Answers
Answers
Second Edition
Endorsement indicates that a resource has passed Cambridge International Education’s rigorous quality-assurance
process and is suitable to support the delivery of a Cambridge syllabus. However, endorsed resources are not the only
suitable materials available to support teaching and learning, and are not essential to achieve the qualification. Resource
lists found on the Cambridge website will include this resource and other endorsed resources.
Any example answers to questions taken from past question papers, practice questions, accompanying marks and mark
schemes included in this resource have been written by the authors and are for guidance only. They do not replicate
examination papers. In examinations the way marks are awarded may be different. Any references to assessment and/or
assessment preparation are the publisher’s interpretation of the syllabus requirements. Examiners will not use endorsed
resources as a source of material for any assessment set by Cambridge International Education.
While the publishers have made every attempt to ensure that advice on the qualification and its assessment is accurate, the
official syllabus, specimen assessment materials and any associated assessment guidance materials produced by the
awarding body are the only authoritative source of information and should always be referred to for definitive guidance.
Our approach is to provide teachers with access to a wide range of high-quality resources that suit different styles and
types of teaching and learning.
For more information about the endorsement process, please visit www.cambridgeinternational.org/endorsed-resources
Chapter 1 answers
Activity 1a
The difference between data and information is that data has no meaning, whereas information is
data which has been given meaning.
Activity 1b
1 Observation is a method of data collection in which the data collectors watch what happens. The
observer is getting their information first-hand rather than from a third party.
2 Direct data is obtained first-hand whereas indirect data is obtained from a third party. Direct data
is data that is collected for a specific purpose or task and is to be used for that purpose and that
purpose only whereas indirect data is used for a purpose different to that for which it was
originally collected.
Activity 1c
1 Any two from:
Accuracy, relevance, age, level of detail and completeness of the information.
2 Measuring the quality of information is sometimes based on the value which the user
places on the information collected and therefore it can be fairly subjective. However,
judgements can be said to be objective if based on factors which are believed to affect the
quality of information. Poor data can lead to businesses making poor decisions. Inaccurate
data can cause businesses to get a poor reputation amongst customers.
Activity 1d
1 Symmetric encryption involves the sending computer, or user, and the receiving
computer, or user, having the same key to encrypt and decrypt a message.
2 Hard disk encryption is when a file is written to the disk, it is automatically encrypted by
specialised software and when it is read from the disk, the software automatically decrypts
it.
Email encryption involves the encryption of the actual connection from the email provider
then messages should be encrypted before sending them and all saved or archived
Activity 1e
1 Verification is checking that data has been entered accurately by a human or the process
of checking that data has been transferred accurately from one storage medium to another.
2 Three from:
A presence check is to make sure data has been entered in certain fields and not been left
out.
A range check always has an upper value and a lower value which form the range of
acceptable values; if a value is entered outside this range an error message is produced.
A length check is performed on alphanumeric fields to ensure they have the correct
number of characters
A format check checks that a certain combination of characters have been entered in a
field and if they have not, it will produce an error message.
A check digit is used on numerical data, which is stored as an alphanumeric data type. It
is only suitable for very long integers. A calculation is performed using each individual
digit in the integer and the result is a single digit which is added on to the end of the
integer. When this data is entered into a computer, it re-calculates the check digit to
identify if a match has occurred. If it does not, an error message is produced.
A lookup check compares the data that has been entered with a limited number of valid
options and if it matches one of these then it is allowed but if it does not, then an error
message is produced.
A consistency or integrity check will inspect data across two fields. An example of this
would be to check if a person’s age must be consistent with a field that contains their date
of birth.
A limit check is similar to a range check but the check is only applied to one boundary so
that if, for example, an upper limit is being used, when a value is entered which is above
this upper limit then it is rejected. If a lower limit is used, when a value is entered which
is below this limit then it is rejected.
Activity 1f
1 First record in the transaction file is read
2 First record in the old master file is read
3 REPEAT
4 IDs are compared
5 IF IDs don’t match, old master file record is written to new master file
6 IF IDs match transaction is carried out
7 IF transaction is D, old master file record is not written to new master file
8 IF transaction is C, data in transaction file is written to new master file
9 IF IDs match, next record from transaction file is read
10 Next record from master file is read
11 UNTIL end of old master file
Activity 1g
ID Department Rate ($) Wages_to_date
578 IT 30 3000
778 IT 30 3120
789 IT 30 3030
Activity 1h
Cust_no Balance
138 0
187 0
219 -120
451 -170
487 -260
523 -190
764 0
802 -920
834 -270
869 -540
Practice questions
1 Five from:
They are just a collection of text, numbers and symbols.
Johan’s context is they might be a person and rather than being a collection of letters it
now means it could be someone’s first name.
The context for Σ is it might be a statistical symbol and rather than being just a symbol it
could mean ‘to calculate the sum of’.
The context for $ is that it might represent a currency symbol and becomes information if
a number is written after it and therefore representing an amount of dollars.
The context for < is it might be a mathematical symbol and if a number is placed after it,
it would mean ‘less than’ that number.
The context for AND is that it might be a Boolean operator and if used to separate two
conditions this would mean both would need to be true.
2a The transaction file must be sorted into the same order as the master file.
If the key fields match, the computer calculates the pay ...
... the master file record is updated and is written to new master file ...
If the key fields don’t match, the old master file record is written to the new master file
The comparison sequence is repeated until the end of the transaction file
Remaining records of the master file are written to the new master file
3a Three from:
A range check ensures that the data entered is within a given rage of values.
A length check ensures that data has the correct number of characters.
A format check ensures that a certain combination of characters has been entered.
A check digit ensures that a long number has been entered accurately with no digits
transposed.
A lookup check ensures that only acceptable values from a certain list are accepted.
A limit check ensures that data is not below a certain value if a lower limit has been set or
not above a certain value if a higher limit has been set.
3b Three from:
A presence check is to make sure data has been entered in mandatory fields and not been
left out. Not all fields are likely to be mandatory.
With many fields it is not necessary to use a presence check/the data can be updated or
entered later.
... if data were not entered it would be very difficult to uniquely identify records ...
Some online data input forms require certain fields to have data entered but not all of
them.
A lookup check ensures that only acceptable values from a certain list are accepted.
A limit check ensures that data is not below a certain value if a lower limit has been set or
not above a certain value if a higher limit has been set.
4 Five from:
A guidance system would be necessary which would consist of inputs, processing, and
outputs.
Controlling rockets often involves the use of sensors and control systems.
Inputs would include data from the sensors in the system such as plume, gas and altitude
sensers.
The processing involves using all the input data to decide what actions, if any, are
necessary to maintain or achieve the required course.
The outputs are the actions decided upon as result of the processing ...
... uses devices such as turbines, fuel pumps, rudders to change or maintain the course.
Real time data processing gives the agency the ability to take immediate action for those
times when acting within seconds is significant.
If the rocket swerves off course the computer would immediately fire engines to correct it.
5 Three from:
Visual checking is reading the data on the screen after it has been typed in to make sure it
is the same as the source document.
Double data entry is entering data twice and the second entry is compared to the first by
the computer and the person entering the data is alerted by the computer to any
differences.
