Computing (Modular) CP2
January 2009

(1.5 Hours)

[1] A low cost airline sends emails to customers advertising flights for sale.
(a) Give two reasons, apart from speed of delivery and cost, why the airline may prefer to use email for this communication instead of using conventional post. [2]
(b) Describe one problem that may arise from using email in this way. [1]
 
2.(a) Draw a diagram of a bus network.  [1]
 (b) Draw a diagram of a star network.  [1]
 (c) Give one advantage of using a star network rather than a bus network.  [1]
 (d) Describe two advantages of network computers compared with standalone computers. [2]
 
 3. Many cars are now fitted with satellite navigation systems. The car's destination is input and the driving directions are output.
 (a) One method of output is a screen display. looking at the screen while driving would be distracting for the driver. What other method of output would be more suitable? [1] 
 (b) Explain why voice input would be a suitable method of input for this device. [1]
 (c) Describe two situations where voice input may not be recognised by the device. [2]
 
 4. A secondary school has a file server with a 500 gigabyte hard disc.
 (a) Describe in detail a suitable strategy for backing up the data stored on the file server. [2]
 (b) Describe in detail a suitable strategy for restoring this data after a failure.  [2]
 
 5. An optician collects customer's details during their first visit. These details are stored on paper in files.
The number of customers is increasing and the optician finds that amending customer details is extremely time consuming. Describe two other possible problems with the current paper-based system and describe how a computerised database system could solve these problems. [4] 
 
 6. Validation checks are carried out on customer data entered into a computer at a car rental company.
 (a) What is the purpose of validation checks?  [1]
 (b) One item of data being entered is the age of the car driver. Name a suitable validation check and describe how this check would detect an invalid age being entered. [2] 
 
 7. The Conifer Hotels group has hundreds of hotels throughout the world. Guests of Conifer Hotels have loyalty cards that earn points for every stay at a participating hotel. Guests can access their loyalty card accounts on-line using the Internet. They are able to view statements and use points to claim free hotel nights. These accounts could be subject to malicious or accidental damage.
(a) (i) Describe what is meant by the term malicious damage and explain how Conifer hotels could prevent malicious damage to the data stored in these accounts. [2] 
 (ii) Describe what is meant by the term accidental damage and explain how Conifer Hotels could prevent accidental damage to the data stored in these accounts. [2]
 (b) Conifer Hotels comply with the Data Protection Act by ensuring that guests data is up to date and accurate, held securely and held for no longer than necessary. Describe three other ways in which Conifer Hotels must operate in order to comply with the Data Protection Act. [3]
 
8. (a) An operating system provides an interface between the hardware and the user and manages system resources.
 (i) Describe three functions of an operating system from a user's point of view. [3]
 (ii) Name three resources which an operating system would manage. [3]
 (b) A theatre sells tickets using real time transaction processing. Describe how real time transaction processing works in this case and explain why it is the most suitable mode of operation [2]
 
9. (a) Records within a file can be fixed length or variable length. Describe the difference between fixed and variable length records, giving one advantage of using a variable length record. [3]
 (b) A household gas supplier takes readings from customers' gas meters every three months. The current meter reading for each customer is stored in a transaction file. Customer details are stored in a master file.
 (i) Why is serial file organisation the most suitable method for the transaction file? [1]
 (ii) Why is sequential file organisation the most suitable method for the master file? [1]
 (iii) Explain how the transaction file is used to update the master file when producing the gas bills. [2]
 
 10. Explain what is meant by each of the following computer terms:
 (a) address bus;  [1]
 (b) byte; [1]
 (c) word;  [1]
 (d) disk cache memory.  [1]
 
 11. In the following question, additional credit ( up to 3 marks) will be given if your answer demonstrates skill in written communication.
A computer software company has been asked to produce a commercial web for a customer. The company employs a team of software developers who will be provided with the necessary hardware and software and will work from home and will have access to the company intranet.
From the company perspective describe the benefits of the developers working from home.
From the developers' perspective describe the drawbacks of working from home.
Explain why the software developers would find the company's intranet useful. [8+3]