Você está na página 1de 38

B061 Exam 21st May 2015

B063 Exam 13th May 2015

GCSE
ICT
Revision

REVISION

B061
&
Booklet 2011
B063

Student Name:

.
Candidate number:
..
GCSE ICT Teacher:Mrs Bolton..
..
1

CONT
Topic
ENTS:
Theory Topics to be revised at

Page Number
Next couple of pages

home
Legal Aspects of ICT
ICT Systems
Computer Systems
Hardware and Software
Data Storage
New & Emerging Technologies
Spreadsheets
Databases
Internet and Email
Measurement and Control
Computer Crime
Networks
Essay Style Questions
Glossary of key exam terms
B061 January 2011 Paper
B061 January 2011 Mark Scheme
B061 January June 2011 Paper
B061 June 2011 Mark Scheme
B061 January 2012 Paper
B061 January 2012 Mark Scheme
B063 OCER Theatre pre-release
2015
B063 Pre-release practice
questions

6
7
8
10
11
12
13
15
16
18
19
20
21-23
24
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix

1
2
3
4
5
6
7

Appendix 8

Revision Tips.
Revision space: Find a good place to work. It should be
quiet and uncluttered.
Revision timetable: Draw up a revision timetable - it's
crucial. It should start early, be realistic, cover all subjects
and allow you time off to relax.
Make notes: Don't just read through your class work,
make notes. Try to condense your notes so they fit on the
back of a postcard / post-it.
Questions and answers: Write out some questions and
answers to see how much you're actually remembering.
Listen in: Read your notes onto a cassette and then play
them walking down the street or whilst you're in bed.
Prompts: Put key words and phrases on sticky notes
around the house, so you'll see them often.
Seek help!: Don't go it alone. Get friends and family on board to help you
2

revise.
Past papers: Have a go at them, then use the mark scheme to mark them and
see how you did.
Relax: If you panic you're lost! The exams are going to happen so you might as
well give yourself the best chance of doing well by starting to revise early and
keeping calm.
2.1.1 ICT Systems
Systems

Done

The main components of a computer system: Central Processing Unit (CPU),


internal/main memory, backing storage, input and output devices and power
supplies
A range of common applications where microprocessor technology is used:
personal computers, mainframe computers, super computers and embedded
systems
The difference between hardware and software
Hardware

Input devices and their use: keyboards, mice, joystick, tracker ball, touch pad,
microphones, remote controls, scanners, digital cameras, webcams, touch
screens, readers for bar codes, magnetic strips and chip and pin, sensors,
Output devices and their use: monitors, printers, speakers, headphones,
digital projectors, plotters.
Storage devices and their appropriate use: hard disks, optical storage devices,
magnetic tape, drives, flash memory devices
Communication devices and their appropriate use: modems, routers, hubs,
network interface cards in fixed and mobile systems
The ads and disads of a variety of input, output, storage and communication
devices
User interfaces: human-machine, graphical (GUI), command line, & direct
neural.
Software

Systems software: operating systems, utility software, drivers


Applications software: word processors, desktop publishing software,
spreadsheets, database management software, multi-media software,
slideshow software, web authoring software, photo-editing software, videoediting software, graphics manipulation software, communications software
(e.g. social networking software, chat, instant messaging, web browsers, file
transfer and email clients), presentation software, gaming software
Programming software: compilers, debuggers, interpreters, links, editors
The advantages and disadvantages of different software applications
The different file types used: image, audio, video, document and executable
(.exe)
2.1.2 Exchanging Information
Communications

