Winter
2012
|
||
13
|
During
the design phase of the system development life cycle many issues need to be
considered. Other than design of hardware, describe in detail four features
or processes which should be considered when designing a new computer system.
|
[8]
|
Summer
2012
|
||
13
|
A
systems analyst is called in to give advice after a new ICT system is
implemented. Describe, using examples, four maintenance issues that could
have arisen.
|
[8]
|
Winter
2013
|
||
14
|
When
developing a new computer system, a systems analyst will have to investigate
to produce the feasibility report. Describe what will be investigated in
order to produce this report.
|
[5]
|
15
|
Once a
new computer system has been designed, it has to be implemented. Discuss two
different changeover strategies that an organisation could use for conversion
to the new system.
|
[6]
|
16
|
Once
the new computer system is up and running, it has to be maintained. Describe
two different system maintenance methods and illustrate each method with
appropriate examples.
|
[6]
|
Summer
2013
|
||
13
|
A
systems analyst is investigating a company with regard to creating a new ICT
system. Describe three methods she would use to gather information
about the existing system.
|
[9]
|
Winter
2014
|
||
4
|
A
system analyst has a choice of direct changeover or parallel running when
updating a computer system. Describe these two different potential changeover
strategies and describe the advantages and disadvantages of each of the
different strategies.
|
[6]
|
Summer
2014
|
||
12
|
A
company has installed a new ICT system which will have to be maintained.
Describe two different methods of system maintenance, illustrating each
method with an appropriate distinct example.
|
[2x3]
|
Summer
2015
|
||
8
|
A
system analyst has been employed by a council to produce a new computer based
system to replace the system currently running their central lending
library. Other than observation, describe two methods the analyst could use to investigate their current system.
|
[2x3]
|
10
|
A
doctors’ practice has installed a new computer system to help run the
practice. Once this system is up and
running, it has to be maintained.
Describe three different
methods of system maintenance and
illustrate each method with
appropriate examples.
|
[3x3]
|
Henry Box KS5 ICT Revision Blog
Labels
- IT1
- IT3
- Database systems
- HCI
- Networks
- Capabilities
- Data Info Knowledge
- ICT in business
- ICT in education
- ICT in healthcare
- ICT in the home
- Internet
- Limitations
- MIS
- Management of change
- Modelling
- Presenting information
- Quality Information
- Security Policies
- Social issues
- Systems development
- Validation
- Verification
- Working with ICT
- life cycle
Wednesday, 7 October 2015
IT3: Topic 9 - Systems development life cycle
IT3: Topic 7 - Management of change
Winter 2012
|
||
14
|
Following a company takeover, the introduction of
new ICT systems has a big impact upon the workforce and working patterns.
These changes have to be carefully managed. Describe in detail four different
consequences of change caused by the introduction of new ICT systems.
|
[4]
|
Winter 2014
|
||
7
|
Describe in detail three fears the workforce may
have when a new ICT system is introduced into their workplace.
|
[3x2]
|
8
|
Describe, using examples, two things that
management could do to lessen any fears that the staff might have about the
introduction of a new ICT system.
|
[4]
|
IT3: Topic 5 - Security Policies
Winter
2012
|
||
8
|
Describe
three factors an organisation needs to consider when producing a risk
analysis.
|
[6]
|
9
|
A local
council uses a network to manage their client records, appointments and all
their financial functions. The council’s Information Officer is worried about
the confidentiality of the records. Explain why the council should have
a security policy. Other than user accounts and logs, give three examples of
what it should contain.
|
[5]
|
10
|
Describe
the use of user accounts and logs as a way of keeping records secure.
|
[3]
|
Summer
2012
|
||
19
|
With
the increase in the use of computing systems most organisations have adopted
ICT security policies. Discuss in detail three different types of
potential threats to data. For each type of threat, describe the possible
consequences of the destruction of data. You need to use distinctly different
examples to illustrate your threats.
|
[9]
|
20
|
Discuss
four possible operational procedures for preventing misuse of data. Use
distinct examples to illustrate your procedures.
|
[8]
|
Winter
2013
|
||
5
|
A large
Research Agency uses ICT systems to store customer records and all its
financial functions. Explain why the agency should have a security policy and
give two examples of what it should contain, other than user accounts and
logs.
