Ict Book Answers
Ict Book Answers
1 a PC or desktop
b laptop
c tablet
d smartphone
2 CLI GUI
() ()
Instructions have to be typed in
Applications are represented by icons
Options are chosen from a menu
Many instructions have to be memorised
3 • PCs/laptops are needed for applications which require high speed processing.
• PCs/laptops are needed for applications which require greater internal memory capacity.
• PCs/laptops are needed for applications which require greater backing storage capacity.
• PCs/laptops are needed for applications which require larger screens.
• PCs/laptops are needed for applications which require more manageable keyboards.
• PCs/laptops are needed for applications which require easy navigation from screen
to screen.
• PCs/laptops are have access to a wider range of application software.
• PCs/laptops are still needed to carry out complex mathematical functions.
• It is easier to monitor the use of PCs/laptops.
5 RAM ROM
() ()
Data on the chip is stored temporarily and can be deleted by the user
Stores data, files or part of the operating system which is currently in use
6 a AR:
• The user experiences the relationship between the virtual and the real world.
• Virtual information and objects are overlaid onto a real-world situation.
• The user can experience the AR world through goggles or smartphone screens.
VR:
• It has the ability to take the user out of the real world and into the virtual world.
• The user is fully immersed into a simulated digital world.
• The user must wear a VR headset/head-mounted display.
3 a (c) keyboard
b (d) scanner
c (a) reading barcodes
d (e) dot matrix printer
e (a) (graph) plotter
f (b) laser printer
g (c) heat
h (a) CRT monitor
i (e) mouse
j (e) (graph) plotter
4
5 a QR code
b OMR
c sensor
d microphone
e scanner
f remote control
g RFID reader
h laser printer
i dot matrix printer
j mouse
8 ()
Pressure sensor
Oxygen level sensor
Wind speed sensor
Sound sensor
Body sensor
Moisture sensor
Infrared sensor
Touch sensor
9 a Device
Data from the starting pistol is read by this device sound sensor
This device detects that the athlete has left the starting block pressure sensor
When the light beam is broken the data is read by this device infrared sensor
b Digital camera (or camera card reader) connected to the computer as an input, to transfer
the camera's image files to the computer for storage and use. Printed photographs put
through a scanner that is connected to computer as an input device, to create digital image
files to be stored and used.
10 True False
() ()
Answers to multiple-choice examination papers can be read
using an optical mark reader (OMR)
1 CD DVD Blu-ray
() () ()
SSD
Blu-ray
Pen Drive
3 a Optical media:
• relies on optical/light properties of laser light
• laser is used to read/write data on disk
• data is stored in lands and pits
• uses red or blue laser light.
b Four from:
• SSD more reliable since there are no moving parts
• SSD considerably lighter in weight
• SSD does not need to ‘get up to speed’ to work
• SSD lower power consumption therefore it runs cooler
• SSD very thin because there are no moving parts
• SSD data access time is 100 times faster
• SSD data read speed is much faster.
4
5 • direct access
• media
• platters
• latency
• data transfer rate
• data access time
• Blu-ray discs
• three-year period
• SSD endurance
• memory sticks
6 True False
Statements
() ()
Both DVDs and Blu-ray discs can make use of dual-layering technology
Solid state drives wear out very quickly due to rapid electron movements
in the transistors that make up the memory matrix
Cloud storage makes use of Blu-ray discs to store customers' music and
photo files
Platters on an HDD can be recorded on both the bottom and top surface
HDDs suffers from latency due to the time taken for a specific block of
data on a data track to rotate around to the read-write head
The data transfer rate is the time taken to locate data on an HDD platter
The areas on a DVD where 1s and 0s are stored are called pits and lands
7 a i Three from:
• Blu-ray uses blue laser light/DVD uses red laser light
• Blu-ray has a much larger storage capacity
• Blu-ray has a secure encryption system built in
• Blu-ray track pitch 0.3 µm compared to 0.74 µm.
ii Blu-ray – high definition movies/back-up hard devices, DVD – CCTV
systems/recording TV programmes.
b i Three from:
• SSDs have no moving parts
• SSDs have low power consumption
• SSDs have limited endurance
• SSDs are lightweight and thin
• HDDs use rotating disks and read/write heads
• HDD have high power consumption
• HDDs suffer from latency
• HDDs can undertake a greater number of read/write operations.
ii HDDs are used as cloud severs and back-up devices. SSDs are used in smartphones
and tablets as the main memory.
