0% found this document useful (0 votes)
43 views6 pages

ICT Answers

Uploaded by

Aye Chan Thit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views6 pages

ICT Answers

Uploaded by

Aye Chan Thit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

334 ANSWERS

ANSWERS CHAPTER 2
1 ▶ A piece of software you can use to carry out specific tasks
that are not related to the operating system (1).
CHAPTER 1
2 ▶ Any three from: backup (1); anti-virus (1); defragmentation
1 ▶ Barcodes save time (1). (1); compression (1); disk management (1).
OR
3 ▶ The operating system allows the user to control and
Barcodes ensure that fewer errors are made when
manage (1) the computer’s hardware (1).
entering product ID numbers (1).
2 ▶ These devices are designed to be portable (1). 4 ▶ So that backup processes can be completed when the
system is not in use (1) to avoid file conflicts (1).
3 ▶ The charge cannot be reduced on the capacitive layer (1)
because wool is not a conductive material (1). (The charge 5 ▶ Compression utilities can free up storage space (1) by
is usually drawn away by touch, thereby reducing the reducing the amount of data (1) needed to store a file.
charge held in the capacitive layer.) 6 ▶ By allowing the user to create slides that contain content
4 ▶ Any three from: a burglar alarm (1); a web server (1); an (1) that support (1) their talk.
engine management system (1); a home heating system 7 ▶ Several answers. For example: Control software could be
(1); many other examples. used in manufacturing factories (1) to control robots on a
5 ▶ Laser printers are faster (1) and produce each copy more production line (1).
cheaply (1) than inkjet printers. 8 ▶ Several answers. For example: Building companies must
6 ▶ Any two from: architecture (1); product design (1); adhere to scheduled timelines because multiple resources
cartography (1); engineering (1). such as materials and personnel such as electricians
7 ▶ To reduce the impact (1) on the environment (1) when the need to be coordinated in sequential phases which are
finished models are discarded (1). dependent upon each other. This ensures that the project
hits targets, and forecasts for completion can be provided,
8 ▶ Several answers. For example: An accelerometer (1),
with progression monitored so that stakeholders (such as
used to detect ‘tilt’ in a game (1), and a light sensor (1),
homeowners) can be updated with the progress of the project.
used to alter the brightness of a screen to match the
environmental light conditions (1). 9 ▶ Any three from: web browser (1); social media (1); SMS
(1); email (1); MMS (1); instant messaging (1).
9 ▶ Several answers. For example: Sensors are used in cars for
many reasons. Some examples include detecting whether 10 ▶ Any two from: fixing security vulnerabilities or bugs (1);
doors are open, whether seatbelts are secured, whether increasing compatibility with newer operating systems (1);
passengers are in their seats and whether it is dark outside. improving performance and efficiency (1); introducing new
This type of feedback on the environment can be useful features (1); improving usability (1).
to the driver, so that they know what is around the car.
For example, the car could use distance sensors to help CHAPTER 3
drivers to park or avoid collisions. Similarly, cars could use
1 ▶ Read Only Memory (1).
light sensors under the car to help drivers know if they are
moving out of a lane on a road and the car’s computer 2 ▶ Random Access Memory (1).
could trigger an alarm to alter the driver’s course. 3 ▶ Increasing the amount of RAM means that more programs
The use of sensors can take some of the need to think away can be open at the same time (1) without needing to use
from the driver, allowing them to concentrate on the driving. virtual memory from storage (1), which has slower access
Sensors can also produce reactions that are quicker than a times than RAM (1).
human’s, therefore increasing road safety. However, sensors
4 ▶ Virtual memory is an area of secondary storage (1) used
(and the computers to which they are linked) are not good
to store data when the computer system does not have
at making ethical decisions and so, if they sensed a person
enough space in RAM (1).
in the road ahead, they may not be able to decide whether
to steer off the road and maybe crash into a wall (potentially 5 ▶ Any three from: volatile (1); instructions can be swapped
injuring the driver) or crash into the person crossing the in and out or temporarily stored (1); used for temporary
road, potentially injuring the pedestrian. storage (1); upgradable (1).
In summary, sensors can be very useful, but humans will 6 ▶ Flash memory does not have any moving parts (1), so it
always need to take responsibility for their actions and has low power consumption (1). It also means that it is
should not become complacent when in charge of a vehicle. less susceptible to data loss (1) if the device is knocked or
10 ▶ Console games use detailed graphics (1), which use a lot shaken (1).
of data and therefore data storage (1). 7 ▶ A The number of times per second that a processor can
OR: carry out instructions (1).
Optical media is required because download sizes would
be too big (1) and Blu-ray media has the greatest capacity
of all optical formats (1).
CHAPTER 4
1 ▶ a Infra-red signals cannot travel as far as Bluetooth signals
(1) and the console is sometimes not in range (1).

