1 - Databases · Web viewA keyword is an important word connected to the information you are...

53
1 - Databases......................................................2 2 - Field Types....................................................3 Written Task (3)- Validation.......................................4 4 - Databases......................................................5 5 - Database Revision Questions....................................6 8 – Websites..................................................... 9 7 - Information Systems...........................................11 8 - Coding and Markup Languages...................................13 9- Media Questions – Text and Sound Files.........................15 10 - Storage Requirements.........................................17 11 - Graphic Files................................................18 12- Video and .pdf Files.........................................20 13 - Hardware and Software requirements...........................22 14 - Output Devices...............................................23 15 - CPU..........................................................24 16 - Device Types................................................27 17- Software......................................................29 18 - Backing Storage..............................................30 Written Task (19)- Networks.......................................32 20 - Security Risks...............................................35 21– Security Precautions..........................................37 22– Legal Implications............................................39 23 - Environment..................................................41

Transcript of 1 - Databases · Web viewA keyword is an important word connected to the information you are...

Page 1: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

1 - Databases.........................................................................................................................................2

2 - Field Types........................................................................................................................................3

Written Task (3)- Validation...................................................................................................................4

4 - Databases.........................................................................................................................................5

5 - Database Revision Questions...........................................................................................................6

8 – Websites.....................................................................................................................................9

7 - Information Systems.......................................................................................................................11

8 - Coding and Markup Languages.......................................................................................................13

9- Media Questions – Text and Sound Files.........................................................................................15

10 - Storage Requirements..................................................................................................................17

11 - Graphic Files.................................................................................................................................18

12- Video and .pdf Files......................................................................................................................20

13 - Hardware and Software requirements.........................................................................................22

14 - Output Devices.............................................................................................................................23

15 - CPU...............................................................................................................................................24

16 - Device Types................................................................................................................................27

17- Software........................................................................................................................................29

18 - Backing Storage............................................................................................................................30

Written Task (19)- Networks................................................................................................................32

20 - Security Risks................................................................................................................................35

21– Security Precautions.....................................................................................................................37

22– Legal Implications.........................................................................................................................39

23 - Environment.................................................................................................................................41

Page 2: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

1 - Databases

1 Describe the difference between flat file databases and linked databases or relational databases. (2)Linked database have two or more tables. Flat file databases only have one table and are not linked to any other tables.

2 Explain what is meant by the terms given below: (3)(a) Database File(b) Record(c) FieldA database File is a structured collection of records Records contain the all information about one person or one member of staff-Each individual piece of information is stored in a field.

3 What should the contents of a primary key field always be? (1)Unique

4 Give 2 examples of data which would be suitable for a primary key.SQA number, national insurance number

5 Explain the difference between a primary key and a foreign key. (2)A primary key is a field in a table where the data is unique. A foreign key is a field in one table, which is the primary key in another and is used to link the tables together.

6 What is used to link database tables (files) together? (1)Foreign key

Total Marks: 11

Page 3: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

2 - Field Types

List the eight field types which you may include in a database and give example for each.

Text Fields hold words, for example, names and addresses. NOTE: phone numbers would be text fields because you need to keep the leading 0.

Number Fields hold numbers, for example, a pay number or items bought.

Date Fields hold dates, such as dates of birth or date of registration.

Time Fields, as the name suggests, hold time and are usually combined with Date Fields.

Graphics Fields (OLE Object), are used to hold images, for example a staff ID photograph.

Hyperlink Fields – allow you to link to files stored elsewhere, such as the Internet, network or computer.

Boolean Fields – whilst designed to store a value of 1 or 0, usually allow users to select the option of Yes/No.

Calculated Fields contain a formula which draws on the content of other fields. For example, in the design for a Customer Bill Table shown below, the Total field is a calculated field where the formula is Total: [PRICE]*[QUANTITY]:

Page 4: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Written Task (3)- Validation

List four validation checks which may be carried out on data being entered into a database and give an example for each. (8)

a. Presence Check – this checks that data has been entered and that a field has not been left blank. A primary key field will not allow you to leave it blank. You can set the properties of any other field to also ensure that data is entered and the field is not left blank.

b. Restricted Choice – allows the user to choose from a drop down list containing range of text or other values. These drop-down lists are usually set up when you are creating the structure of your database, by using a lookup wizard data type. Restricted choice also speeds up data entry as the values to choose from have been pre-entered and do not need to be entered again. It also minimises the risk of incorrect data being entered.

c. Length Check – specifies the maximum number of characters a field can hold and will, once set, not permit you to go above this limit. For example a National Insurance Number has a maximum of 9 characters, so a field size for it would be set to 9.

d. Range Check – specifies the range of numbers that data entered in a field must lie within. For example, a date field could be set up so that it would not allow you to enter a date that is out with the values: >=01/05/2016 AND <= 31/05/2016

Page 5: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

4 - Databases

1 Suggest two reasons why a database table might have to be amended. (2)For example, using a STAFF RECORDS database, a new record would have to be added when a new employee joined the staff. It may have to be edited to change the address and phone number when an employee moved house. When an employee resigns and leaves the company, their record would be deleted.

2 Explain the difference between a simple sort and a complex sort. (2)A simple sort is based on the contents of one field.

A complex sort is where two or more fields are used to organise the data into order.

3 Give two ways in which database tables can be sorted. (2)numerically descending or alphabetically ascending.

4 Explain the difference between a simple search and a complex search. (2)A simple search of a database would be done on the contents one field only.

A complex search is where two or more fields are used.

5 Give four criteria which could be included in a search condition. (4)= equals

<> not equal to

< less than

> greater than

6 Explain the benefit of doing a complex search rather than a simple search. (1)

Page 6: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

A complex search allows you to find out more detailed information and allows you to find the answer more quickly.

Total marks: 13

5 - Database Revision Questions

1 Explain the difference between a file, record and field is in a database. (3)

A database File is a structured collection of Records, of related information about something - with the single pieces of information stored in Fields.

2 What is the difference between a flat file and linked tables? (1)a flat file database – which means that it is a single table not linked to any other tables.

3 Give seven field types and give an example of the type of information which might be held in each field type that you have given. (7)

Text Fields hold words, for example, names and addresses. NOTE: phone numbers would be text fields because you need to keep the leading 0.

Number Fields hold numbers, for example, a pay number or items bought.

Date Fields hold dates, such as dates of birth or date of registration.

Time Fields, as the name suggests, hold time and are usually combined with Date Fields.

Graphics Fields (OLE Object), are used to hold images, for example a staff ID photograph.

Hyperlink Fields – allow you to link to files stored elsewhere, such as the Internet, network or computer.

Boolean Fields – whilst designed to store a value of 1 or 0, usually allow users to select the option of Yes/No.

Page 7: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Calculated Fields contain a formula which draws on the content of other fields. For example, in the design for a Customer Bill Table shown below, the Total field is a calculated field where the formula is Total: [PRICE]*[QUANTITY]:

4 What type of key uniquely identifies each record in a database? (1)Primary key

5 What is the purpose of a foreign key? (1)A foreign key is field in one table, which is the primary key in another and is used to link the tables together.

6 Explain why you would use and give an example for: (4)

e. Presence Check – this checks that data has been entered and that a field has not been left blank. A primary key field will not allow you to leave it blank. You can set the properties of any other field to also ensure that data is entered and the field is not left blank.

f. Restricted Choice – allows the user to choose from a drop down list containing range of text or other values. These drop-down lists are usually set up when you are creating the structure of your database, by using a lookup wizard data type. Restricted choice also speeds up data entry as the values to choose from have been pre-entered and do not need to be entered again. It also minimises the risk of incorrect data being entered.

g. Length Check – specifies the maximum number of characters a field can hold and will, once set, not permit you to go above this limit. For example a National Insurance Number has a maximum of 9 characters, so a field size for it would be set to 9.

h. Range Check – specifies the range of numbers that data entered in a field must lie within. For example, a date field could be set up so that it would not allow you to enter a date that is out with the values: >=01/05/2016 AND <= 31/05/2016

6 What can be used to link database tables together to avoid duplication of data? (1)

Foreign keys

Page 8: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

7 Suggest a way in which a database table can be amended. (1)a new record would have to be added when a new employee joined the staff. It may have to be edited to change the address and phone number when an employee moved house. When an employee resigns and leaves the company, their record would be deleted.

8 What two ways can a database table be sorted? (2)simple sort or complex sort

9 Why might you include a linked field in a database? (1)To connect to a website

10 How many values can a Boolean field contain? (1)Two values – yes or no.

11 Explain the difference between a simple sort and a complex sort. (1)

A simple sort is based on the contents of one field.

A complex sort is where two or more fields are used to organise the data into order.

12 How many fields are involved in a simple search? (1)One field

13 What is a complex search based upon? (1)A complex search is where two or more fields are used.

14 Explain the difference between list view and form view. (1)list view – which means all the records are visible on the screen at a time.

Forms -they allow us view the records one at a time.

15 What tool can be used to help create reports and forms? (1)report wizard or form wizard

Total Marks: 29

Page 9: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

8 – Websites

1 Give five media types which can be used to give information on web pages. (5)Information systems can hold and use different types of data, such as text, graphics, sound, animation and video.

2 What is a URL? (1)every web page has a URL (Universal Resource Locator), which is unique to that web page – it’s address!

3 Explain what http is used for. (1)http:// - this is short for Hypertext Transfer Protocol. All web pages are created using Hypertext Mark-up Language (HTML) and http:// is the protocol used to transfer web pages to your computer from an http server.

4 Explain what a domain name is? (1)domain name - the server the web page is stored on.

5 Give four domain types and explain what type of website they would represent. (4)Domain Type Type of Site Country of Origin.com Commercial.org Non-profit Organisation Worldwide.net Internet Company .gov Government.co.uk Commercial UK.ac.uk Academic UK

6 What are hyperlinks used for? (1)Hyperlinks are used to link web pages together.

7 Describe how a hyperlink can be created using either a piece of text or a graphic. (2)Select or highlight the piece of text or graphic that you want to use as the hyperlink.

Page 10: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Choose Insert Hyperlink from the menu.You will be prompted to browse to the page you want to link to.

9 Explain the difference between an internal hyperlink and an external hyperlink. (2)

An internal hyperlink will take you to another page within the website you are currently in.An external hyperlink will take you to a web page on another website on another computer.

10 Which kind of addressing would an internal hyperlink use? Relative or absolute? (1)

A relative URL is when an internal hyperlink is being used to link to other web pages on the website currently being used: For example: education/ema/ This points to the folder education, which has a file within it called ema. The browser assumes the current server is the requested computer system.

11 Give an example of an absolute web address. (1)http://www.dundeecity.gov.uk//

12 What are browsers used for? (1)A program called a browser is needed to help you look at and move from, one web page to another – navigate the World Wide Web.

13 Which two features of browsers can be used to navigate websites? (2)Entering the URL (address) of the web page you want.Clicking on a hyperlink to a web page.

14 What is a search engine? (1)A search engine is a program which you can use to look for web pages.

15 Why are keywords important when using a search engine? (1)

A keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the keyword and then returns a list of URLs for web pages, when it has found the keyword.

16Suggest a keyword or keywords which could be used in a search engine, to find your school’s website. (1)St Joseph’s College, school

Page 11: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Total marks: 24

7 - Information Systems

1 What factors must be considered about the target audience for an information system? (2)Target audience - What is the purpose of your information system and what type of user are you aiming your website at? Are the users you intend to target beginners (novice), intermediate or expert users? Is there an age range?

2 Suggest three ways that can be implemented in an information system to make is usable and accessible. (3)

a. Usability and accessibility of the website, or indeed any information system, should include consideration of clear navigation routes, to make it as easy as possible for users – clear and simple toolbars, with sensible names for internal hyperlinks.

b. Facilities such as on-line help and on-line tutorials.

c. Inclusion of a search facility to speed up users locating pages containing information they want.

3 Why should the names of internal hyperlinks be sensible? (1)So it is clear to the user what they mean

4 What can inclusion of a search facility do? (1)Inclusion of a search facility to speed up users locating pages containing information they want.

