0% found this document useful (0 votes)
68 views36 pages

Unit 1 Revison

Uploaded by

adamfathialsaleh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views36 pages

Unit 1 Revison

Uploaded by

adamfathialsaleh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Unit 1 - Tum Sorular [222 marks]

An international organization is moving its offices from Africa to Europe. All of its
data will need to be moved to a new system.

1a. Define the term data migration. [1 mark]

1b. Outline two issues that could arise concerning data migration. [4 marks]
1c. Outline two aspects of change management that need to be considered, [4 marks]
other than data migration.

The organization will continue to maintain the legacy system.

1d. Explain one problem of maintaining legacy systems. [3 marks]


1e. Explain why parallel running is an expensive changeover method. [3 marks]

A company is using a prototyping approach as part of their software development


process.

2a. Outline one advantage of prototyping. [2 marks]


2b. Outline one situation in which the use of a prototype is not the best [2 marks]
approach.

A student posts images and videos on a public website of her friends at a party.

3a. Outline one ethical issue with the student posting these images and [2 marks]
videos.
3b. Outline one technical issue that may prevent the images and videos [2 marks]
from being viewed.

4. State two compatibility issues that may arise when international [2 marks]
businesses merge.

A business’s computer system needs to be updated.

5a. Identify one stakeholder to be considered when planning the new system.[1 mark]
5b. Outline one consequence of not including all stakeholders in the design [2 marks]
of the new system.

5c. Describe two appropriate techniques to gather the information needed [4 marks]
to find a suitable solution for the updated system.
5d. Outline one reason testing should take place at every stage of the [2 marks]
development process.
The new system is now ready for implementation.

5e. Evaluate two methods the business could use to implement the new [6 marks]
system. Include the benefits and drawbacks of each.
6. Outline one reason why accurate user documentation is necessary for a [2 marks]
system.

A group of programmers are involved in creating a new software product. They


create many new sub-programs but also use existing sub-programs within the
product.

7a. Outline why a sub-program is considered an example of abstraction. [2 marks]

7b. Evaluate the use of designing and developing different parts of software [3 marks]
products concurrently.
7c. Outline one way in which users can be informed of software updates. [2 marks]

8. Identify two roles that a computer can perform in a network. [2 marks]

9. Identify one common feature found in the user interface of application [1 mark]
software to improve its usability.

10. Describe one method of implementation for a new computer system. [2 marks]
11a. Identify two reasons why patches may be necessary for an operating [2 marks]
system.

11b. Identify two methods that can be used to obtain these patches. [2 marks]

12a. Outline one feature of a word processor that could reduce the amount [2 marks]
of typing required when writing letters.
12b. State the purpose of technical documentation provided with software. [1 mark]

An airline has a server that holds the flight database. Passengers can check in
using a number of self-service client kiosks located in the airport.

13a. Define the term client. [1 mark]

13b. Define the term server. [1 mark]


13c. Explain the functions performed by the server in this situation. [4 marks]

14. Compare direct changeover with parallel running as a method of [4 marks]


implementation.
A school has a local area network (LAN) connecting its computers and peripheral
devices. The LAN also provides access to the internet.

15a. Describe the role of a router in this network. [3 marks]

Users have been troubled by slow speeds when accessing the internet.

15b. Outline two reasons why there might be a reduction in data [4 marks]
transmission speed at certain times.
15c. Outline two measures that the school could take to safeguard its data [4 marks]
from unlawful access via the internet.

15d. The inventory of office supplies used in the school is stored on the [4 marks]
computer as a single file.
Each of the office supplies in the inventory (such as paper, ink, toner, printers,
pens, staplers, pencils and scissors) has a unique ID number, name, maximum
quantity, minimum quantity and remaining quantity.
Outline the steps in an algorithm that would output a list of supplies with the
quantity to be ordered.
Website developers need to consider a range of usability factors when designing a
website.

16a. Identify two usability factors that need to be considered in the design [2 marks]
of a website.

16b. Outline one reason why visual displays on a computer screen can [2 marks]
create difficulties for some people.
A company promotes its products online. To make a purchase, customers are
required to register with the company and provide data like their name, date of
birth, age, gender and email address. Once registered, more than one customer is
able to access the server to retrieve and modify their data at the same time.

16c. State where the customer data is held during the process of modifying [1 mark]
their data.

16d. Explain how the operating system ensures that each customer’s data is [4 marks]
secure when multiple users are accessing the data at the same time.
16e. The company is considering sharing its customers’ data with marketing [6 marks]
organizations.
Explain why there could be ethical issues for the company when sharing its
customers’ data.

17a. Identify one cause of data loss. [1 mark]

17b. Describe one way offsite storage can be used to prevent data loss. [2 marks]
An organization is implementing a new computer system.

18a. Identify two organizational issues related to the implementation of the [2 marks]
new system.

The management considered phased conversion and direct changeover as


methods of implementation.

18b. Evaluate these two methods of implementation. [5 marks]


18c. State one type of testing that involves users. [1 mark]

18d. Identify three consequences of inadequate testing. [3 marks]

18e. Discuss the social and ethical issues associated with the introduction of [4 marks]
a new computer system.
19. Define the term peripheral. [1 mark]

20. Identify two ways that user documentation may be provided. [2 marks]

A large mail order company is concerned about the security of its stored data.

21a. Describe two possible causes of data loss. [4 marks]


21b. Outline two backup strategies that may be used to limit data loss. [4 marks]

The company decides to improve its service by introducing a new user interface
for its customers and has developed this interface to the point that it needs to be
tested by users who are outside of the company.

