100%(4)100% found this document useful (4 votes) 730 views84 pagesIct Theory Workbook
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Cambridge
7h ICT
eo
David Watson
aa)
rm HODDER
e4 6 EDUCATIONa DE
j 4 HOpPER‘Although every effort has been made to ensure that website addresses ae correctat the time of going to press, Hodder
Education cannot beheld responsible for the content of any website mentioned inthis book Itis sometimes possible to find a
relocated web page by typing n the address of the home page for a website nthe URL window of your browser
Hachette UX's policy to use papers that are natura, renewable and recyclable products and made from wood grown in
‘sustainable forests. The logging and manufacturing processes are expected to conform to the environmental reguations of the
county of origin.
cers: please contact Bookpaint Ltd, 130 MiltonPatk, Abingdon, Oxon OX14 488 Telephone (44) 01235 827720, Fax (44) 01235
400454 Lnes are open 9,005.00, Monday to Saturday, witha 24-hour message answerng service Visitourwebsite at www
boxddereducaton com
(SBN 978 1 471890369
© David Watson 2016
Feat published in 2016
by Hodder Education,
‘anHachette UK Company,
CarmeliteHouse
50 Vietora Embarkment
London ECAY ODZ
stwhoddereducaton com
impression number 10987654921
Year 20202019 201820172016
Allrihts teserved. Apart from any use perritted under UK copyright aw, no part of this publicaton may be repraduced or
‘rancrntted in any form or by ny means, electronic or mechanical, including pho lacopyng and recording, or held within ay
information sterage andreteval system wrheut permission n writng from the publisher or under licence from the Copyright
LUcensing Agency Limited. Further details of such licences (for reprograptc reproduction) may be obtained ftom the Copyright
LUcensing Agency Lirited,Saffion House, 6-10 Kirby Stteet London ECIN 8TS
Cover phote © Oleksiy Mark -Fotolia
Typesetin Frutger $5 roman, 10/13 pts by Aptara inc.
Printed in the UK
‘A catalogue record for ths tiles avaiable fom the Britsh LibraryContents
Types and components of a computer system
inputand output devices
Storage devices and media
Networks and the effects of using them
Ihe effects of using ICT
Dm wR eR
iCTapplications
Z Systems life cycle
8 Safety and security
2 Audiences
10 Communication
ERE RB Bebe
BBEThis page intentionally left blank1) Types and components of
~ acomputer system
1 Name the parts of a computer system shown below:
ft
a
b
-
LS
ty
_—
[6 marks}
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook @1 Types and components of a computer system
2 Choose items from the following list to satisfy the definitions below:
compiler graphics software source code
video editing software
linker spreadsheet database operating system
utlities device driver photo editing software control and measurement
software
(Definition Tem from list
Software used to manipulate photographs stored on a
computer
‘Software which obtains data from sensors allowing
[computers to monitor and contol external actvites:
| Software used to manipulate and organise numerical
data, data is putinto a grid of numbered rows and
lettered columns
‘Software running in the background of @ computer
|which manages most of he basic functions, such as user
Interface and memory mangement
| Software that wansietes « program wtten in @ high
level language into machine code so thatitcan be
irectly run on the computer
|Sofoare that kes one or more object es produced
bya language translator and combines them into a
‘single program that can be un on a computer
Software that enables one or more hardware
devices to communicate with the computer's
|operatng system
[7 marks}
3.Some of the statements below are true and some are false. Tick (y) the appropriate column
to indicate which are true and which are false:
‘Statement
True False
than using WiFi
reaming videos to mobile phones using AG networks has faster data Wanster rates
Main rame computers have smaller intemal memories than desktop computers
[Spreadsheets and word processors are examples of applications software
\Video cards and sound cards are typical examples of computer software
‘savers
Examples of utlites include antivirus software, ant-spyware software and screen
e Cambridge IGCSE ICT Practical Workbook
[5 marks}
Photocopying prohibited1 Types and components of a computer system
4. Computers can have command line interfaces (CL.!) and graphical user interfaces (GUD).
aGive two advantages and two disadvantages of both types of user interface:
‘Advan tages Disadvantages:
1 - . 1
cu
2 2
1 1
cul
2 2
[8 marks}
bGive one example of who might use each type of user interface.
CLI.
cul
“L 2 marks]
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook 81 Types and components of a computer system
5 Three types of device are shown below. In each case:
iname the device.
lige two advantages of using the device (compared to the others)
lil give two disadvantages of using the device (compared to the others)
iv give two features of each device (which makes it different to the others).
iName
{i Advantage 1
Advantage 2
1 Disadvantage 1
Disadvantage 2
iv Feature 1
Feature 2
iName
ii Advantage 1
Advantage 2
Ili Disadvantage 1
Disadvantage 2
iv Feature 1
Feature 2
8 Cambridge IGCSE ICT Practical Workbook
[6 marks}
[6 marks}
Photocopying prohibited1 Types and components of a computer system
I Name
ii Advantage 1
Advantage 2
li Disadvantage 1
Disadvantage 2
Iv Feature 1
Feature 2
[6 marks}
6 Which terms are being described below:
A type of language translator which uses specific software to help in translation from one human
language (e.g. French) into another (e.g. German); makes use of terminology databases and
translation memories.
b Technology that allows 3-D images to be produced; makes use of laser light source, ight
diffraction and light intensity reading; as an image is rotated it will appear to move in the same
way as the original in three dimensions.
The science of making a message unintelligible to a hacker, this method uses light and its physical
properties to produce a virtually unbreakable coding system.
d Technology that uses data goggles, sensor suits, data gloves or helmets to get a feeling of realifytis an
artificial environment created by software used in training, fashion, engineering and sport, for example.
