0% found this document useful (0 votes)
22 views17 pages

Paper 1 HL MS

The document outlines various topics in information technology, including compatibility issues in IT systems, definitions of Boolean operators, functions of the control unit in CPUs, data packet requirements, and the concept of virtual machines. It also discusses security measures for patient data, causes and prevention of data loss, and the use of mail merge for generating personalized letters. Additionally, it covers the importance of software testing, ethical considerations in using images, and methods for gathering user information in system analysis.

Uploaded by

Bot 10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views17 pages

Paper 1 HL MS

The document outlines various topics in information technology, including compatibility issues in IT systems, definitions of Boolean operators, functions of the control unit in CPUs, data packet requirements, and the concept of virtual machines. It also discusses security measures for patient data, causes and prevention of data loss, and the use of mail merge for generating personalized letters. Additionally, it covers the importance of software testing, ethical considerations in using images, and methods for gathering user information in system analysis.

Uploaded by

Bot 10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Section A -

1. State two compatibility issues that may occur when two information technology (IT)
systems are merged. [2]
● Language differences / lexical differences present across datasets to be
merged;
● Data representation differences / different data structures (e.g., date format,
incompatible file formats);
● Incompatible hardware;
● Incompatible operating systems / different software versions;

2. Define the Boolean NAND operator. [1]


● It is the negation of the AND operator.
● NAND operator is a binary operation that produces a true result for all input
combinations except when all inputs are true; if all inputs are true, the output
is false.

3. Identify three functions of the control unit (CU) in the central processing unit (CPU)
[3]
● Decodes the instructions
● Control Signal Generation // controls all the other internal components of the
CPU
● Timing and Sequencing // The CU manages the timing and order of
operations, ensuring that each step in the execution of an instruction happens
in the correct sequence and at the right time.
● Retrieves and stores data/addresses from RAM // writes or reads the data
to/from the location in RAM

4. State three pieces of information that a data packet must contain. [3]
● Destination Address
● Source Address
● Payload

5. These flower names should be inputted in the following order:


Gladiolus, Lantana, Hyacinth, Iris, Columbine and are inserted into a binary tree in
such a way that an inorder traversal of the binary tree visits the nodes in alphabetical
order of the names. Sketch the resulting binary tree. [3]

○ Correct root;
○ Correct left sub-tree;
○ Correct right sub-tree;

1 mark max if a tree is represented that would return values in


alphabetical order using inorder traversal

6. Outline what is meant by a virtual machine. [2]


○ software emulation of a physical computer
○ creates an environment allowing users to run multiple operating systems on
single physical hardware host
○ abstracts the hardware components like CPU, memory, network devices, and
storage from the underlying physical hardware, enabling the sharing of these
resources among different virtual machines

7. Identify two usability problems that can occur in a voice recognition system. [2}
○ Accuracy Issues
○ Limited Vocabulary and Understanding.
○ Need Training

8. a. Outline what is meant by concurrent processing. [2]

Processes/tasks are carried out simultaneously/at the same time;


Rather than sequentially

b. Identify one advantage of concurrent processing. [1]

faster overall system performance or reduced processing time

If answered in a project management scenario:


Processes/tasks are carried out simultaneously/at the same time;
Rather than sequentially

faster overall project completion or reduced project time


9. Consider the following recursive method:
○ Determine the value of fun(1216) Show all your working. [4]

○ Deduce the purpose of this recursive method. [2]

fun(N)
if N > 0 then
return (N mod 10) + fun(N div 10)
else
return 0
end if
end fun

fun(1216)
= 6 + fun(121) 1 mark
= 6 + (1 + fun(12)) 1 mark
= 6 + (1 + (2 + fun(1))) 1 mark
= 6 + (1 + (2 + ((1 mod 10) + fun(1 div 10))))
= 6 + (1 + (2 + (1 + fun(0))))
= 6 + (1 + (2 + (1 + 0))) // since fun(0) returns 0, the recursion ends here
= 6 + (1 + (2 + 1))
= 10 1 mark

[4]

The function fun(N) calculates the sum of the digits of a positive number N. (1
mark for sum and 1 for postive)

[2]
Section B

Answer all questions.

