Past Paer Q’s on Systems and Review Computer Architecture

Home Forums Week 8 Past Paer Q’s on Systems and Review Cumpter Architecture Past Paer Q’s on Systems and Review Computer Architecture

Viewing 5 posts - 1 through 5 (of 5 total)
  • Author
    Posts
  • #6663
    Eamonn
    Keymaster

    Review Systems Design and Fundamentals

    Past Paper Questions

    1. Human interaction with the computer system includes a range of usability problems.

    (a) Define the term usability. [1]

    (b) Identify two methods that could be used to improve the accessibility of a computer
    system. [2]

    4. A small hotel buys a software package to manage their bookings.

    (a) Describe two types of documentation that should be provided with the software package. [4]
    (b) State two methods of delivering user training. [2]

    7. A hardware shop supplies a wide variety of bathroom equipment. There are 15 shop
    assistants who serve customers, 3 office staff who handle the administration, and a manager.

    A specialized company is asked to design and implement a new computer system for
    the shop.

    (a)
    (i) Identify two different types of users of the system. [2]
    (ii) Explain the role of users in the process of developing the new computer system. [3]

    (b) Describe why it is useful to produce more than one prototype of the new system. [2]

    (c) Outline two problems that may occur when transferring data from the old system to the
    new system. [4]

    The new system is implemented using parallel running.

    (d)
    (i) Outline what is meant by parallel running. [2]
    (ii) Outline one reason for choosing parallel running as opposed to a direct
    changeover. [2]

    2021 Paper

    12 A school has a cabled network and wishes to add wireless networking access for the whole campus.

    Describe 2 hardware components the school will need to implement the network
    Identify 2 advantages to the students of the new wireless network

    There are concerns that unauthorized people may gain access to the data on the network

    (c) Outline 2 methods that the school could employ to prevent network data being accessed over the wireless network. ( see https://mecsunlimited.com/top-5-ways-to-secure-your-schools-wireless-network-in-a-byod-era/

    Review Computer Architecture
    2.1.1 Outline the architecture of the central processing unit
    2.1.2 Describe primary memory.
    2.1.3 Explain the use of RAM, ROM and Cache memory.
    2.1.4 Explain the machine instruction cycle ( Fetch Decode Execute )

    Link to Slide https://docs.google.com/presentation/d/1h2AF-Xu73yLx1ioEUnxB74CJSO0YqrpTBzcpBnkR8Qs/edit?usp=sharing

    #6665
    girwan
    Participant

    1. Human interaction with the computer system includes a range of usability problems.

    (a) Define the term usability. [1]
    Usability is how easy it is for users to efficiently use the system/

    (b) Identify two methods that could be used to improve the accessibility of a computer
    system. [2]
    The use of contrasting colors and fonts
    Use of features such as voice recognition

    4. A small hotel buys a software package to manage their bookings.

    (a) Describe two types of documentation that should be provided with the software package. [4]
    Requirements : This documentation will talk about the capabilities, characteristics and attributes of the system. This documentation will talk about what is required before implementing the system.
    User Manuals: This includes instructions on how to operate the system and is targeted towards the end-user. This should allow them to use the system efficiently.

    (b) State two methods of delivering user training. [2]
    Self-instruction
    Formal Classes

    7. A hardware shop supplies a wide variety of bathroom equipment. There are 15 shop
    assistants who serve customers, 3 office staff who handle the administration, and a manager.

    A specialized company is asked to design and implement a new computer system for
    the shop.

    (a)
    (i) Identify two different types of users of the system. [2]
    The manager
    Shop Assistant
    (ii) Explain the role of users in the process of developing the new computer system. [3]
    Users help designers and developers to understand the specific needs required. Users can give feedback on prototypes and this can reduce the flaws, and make the final product experience more comfortable for the user.
    (b) Describe why it is useful to produce more than one prototype of the new system. [2]

    Multiple prototypes gives users the chance to give feedback and allows them to compare the prototypes against each other to see which one fits their needs the best. It also allows developers to see what they can improve upon and this can help them learn from their mistakes.

    (c) Outline two problems that may occur when transferring data from the old system to the
    new system. [4]
    Data loss: Data loss can occur when transferring large amounts of data between two systems. This data may not be noticeable at first but can cause glitches with the system later
    Hardware challenges: The new system may not be able to handle the amount of data that is about to be transferred. Maybe sometimes the data handling capacity may also be overestimated leading to a waste of resources.

