Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13...

26
Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12 s13_qp_13 0417/11/M/J/14 0417/12/M/J/14 0417/13/M/J/14 0417/11/M/N/14 0417/12/M/N/14 0417/13/M/N/14

Transcript of Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13...

Page 1: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory (Chapter 6 Including 2014)

Exam Questions and Answers

Guidance:S10_QP_12

S10_QP_13w12_qp_11

w11_qp_12w12_qp_11

s13_qp_11s13_qp_12

s13_qp_130417/11/M/J/14

0417/12/M/J/14

0417/13/M/J/14

0417/11/M/N/14

0417/12/M/N/14

0417/13/M/N/14

Page 2: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

S10_QP_12

Explain what is meant by the following terms.

Phishing:One from: is using e-mails pretending to be the target's bank Fake email to get personal details

Pharming:One from: is installing malicious code on a pc or server to redirect to fake websites redirecting users to websites which look authentic to get personal details

Spam:(Is the sending/receiving of) unsolicited/junk emails

Page 3: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

S10_QP_13

Describe three ways to evaluate the reliability of information found on a website.

• Check the last part of the URL (for example .gov, .ac, .ed, .sch should be reliable/.org, .co, .com less reliable).

• See if responsible bodies have endorsed the site e.g. NGFL

• Check the date of the last update

• Are any advertisements present

• Are there links to and from the website to and from well known reliable websites?

• Checking the author’s credentials

Page 4: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

S10_QP_13

The internet has given rise to a number of developments, including blogs and wikis.

(a) Give two features of a blog.• Usually single author• readers can add comments but not edit

blog• Reverse chronological structure• Usually personal• External links

Give two features of a wiki.• Usually many authors • Structure determined by content and

users • Usually objective • Internal and external links • Contributors can edit entries

Describe three differences between a blog and a wiki.

• Blog usually has a single author/ a Wiki usually has many authors

• Blog is usually in reverse chronological structure/ a Wiki has a structure determined by content

• and users• Blog is usually personal/someone’s opinion/ a

Wiki is usually objective• Can’t edit a blog/ a Wiki can be edited/ Can only

add comments to a blog

Page 5: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

w11_qp_12

Online banking and ATMs are used by many customers.

Give three advantages to the bank of using online banking• Fewer cashiers/security staff needed – less spent on wages• Fewer branch offices needed – less spent on rates/rent/utilities• Less actual cash handled – fewer robberies• Cheaper to advertise• Lower postal charges• Have access to a wider customer base

Give three advantages to the customer of using online banking. • Less danger of mugging• Don’t have to waste time travelling to bank• Don’t have to spend money on travelling• Can bank at any time of day or night/can bank when banks are closed• Can use it anywhere if there’s an internet connection• Can ask for a loan over the Internet without being embarrassed • Can’t edit a blog/ a Wiki can be edited/ Can only add comments to a blog

Page 6: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

w11_qp_13

Hackers try to defraud online banking customers by pretending to be their bank. Name anddescribe two methods by which they do this.

Phishing:Hackers send an e-mail (appearing to be from the bank) asking for a customer’s (account)details/includes a website link so customers details are gathered

Pharming:Installing malicious code on a pc or server causing users to access websites which lookauthentic/websites are used to gain bank details/redirects a genuine website’s traffic to hacker’swebsite

Page 7: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

w11_qp_13

Marie has purchased a laptop computer. She wants to use it for internet shopping.

Give four advantages to Marie of using internet shopping.• Less danger of mugging• Can shop when shops are closed• Doesn't have to spend time queuing/going around different shops/travelling to shop/can• compare prices at different shops more easily• Can look at wide range of shops• No travelling expenses/don’t waste fuel• Easier to search and find what you’re looking for

Give four disadvantages to Marie of using internet shopping. • Lack of socialising/social contacts• Hackers may intercept data and defraud customer/steal identity• Deprived of personal touch• Phone bills can increase• Without broadband other family members cannot use the phone• Cannot see/feel goods in reality/goods delivered may not be the same standard as those ordered• More vulnerable to phishing/pharming• More vulnerable to viruses• Goods may not be delivered/can’t check the standard of goods before buying• May be hidden costs such as delivery charges

Page 8: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

w12_qp_11

Ali wants to back up his data. (a) Give two reasons why making backups is necessary. • Data could be corrupted on original medium • Data could be accidentally amended/overwritten on original medium • Data could be accidentally deleted from original medium • Data could be maliciously deleted from original medium

Ali thinks that making backups will prevent his data from getting viruses.Describe what a virus is and explain why Ali is wrong.

• Virus is a piece of programming code• Which replicates itself...• Can fill up storage medium making it unusable• Deletes data/change data• Makes software/operating system unusable • If the original medium has a virus the backup will have it as well/backup will have no effect on• the hard disc so it is still susceptible to viruses

Page 9: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

s13_qp_11

Discuss the use of blogs and social networking sites as means of communication.

• Blog is public/anyone can see it• Blog is online diary/personal opinions• Viewers can only add comments on blogs/authors can reply to comments• Only author can edit blog• Social networking sites might only be available to friends of user• Social networking site enable users to send messages to small group of ‘friends’ to arrange• meetings• Friends can respond more quickly to messages within the group to confirm availability• Easier to share photographs with others• Social networking sites can lead to seclusion from society• Social networking sites can lead to cyber bullying

Page 10: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

s13_qp_12

A bank is looking into a variety of security measures to protect its customers’ data. It is worried that hackers may gain access and cause viruses to infect the system.

Explain what is meant by a virus and what it does.

• A piece of programming code/software/program/script• It replicates itself• Attaches itself to files• Corrupts/deletes files/data• Can corrupt or erase the contents of the hard disk• Can completely fill the hard disk/memory making it unusable/slows down operations• Makes software/operating system unusable• One mark is available for an accurate description of method of transmission

Page 11: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

s13_qp_13

Explain what is meant by software copyright.

• Lawful protection....• ......given to authors/software companies and publishers• Relates to the software the author/publisher/company created/published• Prohibits purchaser from making unlimited copies/lend it to others/change the software/sell it• without the company’s permission

Explain how software manufacturers attempt to prevent copyright being broken.

• Encryption of the execution code requires a key to run• Use of a dongle• Registration system requiring the typing in of a registration code• “Guards” are hardware or software modules that monitor the running program and• ensure that it has not been tampered with in any way• Activation code which can be used only on a limited number of machines

Page 12: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/11/M/J/14

Many workers now use computers a lot in their work and this can cause them to suffer from RSI.

Name two other possible health problems and for each one describe a different precaution which could be taken to help prevent it.

• Headaches: Use anti-glare screen (headaches/eyestrain)• Eyestrain: Take regular breaks• Backache: Use straight backed chair/ergonomic/maintain good posture

Page 13: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/11/M/J/14

Discuss the advantages and disadvantages to customers of Internet shopping compared to visiting stores to do their shopping.

Advantages Disadvantages

• Less danger of mugging • Don’t have to waste time travelling/queuing • Don’t have to spend money on travelling to

shops • Greater choice of goods • Can shop when shops are closed • Easier to search and find what you are

looking for • Comparison websites will find you the

cheapest option • Goods may be cheaper as shops have less

staff to pay/less premises to rent • Don’t have to pay car parking charges • Don’t have to pay for shopping bags • Vouchers/special deals are often only

available online/online discounts

• Lack of socialising/social contacts • Hackers may intercept data and defraud

customer • Deprived of personal touch • Cannot see/feel goods in reality • More vulnerable to phishing/pharming • Goods sometimes don’t arrive/substitute

goods may be sent/take longer to arrive/may be delivered to wrong address

• Shipping charges • ISP costs/Possible high connection charges • Initial cost of equipment/phone line • Postal costs of returning item

Page 14: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/12/M/J/14

Describe the effects on people’s lifestyles of the use of microprocessor-controlled devices in the home.

• Microprocessor controlled devices do much of housework • Do not need to do many things manually • Do not need to be in the house when food is cooking • Do not need to be in the house when clothes are being washed • Can leave their home to go shopping/work at any time of the day • Greater social interaction/more family time • More time to go out/more leisure time/more time to do other things/work • Are able to do other leisure activities when convenient to them • Can lead to unhealthy eating due to dependency on ready meals • Can lead to laziness/lack of fitness • Can encourage a healthy lifestyle because of smart fridges analyzing food constituents • Microprocessor controlled burglar alarm provides a sense of security • Do not have to leave home to get fit • Manual household skills are lost

Page 15: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/12/M/J/14

Discuss the advantages and disadvantages, in terms of cost, to customers of using the Internet for home shopping.

Advantages: • Don’t have to spend money on travelling to shops • Goods may be cheaper as shops have less staff to pay/less premises to

rent • Don’t have to pay car parking charges • Don’t have to pay for shopping bags • Vouchers/special deals are often only available online • Comparison websites will find you the cheapest option/can compare

prices more easily

Disadvantages: • May have to pay delivery charges • Postal costs of returning items • Initial cost of equipment/phone line • ISP costs/Possible high connection charges

Page 16: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/13/M/J/14

Explain what is meant by phishing and pharming.

• Phishing involves fraudster sending an e-mail… • …whereas pharming involves fraudster/hacker installing

malicious code on a pc or server • Both involve trying to obtain personal details

Phishing • Email appears to be authentic • Is sent by a fraudster posing as a bank/organisation

Pharming • User is redirected to bogus website • User accesses websites which look authentic • But belong to the fraudster/hacker

Page 17: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/13/M/J/14

An online bank keeps customer account data on their computers. (a) Give one way a hacker can use customer accounts to defraud the bank.

Can transfer money out of account/Can create bogus account/Can transfer money into bogus account

(b) Give three reasons why, despite the risk of hacking, the bank still operates on-line banking.

• Fewer bank employees, so less paid out in wages • Fewer banks needed – less spent on rates/rent • Less actual cash handled – fewer robberies • Less money spent on security staff • More customers attracted by lower interest rates on loans/higher interest rates on saving • accounts

(b) Describe four drawbacks to young people using social networking sites• May make friends with inappropriate people • Cannot be sure the person you are communicating with is the same as the images you have seen. • Can become preoccupied with sites and not do other tasks/perform poorly academically • Can swap coursework/homework inappropriately • Lose person to person social skills/spend less time with family/friends • Prone to cyber bullying • Continual use results in lack of exercise, causing health problems

Page 18: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/11/M/N/14

Discuss the benefits and drawbacks to teachers and students of using the Internet to carry out research.

• Internet is not regulated • Danger of accessing inappropriate websites. • Can take long time to find required information • Have to have internet connectivity/computer/phone line/modem • Internet tends to be up to date • Internet has vast amounts of information/wide range of information • Can access biased/inaccurate/unreliable websites • Lack of expertise can lead to inefficient searching • Easy to plagiarise information

Page 19: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/11/M/N/14

Internet banking allows customers to transfer money from one account to another and pay bills. (a) Describe two transactions that internet banking does not allow you to make• (Cannot) deposit cash • (Cannot) withdraw cash • (Cannot) deposit cheques with most banks

When logging on, as well as typing in their username and passwords, customers have to provide an answer to a security question. Tick two examples of a security question.

Give two drawbacks to the bank of introducing internet banking• Initial cost of hardware/software (is expensive) • Need to retrain staff • Loss of customers/more difficult to sell other services – due to lack of personal touch • System maintenance may be/is expensive/cost of system maintenance.

Page 20: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/11/M/N/14

Teachers should always make a backup of their worksheets.(i) Describe what is meant by a backup. • It is a copy of data • Leaving the original intact • Stored away from the original

(i) Explain why backups are necessary.

• Data could be corrupted on original medium • Data could be accidentally amended/overwritten on original medium • Data could be accidentally deleted from original medium • Data could be maliciously deleted/edited from original medium

Give two methods of preventing viruses other than by using virus protection software.

• Do not download software/music/games from unknown/untrusted sources/(only) download files from reputable sources • Do not open email (attachments) from unknown/untrusted sources • Do not use media from unknown sources

Page 21: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/12/M/N/14

Many bank customers do their banking using the Internet at home. Many transactions can now be done without having to travel to the bank.

(a) Describe three types of transaction which they can do from home.