10. The staff at a doctor's practice consist of a receptionist and a doctor.

The patient's medical records and payments, the doctor's appointment


calendar, and other important data are stored in a database on the
central computer.

(a) Outline one security measure that can be taken to prevent


unauthorized access to the patients' data stored on the central
computer. [2]

● Implementation of strong password policies that require complex


passwords that must be changed on a regular basis. (1 mark)
● Use of multi-factor authentication (MFA) where users must provide
multiple proofs of identity such as a password and a one-time code
sent to a mobile device. (1 mark)
● Installation and regular updating of anti-virus and anti-malware
software to protect against unauthorized access from malicious
software. (1 mark)
● Employing a firewall to monitor and control incoming and outgoing
network traffic based on predetermined security rules. (1 mark)
● Regularly updating the operating system and application software to
ensure security patches are applied. (1 mark)
● Limiting user access rights so that individuals can only access the
data necessary for their job role. (1 mark)
● Use of encryption for data both at rest within the database and in
transit between the database and end-users. (1 mark)

(b) (i) Identify one cause of data loss. [1]


● Hardware failure such as a hard drive crash. (1 mark)
● Human error such as accidental deletion of files. (1 mark)
● Software corruption or system crashes that lead to data becoming
inaccessible. (1 mark)
● Natural disasters such as fires, floods, or earthquakes that damage
the computer hardware. (1 mark)
● Cyber-attacks such as ransomware or other malware that can
encrypt or delete data. (1 mark)

● (ii) Describe one method that can be used to prevent data loss
[2]
Regular backups of all critical data, which can be stored off-site or in
the cloud to ensure it can be recovered in case of data loss. (1 mark)
● Use of Uninterruptible Power Supplies (UPS) to prevent data loss
due to power outages or surges. (1 mark)
● Implementing disk mirroring or RAID (Redundant Array of
Independent Disks) systems to duplicate data across multiple drives,
which ensures data is not lost if one drive fails. (1 mark)
● Employing version control systems to keep track of changes and
allow rollback to previous versions in case of data corruption. (1
mark)

A new vaccine has been distributed that would be of benefit to some of the
doctor's patients. A large number of personalized letters need to be written to
these patients, inviting them to visit the doctor's practice to be vaccinated.

(c) Describe how these letters could be automatically


generated by a word processing application. [3]

● mail merge feature. (1 mark)


● Connect to a database or spreadsheet containing the details of the
patients who would benefit from the vaccine (1 mark)
● Design a template with placeholders for the personalized information
(fields) that will be replaced with the actual data from the database or
spreadsheet for each patient. (1 mark)

When the doctor visits a patient in their home, she needs to be able to access the
patient's medical records stored on the central computer in the practice.

(d) Outline two reasons for the use of a virtual private network
(VPN) in this situation. [4]

● Security:
○ data encryption provided by the VPN (1 Mark)
○ encryption protects sensitive data from unauthorized
access.(1 Mark)
● Remote Access:
○ remote access capability provided by the VPN. (1 Mark)
○ allows the doctor to retrieve patient records as if they were on
the local network. (1 Mark)

A mobile data connection enables the doctor to access internet


resources while visiting patients in their homes. Sometimes the data
transfer speeds are slow.

(e) Explain why the speed of data transmission across a mobile network
can vary. [3]

● Signal Strength: The strength of the signal between the mobile


device and the cell tower can affect transmission speeds. Obstacles
such as buildings, natural terrain, or distance from the tower can
weaken the signal, leading to slower speeds. (up to 3 marks)
○ One mark for mentioning signal strength as a factor.
○ Up to two marks for explaining how obstacles, distance, or
environmental factors can weaken the signal and thus reduce
speed.

● Network Congestion: The number of users simultaneously accessing


the network can lead to congestion. During peak usage times, more
users share the same bandwidth, which can result in slower data
transmission for everyone. (up to 3 marks)
○ One mark for identifying network congestion as a factor.
○ Up to two marks for explaining how high user volume can
overwhelm network capacity and slow down transmission
speeds.
● Bandwidth Limitations: The available bandwidth of the network and
any data caps imposed by the service provider can influence the
speed. Once a data cap is reached, the provider may throttle the
speed, decreasing the data transmission rate. (up to 3 marks)

○ One mark for mentioning bandwidth limitations or data caps.


