Consequences of Uses of Computing Questions
Consequences of Uses of Computing Questions
• Describe what Big Data is, using examples to illustrate your description.
• Explain some of the challenges that Big Data brings with it and the approaches that
can be taken to overcome these, in relation to programming and hardware.
• Consider some of the ethical and legal issues that might arise in applications that
store data, particularly data about people.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 12 marks)
Q2.
A company provides a social media service through which members can share
information about themselves and view information and news from their friends.
The service also displays current affairs news stories to its members. The service does
not have journalists who write the stories but instead it uses algorithms to select news
stories written by other organisations and individuals and shows these. Different news
stories may be shown to different members.
Discuss:
• how algorithms might determine which current affairs news stories to display to an
individual member
• the moral, ethical and legal considerations that the developers of the system and its
operators should consider in relation to how the algorithms work and which news
stories are displayed.
_______________________________________________________________________
Page 1 of 24
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 6 marks)
Q3.
Explain some of the challenges that face legislators in the digital age.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 3 marks)
Q4.
Google have a service called Street View which allows a user to view surroundings from
street-level. Google have extended their Street View service to cover the inside of
buildings such as museums and sports stadiums.
Page 2 of 24
Discuss a range of ethical, legal and cultural issues that Google may have needed to deal
with when extending the service.
(Total 9 marks)
Q5.
Between 2008 and 2010, a company that was gathering data for an online mapping
system, using cars fitted with cameras and WiFi equipment, collected some information
that was being transmitted on personal WiFi networks. The company apologised for doing
this and an investigation found that a small number of software developers had been
responsible for adding this functionality to the mapping system data collection software.
In your answer you will be assessed on your ability to follow a line of reasoning to produce
a coherent, relevant and structured response.
(Total 12 marks)
Q6.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(b) Do you believe that a computer will ever be as intelligent as a human being?
Tick one row in the table below to indicate your opinion, then, in the space
underneath the table, give reasons for this. Marks will be awarded for the
development of a reasoned justification of your opinion.
Page 3 of 24
Reasons___________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(3)
(c) (i) Some people say that a hacker is someone who loves to program or who
enjoys playful cleverness, or a combination of the two.
______________________________________________________________
______________________________________________________________
(1)
______________________________________________________________
(1)
(iii) Identify two reasons why it is difficult to identify and catch computer hackers.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
(2)
(Total 9 marks)
Q7.
(a) Below is a numbered list of the names of some of the legislation that applies in
situations where computers are used:
Page 4 of 24
For each of the situations given below, identify the relevant legislation which is being
followed. Write the number that corresponds to the appropriate legislation in the box
given after each situation.
Marcus wanted an MP3 of a recent song so he went to an online music store. After
paying he was able to immediately download the purchased song.
Legislation
Legislation
Mr Smith hands over his 50-character encryption key in response to a request from
the authorities investigating a fraud case.
Legislation
(3)
(b) The operators of a number of multi-storey car parks have installed systems to scan
and recognise number plates. The system is used at both the entrance and exit of
the carparks so that the arrival and leaving times can be recorded.
Customers can set up an account so that money is automatically debited when their
car number plate is recognised as the car leaves the car park.
Customers who do not have an account can use their mobile phones to pay the car
parking fees by sending a text message to a specified number with their number
plate details and length of stay.
As these car parks are based around the UK the company also collects location-
specific data.
(i) The number plate recognition system uses CCTV cameras and OCR software.
What is the full name of the technique known by the abbreviation OCR?
______________________________________________________________
(1)
(ii) The company will need to follow the Data Protection Act as they will be storing
personal data.
______________________________________________________________
(1)
(iii) Why might the storing of number plate details, mobile phone numbers and
location-specific data be a concern for privacy campaigners?
______________________________________________________________
Page 5 of 24
______________________________________________________________
______________________________________________________________
______________________________________________________________
(2)
(Total 7 marks)
Q8.
A school has recently launched a ‘Parent Portal’ which is a website that provides
information from the school. By logging on to the portal a parent can access the
information that is stored about their son or daughter. This information includes academic
reports, discipline records and other personal data.
(a) A parent recently contacted the school because he was concerned that when he
logged on to read his daughter’s report he could access the reports of all the other
students.
The school should immediately look into this concern as a law has been broken.
State the full name of the law that has been broken.
___________________________________________________________________
(1)
(b) Which principle of the law identified in your answer to part (a) has been broken?
___________________________________________________________________
___________________________________________________________________
(1)
(c) State another principle of the law identified in your answer to part (a).
___________________________________________________________________
___________________________________________________________________
(1)
(d) A parent also noted that the website was using HTTP (HyperText Transfer Protocol).
