OCR Unit 1 Fundamentals of IT 14 May 2018
star
star
star
star
star
Last updated almost 7 years ago
39 questions
1
Which of the following types of server would be used to run a virtual machine?
Which of the following types of server would be used to run a virtual machine?
1
Which of the following is an example of storage virtualisation?
Which of the following is an example of storage virtualisation?
1
Which of the following is a characteristic of a peer to peer network?
Which of the following is a characteristic of a peer to peer network?
1
Which network topology is represented in Fig. 1?
Which network topology is represented in Fig. 1?
1
What is meant by the term ‘Metropolitan Area Network’ (MAN)?
What is meant by the term ‘Metropolitan Area Network’ (MAN)?
1
Which of the following is an example of a WAN connectivity method?
Which of the following is an example of a WAN connectivity method?
1
Which of the following is not a suitable use of a blog by a business?
Which of the following is not a suitable use of a blog by a business?
1
Which of the following is considered to be a personal attribute for a successful network manager?
Which of the following is considered to be a personal attribute for a successful network manager?
1
Why could two staff members of an organisation have different expected standards of dress code at work?
Why could two staff members of an organisation have different expected standards of dress code at work?
1
Which of the following is not a purpose of a professional body?
Which of the following is not a purpose of a professional body?
1
Which of the following is an example of staying safe online?
Which of the following is an example of staying safe online?
1
Which of the following is not an example of disaster planning?
Which of the following is not an example of disaster planning?
1
Which of the following is an attempt to gain information by listening to communication traffic?
Which of the following is an attempt to gain information by listening to communication traffic?
1
Which of the following is an example of digital security?
Which of the following is an example of digital security?
1
Which of the following describes why usernames must be used with a password for improved security?
Which of the following describes why usernames must be used with a password for improved security?
4
16 Staff at AMEC Leisure must read and sign the company’s Code of Conduct. Explain two reasons why staff must agree to the AMEC Leisure Code of Conduct.
16 Staff at AMEC Leisure must read and sign the company’s Code of Conduct. Explain two reasons why staff must agree to the AMEC Leisure Code of Conduct.
10
(a) Explain why IT staff use SOP to maintain the ‘connected’ fitness equipment.
(a) Explain why IT staff use SOP to maintain the ‘connected’ fitness equipment.
3
(b) Convert the decimal number 244 to hexadecimal. You must show your workings .
(b) Convert the decimal number 244 to hexadecimal. You must show your workings .
3
(c)Each piece of ‘connected’ fitness equipment has 128 mebibytes of storage.
Describe the difference between a mebibyte and a megabyte and explain why mebibytes are used.
(c)Each piece of ‘connected’ fitness equipment has 128 mebibytes of storage.
Describe the difference between a mebibyte and a megabyte and explain why mebibytes are used.
10
(d) Discuss the use of wireless technologies for uploading data to and from the ‘connected’ fitness equipment.
(d) Discuss the use of wireless technologies for uploading data to and from the ‘connected’ fitness equipment.
1
(a) Identify one social media channel that could be used by AMEC Leisure.
(a) Identify one social media channel that could be used by AMEC Leisure.
3
1
1
3
2
2
1
(a) (i) Identify one method that could be used to remove data from equipment before disposal.
(a) (i) Identify one method that could be used to remove data from equipment before disposal.
2
Advantage 1
Advantage 1
2
Advantage 2
Advantage 2
1
Disadvantage
Disadvantage
2
(a) Explain one benefit to AMEC Leisure of using a bespoke operating system
(a) Explain one benefit to AMEC Leisure of using a bespoke operating system
2
1
1
2
2
2
1
3
3
2
1
1
2
2
2
1
1
1
1
2
2
1
3
3
2
(e) Explain one benefit of not using automated methods to configure the addressing information.
(e) Explain one benefit of not using automated methods to configure the addressing information.
2
Identify and describe one type of utility software that can be used for this purpose.
Identify and describe one type of utility software that can be used for this purpose.
1
(g) Identify and describe one other type of utility software that can be used to improve the performance of the tablet computer.
(g) Identify and describe one other type of utility software that can be used to improve the performance of the tablet computer.