0% found this document useful (0 votes)
18 views8 pages

2019

The document outlines various functionalities and features of smartphones, tablets, and smartwatches, including connectivity options, application software, and the role of CPUs. It also discusses the impact of technology on accessibility, online services, and the importance of security measures like encryption. Additionally, it highlights the advantages of local and cloud-based services in educational settings and the implications of using virtual learning environments (VLEs) for learners.

Uploaded by

thethninei2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views8 pages

2019

The document outlines various functionalities and features of smartphones, tablets, and smartwatches, including connectivity options, application software, and the role of CPUs. It also discusses the impact of technology on accessibility, online services, and the importance of security measures like encryption. Additionally, it highlights the advantages of local and cloud-based services in educational settings and the implications of using virtual learning environments (VLEs) for learners.

Uploaded by

thethninei2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

1. Kiki buys a smartphone.

(a) The smartphone uses a sensor that detects movement of the device.
One way in which the smartphone uses data from the sensor is to switch itself off if
dropped. Give two other ways in which the smartphone could use data from the sensor.
(2)
Ans: 1. Rotating the screen / change the view 2. Compass 3. Music player 4. Crash
sensors 5. Step counter / Health apps 6. Controlling/playing games 7. Image stabilisation
8. To turn the device on 9. Raise to answer.
------------------------------------------------------------------------------------------------------------
(b) Smartphones can be connected using wired or wireless methods.
(i) Give two advantages to Kiki of using a wired method to connect to the smartphone. (2)
Ans: 10.Faster / higher bandwidth / lower latency 11. More stable connection 12. Less
interference (e.g. dropped packets, loss of data) / Not affected by physical obstructions
(e.g. walls) 13. More secure 14. Password not needed.
------------------------------------------------------------------------------------------------------------
(ii) Give two advantages to Kiki of using a wireless method to connect to the smartphone.
(2)
Ans: 1.Can move around (while transferring data) 2. Does not have to waste time finding
/ connecting cables 3. Cost of cables / cheaper 4. Health and safety / no trailing wires.
------------------------------------------------------------------------------------------------------------
(c) The smartphone uses a SIM card. Which one of these is a type of connectivity that the
SIM card provides? (1)

Ans: D
------------------------------------------------------------------------------------------------------------
(d) Kiki meets her friend, Zara.
(i) Draw a diagram to show how Kiki’s smartphone can be used to provide Zara’s tablet
computer with an Internet connection.
Label each component and the connectivity you use in your diagram. (4)
Ans: A drawing that shows: ● A smartphone connected to the Internet / mobile phone
mast ● Correct connectivity identified for this (3G, 4G etc.) ● Tablet directly connected
to smartphone (4) ● Correct connectivity identified for this (Bluetooth / Wi-Fi / USB etc.)

1
(ii) Explain why sharing an Internet connection would affect the bandwidth available to
Kiki’s smartphone. (2)
Ans: An explanation to include two from: Kiki will have less bandwidth (1) because it is
fixed (1) and it must be divided between each device/person (1).
------------------------------------------------------------------------------------------------------------
(e) Kiki’s smartphone and Zara’s tablet computer share a lot of the same functionality.
State the term used to describe this. (1)
Ans: Converged / Convergence.
------------------------------------------------------------------------------------------------------------
(f) The smartphone has a 4 GHz CPU. Describe the function of a CPU. (2)
Ans: To fetch/decode/execute (1) data/instructions (1).
------------------------------------------------------------------------------------------------------------
(g) The smartphone uses application software.
Describe the purpose of application software. (2)
Ans: A description that includes two from: A program designed so that a user (1) can
carry out a particular task (1) such as write letters, mainupate images [etc.] (1)
------------------------------------------------------------------------------------------------------------
(h) Explain one benefit of using solid state storage with a smartphone. (2)
Ans: An explanation such as: ● Data (transfer) will not be negatively affected by
movement / less risk of damage to the drive (1). because solid state storage does not use
moving parts (1) OR ● Smartphones are portable (1) because solid state storage takes up
less space / has no moving parts (1) OR Additional Guidance Do Not Accept Mark (2) ●
Longer battery life (1) because solid state storage uses less power (1)
------------------------------------------------------------------------------------------------------------
(i) Kiki’s smartphone uses an open source operating system.
Which one of these describes the source code in an open source operating system? (1)