5 Detail two considerations which should be given for visual layout of an information system. (2)

Choosing suitable colours for backgrounds and fonts. Choosing an easily readable and attractive font and setting a

good font size. Using the same font and font size on every page or slide. Decide on the type and size of graphics to be included. The same navigation bars in the same position on every page. Careful planning of the content of each page so that it

remains clear and uncluttered. Commands producing the same action each time they are

activated.

Page 12: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Clear steps to lead users through processes, with suitable error messages.

Including sound and video files to add to the appeal of the website or other information system, and increase interactivity by the user.

6 Suggest a way in which the interactivity with an information system can be kept consistent. (1)The same navigation bars in the same position on every page.

7 What should be tested in an information system? (1)Once you have created your information system is it important that you test it thoroughly to ensure that all the links (both internal and external), work correctly.

8 Explain the difference between alpha and beta testing. (2)All initial testing should be done by you as the developer. This is called alpha testing. Once you have debugged any errors you have identified, you should then ask someone else, who has not been involved in the development or implementation of your information system, to test it. This is called beta testing.

9 What six features can be used for navigation in a website? (6)The user can navigate using the address bar to input the URL, the forward and backward buttons, a home button, hyperlinks, breadcrumbs (as mentioned earlier) and site maps. Hotspots are linked to images or objects, the pointer changes to a hand. Site maps provide an overview of the whole website.

10 What is usability? (1)This is how easy it is to use and learn how to use an item. If icons are familiar it makes it easier for new users.

11 Describe three ways in which you can make your website consistant. (3)

The navigation buttons are on the same place on each page The same typeface and colours on each pate A balance of text and graphics throughout

12 Explain readability (1)This is the reading age of the text and how easy it is to understand; there is software that can be used to work this out. (NOTE: Readability of code is different: this is done by adding comments to your program).

13 Explain accessability (2)

Page 13: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

If an information system is able to be used by anyone, including people with disabilities, it is said to be accessible. This can be achieved by using speech recognition, voice synthesiser software or specialist input devices. This means changing the typeface, magnifying the screen, automatic form filing.

14 When might you use a linear navigation ion a web site. (1)When you have to read one page after another

Total marks: /27.

8 - Coding and Markup Languages

1 Why do people use WYSIWYG web authoring software to create web pages? (1)Using WYSIWIG web authoring software makes it easier for people who are not expert computer programmers to create web pages.

2 What is HTML short for? (1)HTML (Hypertext Mark-up Language).

3 What two things does HTML use to create web pages? (2)Tags and elements

4 Give two examples of HTML elements syntax. (2)

• An HTML element starts with a start tag / opening tag.• An HTML element ends with an end tag / closing tag.• The element content is everything between the start and the end tag.• Some HTML elements have empty content.• Empty elements are closed in the start tag.• Most HTML elements can have attributes.

5 What is an HTML element? (1)An HTML element is everything from the start tag to the end tag:

6 Which HTML tag starts a heading? (1)<h1>

7 Which HTML tag ends a paragraph? (1).</p>

Page 14: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

8 Write the HTML code for a hypterlink to St Joseph’s College ‘http://www.stjosephscollege.co.uk/’ (3)

<a href="http://www.stjosephscollege.co.uk/">This is a link</a>

9 Write the tag that ends an HTML document? (1)</html>

10 What are scripts used for? (2)they are small programs written for a special runtime environment, that can automate the execution of tasks which could alternatively be executed one-by-one by a human operator.

11 Give the name of the default scripting language used for HTML. (1)JavaScript

12 Suggest an advantage of using a keyboard macro? (1)It automates frequently used tasks.

13 Give two ways in which macros can be activated. (2)A single key press or click of a button can be used to activate a macro.

14 Give two other advantages of macros. (2) Lots of routine tasks can be recorded in a single macro. A single key press or click of a button can be used to activate a

macro. Macros can increase accuracy as compared to repeatedly doing

the task manually. Repetitive processes are easily automated using macros.

15 Give two disadvantages of macros. (2) If you make a mistake when you are recording a macro it will be

repeated every time you run the macro. Computer viruses can be spread by macros. Sometimes security settings on computers, used to prevent

possible macro viruses, stop the macros from running. Macros usually have to be re-recorded if some part of them needs

to be changed. If someone uses lots of macros, they might inadvertently get

them mixed up and use the wrong one.

Total Marks: /23

Page 15: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

9- Media Questions – Text and Sound Files

1 List four different media types (4)text, graphics, sound, animation and video.

2 What is the advantage of using the standard file formats .txt and .rtf to save text files? (1) Using standard file formats makes the data portable across different computing platforms and improves accessibility.

3 Suggest why it might be better to save a file in rich text format (.rtf) rather than .txt. (2)A rich text format (.rtf file) is also portable across most computing platforms, however an .rtf file does contain all the formatting information, including fonts and sizes used, styles, indentation etc.

4 What are the two standard file formats for sound files? (2)

.wav

.mp3

5 Why do audio, graphic and video files need to be compressed? (1) RAW sound files are very large and take up a large amount of backing storage space so some form of compression is needed to reduce the size of the file.

4 What is sampling depth? (1) Sampling Depth refers to the number of bits used to store each sample of sound.

5 What effect does increasing the sampling depth have on the size and quality of a sound file? (2)

The greater the sampling depth, the higher quality of sound. However the greater the sampling depth, the larger the file size will be.

6 How many different sound levels would you have with a bit depth of:- (2)

8 256 sound levels24 16, 777, 216 sound

levels

Page 16: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

7 How much more backing storage would a bit depth of 16 require for the same sound file compared to bit depth of 8? (1)

This means that a sound file with a sampling depth of 16 bits will require twice the amount of backing storage than the same sound with a sampling depth of 8 bits.

8 What is sampling frequency? (1)

Sampling Frequency refers to the number of times per second a sample is taken.

9 What effect does increasing the sampling frequency have on the size and quality of a sound file? (2)

The greater the sampling frequency, the higher quality of sound. However the greater the sampling frequency, the larger the file size will be.

10 What is WAV file format? (1) WAV file format is one step removed from RAW audio data.

11 Explain fully how WAV files are encoded (2) However WAV files are encoded using lossless compression, by storing the difference between the samples of the audio wave, instead of the actual sound samples themselves, as is done in RAW files.

