Flashcards Computing

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Graphics and photo manipulation software as it has a range of

12. What software would staff who create tools and features that are used to create or edit image. Photos can:
books and comics use and what features • be edited to remove red-eye or other unwanted blemishes
• be cropped to remove unwanted parts of the image
within the software would they make use • have elements cut off or out of the image
• be resized to fit frames in documents or for use in different devices
of?
• have extra layers created to add new elements to the image

Databases are used for:


Animated World Books holds customer • entry/storage/editing/processing/processing of data
• Databases store data in files made up of records
details of her employees in a database. • A record is a collection of fields
Describe three features of database • A field holds one item of data
• A database can
software that make it suitable for storing - be made of just one table of records - a flat file database
and analysing - hold many tables of records connected by relationships - a
relational database.

• Legal implications (eg possible action from owners of copyright)


Animated World Books is considering • Security implications (eg need for secure systems/increased
creating a community section on its security)
• Impact on organisation (eg costs of setting up systems and
website. Discuss the implications for resolving problems caused by inappropriate use)
Animated World Books of including a • Commercial implications (eg it could increase interest in the
business and sales of its products)
community section on its website • Means of communication (not advertising)

• manages the hardware


• allows software to be run on the computer for users to carry out tasks.
• Operating systems nowadays usually have graphical user interfaces (GUis)
Animated World Books is installing a new and include:
- Android developed by the Open Handset Alliance led by Google, used in
operating system (OS) and utility smartphones, tablets, netbooks, laptops and desktop computers.
- Apple OS X and iOS
software. What is the purpose of these - Linux, which is an open-source operating system used in smartphones,

software? tablets, netbooks, laptops and desktop computers. It has also been used in
mobile phones, televisions, TV set-top boxes, routers and video game consoles.
- Microsoft Windows, used in smartphones, tablets, netbooks, laptops and
desktop computers.

• The user name recognises the user (1) as it can be


Animated World Books issues usernames checked against recognised list (1)
and passwords to its staff. Describe how • The user is identified (1) and
the network operating system uses the resources/privileges/storage areas are allocated (1)
• Use of the network is linked to the user name (1) so
username
misuse/level of use can be tracked (1)
Animated World Books requires each employee to • Security (1) this is the worry that the App
sign an Acceptable Use Policy (AUP) before they are may give access to information that is on the
issued with their netbook. The AUP states that
phone/may allow customers to be identified
technicians are not allowed to download any Apps
(1)
other than those included with the netbook. Explain
two reasons why Animated World Books would not • A virus could be downloaded (1) which
want staff to download any other Apps to their could infect the smart phone/other impact
netbooks (1)

• In shared areas on the Animated World


Books network - different access levels can
As a range of staff often work on files,
be set eg. write, edit and/or read
describe two ways this can have access to
• On a cloud so all of the staff in the team
the same files.
can access documents online - access can
be open or restricted

b. Describe how a customer's signature The customer can write (directly) onto the
could be entered onto the hand-held (touch) screen (1) using a stylus/their
computer finger etc (1)

• High cost, especially if large size


• Data has to be moved to the new hard
Backup: Additional hard disk in a
disk in the other server
dedicated server
• Disks more difficult to steal due to
physical security
• Encrypted data sent over the network

• Reasonably low, cheap to use


• Not all devices have the same (if any) USB port
Backup: External hard disks • Data can be slow - USB 3 is faster than USB 2
though
• Can be damaged (eg. dropped), lost or stolen
• More expensive ones allow your to encrypt the
data
• High cost
• Backup requires a new tape for each one for
Backup: Tape System each one
• Tapes can be broken/damaged
• Data is encrypted
• Tapes are small in size - could be stolen or
lost

• Feedback has been gathered to try to help the business (1) and the
Catherine publishes her app online and noticed customer does not expect to have to justify their comment/face
that she has had a negative review from a aggression (1)
customer who has downloaded it. She has decided • The customer does not expect it (1) because there was no
indication that their details would be passed on (1)
to use the details included on the app review to • Personal contact details are private (1) and should only be used
contact the customer to discuss their review. for the purpose for which they were collected/Marcus has accessed
Explain two reasons why it would be morally details which should have been kept secure (1)
• It is a form of harassment (1) and the customer will be
wrong for her to do this
upset/intimidated/scared (1)

• Use the in-built digital camera to take


Catherine will use her own smartphone to photographs/record video
make phone calls, send text messages and • Finding the location of and directions to a
receive her work schedule. Describe two customer's house
other ways she could use her smartphone • Make video conferencing calls using VoIP
to help them with her work • View/download emails whilst on the move
• Browse the world wide web

Badges with RFID tags can be used to


Certain staff are allowed access to certain
control where staff are allowed to access.
parts of the building. How is this
Changing the data on the RFID tag will
achieved?
allow staff access to different areas.

