Sunteți pe pagina 1din 16

Joshua Isaacs

Name
Date

21/04/2016

Pearson BTEC Level 1 / Level 2 First

Information and Creative Technology


Unit 1: The Online World
Practice Examination 2

This practice examination is 1 hour in duration and contains 50 marks.


Please write your name at the top of this page and answer all questions on the
following pages using the spaces provided. There are 16 questions in total.

BTEC Level 1 / Level 2 ICT Unit 1

Page 1 of 1610

Questio
n

Max

Marks

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

1
2
4
2
2
2
4
2
1
3
5
4
2
5
3
8

1
2
2
1
2
2
4
1
1
3
4
2
1
1
0
4

Total

50

31

ZigZag Education, 2014

Question 1 of 16
New ways of communicating have opened up markets on a global scale.
Businesses around the world communicate with customers, suppliers and the
public via email, web forms, instant messaging, live chat, blogs and forums.
Which of the following is an example of online publishing?

[1]

Tick one box


Web Conferencing
Podcast

BTEC Level 1 / Level 2 ICT Unit 1

Online tax assessment


E

Page 2 of 1610

-voting

ZigZag Education, 2014

Question 2 of 16

A web address or URL is used to access a website on the Internet.


Label the two parts of the website address (URL) below.
Protocol

Domain

Pathname

http://ww
w.
megasto
reuk . eu
Domain

BTEC Level 1 / Level 2 ICT Unit 1

Page 3 of 1610

[2]

Padlock

Location

Location

ZigZag Education, 2014

Question 3 of 16
Advertisements are aimed at grabbing your attention and making you
buy/read/use their product. Commercial advertisements may also use rollovers
and interactive elements which invite the user to click to see a result.
(a) Affiliate programs can be an effective way of e-marketing.
Explain the term pay-per-click.

[2]

Enter your answer in the box


Pay-per-click is when someone has some form of advertisement online and they pay
a set amount per click on there ad.

(b) Name the text file that can be used for targeted marketing, allowing a
profile of the customer to be built up based on what they have clicked on or
viewed.
[1]
Enter your answer in the box

(c) Give the name of a program that displays advertising on a user's computer,
usually in the form of pop-ups.
[1]
Enter your answer in the box

BTEC Level 1 / Level 2 ICT Unit 1

Page 4 of 1610

ZigZag Education, 2014

Question 4 of 16
E-mail, which stands for electronic mail, enables worldwide communication via
computers or mobile devices between users. With email you can send, receive,
reply and forward mail to one or more recipients (a recipient is someone who
receives).
Give one advantage and one disadvantage of using email.

[2]

Enter your answer in the box


Advantage Its a free instant messaging service.
Disadvantage You do not know if the receiver has gotton/read the email.

Question 5 of 16
A web browser requests a page and displays all components of the requested
page on the user's computer (e.g. text, images, animations, videos, links, etc.).
Match the correct type of web component to the descriptions below.
Meta tag

Hyperlink

Browser

The source code used for creating web pages


Used to add keywords and descriptions to help
users find a website via search engines

BTEC Level 1 / Level 2 ICT Unit 1

Page 5 of 1610

[2]

HTML

HTML

Meta tag

ZigZag Education, 2014

Question 6 of 16
This question refers to the Internet infrastructure.
(a) Give the name for an access point (i.e. a physical location) for connecting
networks or communication devices to the Internet, usually comprising a
server, router, modems and switches.
[1]
Tick one box
IMAP
POP3

BTEC Level 1 / Level 2 ICT Unit 1

NAP
Point of Presence

Page 6 of 1610

ZigZag Education, 2014

(b) Give the name for a public network exchange where ISPs can connect and
exchange traffic between their networks via peering arrangements.
[1]
Tick one box
Router
NAP

ISP
Splitter

Page 7 of 16

Question 7 of 16
A database is used for storing information.
Match the labels to the correct description below.
DBMS

SQL

Record

A collection of related fields

[4]
Relationship
Record

When a query is created in a database software


program such as Microsoft Access, it is written
using this language

SQL

Used to bring together data from multiple tables


by matching a unique field in one table with a field
in another, thereby minimising data duplication

Relationship

Used by businesses to share data, control and


manage redundant data and ensure consistency
and integrity of data

DBMS

BTEC Level 1 / Level 2 ICT Unit 1

Page 8 of 165

ZigZag Education, 2014

Question
Question 10
8 of
of16
16
Data exchange refers to the passing of data between computers on a network,
the methods of transmitting data between computers and the type of
transmission mode.
(a) Label the device in the diagram below which enables a wired device to
become part of a wireless network.