Communication services: voice telephone, SMS (text messages), instant


messaging, fax, email, chat rooms, forums, bulletin boards, Voice-over-IP
(VoIP), video conferencing, ads and disads of using different methods of
3

communication
Sharing, exchanging and managing information: sharing files (file naming
conventions and online safety version control), the secure transfer of data and
secure access (read/write permissions);
The safe and responsible use of communication services: showing respect
towards others, complying with data protection regulations, staying safe
(disclosure of personal data, using appropriate language, misuse of images)
Communications software: web browsers, email software, messaging and file
transfer
The use of the internet: communication, commerce, leisure and information
retrieval
Controlling ICT systems remotely: remote controls, remote access to
computer systems
Monitoring and tracking systems: worker monitoring/logging, cookies, key
logging, worker call monitoring/recording, electronic consumer surveillance,
mobile phone triangulation, automotive number plate recognition, CCTV
cameras
Emerging technologies: wireless communication, WiFi, mobile technologies,
Bluetooth technology, Geographic Information Systems (GIS), and other
emerging connection/communication technologies
2.1.3 Presenting Information

Types and purposes of different ways of presenting information: word


processing and desktop publishing software (DTP), slideshow, multimedia and
web authoring software
The use of ICT tools and features/facilities for presenting information with
regard to efficiency and quality of work, ease of transfer, training needed.
Integration between and within software applications: e.g. integrating sections
from one application to another, charts, tables, original graphics into word
processing files
2.1.4 Manipulating Data
Data Management

Different data types: alphanumeric, text, numeric (integer, currency,


percentages, number of decimal places and fractions), date/time, limited
choice (drop down list, radio buttons, tick lists), object, logical/Boolean
(Yes/No, Male/Female) types
The main issues governing the design of file structures: folders, subfolders,
filenames, file types, paths, how encoding affects data entry and retrieval
The main issues around data capture methods ads and disads of using
different data capture and collection methods: forms questionnaires, online
forms, chip and PIN, OMR, barcode reader, voice recognition, biometrics and
RFID tags
Validation: range checks, type checks, format checks, presence checks, check
digits, parity checks
Verification: batch totals, hash totals, double keying, double entry
Data Handling Software

The features of spreadsheet software: cells, cell references, rows, columns


(and their height and width), show row/column labels, enter and edit cell
content, key fields, cell gridlines, cell ranges, replication, formatting, merging
cells, formulae, automatic recalculation, sorting rows/columns, graph/chart,
4

displaying numerical information (bar chart, pie chart, line graph and the use
of scales, a title, axis title and key/legend), layout of worksheets and linked
worksheets.
The features of modelling software: how a data model may be used to answer
what if questions and the benefit of being able to answer such questions
using a data model
The features of database software: field (column) and record (row), field
names, key field (unique), primary key, file; create a database, insert/delete
field/record, enter and edit field contents, organise and select records, view
database structure, control the content of reports by selection of fields and use
of headings, control the format of reports (header and footer), creating and
development of charts/graphs
Typical tasks for which data handling software can be used: organising &
collecting data, amending existing data, deleting redundant data,
select/search/filter records, sort on one or more fields (ascending /
descending), merging data & report production.
Data modelling: what if questions, formulae, functions, variables, modelling
different scenarios, verification of results (accuracy and plausibility)
The use of relational databases and spreadsheets: flatfile vs relational
databases
Emerging data handling applications: models for financial forecasting,
queuing, weather forecasting, flight simulators, expert systems for decision
making.
2.1.5 Keeping data safe and secure

Backups and archiving: taking backups of data/programs, keeping


information/archives safe, use of backing storage media
Secure and safe practices in the use of ICT: protecting data from accidental
destruction, protecting data from deliberate damage
Appropriate User Security methods and devices: user IDs, password,
encryption, restricted physical access (e.g. biometric scans, electronic
passes), restricted access to data (e.g. access rights, encryption), monitoring
(e.g. transaction logs)
Malicious software and the damage it can cause: viruses, key logging & other
malware
Procedures to minimise risks of damage caused by malicious software: antivirus software, firewalls, malware detection
How to avoid the loss/disclosure of personal data to unauthorised users
What is meant by data encryption and when and why it is used
2.1.6 Legal, Social, Ethical and Environmental issues when using ICT

The main aspects of legislation relating to the use of ICT: computer misuse,
the Data Protection Act, copyright design and patents act as it applies to the
use of ICT
The potential health and safety problems related to prolonged use of ICT
systems: stress, eye, wrist, back and neck problems, Repetitive Strain Injury
(RSI),
The need for good design of user interfaces and their impact on the health of
users
How ICT systems can affect the quality of life experienced by persons with
disabilities: screen filters, voice recognition software, text to voice software,
customised desktop environments, Braille keyboards, specialist input devices,
communication and control device, software accessibility options
5