|
[4]
|
6
|
Describe
the use of user accounts and logs as a way of maintaining the security of
customer records.
|
[3]
|
9
|
Other
than how well the company is equipped to deal with the risk, describe in
detail three of the factors an organisation needs to consider when producing
a risk analysis.
|
[6]
|
10
|
A bank
is reviewing its disaster recovery programme. Other than risks, explain with
reasons three factors, which should be included in a disaster recovery
programme.
|
[6]
|
Winter
2014
|
||
18
|
Due in
parts to potential threats to data, most organisations have now created ICT
security policies. Discuss in detail four distinctly different types of
potential threats to data. For each type of threat, describe a possible
distinctly different consequence of the destruction of the data.
|
[12]
|
19
|
Describe
three operational procedures an organisation could put in place to prevent
misuse of data. Use different examples to illustrate each procedure.
|
[6]
|
Summer
2014
|
||
5
|
The
Data Officer of a large company has written a security policy for that
company. Explain why the company should have a security policy. Other
than user accounts and logs, give three examples of what it should contain.
|
[5]
|
6
|
Describe
the use of user accounts and logs as a way of keeping confidential data
secure.
|
[3]
|
11
|
A
finance company is carrying out a risk analysis. Describe in detail three of
the factors the company should take into account when
deciding how much to spend to control and minimise the risk to data.
|
[3x2]
|
Summer
2015
|
||
11
|
Other than establishing a code
of conduct,
discuss five possible operational procedures which could be
introduced to prevent the misuse of data.
Use distinct examples to illustrate these procedures.
|
[5x2]
|
13
|
Companies
and their customers are increasingly dependent on electronic
information. The security of
electronic data is very important to every company and their customers.
Describe
three different types of threat to a company’s data and illustrate each type of threat with a different detailed example. For each
of the different threats, describe a distinctly
different consequence for a company or its customers, should the security
of the data be compromised of the data destroyed.
|
[3x3]
|
Tuesday, 6 October 2015
IT3: Topic 8 - Management information systems (MIS)
Winter
2012
|
||
6
|
Most
organisations now use Management Information Systems (MIS). Describe what is
meant by an MIS, and use a suitable example to illustrate how it can be used.
|
[4]
|
7
|
Describe
the factors which make a Management Information System (MIS) either good or
poor.
|
[7]
|
Summer
2012
|
||
14
|
Many
organisations now depend on their Management Information System (MIS) for the
success of their businesses. Discuss using appropriate examples four of the
features of an effective MIS system.
|
[8]
|
Winter
2013
|
||
11
|
More
and more organisations are becoming very dependent on their Management
Information Systems (MIS). Describe in detail four factors that can lead to
an effective MIS.
|
[8]
|
Summer
2013
|
||
12
|
Most
organisations could not operate without a good Management Information System
(MIS). Define what is meant by an MIS and describe the factors which make an
MIS good or poor.
|
[10]
|
Winter
2014
|
||
9
|
Describe,
in detail, four of the factors which make an effective Management Information
System (MIS).
|
[8]
|
Summer
2014
|
||
13
|
Describe
the factors which make a Management Information System (MIS) either good or
poor.
|
[6]
|
Summer
2015
|
||
14
|
Organisations
find that having an ineffective Management
Information Systems (MIS) can be counter-productive. Describe, in detail, four factors that can help prevent a MIS being non-effective.
|
[4x2]
|
IT3: Topic 6 - Database systems
Winter
2012
|
||
17
|
Many
companies would now struggle to operate effectively without database
technology. Explain what is meant by a relational database.
|
[2]
|
18
|
Using
appropriate examples, describe the advantages of a relational database
approach over a flat file approach.
|
[6]
|
19
|
Describe
what a data warehouse is and give an example of how a company might use it.
|
[3]
|
20
|
Explain
what is meant by data mining and give a detailed example of how a company
might use it.
|
[3]
|
21
|
Discuss
in general terms, the advantages and disadvantages distributed databases give
to a company.
|
[3]
|
Summer
2012
|
||
15
|
Explain
what is meant by a relational database.
|
[2]
|
16
|
A DVD
Rental Company uses a relational database management system for organising
its lending. For simplicity, a person may only borrow one DVD at a time. Part
of one table in the DVD Rental Company database could be:
BORROWER
[BorrowerID, FirstName, Surname, Borrower Type, Address1, ........] with
BorrowerID being the primary key.