○ Up to two marks for explaining how reaching data limits can
lead to throttling and slower speeds.

● Technology and Infrastructure: The type of mobile network


technology (e.g., 3G, 4G, 5G) and the quality of the network
infrastructure can cause variations in speed. Newer technologies and
well-maintained networks typically offer faster and more reliable
connections. (up to 3 marks)
○ One mark for identifying the type of mobile technology and
infrastructure as factors.
○ Up to two marks for explaining how advancements in
technology and infrastructure quality can lead to speed
variations.

11. A systems analyst has been employed to make proposals on how to improve the
current operation of a design company.

To achieve this, the analyst decided to carry out interviews.

(a) (i) Identify one other method of obtaining information from the
end-users. [1]

● Phone interviews
● Online surveys
● Focus groups
● Observation
● Document analysis
● Online user forums or communities
(ii) Outline one advantage of using the method identified in part
(a)(i) in preference to interviews. [2]

● Phone interviews: Similar to face-to-face interviews, phone


interviews involve speaking with end-users over the phone.
This method allows for more flexibility in scheduling and can
be useful when face-to-face meetings are not possible.
● Online surveys: An analyst can create and distribute online
surveys to gather information from end-users. Surveys can be
designed to collect quantitative data through multiple-choice
questions or qualitative data through open-ended questions.
Online surveys are efficient for reaching a large number of
end-users and can be easily analyzed.
● Focus groups: Focus groups involve gathering a small group
of end-users together to discuss specific topics or issues
related to the design company. The analyst moderates the
discussion and encourages participants to share their
thoughts, opinions, and experiences. Focus groups allow for
group dynamics and interactions among participants, leading
to rich insights.
● Observation: By directly observing end-users in their work
environment, the analyst can gain insights into their daily
tasks, challenges, and workflows. This method involves
watching and documenting how end-users interact with the
current systems and processes, which can provide valuable
information for improvement.
● Document analysis: The analyst can review existing
documents, such as user manuals, support tickets, or
feedback forms, to gather insights into end-users' experiences
and pain points. Analyzing these documents can help identify
recurring issues and areas for improvement.
● Online user forums or communities: Participating in online
forums or communities related to the design industry can
provide the analyst with valuable information. By engaging with
end-users in these platforms, the analyst can ask questions,
seek feedback, and gain insights into their needs, preferences,
and challenges.

(b) Outline the purpose of prototypes. [2]


● Proof of Concept: Prototypes allow designers and developers to validate the
feasibility of their ideas and concepts.
● User Feedback and Testing: Prototypes provide an opportunity to gather feedback
from end-users and stakeholders early in the design process.
● Iterative Design: Prototyping facilitates an iterative design process where designers
can quickly make changes, enhancements, and refinements based on user feedback
and testing results.
● Communication and Collaboration: Prototypes serve as a communication tool
between designers, developers, stakeholders, and end-users
● Investor and Stakeholder Engagement: Prototypes can be used to attract
investors, secure funding, and engage stakeholders.
● Risk Reduction: Prototyping allows designers to identify and mitigate potential risks
and issues early in the development process.

(Question 11 continued)

A software company has been employed to program and implement a new


system proposed by the systems analyst.
(c) Explain why software testing is important at all stages of
implementation. [3]

● Detecting and Fixing Bugs: Testing helps identify and uncover software
defects, bugs, and errors.
● Ensuring Functionality and Quality: Testing verifies that the software meets
the specified requirements and functions as intended.
● Validating System Integration: During implementation, various software
components, modules, or subsystems are integrated to form a cohesive
system.
● Assessing Performance and Scalability: Testing allows for evaluating the
performance of the software under different conditions and workloads.
● Verifying Security and Compliance: Testing is essential for validating the
security of the software and ensuring that it adheres to relevant standards,
regulations, or industry best practices.
● Enhancing User Experience: Testing is critical for ensuring a positive user
experience.
● Building Confidence and Trust: Thorough testing instills confidence in the
software's reliability and performance.

Using images in design may have ethical considerations.