Z01_EDICT_SB_IGCSE_88931_ANS_334-339.indd 334 29/08/2017 11:38


ANSWERS 335

OR 7 ▶ Any two from: passwords (1); PINs (1); biometrics (1).


Infra-red requires line of sight (1) and the controller is 8 ▶ Domain name spoofing (1) and redirecting traffic (for
often pointed away from the console when in use (1). example, using malware) (1).
b Loss of connection would give the user a bad 9 ▶ It can be slower to backup (1) because the connection
experience (1). to the internet provides less bandwidth than a local data
2 ▶ Parts of a video file are downloaded to a buffer (1), which connection (1).
is then topped up (1) as the video plays (1).
3 ▶ The user does not have to wait (1) for the full file to be CHAPTER 7
downloaded (1) before it can be played (1).
1 ▶ C Streaming (1).
4 ▶ Several answers. For example: USB (1), Ethernet (1) and
HDMI (1). 2 ▶ Any two from: no need to travel to work (1); no stress
caused by traffic or public transport delays and
5 ▶ B WAN (1). overcrowding (1); saves money (1); reduces impact on
6 ▶ People play games with others from all round the world (1) the environment (1); employees can spend more time
and they want to avoid lag (1) caused by latency (1). working because they spend less time travelling to work
(1); no need to wear uniform or business clothes, reducing
CHAPTER 5 employees’ costs (1); employees can work at a time that
suits them (1); employees can work on tasks for longer
1 ▶ B Gateway (1). periods of time without distractions from colleagues
2 ▶ Public key encryption does not use the same key (1) to or scheduled meetings (1); employees can work in a
encrypt and decrypt the data (1). comfortable environment (1); employees can organise
their work around social or family commitments (1).
3 ▶ Firewall (1).
3 ▶ Any two from: there may be concerns about data security
4 ▶ IP address (1) and MAC address (1).
(1); it can be more difficult to manage and support
5 ▶ IPv4 did not provide enough unique addresses (1) to employees who are not in the office (1); employees
service the number of devices being connected to the working at home might not work as hard as employees in
internet (1). an office (1); it can be complicated to organise payments
6 ▶ Any two from: working from home (1); avoiding geolocation and permissions for employees in different countries (1).
rights management (1); making secure payments (1). 4 ▶ Body language (1) is not always visible online (1) so
7 ▶ A booster is used if the network signal has a limited range (1). people do not practise using and reading body language
and other social and emotional cues (1).
8 ▶ Data is scrambled (1) using a key (1), meaning that it can
only be accessed by other users with the key (1). 5 ▶ Bullies can remain anonymous (1), making the bully feel as
though they can behave more inappropriately (1).
9 ▶ Any three from: logins/passwords (1); firewalls (1);
OR:
encryption/VPN (1); file access rights (1).
Bullies can remain anonymous (1), which removes victims’
10 ▶ Any three from: access to shared peripherals (1); access ability to control the situation (1).
to shared storage and data (1); ability to use any device on
the network (1); streaming media such as movies, music 6 ▶ Working together (1).
and games (1); ability to send messages and files to others 7 ▶ Any three from: economy and infrastructure (1); location
on the network (1); shared access to the internet (1). (1); politics (1); religion (1); disability (1); social factors such
11 ▶ Several answers. Ask your teacher to check your diagram. as age, gender, education and income (1).
8 ▶ Any three from: entertainment and leisure (1); shopping
CHAPTER 6 (1); education (1); banking (1); tax (1); applications for
1 ▶ C Firewall (1). driving licences (1).

