The Student Room Group

A2 aqa ict info 3 june 2015 exam thread (predicted question/revision material)

Scroll to see replies

Original post by Taplin97
My ICT teacher has ordered 2 complete Zig zag papers should arrive when we get back after Easter break,- can upload for yiu when I get them,

you our got any good questions based on UCDM that might come up?


hey, would it be possible to upload the zigzag resource u have? I'm struggling quite a bit with this unit. Thank you :smile:
Anyone know key topics for the case study

Posted from TSR Mobile
Reply 22
1. Following the security breach UCDM have had a risk analysis carried out on threats to their ICT operations. Explain what is meant by a ‘risk analysis’ and why it would have been carried out.

2. The Trustees of UCDM are concerned of the consequences should ICT systems be unavailable at the time a disaster. To achieve continuity of service they have decided to build a secure computer room and install UPS and standby generators. What else should they consider and why?

3. The UCDM website includes an extranet facility for volunteers and sponsors. Explain how volunteers and sponsors would be given access to this facility and what differences there would be for each group.

4. UCDM currently works in 37 countries, each with volunteers and stocks of emergency supplies. Describe some of the issues that would need to be considered in managing an ICT system with this large geographical spread.

5. The merger of UCDM with Helping Hands will involve the need for a temporary solution using a data warehouse. How can data from both systems be presented to users with ‘the appearance of one system’?

6. The developers of the new ICT system will use a formal project management methodology due to the complex nature of the work. Explain what is meant by a ‘formal project management methodology’ and why it appropriate in this situation.

7. The new system that is being developed for the merged organisations will match disaster locations with location of volunteers and equipment. Draw an entity relationship diagram to represent a relational database design that could be used.

8. How could social networking be used to keep volunteers informed of countries where their assistance might be needed?

9. What ways are there of volunteers and staff having Internet access in regions where a serious disaster has happened?

10. UCDM’s Trustees were notified of a serious security breach. Details of all UK donors and volunteers, including names, addresses and bank account details, have been obtained and offered for sale on the internet. What legislations have been broken and explain what UCDM will need to do to fully comply with the legislations.

11. What are the internal and external security threats and explain what UCDM can do to effectively protect themselves in the future.
Original post by ruby__9
1. Following the security breach UCDM have had a risk analysis carried out on threats to their ICT operations. Explain what is meant by a ‘risk analysis’ and why it would have been carried out.

2. The Trustees of UCDM are concerned of the consequences should ICT systems be unavailable at the time a disaster. To achieve continuity of service they have decided to build a secure computer room and install UPS and standby generators. What else should they consider and why?

3. The UCDM website includes an extranet facility for volunteers and sponsors. Explain how volunteers and sponsors would be given access to this facility and what differences there would be for each group.

4. UCDM currently works in 37 countries, each with volunteers and stocks of emergency supplies. Describe some of the issues that would need to be considered in managing an ICT system with this large geographical spread.

5. The merger of UCDM with Helping Hands will involve the need for a temporary solution using a data warehouse. How can data from both systems be presented to users with ‘the appearance of one system’?

6.The developers of the new ICT system will use a formal project management methodology due to the complex nature of the work. Explain what is meant by a ‘formal project management methodology’ and why it appropriate in this situation.

7. The new system that is being developed for the merged organisations will match disaster locations with location of volunteers and equipment. Draw an entity relationship diagram to represent a relational database design that could be used.

8. How could social networking be used to keep volunteers informed of countries where their assistance might be needed?

9. What ways are there of volunteers and staff having Internet access in regions where a serious disaster has happened?

10. UCDM’s Trustees were notified of a serious security breach. Details of all UK donors and volunteers, including names, addresses and bank account details, have been obtained and offered for sale on the internet. What legislations have been broken and explain what UCDM will need to do to fully comply with the legislations.

11. What are the internal and external security threats and explain what UCDM can do to effectively protect themselves in the future.


How would you answer and what could u include in this?

2. The Trustees of UCDM are concerned of the consequences should ICT systems be unavailable at the time a disaster. To achieve continuity of service they have decided to build a secure computer room and install UPS and standby generators. What else should they consider and why?

Posted from TSR Mobile
Reply 24
2. The Trustees of UCDM are concerned of the consequences should ICT systems be unavailable at the time a disaster. To achieve continuity of service they have decided to build a secure computer room and install UPS and standby generators. What else should they consider and why?

A UPS will not be sufficient in securing the computer room its hardware and software resources. The UPS and generators will be able to provide the power after power cut which will allow the system to run but the following factors should also be considered.

Back up recovery points should be considered:
1. Responsibility for recovery procedures: whether another branch will take over at the time of a disaster, individuals who will be obtained to take immediate action at the time of a disaster.
2. Mode of recovery: Hot or cold standby, hot standby would be more beneficial for a large organisation like UCDM as it is a duplicate system running as a mirror site and at the same time providing a failover system.

Backup Strategies:
1. What to back up: information about donors, volunteers and donations
2. Time or frequency of backup: this will depend on the frequency a new volunteer joins or donation is made, timing differences due to being an international organisation.
3. Method of backup: full, incremental or differential backup, this will depend on the volume of data held at UCDM
4. Medium used: Cloud, tape disk etc these will require rigorous security measures inc encryption.
5.Testing backup

Further points could inc security procedure against the location where the back up is kept. E.g. network security, biometric devices, encryption etc
Posted from TSR Mobile
Original post by H1ace
Anyone got predicted questions on section A on the case study?

1. Following the security breach UCDM have had a risk analysis carried out on threats to their ICT operations. Explain what is meant by a ‘risk analysis’ and why it would have been carried out.

2. The Trustees of UCDM are concerned of the consequences should ICT systems be unavailable at the time a disaster. To achieve continuity of service they have decided to build a secure computer room and install UPS and standby generators. What else should they consider and why?

3. The UCDM website includes an extranet facility for volunteers and sponsors. Explain how volunteers and sponsors would be given access to this facility and what differences there would be for each group.

4. UCDM currently works in 37 countries, each with volunteers and stocks of emergency supplies. Describe some of the issues that would need to be considered in managing an ICT system with this large geographical spread.

5. The merger of UCDM with Helping Hands will involve the need for a temporary solution using a data warehouse. How can data from both systems be presented to users with ‘the appearance of one system’?

6. The developers of the new ICT system will use a formal project management methodology due to the complex nature of the work. Explain what is meant by a ‘formal project management methodology’ and why it appropriate in this situation.

7. The new system that is being developed for the merged organisations will match disaster locations with location of volunteers and equipment. Draw an entity relationship diagram to represent a relational database design that could be used.

8. How could social networking be used to keep volunteers informed of countries where their assistance might be needed?

9. What ways are there of volunteers and staff having Internet access in regions where a serious disaster has happened?

10. UCDM’s Trustees were notified of a serious security breach. Details of all UK donors and volunteers, including names, addresses and bank account details, have been obtained and offered for sale on the internet. What legislations have been broken and explain what UCDM will need to do to fully comply with the legislations.

11. What are the internal and external security threats and explain what UCDM can do to effectively protect themselves in the future.
Original post by ruby__9
1. Following the security breach UCDM have had a risk analysis carried out on threats to their ICT operations. Explain what is meant by a ‘risk analysis’ and why it would have been carried out.

2. The Trustees of UCDM are concerned of the consequences should ICT systems be unavailable at the time a disaster. To achieve continuity of service they have decided to build a secure computer room and install UPS and standby generators. What else should they consider and why?

3. The UCDM website includes an extranet facility for volunteers and sponsors. Explain how volunteers and sponsors would be given access to this facility and what differences there would be for each group.

4. UCDM currently works in 37 countries, each with volunteers and stocks of emergency supplies. Describe some of the issues that would need to be considered in managing an ICT system with this large geographical spread.

5. The merger of UCDM with Helping Hands will involve the need for a temporary solution using a data warehouse. How can data from both systems be presented to users with ‘the appearance of one system’?

6. The developers of the new ICT system will use a formal project management methodology due to the complex nature of the work. Explain what is meant by a ‘formal project management methodology’ and why it appropriate in this situation.

7. The new system that is being developed for the merged organisations will match disaster locations with location of volunteers and equipment. Draw an entity relationship diagram to represent a relational database design that could be used.

8. How could social networking be used to keep volunteers informed of countries where their assistance might be needed?

9. What ways are there of volunteers and staff having Internet access in regions where a serious disaster has happened?

10. UCDM’s Trustees were notified of a serious security breach. Details of all UK donors and volunteers, including names, addresses and bank account details, have been obtained and offered for sale on the internet. What legislations have been broken and explain what UCDM will need to do to fully comply with the legislations.

11. What are the internal and external security threats and explain what UCDM can do to effectively protect themselves in the future.


For Question 5, any ideas of an answer? good questions btw
Original post by Cleveland1
For Question 5, any ideas of an answer? good questions btw


Screen Scraping,which enables information from multiple systems to be accessed and displayed togethercreating the appearance of one system.
Original post by joshoantonio
Screen Scraping,which enables information from multiple systems to be accessed and displayed togethercreating the appearance of one system.


Is there anything in the book about question 5 or is that just real world knowledge?

These are great questions though! :smile:
(edited 8 years ago)
Original post by lewisdebruin11
Is there anything in the book about question 5 or is that just real world knowledge?

These are great questions though! :smile:


I'm not sure if there is anything specific in the book about screen scraping, but it is what my teacher taught us about when he gave us the questions.

These questions are his best guess at what could possibly come up.
Original post by ruby__9
2. The Trustees of UCDM are concerned of the consequences should ICT systems be unavailable at the time a disaster. To achieve continuity of service they have decided to build a secure computer room and install UPS and standby generators. What else should they consider and why?

A UPS will not be sufficient in securing the computer room its hardware and software resources. The UPS and generators will be able to provide the power after power cut which will allow the system to run but the following factors should also be considered.

Back up recovery points should be considered:
1. Responsibility for recovery procedures: whether another branch will take over at the time of a disaster, individuals who will be obtained to take immediate action at the time of a disaster.
2. Mode of recovery: Hot or cold standby, hot standby would be more beneficial for a large organisation like UCDM as it is a duplicate system running as a mirror site and at the same time providing a failover system.

Backup Strategies:
1. What to back up: information about donors, volunteers and donations
2. Time or frequency of backup: this will depend on the frequency a new volunteer joins or donation is made, timing differences due to being an international organisation.
3. Method of backup: full, incremental or differential backup, this will depend on the volume of data held at UCDM
4. Medium used: Cloud, tape disk etc these will require rigorous security measures inc encryption.
5.Testing backup

Further points could inc security procedure against the location where the back up is kept. E.g. network security, biometric devices, encryption etc
Posted from TSR Mobile


Thank you that makes sense now. Sorry to be a pain but any idea on how to answer 2 ?

Posted from TSR Mobile
Original post by thepatel_1


Thank you that makes sense now. Sorry to be a pain but any idea on how to answer 2 ?

Posted from TSR Mobile

Number 11, is this just asking about how UCDM can comply with the legislation generally or comply after the disaster has occurred?
Reply 32
Original post by Cleveland1
For Question 5, any ideas of an answer? good questions btw


For number 5 you could talk about data warehouse, It’s a system used for reporting and data analysis, where the data is taken from a variety of database systems. Both current and historical data can be stored from these enquiries.
Reply 33
Original post by lewisdebruin11
Thank you that makes sense now. Sorry to be a pain but any idea on how to answer 2 ?

Posted from TSR Mobile


Number 11, is this just asking about how UCDM can comply with the legislation generally or comply after the disaster has occurred?

I think that number 11 is talking about how UCDM can comply with the legislation in general in order to prevent disasters and security breaches.
Would this be right for question 7
Original post by ruby__9
1. Following the security breach UCDM have had a risk analysis carried out on threats to their ICT operations. Explain what is meant by a ‘risk analysis’ and why it would have been carried out.

2. The Trustees of UCDM are concerned of the consequences should ICT systems be unavailable at the time a disaster. To achieve continuity of service they have decided to build a secure computer room and install UPS and standby generators. What else should they consider and why?

3. The UCDM website includes an extranet facility for volunteers and sponsors. Explain how volunteers and sponsors would be given access to this facility and what differences there would be for each group.

4. UCDM currently works in 37 countries, each with volunteers and stocks of emergency supplies. Describe some of the issues that would need to be considered in managing an ICT system with this large geographical spread.

5. The merger of UCDM with Helping Hands will involve the need for a temporary solution using a data warehouse. How can data from both systems be presented to users with ‘the appearance of one system’?

6. The developers of the new ICT system will use a formal project management methodology due to the complex nature of the work. Explain what is meant by a ‘formal project management methodology’ and why it appropriate in this situation.

7. The new system that is being developed for the merged organisations will match disaster locations with location of volunteers and equipment. Draw an entity relationship diagram to represent a relational database design that could be used.

8. How could social networking be used to keep volunteers informed of countries where their assistance might be needed?

9. What ways are there of volunteers and staff having Internet access in regions where a serious disaster has happened?

10. UCDM’s Trustees were notified of a serious security breach. Details of all UK donors and volunteers, including names, addresses and bank account details, have been obtained and offered for sale on the internet. What legislations have been broken and explain what UCDM will need to do to fully comply with the legislations.

11. What are the internal and external security threats and explain what UCDM can do to effectively protect themselves in the future.




Is this right for q7? Please help
Original post by Taplin97
Is this right for q7? Please help



I don't get 9 either?
Original post by Taplin97
I don't get 9 either?


Pervasive Internet?
Which is when you have access to the Internet whenever you want and wherever you are. It is a future development.
(edited 8 years ago)
Anybody fancy giving the answers to all the predicted questions? I know some answers but the wording catches me out. Would really appreciate it.
1) Risk Analysis identifies the most important data for UCDM and places a value on this data. This allows them to identify data that is most crucial and valuable to UCDM as well as what data needs to be restored first. This enables UCDM to choose backup facilities to best suit the different data they have. For example, Data that needs to be restored quickly and is of high value may be backed up via a fail over system, while data that is not as mission critical may be backed up on a disc or tape.

Quick Reply

Latest

Trending

Trending