Professional Documents
Culture Documents
Theory Workbook Answers
Theory Workbook Answers
Software that obtains data from sensors allowing control and measurement software
computers to monitor and control external activities
3 True False
Statement
(✓) (✓)
A network interface card allows a user to access websites on the
✓
world wide web
Solid-state drives make use of laser light to read and write data ✓
4 a Advantages Disadvantages
Two from: Two from:
• The user is in direct • The user needs to learn a
communication with the number of commands to
computer. carry out basic operations.
• The user is not restricted to a • All commands need to be
CLI
number of pre-determined typed in which takes time
options. and can be error prone.
• It is possible to alter • Each command must be
computer configuration typed in using the correct
settings. format, spelling, and so on.
Two from: Two from:
• The user does not need to • This type of interface uses up
learn any commands. considerably more computer
• It is more user-friendly; icons memory than a CLI interface.
are used to represent • The user is limited to the
GUI applications. icons provided on the screen.
• A pointing device (such as a • It needs an operating system,
mouse) is used to click on an such as Windows, to operate,
icon to launch the application which uses up considerable
– this is simpler than typing memory.
in commands.
5 a i tablet
ii Features of a tablet, two from:
• high definition, anti-glare displays
• front and back facing cameras (which are used to take photos, videos or act as a
webcam when doing video calls over the internet)
• lower weight and longer battery life than laptops
• uses Bluetooth for connection to printers and other devices
• makes use of flash (solid state) memory and cloud storage facilities to back up and
synchronise (often just referred to as 'sync') data sources
• it uses a number of sensors to carry out the following functions:
• proximity sensors to detect if the device is close to, for example, the ear, which
allows it to block unintended 'touches'
• accelerometers, which detect movement and orientation of the device
(for example, move the display from portrait to landscape to view videos, or
allow it to be used as a 'steering wheel' in car racing games, for example)
• sophisticated speech recognition systems (such as Siri) to enable the user to
ask the device to look for things (such as search the address book).
iii Uses of a tablet, two from:
• web browsing
• games
• watching videos
• listening to music
• built in GPS means that it is great for maps and navigating
• reading documents
• very lightweight and portable with relatively long battery life – so any other
activity where this is an advantage.
b i laptop
ii Features of a laptop, two from:
• lightweight (to aid portability)
• low power consumption (and also long battery life)
• the processor shouldn’t generate too much heat (cooling is very important)
• the most obvious feature is its portability; it can be taken anywhere because the
monitor, pointing device, keyboard, processor and backing store units are all
together in one single unit
• because everything is in one single unit, there are no trailing wires (only one single
cord is used)
• it takes up much less room on a desk, so it can be used anywhere (for example,
in a café)
• its portability allows it to take full advantage of WiFi features
• because it is portable, it can link into any multimedia system.
Negative impacts:
• AI can lead to many job losses in a number of areas (although it is true to say that new
technical jobs would also be created); most jobs would be lost in manufacturing but it
would be unwise to speculate that other areas wouldn’t be affected (such as bus, taxi
and train drivers)
• dependency on technology by humans; the inability to carry out tasks done by robots,
for example, could be an issue in the future
• loss of skills that are now done by machines and software applications.
9 Features of AR include:
• allows the user to experience the relationship between digital (virtual) and physical
(real) worlds
• virtual information and objects are overlaid onto real-world situations
• the real world is enhanced with digital details, such as images, text and animation
• the user can experience the AR world through special goggles or via
smartphone/tablet screens
• the user is not isolated from the real world and is still able to interact and see what is going
on in front of them
• examples include the Pokémon GO game which overlays digital creatures onto real-world
situations.
Features of VR include:
• the ability to take the user out of the real-world environment into a virtual (unreal) digital
environment
• in contrast to AR, the user is fully immersed in a simulated digital world
• the user must wear a VR headset or a head-mounted display which allows a 360° view of
the virtual world (this 'fools' the brain into believing they are, for instance, walking on an
ocean bed, walking on an alien world or inside a volcano)
• this technology can be used to good effect in: medicine (teaching operation procedures),
construction, engineering and the military.
Impact of AR:
• safety and rescue operations (for example, it is possible to provide 3D images of an area
where a rescue mission is to take place, giving a team the opportunity to interact with the
environment, and try out rescue procedures before doing the real thing)
• entertainment (for example, AR takes users into a virtual environment where it is possible
to interact with the characters)
• shopping and retail (for example, using your smartphone camera, you can try out make-up
and see how it looks on you before buying it; or you can experience a virtual tour of a new
car where you can 'sit' in the interior and try out the driving experience before buying
the car)
• healthcare (doctors can make use of AR to have a better understanding of a patient’s body;
software, such as Echopixel enables doctors to use CT scans from patients to build up a 3D
image of their body to help with surgery and diagnosis).
Impact of VR:
• military applications (for example, training to operate a new military tank)
• education (for example, looking inside an ancient building as part of a history lesson)
• healthcare (for example, as a diagnostic tool to recommend treatment)
• entertainment (for example, games where gloves, goggles or helmets are worn to give
realism to the scenario and even to give visual or audio to make it seem very real)
• fashion (for example, to do fashion shows before doing the real thing – see the clothes on
people, check out the venue, and so on)
• heritage (for example, allowing users to walk around and up close up to monuments like
Stonehenge)
• business (for example, training courses and role-playing scenarios for staff)
• engineering (for example, seeing how new designs like bridges will look in an existing
environment)
• sport (for example, a golfer trying to improve their swing can use this technology and get
feedback to improve their game)
• media (for example, interactive special effects in movies)
• scientific visualisation (for example, seeing part of a molecular structure in chemistry, or
a cell in biology).
10 a basic input-output system (A)
b network interface card (C)
c central processing unit (D)
d command line interface (C)
e analogue to digital converter (B)
3 a One from:
• applications where user has limited hand/arm movement
• control room environment to navigate process screens
• luxury cars to select various functions from an onscreen menu.
b One from:
• video/computer games
• used in simulators (such as flight or driving).
c One from:
• control of TVs, DVD/Blu-ray players, hi-fi systems, etc.
• control of multimedia systems
• remote control of machinery, robots, lighting, and so on.
d One from:
• to input sound for presentations, voice-overs, and so on
• voice recognition systems
• to pick up sounds (such as breaking glass) when used in an intruder alert system
• video-conferencing/VoIP.
e One from:
• to scan in documents, photos and books into digital format
• to scan in barcodes at checkout terminals.
f One from:
• selecting objects on a CRT screen
• drawing on a CRT screen (for example, when using CAD software).
