exam prep for r001 wednesday 18th may 2016 - deyes high school  · web view2016-08-31 · please...

55
Exam Prep for R001 Wednesday 18 th May 2016 Please read the pre-release case study below, underlining key areas before starting this exam prep. Information for Learners: Gyms offer people the opportunity to exercise in a number of ways. As well as the use of weights and exercise machines, gyms also offer a range of classes, each led by an instructor. People who want to attend a class usually have to sign up to show their interest (Scenario 1). Gym instructors are usually self-employed and may lead and organise classes at many different gyms. As well as working with large groups, instructors also work as Personal Trainers on a one-to-one basis (Scenario 2). Scenario 1 Fun Gym is based in a converted warehouse in London. The gym has two weights rooms, one studio for aerobics and other classes and a room with 30 static bikes used for group cycling classes. The studio and the room with the static bikes are each equipped with one computer and a speaker system. The gym has a website, which is its main form of advertising. Bridget, the owner of the gym, uses web-authoring software on a computer in her office to maintain the website. The website has a ‘news’ section, which includes photographs and features on instructors, members and special events. Bridget takes most of the photographs for this section herself, and optimises them so that they are suitable for use. The website includes a ‘members only’ section. This is a restricted area that members use to book their classes. The gym runs classes throughout the week, staffed by instructors. All instructors at the gym are self-employed and are paid a fee for each session they lead. At the end of every month Bridget sends each instructor an email with an attached encrypted file. The file contains the details of their earnings for the month and the date that the money will be transferred to their bank account.

Upload: others

Post on 14-Mar-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Please read the pre-release case study below, underlining key areas before starting this exam prep.

Information for Learners: Gyms offer people the opportunity to exercise in a number of ways. As well as the use of weights and exercise machines, gyms also offer a range of classes, each led by an instructor. People who want to attend a class usually have to sign up to show their interest (Scenario 1).

Gym instructors are usually self-employed and may lead and organise classes at many different gyms. As well as working with large groups, instructors also work as Personal Trainers on a one-to-one basis (Scenario 2).

Scenario 1 Fun Gym is based in a converted warehouse in London. The gym has two weights rooms, one studio for aerobics and other classes and a room with 30 static bikes used for group cycling classes. The studio and the room with the static bikes are each equipped with one computer and a speaker system.

The gym has a website, which is its main form of advertising. Bridget, the owner of the gym, uses web-authoring software on a computer in her office to maintain the website. The website has a ‘news’ section, which includes photographs and features on instructors, members and special events. Bridget takes most of the photographs for this section herself, and optimises them so that they are suitable for use. The website includes a ‘members only’ section. This is a restricted area that members use to book their classes.

The gym runs classes throughout the week, staffed by instructors. All instructors at the gym are self-employed and are paid a fee for each session they lead. At the end of every month Bridget sends each instructor an email with an attached encrypted file. The file contains the details of their earnings for the month and the date that the money will be transferred to their bank account.

Scenario 2Tom is a gym instructor who leads and organises four group-cycling classes a week at Fun Gym. He also works at other gyms and competes in cycling competitions. He sometimes has to travel to these competitions and so is unavailable for work on those days when he is competing.

Tom has seven private clients and, every month, he emails them details of forthcoming events and competitions.

Tom plans his classes for the week to include fast sprints, hill climbs and cool-down sessions. He selects suitable music from his home computer to use with his classes. Tom transfers the music to a storage medium which he then takes with him to each gym.

Tom wants to attract more members to his classes so he has decided to create posters advertising the forthcoming week’s sessions. These posters will combine graphics and text.

Page 2: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Tom would like to work in primary schools and so has been developing a course for younger children. He has been researching into the use of video games which simulate sport and exercise. He is particularly interested in those video games which use specialist input devices to involve the player directly in exercise.

Tom has recently been the victim of cyber-bullying and has been researching methods that he could use to reduce the chance of this bullying continuing.

To prepare for the exam, you should research the following:

Hardware and software required to support the business function of the organisation.

Features and purposes of computing devices:1. Research the meaning of the following Key Words, and write in your own words,

giving examples where appropriate:

Portable devices ______________________________________________

______________________________________________

Operating systems ______________________________________________

______________________________________________

Application software ______________________________________________

______________________________________________

Multimedia software ______________________________________________

______________________________________________

Storage devices ______________________________________________

______________________________________________

Magnetic media ______________________________________________

______________________________________________

Page 3: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

2. Describe the following portable computer devices and state the features and functions (i.e. CD Drive, integral/separate keyboard, word processing, voice calls, surf the internet etc. ) of each.