8 a • use of cloud storage replacing users' own HDDs and SSDs
• SSD is more reliable (no moving parts)
• SSDs have lower power consumption (less heat generated) than HDDs
• SSDs are much lighter and thinner (allowed development of laptops, tablets
and smartphones)
• SSDs have a much faster data access time than HDDs
b • Technologies which do not need to get up to speed allow instant access
• use of MP3 format replacing audio CDs
• streaming is replacing the need for CDs/DVDs/Blu-ray disks
• development of memory sticks replacing CDs and DVDs.
1 a Three from:
• video camera/webcam
• microphone
• keyboard
• large screen/monitor/data projector
• speakers/headphones.
b A web conference:
• is held over the internet using TCP/IP connection/in real time, for example,
webinar/webcasts/VoIP
• can be point to point (VoIP) or multicast (i.e. source data is sent from one computer to
many different receiving computers)
• allows text communication
• allows video communication
• uses web browsers.
c • data packets are sent from the computer in network ‘A’ to the nearest router
• the router checks IP address and notes the data packets that aren’t intended for any
devices on network ‘A’
• data packets are forwarded to other routers in network
• data packets are forwarded to the router linked to network ‘B’ using its IP address
• the router recognises the IP addresses of data packets referred to network ‘B’
• data packets are forwarded to the destination computer on network ‘B’.
4 a Zero login:
• allows users to log into a computer system without the need to type in a password
• relies on biometrics …
• … and on behavioural patterns …
• biometrics: fingerprints, facial recognition
• behavioural: typing speed, location, how the user swipes the screen
• the systems use the above information to build up complex user profiles.
b Physical token:
• a type of hardware security device
• form of authentication …
• … to prove user has possession of the token
• when the PIN is entered into token, a one-time password (OTP) is created and shown
on screen
• the code changes every 30 sec or so
• the OTP is typed into another device as part of a security authentication process
• can be connected or disconnected (for example, through USB).
c Electronic token:
• software installed on user's device as an app
• used to authenticate a user
• the user opens the app on a device which generates random numbers (OTP) …
• … which is valid for a limited amount of time
• the user enters the OTP onto the website using this type of authentication; often
includes a PIN, touch ID or face ID in addition
• the website server runs the same app
• both the user and the website use synchronised clocks and therefore generate the
same OTP.
All data packets are sent to all the devices on the network
6 a Virus – a program which replicates; the intention is to delete, corrupt or alter files/data to
prevent normal running of a computer.
b Three from:
• checks software or files before they are run or loaded onto a computer
• compares a potential virus against database of known viruses
• carries out heuristic checking (checking on behaviour of a program/file that could
indicate it is a virus)
• puts infected files or programs into quarantine
• automatically deletes the virus or allows the user to make the decision
• runs in the background
9 a Cloud computing:
• computing resources that can be accessed on separate and remote servers
• cloud computing can refer to storage or applications
• may be hundreds of servers in several locations
• the same data is stored on more than one database in case of maintenance and/or repair
(data redundancy)
• three types of cloud storage: public, private, hybrid.
b Three from:
• files can be accessed at any time, in any location, on any device
• there is no need to carry external storage with you; not even necessary to take a
computer containing files with you
• the cloud provides users with remote, automatic back-up
• the cloud allows recovery of data if the customer’s hard drive fails on their
own computer
• it offers unlimited storage capacity.
c Three from:
• it is not always secure
• if there is a poor internet connection, or none, the cloud cannot be used
• it can be expensive if large amounts of storage needed
• the potential failure of cloud storage companies is always possible; poses risk of losing
all back-up data.
