New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
computer science
cambridge igcse computer science coursebook
Cambridge IGCSE And O Level Business Studies 5th Edition Karen Borrington, Peter Stimpson - Solutions
Describe the features of the following:a Blog b Wiki
Indicate which of the following statements are TRUE or FALSE by putting a tick (✔) in the appropriate box. Statement The internet is part of the World Wide Web (WWW) All recipients of emails can see all the recipients in the Bcc and Cc lists Extranets allow intranets to be extended outside the
Looking at the arguments in favour (Figure 10.13) and against (Figure 10.14), what is your opinion?Should we police the internet and tighten up the laws to prevent illegal use, and prevent the posting of offensive or harmful material?Would increasing the monitoring of the internet prevent crime?
1 Which recipients of the email can be seen by John, Mary and Karl?2 Which recipients of the email can be seen by Tim, Ahmed and Dimitri?3 Which recipients of the email can be seen by Nick, Ivan and Christina?4 Who can see that the email was sent to Nick, Ivan and Christina? To... John, Mary, Karl
A programmer is developing a presentation of a new ICT solution for a conference and needs to consider the audience.a Using examples, explain why presentations and ICT solutions have to take into account the type of audience.b The programmer is concerned that the software used for the presentation
An airport in southern Cyprus is designing a new information system. A number of automated information kiosks will be distributed throughout the airport. Customers can be any age from 18 upwards. It is also expected that Greek and English language will be used by all customers. The kiosks must also
Explain each of the following terms:a software piracy b product key c copyright infringement
Tick (✔) which of the following are used to help maintain copyright and reduce piracy of software. Use of a product key Use of ethics in software Click on a check box agreeing to licence agreement Use of holographic images Make the software cheaper to develop Supply software on CD-ROM or DVD-ROM ]
A company has decided to develop a new online game which helps students revise their A Level Chemistry.Describe what factors the company needs to consider when deciding who the audience will be for their new online game. Give examples to illustrate your answer.
When giving a presentation to a large audience, the person giving the presentation has to consider a number of key factors:>> the language that is used>> what multimedia could be used>> how long should the presentation last>> if the presentation should be interactive>> what would be suitable
The example given assumes that software is distributed on CD or DVD.However, software is often purchased using store apps, where it is downloaded to a device immediately after is paid for.How do you think software copyright infringements and software piracy are controlled when software is bought
Using the mobile phone example described above, produce two different presentations to cover the two types of potential audience:• the mobile phone sales team• the potential mobile phone customers.Explain why you have included certain features into each of your presentations.
a Explain why it is important to encrypt emails.b Explain why key logging software poses a security threat when purchasing items on the internet.
a Explain what is meant by the term authentication.b Explain what is meant by two-factor authentication.
a Name three biometric authentication techniques.b For each named technique, describe the advantages and disadvantages of using it as a method of data security.
Explain each of the following terms and give an example of their use.a cloning of credit cards b fingerprint scanning c digital certificates d encryption e vishing
a Explain what is meant by a firewall.b Describe four of the tasks carried out by a typical firewall.
Complete the following paragraph using words or phrases from the following list. Each word or phrase may be used once, more than once or not at all. authenticity >> biometrics digital certificate encrypted e-safety hacking link >> password protected personal data >> pharming >> phishing >>
Seven ICT descriptions are shown on the left and seven ICT terms on the right.By drawing arrows, connect each description to the correct term. Authentication method using, for example, fingerprint scans, retina scans or face recognition Result of putting a message through an encryption algorithm
Indicate, by ticking (✔) the appropriate box, which of the following are examples of a health risk and which are examples of a safety risk. Description of risk Tripping over a loose wire on the floor Headaches caused by the glare from a computer screen Risk of electrocution caused from damaged
a Discuss the e-safety issues when using a social networking site.b Data can be classified as personal or sensitive.Give two examples of each.