The Service Set Identifier (SSID) identifies each network The


Service Set Identifier (SSID) identifies each network by a unique
name so that all the devices connected to it can identify the
The company has an SSID. What is one network. It must be used by all the devices on that network if they
and how can they be administered? are to communicate with each other. SSIDs can be set manually by
the person who administers the network or set up automatically.
Automatic SSID broadcasts can be hidden to make it harder to
detect the network. Network administrators can use a public SSID
to broadcast to wireless devices in range of an access point.
• use a router that controls access to a company
network and can be setup to allow remote access
A company using remote access must • check that the workers have the proper
authentication for access by checking the user name
and password for the remote user
• be able to send and receive the files securely
• be configured for access to the remote storage.

Customers who purchase artwork have hard copies


• The barcode reader scans/ is passed over the barcode (1)
sent in the post which is sent by a tracked delivery • Shines a light onto the code (1)
service. The delivery person scans the package before • The barcode reader measures the intensity of light (reflected) (1)
the customer signs to acknowledge that they have • As it passes over a line of black and white bars (of varying width)
received the package. (1)
• Measures the gaps between (black) bars (1)
a. Describe how a barcode reader captures the data
• Converts this data into a code (1).
stored in the barco

• Cost of purchase compared to cost of not buying the system


• Not buying the product may result in a greater cost to Animated
Describe how COST would be considered World Books than not buying it
• Cost of the product may differ from other products
when Animated World choose a computer • Cost may be justified by the benefits to be gained/extra features
system? included
• Cost is important within a fixed budget
• Cost of training

• Remember 3:
o RFID tag placed on a parcel (1)
Describe how RFID technology would
o RFID tags transmit a unique signal (1)
track the movement of a package eg.
o This signal is unique (1)
artwork
o These are picked up by receiver (1)
o Packages can be located (1)

Describe how SECURITY would be • Provision of security within the system


considered when Animated World choose must meet requirements of Animated
a computer system? World Books/DPA
• Remember 4:
o Works with satellites (1)
o Receives/detects signals (1)
Describe how the Global Positioning o The time taken (for the signal) to reach the device is calculated
System (GPS) locates the position of an (1)
o The time taken to reach the device is compared to the location
employee from where the signal was sent (1)
o Requires uninterrupted line of sight (1)
o Requires a minimum of four satellites (1)

• The convergence of user needs and the


Describe how USER NEEDS would be features of the system
considered when Animated World choose • The ease of use for a range of different
a computer system? users
• Method of control

Wired method:
Describe one method which could be used • FireWire is a high-speed connection similar
to transfer the image from Richard's to USB and mainly used for connecting
computer to his colleagues via a wired storage devices and transferring digital video
method • FireWire hardware is more expensive than
that for USB so is not used so often

Wireless method:
Describe one method which could be used
• If the image is small enough you could
to transfer the image from Richard's
transfer via Bluetooth
computer to his colleagues via a wireless
• If the image is small enough you could
method
transfer via infra-red (weakest answer)

Internet:
• If the image is small enough you could
Describe one method which could be used
email the image as an attachment
to transfer the image from Richard's
• Peer-to-peer file sharing file sharing is used
computer to his colleagues via the internet
to transfer a file directly from one device to
another without using a file server
• Employers need to check that the equipment they provide is safe/does
not cause harm/injury (1). If an issue is identified, action needs to be
Describe one responsibility that the taken to reduce the risk/equipment needs to be replaced with suitable
equipment (1)
Health and Safety at Work Act places on • Allow employees to have regular breaks (1) and so plan the day to allow
for these to be taken/(Candidate may give examples of regular breaks)
employers who provide staff with (1)
computer equipment • Arrange for eye tests (1) and pay for eye tests (1)
• Set up health and safety training for staff/display correct use posters
(1) so that they know how to use computer equipment safely (1)

• Repetitive strain injury (RSI) may be caused by the repetitive


clicking of the buttons of a mouse or using a keyboard and shows
itself as pain in the arms
Describe three potential health issues for • Headaches are often caused by problems with vision and having a
employees computer monitor too far away, too dim or too bright, or having the
text on the screen at the wrong size
• Neck or back pain may be associated with incorrect posture.
Sitting at the wrong height, or wrong distance or for long periods
at computer desks may cause back or neck pain.

• Tracked changes (1) which shows any changes that his


Describe two features of word processing colleagues have made (1)
software that his colleagues can use the • Add comments (1) by clicking on the comments tool/which are
callouts (which include comments)/which go in coloured boxes on
collaborative editing tools in a word the side of the page (1)
processing package to do this efficiently so • Emphasised text (or example) (1) by clicking the coloured
pencil/bold (or equivalent) (1)
to provide Richard with feedback • Ink tools/layer (or equivalent) (1) to annotate text (1)

• Search facility
• Ability to access from anywhere
Discuss how the use of features of online • Online calendars include a messaging system
• Bookings have been cancelled because either Richard or the customer was unaware of the

calendars could help Richard in managing other/clashing booking.