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook e1 Types and components of a computer system
@ A system that allows images to be projected inside the headset in front of the user's eyes; some
systems use infra-red light which allows objects to be seen even at night.
1A system that uses fingerprint identification, retina scans and voice recognition as a form of
security to uniquely identify a user; dynamic profiling is used so that the system leams about the
user each time the biometric features are scanned,
6 marks}
7 Explain each of the following terms:
a RAM, -
bROM.
CBIOS.sson
CMOS,
[ 10 marks}
9 ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited1 Types and components of a computer system
8 There are many emerging technologies such as: Artificial Intelligence (Al), Quantum Cryptography
‘and Virtual Reality (VR).
Using examples of your choice, describe:
+ the operation of the technology
+ the use of the technology
+ the possible impact of the technology.
(You will be marked on the quality of your response.)
8 marks]
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook @(2) Input and output devices
1 Four applications are shown in the table. By using a tick) indicate the most appropriate
method of inputting data for each application:
[Application {MICR Touchscreen Se
Reading the numbers found on a cheque
inputting the temperature directly in an industial process
|Selecing a choice on an ATM
[Ppungimoturelevisn a grenhousedrecty
[4marks}
2a What is meant by the two terms ‘OCR’ and ‘OM’?
10CR...
iiOMR.
[| 2marks}
b Compare the relative advantages and disadvantages of using OCR and OMR asa
method of inputting data from a paper questionnaire.
(ocr oma
[4marks]
e ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited2 Input and output devices
3. A supermarket uses barcodes on all its items. When a customer goes to check out, a number of
input and output devices may be used.
Name two input devices and two output devices. Give a different use for each
named device.
Input device Venn
Use.
Input device 2.
Use...
Output device 1... oo sonnei
Use...
sosguonnnnn mon rnnisennn manna sn 8 marks}
b Give two advantages to the supermarket manager and two advantages to
customers of using barcodes on all items.
Manager
Te
Customer
[ 4marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook 92 Input and output devices
4 This barcode is known as a QR code:
‘a What does ‘QR’ mean?. J mark]
b Give two benefits of using QR codes,
Te
af 2marks}
Explain how a tourist could use QR codes at an airport to help plan their holiday.
[ 3 marks)
5a 3-D printers use various ways to produce solid objects. Explain each of the following terms:
i Additive...
{i Direct 3-D printing...
@ ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited2 Input and output devices
lil Binder 3-D printing...
[ 3marks}
b Acar enthusiast has bought a car made in 1921. Unfortunately, none of the parts for the
car are still made.
Explain how 3:D technology could be used to create any part for this car.
3 marks]
c Describe three other uses of 3-D printers.
1
3 marks}
6 Give one use for each of the following input devices:
inputdevice ‘Application
‘Trackerball
Joystick
Concept keyboard
Remote control
Microphone
[Smarks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook @2 Input and output devices
7Give three examples of devices operated by actuators in control applications
For each named device, give a use in a control application.
Device 1
Use.
Device 2....
USE ese
8 a Describe three ways in which photographs can be transferred from a digital
‘camera to a computer.
[ 3marks}
® ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited2 Input and output devices
b Most smart phones also have cameras fitted as a standard feature.
Give two reasons why many people stil prefer to use a digital camera rather than
take photos using their smart phone.
1
2 marks}
9. aMost modern televisions and computer screens are LCD and use LED backlit technology.
Give three advantages of using LED backiit technology rather the older COFL (fluorescent lamp)
technology
1
escanmnne [ 3 marks}
bi Explain the term ‘OLED’.
t ‘Tmark)
|i Give two benefits of using OLED technology rather than LCD.
1
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook Cs)2 Input and output devices
~[ 2marks
10 Describe suitable different applications that use of the following named sensors:
‘Sensor Application
‘Temperature
Pressure
“Acoustie/sound
pH
Humidity/moistire
[5 marks]
11 Direct Data Entry (DDE) is used to input data into a computer, removing the need for
manual data entry. Give the most appropriate input device for the following data items:
a data written in special ink at the bottom of bank cheques
b information on the labels of products (such as a can of soup)
e Cambridge IGCSE ICT Practical Workbook Photocopying prohibited2 Input and output devices
c shaded boxes or lozenges on a paper-based questionnaire
debit and credit card details input at an ATM.
4 marks)
12 Seven statements about input/output devices are given below. By ticking( either the
True or False column, indicate which statements are true and which ate false.
Statement Tue False
Webcams record images before being transmitted
Light pens only work with CRT monitors
Graphics tablets allow drawings to be modified prior to input
Dota from microphones can be drecty processed by 8 computer
Optical mice use light t tansmitdata directy to the computer
Ergonomic keyboards are much smaller then standard QWERTY
keyboards
Driving (steering) wheels use sensors to detect lefvright movement to
‘ive the sensation of steering
(7 marks}
13 Describe | the use and ii the operation of the following devices.
aRFID
Use.
HW Operation nnn snnnnnnnnnninnnnnnnnsnnannnn
Hi Operation...
[ 6 marks}
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook2 Input and output devices
143-0 printers produce solid objects. When data is sent to a 3D printer, it goes through a
number of stages. The stages are shown below. By writing the numbers 1 to 5, put the
following stages in the correct order.
Desonption of stage Order of stage:
|3-D printer is now setup to allow the solid object to be ‘printed
Fialised drawing is imported into 3-D printng sofware thatprepares datain a
format understood by the printer
Object removed from the 3-D printer and any unwanted material
away to produce a final solid object
Design is made using CAD software or blueprint downloaded from the internet
‘cut or washed
Solid abjectis now built up layer by layer, each layer is 0. Imm thick and printing
can take several hours.