10 a "A" = hub
b "B" = hub/switch, "C" = hub/switch, "D" = bridge
c "E" = hub/switch, "F" = router
1 a Three from:
• people do not have to do manual tasks anymore
• gives people more time for leisure, hobbies or socialising
• no need to stay at home to do cooking, washing clothes
• devices can be controlled from a smartphone or tablet remotely
• automated burglar alarms give a sense of security
• smart fridges/freezers lead to a healthier lifestyle
• devices are more energy efficient
• easier to ‘program’ devices to do a number of tasks.
b Three from:
• can lead to unhealthy lifestyles due to reliance on ready-made meals
• tend to make people lazy due to machine dependence
• people become less fit since devices do all the work
• loss of household skills
• cybersecurity risks
• wasteful since devices are thrown away when it breaks down
• can be more complex to operate
• leaving devices on stand-by is wasteful of energy.
2 Neck/back strain:
• use fully adjustable chairs and tilting screens
• can be difficult to get a comfortable position if there are too many adjustments.
RSI:
• correct posture using adjustable chairs
• take regular breaks and exercise
• use voice-activated software and ergonomic keyboards
• voice-activated software can annoy others
• voice-activated software is expensive but can remove many RSI risks
• regular breaks do not cost money, but exercise needs to be the correct type.
Eyestrain:
• take regular breaks and exercise
• use anti-glare screens
• have eyes tested on regular basis
• anti-glare screens only work if other factors are correct (for example, correct lighting)
• glasses on their own will not be totally effective
• eye tests can also help with neck strain since it is easier to read the screen.
Headaches: see notes above on eyestrain
Ozone irritation:
• poor ventilation in the room
• need for a dedicated printer room
• use inkjet printers instead
• only works if the printer room is properly ventilated
• using a dedicated room avoids the need to change the printers.
3 a Potential security issues:
• potential virus risks
• hacking into devices which are remotely controlled
• if not password-protected this might allow a criminal to gain personal data
(for example, a central heating system might contain holiday dates)
• if a fridge/freezer automatically orders food, it is possible to gain credit card details
• important to password protect every device if possible.
b True False
() ()
Using microprocessors has increased the longevity of devices in
the home, therefore reducing waste
5 a Advantages:
• if there is accident or traffic congestion, smart signs can keep traffic moving …
• … or warn traffic to leave the road
• improved safety since traffic can be warned in advance of adverse weather or an
accident
• can give helpful information such as time to next junction.
b Risks:
• hacking or virus
• if system is ‘taken over’ then there are potential safety risks.
6 ICT applications
Answers to exercises
6a Answers with student explanation of how the feature is to be used:
• search and replace
• margins
• cut and paste
• import
• spellchecker
• drawing
• type fonts/size
• tables.
6b Posters printed out by the student.
6c Advantages with student explanation:
• no need to buy physical copies of books
• no need for customers to carry heavy books around with them
• can read anywhere
• easy to page mark
• easier to use text in customers' documents.
Disadvantages with student explanation:
• sometimes harder to read than a book
• devices are not cheap to buy
• no physical object to own.
6d Spreadsheet produced and printed out; makes use of graphics.
6e Pilot training – Easier/safer to make changes to a model
Environmental modelling – Takes too long to get results back from the real thing
Simulating bridge loading – Cost of building the real thing is too expensive
Nuclear reactor model – Some situations are too dangerous for humans
Space exploration – It is almost impossible to do the tasks for real
6f Examples:
• bottling plant
• canning plant
• car production
• television production
• clothing manufacturing.
Look for functions such as:
• filling bottles/filling cans
• labelling
• fitting caps/welding cans
• spraying bodies/panels
• fitting windscreens
• weld body shell
• fit screen into surroundings
• fit electronic components
• control linking of fibres and so on.
Look for advantages such as:
• faster operations
• greater productivity (the production can run 24 hours a day, every day)
• greater consistency
• built-in quality control
• reduced cost to the consumer.
Look for disadvantages such as:
• deskilled workforce
• expensive to set up
• any changes to designs or process need human to intervene, reprogram, etc.
6g • days selected
• flight lines selected
• destination + departure airports selected
• number of passengers input
• credit/debit card details input
• passenger information provided
• one seat allocated, removed (flagged) on database to stop double-booking
• ticket sent as QR code.
6h 1 Advantages:
• most efficient route
• more deliveries per day
• faster way/service.