• Bookings have been cancelled because DJs have forgotten to attend.
• Online calendars can be shared between two users, both of whom can add to and view bookings
this time and avoid the need to cancel • Online calendars allow the user to add coloured/keyed blocks to show what the time block is
for
meetings • Reminders can be set up for events
• Reminders can be set to go off at different stages before an event
• Notes can be added to events/blocks

Each laptop in the office uses a wireless


connection. As part of its security, the
The security key is checked to see if it is on
wireless network requires the use of a
a list if on a list, access is granted
security key. Describe how a security key
is used to allow a device to connect to a
wireless network
Data can be kept safe by
• saving work regularly
• never working on the only copy of the work
Explain how Animated World can keep • shutting down the computer properly
• storing storage media such as CDs and other removable media
data safe and secure. carefully.
Data can be kept secure by:
• physically protecting the data
• encrypting the data
• using passwords to control access to the data

All files and folders have access rights and


Explain how Animated World will make permissions to control who can read, edit
use of access rights and permissions and save files. If a file is read-only files
cannot be altered so if the file was changed
it would have to be re-saved.

• Remember 2:
o If the technology/reader is too expensive(1) then it will not be
Explain how cost would influence the introduced (1)
o Lots of tags are needed (1) which is too expensive (1)
decision about whether to adopt RFID o Lost products cost the delivery company (1) RFID tags reduce the
technology chance of loss (1)
o The delivery company will weigh up the cost against the benefit
(1). If this is positive, they will buy (1).

• Require John to select from a drop down


Explain how the form could make sure
list (or equivalent) (1) and set the form to
that John can enter only a valid country
only accept answers from that list/not
name
allow any other answers (1)

• The quality of service


• The ability to respond to changes
Explain how the use of ICT by Animated
• The time taken to respond
World Books increases its efficiency as a
• The ability to fill all responsibilities
business
• Economic impacts (efficient use of
resources)
Advantages
• Using an online form allows data to be entered directly into a database without the need to check a paper form, read it
through and then copy the data into a database.
• Online forms can be constructed to include validation checks so they are likely to be more accurate and reduce the
possibility of human error

Explain the advantages and disadvantages • Online forms can contain features that speed up/ease data entry and are clear to read
• Online forms can conduct a presence check to ensure the necessary data is completed
• There are no paper forms left lying around for others to see or to be disposed of

of using an online form rather than Disadvantages


• Customers may fail to complete an online form later

customers expressing an interest on


• Customers require an internet connection to complete the form
• If the form asked for any kind of feedback answers on an online form may be more honest

paper?
66. Explain one possible disadvantage caused by using a paper-based form to capture the information Richard needs p41

• A paper-based form cannot validate the customers email address to check they have entered it correctly
• Paper based requires a pen (1) and Animated World Books would have to provide a pen (1)
• Paper and/or ink (either answer) is damaged by liquid (1)
• Ink could be smudged if becomes wet (1) and someone could spill liquid (1)
• It could be lost (1) if data is collected by Richard whilst he is travelling (1)
• People may not write clearly (1) and so Richard will be unable to read the writing (1)
• It will be dark (1) and so people would not be able to see (1)

• Verification checks that data is entered exactly as it is shown on


the original data capture sheet. Verification can be done by:
• Visual check - to see if the data in the computer system is the
Explain the role of data verification in data same as that on the original questionnaire
• Double entry - data is entered twice, by different operators, for
capture large amounts of data, so the computer system can check one set
against the other. If any differences are found, the computer system
will report the differences to the operators. Double entry can also be
used, for instance, when the same individual enters a new
password into an online form

• The graphics tablet uses a stylus/pen shaped tool (or equivalent) (1)
and so is more like a real drawing experience (1)
• Because a graphics tablet is more accurate/precise(than a mouse) (1)
Explain two possible reasons why Richard and so offers greater control (1)
might prefer to use a graphics tablet rather • Because a graphics tablet includes specialist software (1) with extra
features (1)
than a mouse when creating digital • Because graphics tablets are more responsive pressure sensitive (1),
therefore increased pressure can be used to increase line thickness (1)
graphics • A more ergonomic tool (1) therefore less chance of injury (1)
• Device is specific for the purpose (1) so will have more suitable
features (or examples) than a mouse

Each username must be unique:


• So that system knows who each person is
Explain why each username used on the (1) and they won't be confused with others/so
Animated World Books website must be delivery goes to the correct person (1)
unique • To enable the system to identify each user
(1) and to enable it to match the username to
the account's password (1)

o Data can be deleted/corrupted/damaged/lost (1) and so a copy is


kept to replace it (1)
Explain why it is necessary to back up data o So that Animated World Books can carry on operating (1) if the
data is deleted/corrupted/damaged (1)
and how can you recover data or files use a o If the data is deleted (1) the school still has the information it
backup? needs (1)
o To protect against accidental loss/destruction (1) as required by
the DPA (1)
Explain why Richard encrypts the personal Data encryption software encrypts data so
data that he holds that only users with the unlock
code/secret key

By restricting the type of data (1) that is entered, the data is more
likely to be the data you need (for the calculation/ for the analysis/
to identify the request) (1)
Explain why the use of data validation • presence check - ensures that data is actually entered by the user
• data type check - ensures that the data is the correct type
could improve the effectiveness of the data • format or picture check - ensures that the data is in the correct
that is submitted on these forms? format
• range check - ensures that the data is within set limits
• character check - ensures that only allowed characters can be
entered and others are rejected