There are a number of health and safety issues associated with the use of computers.Draw arrows from the terms Health or Safety to the matching issue. Use a maximum of four arrows. Health Safety Tripping over loose wires. Heavy equipment falling off tables and injuring people. Clicking a mouse
Internet banking can be used by bank customers to check their account balance.Many ways of logging into such a system involve the use of passwords.Describe three methods of minimising the possibility of passwords being misused or intercepted.
1 a Name three safety issues when using computer systems.b For each named safety issue, describe one way to remove or militate against the risk.
Which of the following are weak passwords and which are strong passwords?Explain your decision in each case.i 25-Apr-2005ii Password1iii ChapTer(@06iv rX!3&tp%v 111111''
Find out how banks overcome problems such as phishing, key logging software and hacking to ensure online banking is safe for their customers. When doing your research, also check out how risks at ATMs are mitigated by reading the section on card cloning and shoulder surfing (at the end of this
Evaluate your own use of the internet, emails and social media/networking sites. Which of these e-safety strategies do you use every day?
Find out what safety measures should be taken when playing games on the internet.Write an article on these safety measures and include ways to minimise or remove these risks.
Six descriptions are given on the left and ten computer terms are given on the right. By drawing arrows, connect each description to its correct term. Designed to help programmers/analysts to make improvements to the system or repair/maintain the system User documentation This checks to see if the
An electric power company introduced computer monitoring and control systems in the year 2000. A project management team has brought in a systems analyst with a view to introducing a new system or upgrading their existing system.The power company supplies the national grid with electricity and
A program is being written which only accepts numbers in the range 1 to 100 (inclusively) to be input. Validation routines are being used to check the input data.a Name two validation routines which could be used to check the input data in this program. Give a reason for your choice in each case.b
7 a Describe what is meant by the evaluation stage in the systems life cycle.b Give two reasons why hardware may need to be updated ten years after its initial introduction.c Give two reasons why software may need to be updated ten years after its initial introduction.
Which five computer terms are being described below?a A changeover method where the old system is stopped overnight and the new system is introduced straight away.b A changeover method where the new system is introduced into one branch of a company and its performance assessed before being
Put the following six stages of the systems life cycle into their correct order:>> Analysis>> Design>> Development and Testing>> Documentation>> Evaluation>> Implementation
In the table below, by using a tick (✔) indicate whether each component is found in user documentation only, in technical documentation only or in both types of documentation.
A farmer has purchased a computerised milking system for her cows. She has asked a systems analyst to create a database to store details of the cows being milked. Examples of the details of the cows which will be stored are:b State which field would be the most appropriate for the primary key.c A
Carlos is designing a new computer system to replace an existing system. a Tick four items which will need to be designed. Inputs to the current system. Data capture forms. Tick() Report layouts. Limitations of the system. Observation methods. Improvements to the system. User and information
For each of these questions, choose the correct response from the five options given. a What validation type would make sure a post code, such as LA21 4NN, was entered in the correct layout? 10 a b C d e Length check Presence check Range check Format check Type check b What validation type would
Write test data for the following fields in a database (the data should try to cover all possible types of data).The database will store the following information:⚫ name of holiday resort⚫ average daily temperature (a whole number value is used)⚫ number of hours of sunshine per day (a whole
Describe what validation routines could be used to check the date if it was input on the screen as follows:Describe how it would be possible to avoid errors altogether when inputting the data in the form shown above. Day: Month: Year:
Each of the following ten statements are True or False.Tick () the appropriate box to indicate which statements are true and which statements are false. Statement NFC can work up to 50 metres away. The RFID chip consists of a tag and an antenna. GIS systems require complex command language
a Complete the diagram below, which shows the structure of an expert system, using the terms below.b Explain the function of the following expert system components:i explanation system ii inference engine iii knowledge base iv rules base v user interface.c Describe how an expert system could be
Seven statements are shown on the left and seven computer terms are shown on the right.By drawing arrows, connect each description to the correct computer term. Users watch movies or sound files on a device connected to the internet; there is no need to download the files first Biomimetics
Discuss the advantages and disadvantages of using internet shopping to both the customers and to the retail companies.