Ans: B
2. Zara uses her tablet computer to watch TV online.
(a) Describe the function of a router. (2)

2
Ans: A description to include two from: ● Stores IP addresses (in a routing table) ● Reads
the packet header ● Takes the recipient's address ● Compares the (recipient’s) address to
the addresses of all devices that are connected to it (2) ● Forwards the packet / network
traffic to its destination ● Using the quickest/most efficient route.
------------------------------------------------------------------------------------------------------------
(b) State two benefits to Zara of online TV. (2)
Ans: Any two from: 1. Wider variety of content 2. Always available / catch up 3. Access
from anywhere (with a connection) 4. Access from any (connected) device 5. Open access
(not as restricted by political factors etc.) 6. Can pause / fast forward / rewind 7.
Suggestions for shows can be made 8. Can be interactive 9. Can save money by not
buying a TV licence.
------------------------------------------------------------------------------------------------------------
(c) Zara streams an online video. She sees the notice shown in Figure 1.

Describe what has happened to Zara. (4)


Ans: A description to include four from: Zara is a victim of ransomware (1) which is
malicious software/malware (1) that has been downloaded/installed (1) encrypting her
files (1) using a key/cipher (1). OR Zara is a victim of scareware (1) which is
malicious software (1) that appears to have been downloaded/installed (1) and
encrypted her files (1).
-------------------------------------------------------------------------------------------------------
(d) Give two benefits to Zara of connecting her tablet computer to her television. (2)
Ans: Any two from: 1. Can take advantage of higher resolution 2. Can take advantage
of bigger screen 3. Fewer health and safety risks (e.g. eye strain / RSI) 4. Can take
advantage of louder/clearer/better speakers/audio
-------------------------------------------------------------------------------------------------------
(e) Zara uses a PIN to unlock her tablet computer. List three other methods she could use
to prevent unauthorised access to her data. (3)

3
Ans: Any three from: 1. Facial recognition / face ID 2. Fingerprint recognition / touch
ID 3. Voice recognition 4. Iris recognition 5. Password 6. Pattern 7. Encryption 8.
Anti-malware. Accept ‘biometric’ if mark points 1, 2, 3 or 4 are not already awarded.
-------------------------------------------------------------------------------------------------------
(f) Explain one advantage of using hosted applications with tablet computers. (2)
Ans: An explanation such as: Hosted applications take up less
storage/memory/resources (1) because they don't have to be installed onto the tablet
(1). OR Apps are updated regularly/automatically (1) by the host / meaning that users
don’t have to do it (1). OR Hosted applications are stored online (1) so users can
collaborate (in real time) (1).
-------------------------------------------------------------------------------------------------------
(g) Explain one advantage of using locally installed applications. (2)
Ans: An explanation such as: Can use software anywhere (1) without an Internet
connection (1). OR Will load/run faster / without lag (1) because the data is
immediately accessible / no connectivity is required (1). OR Has more/unique features
(1) because resources are/must be available on the local machine (1).
-------------------------------------------------------------------------------------------------------
3. Ruwan uses a smartwatch when he exercises.
(a) The smartwatch can connect to a Bluetooth health monitor. Which one of these
describes Bluetooth? (1)

