You are on page 1of 18

CAMBRIDGE IGCSE™ ICT: WORKSHEET 4.1–4.

3 ANSWERS

4.1 Network devices, Wi-Fi and


Bluetooth answers
Getting started
1 Learner successfully completes the puzzle.
Across
1 bridge
2 packet
4 router
5 switch
Down
1 Bluetooth
3 server
6 hub

Practice
2 a USB tethering; Bluetooth.
b USB tethering advantages:
• allows the phone to provide internet
• allows the phone to be charged whilst in use
• has a secure, reliable and faster connection than Bluetooth.
USB tethering disadvantage:
• has a slow internet connection compared to Wi-Fi.
Bluetooth advantages:
• multiple devices can connect via Bluetooth
• Bluetooth is a standard so most mobile devices have one built in.
Bluetooth disadvantages:
• Bluetooth has a shorter range of about 10 m
• Bluetooth has a slower transmission speed compared to Wi-Fi.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 1
CAMBRIDGE IGCSE™ ICT: WORKSHEET 4.1–4.3 ANSWERS

Challenge
3 Benefits:
• Devices can stay connected to the network but still roam about.
• Can access content from anywhere within the range of the Wi-Fi.
• Easy to set up/no trailing cables/no safety issues.
• Less expensive since no cables are required.
Drawbacks:
• Security issues/data leaks/network can be compromised.
• Less reliable over longer distances/bad weather/obstacles.
• Slower compared to wired network.
• Shorter range/coverage.
Learner gives reasonable conclusion.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 2
CAMBRIDGE IGCSE™ ICT: WORKSHEET 4.1–4.3 ANSWERS

4.2 Network types and environments,


cloud computing and electronic
conferencing answers
Getting started
1 LAN (✓) WAN (✓) WLAN (✓) Bluetooth (✓)
Has a range of about 10 m ✓
Has a range of around 100 m ✓
Has a range of about 100–1000 m ✓
Spans over a large geographical area ✓

Practice
2 Learner successfully prepares a presentation on intranet, stating what it is, its advantages
and disadvantages
Description:
• An intranet is a private network within an organisation/restricted network.
• Can exist in a school or company.
• Uses the normal internet technology.
Advantages:
• Private network/cannot be accessed by outsiders/cannot bring viruses through the internet.
• Content on the network is relevant to the organisation.
• Improves internal communications among workers.
Disadvantages:
• Limited content/restricted to internal use only.
• Costly and time consuming to set up.
• Some employees can be less content/satisfied hence decreased employee performance/Poor
user experience.

3 Learner correctly distinguishes between the internet and an extranet – the internet is a global
network of networks while an extranet is a type of intranet with user extensions so that it can be
accessed outside the organisation.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 3
CAMBRIDGE IGCSE™ ICT: WORKSHEET 4.1–4.3 ANSWERS

Challenge
4 a Learner correctly identifies three pieces of hardware, other than a computer, that a client
might need to participate in the training:
• headphones/speakers/headset
• microphone
• webcam.
b Learner suggests a piece of software that can be used:
• VOIP client software/web conferencing software
• not brand names.

5 Learner correctly explains the benefits to the client of accessing the material via cloud storage:
• Can be accessed from any device with supported software or network access.
• No need to buy expensive storage devices.
• Possible to collaborate on the training material with other trainees.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 4
CAMBRIDGE IGCSE™ ICT: WORKSHEET 4.1–4.3 ANSWERS

4.3 Security issues and authentication


techniques answers
Getting started
1 Learner correctly identifies the items described.
a Biometrics
b Magnetic stripes
c Smart cards
d Physical tokens
e Zero login

Practice
2 Learner correctly states four characteristics of a strong password.
• Should contain both letters and numbers.
• Combination of both upper and lowercase letters.
• Should contain at least one character such as @, #, $, etc.
• Avoid names that can easily be guessed.
• Should be at least eight characters long.

3 Learner explains the difference between the confidentiality of data and the privacy of data.
Privacy is the right of an individual or organisation to have control over how their personal
information is accessed, stored, used or disclosed.
Confidentiality is the duty of authorised personnel requiring them to ensure information is
kept secret and can only be accessed by people authorised.