[5 marks}
15 Complete the table by identifying the most appropriate output device for each use:
Description ofuse Name of device
Produce high quality oneof? printing, such as @
photograph |
Produces conthuous stationery and mult-part
printouts
Produces high quality pining wherehigh volumes
also required
Produces very large printouts, such as an AO drawing
[4 marks}
16 A chemical process is being monitored by temperature and pH sensors and by @ microprocessor,
A heater is used to raise the temperature and a valve is controlled to admit acid whenever the
pH rises above 5.0, The following diagram is a schematic of the process. Name each of parts
numbered 1 to 6.
e ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited2 Input and output devices
6 = . 7 7 [ 6 marks}
17 Discuss the relative advantages and disadvantages of using:
+ laser printers
+ inkjet printers
+ dot matrix printers,
to produce hard copy output.
7 marks)
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook3. Storage devices and media
1 Abank uses magnetic tapes to update their customer account data at the end of each day. New data
Is stored on a Transaction File (TF) and this is combined with the Master File (MF) to produce a New
Master File (NMF)
‘The data is stored in account order and part of the TF and MF are shown below:
MF:
12346891112
124578101314
‘a Show how the data is stored on the merged NMF and indicate which file (TF or MF)
the data came from.
NME:
TF or ME?
[4 marks}
b Indicate which of the following is the largest memory size by ticking(_yv) the
appropriate box on the right.
168
1K8
1B
1B
[1 mark}
Music files are 4MB in size. Calculate how many music files could be stored on a
‘memory stick with 4GB capacity,
[ 2marks}
‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited3 Storage devices and meda
2 Storage media can be classed as magnetic, optical or soli state, Six types of storage
media are shown in the table. Tick ( ¥) the appropriate column in the table to indicate the
type of media used in each case
‘Storage device Magnete Optical Solid state
Hard cisk
Flash memory card
Bluray disk
‘CD-ROM
[Memory stick I
DVD-RAM
(6 marks}
3 Describe the main differences between Blu-ray discs and DVDs.
[ Amarks}
4 Discuss the main advantages of using SSD rather than HDD in laptop computers,
4 marks}
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook e43 Storage devices and media
bName two other devices which would make use of SSD and give areason for your
‘choice; a different reason should be given in each case.
Name 1
Reason 1
Name 2
Reason 2
mL 4 marks]
5 Place each of the following storage and memory devices into their correct category:
Bluray disc flash memory/memory stick
DVD-RAM RAM
fixed hard disk drive (HDD) removable hard disk drive (HDD)
fixed solid state drive (SSD) ROM
Primary ‘Secondary [oftine
[6 marks)
6 Indicate which type of access each of the following storage media use by ticking( 4)
the appropriate box.
Media Seal Direct
Magnetic tape
Magnetic disk
cORW
[3 marks]
Q ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited3 Storage devices and meda
7 A student wrote: ‘the future of optical media is one of obsolescence in the next 5 years’
Discuss this statement by referring to modem technologies.
6 marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook ®@Networks and the effects of
using them
1 Ken owns a large shop with a number of computers. He would like each computer to be able to
access the internet to enable new orders to be processed and to answer customer queries,
a identify three items of hardware Ken may need to buy to set up a computer network.
1.
fl 3 marks]
b Ken allows his staff to use the computers during their lunchbreaks. Describe three
‘ways the staff could make appropriate use of the network.
tie
[ 3marks)
ct is necessary to back up the shop data, such as customer accounts. Describe a strategy
Ken could adopt to back up his data
a [ 3marks}
@® cambridge isese ter Practical Workbook Photocopying prohibited4. Networks and the effects of using them
d Ken uses passwords to protect against illegal access to customer accounts.
Indicate whether the following passwords are strong or weak
Password Weak ()
Password
Ken123
AbIS6@O
1 8Apri2000,
Tews
‘Strong (y)
[5 marks}
2.a.Explain the following terms:
ILAN....
WAN...
|i WLAN...
6 marks}
b Complete the diagram using the following terms:
bridge hub/switch —intemet router
server
Lan
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook4.Networks and the effects of using them
4.
5
{ Smarks]
cGive one advantage and one disadvantage of using WLANs rather than LANS.
Advantage...
Disadvantage
{ 2marks]
3.a Data is often transmitted using packets. Indicate, by using a tick ( 4/ which of the following
information forms part of the packet
tem of information Present
[Size of the packet (in MB).
Header to iden ty data packet
‘Sender's IP address
Tden ity of each node covering whole route
Iden tity number of each packet
[3 marks}
b Describe what happens when the packets of data arrive together at their destination,
2 marks]
e ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited4. Networks and the effects of using them
4Phablets, laptops and desk top computers can all be used to access the internet.
Discuss the relative advantages and disadvantages of using all three types of device to
access information from the internet.
a Phablets...
Laptops... sitet iii
Desk top computers...
9 marks]
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook eS4. Networks and the effects of using them
5 Put each of the following statements into the correct column in the table:
+ Can bea delay in sending documents if telephone line is busy.
* More likely to be intercepted or read by ‘the wrong people’.
+ More secure system since documents are password-protected.
+ Much easier and quicker to send to multiple recipients.
+ Printed documents are usually of a higher quality.
+ Received documents can be more easily modified or used in other documents.
+ Signatures on received documents can be accepted as legal documents.
Traditional faxes Emails
(7 marks}
6 Imran is using the internet to research his Geography project Heis usinga search engine
to find suitable information.
Discuss the relative advantages and disadvantages of using the internet to find
information compared to the traditional method of using books.
Q ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited4 Networks and the effects of using them
Smarks]
7aName three items of hardware and software needed to carry out video conferencing.
1
[ 3marks}
b Describe two potential issues and two clear advantages of using video conferencing
rather than face-to-face meetings.
Potential issues.
[ 4marks)
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook @4.Networks and the effects of using them
8 Desoribe the operation of
a web conferencing (webinars)...
b phone conferencing...