Ans: C
---------------------------------------------------------------------------------------------------------
(b) The health monitor uses Bluetooth to transfer data to the smartwatch.
(i) Explain why Bluetooth rather than infrared is used for this transfer. (2)
Ans: An explanation such as: Infrared requires line of sight / Bluetooth does not
require line of sight (1) which is not always possible when exercising (1)
---------------------------------------------------------------------------------------------------------
(ii) Give two factors that might affect the speed of the transfer. (2)
Ans: Any two from: 1. Range / distance 2. Bandwidth 3. Interference 4. Physical
blockages.
---------------------------------------------------------------------------------------------------------
(c) Some data needs to be encrypted when it is transferred. Describe how encryption helps
keep data secure. (2)
Ans: A description such as: Randomises/encodes/scrambles the data (1) So that it
cannot be read/understood / needs to be decrypted / requires a key (1).
---------------------------------------------------------------------------------------------------------
(d) Ruwan’s smartwatch uses GPS to monitor his location. Give two pieces of information
that could be calculated using GPS data. (2)

4
Ans: Any two from: 1. Speed 2. Estimated time of arrival (ETA) 3. Time to destination
4. Quickest route 5. Shortest route 6. Distance travelled 7. Distance to destination 8.
Direction/heading/bearing 9. Steps taken.
---------------------------------------------------------------------------------------------------------
(e) Some social networking services use GPS data. Describe how the use of GPS data
could place social network users at risk. (2)
Ans: User’s location is published / accessible (1) and this information might be shared
/ used inappropriately (1).
---------------------------------------------------------------------------------------------------------
(f) The health monitor stores 4 MiB of data.
Construct an expression to show how many bits are in 4 MiB. (3)
Ans: ● 1 mark for sight of 8 ● 1 mark for sight of 1024 ● 1 mark for complete
expression (4 x 10242 x 8) that includes 10242 OR 1024 x 1024 OR 220 and each
component multiplied. Accept 1000 for 1024
Award all three marks for the result of the calculation: 33,554,432 Accept 32,000,000
---------------------------------------------------------------------------------------------------------
(g) Ruwan purchased his smartwatch online. Describe two ways in which the Internet can
impact positively on companies that sell goods. (4)
Ans: Two descriptions such as: 1. The Internet has a wider/global/24 hour reach (1)
which makes more customers available (1). 2. Use of accessibility features on a
company's online store (1) makes it easier for customers with disabilities to purchase
its products (1). 3. Saves (company) money (1) as no need for physical shops / rent /
store employees (1) 4. People’s browsing habits can be recorded/analysed to allow (1)
targeted marketing / personalised experience (1) 5. Online reviews (1) help
market/promote the company (1)
---------------------------------------------------------------------------------------------------------
4. Ruwan searches online for local sporting events.
(a) Ruwan evaluates the fitness for purpose of the search results.
(i) Complete this table to show how each property can negatively affect the fitness for
purpose of information.(3)

Ans: Bias: May focus on only one point of view / not contain full information. Age:
Information may be out date / irrelevant now. Reliability: Information may not match
other sources / be inconsistent.

5
(ii) Which one of these is another property of information that affects fitness for
purpose?(1)

Ans: D
------------------------------------------------------------------------------------------------------------
(iii) Which one of these would improve the ranking of a search result?(1)

Ans:D
------------------------------------------------------------------------------------------------------------
(b) Explain why Ruwan must consider his use of keywords when using a search engine.
(2)
Ans: An explanation such as: If specific keywords are entered into the search engine (1),
more relevant results will be returned/matched (1). OR If vague keywords are entered into
the search engine (1) less relevant results will be returned/matched (1). OR Keywords are
compared (1) with the content of web pages / providing more relevant results (1).
------------------------------------------------------------------------------------------------------------
(c) Zara enters the same search term as Ruwan but receives different results. Explain why
Zara receives different results. (2)
Ans: An explanation such as: The results Zara receives are personalised (1) because
cookies / transactional data / previous search history is used (1). OR If the search is not
done at exactly the same time (1) then the algorithm may have updated (the index) (1) OR
A different search engine / browser is used (1) that uses a filter / different algorithm (1)
------------------------------------------------------------------------------------------------------------
(d) Which one of these is a protocol used to transfer data on the Internet? (1)

Ans: B
------------------------------------------------------------------------------------------------------------
(e) Describe how MAC addresses can be used to prevent access to networks. (3)
Ans: A description such as: Every device/NIC has a unique MAC address (1) that can be
blacklisted/whitelisted/checked/filtered (1) by a firewall (1).

