home

Multiple Choice Q1. B Q2. C Q3. D Definitions of "database"

Q4. D or C Q5. D Q6. A Q7. C Q8. A Q9. D Q10. B Q11. C //I tested using File Search * [word] * seems to return every string with spaces in it whereas *[word]* returns string just with the desired word in it. TPF//

//I have never used a wildcard with a space between the asterix. SM.//

or D? //I was very confused by this question. *band would presumably find things like wideband" band* would find bandwidth etc. but how do you search for "band" with a space each side. Is the way spaces treated in different wildcard searches consistent? TPF.//

Q12. B Q13. B Q14.C Q15. A Q16. B Q17. A Q18. D Q19. B Q20. A

Q21.(a) SELECT CountryName FROM Countries WHERE Continent EQUALS "South America" AND Language EQUALS "Spanish"

Q21. (b) DATEBASE SIZE in kilobytes= (200RECORDS*LENGHT(CountyName+Continet+BirthRate+DeathRate+LifeEexpectancy+Language))/1024

e.g.

DATEBASE SIZE in kilobytes= (200*(25+15+6+6+6+10))/1024

Note: one character = 1 byte

200 = number of records e.g 25 = size of data field 1024 = number bytes in one kilobyte

Q21 (c) To be able to calculate the rate of population increase using the field BirthRate and DeathRate these 'field type' for these two fields should be changed to '%' field types to allow numercial formula to be used for the calculation. SM: BirthRate and Deathrate have to be changed to a number datatype and formatted as a percentage. This will allow one to use formulas that is: Population % Increase = BirthRate - DeathRate

To store information about the expected life span of the female population, a new field e.g LifeExpectancy(F) should be added to the database, probably with similr characteristics to the field LifeExpectancy i.e Type EQUALS text; Length EQUALS 6; Description'Expected life span of the female poplation". SM: this assumes that field entry would look like 13y_4m for a text datatype. If the field entry was like 14.4, the datatype would most likely be a number.

Q22 (a) The participants in the system, that is the people who conduct the ifnormation processing or enter and update data in the system are:

Q23 (a) Two things that are suspicious in this email are:


 * 1) the fact that a secure site is not being used to update account information
 * 2) the misspelling of 'notification' as 'notifikation'

Typically a major bank would use a secure web site (one utilising the 'https') for updating account information. The fact that a secure website is not being utilised may indicate that whoever is behind the email could not demonstrate bona fides in relation tos ecuring a secure site.

It is highlu unusual that a formal communciation from a major bank would contain a spelling mistake.

Q23 (b) By following the link to the website you run the risk of exposing you confidential information both during unsecured transmission and on the site itself which does not appear to be secure. The privacy of your information could be violated.

An alternative course of action would be to contact your bank either by telephone or in person questioning why they may need you to uopdate youir information. Alternatively, you may choose to contact your bank using their published email or web contact details, obtained independenlty of the email in question.

Q24 (a) One stratgey negotiate with the builders and employees of Build Safe would be host a team building session. This could be in the form of an information/social event where the buidlers and employees are advised of the planned changes to the system and the timeframe for the propsoed changes. This stratgey could be enhanced by demonstrating a protototype (working model) of the planned system. The project manager should also seek feedback from the builders and employees and by active listening identify pertinent suggestions for change, issues or improvements.

Another stratgey would be to involve the builders and employees directly in the design of the new system using a process known as participant development where then people within the propsoed information system develop the solution. An evolutionary prototype could be utilised. This means that the process of development proceeds by a series of steps where participants refine their understanding of the new system and make changes to the prototype as appropriate.

Q24 (b) Tasks required to move from posted reminder letter to email reminder sent to builder.

1. Acquire email serve such as MS Exchange - this would involve licensing the email server software 2. Acquire appropriate server hardware on which to install MS Exchange - 3. Acquire communciation connection (internet access) for email services 4. ........

Q24 (c) SM: i thought this was a difficult question when one considers the time constraints in an exam situation. More than one way to do a DFD properly. Scenario can be interpreted more than one way. //TPF: I think BuildSafe entity would more likley enter 'reminder details' or "Builder details" - 'builder' sounds more like an entity name.//



Q25 (a) (i) A transaction is an event that generates or modifies data that eventually stored in an information system (syllabus p.44).