2 ▶ Characters cannot be read or interpreted (1) by an 9 ▶ It has helped build strong communities (1) using social
automated computer program (1). media (1).
It has increased access to the global society (1) at the
3 ▶ To gain users’ personal information without their expense of their local societies (1).
permission (1).
10 ▶ The gap has been made wider (1) because the internet
4 ▶ Any three from: card number (1); expiry date (1); start date has increased the amount of information available to the
(1); name of the cardholder (1); CSC (1). information rich (1).
5 ▶ A differential backup saves a copy of all files that have 11 ▶ Several answers. For example: The internet provides
changed since the last full backup (1). An incremental more opportunities for us to socialise by allowing us to
backup saves a copy of only the files that have changed connect with each other using global communication
since the last full or incremental backup (1). services such as instant messaging and social networks.
6 ▶ Encryption ensures that unauthorised users cannot read We can communicate at any time of the day with friends
data (1) without the key (1). from around the world and make use of the ability to
connect data from different account profiles to create

Z01_EDICT_SB_IGCSE_88931_ANS_334-339.indd 335 29/08/2017 11:38


336 ANSWERS

new connections with people we have never met. We user’s work and education (1); travel history (1); family
use social features in many services, such as when we details such as relationship status, family members and
are watching television, using television as a ‘back- pets (1); contact information such as telephone number,
channel’ line of communication to comment upon, rate email address and website (1); profile and background
and discuss live television programmes and news. This images, colour schemes and designs (1).
allows us to access more than one point of view about 6 ▶ To allow users to share URLs (1).
the issues being shown on the news. We also use social
features of the internet when shopping and learning in 7 ▶ Any three points from: Because the organisation’s workers
order to get more than one perspective, keep informed will be located in different countries (1), which would
of new developments and gain a wider perspective on make communicating and collaborating on work more
the world. However, some people’s use of the internet difficult or expensive to organise and time consuming (1)
means that they are not in touch with the real-world due to differences in time zones and the costs and time
communities in their local geographical area, leading to associated with travelling (1). They would also benefit
the disintegration of those communities. Some people from having centralised resources such as virtual meeting
become so engrossed in online communication that they spaces, shared documents and shared online calendars (1).
lose the skills that they need to communicate with people 8 ▶ By matching (1) information shared by members (1).
in the real world. Some people also argue that, despite
9 ▶ By matching (1) information shared by members (1).
the wide variety of social groups available to individuals,
the ones you tend to join are those which share your 10 ▶ Any four from: students can access resources (1);
views, as that is often how suggestions are made based students can interact with teachers (1); students can get
on users’ profiles. This means that individuals who think notifications of assignments and grades (1); students can
they are joining in with a wider community are simply chat with classmates and share ideas and research (1);
reaffirming their own opinions, so they do not actually students can get immediate feedback from automatically
come to understand and integrate with the wider social marked quizzes (1); students can collaborate on
communities available to them via the internet. In assignments with other students and teachers (1).
conclusion, there is a wide variety of social interaction 11 ▶ Rate/like/upvote (1); share/repost (1); comment/quote (1).
available thanks to the internet, but people need to
12 ▶ Answers should discuss: cost of and need to protect their
understand the ways in which they are connected to
safety; companies sharing users’ personal information;
others to truly understand how to make the most of the
targeted marketing; cost to users’ privacy.
opportunities that are available to them.
12 ▶ Keep personal information private (1) by being careful
what is shared and by using privacy settings to control CHAPTER 9
access to personal profiles (1); block people, especially 1 ▶ C Using an RCD (1).
strangers (1), who are offensive or whose behaviour
is concerning (1); report (1) inappropriate behaviour to 2 ▶ They have reduced the cost of technology (1) so that more
relevant authorities (1). people can afford digital devices (1).
13 ▶ The use of the internet provides another method (1) 3 ▶ Location sharing has an impact upon their privacy (1)
of unauthorised access (1) to the data held by the because their location could be shared with other people with
organisation (1). whom they do not actually want to share their location (1).
4 ▶ Any three from: music (1), e-books (1), video (1), apps (1).

