IT A Level
IT A Level
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
2 Sandeep works for a company which uses software to help protect its computer systems against
malware. The company is looking for additional ways to minimise the effects of malware. Sandeep
and the other workers have already been advised on good practice when logging on and how to
use emails safely.
Describe other methods the company can instruct workers to use so that malware can be
prevented from entering its computer systems.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
3 Most companies use transaction files to update master files in their payroll systems. One part of
the updating process is to calculate weekly or monthly pay. Another part is to update workers’
personal and work details.
Without referring to the calculation of pay, describe the three types of transaction that would
take place when workers’ details are being updated. You must give an example for each type of
transaction.
..........................................................................................................................................................
Example 1: .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Example 2: .......................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Example 3: .......................................................................................................................................
..........................................................................................................................................................
[6]
4 A customer at a supermarket checkout pays for their goods by inserting a card into a chip reader
and entering their personal identification number (PIN). Electronic funds transfer takes place.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
5 Encryption is a method used by organisations to keep data confidential. Symmetric or asymmetric
encryption is used.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]
6 The digital divide affects many people. There can be a divide between older and younger people.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]
7 Spreadsheet models can be used to forecast the population growth of humans.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [8]
8 Maria has been asked to write a word-processed report for her homework. She needs to choose
between using proprietary software and open source software.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [6]
9 Jose has a greenhouse to grow his plants. He lives in a country which has a warm climate so the
greenhouse does not need a heater but has microprocessor controlled windows and a temperature
sensor.
(a) Describe how the sensor represents the temperature so the computer can read the data.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) Complete this pseudocode algorithm to show the processing which takes place to control the
temperature of the greenhouse.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
(c) Discuss the advantages and disadvantages, to Jose, of using microprocessor control in this
scenario.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [8]
10 Companies who store the personal data of individuals use a number of methods to prevent illegal
access to this data.
Apart from preventing illegal access, suggest other methods companies can use to protect the
confidentiality of this data.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [5]