OCR Unit 1 Fundamentals of IT 14 May 2018
starstarstarstarstarstarstarstarstarstar
by Level 3 Unit 2
| 39 Questions
1
1
Which of the following types of server would be used to run a virtual machine?
A Mail
B Web
C File/Print
D Hypervisor

2
1
Which of the following is an example of storage virtualisation?
A Storing audio files on a mobile device
B Storing server back-ups on a removable drive.
C Storing a word processed document on a laptop desktop.
D Storing a movie on a drive from multiple network storage devices
3
1
Which of the following is a characteristic of a peer to peer network?
A Centralised data accounts.
B All data traffic flows through a central server
C Resources can be shared without a dedicated server.
D Data flow through the network is controlled by a token allocated by the server.
Fig 1 shows a diagram of a computer network
4
1
Which network topology is represented in Fig. 1?
A Bus
B Star
C Ring
D Mesh
5
1
What is meant by the term ‘Metropolitan Area Network’ (MAN)?
A A network based in a school
B A city-wide network of computers.
C A network spanning two countries
D A network of hypervisor enabled machines.
6
1
Which of the following is an example of a WAN connectivity method?
A Data
B ISDN
C HTTP
D SATA
7
1
Which of the following is not a suitable use of a blog by a business?
A To launch a new product.
B To request feedback on a product
C To share new developments with staff
D To inform staff that they have been made redundant.
8
1
Which of the following is considered to be a personal attribute for a successful network manager?
A Being self-taught.
B Requiring supervision.
C Ability to work independently.
D Being a member of a professional body
9
1
Why could two staff members of an organisation have different expected standards of dress code at work?
A The staff members job-share
B The staff members are different ages.
C The staff members perform different job roles.
D Staff members are at different stages of their career.
10
1
Which of the following is not a purpose of a professional body?
A To share best practice.
B To organise industrial action.
C To act as a means of entry into the profession.
D To support the learning that underpins the professional body
11
1
Which of the following is an example of staying safe online?
A Switching off the firewall.
B Regularly changing passwords.
C Providing personal details for public access.
D Updating anti-virus software on an annual basis.
12
1
Which of the following is not an example of disaster planning?
A Backing up the main server to the Cloud.
B Having two mirrored folders on separate servers
C Keeping a back-up copy of an organisation’s website.
D Using an external hard drive as the sole storage area.
13
1
Which of the following is an attempt to gain information by listening to communication traffic?
A Phishing
B Data theft
C Eavesdropping
D Social engineering
14
1
Which of the following is an example of digital security?
A Biometrics
B Electromagnetic wipe
C Permissions
D Tokens
15
1
Which of the following describes why usernames must be used with a password for improved security?
A Usernames should combine numbers, letters and symbols
B Usernames and passwords are changed every time you log on
C Username and password combinations being guessed is a low risk.
D Usernames are not unique, so offer high security levels on their own.
Answer all the questions.

AMEC Leisure runs leisure centres throughout the country providing a variety of facilities. It has a website where customers can register to use a fitness gym’s facilities and create a personal profile to store training programs and track their progress. Customers can also link their social media accounts to their profile to share their training information with friends.

The leisure centres feature the latest fitness technology including ‘connected’ fitness equipment that automatically uploads workout information to the customer’s personal profile.

AMEC Leisure’s IT staff are responsible for the maintenance of the ‘connected’ fitness equipment as well as the company’s computer systems.
16
4
16 Staff at AMEC Leisure must read and sign the company’s Code of Conduct. Explain two reasons why staff must agree to the AMEC Leisure Code of Conduct.

17 When maintaining the ‘connected’ fitness equipment, IT staff use a set of Standard Operating Procedures (SOP).
17
10
(a) Explain why IT staff use SOP to maintain the ‘connected’ fitness equipment.

The ‘connected’ fitness equipment features a hexadecimal error display. The code on the display identifies the error with the ‘connected’ gym equipment.

When updating the equipment’s user manual, the engineer mistakenly used a decimal value instead of hexadecimal.
18
3
(b) Convert the decimal number 244 to hexadecimal. You must show your workings .

19
3
(c)Each piece of ‘connected’ fitness equipment has 128 mebibytes of storage.

Describe the difference between a mebibyte and a megabyte and explain why mebibytes are used.

20
10
(d) Discuss the use of wireless technologies for uploading data to and from the ‘connected’ fitness equipment.

18 Staff at AMEC Leisure have received a customer complaint via one of its social media channels.
21
1
(a) Identify one social media channel that could be used by AMEC Leisure.
(b) Explain two barriers to communication that could be encountered when receiving a complaint via social media.
22
3
1
23
3
2
19 Before disposing of computer equipment, AMEC Leisure must ensure it has removed all data.
24
1
(a) (i) Identify one method that could be used to remove data from equipment before disposal.
(ii) Explain two advantages and one disadvantage of the method you have chosen.
25
2
Advantage 1
26
2
Advantage 2
27
1
Disadvantage
20 Each staff member at AMEC Leisure has a tablet computer with a bespoke operating system.
28
2
(a) Explain one benefit to AMEC Leisure of using a bespoke operating system
(b) Describe three functions that a tablet computer’s operating system will perform.
29
2
1
30
2
2
31
1
3
(c) Describe two troubleshooting tools that could be used to investigate faults with the tablet computers.
32
2
1
33
2
2
(d) The tablet computers are connected to a network using the TCP/IP protocol. The addressing information must be configured manually.

Identify three pieces of information that must be configured to allow the tablet computer to access a web site on the internet.
34
1
1
35
1
2
36
1
3
37
2
(e) Explain one benefit of not using automated methods to configure the addressing information.
(f) Data on the tablet computers must be protected from accidental deletion.
38
2
Identify and describe one type of utility software that can be used for this purpose.
39
1
(g) Identify and describe one other type of utility software that can be used to improve the performance of the tablet computer.

END OF QUESTION PAPER

Add to my formatives list

Formative uses cookies to allow us to better understand how the site is used. By continuing to use this site, you consent to the Terms of Service and Privacy Policy.