3 3 Tick (✓) the most appropriate storage medium that should be used in each scenario. Magnetic tape RAM ROM Scenario (✓) (✓) (✓) To store the current instructions in use by a computer To back up data from a school network server To store data temporarily To store the start-up instructions of a computer [4] 4 Complete the sentences below using the most appropriate word from the list. cookies hacking pharming phishing smishing spam spyware virus (a) The act of gaining unauthorised access to a computer system is called ........................................................................................................................................... [1] (b) The software that gathers data by monitoring key presses on a user’s keyboard is called ........................................................................................................................................... [1] (c) A fake text message, that could contain a link, sent to a mobile phone is called ........................................................................................................................................... [1] © UCLES 2021 06_0417_12_2021_1.2 [Turn over
4 5 Petr has set up a database for a science project on planets in the solar system. Part of the database is shown. ID Name_of_planet Number_of_moons Orbital_period Rings Gravity Type_of_planet First_observed 4 Mars 2 1.88 N 0.38 Regular 1610 5 Ceres 0 4.61 N 0.27 Dwarf 1801 7 Saturn 62 29 Y 1.16 Gas Giant 1610 9 Neptune 14 165 Y 1.21 Gas Giant 1846 10 Pluto 5 248 N 0.62 Dwarf 1930 11 Haumea 1 309 N 0.401 Dwarf 2004 (a) When Petr was designing his database, he had to set the data types for each field. Complete the design table below by filling in the data types for each named field. Use the most appropriate data type. Each data type must be different. For any numeric field, specify the type of number. Field name Data type Number_of_moons Orbital_period Rings Name_of_planet [4] © UCLES 2021 06_0417_12_2021_1.2
7 7 The owner of Tawara Hotels is planning a new computerised booking system. There are ten Tawara Hotels throughout the world. The current booking system allows people to book rooms in any of the Tawara Hotels. He has employed a systems analyst to research the current system and then install the new system. (a) When analysing the current booking system, the systems analyst must identify the user requirements. Explain why it is important for the systems analyst to do this. ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... ........................................................................................................................................... [3] (b) Tick (✓) the relevant stage of the systems life cycle for each of the following activities. Development Activity Analysis and testing Evaluation (✓) (✓) (✓) Identifying the problems with the current system Comparing the solution with the original task requirements Create the file structure Identify limitations to the new system and improvements to be made [4] © UCLES 2021 06_0417_12_2021_1.2 [Turn over