Anda di halaman 1dari 8

Answers

Section 4B: Applications and Implications


Check your progress 1 1. Describe how surveillance can be used by the police to solve crimes. A. The police can track someone who is suspected of having committed a crime, or who they believe is about to commit a crime. They can track where people are from their cell phone signals and can use hidden cameras to record criminal activity. They may also intercept emails and text messages. End-of-topic questions 1 1. Describe one way in which a computer system can be used to violate your privacy. A. Someone who works at a medical centre may use their access privileges to read confidential information about your health and then tell other people about it. (Note that if an employee did this and was found out they would normally lose their job.) 2. What is personal information? A. Personal information is information about living people. 3. Give one example of when surveillance could be used legally and one example of when it might be used illegally. A. Surveillance could be used legally to, for example, watch suspected drug smugglers at airports. Surveillance could be used illegally by a criminal to watch a house that they intend to burgle. 4. List two ways in which you can check whether information you have found on website is accurate. A. You could find out who or which organisation was responsible for the information and then decide whether they would know the correct information. You could also check the information against other trusted sources, such as an encyclopedia, or a reliable public website.

Check your progress 2 1. What is copyright? A. The person who created a book, a piece of music or an artwork, owns the copyright to that material, which means that no-one may copy, quote or reuse the material without their permission. 2. What is software piracy? A. Software piracy occurs when someone illegally copies and sells software. End-of-topic questions 2 1. Which of the following is ALWAYS a crime? a. electronic eavesdropping b. credit card fraud c. storing personal data d. storing inaccurate data A. B - credit card fraud 2. List two reasons why software piracy is bad for the computer industry. A. Software companies lose millions of potential sales because of piracy, which means that they have to increase their prices. Pirate software often carry viruses, which damages the reputation of genuine software suppliers. 3. Explain how someone can protect themselves from identity theft. A. By only giving your personal information to someone who needs to know it, and by shredding documents that contain personal information. 4. State the main differences between credit card fraud and computer fraud. A. Computer fraud is normally carried out by someone who has legal access to data. They then use their privileges to alter data, to create bogus bank account,s etc for their own personal gain. Credit card fraud can be carried out by anyone who has access to someone elses credit card, or knows the information printed on a credit card plus the PIN.

Check your progress 3 1. Make a list of all the application software that you can use at school. Are there other applications you would like to use? A. Lists will vary from school to school, but will probably include software packages for word processing (such as Microsoft Word), spreadsheets (such as Microsoft Excel), presentation (such as Microsoft PowerPoint), web design (such as Microsoft FrontPage), database management (such as Microsoft Access), desktop publishing (such as Microsoft Publisher), graphics (Microsoft Paint or Adobe PhotoShop) End-of-topic questions 3 1. What is the difference between custom-written and proprietary software? A. Custom-written software is created for one specific organisation so it exactly meets their needs. Proprietary software is available on the open market, and anyone can purchase it. 2. What are the advantages of using open source software? What are the disadvantages? A. Advantages: open source software is free; you can find plenty of help from the software developers and other users. Disadvantages: Open source software may not be compatible with other software applications. 3. For each of the following tasks state whether the user should use presentation, spreadsheet, word processing or desktop publishing software. a. Writing a letter to a customer b. Producing a fashion magazine c. Creating a slideshow for a talk d. Designing the menu for a restaurant e. Writing up a project f. Keeping track of personal expenditure A. a. word processing b. desktop publishing c. presentation d. word processing or desktop publishing e. word processing f. spreadsheet

End-of-topic questions 4 1. Describe a situation in which an expert system might be used. A. A junior doctor may use an expert system to make a diagnosis. 2. Explain the differences between CADD and CAE software. A. Computer Aided Design and Drafting software is a graphical program that is used by engineers to design products. Computer Aided Engineering software is used by engineers to both create and test a design on a computer before the product is actually made. 3. Describe two contexts in which a robot might be used instead of a human to do a task. In each case explain why the robot is preferred. A. A robot could be used in a dangerous location, such as within a nuclear reactor or in a collapsed building. This would protect humans from dangerous situations. A robot could also be used in a factory, where it would be able to carry out detailed tasks with much greater accuracy than a human. 4. What are the advantages of using teleconferencing facilities for a business meeting instead of meeting face-to-face? A. Advantages: The participants would not have to pay to travel to a meeting place; they would save the time that could have been spent travelling; they can have meetings that bring together people across the world and in different time zones. End-of-topic questions 5 1. List three jobs that have disappeared and three other jobs that have been created as a result of ICT. A. Three jobs that have disappeared: long-distance telephone operators, hot metal typesetters, shorthand typist, etc. Three new jobs: software engineers, database managers, IT trainers, etc. 2. Does telecommuting mean: a. Travelling to work from a long distance. b. Using a television as part of your work. c. Working from home. d. Working for a telemarketing business. A. C - Working from home