The banking industry has rapidly changed over the last few years as modern technology has developed.Discuss the advantages and disadvantages of using online banking rather than other banking methods to the customer.October/November 2017
A theatre manager holds a number of music concerts through the summer months. She has decided to introduce an online booking system to replace her current paper-based booking system.Give four advantages ntages of using an online booking system.
The city of Venice is in danger of being damaged due to rising sea levels. A new computer controlled flood defence system is being planned. The developers of the system are using a spreadsheet to model the plan.a Give three reasons why computer models are used to simulate the flood defence system.
An automatic washing machine contains a device to read RFID chips sewn into clothing. When an item of clothing is placed in the washing machine it is scanned.a Describe how the data is read from the RFID chip.b Explain the benefits of using RFID technology in a washing machine.
3 Robots are being used in the oil industry to find new deposits under the Earth's surface.a Give three advantages of using robots rather than humans when searching for new oil deposits. [3]b Give two disadvantages of using robots rather than humans. [2]
You have been asked by your teacher to use a word processor to create a brochure for a new intake of pupils. The brochure will consist of:>> Images of the school taken from a digital camera.>> Printed archive photographs.>> Information about the school already stored in text files.>> Information to
The managers of a company are concerned about illegal parking in their car park. Drivers are parking their cars in the private car park and then walking to the local football match. There have been a few instances of damage to employees' cars. A decision has been made to install a number plate
Which expert system terms are being described below?1 A repository of facts made up of a collection of objects and their attributes.2 It informs the user of the reasoning behind the expert system's conclusions and recommended actions.3 It is made up of a user interface, explanation system and
Write a sequence of instructions to show how the following expert systems would be used to:a diagnose circuit board faults in television sets b identify an unknown' chemical compound c identify a new species of flower d produce the best route for a delivery vehicle.
Write a sequence of instructions to show how the following expert systems would be set up:a identification of a chemical found at, for example, a crime scene b strategy game, such as chess c engine diagnostics for a racing car.
a Describe the advantages of having major roads controlled and monitored by smart road signs.b Describe the risks of having smart road signs under computer control.
Five statements are shown on the left and eleven ICT terms on the right.Draw arrows to connect each statement to its correct term. Name given to driverless vehicles, such as cars, vans and buses Monitor Cybercriminal A type of intelligent" road sign used to monitor and control road traffic
a There are potential security issues when using microprocessor-controlled devices in the home.Describe these issues and explain how they can be mitigated.b Indicate which of the following statements are True or False by ticking (✔) the appropriate box. True False () Using microprocessors has
You use a computer to do your homework. You are concerned about the health issues of using a computer.Discuss the advantages and disadvantages of different methods you could use to help minimise the health problems of using the computer. [6]Cambridge IGCSE Information and Communication Technology
The use of microprocessor-controlled devices in the home affects an individual's leisure time, social interaction and the need to leave the home.a Give three advantages to the individual when microprocessor-controlled devices are used in the home.b Give three disadvantages to the individual when
Name each of the six network devices labelled 'A' to 'F' in the diagrams below: 10 computer Local area network "A" computer computer computer computer computer b computer computer computer "B" "C" computer computer computer LAN 1 "D" server computer computer "E" "F" computer LAN 3 LAN 2 internet
a Explain what is meant by cloud computing.b Give three advantages of storing data on the cloud.c Give three disadvantages of storing data on the cloud.
Seven descriptions are shown on the left and ten computer terms are shown on the right.By drawing arrows, connect each description to the correct computer term. Form of authentication in the form of hardware devices; uses periodically changing random numbers to log in to a secure system Type of
a Explain how magnetic stripe cards could be used to control the entry and exit to a security building.b Describe how these magnetic stripe cards could be improved to increase the security of the building.
a Describe what is meant by a virus.b Describe three of the features you would expect to find in any anti-virus software.
