Questions - Grade 8AB

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

3

4 Young people use the internet for research and communication.

(a) Search engines can be used to research information on the internet.

Describe three benefits of using a search engine to find information.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

[3]

(b) Social media can be used to communicate with friends.

Give four precautions that young people should take when using social media.

1 ........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

4 ........................................................................................................................................

...........................................................................................................................................

[4]

© UCLES 2023 03_0417_12_2023_1.10 [Turn over


7

11 A student has downloaded a file which contains a virus.

(a) Describe the possible effects on his computer system if he opens the file.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [2]

(b) Explain how the student could prevent the computer from being infected by viruses.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [3]

(c) Some files containing viruses have to be quarantined as they cannot be deleted.

(i) State the type of files that may have to be quarantined rather than deleted.

................................................................................................................................ [1]

(ii) Explain how the software detects and quarantines the file.

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................

................................................................................................................................ [3]

© UCLES 2023 03_0417_12_2023_1.10 [Turn over


6

7 You have been asked by your teacher to use a word processor to create a brochure for a new
intake of pupils. The brochure will consist of:

• Images of the school taken from a digital camera.


• Printed archive photographs.
• Information about the school already stored as text files.
• Information to be typed directly into the brochure.

(a) Describe the steps which you will need to take to create the brochure.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) When the brochure is being created, the word processing software automatically checks the
spelling of the text as it is typed in and may suggest alternative words.

Explain why the suggestions may not always be appropriate.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 0417/11/O/N/19


10

10 E-safety is very important when using the internet. It is very easy to accidentally reveal personal
data to others when using social networking sites.

(a) Describe three strategies, giving reasons for each one, which you would take to avoid
revealing personal information when using social networking sites.

Strategy 1 .................................................................................................................................

...................................................................................................................................................

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Strategy 2 .................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................

Strategy 3 .................................................................................................................................

...................................................................................................................................................

Reason 3 ..................................................................................................................................

...................................................................................................................................................
[6]

(b) Confidential personal data is sensitive data.

Name three items of personal data that could be sensitive data.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2019 0417/11/O/N/19


8

(c) Juan wants to create his report whilst he is working in the jungle.

Compare the advantages and disadvantages of using a smartphone rather than a laptop
computer for creating his report.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [8]

© UCLES 2019 06_0417_11_2019_1.13


10

10 Kaori is writing a school project about the history and origins of Dracula for her English Literature
examination. Kaori has produced the text shown in Fig. 10.1. Her teacher has reviewed the project
and thinks the layout of the document could be improved. Kaori has produced an improved version
shown in Fig. 10.2.

Fig. 10.1

Fig. 10.2

© UCLES 2019 06_0417_11_2019_1.13


11

(a) Describe the steps that Kaori took to improve the layout of the body text.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Describe the steps that Kaori took to edit the heading.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(c) When Kaori has completed the project, she notices that on one of the pages the last line of
the paragraph has appeared on the next page.

Give the technical term for this.

...........................................................................................................................................

........................................................................................................................................... [1]

© UCLES 2019 06_0417_11_2019_1.13 [Turn over


12

11 John has realised that his younger sister is using social media websites. During her use she may
reveal personal data.

(a) Explain what is meant by personal data.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [4]

(b) Describe the strategies that John would suggest to his sister so that she can minimise the
potential dangers whilst using social media websites.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

........................................................................................................................................... [6]

© UCLES 2019 06_0417_11_2019_1.13


4

6 Students can use CDs or pen drives for storing their work. Give three reasons why students For
may prefer to use pen drives. Examiner's
Use

[3]

© UCLES 2010 0417/11/M/J/10


7

(c) Tick three advantages of using computers, rather than students, to control the growing For
conditions. Examiner's
Use


Computer readings are more accurate

Students always forget to take readings

Students might be unavailable to take readings during school holidays

Computers can record data for later use

Computers can analyse the results

Computers can react to changes in the conditions immediately


[3]

The students want a printed record of the computer readings as they are taken. They want
to put the printer inside the greenhouse. Their teacher has suggested a dot matrix printer.
The students suggested an inkjet printer.

(d) Give two reasons why the teacher has suggested a dot matrix printer.

[2]

(e) Give two reasons why the students have suggested an inkjet printer.

[2]

© UCLES 2010 0417/11/M/J/10 [Turn over


14

19 Give three reasons why pilots are trained using flight simulators rather than by flying real For
aircraft. Examiner's
Use

[3]

20 Explain what is meant by the following terms.

Phishing

Pharming

Spam

[3]

© UCLES 2010 0417/11/M/J/10


3

3 Tick True or False next to each of these statements. For


Examiner's
Use
True False

Dot matrix printers produce high quality output.

Laser printers are very noisy.

Graph plotters are used when extremely large hard copy is required.

Inkjet printers are used where continuous stationery is required.

[4]

4 Complete each sentence below using one item from the list.

a bank cheque a floppy disc an inkjet printer

a light sensor a memory stick a microphone

a mouse a plotter a school register

(a) Options from a menu can be selected using

(b) Magnetic ink characters are used to record information on

(c) A very large file which needs to be moved from one computer to another for

editing can be stored on

(d) Sound can be input to a computer using [4]

5 Tick True or False for the following statements about RAM and ROM.

True False

RAM is not volatile.

ROM is used to store the BIOS of a computer.

The data in ROM is easier to change than that in RAM.

RAM is used to store the data the user is currently working on.

[4]

© UCLES 2009 0417/01/O/N/09 [Turn over


13

15 Tick three essential components of a computer to be used in a video conferencing system. For
Examiner's
Use


Graph plotter

Trackerball

Microphone

Speakers

Optical mark reader

Web cam

[3]

16 On-line banking is used by many customers. Describe three methods of making sure that
the data transferred is secure.

[6]

© UCLES 2009 0417/01/O/N/09 [Turn over


11

14 The prolonged use of computers can lead to health and safety problems. For
Examiner's
Use
(a) Tick two health problems that may be caused by prolonged use of computers.

RSI

Influenza virus

Blood poisoning

Headaches
[2]

(b) Tick two ways of preventing health problems.

Sit far away from the monitor

Sit in a comfortable chair

Take regular breaks

Put a screen filter in front of the monitor


[2]

(c) Tick two safety problems that may be caused by the use of computers.

Back problems

Electrocution

Fire

Hacking
[2]

(d) Tick two ways of preventing safety problems.

Don’t overload electrical sockets

Make sure there are no bare wires

Use an expert system

Use anti-virus software


[2]

© UCLES 2009 0417/01/M/J/09 [Turn over


13

16 A hospital uses computers to monitor the health of patients. For


Examiner's
Use
(a) Give three advantages of using computers rather than nurses to do this.

[3]

(b) Explain why analogue to digital conversion is needed when computers are used in
monitoring and measuring.

[4]

© UCLES 2009 0417/01/M/J/09 [Turn over

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy