Professional Documents
Culture Documents
Introduction:
The aim of this section of the syllabus is to cover as broad a range of computer applications as possible. So as to provide an understanding of the power
and versatility of the computer and the benefits of its use, and also of its limitations and the problems and potential disadvantage of this use.
Commercial and general data Examples could be selected from banking systems, Q 1. (e)Batch processing
processing hospital administration, systems for personnel
records, stock control and order processing.
Industrial, technical and Examples could be selected from weather Q 1 (d) simulation.
scientific uses forecasting, computer aided design and
manufacture, image processing, simulation and Q 13 (a) (b) (c) (d) What is
modelling, use of virtual reality in designing meant by virtual reality?
chemical and nuclear plants, training of airlines examples, advantages and
pilots. application
Use of the internet Design of internet sites, website features for online
ordering and other applications (such as banking Q 4. State three effects on
and ecommerce), use of internet search engines, society due to the increase of
protection built into secure internet sites (e.g. when businesses using e-commerce.
playing
Changes in employment, Candidates may see the need for constant retraining
retraining of staff as existing packages are upgraded and new
ones published. Candidates may appreciate the use
of individualised training packages that use CD-
ROM, DVD and multimedia
Hacking and other computer Computer crime includes activities such as the
crime cracking of ineffective security systems so as to
gain unauthorised access to commercially sensitive Q 3 (a) Give two examples of
or confidential personal files, and fraud through the computer crime.
improper transfer of funds from one account to (b)Describe two methods
another. Computer criminals may work within used to prevent computer
organisation suffering the crime or may be crime.
4
outsiders . measures taken to combat computer
crime include physical security, development of
complex security codes and systems, encryption of
sensitive data, and monitoring of all attempt to
access the system, whether successful or not.