Please enable JavaScript.
Coggle requires JavaScript to display documents.
IT Revision (Unit 1: Information Technology System 11th June 2018 paper),…
Question 1)
1) a. Mobile data isn't always reliable as it is signal based and depending on your provider it will effect the speeds. This question relates to Networks
Mobile data networks this is an example of a WAN (Wide Area Network) as the majority of locations in the century the provider is from will be covered and so you will be able to access the internet. The down sides to using mobile data is that you normally have a set amount of data you can use and downloads/uploads will use more data then just accessing the internet.
Advantages of mobile data:
- You can access it anywhere with a signal
- You can use it as a hotspot for several devices
- You can also download and upload data from anywhere
Disadvantages of mobile data:
- You are set to the range that the provider covers
- It can be quite expensive to constantly use Mobile data
- Isn't not 100% reliable as speeds can vary
1) b. (i) A VPN would make transferring data more secure as it will encrypt data when being transferred and this will prevent things like packet sniffing. It will also change your IP as it will change it to seem like you aren't where you are therefor protecting the data.
Virtual Private Network, this is a way of protecting your data when you are on the internet by changing your digital location, it does this by changing your IP address allowing you to access regen locked content. It will also encrypt your data when being transferred. This is seen as the most secure way to use the internet.
Advantages of using a VPN:
- It will encrypt data when being transferred
- It will change your IP address to make you appear in another country
- Your real IP address is never given out
Disadvantages of using a VPN:
- It will use up some of the devices recourses possibly slowing the device down (not really an issue on modern devices)
1) b. (ii) Two rules that would help increase a passwords security are making the password have a specific length (length check) and if the password has a capital letter numbers and a symbol (format check) . Protecting data techniques
-
A format check will check that the password has specific characters in it like symbols numbers and a capital letter
1) c. It will manage these devices by looking for any software attached to the device (drivers) these will allow the peripheral device to be used with the laptop. it will then use these drivers when ever the device is plugged in (this is mainly done through USB ports) if the device doesn't come with drivers the laptop will say there is no supporting drivers for this device, and then you would install drivers from the company's website.
Peripheral devices are mostly used to allow people with disability's to use things like laptop and condoles. They will also be used to create an output of some form like printing or using speakers to produce sound.
1) d. Two things they should consider when upgrading software are if the hardware can handle it and the training of staff to use the software.
-
-
Question 2)
2) a. (i) Two features that they can provide for visually impaired users are a screen reader and a zoom feature.
Screen reader - this will read highlighted text allowing people who cant see or read to access the content in the text
Zoom - this will enlarge things on screen for people who need it, this can be done through things like the + and - keys.
2) a. (ii) Two peripheral devices that can be used to help visually impaired users are a brail/large keyboard and a brail embosser. Accessibility information
Braille/Large keyboard - this is a keyboard that uses either brail cells or a keyboard with an increased size in the font to allow visually restricted users to type.
Braille embosser - this is a special type of printer that will output braille cells instead of standard ink text. This allows people with visibility issues to read and have a physical copy of a document
2) b. This will restrict access to content that the students shouldn't need to access this can be and will have controlee over there's and only there files, no other people will be able to access these files apart from the head of IT. Tutors will be able to view the files but wont be able to edit or delete any files. But tutors will have access to files that students cant access like lesson plans. The way that file permissions work is by people having a set role which tells the system which files they can access.
2) c. Things that a company should consider when implementing emerging technologies are security, training for staff, cost, and accessibility.
Security - When implementing new technology there are often a lot off issues and this can effect how safe the device or software is to use and it could put customer, personal and company data at risk.
Training - Often when implementing new technology the staff using it will need to be shown what it does how it operates and what they will use it for. This will take up time where they could be working and it could take a while for hem to get used to it so productivity could be slowed down for a while.
Cost - new technologies always come with a large price tag and it needs to be available for anyone to use (that needs to). So it could mean that there are several of these net technologies that need to be bought.
Accessibility - These technology should be able to be accessed by anyone in the company including those with disabilities. There are normally peripheral or digital solutions to these issues though.
Question 3)
3) b. (i) One way that sales data can be used to update stock data is by using the sales to manage how much stock there is for example when pair of shoes is sold, that data can be sent to the stock data to tell it to lower there stock of that type of shoes.
-
3) c. (ii) Two ways that data can be kept up to date is by using an automatic stock system and backups . For example it can automate updates for the system therefor keeping the data up to date, and the data can be backed up so that it is kept up-to-date.
Question 4)
4) a. The implications of doing online surveys are people pretending to be someone else. And with using face to face focus groups it allows for clear communication but could be effected by the recent pandemic so it would have to be face to face digitally which causes issues as connection and having the equipment for it is an issue.
Online surveys
Advantages:
- These can be accessed at anytime
- There simple to do
- They take up less time to do
Disadvantages:
- People can pretend to be other people
- People might not have access to the internet
-
4) b. This will remove the need for face to face interaction and as of 2021 that is very important. Also it will remove the likelihood of human error or miscommunications as it allows the customer.
The advantages of using online only booking:
- Easy to do
- No human error
- there isn't a need for several buildings to manage the company
The disadvantages of using online booking:
- People might not have access to the internet
- People don't trust things online so its a potential loss of customers
- People could get confused and no know how to use the system
-