The data logger contains input, output and storage components


Identify one component that is used for input.


Identify one component that is used for output.


Identify one component that is used for storage.


One from:


heart rate sensor (1)

buttons (1)

on/off switch (1)


One from:

LCD/screen (1)

Speaker (1)


flash memory card (1)

built-in data logger (1)

The computerised data logger contains an analogue to digital converter.

Explain why this is needed.

Two from:


  • sensors produce/send analogue (data) (1)
  • computers only use/read digital (data) (1)


OR One mark only for response similar to:


(data) needs to be changed/converted so computer can use/see it. (1)

Describe one difference between computer monitoring and computer control.
One difference from:


  • use of feedback in control (1) monitoring only records data (1)
  • response to data in control eg switch on/off/adjust actuator (1) but no response in monitoring (1)
  • in monitoring the computer takes no action (1) control computer takes action (1).
Discuss the impact of the increased use of ICT on the way people spend their leisure time.

impacts could be:

use of microprocessor controlled devices for household chores freeing time for other activities

use of microprocessor controlled devices for entertainment eg TV, radio, games consoles, set top boxes

use of computers for research/leisure/games/making contact with others

health related use of ICT in eg monitoring, measuring health parameters/training/keep fit

security/personal alarms

mobile phones/PDA/smart phone usage for eg contacts/games/etc as ICT “relaxes” the boundary between solitary and social activities

ability of ICT to facilitate spontaneous or short-notice meetings may increase time spent in social rather than solitary activities.

increase in range of activities eg TV, games, negative impacts eg:

less exercise due to increased use of eg PCs, games consoles, internet

alternative activities eg sports, walking, etc are “crowded out” and no longer feature in leisure time use i.e. ICT is substituted for these activities

quality of an experience via the use of an ICT alternative may be inferior than the real thing

Describe two differences between email and instant messaging.
Give one benefit and one drawback of using text messages to communicate with friends.
Sarbjit plans to use video conferencing to keep in contact with his business colleagues.

Identify three devices Sarbjit must have in his computer system so he can set up a video conference. Give a reason for having each one.

Three devices from:


1. video/web camera (1) for sending/capturing image of himself (1)
2. microphone (1) to capture sound/voice (1)
3. monitor (1) to display image of other participant(s) (1)
4. speakers/headphones (1) to hear other participant(s) (1)
5. network card (NIC) (1) to connect to a network (1)
6. router (1) to connect to internet (1)

Complete the table below by stating the most suitable type of software 

 A user name and password are required to access the computers on a school network.


(a) What is the purpose of the user name?

 (b) What is the purpose of the password?

User name


identifies user (to system) (1)

sets up access rights/profile (1)

allows access to the user files/folders (1)




security (1)

ensures that only the user can access the system (1)

Explain, using examples, what is meant by the term malicious software.
Examples from:


virus, spyware/keyloggers, malware, adware, Trojan, worm


Explaination from:


enters a computer without the consent of user/owner

capturing data without the knowledge/consent of the user

intended to do harm to host computer/files (1)

Describe two ways a school can try to prevent malicious software affecting its computers

Two descriptions from:


.  ban the use of USB flash memory drives/floppy disks/other external devices (1) to stop malware being brought in (1)

.  install/use anti-virus/other preventive software (1) to scan files as they arrive (1) to scan files on the system (1)

.  restrict use of external email (1) to avoid malware in attachments (1)

.  restrict web sites access (1) to avoid sites which carry malware (1)

.  user policies (1) instruct user not to download files unless from known/safe source (1)

.  firewall (1) to control data flow in/out of a network (1)

Many companies store the personal details of their customers.

How does the Data Protection Act attempt to protect the rights of the customers.

The DPA states that anyone collecting personal information must:

1. fairly and lawfully process it

2. process it only for limited, specifically stated purposes

3. use the information in a way that is adequate, relevant and not excessive

4. use the information accurately

5. keep the information on file no longer than absolutely necessary

6. process the information in accordance with your legal rights

7. keep the information secure

8. never transfer the information outside the UK without adequate protection

Students in a school use netbooks for their work.Tick one box in each row to show whether each device is used for storage, input or output.  The first one has been done for you
Explain one advantage of using a netbook rather than a desktop computer for school work.

One explanation of advantages from:


1. portable/small/lightweight – can be carried and used anywhere

2. use batteries/do not need mains electricity supply – can be used away from buildings/mains electricity /while moving/travelling

3. have wireless networking/WiFi – can connect to the internet while away from main base/home/travelling.