Wired Device

Switch

[1]

Wireless Network

(b) Label the device in the diagram below which enables wireless connection to
a network. Correctly label the device below:
[1]

Router

Wi-Fi Adapter

Desktop Computer

Question 9 of 16
Data, such as personal or financial details, that is transmitted via a network
(particularly a wireless, public or unsecured network) is prone to security threats.
Give the name for the security measure that makes data incomprehensible but
can be decrypted by the receiver.
[1]
Enter your answer in the box
Encryption

BTEC Level 1 / Level 2 ICT Unit 1

Page 9 of 165

ZigZag Education, 2014

To ensure the safety of your data, it is important to save your work regularly.
Match the correct term to the descriptions below.
Memory Stick

Recycle Bin

When items are deleted from a computer hard


drive they are sent here

[3]
Remote
Recycle Bin

A type of backup service provided by ISPs over


broadband Internet connections

Remote

A portable storage device which is inserted into


the USB (Universal Serial Bus) port of a computer

Memory Stick

Question 11 of 16
There are many social network sites providing chat rooms, forums, email and
instant messenger which allow you to post information about yourself and
communicate with other users. When using these sites, users should be cautious
about what personal information is disclosed as they may be viewed by complete
strangers.
(a) Describe two ways in which a user can stay safe while using social
networks.

[2]

Enter your answer in the box


1) Keep personal information private
2) Dont let anybody else have access to your account

Question 11 continues on the next page

BTEC Level 1 / Level 2 ICT Unit 1

Page 10 of 165

ZigZag Education, 2014

Question 11 of 16 (continued)
(b) Describe what is meant by the term spam.

[2]

Enter your answer in the box


Spam is a thing that is sent usually to a large number of people, it is usually
advertisement or malware.

(c) Name the term used for posting deliberately hostile messages to other
Internet users.

[1]

Tick one box


Firing
Flaming

BTEC Level 1 / Level 2 ICT Unit 1

Grilling
Roasting

Page 11 of 165

ZigZag Education, 2014

Question 12 of 16
Collaborative working enables multiple people to share files and resources.
Tania wants to know more about collaborative working. To help Tania, list one
advantage and one disadvantage of collaborating online.
[4]
Enter your answer in the box
Advantage People can work on a project together and they have the internet right
infront of them, so if they need information they can access it easily.
Disadvantage The person you are working with may write the wrong information.

BTEC Level 1 / Level 2 ICT Unit 1

Page 12 of 165

ZigZag Education, 2014

Question 13 of 16
It is important to maintain full control over who can access and edit shared
documents, ensuring that sensitive information is kept secure.
Match the correct type of security measure to the descriptions below.
Access Rights

Read-only

Acceptable Use

These allow authorised users to access areas on


the system using their password
This feature protects a file from being altered

[2]

Password Protect
Password Protect

Read-only

Question 14 of 16
Data transfer rates refer to the speed at which data is sent via a network.
(a) In which way is the transfer rate of data most commonly measured?

[1]

Tick one box


Bits / bytes per second

Gigabytes per minute

BTEC Level 1 / Level 2 ICT Unit 1

/ megabytes per second


Megabits
Terabytes per second

Page 13 of 165

ZigZag Education, 2014

Page 14 of 16

(b) Using an example for each, explain


the
between wired and
Question
15 difference
of 16
wireless transmission in terms of transfer speeds, ranges and uses.

[4]

Enter your answer in the box

Question 16 of 16
Explain, using examples, the term packet switching.

[3]

Enter your answer in the box

It is important to protect your computer against malicious programs, such as


viruses, worms, Trojan horses, spyware, adware and rogue diallers.
Naomi wants to ensure that his computer is protected from malicious threats.
Discuss what measures Naomi should take to protect his computer from threats
such as viruses and spyware.
[8]
Enter your answer in the box

BTEC Level 1 / Level 2 ICT Unit 1

Page 15 of 1610

ZigZag Education, 2014

The most obvious one is an antivirus, Windows comes with Windows Defender free
but if you wanted something different you can get loads on line ranging from all sorts
of prices, some are even free. Another way of staying safe is just be carful, dont
download anything from an untrusted site and watch what yourself and others are
doing. Lastly if you have an antivirus you should do a scan at least once a month,
maybe once a week. This will make sure you have nothing on your system and if you
do it will clear it out before it becomes a problem.

BTEC Level 1 / Level 2 ICT Unit 1

Page 16 of 1610

ZigZag Education, 2014

S-ar putea să vă placă și