Professional Documents
Culture Documents
9626_s19_qp_12_ Answer
9626_s19_qp_12_ Answer
9626_s19_qp_12_ Answer
Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.
At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.
[Turn over
2
1 Tick the four statements referring to asymmetric encryption which are true.
The public key and the private key are published to everyone who wants to send
a message
Anyone with a copy of the public key can read encrypted data
3 People in a village are aware that the local river is being polluted. They are concerned that this is
being caused by a nearby factory.
Describe how computers and sensors could be used to monitor the level of pollution in the river in
order to determine whether the factory is responsible for the pollution.
Five from:
Place sensors upstream and downstream from the factory
Temperature / light / turbidity sensors would be connected to computer (Analogue) data is converted
into digital using an analogue to digital converter / ADC Conversion / use of ADC enables the
computer to understand the data Computer receives data from sensors / ADC Readings from above
the factory are compared with those from below the factory by the computer Differences / results are
printed out / displayed on screen Graphs are automatically produced by the computer showing
values from below and above the factory Computer stores readings in a table ready for processing.
[5]
4 Some people get confused when trying to establish what is data, information or knowledge. The
sequence of numbers 192.168.1.254 could be an example of data.
Using this example, or another of your choice, explain how data, information and knowledge are
linked.
Five from:
Max three from:
Data consists of raw facts and figures as it does not have any meaning until it is processed and given
a context
Information is data that is assigned a meaning / presented within a context that gives it meaning,
relevance and purpose
Knowledge is know-how and learning of contextualised information
(i) Primary key- A primary key is a field in a table which is unique and enables you to identify every
record in that table. [1]
(ii) Foreign key- A foreign key is used to link tables together and create a relationship / it is a field in
one table that is linked to the primary key in another table. [1]
(iii) Compound key - A compound key is a primary key that combines more than one foreign key to
make a unique value. [1]
[Turn over
4
Three from:
Prevents the entry of duplicate data
Prevents records being added to a related table if there is no associated record in the primary table
Prevents the changing of values in a primary table that result in orphaned records in a related table
Prevents the deletion of records from a primary table if there are matching related records. [3]
6 The owners of a bank are considering changing its system of reading cheques from Magnetic Ink
Character Recognition (MICR) to Optical Character Recognition (OCR).
Give two advantages and two disadvantages of using OCR instead of MICR.
Advantages – Two from:
The bank will have an electronic copy of the cheque to refer in case of customer complaints
Can read all the data on the cheque / not limited to MICR characters
Cheques can be processed after being deposited at ATMs
Cheques can be processed having been sent by phone (camera)
Disadvantages – Two from:
Cheques will be easier to forge / less secure
New OCR equipment / software will need to be purchased
If cheques are written over OCR will not be able to read it
OCR is less accurate than MICR.[4]
7 An examinations officer has created a spreadsheet containing a list of students and their dates of
birth. It will be used to calculate each student’s age in years. This is the age that they will be
on the date of a science exam which is on 21/05/2019.
A B C D E F G H
1
Number of
Family First Date of birth exams
2 name name (dd/mm/yyyy) Age entered for 21/05/2019
3
Write down the formula she used. This formula should be easy to replicate.
You can assume for the purpose of this exercise that the number of days in a year averages
out to 365.25.
= ............................................................................................................................................[4]
=INT((G$2-C4)/365.25)
5
INT() 1
(G$2 1
-C4) 1
/365.25 1
(b) (i) The spreadsheet is to be sorted in ascending order of Age and then descending order of
Number of exams entered for.
.......................................................................................................................................[2]
You can use the space below for any working you need.
16 [1]
4 [1]
(ii) The original spreadsheet is to be sorted in descending order of Age and then
ascending order of Number of exams entered for.
Write down the values which would be displayed in D17 and E17.
.......................................................................................................................................[2]
You can use the space below for any working you need.
16 [1]
3 [1]
(c) A teacher wanted to know the number of students aged 17 taking three exams.
Write down the formula containing a counting function she used in cell G4 to calculate this
number. This formula should work even if the data changes.
= ............................................................................................................................................[5]
You can use the space below for any working you need.
=COUNTIFS(D4:D23,17,E4:E23,3)
=COUNTIFS() [1]
(D4:D23 [1]
E4:E23 (and must come) after D4:D23 within same function [1]
,3) immediately after E4:E23 within the same function as D4:D23 [1]
[Turn over
6
(d) The teacher now wants to know the number of students aged 16 taking four exams.
Write down the formula containing a counting function she used in cell G5 to calculate this
number. This formula should work even if the data changes.
...............................................................................................................................................[3]
=COUNTIFS(D4:D23,16,E4:E23,4)
=COUNTIFS(D4:D23...) [1]
,16,E4:E23 [1]
,4) immediately after E4:E23 [1]
8 A library database consists of one table containing details of all the books in a library and another
table containing details of all the borrowers. Parts of the tables are shown below.
Books table
Borrowers table
(a) You have been asked to create a query which will output only the names and phone
numbers of all the borrowers who have a family name beginning with G and also live in
Midtown.
Describe the steps you would have to follow in order to create this query, without using a
query wizard or a parameter query.
Five from:
Select query design
In the table row select Borrowers/add Borrowers table
In the field row, select the fields FamilyName, FirstName, Mobilephone and Residence
In Show row untick Residence
In criteria row under FamilyName enter Like G*
In criteria row under Residence enter Midtown [5]
(b) You have been asked to create a query which will output only the titles and authors of all the
books published by Panda Books which have a replacement cost of less than €20.
Describe the steps you would have to follow in order to create this query, without using a
query wizard or a parameter query.
Three from:
Select query design, in the table row select Books/add Books table and in the field row, select the
fields Title, Author, Publisher and ReplacementCost
In Show row untick Publisher and ReplacementCost
In criteria row under Publisher enter Panda Books
In criteria row under ReplacementCost enter <20 [3]
[Turn over
8
9 Validation is often used to check that data entered into a computer is sensible. A customer orders
database contains details of the Customer ID number, the value of the order placed and the date
the order was placed. Any new order, when it is entered, needs to be validated.
Using these examples of database fields, analyse the use of the following different validation
rules – range check, type check, length check and format check.
Eight from: