Вы находитесь на странице: 1из 16

Cambridge International Examinations

Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/01


*0123456789*

Paper 1 Theory For Examination from 2017


SPECIMEN PAPER
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams or graphs.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages.

© UCLES 2015 [Turn over


2

1 (a) Describe the difference between data and information.

Data usually refers to raw data/unprocessed data


Information is data that has structure and context

(b) There are different types of data.

Tick four correct statements in the following table.


v
True and false are examples of Boolean data
A field containing the value 253 would be a fi eld containing text data
245.6 is an integer
All numbers are stored as decimals
v
‘13 cm’ is an example of alphanumeric data
An integer stored in a field is a form of numeric value v
v
Currency is a type of numeric data
A real number is an integer which has already been used in a database
How many times a student has taken an exam would be stored as a
Date/time data type
A percentage value is usually stored as text as it has a percentage sign

[4]

© UCLES 2015 9626/01/SP/17


3

2 There are many ways of changing data to suit a purpose including coding, encoding and
encryption of data. Coding data in a field containing the gender of a person, for example, would
involve coding ‘male’ as ‘m’ and ‘female’ as ‘f’.

(a) Tick the correct statement regarding the coding of data.


A disadvantage of coding data is that it makes the data very difficult to read and
understand
An advantage of coding data is that it saves storage space v

A disadvantage of coding data is that it becomes much slower to type in the data
An advantage of coding data is that codes are never complicated

[1]

(b) Tick the correct statement regarding the encoding of data.


Encoding data is a form of validation
Text and numbers are the only data types that can be encoded
Converting digital data to analogue data is a form of encoding data v

Encoding is done to deliberately conceal the content of the data

[1]

(c) Tick the correct statement regarding the encryption of data.


Encrypting data prevents hackers from intercepting it
Encryption is the conversion of data into a form that cannot be easily
v
understood by unauthorised users
The two main types of encryption are known as public key encryption and open
encryption
Decryption is the process of further converting encrypted data into another more
complicated encrypted form

[1]

© UCLES 2015 9626/01/SP/17 [Turn over


4

3 Giving examples, explain what is meant by:

(a) application software

Application software is a set of one or more programs designed to carry out


operations for a specific application other than system maintenance functions
Types of application software include spreadsheet, database, DTP, word
processing software (must have at least two)

(b) system software.

System software refers to the operating system and all utility programs that
manage computer resources
System software includes BIOS, compilers, interpreters, system utilities (must
have two)
System software is a type of computer program that is designed to run a
computer’s hardware and application programs

© UCLES 2015 9626/01/SP/17


5

4 Describe the characteristics of a gesture based user interface.

Provides an interface that does not need the support of a device


Gesture interfaces are graphical user interfaces which accept input in a form
of hand gestures
It is a virtual world to which the user is connected digitally
]

© UCLES 2015 9626/01/SP/17 [Turn over


6

5 Here is a small section of a spreadsheet used to calculate the weekly wages of the workers in a
company.

A B C D E F
1 First Second Hours worked Hourly rate Weekly wage ($) Full
name name name
2 John Smith 40 8.50 =C2*D2
3 Johann Schmidt 42 9.25 =C3*D3
4 Felix Schnell 38 8.75 =C4*D4
5 Maurice LaPorte 46 11.50 =C5*D5
=SUM(C2:C5) =MAX(D2:D5) =AVERAGE(E2:E5)

(a) Using examples from the spreadsheet, explain what is meant by a cell reference.

A cell reference identifies the cell that is being referred to


A cell reference consists of the column letter and row number that intersect at
the cell’s location

(b) This spreadsheet uses formulae and functions. Explain the difference between formulae and
functions.

A formula is statement written by the user to perform a calculation


Formulae can be as simple or as complex as the user wants
A function is also a formula, but is predefined/comes with the spreadsheet
software. Instead of having to accurately type out the details of the formula,
the function acts as a shortcut to carry it out.
For example =SUM is a function whereas =C2*D2 is a formula

© UCLES 2015 9626/01/SP/17


7

(c) The manager of the company wants the full name of the worker printed on the payslip. In
order to do this a formula will need to be used in cell F2 combining the first name and the
second name separated by a space.

Write down the formula which uses a function to combine this data.

=CONCATENATE(A2,“ ”,B2)

(d) The manager wants to see immediately if a worker earns more than $500 per week, without
reading through the spreadsheet.

Explain what you would do in cells E2 to E5 to make it easier for her to see this.

Use conditional formatting


Highlight E2 to E5
Select conditional formatting
Select ‘greater than’
Type in 500
Select colour of font/background

© UCLES 2015 9626/01/SP/17 [Turn over


8

(e) Relative cell referencing has been used in the spreadsheet. Using examples from this
spreadsheet, explain why the use of absolute referencing would not be suitable.

Absolute cell referencing is used when formulae are replicated


It is used to keep cell references constant as they are replicated
If it was used in column E the weekly wage for every worker would remain the
same
Here the wage needs to be calculated separately for each worker and the
values do need to change

(f) This spreadsheet could be used for modelling purposes. An example of modelling is the use
of simulators for pilot training.

Describe three advantages of using computer simulations for pilot training rather than the
real thing.

If the plane crashed in real life the pilot might die whereas nothing would
happen to him/her in a simulator
If the plane crashed in real life the plane would cost a lot to replace whereas
nothing would happen to the simulator
Extreme weather conditions can be made to order in a simulator but you
might have to wait a long time for them to happen in real life
The cost of running a simulator is cheaper than the cost of fuel in a real plane

© UCLES 2015 9626/01/SP/17


9

6 A shop selling Konia mobile (cell) phones keeps records of all the phones it sells.
The shop only stocks three models but each model has either 32 or 64 GB of memory.
An example of the shop’s database is given below.