Safety issues related to using computers and measures for prevention of


accidents: taking breaks, appropriate lighting, eye tests, wrists rests and other
support devices, adjustable seating, monitor positioning, avoiding hazards,
electrical safety measures
The environmental impact of digital devices: their use, deployment and
eventual recycling and disposal
The social and ethical implications of the electronic transmission of personal
information: monitoring/detecting loss or corruption of information, preventing
the abuse of personal information, the purpose and costing of national
databases, security of public data, links between public and private databases,
national identity cards, CCTV, government access to personal data, the
surveillance society
2.1.7 Using ICT Systems
How ICT systems are used

The correct procedures to start, access, exit and shutdown ICT systems
The selection and appropriate adjustment of system settings and user
preferences
The selection and use of features of user interfaces
The management of folder structures and files to ensure the safe storage and
retrieval of information
The main types of network, the components and ads and disads of networked
systems
Troubleshooting

Common problems encountered when using ICT systems: software freeze,


error dialogues, storage full, paper jams, hardware malfunction
Troubleshooting activities: hardware troubleshooting, software troubleshooting
The difference between hardware and software problems, and how these can
be solved
2.1.8 Monitoring, measurement and control technology

The different types of sensor and their suitable uses: sensors and actuators
for visible, tactile, audible and other physical signals
The advantages and disadvantages of computerised data logging
Writing a sequence of instructions to control a screen or external device, light
buzzers, sound or turtle, using repeated instructions, procedures and variables
The use of ICT to control and monitor areas of everyday living: applications
that utilise data logging and control, analogue-digital conversion, control and
feedback loops and the associated hardware and software
2.1.9 ICT and modern living

How ICT systems have changed the way people live & work: communication,
shopping, gaming, entertainment, education and training, banking and
financial services, social networking, online/remote working, the ads and
disads.
The impact of emerging technologies on organisations: artificial intelligence,
robotics, biometrics, vision enhancement, computer-assisted translation,
quantum cryptography, 3D and holographic imaging, 3D printing, virtual reality

The Legal
For your GCSE ICT Exam you will need to revise the following three pieces
Framework
of legislation
which are connected with using computers. Read pages 84
& 85 of the revision guide and then answer the following questions on:

Data Protection Act


Computer Misuse Act
Health and Safety Act

Answer the following questions to help you revise:

Data Protection Act first


1. What is the purpose of the Data Protection Act?
2. What is a person who has personal data about them stored called?
3. How many principles does the Data Protection Act have?
4. List 3 of the principles of the Data Protection Act
5. What is the name of the person within an organisation who collects data
about people?

Computer Misuse Act.


1. What is gaining unauthorised access to a computer also known as?
2. What is the name of the law that makes hacking illegal?
3. Which of the following is NOT an offence under the Computer Misuse Act?
a. Unauthorised access to someone elses files
b. Unauthorised access to someone elses files with intent to commit
further criminal offences
c. Copying software and trying to sell it to someone for a profit

Health & Safety Act.


1. Name 3 health problems that can be a result of using a computer and
prevention for each.
Health Problem 1:

..
Prevention:

..

Health Problem 2:

..
Prevention:

..
Health Problem 3:

..
Prevention:

..
Read pages 8, 10, 13, 14 & 15 of the revision guide, then answer the following
questions:

ICT
Systems

1. Which of the following devices stores data using magnetic technology?


A A memory stick
C A CD-Rom

B A hard disk
D RAM

2. Give 2 input and 2 output devices that might be used in a school. For
each, give a possible use.
Input Device 1
Use
Input Device 2
Use
Output Device 1
Use
Output Device 2
Use
3. Give 2 advantages and 1 disadvantage of a Memory stick and a hard
disc?
Memory Stick Advantage 1
Memory Stick Advantage 2
Memory Stick Disadvantage
Hard Disc Advantage 1
Hard Disc Advantage 2

