0% found this document useful (0 votes)
51 views5 pages

Ict Assessment Chapter 7 and 8

IGCSE ICT THEORY ASSESSMENT 7 AND 8

Uploaded by

Mr Saem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views5 pages

Ict Assessment Chapter 7 and 8

IGCSE ICT THEORY ASSESSMENT 7 AND 8

Uploaded by

Mr Saem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1 A student has set up a password for his laptop computer.

The password he has chosen is


Px2zY!Cg3?bd

(a) Discuss the benefits and drawbacks of using this password.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

(b) The student could have protected his laptop computer by using two-factor authentication. This
could have combined his password with a biometric method.

State two examples of biometric methods he could use.

1 ........................................................................................................................................

2 ........................................................................................................................................

[2]

2 A systems analyst has been asked to carry out an analysis of a company’s current computer system.

(a) State three methods of analysing the current system.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................

[3]
(b) The systems analyst is working with a team to create some new software. The software
documentation will be stored on the cloud.

Describe how the team can use the cloud to share the documentation.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

3 Tick (3) whether the following advantages of analysing a system refer to looking at existing
paperwork, observation or questionnaires.

Looking
at existing
paperwork Observation Questionnaire
(3) (3) (3)

This method gives the systems analyst


an overall view of the system

Individuals can remain anonymous

This method allows information to be


collected that cannot be obtained from
any other method

This method gives the quickest analysis


of the data

[4]
4 Tawara Tours has created a new online booking system to allow customers to book holidays. The
system was written using modules.

(a) Describe how the new system could be tested prior to it becoming operational.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]
5 Many young people play online games. One problem with online gaming is that it is easy to give
out personal details accidentally. Some users create weak passwords which could lead to their
personal details being accessed.

(a) Name two pieces of personal data that could be accessed.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Write down three rules that should be applied when setting a strong password.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(c) Describe safety measures that should be taken by gamers to ensure their data is safe other
than using strong passwords.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]
6 The owner of Tawara Hotels is planning a new computerised booking system. There are ten Tawara
Hotels throughout the world. The current booking system allows people to book rooms in any of
the Tawara Hotels. He has employed a systems analyst to research the current system and then
install the new system.

(a) When analysing the current booking system, the systems analyst must identify the user
requirements.

Explain why it is important for the systems analyst to do this.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

You might also like