You are on page 1of 16

Joshua Isaacs

Name
Date

21/04/2016

Pearson BTEC Level 1 / Level 2 First

Information and Creative Technology
Unit 1: The Online World
Practice Examination 2

This practice examination is 1 hour in duration and contains 50 marks.
Please write your name at the top of this page and answer all questions on the
following pages using the spaces provided. There are 16 questions in total.

BTEC Level 1 / Level 2 ICT Unit 1

Page 1 of 1610

Questio
n

Max

Marks

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

1
2
4
2
2
2
4
2
1
3
5
4
2
5
3
8

1
2
2
1
2
2
4
1
1
3
4
2
1
1
0
4

Total

50

31

© ZigZag Education, 2014

Question 1 of 16
New ways of communicating have opened up markets on a global scale.
Businesses around the world communicate with customers, suppliers and the
public via email, web forms, instant messaging, live chat, blogs and forums.
Which of the following is an example of online publishing?

[1]

Tick one box
Web Conferencing
Podcast

BTEC Level 1 / Level 2 ICT Unit 1



Online tax assessment ☐
E

Page 2 of 1610

-voting

© ZigZag Education, 2014

Question 2 of 16

A web address or URL is used to access a website on the Internet.
Label the two parts of the website address (URL) below.
Protocol

Domain

Pathname

http://ww
w.
megasto
reuk . eu
Domain

BTEC Level 1 / Level 2 ICT Unit 1

Page 3 of 1610

[2]

Padlock

Location

Location

© ZigZag Education, 2014

Question 3 of 16
Advertisements are aimed at grabbing your attention and making you
buy/read/use their product. Commercial advertisements may also use rollovers
and interactive elements which invite the user to click to see a result.
(a) Affiliate programs can be an effective way of e-marketing.
Explain the term pay-per-click.

[2]

Enter your answer in the box
Pay-per-click is when someone has some form of advertisement online and they pay
a set amount per click on there ad.

(b) Name the text file that can be used for targeted marketing, allowing a
profile of the customer to be built up based on what they have clicked on or
viewed.
[1]
Enter your answer in the box

(c) Give the name of a program that displays advertising on a user's computer,
usually in the form of pop-ups.
[1]
Enter your answer in the box

BTEC Level 1 / Level 2 ICT Unit 1

Page 4 of 1610

© ZigZag Education, 2014

Question 4 of 16
E-mail, which stands for electronic mail, enables worldwide communication via
computers or mobile devices between users. With email you can send, receive,
reply and forward mail to one or more recipients (a recipient is someone who
receives).
Give one advantage and one disadvantage of using email.

[2]

Enter your answer in the box
Advantage – It’s a free instant messaging service.
Disadvantage – You do not know if the receiver has gotton/read the email.

Question 5 of 16
A web browser requests a page and displays all components of the requested
page on the user's computer (e.g. text, images, animations, videos, links, etc.).
Match the correct type of web component to the descriptions below.
Meta tag

Hyperlink

Browser

The source code used for creating web pages
Used to add keywords and descriptions to help
users find a website via search engines

BTEC Level 1 / Level 2 ICT Unit 1

Page 5 of 1610

[2]

HTML

HTML

Meta tag

© ZigZag Education, 2014

Question 6 of 16
This question refers to the Internet infrastructure.
(a) Give the name for an access point (i.e. a physical location) for connecting
networks or communication devices to the Internet, usually comprising a
server, router, modems and switches.
[1]
Tick one box
IMAP
POP3

BTEC Level 1 / Level 2 ICT Unit 1


NAP
Point of Presence

Page 6 of 1610


© ZigZag Education, 2014

(b) Give the name for a public network exchange where ISPs can connect and
exchange traffic between their networks via peering arrangements.
[1]
Tick one box
Router
NAP


ISP
Splitter

Page 7 of 16


Question 7 of 16
A database is used for storing information.
Match the labels to the correct description below.
DBMS

SQL

Record

A collection of related fields

[4]
Relationship
Record

When a query is created in a database software
program such as Microsoft Access, it is written
using this language

SQL

Used to bring together data from multiple tables
by matching a unique field in one table with a field
in another, thereby minimising data duplication

Relationship

Used by businesses to share data, control and
manage redundant data and ensure consistency
and integrity of data

DBMS

BTEC Level 1 / Level 2 ICT Unit 1

Page 8 of 165

© ZigZag Education, 2014

Question
Question 10
8 of
of16
16
Data exchange refers to the passing of data between computers on a network,
the methods of transmitting data between computers and the type of
transmission mode.
(a) Label the device in the diagram below which enables a wired device to
become part of a wireless network.