Parity check is ensuring that all bytes transferred from one medium to another have an
even number of ones so that if a one within the byte is transmitted as a zero, then the error
will be trapped by the system. This could involve an even or odd parity check.
Checksum is calculated using the number of bytes in a file, is transmitted at the end of the
file and the receiving device re-calculates the checksum and then compares it to the one it
received to make sure they are identical.
Hash total is found by adding up all the numbers in a specific field, on data not normally
used in calculations and after the data is transmitted the hash total is recalculated and
compared with the original value to make sure it is the same.
Control total is found by finding how many numbers exist in a in a specific field, but on
data normally used in calculations, and after the data is transmitted the control total is
recalculated and compared with the original value to make sure it is the same.
6 Two from:
A format check could be used to make sure it is one letter followed by 5 digits.
A type check could be used to make sure that the input is of type text/string.
7 Three from:
Because of time and cash restraints, the sample or group size may be small whereas
indirect data sources tend to provide larger sets of data.
The person collecting the data may not be able to gain physical access to particular groups
of people, whereas the use of indirect data sources allows data from such groups to be
gathered.
Using a direct data source could be difficult if the people being interviewed are not
available thus reducing sample size, whereas using indirect data sources allows the
sample size to be greater.
It may not be possible to gather original data due to the time of year e.g. summer rainfall
data may be needed but at the time of the data gathering it is winter.
To gather data from a specific sample would take a lot longer than it would with indirect
data.
By the time all the required data has been collected it may possibly be out of date
Indirect data can be of a higher quality as it has already been collated and grouped into
meaningful categories.
Compared to indirect data sources, the collection of data may be more expensive than
using an indirect data source as people may have to be paid to collect it.
Extra cost may be incurred as special equipment has to be bought such as data loggers and
computers with sensors.
Chapter 2 answers
Activity 2a
1 MIPS stands for Millions of Instructions Per Second. It measures the performance speed
of a mainframe computer’s CPU. It is not always the best measure as not all instructions
are the same. MIPS are often linked to cost by calculating how much a mainframe costs
per one million instruction per second.
2 FLOPS stands for Floating Point Operations Per Second. Useful in measuring
performance of supercomputers where mainly scientific calculations need to be carried
out. Modern supercomputers performance is measured in petaflops (peta is
1,000,000,000,000).
3 A computer with fault tolerance means that it can continue to operate even though one or
some of its components have failed. It may continue to operate at a reduced level but does
not fail completely. Mainframe computers have the characteristic of being fault tolerant in
terms of their hardware. Whilst in operation, if a processor fails to function the system is
able to switch to another processor without disrupting the processing of data. By having
several processors, a mainframe can switch work to other processors if one fails. It can
also overcome software problems by having two versions of the software so if one fails to
work, the other can take over. In the event of a system breakdown, a mainframe having
great fault tolerance means that the level of throughput would not reduce as much.
Activity 2b
The increase in processing power and storage capacities of personal computers means
that many countries can now take a new approach, and many are deciding against buying
expensive mainframe computers.
Activity 2c
The calculations that need to be carried out are very complex.
There are a very large number of calculations that need to be carried out.
Activity 2d
The purpose of compilers and interpreters is to translate high level language into code
which can be executed by a computer.
Activity 2e
To act as an interface between the user and the computer.
Activity 2f
Anti-virus software is a program or set of programs whose function is to detect and
remove viruses.
Back-up software is used to keep copies of files from a computer or copies the content of
a server’s backing storage.
Data compression is the modifying of data so that it occupies less storage space on a disk.
Defragmentation software is used to organise the data on a hard disk by moving the data
blocks of a file around to bring all the parts of a file together, so they are contiguous.
Disk formatting is the configuring of a data storage medium such as a hard disk or solid-
state drive for initial use.
The delete utility is a piece of software that deletes the pointers that tells the operating
system where to find the file.
Activity 2g
It can take a long time to develop custom written software whereas with off-the-shelf
software it is available immediately as it has already been written. However, off-the-shelf
software may not have the availability of all the featured required, whereas custom
written software will have been tailored accordingly.
There may be more bugs in custom built software as it may not have been tested as
thoroughly. Often the tests that are carried out are those which the programmer thinks are
necessary, how they think the software will be used which may not be accurate. Off-the-
shelf software is usually tested rigorously so it is highly unlikely that there will be any
bugs in it and it will have been used many more times so any bugs that there were will
have been discovered and removed.
Activity 2h
1 Any two from:
CLIs require the user to learn a lot of commands whereas GUIs are more user friendly and
reasonably intuitive.
Users with physical disabilities may be able to hold a mouse or click easier than typing
using a keyboard.
CLIs tend to be used by IT specialists and require a certain amount of IT knowledge but
this is not the case with GUIs.
Compared with a GUI, commands entered into a CLI are far more difficult to correct.
Users with physical handicaps in their limbs could still speak to control a device.
To operate a device using a gesture would require taking a hand off the steering wheel
which could be dangerous.
Gesture based interface is less successful when there are several people moving around.
Gesture based interface requires the user to be seen by the device unlike a dialogue
interface.
Practice questions
1 Three from:
The term RAS is frequently used when referring to mainframe computers and stands for
reliability, availability and serviceability.
Mainframes are the most reliable computers since the processor can check itself for errors.
The mainframe’s software is very reliable as it is thoroughly tested and updates are made
quickly to overcome any errors.
The average period that exists between failures of a mainframe during its normal
operation is quite long giving months or even years of system availability between system
failures.
Hardware and software components can be replaced without having too great an effect on
the mainframe’s operations.
2 Five from:
A compiled program will only run on a different computer if it has the same operating
system as the computer it was originally compiled on.
An interpreted program will still be in its original source code and so it will work on any
system with the appropriate interpreter.
An interpreter translates the high-level language program one statement, or line, at a time.
An interpreter continues translating the program until the first error is met, in which case
it stops which means that errors are located by the programmer, exactly where they occur.
3a A sector is a part of a track on a computer disk and normally consists of 512 bytes.
3b A block is the section of a disk that the operating system deals with and it can consist of a
number of sectors.
3c A track is circular portion of a disk surface with each surface having several tracks.
3d The track on the top disk platter together with the tracks exactly below it and forms a
cylinder of data.
4 Three from:
When the software is written the company will own it and may be able to sell it to other
companies.
5 Four from:
The command line interface is a means of using commands in the form of successive lines
of text to interact with a computer.
This type of user interface is only used today by software developers, system
administrators and the more advanced users.
It is possible to do any action with a CLI that could be achieved with a GUI.
It can take several clicks of the mouse and working through a number dialogue boxes. and
menus in a GUI to achieve the same outcome as a single line of text in a CLI.
Chapter 3 answers
Activity 3a
Select appropriate sensors such as pH, moisture and temperature sensors to monitor soil
conditions. Sound sensors would be needed to monitor noise pollution. Temperature
sensors would be used so that computers can detect abnormally high temperatures. O2
and CO2 sensors would be used to monitor oxygen levels which provides an indicator of
the level of air pollution. pH sensors can be used to provide acidity readings in the air.
Ultraviolet sensors could be used to measure the amount of UV as excessive amounts can
cause skin cancer. These sensors would be connected to a computer so that the readings
can be processed. A printer or visual display would need to be connected to output graphs
and tables of data.
Activity 3b
Start
no
is system
switched on?
yes
Input temp
Stop
no
Is temp >
pre-set
yes
Activity 3c
1. The system is switched on
4. Input sound
6. Input pressure
8. Go back to step 2
Activity 3d
The car’s presence would be detected by an induction loop ...
... because the electromagnetic field in the loop/coil is disturbed by a metallic object/car.
Loop sends back data to ADC which converts it from analogue to digital.
If different to pre-set value, the computer sends a signal to a motor to operate barrier.
A light beam from one post passes across to a light sensor in the other post.
If the light sensor does not send a signal the bar remains raised.
If the light sensor sends a signal computer sends a signal to the motor to lower the
barrier.
Practice questions
1 Data would be collected by temperature sensors to measure the ambient temperature.
Sensors to measure wind speed and direction. The sensor readings are fed back to an
analogue to digital converter and then sent to the computer.
The data is converted from analogue to digital using the ADC so that the computer can
understand and process it.
On receiving the digital data, the computer validates and stores the data in the form of a
table or data log.
The processing might consist of calculating, for each day, the highest, lowest and mean
temperature and level of UV radiation, total rainfall, hours of sunshine, highest and lowest
value of atmospheric pressure and wind speed and direction.
These values can also be calculated to know what they are so far this month and so far, this
year.
Results are also output in the form of graphs either to a monitor or to a printer
automatically, without the need for human intervention.
2 Three from:
Humans are unable to take readings at very frequent intervals and computers can take
readings at more frequent intervals.
Computers are capable of reading more than one variable simultaneously, but humans can
only read a variable at a time.
It is very difficult for humans to keep taking readings for sustained periods whereas
computers can be left on to take readings at any time, day or night.
Computers take readings at regular intervals unlike humans who might forget to take
them.
It takes time for people to draw graphs, particularly if they are going to be accurate
whereas computers produce them automatically after processing the data.
Results are produced automatically after the readings are received by the microprocessor
or computer unlike a human who would take a lot of time to write them down.
3 Three from:
Smart homes can lead to people becoming lazy since they can become over reliant on
microprocessor-controlled devices in the home.
They can prevent people from performing simple exercise such as walking around or
using their hands and arms as much as they used to.
It may cost a lot of money to buy the system in the first place because devices used in a
smart home are much more expensive than buying a device which is not smart.
A computer-controlled system will not be able to function if there is a problem with the
computer or there is a power outage without a backup power supply.
Smart system security can be accessed from unauthorised users from outside of the home.
Start
is system
switched on?
Input reading
from
Stop
induction loop
is reading >
pre-set?
Send signal to
raise barrier
Send signal to
lower barrier
Chapter 4 answers
Activity 4a
1
INPUT number
IF number < 3
THEN
X ← number * 8
ELSE
IF number < 6
THEN
X ← number * 4
ELSE
X ← number * 2
ENDIF
ENDIF
PRINT X
2
INPUT number
CASE number OF
>5 : X ← number /5
OTHERWISE: X ← number /2
ENDCASE
PRINT X
Activity 4b
1
WHILE system switched on
INPUT temperature
IF temperature > pre-set
THEN
IF window closed
THEN
moisture
is system
switched on?
Input
moisture Stop
is moisture <
pre-set?
is sprinkler is sprinkler
valve valve open?
closed?
light
is system
switched on?
Input
light_level Stop
is light_level
> pre-set2?
is light_level is light
< pre-set1? source on?
send signal to
actuator to
is light switch off light
source off? source
send signal to
actuator to
switch on light
source
Start
is system
switched on?
Call temperature
Stop
Call moisture
Call light
4
When it gets to count > 8 the first time the answer is no and so none of the other
statements will be executed, the flowchart terminates straight away.
Practice questions
1
count ← 0
INPUT mark
IF mark > 40
THEN
ELSE
ENDIF
count ← count + 1
ENDWHILE
count ← 0
largest ← 0
REPEAT
INPUT number
THEN
largest ← number
ENDIF
count ← count + 1
UNTIL count = 5
Start
count ← 0
Input number
no count = 6?
yes
Print average
Stop
WHILE count = 0 is always true so the loop will operate continually and never exit, continuously
asking for the number to be input so change WHILE count = 0 to WHILE count < 1.
PRINT “number is invalid has no closing speech marks so change the PRINT statement to PRINT
“number is invalid”.
Insert ELSE after PRINT “number is invalid” and under ELSE put the statement count ← count
+1.
There is no ENDIF statement closing the IF condition so add it after PRINT “number is invalid”.
WHILE count < number, again will not be true if the number 1 is entered and when it is nothing
will be printed out. If a number greater than 1 is entered, then 1 x 10 is printed out but the
algorithm stops so change the statement WHILE count < number to WHILE count <= number.
After the PRINT statement put an extra statement count ← count +1.
count ← 0
INPUT number
IF number <1
THEN
ELSE
count ← count +1
END IF
ENDWHILE
count ← count +1
ENDWHILE
Or
Chapter 5 answers
Activity 5a
Five from:
Organisations which store personal data tend to have several computers that form
networks, many of which are connected to the Internet and firewalls are designed to
prevent unauthorised network access.
Different groups of users can be granted different levels of access to the data on the
network.
Network policies are sets of rules that allow companies to choose who can access their
computer network and controls their use of the network once they have gained access.
The most useful function of software updates is probably the fact they eliminate specific
security weaknesses present in an operating system which hackers can take advantage of
these to access the computer system.
Encryption ensures that data, even when illegally accessed, will not be understandable.
A website often has a digital certificate to verify ownership of the website and also
prevent fraudsters creating a fake version of the website.
Should a mobile device is lost or stolen, the owner can send a command to it using
another phone that will completely remove any data, such as personal data from it.
Activity 5b
1 The user may download malicious software which corrupt the host’s file by adding URLs
to the host’s file and corresponding IP addresses which will redirect the user to a fake
website when they enter that URL.
Another type of pharming is when the fraudster hacks into the DNS server and corrupts
the file on that computer, again, causing the user to be redirected to a fake website.
2 Four from:
Many digital security companies produce mobile protection software which users can run
in their smartphones.
Users should look out for signs such as spelling and grammatical errors, messages
requiring immediate action or offering financial rewards.
Users should open the sender’s website itself rather than replying to a text with personal
information included in it.
Users should check the sender’s phone number against the phone number of the company
they claim to represent.
Users should never type in personal or banking information, other than when using the
organisation’s official website.
Receivers of a text should not click on links from senders they do not recognise.
Users should only type the URL into a browser rather than clicking on a link.
Users should not phone any number contained in the text message.
Activity 5c
1 Ransomware is a type of malware that blocks access to the user’s data until a ransom is
paid. An alternative approach is for the hacker to threaten to publish the user’s data unless
a ransom is paid. The user must pay even though they don’t want to. Scareware is a type
of malware that tricks the computer user into thinking that their computer has been
infected with a virus. The user then willingly pays the ‘provider’ to download the ant-
virus and then discovers, too late, that it is a scam.
