Professional Documents
Culture Documents
RAM
ROM
Question 02
Computer operating systems have developed since early computers used Command Line Interfaces
(CLI). Many computers now use Graphical User Interfaces (GUI), some of which are capable of using
touch screen technology. Compare and contrast CLI and GUI.
www.mahmoudmoussa.com 1
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 3
Drones are unmanned flying vehicles that are used for commercial and leisure activities. Drones are
fitted with cameras to monitor situations. A river has burst its banks following prolonged heavy
rainfall. Explain why drones are used to help monitor the situation.
Safer to use drones than human life being risked in flood waters
Drones can fly low over the flooded areas checking the extent of the
damage, would be more difficult/dangerous for a human
Drones can be used in areas that would not be accessible to humans
Cheaper than using a helicopter to film the flooding
Drones can cover a greater area than a human in the time available
They are portable and can be transported from place to place easily
Can automatically return to the base station when fuel is running low
Question 4
OMR, OCR and MICR are methods of direct data entry. Describe each method, giving an example of
an application where each might be used.
OMR
Optical Mark Recognition
Pencil/pen marks are read by scanner/Reader
Position of marks are identified
Exam papers/school registers/lottery/multiple choice questionnaires
OCR
Optical Character Recognition
Text is read by scanner
Image compared with characters stored in computer
Converted to text for use with other software
Utility bill/turnaround documents/word processors/mail/passports/id cards/car number plates
MICR
Magnetic Ink Character Recognition
Characters read by magnetic reader
Characters compared with characters stored in computer
Converted to text for entry into system
Bank cheques
Question 5
Describe how RFID technology reads the details from the chip.
www.mahmoudmoussa.com 2
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 6
3D printers are being used for producing personalised prescription drugs. Give two advantages of
using 3D printers for this purpose.
Question 7
A payroll office, which prints out large numbers of payslips every month, has decided to install a new
printer. Discuss the advantages and disadvantages of using a laser printer, an inkjet printer or a dot
matrix printer in this office.
www.mahmoudmoussa.com 3
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 8
Laptop computers are often equipped with Solid State Drives (SSD) or Hard Disk Drives (HDD).
Give four advantages of SSD compared to HDD.
The SSD is lighter in weight than the HDD therefore the laptop will be lighter and more portable
The speed of access in SSD is a lot quicker
The speed of data transfer in SSD is a lot quicker
There is less chance of the data becoming corrupted as it can save whilst the laptop is moving
It is a smaller device therefore the laptop will be smaller/thinner
SSD uses less energy
Less chance of impact damage
Question 9
Compare and contrast the use of magnetic tapes with removable magnetic disks to make network
server backups.
Both can be stored well away from the server in the event of fire they will be secure
Tapes are cheaper per bit
Tapes are more compact than a portable hard disk for the same memory
It is quicker to access lost work using disks
Disks would make it quicker to restore the system
Tapes are less prone to data loss and mechanical failure
Both can store very large amounts of data
Both have very fast data transfer rates
Question 10
Compare and contrast the use of optical discs and the use of fixed magnetic disks to store data.
Optical discs such as CDs DVDs and Blu-ray discs are read from and written to using a laser beam
Magnetic disks are read from and written to using read/write heads
Optical discs are more portable
Magnetic disks are more likely to spike
Optical discs are cheaper to buy
Magnetic disks store more data
Optical discs have slower access times
Optical discs have slower transfer rates
Optical discs can be more easily lost/stolen
Optical discs can be more easily scratched
Both store videos, music
Both use direct access
www.mahmoudmoussa.com 4
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 11
Name three network devices and for each one describe what it does.
Comparison
Contrast
Question 12
Describe what is meant by a LAN.
www.mahmoudmoussa.com 5
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 13
Compare and contrast Bluetooth and WiFi.
Similarities
Differences
Question 14
What is an intranet and what would be the benefits of having one.
A company’s employees can have access to the internet and the company intranet. Describe the
differences between an intranet and the internet. [6]
www.mahmoudmoussa.com 6
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 15
Describe what is meant by the internet.