    The new system is implemented using parallel running.

    (d)
    (i) Outline what is meant by parallel running. [2]
    Parallel running a system changeover method where two systems are running simultaneously.

    (ii) Outline one reason for choosing parallel running as opposed to a direct
    changeover. [2]
    Parallel running is more advantageous as it reduces the risk of data loss. Even if there is data loss, you can revert back to the old system and it won’t end up being permanent

    2021 Paper

    12 A school has a cabled network and wishes to add wireless networking access for the whole campus.

    Describe 2 hardware components the school will need to implement the network
    Modem: A modem will allow the school LAN to connect with the Wide Area Network(WAN)
    Repeater: A repeater is required to extend the range of the network throughout the whole campus. A wireless repeater will receive an existing signal from a wireless router and rebroadcast it.
    Identify 2 advantages to the students of the new wireless network
    A wireless network is more convenient as students will be able to access the network wherever they are on campus.
    The wireless network connection will remain strong wherever the go due to the presence of the repeaters. This will also allow for more flexibility and portability for the students.
    There are concerns that unauthorized people may gain access to the data on the network

    (c) Outline 2 methods that the school could employ to prevent network data being accessed over the wireless network.
    -Encryption: The process of encryption makes the network data not understandable to any unauthorized persons. This happens through the use of encryption keys.
    – Firewall: A firewall controls and monitors the network traffic. It acts as a barrier between the school network and untrusted networks.

    #6667
    ArinN_
    Participant

    1. Human interaction with the computer system includes a range of usability problems.

    (a) Define the term usability. [1]
    – Usability is how well a system could be used.

    (b) Identify two methods that could be used to improve the accessibility of a computer
    system. [2]
    – Text-to-Speech could help people with visibility issues.
    – Voice Recognition and Touch screens could help users to navigate and use the system.

    4. A small hotel buys a software package to manage their bookings.

    (a) Describe two types of documentation that should be provided with the software package. [4]
    – Statements that identify attributes and characteristics and the documentation of code and interface of the software.
    (b) State two methods of delivering user training. [2]
    – Online training & Classrooms (i.e Lecturing)

    7. A hardware shop supplies a wide variety of bathroom equipment. There are 15 shop
    assistants who serve customers, 3 office staff who handle the administration, and a manager.

    A specialized company is asked to design and implement a new computer system for
    the shop.

    (a)
    (i) Identify two different types of users of the system. [2]
    – Admin and General user
    (ii) Explain the role of users in the process of developing the new computer system. [3]
    – Admin users are like the shop owners who has full access/control over the system while a general user might be the shop’s employees using a cashier or an accountant loging datas.

    (b) Describe why it is useful to produce more than one prototype of the new system. [2]
    – By producing multiple prototypes, the owner of the shop could choose their favourite one thus improves customer’s satisfaction but moreover, by producing multiple prototypes the company could develop ones that are considered good and possibly sell it.

    (c) Outline two problems that may occur when transferring data from the old system to the new system. [4]
    – 1. New interfaces could be troublesome and takes time to get used to.
    – 2. Datalost could occur if there’s a need to transfer data from the old system.

    The new system is implemented using parallel running.

    (d)
    (i) Outline what is meant by parallel running. [2]
    – Parallel running is when both the new and old system runs at the same time so the change to the new system would occur over a period of time.

    (ii) Outline one reason for choosing parallel running as opposed to a direct changeover. [2]
    – By running a parallel system, there would be more time for users to get used to the new interfaces so there would be no loss of momentum in the work amount as the old system is still in place and the change wouldn’t suddenly interrupt the work flow.

    2021 Paper

    12 A school has a cabled network and wishes to add wireless networking access for the whole campus.

    Describe 2 hardware components the school will need to implement the network
    – Router & Network Switch (Preferably a firewall switch)
    Identify 2 advantages to the students of the new wireless network
    – 1. Easy access to the internet and knowledge while on the go.
    – 2. No need to stick to using computers in the computer lab.
    There are concerns that unauthorized people may gain access to the data on the network

    (c) Outline 2 methods that the school could employ to prevent network data being accessed over the wireless network. ( see https://mecsunlimited.com/top-5-ways-to-secure-your-schools-wireless-network-in-a-byod-era/
    – Use a firewall with role based access with encryption
    – Create security practices and protocols