Challenge
4 a Learner correctly describes how antiviruses remove viruses and prevent viruses from
infecting a computer.
• Antivirus scans an incoming file/program/application/stored files.
• Compares specific code in the file/program/application with information stored in its
knowledge base.
• If code similar/identical to known malware is identified, it is removed or quarantined.
b Learner explains why it is important to update antivirus software regularly.
• Viruses evolve/new viruses are a threat.
• Latest antivirus update contains new virus definitions/information about possible viruses.
• System runs fast and safely.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 5
CAMBRIDGE IGCSE™ ICT: WORKSHEET 5.1–5.3 ANSWERS

5.1 Microprocessor-controlled devices


in homes answers
Getting started
1 Learner uses their own words to describe a microprocessor-controlled device.
A typical answer could be:
This is an electronic device with a computer chip used to control or perform an activity.

2 For example:
• washing machine
• automatic cooker
• microwave
• smart TV
• smart fridge
• automatic dishwasher.

Practice
3 Learner correctly describes the Internet of Things.
A typical answer can be:
This is the interconnection of things via the internet, allowing them to communicate and
share information.
Examples may include:
• Wi-Fi enabled kettles
• smart contact lenses
• smart farming
• self-healing machines
• augmented reality glasses
• activity trackers, etc.

4 Learner designs and creates a poster using desktop publishing software (DTP) to show the
negative effects of using microprocessor-controlled devices to monitor and control the home.
Typical answers may include:
• They can lead to an unhealthy lifestyle when people rely on eating already made meals which
must be preheated or defrosted using microprocessor-controlled devices like microwaves.
• Due to lack of activity, people may become less fit when they no longer cook for themselves.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 1
CAMBRIDGE IGCSE™ ICT: WORKSHEET 5.1–5.3 ANSWERS

• People may become deskilled, may forget some skills like cooking due to over-reliance
on microprocessor-controlled devices.
• They may make people lazy as they over-rely on the microprocessor-controlled devices.

Challenge
5 Learner creates a presentation about the positive effects of using microprocessor-controlled
devices for monitoring and controlling in the home.
Typical answers may include:
• They reduce the amount of manual work at home.
• The users can do other things instead of waiting for the devices to cook food or wash clothes.
• There will be more time for leisure, shopping, socialising.
• Automated security systems give people a sense of security as intruders will easily
be detected.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 2
CAMBRIDGE IGCSE™ ICT: WORKSHEET 5.1–5.3 ANSWERS

5.2 Impact of microprocessor-controlled


devices answers
Getting started
1 Learner provides two suitable impacts. For example:
• Jenny can have enough time to do other things.
• Jenny can become lazy.
• Jenny can become deskilled.

Practice
2 Tick (✓) whether the following is true or false:

True (✓) False (✓)


Microprocessor-controlled devices give people more time for leisure and

interaction.
Over-reliance on microprocessors and lack of exercise does not lead to

serious health issues.
Smart devices can be used to monitor heart rates and the amount of

sleep quality.
In Internet of Things, all devices are connected to the internet so they can

become a target of hackers.

3 Advantages – examples:
• Microprocessor-devices can help save time and create more leisure time.
• Disabled people can still communicate without leaving the comfort of their homes.
• Microprocessor-controlled devices like smartphones and tablets can allow people to
make internet calls.
• Smart devices like smart assistants help communication, e.g. using smartphones to
create voice notes.
Disadvantage – example:
• People may become anti-social when they over-rely on microprocessor-devices.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 3
CAMBRIDGE IGCSE™ ICT: WORKSHEET 5.1–5.3 ANSWERS

Challenge
4 Learner highlights the benefits and drawbacks of using smart devices in autonomous vehicles.
Benefits examples:
• Autonomous vehicles reduce human errors on the road.
• They don’t get fatigued and can drive 24-7 without rest.
• They can go anywhere, even in dangerous environments.
Drawback examples:
• There are safety issues that border on ethics. For example, if a group of people suddenly
showed up on the road, should the car swerve to the side and hit a single pedestrian on
the pavement?
• Should the vehicle make decisions based on age, for example, avoid hitting children in
preference to adults in the case of an emergency?