8 marks}
e ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited4. Networks and the effects of using them
‘9 Which terms are being described below:
a Guidelines to protect individuals, which includes ‘data must be accurate’ and ‘data must be
adequate, relevant and not excessive’
bb Software that can carry out ‘heuristic checking’ and make use of ‘quarantine’ to identify and
deal with potential computer malware.
c Additional security item found on ID cards and credit/debit cards to make forgery more difficult;
these appear to move or change colour when the card is rotated.
d Verification that data comes from a secure and trusted source; works with encryption to
strengthen internet security (e.g. through biometrics)
Wireless communication between devices in close proximity, makes use of ‘spread-spectrum
frequency hopping.
A transmitter/receiver that allows a device to access a network/intemet from any place within
100 metres.
g When a device wants to communicate, it picks one of 79 Bluetooth channels at random; if the
channel is being used, itrandomly picks another channel.
7 marks)
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook 84. Networks and the effects of using them
10 ‘Should the internet be policed?”
Discuss the above statement and draw a reasoned conclusion.
(7 marks}
Q ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited(8) The effects of using ICT
1 A school uses a spreadsheet to keep track of students’ test results at the end of each term,
The following section shows part of the end of term 1 results for a group of 100 students:
[A 8 c D IF 6 Ww
T ‘Name Matis faths icience Science IC Tmark ICT grade. ‘Class name |
Imark(%) |rade mark (8) grade
2 | Rien 53 Ww 60 1 ]
3 [wow ah (60 | ef | | |
4 (Fim 8 6 I Cy 1
102 Averages Maths [42 5% Science [526% 89% /(.20r3)
| A mark of 70% or over in any subject is awarded a grade A; a mark of 55% to 69% in any
subject is awarded a grade B and a mark of 40% to 54%in any subject is awarded a grade C.
Anything below 40% is awarded a grade D.
Write down the formulae that must be in cells C2, C3 and C4 so that the Maths
‘grade for each student can be calculated
(eee
3,
ca.
C 3 marks}
li There are 100 students in this year group. Each student is placed in class 1, class 2 or class 3
according to their combined mark for Maths, Science and ICT. A combined mark of 180 or
more places a student in class 1 and a combined mark of 130 to 179 places a student in class 2.
All other students are placed in class 3
‘Write down the formule that must be placed in W2, W3 and W4 to calculate
which class a studentis placed in
ee
wa.
wa.
mol 3 marks}
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook @5 The effects of using ICT
b Describe how you could modify the spreadsheet to allow the marks for terms 1, 2 and
3 for each subject to be recorded.
3 marks]
c Describe how the spreadsheet could be used to monitor a student's progress; tests in
‘each subject are taken at the end of each term.
wo 4 marks]
2. A manufacturing company has decided to use robots on the production line.
By placing ticks (y) in the righthand column of the table, incl
to the manufacturers of using robots on the production line.
te
three disadvantages
‘Statement
)
Redundancy payments to dismissed workers can be expensive
Items produced are not made to a consistent standard
tS are unable to think for themselves and can repeat errors
I
I
|PBbote dont take any stike action (removal oflabour)
|RoboWs are expensive to Buy and to maintain
Robois don’ tmake any errors
Remaining workers will need to be paid higher wages
Q Cambridge IGCSE ICT Practical Workbook
[3 marks}
Photocopying prohibited5 The effects of using ICT
b Job losses are one of the disadvantages to workers of introducing ICTinto the work place
Describe three positive effects of introducing ICT into the workplace.
1
‘3 markg
3 Introduction of ICT into the workplace has led to @ number of changes to working patterns
‘a The normal working hours for an employee at a company is 9am to Spm Mondays to Fridays.
Describe which working patters are being used for employees A to E according to the
table which shows their working hours.
Gn a CS DE ih TomTepn
Worker
&
Worker
3
Workers
CandD
Worker
e
Worker A...
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook 85 The effects of using ICT
Worker B.
-[ 4marks)
bDescribe three advantages to the management of the company in allowing different work
patterns.
1.
L 3 marks]
4aNeme three labour-saving devices used in the home which use embedded microprocessors.
{ 3marks)
@ ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited5 The effects of using ICT
b Describe three advantages and three disadvantages of using labour saving devices in
the home
3 marks}
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook5 The effects of using ICT
‘5 Microprocessors are also used in many other types of device, such as digital cameras.
aName three devices (other than labour-saving devices) which use embedded microprocessors,
Vo
vol 3 marks]
bGive two advantages and two disadvantages of your named devicesin part a.
‘Advantages
1
Disadvantages
1
{ 4marks)
Qe ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited(6) ICT applications
1 Mike owns a company that wishes to advertise their products end services, He has decided on three
possible methods:
+ paper-based advertising (flyers, posters and brochures)
+ computer-based advertising (using their own website)
+ multi-media presentations in local shopping malls
aGive three advantages of using all three methods
Paper-based advertising
1
Computer-based advertising
1
Multi-media advertising in local shopping mall
1
it 9 marks]
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook @6 ICT applications
» Cartoons and animation can be used in presentations. Which of the following terms
‘are used to describe the processes used to produce cartoons and animation?
(Tem ~
Tweening
| Morphing
[Tags
| Rendering |
Vector graphics
Formating
Mike frequently goes overseas on marketing visits. He uses VoIP to keep in touch
with his main office.
[3 marks)
i What is meant by VoIP?
liName two devices needed for VoIP.
1
{Give one advantage and one disadvantage of using VoIP
Advantage.
Disadvantage...