12 How much smaller can a WAV file be? (1) A WAV file can be a quarter of the size of the same audio file stored in RAW but without any loss of sound quality.

13Explain how lossy compression works when applied to an .mp3 file. (2)

The lossy technique samples data that cuts out parts of the sound that the human ear cannot hear. Once it has cut the inaudible data it uses Huffman encoding to further compress the file size.

14 How much compression can the MP3 format achieve? (1)Compressing files using MP3 format means that audio files can be compressed by a factor of up to 12 with no noticeable loss of quality.

15Give two advantages of lossy compression for MP3 files. (2)

Page 17: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

MP3 files take up less space on backing storage than other audio file formats and take less time to transmit on a network.

Total: 28 marks

10 - Storage Requirements

Calculate the storage requirements in Mb for the following graphics:

1 A 5 inch x 5 inch graphic with a resolution of 300 x 300 pixels using a bit depth of 8 bits. (3)= 5 * 300 * 5 * 300 * 8 = 18,000, 000 bits (1 mark)= 18,000, 000 bits /8 = 2, 250, 000 bytes (1 mark)= 2, 250, 000 bytes / 1024 = 2, 197.27 Kb= 2, 197.27 Kb /1024 = 2.15Mb (1 mark)

2 A 2 inch x 2 inch graphic with a resolution of 200 x 200 pixels using a bit depth of 24 bits. (3)= 2 * 200 * 2 * 200 * 24 = 3, 840, 000 bits (1 mark)= 3, 840, 000 bits /8 = 480, 000 bytes (1 mark)

= 480, 000 bytes / 1024 = 468.75 Kb= 468.75 Kb /1024 = 0.46 Mb (1 mark)

3 A 6 inch x 4 inch graphic with a resolution of 400 x 400 pixels using a bit depth of 24 bits. (3)

= 6 * 400 * 4 * 400 * 24 = 92, 160, 000 bits (1 mark)= 92, 160, 000 bits /8 = 11, 520, 000 bytes (1 mark)

= 11, 520, 000 bytes / 1024 = 11 250 Kb= 468.75 Kb /1024 = 11 Mb (1 mark)

4 4 A 3 inch x 2 inch graphic with a resolution of 200 x 200 pixels using a bit depth of 8 bits. (3)

= 3 * 200 * 2 * 200 * 8 = 1, 920, 000 bits (1 mark)= 1, 920, 000 bits /8 = 240, 000 bytes (1 mark)

= 240, 000 bytes / 1024 = 234.4 Kb= 234.4 Kb /1024 = 0.23 Mb (1 mark)

Page 18: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Total: 12 marks

11 - Graphic Files

1 List four standard file formats for graphics files? (4)

.bmp .jpeg .gif .png

2 Give two reasons why graphics files need to be compressed (2)The file sizes for graphic files can be very large, which means they will take up a lot of backing storage space and will take longer to transmit across networks such as the Internet.

3 Apart from using compression, what can be done to reduce the size of a graphic file? (2)Graphic file sizes can be made smaller by varying the resolution and/or colour depth used and by using compression techniques. However, varying the resolution and/or colour depth and compressing a graphic will have an effect on the file quality and the file size.

4 Write down how much storage per pixel is needed for the following bitmap files (5)

Black and White image 1 bit per pixel16 colour image 4 bits (minimum 1 byte) per pixel256 colour image 2 ^ 8 = 1 byte per pixel65, 536 colour mage 2 ^ 16 = 65, 536 = 2 bytes per pixel16, 777, 216 16, 777, 216 = 3 bytes per pixel

5 Why are bit map (.bmp) files very large? (1)They are uncompressed

6 How does lossy compression work in .jpeg files? (1)This works by cutting out the parts of the graphics which won’t be noticed by the human eye.

7 Explain why lossy compression works in .jpeg files (2)

Page 19: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

As jpegs use True Colour with 16,777,216 colours available – the lossy compression cuts out some of the very subtle variations in colour, which are not noticeable.

8 Below is a .jpeg picture of a cat, where the level of compression varies in the photo.

Draw three lines on your page, similar to the one shown, in any direction you choose.

a. One line should show the direction of ‘rate of compression increasing’.

b. One should show the direction of ‘file size increasing’.c. One should show the direction of ‘quality increasing’. (3)

9 What type of graphics are best saved in .gif format? (1)drawings, charts and diagrams

10 Write out and complete the following sentence.When a graphic file is saved as a .gif file, the file size will ________ but quality will ________.

decrease not change (2)

11 How many bits are used to store every pixel in a .jpeg? (1)24

12 Explain fully why a .gif file can only have 256 colours (2)Only uses 8 bits

13What kind of files are .gif files most suitable for? (1) drawings, charts and diagrams

14 What do .gif and .png files have in common regarding compression? (1)

Quality increasing

File size increasing

Rate of compression increasing

Page 20: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Both use lossless compression

15 Give the number of colours are available in: (2)(a) .gif files - 256(b) .jpeg files - 16, 777, 216

16 Why is the .gif file format not suitable for storing photographs? (1)Too few colours, would make it appear poor quality.

Total: 31 marks

12- Video and .pdf Files

1 What are the two standard file formats for video files (2).mp4.avi

2 What is a video (1)Video is a sequence of frames (individual pictures), taken one after the other. When played back quickly the brain and eyes are tricked into seeing a moving image.

3 Give three reasons why video files are compressed (3)

video files can be very large – one second of uncompressed video could demand 53 Megabytes of storage,

make less demands on backing storage more easily transmitted across networks.

4 How many colours are videos usually captured in? (1)Videos are usually captured in true colour

5 How many bits does true colour require? (1)which requires 24 bits for every pixel.

6 If colour depth in a video is reduced what three changes to the video occur? (3)Reducing the colour depth reduces the file size but limits the number of colours displayed and degrades the quality of the video.

7 What two changes to a video occur if the resolution is increased? (2)Increasing the resolution improves the quality but increases the file size.

8 What two changes to a video occur if the resolution is decreased? (2)

Page 21: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Decreasing the resolution degrades the quality but decreases the file size.

9 What does fps stand for? (1)how many frames are processed per second.

10 What is the standard rate for a video clip (1)30 fps.

11 What effect would reducing the fps in a video have on the size and quality of the video? (1)the file size would reduce but result in a jerky, unsatisfactory playback.