2 A trojan horse is a malicious computer program which is used to hack into a computer. It
enables the person who created it to take control of the computer it has infected. The user
is deceived into thinking they have downloaded genuine software. Unlike worms, trojans
generally do not attempt to infect other files or replicate themselves. They are used for
several purposes. The main one is simply to gain access to a computer so that the
controller can discover the personal data of the owner. Another purpose is to delete files
from the hard disk, and it can also be used to simply corrupt the data.
A worm will often exploit security holes in networks to spread throughout the network.
Sometimes, their main purpose is to continually replicate themselves and in so doing
occupy more and more disk space until the disk is full and can no longer function. They
do not attach themselves to other programs of files. They are designed to spread by many
copies being sent to other computers in a network. This results in slowing down the traffic
in a network due to high packet congestion.
Activity 5d
Hackers can buy goods through internet shopping using the credit card details they have
obtained from individuals causing the individual to be affected financially.
Individuals can have large sums of money withdrawn from their bank account.
Individuals can have money transferred from their account to the hacker’s account.
Ransomware, although usually performed on organisations can also affect the individual,
usually demanding lower sums such as $200–$400.
Because of malware, individuals must spend a great deal of money buying authentic anti-
virus software.
Personal data can be collected by hackers to the extent that a person’s identity can be
stolen.
Practice questions
1 Three from:
An Internet Protocol (IP) address which is a group of numbers assigned to each device
connected to a computer network that uses the Internet Protocol for communication.
A cookie ID is when a web site generates a unique ID number for each visitor and stores
the ID number on each user’s machine using a cookie file.
2 Three from:
Fraudsters who have accessed an individual’s personal data can use their login details to
access their bank accounts or commit other types of fraud, while pretending to be that
individual.
Fraudsters can take the individual’s banking information and make unauthorised
withdrawals, purchases, and transfer money between accounts.
If burglars obtain personal data such as someone’s address and whether the person is at
work then they can burgle that person’s house.
If burglars know a person is not at home it is much easier to burgle that house so people
should not post information about their holiday plans or activities on social media.
If kidnappers know a child’s school, they can more easily plan a kidnap. Students should
not post information about their school on social media.
3 Three from:
Typing in a User ID and password or PIN which only the user knows.
Using biometric data, which is something about the user which is unique.
When using online banking additional information such as date of birth is often required.
When a customer carries out certain transactions using a smartphone some banks will send
a one-time PIN or password, in a text message, for them to enter as part of the
authentication process.
Drop down options are often used for dates or PINs to be entered as keyboard presses can
be detected by spyware.
Two-factor authentication which could include a password and then a message sent to a
personal device such as a smartphone which the user can accept or decline.
Chapter 6 answers
Activity 6a
1 Three from:
The rural parts of any country have a low population, challenging geography, or limited
commercial potential ...
It’s more expensive for providers to offer services in those areas so those extra costs are
passed onto the customers.
A single fibre-connected cabinet in one street can connect several houses but houses tend
to be further apart in the remote rural areas so installing a single cabinet will not be able to
connect many houses ...
... meaning that people are further away from a cabinet than would be the case in a more
urban area ...
It can also be very difficult to lay fibre cables because rural areas often consist of
farmland, sometimes rivers or even lakes as well as hills, and sometimes mountains.
Any infrastructure that already exists tends to use a lower level of technology this makes
it difficult to install high speed broadband.
To improve the infrastructure costs a lot of money and broadband companies are reluctant
to invest such sums for so few customers.
2 Three from:
Satellite broadband
Fixed wireless
Smartphones
Bonded broadband
Activity 6b
Large supermarkets would be reluctant as they incur large costs overcoming delivery
issues such as small countries such as Tuvalu which do not have separate or identifiable
postal address for each individual the delivery of goods which were purchased online
would be difficult.
In small remote countries such as Tuvalu, very few people have broadband and so would
find it too difficult to carry out online shopping meaning fewer customers for the
supermarket.
In other parts of the world billions of people do not have bank accounts and credit cards
and so could not do their shopping online so it would not be cost-effective for
supermarkets to offer online shopping to these people.
It is often the case that in many developing countries, goods bought using the Internet are
not covered by consumer-protection laws which would lead to customers not doing their
shopping, online meaning less business for the supermarkets.
Activity 6c
An important factor is an individual’s level of educational achievement and subsequent use
of IT in schools and classrooms. The lower the level of achievement the less likely they
will be to go on to successfully use IT.
Another factor is the divide that exists between educational establishments. More
successful educational institutions will have more IT equipment, faster broadband, and
greater use of IT across the curriculum.
Another factor is that the less well-educated individual appears to have little respect for the
advantages that using IT can bring to them.
Activity 6d
Older generations tend to and lack confidence when it comes to using IT, as they were not
brought up being exposed to it constantly unlike like the younger generations.
Because they lack confidence, a “fear” is developed among older generations, which
makes them avoid this technology.
Older people tend to find modern devices difficult to use, mainly because IT businesses
concentrating on younger people for their market, with very few modifications made to
modern devices, such as smart phones, to help older people use them more easily.
Older people are more likely to concentrate on friendships and being emotionally involved
with others rather than spending time on machines leading to less use of social media.
Many elderly people find it difficult to read text on a screen or use a keyboard due to visual
impairments or other physical handicaps.
Older adults tend to use well-established technologies and are slower at accepting new
ones.
Elderly people tend to only accept a new technological development after seeing that it has
been successfully used by others and they could see clear benefits for themselves.
Older adults may not have been subject to new technology which is required for their
education setting or work and may not see the clear benefits for themselves and may not
have the initial training or experience.
Activity 6e
There is no need for IT companies to develop systems that would be suitable for the poor
as this would not involve making the same level of profit.
Those systems that are produced for poorer people tend to be less advanced.
Household income affects whether people use IT in general and more specifically gain the
skills used to take advantage of using the internet.
Many people in poverty often in less developed countries just cannot afford to buy their
own computer or afford the cost of a broadband connection.
IT companies focus on the development and marketing of new products rather than to
provide opportunities for poorer people to make use of unused or redundant technology.
Activity 6f
People with physical disabilities that affect movement of the hand are unable to use a touch
screen, mouse, or keyboard effectively.
The devices they need which are much easier to control can be very expensive to purchase.
People with hearing or visual problems find it difficult to listen to sound output from a
computer.
New technologies bring higher resolution screens which can cause problems with people
with visual impairments having to access small text.
Governments moving their services online sometimes forget that the platforms being used
are not favourable to those who are visually impaired.
New technology accessibility features evolve over time and therefore users with
accessibility needs may use more robust software which is tried and tested installed on
older devices.
Activity 6g
Three from:
These websites can only be accessed by individuals with the necessary IT equipment such
as a PC or laptop computer or tablet computer with broadband or perhaps a smartphone.
The websites may not be available to individuals because the equipment needed is too
expensive to buy.
People may live in remote regions which do not have fast broadband speeds.
Users may have the equipment and fast broadband, but the electricity supply may be
subject to power cuts or outages or load shedding, in which case, the individuals concerned
will not be able to access the websites.
If people live in a rural area where broadband connections are poor or non-existent it can
Health websites may not have the necessary accessibility features which may make it
impossible for some users to access the information provided.
