0% found this document useful (0 votes)
18 views9 pages

IT A Level

soal

Uploaded by

Abraham Siregar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views9 pages

IT A Level

soal

Uploaded by

Abraham Siregar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

1 Computers often have utility software supplied with the operating system.

Explain what is meant by utility software and why it is needed.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

2 Sandeep works for a company which uses software to help protect its computer systems against
malware. The company is looking for additional ways to minimise the effects of malware. Sandeep
and the other workers have already been advised on good practice when logging on and how to
use emails safely.

Describe other methods the company can instruct workers to use so that malware can be
prevented from entering its computer systems.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]
3 Most companies use transaction files to update master files in their payroll systems. One part of
the updating process is to calculate weekly or monthly pay. Another part is to update workers’
personal and work details.

Without referring to the calculation of pay, describe the three types of transaction that would
take place when workers’ details are being updated. You must give an example for each type of
transaction.

Transaction type 1: ...........................................................................................................................

..........................................................................................................................................................

Example 1: .......................................................................................................................................

..........................................................................................................................................................

Transaction type 2: ...........................................................................................................................

..........................................................................................................................................................

Example 2: .......................................................................................................................................

..........................................................................................................................................................

Transaction type 3: ...........................................................................................................................

..........................................................................................................................................................

Example 3: .......................................................................................................................................

..........................................................................................................................................................
[6]
4 A customer at a supermarket checkout pays for their goods by inserting a card into a chip reader
and entering their personal identification number (PIN). Electronic funds transfer takes place.

Describe what happens during the electronic funds transfer.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]
5 Encryption is a method used by organisations to keep data confidential. Symmetric or asymmetric
encryption is used.

Explain what is meant by asymmetric encryption.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [5]

6 The digital divide affects many people. There can be a divide between older and younger people.

Describe how this digital divide could be reduced.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [5]
7 Spreadsheet models can be used to forecast the population growth of humans.

Analyse the effectiveness of using a spreadsheet model for this purpose.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]
8 Maria has been asked to write a word-processed report for her homework. She needs to choose
between using proprietary software and open source software.

Describe the differences between these two types of software.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]
9 Jose has a greenhouse to grow his plants. He lives in a country which has a warm climate so the
greenhouse does not need a heater but has microprocessor controlled windows and a temperature
sensor.

(a) Describe how the sensor represents the temperature so the computer can read the data.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Complete this pseudocode algorithm to show the processing which takes place to control the
temperature of the greenhouse.

WHILE system switched on


INPUT temperature
IF temperature > preset
THEN
IF window closed
THEN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]
(c) Discuss the advantages and disadvantages, to Jose, of using microprocessor control in this
scenario.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]
10 Companies who store the personal data of individuals use a number of methods to prevent illegal
access to this data.

Apart from preventing illegal access, suggest other methods companies can use to protect the
confidentiality of this data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [5]

You might also like