ICT Answers
ICT Answers
ANSWERS CHAPTER 2
1 ▶ A piece of software you can use to carry out specific tasks
that are not related to the operating system (1).
CHAPTER 1
2 ▶ Any three from: backup (1); anti-virus (1); defragmentation
1 ▶ Barcodes save time (1). (1); compression (1); disk management (1).
OR
3 ▶ The operating system allows the user to control and
Barcodes ensure that fewer errors are made when
manage (1) the computer’s hardware (1).
entering product ID numbers (1).
2 ▶ These devices are designed to be portable (1). 4 ▶ So that backup processes can be completed when the
system is not in use (1) to avoid file conflicts (1).
3 ▶ The charge cannot be reduced on the capacitive layer (1)
because wool is not a conductive material (1). (The charge 5 ▶ Compression utilities can free up storage space (1) by
is usually drawn away by touch, thereby reducing the reducing the amount of data (1) needed to store a file.
charge held in the capacitive layer.) 6 ▶ By allowing the user to create slides that contain content
4 ▶ Any three from: a burglar alarm (1); a web server (1); an (1) that support (1) their talk.
engine management system (1); a home heating system 7 ▶ Several answers. For example: Control software could be
(1); many other examples. used in manufacturing factories (1) to control robots on a
5 ▶ Laser printers are faster (1) and produce each copy more production line (1).
cheaply (1) than inkjet printers. 8 ▶ Several answers. For example: Building companies must
6 ▶ Any two from: architecture (1); product design (1); adhere to scheduled timelines because multiple resources
cartography (1); engineering (1). such as materials and personnel such as electricians
7 ▶ To reduce the impact (1) on the environment (1) when the need to be coordinated in sequential phases which are
finished models are discarded (1). dependent upon each other. This ensures that the project
hits targets, and forecasts for completion can be provided,
8 ▶ Several answers. For example: An accelerometer (1),
with progression monitored so that stakeholders (such as
used to detect ‘tilt’ in a game (1), and a light sensor (1),
homeowners) can be updated with the progress of the project.
used to alter the brightness of a screen to match the
environmental light conditions (1). 9 ▶ Any three from: web browser (1); social media (1); SMS
(1); email (1); MMS (1); instant messaging (1).
9 ▶ Several answers. For example: Sensors are used in cars for
many reasons. Some examples include detecting whether 10 ▶ Any two from: fixing security vulnerabilities or bugs (1);
doors are open, whether seatbelts are secured, whether increasing compatibility with newer operating systems (1);
passengers are in their seats and whether it is dark outside. improving performance and efficiency (1); introducing new
This type of feedback on the environment can be useful features (1); improving usability (1).
to the driver, so that they know what is around the car.
For example, the car could use distance sensors to help CHAPTER 3
drivers to park or avoid collisions. Similarly, cars could use
1 ▶ Read Only Memory (1).
light sensors under the car to help drivers know if they are
moving out of a lane on a road and the car’s computer 2 ▶ Random Access Memory (1).
could trigger an alarm to alter the driver’s course. 3 ▶ Increasing the amount of RAM means that more programs
The use of sensors can take some of the need to think away can be open at the same time (1) without needing to use
from the driver, allowing them to concentrate on the driving. virtual memory from storage (1), which has slower access
Sensors can also produce reactions that are quicker than a times than RAM (1).
human’s, therefore increasing road safety. However, sensors
4 ▶ Virtual memory is an area of secondary storage (1) used
(and the computers to which they are linked) are not good
to store data when the computer system does not have
at making ethical decisions and so, if they sensed a person
enough space in RAM (1).
in the road ahead, they may not be able to decide whether
to steer off the road and maybe crash into a wall (potentially 5 ▶ Any three from: volatile (1); instructions can be swapped
injuring the driver) or crash into the person crossing the in and out or temporarily stored (1); used for temporary
road, potentially injuring the pedestrian. storage (1); upgradable (1).
In summary, sensors can be very useful, but humans will 6 ▶ Flash memory does not have any moving parts (1), so it
always need to take responsibility for their actions and has low power consumption (1). It also means that it is
should not become complacent when in charge of a vehicle. less susceptible to data loss (1) if the device is knocked or
10 ▶ Console games use detailed graphics (1), which use a lot shaken (1).
of data and therefore data storage (1). 7 ▶ A The number of times per second that a processor can
OR: carry out instructions (1).
Optical media is required because download sizes would
be too big (1) and Blu-ray media has the greatest capacity
of all optical formats (1).