Wired Device

Switch

[1]

Wireless Network

(b) Label the device in the diagram below which enables wireless connection to
a network. Correctly label the device below:
[1]

Router

Wi-Fi Adapter

Desktop Computer

Question 9 of 16
Data, such as personal or financial details, that is transmitted via a network
(particularly a wireless, public or unsecured network) is prone to security threats.
Give the name for the security measure that makes data incomprehensible but
can be decrypted by the receiver.
[1]
Enter your answer in the box
Encryption

BTEC Level 1 / Level 2 ICT Unit 1

Page 9 of 165

© ZigZag Education, 2014

To ensure the safety of your data, it is important to save your work regularly.
Match the correct term to the descriptions below.
Memory Stick

Recycle Bin

When items are deleted from a computer hard
drive they are sent here

[3]
Remote
Recycle Bin

A type of backup service provided by ISPs over
broadband Internet connections

Remote

A portable storage device which is inserted into
the USB (Universal Serial Bus) port of a computer

Memory Stick

Question 11 of 16
There are many social network sites providing chat rooms, forums, email and
instant messenger which allow you to post information about yourself and
communicate with other users. When using these sites, users should be cautious
about what personal information is disclosed as they may be viewed by complete
strangers.
(a) Describe two ways in which a user can stay safe while using social
networks.

[2]

Enter your answer in the box
1) Keep personal information private
2) Don’t let anybody else have access to your account

Question 11 continues on the next page

BTEC Level 1 / Level 2 ICT Unit 1

Page 10 of 165

© ZigZag Education, 2014

Question 11 of 16 (continued)
(b) Describe what is meant by the term ‘spam’.

[2]

Enter your answer in the box
Spam is a thing that is sent usually to a large number of people, it is usually
advertisement or malware.

(c) Name the term used for posting deliberately hostile messages to other
Internet users.

[1]

Tick one box
Firing
Flaming

BTEC Level 1 / Level 2 ICT Unit 1


Grilling
Roasting

Page 11 of 165


© ZigZag Education, 2014

Question 12 of 16
Collaborative working enables multiple people to share files and resources.
Tania wants to know more about collaborative working. To help Tania, list one
advantage and one disadvantage of collaborating online.
[4]
Enter your answer in the box
Advantage – People can work on a project together and they have the internet right
infront of them, so if they need information they can access it easily.
Disadvantage – The person you are working with may write the wrong information.

BTEC Level 1 / Level 2 ICT Unit 1

Page 12 of 165

© ZigZag Education, 2014

Question 13 of 16
It is important to maintain full control over who can access and edit shared
documents, ensuring that sensitive information is kept secure.
Match the correct type of security measure to the descriptions below.
Access Rights

Read-only

Acceptable Use

These allow authorised users to access areas on
the system using their password
This feature protects a file from being altered

[2]

Password Protect
Password Protect

Read-only

Question 14 of 16
Data transfer rates refer to the speed at which data is sent via a network.
(a) In which way is the transfer rate of data most commonly measured?

[1]

Tick one box
Bits / bytes per second


Gigabytes per minute ☐

BTEC Level 1 / Level 2 ICT Unit 1


/ megabytes per second☒
Megabits
Terabytes per second

Page 13 of 165

© ZigZag Education, 2014

Page 14 of 16

(b) Using an example for each, explain
the
between wired and
Question
15 difference
of 16
wireless transmission in terms of transfer speeds, ranges and uses.

[4]

Enter your answer in the box

Question 16 of 16
Explain, using examples, the term packet switching.

[3]

Enter your answer in the box

It is important to protect your computer against malicious programs, such as
viruses, worms, Trojan horses, spyware, adware and rogue diallers.
Naomi wants to ensure that his computer is protected from malicious threats.
Discuss what measures Naomi should take to protect his computer from threats
such as viruses and spyware.
[8]
Enter your answer in the box

BTEC Level 1 / Level 2 ICT Unit 1

Page 15 of 1610

© ZigZag Education, 2014

The most obvious one is an antivirus, Windows comes with Windows Defender free
but if you wanted something different you can get loads on line ranging from all sorts
of prices, some are even free. Another way of staying safe is just be carful, don’t
download anything from an untrusted site and watch what yourself and others are
doing. Lastly if you have an antivirus you should do a scan at least once a month,
maybe once a week. This will make sure you have nothing on your system and if you
do it will clear it out before it becomes a problem.

BTEC Level 1 / Level 2 ICT Unit 1

Page 16 of 1610

© ZigZag Education, 2014