    Review Computer Architecture
    2.1.1 Outline the architecture of the central processing unit
    – Control Unit, ALU (Arithmetric Logic Unit) & Cache
    2.1.2 Describe primary memory.
    – Primary memory is the main memory where data are stored while the computer is turned on (such as cache and ram)
    2.1.3 Explain the use of RAM, ROM and Cache memory.
    – Cache memory is attached to the central processing unit (CPU) and is the fastest memory unit. Cache predicts sets of data the CPU would used next from the past repetition of data requested from RAM.
    – A RAM or Random Access Memory is where programs processes resides in while it is running.
    – A ROM or Read-only Memory is usually hard-mounted onto the mainboard and is where the BIOS is stored. (ROM would be the first thing a computer access when turning on)
    2.1.4 Explain the machine instruction cycle ( Fetch Decode Execute )
    – Fetch: Firstly, the instruction is fetched from the PC and copied into the memory address register then the address is sent down the address bus to the main memory then the instruction is sent back down the data bus to the memory buffer register and from the memory buffer register, the instruction is copied to the current instruction register
    – Decode: The contents of the current instruction register are sent to the control unit which makes all the necessary changes to logic gates and communication channels.
    – Execute: The tweaked instruction then get executed by the ALU (Arithmetric Logic Unit)
    – Store: The result generated by the operation is then stored in the main memory, sent to an output device, or saved in the accumulators. Based on the condition of any feedback from the ALU, Program Counter may be updated to a different address from which the next instruction will be fetched.

    #6702
    joshua7
    Participant

    1. Human interaction with the computer system includes a range of usability problems.

    (a) Define the term usability. [1]
    – How easy it is for users to use the system

    (b) Identify two methods that could be used to improve the accessibility of a computer
    system. [2]
    – Braille keyboard for someone that is blind
    – Text to speech for someone that may have difficulty on using the computer physically

    4. A small hotel buys a software package to manage their bookings.

    (a) Describe two types of documentation that should be provided with the software package. [4]
    – FAQ documents with the most frequently asked questions that the users may have as well. These documents would also contain additional information for help like customer service support contact
    – Printed manuals which is a paper manual that explains the basics of the software and provides the first steps like how to install the software and use them

    (b) State two methods of delivering user training. [2]
    – Self instruction
    – Formal classes

    7. A hardware shop supplies a wide variety of bathroom equipment. There are 15 shop assistants who serve customers, 3 office staff who handle the administration, and a manager.
    A specialized company is asked to design and implement a new computer system for the shop.

    (a)
    (i) Identify two different types of users of the system. [2]
    – Shop assistant
    – Office staffs

    (ii) Explain the role of users in the process of developing the new computer system. [3]
    – The role of users is to make sure the developers of the software are designing the software in the right direction and making sure they understand all the specifications and needs required. Users usually give feedback on prototypes in which the developers can make iterations and edits before making the final software. This process would reduce issues and will ensure user satisfaction for the final product

    (b) Describe why it is useful to produce more than one prototype of the new system. [2]
    – Multiple prototypes provide safety for developers because of the variety of the options for users but also if the prototype data is lost, there is a backup to ensure that the developer would not need to start again from scratch. Having a variety of prototypes allows users to discover different designs and provide the best feedback to the developers so that the developers have a more clear vision on how to better develop the software

    (c) Outline two problems that may occur when transferring data from the old system to the
    new system. [4]
    – Data loss because during the transfer of data between two systems, many errors such as human error or data incompatibility would result in a data loss. Data loss would have many issues for the software as glitches and software crashes may happen
    – Data incompatibility with the new system. The data may not be compatible with the new system for various reasons such as outdated files or data with different components. So during the transfer of data, if it is not compatible with the new system, data would be lost

    The new system is implemented using parallel running.

    (d)
    (i) Outline what is meant by parallel running. [2]
    – It is when both the old and the new system are run simultaneously. This process allows a fallback to the old system if the new system fails or needs iterations

    (ii) Outline one reason for choosing parallel running as opposed to a direct changeover. [2]
    – If the new system fails, parallel running gives the opportunity to fall back to the old system while the new system is being fixed. But also because it reduces the risk of data loss

    2021 Paper

    12 A school has a cabled network and wishes to add wireless networking access for the whole campus.

    Describe 2 hardware components the school will need to implement the network
    – Routers connect directly to a modem by a cable and allows it to receive and transmit information to the internet
    – Repeaters receives existing signals from a wireless router and rebroadcast it which allows an extended range of the network

