01 ##Commonly Asked Theory Questions##
01 ##Commonly Asked Theory Questions##
01 ##Commonly Asked Theory Questions##
Basics:
Q1. Ways in which personal data could be misused with prevention:
Ans. Ways in which it could be misused:
Hackers may read the data and pass it on
Hackers may delete the data
Hackers may amend the data Ways in which it can be prevented:
Username/ Passwords
Do not connect to network
If connected to network use dedicated lines
Physical security: use locks on computer room doors
Firewall
Q5. Advantages of using chip and pin systems over a magnetic stripe system.
Data more difficult to copy
Extra layer of security with pin number
Even if stolen card cannot be used unless thief knows PIN number
Larger amount of information can be stored
Disabled people may find it easier than signing
Reduces disputes at checkouts over validity of signature/saves time at checkouts
Not affected by magnetic fields
Q10. Advantages of using mobile phones to speak with other people rather than
sending emails using a laptop:
You can get immediate feedback/interaction/you can ask questions immediately based on
feedback
You know you have the right address/number
Laptop is not as portable as phone
Laptop is difficult to use ‘on the move’
Less impersonal/less risk of upsetting recipient/can detect emotions
Can make yourself understood more easily
Can be easier to get a connection
Q11. PCs come with a hard disc drive. Why are each of the following also used
with PCs:
1. Magnetic tape: To make backups
2. CD R: To transfer data/programs from computer to computer/to save user data
3. DVD ROM: For companies to distribute software/movies/For users to install software/view
multimedia
Q14. The main memory in computers is becoming very large. Why is backing
storage still need?
Data in the main memory can be lost if computer shuts down
Data in the main memory can be corrupted
Data in the main memory can be accidently deleted
Data/software may need to be switched from machine to machine
Q15. Describe the role of a proxy server when a LAN is connected to the internet:
Can act as web server
Can act as buffer(b/w internet and LAN)
Server passes on requests to the internet
Passes the requested pages to individual computers
Can cache/store the webpages
Subsequent requests for that/those web page(s) are responded more quickly
Can be used to monitor internet usage
Can block certain sites
Networks:
Q1. Advantages and disadvantages of having computers networked:
Ans. Advantages:
Share hardware/software
Share data/information
Electronic communication
Users can be more effectively controlled/monitored
Disadvantages:
Work can be misused more easily
Viruses more easily spread
Printer queues
Slower access to the internet
If server crashes all computers are affected
Increased security risk
Q2. Describe the advantages and disadvantages to the shops from shopping from
home using the internet.
Ans. Advantages:
Fewer staff needed/less spent on wages
Fewer shops needed/less spent on rates/rent
Less actual cash handled/fewer robberies
Less money spent on security staff
Potentially larger customer base
Disadvantages:
Initial outlay on computers is expensive
Need to retrain staff
Less customer loyalty/loss of customers due to lack of personal touch
Costs of system maintenance
Greater costs due to more delivery staff
Q3. Describe the advantages and disadvantages to the customers from shopping
from home using the internet.
Ans. Advantages:
Less danger of mugging
Don’t have to waste time travelling (long distances to shops)
Elderly/Disabled people don’t have to travel/leave home to shop
Don’t have to spend money on travelling expenses
Greater choice of goods
Can shop when shops are closed
Easier to search what you are looking for
Disadvantages:
Lack of socialising/social contacts
Customers must have a computer/internet access/(basic) computer skills
Hackers may intercept data and defraud customer
Deprived of personal touch
Phone bills can increase
Without broadband other household members cannot use phone
Cannot see/feel goods in reality
More vulnerable to phishing
Goods sometimes don’t arrive/substitute goods may be sent/take longer to arrive
Must have credit/debit card if COD not available
Shipping charges may be added
Q8. Describe how an expert system for diagnosing diseases will be created
andevaluated:
Doctors interviewed for requirements
Data is collected from experts
Knowledge base is designed/created
Rule base is designed/created
Interfence engine is designed/created
Output format is designed/created
Input Screen is designed/created
Ailments with known diagnosis are used to test the system and results valuated
Does new system match original system specification
[email protected] Mr. Khairy 2022 Facebook page IGCSE ICT
IGCSE ICT (0417) What’s App +966580309100
Q10. Describe features that would help a user navigate between input forms.
Button to close form
Button to first record/form
Button to end file/new record
Button to previous record/form
Button to next record/form
Submit/continue button
Space to enter required record number
Search facility/engine
Button to go to sub forms
Q14. Describe the inputs, outputs and processing involved in a house burglar
alarm system.
Ans. Inputs:
Pressure pad
Light sensors
Temperature sensors
Contact switches/push switch
Input keypad
Pass number input to keypad
Zones selected
Sound sensor
Infrared sensor/proximity sensor
Motion sensor/movement sensor
Digital/video camera
Processing:
Microprocessor continually monitors sensors
If light sensor beam interrupted:
If movement sensor activated:
If contact switch activated:
If pressure sensed by processor is greater than pre-set value:
If temperature sensed by processor is greater than pre-set value:
Microprocessor sends signals to output device
Output:
Q20. Why pilots are trained using flight simulators rather than by flying real
aircrafts:
If airplane crashed you wouldn’t need to replace it saving money
If the airplane crashed nobody is injured
It is easy to recreate extreme weather conditions
It is easy to recreate unusual flying conditions
Can recreate mechanical/computer failure from previous real situations
Cheaper fuel costs
Q24. Describe what is meant by live data and how it is used to test a system:
Data that has already been used I the previous system
Data that has known result
A table of expected results drawn up
Live data is input to the system
Actual results are recorded
The results are compared
Any resulting differences will highlight limitations of the system
Q27. Why is setting a field length such an important part of computer modelling?