Six features of network devices are given in the table below.For each feature, tick (✔) the appropriate box to indicate whether it refers to a router, hub or switch. Feature Used to connect devices together to form a local area network (LAN) The destination MAC address is looked up before the
Authentication is an important part of network security.Explain the meaning of the following three types of authentication.In each case, also give an example of its use.a Zero login b Physical token c Electronic token
Hubs and switches are both used to enable devices to communicate with each other in a network.a Describe the differences and similarities in the use of hubs and switches in a network.b A bridge is another device used in network connectivity.Describe the function of a bridge.c Routers are used to
Both Wi-Fi and Bluetooth can be used to enable devices to communicate wirelessly.Describe the differences in how Bluetooth and Wi-Fi both operate.
A company is setting up a video conference.a. Name three computer hardware devices they would need.b. The company could have set up a web-conference rather than a video-conference.Describe what is meant by a web-conference.
a Describe the changes in technology which have led to the disappearance of the hard disk drive (HDD) as the main backing store on a computer.b Describe the changes in technology which have led to the reduction in the use of CD and DVD drives being installed on modern laptop computers.
a i Blu-ray and DVD are two types of optical media.Give three differences between Blu-ray and DVD.ii Give one application that uses Blu-ray discs and one application that uses DVD disks.b i Hard disk drives (HDD) and solid-state drives (SSD) are two types of storage device.Give three differences
Indicate whether the following ten statements are True or False by putting a tick () in the appropriate box. Statements Both DVDs and Blu-ray discs can make use of dual-layering technology CD-RW can act as the same as a ROM chip Solid-state drives wear out very quickly due to rapid electron
Fifteen words or phrases are listed below:Use words or phrases from this list to complete the following paragraph. Note that each word or phrase can be used once, more than once or not at all.__________________________ is used by magnetic disks, optical disks and solid-state media when locating
Six descriptions are shown on the left and six computer terms are shown on the right.By drawing lines, connect each description to its correct term. Areas on a DVD surface where 1s and Os are stored Two individual recording layers sandwiched together to form a single DVD Technology that makes use
a Explain what is meant by the term optical media.b Hard disk drives (HDD) are being replaced by solid-state drives (SSD).Give four reasons why this is happening.
Tick(✔) whether the following are optical, magnetic or solid-state storage media. SSD Blu-ray Pen drive Portable hard disk drive Optical () Magnetic () Solid state ()
CD, DVD and Blu-ray are types of optical storage media.Tick (✔) the most appropriate optical storage medium for each of the statements. Stores lower quality audio files Has the highest storage capacity The RAM version of this medium is used to record and play recorded images at the same time
Review all of the uses, advantages and disadvantages of optical media. Produce a table comparing CD formats, DVD and Blu-ray. Once you have completed the table, choose which optical media could you use for the following (include a reason for your choice):a Supplying software for use on a computer.b
Tick(✔) whether the following statements are True or False. Answers to multiple-choice examination papers can be read using an optical mark reader (OMR) The PIN is stored on the magnetic stripe on a credit card The chip on a credit card is read by a PIN reader An RFID chip can be used to track
A school is holding an athletics competition. The timings of each running event will be measured electronically using sensors at the start and finish. Runners begin a race in starting blocks. When the starting pistol is fired the electronic timing starts. The winner of the race is the first to
A home is fitted with a microprocessor-controlled burglar alarm system. It is not connected to a police station.Tick(✔) three sensors which would be used in such a system. S Pressure sensor Oxygen level sensor Wind speed sensor Sound sensor Body sensor Moisture sensor Infra-red sensor Touch sensor
Which ten computer terms are being described below?a A matrix of filled-in dark squares on a light background; read using a smartphone camera or tablet using an app.b A device that can read marks written in pen or pencil; the pencil or pen marks must be made in the correct position.c An input
Five devices are shown on the left and five descriptions are shown on the right. By drawing lines, connect each device to its correct description. Inkjet printer Display that uses light modulating properties of crystals LCD screen 3D printer Digital projector Image from a source is magnified and
In each of the following questions, only one of the responses is correct. Choose one of the five options given. a Which one of the following is the most suitable device for inputting a short report into a computer? a trackerball b scanner C keyboard d optical mark reader (OMR) e joystick b Which
Contactless debit cards are replacing standard debit cards. Some countries are introducing contactless debit card transactions at ATM machines. Give three disadvantages to the customer of using these cards at an ATM.