CHAPTER 4
1 ▶ a Infra-red signals cannot travel as far as Bluetooth signals
(1) and the console is sometimes not in range (1).
2 ▶ Characters cannot be read or interpreted (1) by an 9 ▶ It has helped build strong communities (1) using social
automated computer program (1). media (1).
It has increased access to the global society (1) at the
3 ▶ To gain users’ personal information without their expense of their local societies (1).
permission (1).
10 ▶ The gap has been made wider (1) because the internet
4 ▶ Any three from: card number (1); expiry date (1); start date has increased the amount of information available to the
(1); name of the cardholder (1); CSC (1). information rich (1).
5 ▶ A differential backup saves a copy of all files that have 11 ▶ Several answers. For example: The internet provides
changed since the last full backup (1). An incremental more opportunities for us to socialise by allowing us to
backup saves a copy of only the files that have changed connect with each other using global communication
since the last full or incremental backup (1). services such as instant messaging and social networks.
6 ▶ Encryption ensures that unauthorised users cannot read We can communicate at any time of the day with friends
data (1) without the key (1). from around the world and make use of the ability to
connect data from different account profiles to create
new connections with people we have never met. We user’s work and education (1); travel history (1); family
use social features in many services, such as when we details such as relationship status, family members and
are watching television, using television as a ‘back- pets (1); contact information such as telephone number,
channel’ line of communication to comment upon, rate email address and website (1); profile and background
and discuss live television programmes and news. This images, colour schemes and designs (1).
allows us to access more than one point of view about 6 ▶ To allow users to share URLs (1).
the issues being shown on the news. We also use social
features of the internet when shopping and learning in 7 ▶ Any three points from: Because the organisation’s workers
order to get more than one perspective, keep informed will be located in different countries (1), which would
of new developments and gain a wider perspective on make communicating and collaborating on work more
the world. However, some people’s use of the internet difficult or expensive to organise and time consuming (1)
means that they are not in touch with the real-world due to differences in time zones and the costs and time
communities in their local geographical area, leading to associated with travelling (1). They would also benefit
the disintegration of those communities. Some people from having centralised resources such as virtual meeting
become so engrossed in online communication that they spaces, shared documents and shared online calendars (1).
lose the skills that they need to communicate with people 8 ▶ By matching (1) information shared by members (1).
in the real world. Some people also argue that, despite
9 ▶ By matching (1) information shared by members (1).
the wide variety of social groups available to individuals,
the ones you tend to join are those which share your 10 ▶ Any four from: students can access resources (1);
views, as that is often how suggestions are made based students can interact with teachers (1); students can get
on users’ profiles. This means that individuals who think notifications of assignments and grades (1); students can
they are joining in with a wider community are simply chat with classmates and share ideas and research (1);
reaffirming their own opinions, so they do not actually students can get immediate feedback from automatically
come to understand and integrate with the wider social marked quizzes (1); students can collaborate on
communities available to them via the internet. In assignments with other students and teachers (1).
conclusion, there is a wide variety of social interaction 11 ▶ Rate/like/upvote (1); share/repost (1); comment/quote (1).
available thanks to the internet, but people need to
12 ▶ Answers should discuss: cost of and need to protect their
understand the ways in which they are connected to
safety; companies sharing users’ personal information;
others to truly understand how to make the most of the
targeted marketing; cost to users’ privacy.
opportunities that are available to them.
12 ▶ Keep personal information private (1) by being careful
what is shared and by using privacy settings to control CHAPTER 9
access to personal profiles (1); block people, especially 1 ▶ C Using an RCD (1).
strangers (1), who are offensive or whose behaviour
is concerning (1); report (1) inappropriate behaviour to 2 ▶ They have reduced the cost of technology (1) so that more
relevant authorities (1). people can afford digital devices (1).
13 ▶ The use of the internet provides another method (1) 3 ▶ Location sharing has an impact upon their privacy (1)
of unauthorised access (1) to the data held by the because their location could be shared with other people with
organisation (1). whom they do not actually want to share their location (1).
4 ▶ Any three from: music (1), e-books (1), video (1), apps (1).
specifically stated purposes (1); use data in a way that is because they can restrict access to bidders with good
adequate, relevant and not excessive (1); ensure that data ratings who are more likely to complete the purchase (1).
is accurate (1); keep data for no longer than is absolutely
necessary (1); handle data according to people’s data 5 ▶ It uses encryption (1) which stops data, such as people’s
protection rights (1); keep data safe and secure (1); if financial information, being read (1) by unauthorised
in the EU, not transferring data outside the European users (1).