Activity 6h
Job hunters must have IT skills if they are to realise their hopes for a job since most jobs in
the modern world require IT skills.
People without the internet are at a disadvantage when it comes to finding out about job
opportunities.
People without the internet are at a disadvantage when it comes to learning new career
skills.
Many people who grew up with no access to the internet lack the appropriate technology
and digital skills that modern jobs require.
People without internet access find it difficult to gain the latest information concerning job
opportunities.
Job applicants could be required to generate a curriculum vitae online and then send it
using email but without the internet they cannot do this.
Activity 6i
1 Accessing web-based course resources.
Download lesson notes and presentations as well as being able to upload homework.
Students must be able to perform these tasks as a matter of course.
Students who are unable to perform these tasks as a matter of routine will find their
progress severely limited.
2 Three from:
Use online booking systems to help search and plan for holiday/vacation destinations.
Shopping online where customers can compare products and prices at their leisure and
can shop at a convenient time for them.
Gaining access to news bulletins since most newspapers are now online and looking to
cease producing hard copies.
Practice questions
1 Four from
Geography:
This may be because more economically developed countries have more technology
because of their greater wealth.
It becomes more difficult to provide optical fibre to people living in settlements close to
mountains, as it is too difficult to build such resources under mountains.
The more rural parts of countries may not have as much access to technologies such as 5G,
or even 4G, or fibre optic internet as urban areas.
Fear of IT
People could be afraid of IT through lack of education, and thereby IT skills, and
knowledge, or simply because of age.
IT is meant to make our life easier, but sometimes it makes it more difficult.
As IT devices become more sophisticated, they tend to become harder to use and learn.
Some people believe that, when asked to use complex computers, telephone systems, or
even Automatic Teller Machines, they might have to learn and understand sets of
complicated instructions.
Most people find the complicated instructions easy to follow, but some do not.
This is particularly true of older individuals who may find any type of change unsettling.
Economic
The wealth of the user will affect their ability to access IT technologies.
As technological innovations are made, each one tends to be more expensive than its
predecessor, at least in the short term.
The richer you are the easier it is to have access to new IT technologies.
It is in the interest of IT companies to have further innovations since they can sell these to
rich people thereby making money.
There is little incentive for IT companies to develop solutions that would be suitable for
the poor as this would not involve making the same amount of profit.
Developments which are produced for poorer people tend to be at a very basic level and
are less likely to increase their ICT skills, thereby widening rather than narrowing the
divide.
Disability
Many people are unable to access IT as it isn’t necessarily designed with everyone in mind.
People with disabilities may need devices which are much easier to control.
Other people who lack access to personal devices and the internet are those with hearing or
visual problems.
2 Four from
Some countries feel that they cannot afford to invest heavily in technology as they need to
improve education, access to health care as well as increasing job opportunities.
Nations with the most developed economies tend to have more efficient postal and parcel
delivery systems than developing countries, which encourages online shopping.
Most of the developed countries have laws which protect the consumer when buying goods
online unlike developing countries.
Countries that have widespread access to the internet and, more specifically, broadband,
can trade with other countries far more easily than those who do not.
Poorly educated nations are unable to compete effectively in the global economy.
Uneducated people tend not to earn enough to provide for their families which makes them
poorer, making it less likely that they will invest in IT equipment or services.
There is a divide between schools that have a lot of IT equipment, fast broadband, use of
IT across the curriculum and schools that have not.
The uneducated fail to see the need for gaining IT skills or the need to spend money on IT
equipment or broadband.
Uneducated people do not understand the importance of the internet in their everyday lives.
Older generations tend to and lack confidence when it comes to using IT.
Older people were not brought up being exposed to IT constantly unlike like younger
people.
New technologies tend to be aimed at younger people with very few modifications made to
help older people use them more easily.
Older people are more likely to concentrate on friendships and being emotionally involved
with others rather than spending time on machines and so do not see the point of using
computers for social networking.
Older adults tend to use well-established technologies and are slower at accepting new
ones.
Socioeconomic groups
The richer you are the easier it is to have access to new IT technologies.
It is in the interest of IT companies to have further innovations since they can sell these to
rich people thereby making money.
There is little incentive for IT companies to develop solutions that would be suitable for
the poor as this would not involve making the same amount of profit.
Developments which are produced for poorer people tend to be at a very basic level and
are less likely to increase their ICT skills, thereby widening rather than narrowing the
divide.
3 Four from:
People might live in remote mountainous areas where it is difficult to install the necessary
infrastructure.
To obtain broadband that can reach fast speeds there needs to be a slightly more advanced
infrastructure.
However, houses tend to be further apart in the remote rural areas so installing a single
fibre connected cabinet will not be able to connect many houses ...
... people are further away from a cabinet than would be the case in a more urban area ...
... so longer cables will need to be used, which leads to slower speeds.
It can also be very difficult to lay fibre cables in rural areas consisting of farmland, rivers
or even lakes as well as hills, and sometimes mountains.
Any infrastructure that already exists tends to use a lower level of technology this makes it
difficult to install high speed broadband.
To improve the infrastructure costs a lot of money and broadband companies are reluctant
to invest such sums for so few customers.
4 Six from:
People with disabilities might not be able to afford the extra cost of adapted devices.
Countries might not have delivery systems to encourage people to use IT in online
shopping.
Chapter 7 answers
Activity 7a
A knowledge base contains a database of facts and the rules base.
The database of facts contains all the known facts of information relating to a specific
scenario which an expert system has been created for.
Many of the components are housed within a shell such as the knowledge base editor
which is basically software that allow the knowledge engineer to edit the rules and facts
within the knowledge base to bring them up to date.
The shell contains the explanation system which explains the logical reasoning that the
expert system has used to come to its conclusions.
The user interface is the component that allows the user to interact with the computer
which stores the expert system, usually consisting of a keyboard and mouse together with a
monitor.
The inference engine performs the reasoning of an expert system using a series of
IF...THEN statements within the rules base and interrogates the database of facts in the
knowledge base.
Activity 7b
1 The amount the client wishes to invest
The level of risk the investor is willing to take
3 There tends to be little agreement about the facts or rules required in the knowledge base.
It is possible that a company has several delivery vehicles, each of which may be
different sizes.
The vehicle must be loaded so that when it arrives at a distribution point, packages do not
have to be climbed over, or temporarily unloaded, to get to the order for that distribution
point.
Activity 7c
When an inference engine uses forward chaining, it explores the rules the system has been
given until it finds one which has an IF part that is true. It takes the THEN part to add new
facts. This process is repeated until a goal is achieved.
Backward chaining is when the inference engine it explores the rules the system has been
given until it finds one which has a THEN part that matches a required goal. If the IF part
of that rule is known to be true, then it is added to the list of goals.
Practice questions
1 Six from:
The inference engine compares the symptoms typed in with those in the knowledge base’s
database of existing illnesses ...
... the IF part is the symptoms part and the THEN part is the illness or disease that is
suggested.
The knowledge base editor allows for increasing the knowledge base by adding further
rules and data.
The explanation system clarifies how the expert system has produced its possible
diagnosis.
