The Student Room Group

A2 aqa ict info 3 june 2015 exam thread (predicted question/revision material)

Scroll to see replies

Original post by CharlSouthon
Anybody fancy giving the answers to all the predicted questions? I know some answers but the wording catches me out. Would really appreciate it.


Yes please! for all of the above :biggrin:
Original post by Yellow636
1) Risk Analysis identifies the most important data for UCDM and places a value on this data. This allows them to identify data that is most crucial and valuable to UCDM as well as what data needs to be restored first. This enables UCDM to choose backup facilities to best suit the different data they have. For example, Data that needs to be restored quickly and is of high value may be backed up via a fail over system, while data that is not as mission critical may be backed up on a disc or tape.


Wow thanks so much that was a really good answer! Is there any chance you could give answers to some more questions especially questions 2, 5, 6 and 11. Thanks so much!
11 looks ok so ill do that one :P.


UCDM internal threats will be the misuse of computers by its ICT staff by malicious or malpractice. UCDM should protect from malpractice via its training policy. This could be by providing induction training about basic ICT procedures, for example, Logging out after using the workstations or by not sharing passwords. UCDM should also try and prohbit malicious internal threats. This could be done via its recruitment policey by trying to only hire trust worthy employees. In addition to this, UCDM could put in place a security policy. This would use Monitoring software packages to ensure that users are in fact keeping to the ICT procedure. Usernames can be assigned so that UCDM knows what user broke a set rule, with punishments in place for breaking said rules. In addition, privileges could be set, these would be public, anyone in or outside the organization could view it, internal only, only employees of UCDM can view the data, or confidential, only set people in UCDM can view the data. This would mean that sensitive details, for example donators details, are only accessible by people who require that data. This will ensure that data does not fall into employees meaning to do harm.

External threats to UCDM would include hackers. These people will look for security breaches to gain data and sell it on, as described in the case study. A good way in stopped such threats would be by both encryption - sending data in hidden messages and decoded by the recipient, or via a firewall. This would be included in UCDM security policy. In addition, viruses and Trojans may be an external threat which could be removed via using up to date anti virus software. In addition, backups should be done regularly to ensure that if data is lost via a security threat, it can be recovered. The backup could be conducted on a disc and stored externally. This would eliminate any external threats on the servers of UCDM such as sabotage as data is now located externally.



Ill try the others now, but they are alot more tricky! :P
After looking at 6, it is not that hard. Reword the question to "why does UCDM need to have agreed time frame, budget, resources and deliverables".

UCDM needs to operate a formal project management methodology to ensure that the merging systems is successful. A formal management methodology is when a project is given an outlined Budget, Resources and time frame to be completed in. Normally, deliverables are to be met along to way to ensure that the project is on track. It is appropriate for this situation as it increases the chance that UCDM project will be on time. With UCDM setting a strict delivery time of just 6 months, it is important to stay on time frame. Using formal project management will help achieve this. In addition, formal project management will make sure that UCDM will have the resources they require, as the needed resources would be outlined at the start. This helps ensure it runs on time, but also increases the chance that the project will be successful as UCDM have everything they require. In addition, it helps ensure that the project runs on budget. This is especially important for UCDM as they require money to spend on helping people, therefore do not want alot of their donations, 90% go on to help people, being spent on an ICT system.

Furthermore, this type of management often uses project management software, this helps to set milestones that further keep the project on task. At the end, the client has to sign off, this means that UCDM will have a project that they want, and therefore have improved chance of being satisfied with the results.
Question 2 can be answered in 2 ways. Im not sure if the server is meant to be a cold failover site or the actual site.

Failover site:

Include - Recovery time object
- Recovery data Points
- trained staff in place
- It is checked and tested regularly.

If its the actual site
- Availability of network in time of disaster
- Availability of staff at the time of disaster
-
Original post by Yellow636
Question 2 can be answered in 2 ways. Im not sure if the server is meant to be a cold failover site or the actual site.

Failover site:

Include - Recovery time object
- Recovery data Points
- trained staff in place
- It is checked and tested regularly.

If its the actual site
- Availability of network in time of disaster
- Availability of staff at the time of disaster
-


Thanks so much! Any help with Q5?:smile:
Original post by CharlSouthon
Thanks so much! Any help with Q5?:smile:


Sadly not. never heard of it, im guessing it will not come up!

If it does, errrm, lol
Original post by Yellow636
Sadly not. never heard of it, im guessing it will not come up!

If it does, errrm, lol


Ok at least I'm not alone haha thanks anyway:smile:
Reply 48
question 3?
Original post by CharlSouthon
Ok at least I'm not alone haha thanks anyway:smile:


nuts, it came up LOL
Original post by Yellow636
nuts, it came up LOL


Wasn't too bad actually because it wasn't to many marks. The others were ok though

Quick Reply

Latest

Trending

Trending