| [1](i) | 
      State the computer term for an area of memory where data
        is temporarily stored while being transferred between a keyboard and a
        computer.
       | 
      [1] | 
    
    
      |   | 
       | 
        | 
    
    
      | (ii) | 
      Give a different example of where such an area of memory
        would be used in a computer system, stating clearly the relative speeds
        of the devices concerned. | 
      [2] | 
    
    
      |   | 
      
		
			- when data is saved to a hard disc, it is 
			transferred to a buffer first...
 
			- ...because the speed of the hard drive is much 
			slower than the speed of the processor.
 
		 
		  | 
       | 
    
    
      |   | 
    
    
      | [2](a) | 
      Wide area networks can use circuit
        switching or packet switching to
        transmit data from a source work station to a destination work station. | 
        | 
    
    
      | (i) | 
      Explain in detail how data is
        transmitted from source to destination using circuit
        switching. | 
      [2] | 
    
    
       | 
      
		
			- a connection is made between the two work 
			stations by switching all the switches on..
 
			- ..and then the data is sent directly along 
			the circuit
 
		 
		  | 
       | 
    
    
      | (ii) | 
      Explain in detail how data is
        transmitted from source to destination using packet
        switching. | 
      [3] | 
    
    
       | 
      
		
			- the data at the source is split into a 
			number of packets of data
 
			- each packet has the address of its 
			destination and is transmitted from workstation to workstation until 
			it reaches its destination. Not all packets need follow the same 
			route.
 
			- the destination workstation reassembles 
			the data from all the packets it receives
 
		 
		  | 
       | 
    
    
      | (iii) | 
      State  one advantage of using
         packet switching rather than 
        circuit switching. | 
      [1] | 
    
    
       | 
      
		
			- more reliable - if one workstation goes 
			down, the data can still be sent via another route.
 
		 
		  | 
       | 
    
    
      | (b)       | 
      A  ring  network uses a  token to communicate with other
        stations on the network. The  token is continuously passed from station
        to station. | 
       | 
    
    
      | (i) | 
      Give  one disadvantage of a ring network topology compared
        to a bus network. | 
      [1] | 
    
    
       | 
      
		
			- one broken section of cable causes the 
			whole network to break down.
 
		 
		  | 
       | 
    
    
      | (ii) | 
      When data is being transmitted, the token will contain
        actual data and check data. State another item that must be included in
        the token. | 
      [1] | 
    
    
       | 
       | 
       | 
    
    
      | (iii) | 
      Explain  in detail how data is sent from the source to the
        destination using  token passing on a  ring network. | 
      [3] | 
    
    
       | 
      
		
			- source attaches the data to a token. Token 
			contains addresses of source and destination
 
			- the token is continuously passed round the 
			network, each station checks the token and passes it on, until it 
			reaches its destination
 
			- destination retrieves the data from the 
			token
 
		 
		  | 
       | 
    
    
       | 
        | 
       | 
    
    
      | [3] | 
      A holiday company allows customers to search for holidays
        using the company's website. After the customer has selected a holiday
        they move to a new page where they can book the holiday. The master
        file  is then updated to indicate
        that a booking has been made. A copy of every booking transaction is
        stored in a separate file called a 
        transaction log. | 
       | 
    
    
      | (i) | 
      Explain how the system would stop two customers booking
        the same holiday. | 
      [1] | 
    
    
       | 
      
		
			- As soon as a holiday is booked, one of the 
			fields of a record on the master file is updated to show the holiday 
			as being unavailable to anyone else.
 
		 
		  | 
       | 
    
    
      | (ii) | 
      If the master file becomes
        corrupted, the holiday company would not know which customer had booked
        which holiday. Explain in detail how the transaction
        log could be used to restore the corrupted master file. | 
      [2] | 
    
    
       | 
      
		
			- a backup copy of the master file is 
			loaded.
 