Hard Disc Disadvantage


4. Chose 1 automated Data input device and describe it below, including an
example of where it might be used.
5. Give 2 types of storage and an example of where each might be used.
Storage device 1
Use
Storage Device 2
Use

Comput
er
Read pages 4, 5, 6 & 7 of the revision guide, then answer the following
questions:
1. What is an embedded computer / embedded system?
2. Explain the difference between hardware and software:
3. What is the difference between RAM and ROM?
4. Give two features of a laptop:
Feature 1
Feature 2
5. What type of memory loses its data when the computer is switched off?
6. Where are calculations carried out in a computer?
7. Give one advantage and one disadvantage of using a netbook on the
move:
Advantage
Disadvantage
6. When an old ICT system needs replacing, what should be done first
before a new system in developed?
a. System analysis
b. Systems investigation
c. Systems development
7. Which of these is in the correct order when developing a new system:
a. Evaluation, analysis, design, implementation
b. Analysis, design, implementation, evaluation
c. Implementation, analysis, design evaluation
8. What document is produced to identify whether the project is technically
possible and worth the cost of development?
9

9. Which diagram would be used to show the flow of data around the new
system?
10.What needs to take place to determine whether a new system works
properly?

10

Hardware &
Software
Review your Software use
PowerPoint and notes on
hardware then answer the following questions:

1. What is the most suitable input device for writing a


short report?
2. What is the most suitable input device for
highlighting and selecting objects on screen?
3. What sort of printer would an architect most likely use to print out large
plans of house?
4. What input device would you use to digitise a photograph?
5. What does MICR and OMR stand for?
6. Where could MICR and OMR be used?
7. What is the purpose of the operating system?
8. Give two examples of utility software.
9. Give 3 examples of application software.
10.What piece of software is suitable for editing large amounts of text in a
report?
11.What piece of software is suitable for using templates for business cards
and flyers?
12.Name 3 standard features of a word processor
13.If you wanted to insert addresses to lots of customers into a letter, what
feature could you use in a word processor rather than writing out the letter
over and over again?
14.What type of image is made up of lines, coordinates and shapes?
15.What type of image is made up of pixels?
16.What does CAD stand for?

11

17.List as many input and output devices into the Venn diagram below:

Both

Inpu
t

Outpu
t

12

Data
Read pages 12, 13, 14 & 15 in the revision guide, then answer the following
Storage
questions:
1. Which of the following retains its data even after the computer has

been switched off?


a. ROM
b. REM
c. RAM
2. What does RAM stand for?
3. What is a computers main internal storage device?
4. How best is a computers hard disk measured?
a. Kilobytes
b. Megabytes
c. Gigabytes
5. What type of storage device would be the most suitable to transfer

work from school to home justify your answer


6. Which of the following shows the correct order of storage size,

starting with the smallest


a. Floppy disk, CD-Rom, DVD
b. CD-Rom, DVD, floppy disk
c. Floppy disk, DVD, CD-Rom
7. Which storage device would be most suitable for backing up the

schools server overnight?


8. Which storage device would be most suitable for storing your

Operating system and application software on?


9. What type of media is a hard disk
a. Optical
b. Magnetic
c. Solid state

13

New and Emerging


Research the Internet for new and emerging technologies (try www.teachTechnologies
ict.com) and make sure you
find and read about at least 3 new technologies.
Then answer the following questions:
1. Name 3 new and emerging technologies that could have an impact
on a school:
Technology 1:
Benefit:
Technology 2:
Benefit:
Technology 2
Benefit:
2. Discuss how the use of new and emerging technologies has had a
an impact on medicine [8 marks] (use the Essay style question
tips on Page 20)
3. Discuss how the use of new and emerging technologies has had an
impact on how people are surveyed [8 marks] (use the Essay
style question tips on Page 20)
New and emerging
technologies:

14

3d printing
3d projectors
Augmented reality
Cybernetics / smart
implants
Virtual reality
Robot teachers / workers
/ surgeons
Biometrics
Nanotechnology
Space tourism / space
planes

Spreadsh
eets
Read pages 50-53 in the revision guide then answer the following
questions:

1. What symbol does a formula begin with?


2. What is the multiply sign used in a spreadsheet formula?
3. What does a formula do in a spreadsheet?
4. Give one advantage of using formula in a spreadsheet.
5. What is the name of where a row and column meet in a worksheet?
6. What is a variable?
7. Name 3 features of a spreadsheet Model
8. What is the difference between a FUNCTION and a FORMULA?
9. What is a relative cell reference in a spreadsheet?
10.