4 a i An object is built-up layer by layer using materials such as plastic, powdered metal,
and so on.
ii Uses inkjet technology where the print head moves left to right as well as up and down
to build up layers of an object.
iii Uses two passes for each layer; first pass sprays dry powder and second pass sprays a
binding agent.
b
c Three from:
• prosthetic limbs
• reconstructive surgery
• aerospace: making lightweight parts
• fashion and art: developing creative ideas
• museums: duplicating priceless items for display or to buy as gifts (where the original
is too delicate or valuable to put on show).
5 a • directly reading the memory card by slotting it into a card reader connected to
the computer
• connecting the camera directly to the computer via USB port
• using wireless/Bluetooth connectivity for data transfer.
b Two from:
• easier to produce better-quality photos
• easier and faster to upload photos to the computer because there is no need to scan
hardcopy photos in first
• no need to develop film: cost, time and environmental issues (of chemicals and
saving paper)
• memory cards can store many thousands of photos in a small space.
c Two from:
• the user needs to be technically literate to use all of the camera features and also to
transfer photos to the computer and carry out manipulation of them
• some artistry is lost because software can now correct errors such as over-exposure, red
eye, non-straight photos, and so on
• may need to compress images for storage which can remove some of the picture
quality.
6 a RFID reader
b OMR
c OCR
d multimedia projector
e laser printer
7
8 a A QR code consists of a block of small squares (light and dark) known as pixels. It can
presently hold up to 4296 characters (or up to 7089 digits) and also allows internet
addresses to be encoded within the QR code. This compares to the 30 digits which is the
maximum for a barcode. However, as more and more data is added, the structure of the QR
code becomes more complex.
The three large squares at the corners of the code function as a form of alignment; the
remaining small corner square is used to ensure the correct size and correct angle of the
camera shot when the QR code is read.
b Three from:
• they can hold much more information than a normal barcode
• there are fewer reading errors than with barcodes
• the higher data capacity of the QR code allows the use of built-in error-checking
systems; normal barcodes contain almost no data redundancy (that is, data which is
duplicated) therefore it isn’t possible to guard against badly printed or damaged
barcodes
• QR codes are easier to read; they don’t need expensive laser or LED (light-emitting
diode) scanners like barcodes – they can be read by the cameras used on smartphones
and tablets
• it is easy to transmit QR codes either as text messages or images
• it is also possible to encrypt QR codes, which gives them greater protection than
traditional barcodes.
c Two from:
• more than one QR format is available
• QR codes can be used to transmit malicious codes; known as attagging – because there
are a large number of free apps available to a user for generating QR codes, that means
anyone can do this
• it is relatively easy to write malicious code and embed this within the QR code; when
the code is scanned, it is possible that the creator of the malicious code could gain
access to everything on the user’s smartphone/tablet (for example, photographs,
address book, stored passwords, etc.); the user could also be sent to a fake website or it
is even possible for a virus to be downloaded.
d Point the phone or tablet camera at the QR code. The app will now process the image taken
by the camera, converting the squares into readable data. The browser software on the
mobile phone or tablet automatically reads the data generated by the app. It will also
decode any web addresses contained within the QR code. The user will then be sent to a
website automatically (or if a telephone number was embedded in the code, the user will be
sent to the phone app). If the QR code contained any free entries to attractions, these will
be automatically sent to the user’s phone/tablet.
10 ink cartridges
thermal bubble
piezoelectric
impact
strikes
inked ribbon
noisy and dirty
laser
positively
toner
negatively
fuser
11 Statement True False
(✓) (✓)
12 a RFID:
i use:
• livestock tracking (so that the whereabouts of each animal on a farm is known; it
also identifies which farm owns the animal)
• retail (it is similar to barcodes but does not require any scanning; details, such as
price, can be stored on the tag and then automatically read at a checkout – a big
advantage is that several tags can be read at the same time, thus speeding up the
checkout process)
• admission passes (for example, in theme parks RFID cards eliminate the need to
scan or swipe people before 'rides', reducing the waiting time; it also allows the
tracking of people in the theme park and certain information, such as height or age,
can be stored to prevent entry to certain rides on safety grounds)
• libraries (books can be tracked in and out automatically by readers at the library
entrance; there is no need to scan barcodes or magnetic stripe cards making the
process quicker and more accurate).
ii operation:
• they use radio waves to read or capture information stored on a tag
• RFID tags are made up of a microchip and an antenna
• they can be passive or battery-powered.
b Contactless card reader:
i use:
• to allow PIN-less transactions to take place in, for instance, a shop.
ii operation:
• Customers look out for the contactless symbol on the payment terminal.
• The shop assistant enters the amount for payment.
• The card reader informs the customer to present their contactless card.
• The customer holds their card close to the front of the card reader.
• The terminal display will indicate that the card has been read successfully.
13 Description of stage Order of stage
3
3D printer is now set up to allow the solid object to be 'printed'
Produces high-quality printing where high volume is also required laser printer
hard disk ✓
Blu-ray disk ✓
DVD-RW ✓
tape drive ✓
3 • A blue laser, rather than a red laser, is used in Blu-ray to carry out read and write
operations; the wavelength of blue light is only 405 nanometres (compared to 650 nm
for red light).
• Using blue laser light means that the pits and lands can be much smaller; consequently,
Blu-ray can store up to five times more data than a normal DVD.
• Single-layer Blu-ray discs use a 1.2 mm thick poly-carbonate disk; however, dual-layer
Blu-ray and normal DVDs both use a sandwich of two 0.6 mm thick disks (i.e. 1.2 mm
thick).
• Blu-ray disks automatically come with a secure encryption system which helps to prevent
piracy and copyright infringement.
• The data transfer rate for a DVD is 10 Mbps and for a Blu-ray disc it is 36 Mbps
(this equates to 1.5 hours to store 25 GB of data).
4 a • they are more reliable (no moving parts to go wrong)
• they are considerably lighter (which makes them suitable for laptops)
• they do not have to 'get up to speed' before they work properly
• they have a lower power consumption
• they run much cooler than HDDs (both these points again make them very suitable for
laptop computers)
• because of no moving parts, they are very thin
• SSD data access time is only 0.1 milliseconds compared to 10 milliseconds for a HDD
• data read speed for an SSD is much faster than for a HDD.
b games consoles:
• they are more reliable (no moving parts to go wrong)
• they are considerably lighter (which makes them suitable for laptops)
• they do not have to 'get up to speed' before they work properly
• they have a lower power consumption
• they run much cooler than HDDs
• because of no moving parts, they are very thin
• SSD data access time is only 0.1 milliseconds compared to 10 milliseconds for
HDD – this is better for games consoles which require a high performance level
• data read speed for an SSD is much faster than for a HDD – also better for games
consoles.
mobile phones:
• small size
• do not use much power, which is important for portable devices
• solid stage is more robust than hard drives, so more suited for portable devices which
get knocked around, dropped etc.