Examples of a transactions that occur in a library are:

SM: I would have indicated whether each was real time or batch processing Q25 (a) (ii) Features of online forms to enable data collection are:
 * a library loan
 * a library book reservation
 * a book catalogue entry
 * payment for book purchased for the library
 * payment of a library fine

//TPF: I may be being pedantic (but that's the nature of IT isn't it?). The IPT syllabus does not contain the word online. In the syllabus it is 'on-line'.//


 * user-friendly design - this means that the forms are well designed with clearly identifable data labels and clearly identified spaces where data can be enetered. The forms should conatin appropriate amounts of 'white space' so that they do not appear cluttered. Forms should make use of appropriate use of colour and text fonts (that not too many
 * allow data to be accurately recorded by incorporating fetaures such as drop down menues; check boxes .....SM: validation techniques: range checks
 * SM: use of input masks eg. phone numbers, birthdates
 * allow data to be easily input by good design allowing the user to progress by 'tabbing' from one field to another in a logical manner.
 * SM: connected to online database via communications so that fields on the online form correspond to fields in the online database.
 * SM: Submit button to populate the online database database
 * SM: "Are you sure" button / window display to check before actually submitting

Q25 (b) (i) A similar pedanticism: in the sylabbus it is 'real time' but 'real-time' in the question.

Real time transaction processing as the immediate processing of data (syllabus p. 45) Batch transaction processing as the collection/storage of data at the time of the event with actual updatin when it is scheduled or there is enough data (syllabus p.45)

The production of an electoral roll is an example of batch processing The prodcution of a voting card could either be an example of batch processing or real time processing - there is not sufficient ifnormation provided to determine. If these were produiced in advance of the election it would probably be by bacth processing. if they are being prodcued at the polling booth one at a time for each voter it would be an example of real time processing. Marking the voter's name off the electoral roll is an example of real time processing. Issuing the voting card is real time processing Completing the voting ballot paper and its transmittal to the server is real time processing The transfer of data to a central computer for counting votes is an example of batch processing.

Q25 (b) (ii) The security measures that could be used in EVACS to protect data during storage and retrieval could include:

//Non-digital data// Making copies in case primary source is lost Storing in a secure area Regular audits
 * Security of stored data**

//Digital data// Requiring user name and password Could require biometric access such as fingerprint recognition of iris scan Data could be encrypted Making backups in case primary data source is corrupted Making copies on different media (including paper) in the event of a system malfunction Storing in a secure environment such as a fire safe Regular audits

//security of transmitted data// Sending data in an encrypted form Using a private communciation network or Virtual Private Network Use of firewalls, access detection Physical securing of cable network

//people in the environment handling stored or transmitted data// subject to police check

25 (c) The issues that might arise if SMS votes from mobile phones were used could be: //(I find this a boring question so I may leave it for someone else to populate some answers)//
 * Security**


 * Technology

Interface design** Limited 'real estate' of the phone display may limit ability to produce well designed screens

Equity requirement that every voter to have a mobile phone account
 * Social issues**

Q26 (a) (i) Data mining is searching through large quantities of data, usually stored in data warehouses to discover trends and patterns. An example would be a supermarket looking for trends in sales of various products so as to market together items that seem to sell well together, such as tomato sauce and meat pies. Q26 (a) (ii) What-if analysis is the process of making changes to data in order to observe the results. For example, in a spreadsheet, data is entered and a formula is used to calculate an answer. If the data is changed, the answer to the formula will also change. A person may set up a spreadsheet to calculate his monthly repayments depending on interest rate and length of the loan. He may then perform a what-if analysis to see what happens to the size of his repayments if the interest rate or the term of the loan is altered. Q26 (b) (i) The SleepCam decision support system is being used in an unstructured situation. There are few facts and a large number of unknowns. There are few known factors to identify drowsiness developing in a driver, and a lot of unknown factors (symptoms that may be displayed by any particular driver). There is no set method or algorithm identified to reach the conclusion that the driver is becoming drowsy. It is unpredictable. The DSS would sound an alarm to alert the driver that he __may__ be becoming drowsy, but he will have to use his own judgement of the situation to determine if he needs to take a break from driving. He will require a certain insight into his physical symptoms. Q26 (b) (ii) The DSS used to implement SleepCam is likely to be an artificial neural network. An ANN is an artificial intelligence system modeled on the human brain. It is electronic circuitry in a computer that uses parallel processing to learn by example. A human programmer would write a set of instructions which would be followed by the many processing elements within the ANN. The ANN would observe a large number of people becoming drowsy and develop the weightings to apply to the rules developed that would lead it to determine whether the person observed is becoming drowsy. If the observations trigger the drowsy conclusion the outcome would be an alarm triggered. In use, the SleepCam would monitor the drivers – observing the position of the head and the blinking rate. These measurements would be passed into the rules held in the ANN, the processing elements would apply their weightings and a determination would be reached. If it is determined that the driver may be becoming drowsy, the alarm would be triggered. Q26 (c) Issues related to the use of SleepCam in trucks could include the following: The main issue is that implementation of SleepCam would improve safety for truck drivers and reduce accidents. This would have a flow on effect of reducing insurance costs and hence overall costs, as well as saving lives. SleepCam has been developed for use in cars. There may need to be some testing and development to ensure that is it suitable for use in trucks. Some modifications may be needed to ensure that the SleepCam works effectively and reliably in the changed environment. This may require some re-programming of the processing units, and some re-training of the neural networks. The unit would have to be fully tested under operating conditions to ensure that it is accurate and reliable. This testing and modification is likely to cost a reasonable amount of money which would increase the costs of implementation for the company. There is a question of reliability and accuracy. The drivers need to be able to depend upon the SleepCam in the same way they depend on the speedometer or petrol gauge on their instrument panel. Each neural network may need to undergo a period of training with respect to the driver who is going to be using it to achieve maximum accuracy. If the unit proves to be unreliable there may be avoidable accidents and loss of life with consequential loss of confidence in the unit. There would be a very large outlay in cost to have the SleepCam unit fitted into the trucks. While this would be an important safety device for truckers to use, the cost involved may not be justified by the improved safety. There would also be increased costs for maintenance and repair of the unit. The company would have to carefully consider whether the increased safety and reduction in accident rate was sufficient to justify the capital expenditure on the implementation of SleepCam. Liability would be another factor. If there was an accident involving a driver falling asleep at the wheel when SleepCam was being used, would the company be considered liable? Or would the driver be held responsible for failing to act upon the warning issued by SleepCam. This concern might increase insurance rates and thus have an effect of increasing costs. On the other hand, implementation of SleepCam might be shown to decrease accidents which might then decrease insurance rates and hence overall costs would also decrease. It would be important that the drivers fully accept the use of the SleepCam device in their trucks. Thorough education and training would be required, so that the drivers understand that this is another safety device and how to use and maintain it. Full acceptance avoids any problems of deliberate damage to the unit by drivers who feel they are being monitored by the company or told what to do by a machine. Education would also be required so that the drivers understand that SleepCam is just another safety sensor. It alerts the drivers to the possibility of drowsiness, but it is up to the individual driver to decide if the monitor is correct. The final decision to pull over and rest lies with them. There is some question of how the devices would function and be used at night. Many truck drivers work through the night. If the unit is shining a light into their eyes or at their faces, this may interfere with night vision and their ability to drive safely. Then SleepCam would become a hazard rather than a safety feature. Q28 (a) (i) Virtual reality is technology (harware, software and communications) that allows a participant to interact with a computer-simulated environment.

