Computing (Modular) CP2
January 2007

(1.5 Hours)

[1] A secretary uses a word processing package to produce letters.
 
(i) Describe how the secretary could use each of the features named below:
 
  (I)  thesaurus;
[1]
   
  (II) print preview.
[1]
   
(ii) The secretary sends confidential letters to clients using email.
 
  (I)  Describe one advantage of sending the letters using email compared to conventional post.
[1]
   
  (II) Describe two possible concerns that the clients may have about receiving this type of communication by email.
[2]
   
 
[2] Two secondary storage devices are a floppy disc drive and a hard disc drive.
Name two other secondary storage devices, giving a suitable use for each device.
[4]
   
 
[3] DAP Motors is a small garage that repairs and services cars. Details of customers and their cars are stored in paper files at reception. Cars need to be serviced at regular intervals.

The number of customers is growing and the garage owner believes that the current paper based system may be losing business.

Describe two possible problems with the current paper based system that may lead to the garage losing business and describe how a computerised database system could solve these problems.

[4]
   
 
[4](a) Explain the difference between validation and verification. [2]
   
(b) National Insurance numbers have the following structure:

LetterLetter  DigitDigit  DigitDigit  DigitDigit  Letter

An example of a valid National Insurance number is RZ 25 27 29 Y

A company uses a validation check when the National Insurance number is input into a computer system.

Describe a suitable validation check that could be carried out on the National Insurance number, and give an example of invalid data that would be detected by this validation check.

[2]
   
 
[5](a) Briefly explain the purpose of handshaking when used in connection with a computer and a printer. [1]
   
(b) Describe the communication that would take place between a computer and a printer before any data to be printed is sent to the printer. [2]
   
 
[6](a) Explain how a record is added to:
 
(i) a serial file [1]
   
(ii) a sequential file [2]
   
(b) Records within a file can be fixed or variable length. Give one advantage of a fixed length record and one advantage of a variable length record. [2]
   
(c) A factory with approximately two thousand employees has a payroll file which contains fixed length records stored in sequential order. At the end of every month, the file is used to calculate that month's pay for each employee and produce the pay slips.

 
(i) Briefly explain why sequential order is the most appropriate in this situation. [1]
   
(ii) Briefly explain why fixed length records are the most appropriate in this situation. [1]
   
 
[7] Operating systems can use different modes of operation including:
  • real time transaction processing
  • real time processing
  • batch processing

 
(a) Name an application where real time transaction processing is used, and give one reason why this mode of operation is used for this application. [2]
   
(b) Name an application where real time processing is used, and give one reason why this mode of operation is used for this application. [2]
   
(c) Name an application where batch processing is used, and give one reason why this mode of operation is used for this application. [2]
   
 
[8](a) A computer can have a 64-bit word length. What is meant by the term word in this context? [1]
   
(b) Computer game consoles can use different word sizes. Explain the advantage of having a computer game console with a 128-bit word size rather than 64-bit. [1]
   
 
[9] A personal computer can use RAM cache and disc cache memory for storing data.
 
(i) Why is cache memory used? [1]
   
(ii) Describe data that could be stored in:
 
  (I) RAM cache; [1]
   
  (II) Disc cache. [1]
   
 
[10] Bank customers can access their bank accounts on-line using the Internet. They are able to view statements, set up regular payments and transfer money. These accounts could be subject to malicious or accidental damage.
 
(i) Describe what is meant by the term  malicious damage and give an example of malicious damage that a customer could suffer with an on-line bank account.
[2]
   
Explain how the bank could prevent malicious damage.
 
   
(ii) Describe what is meant by the term accidental damage and give an example of accidental damage that a customer could suffer with an on-line bank account.
[2]
   
  Explain how the bank could prevent accidental damage.
[1]
   
 
[11] Cameras used by the police can photograph a vehicle's number plate. The number plate data is transmitted to a central database where it is used to identify the owner of the vehicle.
 
(i) The number plate data is transmitted using a wide area network (WAN). Why  is a local area network (LAN) not suitable for the transmission of this data?
[1]
   
(ii) If the output from a camera is analogue, what process must be carried out on the data before it can be used as input into a computer?
[1]
   
(iii) Describe two ways the police could use this system to help them in detecting crime.
[2]
   
(iv) The Data Protection Act will apply to the data stored on the database. Describe three principles of the Data Protection Act.
[3]
   
 
[12] In the following question, additional credit (up to 3 marks) will be given if your answer demonstrates skill in written communication.

Engineers working for a mining exploration company have to travel to remote areas of the world searching for oil, gas and other minerals. They collect geological and environmental data, take photographs and write reports. The engineers have lap top computers with fast Internet access and only visit an office when necessary.

Describe how the engineers could make use of email and the Internet.

Describe any benefits for the company of the engineers carrying out most of their work away from an office and give one reason why the engineers may occasionally have to visit an office.

[6+3]