You are on page 1of 16

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS

International General Certificate of Secondary Education


*8341556169*

INFORMATION AND COMMUNICATION TECHNOLOGY 0417/01


Paper 1 May/June 2009
2 hours
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use a soft pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, highlighters, glue or correction fluid.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

For Examiner's Use

This document consists of 15 printed pages and 1 blank page.

IB09 06_0417_01/4RP
© UCLES 2009 [Turn over
2

1 Name the methods used to represent information on A, B, C, D and E using the words from For
the list below. Examiner's
Use

A B C

D E

SECTION 1 SECTION 2
1 A B C D E 1 A B C D E

2 A B C D E 2 A B C D E

3 A B C D E 3 A B C D E

4 A B C D E 4 A B C D E

5 A B C D E 5 A B C D E

Bar code Chip DVD ROM

Flash memory Graphics tablet Light pen

Magnetic ink characters Magnetic stripe Optical marks

Optically read characters Plotter Remote control

Magnetic stripe Magnetic ink characters


A B
Chip Optical marks
C D
Barcode
E [5]

2 Ring two items which are input devices.

Buzzer Dot matrix printer Graph plotter

Graphics tablet Laser printer Touch screen

[2]

© UCLES 2009 0417/01/M/J/09


3

3 Tick TRUE or FALSE next to each of these statements. For


Examiner's
Use
TRUE FALSE

Encryption prevents hackers from deleting data.


Back up procedures prevent hackers from accessing data on a
computer.
You should regularly change your password to make it more difficult
for hackers to access your data.
You should always log off after using a networked computer.

You should always tell a friend your password in case you forget it.

[5]

4 Draw five lines on the diagram to match the software to how it could be used.

Software Use

Desktop publisher suggesting medical diagnoses

Measuring program storing pupil records in a school

Spreadsheet producing a school magazine

Inference engine monitoring temperature in a science experiment

Database managing personal finance

[5]

5 Select the most suitable data type from the list to represent:

Numeric(integer)
(a) the number of children in a family
Alphanumeric
(b) a line of a company’s address

(c) the gender of a person Booloean

Date
(d) somebody’s birthday

Alphanumeric Boolean Date

Numeric (Integer) Numeric (Real)

[4]

© UCLES 2009 0417/01/M/J/09 [Turn over


4

6 A floor turtle can use the following instructions: For


Examiner's
Use
INSTRUCTION MEANING

FORWARD n Move n mm forward

BACKWARD n Move n mm backward

LEFT t Turn left t degrees

RIGHT t Turn right t degrees

PENUP Lift the pen

PENDOWN Lower the pen

Complete the set of instructions to draw this shape by filling in the blank lines.

PEN DOWN 180


LEFT 90
70
FORWARD 35 80

RIGHT 90 35 80 10
FORWARD 80
Start Finish
RIGHT 90

FORWARD180

RIGHT 90

FORWARD 70

PENUP

FORWARD 10

PENUP

RIGHT90
FORWARD 80

LEFT 90

[5]

© UCLES 2009 0417/01/M/J/09


5

7 Two types of network topology have been combined to form a larger network. For
Examiner's
Use

(a) Give the name of the type of the larger network topology Tree [1]

(b) Give the names of the other two types of topology in this network.
Star
1
Bus
2 [2]

(c) Complete each sentence below using one item from the list.

A bridge A hub

A proxy server A switch

Hub
(i) does not manage any of the data traffic through it.

(ii) Switch forwards data packets to computers and printers.

(iii) Proxy server can be a major component of a firewall.

(iv) Bridge usually only has two ports. [4]

8 Tick TRUE or FALSE next to each of these statements which describe the use of e-mail
compared to the normal postal service.

TRUE FALSE

E-mails can only be sent using a Post Office.

You don’t have to leave your house to send e-mail.

It is quick to send the same message to many people using e-mail.

It takes a long time for an e-mail to arrive.

[4]

© UCLES 2009 0417/01/M/J/09 [Turn over


6

9 Put a tick in the column which best describes the type of processing used in the following For
applications. Examiner's
Use

Real Time Batch

A burglar alarm system.

Producing gas bills.

Cooking with an automatic cooker.

Scanning OMR sheets.

[4]

10 A book shop owner uses a spreadsheet to calculate profits. This is part of the spreadsheet.

A B C D E F

Cost Selling Profit Total


price Price per book Number Profit
1 ISBN
sold
($) ($) ($) ($)

2 0-34-080006-2 22 29 7 32 224

3 0-52-154540-4 26 35 9 45 405

4 0-74-879116-7 15 21 6 32 192

5 0-34-081639-2 33 41 8 89 712

(a) Which row contains labels?


1
[1]

(b) Give the cell reference of the cell that contains 0-74-879116-7.
A4
[1]

(c) Give the cell reference of a cell that contains numeric data.
Cell in the range of B2 to F5
[1]

(d) Write down the formula which has been entered in cell F2.
=D2*E2 [1]

© UCLES 2009 0417/01/M/J/09


7

(e) When the spreadsheet was created a similar formula had to go in cells F3 to F5. Tick For
three methods that could have been used to achieve this, leaving F2 unchanged. Examiner's
Use

Cut and paste

Fill down

Copy and paste

Dragging the fill handle down

Transposing the cells

Absolute cell referencing

[3]

11 Raquel Lopez owns a chain of car repair garages. She keeps records of all her customers.
She has employed a systems analyst to recommend a new computer system for her
business. The first task the analyst will undertake is to analyse the existing system.

