Sunteți pe pagina 1din 36

ICT IGCSE Theory

Revision Questions

Chapter 1: Types & Components of a Computer System


Chapter 2: Input & Output Devices
Chapter 3: Storage Devices and Media
Chapter 4: Networks
Chapter 5: The Effects of Using ICT

Name:

www.yahmad.co.uk
Chapter 1: Types & Components of a Computer System

What is the difference between Hardware and software?

Briefly describe the purpose of the following hardware components:


Central Processing
Unit (CPU):

Motherboard:

Internal Hard Disk:

Sound Card:

Graphics Card:

What are the differences between ROM & RAM?


ROM: RAM:

What are the differences between Application & System Software?


Application: System:

Examples with use: Examples with use:


Word Processing - Used to prepare
reports, school essays

What is measure and control software used for?

www.yahmad.co.uk
What are the main functions of an operating System?

What are the differences between the CLI & GUI interfaces?
CLI: GUI:

Advantages: Advantages:

Disadvantages: Disadvantages:

Describe the four main features of the graphical user interface?

W
I
M
P

What are the differences between Main Memory and Backing Storage? (4)
Main Memory (ROM/RAM/Cache): Backing Storage:

Type of computer and use: Advantages Disadvantages


Personal Computer:

Laptop:

Tablet:

Smart Phone:

www.yahmad.co.uk
2015 – 16 Exam Questions
There are a number of different types of computer.
Write down the type of computer that best fits the following descriptions.

A computer that is difficult to move and has a separate monitor and keyboard.

A portable computer that includes a physical keyboard.

A thin portable computer that has a touch screen and a battery in a single unit, not normally used
to make phone calls.

A mobile phone that can be used as a computer.

Smart phones are used to send and receive emails with and without attachments.
Describe four other ways in which emails can be managed on a smart phone.

Discuss the advantages and disadvantages to a teacher of using a tablet computer


instead of another type of computer

www.yahmad.co.uk
Tick the type of computer which would be most appropriate for each use of ICT.

Tick whether the following are examples of applications software or systems software.

Tick whether the following statements about desktop and laptop computers are true or false.

Discuss why different user interfaces require the use of different types of input device.

www.yahmad.co.uk
Chapter 2: Input & Output Devices
Describe the role of an Input Device? (1) List 2 Examples:

Describe the role of an Output Device? (1) List 2 Examples:



Describe the role of a Sensor? (1) List 3 Examples:




Why does a computer not understand Physical Variables (real world) read from
Sensors? (3)

Describe the role of an Actuator? (1) List 3 Examples:




Input Device USE: Advantage Disadvantage


Numeric Key
Pad

Mouse

Touch Pad

Web Camera

Microphone

Light Pen

www.yahmad.co.uk
OMR: Use: Advantage:

OCR: Use: Advantage:

MICR: Use: Advantage:

Keyboard: Disadvantage of Using a Keyboard to input data over the direct data
input devices?

Magnetic Strip Advantages Disadvantages


Readers

Use:

Chip and Pin Advantages Disadvantages


Readers

Use:

Contactless Cards Advantages Disadvantages

Use:

RFID (Radio Advantages Disadvantages


Frequency
Identification)

Use:

www.yahmad.co.uk
Type of Printer: Use Advantages Disadvantages
Dot Matrix:

Inkjet Printer:

Laser Printer:

3D Printer

Wide Format
Printer/Plotter

Compare the use of Magnetic Strip Reader, Chip and Pin Reader, Contactless
Cards Point, barcode scanner and number pad at the POS (Point of Sale)?

www.yahmad.co.uk
Describe the input and output devices used in a video conference?

Describe the input and output devices used in a teachers classroom

Compare the advantages and disadvantages of the CRT and the LCD monitor?

Compare the use of the Dot Matrix, Inkjet and Laser Printers identifying
advantages and disadvantages?

www.yahmad.co.uk
2015 – 16 Exam Questions

The inbuilt device which moves the cursor when using a laptop is called a _____________

The device used for selecting an icon so a bar code label can be printed in a supermarket is
called a _________________

The device used for controlling a pointer on a screen when the user
has limited motor skills is called a ___________________

This is provided with a laptop to imitate the functions of a mouse. ________________

This is not a mouse but is used to manoeuvre objects around the screen in computer video
games. __________________

This is used to type in text. __________________

This is used for direct input of hard copy images __________________

www.yahmad.co.uk
Data can be input to a computer using different devices. Write down the most appropriate
input device which will enable you to:

(a) type an essay: __________________


(b) select options from a drop down menu whilst moving the device: __________________
(c) read the temperature: __________________
(d) fly an aircraft in a video game: __________________

Data can be input to a computer using direct data entry methods.