Laptop_______________________________________________________________________________________________________________________________________

Netbook_____________________________________________________________________________________________________________________________________

Tablet_______________________________________________________________________________________________________________________________________

Smartphone__________________________________________________________________________________________________________________________________

Input devices:

3a. What is an input device? List and describe five computer input devices, i.e. keyboard, graphics pad, webcam, scanner etc. e.g. Keyboard, used to input letters, numbers and characters e.g to write a letter.

1. ___________________________________________________________________

2. ____________________________________________________________________

3. ____________________________________________________________________

4._____________________________________________________________________

5._____________________________________________________________________

3b. Specialist input devices might be used by Tom during his work in primary schools into video games which stimulate sport and exercise. For each of the devices below, write a summary sentence about how the input device might be used by the children.

Dance mat: ____________________________________________________________

______________________________________________________________________

X Box Kinect: ___________________________________________________________

______________________________________________________________________

Play Station move: ______________________________________________________

______________________________________________________________________

Page 4: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

4. Match the input device on the left that is most suitable for the tasks on the right.

Output devices:

5. What is an output device? List and describe five computer output devices, i.e. printer, Monitor, speakers etc.

e.g. Printer, used to output electronic documents or images onto paper e.g. to print a letter to post or poster onto paper to display in the gym.

1. ____________________________________________________________________

2. ____________________________________________________________________

3. ____________________________________________________________________

4._____________________________________________________________________

5._____________________________________________________________________

Microphone

Recording a song Mouse

Writing a letter

Scanner ‘Face to face’ communication

Keyboard Surfing – clicking on links, icons

Webcam Capturing photos for editing

Page 5: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

6. Match the task with the most suitable output device:

7. Bridget uses a digital camera to take pictures in the gym and use these on the website. Explain why the digital camera is both an input and an output device._____________________________________________________________________________

_____________________________________________________________________________

Application Software.

8. Which Application Software is most suitable for the tasks below:

(Remember: use generic terms such as spreadsheet & word processing, not Excel and Word.)

Writing a letter ______________________

Making calculations/creating charts and graphs ______________________

Updating the news or blog on a website ______________________

Sending email/receiving email ______________________

Creating publications such as leaflet, poster etc. ______________________

Making presentations with images and text ______________________

Editing photos ______________________

Page 6: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

9. Taking pictures – modern smartphones typically have a camera. What is the resolution measured in?

M_ _ _ p _ _ _ _ _

10. Compare the following electronic and paper based diary for Bridget at Fun Gym. Include the following in your comparison: Ease of use, storage, finding information, editing information, use online & offline.

Paper based diary Electronic diary

Ease of use

Storage capacity

Ease of finding information

Ease of editing information

Online or Offline or both

Ease of use

Storage capacity

Ease of finding information

Ease of editing information

Online or Offline or both

Page 7: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

11. How can documents be created and edited collaboratively. Describe the following methods of sharing documents:

Network shared area (e.g. read/write access like the shared area)

____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Cloud based services (e.g. open or restricted access to files stored online such as DropBox and Google Drive)

____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 8: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Fun Gym use restricted areas of their websites to provide members with special services, such as the ability to book classes.

12. Complete the gap fill on Members areas of a website:

Adding a Member _ _ _ _ _ Button to the Fun Gym website allows them to set _ _ _ _ _ _ _ pages of their site as members-only pages. A site visitor that tries to access the members-only pages will be prompted to _ _ _ _ in or to sign up for the site.The basic function of the login application is to allow registered _ _ _ _ _ _ _ to book their classes and to keep out _ _ _ _ _ who haven’t registered.

Its second major function is to allow users to_ _ _ _ _ _ _ _, storing their information in a database so they don’t have to enter their information each time, such as their _ _ _ _ _ _ _ _ _ _ number.

Members only areas usually do the following:

Give customers a choice of whether to register for website _ _ _ _ _ _ or to log in to the website if they’re already registered.

Display a registration _ _ _ _ that allows new customers to type their registration information.

Validate the information submitted in the form. For example to make sure the membership number field is not _ _ _ _ _ (to ensure only Fun Gym members can book classes) and the submitted information is in the correct format.

Store the validated information in the_ _ _ _ _ _ _ _ . Display a login form that asks for the registered customer's _ _ _ _ _ _ _ _ and_ _ _ _ _ _

_ _ . Compare the username and password that's entered with the usernames and

passwords in the database. If a _ _ _ _ _ is found, send a web page from the site to the customer. If no match is found, give the customer the opportunity to try another login.

