Documente Academic
Documente Profesional
Documente Cultură
Name
Date
21/04/2016
Page 1 of 1610
Questio
n
Max
Marks
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
1
2
4
2
2
2
4
2
1
3
5
4
2
5
3
8
1
2
2
1
2
2
4
1
1
3
4
2
1
1
0
4
Total
50
31
Question 1 of 16
New ways of communicating have opened up markets on a global scale.
Businesses around the world communicate with customers, suppliers and the
public via email, web forms, instant messaging, live chat, blogs and forums.
Which of the following is an example of online publishing?
[1]
Page 2 of 1610
-voting
Question 2 of 16
Domain
Pathname
http://ww
w.
megasto
reuk . eu
Domain
Page 3 of 1610
[2]
Padlock
Location
Location
Question 3 of 16
Advertisements are aimed at grabbing your attention and making you
buy/read/use their product. Commercial advertisements may also use rollovers
and interactive elements which invite the user to click to see a result.
(a) Affiliate programs can be an effective way of e-marketing.
Explain the term pay-per-click.
[2]
(b) Name the text file that can be used for targeted marketing, allowing a
profile of the customer to be built up based on what they have clicked on or
viewed.
[1]
Enter your answer in the box
(c) Give the name of a program that displays advertising on a user's computer,
usually in the form of pop-ups.
[1]
Enter your answer in the box
Page 4 of 1610
Question 4 of 16
E-mail, which stands for electronic mail, enables worldwide communication via
computers or mobile devices between users. With email you can send, receive,
reply and forward mail to one or more recipients (a recipient is someone who
receives).
Give one advantage and one disadvantage of using email.
[2]
Question 5 of 16
A web browser requests a page and displays all components of the requested
page on the user's computer (e.g. text, images, animations, videos, links, etc.).
Match the correct type of web component to the descriptions below.
Meta tag
Hyperlink
Browser
Page 5 of 1610
[2]
HTML
HTML
Meta tag
Question 6 of 16
This question refers to the Internet infrastructure.
(a) Give the name for an access point (i.e. a physical location) for connecting
networks or communication devices to the Internet, usually comprising a
server, router, modems and switches.
[1]
Tick one box
IMAP
POP3
NAP
Point of Presence
Page 6 of 1610
(b) Give the name for a public network exchange where ISPs can connect and
exchange traffic between their networks via peering arrangements.
[1]
Tick one box
Router
NAP
ISP
Splitter
Page 7 of 16
Question 7 of 16
A database is used for storing information.
Match the labels to the correct description below.
DBMS
SQL
Record
[4]
Relationship
Record
SQL
Relationship
DBMS
Page 8 of 165
Question
Question 10
8 of
of16
16
Data exchange refers to the passing of data between computers on a network,
the methods of transmitting data between computers and the type of
transmission mode.
(a) Label the device in the diagram below which enables a wired device to
become part of a wireless network.
Wired Device
Switch
[1]
Wireless Network
(b) Label the device in the diagram below which enables wireless connection to
a network. Correctly label the device below:
[1]
Router
Wi-Fi Adapter
Desktop Computer
Question 9 of 16
Data, such as personal or financial details, that is transmitted via a network
(particularly a wireless, public or unsecured network) is prone to security threats.
Give the name for the security measure that makes data incomprehensible but
can be decrypted by the receiver.
[1]
Enter your answer in the box
Encryption
Page 9 of 165
To ensure the safety of your data, it is important to save your work regularly.
Match the correct term to the descriptions below.
Memory Stick
Recycle Bin
[3]
Remote
Recycle Bin
Remote
Memory Stick
Question 11 of 16
There are many social network sites providing chat rooms, forums, email and
instant messenger which allow you to post information about yourself and
communicate with other users. When using these sites, users should be cautious
about what personal information is disclosed as they may be viewed by complete
strangers.
(a) Describe two ways in which a user can stay safe while using social
networks.
[2]
Page 10 of 165
Question 11 of 16 (continued)
(b) Describe what is meant by the term spam.
[2]
(c) Name the term used for posting deliberately hostile messages to other
Internet users.
[1]
Grilling
Roasting
Page 11 of 165
Question 12 of 16
Collaborative working enables multiple people to share files and resources.
Tania wants to know more about collaborative working. To help Tania, list one
advantage and one disadvantage of collaborating online.
[4]
Enter your answer in the box
Advantage People can work on a project together and they have the internet right
infront of them, so if they need information they can access it easily.
Disadvantage The person you are working with may write the wrong information.
Page 12 of 165
Question 13 of 16
It is important to maintain full control over who can access and edit shared
documents, ensuring that sensitive information is kept secure.
Match the correct type of security measure to the descriptions below.
Access Rights
Read-only
Acceptable Use
[2]
Password Protect
Password Protect
Read-only
Question 14 of 16
Data transfer rates refer to the speed at which data is sent via a network.
(a) In which way is the transfer rate of data most commonly measured?
[1]
Page 13 of 165
Page 14 of 16
[4]
Question 16 of 16
Explain, using examples, the term packet switching.
[3]
Page 15 of 1610
The most obvious one is an antivirus, Windows comes with Windows Defender free
but if you wanted something different you can get loads on line ranging from all sorts
of prices, some are even free. Another way of staying safe is just be carful, dont
download anything from an untrusted site and watch what yourself and others are
doing. Lastly if you have an antivirus you should do a scan at least once a month,
maybe once a week. This will make sure you have nothing on your system and if you
do it will clear it out before it becomes a problem.
Page 16 of 1610