Professional Documents
Culture Documents
Flashcards Computing
Flashcards Computing
Flashcards Computing
12. What software would staff who create tools and features that are used to create or edit image. Photos can:
books and comics use and what features • be edited to remove red-eye or other unwanted blemishes
• be cropped to remove unwanted parts of the image
within the software would they make use • have elements cut off or out of the image
• be resized to fit frames in documents or for use in different devices
of?
• have extra layers created to add new elements to the image
software? tablets, netbooks, laptops and desktop computers. It has also been used in
mobile phones, televisions, TV set-top boxes, routers and video game consoles.
- Microsoft Windows, used in smartphones, tablets, netbooks, laptops and
desktop computers.
b. Describe how a customer's signature The customer can write (directly) onto the
could be entered onto the hand-held (touch) screen (1) using a stylus/their
computer finger etc (1)
• Feedback has been gathered to try to help the business (1) and the
Catherine publishes her app online and noticed customer does not expect to have to justify their comment/face
that she has had a negative review from a aggression (1)
customer who has downloaded it. She has decided • The customer does not expect it (1) because there was no
indication that their details would be passed on (1)
to use the details included on the app review to • Personal contact details are private (1) and should only be used
contact the customer to discuss their review. for the purpose for which they were collected/Marcus has accessed
Explain two reasons why it would be morally details which should have been kept secure (1)
• It is a form of harassment (1) and the customer will be
wrong for her to do this
upset/intimidated/scared (1)
• Remember 3:
o RFID tag placed on a parcel (1)
Describe how RFID technology would
o RFID tags transmit a unique signal (1)
track the movement of a package eg.
o This signal is unique (1)
artwork
o These are picked up by receiver (1)
o Packages can be located (1)
Wired method:
Describe one method which could be used • FireWire is a high-speed connection similar
to transfer the image from Richard's to USB and mainly used for connecting
computer to his colleagues via a wired storage devices and transferring digital video
method • FireWire hardware is more expensive than
that for USB so is not used so often
Wireless method:
Describe one method which could be used
• If the image is small enough you could
to transfer the image from Richard's
transfer via Bluetooth
computer to his colleagues via a wireless
• If the image is small enough you could
method
transfer via infra-red (weakest answer)
Internet:
• If the image is small enough you could
Describe one method which could be used
email the image as an attachment
to transfer the image from Richard's
• Peer-to-peer file sharing file sharing is used
computer to his colleagues via the internet
to transfer a file directly from one device to
another without using a file server
• Employers need to check that the equipment they provide is safe/does
not cause harm/injury (1). If an issue is identified, action needs to be
Describe one responsibility that the taken to reduce the risk/equipment needs to be replaced with suitable
equipment (1)
Health and Safety at Work Act places on • Allow employees to have regular breaks (1) and so plan the day to allow
for these to be taken/(Candidate may give examples of regular breaks)
employers who provide staff with (1)
computer equipment • Arrange for eye tests (1) and pay for eye tests (1)
• Set up health and safety training for staff/display correct use posters
(1) so that they know how to use computer equipment safely (1)
• Search facility
• Ability to access from anywhere
Discuss how the use of features of online • Online calendars include a messaging system
• Bookings have been cancelled because either Richard or the customer was unaware of the
• Remember 2:
o If the technology/reader is too expensive(1) then it will not be
Explain how cost would influence the introduced (1)
o Lots of tags are needed (1) which is too expensive (1)
decision about whether to adopt RFID o Lost products cost the delivery company (1) RFID tags reduce the
technology chance of loss (1)
o The delivery company will weigh up the cost against the benefit
(1). If this is positive, they will buy (1).
Explain the advantages and disadvantages • Online forms can contain features that speed up/ease data entry and are clear to read
• Online forms can conduct a presence check to ensure the necessary data is completed
• There are no paper forms left lying around for others to see or to be disposed of
paper?
