Search Header Logo
Cambridge Nationals in IT

Cambridge Nationals in IT

Assessment

Presentation

Computers

10th - 11th Grade

Practice Problem

Hard

Created by

Patricia Mogio

Used 4+ times

FREE Resource

18 Slides • 35 Questions

1

Cambridge Nationals in IT

ON YOUR MARKS, GET SET…

Slide image

2

Multiple Choice

The Phases of the project life cycle are...

1

Initiation, planning, evaluation and review

2

Initiation, planning, execution and evaluation

3

Multiple Choice

WHAT IS PROJECT MANAGEMENT?

1

a. Project management is a structure used to plan and manage the tasks required to achieve a goal and meet specific success criteria.

2

b. Project management is a job. Many industries employ project managers to implement new initiatives and ideas into their usual business practices.

3

c. Both (a and b) are correct

4

d. Both (a and b) are wrong

4

Multiple Choice

What is the Project Life Cycle?

1

The project life cycle is a term used to describe the different phases or stages of a project.

The project life cycle is the name we give to describe what needs to be done and how to do it.


The project life cycle contains four phases:

a. Project initiation

b. Project planning

c. Project execution

d. Project evaluation

2

The project life cycle is a term used to describe the different phases or stages of a project.

The project life cycle is the name we give to describe what needs to be done and how to do it.


The project life cycle contains four phases:

a. Project initiation

b. Project planning

c. Project iteration

d. Project testing

5

Multiple Choice

What are the tasks of the Project Life Cycle - initiation phase?

1

Define or say exactly what the project is about.

2

Make a detailed plan of what needs to be done, when it is going to happen and when it is to be completed. (This is like setting out a road map for where you are going and how you are going to get there.)

3

Produce what you have set out to do and control the project so that it is completed on time and includes everything that you have set out to do, thinking about any risks and issues.

4

Involves closing the project by thinking about what you have done well and what you could have done to improve what you set out to do.

6

Multiple Choice

What are the tasks of the Project Life Cycle - planning phase?

1

Define or say exactly what the project is about.

2

Make a detailed plan of what needs to be done, when it is going to happen and when it is to be completed. (This is like setting out a road map for where you are going and how you are going to get there.)

3

Produce what you have set out to do and control the project so that it is completed on time and includes everything that you have set out to do, thinking about any risks and issues.

4

Involves closing the project by thinking about what you have done well and what you could have done to improve what you set out to do.

7

Multiple Choice

What are the tasks of the Project Life Cycle - execution phase?

1

Involves closing the project by thinking about what you have done well and what you could have done to improve what you set out to do.

2

Make a detailed plan of what needs to be done, when it is going to happen and when it is to be completed. (This is like setting out a road map for where you are going and how you are going to get there.)

3

Define or say exactly what the project is about.

4

Produce what you have set out to do and control the project so that it is completed on time and includes everything that you have set out to do, thinking about any risks and issues.

8

Multiple Choice

What are the tasks of the Project Life Cycle - evaluation phase?

1

Define or say exactly what the project is about.

2

Produce what you have set out to do and control the project so that it is completed on time and includes everything that you have set out to do, thinking about any risks and issues.

3

Involves closing the project by thinking about what you have done well and what you could have done to improve what you set out to do.

4

Make a detailed plan of what needs to be done, when it is going to happen and when it is to be completed. (This is like setting out a road map for where you are going and how you are going to get there.)

9

Multiple Select

Successful projects do not compromise on the following: (select all appropriate)

1

Time

2

Quality

3

Strawberry Shortcake

4

Cost

10

Multiple Choice

If you follow the project life cycle... you will not finish the project. True or False?

1

True

2

False

11

Multiple Choice

If you follow the project life cycle... You decide exactly what needs to be done and how it can be done. True or False?

1

True

2

False

12

Multiple Choice

If you follow the project life cycle... You need to think about what could go wrong when trying to achieve your tasks. True or False?

1

True

2

False

13

Multiple Choice

Closing the project is to do with executing it. True or False?

1

True

2

False

14

Multiple Choice

if you follow the project life cycle... You need to decide how your project will be successful. True or False?

