Question Answer Points
Ring two input devices.
Monitor Plotter Printer
Scanner Speaker Touchpad
Scanner and Touchpad 2
Ring two items which are used to store personal data.
Customer database, Graphics tablet, Magnetic strip on a credit card,
Product bar code, A ROM chip, Sensor
Customer database and magnetic strip on a credit card 2
Ring two items which are used to connect computers to the Internet.
ISDN link, Keyboard, MIDI,
Modem, Monitor, RAM
Modem and ISDN link (ISDN is a digital phoneline) 2
Complete each sentence below using one item from the list.
analysis, data logging, encryption, a flowchart, hacking, implementation, a password, a virus, the world wide web
Interviewing people about a system is . . .
Parallel running is a method of . . .
You can prevent someone accessing your work by using . . .
A program which can damage the contents of a hard disc is called . . .
Interviewing people about a system is analysis
Parallel running is a method of implementation
You can prevent someone accessing your work by using a password
A program which can damage the contents of a hard disc is called a virus
4
Mention two benefits of using computers for home shopping.
Goods are better quality
People don’t have to leave their house to do the shopping.
People can only buy one of each item.
Less chance of getting the wrong goods.
People can do their shopping at any time of day.
You can’t touch the goods.
People don’t have to leave their house to do the shopping.
People can do their shopping at any time of day.
2
Systems analysts have been employed to computerise the record keeping of a video rental shop. They will be creating one data file of videos and one of customers.
(a) Ring two items they will produce during the design phase.
evaluation, existing documents, file structure, questionnaires, parallel running, screen layouts
(b) The customer file will contain details of what the customer looks like. State two input devices which would be suitable for inputting an image of the person into this file.
(c) Circle the field which would be the best choice as the key field of the video file.
director’s name, video reference number, video title, rental price
a) Design phase: Screen layouts and File structure
b) Digital camera or optical Scanner
c) Video reference number
5
Tick whether the following statements are TRUE or FALSE.
Using computers for long periods of time can cure back strain
An anti-glare screen reduces eye strain
Radiation from computer screens can cause illness
Repetitive Strain Injuries are caused by using wrist rests
Using computers = false
Antiglare = yes
Radiation = yes
Repetitive strain = false
4
Architects use CAD packages to draw designs of houses. List three features, other than load, save and print, that you would expect to be included in such a package. Ability to rotate objects
Ability to zoom in and out on objects
Ability to change size of objects
Ability to choose from an object library
Ability to print / plot designs
Ability to work in 3D mode
3
Complete the sentences using words from the following list:
MICR, OMR, RAM, ROM, Word Processing
(a) School registers are read using .......................................................................................
(b) The part of central memory which loses its data when the computer is switched off is called ....
(c) A software package which allows secretaries to type in letters is called a
................. package.
(a) School registers are read using OMR
(b) The part of central memory which loses its data when the computer is switched off is called RAM
(c) A software package which allows secretaries to type in letters is called a Word Processing package.
3
Tick two applications which use on-line processing.
Booking a flight at a travel agent.
Producing gas bills.
Sending out reminders for overdue books.
Withdrawing money from a cash point.
Reading data from bank cheques.
Producing credit card statements.
Booking a flight
Withdrawing money
2
Computers are now widely used in libraries.
(a) State the input device which is used to enter data about a book when it is borrowed.
(b) Write down the validation check which would be used to make sure the data had been entered correctly.
(c) Library members must type in two items of information before they can access the Internet. List these items.
a) A barcode reader will enter the ISBN or Library bookcode - alternative would be a simple keyboard
b) The barcode might have a Check digit, an extra digit that is the result of a calculation of the real digits
c) ??? Name and Password ????
4
A tennis club is planning to keep members’ records on a computer database. New members will fill in an application form and be given a membership number.
The form will contain the member’s personal details as well as their method of payment.
(a) Design a screen input form to enter all the details onto the computer.
Fields needed: Firstname, Surname, Address (street, city, postcode), Birthdate, Date of start of membership, a drag-down menu with payment options 5
All the data except for the membership number can be amended. It is very important that this is copied correctly from the application form. Describe two methods of verification which could be used to check it has been entered correctly. Verification: is checking without the computer’s help; One could type the data twice and then compare if it’s right, one could also ask someone else to go over the added record and check if the data is correct, one could also print out the record and ask the member to check it 2
Describe two methods of validation which could be used to make sure that the
membership number given is valid.
Validation: checking with the help of the computer. the computer could do a RANGE check, to see if the number is within a certain range, it could do a TYPE check, to se if only digits (and no characters) are used, it could do a lenght check, to see if the number isn’t too long, it could do a test to see if the number is UNIQUE (the number should not exist yet in the database) 2
d) The club intends to connect to other local clubs using a Wide Area Network. Some of the members are concerned about this plan because they are frightened that their data may be misused.
Describe three ways in which their data might be misused.
e) After the system is designed it must be tested. Describe the three types of test data which are used to test a system.
d) The tennisclub members fear that maybe:
- their personal data might be used to send them spam mails
- their data could be used by others to ‘steal’ their identity
- others might see personal data, especially their payment info (like bank or creditcard numbers)
- the data might be ‘crosslinked’ by others (combining data about people
- basically they might fear that people hack the data and that their privacy is at risk