Aside from the capability to register and log in, a login application can get much more complex, giving the capability for Bridget to assign roles to certain accounts. For example, Tom might be an _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ who can view details of members signed up for his classes.

members membership form sign matchspecific database Login username registeraccess blank password users administrator

Page 9: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

The content included in posters that would be displayed in a gym and methods by which these posters can be created.

13. What software would Tom use to create posters? ____________________________________

14. Find three examples of posters online advertising gym classes. What information do they all

contain / have in common?

__________________________________ _________________________________________

__________________________________ _________________________________________

__________________________________ _________________________________________

15. Tom needs images to use in his posters and finds these online. How can Tom ensure he is not breaking copyright rules when he uses images he finds online?_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

Legal issues.

Copyright:- The Copyright, Designs and Patents Act, 1988 makes it illegal to copy music, text, images or logos from the Internet and then re-use them without permission from the copyright owner. Photographs are the legal property of the photographer, not the subject.

16. Complete the gap fill:

Information on the World Wide Web is protected by copyright laws. If you copy without_ _ _ _ _ _ _ _ _ _ , you could be breaking _ _ _ _ _ _ _ _ _ laws.

Some websites give permission for their material to be used for _ _ _ _ _ _ _ _ _ _ _ or non-profit making purposes – the statement of permission is usually on the home page of the site.

Before you use content from another website you should contact the _ _ _ _ _ _ for permission – this may not always be successful.

You must always _ _ _ _ _ _ _ _ _ _ _ work that is not yours!

If you write the information in your own _ _ _ _ _ you are not breaking copyright laws.

educational acknowledge permission words copyright author

Page 10: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

17. How do you know if something is protected by copyright? ____________________________

___________________________________________________________________________

18. What sort of things can be protected by copyright? _________________________________

___________________________________________________________________________

19. How does it apply to Fun Gym? _________________________________________________

___________________________________________________________________________

20. How does it apply to Tom? _____________________________________________________

___________________________________________________________________________

Computer Misuse Act:-21. Complete the gap fill on the Computer Misuse Act:

The Computer Misuse Act was created to protect data stored on computers from _ _ _ _ _ _ _ . It covers:

The unauthorised accessing of materials stored on _ _ _ _ _ _ _ _ _ . This means that if you access any materials that you do not have _ _ _ _ _ _ _ _ _ _ to view you are breaking the law, as is using a _ _ _ _ _ _ _ _ to access data or programs stored on other computers. This is often what people refer to as ‘hacking’ but hacking is only _ _ _ _ _ _ _ if you do not have permission to access the data or use the computer to access the data. Some hackers are employed by companies to hack their own computers to find loopholes in their _ _ _ _ _ _ _ _ . This is not illegal as they are authorised.

Any access to computer material with the intention of committing further offences.This is against this law and is used to _ _ _ _ _ _ _ _ _ people who have illegally changed data to commit fraud or use the illegally obtained information to commit other offences such as identity theft.

Unauthorised _ _ _ _ _ _ _ _ _ _ _ to computer materials. If you change data stored on computer when you do not have permission, then this is breaking this law; for instance, if you access someone else’s computer files and change the contents, then you are breaking this law. This law also covers _ _ _ _ _ _ _ which affect computers data as they do so without the owner’s permission. It is illegal to knowingly send computer viruses.

Penalties for breaking the law can be prison term of several years, or fines, or both.

permission security computers permission virusesprosecute hackers illegal alterations computer

Page 11: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Data Protection Act: -

22. Complete the gap fill below on the Data Protection Act:

Because Fun Gym are collecting _____________ data such as a persons’ __________, address and date of birth, they will have to make sure that they collect and ___________ this data according to the _________principles of the _________ Protection Act (1998).

The eight principles are that DATA MUST BE:

1. Processed ___________ and lawfully2. Processed for limited purposes3. Adequate, relevant and not _______________4. Accurate5. Not kept ___________ than necessary6. Processed in accordance with the data ___________’ rights7. Kept ______________8. Not _______________ to any country outside the EU without similar ________________.

Name Secure Eight Personal Data

Legislation Fairly Longer Store Subjects

Excessive Transferred

How and why files may be encrypted.

Encryption is the process of encoding messages or information in such a way that only authorised parties can read it. Encryption does not of itself prevent interception, someone getting hold of the messages, but denies the message content to the interceptor as they cannot read it without the correct decryption key.

23. Why will Fun Gym need to encrypt their data? ______________________________________

______________________________________________________________________________

______________________________________________________________________________

Page 12: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

24. Label the missing parts of the diagram below:

Recipient Decrypt Encrypt Sender Ciphertext

25. Put these stages in the correct order: [4]

□ Decryption using private key

□ Encryption using public key

□ Sending ciphertext

□ Give public key to sender

Optimising image files for displaying on websites.

Images often account for most of the downloaded bytes on a web page and also take up a significant amount of visual space. As a result, optimising images can often give some of the largest byte savings and performance improvements for a website: the fewer bytes the browser has to download, the faster the browser can download useful content on the screen.

Bridget will need to optimise the Fun Gym website so that it is easy for members to use and for them to book their classes. In particular, lots of people now access the internet using their mobile phones or tablets.

Page 13: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

26. Why should Bridget ensure her website is suitable to be used by smart phones and tablets? _____________________________________________________________________________

_____________________________________________________________________________

Strategies Bridget can use for optimising images:

Eliminate unnecessary images – take away any images on the home page or login page which are unnecessary.

Ensure images have an ‘alt text’ or alternative text description so that users with visual disabilities can hear the text read aloud rather than see the image.

Ensure files sizes are small so that visitors to your website won’t have to wait too long for the page to download. Try to keep images below 70kb.a) Save large bitmap images (photographs) as compressed files such as jpeg files.b) Reduce the number of colours in an image.c) Reduce the physical size of the image.

27. Benefits and drawbacks: What do you think are the benefits and drawbacks of the following techniques to optimise images for the web:

Benefits Drawbacks

Compressing files

Reducing colours

Reducing sizes

Removing images

Software used to carry out calculations.

28. Which of the following software would commonly be used to carry out calculations? (please circle)

Word Processing Database Web authoring Spreadsheet Desk-top Publishing

Page 14: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

28. Using the keywords listed below match them to the arrows pointing to different parts of the spreadsheet shown:

Active Cell Worksheet Tab Row ColumnCell Reference Formula Bar Bold Underline

Can you think of two things Bridget might record in a spreadsheet to help her calculate how much to pay her instructors? 1. ________________________ 2. _____________________________

29. A spreadsheet is being designed to contain data about a tuck shop.

Page 15: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

The data to be stored is the item name, cost price, selling price, profit and number sold for each item. Profit = Selling price – Cost price. The Total profit per item = Profit x Number Sold.

(a) Write down one cell apart from those in row 1 which would store text: _____

(b) Write down one cell where the data would be numeric. _____

(c) Write down one cell which would contain a formula. _____

(d) Write down a formula to work out the total profit per item. ______

30. Tom uses a spreadsheet to record the timing scores of his clients of a 10 mile cycle. The spreadsheet below shows the timing scores of some of those clients.

(a) Write down the formula which should go in cell E2. ____________________

(b) Write down the formula which should go in cell B6. ____________________

Transferring files between devices.

31. Tom needs to be able to move music files between his computer and the computers at Fun Gym for his classes. Which of the following storage devices do you think he should use? (please circle)

CD DVD Blu Ray Memory stick Magnetic tape drive External hard disc

32. Why do you think he should use this device? __________________________________________

_______________________________________________________________________________

33. Why should Tom not e-mail the files to himself and then log in to his e-mail at Fun Gym? ______

_______________________________________________________________________________

Page 16: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Accessing files remotely.

34. Complete the data storage technologies word search below:

34. Security measures when storing data – complete the table below stating how to protect others from accessing password, username and access to your personal files either at home or at school.

How to protect it Risk of unauthorised access/usage Password

Username

Access to documents in your user area

Page 17: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

35. Data transferring technologies - research and describe in your own words the following methods of transferring data. Then, for each method list three advantages and three disadvantages.

Advantages Disadvantages

E-mail is _________________

_________________________

_________________________

1.

2.

3.

1.

2.

3.

SMS (Text message) is ______

_________________________

_________________________

1.

2.

3.

1.

2.

3.

Peer-to-peer file sharing is

______________________

_________________________

_________________________

1.

2.

3.

1.

2.

3.

Page 18: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

36. Compare the use of an external hard drive for storing back-ups of Fun Gym’s website with using cloud storage by completing the table below:

External Hard Drive Cloud StorageAmount of storage

Portability

Security

Cost

Ease of use

37. Methods of transferring data - fill in the blanks below from the list above.

Wired and wireless method

Mobile data transmission i.e. 3g , 4g

peer to peer file sharing

email, Use of data encryption

This method is most suitable for transferring a large amount data ___________________.

_____________________provides the quickest method of f transferring data.

This method of transferring data is future proof ___________________.

______________ allows data to be transferred securely.

_____________allows the user to access data on demand/on the go.

Page 19: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Correct and efficient use of email when communicating within a business setting.38. Can you design a poster giving important advice about using e-mail in a business setting. E.g

do’s and don’ts or email etiquette.

Page 20: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Online and Paper Based Forms.

A data capture form is been designed especially to collect data from people. Sometimes it is called a questionnaire.

The forms can be either printed onto paper to be completed in pen or electronically so that people can complete it and submit it online.

A data capture form should contain a title, a brief explanation and instructions on how to complete it. There should also be information about what to do with the form once it has been completed.

An online data entry form is often used to input data, which has previously been collected, perhaps from a paper form, into a database.

There are some common controls within a data entry form that include:

• Text Box : Allows a single text line to be entered• Text Area: Allows multiple lines of text to be entered• List Box: Allows you to pick one or more items from a list• Combo Box: Allow you to pick a single item from a list• Radio button: Always in a group of at least two, but often more. radio buttons allow you to

make a single selection from a number of options.• Check box: A small rectangular box that allows you to select an option. • Submit Button: Allows you to send the data. Often some 'validation' checks are made before

sending in order to make sure the data format is valid and within range.

39. Compare an online data capture form with a paper based data entry form in the table below:

Online Data Capture Form Paper Data Entry FormEase of use

Requires a computer / internet connection Yes / no Yes / no

Data entered goes straight onto database Yes / no Yes / no

Speed of use

Accuracy of information submitted

Page 21: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Validation & Verification:Validation and verification are important tools to ensure minimal mistakes in the data we enter onto our databases. Online forms can utilise both of these techniques to ensure data entered is reasonable, sensible and complete. They can’t ensure it is totally accurate, but they can help.

40. Follow this link and read the information, filling in the gaps below: http://www.teach-ict.com/gcse_new/databases/validation_verification/miniweb/pg2.htm

Validation is one way of trying to reduce the number of _ _ _ _ _ _ in the data being entered into your system.

The validation is performed by the _ _ _ _ _ _ _ _ at the point when you enter_ _ _ _ . It is the process of _ _ _ _ _ _ _ _ the data against the set of validation _ _ _ _ _ which you set up when developing your new _ _ _ _ _ _ _ _ or _ _ _ _ _ _ _ _ _ _ _ system.

DEFINITION: Validation aims to make sure that data is_ _ _ _ _ _ _ _ , reasonable, complete and within acceptable boundaries.

It is critical that you understand what this definition means and can repeat it when asked in an examination question.

Do not say ‘validation checks that the data is correct’ because it does NOT!!

If you enter ‘Smithe’ instead of ‘Smith’ or ‘07/08/07’ instead of ‘08/07/07’ no amount of validation in the world will pick up that _ _ _ _ _ error.

So while _ _ _ _ _ _ _ _ _ can help to reduce the number of errors when _ _ _ _ _ _ _ _ data, it cannot

_ _ _ _ them.

rules checking spreadsheet computer data sensiblehuman stop errors entering validation database

Keywords:User error – when someone entering the data makes a mistake

Validation – is checking that the data entered into a computer is correct. It is an automatic computer check to ensure that the data entered is sensible and reasonable. It does not check the accuracy of data.

Verification - is performed to ensure that the data entered exactly matches the original source. There are two main methods of verification:

Double entry - entering the data twice and comparing the two copies. This effectively doubles the workload, and as most people are paid by the hour, it costs more too.

Page 22: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Proofreading data - this method involves someone checking the data entered against the original document. This is also time consuming and costly.

41. Read the following table and then complete the table below to show which is an example of verification and which is an example of validation.