• do not generate a lot of heat
• immediate start-up and data transfer
• lightweight.
6 a
The floating gate is either charged (1) or not charged (0) and stores the data. The
control gate allows the charge to enter or leave the floating gate, i.e. controls the change
in any data.
b • there are questions about the longevity of data held on SSDs
• memory capacity is not as large as a HDD.
7 True False
Statement
(✓) (✓)
Hard disk drive (HDD) platters can be made from ceramic material
✓
coated in iron oxide
Hard disk drive (HDD) surfaces can be split up into tracks and sectors ✓
Hard disk drives (HDDs) are more reliable than solid state drives
✓
(SSD)
DVD disks and Blu-ray disks can both use dual-layer technology ✓
9 Wavelength
Disk type Laser colour Disk is constructed from:
of laser light
b • 1 = switch
• 2 = server
• 3 = bridge or switch
• 4 = router
• 5 = internet
c One advantage and one disadvantage of each from:
WLANs LANs
Advantages: Advantages:
• it is easier to expand the networks and • using cables produces a more reliable
it is not necessary to connect the and stable network; wireless
devices using cables connectivity is often subjected to
• these give devices increased mobility interference
provided they are within range of • data transfer rates tend to be faster and
the WAPs there won’t be any 'dead spots'
• no cabling so there is a safety • setting up cabled networks tends to be
improvement and increased flexibility cheaper overall despite the need to buy
and install cable
Disadvantages: Disadvantages:
• there is an increased chance of • cabled networks lose the ability for
interference from external sources devices to be mobile; they must be
• data is less secure than with wired close enough to allow for cable
systems; it is easier to intercept radio connections
waves and microwaves than cables; it • having lots of wires can lead to a
is essential to protect data number of hazards such as tripping
transmissions using encryption hazards, overheating of connections
• data transmission rate is still slower (leading to potential fire risk) and
than for cabled networks although it disconnection of cables during routine
continues to improve office cleaning
c • data packets are sent from 'X' to the nearest router (e.g. R1)
• R1 checks the IP address and notes that none of the data packets are intended for any
devices on the 'Swedish' LAN
• the data packets are then forwarded over a number of routers to their destination
• at the destination, router R2 (for example) is connected to the 'Pakistan' LAN
• the switch in the 'Pakistan' LAN directs the data packets to computer 'Y'.
4 a Three from:
• webcam
• large monitors or TV screens
• microphones
• speakers
• webcam and microphone software drivers
• CODEC software
• echo cancellation software.
b Potential issues, two from:
• potential time lag in responses/delays when talking
• jerky images – usually due to poor internet/network performance or a poor bandwidth
• can be very expensive to set up in the first place (both the hardware and the software
are expensive to purchase and get set up correctly)
• there can be problems if the delegates live in different countries where the time zone
differences are large
• training people to use the system correctly can be both costly and time consuming
• it can be demotivating for staff if they believe that one of the 'perks' of their job is
international travel
• the whole system relies on a good network connection – if it breaks down or the signal
strength is diminished in any way, then the video conference can be almost unusable.
Advantages, two from:
• as people are in their own building, it is much easier to access important documents or
bring in 'experts' at key parts of the conference – this would be difficult if they were a
long way away from their office
• it is possible to hold conferences at short notice (a conference date can be set up within
a few hours as no person needs to travel very far)
• not travelling physically to meetings reduces costs:
• reduced travelling costs
• no need to pay for hotel accommodation or venue hire
• reduced cost of taking people away from their work for two or three days to travel
– people are still paid their wage even though they are not in the office, so this is a
large 'hidden' cost
• it may be better to use video conferencing than have delegates travel to potentially
unsafe places around the world.
Cambridge IGCSE Information and Communication Technology Teacher's Guide 22
© David Watson 2021
Cambridge IGCSE Information and Communication Technology Theory Workbook answers
5 a web conferencing:
• uses internet (with TCP/IP connections) to allow the conference to take place
• requires a computer and high-speed internet connection
• each user needs to download the appropriate app or log onto the website from the link
supplied in an email from the conference organiser
• the organiser can decide who speaks at any given time
• delegates can post comments using instant messaging to allow all delegates to read
comments
• delegates can draw/write on a whiteboard using a keyboard and a mouse
• it is possible to transmit images and videos to other delegates
• documents can easily be shared.
b phone conferencing:
• refers to meetings between people using sound equipment, such as phone, computer or
internet phone
• the organiser of the conference is given two PINs by the phone company (a personal
PIN and a participant’s PIN)
• the organiser contacts all participants and gives them the PIN, date and time of the
phone conference
• when the conference is about to start, the organiser dials the conference phone number
and then keys in his/her personal PIN
• the participants dial the same conference phone number to join and also key in the
participant PIN sent to them by the organiser.
6 a • the card is swiped through a card reader
• data, such as name, ID, sex and date of birth may be on the magnetic stripe
• access is only allowed if details stored on swiped card match those on the database
• access will be denied if stored details do not match those on the database.
b • addition of a PIN
• use of a holographic image (hologram)
• a photographic image printed directly onto a card.
7 a • a type of authentication in the form of a physical device
• physical tokens contain internal clocks and when a PIN and another authentication
factor is entered (for example a debit card), a one-time password/passcode (OTP) is
generated.
9 True False
Statement
(✓) (✓)
A network interface card has a MAC address hard-wired at the
✓
manufacturing stage
Hubs only send data packets to a specific device on the local
✓
network
A bridge is used to connect a local area network (LAN) to any
✓
external network
Routers use IP addresses to direct data packets to the correct
✓
network
Bluetooth uses spread-spectrum frequency hopping to allow device
✓
pairing
Cloud computing does not require access to the internet to enable
✓
files to be downloaded or uploaded
Wide area networks (WANs) only work over a very limited
✓
distance geographically
Zero login depends on biometrics and behavioural patterns ✓
Advantages Disadvantages
• people no longer have to do manual tasks • labour-saving devices can lead to
at home unhealthy life styles (for instance
• they give people more time for leisure microwave ovens may make people
activities, hobbies, shopping and socialising reliant on ready-made meals)
• there is no longer a need to stay home while • they might make people rather lazy
food is cooking or clothes are being washed because there is a dependence on the
• it is possible to control appliances using devices
smartphones – a web-enabled phone allows • people can become less fit if they just
devices to be switched on or off while the sit at home while the devices carry
owner is out out many of the previous manual
• automated burglar alarms give people a tasks
sense of security and well-being as they • tasks carried out by people in the past
give a very sophisticated level of intruder are now done by the microprocessor-
warning at all times controlled devices, which means there
• smart fridges and freezers can lead to more is a potential to lose these household
healthy lifestyles (they can automatically skills
order fresh food from supermarkets using • as with any device which contains a
their internet connections) as well as microprocessor and can communicate
prevent food waste using the internet, there is the risk of
cybersecurity threats
d Advantages Disadvantages
• microprocessor-controlled devices save • the devices lead to a more wasteful
energy because they are far more society – it is usually not cost effective
efficient and can, for example, switch to repair circuit boards once they fail;
themselves off after inactivity for a the device is then usually just thrown
certain time period away
• it is easier 'programming' these devices • they can be more complex to operate for
to perform tasks rather than turning people who are technophobes or who
knobs and pressing buttons manually are not very confident around electronic
(for example, QR codes on the side of devices
food packaging can simply be scanned • leaving devices on stand-by (such as
and the oven automatically sets the televisions or satellite receivers) wastes
cooking programme) electricity
2 • autonomous
• sensors
• cameras
• safer
• human
• actuators
• smart
• accident
• congestion
• hacking.
3 a • a vehicle under computer-control using sensors and cameras to gather information
about the immediate surroundings/environment
• a vehicle that is capable of movement without the need for any human input.
d • Trains run on fixed tracks (and often in remote/unpopulated areas) so have little
freedom of movement so can be perceived as 'safer' for autonomous systems.
• Autonomous cars mix with human driven cars and may not be considered sufficiently
sophisticated to respond to situations caused by human drivers.
• Plane crashes always attract negative attention and the public has potential worries that
an autonomous plane could crash in a public area.
• Other points might include:
• Reluctance to rely on the technology – some people might find it hard to believe
that a computer could be safer than a human.
• What happens if there is a computer problem (for example, a hardware or
software failure)?
• How safe is the technology in counteracting hacking and malware attacks?
4 True False
Statement
(✓) (✓)
5 Health risk Cause of health risk Methods of removing/reducing the health risk
• use fully adjustable chairs to give the correct
caused by sitting in posture
Back and front of a computer • use foot rests to reduce posture problems
neck strain screen for long
periods of time • use tiltable screens to ensure that the neck is at
the right angle
• ensure that correct posture is maintained
(i.e. correct angle of arms to the keyboard and
mouse, for example)
damage to fingers
and wrists caused by • make proper use of a wrist rest when using a
Repetitive
continuous use of a mouse or keyboard
strain injury
keyboard or repetitive
(RSI) • take regular breaks (+ exercise)
clicking of mouse
buttons, for example • make use of ergonomic keyboards
• use voice-activated software if the user is prone
to problems using a mouse or keyboard
• if necessary, change screens to LCD if older
CRT screens are still used
• take regular breaks (+ exercise)
caused by staring at a
computer screen for • make use of anti-glare screens if the room
too long or by having lighting is incorrect (or use window blinds to cut
Eye strain
incorrect lighting in out direct sunlight)
the room (causing
• users should have their eyes tested on a regular
screen reflections)
basis (middle-vision glasses should be prescribed
if the user has a persistent problem with eye
strain, dry eyes, headaches, etc.)
• make use of anti-glare screens if the room
lighting is incorrect (or use window blinds to cut
out reflections which cause squinting, leading to
caused by incorrect headaches)
lighting, screen • take regular breaks (+ exercise)
Headaches
reflections, flickering
screens, and so on • users should have their eyes tested on a regular
basis (middle-vision glasses should be prescribed
if the user has a persistent problem with
headaches)
• proper ventilation should exist to lower the ozone
caused by laser gas levels to acceptable values
printers in an office
Ozone • laser printers should be housed in a designated
(symptoms are dry
irritation
skin and respiratory printer room
problems) • change to using inkjet printers if possible
6 ICT applications
1 a paper-based, three from
• it is easier to target the exact audience
• you can be more certain your advert has been delivered
• posters, if placed strategically, can be seen every day by people
• they catch the attention when in poster-form.
computer-based, three from:
• sound/video/animation can be added
• hyperlinks and hotspots can be used to link to other websites/web pages
• buttons can be added to navigate/move around the website, leading to more
information
• hit counters to see how many people have visited the website
• they can be seen by a global audience
• they cannot be defaced or thrown away
• it is much easier to update a website (and there is no need to do a reprint and then
distribute the new version).
multimedia advertising in a shopping mall, three from:
• use of sound and animation/video effects can be used which are more likely to grab
the attention of the audience, and which can also make the presentation easier to
understand
• it is possible to have interactive/hyperlinks built into the presentation; this means the
presentation could access a company’s website or even key files stored on the cloud
(such as video footage, images, spreadsheets and so on)
• the use of transition effects allow a presentation to display facts in a key or
chronological order
• presentations can be interactive
• it is more flexible; because of the links to websites and other external systems (for
example, the cloud), presentation can be tailored to suit a particular audience.
b i A method used to talk to people using computers or internet-phones connected to the
internet
ii microphone, (loud) speakers
iii Advantages, one from:
• computer-to-computer communication over the internet is free
• it can make use of built-in camera to make a video call.
Disadvantages, one from:
• sound quality can be poor
• there are potential security issues (due to viruses, for example)
• it requires a high-speed broadband connection.
2 a Three from:
• the number of vehicles passing the junction in all directions, along with a vehicle count
• how many vehicles build up at the junction
• the time of day
• the day of the week, along with special days such as bank holidays etc.(to understand
how that might alter how the data needs to be interpreted)
• how long it takes a vehicle to clear the junction
• other data could include: pedestrian crossings, nearby left turns, right turns,
filtering, etc.
b Three from:
• using computer models is less expensive than having to build the real thing (for
example, a bridge)
• on many occasions it is safer to use a computer model (some real situations are
hazardous; for example, chemical processes)
• when using computer modelling it is much easier to try out various scenarios in
advance
• it is nearly impossible to try out some tasks in real life because of the high risk
involved or the remoteness (for example, outer space, under the sea, nuclear reactors,
crash testing cars, etc.)
• it is often faster to use a computer model than to do the real thing (some applications
would take years before a result was known; for example, climate change calculations,
population growth, etc.).
c
3 Reasons Disadvantage?
(✓)
Robots have difficulty in doing 'one off' tasks ✓
Management can move factories anywhere in the world
Using robots can lead to unemployment
Robots manufacture more items per hour than humans
All items produced using robots are identical
The set up and maintenance of robots is expensive ✓
c Three from:
• oil/mineral prospecting
• medical diagnosis
• strategy games, such as chess
• tax/financial planning
• route scheduling for delivery vehicles
• identification of plants, animals, chemical compounds etc.
d • run the system using input data with known outcomes
• compare the results from expert system with existing system
• make any changes as necessary.
6 True False
Statement
(✓) (✓)
The making of prosthetic limbs is one example of an expert system
✓
application
One of the disadvantages of expert systems is that the results are inconsistent ✓
Expert systems are not infallible ✓
An explanation system provides the user with the reasons why an expert
✓
system came to its final conclusion
The rules base acts like a search engine in an expert system ✓
The knowledge base in an expert system is made up of objects and attributes ✓
When setting up an expert system, the first task is to gather information from
✓
knowledgeable sources
7 a ANPR:
• an abbreviation for automatic number plate recognition
• it is used to read the number plates on a car
• for example, to control the entry/exit barrier to a car park.
8 Three from:
• emergency services use GIS to send the closest emergency personnel to a location
• biologists and environmentalists use GIS to protect animal life and plants in certain
vulnerable areas (which meet certain criteria after carrying out a search on the database)
• teachers can use GIS in their geography, science or engineering lessons
• crime mapping can take place in a region or in a country
• route monitoring (used in conjunction with route scheduling software)
• management of agricultural crop data
• addressing public health issues, for example, in the COVID-19 pandemic of 2020–2021 to
show the spread of the virus in different parts of the world and where data could be
combined with other data (such as, age groups, ethnic type, population density, and so on)
to create a unique insight into how the virus spread
• mapping of wildfire risks, for example, in Australia in 2019 during the wildfire outbreaks;
it was possible to map out why and how the fire was spreading.
9 True False
Statements
(✓) (✓)
The sat nav in the car sends signals to the GPS satellites giving the car’s
✓
location
If the maps are not up to date, the driver can be given incorrect
✓
instructions
The satellites move around the Earth keeping track of all the cars ✓
The sat nav system installed in the car has state of the art timing systems ✓
The system can estimate the time of arrival of the car at its destination ✓
Paper maps have been scanned in so that the route shows up on the sat
✓
nav screen in the car
10
11 a NFC devices communicate at up to 5 centimetres; they are not time dependent and do not
require devices to be paired.
b OMR is used to read pencil or pen marks written on a pre-printed grid; lozenges are filled
with pencil or ink to indicate choices.
c Passive RFID chips do not have a power source; they use the reader’s radio wave energy to
send back information.
d Satellites do not transmit the coordinates to on board sat nav devices; sat nav software
triangulates signals received from at least three satellites to determine the exact position of
the vehicle.
e Sound waves are not transmitted; radio waves are used as carrier waves to send data to the
satellites.
12 a geographic information system (GIS)
b RFID scanner
c token(isation)
d internet banking/shopping/commerce
e expert system
f computer simulation.
13 a Three from:
• sensors could be used out in the river to monitor water level and rate of flow (and
possibly other factors, such as wind speeds); using sensors would give a much faster
response to any deteriorating conditions in the river
• using a computer system is safer, because using humans to monitor conditions could
potentially put them at risk
• data collection is continuous and more accurate than manual measurements (readings
can also be taken more frequently)
• because of the faster response to changing conditions, city dwellers can be warned well
in advance of any flooding actually taking place
• data from the sensors could also be fed into the simulation modelling the flood area;
this could lead to further improvements as more data is gathered, which means that the
simulation becomes closer to reality.
b • it has a faster response to changing conditions
• it is much safer since it is no longer necessary to use 'look outs' who could be in danger
during extreme weather
• data is continuously collected irrespective of weather conditions or time of day (for
example, during the night).
4 Cheque image and digital record are added to file of all cheques for bank 'A'
7 Bank 'A' receives data stream containing 'request to pay' and 'no pay' messages
8 Central facility routes all 'request to pay' and 'no pay' responses to bank 'B'
19 a media streaming:
• refers to media content
• … which can be live or pre-recorded
• which is sent to computer/smartphone/tablet
• using the internet and played back on a device in real time
• streaming is done via data packets sent over the internet
• continuous transmission of video or audio files from a remote server to a user’s device
• streaming removes the need to store files on device storage, such as HDD or SSD.
b buffering:
• the temporary storage of data
• to prevent 'freezing'
• because playback is often faster than the data streaming rate
• while the buffer receives data packets, it is sending previous data packets to the media
player (playback is always a few seconds behind data receiving time).
c subscriber identity model:
• SIM card installed in a mobile phone
• … to allow it to connect to the mobile phone network.
d simulation:
• creation of a model of a real system
• in order to study the behaviour of the system
• it is computer-generated and is based on mathematical representations.
e end effector:
• a device connected to a robotic arm
• it allows the arm to carry out a number of functions.
f e-ticket:
• electronic ticket
• sent to a device to act as the ticket for entry to an event, theatre, etc.
• often shows as a QR code or barcode.
g out clearing:
• camera takes image of cheque at bank where cheque is presented
• OCR software turns the cheque image into an electronic data format
• creating a digital record of money to be paid, sort code, account number, date and
signature.
h expert system:
• software developed to mimic the expertise and knowledge of an expert
• made up of HCI, explanation system, inference engine, knowledge base and rules base.
i near-field communication:
• uses RFID technology
• can be passive or active
• three types: peer-to-peer, read-write mode and card emulation mode
• range is up to 5 centimetres
• does not require devices to be paired.
j tokenisation:
• a user takes a photo of card using a smartphone camera
• the image is stored on a smartphone which reads details such as card number and
bank name
• then details are transmitted to the bank that issued the card
• the bank now replaces details on the card by a series of randomly generated numbers
(called tokens)
• tokens are changed every time NFC transaction takes place.
20 a rules base:
• a set of inference rules
• inference rules are used by the inference engine to draw conclusions (the methods used
closely follow human reasoning)
• inference rules follow logical thinking; usually involving a series of 'IF' statements,
for example: IF continent = 'South America' AND language = 'Portuguese' THEN
country = 'Brazil'.
b knowledge base:
• a repository of facts
• it stores all the knowledge about an area of expertise obtained from a number of expert
resources
• it is basically a collection of objects and their attributes.
c inference engine:
• the main processing element of the expert system
• the engine acts like a search engine examining the knowledge base for information/data
that matches the queries
• responsible for gathering information from the user by asking a series of questions and
applying responses where necessary; each question being asked is based on the
previous responses
• the problem-solving part of the expert system which makes use of inference rules in the
rules base
• because the knowledge base is a collection of objects and attributes, the inference
engine attempts to use information gathered from the user to find an object that
matches (making use of the rules base to find a match).
d explanation system:
• informs the user of the reasoning behind the expert system’s conclusions and
recommended actions
• will supply a conclusion and any suggested actions to take; the important thing is that
it will also give the percentage probability of the accuracy of its conclusions.