(d) Explain one ethical problem associated with using images. [3]

● Copyright Infringement: One of the primary ethical concerns is the


unauthorized use or reproduction of copyrighted images. Using images
without proper permission or licensing can infringe upon the rights of the
original creators or owners. Designers must ensure they have the necessary
rights or licenses to use images and respect copyright laws.
● Plagiarism: Using images without proper attribution or claiming them as
one's own work is a form of plagiarism. It is unethical to present someone
else's work as your own, whether it's an entire image or elements within it.
Designers should give credit to the original creators and obtain permission
when necessary.
● Misrepresentation and Deception: Images can be manipulated or altered to
misrepresent reality, deceive viewers, or manipulate emotions. This can lead
to ethical dilemmas, especially in advertising or journalism, where truthfulness
and transparency are expected. Designers should be mindful of presenting
images accurately and ethically, avoiding misleading or deceptive practices.
● Stereotyping and Bias: Images can perpetuate stereotypes, reinforce
biases, or marginalize certain groups of people. Designers need to be aware
of the potential impact of their image choices and avoid using visuals that
perpetuate harmful stereotypes or promote discrimination. Embracing
diversity, inclusivity, and cultural sensitivity in image selection is essential.
● Exploitation and Objectification: Using images that exploit or objectify
individuals, particularly women or marginalized groups, is ethically
problematic. Designers should be conscious of how their image choices may
reinforce harmful societal norms, objectify individuals, or contribute to the
perpetuation of harmful beauty standards.
● Privacy and Consent: Using images of individuals without their consent or
invading their privacy can raise ethical concerns. Designers should respect
privacy rights and obtain appropriate consent when using images that feature
identifiable individuals. This is particularly relevant when working with
personal or sensitive data.
● Cultural Appropriation: Appropriating images from specific cultures or
communities without proper understanding, respect, or permission can be
seen as disrespectful and ethically problematic. Designers should exercise
cultural sensitivity and avoid appropriating or misrepresenting cultural
elements in their designs.
● Environmental Impact: Using images that contribute to environmental harm
or promote unsustainable practices can also be considered an ethical issue.
Designers should consider the environmental impact of their image choices,
such as using images that promote eco-friendly practices or avoiding visuals
that support environmentally harmful industries.

Images are sometimes larger than the limit placed on email attachments. For
example, a 60 MB image file needs to be sent by email without losing quality, but a
file larger than 10MB cannot be uploaded as an attachment.

(e) (i) Describe how large image files can be sent by email. [3]

● File Compression: Use file compression software or tools to reduce the size
of the image file without compromising its quality. You can compress the
image file into a more compact format, such as ZIP or RAR. This can
significantly reduce the file size, making it easier to send as an email
attachment. However, note that some email providers may still have
limitations on the maximum compressed file size.
● Cloud Storage Links: Instead of attaching the large image file directly to the
email, upload the file to a cloud storage service like Google Drive, Dropbox,
or OneDrive. Once uploaded, generate a shareable link for the file and
include it in the email. This way, the recipient can access and download the
file from the cloud storage service without any size limitations. Ensure that the
cloud storage account has sufficient space to accommodate the large image
file.
● File Transfer Services: There are specialized file transfer services designed
for sending large files. These services allow you to upload your image file to
their servers and generate a secure download link. You can then include the
download link in the email for the recipient to access and download the file.
Examples of such services include WeTransfer, SendSpace, or Filemail.
● FTP (File Transfer Protocol): If you have access to an FTP server, you can
upload the large image file to the server and provide the recipient with the
FTP server details, including the login credentials and file location. The
recipient can then use an FTP client to connect to the server and download
the file. FTP is suitable for larger files and is commonly used for file transfers.
● Splitting the File: If none of the above methods are feasible, you can split
the large image file into smaller parts using file splitting software. This divides
the file into several segments, each below the attachment size limit. You can
then send each segment as a separate email attachment, and the recipient
can reconstruct the original file using file merging software.

(ii) State one other hardware or software problem associated with the
use of images. [1]

● Insufficient Storage
● Inadequate Processing Power
● Display Quality and Calibration
● Incompatible Hardware Devices

● File Format Compatibility


● Software Performance and Stability
● Data Loss or Corruption
● Software Bugs and Vulnerabilities
● License and Copyright Compliance
12. Input devices that detect cars approaching a crossroads are connected to a
microprocessor.

