0% found this document useful (0 votes)
40 views15 pages

Ig Ict Mock Paper 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views15 pages

Ig Ict Mock Paper 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

International GCSE

ICT

Paper 1 QP

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
1. Emma is a teacher in a primary school, teaching children aged 8 to 10. The school has
two computer rooms, each room has 20 computers in.
(a)(i) Which one type of network connects the computers?
A wide area network

B local area network

C personal area network.

(1)

(ii) Which one device stores data that all the computers can access?

A modem

B server

C router

D gateway.

(1)

(iii) Identify three components not given in part (a)(ii) that can be used within the network.
1………………………………………………………………………………………………………….
……………………………………………………………………………………………………………

2………………………………………………………………………………………………………….
……………………………………………………………………………………………………………

3………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
(3)

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
(b) Students can use the computers to access the Internet.
(i) Which one type of software is needed for students to access the Internet?

A word processor

B spreadsheet

C web browser

D graphic manipulation software

E email software.

(1)

(ii) Each computer has a MAC (media access control) address, and when the computers
connect to the network they are given an IP (internet protocol) address. Describe MAC and
IP addresses.
MAC
…..……………………………………………………………………………………………………….
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
…………………………………………………………...………………………………………………

IP
.…………………………………………………………………………………………………………..
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(4)

(c) The school has four laptops that connect to the network wirelessly.
(i) State three benefits of the laptops connecting using wireless instead of wired
communication.
1………………………………………………………………………………………………………….
……………………………………………………………………………………………………………

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
2………………………………………………………………………………………………………….
……………………………………………………………………………………………………………

3………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
(3)

(ii) Explain why the laptops connect using Wi-Fi instead of Bluetooth.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(4)

(d) The school was worried about allowing the students access to the Internet.
Discuss the factors that the school may have considered before allowing the students
access to the Internet.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(8)

(e) The school is developing a virtual learning environment (VLE).


Identify four key features of a VLE.
1…………………………………………………………………………………………………………
……………………………..……………………………………………………………………………

2…………………………………………………………………………………………………………
…………………………..………………………………………………………………………………

3…………………………………………………………………………………………………………
………………………………..…………………………………………………………………………

4…………………………………………………………………………………………………………
………………………………..………………………………………………………………………….
(4)

(f) The schools must ensure students follow health and safety rules when using the
computers.
Describe two health and safety risks associated with using computers.
1………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

2………………………………………………………………………………………………………….
……………………………………………………………………………………………………………

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(4)

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
2. Cheng runs a small business that sells products throughout the world. He uses his
computer to store important data about his clients and business.
(a) Cheng is worried about potential risks to his data and computer, including hackers.
(i) Identify and describe two other risks to his data and computer.
1………………………………………………………………………………………………………….
……………………………………………………………………………………………………………

2………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
(4)
(ii) Cheng has the password “1234”.
Explain how Cheng can increase the strength of his password.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(3)
(iii) Describe two methods, other than a strong password, that Cheng can use to keep the
data on his computer secure.
1………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

2………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(4)

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
(b) Cheng’s customers need to pay for the items securely.
Explain how Cheng can help ensure online payments are secure.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(2)

(c) Cheng has only recently started using the Internet to sell products.
Describe the benefits that using the Internet can bring to Cheng’s shop.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(4)

(d) Cheng stores personal data about his customers.


Describe the legal requirements Cheng has to follow when storing this data.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(3)

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
3. Eshan uses her mobile phone to communicate with friends.
(a) Eshan uses social networking sites.
(i) Identify three key features of social networking sites.
1…...……………………………………………………………………………………………………..
……………………………………………………………………………………………………………

2……...…………………………………………………………………………………………………..
……………………………………………………………………………………………………………

3..………………………………………………………………………………………………………...
……………………………………………………………………………………………………………
(3)
(ii) Describe two benefits to Eshan of using social networking sites.
1………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

2………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(4)
(b) Eshan is a member of several online forums. She signed acceptable behaviour policies
when joining the websites.
Explain the purpose of acceptable behaviour policies.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(2)

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
(c) Eshan uses a laptop when at home and a mobile phone when away from home to
connect to the Internet. She likes to have the latest models of laptop and mobile phone and
purchases new devices each year.
Discuss the factors Eshan should consider before purchasing new devices.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(8)

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
4. A bank needs a large and powerful computer that can perform multiple complex
processing tasks.
(a) Which one type of computer should the bank use?
A microprocessor
B portable computer
C mainframe computer.
(1)

(b) The bank needs each employee to have a personal computer and a multifunctional
device.
(i) Which one of the following is not a personal computer?
A desktop computer
B laptop
C embedded computer.
(1)

(ii) State what is meant by a multifunctional device.


……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(1)
(c) The bank is creating new automatic teller machines (ATMs) for its customers to use to
withdraw money from their account.
The bank is considering using a menu-driven interface or a graphical user interface (GUI) for
the automatic teller machine (ATM).
(i) Identify two features of a graphical user interface (GUI).
1………………………………………………………………………………………………………….
……………………………………………………………………………………………………………

2………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
(2)

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
(ii) Explain two benefits and one drawback of the bank using a menu-driven interface, rather
than a graphical user interface (GUI).

Benefit 1
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

Benefit 2
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

Drawback
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(6)

(d) The computers at the bank have software that allows the user to control and manage the
computer’s hardware. The bank makes sure the software is always up to date.
(i) Which one type of software allows the user to control and manage the computer’s
hardware?
A application software
B operating system
C utility software.
(1)

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
(ii) Explain two problems that could occur if the bank did not keep the software up to date.

Problem 1
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………

Problem 2
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(4)

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
5. George has a computer. The computer uses random access memory (RAM), read only
memory (ROM) and flash memory.

(a)(i) Which two of these statements are correct?

A RAM is volatile memory; ROM is non-volatile memory

B RAM stores data permanently; ROM stores data temporarily

C RAM cannot be upgraded; ROM can be upgraded

D RAM can be written to and read from; ROM can only be read from.

(2)

(ii) State two characteristics of flash memory.


1………………………………………………………………………………………………………….
……………………………………………………………………………………………………………

2………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
(2)

(b) George’s computer has the following specification:

 2GHz processor
 4GB RAM
 500GB hard disk drive (HDD).
(i) George upgrades the processor to a 4GHz processor to improve its performance.
Explain how this will improve the performance of the computer.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(2)

(ii) Identify two other ways George could improve the performance of the computer.
1………………………………………………………………………………………………………….
……………………………………………………………………………………………………………

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.
2………………………………………………………………………………………………………….
……………………………………………………………………………………………………………
(2)

(c) George stores a back-up of all the data on his computer in a cloud-based service. He is
discussing with his friend Rita why he stores his data in a cloud-based service. Rita is
concerned about storing her data in a cloud-based service.
(i) Explain one benefit George could give Rita for storing his data in a cloud-based service.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(2)

(ii) Explain why Rita may be concerned about storing her data in a cloud-based service.
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
……………………………………………………………………………………………………………
(4)

© Pearson Education Ltd 2018. Copying permitted for purchasing institution only. This material is not copyright free.

You might also like