Beruflich Dokumente
Kultur Dokumente
7. Describe how the following health problems can arise due to the
use of computers. Give a different cause for each.
1. RSI in the wrists
2. RSI in the fingers
3. Headaches
4. Back pain
10. There are many safety issues associated with the use of
computers.
Tick three methods which could be used to avoid these issues.
11. A company uses robots to manufacture cars.
(a) Tick four advantages to the company of using robots rather than
humans to manufacture cars.
(a)
(b) Describe three tasks that humans will have to do when robots
are used to manufacture cars.
Three from:
1. Installing malicious code on a PC or server
2. User is redirected to bogus website
3. User accesses websites which look authentic but belong to the
fraudster/hacker
4. Are used to gain bank/personal details
Six from:
1. Internet is not policed so information is not necessarily reliable
2. Anybody can have a website so information is not necessarily reliable
3. Anybody can publish their understanding of a topic so information is
not necessarily reliable
4. If site has excessive advertising it could be unreliable
5. If the advertising is related only to its own products it could be
unreliable
6. The final part of a URL can help to identify reliability…
7. … .ac, .gov, .org are usually fairly reliable
8. Can compare information from sites to see if it is reliable
9. If site is endorsed by reliable/reputable people/organisations it can be
accepted as being reliable
10. If it has links to other reliable sites it is usually reliable
11. If it has testimonials it is likely to be reliable
12. If the author’s credentials are good it is likely to be reliable
13. If information is comparable to information from
reliable/authenticated/text books it is likely to be reliable
14. If the date of the last update was a long time ago it is likely to be
unreliable
17. The growth of the internet has led to many new developments.
Explain what the following terms mean.
- Spyware
- Spam
- Social networking site
Spyware
Two from:
1. Software that gathers data from computers without the user realising
2. It monitors and records all key presses
3. It sends this information back to the hacker who sent it out
Spam
Two from:
1. Electronic junk mail/sending of unsolicited emails
2. Sent to everybody on a mailing list/many emails sent at once
3. Can slow down networks
4. Can fill up the receiver’s mail box and therefore hard disk
Social networking site
Two from:
1. Online communities of like minded users
2. Enables users to share photos
3. Enables users to communicate with each other
4. Enables users to organise meetings
5. Allows users to set up profiles
Encryption
Advantage
Data is scrambled into unreadable form/only person/computer with key can
understand data
Disadvantage
Data can still be deleted from system
Firewall
Advantage
Only allowed users/computers can access data
Disadvantage
It is not necessarily the hacker that is excluded but the computer/hackers
might use an acceptable computer
Digital certificates
Advantage
Only computer with certificate can access data
Disadvantage
Can be expensive to purchase
Anti Spyware
Advantage
Prevents spyware from invading your computer and gaining personal
information
Disadvantage
Doesn’t work for all invasions/needs to be continually updated
TANs
Advantage
It is a double layer of security
Disadvantage
PIN can be forgotten/if misused can generate wrong TAN
Pharming
Redirects a genuine website’s traffic to hacker’s website
Spyware/key logging software
Software which detects key presses on the keyboard when the user logs on
to bank account
Three from:
1. Phishing is done by email
2. Can invite you to go to a website/respond to an email
3. Pharming is done by installing malicious code on a pc or server
4. Redirects a genuine website’s traffic to hacker’s websites
Two from:
1. Gaining unauthorised access to a computer system
2. (May lead to) illegally copying data from a system
3. (May lead to) illegally amending data in a system
4. (May lead to) illegally deleting data from a system
5. Gaining authorised access to a system but exceeding their authority’s
Four from:
Microprocessor controlled devices do much of houseworkDo not need to do
many things manuallyDo not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washedCan leave
their home to go shopping/work at any time of the dayGreater social
interaction/more family timeMore time to go out/more leisure time/more
time to do other things/work Are able to do other leisure activities when
convenient to themCan lead to unhealthy eating due to dependency on
ready mealsCan lead to laziness/lack of fitnessCan encourage a healthy
lifestyle because of smart fridges analyzing food constituentsMicroprocessor
controlled burglar alarm provides a sense of security Do not have to leave
home to get fitManual household skills are lost
Eight from:
Drawbacks:
Not all information is accurate
Some information is purely for advertising/selling purposes
Might need proxy server to prevent access to certain types of site
Some information is pornographic
Anyone can put information on the Internet
Much of the information on the Internet is not filtered
Need to identify the validity of the author
Need to be careful about whether information is fact or opinion
Information can be biased
Results from search engine could be skewed because of
sponsorship/marketing
Internet is not policed
So much information available which might be unreliable
Benefits:
Wide range of information to select (desirable/reliable information)
Able to search quickly (using search engines) to find (reliable/desirable)
information
Information can be downloaded and edited (to make it desirable/reliable)
Can use the final part of a URL to identify reliability
Information can be up to date/real time so reliable
.ac, .gov, .org are usually fairly reliable
Can compare information from sites to see if it is reliable
27. Many people are now using the Internet for banking, shopping,
booking holidays and theatre tickets. Discuss this development and
its effect on the general public.