[ 6 marks}
2 Sensors are often used to collect data and then sendit to a computer.
‘a Applications which use sensors are either measurement or control. In the table, tick ( ¥ the
‘appropriate column to indicate whether the given application is measurement or control
‘Application
Monitoring the pollution levels in a river
Measurement Cdntrol
Burglar alarm system (detecton of intuders)
Maintaining the correct temperature and light conditions in a greenhouse | [
‘Automatic aven cooking food at correct temperature
Monitoring patien ¢s wital signs in a hospital
[5 marks]
Q Cambridge IGCSE ICT Practical Workbook Photocopying prohibited6 ICT applications
b Weather stations are examples of measurement applications. Name three pieces of
data collected by sensors at a weather station,
1
2
3 : [ 3marks}
i Name the device often needed to enable a computer to process the data coming from a
sensor.
ii Name the device often needed to allow a computer to control output devices such as pumps
and switches,
[ 2marks}
d Give one suitable application for each of the following sensors. A different application
needs to be given in each case.
= ‘Applicetion
mrygen/earbon dioxide
Ught
‘infrared
‘Pressure
pH
[6 marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook 86 ICT applications
3 A factory makes parts for cars by gluing together aluminium components. When the components
arrive at a robot station, the robot automatically deposits glue in the correct places. The panels are
then forced together and transferred to an oven for the glue to cure. Components need to be in the
oven for 10 minutes at an exact temperature of 295°C,
a Sensors are used to detect the presence of aluminium components and also to maintain the
critical temperature in the oven. Name two sensors required for these two tasks:
{Aluminium panels in correct position,
{i Maintaining oven temperature,
2 marks}
b The sensors send data to a computer. Describe how the sensors and computer are used to
+ ensure robots only apply glue when components have arrived
+ ensure the oven is maintained at its critical temperature.
6 marks]
Q ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited6 ICT applications
4 The instructions to control the movements of a floor turtle are shown below.
Command Meaning
FORWARD x Move x cm forward
BACKWARD x xem backward
LEFT Tum left trough d degrees
Tum right through d degrees
Repeatnextset ofinstuctons n tmes
ENDREPEAT Finish the repeat loop |
PENUP ‘Lift the pen up |
PENOOWN Lower the pen
The following shape is to be drawn using the above commands (each square is 10cm by 10cm).
Complete the set of instructions to draw the shape. Use efficient coding in your answer.
Photocopying prohibited
Instructions
1 PENDOWN
‘2 FORWARD 10 14,
SLEFT90 15
REPEATS 16
5
6 oon -
19
criti 20.
9 2.
TD venti Dos
23
WA cnne
[6 marks}
Cambridge IGCSE ICT Practical Workbook @6 ICT applications
5A set of traffic lights at a Tjunction is to be modelled on a
a alls
Before modelling can be carried out there is a need to
collect data at the Tjunction. This datais then to be input
Into @ computer, 8
‘a Describe three pieces of data that would need to be
collected for this model
1
owe marks]
b Give three reasons why modelling is carried out.
1
[ 3marks]
¢ The diagram below shows five computer modelling applications and five reasons why modelling
| carried out. By drawing arrows, match each application to the best reason why it would be
modelled,
Cer driving simulation Cost of building te real thing
is t00 expensive
Climate change Sr
sme real sitvations are too
EL dangerous to humans
‘Modal the loading on ittakes too ong to getresults
a new bridge back from the real thin
=o ‘Aimostimpossible to do the
involving toxic chemicals) eee
Easier and safer to make
Under-sea exploration changes to a model rather
than the real thing
[5 marks}
8 ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited6 ICT applications
‘6 Robots are used in many factories.
Indicate (¥) which of the following are disadvantages to the management of a company
in using robots,
Reasons Disadvantage?
Robots have dificultyn doing ‘one off taske
|Management can move factories anywhere in the world |
(Using robots can lead to unemployment
Robots manufacture more items per hour than humans
‘Ailitems produced using robots are identical
‘The setup and maintenance of robots is expensive
[2 marks}
7 customer of Hodder Bank would like to check the balance on their bank account
The customer decides to use the local ATM and inserts their debit card into the ATM:
‘a Describe the computer processing that takes place at the ATM once the customer
inserts their card.
4 marks]
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook 86 ICT applications
b During the customer's request for a current balance, the bank's computer will carry out a number
of processes to enable the customer to see their balance.
Describe these processes.
3 marks]
8 A customer of Hodder Bank buys an item from a shop using a cheque.
aName three items which are pre-printed in magnetic ink on the cheque.
‘3 marks}
b Describe the stages that are carried out when clearing a cheque.
@ ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited6 ICT applications
Se so uasannnnnnnnnn os se teennsnnin [ S marks)
‘¢ Hodder Bank has reviewed the use of magnetic ink and the use of barcodes on their
cheques to show customer data
Give two reasons why the use of magnetic ink is better than using barcodes on cheques.
[ 2marks)
ii Describe the different ways magnetic ink and barcodes would be read from the cheque.
4marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook 86 ICT applications
GaDescnbe three types of medical ald which can be produced using a 3. printer.
“L 3 marks]
b Describe why 3D printers are very useful to surgeons who are about to do
‘constructive surgery.
af Smarks}
10 a Circle the items below which are components of @ typical Expert System.
knowledge base rules base encryption system
explanation system hyperlinks inference engine
digital to analogue converter target attribute analogue to digital converter
[4 marks}
Q ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited6 ICT applications
bb Faults in TVs can be identified using Expert System diagnostics.
Describe how an Expert System is used to carry out the diagnostics.
[
marks}
Give three other uses of Expert Systems.
3 marks]
d Describe how anew Expert System could be tested to ensure the results produced were correct
when the system was used commercially.
2 marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook @6 ICT applications
11 Acar with registration number ABC 123 enters a car park. The car park uses ANPR
‘a What is meant by ANPR?
sow 1 mark]
b There are nine stages used by ANPR to recognise a car entering and leaving the car park. These
nine stages are listed below but are in the wrong order.