What is an absolute cell reference in a spreadsheet?

11.
Give two examples of functions that can be used in a
spreadsheet
12.
What is validation? Can you give an example of where and
why it might be used.
13.

Give an example of spreadsheet software.

15

LABEL THE SPREADSHEET:


BOLD

underlin
e

Formula
bar

Cell
referenc
e

row

16

Active
cell

Worksh
eet tab

column

Databa
ses
Read pages 56-60 of the revision guide and then answer the following
questions:

1. What is the name of the database in which ALL the data is stored in a
SINGLE table?
2. What is a database with multiple tables linked together known as?
3. What is a data capture form specifically designed to collect?
4. Which of the following queries would find all animals that are dogs and
10 yrs or older?
[animal] = dog OR [age] >10
[animal] = dog AND [age] >10
[animal] = dog AND [age] >= 10
5. Which of the following queries would find all Jaguar cars costing over
10,000?
[make] = Jaguar AND [price] >10,000
[make] = Jaguar AND [price] >=10,000
[make] = Jaguar OR [price] >10,000
6. Give 2 advantages of storing data in a computer database:
7. What is the purpose of the primary key?
8. Name 3 features of database software.
9. What type of validation checks that a field cannot be left blank?
10. What type of validation would be suitable for a postcode field?
11. What is the purpose of verification?
12. What is the name of when a computer checks the data entered is
reasonable and sensible?
13. Why would a form be used in a database?
14. Give one advantage and one disadvantage of a form.
15. Why would a query be used in a database?

17

LABEL THE DATABASE:


Table

Field

Record

Tick box

Drop down /
look up list

LABEL THE QUERY:


criteria

Field name

Hair field

18

Alternative
criteria

Query in
design view

Internet and
Read pages 74-77 and page 80
of the revision guide before answering the
email
following questions:

1. What piece of software do you need to view web pages?


2. What language are web pages written in?
3. What does HTML stand for?
4. What does WYSIWYG stand for?
5. What does ISP stand for and what is its purpose?
6. What does URL stand for?
7. Name 3 different search engines
8. List 3 advantages of using email:
Advantage 1:
Advantage 2:
Advantage 3:
9. Which of the following is NOT an example of a valid email address:
a. John@ixp/com
b. John.ixp@com
c. john@ixp.com
10.
What is an email known as that tries to trick the receiver in
providing personal details (such as bank details)?
11.

Unsolicited emails are known as what?

12.
What button would you click on to send a copy of an email you
have received from a friend?
13.
What button would you click on to send a copy of an e-mail to
someone else?
14.
What piece of advice would you give a friend to avoid them
opening viruses from emails?

19

Measurement and
Control
Read pages 62-65 of the revision guide and answer the following
questions:
1.

Name 3 different types of sensors and their uses:

2.

What is data logging?

3.

Write down the commands below to draw the following shape:

4.

What stores and converts the signals from sensors into a form the
computer can understand?

5.

Where is data transmitted from the interface box to?

6.

What is the time reading between periods called?

7.

What is the total length of time over which readings are taken
called?

8.

What is it called when data is recorded out in the field?

9.

Give 2 examples of computer control used in the home

10.

What type of sensor would be used in an air conditioning system?

20

Computer
Crime

Read pages 68-71 of the revision guide and answer the questions below:
1. Name 3 physical methods of security that can be used to keep data
safe
2. Name 3 actions that you can do to keep data safe
3. Name 3 types of computer crime that can take place
4. What piece of legislation covers unauthorised access to data also
known as hacking?
5. What is a trojan horse?
6. What is malware?
7. What is a virus?
8. Give 2 pieces of advice to avoid getting a virus
9. Give one advantage and one disadvantage of using anti-virus
software.
10.

