Chapter 12:
1. Discuss the benefits of the use of vision enhancement in health care.[8]
2. Explain how technology-enhanced learning can have an impact on the autonomy of learners.[6]
3.
Chapter 14:
4. Near Field Communication (NFC) is a communication method.
Describe how NFC can be used by mobile devices.[6]
5. Many companies have access control strategies to protect their data. Explain how the use of an access
control strategy can minimise the risks to computer data.[6]
6. Discuss the benefits and drawbacks of using virtual servers for hosting websites.[8]
7. Web browsers are clients which request services, such as web pages, from a web server. This is an
example of the use of the client-server model of networking.
Justify the use of client-server networking in this scenario[6]
8. Computer devices can connect to a local area network (LAN).
Wi-Fi connections can only be used within range of a wireless access point (WAP).
(a) Explain why Wi-Fi connections to a WAP have a limited range. [3]
(b) Explain how the connection range of Wi-Fi can be increased. [3]
Devices use ethernet technology to send data on cabled LANs.
(c) Explain why ethernet technology is used on LANs to send data. [4]
7. Devices on a network can be connected by Wi-Fi. Describe how a Wi-Fi connection is used to transfer
data between devices. [6]
8. A company network has a file server and a print server. Employees store their files on the file server and
use the print server when they need hard copies of their work.
(a) Discuss the benefits and drawbacks of the use of a print server on company networks. [8]
(b) The company also has an FTP server. Its web designers use FTP to upload and download files between
the FTP server and their workstations. Evaluate the use of FTP in this scenario. [6]
9. Computer devices can connect to a local area network (LAN). Wi-Fi connections can only be used within
range of a wireless access point (WAP).
(a) Explain why Wi-Fi connections to a WAP have a limited range. [3]
(b) Explain how the connection range of Wi-Fi can be increased.[3]
Devices use ethernet technology to send data on cabled LANs.
(c) Explain why ethernet technology is used on LANs to send data.[4]
10 Web browsers are clients which request services, such as web pages, from a web server. This is an
example of the use of the client-server model of networking. Justify the use of client-server networking
in this scenario.[6]
Chapter 15:
11 Developers can use either evolutionary or throw-away prototyping to create prototypes of a new
interface.
(a) Describe two advantages of using evolutionary prototyping.[2]
(b) Describe one disadvantage of using evolutionary prototyping.[1]
(c) Describe two advantages of using throw-away prototyping.[2]
(d) Describe one disadvantage of using throw-away prototyping.[1]
12 Project management software (PMS) is used to support a project
(a) Explain how PMS can be used for the scheduling of tasks in a project.[4]
(b) Explain why using PMS may not be appropriate for very small projects.[4]
(c) Describe how PMS can be used to manage the costings of a project.[4]
(d) Explain how PMS can help in decision making during a project.[4]
Chapter 16:
13 Describe the Agile method used to develop software.[6]
14 Draw three different symbols used in a data flow diagram (DFD). For each symbol, state its purpose.
Symbol 1
Purpose 1
Symbol 2
Purpose 2
Symbol 3
Purpose 3 [6]
15 Alpha testing is carried out in the final stages of software development. Describe the process of alpha
testing.[6]
16 Describe how a system flowchart is constructed.[5]
17 Data flow diagrams (DFD) are drawn when designing a new computer system.
(a) Explain the purpose of a DFD.[2]
(b) When a new computer system is being designed, the designers draw a level 0 (context-level) DFD
before drawing a level 1 DFD. Describe two differences between a level 0 DFD and a level 1 DFD.[2]
18 A software developer has been asked to create a gaming app for a smartphone. Analyse the use of the
waterfall method of software development in this scenario. [8]
19 Describe how a system flowchart is constructed[5]
Practical’s:
20 Explain why break statements, functions and comments are used in JavaScript code.
(a) Break statements [2]
(b) Functions [2]
(c) Comments [2]
21 Justify the use of lossy compression when storing and using bitmap images. [6]
22 Objects in computer animations have properties.
Describe the following properties.
(a) Orientation [3]
(b) Transparency [3]
23 JavaScript uses loops to execute a block of code using Iterative methods.
(a) Describe what is meant by an Iterative method. [2]
(b) Explain how a do/while loop differs from a while loop.[2]
(c) Explain why a while loop might be used instead of a for loop in JavaScript code.[1]
24 Describe how stroke and fill settings can be used to change the appearance of text in a computer
animation[6]
25 Web pages can be made more attractive and easier to read by using colours. All major web browsers
support the use of HSL to specify the colours used in web pages.
Explain how HSL is used to specify colours.[6]
25. Describe the differences between 2D and 3D computer animation.[6]
26. JavaScript code has been developed for an interactive website. White box testing is carried out by the
developers.
(a) Describe how white box testing is used to test the code.[6]
(b) Describe one way that JavaScript code can add interactivity to a web page.[1]
(c) HTML events occur when users interact with a web page. Describe how JavaScript code can be made to
react to an HTML event.[5]
27. JavaScript uses loops to execute a block of code using Iterative methods.
(a) Describe what is meant by an Iterative method.[2]
(b) Explain how a do/while loop differs from a while loop.[2]
(c) Explain why a while loop might be used instead of a for loop in JavaScript code.[1]
28. Describe how stroke and fill settings can be used to change the appearance of text in a computer
animation.[6]