0% found this document useful (0 votes)
3 views

Revision 12

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Revision 12

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Revision 12

The digital divide affects many people for many reasons. For example, it exists
between people who live in rural areas and people who live in urban areas.
(a) Describe the causes of the digital divide in rural areas compared with urban
areas.
Ans: Three from:
People in rural areas have lower incomes and are not to afford technology
devices
Broadband speeds in rural areas are lower than in urban areas
Telecommunication facilities are not easily available in rural areas
As people in rural areas have lower incomes, it is difficult for them to make
investments in technology.
Rural areas lack the infrastructure for technology companies to build on
without huge investment
Fibre connection costs are much higher for companies to provide in rural
areas.

(b) Suggest ways of reducing this divide.

Ans: The government could give subsidy on internet access for low-income
households.
The government could provide free of cost internet to schools, libraries and rural
health care providers to access telecommunications and internet services
Easy availability of internet cafes in schools could allow adults access to
technology facilities in the evenings and during school holidays
Schools could provide teaching and training to adults to improve their skills.

Compare the use of forward chaining with the use of backward chaining.
Ans: Six from:

Both are methods of reasoning used by an inference engine


Both use a rules base to solve problems.
Both involve the output of one rule activating another rule
Forward chaining is bottom-up reasoning and backward chaining is topdown
reasoning
Forward chaining starts with a set of known facts and applies rules to generate
new facts
Forward chaining continues until it reaches a set goal
Forward chaining checks the facts against the set goal
Forward chaining is data driven and backward chaining is goal driven
With forward chaining the data decides which rules are used in a rules base
With backward chaining goals decide which rules are used in a rules base
Backward chaining starts with a goal or hypothesis and looks for rules to support
the hypothesis
Backward chaining can either support or reject an hypothesesis.

A school secretary is updating a database by copying data from some hard copy
records. Here are three of the records:

The Student_number will be stored as text, with the first two characters
representing the year group the student belongs to.

The Student_number and Date_of_birth are the only data that need to be
validated as they are entered. A range check, limit check or presence check
would not be appropriate for validating these data.

(a) Describe, in precise detail, three appropriate validation checks that could be
used to validate the data. Each validation check must be different.
Ans: Three matched pairs (all must be different):
A length check could be performed on the Student_number data Each data
item must be exactly 5 characters long/no more and no less than 5 characters
A format check could be performed on the Date_of_birth data Each date
must consist of two digits followed by a slash, followed by two digits, followed
by a slash, followed by four digits
A length check could be performed on the Date_of_birth data Must be exactly
10 characters
A consistency check could be performed on the Student_number and
Date_of_birth data The first two digits/year group must relate to the
Date_of_birth

(b) As well as validation, verification will need to be carried out. Explain why
verification is needed in addition to validation. Use examples from your
answers to part (a).
Ans: Six from: Four from:
Common errors when copying data are transcription and transposition errors
Verification would pick up a transposition error, but most validation checks
(except a check digit) would not
Verification would pick up transcription errors, but validation might not.
Verification is checking that data that has been entered into a computer has
been copied correctly from the data source
Validation is checking that the data entered is reasonable/sensible
neither method checks that data is accurate/correct.
Examples from:
A format check might show that the Date_of_birth is in the correct format of
dd/mm/yyyy but verification would pick up errors… …Jonathon Odoki’s
Date_of_birth, for example, might have been incorrectly copied as
12/07/2004/month and day have been swapped.
A length check might show that the Student_number is the correct length but
verification would pick up a transposition error… …For example Sven
Johansson’s Student_number could have been copied as 09312/two digits
have been swapped.
A length check might show that the Student_number is the correct length but
verification would pick up a transcription error… …For example Sven
Johansson’s Student_number has been copied as 09S32/text has been
entered instead of a digit
A consistency check might show that the Date_of_birth is consistent with the
Student_number but Manjit Sangherra’s Student_number may have been
copied as 11102… …and Date_of_birth as 11/03/2006

(a) Describe what is meant by the term ‘spyware’.

Spyware is a type of malware that collects information about a user’s activities


without them knowing and a user might experience slow processing power
and low bandwidth.
Data such as web browsing habits are collected
Data such as user’s personal data are collected such as the user’s credit card
numbers, usernames and passwords
A keylogger can be used to collect a record of the user’s keystrokes
Data is sent to the hacker It does not replicate like a virus or worm
(c) Explain how a hacker uses the information gained from spyware to
commit fraud.
Hackers can sell the personal/financial information to other criminals ‘
Hackers can impersonate the user/commit identity theft Hackers can use the
user's financial data to ask the bank for a new PIN
Hackers can ask the bank for an extra bank card
Hackers can buy goods through internet shopping using the credit card details
they have obtained
Hackers can withdraw large sums of money from the user's bank account.

Advantages of Mainframe computer


Ans:

You might also like