2 Disadvantages:
• cannot always take roadworks into account
• expensive software
• sometimes the most logical route is not the fastest.
6i Sequence: A, D, C, E, G, J, distance: 49 km
6j 1 For example: a Identification of chemical
• gather identification techniques from chemists and sources such as the internet/books
• this data is entered into a knowledge base …
• … in the form of objects and attributes
• … for example, object: sodium chloride
• attribute: yellow flame test
• attribute: white precipitate with silver chloride
• rules base is also created containing inference rules
• for example, if flame test = yellow THEN it contains sodium, etc.
• develop the user interface as a series of Yes/No questions
• for example, is the chemical white in colour? Yes/No
• finally, the system is tested with data with a known outcome so that the performance of
the expert system can be judged.
2 For example: 2b identify an 'unknown' chemical compound
6k 1 knowledge base
2 explanation system
3 expert system shell
4 rules base
6l 1 Article printed out showing pros and cons of shopping online.
2 Examples: supermarkets, libraries, luggage handling at airport. Could use RFID tags in
some applications. Barcodes are still widely used because they are simple, widespread and
cheaper than other systems such as RFID.
6m • car number plate read by camera
• OCR software identifies characters on number plate
• allows speeding cars to be identified
• allows car routes to be monitored
• allows lanes to be closed or opened to improve traffic flow.
Answers to exam-style questions
Answers to questions 2, 4, 5 and 7 in this section are example answers for past paper questions. The details
of the relevant past paper can be found with the corresponding exam-style question in the Student’s Book.
b Two from:
• any changes needed to mining equipment/rock type requires reprogramming of
the system
• reprogramming takes time
• reprogramming can increase the cost
• setting up the robot in the mine will be dangerous for humans
• expensive to maintain/repair
• the initial cost of a robot is high.
4 a • the washing machine sends out a radio signal to read the data from the RFID
• RFIDs act as passive transponders
• clothing has a battery attached to the RFID
• a radio signal given out by the chip is read by the receiver using its antenna.
6 Four from:
• speeds up booking process
• no need for customer to travel to theatre, saving them travelling time
• no queuing
• reduces postage cost
• can amend booking at any time
• can book several shows
• no double-booking
• can book from anywhere, at any time.
7 Advantages:
• can ‘bank on the move’ therefore no need to visit a bank
• less physical money therefore safer
• available 24/7
• available anywhere in the world
• no need to go to the bank therefore saves money
• no need to go to the bank therefore saves time.
Disadvantages:
• fewer branches are available to customers
• non-IT literate users, or those that do not have internet access, are left out
• need to buy a computer
• chance of bank fraud
• physical money cannot be withdrawn/deposited
• easier to mismanage account.
• It is easier to make errors with online banking and transfer money incorrectly to
different accounts.
8 Advantages of internet shopping:
• There is no longer a need to travel into the town centre, thus reducing costs (money for
fuel, bus fares, etc.) and saving time; it also helps to reduce town centre congestion and
pollution.
• Users now have access to a worldwide market and can thus look for products that are
cheaper; this is obviously less expensive and less time consuming than having to shop
around by the more conventional methods; they will also have access to a much wider
choice of goods.
• Elderly people and people with disabilities can now access shops without the need to leave
home, which can be of great benefit.
• Because it is online, shopping can be done at any time on any day of the week (i.e. 24/7,
which is the term now used) – this is particularly helpful to people who work during the
day, as the shops may normally be closed when they finished work.
• People can spend more time doing other things, for example, going shopping to the
supermarket probably took up a lot of time; by doing this online (for example, setting up
repeat items) people are now free to do more leisure activities.
• There are often long queues at checkouts at the shops, so internet shopping saves time.
• The shops save money by not having as many staff working for them (reduced wage bill)
or hiring of high-street premises (reduction in rental costs) – these savings are often passed
on to the customer in the form of cheaper goods.
Disadvantages of internet shopping:
• There is the possibility of isolation and lack of socialisation if people stay at home to do all
their shopping.
• There are possible health risks associated with internet shopping because of lack of
exercise; if people physically go shopping then they are getting some exercise.