Eight from:
Advantages
1. Less danger of mugging
2. Saves time rather than queuing
3. Don’t have to waste time travelling to shops / banks / theatres etc.
4. Disabled people don’t have to travel / leave home
5. Don’t have to spend money on travelling expenses (travelling long
distances to shops / banks / theatres)
6. Greater choice of goods / seats
7. Can shop when shops / bank are closed / can book tickets when
theatres are closed / can shop / bank / book 24/7
8. Less traffic pollution
Disadvantages
1. Lack of socialising / social contacts
2. Customers must have a computer / (basic) computer skills
3. Hackers may intercept data / defraud customer
4. Deprived of personal touch
5. Phone bills can increase
6. Without broadband other family members cannot use the phone
7. Cannot see / feel goods in reality
8. More vulnerable to phishing
9. Lack of exercise
10. May not get the exact goods they ordered
Disadvantages –
Advantages:
Goods may be cheaper as shops have less staff to pay/less premises to rent
Don’t have to pay for shopping bagsVouchers/special deals are often only
available online
Comparison websites will find you the cheapest option/can compare prices
more easily
Disadvantages:
MICR: MICR stands for Magnetic Ink Character Reader and it reads data off
of bank cheques. Characters read by magnetic reader, characters compared
with characters stored in computer, converted to text for entry into system.
OMR: OMR stands for Optical Mark Reader and it is used in multiple-choice
exams, registers. It requires a special layout and it can only read pencil
marks. Read using scanner. Marks are identified. This special format is
expensive.
3)Portable
Modelling:
Easier to change/modify
It may take a long time to obtain results from the real thing
Extremes which can’t be tested in real life can be tested using models
Lose older customers who don’t like changeInitial set up costs of equipment/
Initial outlay on computers expensive Need to employ highly paid technical
experts to maintain system Initial large redundancy paymentsUpset/Lose
customers due to lack of personal touchGreater risk of fraud so lose
money/description of effects of phishing Need to retrain staff
cheques are collected togetherduring the course of the daycheques are then
processed all at once cheques are processed overnightbank accounts
updated following morning
CHECK ON BAR-CODES:
Check digittwo from:A single digitis calculated using the other digitsand
added on to the end of the numberrecalculated at a later stage to ensure
validity of data entry
The bar code field in the data file is read Record by recordUntil a match is
found with the bar code entered The corresponding number in stock is read
One is subtracted from this numberWritten back to file.
Benefits: Can call meeting at short notice No need to pay travelling expenses
Can work from home Employees will save time travelling Do not have to pay
hotel expenses Do not have to pay for conference room facilities Safer as
participants do not have to travel Don’t have to transport/carry
equipment/lots of documents/documents don’t get lost in transit Four max.
Drawbacks: Takes time/costs money to learn new technology/to be trained
Difficult to have international meetings because of time differences Initial
cost of hardware (and software) Equipment can break down/power cuts can
stop conference Poor strength of signal/time lag/lip sync can be a problem/
connection can be lost Loss of personal/social contact Legal documents
cannot be signed
Technical- How to load software/ run software/install softwareHow to save a fileHow to
searchHow to sortHow to printHow to add recordsHow to delete/edit recordsPurpose of the
systemInput format or exampleOutput format or exampleHardware requirementsSoftware
requirementsSample runs/test runsLimitations of the systemTroubleshooting guide/contact
details/help line/faqsError messages/handlingTutorials [2]
User-Program coding/listingName of program languageSystem flowchartProgram
flowchart/algorithmList of variablesFile structurePurpose of the programPurpose of the system
(only if not mentioned in user documentation)Input format or example (only if not mentioned in
user documentation)Output format or example (only if not mentioned in user documentation)
Hardware requirements (only if not mentioned in user documentation)Software requirements
(only if not mentioned in user documentation)Sample runs/test runs (only if not mentioned in
user documentation)Limitations of the system (only if not mentioned in user documentation)
Known bugsValidation routines [2]
EVALUATION OF SYSTEM:
Comparing the performance of the new system with performance of the old.