21c. Explain why beta testing is used to gather feedback for the new user [3 marks]
interface.
21d. Outline one consequence of not involving end-users in the design and [2 marks]
testing stages.

21e. Identify two features that could be used to improve the accessibility of [2 marks]
the new user interface.

22. Outline one method of collecting information from stakeholders [2 marks]


concerning the requirements for a new system.
23. Outline why a prototype would be used to demonstrate the proposed [2 marks]
system to the client.

Many health agencies are using simulations in an attempt to understand how their
resources could be used in the future. With many countries experiencing aging
populations, health agencies have worked with computer scientists to develop
simulations that will enable them to manage their resources more effectively.
One of the key features of these simulations is the development of “what-if”
models.

24a. Describe the main features of a “what-if” model. [4 marks]


The following variables can be considered as part of a model to be used to
simulate the management of an aging population:
quality of health education
lifestyle choices such as smoking
residential region.

24b. Identify three other variables that could be included in this model. [3 marks]

24c. Explain the ethical issues that may arise from the collection of [5 marks]
information for this model.
24d. Explain why the model would be converted to a simulation. [3 marks]

25a. Outline what is meant by a database management system. [2 marks]

25b. Outline one advantage of using beta testing prior to the release of a [2 marks]
new product.

Direct observation is a technique used by a system analyst to determine user


requirements for updating a computer system.

26a. Identify one advantage of direct observation. [1 mark]


26b. Identify one disadvantage of direct observation. [1 mark]

An international company is in the process of moving its Head Office from Europe
to Asia.

27a. Identify two possible compatibility issues as a part of data migration. [2 marks]

27b. Outline how a virtual private network (VPN) will allow employees who [2 marks]
are in Europe to communicate with the Head Office in Asia.
27c. Outline one social issue associated with this process. [2 marks]

A new computerized system is being planned for a school library.

28a. Describe one method by which systems requirements can be obtained [2 marks]
from the stakeholders.

28b. Outline one reason for providing a prototype for this new system. [2 marks]
A medical centre uses a computer system to manage both patients’ data and
appointments. This system, which is used by the doctors, nurses and secretaries,
has two unordered files: a patients’ file and an appointments’ file, both of which
can only be accessed sequentially.
Every evening the following processing takes place:
a list of appointments for the next day is printed out
reminders are sent by SMS text messages to the patients’ mobile devices.

29a. Outline the pseudocode that the processing must follow when the [5 marks]
system sends out the text reminders.
29b. Describe two different methods that the medical centre could use that [4 marks]
would allow data to be restored should it be lost for any reason.

29c. The medical centre is concerned about the privacy of the data it is [6 marks]
storing and has to make decisions concerning:
access to the data stored on this system
storing the data locally or through the use of a cloud service.
Discuss the issues that should be considered before making these decisions.
30. Outline what is meant by beta testing. [2 marks]

An application package used in an office includes a word processor. A secretary


uses the word processor to create a text file.

31a. Describe how a spellchecker checks whether a word in a text file is [2 marks]
correctly spelt or not.

The text file is automatically saved at regular periods while being edited.

31b. State one advantage of this feature. [1 mark]


31c. Identify two additional features of a word processing package that [2 marks]
could be useful for this office.

31d. Outline the purpose of one application software package other than a [2 marks]
word processing package that could be used in this office.

All files created in this office contain information important to the business.

31e. Outline the security measures that should be taken to prevent data [2 marks]
loss.
The office manager decides to buy and install new software and hardware.

31f. Outline one problem that may arise from the installation of new [2 marks]
hardware and software in the office.

31g. The changeover to the new system can be achieved by either direct [4 marks]
changeover or phased conversion.
Compare direct changeover and phased conversion.

32a. In the context of the networked world, state the role of a client. [1 mark]
32b. In the context of the networked world, state the role of a server. [1 mark]

33. Identify one method of inputting data that can improve the accessibility [1 mark]
of a computer system for some users.

An application package used in an office includes a word processor.

34a. Describe how a spellchecker checks whether a word in a text file is [2 marks]
correctly spelt or not.

The office manager decides to buy and install new software and hardware.

34b. Outline one problem that may arise from the installation of new [2 marks]
hardware and software in the office.
The changeover to the new system can be achieved by either direct changeover
or phased conversion.

34c. Compare direct changeover and phased conversion. [4 marks]

The new software allows basic text summaries and analysis to help check text
files, including functions such as calculating word frequency.

34d. Identify one way of testing this software. [1 mark]


34e. One of the methods in this software is findFirst(CH, CHARARRAY) which [6 marks]
accepts a character, CH, and a one-dimensional array of characters, CHARARRAY,
and returns the position of the first occurrence of character CH in CHARARRAY. It
returns −1 if CH does not appear in the array CHARARRAY.
For example, consider the character array MESSAGE, which is of length 19.

For this array:


The character at position 8 in the sentence is “U” and hence MESSAGE[8] = "U".
The character at position 18 in the sentence is “.” and hence MESSAGE[18] = ".".
The method findFirst('A', MESSAGE) returns 0.
The method findFirst('S', MESSAGE) returns 9.
The method findFirst('Z', MESSAGE) returns −1.
Construct an efficient algorithm for the method findFirst(). You should use the
function len(), which returns the number of characters in an array (for example,
len(MESSAGE) returns 19).

© International Baccalaureate Organization 2023


International Baccalaureate® - Baccalauréat International® - Bachillerato Internacional®

Printed for AMER SCH OF BAHRAIN JR

You might also like