Question 16
Describe web-conferencing and how it could be used
Question 17
Describe what is meant by Physical fax and electronic fax
Physical fax
Electronic faxing
This requires a network, such as the internet, for the fax to be sent.
www.mahmoudmoussa.com 7
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 18
The use of computers continues to change the way employees work.
Describe how the use of computers has led to a number of employees changing their working patterns.
Some workers may job-share with other workers this means that two workers share the same job one
starting as the other finishes
Some workers may work compressed hours this means working a five-day week but compressed to
four days
Some workers may work flexible hours so the worker and the employer negotiate a time the
employee works and this means the employee can arrive later/leave later as long as they work the set
number of hours
Workers can change their work pattern to meet domestic chores/avoid rush hour
Some workers can work from home
Question 19
Define the following terms
Job sharing
Two or more employees doing the same job but working at different times
Part-time working
When a person is employed to work fewer hours than the normal working week
When employees work the full normal hours in a week but work at times which suit them and the employer
When an employee works the full normal hours in a week but works fewer days
Question 20
Explain what is meant by VOIP.
www.mahmoudmoussa.com 8
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 21
Describe how the sensors and computer system are used to monitor the patients and to alert doctors
and nurses of a possible problem.
Question 22
The diagram below shows one of Niagara Drug’s chemical processes. This process is dependent on pH
and temperature. Sensors are used to relay back information.
Describe how the sensors and microprocessor are used to control the conditions in the chemical
process.
www.mahmoudmoussa.com 9
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 23
Give three reasons why computer modelling is used instead of the real thing.
Question 24
Robots are now used on many car production lines. Discuss the benefits and drawbacks to the car
company of using robots.
Benefits
Can operate continuously, 24 hours per day and 7 days per week.
Less expensive to run as you don’t have to pay wages.
Can work in extreme conditions (e.g., a robot can lift heavier loads).
More accurate than humans.
More consistent (Produce the same standard every time)
Greater productivity (can usually do a given task in a shorter time than a human)
No industrial disputes (e.g will not go on strike).
Drawbacks
If a change is made in the manufacturing process the robot needs to be re-programmed.
If a robot makes a mistake it will continue to make the same mistake.
Expensive to set up/maintain
Robots are not capable of performing tasks autonomously without guidance from humans/they
cannot think for themselves.
If they break down then they are difficult/impossible to repair.
If the robot breaks down the whole process stops.
The abilities of robots are suitable only for simple activities in which no major difficulties are met.
www.mahmoudmoussa.com 10
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 25
Three types of call monitoring, monitor, whisper and barge. Describe each one
Monitor
This allows the manager/supervisor to listen in on calls (the line is muted so that neither the employee nor
the other person being called is aware of their presence)
Whisper
This allows the manager to speak to employees to help them with a call (only the employee can hear the
manager/supervisor’s voice
Barge
This allows the manager/supervisor to be heard by both the employee and the other person in the call
Question 26
Expert systems are used in mineral exploration. Name two other uses of expert systems.
Question 27
A group of car mechanics wants to have an expert system to help them with their work in diagnosing
car engine faults. Describe how such a system would be created.
Experts in the field are interviewed to find out what is needed in the expert system.
Data is then collected from these experts.
A knowledge base is designed and then created.
The rules base is designed and created.
An inference engine is designed and created.
The input screen and output format are also designed and created – this is known as the user
interface.
The expert system is tested against known conditions and scenarios.
www.mahmoudmoussa.com 11
Mr. Mahmoud Moussa IGCSE ICT 0983
Advantages
Disadvantages
Question 28
Question 29
A supermarket uses POS terminals. The stock levels in the supermarket are updated automatically.
Describe the steps involved in updating the stock level of a product when the bar code is read.
www.mahmoudmoussa.com 12
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 30
The library uses a database with two tables: borrowers and books. They have recently
purchased a biometric reader which will identify the borrower from their thumb print. A
borrower may only borrow a maximum of six books. Describe the computer processing involved when
a book is borrowed using this system
Question 31
Automatic number plate recognition (ANPR) systems are used to read the number plates on cars in a
number of applications. Describe how ANPR is used in a car park to enable entry and exit to be
automatically controlled by a computer system.
Question 32
Adam is paying his bill in a restaurant using a contactless debit card.