e) 1. extreme data (numbers or figures that are way out of possible, e.g. 00077777734fffff for a birthdate)
2. normal data (real data, just to see if that works correct)
3. fasle data (data that is incorrect, to see if the validation rules will work, e.g. 32/12/2002 for a birthdate)
6
(a) Name three applications which involve the use of expert systems.
(b) For each of the above describe the inputs and outputs used by the system.
1. a medical diagnoses system
input: the symptons of a patient
output: a possible desease and maybe even possible medication
2. a mortgage banking system
input: financial and personal data
ouput: advise about the best mortgage (and decision if a mortgage at all!)
3. a oil detection system
input: geographical, historical and other measured data
ouput: a map, with lines that indicate the probability of oil in the deeper soil
6
At a supermarket checkout customers present their purchases to the checkout operator. After the goods have been passed through the checkout the customer pays, usually by credit or debit card.
(a) Name two items of information found in the magnetic strip on the back of the card.
(b) The bank makes checks on the cards. Describe two of these checks.
(c) Describe the processing which takes place after the computer has completed these checks.
a) The customer account number and the card number, possibly the year of issue, the data till it’s valid
b) It will check if the account number is valid, e.g. if it exists in the database
It might also check if the account is still valid, e.g. not belongs to a stolen card or card that was blocked.
c) the accountnumber will be used to find the right record in the banks database. The existing record will be updated (amended), e.g. the money fields will change. The processing will also involve to check if enough money / credit is available. The money from the customer will be booked to the account of the shop owner, this will take place using EDI transactions. (digital electronc payments). The processing also involves the printing of a receipt for the shop owner and the customer.
6
Describe the two types of documentation that are found with newly created information systems. Give reasons why each type is needed. Technical documentation:
- shows which hardware is needed
- lists all files needed
- lists how to install the software
- lists the version of the software
- shows the serial number(s) needed
- gives descriptions of technical nature, allowing experts and programmers to change or fix mistakes

User documentation
- shows how to start the system
- shows how to use the system, e.g how to print search and find information and get certain tasks done.
- has help pages, showing all features of the software
- has info about what to do when mistakes occur, e.g website address and postal information
6
More and more people are using the Internet for home banking and home shopping
services.
Describe the benefits and limitations for individual people in their everyday lives.
Benefits:
- people can buy at any time of the day, and from anywhere in the world
- people can at ease compare products and prices
- people can order articles on auctions (e.g. E-Bay) for reduced prices

Limitations:
- One cannot see / touch the articles for real
- in some cases it’s hard to tell if a company is reliable or will keep it’s promises
- often a credit card is needed for payments
- fraud might occur (goods not delivered)
- quality might be dissapointing
- transportation / shipping costs might be high

6
The employees of many companies communicate through the use of electronic mail and video conferencing.
(a) What is meant by video conferencing?
(b) Describe the advantages and disadvantages of video conferencing when compared with electronic mail.
a) Video conferencing is communication via digital networks, using sound and video. One needs special software, fast network connections (cable or ADSL) and a digital video camera or webcam with microphone attached. One can do this at small scale (e.g. MSN or iVisit) or on a large scale (using a video conferencing room for multiple participants). Key element is the fact, that one can see and hear his counterpart(s)
b) Advantages:
- Safes travel time to meet, so it’s very cost effective alternative to communicate with multiple people, allowing video contact (E-mail can only have attached pictures at the most)
Disadvantages:
- E-Mail can be picked up at any time, it will be on hold for a user, Video conferences need to be scheduled
- Video conf. is more complicated to set up, one needs special hardware and software
- Video conf. needs fast ineternet conncetions, with a modem is will not work well (but E-mail will work ok!)

6