Paper 1 Nov 2022 Flashcards
(15 cards)
The input data will be inserted into the binary tree so that an inorder traversal of the
binary tree would output all the students’ names and scores, sorted from the highest
to the lowest score.
(c) Describe the steps in this insertion process. [6]
Repeat the following steps (until all the names and scores are inputted);
input the values (name and score of one student), create a new node and place the input values into the newly created node;
If the tree is empty, set the root to a new node;
Else (if the tree is not empty)
repeat the following until a leaf node is reached;
If a new node is smaller than or equal to the node (here it is a root node)
move to its right child;
If a new node is larger than the node, move to its left child:
insert the new node (as a right or left child of the leaf node based on node
is less or greater than the leaf node);
A decision has been made to create a new application. It will use a binary tree as an
alternative to the two arrays.
(b) Identify the components of a node in a binary tree.
- Components data
- Pointer to the left child
- Pointer to the right child
(a) (i) Describe the steps in the bubble sort algorithm that sorts the input data stored in
the SCORES and NAMES arrays in order of scores. [5]
scores and names have corresponding indexes btw
Award [1] for repeating the following steps until no swaps is required (the array is
sorted);
Award [1] for looping through the array SCORES;
Award [1] for comparing each pair of adjacent elements in the array SCORES;
Award [1] for swapping them if they are in the wrong order;
Award [1] for also swapping the corresponding elements in the array NAMES;
- A company is planning to transform its office building into a smart building. Among other
things, a smart building can control the opening and closing of its doors.
(a) Outline two other operations that can be controlled by a smart building. [4]
Heating / air conditioning controlled;
help lower the energy bills / increases the comfort level of the occupants;
Security system;
Locking/unlocking doors for the authorised or unauthorised employees/ windows open-close;
(d) Explain why parallel running is an expensive changeover method. [3]
Two systems will be run simultaneously so that operations are not disrupted, this is a costly
operation;
Because both systems and all their resources need to be maintained/run at the same time;
Data also has to be migrated to the new system, and data migration is a complex, costly process to implement correctly.
The organization will continue to maintain the legacy system.
(c) Explain one problem of maintaining legacy systems. [3]
Applications in the legacy/outdated system do not have upgrades;
Documentation of the legacy system might be missing/incomplete/unreliable;
It may be difficult to find system engineers familiar with the old operating systems to maintain the system;
(a) (i) Define the term data migration. [1]
The process of transferring data from one device to another.
(ii) Outline two issues that could arise concerning data migration. [4]
Incompatible file formats;
Which could lead to incomplete or incorrect data transfer / data loss;
New validation rules differ to the old validation rules;
Which could lead to inconsistent/incorrect results;
Outline two aspects of change management that need to be considered, other than
data migration. [4]
Issues with personnel;
such as redundancy/retraining/employee not willing to move to different country, etc.;
Changeover decisions;
such as direct changeover/ parallel running etc;
(d) Outline two features of a VPN that make it secure. [4]
Encryption;
If data intercepted, it will not be readable;
Tunnelling software;
A VPN hides a user’s data by encrypting it with a tunnel created between the user’s device
and the VPN’s web server (The user then takes on the IP address of the web server (rather
than their true IP), and this leads to one advantage of a VPN (namely that a user can appear
to be in a different geographic location than they are actually located in);
- A company has a local area network (LAN). Ethernet (a wired network) and WiFi
(a wireless network) are the two ways to enable LAN connections.
(c) Outline why a wireless network may be less secure than a wired network. [2]
networks signals are broadcasted outside of the building;
leaving it open to the public and potential hackers/ it is easy to intercept transmissions;
Distinguish between a wired network and a wireless network in terms of reliability
of transmission. [4]
The reliability of wireless depends on the strength of the wireless signal;
Depends on distance from router;
whilst
Ethernet is more reliable as the strength of the signal does not depend on the
distance from the router/ wired LAN support longer distances;
wired is immune to interference;
- Define the term variable. [1]
Variables define areas in memory in which values (data) are stored;
- A company is using a prototyping approach as part of their software development process.
(a) Outline one advantage of prototyping. [2]
Prototyping approach allows the end users (employees, management, owner) to visualize
how the final solution might look;
So, they can provide feedback to the system analysis team;
(b) Outline one situation in which the use of a prototype is not the best approach. [2]
The software developer is the only end-user;
No need to waste time and money on a prototype / to view how the solution might look;