Sie sind auf Seite 1von 4

MARKING SCHEME | CONFIDENTIAL

INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) Year 10


Mid Year Examination (MAY 2015)

ICT
Year 10

Marking Scheme
Mid Year Exam

Paper 1
May 2015

ANSWER
1

A. Bar Code

MARK
[4]

B. Chip
C.Graph plotter
D. Magnetic ink characters
2
3

Graphic Tablets
Monitor
False
True
False
False
A microphone
B remote control
C keyboard
D chip reader
E joystick
Three from:
Can act as a web server
Can act as a buffer (between internet and LAN)
Server passes on requests to the internet
Passes the requested web pages to individual
computers
Can cache/store the webpages
Subsequent requests for that/those web page(s)
are responded to more quickly
Can be used to monitor internet usage
Can block certain sites
Three from:
Can store more data
Easier to carry/more portable
Majority of computers have USB ports/many
school computers dont have CD drives

[2]
[4]

[5]

[3]

[3]

MARKING SCHEME | CONFIDENTIAL


INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) Year 10
Mid Year Examination (MAY 2015)

Speed of access is quicker


Speed of data transfer is quicker
Pen drives are more robust/less prone to damage
7

10

Virus scanner
Email
Browser
RAM So that users are able to make changes to
the data they are working on/to store the
program or data they are currently using (1)
ROM So that programs/coding/software can be
stored permanently/cannot be changed (1)
Backing storage So that users can have a
permanent copy of the work they are doing/can
have a copy of their work when the computer is
switched off (1)
(a) Hub (1)
Switch (1)
Bridge (1)
(b) Two from:
-It stores information about which computer is
connected to which network
-It receives data packets from an individual
computer
-It passes the data packets to the appropriate
switch
-To reduce data collisions
-It can connect the LANs to the internet
(a) Two from:
A piece of programming code/software
Which replicates itself
Transmitted through email attachments/portable
media
Corrupts/Deletes files/data
Can corrupt or erase the contents of the hard
disk/can completely fill the hard disc/memory

[3]

[3]

[3]

[2]

[6]

MARKING SCHEME | CONFIDENTIAL


INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) Year 10
Mid Year Examination (MAY 2015)

(b) Two from:


Gaining unauthorised access to a computer
system
(May lead to) illegally copying data from a system
(May lead to) illegally amending data in a system
(May lead to) illegally deleting data from a
system
Gaining authorised access to a system but
exceeding their authority

11

(c) Two from:


Web log
Personal journal/online diary
Owners observations/opinions on a topic
Can have links to other sites
Others can post comments
Frequently updated by owner
(a) Browser to access banks website
(b) ISP to have access to internet
(b) Six from:
Advantages
Dont have to waste time travelling (long
distances) to banks
Dont have to spend money on travelling
expenses travelling (long distances) to banks
No embarrassment of having to ask for loans face
to face
Can bank when banks are closed
Can use it anywhere if theres an internet
connection
Disadvantages
May not like the lack of personal touch
There may be less opportunity for socialising with
friends/neighbours
Possibly more expensive phone bills

[1]
[1]

[8]

MARKING SCHEME | CONFIDENTIAL


INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) Year 10
Mid Year Examination (MAY 2015)

Hackers can access personal details and transfer


money to their account
You have to have Internet access
Unable to withdraw cash
One mark is available for a reasoned conclusion
Maximum four advantages or disadvantages

TOTAL

48

Das könnte Ihnen auch gefallen