Computing (Modular) 
CP2
January 2004
(2 Hours)

[1](a) Clip art is a library of electronically stored pictures. The manager of a discount store uses a word processor package and clip art to produce information sheets advertising the store's latest offers. He uses clip art to enhance the appearance of his information sheet. Give an example of suitable clip art that would enhance the appearance of the information sheets. [1]
   
(b) The manager uses a spreadsheet package to manage the store's accounts. Describe two features of a spreadsheet package that the manager may find useful when managing the store's accounts. [2]
   
 
[2] Ceri owns a small interior design company. The company carries out the decoration of flats and houses. Clients often book months in advance and a project can take from one week to several months to complete. Ceri sometimes has to employ specialists such as carpenters or plumbers for the projects.

At present Ceri keeps information about all future projects using a paper based system.

 

 
(i) Describe two possible difficulties that Ceri may have with the current paper based system. [2]
   
(ii) Ceri could use a personal computer to overcome these difficulties.
 
I A suitable type of software for this application is a database package. Describe, giving two reasons, how this software would overcome the difficulties experienced with the existing paper-based system. [2]
   
II. Apart from name, address and telephone number, state two items of information which the new system should store about future projects. [2]
   
(iii) Describe how a high specification portable ("lap-top") personal computer could further help Ceri. [2]
   
 
[3] State, giving a reason in each case, the most suitable storage medium, for each of the following situations.
 
(i) A secondary school teacher giving a copy of a very small (30 Kilobytes) computer program to all members of a computing class. [2]
   
(ii) A school computer technician backing up the very large (100 Gigabytes) hard disc drive of a network's file server. [2]
   
(iii) Distributing an electronic encyclopaedia (500 Megabytes) [2]
   
 
[4](a) A range check is one method of validating data. Use an example to help explain the term range check. Give one example of valid data and one example of invalid data. [3]
   
(b) Another method of data validation is the use of a check digit. A shop selling a small range of specialist musical instruments uses a three-digit code number for each instrument. A check digit is calculated as follows:
  • The right digit is multiplied by 1
  • The middle digit is multiplied by 2
  • The left digit is multiplied by 3
  • The three numbers calculated above are then added.
  • The check digit is the right most digit of the resulting number.

Calculate the check digit for the code 316, showing how the check digit was calculated.

[2]
   
 
[5](a) Explain the difference between serial file organisation and sequential file organisation. [2]
   
(b) Describe a computer application of a serial access file, making it clear why this file structure is appropriate. [2]
   
(c) Records within a file can be fixed or variable length.
 
(i) Give one advantage of a fixed length record. [1]
   
(ii) Describe, with a reason, an application in which variable length records would be useful. [2]
   
 
[6] Explain what is meant by each of the following terms:  
(i) address bus; [1]
   
(ii) control bus. [1]
   
 
[7](a) One role of the operating system of a personal computer is managing resources. Describe three examples of how the operating system manages resources. [3]
   
(b) Describe two utilities usually provided by the operating system of a personal computer. [2]
   
(c) An operating system on a large mainframe computer allows multi-user (multi-access) mode of operation. Describe one additional feature a multi-user operating system would have compared with the operating system found on a personal computer. [1]
   
 
[8] Briefly explain, using an example, the term handshaking when used in connection with a computer and a printer. [3]
   
 
[9] A school has a local area network with one file server attached. The pupils and the teachers can save files on this server in their own directories. The school secretary also stores personal information about the school's staff and pupils.
 
(i)I Describe two methods, which the school could use to prevent malicious damage to any files on the server. [2]
   
II In the event of data being corrupted, describe a procedure the school should have in place to prevent data loss. [1]
   
(ii) Describe three ways in which the Data Protection Act would affect the school. [3]
   
 
[10] Palm top computers and personal organisers are often too small to have usable keyboards. What other method of input could they use? State one advantage and one disadvantage of this method. [3]
     
 
[11] In the following question, additional credit (up to 3 marks) will be given if your answer demonstrates skill in written communication.

 

 
  A company employs a large door-to-door sales team. A door-to-door sales person collects orders from customers and posts them to the company's headquarters where they are input into a computer.

The company decides to close the department where the orders are input and asks the sales people to input the orders directly from their home. The company has a local area network and an Intranet.

Describe any benefits and drawbacks for the company, including possible costs incurred and savings made. How will working from home affect the employee? What additional hardware and software will be required?

How could the 'home workers' make use of the company's Intranet?

[8+3]