If field length is too long storage space is wasted...
Greater memory requirements increases cost
Takes longer to type in data
If it’s too short not all data within the field will be entered
If it’s too short abbreviations would be needed making the field contents difficult to interpret
Steps questions:
Q1. Describe how the computer will automatically identify overdue books and
send out letters to the borrowers. It is 27th May today.
1. Computer reads a record from the book file
2. Compares with date due back
3. With 27th May
4. If date due back is less/earlier than 27th May
5. Using the borrower number
6. Reads the corresponding record from borrowing file
7. Address is read from record
8. Mail merged letter/email is generated
9. Otherwise reads next record and repeats above
10. Until end of file
Q2. The bar code number is scanned into the computer system when the item is
sold. Describe the computer processing that would then take place in order for
the number in stock to be updated.
Ans. The bar code field in the data file is read/record by record/until a match is found with the bar
code entered/the corresponding number in stock is read/one is subtracted from this number/written
back to file/no. in stock checked with reorder quantity/if <= reorder quantity/then reordered or
flagged.
Q3. When a customer pays for an item, chip and pin technology may be used.
Describe the steps involved in a customer transaction.
PIN is entered
Pin read from chip
Numbers compared
If identical, transaction is authorised
If not identical, transaction is refused
Customer bank contacted by computer/automatically
Card details checked for not stolen
Account checked for sufficient funds
If card stolen or insufficient funds then transaction is rejected
If card not stolen and sufficient funds then transaction is authorised
Money deducted from customer account
Money credited to supermarket account
Items receipt printed out
Q7. Describe the online processing of data, using the booking of airline tickets as
an example:
User/customer is in direct contact with the main computer/CPU
Appears that nobody else can access system at that point/processing is almost immediate
Computer asks customer for details of flight
Computer asks for personal details of passengers
Computer searches for matching flights
Computer may display list of seats available
Computer may ask customer to select a seat
(Customer selects seat from those available and) computer flags seat as booked
Computer asks customer to complete payment details
Computer checks details are valid by communicating with customer’s bank
Computer checks if sufficient funds
Airline’s database is updated immediately
Number of seats available reduces by number booked
Prevents double booking
[email protected] Mr. Khairy 2022 Facebook page IGCSE ICT
IGCSE ICT (0417) What’s App +966580309100
Q2. Safety problems due to computers with what happens and prevention:
1. Electrocution: By touching loose wires/spilling liquids on electrical contacts-RCB
installed/cable insulation
2. Trailing cables: Tripping and falling-Create ducts/cover cables with carpets
3. Heavy equipment falling: Physical injury to feet/legs-Sturdy/large tables
4. Fire: Too many plugs in multisocket and thereby overheating/overheating of equipment-
appropriate type of extinguisher/regular maintenance of equipment/ventilation
Q5. Describe some authentication techniques and give benefits and drawbacks of
each:
User ID and password
Benefit – each user ID could be unique/only user will know the password/data can only be
accessed by person who knows the password/Password can be changed frequently to avoid
hackers guessing them/Unsuccessful logins can throw you out of the system
Drawback – user might forget password/keylogging software can be used to intercept it
Biometrics
Q11. Security methods school can use so all students don’t have access to
everything/sites with undesirable content:
Proxy server: The proxy server can restrict the web sites students can access/can block access
to sites with objectionable material
Firewall: Limits the computers (using IP address) that can access the system/that can be
accessed from within the school
Applying parental guidance settings: Can block undesirable topics
Q2. Put formula in cell(s) without typing when it is already present in one cell:
Highlight the cell in which the formula is/copy/highlight range of cells in which you want the
formula/paste
Highlight the cell in which the formula is/using fill handle or little black cross or cross in
bottom right hand corner of a cell/drag down till required cell
Highlight the cell in which the formula is/highlight range of cells in which you want the
formula/click on fill/click on down
Q4. Features of a relational database which are not found in a flat file:
More than on table/file
Tables are linked
Primary keys
Foreign keys
Less duplication of data
Data from more than one table can be used in the same report
Q7. How can two flat files be combined to form a relational database?
The personal details file and test results would be saved as separate tables
Primary key/key field(s)/foreign key would be identified
The primary key would be used to link the two tables together
Q8. Features of presentation software not in printed copy with use (school
presentation):
1. Animation: To move images or text
2. Video: Video of school plays/performances/sports events
3. Sound: Background music/school concerts/voiceovers/sound effects when changing/opening
slide
4. Hyperlinks: To link to other slides
5. Slide transitions: To keep the viewer’s attention
Q10. Describe how use of robots on car production lines has affected the nature
of employment in the car industry:
Car workers have been made unemployed
Car workers have had to be retrained
Car workers have become deskilled
More technical staff have been employed
Work areas are cleaner
There is a healthier environment
Workers have a safer environment
Fewer manual tasks
Q15. Advantages to bank customers of using ATMs rather than going to the bank:
No embarrassment of not having sufficient funds
Less time spent queuing
Can get money any time of day or night
Own bank may be further to travel to than nearest ATM
Can use most ATMs/does not have to be own bank
Have choice of languages so is easier to understand/be understood