Question 4, May 2020, Pearson Edexcel International GCSE (9-1) Information and Communication Technology, Paper-1
Kasuni studies online.
(a) Which one of these is a user-generated reference site? (1)
A Social network
B Wiki
C VLE
D Online work space
B Wiki
(b) Which one of these is a method Kasuni could use to avoid plagiarising content? (1)
A Bias check
B Copy and paste
C Paraphrasing
D Efficient search
C Paraphrasing
(c) Describe how the key features of social bookmarking could be used by students completing a research project. (4)
Social bookmarking lets users store URLs. The URLs can be stored and tagged with useful tags or keywords for future reference to find the useful sites. These tags can be shared with other people to reduce the workload.
(d) Some teachers use OMR to reduce their workload when marking tests.
Describe how OMR works. (2)
OMR devices have a scanner that shines a light onto a form. The device then looks at the contrasting reflectivity of the light at certain positions on the form. It will detect the black marks because they reflect less light than the blank areas on the form.
(e) Schools must comply with data protection laws.
Explain why teachers should use a VPN to access files on school servers. (2)
A VPN uses tunneling to provide and encrypted connection. This prevents data being accessed by unauthorized users.
(f) Kasuni needs to submit her project file online.
Explain why Kasuni compresses her file before uploading it. (2)
Compressing will decrease the file size to upload it more quickly, which is necessary when then file is too bug. It takes up less storage on the recipient's server.
(g) Which one of these is a type of software used to compress files? (1)
A Backup
B Utility
C Security
D Network
B Utility
(h) Discuss the impact of transaction tracking on the information that individuals see online. (8)
Transaction tracking refers to the process of monitoring an individual's online activity, including their browsing history and purchase behaviour. The impact of transaction tracking on the information that individuals see online is significant, and it can be both positive and negative.
On the positive side, transaction tracking can provide individuals with more relevant and personalised content. For example, when a person searches for a particular product or service, transaction tracking can provide them with related suggestions or recommendations based on their search history or purchase behavior. This can make their online experience more convenient and efficient.
However, the negative impact of
transaction tracking is that it can limit the information that individuals see
online. When transaction tracking is used to personalize content, it can create
what is known as a "filter bubble" - a situation where an
individual's online experience is limited to a narrow range of content that
confirms their existing beliefs and interests. This can lead to the reinforcement
of biases and limit the individual's exposure to new and diverse ideas.
Moreover, transaction tracking can also
raise privacy concerns. Many people are uncomfortable with the idea of being
tracked and having their online activity monitored, especially when it comes to
sensitive information such as financial transactions or health-related
searches. There is also a risk that the data collected through transaction
tracking could be used for malicious purposes, such as identity theft or
targeted advertising.
To address these concerns, some
individuals choose to use privacy-focused tools such as ad-blockers, VPNs, or
privacy-focused search engines. Additionally, policymakers have taken steps to
regulate transaction tracking and protect individual privacy.
In conclusion, transaction tracking has
a significant impact on the information that individuals see online. While it
can provide personalized and relevant content, it also raises concerns about
privacy and the potential for bias and filter bubbles. It is important for
individuals to be aware of transaction tracking and take steps to protect their
privacy, and for policymakers to regulate these practices to ensure that
individual privacy is protected.
Comments
Post a Comment