3 a 15 (D)
b decimal/real (B)
c program listings (C)
d how to print out a document (A)
e examine the documentation (D)
4 a i Four from:
• have a heading to make the purpose of the form clear
• make it clear to the person filling in the form where they must place their answers
• make use of text boxes which will limit the amount of information collected
• make use of character boxes for data such as surnames, telephone numbers, and so
on (each box allows one character only)
• make use of printed text boxes to allow for easy input of items such as date of birth
• make use of tick boxes to make choices easier (such as gender – male, female,
prefer not to say, or similar)
• make sure there is sufficient space to write answers
• make use of clear fonts and clear text colours to ensure the form is easy to read.
ii
b i Five from:
• the use of text boxes to capture key data clearly
• the use of on-screen help when completing the form
• the use of drop-down/combo boxes where there are limited choices
• the use of radio buttons and tick boxes requiring a single click of a mouse to select
• automatic validation of data as it is entered
• control buttons (such as next form, clear entry, save, etc.)
• double entry boxes (with verification rules) to check correctness of key data (for
example, when keying in an email address).
Program listing/coding ✓
How to print out data ✓
Hardware requirements ✓
Software requirements ✓
Sample runs (with results) ✓
Validation routines ✓
Systems flowcharts ✓
How to add/delete/amend files ✓
The meanings of possible error messages ✓
Troubleshooting guide ✓
6 a i Data that is acceptable/valid and has a known outcome; for example, a month can be
any integer between 1 and 12.
ii Data at the limits of acceptability/validity; for example, for month data this would be
1 or 12 (end values).
iii Data outside the limits of acceptability/validity and should be rejected or cause an error
message; for example, for month data, any number less than 1 or greater than 12, non-
numeric and non-integer values.
b Normal Extreme Abnormal
Input data
(✓) (✓) (✓)
0 (✓) ✓
22.5 ✓
15.1 ✓
18 (✓) ✓
1 ✓
fifteen ✓
2.175 ✓
−10 ✓
25 ✓
b Three from:
• field length
• data type
• any special codes used, e.g. XL standing for 'extra large'
• is it a primary field?
c • input formats/data capture forms
• output formats/screen layouts/report layouts
• validation routines.
8 Example of data item Example of data item that
Field name Validation check that would PASS would FAIL validation
validation check check
credit card range 1234 5678 9012 3456 1234 5678 9012 345
number character check 1234 5678 9012 3456 ABCD 1234 EFGH 5678
red
123
colour character check black
B*1*
white
character check XS 34
size
format (X or XX) M XXS
ii For example:
error message/data
E 2.0 abnormal
rejected
error message/data
F 12.5 abnormal
rejected
error message/data
G −3.5 abnormal
rejected
error message/data
H twelve abnormal
rejected
2 a e-safety:
• refers to the benefits, risks and responsibilities when using IT equipment
• often defined to be the safe and responsible use of IT technology
• also concerned with user behaviour as well as electronic security when: using the
internet, when sending/receiving emails, using social media or online gaming.
b Five from:
• When using the internet make sure that the websites being used can be trusted (for
example, look out for websites including https and/or the green padlock symbol).
• Only purchase items from websites that offer secure, encrypted connections.
• When using search engines, always make sure the device settings are set to 'safe search'
and the highest possible level of security is used.
• Only use websites recommended by teachers, parents or from trusted sources.
• Be careful what you download; is the material potentially offensive or could it be
malware?
• It is essential that anti-virus or anti-malware software is always running in the
background and is kept up to date.
• Always remember to log out of sites when you have finished using them; remember
that cookies are used every time you log into a website (take particular care with
websites that store key data such as bank account or credit/debit card details).
• Check that email addresses or website addresses pertaining to come from a genuine
company contain the company name; for example, a web page with the address
[email protected] should be treated with caution, whereas
[email protected] is more likely to be genuine.
3 a i Three from:
• name
• address or email address
• ID card/passport number
• IP address
• cookie ID
• advertising identifier on a mobile phone
• date of birth
• banking details (account number)
• photograph of an individual.
ii Three from:
• ethnicity
• political views
• membership of a political party
• membership of a trade union
• religion
• sexual orientation
• criminal record
• genetic data/DNA
• biometric data.
b Three from:
• predators (people who prey on others who they see as vulnerable)
• cyber bullying (the use of electronic communication to bully a person, typically by
sending messages of an intimidating or threatening nature)
• use of webcams which allow people to see into homes
• voice-masking technology (to disguise a voice so you cannot tell their sex or age, or
even their accent)
• viruses, phishing or spyware
• violence in the game itself, which can lead to violent behaviour in reality.
4 Descriptions of security risk Name of security risk
The act of gaining unauthorised access to a user’s computer hacking
The use of legitimate-looking emails that contain links to fake
websites; once the user clicks on the link, their browser is sent to phishing
this fake website
Malicious code installed on a user’s HDD/SSD or on a web
server; the code will redirect the user’s browser to a fake website pharming
without their knowledge
Program code that can replicate, with the intention of deleting,
corrupting or altering data/files on a computer’s HDD/SSD; this virus
causes the computer or software to malfunction
Malware that does not need an active host program to do damage
to, for example, a network of computers; they replicate without worm
targeting any specific files or programs on a computer
Software that gathers information by monitoring keyboard
activity carried out on a computer; the gathered data is sent back key logger/spyware
to the cybercriminal who sent the software in the first place
b i digital certificate:
• a pair of files stored on a user’s computer used to encrypt and decrypt
communications
• files divided into public key and private key.
ii Three from:
• sender’s email address
• name of digital certificate owner
• serial number
• expiry date
• public key
• digital signature of CA (certificate authority).
c secure sockets layer:
• type of protocol
• … that allows data to be sent and received securely over a network/internet
• recognised by appearance of https and/or green padlock.
7 a secure sockets layer (C)
b automatic teller machine (D)
c one-time passcode/password (A)
8 a Pharming is software on a hard drive or web server that sends the web browser to a fake
website without any action from a user; the clicking on a link in an email is actually known
as phishing.
b Using a scanned image of a card is not enough to make a plastic, usable copy; the
magnetic stripe needs to be magnetically copied using a skimmer or shimmer (if the chip is
to be read as well).
c Backing up files does not safeguard against a virus attack because the backed-up data may
contain the virus attachments, which would then be reintroduced into the computer system
if the backed-up files were reinstalled.
d Changing passwords does not guard against key logging software because this is
programming code saved on the hard drive/SSD which can come from a number of
sources.
e The data protection act does not stop hackers; it can merely implement legal action if the
hacker is caught in the act, but does not stop them from carrying out the hacking attack in
the first place.
9 Dangers include:
• Identity theft:
• Do not give out personal information or photos of yourself to people you do not know;
do not let strangers access such photos by always making sure you use the privacy
settings when posting photos of yourself on social media sites.