Eye strain or sore eyes Eye strain or sore eyes may be caused by
using computers for long periods

Give a reason why Richard gets the data Each submission would have a unique
capture form to add a number to each number
submission

• Graphics tablet would be the best input device to


suggest
hat input devices would staff would create • Webcam/video camera/camera for moving image
animated cartoons make use of? input would also be a good answer
• Scanner would be a reasonable answer as you could
scan in drawings
• Mouse and camera would be weaker answers
Ensure each piece of software has been bought by
How can Animated World Books ensure Animated World Books with a licence to install it
on the number of PCS running the software and
they do not break the Copyright, Designs
they should not make copies of the software.
and Patents Act when using software to Catherine is also responsible for publicising new
create the assets? characters and storylines to trade publications and
the wider public

• using GPS location tracking


theory they could use electronic tagging
• an audit trail may be needed
How can Animated World Books monitor • Worker monitoring/logging: CCTV camera/Swipe or RFID ID
employees by cards
• Key logging is hardware or software which records the real time
activity of a computer user
Mobile phone triangulation Mobile phone triangulation
• Worker call monitoring/recording

How can Animated World Books try to They should have a section in their ICT
stop incidents of cyberbullying? policy to try and prevent this

An email is made up of two parts - the header and the body:


• The body is the main contents of the email.
• The header contains:
How can employees ensure his email o From: the email address of the sender of the email
communications are clear and o To: the email address(es) of the person(s) the email is being sent
to
understood? o Subject a brief summary of the contents of the email
o Date: the rime and dare the email was sent
o Attachment where any files are shown

• Poor spelling/ example of poor spelling, such as 2U (1)


• Poor grammar/example of poor grammar, such as Please attention! (1)
• Large prize/ mention of $650million as the prize (1)
How can you tell if an email is suspicious? • Request for bank details (1)
• Request to download/open an attachment (1)
• Misspelling in email address/example of misspelling of email address,
such as animationworldbooks not animatedworldbooks (1)
• Unusual email address/example of unusual email address such as
@czgt.com (1)
• No name on the letter (1)
• Instead of purchasing software applications she could use online
applications eg. online graphics manipulation software and online
How could Catherine make sure of cloud office software to manage the business negating the need to
purchase higher specification computers to process images
computing? • She could store her data using online file storage and the
company hosting the file servers is responsible for ensuring that
the Catherine's data is kept safe and secure which is cost-effective
for her business if it is small as she might not have her own server

Matrix bar codes (two-dimensional bar


codes) are often called QR codes and hold
How could Catherine make use of matrix more data than a conventional bar code. As
barcodes? they can be QR codes can be read by a
smartphone using a free app, she could
create one which links directly to the
products she sells on a website or app.

Cookies:
• A cookie is a 'text file' which usually contains a site name and unique user ID - they are
downloaded the first time a website is accessed
• Richard could make the cookie
How could Richard make use of cookies o record items they have saved in their shopping basket so they might buy next time they visit
o create a marketing list or target special offers based on their previous browsing or shopping
and electronic consumer surveillance to habits.
• The use of cookies to collect and store personal information without permission is not legal in

generate more income? the UK without permission so he must allow the customers agree to download the cookie
Electronic consumer surveillance:
• The website could allocating points to the a loyalty card when a customer buys artwork
• The customer could convert points into vouchers at regular intervals
• The customer could spend, save or exchange the vouchers for goods or serv1ces

• The DMS can be open (allows anyone to access it) or closed (only invited
people can access it) and then access rights can be open (people can only view
it) or closed (people would be able to view, add or amend the facilities of the

How could Richard make use of DMS DMS)


• check that everyone who is needed can attend an appointment/meeting
(Diary Management Software) • make sure that appointments/meetings do not clash
• set reminders to make sure that meetings/appointments are not missed
• plan and track the progress of team projects
• allocate tasks to different members of the team
• communicate with each other to make sure that all tasks are completed
• share files and documents which are needed during the project

He could use a wi-fi hotspot but he could also


either use his smartphone, connected to a 3G
How will Richard connect to the internet or 4G network. He could use a dongle if he is
whilst mobile or travelling? not allowed to tether his internet connection
form his smartphone. He needs to be aware
of mobile roaming charges and should
consider a local SIM card.
Animated World Books would use ICT to
How would Animated World Books use • Sell services to customers
ICT? • Plan and monitor finances
• Communicate between employees
• Communicate with customers

How would customers know that their A secure website will show a small padlock
data is being encrypted? and will use https instead of http in the
URL to show that it is using encryption

• Delete email (1)


Identify one action, other than contacting • Do not act on contents (1)
Animated World Books, that the customer • Do not open the attachment (1)
should take in response to a phishing • Contact/inform bank (1)
email • Mark as spam (1)
• Report to actionfraud.co.uk/police (1)