5 Learner states one safety issue that might arise when using smart devices in the transport sector.
Typical answers can be:
• Control systems in vehicles can malfunction and the cars may need technological experts to
fix which may be expensive.
• If there is a communication breakdown in the device, the system may behave in an
unusual way.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 4
CAMBRIDGE IGCSE™ ICT: WORKSHEET 5.1–5.3 ANSWERS

5.3 Health issues and how to minimise


them answers
Getting started
1 Task Health Issue
Working on a bright computer screen without
Eye strain
looking away at intervals.
Sitting in a wrong posture while completing an
Back pain
assignment for school.
Failure to position your wrist properly whilst
RSI
using a computer mouse.

Practice
2 a Repetitive strain injury (RSI).
• Use ergonomic keyboards and mouse.
• Sit in a good posture – that is, in an upright position.
• Take regular breaks from the computer/look away from the screen to a distant object.
b Eye strain.
• Take regular breaks from the computer/look away from the screen to a distant object.
• Use suitable font size, text colour for, etc.
• The room should be well lit.
c Headaches.
• The room should be well lit/look away from the screen to a distant object.
• Take frequent breaks from the computer.
• Regularly clean the computer screen.

Challenge
3 Learners create a poster or presentation to describe what causes back injuries and stress health
issues and the precautions they can take to minimise them.
Learners may have used images and/or a short video to make their poster or presentation
more informative.
Some precautions may include:

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 5
CAMBRIDGE IGCSE™ ICT: WORKSHEET 5.1–5.3 ANSWERS

a Back injuries:
Using suitable techniques to lift the objects, such as:
• Avoiding unnecessary twisting, stopping or reaching for objects.
• Where necessary, avoid lifting objects from ground level or to above shoulder height
to prevent unnecessary stress on the back.
• Think about the route to use to avoid walking unnecessary long distances and avoid hazards.
• Asking other people to help carry the load.
b Stress:
• Keep hardware and software up to date and well maintained.
• Take regular breaks.
• Ask for help from colleagues.
• Ask for software training.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 6
CAMBRIDGE IGCSE™ ICT: WORKSHEET 8.1–8.3 ANSWERS

8.1 Physical safety answers


Getting started
1 Safety issue Tick (✓)
Electrocution ✓
Fire ✓
Meeting strangers from social media ✓
Trailing cables ✓
Playing online games

Practice
2 Learner writes a suitable description/cause and states one strategy to prevent the safety issue.
An example answer could be:

Safety issue Description/Cause Strategy to prevent it


Heavy equipment not well secured, • Use large surface areas so that
may accidentally fall or break weak heavy objects are not close to
Heavy equipment surface areas. over the edges.
falling • Shelves or surfaces should
be firm enough to support
heavy equipment.
Loose cables exposed in the way of • Tuck all loose cables in a cable duct.
Tripping over people which may cause them to • Where possible, use
trailing cables trip over. wireless connections.

Accidental touching of live wires • Insulate all exposed wires.


or spilling liquids may cause a • Do not drink liquids near
complete circuit, resulting electrical or electronic devices.
Electrocution
in electrocution. • Hardware devices must be
regularly checked and maintained
to ensure they are safe.
Could be started by an electrical • Do not overload sockets.
fault such as socket overload or lack • Rooms with electrical devices
of proper ventilation in a room. must be furnished with
fire extinguishers.
Fire
• Rooms must be well ventilated
to avoid overheating of devices.
• Do not cover hardware devices
which may lead to overheating.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 1
CAMBRIDGE IGCSE™ ICT: WORKSHEET 8.1–8.3 ANSWERS

Challenge
3 Learner designs a suitable poster outlining physical safety issues learners should consider
when working inside a computer room.
There will be various answers here but creativity should be encouraged.
In addition to the correctness of the content, good poster design techniques should also be
encouraged, for example, appearance (use of images, text colour, background colour,
font size, etc.).

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 2
CAMBRIDGE IGCSE™ ICT: WORKSHEET 8.1–8.3 ANSWERS

8.2 eSafety answers


Getting started
1 Learner lists any three principles of the Data Protection Act.
• Data must be obtained lawfully and fairly.
• Data must be held only for the intended purpose.
• Data must be adequate, not excessive, and relevant to the purpose it is being collected for.
• Data must be accurate and up-to-date.
• Data must not be kept longer than necessary.
• Data must be processed in a way that does not infringe the rights of the subject.