2 Four from:
Inference engine uses the rules base part of the knowledge base to reason through the users
answers to the system’s questions.
Inference engine uses the database of facts in the knowledge base to reason through the
user’s answers.
Inference engine compares the answers typed in with those in the knowledge base’s
database of facts.
Inference engine uses the IF...(THEN)... rules in the rules base in the knowledge base.
Knowledge base editor enables the knowledge engineer to edit rules and facts within the
knowledge base.
3a Three from:
Forward chaining is known as data-driven because the data entered into the system
determines which rules are selected and used.
When an inference engine uses forward chaining, it explores the rules the system has been
given until it finds one which has an IF part that is true.
3b Three from:
It starts with a goal or set of goals that basically establish which rules are to be followed.
When an inference engine uses backward chaining, it explores the rules the system has
been given until it finds one which has a THEN part that matches a required goal.
If the IF part of that rule is known to be true, then it is added to the list of goals.
Activity 8a
Activity 8aa
Activity 8b
Value printout
A4 page size 1 mark
Narrow margins 1 mark
Fit to single page with no data loss 1 mark
All data fully visible within columns 1 mark
Header – automated filename… 1 mark
… with file path present (only 1 filename) 1 mark
.. centre aligned (or left if very long file path) 1 mark
Footer – appropriate introductory text … 1 mark
… author’s name 1 mark
… centre aligned in the footer 1 mark
Gridlines visible 1 mark
Row & column headings not visible 1 mark
No extra whitespace in columns 1 mark
Activity 8c
Activity 8d
Activity 8e
44
247
0.7−3
53
x4 where x=3.7
Activity 8f
Activity 8f
Activity 8g
Activity 8g
Activity 8h
Values view
Name present 1 mark
Top row merged as shown 1 mark
Top row text wrapped 1 mark
Column A – All grades boxes merged as shown 1 mark
All data centre aligned 1 mark
Activity 8h
Activity 8h
Values view
Merged cells in rows 102 - 104 as shown 1 mark
Total number of students - correct value 1 mark
Number of grades – correct value 1 mark
Number of blank values – correct value 1 mark
Print area – fitted to 3 pages 1 mark
Activity 8i
Values view
Average number of days - correct value 1 mark
Formulae view
Nested function for average 1 mark
ROUND (… ,2) 1 mark
… Average(Days)
Activity 8j
Values view
Number of students - correct values 1 mark
Print area – as shown 1 mark
Formulae view
COUNTIF used with brackets 1 mark
Correct range (accept D98 or D99) 1 mark
As absolute values 1 mark
Reference to Column F 1 mark
As relative reference 1 mark
Replicated as shown 1 mark
Print area – as shown 1 mark
Activity 8k
Values view
Text entry 100% accurate 1 mark
Formatting as shown 1 mark
Number of passes with grade 1- correct value 1 mark
Number of passes with grades 1 to 3- correct value 1 mark
Number of passes at low grades (6-9) - correct value 1 mark
Number of Maths grade 1- correct value 1 mark
Number of English grade 1- correct value 1 mark
Print area – as shown 1 mark
Activity 8k
Formulae view
Print area – as shown 1 mark
Number of passes with grade 1
COUNTIF used with brackets 1 mark
Correct range 1 mark
With absolute referencing 1 mark
,1 1 mark
Number of passes with grades 1 to 3
COUNTIF used with brackets 1 mark
Correct range 1 mark
With absolute referencing 1 mark
"<4” or "<=3" 1 mark
Number of passes at low grades (6-9)
COUNTIF used with brackets 1 mark
Correct range with absolute referencing 1 mark
">=6" or ">5" 1 mark
Number of Maths grade 1
COUNTIFS used with brackets 1 mark
Correct range – B2:B100 with absolute referencing 1 mark
, "Maths" or reference to a cell containing English 1 mark
, Correct range – C2:C100 with absolute referencing 1 mark
,1 or reference to a cell containing 1 1 mark
Number of English grade 1
COUNTIFS used with brackets 1 mark
Correct range – B2:B100 with absolute referencing 1 mark
, "Maths" or reference to a cell containing Maths 1 mark
, Correct range – C2:C100 with absolute referencing 1 mark
,1 or reference to a cell containing 1 1 mark
Activity 8l
Values view
Text entry 100% accurate 1 mark
Formatting as shown 1 mark
All 4 classes with correct values 1 mark
Print area – as shown 1 mark
Formulae view
Print area – as shown 1 mark
Cell G2
=COUNTIF used with brackets 1 mark
Correct range 1 mark
… as absolute reference 1 mark
,F2 1 mark
… as relative reference 1 mark
Replication
As shown 1 mark
Activity 8m
Values view
Formatting as shown for rows 1, 2 and column A 1 mark
Do not penalise alignment in cells C3 to H6
All grades show correct value 1 mark
Rounded to 0 dp 1 mark
Print area – as shown 1 mark
Formulae view
Print area – as shown 1 mark
C3 - ROUNDING
=ROUND used with brackets 1 mark
… ,0 1 mark
C3 - AVERAGEIF
AVERAGEIF used with brackets 1 mark
Correct range B9:B41 1 mark
Absolute referencing 1 mark
,B3 1 mark
Absolute referencing on the B 1 mark
Relative referencing on the 3 1 mark
, correct range C9:C41 1 mark
Absolute referencing on the column - C 1 mark
Relative referencing on the rows – 9 and 41 1 mark
Activity 8m
Activity 8n
Values view
Formatting as shown (ignore alignment in C6:C14) 1 mark
All notes show correct value 1 mark
Activity 8o
Values view
Row 1 hidden 1 mark
Column A hidden 1 mark
Cells B2-D2 merged 1 mark
Correct data displayed - row 2 1 mark
Correct data displayed – column B 1 mark
Correct data displayed - column C 1 mark
Correct data displayed - column D 1 mark
Activity 8o
Activity 8o
Activity 8o
Activity 8o
Activity 8o
Activity 8p
Values view
Required length = 262 1 mark
Required width = 148 1 mark
Correct resulting price = $1290 1 mark
Formulae view
INDEX used with brackets 1 mark
B20:L27 1 mark
,MATCH used with brackets 1 mark
Reference to B5 1 mark
, A20:A27 1 mark
,-1 1 mark
,MATCH used with brackets 1 mark
Reference to B4 1 mark
, B19:L19 1 mark
,-1 1 mark
Activity 8q
Values view 1
Emphasis on row 1 or Appropriate title 1 mark
Address 1 - correct text only 1 mark
Town/City - correct text only 1 mark
Postcode - correct text only 1 mark
All columns fully visible 1 mark
Activity 8q
Activity 8r
Values view 1
Emphasis on row 1 or Appropriate title 1 mark
Duration column formatted as hh:mm 1 mark
Working column used… 1 mark
…either hidden or with appropriate column title 1 mark
All columns fully visible 1 mark
Values view 2
Appropriate label for average 1 mark
With appropriate placement and formatting 1 mark
Average duration calc appropriately placed 1 mark
Average Duration formatted as hh:mm 1 mark
Formulae view 1
TEXT used with brackets 1 mark
… ,”hh:mm” 1 mark
Calculation
… (D2+E2) 1 mark
…-(B2+C2) 1 mark
Working column
Calc to turn string to number (e.g. 1* or +0) 1 mark
Activity 8r
Formulae view 2
TEXT used with brackets 1 mark
… ,”hh:mm” 1 mark
Calculation
AVERAGE used with brackets 1 mark
…-(G2:G115) or appropriate range 1 mark
Alternative solution
Calculation
AVERAGE used with brackets 1 mark
…-(G2:G115) or appropriate range 1 mark
Formulae view 2
Cell F116 formatted as time… 1 mark
… in ”hh:mm” format 1 mark
Activity 8s
Validation
Cells in the range C9 to H41 selected 1 mark
Validation rule applied 1 mark
Allow whole number only 1 mark
Minimum value = 1 1 mark
Maximum value = 9 1 mark
Validation
Appropriate Input title 1 mark
Appropriate Input message 1 mark
Validation
Appropriate Error title 1 mark
Appropriate Error message 1 mark
Activity 8t
Range: C7:C23
Gold colour background for 1st 1 mark
Silver colour background for 2nd 1 mark
Bronze colour background for 3rd 1 mark
Other cells with no background 1 mark
Range: C7:C23
Correct range for all 3 rules 1 mark
1st is compared as text with cell value 1 mark
2nd is compared as text with cell value 1 mark
3rd is compared as text with cell value 1 mark
Accept alternative solutions that work, using functions like = to
replace contains.