What is key logging?

11.

Give 2 advantages of encrypting data:

21

Netwo
rksguide and answer the following
Read pages 20-23 of the revision
questions:
1. What does a network allow computers to share?
2. What does LAN stand for?
3. What does WAN stand for?
4. What type of network would be most suitable for a school on one
site? Justify your answer:
5. Give an example of a WAN
6. Label the following network topologies:

7. Give two advantages of using a network in an organisation:


8. Give 1 Disadvantage of CLOUD computing
9. Give 2 advantages to using CLOUD computing:
10.

What is the computer server in a network?

11.

To log onto a network, what 2 things do you usually need?

22

Essay Style
Questions

For each of the following essay style questions YOU NEED TO:
Write an opening sentence
Give 2 advantages of using ICT for security in airports (can be
bullet points as long as written in sentences) giving examples if you
can.
Give 2 disadvantages of using ICT for security in airports (can be
bullet points as long as written in sentences) giving examples if you
can.
Write a concluding sentence.
Airport staff use ICT to security check passengers and their
baggage before they are allowed on a flight. Discuss the impact
on passengers of the use of ICT in security. The quality of written
communication will be assessed in your answer to this question
[8 marks]
Example:
Opening Sentence: ICT is increasingly being used to increase security in
airports all over the world. With recent events such as 9/11 people are
more and more aware of the potential risks of flying.
Advantage 1: ICT helps passengers feel safer knowing that everybody
boarding the plane is being thoroughly checked and human error (missing
someone by accident or on purpose) can be avoided.
Disadvantage 1: An invasion of peoples personal privacy with the
security guards looking at passengers bodies as they are scanned, could
make passengers feel uncomfortable, especially if they then need to be
physically searched in front of other passengers.
Advantage 2: ICT helps speed up the process of checking for dangerous
items and helps flights board quicker causing less disruption to flights and
passengers. Barcoding of luggage means that they can be easily tracked
down if a passenger is removed from the plane.
Disadvantage 2: Sometimes ICT can break down and this can cause
huge delays or lost baggage which can be annoying and frustrating,
especially if you end up at your destination and your bags end up
somewhere else.
Conclusion: In summary I think that ICT does have a positive impact by
helping make travelling safer and more efficient for most passengers,

23

however robust systems are needed as when it goes wrong it can have a
negative impact on passengers and safety.

24

Essay Style
For each of the following essay style questions YOU NEED TO:
Questions
Write an opening
sentence

Give 2 advantages of e-commerce (can be bullet points as long as


written in sentences) giving examples if you can.
Give 2 disadvantages of using e-commerce (can be bullet points
as long as written in sentences) giving examples if you can.
Write a concluding sentence.

Using the internet is a convenient and secure way to buy and sell
goods. Discuss this statement. The quality of your written
communication will be assessed in this answer
[8 marks]
Opening Sentence:

Advantage 1:

Disadvantage 1:

Advantage 2:

Disadvantage 2:

Conclusion:

25

Essay Style
For each of the following
essay style questions YOU NEED TO:
Questions
Write an opening sentence

Give 2 advantages of using an expert system (can be bullet points


as long as written in sentences) giving examples if you can.
Give 2 disadvantages of using an expert system (can be bullet
points as long as written in sentences) giving examples if you can.
Write a concluding sentence.

Discuss how a teacher could use an expert system to help


students outside school. The quality of your written
communication will be assessed in this answer
[8 marks]
Opening Sentence:

Advantage 1:

Disadvantage 1:

Advantage 2:

Disadvantage 2:

Conclusion:

26

Key Exam
Terms

The following key exam terms and descriptions will help you understand
how to answer your exam questions in June.

Key Exam Term Description


Compare

Examine qualities or characteristics in order


to discover resemblances. Compare the
same feature on each line, eg training, cost,
time.
You can use a table:

Define

Give a clear, specific meaning, like a


definition in a dictionary definition.