Give two disadvantages of using a netbook, rather than a desktop computer, for school


Two disadvantages from:

1.  can be easily lost/misplaced/dropped (resulting in loss of schoolwork)

2.  difficult to see/read (schoolwork)

3.  difficult to type/use (schoolwork)

4.  no optical drive fitted internally/ need an external device /cannot use CDs/DVDs (to save backup work)

5.  battery life may be short/limited/need frequent recharges/may shut down when needed (may lose work)

A USB flash memory drive may be used for storing a backup of a file.

What is a backup?

a copy (of files)
Explain one reason why a USB flash memory drive is suitable for storing backups.
One explanation of an advantage from:


1.  portable – can be stored away from netbook/computer

2.  small – easily stored

3.  large enough memory – to store large/many files

4.  ease of use – no special software needed/can simply plug in the device.

Vaneesa is a school student. She often uses chat rooms from home to keep in contact with other



Give four precautions that Vaneesa should take when using chat rooms.

Four from:

1. never give out personal details eg school information, telephone numbers, favourite places to visit

2. be wary of discussing/revealing the address/(general) area in which you live

3. never use a (revealing) photograph of yourself

4. check who you are in contact with/only talk to people you know

5. never arrange to meet a contact that you do not already know

6. never allow yourself to be persuaded to indulge in any activity that worries you

7. report any suspicious activity to parents / adults / responsible people.

Vaneesa uses her netbook for accessing chat rooms, often for long periods of time.


State two health problems that Vaneesa might develop as a result of this, and how she could

avoid them.

Two from:

RSI – appropriate precaution e.g. regular breaks, correct positioning of hardware items/chairs

eye problems – appropriate precaution e.g. regular breaks, correct positioning of hardware items/chairs, appropriate screen resolution/brightness, use external monitor

back and neck problems – appropriate precaution e.g. regular breaks, correct seating position/placing of netbook

wrist problems – appropriate precaution e.g. regular breaks, correct positioning of netbook for typing/use of external keyboard/mouse and rests, use external keyboard.

Steve has been asked to create a presentation to show how to use the different settings on a

digital camera.

Describe how three different multimedia features could be used to enhance this presentation.

Three descriptions from:


1. (use of) sound – for background music,sound effects

2. animation sequences – to demonstrate actions, to move text/images

3. video/movie sequences/images – to show use of device

4. voice output – for a narrative, output recorded interviews with users

5. (hyper)links – to link with websites about mobile phones, move between sections/parts/slides of the presentation

6. slide transitions – to change slides automatically, 

make transitions more appealing to audience.

Airport staff use ICT to security check passengers and their baggage before they are allowed

on a flight.

What ways can ICT be used in  airport security.

ICT use:

1. use of RFID in baggage for tracking bags

2. CCTV cameras recording people in the airport

3. facial recognition

4. software

5. machine readable ID/passports cross check with databases of people/wanted persons

6. use of biometrics

7. use of body scanners

8. remote check in/pre boarding passes printed at home, with checks on the person.


Airport staff use ICT to security check passengers and their baggage before they are allowed

on a flight.

What is the impact on passengers of the use of ICT in security.

Impacts include:



1. ability of reserve seats/check availability

2. effect on privacy/rights of the individual

3. delays at check in by security checks/check in may be faster

4. slow throughput at security

5. safety impacts. 

A computer’s operating system uses a Graphical User Interface (GUI).

State three features of a GUI, giving one benefit of each.

Three from:

1. windows/dialog boxes e.g. easy to use/navigate

2. icons e.g. no language skills needed to understand

3. menus e.g. simple to navigate for options

4. pointer/mouse e.g. to select/choose items

5. help feature e.g. no need for knowledge/manual

6. drag & drop e.g. can move objects around easily

7. toolbars e.g. easy to find/grouping of tools/options

8. screen resembles desktop  e.g. familiar working environment.


Describe how data encryption is used to keep information safe from unauthorised users.
Two from:


1. data is scrambled


2. key used to encrypt/decrypt


3. data cannot be understood unless decrypted/have key.

Bert and Theresa have a number of appliances in their home that contain embedded systems.

What are the features of an embedded system.

Features of an embedded system:

1. real time operation

2. dedicated to specific tasks/functions

3. inbuilt sub-functions e.g. different spin speed/temperature combinations

4. embedded program cannot be changed by user

5. no need for user to change embedded program

6. require little memory to run

7. require no keyboard or other peripherals other than e.g. basic input buttons.

Identify two sensors that would be used in the washing machine.
Two from:


1. pressure


2. temperature


3. water level


4. tilt switch.

What are the benefits and drawbacks of using appliances with embedded systems.

Answers may include:

1. references to freeing time for other purposes

2. automatic control of events/tasks

3. energy saving settings

4. programmable settings

5. storing frequently used settings

6. use of leisure time

7. cost

8. difficult to repair/ not user repairable

9. features are included that may not be required by most users.