Professional Documents
Culture Documents
Information & Communication Technology: Paper 1: Written Paper
Information & Communication Technology: Paper 1: Written Paper
Time: 1 hour
IGCSE ICT MOCK 03
Instructions
• Use black ink or ball-point pen.
• Fill in the boxes at the top of this page with your name,
centre number and candidate number.
• Answer all questions.
• Answer the questions in the spaces provided
– there may be more space than you need.
Information
• The total mark for this paper is 50.
• –Theusemarks for each question are shown in brackets
this as a guide as to how much time to spend on each question.
Advice
• Keep
Read each question carefully before you start to answer it.
• Try toananswer
eye on the time.
• Check your answers
every question.
• if you have time at the end.
1. a) Which one of these is used to control internet traffic entering a network? (1)
I. Server
II. Backup
III. Firewall
IV. Encryption
…………………………………………………………………………………………
…………………………………………………………………………………………
c) List three pieces of data from a bank card that a user is asked to enter when
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
e) Explain one disadvantage of using online storage for backups rather than local
storage. (2)
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
d) Describe four ways in which individuals can stay safe online. (4)
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
3. a) State four ways in which students can use the features of VLEs to support their
learning. (4)
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
b) Discuss the factors that users of social networking sites should consider when
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
b) State three types of digital information that can be protected by copyright. (3)
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
c) Explain why the large-scale use of online storage and application can have a
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
…………………………………………………………………………………………
i) +
ii) –
iii) @
iv) “”
b) State one reason why you should check whether information is biased before using
it. (1)
…………………………………………………………………………………………
…………………………………………………………………………………………
c) Complete the table stating whether each source is primary of secondary. (8)