Describe

Give a detailed account of the topic.


Include features or characteristics of the
topic with examples.

Discuss

You need to present the facts here, giving


the advantages / disadvantages or
impacts and consequences of each point you
have raised with clear examples. If 8
marks, use: Opening Sentence, 2
Advantages, 2 Disadvantages and a
Conclusion.

Explain

You need to clarify and interpret the topic


you have been presented with who, why,
what, how and where?

List

Give an itemised/bulleted account of the


topic/subject matter.

Outline

Give the main points of the topic/subject


matter with any supplementary material you
think suitable.

GOOD LUCK IN YOUR


EXAMS!
27

28

GUIDE TO APPENDIX:
Have a look through some of the past papers, familiarise yourself with the
type and style of questions, perhaps even have a go at answering them in
the spaces provided. Your exams will follow a similar style, layout and
mark scheme.
If you are sitting B063 in June 2013, please look carefully at the prerelease material for this exam and the preparation booklet provided
separately.

B061 January 2011 This is attached and you can have a go at this
yourself at home.
B061 January 2011 Mark scheme Use this to check your answers on
the January 2011 paper.
B061 June 2011 The June 2011 paper. Have a go at this yourself.
B061 Mark Scheme June 2011 Use this mark scheme to check your
answers.
B061 January 2012 This was the paper sat in January 2012. Have a go
at home, use the mark scheme to check your answers.
B061 Mark Scheme Jan 2012 This is the mark scheme for the January
2012 paper, use it to check your answers.
B063 pre-release Jan June 2013 This is the pre-release task for the
B063 case study exam you will sit in June. Study it carefully as there will
be a question on each of the topics in the bulleted list at the end.
Aqua-Inflatables practice questions These are practice questions on
each of the topics. Have a go at answering them. If you struggle, use
your Aqua-Inflatables booklet to go over those topic areas.

29

APPENDIX 1:
B061 JANUARY 2011
EXAM PAPER

30

APPENDIX 2:
B061 JANUARY 2011
MARK SCHEME

31

APPENDIX 3:
B061 JUNE 2011
EXAM PAPER

32

APPENDIX 4:
B061 JUNE 2011
MARK SCHEME

33

APPENDIX 5:
B061 JANUARY 2012
EXAM PAPER

34

APPENDIX 6:
B061 JANUARY 2012
MARK SCHEME

35

APPENDIX 7:
B063 PRE-RELEASE
OCER THEATRE

36

APPENDIX 8:
OCER THEATRE
PRACTICE QUESTIONS

37

AREAS TO RESEARCH:
OECR Theatre.
OECR Theatre is a small theatre company based in Coventry. Over the last year,
OCER Theatre has invested in technology to help run the business and to
improve the service to customers who visit the theatre.
One of the facilities introduced by OCER Theatre is a self-service multimedia
ticketing kiosk in the foyer. Customers are able to view video clips of shows and
purchase tickets for shows either on the day of the show or in advance. The kiosk
can print the tickets after payment has been made by credit or debit card.
Alternatively, customers can opt to use a mobile ticketing facility, which can send
tickets directly to their mobile phones.
OCER Theatre has also installed a new website featuring Web 2.0 technologies.
After registering, customers are able to purchase tickets through the website.
Tickets can be posted to the customers home address. Customers can also
choose to use the Theatres new print-at-home facility.
OCER Theatre is considering the purchase of an integrated box-office system
that can be used to help make business decisions. The system would store data
from a variety of sources, including Point of Sale terminals, the ticketing kiosk
and the website for the company to analyse.
OCER Theatre has started to include Quick Response (QR) codes on most of its
printed materials, including posters and tickets.
A range of standard business software is used within the theatre, as well as
project management software to help plan the production of new shows.
You need to research the following in relation to a theatre:

ICT hardware and software, including integrated box office software


QR codes and their uses
Web 2.0 technologies
Self-service multimedia kiosks
Project management software and its features
Ticketing systems, including online, mobile and print-at-home
Legislation relating to the use of ICT.

38

Você também pode gostar