Put the nine stages into the correct order.
1 Algorithm used to locate and isolate number plate from camera image.
2 Text string s stored in a database.
3 Motorist returns to car park and makes payment after inserting his ticket into the machine.
4 Sensor detects car and sends a signal to the microprocessor to instruct a camera to capture an
image of the front of the vehicle.
5 Motorist drives to exit barrier and ANPR system reads the number plate and checks the
database.
6 Brightness and contrast of number plate adjusted so that the characters can be clearly read.
7 If the number plate is recognised and payment has been made, the exit barrier is raised
8 Once all the checking is done, the car park entrance barnier is raised and the motorist is issued
with a ticket showing date and time of entry.
‘9 Each character on the number plate is then recognised using OCR; the characters are
converted into a text string,
Af 9 marks]
12 Give three uses of a Geographic Information System (GIS).
1
“L 3 marks]
e ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited6 ICT applications,
13 Global Positioning Satellites (GPS) are used to help motorists navigate to a given location.
Indicate (4) which of the following are true and which are false statements about GPS.
‘Statements True False
‘The satnav in the car sends signals to the GPS satellites giving the car's locaton
lf fie maps are notup to date, te driver can be given incomectinstuctions
‘The satellites move round the Earth keeping track of all the cars
The sat hav system installed in the car has state-of the-ert tming systems:
‘ion
| The system can estimate the time of arrival of the car atits dest
Paper maps have been scanned in so that the route shows up on the satnav
screen in the car
[6 marks)
14 Give the meaning of each of the following terms:
aMIcR
bocr
cOMR.
RFID...
eEPOS.
FMRI...
aa™
hac...
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook e6 ICT applications
SIM.
1 VoIP.
i 10 marks}
115A cinema has an online booking system.
Describe what happens when a customer visits the cinema's website and chooses to purchase four
seats to the see the film Hachette ~ the story of a book
Include in your description the role of the user and of the website software to ensure purchased
tickets can’t be double booked.
wf 8 marks)
@ ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited(2) Systems life cycle
1 Complete the following diagram with the missing stages from the _ systems life cycle
ANALYSIS
|
DOCUMENTATION
i
[4marks}
2Part of the analysis stage involves researching the existing system.
Name three methods of gathering information about the existing system. For each named method,
agivea brief description
baive one advantage
cgive one disadvantage.
Method 1
Description
Advantage
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook g7 systems life cycle
Disadvantage
Method 2
Description
Advantage ...
Disadvantage
Method 3
Description
Advantage
Disadvantage
12 marks}
8 ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited7 systems life cycle
3 Two types of diagram used in systems analysis are DFDs and system flowcharts,
Describe the purpose of each type of diagram.
FD
System flowchart
[ Amarks}
4 Data capture forms can be paper-based or electronic, online forms.
aiGive five features you would expect to see in a well-designed paper-based data
capture form
1
vow — Smarks)
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook 87 Systems life cycle
it Look at the following data capture form designed to collect information about car
‘ownership.
‘Your name:
Your address:
Reg Number of your car:
‘Make of car:
Colour of car:
Was it bought new?
When did you buy it (dd/mm/yy):
Design a much improved paper-based form for data capture using some of the features described
in part ai above,
[ 3marks]
® camonage 16cse ter Practica Workbook Photocopying prohibited7 Systems life cycle
b Computer-based (online) data capture forms are also used.
Give five features you would expect to see in a well-designed computer-based data capture form.
1
L Smarks}
\i Design a much improved computer-based data capture form using some of the features
described in part bi above.
1 4marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook 87 systems life cycle
5 The owner of a number of leisure centres has had anew computerised booking system installed.
A systems analyst was brought in to research the existing system and to oversee the installation of
the new system
ain the table below, tick (_y) the relevant stage of the systems analysis for each of the five named
activities:
ity Analysis stage [Design stage [Evaluation stage:
Interviewing users of the existing system
| Planning the validation and verification routines /rules
[Deciding on tie required fle structures
Tnterviewing users of the new system
Examining existing documentation usedin the booking
system
[5 marks}
b The systems analyst needs to decide the best way to implement the new system. Name and
describe three different methods of implementation.
Method 1
Description
Method 2
Description
Method 3
Description
) ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited7 systems life cycle
[6 marks}
c Once the system was fully implemented, the systems analyst handed over documentation to the
owner of the leisure centre. The documentation was referred to as: technical and user.
In the following table indicate, using a tick (4), which items would be foundin the technical
documentation, in the user documentation or in both types of documentation
ems cal User [Both pes
Program lising/coding
Far RTT |
|rarawarereanrenans
|saroarerequrenens
| sample vane (ih rau)
L_ - |
Validation routines:
— Towehars
How to add/delete/amend files
Meaning of possible error messages
Troubleshooting guide
[6 marks}
6 A system accepts numbers in the range 1 to 50. Tick (4) whether the following data items are
examples of normal data, abnormal data or extreme data
Data item Normat ‘Abnormal Extreme
41
a
50
thirty
[5marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook7 Systems life cycle
7 Anew database is being developed for a shop that sells CDs. The new database needs to indicate
when stock levels have reached re-order levels. Each CD title needs to be recorded uniquely and the
manager also needs to know the last date each CD title was ordered and whether anew order has
yet been placed.
‘a Complete the data dictionary table, giving the full field names to be used in the stock database.
Itis also necessary to give the most suitable validation check to be carried out on each data field
and also indicate the data type in each field. (Note: it is not adequate just to say
numeric for a
data type where appropriate.)
