ITGS Paper 1 HLSL Markscheme
ITGS Paper 1 HLSL Markscheme
MARKSCHEME
May 2006
INFORMATION TECHNOLOGY IN A
GLOBAL SOCIETY
Paper 1
11 pages
–2– M06/3/ITGSX/BP1/ENG/TZ0/XX/M
Annotation of scripts
Scripts should be annotated to indicate how certain decisions have been made. Use the following codes
only to support judgements:
Annotation Meaning
BOD Marginal point - benefit of doubt given
JE Just enough
NAQ Not answered question
NBOD Marginal point – benefit of doubt not given
NE Not enough
OC Off course
R Repetition
TV Too vague
–4– M06/3/ITGSX/BP1/ENG/TZ0/XX/M
1. (a) Identify two ways in which photo editing software can be used to create a photo of a
situation that never existed. [2 marks]
Award [1 mark] for each method which is clearly identified up to a maximum of [2 marks].
• Superimposition idea: e.g. two or more original photos to appear as one and create a
fictitious situation
• editing / alteration of existing image: e.g. add/erase information.
Reward other acceptable answers with the approval of the team leader.
(b) Describe how such photographs might be verified for their authenticity. [4 marks]
• add authentication code to image file [1 mark] check this against known source
[1 additional mark]
• add additional data about the picture [1 mark] compare with the appearance of the
image [1 additional mark]
• software to tell if image has been altered [1 mark] detects if changes made since
original photo taken [1 additional mark]
• biometric data stored at same time as photo taken [1 mark] compared with data from
suspected fraudster [1 additional mark]
• attempting to locate the original source [1 mark] by typing keywords in an Internet
search engine [1 additional mark]
• open in a photo editing program [1 mark] to look for evidence of merging of more than
one photo [1 additional mark]
• contact the institution or person photographed [1 mark] to verify the truth of the
situation [1 additional mark]
• inconsistencies in photograph [1 mark] example such as colours / shadows / pixellation
/ resolution / logic (item in photo that couldn’t be there in reality) [1 additional mark].
Reward other acceptable answers with the approval of the team leader.
–5– M06/3/ITGSX/BP1/ENG/TZ0/XX/M
(c) Discuss how the enhancement of digitally produced photographs may be misused.
[4 marks]
N.B. To gain any marks, the answer must focus on identified example / examples of misuse.
Answers which are generalised or only refer to methods of photo manipulation score zero.
Reward other acceptable answers with the approval of the team leader.
–6– M06/3/ITGSX/BP1/ENG/TZ0/XX/M
2. (a) Identify two technological developments that have led to the widespread use of wireless
networks. [2 marks]
• Laptop with wireless LAN connectivity (wireless port, wireless PCMCIA, wireless
interface card)
• PDA with a wireless connection, (e.g. Bluetooth, Flash cards)
• Bluetooth
• mobile phones with network connection capabilities / WAP
• development of personal portable computing devices
• development of wireless communication technology
• development of robust network software (including security).
Reward other acceptable answers with the approval of the team leader.
• Mobility: available anywhere with their own computer [1 mark] user can access the
information in the LAN sitting in a café / not restricted to employee’s desk
[1 additional mark]
• less need to install cables [1 mark] office setup can be rearranged at will as there are no
cables physically restricting the movement of desks to accommodate new employees
[1 additional mark]
• no need to pay for personal ISP [1 mark] use of public service provides free access to
the LAN, Internet/email [1 additional mark].
Reward other acceptable answers with the approval of the team leader.
–7– M06/3/ITGSX/BP1/ENG/TZ0/XX/M
(c) Certain files available to users of the wireless LAN may by particularly sensitive or
confidential.
Discuss how the administrator of a wireless LAN could protect specific files on this
network from unauthorized access. [4 marks]
Reward other acceptable answers with the approval of the team leader.
–8– M06/3/ITGSX/BP1/ENG/TZ0/XX/M
3. (a) Identify two technological requirements for people to use Internet telephony. [2 marks]
• headset
• microphone
• VOIP / software that connects caller and person called
• high speed / broadband Internet connections
• analogue to digital input/output devices
• personal computing devices (accept computer)
• sound card
• compression software
• accelerator cards.
Reward other acceptable answers with the approval of the team leader.
(b) Describe one advantage for individuals who use Internet telephony compared with using
a conventional telephone service. [2 marks]
• reduced cost [1 mark] no extra cost apart from regular Internet connection cost whereas
a regular phone call is charged per call [1 additional mark]
• text messaging can be done simultaneously [1 mark] which can be printed whereas a
regular phone call is voice only [1 additional mark]
• record of calls made [1 mark] details stored on own computer of date/ time / user called
/ length [1 additional mark].
• calls can be made from any connected computer [1 mark] no problems with calling
different numbers according to location [1 additional mark].
Reward other acceptable answers with the approval of the team leader.
(c) Describe one disadvantage for individuals who use Internet telephony compared with
using a conventional telephone service. [2 marks]
• computer must be switched on [1 mark] unlike the telephone which rings to alert you to
a call
• potential invasion of privacy [1 mark] digital data is more subject to unauthorised
access compared with the analogue telephone [1 additional mark]
• sender and receiver must have VOIP software and be registered as users [1 mark]
telephones are more common in homes than computers [1 additional mark].
Reward other acceptable answers with the approval of the team leader.
–9– M06/3/ITGSX/BP1/ENG/TZ0/XX/M
(d) Discuss how developments in Internet telephony might affect the nature of the services
offered by conventional and mobile phone (cell phone) providers. [4 marks]
Reward other acceptable answers with the approval of the team leader.
– 10 – M06/3/ITGSX/BP1/ENG/TZ0/XX/M
4. (a) Identify two types of crime that are associated with the widespread use of IT.
[2 marks]
There are endless possibilities for this question. Marking principle: award marks for crimes
that are distinct and feasible. The answers must clearly be IT related.
(b) Describe two pieces of advice that a bank can give to customers to help them avoid such
dangers. [4 marks]
• Don’t disclose PIN / passwords / other details over the web [1 mark] the bank never
requests this via email [1 mark].
• Report scams [1 mark] by forwarding suspicious emails to the bank / other competent
organisation [1 additional mark].
• Don’t click links in emails [1 mark] type in the known URL in the browser address bar
[1 additional mark].
• Look for evidence of site security [1 mark] such as padlock or https [1 additional
mark].
• Evidence of verification [1 mark] such as Veri sign [1 additional mark].
(c) Discuss how it may be possible for a bank to become aware of fraudulent transactions
taking place in its customers’ accounts. [4 marks]
• unusual transactions
• software to detect this
• transactions from countries other than customer’s residence
• customer complains
• serious overdraft.