Activity 8u
Test plan
Test plan created 1 mark
Normal data tested 1 mark
Both extreme data items tested 1 mark
Abnormal data tested for decimal 1 mark
Abnormal data tested for text 1 mark
Abnormal data tested for negative number 1 mark
Expected results correct for chosen data 1 mark
Actual results listed 1 mark
Remedial action column completed 1 mark
For reference:
Activity 8v
Activity 8w
Values view
Depart date = 07/01/2022 1 mark
OR 1 mark
Depart date = 21/01/2022 1 mark
AND 1 mark
Depart time > 08:00 1 mark
All columns fully visible 1 mark
Activity 8x
Values view
Name starts with S 1 mark
AND 1 mark
Town/City - Bolton 1 mark
OR 1 mark
Town/City - Dundee 1 mark
All columns fully visible 1 mark
Activity 8y
Value printout
Sorted data into: 1 mark
Family name … 1 mark
… in ascending order 1 mark
… Then 1 mark
… First name… 1 mark
… in ascending order 1 mark
All data fully visible 1 mark
Activity 8z
Pivot Table
Created on correct data set 1 mark
Sites as columns 1 mark
10 Departments as rows 1 mark
9 Correct figures 1 mark
Row title changed and appropriate 1 mark
8 Column title changed and appropriate 1 mark
7 Pivot table title changed and appropriate 1 mark
Ashford All columns fully visible 1 mark
6
Bolton
5
Cardiff Pivot Chart
4 Created on correct data set 1 mark
Dundee
Sites as column labels 1 mark
3
Departments as category axis labels 1 mark
2 Correct figures 1 mark
1
All data fully visible 1 mark
0
Administration Management Production Sales Security
Practice question 1
Header 100% correct 1 mark
Sorted
On end date with integrity 1 mark
Most recent at top 1 mark
Working
Correct 3 events changed (blocked together) 1 mark
With years changed from 2019 to 2018 1 mark
No changes to any other data (check Full end date) 1 mark
Working
=IF () function 1 mark
Extracting quarter no (4 marks) eg:
LEFT( ,1) 1 mark
RIGHT(L2,2) 1 mark
=”4” 1 mark
Corrected version if test true (8 marks)
TEXT () 1 mark
K2 relative reference 1 mark
“yyyy” format 1 mark
-1 1 mark
Concatenate or & 1 mark
=RIGHT() 1 mark
L2 1 mark
,12 characters 1 mark
Else if incorrect
Same function as previous print 1 mark
Whole function
Most efficient working solution 1 mark
Chapter 9 answers
Practice questions
1 Six from:
Allows customers to test drive in different weather conditions such as fog, heavy rain,
snow, driving into a setting sun.
With a simulator company wouldn’t have to worry about repairing and replacing damaged
cars.
Staffing costs may be reduced as staff may not need to be with customers during the
simulated test drive.
Customers would feel safer as it prevents injury in the event of a car crash.
Buying a simulator with a fast processor and large amounts of memory could be very
expensive for the company.
May make customers overconfident and too casual regarding their abilities.
A company using a simulator from scratch will need to retrain salesmen which would cost
money ...
Technical support for such systems could prove to be more expensive for the company
than regular servicing of cars.
2 Three from:
With a simulator the company wouldn’t have to worry about repairing parts of the
production line if the trainee made a mistake during training on an actual production line.
With a simulator there would be no risk of injury if the trainee made a mistake during
training on an actual production line.
With a simulator it would be easier to provide overlays to provide guidance when using the
simulation (for example using augmented reality).
The company would need fewer human trainers resulting in lower costs.
Easier to judge the suitability of a worker to operate the new process by measuring reaction
times and attention spans.
3 Six from:
Climatologists have to make several assumptions about how the climate works.
Relating all the variables to each other and identifying trends is a very difficult task.
Some experts think that climate models may be too approximate and may not represent
how the climate functions in real life.
Models may take into account the effect of greenhouse gas emissions, but it is not possible
to predict future government policies ...
This makes it difficult to predict with any accuracy what the effect of emissions will be on
the climate, in future.
It is difficult to calculate how recent messages about climate change might impact existing
and future trends.
It is difficult to calculate how the use of electric cars to replace internal combustion engine
cars will affect climate change.
Because models are based on a limited number of past records it is difficult to say how far
into the future a model can make accurate predictions.
There are unpredictable factors such as natural disasters and pandemics that could affect
the climate in the near future.