12 Which video file format is uncompressed?AVI

13 Give two limitations of AVI (2) Audio is low quality as it supports only 8-bit samples at a frequency

of 11.025 KHz. It is not compressed – so large file size. Resolution is a maximum of only 320 x 240 pixels. Maximum file size of 2 Gigabyte – so not suitable for large projects.

14 Give the video file format which uses lossy compression? (1)mp4

15Explain how lossy compression works in a video file. (3)This works by looking the differences frame to frame in a video and cuts out the unchanged parts. Although data is lost to achieve compression, when the video is played back the human eye and brain compensate for any loss of data and fill in the gaps.

16 What file format was developed as a means of publishing and sharing documents across networks? (1)Pdf

17 If you open a .pdf file what can you normally not do with it unless you have permission? (1)Change anything

18 What does ‘portable’ mean when referring to a file?It will open or run on any computing system.

Total: 28 marks

Page 22: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

13 - Hardware and Software requirements

1 What is the most common input device used with a computer? (1)

Keyboard

2 What is a mouse used for? (2)Various types of mouse can be used to point and select on the

computer screen.3 Which type of computer uses a touchpad instead of a mouse? (1)Laptop4 Which input device can be used with voice recognition software to input instructions or data into a computer? (1)microphone

5 Give two input devices which use a sensor called a charged coupled device to capture data? (2)

Digital Cameras and Digital Video Camera:

6 Suggest a suitable input device which could be used for video conferencing? (1)

Webcam7 Which input device used for capturing images, has the lowest

resolution? (1)Webcam

8 Which input device can be used to capture handwritten signatures? (1)scanner i

9 Give two input devices which can be used to control video games. (2)Joystick/Joypad:

10 Explain what a scanner is used for. (1)A scanner is used to capture hard copies of documents, including photographs and convert them into digital format so that they can be manipulated or stored on a computer.

11 Which type of software is needed with a scanner to enable documents to be captured in a format which allows computer editing? (1)

OCR

Page 23: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Total Marks: 14

Page 24: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

14 - Output Devices

1. Name two types of printers (2)Inkjet, laser

2. What is the resolution of a printer measured in? (1)Dpi

3 How is the speed of printing measured? (1)Ppm

4 How can pictures from a digital camera be easily printed out? (1)Many inkjet printers now come with a feature which allows the flash memory card from a Digital camera to be inserted, so that images can be printed directly, without having to be uploaded to a computer first

5 What is a monitor? (1)Monitors or screens are peripheral output devices used to display output from a computer on a screen.

6 What is an LCD screen? (1)Liquid Crystal Display

7 Where would you usually find LCD screens being used? (1)smart phones, tablets and laptop computers

8 What is a TFT screen and what is the main advantage of using one? (2)Thin Film Transistor and although TFT screens are more expensive than LCD screens, their main advantage is that animations and graphics are displayed to a higher quaity than is generally possible using LCD screens.

9 What two items of hardware are needed to output sound from a computer system? (2)Loudspeaker and sound card

Total marks: 12

Page 25: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

15 - CPU

1 What is the processor? (1)The processor, is the brain of the computer

2 Copy a fully labelled diagram of the processor into your jotters. Show all arrows. (3)

3 What is the speed of the processor measured in? (1)gigahertz (GHz).

4 What does this unit actually measure of in terms of the processor? (1)it is the number of instructions per second that it can carry out

5 Whydo multi-core processors improve performance for the computer? (1)multi-core processor has more than one processor on a single silicon chip, so it’s better able to handle multiple tasks at once

6 What does 64 bit mean? (1)this means that they can work with chunks of data made up of 64 binary digits.

7 Name the two parts of the CPU. (2)PROCESSOR and MAIN MEMORY

8 Fully explain what RAM is. (3)RAM (Random Access Memory) is used to store any program and associated data currently being run on the computer. When RAM is switched off all its memory contents are lost. This is why RAM is sometimes described as being volatile. If the user wants to make any changes to a file, it must first be loaded into RAM before any changes can be made.

9 Fully explain what ROM is? (3)ROM (Read Only Memory) keeps its memory contents when the computer is switched off. This is why ROM can sometimes be described as being non-volatile. The contents of ROM cannot be altered by the user (anything stored in ROM must be loaded into RAM before any changes can be made).

Page 26: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

10 Where is the computers operating system stored? (1)ROM

11 What is addressability? (1)The ability of the CPU to identify each storage location

12 What is Flash ROM and give an example ? (2)FLASH ROM is similar to ROM, however it can also be used to store data. Flash ROM is used in USB Flash Drives (Memory Sticks) and Flash Memory Cards in digital cameras, mobile phones etc.

13 What is FLASH ROM also called? (1)It is called solid state storage.

14 Where is the Control Unit found? (1)The Control Unit is found in the Central Processing Unit (CPU).

15 Fully describe three tasks that the Control Unit performs. (3) The Control Unit makes sure that everything happens in the

correct place at the correct time. This means that it decodes instructions sent to the processor

and controls peripheral devices (printers, scanners, disc drives etc), as required.

The Control Unit also controls the flow of data around the CPU.

16 Explain the purpose of the ALU. (2)The Arithmetic & Logic Unit (ALU) carries out all calculations (arithmetic) and performs logical operations (it makes decisions).

17 What registers and what are they used for? (2)Registers are memory locations inside the processor. Registers are used to hold the programs and data while they are being processed.

18 Give an example of what kind of information a register will hold. (1)Variables such as Total, ItemCost, Counter

19 What is used to store programs and data permanently? (1)Backing storage

20 What is the purpose of the Address Bus? (2)This carries address information from the processor to main memory or peripherals.

21 In what direction does data transfer on the Address Bus, and what does this mean

Page 27: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

It is uni-directional. This means the address can only be transmitted from the processor to the memory.

22 Why is there no point in the direction travelling the other way? (1)There is no point in the address travelling the other way; the memory is just a set of storage locations, it is the processor that keeps track of the addresses being used by a program.

23 What does the data bus do? (1)This carries data between the processor and the memory or peripherals.

24 What direction does the data flow on a data bus? (1)It is bi-directional.

25 What does this mean? (1)This means that it is possible to transfer data from the processor to the memory/peripheral (one direction) or from the memory/peripheral.