Why should the school be concerned about the use of this protocol and which
protocol would you recommend that the school should use instead?
___________________________________________________________________
(e) The process of writing reports and then allowing access to these reports via the
parent portal involves the use of many different categories of software.
Page 6 of 24
application software, General purpose application software
Complete Table 1 by writing the correct category from the list above in the Category
column next to the appropriate Software.
Table 1
Software Category
Q9.
Students often search online for music files and then download them to their computer,
mobile phone or music player.
(a) State the full name of the law that students might have broken by downloading
music files in this way.
___________________________________________________________________
(1)
(b) State two arguments against music being available for free on the Internet.
Your answers should not refer to the law asked for in part (a).
Argument 1 _________________________________________________________
___________________________________________________________________
Argument 2 _________________________________________________________
___________________________________________________________________
(2)
(c) Many websites now offer the ability to download music files which are without any
DRM(Digital Rights Management) protection.
State two advantages to students of DRM-free files over files that have DRM
restrictions.
Advantage 1 ________________________________________________________
___________________________________________________________________
Advantage 2 ________________________________________________________
Page 7 of 24
___________________________________________________________________
(2)
(Total 5 marks)
Q10.
An ICT technician at a secondary school has access to a variety of programs that she
uses to manage a group of servers.
(a) State one use for each of the protocols listed below.
(iii) POP3:_________________________________________________________
(1)
(b) Whilst remotely connecting to one of the servers the technician executes a
command that displays the current network connections. The table below shows
these network connections.
(ii) Port::
__________________________________________________________
(1)
(c) State two reasons why the technician uses remote management software from her
computer rather than going to the actual servers.
Reason 1: __________________________________________________________
___________________________________________________________________
Reason 2: __________________________________________________________
Page 8 of 24
___________________________________________________________________
(2)
(Total 8 marks)
Q11.
You have been asked to design and set up a computer work area for the employees of a
library.
(a) State the legislation that is concerned with how the work area should be physically
set out and state two ways that this legislation will affect the design.
Legislation: _________________________________________________________
Affect 1: ____________________________________________________________
___________________________________________________________________
Affect 2: ____________________________________________________________
___________________________________________________________________
(3)
(b) Application software has already been installed onto computers in another room.
(i) State the full name of the law that may be broken by installing the same
software onto the new computers.
______________________________________________________________
(1)
(ii) What information should you find out before installing this software to ensure
that you will comply with the law identified in part (i)?
______________________________________________________________
______________________________________________________________
(1)
(c) As soon as an employee logs onto one of the computers they have to agree to the
Code of Conduct relating to their use of the computer system.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(1)
(Total 6 marks)
Q12.
There are various formats of optical storage media currently available.
Page 9 of 24
(a) Choose the most appropriate medium from the list below that would be best suited
to the purpose given. Write your answer in the Medium column in the table below.
You must not use the same medium more than once.
Purpose Medium
(b) Describe how data is written to and read from a CD-R disk.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(3)
State two reasons why in 20 years’ time it might be impossible to open up these
documents.
Reason 1: __________________________________________________________
___________________________________________________________________
Reason 2: __________________________________________________________
___________________________________________________________________
(2)
(Total 9 marks)
Q13.
An Internet Service Provider (ISP) has instructed a firm of solicitors to investigate the
download activities of the ISP’s clients.
___________________________________________________________________
Page 10 of 24
___________________________________________________________________
(1)
(b) The clients under investigation are alleged to have downloaded music files from a
file-sharing site.
The ISP wishes the firm of solicitors to investigate whether any laws have been
broken.
State the full name of the law which might have been broken by the clients
downloading music files.
___________________________________________________________________
(1)
(c) The ISP stores personal data concerning each of its clients.
___________________________________________________________________
___________________________________________________________________
(1)
(d) The firm of solicitors discovers during their investigation that the same clients have
been downloading personal data relating to other clients of the ISP without
authorisation.
(i) State the full name of the law that may have been broken by the ISP.
______________________________________________________________
(1)
(ii) State the full name of the law that may have been broken by the clients.
______________________________________________________________
(1)
(Total 5 marks)
Q14.
A well established use for robots in industry is the spraying of car bodies on a car
production line.
She has identified some of the inputs into the control system already:
• detailed map
Page 11 of 24
• forces on accelerator and brake pedals.
Discuss why automated car control is a harder programming problem to solve than
developing programmed control of a robot for spraying car bodies on a car production line.
For full marks your discussion must cover both programming problems.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 4 marks)
Q15.
(a) If you borrow a shop bought music CD and “rip” (copy) the tracks to your hard disk
before you give the CD back to your friend, you have probably broken a law.