• Mouse (1)
Identify one input device that could be
• Keyboard (1)
used to enter text onto the website
• Microphone (1)
• Touch screen (1)

o Data needs to be uncompressed (1)


Identify one possible problem to Animated o Difficult to find files (1)
World Books that may be caused by o Storage format may become redundant
archiving data (1)
o Data not immediately available (1)
Identify one security measure that Richard
• Password protect the file
could use to prevent unauthorised people
• Restrict access to folder
reading the article he sends to his
colleagues via the internet

• Stylus (or equivalent) (1)


• Voice (1)
Identify two input methods that the • Buttons (1)
• Keyboard/Keypad/Type (1)
customers can use to enter information
• (Download) from the internet (1)
onto a smartphone • (Transfer) from a computer (1)
• Touch/Swipe (1)
• Camera (1)

• Display/screen (1)
Identify two output devices that may be
• Speaker (1)
found on the customers'' smartphones
• Vibration mechanism or equivalent (1)
• Light/Torch (1)

• For serious breaches (1) Animated World Books can be made to pay (1)
up to £500,000 (1)
• They can be prosecuted/fined/sued (1) because she has not kept the
If Animated World Books lost data due to data securely (1)
• Data held has to be protected from loss (1) so if the data is lost, an
corruption or theft what would the impact offence has occurred/Nico has to inform those whose data has been lost
(that it has been lost) (1)
on the business be? • The Information Commissioner can issue them with an undertaking to
comply (1) to force her to improve her data security (1)
• The Information Commissioner can serve an assessment notice on
them (1) and investigate her data security (1).

• May lose confidence and trust in the


If Animated World Books lost data due to
business and may move their custom (also
corruption or theft what would the impact
an impact on the business)
on the customers be?
• May become victims of identity theft
• The actions an employee faces could be:
o formal written warning
o a demotion in job role, and probably a reduction in salary
If Animated World Books lost data due to o dismissal from their job
o a reference which stated why they lost their job - this could result
corruption or theft what would the impact in difficulty in finding another job
on the employee be? • The employer could also increase security including:
o access rights to data being changed
o more monitoring of what employees are doing whilst accessing
the data

The Office Controller would like to monitor • Monitor via observation or calculation eg.
the amount of time Richard spends on his o SUM to add up the total time taken
travel. She is going to use spreadsheet • FORMATTING/CONDITIONAL
software for this purpose. Describe features FORMATTING to identify issues, highlight
of spreadsheet software that make it suitable information
for to monitor the amount of time Richard • GRAPHING to present timings for
travels. comparison

• Data Protection Act (1998)


o The 8 principles are that personal data (any information about a living individual) must:

Once the data has been collected, which be fairly and lawfully processed
be processed for limited purposes
be adequate, relevant and not excessive
law protects the customers' rights on how be accurate and up to date
not be kept for longer than is necessary
the data should be stored and used by be processed in line with your rights
be kept secure

Richard and name some of the principles not be transferred to other countries outside of the European Economic Area that do not have
adequate data protection
• Data Subject - The person the data is being stored about
of the law? • Data User The person who needs to access or use the data as part of their job.
• Data Controller - This is the person who needs to apply for permission to collect and store data.
• Information Commissioner - This is the person who enforces the DPA

• Voice telephones
• SMS
• Instant Messaging
Other than social media, what other • Email
communication methods could Richard • Chatrooms
• Forums
use to communicate with his friends and • Bulletin boars
• Voice Over Internet Protocol
customers? • Blogs
• Video conferencing
• Webcams

• sharing the desktop of a computer in the office


• using a virtual private network (VPN)
• accessing files and folders using specialist software
Remote access involves
such as FTP.
• The employee must have a user name and a
password in order to access files.
• The company system that stores the files must be
configured to allow remote working access.
• To save space in a spreadsheet or database file, data
The results of the input form get stored in can be coded eg. Y or N instead of Yes or No
• Every item in a database is given a code that can be
a database. Why is data coded in a
searched for or sorted into order
database and give an example of what it • Data such as 'red animated car' is more complicated
would look like? than a code such as 'ani_car_red' and takes longer to
process.

Richard connects to open networks whilst


traveling. What are the potential issues
A firewall controls what data can and
with using an open network and what
cannot pass through
could he install which would still allow
internet access but block unauthorised
devices?

• text field - the user can type directly into this (1) to add free text (1)
• drop down menus to force a single choice from
Richard has created a user form on his • pre-set selection of choices
website which people can fill in and • boxes to force a yes or no response
• a single character text box for each letter of a name
submit if they want further information. • radio buttons - the user can click to select (1) one option of a
What are all the features of a user form group (1)
• validation rules to make sure that the data meets specific
and what is their purpose? requirements or that all specific questions have to be answered
before the user can move to the next question

Take regular breaks; Provide


Solution to RSI
ergonomically designed equipment
including a keyboard, mouse and wrist rest
for employees to use

Be provided with, and use, an anti-glare


screen; Use swivel bases on screens to
Solutions to eye strain
deflect the light (natural and artificial).;
Adjust brightness and contrast on screens;
Have regular eye checks- provided by
Animated World Books
Be provided with, and use, an anti-glare
screen; Use swivel bases on screens to
Solutions to Headaches
deflect the light (natural and artificial).;
Adjust brightness and contrast on screens;
Have regular eye checks- provided by
Animated World Books

