Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Cambridge International AS & A Level

* 4 4 6 4 1 7 9 1 6 4 *

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory October/November 2022

1 hour 45 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 70.
● The number of marks for each question or part question is shown in brackets [ ].

This document has 12 pages. Any blank pages are indicated.

DC (KN) 303205/2
© UCLES 2022 [Turn over
2

1 Computers often have utility software supplied with the operating system.

Explain what is meant by utility software and why it is needed.

Computer needed utility software because it helps to


..........................................................................................................................................................

keep viruses it
helps to
perform maintenance
..........................................................................................................................................................
away,
or perform a
specific task, there be
..........................................................................................................................................................
can

utilities stared
many operating system,
..........................................................................................................................................................
in an

better overall
it gives user
experience.
..........................................................................................................................................................
a

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

2 Sandeep works for a company which uses software to help protect its computer systems against
malware. The company is looking for additional ways to minimise the effects of malware. Sandeep
and the other workers have already been advised on good practice when logging on and how to
use emails safely.

Describe other methods the company can instruct workers to use so that malware can be
prevented from entering its computer systems.

Sandeep can install anti-virus software, scan


..........................................................................................................................................................
the oftenly, keep computer system
computers
..........................................................................................................................................................
and firewall to date, hire
specialist
..........................................................................................................................................................
or a
up
to
prevent malware.
..........................................................................................................................................................

..........................................................................................................................................................

Report malicious websites to the


manager
-

..........................................................................................................................................................

-Only download suffrare from trusted source.


..........................................................................................................................................................
a

Disconnectwithwhen not using


..........................................................................................................................................................
of
Maintain
up
to date knowledge risks.
..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2022 9626/11/O/N/22


3

3 Most companies use transaction files to update master files in their payroll systems. One part of
the updating process is to calculate weekly or monthly pay. Another part is to update workers’
personal and work details.

Without referring to the calculation of pay, describe the three types of transaction that would
take place when workers’ details are being updated. You must give an example for each type of
transaction.
Delete a record
Transaction type 1: ...........................................................................................................................

..........................................................................................................................................................
to remove
duplicates
Example 1: .......................................................................................................................................

..........................................................................................................................................................

Change record
Transaction type 2: ...........................................................................................................................
a

..........................................................................................................................................................
to
change name
Example 2: .......................................................................................................................................

..........................................................................................................................................................

Add record
Transaction type 3: ...........................................................................................................................
a

..........................................................................................................................................................
to add new worker.
Example 3: .......................................................................................................................................
a

..........................................................................................................................................................
[6]

© UCLES 2022 9626/11/O/N/22 [Turn over


4

4 A customer at a supermarket checkout pays for their goods by inserting a card into a chip reader
and entering their personal identification number (PIN). Electronic funds transfer takes place.

Describe what happens during the electronic funds transfer.

Chip reader reads the


chips Pin entered
-

..........................................................................................................................................................

by customer is compared to pin stored in


..........................................................................................................................................................

verified" then
the
chip, if pin is
computer
..........................................................................................................................................................

contacts bank to check if there is sufficient


..........................................................................................................................................................
-

funds in the account, if there is, the


..........................................................................................................................................................

amountof transaction will be deducted


..........................................................................................................................................................
I

then will be credited to supermarket's account.


..........................................................................................................................................................
-
..........................................................................................................................................................
* Use opposite sides to
get more
points
..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2022 9626/11/O/N/22


5

5 Encryption is a method used by organisations to keep data confidential. Symmetric or asymmetric


encryption is used.

Explain what is meant by asymmetric encryption.

Asymmetric encryption uses two different w


..........................................................................................................................................................
of keys, public
types key and private key,
..........................................................................................................................................................

while public key can be seen byanyones


..........................................................................................................................................................

private key needed to be keptsecretly, when


..........................................................................................................................................................

person A wanted to send is a


..........................................................................................................................................................
person message,
person A
will
encrypt the message with
..........................................................................................................................................................

person B's public key, person B will then


..........................................................................................................................................................

be able to decrypt the with his


..........................................................................................................................................................
message
own
private key, this allows only person is
..........................................................................................................................................................
to read the
message.
..........................................................................................................................................................
also known
public key encryption.
..........................................................................................................................................................
as

a
~

.................................................................................................................................................... [5]

6 The digital divide affects many people. There can be a divide between older and younger people.

Describe how this digital divide could be reduced.