• The risk of personally identifying yourself or others, risks criminals knowing where
you live:
• It is important that none of the photos you post can link you to a place or an address
(for example, it is not a good idea to show the number plate on a car because it is
possible to find your address from this information); particular care should be taken not
to post photos of yourself in some form of school uniform; again, this gives somebody
information about where they can find you. Do not post email addresses or real house
addresses, because these can be used to find information about you, or lead to stalking
or even breaking into your house.
• You know nothing about strangers on the internet and they may try to exploit you:
• Always maintain privacy settings to stop 'non-friends' from contacting you and make
sure you control who has access to your profile. Only make friends with people you
know or who are known to other friends.
• Block or report anybody who acts suspiciously or uses inappropriate language.
• Be very careful with the language used in chat rooms; always use a nickname and
not your real name.
• Keep private and personal data secret.
• Stay in public chat rooms.
• Never arrange to meet anyone for the first time on your own.
• Always tell an adult if anyone you do not know wants to meet you in person.
• Avoid the misuse of images.
• Always respect people’s confidentiality.
b Four from:
• online banking and all online financial transactions
• online shopping/commerce
• when sending software out to a restricted list of users
• sending and receiving emails
• using cloud storage facilities
• intranets and extranets (as well as the internet)
• Voice over Internet Protocols (VoIP) when carrying out video chatting and/or audio
chatting over the internet
• used in instant messaging
• when making use of a social networking site.
11
5 Karl keys the 8-digit PIN into the web page using his tablet
c • an email is sent to Karl which contains a link to a webpage where the password
can be re-set
• another email is then sent to Karl warning him that their password has just been
changed and asking him to report if it was not him that made this change.
13 a i Three from:
• Fingerprints are fairly unique, therefore this technique would improve security
because it would be difficult to replicate a person’s fingerprints.
• Other security devices (such as magnetic cards) could be lost or even stolen, which
makes them less effective.
• It would be impossible to 'sign in' for somebody else because the fingerprints
would match up to one person only on the database.
• Fingerprints cannot be misplaced; a person always has them.
ii Three from:
• It is relatively expensive to install and set up.
• If a person’s fingers are damaged through an injury, this can have an effect on the
scanning accuracy.
• Some people may regard it as an infringement of civil liberties.
b i Three from:
• signature recognition
• retina scans
• iris recognition
• face recognition
• voice recognition.
Biometric
Benefits Drawbacks
technique
• non-intrusive
• if individuals do not sign their
• requires very little time names in a consistent manner there
Signature to verify (about five may be problems with signature
recognition seconds) verification
• relatively low-cost • high error rate of 1 in 50
technology
• very high accuracy • it is very intrusive
Retina • there is no known way • it can be relatively slow to verify a
scans to replicate a person’s retina scan with stored scans
retina pattern • very expensive to install and set up
• very high accuracy • very intrusive
Iris • verification time is • uses a lot of memory for the data to
recognition generally less than 5 be stored
seconds • very expensive to install and set up
• non-intrusive method • it is affected by changes in lighting,
Face the person’s hair, their age, and if
• relatively inexpensive
recognition
technology the person is wearing spectacles
• a person’s voice can be easily
recorded and used for unauthorised
• non-intrusive method
access
• verification takes less
Voice • low accuracy
than 5 seconds
recognition • an illness, such as a cold, can
• relatively inexpensive
change a person’s voice, making
technology
absolute identification difficult or
impossible
14 True False
Statement
(✓) (✓)
A Trojan horse contains malicious code embedded in legitimate-looking
✓
software; it needs to be executed by an end-user
Eyestrain is an example of a safety risk associated with using IT equipment ✓
A person’s political and religious views are regarded as being personal data ✓
Http in a browser window indicates that the website is using SSL encryption ✓
Smishing uses the SMS system on a mobile phone to send out fake text
✓
messages to a user
The term malicious use refers to data deletion, fraud, identity theft and
✓
selling personal and sensitive data
Worms require an active host program to be initiated in a computer or
✓
computer network
Plaintext is the result of putting cyber text through an encryption algorithm ✓
9 Audiences
1 a Three from:
• the age of the target group
• the experiences of the audience
• the expectations of the audience
• the knowledge of the audience.
b Three from:
• interviewing a cross-section of the target group
• giving out paper questionnaires to people in the target group
• creating online surveys
• carrying out market research – this could involve the two techniques described above
plus focus groups, but would certainly involve a more sophisticated and in-depth
analysis of the data received (it would all depend on how large the 'affected' audience
is likely to be).
2 a Creating illegal copies of software.
b Three from:
• When software is being installed, the user could be asked to key in a unique reference
number or product key (a string of letters and numbers) which was supplied with the
original copy of the software (for example: 4a3c 0efa 65ab a81e) – without a valid
product key the software will not work.
• The original software packaging often comes with a sticker informing the purchaser
that it is illegal to make copies of the software; the label is often in the form of a
hologram indicating that this is a genuine copy.
• Some software will only run if the CD-ROM, DVD-ROM or memory stick is actually
in the drive; this stops illegal multiple use and network use of the software.
• Some software will only run if a dongle is plugged into one of the USB ports.
• The user will be asked to click 'OK'/'I AGREE' or put a cross in a box to agree to the
licence agreement before the software continues to install – while this does not stop
piracy it does make it clear that the software is legally protected by copyright.
c Three from:
• It is illegal to make a software copy and then sell it or give it away to a friend or
colleague.
• It is illegal to use software on a network or in multiple computers unless a licence has
been acquired to allow this to happen.
• It is illegal to use coding from the copyright software in your own software and
then pass this software on or sell it as your own without the permission of the
copyright holders.
• It is illegal to rent out a software package without permission to do so from the
publishers.
• It is illegal to use the name of copyrighted software on other software without
agreement to do so.
3
4 a For example:
• age range
• income levels
• what other games they like
• other interests
• are there any additional needs?
5 a product key:
• string of letters and numbers (hex notation)
• supplied with original software
• this key needs to be keyed in when software is being installed to check its authenticity.
b software piracy:
• making an illegal copy of software and then selling it or giving it away to a friend or
colleague
• using software on a network or in multiple computers without a licence
• using coding from copyright software in your own software without the permission of
the copyright holders
• renting out software without permission to do so from the publishers
• using the name of copyrighted software on other software without agreement to do so.
c a dongle:
• a small device plugged into a USB port used to protect the software
• it may contain important files and the software will only run if the dongle is present
which is therefore an additional layer of security.
d infringement of software copyright:
• illegal copying or distribution of software, for all of the reasons given in b above.
6 True False
Statement
(✓) (✓)
Sound, video and animation will always detract from the message given
✓
in a presentation
The gender of a target audience when developing new products does not
✓
need to be considered
When developing a new product, it is irrelevant to consider the income
✓
levels of the target group
A hologram on the cover of a new CD/DVD is used to indicate it is a
✓
genuine copy
It is illegal to make copies of software and then give copies of it to friends
✓
and family
10 Communication
1 a Three from:
• Many countries require senders of emails to obtain 'opt in' permission before the emails
are sent out.