Activity 10a
Conceptual ERD
4 entities 1 mark
Correct entity box shapes 1 mark
Appropriate entity names 1 mark
Drivers entity – 6 attributes 1 mark
Appropriate attribute names 1 mark
Buses entity – 4 attributes 1 mark
Appropriate attribute names 1 mark
Data types as shown (ignore integer) 1 mark
Integer data type identified for seats 1 mark
Journeys entity – 4 attributes 1 mark
Appropriate attribute names 1 mark
Customers entity – 6 attributes 1 mark
Appropriate attribute names 1 mark
3 one-to-many relationships… 1 mark
… with ‘many’ at Journeys entity 1 mark
Activity 10a
Logical ERD
4 entities 1 mark
Correct entity box shapes 1 mark
Appropriate entity names 1 mark
Drivers entity – 6 attributes 1 mark
Appropriate attribute names 1 mark
Data types as shown 1 mark
Buses entity – 4 attributes 1 mark
Appropriate attribute names 1 mark
Data types as shown (ignore integer) 1 mark
Integer data type identified for seats 1 mark
Journeys entity – 4 attributes 1 mark
Appropriate attribute names 1 mark
Data types for payroll number, registration
number and customer ID match other entities 1 mark
Data types as shown (ignore formats/integer) 1 mark
Customers entity – 6 attributes 1 mark
Appropriate attribute names 1 mark
Data types as shown although customer ID can be
alphanumeric 1 mark
3 one-to-many relationships… 1 mark
… with ‘many’ at Journeys entity 1 mark
Activity 10a
Physical ERD
4 entities 1 mark
Correct entity box shapes 1 mark
Appropriate entity names 1 mark
Drivers entity – 6 attributes 1 mark
Appropriate attribute names 1 mark
Data types as shown 1 mark
Appropriate lengths for alphanumeric data 1 mark
No length on date data 1 mark
Primary key on payroll number 1 mark
Buses entity – 4 attributes 1 mark
Appropriate attribute names 1 mark
Data types as shown (ignore integer) 1 mark
Integer data type identified for seats 1 mark
Appropriate lengths for alphanumeric data 1 mark
Primary key on registration number 1 mark
Journeys entity – 4 attributes 1 mark
Appropriate attribute names 1 mark
Primary key on booking number 1 mark
Foreign key on payroll, registration & customer 1 mark
Data types of 3 foreign keys match other entities 1 mark
Data types as shown (ignore formats/integer) 1 mark
Appropriate lengths for alphanumeric data 1 mark
Customers entity – 6 attributes 1 mark
Appropriate attribute names 1 mark
Data types as shown although customer ID can be
alphanumeric 1 mark
Appropriate lengths for alphanumeric data 1 mark
Primary key on customer ID 1 mark
3 one-to-many relationships… 1 mark
… with ‘many’ at Journeys entity 1 mark
Activity 10b
Drivers table
Activity 10b
Activity 10b
Journeys table
Activity 10b
Activity 10b
Buses table
Activity 10b
Activity 10b
Customers table
Activity 10b
Activity 10b
Relationship diagram
Activity 10c
Boat table
Activity 10c
Activity 10c
Activity 10c
Activity 10c
Customer table
Activity 10c
Activity 10c
Relationship diagram
Activity 10d
Activity 10e
Report for the names and email addresses of the customers with a
phone number that starts with 001223
Activity 10e
Report for the details of the unsold power boats that were built at
this yard after 2012
Activity 10e
Report for the make, type, price and year of all boats bought in the
year 2020
Activity 10f
Parameter query for boats with a specified type costing less than a
specified price
Activity 10f
Parameter query used to find power boats costing less than 40,000
Activity 10f
Parameter query used to find yachts made on or after the year 2011
Activity 10g
Crosstab query
Activity 10g
Results
Activity 10h
Query to compare the price per foot for each yacht and power boat
Activity 10h
Report
Activity 10h
Activity 10i
Activity 10j
Report design
Activity 10j
Report
Activity 10j
Activity 10k
Report design
Activity 10k
Report
Activity 10k
Activity 10l
Query Design
Report design
Activity 10l
Report
Activity 10l
Activity 10m
Form Design
Activity 10m
Form view
Activity 10n
Form Design
Activity 10n
Form view
Activity 10o
Normalisation - 1NF
Cust_ID Com_ID
Forename Surname Com_Name Add_1 Add_2 Add_3 Zip_Code Tel_1 Tel_2
0001 Surjan Patel BA Binaccount Manley Hall Manley Tawara 4303 05551 275236 05551 175394
Tawara Bus
0002 Jay Murray TBC 14 Main Street Grovecourt Tawara 4303 05551 245975 05551 175401
Company
41 Dilbridge Port
0003 Lucy Murray ED Easy Doors Dockside 4302 05553 128835 05553 245046
Road Peppard
0004 Surjan Patel DBMS DBM Systems 56 Green Lane Littleton 4254 05554 168431 05554 179139
Tawara Bus
0005 Joseph Norris TBC 14 Main Street Grovecourt Tawara 4303 05551 245975 05551 175401
Company
Tawara Bus
0006 Victoria Wilkins TBC 14 Main Street Grovecourt Tawara 4303 05551 245975 05551 175401
Company
Activity 10o
Normalisation - 2NF
Customer table
Cust_ID Com_ID Customer details extracted 1 mark
Forename Surname 4 correct fields 1 mark
(Foreign ) Company ID (or Company name) field set as foreign key 1 mark
0001 Surjan Patel BA No other company details present 1 mark
0002 Jay Murray TBC
0003 Lucy Murray ED
0004 Surjan Patel DBMS
0005 Joseph Norris TBC
Company details extracted 1 mark
0006 Victoria Wilkins TBC 8 correct fields 1 mark
Company table
Com_ID
Com_Name Add_1 Add_2 Add_3 Zip_Code Tel_1 Tel_2
BA Binaccount Manley Hall Manley Tawara 4303 05551 275236 05551 175394
DBMS DBM Systems 56 Green Lane Littleton 4254 05554 168431 05554 179139
41 Dilbridge Port
ED Easy Doors Dockside 4302 05553 128835 05553 245046
Road Peppard
Tawara Bus
TBC 14 Main Street Grovecourt Tawara 4303 05551 245975 05551 175401
Company
2NF because all fields are dependant on the primary key fields. 1 mark
Activity 10o
Normalisation - 3NF
Customer table
Cust_ID Com_ID As 2NF 1 mark
Forename Surname
(Foreign )
0001 Surjan Patel BA
0002 Jay Murray TBC
0003 Lucy Murray ED
0004 Surjan Patel DBMS
0005 Joseph Norris TBC
0006 Victoria Wilkins TBC
As 2NF 1 mark
Company table
Com_ID
Com_Name Add_1 Add_2 Add_3 Zip_Code Tel_1 Tel_2
BA Binaccount Manley Hall Manley Tawara 4303 05551 275236 05551 175394
DBMS DBM Systems 56 Green Lane Littleton 4254 05554 168431 05554 179139
41 Dilbridge Port
ED Easy Doors Dockside 4302 05553 128835 05553 245046
Road Peppard
Tawara Bus
TBC 14 Main Street Grovecourt Tawara 4303 05551 245975 05551 175401
Company
No change between 2NF and 3NF as no fields are more dependant on another field than the primary key fields 1 mark
Practice questions
Question 1
Question 2
Question 3
Question 4
Activity 11a
Ellmau video
Image ratio of software set to 4:3 1 mark
Saved in 960 x 720 format 1 mark
Title frames
Title background - Nurse_Shark.png 1 mark
… correct aspect ratio 1 mark
… fills whole frame 1 mark
Title 6 seconds duration 1 mark
Title text Diving in Cozumel, Mexico 1 mark
Top centre of screen and clearly visible 1 mark
Yellow 48 point serif font 1 mark
Effect added for title text animation … 1 mark
… effect does not hinder readability 1 mark
… effect added to give sufficient time to read text within 6 secs 1 mark
Activity 11b
Activity 11c
Activity 11d
Activity 11e
Activity 11f
Pitch of first 30.6 seconds changed from C♯/ D♭ into the key of F♯/G♭ 1 mark
No change top rest of pitch 1 mark
Clip length 0.9 x length of Activity_11e.mp3 (approximately 1 minute 22 or 1 minute 23 1 mark
Activity 11g
Activity 11h
Activity 11i
Activity 11i
Practice question 1
Bali_sound.mp3
Still image extracted from first frame saved as Bali2 in suitable file format 1 mark