Economic Area without adequate protection (1). 6 ▶ There is no need to check in at a check-in desk at the
11 ▶ Several answers. Should include up to four linked airport (1), which saves passengers time (1).
points from: online storage and apps are based in large 7 ▶ EITHER: Their use affects users’ privacy (1).
data centres (1) which use lots of energy (1) to cool the OR: Users’ experience is based on decisions made by
servers (1) and power the servers (1). This energy could computer code rather than on choices that they make (1).
be created by using non-renewable energy (1), in order 8 ▶ Any three from: time and date of the transaction (1); IP
to avoid depleting the planet’s natural resources and addresses (1); referring website (1); the products and
contributing to climate change (1). services previously viewed or bought (1); categories
12 ▶ Several answers. For example: Recycle their devices (1) so of products and services previously viewed or bought
they do not leak toxins (1) which can cause health risks to (1); items added to online shopping basket (1); buttons
plants, wildlife and people (1). pressed (1); data entered into web forms, such as name
and address (1); any other sensible response.
CHAPTER 10 9 ▶ Session cookies are only stored while the browser has the
site open or until the browser closes the site. Persistent
1 ▶ D “” (1).
cookies are stored after the browser closes the site.
2 ▶ Any two from: size (1), colour (1), type (1), time and date
10 ▶ The use of notifications or alerts (1).
(1), usage rights (1).
11 ▶ Several answers. Relevant points include: Organisations
3 ▶ It might not represent the issue in full (1).
use cookies to track the transactions that individuals
4 ▶ A search engine compares (1) words or phrases entered carry out online, such as the websites that they visit.
by a user (1) against a database of pages (1) and returns This browsing history can then be used by organisations
the URLs or descriptions of those that match (1). to target their marketing and create a personalised
5 ▶ You might infringe others’ rights (1), leading to ethical and experience for users. Although some people find this
legal issues (1). useful, other people do not like the fact that their online
activity is tracked and monitored; as they believe this to
6 ▶ It shows that the student understands the meaning of the
be intrusive and to have a negative effect on their privacy.
information (1).
They do not like the ways in which these systems are
7 ▶ AND (+) (1), NOT (-) (1), phrase matching (“”) (1). used to decide the content people are shown and say that
8 ▶ Table 10.3 Identifying primary and secondary sources they would prefer to decide this themselves as it may limit
or narrow their experience.
Source Primary or
secondary? CHAPTER 12
A podcast that you have created Primary (1) 1 ▶ C Server (1).
A video of a discussion that you have with an Primary (1) 2 ▶ Any three from: automatic backup (1); greater scalability
expert (1); enables sharing data (1); cheaper than local storage
or even free (1); makes collaboration possible (1); reduces
Your own copy of a film Secondary (1) use of local storage making more space for locally
Notes that you take while visiting a museum Primary (1) installed software (1).
A book that you borrow from someone Secondary (1) 3 ▶ Any three from: shopping or auction sites (1); booking
systems (1); banking services (1); education services
An image that you download from the internet Secondary (1) such as VLEs and MOOCs (1); gaming (1); news and
Your own recording of a radio broadcast Secondary (1) information (1); entertainment services such as on-
demand television (1).
CHAPTER 11 4 ▶ Online storage and/or applications that are hosted on
online servers (1).
1 ▶ A Paying in cheques (1).
2 ▶ Any two from: VLEs (1), online support (1), remote access CHAPTER 13
to journals and books (1).
1 ▶ A Image (1).
3 ▶ Several answers. For example: basket (1), product
2 ▶ If there is not enough white space (1), the information
catalogue (1), checkout (1).
could appear cramped (1).
4 ▶ EITHER: It helps sellers know which buyers they can trust
3 ▶ Several answers. For example: number data (1) is turned
(1) to pay for items (1).
into information through the creation of graphs or charts (1).
OR: It stops sellers having to relist (1) unpaid-for bids
4 ▶ Spelling error because should be spelled ‘supposed’ (1); beneath each other on the z axis (1).
grammar error because the sentence should end with 4 ▶ Pixels (1).
a question mark (?) (1); contextual error because ‘two’
should be given as ‘to’ (1). 5 ▶ Vector graphics often look stylised or unnatural (1).
5 ▶ A house style ensures that documents are consistent (1), 6 ▶ Any two from: Erase tool (1); Cropping (1); Recolouring or
which helps to create a brand or corporate identity (1). airbrushing (1).