• Security issues are a major concern (for example, hacking, stealing credit card details, etc.)
as are viruses and other malware (for example, phishing, pharming and so on).
• Accidentally using fraudulent shopping websites is always a risk and this is linked to
security issues.
• It is necessary to have a computer and to pay for the internet to take part in online
shopping.
• Unlike high-street shopping, it is only possible to see a picture of the goods, which might
not portray the exact colour; you cannot try on an item of clothing to see if it fits before
buying it; you also have to wait several days for the goods to arrive; returning goods can
also be expensive.
• High-street shops are closing because of the increase in internet shopping and this is
leading to 'ghost towns' forming.
Effects on companies due to the spread of internet shopping:
Advantages
• Companies can save costs here because fewer staff need to be paid and it is not necessary
to have as many shops in high streets to deal with potential customers.
• Because the internet is global, the potential customer base is increased.
Disadvantages
• There will be some increased costs, however, because of the need to retrain staff and the
need to employ more staff in despatch departments.
• There are also costs due to the setting up and maintaining of websites to enable internet
shopping.
• Because there is very little or no customer-employee interaction, this could lead to a drop
in customer loyalty, which could lead to loss of customers (this could also be brought about
by the lack of personal service associated with internet shopping).
10 a
b i Explanation system:
• informs users of reasoning behind expert system conclusions and recommended
actions
• gives the percentage probability of accuracy of conclusions.
ii Inference engine:
• the main processing element of expert system
• acts as a search engine examining the knowledge base for information that matches
the queries
• the problem-solving part of expert system which uses inference rules from a
rules base
• the inference engine attempts to use the gathered information from the user to find
an object that matches.
iii Knowledge base:
• repository of facts
• stores all knowledge about an area of expertise obtained from a number of experts
• collection of objects and their attributes.
iv Rules base:
• set of interface rules
• … which are used by an inference engine to draw conclusions
• follows logical thinking, such as IF … THEN.
v User interface:
• expert system interacts with the user through dialogue boxes or command prompts
• usually has Yes/No answers and is based on responses from previous answers.
c • an interactive screen is presented to the user
• the system asks a series of questions about the fault found in the computer
• the user answers the questions asked
• a further series of questions are asked based on the user’s previous responses
• the inference engine compares faults entered with those in the knowledge base looking
for “known faults and their causes”
• once a match is found, the system suggests a remedy for the fault
• the system will give reasons for its recommendations including the probability that the
recommendations given will cure the fault
• the output will be in the form of text or a series of drawings showing internal
components and how to repair/replace them
• the user can request further information from the expert system.
11 True False
Statement
() ()
Building a computer model is much cheaper than building the real thing
One advantage of CAL is the ability of the student to stop at any point
and resume from where they left off at a later date
2 Name: text
Date of birth: format check
Telephone number: alphanumeric check
Order ref number: length check
Sex: presence check
Primary key field: order ref number (should be unique)
7c
15 month
12 month
07 month
1.6 month
1 month
0 month
13 month
March month
1 day
31 day ()
18 day
Tuesday day
45 day
0 day
30 day ()
2021 year
90.55 year
-25 year
1854 year
2 presence check
Using drop down boxes would avoid errors.
2 a Tick ()
Inputs to the current system
Data capture forms
Report layouts
Limitations of the system
Observation methods
Improvements to the system
User and information requirements
Validation routines
Problems with the current system
File structures
b this is data that has been used with current system/data not created for test purposes …
… therefore expected results are known
c Three from:
• program listing
• program language used
• program flowchart/algorithms
• system flowchart
• minimum memory requirements
• known 'bugs'
• file structures
• list of variables
• sample runs (and results)
• validation rules.
