can be used on PAN. ____/[1]
_______________________________________________________________________
iv) Give an example of data that would PASS the validation check that you have specified in
step ii. ____/[1]
_______________________________________________________________________
11. a. Describe the concept of a bookmark and methods of creating a bookmark within a web
page. ____/[3]
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
b. Write down the CSS code to add a green colour background to a table. ____/[3]
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
c. The following icons are used in various application software that you have used.
Write down the most appropriate meaning for each icon. ____/[3]
Icon Meaning