Give
two other suitable tables you could expect to see in this database,
identifying any primary and foreign keys.
|
[7]
|
17
|
Relational
databases are normalised to work effectively. Explain what is meant by the
term data normalisation.
|
[2]
|
18
|
Some
companies now use distributed databases. Explain what is meant by the term
distributed databases and explain their advantages and disadvantages.
|
[6]
|
21
|
Discuss
in general terms, the advantages and disadvantages distributed databases give
to a company.
|
[3]
|
Winter
2013
|
||
17
|
Data in
a relational database is normalised. Explain what is meant by a relational
database and data normalisation.
|
[4]
|
18
|
Describe
the terms data redundancy, data integrity and data consistency in relation to
a relational database approach over a flat-file approach.
|
[3x2]
|
19
|
Give
two reasons why relational databases are more secure than the flat-file
approach.
|
[2]
|
20
|
Modern
technology also makes use of distributed databases. Define what is meant by a
distributed database. Describe two security issues that apply to distributed
databases and suggest a different method for overcoming each issue.
|
[5]
|
Summer
2013
|
||
15
|
A Hospital
uses a relational database for storing patient records. Explain what is meant
by a relational database.
|
[2]
|
16
|
Data
consistency, Data redundancy, Data integrity and Data independence are all
terms associated with relational databases. Explain what each of these four
terms means.
|
[4]
|
17
|
Consultants
and patients are allocated to wards but each patient has only one consultant
and each ward has their own consultant. One table in this database could be:
WARD(Wardid,
WardName, NumOfBeds). With Wardid being the primary key.
Give
two other suitable tables you could expect to see in this database,
identifying any primary or foreign key.
|
[6]
|
18
|
Describe
what a data warehouse is and give an example of how a company might use it.
|
[3]
|
19
|
Explain
what is meant by data mining and give a detailed example of how a company
might use it.
|
[3]
|
21
|
Discuss
in general terms, the advantages and disadvantages distributed databases give
to a company.
|
[3]
|
Winter 2014
|
||
13
|
Relational
databases are normalised to work effectively. Explain what is meant by the
term data normalisation.
|
[2]
|
14
|
Give
three reasons why relational databases are more secure than a flat file
approach.
|
[3]
|
15
|
Distributed
databases are widely used. Explain what is meant by the term distributed
databases and explain their advantages and disadvantages.
|
[7]
|
16
|
Explain
what is meant by a data warehouse and describe the advantages it might give a
retail company.
|
[3]
|
17
|
Explain
what is meant by data mining and describe an example of how a retail company
might use it.
|
[3]
|
Summer
2014
|
||
15
|
Explain
what is meant by a relational database.
|
[2]
|
16
|
A car
hire company uses a relational database management system for organising its
rentals. For simplicity, a person may only hire one car at a time. Part of
one table in the car hire database could be:
CAR
[CarID, Make, Model, Colour, Year of registration, Hire rate, .........] with
CarID being the primary key.
Give
two other suitable tables you could expect to see in this database,
identifying any primary and foreign keys and at least two other fields in
each table.
|
[7]
|
17
|
Describe
how the car hire database structure could be improved to allow a person to
hire more than one car at a time.
|
[1]
|
18
|
Using
appropriate examples, describe the advantages of a relational database
approach over a flat file approach.
|
[8]
|
21
|
Discuss
in general terms, the advantages and disadvantages distributed databases give
to a company.
|
[3]
|
Summer 2015
|
||
15
|
Organisations
now store vast amounts of data in normalise form in relational databases. This data is used as a data warehouse and
is mined to aid decision making.
Explain what is meant by:
·
Data normalisation
·
Relational database
·
Data warehouse
·
Data mining.
|
[6]
|
16
|
A
relational database approach has many advantages, including increased
security. Describe the positive
security implications of a relational database over other types of database.
|
[2]
|
17
|
Give one advantage of using a data
warehouse and one detailed
advantage of data mining to an organisation.
|
[3]
|
18
|
Distributed
databases are used by some hotel chains.
Describe two benefits to a
hotel chain of using a distributed database and describe two security issues associated with distributed
databases for the hotel chain. Suggest
a different method the hotel chain could use for overcoming each of these issues.
|
[6]
|
Subscribe to:
Posts (Atom)