6
------------------------------------------------------------------------------------------------------------
(f) Analyse how the use of cloud-based services has impacted on the gap between the
information rich and the information poor. (8)
Ans: Candidates should identify points/issues/information/outcomes related to how cloud-
based services have impacted on the gap between the information rich and the
information poor by widening and narrowing it. The indicative content is not
exhaustive/prescriptive and candidates should be credited for other relevant content. + +
Availability of services is wider-reaching (to those in remote, island locations, for
example) + Availability of services restricted to those with access + Knowledge can be
shared more easily + More learning opportunities thanks to VLEs and MOOCs + Gap
widens due to [causes of the digital divide] + Gap narrows due to affordability of devices
facilitated by hosted applications (lower device storage and processing costs if hosted)
------------------------------------------------------------------------------------------------------------
5. James teaches in a school that uses a local area network and a wide area network.
(a) Give one example of a wide area network. (1)
Ans: Any one from: ● The Internet (1) ● A network that uses third-party infrastructure.
------------------------------------------------------------------------------------------------------------
(b) Some learners have accessibility needs.
Complete the table to describe how two peripheral devices designed specifically for
accessibility could improve the learning of people with accessibility needs. (4)

Ans: Two descriptions such as: ● Gesture interface (1) allows data entry for those with
low levels of mobility/dexterity (1) ● Braille keyboards (1) would allow those with visual
impairments to enter data (1). ● Reading pen (1) allows users with dyslexia to interpret
text (1)
------------------------------------------------------------------------------------------------------------
(c) Describe two benefits to teachers of using a local area network. (4)

7
Ans: Two descriptions such as: ● Can share printers (1) to reduce printer costs (1) ● Can
share/store files/software (1) so they are accessible by colleagues and pupils (1) ● Can
communicate (1) using email (1)
-----------------------------------------------------------------------------------------------------------
(d) One type of backup procedure the school could use is incremental backup.
State one other backup procedure the school could use to secure its data. (1)
Ans: Any one from: ● Differential ● Full ● Partial. Allow ‘Grandfather, father, son’.
------------------------------------------------------------------------------------------------------------
(e) Explain the purpose of an acceptable use policy. (3)
Ans: An explanation such as: Rules (1) and consequences (1) to prevent users from
behaving inappropriately / encourage users to behave appropriately (1). OR
Companies can protect their reputation (1) by preventing inappropriate actions of their
employees (1) to avoid financial losses (1).
-------------------------------------------------------------------------------------------------------
(f) The learners use communication software.
Describe the purpose of communication software. (2)
Ans: A description such as: To enable the exchange/sharing/sending (1) of files /
information / messages / text / images / audio / video (1)
-------------------------------------------------------------------------------------------------------
(g) Discuss the impact of VLEs on learners. (8)
Ans: + Availability of work 24/7/365 + Personalised / adaptive learning + Organised
(noticeboard / wall / assignment calendar) + Instant / automatic grading and
gradebooks to monitor progress + Revision materials + Can increase contact with
teacher beyond class time + Multimedia can be engaging + Accessibility for those
who find attendance difficult + Collaboration
- Could reduce face-to-face teacher contact so cannot ask for clarification as easily - -
- - - Collaborative tools are not as personal as face-to-face Limited assessment
methods, overreliance on multiple-choice / closed questions Expectations for
engagement are raised so potential for lack of study/life balance Hosted online so
could lead to distractions Could restrict access (digital divde)

You might also like