Write down the most appropriate device to input the following:

(a) information from the chip in an electronic passport:


__________________
(b) text from an id card:
__________________
(c) account details from the front of a credit card at an EFTPOS terminal:
__________________
(d) account details from the back of a credit card at an EFTPOS terminal:
__________________

Describe how MICR is used to read these details from the cheque.

Discuss why different user interfaces require the use of different types of input device.

www.yahmad.co.uk
Chapter 3: Storage Devices and Media

What is Secondary Storage? List 3 Storage Mediums:

What is meant by Backup? Why would you backup:

How would you make a personal How would businesses backup?


backup?

List features of the Main Memory List features of Backing Storage

Compare the differences between Serial and Direct Access?

List the different types of storage Medium:


Magnetic Storage Optical Media Solid ‘state’
Devices

Compare the differences between Magnetic, Optical and Solid State storage
medium?

www.yahmad.co.uk
Storage Medium (Magnetic)
Name Use Advantages Disadvantages
Fixed Internal
Hard
Drive

Portable Hard
Drive

Magnetic Tapes

Storage Medium (Optical)


Name Use Advantages Disadvantages
CD-ROM

DVD-
ROM

Blu-Ray

Compare the differences between CD/DVD R, CD/DVD RW and DVD RAM

Storage Medium (Solid ‘state’)


Name Use Advantages Disadvantages
USB Memory
Stick

Memory Card

www.yahmad.co.uk
2015 – 16 Exam Questions

Describe the characteristics and uses of different types of DVD

Compare and contrast the use of optical discs and the use of fixed magnetic disks to store
data.

www.yahmad.co.uk
Chapter 4: Networks
What is a Computer Network?

Advantages of using Networks Disadvantages of using Networks

Understand how a Router works and its purpose?

Data Packets contain the following information:

Compare the differences between the following devices?


Switch Hub

How does a Switch learn each workstations MAC address?

www.yahmad.co.uk
Network Describe the role of each Network Device?
Devices
Modem:

Network
Interface
Card:

Bridge:

Server

What are the differences between Bluetooth and Wifi?


Bluetooth Wifi

What software is required when using the Internet?

What are the differences between the internet and Intranet?


Internet Intranet

www.yahmad.co.uk
Provide a brief description of the following types of Networks?
LAN WAN WLAN

Diagram

Accessing the Internet


Device Advantage Disadvantage

Laptop
Computer

Desktop

Tablets

Smart Phones

www.yahmad.co.uk
How can hackers affect your network and data?

Threat to Data:

Threat to Network:

Should the internet be Advantages Disadvantages


policed?

What are The use of passwords?


Authentication Advantages Disadvantages
techniques and why
use them?

Features of a strong password?

What other types of information could be asked for to verify a customer’s


account?

www.yahmad.co.uk
Alternatives Methods of Authentication (Network Security)
Device Overview/Advantage
Biometrics
 Finger Prints
 Retina Scan
 Iris Scans
 Face Scans
 Vocal
Recognition

Magnetic Swipe Cards

Transaction
authentication number
(TAN)

Two factor
authentication

Security issues regarding data transfer: Viruses & Spyware?

What is a computer virus:

What is spyware:

Tips to keep your computer protected from viruses and spyware:

www.yahmad.co.uk
How is a firewall used to keep your computer protected?

What is the purpose of a Proxy Server?

What is data Encryption?


Step 1: Step 2: Step 3:

Principles of the Data Protection Act?

Who does the data protection Act protect?

www.yahmad.co.uk
Device Overview/Advantage
Physical Faxing

Email
Communication

Electronic Faxing

Fax Email
Advantages

Disadvantages

Video Conferencing
Overview: Advantages: Disadvantages:

Hardware:

www.yahmad.co.uk
Audio Conferencing
Overview: Advantages: Hardware:

Web-Conferencing
Overview: Advantages: Hardware:

www.yahmad.co.uk
2015 – 16 Exam Questions

Use examples to describe the difference between a weak password and a strong
password

Describe how data is sent from a networked computer to a computer on a different


network.

Describe two similarities between physical faxing and electronic faxing.

Describe three differences between physical faxing and electronic faxing.

Describe four items which can be provided by an ISP.

www.yahmad.co.uk
Give three reasons why some companies have intranets.

Explain, using examples, what is meant by authentication techniques.

Describe the differences in use between WiFi and Bluetooth.

In order to make reliable information available to all students, schools often put the
information on their intranet. Describe what is meant by an intranet.

Most data protection acts include the principle that data should be stored securely. List
four other principles of a typical data protection act.

www.yahmad.co.uk
Fiona wants to communicate with her friend Myfanwy using her mobile phone.
Describe four ways she could do this.

Describe the details of computer addresses that are stored by a router.

Internet banking can be used by bank customers to check their account balance.
Many ways of logging into such a system involve the use of passwords.