66. Explain one possible disadvantage caused by using a paper-based form to capture the information Richard needs p41
• A paper-based form cannot validate the customers email address to check they have entered it correctly
• Paper based requires a pen (1) and Animated World Books would have to provide a pen (1)
• Paper and/or ink (either answer) is damaged by liquid (1)
• Ink could be smudged if becomes wet (1) and someone could spill liquid (1)
• It could be lost (1) if data is collected by Richard whilst he is travelling (1)
• People may not write clearly (1) and so Richard will be unable to read the writing (1)
• It will be dark (1) and so people would not be able to see (1)
• The graphics tablet uses a stylus/pen shaped tool (or equivalent) (1)
and so is more like a real drawing experience (1)
• Because a graphics tablet is more accurate/precise(than a mouse) (1)
Explain two possible reasons why Richard and so offers greater control (1)
might prefer to use a graphics tablet rather • Because a graphics tablet includes specialist software (1) with extra
features (1)
than a mouse when creating digital • Because graphics tablets are more responsive pressure sensitive (1),
therefore increased pressure can be used to increase line thickness (1)
graphics • A more ergonomic tool (1) therefore less chance of injury (1)
• Device is specific for the purpose (1) so will have more suitable
features (or examples) than a mouse
By restricting the type of data (1) that is entered, the data is more
likely to be the data you need (for the calculation/ for the analysis/
to identify the request) (1)
Explain why the use of data validation • presence check - ensures that data is actually entered by the user
• data type check - ensures that the data is the correct type
could improve the effectiveness of the data • format or picture check - ensures that the data is in the correct
that is submitted on these forms? format
• range check - ensures that the data is within set limits
• character check - ensures that only allowed characters can be
entered and others are rejected
Eye strain or sore eyes Eye strain or sore eyes may be caused by
using computers for long periods
Give a reason why Richard gets the data Each submission would have a unique
capture form to add a number to each number
submission
How can Animated World Books try to They should have a section in their ICT
stop incidents of cyberbullying? policy to try and prevent this
Cookies:
• A cookie is a 'text file' which usually contains a site name and unique user ID - they are
downloaded the first time a website is accessed
• Richard could make the cookie
How could Richard make use of cookies o record items they have saved in their shopping basket so they might buy next time they visit
o create a marketing list or target special offers based on their previous browsing or shopping
and electronic consumer surveillance to habits.
• The use of cookies to collect and store personal information without permission is not legal in
generate more income? the UK without permission so he must allow the customers agree to download the cookie
Electronic consumer surveillance:
• The website could allocating points to the a loyalty card when a customer buys artwork
• The customer could convert points into vouchers at regular intervals
• The customer could spend, save or exchange the vouchers for goods or serv1ces
• The DMS can be open (allows anyone to access it) or closed (only invited
people can access it) and then access rights can be open (people can only view
it) or closed (people would be able to view, add or amend the facilities of the
How would customers know that their A secure website will show a small padlock
data is being encrypted? and will use https instead of http in the
URL to show that it is using encryption
• Mouse (1)
Identify one input device that could be
• Keyboard (1)
used to enter text onto the website
• Microphone (1)
• Touch screen (1)
• Display/screen (1)
Identify two output devices that may be
• Speaker (1)
found on the customers'' smartphones
• Vibration mechanism or equivalent (1)
• Light/Torch (1)
• For serious breaches (1) Animated World Books can be made to pay (1)
up to £500,000 (1)
• They can be prosecuted/fined/sued (1) because she has not kept the
If Animated World Books lost data due to data securely (1)
• Data held has to be protected from loss (1) so if the data is lost, an
corruption or theft what would the impact offence has occurred/Nico has to inform those whose data has been lost
(that it has been lost) (1)
on the business be? • The Information Commissioner can issue them with an undertaking to
comply (1) to force her to improve her data security (1)
• The Information Commissioner can serve an assessment notice on
them (1) and investigate her data security (1).