26 What kind of information does each wire on a bus carry? (1)Each wire can only carry a single bit (either a 1 or a 0) of data at one time.

Total Marks: 38

Page 28: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

16 - Device Types

1 What is an embedded computer? (1)An embedded computer is a computer built into the system it is

controlling.

2 Explain why it is necessary for embedded computers to process data in real time. (1)Embedded computers process data in real-time because they need to process information very quickly.

3 Give three features of a smart phone? (3)

Most smartphones also feature, portable media players, compact digital cameras, pocket video cameras, and GPS navigation units to form one multi-use device. Most modern smartphones also include high-resolution touchscreens and web browsers that display standard web pages as well as mobile-optimized sites.

4 Suggest a business which would use a mainframe computer and why. (1)

Very large companies processing huge amounts of data

5 Why are some computers describe as ‘super’? (3)Supercomputers have very fast, multiple processors and a huge backing storage capacity.

6 Which types of computers are unlikely to have a keyboard? (1)Smartphone, tablet or palmtop

7 What is usually used for input on a palmtop computer? (1)Stylus

8 What is clock speed an indicator of? (1)Speed of the computer

9 What is clock speed measured in? (1)GHz

10 List the key features of a: (a) Palmtop computer (1)

They come with an LCD screen for output and may have a small keyboard, however, input is usually via a touch sensitive screen using a stylus. They are battery operated.

(b) Laptop computer (1)

Page 29: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

They come with an LCD monitor for output and a keyboard and trackpad for input. These types of computers have a hard disk and cd/dvd drive for storage, however it is likely that solid state storage (SSD) will start to replace hard disk drives in laptops and notebooks, as they are very robust – having no moving parts.

(c) Desktop computer (1)They are not portable. The common peripheral devices are:

KeyboardMouseMonitor (Liquid Crystal Display)Loudspeakers

Storage Devices typically include Hard Disk Drive and CD/DVD drives.

A network interface card (NIC) is also needed to connect to a local area network (LAN).

(d) Supercomputer computer (1)Supercomputers have very fast, multiple processors and a huge backing storage capacity.

(e) Smartphone (1)mobile operating system, with advanced computing capability and connectivity. Smartphones combine the functions of a personal digital assistant (PDA) with a mobile phone. Most smartphones also feature, portable media players, compact digital cameras, pocket video cameras, and GPS navigation units to form one multi-use device. Most modern smartphones also include high-resolution touchscreens and web browsers that display standard web pages as well as mobile-optimized sites. High-speed data access is provided by Wi-Fi and mobile broadband.

(f) Tablet (1)Tablet computers have a large touch sensitive screen – used with a stylus for drawing and writing.They can be used for web-browsing, e-mail, music, games etc.

11 Explain fully the purposes of an interface. (3)

The functions of an interface are: Temporary Data Storage. Compensating for differences in speed between the CPU and

peripherals. Data Conversion.

Page 30: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

12 Give three examples of commonly used interfaces (3)Mouse, USB, NIC

Total Marks: 25

17- Software

1 Why do computers need software? (1)No matter what hardware a computer systems has, it must be combined with software before it can be used to do any task.

2 State three functions of an operating system. (3) To provide a human computer interface (HCI) so that the

user can interact with the operating system. Managing input and output to and from peripheral devices. Managing the loading and execution of programs. Managing, saving and loading of files to and from backing

storage. Error reporting.

3 Explain the difference between an application program and an operating system program. (2)Operating system runs the computer, application programs are pieces of software which are designed for tasks eg word processing or anti-virus.

4 Give an example of utility software. (1)anti-virus, eg Norton

5 What is an integrated package? (1)When two or more GPP’s are combined together

6 Give the name and the primary function of three application packages. (3)Microsoft Word – word processingInternet Explorer – web browsingMicrosoft Visual Basic – to make software

7 What is the primary function of a web browser? (1)It is a software application for retrieving, presenting and navigating information resources on the World Wide Web.

Page 31: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

8 What is an URL and give an example. (2)An information resource is identified by a Uniform Resource Identifier (URL) and may be a web page, image, video or other piece of content. www.bbc.co.uk

Total Marks: 14

18 - Backing Storage

1 Explain fully why backing storage is needed (2).We need to have some kind of backing storage so that our program and data files are no lost when the computer is switched off and where it can be retrieved from, when it is needed again.

2 Give two costs associated with local storage. (2) Cost of buying and maintaining the software, computers,

backing storage and associated network for sharing of files.

Technical support will need to be provided. File security will need to be provided.

10 Suggest two advantages and one disadvantage of using cloud storage. (3)

The advantages of using cloud storage include: Companies need only pay for the storage they actually

use. Storage maintenance tasks, such as backup, data

replication, and purchasing additional storage devices are offloaded to the responsibility of a service provider, allowing organizations to focus on their core business.

Cloud storage provides users with immediate access to a broad range of resources and applications hosted in the infrastructure of another organization via a web service interface.

Customers have access to technical support.

However, the disadvantages of using cloud storage include: On-going costs of paying for this service. Security concerns about possibility of hacking of

important data.

5 What system do computers use to store data? (1)

Page 32: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Binary system

6 Put measurements of storage capacity in order, from smallest to highest. (4)

1024 Bytes = 1 Kilobyte 1024 Kilobytes (Kb) = 1 Megabyte 1024 Megabytes (Mb) = 1 Gigabyte (Gb) 1024 Gigabytes (Gb) = 1 Terabyte (Tb) 1024 Terabytes (Tb) = 1 Petabyte (Pb)

7 Which backing storage device, offers faster access to data than any other storage device? (1)Hard disk

8 Give two backing storage devices which use magnetic storage. (2)Hard disk, floppy disk, magnetic tape

9 Give two backing storage devices which use optical storage? (2)CD, DVD, Blu-Ray

10 What type of backing storage is a USB flash drive? (1)solid state storage

11 Give two peripheral devices which use flash memory cards. (2)smartphones, MP3 players and digital cameras

12 Explain the term portability, when applied to backing storage devices. (1)

Means they can be easily transported.