Describe the computer processing involved in Electronic Funds Transfer (EFT) using contactless
cards.
The reader checks the amount to pay is less than the contactless limit
The data is read from the chip using RFID / NFC
The restaurant’s bank's computer contacts the customer’s bank's computer
The card is checked if it is valid
If valid the transaction continues
If not valid the transaction is terminated
An authorisation code is sent to the restaurant
The price of the meal is deducted from the customer’s account
Added to the restaurant’s account
www.mahmoudmoussa.com 13
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 33
A company wishes to replace its current system with a new computerised system. It has employed a
systems analyst to investigate the current system. Describe three methods the systems analyst could
use to research the current system.
Observation
Involves watching personnel using the existing system to find out exactly how it works.
Questionnaires
Involves sending out questionnaires to the work force to find out their views of the existing system and find
out how some of the key tasks are carried out.
Interviewing
Involves a one-to-one question-and-answer session between the analyst and the employee
Looking at existing paperwork
Allows the analyst to see how the paper files are kept, look at operating instructions and training manuals,
check the accounts.
Question 34
Describe two ways of verification and explain why verification is needed.
Double data entry – Data is typed in twice by one typist or data is typed in by two operators and computer
compares versions. If different freezes/sounds buzzer
Visual check: this is the checking for errors by comparing entered data on the screen with the data in the
original document
Question 35
In the answer to a question on verification, a student wrote:
‘An example of verification is proofreading’. Explain why proofreading is not necessarily verification.
Proofreading often involves reading through the document without referring to the original source
document.
This is to check for errors in the typing/spelling/grammar.
Verification involves reading through the document but referring to the original source document.
Verification can involve one person reading the document and a second one re-reading the
document.
Proofreading does not involve two people keying in the same data for the computer to compare the
versions.
www.mahmoudmoussa.com 14
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 36
The customer is then sent to another screen where they have to input:
the goods reference number which is 8 digits long
today’s date which must be in the form dd/mm/yyyy
the customer’s telephone number
For each input give one validation check that should be performed. A different type of check must be
given in each case.
Question 37
The systems analyst must now produce a screen input form. Design a suitable screen input form which
the owner could use to input the details of one book. Consider both the fields that you will include and
the form layout.
www.mahmoudmoussa.com 15
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 38
Name and describe four types of test data which are used when testing a system.
Normal data – data within a given range/appropriate for that data type
Abnormal data – data outside the range/of the wrong data type
Extreme data – data that is on the edge of acceptability.
Live data – data that has been used in the previous/existing system
Question 39:
Chad has developed a new computer system. He now needs to implement it. He has decided against
using phased implementation. Name and describe three other methods which could be used to
implement a new system.
Direct changeover
New system replaces existing system immediately/overnight
Parallel running
New system runs alongside/together with existing system
Phased implementation
New system is implemented part by part
Pilot running
System is implemented in one branch/one office (at a time)
Question 40
A new system is being implemented in a company. The systems analyst has a number of ways that the
system can be implemented. For each named method, give an advantage of using the implementation
over the others.
Parallel running
If the new system fails then the old system is still running.
There is always a backup of the whole system.
Direct changeover
Saves on the costs as less personnel
Saves the time of implementing the new system
Advantages are immediate
Phased implementation
If the new system fails then most of the old system still in place.
Possible to see if part of the new system works before proceeding
Question 41
Part of José’s job will be to produce both technical and user documentation for the new system. For
each type of documentation give two reasons why it is needed.
Technical documentation
Designed to help programmers/systems analysts
to improve a system.
to maintain a system.
to upgrade a system.
User documentation
To help the user understand how the new system works
To help the user to learn how to use the new system
Technical documentation may be too complex for the user to understand
To help the user deal with problems
www.mahmoudmoussa.com 16
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 42
There are a number of security risks associated with using the Internet.
Name three of these risks. For each, state why it is a risk and describe how the risk can be minimised.