___________________________________________________________________
(1)
(b) Alternatively, you could download music from an official music website on the
Internet. The website owners might protect this music using Digital Rights
Management.
Give two examples of how Digital Rights Management could prevent you from
sharing downloaded music with a friend.
1. _________________________________________________________________
___________________________________________________________________
2. _________________________________________________________________
___________________________________________________________________
(2)
(Total 3 marks)
Page 12 of 24
Q16.
What are machines good and bad at, in comparison to humans?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 4 marks)
Q17.
___________________________________________________________________
___________________________________________________________________
(1)
(b) Explain why a robot is suited to completing the task that you have identified in part
(a).
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 3 marks)
Q18.
Discuss the arguments for and against the use of Digital Rights Management (DRM) to
protect digital music and videos.
In this question you will also be assessed on your ability to use good English and to
Page 13 of 24
organise your answer clearly in complete sentences, using specialist vocabulary where
appropriate.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 6 marks)
Q19.
A company that develops computer software has just taken on a new employee.
(a) The actions of the employee and company are covered by several laws.
Name the law that would be most relevant in each of the following cases.
(i) The employee brings into work a copy of a computer game that he has
purchased and already installed on his home computer. He installs it on his
work computer.
______________________________________________________________
(1)
______________________________________________________________
(1)
(iii) The company issues the employee with a voucher once a year for a free eye
Page 14 of 24
test.
______________________________________________________________
(1)
(b) The company makes the employee sign a Code of Conduct before he is allowed to
start work.
______________________________________________________________
______________________________________________________________
______________________________________________________________
(2)
(ii) Why does the company have a Code of Conduct rather than just expecting
employees to obey the law?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
(2)
(Total 7 marks)
Q20.
Imagine that you are a computer programmer in a company that stores personal data. The
company must comply with the Data Protection Act.
___________________________________________________________________
___________________________________________________________________
(1)
State one principle of the Data Protection Act that could be met by the careful
design of your program.
___________________________________________________________________
___________________________________________________________________
(1)
(c) Name one feature that you could include in your program and describe how it would
help the company comply with the principle stated in part (b).
Page 15 of 24
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 4 marks)
Q21.
A company sells music to its customers over the Internet. The music can be downloaded
as files and saved on the user’s computer. It is protected by Digital Rights Management
(DRM).
(a) What is DRM and why does the company use it to protect the music that it sells?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(3)
(b) Explain how the company could use DRM to protect its music.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 5 marks)
Q22.
Page 16 of 24
(a) Describe what is meant by a robot.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(b) Illustrate your answer to part (a) with an example application of where robots are
used and why.
Application: _________________________________________________________
Why: ______________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 4 marks)
Q23.
A company stores all its data in an on-line information retrieval system. Some of this data
is personal data about the employees; some of it is confidential data about the business.
All staff have authorised access to those parts of the system which they need to carry out
their job role.
(a) (i) Describe two distinct steps that should be taken to minimise unauthorised
access by staff to those parts of the system they have no need to access in
order to carry out their job role.
1. ____________________________________________________________
______________________________________________________________
2. ____________________________________________________________
______________________________________________________________
(4)
______________________________________________________________
______________________________________________________________
(1)
(b) What safeguards should be used to keep the data protected from loss or corruption
due to:
(i) Hackers
Page 17 of 24
______________________________________________________________
(1)
(ii) Viruses
______________________________________________________________
(1)
______________________________________________________________
(1)
(c) Describe one further safeguard which needs to be in place to enable the company
to get back into operation swiftly and effectively after a serious problem causing a
complete system failure.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(1)
(Total 9 marks)
Q24.
An architect has been asked to design a ‘smart’ home using components of a computer-
controlled home automation system, for a client who uses a wheelchair. The client cannot
stand easily and has limited use of their arms.
For three of the above devices, state the device and explain its use for a home
automation system and why it would help the client.
Device 1: _______________________________________________________________
Use: ___________________________________________________________________
_______________________________________________________________________
Why: __________________________________________________________________
_______________________________________________________________________
Device 2: _______________________________________________________________
Page 18 of 24
Use: ___________________________________________________________________
_______________________________________________________________________
Why: __________________________________________________________________
_______________________________________________________________________
Device 3: _______________________________________________________________
Use: ___________________________________________________________________
_______________________________________________________________________
Why: __________________________________________________________________
_______________________________________________________________________
(6)
(Total 6 marks)
Q25.
(a) Spam is unwanted advertising e-mail. It has been estimated that it accounts for
more than half of e-mail traffic. Explain three different unwelcome consequences of
spam; one social, one economic and one ethical.