Describe three methods of minimising the possibility of passwords being misused if


intercepted.

Juanita has a computer and a contract with an ISP. When she searches the internet she
does not find relevant information quickly.

Describe three ways she could reduce the amount of excess information she gets without
changing either her computer or ISP.

www.yahmad.co.uk
Discuss the effectiveness of different methods which could be used to prevent
unauthorised access to a laptop computer.

Tick whether the following statements would most appropriately apply to the internet or
an intranet.

A piece of programming code which maliciously deletes files is called


_________________
The scrambling of data to make it unreadable by unauthorised users is called
_________________

A school’s Science department has a network which uses WiFi. A teacher has a laptop
computer and whilst in school wishes to connect to this network.

Write down the name of this type of network.


_________________
In order to access the network the laptop must be within range of a type of WiFi network
device.

Write down the name of this type of device.


_________________

Describe how this device is connected to the network using an ethernet cable.
_________________

www.yahmad.co.uk
WiFi networks can be limited in their range.
Describe one other disadvantage of a WiFi network compared to a cabled network.

Explain what is meant by VOIP.

Name two items of computer hardware that are needed in order to make a VOIP phone call
from one computer to another.

Tick whether the following are features of emails or traditional faxes.

Tick whether the following statements are true or false.

Describe what an ISP is and, apart from security measures, describe what it offers its
customers.

www.yahmad.co.uk
Chapter 5: The Effects of Using ICT
ICT effect on Employment?

Identify and describe increased areas of employment due to ICT:

Identify and describe decreased areas of employment due to ICT:

Describe how ICT has changed the way we can work at home?

Employee
Advantages Disadvantages

Employer
Advantages Disadvantages

Compare Full Time working hours to compressed working hours?

www.yahmad.co.uk
Describe Part Time (flexi-Time):

Describe Job Sharing:

Describe what microprocessor devices are?

Advantages: Disadvantages:

Health Risk and Reason Prevention

Use of IT equipment to minimise the health risks:

Strategies to minimise the health risks:

www.yahmad.co.uk
2015 – 16 Exam Questions
The use of computers has led to some employees changing their working patterns.
Complete the following sentences.
(a) Two or more employees doing the same job but working at different times is called
__________________.

(b) When a person is employed to work fewer hours than the normal working week, this is called
__________________.

(c) When employees work the full normal hours in a week but work at times which suit them and
the employer, this is called ___________________.

(d) When an employee works the full normal hours in a week but works fewer days, this is
____________________.

The introduction of computers into the workplace has caused some changes in
employment.
Identify different types of job where employment has decreased.

Identify different types of job where employment has increased.

There are many microprocessor controlled devices used in the modern home.
Describe two drawbacks in terms of lifestyle changes this has produced for the users of
such devices.

There are many microprocessor-controlled devices used in the modern home.


Describe four benefits in terms of lifestyle for users of such devices.

www.yahmad.co.uk
Key Words
Chapter 1: Types & Components of a Computer System
Hardware

Software

System
Software

Operating
System

Application
Software

GUI

CLI

RAM

ROM

PC/Desktop

Laptop

Tablet

Smart Phone

www.yahmad.co.uk
Key Words
Chapter 2: Input and Output Devices
Input Device

Output Device

Sensor

ADC

OMR

OCR

MICR

Dot_ Matrix
Printer

Ink Jet Printer

Laser Printer

Magnetic Strip
Readers

Chip and Pin


Readers

Contactless
Cards

RFID

Barcode
Scanner

POS

www.yahmad.co.uk
Key Words
Chapter 3: Storage and Media Devices
Secondary
Storage

Backup

Serial
(Sequential
Access)
Direct Access

Magnetic
Storage Devices
Fixed Internal
Hard drive

Portable Hard
drive

Magnetic Tapes

Optical Media

CD-ROM

DVD-ROM

Blu-Ray

CD/DVD R

CD/DVD RW

Solid State

USB Memory
Stick

Memory Card

www.yahmad.co.uk
Key Words
Chapter 4: Networks
Computer Network

Router

Data Packet

Switch

Hub

Modem

Server

Network Interface
Card (NIC)

Bridge

Bluetooth

Server

Internet

Intranet

LAN

WAN

WLAN

Hackers

www.yahmad.co.uk
Computer Virus

Spyware

Firewall

Proxy Server

Authentication
Techniques

User name &


Password

Biometrics

Transaction
Authentication
Number (TAN)

Two Factor
Authentication

Data Encryption

Fax

Email

VOIP

ISP

www.yahmad.co.uk
Key Words
Chapter 5: The Effects of Using ICT
Employment

Employee

Full Time Working


Hours

Part Time Working


Hours

Compressed
Working Hours

Job Sharing

Microprocessor
Devices

Health Risks

www.yahmad.co.uk

S-ar putea să vă placă și