1

True

2

False

15

Multiple Select

The Initial project considerations are:

(select all appropriate)

1

SMART goals

2

User Requirements

3

Success Criteria

4

Constraints/Limitations

16

Multiple Choice

A SMART target is a method used for writing down a goal or target. When you write a goal or target, it needs to be written in enough detail so you know exactly what you have to do and how you can prove that you have met the goal. The word SMART is an acronym that can help you define and write down the goal you are aiming for.

What do the initials “SMART” stand for?

1

S…specific

M…measurable

A …achievable

R …rewarding

T …target

2

S…secret

M…measurable

A …achievable

R …renewable

T …time

3

S…specific

M…measurable

A …achievable

R …realistic

T …time

4

S…specific

M…measurable

A …amusing

R …realistic

T …time

17

EXAMPLE Smart Target:

Going on a diet

S- I want to lose body weight.

M - I want to lose 2 stone (12 kg) in body weight.

A - I want to lose 2 stone (12 kg) in body weight over the next 8 weeks.

R - I want to lose 2 stone (12 kg) in body weight over the next 8 weeks by following a healthy eating plan, reducing my sugar intake and doing exercise.

T - I want to lose 2 stone (12 kg) in body weight over the next 8 weeks by following a healthy eating plan, reducing my sugar intake and doing 30 minutes of brisk walking every day.

18

User Requirements

- Identifying what the user wants out of a computer system is necessary for making a project successful. Here is what you need to know:

- What do you want the system to do?

- What kind of data or information will be processed?

- Is it possible to get the system to do what you want it to do?

- How it will be done?

- Will its design help the user to use the system?

- Can you achieve what you want the system to do in the time you have available?

- Will you have to compromise on the solution you have created to make sure that all the things you want the system to do can be achieved?  

19

Multiple Choice

User requirements consist of

1

Identifying what the user wants out of a computer system to make the project successful.

2

Creating a list with the names of Care Bears and making sure you mention them in your next meeting with your client

20

Success Criteria

- Success criteria are basically the requirements that you will use to judge your project against.

- You should be able to look over the list of criteria and say whether things have been completed to the standard that you set out at the beginning of the project.

- If a project does not have detailed enough success criteria, it is likely to fail. 

21

Multiple Select

Success Criteria (Select all appropiate)

1

- Success criteria are basically the requirements that you will use to judge your project against.

2

Noboday knows what is "Avatar: The Last Airbender", but distractions like this one will not help when doing your exam

3

- You should be able to look over the list of criteria and say whether things have been completed to the standard that you set out at the beginning of the project.

4

- If a project does not have detailed enough failure criteria, it is likely to fail.

22

Constraints and limitations

-Every project will have some form of limitations. 

-These limitations are constraints that restrict the project in some way – we call this the project scope.

-The scope is the limits the project can achieve within its constraints. 


For example:

1. time

2. resources

3. regulations

4. security/risk management

5.  mitigation of risks

23

Multiple Choice

Another word for limitations in a project is...

1

Constrants

2

Constraints

3

Contrainsts

24

1.1  The interaction and iteration between the phases of the project life cycle 


Slide image

25

The inputs and outputs of each phase of the project life cycle

Slide image

26

Multiple Choice

Reviewing the work that you have done well, and saying how it could be improved, is called

1

Phase review

2

Test review

27

Multiple Choice

What are the Software types used to develop project plans:

1

a. project management software

2

b. spreadsheets

3

c. word processors

4

d. Desktop Publishing (DTP)

5

All are correct

28

Multiple Choice

Select the correct answer:

Data...

1

Data has meaning​

2

Data is raw facts and figures before they have been processed

3

Data cannot be made up of letters, numbers, symbols, graphics and sound

29

Data Types (what is the appropriateness of the use of these in a given context?)

  • Text

  • Alphanumeric​

  • Numeric (integer, real, currency,

    percentage, fraction, decimal)​

  • Date/time​

  • Limited choice (drop-down lists, radio

    buttons, tick lists)​

  • Object​ (graph)

  • Logical/Boolean (yes/no, true/false)

30

Multiple Choice

Information is made by taking data and processing it - what is the formula of Information?