(a) Give four methods of analysing the existing system.


Questionnaires
1

2 Interview

Examination of documents
3

Observation
4

[4]

(b) Details of each customer need to be entered into the computer. Give one reason why
this data will need to be verified.
To detect typing errors/data entry errors/transcription errors

[1]

(c) Name and describe one method of verification.


Visual verification

Double entry

[2]

© UCLES 2009 0417/01/M/J/09 [Turn over


8

(d) The systems analyst decides that the system needs to have a screen input form to For
enter all the details of each customer. Name four data items that would be included in Examiner's
Use
such a form.

1 Name

2 Address

3 Postcode

Email address
4 [4]

(e) Describe four features that would help a user to navigate between input forms.

1 Search engine

2 Submit button

3 Button to go to sub forms

Button to close from


4

[4]

(f) The systems analyst now designs the file structure. Tick three items which would need
to be designed as part of the file structure.

Field names

Input screen

Print format

Validation routines

Field lengths

Hardware and software required


[3]

© UCLES 2009 0417/01/M/J/09


9

(g) Name three methods of implementing this new system. For


Examiner's
Parallel running Use
1
Pilot running
2

3 Phases implemetion [3]

(h) After the system is implemented it will be evaluated. Tick three items which should be
present in the evaluation.

Printouts of the results of queries

The appropriateness of the solution

Comparing the solution with the original task requirements

Program listing

Any improvements which can be made to the system

System flowcharts
[3]

© UCLES 2009 0417/01/M/J/09 [Turn over


10

12 Companies in the nuclear industry often use simulations because to experiment with For
nuclear material would be too dangerous. Examiner's
Use
(a) Give two other examples of computer modelling which are used to minimise danger.
Flight simulation
1

2 Car driving simulator

[2]
(b) Other than minimizing danger, give three reasons why computer models are used
rather than the real thing.
Real thing is too expensive
1

2 Correction are easy to make

Waste of materials
3

[3]

13 Tick four items which must be part of an expert system.

Bar code reader

Spreadsheet

Dot matrix printer

Inference engine

Interactive input screen

Knowledge base

Rules base

Search engine
[4]

© UCLES 2009 0417/01/M/J/09


11

14 The prolonged use of computers can lead to health and safety problems. For
Examiner's
Use
(a) Tick two health problems that may be caused by prolonged use of computers.

RSI

Influenza virus

Blood poisoning

Headaches
[2]

(b) Tick two ways of preventing health problems.

Sit far away from the monitor

Sit in a comfortable chair

Take regular breaks

Put a screen filter in front of the monitor


[2]

(c) Tick two safety problems that may be caused by the use of computers.

Back problems

Electrocution

Fire

Hacking
[2]

(d) Tick two ways of preventing safety problems.

Don’t overload electrical sockets

Make sure there are no bare wires

Use an expert system

Use anti-virus software


[2]

© UCLES 2009 0417/01/M/J/09 [Turn over


12

15 Computers are used to manage data in libraries. Name the different methods used to input For
data about books and borrowers and discuss the advantages and disadvantages of these. Examiner's
Use
Keyboards, bar code reader, magnetic stripe reader can be used to enter data about books.

Advantages:

Scanning barcodes are very fast

Magnetic stripe readers are also fast and accurate

Keyboards are much faster than writing

Disadvantages:

Entering data is by a keyboard is slow and monotonous.

Barcode and magnetic reader can be error prone of the code/stripe is damaged

[6]

© UCLES 2009 0417/01/M/J/09


13

16 A hospital uses computers to monitor the health of patients. For


Examiner's
Use
(a) Give three advantages of using computers rather than nurses to do this.
Reduced workload compared to writing
1

Nurses can be used for other useful tasks


2

Computers are more accurate.


3

[3]

(b) Explain why analogue to digital conversion is needed when computers are used in
monitoring and measuring.
Sensors only read analogue data and thus needs to be converted. Computers understand

digital data only and so the conversion is necessary for the proper working of components.

[4]

© UCLES 2009 0417/01/M/J/09 [Turn over


14

17 Many companies use video conferencing instead of face-to-face conferencing. Discuss the For
advantages and disadvantages of this. Examiner's
Use
Advantages:

Workers can attend meeting from the comfort of their home

Reduced cost as they dont need to travel to and from the office

Time from travelling is saved

No need to transport bulky papers/documents.

The meetings can be announced at a short period of time

Disadvantages:

Needs extensive training

Specialized software is necessary

Good network quality is required

Loss of social contact

Less physical activity


[6]

18 Describe four advantages that the use of chip and pin systems have over a magnetic stripe
system.
Not affected by magnetic fields
1

Saves time at checkout of shopping centres


2

3 Larger amount of information can be stored

4 Data more difficult to copy

[4]

© UCLES 2009 0417/01/M/J/09


15

19 A company wants all its offices to be able to communicate using ICT systems. They are For
considering using fax, e-mail and bulletin boards. Discuss the advantages and Examiner's
Use
disadvantages of these methods.
Advantages:

Fast transmission times for email and fax

Reduces waste (ink, paper)

Environment is save because less usage of paper

Easier to send large amount of information

Attachments can be easily downloaded and viewed anytime.

Disadvantages:

Not very good quality with fax

Requires internet connection for emails

Cannot send multimedia items in fax

Viruses can be trasmitted.

[8]

© UCLES 2009 0417/01/M/J/09


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

University of Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of
Cambridge Local Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

0417/01/M/J/09

You might also like