Validation type

How it works Example usage

Check digit the last one or two digits in a code are used to check the other digits are correct

bar code readers in supermarkets use check digits

Format check checks the data is in the right format a National Insurance number is in the form LL 99 99 99 L where L is any letter and 9 is any number

Length check checks the data isn't too short or too long a password which needs to be six letters long

Lookup table looks up acceptable values in a table there are only seven possible days of the week

Presence check

checks that data has been entered into a field in most databases a key field cannot be left blank

Range check checks that a value falls within the specified range

number of hours worked must be less than 50 and more than 0

Spell check looks up words in a dictionary when word processing

Page 23: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Page 24: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Factors Affecting Choice of Data Capture Methods

42. Explain the following methods of capturing data (gathering members details, ID and any written text), give at least one advantage and one disadvantage of each to Fun Gym.

paper-based ____________________________________________________________________

______________________________________________________________________________

_______________________________________________________________________________

automated data capture methods i.e. OCR (Optical Character Recognition) __________________

_______________________________________________________________________________

_______________________________________________________________________________

43. Capturing Data - Use the words in the list below to complete the sentence

Software Automatic Written Optical Paper Scan form

A bar code reader uses visible red light to _________ and read a barcode

An optical mark reader is a scanning device that reads carefully placed pencil marks on a specially designed __________ or document.

The ___________ based method is the most commonly use method of

collecting or capturing data.

An Optical Character Recognition system consist of a normal scanner and

some special____________ the scanner is used to scan the text from a

document into the computer.

The ___________ character recognition is used to automatically recognise

postcodes on letters at sorting offices

There are many methods which can be used to collect and enter data, some manual and some _________________

A speech recognition software is also an example of automatic data entry. The software listens to the speaker then translates the information into ________________ words.

Page 25: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

44. Bridget processes a number of online and paper based membership applications. Use the variables below to evaluate which method is most suitable to process the information. Give reasons for your answer.

Online application Paper based application

Which option is more costly for the business? whyWhich option is economically friendly? why

Which option is easier to use for the applicant? Why? For which option is data more secure? Why?

Which option allows data to be processed quickly? Why?

Which is easier to store/maintain? Why?

45. Create a questionnaire to gather personal information about new members. When creating this questionnaire you must consider the audience and purpose, your questionnaire must capture the following data.

Gender, Age, Personal details i.e. Date of Birth, Contact details, sports played, fitness goals, Any other relevant information.

Consider how the form might be laid out to ensure it is easy to fill in, but also easy to transfer the data to the Fun Gym database. You may want to look at images of forms online for ideas.

Page 26: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Databases:46. The local zoo has created a database to store records about each of the animals.A copy

of their main table looks like the one below

(Remember: Fields - (Column heading), Records (information in an Rows))

Animal Breed Name GenderAge

Food

Giant Panda PongoM

8 Bamboo

Giant Panda Bongo F 7 BambooPenguin Pingu M 5 FishLion Hermes M 4 Fresh meatLion Tarsa F 4 Fresh meatCrocodile Spike M 7 Fresh meatGorilla Gemella F 122 FruitZebra Stripey M 8 GrassSnake Leyla F 2 Live miceParrot Robina F 25 Nuts and seeds

a) How many fields are there in the zoo database? ……………………………………………............

b) How many records are stored in the database? …………………………………………….............

c) One of the fields has been sorted into ascending order. Which field is it? ……………....

d) One item of data in the database looks incorrect. Which one do you think it is? ……………………………………………………………......................................................................

e) Explain your answer…………………………………………………………………………………....................

f) How many animals are there in the database which are female?………………..................

g) Give the names of the animals which eat fresh bamboo?……………………………………………

h) Give the name of the animal which eats fresh meat and is female?…………....................

Page 27: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Data SecurityOur data is important, whether it is our personal information stored on a school or work database such as members details at Fun Gym or customer order details stored in a business’s files, it can be catastrophic if it is lost, damaged or stolen. Anyone that holds data therefore needs to keep it secure to prevent loss, damage or theft, and not just to comply with the DPA legislation.

Software security

User ID’s: User ID’s are unique to each user of a computer or network and usually follow a pattern or ‘naming convention’. They allow a user to access their own files as well as shared files. These user ID’s are not kept secret, BUT cannot be used without a password. Bridget will have user ID’s assigned to each of the instructors that work at Fun Gym.

47. Passwords: Answer these questions about passwords:

What makes a strong password? __________________________________________________

Why should you change your password often? _______________________________________

Why shouldn’t you use the same password for lots of different accounts / log-ins? __________

_____________________________________________________________________________

What should a secure password contain? ___________________________________________

Give an example of a secure password: _____________________________________________

Access Rights / Permissions: Access rights give each user permission to access or not to access certain files. For example, as a student user, you can ‘read’ and ‘alter’ files on the Public Shared area, but you cannot ‘save’ files there or ‘delete’ them.

Properties of specific files can be changed by clicking on the ‘properties’ tab for a file.