Field nome Validation check Data ype
oi.title alphanumeric
integer
lastordered.date
[6 marks)
bName and describe two methods of data verification
5
[marks]
‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited7 systems life cycle
8 The following fields are used on an online form to allow customers to enter key data:
credit card number:
order co
colour
size:
16-digit code
XXNNNNXX (X = letter, N = digit)
ted, black or white
XS, S,M,L,XL
Give a suitable validation check for each data item. For each validation check, give
+ one example of a data item that would fail your validation check
+ one example of a data item that would pass your validation check
(Feldname idation check ‘Example of data item | Example of data
‘that would PASS item that would FAIL
validation check validation check
edit card number
‘order code i
‘colour
‘size
Photocopying prohibited
[8 marks}
Cambridge IGCSE ICT Practical Workbook @7 systems life cycle
9 Once systems have been implemented and have been running for a few months, itis necessary to
carry out evaluation.
Discuss how evaluation is carried out,
8 marks]
@ ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited(8) Safety and security
1 Use of computers can lead to health and safety risks.
aName three health risks. For each one, describe what causes the
way of reducing or eliminating the risk.
risk and suggest a
Elimination
(Health risk _ [Description
[9marks}
bName two safety risks. For each one, describe what causes the risk and suggest a way
of reducing or eliminating the risk.
(Safety isk Description Elimination
[6 marks}
Photocopying prohibited Cambridge IGCSE loTPractcal Workbook GD)8 Safety and secunity
2aWhatismeant by — e-safety?
[ 1 mark]
bDescribe five ways of ensuring e-safety.
1
L 5 marks}
3 Which types of security risks are being described below
a The act of gaining unauthorised access to a computer system with the aim of deleting, changing
‘or ‘stealing’ personal data.
b Editing the source code of a program, allowing it to be exploited or changed for a specific purpose;
itis often done to alter how the software works for a malicious purpose; always an illegal act.
8 ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited8 Safety and security
Software that gathers data by the monitoring of key presses on a user's computer; the gathered
datais sent back to the person who sent the malware in the frst place
d Program code that can replicate itself with the intention of deleting or corrupting files on a
computer,
e Junk email sent out to recipients on a mailing list; the emails can clog up bandwidth on the
internet and users’ in boxes.
f An online discussion group in which all the posts are checked by an administrator before
they can be posted; this can prevent spam and filter out inappropriate messages and websites.
{g Small files or code stored on a user's computer sent by a web server, this allows a website to
remember a.user's preferences each time they visit the website.
[7 marks}
Explain the following two terms:
aphishing........ anna
b pharming.
[ 4marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook Q8 Safety and security
Sindicate ( 7) which of the following tasks are carried out bya firewall.
Task Carried outby frewal
Firewalls can control employee misconduct or carelessness, preventing
them divulging passwords
Firewalls can examine traffic between a user's computer and the public
network (e.g internet)
Firewalls can help to prevent viruses or hackers entering the user's
‘computer or computer network
Firewalls can be used to log all incoming and outgoing traffic to allow
later interrogation by @ network manager
Firewalls can prevent individuals on internal networks from using their
‘own modems to by-pass the firewall
Firewalls warn theuser if software on thelr computer is tying to access
‘an external data source (eg automatic software update)
[4 marks}
62 Explain the following terms:
i
ol 5 marks}
bGive two differences between SSL and TLS.
Tan
-L 2 marks]
Cambridge IGCSE ICT Practical Workbook Photocopying prohibited8 Safety and security
Five stages that ocour when a user wants to access a secure website and receive/send
data from/to it are shown below. Put the five stages in their correct order.
1 If the web browser can authenticate the SSL certificate, it sends a message back to the web
server to allow communications to begin.
2 The web server responds by sending a copy of its SSL certificate to the user's web browser.
3 The user's web browser sends a message so that it can connect with the required website
which is secured by SSL.
4.0nce the message is received, the web server acknowledges the web browser and the SSL-
‘encrypted two-way data transfer begins.
'5 The web browser requests that the web server identifies itself
Stages:
[5 marks}
7.aWhatismeant by — encryption 7
[ 2marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook8 Safety and security
b Complete the diagram by naming the two missing parts A and 8.
Eneyption | b
algonttm
{| marks)
cifA=1,E=2,1=3,0=4,U=SandZ=A,Y=B,X=C,..,C=X,B=¥
1 What message would produce the following encoded message?
XANK5G2! HX32MX2 3H USM
{i Encode the following message:
INFORMATION TECHNOLOGY QUESTION
t 4 marks)
BaWhatismeantbya digital certificate ?
1 mark]
8 ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibitedb Name three of the parts that make up a digital certificate
1
8 Safety and security
2 es of 3marks}
9 Biometrics is used as a security method in many applications.
Complete the following table which identifies:
+ comparative accuracy
+ required input devices
+ what can interfere with the biometric technique.
|Biomretie technique Comparative securacy enters ee interfere
‘Medium equi biometic
‘Hioh (A) W atte
Fingerprinting
Reine scans
|
Voice recognition
Face recogmiion
(6 marks]
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook @8 Safety and security
10 Discuss the issues ofcloud security
6 marks]
e ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited9 Audiences
1 You are planning and creating a presentation to @ group of people.
‘Give three factors which should be considered about the group of people.
1 . .
2.
3
[ 3marks}
b Give three methods of finding out information about the target audience.
1
2a
3
o[ 8 marks}
2aWhatismeantby — software piracy 7
cetera ene “ me en hal ‘Tmark)
1
[ 3marks}
Photocopying prohibited Cambridge IGCSE ICT Practical Workbook9 Audiences
3 The five items shown need to be considered when giving a presentation
For each item, give one example of what needs to be considered.
a Language used.
b Multimedia used.
c Length of presentation...
d interactive presentation,
e Examples to be USE rs ernnnnnnn S ereintaenee women Smarks]
4Four terms and four descriptions are shown in the diagram. By drawing arrows, connect,
each term to its correct description.