a. State one suitable application for each of the following printers.A different application should be given in each case.>> inkjet printer>> 3D printerb. Name another type of printer and describe one way in which it is different from the two printers named in part a.
7 Six descriptions are shown on the left and six computer terms are shown on the right.Draw lines to link each statement to its correct computer term. Method whereby a person uses their voice to carry out a function Physical component that allows data to be entered into a computer system output
a. Describe what is meant by augmented reality and virtual reality.b. Describe how augmented reality and virtual reality could affect society in the near future.
Nine statements about random access memory (RAM) and read-only memory (ROM) are given below. By putting a tick (✔) in the appropriate box, indicate whether each statement refers to RAM or ROM. Data on a chip is stored permanently and cannot be deleted It is not possible to alter or delete the
Computer operating systems have developed since early computers used Command Line Interfaces (CLI). Many computers now use Graphical User Interfaces (GUI), some of which are capable of using touch screen technology.Compare and contrast CLI and GUI.
Most smart phones can carry out many functions which, until recently, only a computer could perform. Explain why computers of all types are still needed.
Tick(✔) whether the following are features of operating systems containing a command line interface (CLI) or a graphical user interface (GUI). Instructions have to be typed. Applications are represented by icons. Options are chosen from a menu. Many instructions have to be memorised. CLI (V) GUI
There are a number of different types of computer. Write down the type of computer that best fits the following descriptions.a. A computer that is difficult to move and has a separate monitor and keyboard.b. A portable computer that includes a physical keyboard.c. A thin portable computer that has
a Identify four stakeholder groups affected by the building of the dam. For each of the stakeholder groups identified, explain how they would be affected by the building of the dam.b First Electricity plans to use the reservoir behind the dam to provide either the hire of rowing boats or swimming
a FirstElectricity will need to recruit construction workers to build the dam. Outline four stages of the recruitment and selection process FirstElectricity will need to follow to employ these workers.b Using all of the information available to you from the case study, consider the advantages and
a Explain two effects on a business in Country Z if its exchange rate rises [appreciates).b FirstElectricity is considering offering bribes to government employees to get permission to build the dam. Is this right? Justify your answer.
a Explain two external costs and two external benefits of building the dam.b Do you think the government should encourage the location of a multinational company in Country Z? Justify your answer.
Beema is a successful business that makes shoes in Country B. It imports some of the leather and the machines it uses, and exports 30 per cent of its output. Recently the currency of Country B has fallen in value (depreciated). Beema's managers are planning to open a second factory. This will be
1 PaintCo manufactures specialist paints for aircraft. It has taken advantage of globalisation. The research department recruits scientists from several countries. Until ten years ago it only had one large factory in Europe. Now PaintCo has four factories in low-cost countries. Raw materials are
Since arriving in 2008, Starbucks has been opening new locations in Argentina at a rate of approximately 12 cafés per year. The company opened its 111th café in 2017, reflecting the shift of consumers in rural Argentina towards global brands. Some people in Argentina have very mixed feelings
Showing 700 - 800
of 1029
1
2
3
4
5
6
7
8
9
10
11
Step by Step Answers