Younger people could teach older people, government


..........................................................................................................................................................

library centre to offer free


..........................................................................................................................................................
can
encourage
access
to
computer, organizations that
supports
..........................................................................................................................................................
older free different
people can set
up sources,
..........................................................................................................................................................

places with
computers can show
support by
..........................................................................................................................................................

supplying free uses of computers in free time.


..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [5]
© UCLES 2022 9626/11/O/N/22 [Turn over
6

7 Spreadsheet models can be used to forecast the population growth of humans.

Analyse the effectiveness of using a spreadsheet model for this purpose.

The benefits of
using spreadsheet
..........................................................................................................................................................
a

model is itcan
perform complex calculation
..........................................................................................................................................................
and it also recalculate formulas
..........................................................................................................................................................
can

automatically, however to account complex


..........................................................................................................................................................
I
formulas need
expertor
some
..........................................................................................................................................................
may
an

additional softwares which be time


..........................................................................................................................................................
can

consuming and expensive.


..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2022 9626/11/O/N/22


7

8 Maria has been asked to write a word-processed report for her homework. She needs to choose
between using proprietary software and open source software.

Describe the differences between these two types of software.

Proprietary software is owned


bythe
..........................................................................................................................................................

copyright holder, users will have to


purchas
..........................................................................................................................................................
the liscene, however, open source software be
..........................................................................................................................................................
can

downloaded and edited


for
free, be ~ by anyone
..........................................................................................................................................................
can

without a breach of leation on the the


ate
..........................................................................................................................................................

..........................................................................................................................................................
of
proprietary, the source of proprietary software
..........................................................................................................................................................
is
alway keptsecret,
..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2022 9626/11/O/N/22 [Turn over


8

9 Jose has a greenhouse to grow his plants. He lives in a country which has a warm climate so the
greenhouse does not need a heater but has microprocessor controlled windows and a temperature
sensor.

(a) Describe how the sensor represents the temperature so the computer can read the data.

Electrical signals are generated.


...................................................................................................................................................

............................................................................................................................................. [1]

(b) Complete this pseudocode algorithm to show the processing which takes place to control the
temperature of the greenhouse.

-
WHILE system switched
INPUT temperature
on

3
IF temperature
THEN
> preset

- THEN
IF window closed

send signals to
open
window
...................................................................................................................................................

#DIE
...................................................................................................................................................

EISE
...................................................................................................................................................

⑰window n
...................................................................................................................................................
THEN
...................................................................................................................................................

signals window
send to
loss
...................................................................................................................................................

Ne
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2022 9626/11/O/N/22


9

(c) Discuss the advantages and disadvantages, to Jose, of using microprocessor control in this
scenario.
The benefits of is Jose can
using microprocessor
...................................................................................................................................................
reduce the chance of plants dying, since computers
...................................................................................................................................................

can work 24/7; they also tend to be more accurate w


...................................................................................................................................................
than
human, if the temperature gets too hat they
...................................................................................................................................................
can
immediatelyopen/close the windows. However,
...................................................................................................................................................
-

using microprocessor control be


expensive to
...................................................................................................................................................
can

set
up, they have errors, andthe maintenance
...................................................................................................................................................
can

costcan be costly,they needed to be checked


...................................................................................................................................................

from time to time. -


...................................................................................................................................................

...................................................................................................................................................

Ben-computers do task automatically


...................................................................................................................................................
will not forget
computer
...................................................................................................................................................

...................................................................................................................................................
function when there is
bit ...................................................................................................................................................
out
cannot a
power
-can be destroyed by natural disaster
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2022 9626/11/O/N/22 [Turn over


10

10 Companies who store the personal data of individuals use a number of methods to prevent illegal
access to this data.

Apart from preventing illegal access, suggest other methods companies can use to protect the
confidentiality of this data.
should the
Companies follow protection rules.
..........................................................................................................................................................

use less confidential data possible,


..........................................................................................................................................................
as as

allow authorized
only worker to have access to
..........................................................................................................................................................

these datas, authorized workers should


sign an
..........................................................................................................................................................

agreement for
keeping these data secured, remove
..........................................................................................................................................................

gestags from
photos if
possible.
..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [5]

11 Explain what is meant by an indirect data source. In your explanation include descriptions of two
different indirect data sources.

Data that is collected for reason but


..........................................................................................................................................................
a

is used for different reason. For examples


..........................................................................................................................................................
a

people provide personal information in storewhen


..........................................................................................................................................................

buying beer.
..........................................................................................................................................................
a

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2022 9626/11/O/N/22


11

BLANK PAGE

© UCLES 2022 9626/11/O/N/22


12

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.

© UCLES 2022 9626/11/O/N/22

You might also like