3. Describe three ways in which a doctor might use ICT in their work. A. A doctor can store patient records on a database, can use computer controlled scanning machines to diagnose a patients illness, can download professional documents from the Web. 4. Explain why training in ICT is important in the workplace. A. Many employees did not learn about ICT at school but find they need to use computer systems at work. New technologies are developing all the time, so employees need to keep up-to-date with the latest innovations. In both cases, the employer needs to provide training for the employees so they have the right skills. End-of-topic questions 6 1. What are the differences between the tasks done by a systems analyst and a software engineer? A. A systems analyst looks at all the processes used by an organisation, including those that involve computers, and then plans improvements. A software engineer designs the software that will be part of a new system described by the systems analyst. 2. Describe the work done by a database administrator. A. A database administrator is responsible for a large database, ensuring that the users can access the data and programs that they need in order to work with the database. 3. List four of the tasks undertaken by an IT manager. A. An IT manager will decide on new hardware and software, will manage the system administrators, will provide help for computer users, will prepare for emergencies, and will manage the IT finances. 4. What is the difference between a webmaster and a web developer? A. A web developer designs and creates a website. A webmaster looks after and amends a website on a day-to-day basis.

End-of-section questions Multiple-choice questions 1. The illegal copying and selling of software is called: A Copyright B Intellectual property C Piracy D Privacy A. C 2. An example of an open source software is A Windows B Linux C Microsoft Word D Microsoft Office A. B 3. Which of the following statements is NOT true about robots? A They are faster than humans B They are easy to buy and maintain C They can do repetitive tasks D They can be used in places that are dangerous for humans A. B 4. Which of the following devices is NOT a requirement in teleconferencing? A Microphone B Sensor C Speakers D Telephone A. B 5. Even though telemarketing is possible, sometimes people prefer to go and buy from shops mainly because A They can bargain the prices. B They can assess the quality of items. C They can shop at multiple shops and compare. D All of the above. A. B

Structured questions 1. a. List four types of computer crime. A. Electronic eavesdropping, industrial espionage, software piracy, identify theft b. Briefly describe any two of the crimes you identified in your answer to 1a. A. Electronic eavesdropping is tapping into other persons conversations, emails, etc. Industrial espionage is accessing information about a company illegally to gain a competitive edge. Software piracy is illegal copying and selling of copyrighted software. Identity theft is a form of fraud in which the criminal pretends to be someone else. 2. a. State the difference between telemarketing and teleconferencing. A. Telemarketing is the buying and selling of goods and services through telecommunication channels, while teleconferencing is having a meeting using telecommunication channels. b. State the difference between telecommuting and teleconferencing. A. Telecommuting is working from home by access to the office computer and teleconferencing is having a meeting using telecommunication channels. c. Expand the following abbreviations: i. CADD ii. CAE iii. CAM A. i. Computer Aided Designing and Drafting ii. Computer Aided Engineering iii. Computer Aided Manufacturing 3. List two ways in which computers can be helpful for the following persons: i. A medical doctor ii. A teacher iii. A movie director A. i. to store patient records, to diagnose diseases ii. to research on a topic, as a visual aid, iii. to store movie scripts, to communicate with other directors

4. List two main duties of the following computer professionals: i. A database administrator ii. A system analyst iii. A computer technician A. i. Determine and allocate the database to different users; set up queries/searches ii. Suggest the most suitable computer systems for the organisation; prepare system documentation iii. Carry out day-to-day maintenance tasks; install new hardware/software 5. Robots are used by many industries due to their many advantages. a. List two industries in which robots are commonly used. b. State two advantages of using robots over manual methods in industries. c. Give one disadvantage of using robots rather than manual methods in industries. A. a. Car manufacturing industries and chemical industries. b. They are faster than manual methods; they can do repetitive tasks without any tiredness. c. They do not have common sense, so if there is an error in the instructions given robots will do it repeatedly.

Anda mungkin juga menyukai