• Companies must provide a subscriber with a very clear way to unsubscribe from their
listings.
• Companies and organisations must make their privacy policy very clear to subscribers
and they must be made aware of such policies.
• Many countries do not allow companies or organisations to harvest email addresses
(this is the process of capturing lists of email addresses).
• A valid postal address must accompany emails from companies or organisations.
• It is important that emails must not be sent out with a false or misleading subject line.
b Passive attacks include the release of email material to other users without your consent.
Active attacks involve the modification of your messages or even denial of service (i.e.
overloading your system by sending you thousands of emails, which 'clogs up' your
computer and makes internet access almost impossible). Active attacks can also involve
viruses or phishing attacks.
c Three from:
• It is easier for a user to send out multiple emails if the addresses are all grouped
together under a single name; the user only needs to use that single name in the 'to'
box.
• Companies and organisations can group people together for marketing purposes, for
example according to age, hobbies, favourite music and so on – this means that each
email can target specific groups.
• Companies use email groups to set up meetings (for example, for a video conference)
to ensure that everybody is always invited to attend – it would be easy to forget a
person if the email addresses were all typed in individually; this way you can be sure
all the correct recipients are sent messages.
2 a Internet Intranets
Feature
(✓) (✓)
Information available to users is specific to a particular
✓
company or organisation only
Requires passwords and user IDs to be entered to gain access to
✓
the network
b Four from:
• Each member is provided with free web space.
• Each member can build their own private and public profiles.
• It is possible to upload content such as text messages, photos and videos.
• It is possible to post public messages to others on the site.
• Members are given free instant messaging and video chatting.
• It is possible to email other members within the community.
• Members can create pages where they can post photos, articles, and so on.
• It is possible to invite people to become friends.
• Members have control over who can access their private or personal data.
c i ISP:
• stands for internet service provider
• company that provides users with access to the internet
• requires a monthly fee
• has equipment and infrastructure to allow internet access.
ii netiquette:
• stands for interNET etIQUETTE
• it means the need to respect other users views and …
• … display common courtesy when posting views in online discussion groups or
when sending out emails.
iii microblog:
• used in social networking sites to …
• … make short, frequent posts (blogs)
• posts can be created using instant messaging, emails, or, for example, tweets
• social networking sites use microblogs to allow members to update their profiles.
iv URL:
• stands for uniform resource locator
• used by browsers to find and access websites on webservers
• represented by a series of numbers (for example 109:108:158:1) or by
alphanumeric format: protocol://website address/path/filename.
5 Advantages, three from:
• a very fast and easy way to search for information
• information available is vast, therefore a search engine is needed to sift through potential
websites based on search criteria
• there is no need to go to a library to do research
• searching is free.
Disadvantages, three from:
• the internet is not regulated – anything can be posted on a web page and, consequently,
information may be biased or totally incorrect (books, on the other hand, usually undergo
some form of review before being published)
• there is a risk of accessing inappropriate websites when using search engines; these can
take many forms and can be very distressing
• it is too easy to be distracted when searching on the internet – users can find computer
games or enter social networking sites instead of doing their work
• there is a risk of 'information overload' if the user lacks the necessary experience or
expertise when using search engines
• because it is very easy to copy material from the internet, there is a huge risk of plagiarism;
this is more likely to occur than when using hard-copy books because this requires
considerably more effort than a simple copy and paste
• some research skills are lost when using the internet as search engines do all the work
for you.
6 a Four from:
• Do not be abusive and do not threaten people.
• Do not send spam – do not repeatedly send somebody the same information.
• Be clear and succinct with your message – do not write long messages full of irrelevant
information.
• Respect people’s privacy and do not discuss or publish information that might
embarrass somebody.
• Forgive people’s mistakes – do not be compelled to respond to an error.
• Do not use capital letters to highlight comments – this is seen as 'shouting' in emails,
text messages or online forums.
• Do not plagiarise – always acknowledge quotes used in any messages you write.
• Do not use too many emoticons because they might annoy your readers.
b • There is a need to respect other users' views.
• There is a need to display common courtesy.
• Users cannot see facial expressions or body language, therefore clear writing rules help
to make sure communications are clear.
7 a Internet World wide web (WWW)
• a collection of multimedia web pages
and other information on websites
• users can send and receive emails • uses http(s) protocols to transmit pages
written in hypertext mark-up language
• allows online chatting (via text, audio (HTML)
and video)
• uniform resource locators (URLs) are
• makes use of transmission protocols used to specify the location of web
(TCP) and Internet protocols (IP) pages
• a worldwide collection of • web resources are accessed by web
interconnected networks and devices browsers
• uses the internet to access information
from web servers
b i extranet:
• computer network based on internet technology
• … but designed to meet the internal needs of a company or organisation
• access restricted via passwords and user IDs
• access from specific computers or using a virtual private network (VPN).
ii virtual private network:
• secure connection to a private network (e.g. company’s secure server) made via the
internet
• secret keys used to encrypt all communications between the user and the private
network so no-one can 'eavesdrop', but user can access all of the resources.
8 a i https
ii www.hodder.com
iii .com
iv IGCSE_ICT
b True False
Statement
(✓) (✓)
It is regarded as adequate by law to simply delete images and
✓
messages, declared as offensive, from social media, blogs or wikis
If part of a sender’s email address contains a company name, then
there is a need for the material in the email to follow company ✓
policies
A strong password contains any eight characters ✓
Unsolicited text messages sent to a recipient are known as spam
✓
SMS
ISPs allow the user to view web pages ✓
The internet is an example of a moderated forum ✓
Web browsers provide the user with access to the internet (for a
✓
monthly fee)
One of the problems with using search engines is known as
✓
information overload
9 a i Copies of an email are sent to those in the 'cc' field – they are being sent the email for
reference but it is not addressed to them. The main recipients and 'cc' recipients can all
see the main recipients and the 'cc' recipients.
ii Like a carbon copy except that those in the 'bcc' field are invisible to everyone,
including each other. The only person who can see the 'bcc' recipients is the person
who sent the email. The main recipients and any 'cc' recipients can be seen by all the
'bcc' recipients.
iii This is a file that is added to an email.
b i Only Nicole and the sender can see her name as a recipient.
ii All users can see that Ahmed received the email.
c Some spam emails may contain malicious attachments and forwarding them only makes it
more likely that the malware will spread.
Emails sent to you may contain personal, sensitive, or confidential information.
Forwarding this information may break company policy, put people's security at risk, put
someone in an awkward position or simply embarrass someone.
Emails containing photographs of other people should never be forwarded without
permission.
10