1

data + [size] + [context] = Information

2

data + [structure] + [context] = Information

3

data + [structure] + [character] = Information

31

how data and information are related: 


·        

data must be processed to become information

·        

information is in context whilst data has no

context

·        

information is data which has been coded,

structured and has context

32

Methods to collect and store: (explain advantages and disadvantages!)

- questionnaires/surveys - online & hard copy

- email    

- sensors

- interviews   

- consumer panels

- loyalty schemes

- statistical reports (e.g. Government

- departments)

- secondary research methods (e.g. search

engines)

33

Information Technology used to support data collection (explain the appropriateness of the use of these in context!)

  • Barcode Readers

  • QR (Quick Response) Codes

  • Web Surveys

  • Wearable Tech

  • Mobile Technology

34

Different storage methods and the appropriateness of the use of these in context:

-The Cloud & Physical Devices

Slide image

35

Multiple Select

Select all that apply to Big Data:

1

It is a Small amount of data which can potentially be mined for information.

2

Information gained by use of loyalty cards is an example.

3

Past shopping patterns are used to predict future shopping.

4

Sets of big data are used to show patterns not otherwise seen such as hidden correlations in market trends and customer preferences.

36

The benefits of the use of data:

-Quickly develop effective business strategies

-Improved profits

-Improved customer service

-Higher quality healthcare through early intervention

-Fraud detection

If there are no errors in the data, there

can be a huge positive impact

37

Drawbacks of the use of data

-Needs sophisticated analysis

-Data privacy

-Undermine e.g. Doctors

-If there are errors in the data, it could have a huge negative impact on any sector

38

Fill in the Blank

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. (Write it all in lowercase)

39

Fill in the Blank

Automatically shows adverts, such as pop ups.

(Write it all in lowercase)

40

Fill in the Blank

Takes control of a computer system without the user’s knowledge

(write it all in lowercase)

41

Fill in the Blank

The result of human error when coding software.

(write it all in lowercase)

42

Fill in the Blank

Restricts user access to a computer by encrypting files or locking down the computer. User has to pay for restriction to be lifted.

(write it all in lowercase)

43

Fill in the Blank

Allows a user to remotely access files, access/steal data and modify software.

(write it all in lowercase)

44

Fill in the Blank

Usually hidden from the user and can be difficult to detect. Often used to monitor users. I.e.: keylogger

(write it all in lowercase)

45

Fill in the Blank

A disguised program that looks legitimate and is designed to give full control on an infected PC to another PC. Used to steal information or harm a computer.

(write it all in lowercase)

46

Fill in the Blank

Replicates itself and spreads from computer

to computer. Can infect files on a network. Often attached to files or

emails.

(write it all in lowercase)

47

Fill in the Blank

A program which replicates itself to spread to other computers but does not attach itself to existing programs.

(write it all in lowercase)

48

Fill in the Blank

It is the art of manipulating people so they give up confidential information.

49

Hacking means finding weaknessess in a established system and exploiting them, for example, to gain unathorised access. A hacker may be motivated by a multiple of reasons, such as profit, protest or challenge.

50

white hat hacking 

White hat hacking is when a hacker is given permission to hack into systems to identify any loopholes or vulnerabilities. As this type of hacking is done with the permission of the computer system owner, it does not break any of the legislation that relates to hacking. White hat hackers are motivated to keep the system as safe as possible from malicious hacking attemps.

51

 black hat hacking 

However, black hat hacking is when a hacker hacks into a computer system with malicious intent. This intent can include theft, exploiting the data stolen or seen, and selling the data on. Black hat hackers carry out illegal hacking activities and can be prosecuted under UK IT legislation.

52

Multiple Choice

What is grey hat hacking ?

1

hacking into systems paid by your company

2

hacking into systems for ‘fun’ or to ‘troll’

3

hacking into systems to steal data with malicious intent

53

The vulnerabilities that can be exploited in a cyber-security attack - There are 3 main vulnerabilities that can be exploited in a cyber-security attack, they are:

1. environmental - natural disasters

2. physical - theft of identity, theft of property

3. system - insecure software applications, weak passwords, insecure modems

Cambridge Nationals in IT

ON YOUR MARKS, GET SET…

Slide image

Show answer

Auto Play

Slide 1 / 53

SLIDE