3 a Field name Data type
Breed_of_cow Text
Date_of_birth Date
Weight_of_cow Numeric: decimal/real
Average_milk_yield Numeric: decimal/real
Animal_passport_number Text
b Animal_passport_number
c format check
data in format: 3 digits/4 digits
length check
length of EXACTLY eight characters
4 Technical User
Description of component documentation documentation
() ()
Hardware requirements
Program flowcharts/algorithms
Troubleshooting guide/FAQs
Validation rules/routines
Program listing/coding
Glossary of terms
5 Analysis
Design
Development and testing
Implementation
Documentation
Evaluation
6 a Direct implementation
b Pilot implementation
c Length check
d Design stage
e Modules (modular design)
7 a • compare the final solution with the original task
• identify any limitations of the system
• identify any necessary improvements that need to be made
• evaluate the user’s responses to using the new system
• compare test results from the new system with results from the old system
• compare performance of the new system with performance of the old system
• observe users performing set tasks (compare old with new)
• measure the time taken to complete tasks (compare old with new)
• interview users to gather responses about how well the new system works
• give out questionnaires to gather responses about the ease of use of the new system.
d This is data that has been used with current system/data not created for test purposes
… therefore expected results are known.
Live data is used to test a new system, to make sure that the results of the new system
match the results from the old system.
9 a Three from:
• obsolescence of existing equipment
• changes to requirements or changes in law (for example, safety requirements or
environmental issues)
• old equipment cannot operate at the required levels
• there is no longer hardware and/or software support
• newer, more efficient and cleaner equipment
• the need to keep pace with competitors.
b Two from:
observation:
• possible to get better overall view of the current system
• results/data obtained are more reliable
• a relatively inexpensive method
• all inputs and outputs of the current system can be reviewed.
interviews:
• an analyst can probe more deeply how to get information needed
• can modify questions depending on previous responses
• body language and facial expression are key to truthful comments
• first-hand information from users.
questionnaires:
• very quick method of gaining data
• relatively inexpensive method
• individuals can be anonymous therefore there may be more truthful answers
• quick analysis is possible
• can be filled in at an interviewee's convenience.
existing paperwork:
• information could be obtained which may not be possible by the other methods
• an analyst can see for themselves how the paper system operates.
c Direct changeover:
• the company cannot go offline for more than eight hours
• therefore, none of the other phasing in methods will work
• the system needs to be changed overnight.
10
1 a Three from:
• electrocution
• fire hazard
• tripping hazard
• personal injury.
2 Three from:
• encrypt passwords
• change passwords on a regular basis
• only being asked for, or providing, a limited number of characters in a password
• two-factor authentication
3
4 a • Giving out personal information to people you do not know could be used to carry out
identity theft.
• Sending out photos of yourself to people you do not know could lead to identity theft
or somebody impersonating you.
• Privacy settings may allow strangers to see photos of yourself on social media sites.
• Photos you post can link you to a place or an address (for example, if they show the
number plate on a car because it is possible to find your address from this information,
or if they show some form of school uniform this gives somebody information about
where they can find you).
• Always maintain privacy settings to stop 'non-friends' from contacting you and also
make sure you control who has access to your profile.
• Making friends with people you do not know is very risky as people may not be who
they say they are (many of the photos on social media sites are false).
• It is very dangerous to use your real name in public social networking sites, instant
messaging or chat rooms.
• It is very dangerous to enter private chat rooms with strangers.
• A user should never arrange to meet anyone for the first time on their own and should
always tell an adult first.
b Personal, two from:
• name
• address or email address
• ID card number/passport number
• IP address
• cookie ID
• advertising identifier on mobile phone
• date of birth
• banking details
• personal photographs.
Sensitive, two from:
• ethnicity/racial origin
• political views
• member of a political party
• member of a trade union
• religion/philosophical beliefs
• sexual orientation/gender
• non-serious criminal records
• medical history
• genetic data/DNA
• biometric data.
5 Health Safety
Description of risk
() ()
7 • e-safety
• sensitive data
• privacy settings
• hacking
• phishing
• link
• smishing
• encrypted
• secure sockets layer
• digital certificate
• authenticity.