48. Complete the table below describing what each of the rights allow users to do.

Right DescriptionWrite Allows a user to write new data to the file.ReadAlterSaveDelete

Page 28: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Physical securityPhysical methods of protection are there to stop unauthorised people physically going to the computer and accessing the system. There are many ways in which companies can help make their equipment more secure.

49. Complete the following list filling in the gaps using the words in the table below.

1. Lock the _ _ _ _ when not in use.2. Use swipe _ _ _ _ _ or keypads to activate locks.3. Bolt computers to the _ _ _ _.4. Use special pens to mark their _ _ _ _ _ _ _ _ onto the computer case.5. Keep windows shut – especially if on the _ _ _ _ _ _floor. Use bars.6. CCTV video _ _ _ _ _ _ _ to monitor rooms where the computers are and corridors.7. Use security_ _ _ _ _ _ , large companies only.8. ID _ _ _ _ _ _ which are checked by security guards.9. Position the screen so that _ _ _ _ _ _ _ _ _ _ can’t see what you’re working on.10. Ensure no one sees you type in your_ _ _ _ _ _ _ _ .

desk postcode cameras cards guardsground passers-by room password passes

Compression:Compression means to reduce the size of a file, for example a document, spreadsheet or photo. It is a good idea to compress large files because they can take up a lot of storage space on your hard disc (ever been unable to take a new photo or video because there was ‘not enough storage’ on your phone??). They will also take a long time to send as an attachment by e-mail or download from a website. Before you can use a compressed file, it needs to be uncompressed. Compression is usually carried out by a piece of utility software such as WinZip.

50. Fill in the table below with advantages and disadvantages, you can use the internet to research:

Advantages of compression Disadvantages of compression

Page 29: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

File Formats.

There are a number of file formats available to support storing an image. Each has advantages and disadvantages. Bridget uses photographs, usually stored as bitmap or raster images. Bridget uses her photographs on the Fun Gym website.

There are two types of images common on the internet - 'bitmap' images and 'vector' images.

With bitmaps, information on each pixel is stored within the file. This makes the file sizes large as they need to contain a lot of data about each pixel. The higher the resolution (pixels per inch) the larger the file size. Bitmaps also have some problems. If you enlarge bitmaps, they tend to lose quality and look blurry or pixelated. This is because the pixels are made larger.

Graphic types

Characteristics Advantages Disadvantages Examples of use

Bitmap

Consist of many tiny dots called pixels. It is possible to edit each individual pixel.

Create lifelike images.

Contain a lot of detail – you can edit every pixel.

The file size of a bitmap graphic is often quite large.

Bitmap graphics lose quality when they're resized.

Photos

Vector

Vector graphics are based on mathematical relationships with control points that make up the image. Information is not stored about each pixel. These points are connected by lines and curves called vector paths or vectors.

Small file size.

Scalable - when you resize a vector graphic the mathematical relationships mean that the image does not lose quality.

Vector graphics are never going to be as lifelike as bitmaps or photos. They will always appear computer generated.

Logos, Posters

A vector image contains instructions to the computer on how to draw the image from scratch, so it tells the computer that this area is red, this area is black etc. When vector images are enlarged they remain the same quality as the areas do not change.

Page 30: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

GIFShort for 'Graphics Interchange Format'. It can support both static image or an animated / moving image. In the early days of the web, animated gifs were everywhere, but as the web got more sophisticated, web designers use them much less frequently.

GIF is a lossless format for storing a bitmap image. GIF can also support transparency, unlike some other popular formats such as jpeg.

With lossless compression, every single bit of data that was originally in the file remains after the file is uncompressed. All of the information is completely restored. This is generally the technique of choice for text or spreadsheet files, where losing words or financial data could pose a problem. The Graphics Interchange File (GIF) is an image format used on the Web that provides lossless compression.

On the other hand, lossy compression reduces a file by permanently eliminating certain information, especially redundant information. When the file is uncompressed, only a part of the original information is still there (although the user may not notice it). Lossy compression is generally used for video and sound, where a certain amount of information loss will not be detected by most users. The JPEG image file, commonly used for photographs and other complex still images on the Web, is an image that has lossy compression. Using JPEG compression, the creator can decide how much loss to introduce and make a trade-off between file size and image quality.

51. Complete the bottom table using the table and notes above comparing graphic file formats by circling the correct answers:

Jpeg Bitmap Gif

Average file size Small / Medium / Large Small / Medium /

Large

Small / Medium /

Large

Lossy / Lossless Lossy / Lossless Lossy / Lossless Lossy / Lossless

Compressed? Yes / No Yes / No Yes / No

Quality High / Low / Variable High / Low / Variable High / Low / Variable

Typical use eg.