Legal This refers to attitudes, values and practices shared by a society or
group of people
warty [cont etapa tr pansy
Ethics ‘This governs professional interactions, codes of behaviour practised by
2 society or group of people
culture This governs the private and personal interactions between people and
is usually determined by the person concemed
[4 marks]
5 During the day, Sergey works in a company that develops software for the nuclear industry. He
‘works with a team of programmers.
In the evening he works for himself writing games software. He frequently hires the services of
other programmers to speed up the process of developing his games software,
The table shows a number of statements about Sergey's activities. By ticking (_y one or more
columns indicate whether each statement is an example of unethical, immoral or illegal activity.
[Statement [Unethical ‘immoral legal
|Sergey uses some of the softwere routnes from his
|dayyob when wring his games software
|Sergey claims thatall the software routines he uses
“from his day job were written by himself
[Sergey has some of his software written overseas,
‘butonly pays the writers a very low wage
@ ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited9 Audiences
‘Sergey wiltes some of is computer games using
the powerful computer systems available to him
during his day job
‘Tohelp advertise his games, Sergey hires @ “hacker”
‘who breaks into websites so that popups appear
Which advertise his games free of charge
‘Some of the games software written by Sergey
make fun of people who have certain disabilites
‘Some of the games Sergey writes collect
information from the user’s computer, where itis
installed. This data is sent back to Sergey for various
uses
Photocopying prohibited
[7 marks}
Cambridge IGCSE ICT Practical Workbook @10) Communication
1 a Most countries in the world have laws governing email content,
Give three examples of these laws.
4
i 3 marks}
b Explain the difference between passive and active attacks by email
[1 3marks|
cGive three reasons why users set up email groups
Vasco
[ 3marks}
e ‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited
1. 27 74 75 % 77 72:79 BO BI R2 82 Be10 Communication
2a The internet and intranets are two different types of network.
Tick (VJ the appropriate columns to show which features refer to the internet and
which features refer to intranets.
(Feature internet invanets
“Information available to users is specific t a particular company or
[organisaton only
"Requires passwords and user ids t be entered to gain access to the network
‘Allows public access tb information on a glabal scale
‘ils behind’ firewall give protecton fiom hackers and fom viruses
“By using an ISP accountitis possible to access thenetwork from anywhere
Lin the world
[Smarks]
b The following diagram shows an extranet.
Complete the diagram by naming parts A,B end C.
iniemer -
A 8
Be
7opbenton z inaet
surver ‘ever
Intel company network (rane!) {smarts}
Give three advantages of using intranets rather than the internet.
of 3 marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook S
1. 7374 75 16 77 78 79 20 B1 BO 82 8410 Communication
3.aWhich typeof cloud storage is being described below:
1A storage environment where customer/citent and cloud storage provider are different
companies.
{i Storage provided by a dedicated environment behind a company firewall; customer/ client
and cloud storage provider are integrated and operate as a single entity.
{il Some of the data resides behind an integrated cloud storage facility while less sensitive data
‘can be accessed from a separate and different cloud storage provider,
1 3marks}
bGive two advantages and two disadvantages of using cloud storage.
Advantages:
2
Disadvantages
1
2
1 4marks}
4a Explain how you would know if a website has security authentication or encryption.
[ 1 mark]
@® camondge ioose ler Practical Warkbook Photocopying prohibited
1 73°74 75 16 77 72 79 20 81 BD 82 8410 Communication
b In each of the following tick (
W) the appropriate box to indicate the correct meaning of the
aiven term.
i Meaning of http.
‘Meaning (7)
hypertext vansfer program
Hypertext ransfer protocol
hybrid text ransaction protocol
Randshaking text wanster protocol
liMeaning of ftp.
Mesning w
fixed type protocol
format testng profile
faster tensfer protocol
file tanster protocol
li Meaning of pdf.
‘Meening WwW
protected document format
portable document format
principal document format
Portable document fle
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook )
1 73°74 75 7677 73 79 BO fi a2 82 2410. Communication
iv Meaning of url
Meaning Ww
uploading remote language
‘user router locator
uniform resource locator
uniform remote linker
[4 marks}
cDescribe three features found in most web browsers.
1.
dAuser typed in:
httpy/www hoddereducation co uk/ICT_books/2017
Identify the three different internet components shown in the above url.
1
-[ 3marks]
‘Cambridge IGCSE ICT Practical Workbook Photocopying prohibited10 Communication
‘SExplain the main differences between ftp and http.
sete e -[ 4marks}
6. The following table shows features of blogs and wikis. Tick (
W) the appropriate columns to show
which are features of blogs and which are features of wikis.
(Feature
Updated on a regular basis by the author oniy
Blogs Wikis
‘Anyone can edit del
or modify the content
‘Organised in reverse chronclogical order
Can only be updated and edited by the author
‘Can be easily edited using a web browser
[5 marks}
bGive four features of a typical social networking site
2
3
4
co : —— neni con marks}
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook @
1 #7374 75 7677 78 79 80 8) B2 82 2410 Communication
c Explain the meaning of the following terms:
ise,
li netiquette...
4 virtual private network (VPN).
iv microblog
ee mt [ @ marks}
7Describe three advantages and three disadvantages of using search engines to research for information,
Advantages
1
2
3 . . :
Disadvantages
2
Ban . .
t 6 marks]
@ camndge ioose ler Practical Werkbook Photocopying prohibited
1 73:74 75 777 78 79 80 8) 82 BF oa10 Communication
8 Discuss how you would evaluate the reliability of information found on the internet.
vo commen Dmarks)
Photocopying prohibited ‘Cambridge IGCSE ICT Practical Workbook e
1 #737475 777 78 79 80 8) 82 2 B84