13 What is data transfer speed generally measured in? (1)in megabits (million bits) or megabytes (million bytes) per second

14 List typical backing storage capacities for: (5)

(a) Hard Disk – 1 Tb(b) CD-R – 700 Mb(c) DVD-R 4.7 and 17 Gigabytes(d) USB Flash Drive - 1 Gigabyte upwards to 128 Gigabytes.(e) Flash Memory Card 1 Gigabyte upwards to 64 Gigabytes.

Total marks: 27

Page 33: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Written Task (19)- Networks

1 What is a network? (1)A network is formed when two or more computers are linked

together.

2 What three ways can networks be connected together? (3)Networks can be connected by wires, be wireless, or optically.

3. Give three advantages of networks (3) Sharing of data. Sharing of expensive peripheral devices, for example

coloured laser printers. Communication between users on the network. Sharing of software (if the necessary licences are in place).

4. What is a client-server network? (1)A client-server network is formed when the client (workstation) is connected to and makes use of, the resources available on the server(s).

5. What does a client need in order to enable it to connect to a network? (1)The client (workstation) requires a NIC (Network Interface Card) to connect it to the network.

6. What is a peer-to-peer network? (2)A peer-to-peer network is created when two or more computers are connected and share resources without going through a separate server computer. A peer-to-peer network can be as simple as a couple of computers connected via a Universal Serial Bus to transfer files, or can be a permanent infrastructure that links a half-dozen computers in a small office over copper wires.

7. Give one advantage and one disadvantage of a peer-to-peer network (2)The main advantage of having a peer-to-peer network is that you do not have the expense of buying a file server, as all the computers on the network have equal status. However disadvantages include,

Page 34: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

making backups and file security, which are more difficult to implement than on a client/server network.

8. What is the difference between a LAN (local area network) and a WAN (wide area network)? (2)A Local Area Network (LAN) covers a small geographical area such as a classroom or school building. A Wide Area Network (WAN) covers a larger geographical area than a LAN – typically a country or a continent.

9 Describe two types of transmission medium and give an advantage for each. (2)signals carried by copper cable are subject to interference, whereas fibre-optic signals are not. Fibre-optic cable also has a higher bandwith. Copper cable is cheaper.

10 Give two differences between Bluetooth and Wi-fi. (2)Bluetooth makes short-range, temporary links between devices like mobile phones, palmtop and laptop computers.Wi-Fi is used to wirelessly connect devices to one another. The range is usually up to 200 metres and is used for routers, laptop computers, games consoles etc.

11 Give three uses for a WAN (3)

Data sharing Video conferencing E-mail Internet

12 What is the Internet made up of? (1)A number of WANS linked together

13 Why do you need an ISP (Internet Service Provider) to access the Internet? (1)

To provide a connection to the internet

14 Describe two types of transmission medium and give an advantage for each. (4)Fibre option – very fast

Copper cabling – cheap

Page 35: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

15 Give three links used to send data in a WAN. (3)fibre optic, satellite links and microwave transmission.

16 What is bandwidth? (1)Bandwidth is the measure of the amount of data which can be carried by the communication channel at any one time on both LANs and WANs.

17 What is bandwidth measured in? (1)Bandwidth is measured in either Megabits per second (Mbps) or Gigabits per second (Gbps).

18 What is used on a client/server network to store documents? (1)file server

19 In what ways does a file server differ from a desktop computer? (3)Differs by having: large amount of RAM, backing storage and fast multiple processors – so that users can access it quickly.

20 What is the most basic security precaution on a client/server network? (1)

Logging in using username and password

21 Give two reasons why file servers use magnetic tape as a backup. (2)

Cheap and holds a large amount of data

23 Explain how a printer server operates. (2)A printer server is used to allow all the clients (workstations) on a network access to printers controlled by the printer server.

The printer server also provides a facility for queuing up printing requests so that they are printed out in turn. It will have its own processor and enough RAM to hold print jobs which are sent to it.

24 What is the primary function of a web server? (1)

Page 36: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

The most common use of web servers is to host websites, but there are other uses such as gaming, data storage or running enterprise applications.

Page 37: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

20 - Security Risks

1. What is a virus? (1)A virus is a computer program which has been deliberately created to cause damage or disruption to a computer system.

2 Why should you should never open e-mails from someone you do not know. (1)Viruses can be spread by opening e-mails or e-mail attachments

3 What else can allow viruses to be spread? (1)

Portable backing storage devices and their associated media, can also allow viruses to be spread

3 Why is it important to use reputable web sites? (1)You must be very careful that you only download music, videos, software (including games), from reputable websites, as viruses can easily be downloaded over the Internet, without you realising the risk that comes from using “fun” websites.

4 Fully explain the difference between a virus and a worm. (2)A worm is a malware computer program that replicates itself in order to spread to other computers. Unlike a computer virus, it does not need to attach itself to an existing program.

5 What harm can worms cause? (1)Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

6 How can a Trojan fool you into downloading it onto your computer? (1)

A Trojan is a program that pretends to be a helpful program.

7 Find an example of a well know Trojan. (1)http://computer.howstuffworks.com/worst-computer-viruses.htm

Page 38: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

8 What is the main purpose of a DOS (Denial of Service) Attack? (1)

DOS Denial of Service attacks occur when networks are targeted to try and bring them to a standstill.

9 What would “zombie” computers be used for? (1)To use for resources eg RAM, hard disk sapce to continue the DOS attack.

10 Give the name of the software which secretly gathers information through a user’s Internet connection. (1)Spyware is software that secretly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.

11 What does a keylogger do? (1)A keylogger is a hardware device or a software program that records the real time activity of a computer user, including the keyboard keys they press.

12 How can keyloggers be used by companies legally? (1)Keyloggers can also be used by organisations to monitor the network usage of people without their direct knowledge.

13 Which form of hacking is used to fish for personal information? (1)Phishing is usually attempted by sending an e-mail to a user falsely claiming to be an established legitimate organisation, in an attempt to trick the user into surrendering private information that will be used for identity theft.

14 Explain the term identity theft. (1)Identity theft occurs when someone pretends to be someone else, by assuming that person's identity, often in order to access resources or obtain credit and other benefits in that person's name.

