Posts

Showing posts from May, 2023

Question 5, May 2019, Pearson Edexcel International GCSE (9-1) Information and Communication Technology, Paper-1

Image
James teaches in a school that uses a local area network and a wide area network. (a) Give one example of a wide area network. (1) Internet (b) Some learners have accessibility needs. Complete the table to describe how two peripheral devices designed specifically for accessibility could improve the learning of people with accessibility needs. (4) (c) Describe two benefits to teachers of using a local area network. (4) 1 Centralised backup: User data is protected from loss because backups can be automated for all users. This makes it more likely that backups will happen then if individual users were asked to complete backups themselves. 2 Shared software: Application servers can provide access to shared software. Some servers can provide access to operating systems. (d) One type of backup procedure the school could use is incremental backup. State one other backup procedure the school could use to secure its data. (1) The school could use to secure its data by using a differential bac...

Question 4, May 2019, Pearson Edexcel International GCSE (9-1) Information and Communication Technology, Paper-1

Image
Ruwan searches online for local sporting events. (a) Ruwan evaluates the fitness for purpose of the search results. (i) Complete this table to show how each property can negatively affect the fitness for purpose of information. (3) (ii) Which one of these is another property of information that affects fitness for purpose? (1) A Cost B Keyword C Plagiarism D Relevance D Relevance (iii) Which one of these would improve the ranking of a search result? (1) A Acknowledged sources B Alphabetical search terms C Copyrighter material D Sponsored adverts D Sponsored adverts (b) Explain why Ruwan must consider his use of keywords when using a search engine. (2) Search engines compare the words entered by a user with words in a database of web pages. They then show the user the results that are the closest match to their original keywords. If specific keywords are entered into the search engine, more relevant results will be returned. (c) Zara enters the same search term as Ruwan but receives dif...

Question 3, May 2019, Pearson Edexcel International GCSE (9-1) Information and Communication Technology, Paper-1

Ruwan uses a smartwatch when he exercises. (a) The smartwatch can connect to a Bluetooth health monitor. (1) Which one of these describes Bluetooth? A A high speed wired connection B A high resolution connection C A type of wireless connection D An energy saving connection C A type of wireless connection (b) The health monitor uses Bluetooth to transfer data to the smartwatch. (i) Explain why Bluetooth rather than infrared is used for this transfer. (2) Infrared requires line of sight which is not always possible when exercising. Bluetooth does not require line of sight. That's why, the health monitor uses Bluetooth to transfer data to the smartwatch. (ii) Give two factors that might affect the speed of the transfer. (2) 1 The speed at which devices can transfer data depends on the bandwidth of the connection. 2 The speed of data transfer also depends on distance. (c) Some data need to be encrypted when it is transferred. Describe how encryption helps keep data secure. (2) Encrypti...

Question 2, May 2019, Pearson Edexcel International GCSE (9-1) Information and Communication Technology, Paper-1

Image
Zara uses her tablet computer to watch TV online. (a) Describe the function of a router. (2) A router stores the addresses of all devices that are connected to it so that it can forward network traffic to its destination using the quickest route. (b) State two benefits to Zara of online TV. (2) 1 You may wish to watch it on demand, 24/7 and can be interacted with. 2 Online TV also allow you to rewind and re-watch a scene you particularly like. (c) Zara streams an online video. She sees the notice shown in Figure 1. Describe what has happened to Zara. (4) Zara's tablet computer is infected by a ransomware which is a malicious software that has been downloaded, encrypting her files using a key. It places restrictions on her access to online video until money is paid. It puts pressure on her to act before she has time to think clearly about the threat and how to manage it. (d) Give two benefits to Zara of connecting her tablet computer to her television. (2) 1 Zara can watch video on ...

