Computing (Modular) CP2
January 2007
(1.5 Hours)
| [1] | A secretary uses a word processing package to produce
        letters. | 
      |
| (i) | Describe how the secretary could use each
        of the features named below: | 
      |
| (I)  thesaurus; | 
      [1] | |
  | 
      ||
| (II) print preview. | 
      [1] | |
  | 
      ||
| (ii) | The secretary sends confidential letters to clients using
        email. | 
      |
| (I)  Describe one
        advantage of sending the letters using email compared to conventional
        post. | 
      [1] | |
  | 
      ||
| (II) Describe two possible
        concerns that the clients may have about receiving this type of
        communication by email. | 
      [2] | |
  | 
      ||
| [2] | Two secondary storage devices are a floppy disc drive and
        a hard disc drive. Name two other secondary storage devices, giving a suitable use for each device.  | 
      [4] | 
  | 
      ||
| [3] | DAP Motors is a small garage that repairs and services
        cars. Details of customers and their cars are stored in paper files at
        reception. Cars need to be serviced at regular intervals.
         The number of customers is growing and the garage owner believes that the current paper based system may be losing business. Describe two possible problems with the
        current paper based system that may lead to the garage losing business
        and describe how a computerised database system could solve these
        problems.  | 
      [4] | 
  | 
      ||
| [4](a) | Explain the difference between validation and verification. | [2] | 
  | 
      ||
| (b) | National Insurance numbers have the following structure:
         LetterLetter DigitDigit DigitDigit DigitDigit Letter An example of a valid National Insurance number is RZ 25 27 29 Y A company uses a validation check when the National Insurance number is input into a computer system. Describe a suitable validation check that could be carried out on the
        National Insurance number, and give an example of invalid
        data that would be detected by this validation check.  | 
      [2] | 
  | 
      ||
| [5](a) | Briefly explain the purpose of handshaking when used in connection with a computer and a printer. | [1] | 
  | 
      ||
| (b) | Describe the communication that would take place between a computer and a printer before any data to be printed is sent to the printer. | [2] | 
  | 
      ||
| [6](a) | Explain how a record is added to: | 
      |
| (i) | a serial file | [1] | 
  | 
      ||
| (ii) | a sequential file | [2] | 
  | 
      ||
| (b) | Records within a file can be fixed or variable length. Give one advantage of a fixed length record and one advantage of a variable length record. | [2] | 
  | 
      ||
| (c) | A factory with approximately two thousand employees has a payroll file which contains fixed length records stored in sequential order. At the end of every month, the file is used to calculate that month's pay for each employee and produce the pay slips. | |
| (i) | Briefly explain why sequential order is the most appropriate in this situation. | [1] | 
  | 
      ||
| (ii) | Briefly explain why fixed length records are the most appropriate in this situation. | [1] | 
  | 
      ||
| [7] | Operating systems can use different modes of operation
        including:
        
  | 
      |
| (a) | Name an application where real time transaction processing is used, and give one reason why this mode of operation is used for this application. | [2] | 
  | 
      ||
| (b) | Name an application where real time processing is used, and give one reason why this mode of operation is used for this application. | [2] | 
  | 
      ||
| (c) | Name an application where batch processing is used, and give one reason why this mode of operation is used for this application. | [2] | 
  | 
      ||
| [8](a) | A computer can have a 64-bit word length. What is meant by the term word in this context? | [1] | 
  | 
      ||
| (b) | Computer game consoles can use different word sizes. Explain the advantage of having a computer game console with a 128-bit word size rather than 64-bit. | [1] | 
  | 
      ||
| [9] | A personal computer can use RAM cache and disc cache
        memory for storing data. | 
      |
| (i) | Why is cache memory used? | [1] | 
  | 
      ||
| (ii) | Describe data that could be stored in: | 
      |
| (I) RAM cache; | [1] | |
  | 
      ||
| (II) Disc cache. | [1] | |
  | 
      ||
| [10] | Bank customers can access their bank accounts on-line
        using the Internet. They are able to view statements, set up regular
        payments and transfer money. These accounts could be subject to malicious
        or accidental damage. | 
      |
| (i) | Describe what is meant by the term  malicious
        damage and give an example of malicious
        damage that a customer could suffer with an on-line bank account. | 
      [2] | 
  | 
      ||
| Explain how the bank could prevent malicious
        damage. | 
      ||
  | 
      ||
| (ii) | Describe what is meant by the term accidental
        damage and give an example of accidental
        damage that a customer could suffer with an on-line bank account. | 
      [2] | 
  | 
      ||
| Explain how the bank could prevent accidental
        damage. | 
      [1] | |
  | 
      ||
| [11] | Cameras used by the police can photograph a vehicle's
        number plate. The number plate data is transmitted to a central database
        where it is used to identify the owner of the vehicle. | 
      |
| (i) | The number plate data is transmitted using a wide area
        network (WAN). Why  is a local area network (LAN) not
        suitable for the transmission of this data? | 
      [1] | 
  | 
      ||
| (ii) | If the output from a camera is analogue, what process must
        be carried out on the data before it can be used as input into a
        computer? | 
      [1] | 
  | 
      ||
| (iii) | Describe two ways the police
        could use this system to help them in detecting crime. | 
      [2] | 
  | 
      ||
| (iv) | The Data Protection Act will apply to the data stored on
        the database. Describe three principles of
        the Data Protection Act. | 
      [3] | 
  | 
      ||
| [12] | In the following question,
        additional credit (up to 3 marks) will be given if your answer
        demonstrates skill in written communication.
         Engineers working for a mining exploration company have to travel to remote areas of the world searching for oil, gas and other minerals. They collect geological and environmental data, take photographs and write reports. The engineers have lap top computers with fast Internet access and only visit an office when necessary. Describe how the engineers could make use of email and the Internet. Describe any benefits for the company of
        the engineers carrying out most of their work away from an office and
        give one reason why the engineers may
        occasionally have to visit an office.  | 
      [6+3] | 
          The engineers can use email to keep in touch
          with their company and other engineers out in the field. They can send
          their reports back to their office and receive replies within seconds,
          sending any photographs as attachments.
           The Internet could be used to obtain information about the locality, book travel tickets or check out the weather forecasts. Forums can be used to discuss and exchange ideas about their work. Videoconferencing with colleagues can be done to keep in touch or hold meetings. The company can receive and act on reports much faster using email and the Internet, and they do not have to provide expensive office space or facilities for their engineers. Engineers may have to visit the office to bring back physical objects such as rock samples...or attend the Christmas office party! 
  | 
      ||