Risk: hacking
Reason: illegal/unauthorised access to data deletion/amendment of data
Minimised:
Use of firewalls
Encrypt data/encryption
Usernames and strong passwords to stop remote and local logins
Use different passwords for different accounts
Biometric systems to ensure the official user is present
Electronic dongles which only allow login when the dongle is plugged in
Dedicated computers which are the only ones allowed to log in
Risk: virus
Reason: can corrupt/delete data cause computer to crash/run slow can fill up hard drive with data
Minimised:
Use of /run anti-virus software
Do not download software or data from unknown sources
Risk: phishing
Reason: link/attachments takes user to fake/bogus website website obtains personal/financial data
Minimised:
Do not open/click emails/attachments from unknown sources
Some firewalls can detect fake/bogus websites
Risk: pharming
Reason: redirects user to fake/bogus website
redirection obtains personal/financial data
Minimised:
Only trust secure websites, e.g. look for https check the URL matches the intended site
Use up to date firewall services on DNS servers
Use up to date anti-virus/anti-pharming/anti-spyware software
Risk: Smishing
Reason: text contain a link to redirect user to fake/bogus website
Minimised:
Never text back to unknown sender
Never respond to any of these types of texts
Never click on any links within the text message
Never give out personal information in a text
Don’t allow your mobile phone number to be included in call lists
Blocking unfamiliar texters/numbers
www.mahmoudmoussa.com 17
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 43
Explain how a firewall could be used to secure the data in a computer connected to the
internet.
Question 44
As more and more people use the internet at home to carry out transactions they are at risk of
downloading software that could corrupt files or copy credit card details. Discuss the effectiveness, or
otherwise, of using different methods of increasing the security of a home computer.
www.mahmoudmoussa.com 18
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 45
Suppose a history website is aimed at children and a different history website is aimed at adults.
Describe how these two websites differ
Question 46
Explain what is meant by software copyright.
Lawful protection given to authors, software companies and publishers which prevents purchaser from
making unlimited copies to the software and sell it, rent it to others or change the software without the
company’s permission
Question 47
What is the difference between HTTP and HTTPS?
www.mahmoudmoussa.com 19
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 48
A student is carrying out some research using the internet but is concerned about the reliability of
some of the information he has found. Explain how he would assess the reliability of the websites
where he has found information.
Question 49
Tawara are currently backing up their data onto a tape drive system. They are considering backing up
onto the cloud. Evaluate in your own words the use of the cloud to backup data compared to their tape
drive system. Recommend the most appropriate back up storage for Tawara Heritage Mining to use.
Benefits of cloud
access to files and data anywhere at any time vs access to tape physical location
reduced hardware/software costs as there is no hardware
only pay for the storage you use, on a tape system you have to buy a brand new tape
more fault tolerance – greater chances of recovering data from raided/mirror cloud storage
access to data on cloud is faster than tape as tape may need to come from off-site store/direct access
to storage within the cloud vs sequential access on tape
storage capacity may be unlimited on the cloud vs capacity of storage limited on tape
Drawbacks of cloud
concerns over security of data/multiple copies, don’t know where data is stored, tape systems are
more secure
ownership of data, data on tapes is fully owned by you
need internet access to update/access files, tapes you don’t/data restrictions through ISP
pay monthly subscription to cloud storage provider/ongoing cost
www.mahmoudmoussa.com 20
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 50
Explain, using at least three different examples, what is meant by the term ‘generic file formats’.
Generic file formats are those that when files are saved in that format they can be used in different types of
application software.
Examples:
A .txt file can be imported into any text editor/ word processing/DTP package
A .csv file can be imported into any spreadsheet
A .jpg/.gif/.png file can be used in most bitmap image editing software
A .pdf can be used in any document format reader
A .rtf can be used in any word processor and retains some formatting
A .css can be opened in any text editor
A .htm can be opened by any web browser
Question 51
Describe what is meant by the following file formats.
.txt
.gif
.jpeg
www.mahmoudmoussa.com 21
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 52
Describe four advantages of using a mail merge
Question 53
A systems analyst is creating a new database for a shop to store the details of its mobile (cell) phones.
Part of the design of this database will involve the identification of suitable validation checks. Below is
a list of some of the data to be included in the database.
For the following fields write down the most appropriate validation check. Each validation
check must be different. The database will have at least 100 records and each ID number will
be different.