Question 1, May 2019, Pearson Edexcel International GCSE (9-1) Information and Communication Technology, Paper-1

Image
Kiki buys a smartphone. (a) The smartphone uses a sensor that detects movement of the device. One way in which the smartphone uses data from the sensor is to switch itself off if dropped. Give two other ways in which the smartphone could use data from the sensor. (2) 1 The smartphone could use data from the sensor, accelerometer, to detect 'tilt' in a game. 2 The smartphone could use data from the sensor, pedometer, to track the steps done by a user. (b) Smartphones can be connected using wired or wireless methods. (2) (i) Give two advantages to Kiki of using a wired method to connect to the smartphone. (2) 1 Using a wired connection method to connect to the smartphone is more stable as it is less affected by interference (e.g. dropped packets, loss of data). 2 Wired connection is usually faster as it is connected directly to the smartphone without any obstacles (e.g. walls). (ii) Give two advantages to Kiki of using a wireless method to connect to the smartphone. (2) 1 Using a...

20 Database Management

1 Which one of these is the most appropriate data type to store data about student grades? (1) A Numeric B Alphanumeric/text C Logical/Boolean D Currency B Alphanumeric/text 2 State the reason why a primary key is used in a database. (1) A primary key is used in a database to uniquely identify each record or row in a table. 3 State two reasons why validation is used in a database. (2) a) By implementing validation rules and checks, the database system can prevent incorrect or inconsistent data from being entered, thereby minimizing data entry errors. b) Validation helps enforce referential integrity by ensuring that relationships between tables are maintained and that foreign key values are valid and consistent. 4 List three attributes that could be stored about a book entity in a library database. (3) a) Title: This attribute stores the title or name of the book, which uniquely identifies it among other books in the library. b) Author: This attributes stores the name of the author or ...

19 Spreadsheets

1 Which one of these is a cell range reference? (1) A G1J1 B G1 to J1 C G1 --> J1 D G1:J1 D G1:J1 2 Explain why named ranges are useful in a spreadsheet. (2) Named ranges in spreadsheets improve clarity and readability by assigning descriptive names to cell ranges, simplifying complex formulas and reducing the chance of errors, while also enabling efficient data analysis and facilitating collaboration among multiple users. 3 Explain why absolute referencing is used in spreadsheets. (4) Absolute referencing is utilized in spreadsheets to prevent cell references from changing when a formula is copied or filled. It is particularly valuable when user need to maintain a constant reference to a specific cell or range, regardless of where the formula is applied. By using the dollar sign ($) before the column letter, row number, or both in a cell reference, user can lock that specific component and ensure it remains unchanged. This enables user to create accurate calculations, preserve cons...

18 Web Authoring

 1 Which one of these is the HTML element used for a hyperlink? (1) A <a> B <h> C <l> D <w> A <a> 2 Explain why image files should not be moved from their original location once they have been added to a web page. (4) Moving image files from their original location after they have been added to a web page can cause broken image links, disrupting the visual experience for visitors. It also creates difficulties in maintaining and updating the website, as other developers may struggle to locate and update image references. Search engines may have trouble indexing and ranking the website if images are moved, affecting its visibility in search results. By keeping image files in their original location, the website maintains consistency, improves user experience, and supports effective search engine optimization. 3 State the use of a table in a web page. (1) Tables are used in web pages to organize and present tabular data in a structured and visually appeal...

17 Presentation

1 Which one of these would make a presentation most readable? (1) A Low contrast between background and text B Dark background and dark text C Light background and light text D High contrast between background and text D High contrast between background and text 2 State the reason why using a slide master gives a consistent layout. (1) Using a slide master ensures a consistent layout by establishing a unified design theme, saving time on edits, maintaining uniformity across slides, and supporting brand identity. 3 State one reason why it is not appropriate to place lots of text on a slide. (1) Placing excessive text on a slide is not appropriate because it overwhelms the audience, makes it difficult to read and comprehend, and diminishes the impact of the visual presentation. 4 List three font enhancements that can be applied to text. (3) a) Bold: Applying the bold style to text makes it appear thicker and bolder, helping to emphasize important words or headings within a slide. b) Ital...