    Identify 2 advantages to the students of the new wireless network
    – It allows more devices to be connected and also allows more convenience as students are able to access the network everywhere within the campus as there is more coverage
    – There is also an increased efficiency and improved data communications which allows faster transfer of information within the network

    The wireless network connection will remain strong wherever they go due to the presence of the repeaters. This will also allow for more flexibility and portability for the students.
    There are concerns that unauthorized people may gain access to the data on the network

    (c) Outline 2 methods that the school could employ to prevent network data being accessed over the wireless network.
    – Firewall as it acts as a barrier between the school network and external networks as the firewall would control the traffic
    – Role based access would allow the school to assign roles to different devices based on how it was authenticated

    #6718
    Shiva Chandnani
    Participant

    Review Systems Design and Fundamentals

    Past Paper Questions

    1. Human interaction with the computer system includes a range of usability problems.

    (a) Define the term usability. [1]
    – Usability is a measure of how well a user can use a product/design to achieve a goal effectively and efficiently.

    (b) Identify two methods that could be used to improve the accessibility of a computer
    system. [2]
    – Implement hearing features that allow people with disabilities to use the system without assistance. Implement vision features that allow people with disabilities to use the system without assistance.

    4. A small hotel buys a software package to manage their bookings.

    (a) Describe two types of documentation that should be provided with the software package. [4]
    – A user manual provides the end-user with information on how to use the system and all of it’s features.
    – FAQ document Provides frequently asked questions, so if the end-user has the same questions they can potentially find the answer on the document.
    (b) State two methods of delivering user training. [2]
    – one-to-one classes
    – Self instruction
    7. A hardware shop supplies a wide variety of bathroom equipment. There are 15 shop
    assistants who serve customers, 3 office staff who handle the administration, and a manager.

    A specialized company is asked to design and implement a new computer system for
    the shop.

    (a)
    (i) Identify two different types of users of the system. [2]
    – The manager and the office staff.
    (ii) Explain the role of users in the process of developing the new computer system. [3]
    – Users are in frequent communication with the developer in order to design the system according to the likings and needs of the users. The user set the requirements for the system at the beginning and then throughout the process of building the system the developer may stay in contact with the users if further question come up or if a prototype testing is required. Then at the end the end user conducts post-system development testing such as a black box testing.
    (b) Describe why it is useful to produce more than one prototype of the new system. [2]
    Having multiple prototypes helps I,proves the end-user satisfaction at the end of the process. Having multiple prototypes allows the the end-user see multiple stages of the system and provide feedback and new requirements based on their likings. If only a few prototypes are made then there is a possibility that at the end the end-user may want to change a certain feature, which will be much harder for the developer to conduct.
    (c) Outline two problems that may occur when transferring data from the old system to the
    new system. [4]
    – The first problem is that there may be data loss.when transferring the data from the old system tot the new system data can be lost in the process if a problem accords during the transfer. Next is that there may be compatibility issues when transferring the data. the new system may not be able tot understand or comprehend the data being inputed form the old system.
    The new system is implemented using parallel running.

    (d)
    (i) Outline what is meant by parallel running. [2]
    – parallel running is when both systems are running at the same time. The old system and the new system are both running together allowing access to both systems at any given time.
    (ii) Outline one reason for choosing parallel running as opposed to a direct
    changeover. [2]
    – Parallel running greatly prevent data loss when choosing to implement a new system because if the new system fails upon launch the old system will still be running so the data will still be available and accessible on the old system. In a direct changeover, if the new system fails then there won’t be a back up system running resulting potential data loss.

    2021 Paper

    12 A school has a cabled network and wishes to add wireless networking access for the whole campus.

    Describe 2 hardware components the school will need to implement the network
    – a wireless router and a network switch. The router will provided access to other networks and the switch will allow nodes within the system to communicate wirelessly.
    Identify 2 advantages to the students of the new wireless network
    – it promotes mobility as now the students can access the network anywhere in the schools premise prevent their limitation to be connected to a Ethernet cable. another advantage is that it allows a larger network area as the network is no longer limited to the distance the Ethernet cables go.
    There are concerns that unauthorized people may gain access to the data on the network

    (c) Outline 2 methods that the school could employ to prevent network data being accessed over the wireless network.
    – set up a firewall
    – unauthorize access to unknown websites and systems.

Viewing 5 posts - 1 through 5 (of 5 total)
  • You must be logged in to reply to this topic.
Scroll to Top