			- all the transactions in the transaction 
			log are performed again, updating the master file.
 
		 
		  | 
       | 
    
    
       | 
        | 
       | 
    
    
      | [4] | 
      The operating system of a multi-user computer has to
        manage the computer's  resources. | 
       | 
    
    
      | (i) | 
      Explain in detail how the
        operating system uses time slicing to
        allocate processor time to user tasks. | 
      [2] | 
    
    
       | 
      
		
			- each user's program gets a time slice - a 
			small (maximum) amount of processing time in turn.
 
			- the operating system will decide the order 
			of processing using a system of priorities allocated to each user's 
			program
 
		 
		  | 
       | 
    
    
      | (ii) | 
      Partitioning is used when
        allocating main memory. Explain in detail the
        term partitioning. | 
      [2] | 
    
    
       | 
      
		
			- memory is divided into partitions that are 
			allocated to a program when it is run.
 
			- no program may use memory in another 
			program's partition.
 
		 
		  | 
       | 
    
    
      | (iii) | 
      Explain the meaning of the computer term interrupt
        and give two examples of situations where
        interrupts may occur. | 
      [3] | 
    
    
       | 
      
		
			- an interrupt is a signal from a device to 
			the operating system.
 
			- an interrupt occurs at the end of a time 
			slice of processing time to let the operating system know that it 
			needs to change to processing another program
 
			- an interrupt may be received from a device 
			such as a printer when it runs out of paper.
 
		 
		  | 
       | 
    
    
       | 
        | 
       | 
    
    
      | [5](a) | 
      A particular indexed sequential
        file uses a three level index. Explain in
        detail, with the aid of a diagram how a
        record is located using the three indexes. | 
      [3] | 
    
    
       | 
      
		
			- First index contains ranges of keys and 
			location of second index.
 
			- Second index contains smaller ranges of 
			keys and locations of final index
 
			- Final third index contains keys and 
			physical addresses of records.
 
			  
		 
		  | 
       | 
    
    
      | (b) | 
      Give one advantage of using
        an indexed sequential file rather than a direct
        access file | 
      [1] | 
    
    
       | 
      
		
			- the file is sorted - so the records can be 
			processed in order.
 
		 
		  | 
       | 
    
    
      | (c) | 
      Explain in detail how a
        record is located using a hashing algorithm when the record is stored in
        the overflow area, | 
      [4] | 
    
    
       | 
      
		
			- a calculation is performed on the key 
			field of the record to be located...
 
			- ...resulting in the hash address of the 
			block where the record should be stored.
 
			- A serial search of that block would result 
			in the record not being found - only the address of an overflow 
			area.
 
			- A serial search of the overflow area would 
			result in the record being located.
 
		 
		  | 
       | 
    
    
      | (d) | 
      How will accessing a record in the overflow area affect
        the access time? | 
      [1] | 
    
    
       | 
      
		
			- it would slow the search process down
 
		 
		  | 
       | 
    
    
       | 
        | 
       | 
    
    
      | [6] | 
      Each year students enrol on many college courses. The data
        is stored in a database which has not been normalised; some of the data
        is inconsistent. An example of the data is shown below. | 
       | 
    
    
       | 
      
		
			
				
					
					Student 
					Number | 
					Name | 
					Address | 
					Tel Num | 
					
					DOB | 
					
					Course Title | 
					
					Course 
					Cost | 
					Start 
					Date | 
				 
				
					| 101 | 
					Ian Smith | 
					22 Apple Drive | 
					0111 555444 | 
					29/07/88 | 
					AS Level 
					Physics | 
					£200 | 
					08/09/07 | 
				 
				
					| 101 | 
					Ian Smith | 
					22 Apple Drive | 
					0111 555444 | 
					29/07/88 | 
					AS Level 
					Chemistry | 
					£200 | 
					08/09/07 | 
				 
				
					| 123 | 
					Jane Jones | 
					31 Farm Road | 
					0123 656565 | 
					17/03/87 | 
					GCSE 
					Mathematics | 
					£95 | 
					15/09/07 | 
				 
				
					| 101 | 
					Ian Smyth | 
					22 Apple Drive | 
					0111 555444 | 
					29/07/88 | 
					AS Level 
					Photography | 
					£350 | 
					08/09/07 | 
				 