16 Graphics

1 Which one of these needs to be maintained in order to prevent an image from becoming distorted? (1) A Z axis B Aspect ratio C Rotation D Grouping B Aspect ratio 2 Explain why vector graphics do not pixelate when they are enlarged. (3) Vector graphics do not pixelate when enlarged because they are mathematically defined, allowing for precise recalculations and redrawings of the shapes and lines based on the new size. 3 Describe how layers can be used to create an image. (2) Layers are transparent sheets in image editing software that allow artists to stack and manipulate different elements of an image separately. By arranging and adjusting these layers, artists can create complex compositions and make precise edits without affecting other parts of the image. 4 State the name of the small elements that make up a bitmap image. (1) The small elements that make up a bitmap image are called pixels. 5 Give one drawback of using vector graphics to represent natural objects. (1) One drawback ...

15 Word Processing

1 Which one of these document types is most likely to use columns? (1) A Report B Memo C Letter D Newsletter D Newsletter 2 Explain why an automatic spell checker will not pick up all text errors. (2)  An automatic spell checker may not catch all text errors due to contextual mistakes, homophones, proper nouns, technical terms, grammatical errors, formatting and punctuation errors, as well as language variations and slang that may not be recognized by the standard dictionary it relies on. It's important to combine spell checkers with thorough proofreading to ensure accurate and error-free text. 3 State two page orientations. (2) a) Portrait orientation b) Landscape orientation 4 Identify three items that could be placed in a page footer. (3) a) Page numbers for easy navigation. b) Page title to provide identification and context. c) Copyright information to assert ownership and protect intellectual property rights. 5 Describe how mail merge can be applied to a document. (4) Mail me...

14 File Management

1 Which one of these is the most sensible filename for a logo created for a school? (1) A Logo-1 B FinalLogo C School_Logo_v1.02 D 102 School C School_Logo_v1.02 2 Explain why it is important to save work regularly. (3)  Saving work regularly is crucial to prevent data loss in case of unexpected events like power outages or system crashes. It enhances productivity by minimizing the need to recreate or redo work, saving time and effort. Additionally, regular saving allows for version control, enabling users to track changes and collaborate effectively. 3 State the reason why including versions in filenames is useful when developing a digital product. (1) It allows user to return to earlier versions of the same document at a later date. 4 State three published file formats. (3) Three published file formats are PDF, which is widely used for consistent document presentation across platforms; JPEG, a common format for storing digital images with lossy compression; and MP3, a compressed ...

13 Applying ICT

1 Which one of these data types is used to store a photograph? (1) A Image B Number C Text D Sound A Image 2 Explain one reason why it is important to use white space well when designing a digital product.  (2) If there is not enough white space or negative space in a design, the information can appear cramped and cluttered, which can make it difficult for users to read and understand. 3 State one type of data and describe how it can be turned into information. (2) Number can be turned into information by creating graphs and charts to represent the data in a meaningful and easily understandable way. Graphs and charts can help to visualize trends, patterns, and relationships in the data, allowing people to quickly and easily identify important insights. 4 Identify three errors in this text. (3) How was I suposed two know Mr Singh . a) A spelling error, where 'suposed' should be 'supposed'. b) A grammatical error, where the sentence is a question but it does not end with ...

12 The Cloud

1 Which one of these is used to store hosted applications? (1) A Laptop B Smartwatch C Server D Tablet C Server 2 State three benefits of using online data storage. (3) a) Files are often backed up automatically. b) Sharing data is easier. c) Many providers offer unlimited storage packages, so less need to buy additional local storage. 3 State three online services provided by cloud-based services. (3) a) Booking systems to purchase train tickets, airline tickets and bus tickets through online. b) Banking through online such as checking balances, setting balance alerts, making payments and transfers etc. c) Online gaming allow users to play games that are hosted on a remote server. 4 State what is meant by the term 'cloud'. (1) In computing, the term 'cloud' refers to a network of remote servers used to store, manage, and process data over the internet.

11 Online Services

1 Which one of these is not provided by banks as an online service? (1) A Paying in cheques B Transferring money  C Viewing an account's balance D Applying for a loan A Paying in cheques 2 State two ways in which education providers can use online services to help learners. (2) a) By using virtual learning environments (VLEs) such as Pearson Active Teach, Google Classroom, Moodle etc. education providers can use online services to help learners. b) Education providers can also use libraries of online journals and reference archives to help learners. 3 State three features of shopping sites. (3) a) Product catalogue: Shopping sites provide a product catalogue with detailed information, allowing users to explore and choose products based on their preferences. b) Basket: It allows users to gather multiple products in one place, making adjustments, and review their selections before proceeding to checkout. c) Payment and Checkout: Shopping sites offer secure payment options and a stre...

