Академический Документы
Профессиональный Документы
Культура Документы
CANDIDATE
NAME
CENTRE
NUMBER M Y 9 6 1
YEAR 11
___________________________________________________________________________
INFORMATION AND COMMUNICATION TECHNOLOGY
Paper 1 Theory 0417/01
May 2017
2 hours
Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagram, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
No marks will be awarded for using brand names of software packages or hardware.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
___________________________________________________________________________
This paper consists of 12 printed pages.
1.
2.....
3.
4.....
5.
6.....
[6]
2. Tick the most appropriate method of inputting data for the following uses
[4]
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 2
ICT 0417/01 MID TERM EXAM YEAR 11_2016
For
Examiner's
3. Identify two features of a Graphical User Interface. Use
(a).
(b).... [2]
[4]
5. Explain how a firewall could be used to secure the data in a computer connected
to the internet.
...
...................................................................................................................................................
..
. [2]
6. Tick whether the following statements apply to online processing or batch processing.
[4]
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 3
ICT 0417/01 MID TERM EXAM YEAR 11_2016
[4]
[6]
..
.....
..
..
..
..
... [4]
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 4
For
ICT 0417/01 MID TERM EXAM YEAR 11_2016 Examiner's
Use
10. (a) Describe the differences between physical safety and e-safety when using computers.
......
..................................................................................................................................................
.....
..... [2]
(b) Describe three measures which should be taken in order to maintain e-safety.
1. ....
.....
2. ....
.....
3. ....
[3]
11. A school has a cabled LAN. The head teacher of the school wants to replace it with
a WLAN. Explain the differences between a cabled LAN and a WLAN, giving two
advantages and two disadvantages of having a WLAN.
...
...
...
...
...
...
...
...
...
.. [5]
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 5
ICT 0417/01 MID TERM EXAM YEAR 11_2016
................................................................................................................................................
................................................................................................................................................
.................................................................................................................................................
.................................................................................................................................................
............................................................................................................................................ [3]
13. Johann is going on holiday to a different country. He will need to take his passport.
He has a new type of passport which has RFID chip in it. He will be passing
through automated passport control gates.
...,.
... [2]
(b) Describe how RFID will be used as he passes through passport control
...
...
...
...
...............................................................................................................................................
.. [3]
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 6
ICT 0417/01 MID TERM EXAM YEAR 11_2016
(a) Name three methods of researching the current system other than from examining
documents.
Identify the workers that each method would be most suitable for. Each method will
be used with a different type of worker.
1 ............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
2 .............................................................................................................................................
................................................................................................................................................
................................................................................................................................................
3
................................................................................................................................................
................................................................................................................................................
................................................................................................................................................
[6]
(b) After the current system has been researched, the new system will be designed. This
means that the file structure will be designed.
Identify three items of a flat file structure which will form part of this activity.
1. .
2. .
3. .
[3]
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 7
ICT 0417/01 MID TERM EXAM YEAR 11_2016
For
15. WBA is a company that makes little profit. Its newly commissioned ICT system is ready to Examiner's
Use
be implemented. It needs the new system to be in use as soon as possible.
Describe the advantages and disadvantages of using parallel running compared with direct
changeover as a method of implementing the system. Choose which of these two methods
of implementation WBA should use, giving reasons for your choice.
...
...
...
...
...
...
..
..
..
..
..
..
..
..
..
.. [8]
16. Davina has asked Boris, a systems analyst, to create a new database system for her zoo.
She keeps animals of all types. Here are some of the questions that visitors to the zoo
ask:
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 8
ICT 0417/01 MID TERM EXAM YEAR 11_2016
For
Examiner's
Use
(a) Complete the data dictionary below filling in the field names and most appropriate
data type to create a database which would answer these questions.
[5]
(b) Boris will provide two types of documentation when the system is implemented.
Name each type of documentation and for each one give two items which would be
included.
Name .....
Item 1 .
...
Item 2....
...
Name ....
Item 1 ...
...
17. The manager of a travel company asked her secretary to look into the reliability of trains
in Birmingham. The secretary obtained the details of some of the trains. He created two
spreadsheets to help him do this.
Sheet 1 is a list of some of the UK stations that trains from Birmingham go to. Sheet 2
consists of the train details he looked at.
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 9
ICT 0417/01 MID TERM EXAM YEAR 11_2016
For
Examiner's
Use
Sheet 1
Sheet 2
...
..
..
..
.. [3]
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 10
ICT 0417/01 MID TERM EXAM YEAR 11_2016
(b) What station would you expect to see in cell A3 in Sheet 2? For
Examiner's
Use
.............................................................................................................................................. [1]
.....
.....
.....
. [3]
..............................................................................................................................................
.. [1]
....
....
..... [3]
(e) What value would you expect to see in cell D11 in Sheet 2?
...............................................................................................................................................
..[1]
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 11
ICT 0417/01 MID TERM EXAM YEAR 11_2016
18. Identify three network devices, other than a router or modem, which are used to connect For
computers together in a network. For each one, describe how it uses the data it receives. Examiner's
Use
1. ....
Use ......
.....
2. ....
Use ......
.....
3. ....
Use ......
.....
[6]
0417/01 2017 Copyright WESLEY METHODIST SCHOOL KUALA LUMPUR (INTERNATIONAL) CONFIDENTIAL
Page 12