				
					| 123 | 
					Jane Jones | 
					31 Farm Road | 
					0123 656565 | 
					17/03/87 | 
					GCSE English | 
					£95 | 
					15/09/07 | 
				 
				
					| 123 | 
					Jane Jones | 
					31 Farm Road | 
					0123 656565 | 
					17/03/87 | 
					GCSE Spanish | 
					£95 | 
					15/09/07 | 
				 
				
					| 136 | 
					Harry Stien | 
					44 Tree Street | 
					0499 333242 | 
					22/05/71 | 
					GCSE Spanish | 
					£95 | 
					15/09/07 | 
				 
				
					| 123 | 
					Jane Jones | 
					31 Farm Road | 
					0123 656565 | 
					17/03/87 | 
					GCSE History | 
					£95 | 
					15/09/07 | 
				 
				
					| ........ | 
					........ | 
					........ | 
					........ | 
					........ | 
					........ | 
					...... | 
					  | 
				 
			 
		 
		 | 
    
    
      | (a) | 
      Using an example of inconsistent data from the above
        table, explain what is meant by the term data
        inconsistency. | 
      [2] | 
    
    
       | 
      
		
			- If data is stored more than once, the two 
			or more versions of the data may be different
 
			- Ian Smith / Ian Smyth (one of these is 
			spelled incorrectly)
 
		 
		  | 
       | 
    
    
      | (b) | 
      How could the possibility of this database containing
        inconsistent data be removed? | 
      [1] | 
    
    
       | 
       | 
       | 
    
    
      | (c) | 
      A definition of third normal form is 'data
        items are dependant on the primary key only and dependant on the whole
        of the primary key'. | 
       | 
    
    
       | 
      Using an example from the above data, which is not
        normalised, explain why this data is not in third normal form. | 
      [1] | 
    
    
       | 
      
		
			- The primary key is the field 'Student 
			Number' but there are fields stored such as 'Course Title' that do 
			not depend on the student number.
 
		 
		  | 
       | 
    
    
       | 
        | 
       | 
    
    
      | [7] | 
      Car engines are controlled by a computer system called the
        engine control unit
        (ECU). The ECU has several inputs. | 
       | 
    
    
      | (a)(i) | 
      The ECU uses feed-back to
        control the engine. Explain in detail what
        is meant by the term feed-back | 
      [2] | 
    
    
       | 
      
		
			- sensors in the engine input readings to 
			the ECU, that may then make adjustments.
 
			- outputs from the ECU may then affect 
			subsequent readings from the sensors.
 
		 
		  | 
       | 
    
    
      | (ii) | 
      Describe one benefit of using
        a computer system to control the engine. | 
      [1] | 
    
    
       | 
      
		
			- continuous and automatic monitoring of the 
			engine performance (no human intervention required)
 
		 
		  | 
       | 
    
    
      | (b)(i) | 
      Explain the difference between analogue and digital
        signals. | 
      [1] | 
    
    
       | 
      
		
			- digital signals have distinct discrete 
			values - analogue signals may have any of a range of continuous 
			values.
 
		 
		  | 
       | 
    
    
      | (ii) | 
      One input to the ECU is the engine temperature. Explain
        why analogue to digital conversion will be required to monitor the
        engine temperature. | 
      [1] | 
    
    
       | 
      
		
			- the temperature readings will be analogue, 
			so they will need to be converted to digital readings for the 
			computer to process them. (computers process digital data)
 
		 
		  | 
       | 
    
    
       | 
        | 
       | 
    
    
      | [8](a) | 
      Data can be transmitted along a data line in two different
        ways, either one bit after the other or by simultaneously transmitting
        more than one bit at the same time. State the name of each
        of these data transmission methods. | 
      [1] | 
    
    
       | 
      
		
			- one bit after another - serial 
			transmission
 
			- more than one bit at a time - parallel 
			transmission
 
		 
		  | 
       | 
    
    
      | (b) | 
      Data can be transmitted along a data line in both
        directions at the same time. State the name of this data transmission
        method. | 
      [1] | 
    
    
       | 
       | 
       | 
    
    
      | (c) | 
      Explain the need for multiplexing
        in a computer system. | 
      [1] | 
    