10 Online Information

Image
 1 Which one of these is used to match a full phrase in a search? (1) A + B - C @ D "" D "" 2 State two ways in which an image search can be refined. (2) a) By using keywords or phrases to narrow down the search: Instead of entering a generic search term like "cat," user could enter a more specific term like "gray tabby cat" to help refine the search results. b) By using filters to refine the search results: Many image search engines allow users to filter their search results by things like colour, size, type, date, and more. This can help users find images that more closely match their needs or preferences. 3 State one reason why you should check whether information is biased before using it. (1) Checking for biases in information is important to ensure its accuracy and reliability, as biased information can be misleading and lack objectivity. 4 Describe how search engine works. (4) A search engine compares words or phrases entered by a user aga...

9 Implications of Digital Technologies

1 Which one of these is used to reduce the risk to health and safety? (1) A Using a small monitor B Increasing the amount of blue light emitted by a screen C Using an RCD D Working in a room with low-level lighting C Using an RCD 2 Explain why free software licenses have helped to reduce the digital divide. (2) Free software licenses have helped to reduce the digital divide by allowing people to access and use software without having to pay for it, which has made it easier for individuals and organizations with limited resources to obtain and utilize technology. This has led to greater access to information and technology, which has helped to bridge the gap between those who have access to technology and those who do not. 3 Explain why users should be able to give their consent before an app shares their location. (2) Users should be able to give their consent before an app shares their location to protect their privacy and personal information. Sharing location without user consent ca...

8 Online Communities

1 Which one of these is used to set the rules for an online community? (1) A User ratings B Analytics C Features that all commenting and sharing D Acceptable use policies D Acceptable use policies 2 Describe the use of tags in online communities. (2) Tags allow members to categories the content they create and post on social networking communities. Other members can then search for content using the tags that were added to the content when it was posted. 3 Describe how social networking services benefit from members sharing content. (4) Share functionality allows members of a social networking community to repeat other members' posts to the community. This makes the original posts available to more people. Sharing increase the reach of content and encourages members to be more active users of the service. This means that they provide the service with more information, which the service can then use to sell marketing opportunities to advertisers. 4 Explain why some online communitie...

7 Impact of the Internet

1 Which one of these activities is only possible when using the internet? (1) A Television B Radio C Streaming D Mobile telephone calls C Streaming 2 State two benefits to employees of working from home. (2) a) No need to travel to work so no stress caused by traffic or public transport delays and overcrowding. b) Employees can spend more time working because they spend less time travelling to work. 3 State two drawbacks to organizations of employees working from home. (2) a) It can be more difficult to manage and support employees who are not in the office. b) Employees working at home might not work as hard as employees in an office. 4 Explain one reason why the use of the internet may affect the ability of individuals to interact with other people face-to-face. (3) The use of the internet can lead to a decrease in face-to-face interactions and social activities. People may become more engrossed in online activities and spend less time engaging in real-world social experiences. This ...

6 Risks to Data and Personal Information

1 Which one of these is used to control internet traffic entering a network? (1) A Server B Backup C Firewall D Encryption C Firewall 2 Explain why CAPTCHA tests work. (2) CAPTCHA tests are used to make sure that data is entered by a human and not by an automatics software program or a bot or web robot. 3 State the purpose of pharming and phishing. (1) The purpose of pharming and phishing is to gain users' personal information and payment details without their permission. 4 List three pieces of data from a bank card that a user is asked to enter when making an online payment. (3) a) Card number b) Expiry date of the card c) Name on the card 5 Describe one way in which incremental backup differs from differential backup. (2) Incremental backup only backs up the data that has changed since the last backup, while differential backup backs up all the data that has changed since the last full backup. 6 Describe how encryption secures data on a network. (2) Encryption ensures that unauth...