8 a Software or hardware which sits between computer and external network and filters
incoming and outgoing network traffic. Any traffic not meeting certain criteria is blocked
and gives a warning to the user.
b Four from:
• to examine the 'traffic' between user’s computer (or internal network) and a public
network (for example, the internet)
• to check whether incoming or outgoing data meets a given set of criteria
• if the data fails the criteria, the firewall will block the 'traffic' and give the user (or
network manager) a warning that there may be a security issue
• the firewall can be used to log all incoming and outgoing 'traffic' to allow later
interrogation by the user (or network manager)
• criteria can be set so that the firewall prevents access to certain undesirable sites; the
firewall can keep a list of all undesirable IP addresses
• it is possible for firewalls to help prevent viruses or hackers entering the user’s
computer (or internal network)
• the user is warned if some software on their system is trying to access an external data
source (for example, automatic software upgrade); the user is given the option of
allowing it to go ahead or request that such access is denied.
b Biometric
technique Advantages Disadvantages
11 a the ability of a user to prove who they are – three common factors:
• something you know (for example, PIN)
• something you have (for example, mobile phone)
• something unique to you (for example, biometrics).
b a form of verification which requires two methods of authentication to verify who user is,
for example:
• an 8-digit PIN is sent to somebody’s smartphone (known as on-time password/code
or OTP)
• this is layered into, for example, a website which then authorises the user
• the number is valid for a limited time period.
9 Audiences
Answers to exercises
9a Print out of the student’s presentations or on-screen slide show.
9b • sign a statement that you agree to privacy rules
• use a product key before software is actually downloaded
• software can record the MAC address therefore only allowing one device to
download software
• keep important files on a website which needs to be accessed when the software is run,
therefore only genuine software downloads would work since the product code could be
stored in the system and used as a passcode.
2 • age range
• income levels
• interests
• impairments
• location of students (which might affect language used).
3 ()
4 a software piracy – illegal copies of software (which are often distributed free of charge or
for a small fee)
b product key – a unique (for example, 4a3c0efab5aba8le) reference number which needs to
be keyed in before software can be installed on a user’s computer
• this checks whether the user downloading software has bought an original or they are
attempting to make multiple downloads
• the product key only works for a finite numbers of copies, which is part of the
purchase fee.
c copyright infringement – this is where copyright laws have been broken – for example,
illegal copying, illegal use of part of the software in another product, etc., using the name
of copyrighted software on another product and so on
5 a • If the user group is made up of older people, or even disabled people, who have visual
impairments, then it is important to make sure the kiosk has clear-to-read fonts
• Complex language can be a real turn off to people where, for example, English is their
second language; the text needs to be clear and easy to read for these reasons
• It is necessary to hold the attention of the users, otherwise they will give up using
the kiosk
• Good, attractive screen designs will attract users to the kiosk
• Keeping interfaces clear and easy to use attracts people; lots of typing can be very
frustrating, as can badly designed kiosk interfaces where the user seems to go 'round in
a big circle', unable to find what they want
b
c • interviewing a cross section of the target group to find out how to engage the audience
(if this involves a major ICT solution, then this may have to involve many of the
techniques that were described in Chapter 7)
• giving out questionnaires to people in the target group to find out their background,
interests, age range and so on, so that the final solution can be tailored to meet the full
range of the target audience
• carrying out market research – this could involve the two techniques described above,
but would certainly involve a more sophisticated and in-depth analysis of the data
received (it would depend on how large the target audience is likely to be).
b • a unique product key needs to be entered when the product is first installed
• the system will check for duplicated numbers
• the system only runs with CD-ROM/memory stick attached
• parts of software are stored on a memory stick/CD-ROM
• a dongle needs to be attached.
10 Communication
Answers to exercises
10a 1 John, Mary, Karl; Tim, Ahmed, Dimitri
2 John, Mary, Karl; Tim, Ahmed, Dimitri
3 Themselves plus John, Mary, Karl; Tim, Ahmed, Dimitri
4 Only the sender can see this.
10b A good, balanced argument from students. Each group should produce a poster showing the
reasons why it should be policed and reasons why it should not.
1 True False
Statement
() ()
All recipients of emails can see all the recipients in the Bcc and Cc lists
5 Intranet Internet
() ()
Information on the network is specific to a particular company or
organisation
7 a (b) ISP
b (a) Uniform resource locator
c (e) Secured
d (b) HTTP
e (e) name@website.info
f (d) Browsing
g (d) FTP
h (c) Allows a user to view webpages
i (c) Extranet
j (a) Spam