G063 - Implications of ICT Questions (20 Marks)

Total Page:16

File Type:pdf, Size:1020Kb

G063 - Implications of ICT Questions (20 Marks)

3.3.6 h. discuss how encryption, authorisation, authentication, virus checking, virus protection and physical security can be used X to protect data;

G063 - Implications of ICT questions (20 marks)

1. A successful travel agency is taken over by an international company with a head office abroad.

(a) Describe the impact of this external change on:

(i) the travel agency [2] (ii) the system the travel agency uses. [2[

(b) Describe factors which the new company must consider when managing this change. [4]

2. Explain the importance of communication between managers and employees when managing changes. [4] 2517 June 2008 Q5

3. The network manager of a company has joined the British Computing Society (BCS). Describe the activities of a professional body, such as the BCS. [6] 2512 January 2003 Q8

4. A network manager for a large bank has been advised by his colleagues to join the British Computing Society (BCS). The BCS is a professional body for people who work in ICT.

Describe the advantages to the network manager of joining a professional body such as the BCS. [4] 2512 June 2004 Q10

5. A network manager has joined the British Computer Society (BCS). Describe three services that would be provided by the BCS for the network manager. [6] 2512 January 2006 Q8

6. Employees of a company need to use computers as part of their work. The managing director wants them to sign a code of conduct before they can use the computers.

Identify two statements that should be in a code of conduct. [2] 2512 June 2008 Q9

7. A removal company has produced a code of conduct relating to the use of their computer system.

Describe two advantages to the removal company of having its employees sign a code of conduct. [4] 2512 January 2005 Q9

8. Explain what is meant by encryption of data. [2] 2515 January 2008 Q4

9. A company has on-line ordering and payment facilities.

(a) Explain the purpose of authentication if a customer pays for a product on-line using a credit card. [2]

(b) Give an example of how authentication would be used. [1] 2515 June 2007 Q1

10. Describe three threats to the security of data held on distributed databases. [6] 2515 January 2009 Q3

Plus:

i. discuss hardware and software developments that are changing, or might change, the way we live. Examples might include advances in treating injuries or disease, leisure activities, the environment, the home, education and freedom of speech and movement. This list of examples is not exhaustive as questions will reflect the current use or abuse of ICT in society. Synoptic content (13%, 16 marks)

Recommended publications