Take regular breaks (1); Adjust posture (1);


Adjust angle of laptop screen (1); Angle the
Solutions to neck and back pain laptop so that the keyboard is slanted (1);
Work at a higher desk/adjust height of
laptop (1); Use an external monitor/docking
station (1); Adjust the seat height (1); Put it
on a desk (1)

The most suitable system would be a desktop


computer with a high-resolution Visual
Some staff are dealing with large graphics
Display Unit and top-of-the-range high-
or video files. Which type of computer
speed processor so the correct level of detail
system would be most suitable and why?
could be viewed and the files could be
processed in a shorter amount of time.

Laptop computers:
Staff are issued with a Laptop to take to
• can connect to the internet while away from an
remote locations and customers own office so the user
homes. Identify and describe three • can keep in contact with the office by email or use
benefits a Laptop can provide to the staff the laptop to access files stored on the company
network or in the 'cloud'
in terms of storage and/or
• some laptops have built-in mobile data slots for
communication? connecting to the internet on the move

State one output device that would be used Printer, possibly laser if it was a large
to create a hard copy of this form number of forms being printer as this type
of printer can print large volumes quickly
o To store old information (1)
State one reason why Animated World o To free up space (1)
Books archives data, what medium they o Separate historical data (1)
might use and why it would be suitable o Information is no longer needed daily (1)
o To improve efficiency (1)

Microphone - Voice input


Webcam/video camera/camera - Moving image
State the devicse that would be needed to input
take part in video conferencing and for Speakers/headphones - Voice output
what purpose Monitor/screen/Visual Display Unit/TV - Moving
image output
Modem/router/cable/network card - Connectivity

• The Data Protection Act (1998) is the act


State the name of the Act that controls the
that controls the storage of personal
storage of personal information and
information and if any data is stolen:
describe one legal implication for
• For serious breaches (1) Animated World
Animated World Books if this data is
Books can be made to pay (1) up to
stolen
£500,000 (1)

• He could use a portable solid state drive as


they are more robust as they do not have any
State the type of portable storage would be moving parts
suitable for Richard to store his artwork, • He could use an optical device already built
stories and illustrations whilst travelling into his laptop eg. a DVD writer
• He could use flash memory drives if the files
were small enough collectively

• Compressing digital video and audio files to make them small enough to be streamed over low
bandwidth connections allows them to be played on smartphones and other portable devices.
However, highly-compressed video and audio is poor quality and only suitable for small devices.
State two ways in which the artwork, once • Image formats that can be compressed are: JPG (lossy), GIF (lossless). PNG (lossless)
• Lossy compression compresses by discarding data that is thought to be unnecessary so there
created, could be manipulated to make it would be some loss in the quality of the image when compressed for the website; Lossless
compression compresses by breaking the file down into smaller parts for storage then putting

suitable for use on the website them back together again when opened and there would be no loss in the quality of the image
when compressed but the file would be larger
• The person creating the website would have to make a decision of quality and speed of
download
• Why it is needed:
o For security purposes (or equivalent) (1)
State why a password is needed when o To protect data/the network/access to resources (1)
logging onto the school network and give • Why should it be changed regularly:
o To increase security (1)
one reason why this password should be o In case someone finds out the password (1)
o To reduce the chance of it being known (1)
changed regularly o To reduce the risk of unauthorised access (or example thereof) (1)
o Because it is good practice (1)

• use an appropriate subject line


• follow the agreed email policy within the business
• check the message content before hitting the send button
• include a signature on any business emails
There are some rules (netiquette) which • be polite
• write in normal English with abbreviations used carefully
should always be followed when using • do not write in capital letters
• check if the email should be replied to all the sending list or just the person the email was

email. What are they? originally from


• when sending an attachment with an email, mention in the email body that there are file(s)
attached
• tell people the format of any attachments you send if they're anything other than standard, e.g.
Microsoft Office file types

• Low as cheap to buy sticks


• Work on most computers as they have USB
USB memory sticks ports
• If not removed correctly can break
• Can still fail after a year if removed
properly! • More expensive ones allow your to
encrypt the data

Desktop computers:
• usually, but not necessarily, have a higher specification than a
laptop
What are the advantages and • are fixed in one place on a desk so can be secured
• can have larger monitors than laptops for ease of viewing
disadvantages for Animated World staff documents
using desktops? • have a separate mouse and keyboard for more ergonomic use to
try and avoid health and safety issues
• can be more easily maintained and upgraded without the need for
complete replacement

Laptop computers:
• are portable because they are light and small
What are the advantages and • can carry out all the office tasks necessary
• do not need a power cable connected to the mains electricity
disadvantages for Animated World staff supply, but can use battery power instead
using laptops? • can connect to the internet while away from an office so the user
can keep in contact with the office by email or use the laptop to
access files stored on the company network or in the 'cloud'
What are the advantages and He is at risk of it being stolen as it may be
disadvantages of Richard carrying a seen as valuable to criminals
smartphone around to take photographs

• Systems allow backups to be done at set


What are the advantages of automatic
times and intervals over a day, week,
backups?
month, etc. and the staff do not have to be
there to run it

• People using social networking and blog sites need


to be careful about the personal information, e.g. date
of birth, address, they put on these sites
What are the advantages of disadvantages
• The information can be deleted but there is no
of social networking? control over how it is stored, copied or archived.
Identity thieves can piece together a person's identity
from a variety of sources to get all the details they
need

What are the advantages of manual • Systems allow users to decide when to
backups? make the backup

• Specialist software/hardware may be needed to organise back-up


(1) and this may be expensive/require special training(1)
What are the disadvantages of automatic • As it is done automatically, there could be a problem eg. the
backup stopped (1) and no one would know until it was checked (1)
backups? • Staff may be required to react to problems at inconvenient times
(1) and so may need better/extra pay (1)
• Automated backups may not be scheduled to suit all users (1) so
work could be lost before the backup occurs (1)
What are the disadvantages of manual • Backups are missed due as a human may
backups? forget

What are the potential issues of Richard • It could become lost, corrupted or stolen
travelling around the world with customer as he could leave it in an airport lounge or
data on his laptop? might not have a safe where he is staying

What can be used to by criminals on


Key loggers
public computers to steal passwords or
credit card information when customers
are typing these details into the website?

They can:
What can employees do when the 'remote
• send emails to colleagues and customers
work'?
• access and transfer files on company
servers or on cloud storage

• More data can be transferred in a set time over


wired networks than wireless networks so wired
What could affect the speed of the
networks are usually faster than wireless networks
network Animated World Books use? • Bandwidth is measured in bits per second and the
available bandwidth will determine how fast a file
such as a video or audio file can be downloaded
• Some smartphones have GPS tracking built
in so she could offer location-based discounts
What could Catherine include in her app? • There could be links to the company's social
networking websites
• There could be a way to contact her
• There could be an online calendar to book a
meeting

• Specialist keyboard designed for disabled users, e.g. Braille keyboards for the visually impaired
• engineering keyboards for specialised character entry
• Puff-suck switches activate switches that select an item on screen or send a command to the
What devices would employees who are computer when the person blows or sucks
• Braille keyboards have braille markings to allow people with visual impairments to feel the

physically impaired use to make their use keys and choose one without seeing it
• A foot mouse is used by feet, instead of hands and fingers, to move the pointer on screen
• Text To Speech software reads text aloud and sounds are made, or words are spoken, when
of a computer easier? commands are entered or carried out
• Speech To Text software translates spoken commands into actions that the computer carries
out and spoken words appear as text in a document
• Zoom enlarges areas of the screen display as a pointer is moved over the screen

• the file contents


What factors affect the choice of file • how best to store the contents
format? • which software application has created
the file
• how the user intends to use the file

What factors would Animated World Cost


consider when choosing a computer User Needs
system? Data Security

Backup systems can create copies of only the data


that is new or that has changed since the last time a
backup was created, saving media space and time.
What is an incremental backup?
Incremental backups can be used to restore the latest
data and files quite quickly. A backup restores the
data, file or disk to the state it was in when the
backup was made so the most recent work may still
be lost.
What is remote working? People can use ICT to work while away
from the office, at home or travelling.

Backups are copies of data or files that are


What is the difference between a backup
currently in use. Archives are copies of
and an archive?
data or files that are no larger needed for
day-today use.

• The subject's consent is usually needed for publishing a photograph of an


identifiable individual taken in a private place
• Some public places also have bylaws preventing commercial photography,
What legal implications should Richard be such as in Trafalgar Square, Parliament Square and some Royal Parks
• If you're not taking photos for commercial gain or causing an obstruction,
aware of when taking pictures with his you're unlikely to be restricted bur Richard might be taking for commercial
reasons (it may be hard to tell if he is using a smartphone camera)
smartphone • There are some 'prohibited public places', which it is an offence to take
photos of (such as factories, dockyards and mines owned by the Crown
• If Richard is travelling he needs to be aware of the laws of the country he
visits

• configured to allow remote access


What must the system that stores the files
• set up so. the worker has the proper
for remote access must be?
authentication to be allowed access
• able to send and receive files securely.

What peripherals might Richard use with He could connect a printer, scanner or
his smartphone? solar-powered charger (NOT mains
charger)
• use a proper office chair with proper back support and adjustable
height (the chair should have a single, central leg that allows the chair to
swing around and that leg should have at least five supporting points,
What should Animated World Books do to ideally each with a wheel so that the chair can move easily)
• do not drink or eat when using a computer due to the possible
ensure the physical safety of its electrical hazards, and the possible spillage of food and drink into the
computer itself!
employees? • do not tamper with any cables or computer parts
• place the computer equipment safely so it cannot fall or be knocked
over
• take care of their own health and safety and that of others

• They would use Comment Boxes and Track Changes features


• Ability to edit means that staff can make changes directly to the
work
What tools can be used to aid • Ability to track changes means that Stephen can quickly find the
changes that Maria has made and decide to agree and keep these
collaboration between staff? changes, or dismiss them totally or edit as sees fit
• Efficiency is increased because time taken to do the task is
reduced
• Efficiency is increased because greater chance of creating a
suitable document

What type of application software would Web authoring/design or he could code it


be most suitable to use to create this in HTML
form?