15 Give two types of online fraud. (2) By using hacking into a computer system and altering or

stealing data held within the system. By using a keylogger to steal passwords to online account or

bank card numbers. Identity Fraud. Online shopping fraud.

Page 39: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

21– Security Precautions

1 Explain the purpose of anti-virus software. (1)Anti-Virus software is designed to detect and remove viruses, worms and Trojans from computer systems.

2 Explain how anti-virus software works? (1)It should also scan anything being downloaded to check that the item is virus free.

3 What should be included in a password to make it very secure? (1)The most secure passwords are usually formed from a combination of letters (both upper and lower case), numbers and other characters.

4 When logging on what two items of data must be entered? (1)user name and password

5 Describe what happens when data is encrypted. (1)The most popular forms of security all rely on encryption, the process of encoding information in such a way that only the person (or computer) with the key can decode it.

6 Why is data encrypted? (1)All reputable organisations which use networks will have various security measures in place to stop hackers obtaining your personal information.

7 Describe three methods of biometric security. (3) Face - the analysis of facial characteristics. Fingerprint - the analysis of an individual's unique

fingerprints. Hand geometry - the analysis of the shape of the hand and

the length of the fingers.

Page 40: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Retina - the analysis of the capillary vessels located at the back of the eye.

Iris - the analysis of the coloured ring that surrounds the eye's pupil.

Signature - the analysis of the way a person signs his name.

Vein - the analysis of pattern of veins in the back if the hand and the wrist.

Voice - the analysis of the tone, pitch, cadence and frequency of a person's voice.

8 What are network security protocols used for? (1)Network security protocols are used to protect computer data and communication in transit.

9 Which security protocol authenticates the identity of both the server and the client? (1) Secure Sockets Layer/Transport Layer Security (SSL/TLS)

10 What should the URL start with if it encrypts data communications and verifies the identity of a web server? (1)

HTTPS encrypts communications and verifies the identity of a web server.

11 Explain what a firewall is. (1)Firewalls are used to stop hackers and viruses from accessing a computer.

12 Give an example of a piece of hardware which might form part of a firewall. (1)

A router is a good example of a hardware device that has a built-in firewall.

13 Suggest three utility programs what you would expect to find in a security suite. (3)

anti-virus firewalls anti-spyware

Total marks: 17

Page 41: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the
Page 42: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

22– Legal Implications

1 Give the names of three computer related laws. (3)

The Computer Misuse Act The Data Protection Act The Copyright, Designs and Patents Act Health and Safety Regulations The Communications Act

2 Which law does a hacker break? (1)Computer Misuse Act:

3 Give three examples of activities which may breach copyright law. (3)

Broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public any dramatic, musical and artistic works without permission.

4 What act governs the storage and use of personal data? (1)Data Protection Act:

5 What is a person who has data held about them called? (1)Data Subject

6 Give three principles of the Data Protection Act. (3)Personal data shall be processed fairly and lawfully.

Personal data shall be obtained only for one or more specified and lawful purposes.

Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.

Personal data shall be accurate and, where necessary, kept up to date.

Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.

Personal data shall be processed in accordance with the rights of data subjects (individuals).

Page 43: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.

7 Give an example of intellectual property and say which Act governs it. (2)Intellectual property rights are given to inventors or companies to protect their discovery and to allow them to sell their product without it being copied. Copyright, Designs and Patents Act

8 What does a Data Controller do? (1)A Data Controller is the person within an organisation who is responsible for how that organisation collects and uses personal data about data subjects.

9 Which Act would you be breaking if you deliberately spread a computer virus? (1)Computer Misuse Act

10 Give two rights which employees have under Health and Safety regulations. (2)

Chairs, computers and work areas to ensure they comply with the current standards.

Computer users are entitled to regular free eye tests and if spectacles are required they should be provided at the employer’s expense.

Employees should not work exclusively at computers. They should have regular breaks, when they can do other tasks.

Employers should ensure that employees have access to health and safety training so that they understand the issues involved with prolonged computer use.

11 Suggest an injury which might happen to an employee who did not have a correctly designed workstation. (1)Back pains, wrist pains, neck pains

Page 44: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

12Give two examples of something which would contravene the Communications Act. (2)

The Act introduced new offences for ‘Obtaining access to the Internet with no intention to pay for the service’.

As well as ‘Sending a malicious communication using social media’.

23 - Environment

1 Explain what a carbon footprint is. (1)

A carbon footprint is the measuring of greenhouse gas emissions caused by an organization, event, product or person

2 Give three greenhouse gases which are in the Earth’s atmosphere. (3)

The main greenhouse gases in the Earth's atmosphere are water vapour, carbon dioxide, methane, nitrous oxide, and ozone.

3 How many kilograms of fossil fuels and chemicals are needed to manufacture a 24 kilogram PC? (1)

Manufacturing a 24kg PC with monitor needs at least 240kg of fossil fuels to provide the energy, and 22kg of chemicals.

4 What is the typical electricity usage of a computer, per hour? (1)

Most computers create 40-80 grams of greenhouse gas emissions per hour through their electricity use

5 Give the name of the regulations which govern the disposal of electronic and electrical equipment. (1)

WEEE regulations (The Waste Electrical and Electronic Equipment Regulations),

6 List three types of hazardous waste that can come from IT equipment. (3)

Antimony trioxide as flame retardant.

Page 45: 1 - Databases · Web viewA keyword is an important word connected to the information you are looking for. The search engine then trawls the Internet looking for occurrences of the

Polybrominated flame retardants in plastic casings, cables and circuit boards.

Selenium in circuit boards as power supply rectifier.

Cadmium in circuit boards and semiconductors.

Chromium in steel as corrosion protection.

Cobalt in steel for structure and magnetivity.

Mercury in switches and housing.

7 How many additional hours of use could there be available from a recycled computer? (1)

The majority of PCs routinely disposed of for recycling by businesses and consumers alike are actually far from their real end-of-life and could go on to give as much as 6,000 additional hours of use.

8 Describe what should be done to avoid identity theft when disposing of old computers and smartphones. (2)

all data which could lead to identity theft is removed from the equipment first.

This means that all hard disk drives should be removed and destroyed, as even reformatting them does not mean that a thief will not be able to extract personal information from them.

Total Marks: 13