1.6.1
1.6.1
6 (a) Name the most suitable input or output device for each of the following uses.
[5]
(b) All of the uses in part (a) involve the input or output of data.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
.......................................................................................................................................[2]
(ii) Describe one way of ensuring the security of the data against malicious damage.
...........................................................................................................................................
.......................................................................................................................................[1]
3 (a) Give the definition of the terms firewall and authentication. Explain how they can help with the
security of data.
Firewall .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Authentication ...........................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
(b) Describe two differences between data integrity and data security.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) Data integrity is required at the input stage and also during transfer of the data.
(i) State two ways of maintaining data integrity at the input stage. Use examples to help
explain your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(ii) State two ways of maintaining data integrity during data transmission. Use examples to
help explain your answer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
4 Paul works part-time for a large software company. The company sells security software to
a number of banks. He also runs his own software company that produces and sells computer
games.
Draw lines to indicate whether each statement describes ethical or unethical behaviour.
Statement
Ethical
Unethical
Because his work load is increasing, Paul
is now using overseas companies to write
some of the routines used in his games
software.
[6]
8 A school stores a large amount of data. This includes student attendance, qualification, and
contact details. The school’s software uses a file-based approach to store this data.
.......................................................................................................................................[1]
(ii) Describe two ways in which the Database Administrator (DBA) could use the DBMS
software to ensure the security of the student data.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iv) The DBMS has replaced software that used a file-based approach with a relational
database.
Describe how using a relational database has overcome the previous problems
associated with a file-based approach.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(b) The database design has three tables to store the classes that students attend.
CLASS(ClassID, Subject)
CLASS-GROUP(StudentID, ClassID)
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
.......................................................................................................................................[1]
(iii) Write an SQL script to display the StudentID and FirstName of all students who are
in the tutor group 10B. Display the list in alphabetical order of LastName.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(iv) Write an SQL script to display the LastName of all students who attend the class whose
ClassID is CS1.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
7 A bank holds personal data about its customers and their financial data.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
(b) Describe three security measures that the bank could implement to protect its electronic
data.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[6]
BLANK PAGE
BLANK PAGE
3 A Local Area Network is used by staff in a hospital to access data stored in a Database Management
System (DBMS).
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
(b) A frequent task for staff is to key in new patient data from a paper document. The document
includes the patient’s personal ID number.
(i) The Patient ID is a seven digit number. The database designer decides to use a check
digit to verify each foreign key value that a user keys in for a Patient ID.
When a user assigns a primary key value to a Patient ID, the DBMS adds a modulus-11
check digit as an eighth digit. The DBMS uses the weightings 6, 5, 4, 3, 2 and 1 for
calculating the check digit. It uses 6 as the multiplier for the most significant (leftmost)
digit.
Show the calculation of the check digit for the Patient ID with the first six digits 786531.
(ii) Name and describe two validation checks that the DBMS could carry out on each
primary key value that a user keys in for a Patient ID.
Description .................................................................................................................
....................................................................................................................................
Description .................................................................................................................
....................................................................................................................................
[4]
3 A Local Area Network is used by school staff who access data stored in a Database Management
System (DBMS).
(a) (i) Explain the difference between security and privacy of data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(ii) Give an example for this application where privacy of data is a key concern.
...........................................................................................................................................
.......................................................................................................................................[1]
(b) Name and describe two security measures the Network Manager has in place to protect the
security of the data held in the DBMS.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(c) A task for staff at the start of the school year is to key in new pupil data from a paper document.
The data is entered to a screen form and includes the data verification of some fields.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
© UCLES 2017 9608/12/O/N/17
QUESTION 8. 8
(a) Two principles of the ACM/IEEE Software Engineering Code of Ethics are:
Name and describe three other principles in the ACM/IEEE Software Engineering Code of
Ethics.
Principle 1 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Principle 2 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Principle 3 .................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(b) The software development company uses data backup and disk-mirroring to keep their data
secure.
Explain how data backup and disk-mirroring allow the company to recover from data loss.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Disk-mirroring ...........................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2019 9608/11/M/J/19
QUESTION 9. 11
(a) Moheem has been told a relational database addresses some of the limitations of a file-based
approach by reducing data redundancy.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Explain how a relational database can help to reduce data redundancy.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(b) Moheem uses a Database Management System (DBMS) to ensure the security and integrity
of the data.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Feature 1 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Feature 2 ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2019 9608/12/M/J/19 [Turn over
12
(iii) The DBMS provides software tools for the database developer.
Fill in the names of the missing software tools in the following statements.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Describe two non-physical methods used to improve the security of computer systems.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
(c) A computer uses parity blocks to check the data that has been received is the same as the
data that has been transmitted.
Parity
Data
bit
1 1 1 1 0 0 0 1
0 0 0 0 1 1 1 0
1 1 0 1 1 0 0 1
Parity
1 1 0 1 1 0 0 1
byte
(i) Describe how a parity block check can identify a bit that has been corrupted during
transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Give a situation where a parity block check cannot identify corrupted bits.
...........................................................................................................................................
..................................................................................................................................... [1]
(d) One principle of the ACM/IEEE Software Engineering Code of Ethics is to always act in the
best interest of the client.
Explain how Frankie can ensure that he is acting in the best interest of his client.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(e) When the program is complete, Frankie uses a compiler to prepare the program for the client.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
1 In a supermarket, a self-checkout machine allows customers to scan the barcodes of products and
then pay for their shopping. These are an alternative to the traditional cashier-staffed checkout.
(i) Identify two other input devices that self-checkout machines have.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(ii) Identify two other output devices that self-checkout machines have.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
Write one of the letters A to D in each appropriate row to complete the sequence.
1 ............................
3 ............................
4 ............................
6 ............................
[2]
(i) Give two reasons why the self-checkout machine needs primary storage.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(ii) The self-checkout machines use Static RAM (SRAM) for their cache.
The following table has statements about SRAM or Dynamic RAM (DRAM).
Tick (✓) one box in each row to identify whether the statement is about SRAM or DRAM.
(c) The self-checkout machines connect to a server that stores all the data for the supermarket.
This is a client-server network.
(i) Describe, using an example for the supermarket, the client-server network model.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) The supermarket is concerned about the security and integrity of the data on the server.
Identify two methods that can be used to minimise the security risk to the data, and one
method to protect the integrity of the data.
Security 1 ..........................................................................................................................
...........................................................................................................................................
Security 2 ..........................................................................................................................
...........................................................................................................................................
Integrity .............................................................................................................................
...........................................................................................................................................
[3]