Websites, photographs,

animated images.

Supports

transparency?

Yes / No Yes / No Yes / No

Page 31: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Understanding of tools within image editing software. Photo editing software allows Bridget to edit and adjust photographs. Usually these photos come from a digital camera or smart phone, but they could also be scanned from existing photos. Digital photos are bitmap images. There is a large range of photo editing software available, e.g. Adobe Photoshop, Corel Paint Shop Pro and GIMP.

Features:

• Crop – cut off sides of an image to make it a suitable size or remove unwanted areas.

• Adjust contrast and brightness.

• Remove red-eye.

• Layers - you can have several different elements of the graphic as separate layers. These layers can be made invisible or even deleted at any time.

• Clone tool – allows the user to clone one part of the picture to another to remove an unwanted element.

• Special effects – the effects vary from one piece of software to another but usually include:

• Artistic effects - for example, making a picture look like an oil painting.

• Geometric effects - for example, making an image appear to be on the surface of a ball.

• Colour adjustments - for example, turning a photo into greyscale or brightening certain colours.

52. Bridget uses photographs on the Fun Gym website which she takes herself. Give three ways Bridget might edit her images and say why this would be useful.

1. ________________________________________________________________________

2. ________________________________________________________________________

3. ________________________________________________________________________

Page 32: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Understanding tools within email.

53. Complete the gap fill below on email:

Features of email:

• automatic reply, forwarding and redirection of _ _ _ _ _ _ _ _ can be set up.• facility to send _ _ _ _ _ _ of a message to many people (CC, BCC)• automatic filing and retrieval of messages• addresses can be stored in an _ _ _ _ _ _ _ book and retrieved instantly• notification if a message cannot be delivered and read _ _ _ _ _ _ _ _ sent.• emails are automatically date and _ _ _ _ stamped• signatures can be attached• files, graphics or sound can be sent as_ _ _ _ _ _ _ _ _ _ _ , often in compressed formats• webmail and mobile email can be used to receive and send messages while on the move.

Email on other devices:

Today email is not limited to_ _ _ _ _ _ _ _ _ . It can be sent from many other devices too, such as: _ _ _ _ _ phones (using the carrier's network or a wireless hotspot), games consoles, TVs and public kiosk terminals. With wireless hotspots becoming increasingly common it's easier than ever to connect to the Internet while on the move.

Advantages

• Emails are delivered extremely fast when compared to traditional _ _ _ _ .• Emails can be sent 24 hours a day, 365 days a year.• Webmail means emails can be sent and _ _ _ _ _ _ _ _ from any computer, anywhere in the

world, that has an _ _ _ _ _ _ _ _ connection.• Cheap - when using broadband, each email sent is effectively _ _ _ _ . • Emails can be sent to one person or several people.

Disadvantages

• The recipient needs access to the Internet to receive email.• Viruses are easily spread in email attachments (email providers scan emails for_ _ _ _ _ _ _ ).• Phishing - sending an email to a user falsely claiming to be a legitimate company to scam the

user into providing information, such as personal data and bank account numbers on a bogus website. The details will then be used for identity theft.

• No guarantee the mail will be read until the user logs on and checks their email.• _ _ _ _ - unsolicited email, ie junk mail.

address Internet receipts copies computers time virusesattachments smart messages free received Spam post

Page 33: Exam Prep for R001 Wednesday 18th May 2016 - Deyes High School  · Web view2016-08-31 · Please read the pre-release case study below, underlining key areas before starting this

Exam Prep for R001 Wednesday 18th May 2016

Cyberbullying.

54. Tom has recently been the victim of cyber-bullying and has been researching methods he could use to reduce the chance of this bullying continuing.

1. What is cyber bullying? _________________________________________________________

_____________________________________________________________________________

2. How it can affect people like Tom? _________________________________________________________

_____________________________________________________________________________

3. Give three ways Tom can prevent cyber bullying in the future? 1. ___________________________________________________________________________

2. ___________________________________________________________________________

3. ___________________________________________________________________________

When you have finished this preparation, please try the mock exam enclosed.

Set aside one hour of quiet time to do this. If you do not have an hour all at once, you can do 30 mins at a time, but please do not cheat.

DO NOT USE THE ANSWER SHEET until you have tried by yourself, then use this to mark your answers and see where you gained or missed marks or ask your teacher to help.