The Office Controller would like to monitor • Monitor via observation or calculation eg.
the amount of time Richard spends on his o SUM to add up the total time taken
travel. She is going to use spreadsheet • FORMATTING/CONDITIONAL
software for this purpose. Describe features FORMATTING to identify issues, highlight
of spreadsheet software that make it suitable information
for to monitor the amount of time Richard • GRAPHING to present timings for
travels. comparison
Once the data has been collected, which be fairly and lawfully processed
be processed for limited purposes
be adequate, relevant and not excessive
law protects the customers' rights on how be accurate and up to date
not be kept for longer than is necessary
the data should be stored and used by be processed in line with your rights
be kept secure
Richard and name some of the principles not be transferred to other countries outside of the European Economic Area that do not have
adequate data protection
• Data Subject - The person the data is being stored about
of the law? • Data User The person who needs to access or use the data as part of their job.
• Data Controller - This is the person who needs to apply for permission to collect and store data.
• Information Commissioner - This is the person who enforces the DPA
• Voice telephones
• SMS
• Instant Messaging
Other than social media, what other • Email
communication methods could Richard • Chatrooms
• Forums
use to communicate with his friends and • Bulletin boars
• Voice Over Internet Protocol
customers? • Blogs
• Video conferencing
• Webcams
• text field - the user can type directly into this (1) to add free text (1)
• drop down menus to force a single choice from
Richard has created a user form on his • pre-set selection of choices
website which people can fill in and • boxes to force a yes or no response
• a single character text box for each letter of a name
submit if they want further information. • radio buttons - the user can click to select (1) one option of a
What are all the features of a user form group (1)
• validation rules to make sure that the data meets specific
and what is their purpose? requirements or that all specific questions have to be answered
before the user can move to the next question
Laptop computers:
Staff are issued with a Laptop to take to
• can connect to the internet while away from an
remote locations and customers own office so the user
homes. Identify and describe three • can keep in contact with the office by email or use
benefits a Laptop can provide to the staff the laptop to access files stored on the company
network or in the 'cloud'
in terms of storage and/or
• some laptops have built-in mobile data slots for
communication? connecting to the internet on the move
State one output device that would be used Printer, possibly laser if it was a large
to create a hard copy of this form number of forms being printer as this type
of printer can print large volumes quickly
o To store old information (1)
State one reason why Animated World o To free up space (1)
Books archives data, what medium they o Separate historical data (1)
might use and why it would be suitable o Information is no longer needed daily (1)
o To improve efficiency (1)
• Compressing digital video and audio files to make them small enough to be streamed over low
bandwidth connections allows them to be played on smartphones and other portable devices.
However, highly-compressed video and audio is poor quality and only suitable for small devices.
State two ways in which the artwork, once • Image formats that can be compressed are: JPG (lossy), GIF (lossless). PNG (lossless)
• Lossy compression compresses by discarding data that is thought to be unnecessary so there
created, could be manipulated to make it would be some loss in the quality of the image when compressed for the website; Lossless
compression compresses by breaking the file down into smaller parts for storage then putting
suitable for use on the website them back together again when opened and there would be no loss in the quality of the image
when compressed but the file would be larger
• The person creating the website would have to make a decision of quality and speed of
download
• Why it is needed:
o For security purposes (or equivalent) (1)
State why a password is needed when o To protect data/the network/access to resources (1)
logging onto the school network and give • Why should it be changed regularly:
o To increase security (1)
one reason why this password should be o In case someone finds out the password (1)
o To reduce the chance of it being known (1)
changed regularly o To reduce the risk of unauthorised access (or example thereof) (1)
o Because it is good practice (1)
Desktop computers:
• usually, but not necessarily, have a higher specification than a
laptop
What are the advantages and • are fixed in one place on a desk so can be secured
• can have larger monitors than laptops for ease of viewing
disadvantages for Animated World staff documents
using desktops? • have a separate mouse and keyboard for more ergonomic use to
try and avoid health and safety issues
• can be more easily maintained and upgraded without the need for
complete replacement
Laptop computers:
• are portable because they are light and small
What are the advantages and • can carry out all the office tasks necessary
• do not need a power cable connected to the mains electricity
disadvantages for Animated World staff supply, but can use battery power instead
using laptops? • can connect to the internet while away from an office so the user
can keep in contact with the office by email or use the laptop to
access files stored on the company network or in the 'cloud'
What are the advantages and He is at risk of it being stolen as it may be
disadvantages of Richard carrying a seen as valuable to criminals
smartphone around to take photographs
What are the advantages of manual • Systems allow users to decide when to
backups? make the backup
What are the potential issues of Richard • It could become lost, corrupted or stolen
travelling around the world with customer as he could leave it in an airport lounge or
data on his laptop? might not have a safe where he is staying
They can:
What can employees do when the 'remote
• send emails to colleagues and customers
work'?