(a) (i) Identify two types of sensor that can be used to detect approaching
cars. [2]
Acceptable answers may include:
Infrared sensors
Ultrasonic sensor
Inductive loop sensors
pressure?

(ii) Outline why sensors are appropriate input devices in this situation. [2]

Sensors can detect the presence of cars accurately and reliably.


Sensors can provide real-time data about approaching cars.
Sensors can be connected directly to the microprocessor for efficient data
processing.
Sensors can run 24 / 7

(b) Suggest the type of memory that could be used to store the control
program in the microprocessor. [2]

ROM (1 mark)
Because (1 mark)
Non-volatile: will retain on power loss
Read-only access: data stored in ROM cannot be easily modified or
altered.
Fast and direct access: ROM allows for fast and direct access to the
stored program instructions.
Cost-effective: ROM is a relatively inexpensive memory type compared to
other storage options like RAM (Random Access Memory).

The traffic lights at the crossroads are also connected to a microprocessor. A person
who wishes to cross the road presses a button at a traffic light. This causes an
interrupt.

(c) (i) Outline what is meant by an interrupt. [2]

An interrupt is a signal or event that temporarily suspends the normal execution


of a program.

It is used to handle urgent or time-sensitive tasks that require immediate


attention.
Interrupts can occur externally, triggered by external devices or inputs, or
internally, triggered by specific conditions within the microprocessor.

(ii) Explain how the microprocessor can deal with this interrupt. [3]

The microprocessor recognizes the interrupt signal and suspends its current
execution.

It jumps to a predefined interrupt service routine (ISR) or interrupt handler to


handle the interrupt.

After the interrupt is processed, the microprocessor resumes the normal program
execution.

Cameras are installed on the top of the traffic lights at the crossroads.

(d) (i) Outline one benefit of monitoring the traffic with cameras. [2]

Cameras can provide visual data, allowing for better monitoring and analysis of traffic
conditions.

They can help identify traffic patterns and congestion hotspots for better traffic management.

Cameras can assist in detecting and recording traffic violations or accidents for law
enforcement or insurance purposes.

(ii) Outline one concern about monitoring the traffic with cameras.[2]

Privacy concerns: Cameras may intrude upon individuals' privacy if used inappropriately or
without proper regulations.

Data security: There could be risks associated with storing and transmitting video data,
potentially leading to unauthorized access or misuse.

Surveillance concerns: The constant monitoring of traffic with cameras might raise concerns
about excessive surveillance and its impact on civil liberties.
13. A programmer is developing a program to record information about
patients as they arrive at the emergency department of a hospital.

Due to the unplanned nature of patient attendance, the emergency department must
provide treatment for a range of illnesses and injuries, some of which may be critical
and require immediate attention.

The programmer decided to use a linked list for storing the patients' data.

(a) Describe the structure of a linked list. [2]

A linked list is a data structure that consists of a sequence of nodes.


Each node contains two components: data and a reference (or pointer) to
the next node in the sequence.
The last node in the list has a null reference, indicating the end of the list.

(b) Explain why a queue data structure is not suitable in this situation [3]

A queue data structure follows the First-In-First-Out (FIFO) principle, where the element that
enters first is the first one to be removed.

In the emergency department scenario, patient treatment priority may not strictly follow the
FIFO principle.

Patients with more serious symptoms may require immediate attention, regardless of their
arrival order.

A linked list allows flexibility in updating and rearranging the order of patients based on their
symptoms' severity.

The information about the most seriously ill patient is held at the beginning of the linked
list. The linked list should be updated as each new patient arrives at the emergency
department.