ID_number
Connectivity
Price
The system is being tested using live data. Write the search criteria you would enter into the database
to search for a mobile (cell) phone costing less than $200.00 which has a connectivity of 4G.
www.mahmoudmoussa.com 22
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 54
The owner of a gardening company is planning to create a database to store the details of all his
customers. He has the choice of using a flat file database or a relational database.
Discuss the advantages and disadvantages of using a relational database rather than a flat file
database.
www.mahmoudmoussa.com 23
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 55
A travel agent keeps a spreadsheet record of his customers’ holiday bookings to various destinations.
It looks through A8 to A18 and it checks whether A8 to A18 contains the contents of B2 which is BRA and
it counts all the cells where there is a match. Then it writes the answer 4 in cell C2.
The function checks whether A8 to A18 contains the code BRA which is the contents of cell B2, if there is a
match adds up all the corresponding cells in B8 to B18 and produces the answer 48.
Describe, with examples, how you would use formulae to check that the total Duration and total
number of Days are the same. (You may use cells B19, D6 and D7 to help you.)
Explain why the $ symbol is used in some of the cells in the spreadsheet above.
Absolute cell referencing is being used. When formulae are replicated, some cell references must remain
unchanged. This makes sure they will stay consistent when replicated.
www.mahmoudmoussa.com 24
Mr. Mahmoud Moussa IGCSE ICT 0983
LOOKUP allows for horizontal and vertical searching whereas VLOOKUP allows for vertical
searching
LOOKUP does not require an index value whereas VLOOKUP requires an index value
LOOKUP usually only works when the data is sorted
VLOOKUP only returns data to the right of the searched column
VLOOKUP user can select either an approximate or exact match to the lookup value
Question 56
Identify and describe the three web development layers.
Content layer
Content can consist of text or images
Presentation layer
This layer is defined by the CSS or styles to indicate how elements are displayed
Behaviour layer
This layer of a Web page allows interaction
Question 57
In the following section of HTML markup there are a number of mistakes.
<td>
<p>Manta conservation workshops and holidays can be booked through
the Xtreme Adventure Holiday Company or by
<a href="http://www.xahc.co.uk" target="_manta">
clicking here.</p>
<td>
<p> <href="mailto:tmcp@cie.org.uk"> Email</a> us for details of our
Manta Education Packs or <a href="mailto,tmcp@cie.org.uk,subject=Donation
by John>">click on this link<a> to discover how to donate to help us
preserve these disappearing species.</p>
</td>
Question 58
Explain the difference between absolute and relative file paths when used in a website
www.mahmoudmoussa.com 25
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 59
Describe the following file formats.
CSS
.htm
Question 60
You are a student creating a website for your IGCSE ICT revision work. You have produced some
HTML, but have not yet added the logo or merged the cells. You are aiming to produce the following
page.
www.mahmoudmoussa.com 26
Mr. Mahmoud Moussa IGCSE ICT 0983
Question 61
Aadhya and her family are planning a visit to the Gir National Park and she is creating a web page
about the destination. She has started writing some of the HTML but has made some mistakes.
<html>
<!-- Visit to Gir National Park -->
<head>
</head>
<title>The Gir National Park</title>
<body>
<table style= "width:100%">
<tbody style="background-color: #9acd32>
<tr>
<td rowspan="2"><img src="GIRNP.JPG" width="50" alt="image of an
elephant">
</td>
<td><h1>The Gir National Park</h1>
<h3>A National Park of Gujarat</h3>
</td>
<td ><img scr="GIR-LOGO.JPG" alt="Logo for Gir National Park">
</td>
</tr>
<tr>
<td colspan="2" >This webpage is under construction.
</td>
</tr>
</tbody>
<table>
</body>
</html>
Write down four mistakes which would prevent this markup from working properly. Your answers
must be different in each case.
</head> is in the wrong place // <title> </title> line is in the wrong place
<tbody style="background-color: #9acd32> no ending quotes
scr is not correct syntax should be src
final <table> is not correct should be </table>
Question 62
Explain the purpose of the body section of HTML
www.mahmoudmoussa.com 27
Mr. Mahmoud Moussa IGCSE ICT 0983
www.mahmoudmoussa.com 28