What type of file format would be suitable GIF


for saving the animated cartoons?

What type of input device could be used to Scanner


convert sketches into a digital image on
the computer?
What type of output device would the staff Plotter
use to print drawings?

What type of software would Richard's Web browser


customers view this data capture form in?

• Hard disk (which use magnetic disks) can


store huge amounts of data
What type of storage device would be • Solid State Drives (which use flash
suitable for storage the assets which will memory) are more reliable than Hard disk
be used in the finished cartoons? Drives
• An optical drive eg. Blu-ray - Blu-ray disks
can store very large amounts of data

• Text - any character


• Integer - whole number
What types of data might the input form • Real numbers (floats) - numbers with
include? decimal places
• Date - date/time
• Boolean - true or false eg. M or F, Yes or No
• Image - a graphic file

• Computer virus - A computer program that can replicate itself and spread from one computer to another. Viruses can
increase their chances of spreading to other computers by infecting files on a network file system or a file system that is
accessed by other computers. A virus attempts to make a computer system unreliable
• Trojans - A Trojan often appears to be something which is wanted or needed by the user of a PC but is a stand-alone
malicious program designed to give full control of a PC infected with a Trojan to another PC. They can be hidden in valid
programs and software. Trojan horses can make copies of themselves, steal information, or harm their host computer
systems.
What types of threats to data security exist • Worm - A stand-alone computer program that replicates itself so it can spread to other computers. A worm can use a
computer network to spread. Unlike a computer virus, it does not need to attach itself to an existing program. Worms
almost always cause some harm to a network, even if only by consuming bandwidth.
for Animated World and how can they • Phishing - A way of attempting to acquire information, for example usernames, passwords and credit card details, by
pretending to be from a trustworthy source such as a social network or auction site. Phishing is usually carried out by email
spoofing or instant messaging. Users are often asked to enter details at a fake website which looks just like the proper

minimise the risk? version


• Spyware - A type of malware (malicious software) installed on a computer system that collects information about users
without their knowledge. Spyware is usually hidden from a user and can be difficult to detect. Spyware is often secretly
installed on a user's personal computer without their knowledge. However, some spyware such as key loggers may be
installed to intentionally monitor users.
• Spyware - can collect data from an infected computer, including personal information such as websites visited, user logins
and financial information. Spyware can also install additional software or redirect web browsers to different websites. Some
spyware can change computer settings, which could lead to slow internet connection speeds or changes in web browser
settings.
o Customer salutation, forename and surname
o Customer telephone number
o Customer email address
o Name of artwork they wish to purchase

What would make a good online data • Online form items (Max 2)
o Submit (1)
o Any other form control (1) eg
capture form? Drop-down box
Radio button
Text box
• Well laid out form (1)
o Fitness for purpose
o Title or other instructions (1)
o Could be used as an online form (1

When employees are working at the office


• Ethernet using a Network Interface Card
identify one type of wired method which
• Firewire
they could use to connect their desktop
• USB
computer to the network

• Check whether copyright applies to a image (1) as some images might


not be copyright free (1)
When publishing the new characters and • Seek permission to use the image (before using it) (1) from the
storylines explain three actions that copyright holder/the artist (1)
• Check whether the image is recognisable (1) as unrecognisable tracks
Catherine must take in order to comply are not covered (1)
• Acknowledge the image/original artist (1) any acceptable method (1)
with the Copyright, Designs and Patents • Payment of fees (1) if requested (1)
• Purchase the image (1) ensuring it's a legal copy (1)
Act? • Copyright holder may place conditions/may say no (1) which they have
to follow (1)

If he took the picture then he owns the rights to it, unless it was
taken on private land or somewhere photographs cannot be taken
When sharing his image via social media for commercial purposes. He might choose to place a Creative
what are the legal implications for Richard Commons licence on the image to explain to people who see the
picture what the copyright restrictions he has placed on it. If it
and other people who see the image? contains someone face and they ask him to remove it from social
media he should do so or could face legal action.

Animated World Books want to know


With employees working in a number of • business critical tasks are being completed
locations, why do Animate World monitor • what their employees are doing and where
its staff and what are the moral/ethical they are during their working day because
issues surrounding this ? they have 'duty of care' to ensure that
employees are safe
• Media is cheaper than the hard disks but may be more expensive
if Animated World Books needs a lot of them!
• You need a new CD/DVD/Blu-ray each time unless using re-
Writeable CDs/DVDs/Blu-rays writeable ones
• Large companies would find it tricky to back up all their data on
them!
• Better for home use although Richard could make use of them and
send images to customers on them • You could easily lose the media
or have it stolen

You might also like