(c) Describe how the linked list should be updated if a new patient arrives at the
emergency department with more serious symptoms than all the other
patients.
[3]

Create a node (1 mark)


Add data (1 mark)

Assuming priority is at the front of the linked list:

Copy Head Pointer to pointer of the new patient node (1 mark)


Change head ptr value to the location of new patient node (1 mark)
Assuming priority is at end of linked list:

Make new patient nodes pointer null (1 mark)


Starting from head pointer use pointers to traverse linked list until the null pointer is
found (1 mark)
Make this pointer = location of the new patient node (1 mark)

(d) Describe how the linked list should be updated if a new patient
arrives at the emergency department and has more serious symptoms
than some patients but less serious symptoms than others. [4]

Create a node (1 mark)


Add data (1 mark)
Starting from head pointer use pointers to traverse linked list by comparing priority
data until correct position is found (loop) (1 mark)
Make the pointer of the new patient node = the node before it’s pointer (1 mark)
Make this pointer of the previous node = location of the new patient node (1 mark)

(e) Compare static and dynamic data structures. [3]

Static data structures are fixed sized (for example, arrays) whilst dynamic data
structures (for example, trees, linked lists) have flexible size;

The size of static data structures is predetermined; the amount of memory once
allocated to them at compile time cannot change on run time whereas dynamic data
structures they can grow or shrink as needed to contain the data to be stored;

Slower access to elements of dynamic data structure (sequential access) when


compared with (direct) access to elements of static data structures;
14. There are 20 gymnasts who took part in a gymnastics competition.

Competitors were assessed by 8 judges who each awarded a score in a range


from 0-10. The judges were numbered 0-7. The competitors' names are
stored in the one-dimensional array NAMES, and their scores are stored in the
two-dimensional array SCORES (see Figure 1).

For example, the score that Judge 4 awarded to Mary Tann (NAMES [ l J) is 8.9 and can be
found in SCORES (l] [4].

(a) State the judge who awarded the highest score to the competitor Tea Fox. [1]

Answer: 3

The highest attainable score in gymnastics is 10.0.

(b) Construct an algorithm that determines and outputs the number of times the
highest attainable score was awarded in this competition. [4]

Answer:

- Search through the 2D array to find highest score (which is =10) - use of
any applicable loop (nested for loop for ex) - 2 marks - a correct row and
column loop
- Declaration of the variable that represents the count of the highest score
and increment by 1
- If statement with the correct condition (highest attainable score = 10.0)
- Output of the count of the highest score

For example (use of nested for loop):

highest_score_count = 0

for n in 0 to 19:

for j in 0 to 7:

If SCORES[ n ] [ j ] = 10.0

highest_score_count += 1

OUTPUT highest_score_count
WHILE LOOP example:

n=0

j=0

WHILE n < len(SCORES):

WHILE j < len (SCORES [n] ):

If SCORES[ n ] [ j ] = 10.0:

highest_score_count += 1

j+=1

n+=1

j=0

A competitor's final score is calculated by ignoring the highest and the lowest mark
awarded and averaging the remaining marks.
For example, the highest mark awarded to Lilly Bush was 7.9, and the lowest mark was
6.9,so her final score was(7.2+ 6.9 + 6.9 + 6.9 +6.9 + 7.2)/6.

(c) Construct an algorithm in pseudocode to output the name and the final score for
every competitor. [10]

Answer:
2 marks - for looping through 2D array (rows and columns)
1 mark - finding min score (if statement) - searching through all the scores
1 mark - finding max score - searching through all the scores
1 mark - assigning min score to a variable, such as minScore
1 mark - assigning max score to a variable, such as maxScore
1 mark - for calculating total and average
1 mark - for subtracting max_Score / min_Score from total_Score or any valid alternative
calculation
1 mark - for correct use of row index and column index throught the solution
1 mark - for outputting name and score with correct indices

Allocation of marks may vary according to the solution of the student.


Example:

for n in range 0 to 19:

gymnast_scores = SCORES[n] #gymnast_scores can be replaced by SCORES[ n ] [ j ]

min_Score = SCORES[n][0]

max_Score = SCORES[n][0]

total_Score = 0

for j in range 0 to 7:

total_Score = total_Score + gymnast_scores[ j ] // total_Score += SCORES [ n ][ j ]

If gymnast_scores[ j ] < min_Score:

min_Score = gymnast_scores [ j ] // min_Score = SCORES [ n] [ j ]

else if gymnast_scores [ j ] > max_Score:

max_Score = gymnast_scores [ j ] // max_Score = SCORES [ n] [ j ]

total_Score -= minScore

total_Score -= maxScore

OUTPUT NAMES[n] , total_Score/6 (#can also be assigned to finalScore or equivalent)

You might also like