• Customers can pay bills • Customers can amend/create standing orders/direct debits • Customers can order a new PIN • Customers can stop a cheque • Customers can see recent/pending transactions • Customers can apply for a loan • Have access to up-to-date bank statements/can check account balances • Can transfer funds between the customer’s different accounts • Can amend personal details

(b) Identify one type of transaction which they cannot do from home.

• Withdraw cash/pay in cash

Page 22: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/12/M/N/14

Many bank customers do their banking using the Internet at home. Many transactions can now be done without having to travel to the bank.

Give three benefits to the bank of internet banking.

• Fewer bank tellers so less paid out in wages • Less actual cash handled – fewer robberies • Have access to a wider customer base • Fewer branch offices needed – less spent on rates/rent/utilities • Less money spent on security staff

Give three drawbacks to the bank of internet banking.

• Initial cost of hardware/software is expensive • Need to retrain staff • Loss of customers/more difficult to sell other services due to lack of personal touch • System maintenance may be expensive/costs of system maintenance

Page 23: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/12/M/N/14

A school is going to install a new computer system that uses WiFi. The headteacher is very concerned about the problems that the introduction of such a system will cause.

The safety issue of students tripping over trailing cables has been minimised by using WiFi, and the risk of electrocution has been minimised by the use of automatic circuit breakers.

(a) Give two other safety issues which might occur and for each one describe a method of preventing it.• Issue – heavy equipment falling injuring users • Prevention – sturdy tables/place heavy equipment in centre of tables • Issue – fire might be caused • Prevention – CO2extinguisher/don’t overload sockets/have fans/cooling system

Describe what a virus is and explain how viruses cause problems for computer users• A piece of programming code/software/program/script • It replicates itself • Attaches itself to files • Corrupts/deletes files/data • Can corrupt or erase the contents of the hard disk • Can completely fill the hard disk/memory making it unusable/slows down operations • Makes software/operating system unusable

Page 24: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/12/M/N/14

Describe what a virus is and explain how viruses cause problems for computer users

• A piece of programming code/software/program/script • It replicates itself • Attaches itself to files • Corrupts/deletes files/data • Can corrupt or erase the contents of the hard disk • Can completely fill the hard disk/memory making it unusable/slows down operations • Makes software/operating system unusable

If hackers get into the system, they may plant spyware. Describe what is meant by spyware.

• Software that gathers data from computers without the user realising • It monitors and records all key presses • It sends this information back to the hacker who sent it out • Used to gain personal details of users

Page 25: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/13/M/N/14

Describe three ways in which personal data held on computers can be misused. For each way explain a different method for helping to prevent it.

• Data could be amended • Use a username and password so that only the person who knows these can access the data • Use biometrics so that only that person who has those characteristics can access the data • Use a firewall which prevents unknown computers accessing a network • Data could be deleted • Use a username and password so that only the person who knows these can access the data • Use biometrics so that only that person who has those characteristics can access the data • Use a firewall which prevents unknown computers accessing a network • Data could be read and passed on • Encryption so that data is unreadable to unauthorised users

Page 26: Paper 1 - Theory (Chapter 6 Including 2014) Exam Questions and Answers Guidance: S10_QP_12 S10_QP_13 w12_qp_11 w11_qp_12 w12_qp_11 s13_qp_11 s13_qp_12.

Paper 1 - Theory

0417/13/M/N/14

The use of microprocessor-controlled devices in the home affects an individual’s leisure time, social interaction and the need to leave the home.

Advantages to the individual when microprocessor-controlled devices are used in the home.

Disadvantages to the individual when microprocessor-controlled devices are used in the home.

• Microprocessor controlled devices do much of housework • Do not need to do many things manually • Do not need to be in the house when food is cooking • Do not need to be in the house when clothes are being washed • Can leave their home to go shopping/work at any time of the day • Greater social interaction/more family time • More time to go out/more leisure time/more time to do other

things/work • Are able to do other leisure activities when convenient to them • Microprocessor controlled burglar alarm provides a sense of

security • Do not have to leave home to get fit • Can encourage a healthy lifestyle because of smart fridges

analyzing food constituents

• Can lead to unhealthy eating due to dependency on ready meals

• Can lead to laziness/lack of fitness • Manual household skills are lost • These may malfunction and, because the

individual has left the device unattended, this can lead to fires/damage to the house