Social _____________________________________________________________
___________________________________________________________________
(2)
Economic
___________________________________________________________
___________________________________________________________________
(2)
Ethical _____________________________________________________________
___________________________________________________________________
(2)
___________________________________________________________________
(1)
(Total 7 marks)
Q26.
Computer software is protected by the Copyright, Designs and Patents Act 1988,
amended by subsequent legislation.
___________________________________________________________________
Page 19 of 24
___________________________________________________________________
(1)
(b) Under the terms of the licensing agreement, what is a purchaser legally entitled to
do with the purchased PC software?
___________________________________________________________________
(1)
(c) Give two ways a purchaser might wish to use the purchased PC software, which are
forbidden under this legislation.
1. _________________________________________________________________
___________________________________________________________________
2. _________________________________________________________________
___________________________________________________________________
(2)
(Total 4 marks)
Q27.
A company backed by the UK government has been set up to provide on-line degrees
from UK universities. All study material, tutorials and assessment will be on-line.
Students, aged 18 to 80, from all over the world have registered to study courses.
Businesses are also being encouraged to take advantage of this scheme for the
continuous professional development of their employees.
______________________________________________________________
______________________________________________________________
(1)
(ii) students living overseas for registering with such a course of study;
______________________________________________________________
______________________________________________________________
(1)
______________________________________________________________
______________________________________________________________
(1)
(b) Certain hardware and software are specifically required to study in this way.
Page 20 of 24
hardware; __________________________________________________________
software. ___________________________________________________________
(2)
(Total 5 marks)
Q28.
A well-known software company has constructed a media player to query an on-line
database at the company’s headquarters. It retrieves the titles of tracks on audio CD’s for
display in the media player’s window. In the process it assigns a unique identifying digital
fingerprint to the computer playing the audio track.
In a separate transaction, the company can then link this digital fingerprint to an e-mail
sent from the same computer. This links the user’s e-mail address to the music interests
of the user for marketing purposes.
______________________________________________________________
______________________________________________________________
______________________________________________________________
(1)
______________________________________________________________
______________________________________________________________
______________________________________________________________
(1)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(1)
(Total 3 marks)
Q29.
The United Kingdom’s National Health Service was created to provide health care to the
nation through:
• hospitals
• health centres/GPs’ (doctors’) surgeries
• pharmacies (chemists).
The UK government is proposing to computerise and network the entire National Health
Page 21 of 24
Service (NHS) so that it will be possible to have on-line access to the system at a level of
security relevant to their status for anyone who
• Every person in the UK is assigned a unique numeric key, the patient reference
number, and is assigned for primary health care to a doctor in a health centre or a
GPs (General Practitioner’s or doctor’s) surgery located in a single building.
• A person’s doctor may, if necessary, arrange for the person to see a specialist doctor
in a hospital.
• Drugs prescribed for a person by the person’s GP for the treatment of an illness are
obtained from a pharmacy.
• Every computer in the service of the NHS will be interconnected in local area
networks (LANS) and the local area networks will be interconnected by a wide area
network (WAN).
Which network type is most appropriate, WAN or LAN, within a health centre or GPs
(doctor’s) surgery? Justify your choice.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Q30.
Electronic Funds Transfer (EFT) makes it possible for a company in the UK to pay for
goods manufactured in Malaysia without needing physically to exchange money in the
form of coins, notes or cheques. The transfer is carried out electronically by messages
sent between the company’s bank and the supplier’s bank.
(a) Why must EFT systems be available for use 24 hours a day?
___________________________________________________________________
___________________________________________________________________
(1)
(b) EFT messages are encrypted before being sent. Give one reason why this is done
in this context.
___________________________________________________________________
___________________________________________________________________
(1)
(c) Some governments have passed laws that require banks to lodge with them the
encryption keys that are used to decrypt EFT messages. Give one reason why this
is done.
Page 22 of 24
___________________________________________________________________
___________________________________________________________________
(1)
(Total 3 marks)
Q31.
In some countries government agencies routinely monitor the content of e-mail routed
over the Internet.
(a) Give two reasons why some governments may allow this to happen.
1. _________________________________________________________________
___________________________________________________________________
(1)
2. _________________________________________________________________
___________________________________________________________________
(1)
(b) Suggest one way in which an individual may make it difficult for any such agency to
read the content of a particular e-mail sent over the Internet.
___________________________________________________________________
(1)
(Total 3 marks)
Q32.
A company has all its records stored on the company’s networked computer system which
is also connected to the Internet. State three distinct ways in which the company’s data
might be corrupted or lost, and for each of the three suggest how the company could
protect itself.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Page 23 of 24
_______________________________________________________________________
_______________________________________________________________________
(Total 6 marks)
Page 24 of 24