Practice
Accept any valid response to these questions.
2 Learner lists two suitable pieces of data that may be considered personal.
Typical examples include:
• name
• address
• date of birth
• banking details
• medical history.

3 Learner explains the importance of upholding safety principles when using the internet.
Typical answer could be:
• To protect oneself from harm, e.g. cyberbullying, grooming and sexual exploitation,
emotional abuse, etc.
• Protect devices from being exploited, e.g. hacking, malware.
• Protect data from falling into the hands of wrong people, e.g. data theft.

4 Learner describes two ways to minimise the potential dangers of using the internet.
Typical examples include:
• install antivirus software
• install firewalls
• regularly update software
• only visit trusted websites
• use teacher-recommended search engines and websites
• do not open links from untrusted sources.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 3
CAMBRIDGE IGCSE™ ICT: WORKSHEET 8.1–8.3 ANSWERS

Challenge
5 a Learner explains a suitable reason why it is not advisable to meet strangers alone.
Typical answer could be:
• Some people are not who they say they are/pretend to be what they are not.
• Jane may not know the real motive the new friend might have for meeting her.
• Jane can endanger her life, e.g. she can be kidnapped, or harmed.
b Learner states three things one can do to stay safe on social media.
Typical answer could be:
• Do not agree to meet with strangers alone.
• Block or report abusive or unwanted users.
• Do not share inappropriate images.
• Practise good internet etiquette; mind your language.
• Tell a trusted adult if something makes you feel uncomfortable/not safe.
c Learner lists two ways of staying safe when playing online games.
Typical answer could be:
• Treat other players with respect.
• Avoid using your real names.
• Do not give out personal information like addresses, phone numbers, etc.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 4
CAMBRIDGE IGCSE™ ICT: WORKSHEET 8.1–8.3 ANSWERS

8.3 Threats to data, and protection of


data answers
Getting started
1 Learner successfully completes the puzzle.
Across
1 vishing
4 hacking
5 phishing
9 card fraud
Down
2 smishing
3 pharming
6 spyware
7 malware
8 virus

Practice
2 Learner matches each method to its correct description.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 5
CAMBRIDGE IGCSE™ ICT: WORKSHEET 8.1–8.3 ANSWERS

3 Learner correctly describes what is meant by biometrics and states two examples of biometrics.
Typical answer could be:
A system that uses a person’s unique body features read by a biometric scanner to authenticate a user.
Examples include:
• fingerprint scan
• iris recognition
• retina scans
• face recognition
• voice recognition
• signature recognition, etc.

4 Learner describes one advantage and one disadvantage of using voice recognition as a biometric
method to protect data.
Typical answer could be:
Advantages:
• Quick to verify one’s voice.
• The method is relatively inexpensive.
Disadvantages:
• Sickness or other factors could alter one’s voice making it difficult for the system to
recognise the voice.
• People with bad intentions can record one’s voice and use this to gain unauthorised access.
• The method has low accuracy compared to other methods like fingerprints and iris scan.

Challenge
5 Learner correctly explains how encryption can be used to protect data on the hard disk.
Typical answer could be:
• Encryption scrambles the data to make it meaningless in case it is hacked or accessed by
someone illegally.
• Before the data is stored safely, it is encrypted using an encryption algorithm and key.
• To read the data, the user needs a decryption tool or key.

6 Learner correctly explains how the Secure Socket Layer (SSL) can be used to protect data
between a client computer and the server.
Typical answer could be:
• SSL is a type of protocol that allows secure data transfers over the internet.
• SSL encrypts messages between the client computer and the server.
• When the client computer requests to connect to an SSL protected server (website), the
browser will request the identity of the server.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 6
CAMBRIDGE IGCSE™ ICT: WORKSHEET 8.1–8.3 ANSWERS

• The server sends a copy of its SSL certificate. The browser must authenticate this certificate
before it can allow the server to transfer files.
• The web server will also acknowledge the browser and complete an end-to-end encryption.
• Data can then be transmitted securely between the client and server computers.

7 Learner correctly lists two items of data that can be found inside a digital certificate. Examples include:
• name of digital certificate owner
• serial number
• sender’s email address
• expiry date
• digital signature of certification authority (CA).

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 7

You might also like