Travel Agents:
39
- Employees who speak can be heard by all the other employees in the
conference
- Several people can take part in a conference regardless of where they are
- work cards
Validation routines
Test Data
EXAMPLES OF COMPUTER MODELS:
Intranet vs Internet:
Examples of Microprocessors:
Microwaves
Effect of microprocessors:
BURGLAR SYSTEM:
Inputs:Pressure pads
Looking at other people’s data Changing other people’s data Deleting other
peoples data Spreading data around
Create magazine:
Disadvantages of websites:
Advantages-
Collection of data
Biometric data
Mobiles vs PC’s:
The field only contains Y or N (two possibilities) It saves time entering dataIt reduces errors
when inputting dataIt’s easier to validateIt saves storage space for the file
Might need to calculate total of all cars sold Easier to validateMight need to produce a graph
Can easily find best selling make
Lan vs WLAN:
LAN uses cables to transmit data WLAN uses wireless technology
Advantage
Cheaper as less cabling/new workstations can be sited anywhere/different devices can be
connected easily
Disadvantage
Slower transfer rates/limited transmission distance/physical obstacles can limit
transmission/less security
Data Verification:
Data is entered twiceData versions are compared by computer If versions are different, typist is
alerted
Two from:Data on screen/in systemIs visually compared withthat on data capture form
Validation vs Verification:
Three from:Validation is checking data enteredIs acceptable/reasonable/within a given range
Verification is checking versions of data have been entered identically/is checking data has been
copied correctlyFrom one medium to another (3)
Two from:Range checkCheck digitControl totalHash totalInvalid character check/type check
Picture/format check/input mask Presence check
Existency check Length check
Expert system for Doctors:
Doctors interviewed for requirements
Data is collected from experts Knowledge base is designed/created
Rule base is designed/created Inference engine is designed/created Input Screen is
designed/created Output format is designed/created (4)
Ailments with known diagnoses are used to test the system and results evaluated/does new
system match original system specification/interviewing doctors about effectiveness of system (1)
From spreadsheet to Word:
Save spreadsheet in suitable formatCreate graphsLoad/open word processing softwareInsert
spreadsheet/import spreadsheet/copy and paste spreadsheet/embed spreadsheet into document
Insert/copy and paste graphsType in/insert textInsert/import imagesFormat images/charts
Format reports/text
Advantages and disadvantages of having computers networked:
Share hardwareShare softwareShare data/information(Electronic) communicationUsers can be
more effectively controlled/monitored (2)
DisadvantagesTwo from:Work can be misused more easilyViruses more easily spreadPrinter
queuesSlower access to InternetIf server crashes all computers are affected Increased security
risk (2)
Customer Transaction:
Card details checked for validityPIN is enteredPIN is read from chipNumbers comparedIf
identical transaction is authorisedIf not identical transaction refusedCustomer bank contacted
by computer/automaticallyCheck if enough funds in accountIf card invalid/insufficient funds
then transaction is rejectedIf card valid and sufficient funds then transaction is authorisedMoney
deducted from customer accountMoney credited to supermarket account [5]
Shops and Customer online shopping:
CustomerLess danger of muggingDon’t have to waste time travelling (long distances to shops)
Elderly/Disabled people don’t have to travel to shop/leave homeDon’t have to spend money on
travelling expenses travelling (long distances to shops) Greater choice of goodsCan shop when
shops are closedEasier to search and find what you’re looking for
Customer –Lack of socialising/social contactsCustomers must have a computer/Internet access/
(basic) computer skills Hackers may intercept data and defraud customerDeprived of personal
touchPhone bills can increaseWithout broadband other family members cannot use the phone
Cannot see/feel goods in realityMore vulnerable to phishingGoods sometimes don’t
arrive/substitute goods may be sent/take longer to arrive Must have a credit cardShipping
charges
Shop – Fewer staff needed/less spent on wages Fewer shops needed/less spent on rates/rent Less
actual cash handled/fewer robberies Less money spent on security staff Potentially larger
customer base
Shop –Initial outlay on computers is expensiveNeed to retrain staffLess customer loyalty/loss of
customers due to lack of personal touchCosts of system maintenanceGreater costs due to more
delivery staff
Some mobile telephones (cell phones) can be used to make video calls. Describe four
advantages of making video calls rather than sending messages by email. :
You get immediate feedback .You know you have the right person/don’t have to worry that
you’ve got the wrong email address .You can ask questions immediately based on feedback/carry
out an interactive conversation .Less impersonal/less risk of upsetting recipient .Can make
yourself understood more easily ,You can see the other person’s reaction
ATMS Vs Going to Bank:
No embarrassment of not having sufficient funds Less time spent queuing Can get money any
time of day or night Own bank may be further to travel to than nearest ATM Can use most
ATMs/does not have to be own bank Have choice of languages so is easier to understand/be
understood
Anya wants to have a system, which will make it easy to enter data.
Describe five features of a well-designed input screen:
Appropriate spacing for each field Buttons to go forward/backwards Screen filled/not too much
white space Drop down lists to choose an option (such as race length) Button to save
data/submit/accept Clearly defined input area for each field Tick boxes/radio buttons to enter
choices An easy to read font/font size A sensible font colour/background colour Easy to follow
instructions for completing screen/help icon No overlapping of items
Race_ID field Data Check:
Format check make sure it begins with – letters and ends with – letters and is – letters
Company using Internet:
Advantages – two from: Can communicate with other companies by email Can use the internet
to place orders Can use the internet to buy materials Can hold video conferences Can create
own website to publicise company Disadvantages – two from: Workers may access undesirable
sites Workers may waste time playing games/going on social network sites/updating their blog/
online shopping/banking Viruses/malware could be downloaded Could make the company
susceptible to hackers
Give two advantages of having computers networked:
Only one printer is needed Only one scanner is needed Data can be shared between
computers/data can be accessed by one computer from another more easily Software can be
shared/updated more easily All computers can access the internet through one connection
OCR vs OMR vs Keyboard:
OCR and OMR are quicker methods of entering data compared to a keyboard OMR has limited
uses such as exam answers OMR can be used in school registers Optical Character Recognition
is more prone to errors OCR can be used by utility companies to read meters/to make entered
text editable Keyboard is used to input data manually/typing Keyboard can be more accurate
than OCR/less accurate than OMR Keyboard and OCR can input text more easily than OMR
Pre printed stationery is required for OMR Specialised equipment is required for OCR/OMR
Pin, card number, and expiry data and type of issuer are found on a Chip
Card is valid/card number exists Card is in date PIN entered matches that on card Checks if
card is stolen are all checks on a card before authorization
process is continuous/ monitoring of sensors is continuous to get last mark in Microprocessor
questions
Prevent Students from changing marks:
Biometric methods – unique so only authorized users will have access Encryption makes it
difficult for unauthorised users to read data Firewall – makes it difficult for unauthorised
computers to access the system Disconnect records computer from network – limit access
physically Access levels – only users with appropriate permissions can access data
Laser vs Deskjet vs Inkjet:
Laser printer/Inkjet printer higher quality output than Dot matrix printer Laser printer/Inkjet
printer faster output than Dot matrix printer Laser printer/Inkjet printer are relatively quiet
compared to Dot matrix printer Laser printer has limited sizes of paper available/Inkjet has
greater sizes of paper available/Dot matrix is unlimited in size in one direction only Laser
printer/Inkjet printer is susceptible to break down in oily/dirty conditions/Dot matrix printer less
likely to break down in oily/dirty conditions Laser printer/Inkjet printer more expensive running
costs than dot matrix Laser printer/Inkjet printer cheaper to buy than dot matrix Inkjet printer
cheaper to refill ink than laser/more expensive to refill than dot matrix printer Laser
printer/Inkjet printer needs regularly refilling with paper/Dot matrix printer has continuous
paper feed available Dot matrix printer/Laser printer – ink needs changing less often than
Inkjet printer Dot matrix printer has fewer colour options than laser printer/Inkjet printer Dot
matrix printer produces instantaneous copies Noise is not a problem in this environment
Optical vs Magnetic (Optical reasons):
Companies selling their software/games Cheap method of production/quick to access data
Making personal backups/transferring data (from one computer to another) Cheap to
buy/quicker to retrieve data/expensive to buy tape drives Downloading/Copying media such as
films/music Faster/Easier to access individual scenes/tracks/ better or higher quality
Drawbacks of CLI:
A CLI only allows you to type in commands With CLI syntax has to be precise Commands
difficult to edit once entered Have to learn a lot of commands exactly/have to be familiar with
the commands
What is EFTPOS?
Electronic Funds Transfer at Point of Sale Enables payment for goods at a checkout using
credit/debit cards Goods are purchased and bill is calculated Customer inserts card into chip
reader Card is checked for validity/reported stolen PIN is entered PIN is compared with that
stored on the chip If PIN is OK/verified transaction is authorised If not, customer is asked to re
enter PIN Supermarket computer contacts customer’s bank Checks if sufficient funds If sufficient
funds, transaction is completed/if not, transaction is rejected Amount deducted from customer’s
bank account Amount credited to supermarket’s bank account The supermarket EFTPOS
terminal produces a receipt
CLI VS GUI:
Don’t have to type in commands/just use mouse to select options Easier to change/edit action
Don’t have to learn/be familiar with a lot of commands Easier to open/load programs
Proxy:
Can act as a web server Passes the requested web pages to individual computers Can
cache/store the webpages Can be used to monitor Internet usage Can block certain sites
Function of Router:
Connects a LAN to a WAN Connects a LAN to the Internet Forward data packets to the
individual computers on a network Hold the addresses of each computer on the network
Online processing results in immediate updating of records book details inputted as soon as
book borrowed/returned records are searched until match is found recorded as being
borrowed/returned
Phishing and EXPLAIN ITS PURPOSE:
Four from: Phishers send an email… … asking for a customer’s details appears to be from the
bank/says that the bank needs the information asks the customer for password, card or account
number Three max. So that they can use these details to log on to bank website Access account
and transfer funds Two max.
Computers are used at checkouts. Three output device which could be used when an item is
purchased:
Printer Monitor Speaker/buzzer LCD display
Card might be rejected if: PIN entered incorrectly Past its expiry date Registered as stolen
Physical damage to chip Unusual spending patterns Unable to use some cards abroad
What is hacking and ways hackers can misuse data held on a computer:
Four from: Illegal accessing of data Unauthorised access to data/computer systemUsually
remotely Two max. Deletion of data Amending/changing of data Copying and distributing data
Using data for fraudulent purposes Three max.
Internet to do homework:
Danger of accessing inappropriate websites Can take long time to find required information
Have to have internet connectivity/computer/phone line/modem Internet tends to be up date
Internet has vast amounts of information/wide range of information Speed of search only if
referring to use of search engine Can access biased/inaccurate websites Lack of expertise leads
to inefficient searching Easy to plagiarise information
Magnetic Disc vs Magnetic Tape for backups: Magnetic tape is less expensive per unit volume
of memory Tape is slower to access data than magnetic disc Tape requires a special drive… …
but these often come as standard with file servers Tapes are easier to store Tapes are easier to
remove from premises if needed
The preset value is the (required) value input by the user/already stored in the computer
How video conferencing works: Video conferencing is a method of visual and audio
communication between people at separate locations Webcams/small video cameras are used to
input faces of participants Large monitor/projector to output faces of participants Microphones
are used to input voices of participants Speakers are used to output voices of participants
Router/broadband modem used to connect to internet Video conferencing software needed to
link participants Employees are connected online/may need to access the Internet/WAN to
work Images of the employees appear on the screen in real time Software is needed in each
computer to operate the conference Employees can be heard by all the other employees in the
conference You can take part wherever you are
Monitoring process in hospitals:
Sensors are used to monitor patient’s vital signs …such as temperature, blood pressure, pulse,
sugar levels (2 required for mark) Sensors send data/signals back to computer ADC converts
analogue signals from sensors… …to digital so that computer can understand/read the data
Graphs are output Inputs are compared to acceptable range of values If higher/lower warning
signal is triggered
Expert systems Drawbacks:
screen/answers to questions are typed in
Uses interactive interface/Asks questions...
........based on previous responses
Expert system analyses data
Inference engine compares data
Compares data with that held in the knowledge base.......
........ using rules base
Matches are found
System suggests possible faults/solutions
Give two advantages and two disadvantages to a company of using a website to advertise,
compared with using flyers and posters:
Two advantages from: Can reach more people, Easier to update, Can have multimedia which
would attract more customers/eyecatching ,
Two disadvantages from: More expensive to start up/pay programmers/developers, More
expensive to maintain, Need specialist equipment to start with, May not reach target audience
When sending documents to each other, companies use email, fax and ordinary post. Discuss
the advantages and disadvantages of each method:
Fax
Personal data more likely to be intercepted by another office worker
Quicker to receive message than using post
Document with signature is legally acceptable via fax
Documents can be lower quality when received
Email:
Personal data less likely to be intercepted by another office worker
No need to do printouts therefore more secure
Attached documents are better quality in attachment
Email is more environmentally friendly
Email attachments can be edited by recipient easier than fax/post
Multimedia attachments can be sent by email
Quicker to receive message than using post
You can send from anywhere there is an internet connection by email
Easier to send to several recipients at the same time using email
Has a lower running cost such as paper/ink than fax
More people have access to email than fax machines
You cannot send solid objects by email
Post:
Received more slowly by recipient
Attached documents are better quality in post
Multimedia documents can be sent by post
Solid objects can be sent by post
You can send from anywhere
Document with signature is legally acceptable
Don’t have to worry about equipment being faulty
More people have access to post than fax machines