CHAPTER 8 5 ▶ Several answers. For example: CCTV (1) can be used to


watch people (1); ANPR (1) can trigger alerts for police
1 ▶ D Acceptable use policies (1). (1); ID, travel or bank cards (1) can be tracked when
2 ▶ Tags are used to categorise (1) information so that it can scanned at terminals or used in transactions (1); IP or
be located more easily (1). MAC addresses (1) can be identified on networks (1); GPS
3 ▶ Sharing increases the reach of content (1) and encourages position (1) can be broadcast to apps (1).
members to be more active users of the service (1). This 6 ▶ To make them the only people who can legally use and
means that they provide the service with more information distribute their work (1) and to prevent people from
(1), which the service can then use to sell marketing making a profit by using their work (1).
opportunities to advertisers (1). 7 ▶ Several answers. For example: It can help parents keep their
4 ▶ Any three points from: Different levels of user children safe (1); It can help friends to find each other (1).
responsibility can be set (1) so that people can be 8 ▶ Several answers. For example: It can help parents see
responsible for quality checking members and their posts what their children are saying online to keep them safe (1);
(1) to ensure that the policies are being followed (1), block It can help governments protect individuals by identifying
posts or enforce sanctions such as banning members potential criminals (1).
from the community (1).
9 ▶ It reduces their privacy (1).
5 ▶ Any three from: biographical details such as name,
gender, date of birth, location and language (1); an ‘about 10 ▶ Any three from: ask people for consent (1); use data
you’ or short description of the user (1); details about the appropriately (1); use data only for the specified purpose
(1); use data fairly and lawfully (1); use data for limited,

Z01_EDICT_SB_IGCSE_88931_ANS_334-339.indd 336 29/08/2017 11:38


ANSWERS 337

specifically stated purposes (1); use data in a way that is because they can restrict access to bidders with good
adequate, relevant and not excessive (1); ensure that data ratings who are more likely to complete the purchase (1).
is accurate (1); keep data for no longer than is absolutely
necessary (1); handle data according to people’s data 5 ▶ It uses encryption (1) which stops data, such as people’s
protection rights (1); keep data safe and secure (1); if financial information, being read (1) by unauthorised
in the EU, not transferring data outside the European users (1).
Economic Area without adequate protection (1). 6 ▶ There is no need to check in at a check-in desk at the
11 ▶ Several answers. Should include up to four linked airport (1), which saves passengers time (1).
points from: online storage and apps are based in large 7 ▶ EITHER: Their use affects users’ privacy (1).
data centres (1) which use lots of energy (1) to cool the OR: Users’ experience is based on decisions made by
servers (1) and power the servers (1). This energy could computer code rather than on choices that they make (1).
be created by using non-renewable energy (1), in order 8 ▶ Any three from: time and date of the transaction (1); IP
to avoid depleting the planet’s natural resources and addresses (1); referring website (1); the products and
contributing to climate change (1). services previously viewed or bought (1); categories
12 ▶ Several answers. For example: Recycle their devices (1) so of products and services previously viewed or bought
they do not leak toxins (1) which can cause health risks to (1); items added to online shopping basket (1); buttons
plants, wildlife and people (1). pressed (1); data entered into web forms, such as name
and address (1); any other sensible response.
CHAPTER 10 9 ▶ Session cookies are only stored while the browser has the
site open or until the browser closes the site. Persistent
1 ▶ D “” (1).
cookies are stored after the browser closes the site.
2 ▶ Any two from: size (1), colour (1), type (1), time and date
10 ▶ The use of notifications or alerts (1).
(1), usage rights (1).
11 ▶ Several answers. Relevant points include: Organisations
3 ▶ It might not represent the issue in full (1).
use cookies to track the transactions that individuals
4 ▶ A search engine compares (1) words or phrases entered carry out online, such as the websites that they visit.
by a user (1) against a database of pages (1) and returns This browsing history can then be used by organisations
the URLs or descriptions of those that match (1). to target their marketing and create a personalised
5 ▶ You might infringe others’ rights (1), leading to ethical and experience for users. Although some people find this
legal issues (1). useful, other people do not like the fact that their online
activity is tracked and monitored; as they believe this to
6 ▶ It shows that the student understands the meaning of the
be intrusive and to have a negative effect on their privacy.
information (1).
They do not like the ways in which these systems are
7 ▶ AND (+) (1), NOT (-) (1), phrase matching (“”) (1). used to decide the content people are shown and say that
8 ▶ Table 10.3 Identifying primary and secondary sources they would prefer to decide this themselves as it may limit
or narrow their experience.
Source Primary or
secondary? CHAPTER 12
A podcast that you have created Primary (1) 1 ▶ C Server (1).
A video of a discussion that you have with an Primary (1) 2 ▶ Any three from: automatic backup (1); greater scalability
expert (1); enables sharing data (1); cheaper than local storage
or even free (1); makes collaboration possible (1); reduces
Your own copy of a film Secondary (1) use of local storage making more space for locally
Notes that you take while visiting a museum Primary (1) installed software (1).
A book that you borrow from someone Secondary (1) 3 ▶ Any three from: shopping or auction sites (1); booking
systems (1); banking services (1); education services
An image that you download from the internet Secondary (1) such as VLEs and MOOCs (1); gaming (1); news and
Your own recording of a radio broadcast Secondary (1) information (1); entertainment services such as on-
demand television (1).
CHAPTER 11 4 ▶ Online storage and/or applications that are hosted on
online servers (1).
1 ▶ A Paying in cheques (1).
2 ▶ Any two from: VLEs (1), online support (1), remote access CHAPTER 13
to journals and books (1).
1 ▶ A Image (1).
3 ▶ Several answers. For example: basket (1), product
2 ▶ If there is not enough white space (1), the information
catalogue (1), checkout (1).
could appear cramped (1).
4 ▶ EITHER: It helps sellers know which buyers they can trust
3 ▶ Several answers. For example: number data (1) is turned
(1) to pay for items (1).
into information through the creation of graphs or charts (1).
OR: It stops sellers having to relist (1) unpaid-for bids