Customer Model Price ($) Memory (GB)


K Spencer 1278C3 500 32
J Sandhu 1273C6 400 64
M Akhtar 1273C3 300 32
Te Won 1275C6 450 64
B Perez 1275C3 350 32
Espanita di Stefano 1278C6 600 64
B Smith 1275C6 450 64
J Johannson 1275C3 350 32
Su Li 1278C6 600 64

(a) A validation check is needed to make sure that only valid model numbers can be
accepted. Name this validation check and describe how it would work.

Lookup check

A table of the three models would be stored


Data is entered into a cell with the rule
Data is compared to entries in the table
If data matches an entry it is allowed/If data entered does not match any of
the entries in the table it is rejected

© UCLES 2015 9626/01/SP/17 [Turn over


10

(b) Giving examples, explain how consistency checks could be used to ensure that the data that
is entered in the shop’s database is valid.

Rule could be that price must match model number


If the model number is 1273C3 price must be $300
If the model number is 1273C6 price must be $400
If the model number is 1275C3 price must be $350
If the model number is 1275C6 price must be $450
If the model number is 1278C3 price must be $500
If the model number is 1278C6 price must be $600

Rule could be that memory must match model number


If model number ends in 3 memory must be 32
If model number ends in 6 memory must be 64

(c) The shop is sending a standard letter to owners of the 1278C6 model informing them about
a defect.

Using information from the shop’s database, explain how you would set up such a letter to
customers who own that particular model.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2015 9626/01/SP/17


11

(d) The data in the shop’s database is in unnormalised form. Complete the table below as
necessary to make the database in first normal form (1NF).

[4]

(e) Give two advantages of normalising a database.

Data is not repeated/no redundant data improving data integrity and reducing
errors
Data is not repeated/no redundant data saving storage space
Reinforces referential integrity

© UCLES 2015 9626/01/SP/17 [Turn over


12

7 A head teacher wishes to use a computer to create a newsletter which will keep parents up to
date with events at the school.

(a) Name two software types that he could use.

Use a word processor (to produce a newsletter)


Use a desktop publishing package (to produce a newsletter)

(b) Compare and contrast the use of these software types.

products...
... such as typesetting, page layout and graphic design
DTP software is a little more difficult to use than regular word processing
software because there are so many different options to consider
DTP is used by graphic designers
Arrangement of the text on the word processing page is largely linear
Word processing has few options to set text precisely where the user wants
DTP packages have a wider selection of import and output options for various
forms of content
DTP packages are better able to combine text and graphics in a single
document

© UCLES 2015 9626/01/SP/17


13

8 The internet is used by many individuals in the world today.

(a) There are a number of malware issues associated with using the internet.
Other than viruses, describe three of these issues.

A worm is a computer program that replicates itself in order to spread to other


computers
It uses a computer network to spread itself
Unlike a computer virus, it does not need to attach itself to an existing
Program

Spyware is software that aids in gathering information about a person or


organisation without their knowledge
It may send such information to another entity without the consumer’s
consent, asserts control over a computer without the consumer’s knowledge
It detects key presses of the computer user

Adware is a form of spyware that collects information about the user in order
to display advertisements in the Web browser
Some applications that contain adware track the user’s internet surfing habits
in order to serve ads related to them

© UCLES 2015 9626/01/SP/17 [Turn over


14

(b) Discuss the reasons why many people use the internet for communication, while some
people do not.

Why people use the internet:


Individuals send emails to communicate with others to gain a reply speedily
Social networking to communicate with friends and family members
Communication – between companies using IM, VOIP and web/audio/video
conferencing because cheaper than organising face-to-face meetings
News services – to find the latest news or sports scores

Why people do not use the internet:


Some may be reluctant to send emails because of malware, speed of reply,
impersonal nature
People may not want their children to use the internet because of esafety, and
children could become addicted and not do their work
Those that do not use the internet are mainly those that suffer as the result of
the digital divide
People and regions that do not have access to aspects of modern technology,
or those that have restricted access
Can be people who live in rural areas
Can be people who are uneducated
Can be people who are poor
Can be people who are older who do not wish to learn to use it
Some might prefer face-to-face contact

© UCLES 2015 9626/01/SP/17


15

(c) Explain what is meant by the internet and the World Wide Web. In your answer include
features of the internet which do not use the World Wide Web.

The internet is an international network of networks of computers


The internet consists of hardware
The World Wide Web makes use of hypertext to access the various forms of
information available on the internet
The World Wide Web is the system used to access the internet
The web is accessed through browsers
The World Wide Web is not the only service provided on the internet
Other uses of the internet include email and instant messaging

© UCLES 2015 9626/01/SP/17 [Turn over


16

9 Evaluate the differences between compilers and interpreters.

The compiler’s conversion is made just once and after that the same binary
code can be distributed to the user’s machines where it can be executed
without further translation thereby saving time compared to an interpreted
program
Whereas an interpreted program is distributed as source code so it needs
to be translated in each final machine, which takes more time than using
compiled code…
…however this does make the program distribution independent of the
machine’s architecture whereas the compiled version will only run on
machines with a specific processor’s architecture, thus making it less portable
than interpreted code
Compiler generates the error report after the translation of the entire page
while an interpreter will stop the translation after it gets the first error making it
easier to debug
An interpreter uses less memory as source code only has to be present
one line at a time in memory whereas with a compiler all the execution code
needs to be loaded into memory

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9626/01/SP/17

Вам также может понравиться