An example of virtual reality would be a training environment such as a flight simulator comrising a physyical mock-up mof say an aeroplane cockpit mounted on hydrualic jacks. The pilots would be equipped with vision goggle on to which is displayed movies of airfields during a landing or takoff sequence. The pilots would interatc with real equipment to 'fly' the plane.

Q28 (a) (ii)

Q28 (b) (i) Information technolgies used for displaying information in Navmap include:

3.5 inch LCD colour screen used to display digital information in the form of text/numbes; digital photos; didtal maps Speaker to display music and MP3 files; voice directions
 * Hardware**


 * Software**


 * Communciations**

A bright, clear display, such as that provided by the LCD screen is needed as it is likely that the device will be used out of doors, including in direct sunlight. The bright screen is also needed as it is likely that the device would be used at night in low light conditions.
 * Justification for inclusion**

Q28 (b) (ii) //Answers from Powers// Image and audio data are compressed using one of two main methods. Lossy compression removes a number of data bytes from the file. The resulting file is smaller in size but the quality is reduced. However, audio and video files can be compressed with high compression ratios and without any noticeable change to the human ear or eye. For example an MPEG file can provide a compression ration up to 200:1. Alternatively Lossless compression allows the original file to be recovered in full. It works by replacing repeated data with something that takes up less room. A codec (coder-decoder) is used to encode (compress) data used for sound files.

The importance of compression in Navmap is that it is unlikely that the hendheld device would have large amounts of storage for audio or image (map) files.

Q28 (c) Navigation using printed maps relies on using maps that might be out of date. Printed maps are costly to produce and are not reprinted all that often. In comparison, maps on Navmap, because they are stored in digital format would be easier to update and publish online.

To navigate using a printed map the user would need additonal technolgy such as a compass and perhaps a ruler. In comparision, the Navma system does not require additional technology.

To navigate using a printed map the user needs to possess map reading and navigation knowledge and skills. In comparision, using Navmap the user is provided with clear, simple sirections to follow and does not need complex knowledge or skills.

Both systems (printed map or Navmap) assist users find their way to a desired destination or to identify features in the environment around them.

Users of Navmap would need to invest in the heandheld technology (hardware, software and communciations) to be able to use the system. A printed map can be used at any time. In comparision, if the satellite system misfucntion or the communciations network was disrupted (as can occur during a solar storm) the Navmap system might not work. Simiallry, The Navmap system may need a source of energy (such as a battery) to operate, whereas a printed map can be used without any source of energy. The Navmap system presumably includes a lighted screen which would allow the syetm to be used in poor light conditions or at night without any additional source of light. In comparision, a printed map cannot be read at night without the use of an additional light source. The voice direction of Navmap would assist some users who may be textually challenged or who may have difficulty reading a map.