    
       | 
      
		
			- many signals can use the same transmission 
			medium
 
		 
		  | 
       | 
    
    
       | 
        | 
       | 
    
    
      | 9.  (i) | 
      A recording company has recording artists who produce
        albums. Each album contains many singles and each recording artist
        produces many albums. | 
       | 
    
    
       | 
      The company need to know which artist has released which
        album and what singles are on each album. | 
       | 
    
    
       | 
      Design a three-table database
        for recording artists, albums and singles in third normal form to handle
        the information required for this application | 
       | 
    
    
       | 
      You should clearly indicate suitable
        table names and any primary of foreign keys that you use. | 
      [8] | 
    
    
       | 
      
		
			- ARTISTS(ArtistID, ArtistName, 
			ArtistAddress, ArtistTelNum)
 
  
			- ALBUMS(AlbumID, AlbumName,
			ArtistID, 
			DateReleased)
 
  
			- SINGLES(SingleID,
			AlbumID, SingleName, 
			Time)
 
			 
			Underlined fields are key fields 
			Overlined fields are foreign fields. 
		 
		  | 
       | 
    
    
      | (ii) | 
      The recording artists also release downloads which are not
        released as singles or contained on any album. Add an extra table to
        your database to accommodate this extra information. | 
      [2] | 
    
    
       | 
      
		
			- DOWNLOADS(DownloadID,
			ArtistID, 
			DownloadName, DownloadTime)
 
		 
		  | 
       | 
    
    
       | 
        | 
       | 
    
    
      | [10] (a) (i) | 
      Explain what is meant by the term data
        encryption | 
      [1] | 
    
    
       | 
      
		
			- coding of data to make it meaningless.
 
		 
		  | 
       | 
    
    
      | (ii) | 
      Explain in detail how
        encrypted data can be read by the appropriate person. | 
      [2] | 
    
    
       | 
      
		
			- the encrypted data needs to be 
			decrypted...
 
			- ...using a decryption key.
 
		 
		  | 
       | 
    
    
      | (b) | 
      Many large organisations carry out disaster planning for
        their computer systems. Describe two
        elements of disaster planning which can allow an organisation to quickly
        recover following a disaster to their computer system. | 
      [2] | 
    
    
       | 
      
		
			- disaster prevention - precautions to be 
			taken before a disaster occurs such as backing up of data
 
			- methods of recovery - after the disaster 
			has occurred. Eg. how to retrieve lost data
 
		 
		  | 
       | 
    
    
       | 
        | 
       | 
    
    
      | 11. | 
      In the following question,
        additional credit, (up to 3 marks) will be given if your answer
        demonstrates skill in written communication. | 
       | 
    
    
       | 
      Engineers have designed a new aeroplane called UltraJet
        that will be the biggest aeroplane ever produced. The pilots will
        require training before they can fly the UltraJet prototype. | 
       | 
    
    
       | 
      The engineers have also used complex software and powerful
        computers to create a flight-training simulator to train UltraJet
        pilots. | 
       | 
    
    
      |   | 
      Explain why powerful computers are essential for
        flight-training simulators and describe the difficulties in producing a
        realistic simulator. Also describe the benefits of using flight-training
        simulators to train UltraJet pilots. | 
      [7+3] | 
    
    
       | 
      
		
			- Powerful computers are needed to process 
			large quantities of data being input. 
 
			- The data needs to be processed fast 
			because the simulator is a real-time system and must react 
			immediately to any inputs.
 
			- Real life situations are extremely complex 
			and only an approximation to real life can ever be achieved.
 
			- Extreme conditions such as flying the 
			UltraJet through a hurricane can only be simulated approximately as 
			realistic behaviour cannot be measured.
 
			- There is a lot less danger for pilots to 
			train on a simulator, and crashing planes in reality would be an 
			expensive business!
 
			- Many situations can be simulated including 
			difficult weather conditions such as fog, cross winds etc, so the 
			pilots can get practice at flying the new plane in all conditions.
 
			- Experimentation can be carried out without 
			endangering aircraft or human life. 
 
		 
		 
		 | 
       | 
    
    
      |   |