• access and transfer files on company
servers or on cloud storage
• Specialist keyboard designed for disabled users, e.g. Braille keyboards for the visually impaired
• engineering keyboards for specialised character entry
• Puff-suck switches activate switches that select an item on screen or send a command to the
What devices would employees who are computer when the person blows or sucks
• Braille keyboards have braille markings to allow people with visual impairments to feel the
physically impaired use to make their use keys and choose one without seeing it
• A foot mouse is used by feet, instead of hands and fingers, to move the pointer on screen
• Text To Speech software reads text aloud and sounds are made, or words are spoken, when
of a computer easier? commands are entered or carried out
• Speech To Text software translates spoken commands into actions that the computer carries
out and spoken words appear as text in a document
• Zoom enlarges areas of the screen display as a pointer is moved over the screen
What peripherals might Richard use with He could connect a printer, scanner or
his smartphone? solar-powered charger (NOT mains
charger)
• use a proper office chair with proper back support and adjustable
height (the chair should have a single, central leg that allows the chair to
swing around and that leg should have at least five supporting points,
What should Animated World Books do to ideally each with a wheel so that the chair can move easily)
• do not drink or eat when using a computer due to the possible
ensure the physical safety of its electrical hazards, and the possible spillage of food and drink into the
computer itself!
employees? • do not tamper with any cables or computer parts
• place the computer equipment safely so it cannot fall or be knocked
over
• take care of their own health and safety and that of others
• Computer virus - A computer program that can replicate itself and spread from one computer to another. Viruses can
increase their chances of spreading to other computers by infecting files on a network file system or a file system that is
accessed by other computers. A virus attempts to make a computer system unreliable
• Trojans - A Trojan often appears to be something which is wanted or needed by the user of a PC but is a stand-alone
malicious program designed to give full control of a PC infected with a Trojan to another PC. They can be hidden in valid
programs and software. Trojan horses can make copies of themselves, steal information, or harm their host computer
systems.
What types of threats to data security exist • Worm - A stand-alone computer program that replicates itself so it can spread to other computers. A worm can use a
computer network to spread. Unlike a computer virus, it does not need to attach itself to an existing program. Worms
almost always cause some harm to a network, even if only by consuming bandwidth.
for Animated World and how can they • Phishing - A way of attempting to acquire information, for example usernames, passwords and credit card details, by
pretending to be from a trustworthy source such as a social network or auction site. Phishing is usually carried out by email
spoofing or instant messaging. Users are often asked to enter details at a fake website which looks just like the proper
What would make a good online data • Online form items (Max 2)
o Submit (1)
o Any other form control (1) eg
capture form? Drop-down box
Radio button
Text box
• Well laid out form (1)
o Fitness for purpose
o Title or other instructions (1)
o Could be used as an online form (1
If he took the picture then he owns the rights to it, unless it was
taken on private land or somewhere photographs cannot be taken
When sharing his image via social media for commercial purposes. He might choose to place a Creative
what are the legal implications for Richard Commons licence on the image to explain to people who see the
picture what the copyright restrictions he has placed on it. If it
and other people who see the image? contains someone face and they ask him to remove it from social
media he should do so or could face legal action.