Z01_EDICT_SB_IGCSE_88931_ANS_334-339.indd 337 29/08/2017 11:38


338 ANSWERS

4 ▶ Spelling error because should be spelled ‘supposed’ (1); beneath each other on the z axis (1).
grammar error because the sentence should end with 4 ▶ Pixels (1).
a question mark (?) (1); contextual error because ‘two’
should be given as ‘to’ (1). 5 ▶ Vector graphics often look stylised or unnatural (1).

5 ▶ A house style ensures that documents are consistent (1), 6 ▶ Any two from: Erase tool (1); Cropping (1); Recolouring or
which helps to create a brand or corporate identity (1). airbrushing (1).

6 ▶ A typeface that adds a short line, known as a serif, to the


ends of some letters (1). CHAPTER 17
7 ▶ A low-resolution screen may not be able to display the 1 ▶ D High contrast between background and text (1).
serif details and make the text difficult to read (1).
2 ▶ The slide master layout is applied to all slides in the
8 ▶ Green (1). presentation (1).
9 ▶ One from: colour-blindness (1), partial-sightedness (1). 3 ▶ One from: It may distract the audience (1); The audience
10 ▶ Spell checkers do not always pick up all errors (1). might not listen to the speaker (1).
4 ▶ Bold (1), underline (1) and italic (1).
CHAPTER 14
5 ▶ To emphasise the changes (1) between slides (1).
1 ▶ C School_Logo_v1.02 (1).
6 ▶ One from: Use images that represent the text (1);
2 ▶ Any three marks from: To prevent data loss (1) if the Summarise points into bullet points (1).
computer crashes or loses power (1), because until data
is saved in secondary storage (1) it is stored in RAM (1), 7 ▶ One from: To provide navigation (1) because some users who
which is volatile (1). will not have access to keyboard and mouse (1); To provide
navigation (1) because presentations are often published in
3 ▶ It enables you to go back to previous versions (1). kiosk mode for use with a touchscreen interface (1).
4 ▶ Several answers. For example: .pdf (1), .ppsx (1), .jpeg (1). 8 ▶ Any two from: URLs (1); Slides (1); Local files (1); Email
5 ▶ It allows the user to set the version (1), date (1) and build addresses (1).
number for that date (1). 9 ▶ Handouts (1), full page slides (1) and notes pages (1).
6 ▶ Add a password (1). 10 ▶ Any two of: It can help a speaker to time their
7 ▶ Exporting files saves them in a format that cannot be presentation (1) by displaying timings (1); Speakers
edited (1). can prepare for the next slide (1), which is displayed as
a thumbnail (1); Notes for the slide are displayed (1),
CHAPTER 15 allowing the speaker to use them to introduce animations
at the correct point (1).
1 ▶ D Newsletter (1).
2 ▶ If words are used out of context (1) but spelled correctly
(1), they will not be highlighted by the spell checker. CHAPTER 18
3 ▶ Portrait (1) and landscape (1). 1 ▶ A <a> (1).
4 ▶ Any three from: Page title (1); Author’s name (1); Page 2 ▶ Image files are referenced, not embedded (1), so the web
numbers (1); Date/time document created/modified (1); browser (1) will not be able to find them if their location is
