Log in
Sign up for FREE
arrow_back
Library

OCR Unit 1 Fundamentals of IT 14 May 2018

star
star
star
star
star
Last updated over 7 years ago
39 questions
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
4
10
3
3
10
1
3
3
1
2
2
1
2
2
2
1
2
2
1
1
1
2
2
1
Question 1
1.

Question 2
2.

Question 3
3.

Fig 1 shows a diagram of a computer network
Question 4
4.

Question 5
5.

Question 6
6.

Question 7
7.

Question 8
8.

Question 9
9.

Question 10
10.

Question 11
11.

Question 12
12.

Question 13
13.

Question 14
14.

Question 15
15.

Answer all the questions.

AMEC Leisure runs leisure centres throughout the country providing a variety of facilities. It has a website where customers can register to use a fitness gym’s facilities and create a personal profile to store training programs and track their progress. Customers can also link their social media accounts to their profile to share their training information with friends.

The leisure centres feature the latest fitness technology including ‘connected’ fitness equipment that automatically uploads workout information to the customer’s personal profile.

AMEC Leisure’s IT staff are responsible for the maintenance of the ‘connected’ fitness equipment as well as the company’s computer systems.
Question 16
16.

16 Staff at AMEC Leisure must read and sign the company’s Code of Conduct. Explain two reasons why staff must agree to the AMEC Leisure Code of Conduct.

17 When maintaining the ‘connected’ fitness equipment, IT staff use a set of Standard Operating Procedures (SOP).
Question 17
17.

(a) Explain why IT staff use SOP to maintain the ‘connected’ fitness equipment.

The ‘connected’ fitness equipment features a hexadecimal error display. The code on the display identifies the error with the ‘connected’ gym equipment.

When updating the equipment’s user manual, the engineer mistakenly used a decimal value instead of hexadecimal.
Question 18
18.

(b) Convert the decimal number 244 to hexadecimal. You must show your workings .

Question 19
19.

(c)Each piece of ‘connected’ fitness equipment has 128 mebibytes of storage.

Describe the difference between a mebibyte and a megabyte and explain why mebibytes are used.

Question 20
20.

(d) Discuss the use of wireless technologies for uploading data to and from the ‘connected’ fitness equipment.

18 Staff at AMEC Leisure have received a customer complaint via one of its social media channels.
Question 21
21.

(a) Identify one social media channel that could be used by AMEC Leisure.

(b) Explain two barriers to communication that could be encountered when receiving a complaint via social media.
Question 22
22.

1

Question 23
23.

2

19 Before disposing of computer equipment, AMEC Leisure must ensure it has removed all data.
Question 24
24.

(a) (i) Identify one method that could be used to remove data from equipment before disposal.

(ii) Explain two advantages and one disadvantage of the method you have chosen.
Question 25
25.

Advantage 1

Question 26
26.

Advantage 2

Question 27
27.

Disadvantage

20 Each staff member at AMEC Leisure has a tablet computer with a bespoke operating system.
Question 28
28.

(a) Explain one benefit to AMEC Leisure of using a bespoke operating system

(b) Describe three functions that a tablet computer’s operating system will perform.
Question 29
29.

1

Question 30
30.

2

Question 31
31.

3

(c) Describe two troubleshooting tools that could be used to investigate faults with the tablet computers.
Question 32
32.

1

Question 33
33.

2

(d) The tablet computers are connected to a network using the TCP/IP protocol. The addressing information must be configured manually.

Identify three pieces of information that must be configured to allow the tablet computer to access a web site on the internet.
Question 34
34.

1

Question 35
35.

2

Question 36
36.

3

Question 37
37.

(e) Explain one benefit of not using automated methods to configure the addressing information.

(f) Data on the tablet computers must be protected from accidental deletion.
Question 38
38.

Identify and describe one type of utility software that can be used for this purpose.

Question 39
39.

(g) Identify and describe one other type of utility software that can be used to improve the performance of the tablet computer.

END OF QUESTION PAPER

Which of the following types of server would be used to run a virtual machine?
A Mail
B Web
C File/Print
D Hypervisor

Which of the following is an example of storage virtualisation?
A Storing audio files on a mobile device
B Storing server back-ups on a removable drive.
C Storing a word processed document on a laptop desktop.
D Storing a movie on a drive from multiple network storage devices
Which of the following is a characteristic of a peer to peer network?
A Centralised data accounts.
B All data traffic flows through a central server
C Resources can be shared without a dedicated server.
D Data flow through the network is controlled by a token allocated by the server.
Which network topology is represented in Fig. 1?
A Bus
B Star
C Ring
D Mesh
What is meant by the term ‘Metropolitan Area Network’ (MAN)?
A A network based in a school
B A city-wide network of computers.
C A network spanning two countries
D A network of hypervisor enabled machines.
Which of the following is an example of a WAN connectivity method?
A Data
B ISDN
C HTTP
D SATA
Which of the following is not a suitable use of a blog by a business?
A To launch a new product.
B To request feedback on a product
C To share new developments with staff
D To inform staff that they have been made redundant.
Which of the following is considered to be a personal attribute for a successful network manager?
A Being self-taught.
B Requiring supervision.
C Ability to work independently.
D Being a member of a professional body
Why could two staff members of an organisation have different expected standards of dress code at work?
A The staff members job-share
B The staff members are different ages.
C The staff members perform different job roles.
D Staff members are at different stages of their career.
Which of the following is not a purpose of a professional body?
A To share best practice.
B To organise industrial action.
C To act as a means of entry into the profession.
D To support the learning that underpins the professional body
Which of the following is an example of staying safe online?
A Switching off the firewall.
B Regularly changing passwords.
C Providing personal details for public access.
D Updating anti-virus software on an annual basis.
Which of the following is not an example of disaster planning?
A Backing up the main server to the Cloud.
B Having two mirrored folders on separate servers
C Keeping a back-up copy of an organisation’s website.
D Using an external hard drive as the sole storage area.
Which of the following is an attempt to gain information by listening to communication traffic?
A Phishing
B Data theft
C Eavesdropping
D Social engineering
Which of the following is an example of digital security?
A Biometrics
B Electromagnetic wipe
C Permissions
D Tokens
Which of the following describes why usernames must be used with a password for improved security?
A Usernames should combine numbers, letters and symbols
B Usernames and passwords are changed every time you log on
C Username and password combinations being guessed is a low risk.
D Usernames are not unique, so offer high security levels on their own.