File name/location (1). Award one mark for ‘document/file altered (1). This will result in a broken link and will make
information’ if no other mark awarded. the browser display a placeholder image (1).
5 ▶ A data source is selected (1) and fields from it are placed 3 ▶ To provide the layout into which content can be added (1).
into the document (1), which is then populated (1) from
4 ▶ To draw attention to important information (1).
selected records (1).
5 ▶ A index.html (1).
6 ▶ Several answers. For example: Dear [Title Surname] (1).
6 ▶ Any three from: Animation (1); Image (1); Text (1); Buttons
7 ▶ Several answers. For example: Yours sincerely (1); Kind
(1); Video (1).
regards (1).
8 ▶ Any two from: Spreadsheet (1); Delimited file such as a CHAPTER 19
.csv file (1); A table in a (word-processed) document (1);
A contact list such as a mail application contact list (1). 1 ▶ D G1:J1 (1).
2 ▶ EITHER: As a way of documenting the spreadsheet (1)
with meaningful names (1) that others/you can
CHAPTER 16 understand (1)
1 ▶ B Aspect ratio (1). OR: You don’t have to check the cell range every time
you refer to it (1), saving time when referencing ranges in
2 ▶ Because they are made up of co-ordinates and lines (1), formulae or functions (1).
which are recalculated (1) when the image is redrawn (1).
3 ▶ Unlike relative references, absolute references do not
3 ▶ Layers allow elements to be placed (1) on top of or change (1) when copied to other cells (1), meaning that a

Z01_EDICT_SB_IGCSE_88931_ANS_334-339.indd 338 29/08/2017 11:38


ANSWERS 339

cell reference can be fixed (1) and reducing the likelihood


of errors and the work required to avoid errors (1).
CHAPTER 20
1 ▶ B Alphanumeric/text (1).
4 ▶ A SUM (1).
2 ▶ To ensure that each record is uniquely identifiable (1).
5 ▶ Any three from: Pie chart (1); Bar chart (1); Column chart
(1); Line chart (1); Scattergram (1). 3 ▶ Any two from: To ensure that the data entered is
acceptable (1); To reduce data entry errors (1); To enforce
6 ▶ It finds a given value (1) in the first column of a given array
referential integrity (1).
(1) and returns the corresponding value (1) from a given
column (1). 4 ▶ Any three from: Title (1); ISBN (1); Number of pages (1);
Author (1); Publisher (1); Published Date (1); Format (1).
7 ▶ Scattergram (1).
5 ▶ Any three from: Referential integrity (1); Presence (1); Type
8 ▶ Pie chart (1).
(1); Length (1); Range (1).
9 ▶ Bar or column chart (1).
6 ▶ The database will only allow data to be entered (1) from a
10 ▶ A trend line shows the general direction of data values foreign table (1) into a linked table (1) if the related record
or line of best fit (1), which can be extended beyond the exists (1).
range of the latest date (1).
7 ▶ Range check (1).
11 ▶ The formulae will automatically update when values in
8 ▶ 1,3,4,6,7 (1).
referenced cells are changed (1).
9 ▶ False (1).
12 ▶ B 9 = (5+4) (1).
10 ▶ C NOT Boy (1).

Z01_EDICT_SB_IGCSE_88931_ANS_334-339.indd 339 29/08/2017 11:38

You might also like