ICT IGCSE Theory Revision Questions Chapter 1: Types & Components of a Computer System Chapter 2: Input & Output Devices Chapter 3: Storage Devices and Media Chapter 4: Networks Chapter 5: The Effects of Using ICT
Name: www.yahmad.co.uk
Chapter 1: Types & Components of a Computer System What is the difference between Hardware and software?
Briefly describe the purpose of the following hardware components: Central Processing Unit (CPU): Motherboard:
Internal Hard Disk:
Sound Card:
Graphics Card:
What are the differences between ROM & RAM? ROM: RAM:
What are the differences between Application & System Software? Application:
System:
Examples with use: Word Processing - Used to prepare reports, school essays
Examples with use:
What is measure and control software used for?
www.yahmad.co.uk
What are the main functions f unctions of an operating System?
What are the differences between the CLI & GUI interfaces? CLI: GUI:
Advantages:
Advantages:
Disadvantages:
Disadvantages:
Describe the four main features of the graphical user interface? W I M P
What are the differences between Main Memory and Backing Storage? (4) Main Memory (ROM/RAM/Cache): Backing Storage:
Type of computer and use: Personal Computer:
Advantages
Laptop:
Tablet:
Smart Phone:
www.yahmad.co.uk
Disadvantages
2015 – 16 Exam Questions There are a number of different types of computer. Write down the type of computer that best fits the following descriptions. A computer that that is difficult to move move and has a separate separate monitor monitor and keyboard. keyboard.
A portable computer computer that includes includes a physical physical keyboard.
A thin portable portable computer that that has a touch screen screen and a battery battery in a single unit, not normally normally used to make phone calls.
A mobile phone phone that can be be used as a computer. computer.
Smart phones are used to send and receive emails with and without attachments attachments.. Describe four other ways in which emails can be managed on a smart phone.
Discuss the advantages and disadvantages disadvantages to a teacher of using a tablet computer instead of another type of computer
www.yahmad.co.uk
Tick the type of computer which would be most appropriate for each use of ICT.
Tick whether the following are examples of applications software or systems software.
Tick whether the following statements about desktop and laptop computers are true or false false..
Discuss why different user interfaces require the use of different types of input device.
www.yahmad.co.uk
Chapter 2: Input & Output Devices List 2 Examples:
Describe the role of an Input Device? (1)
Describe the role of an Output Device? (1)
List 2 Examples:
Describe the role of a Sensor? (1)
List 3 Examples:
Why does a computer not understand Physical Variables (real world) read from Sensors? (3)
Describe the role of an Actuator? (1)
List 3 Examples:
Input Device Numeric Key Pad
USE:
Advantage
Mouse
Touch Pad
Web Camera
Microphone
Light Pen
www.yahmad.co.uk
Disadvantage
OMR:
Use:
Advantage:
OCR:
Use:
Advantage:
MICR:
Use:
Advantage:
Keyboard:
Disadvantage of Using a Keyboard to input data over the direct data input devices?
Magnetic Strip Readers
Advantages
Disadvantages
Advantages
Disadvantages
Advantages
Disadvantages
Advantages
Disadvantages
Use: Chip and Pin Readers
Use: Contactless Cards
Use:
RFID (Radio Frequency Identification)
Use:
www.yahmad.co.uk
Type of Printer: Dot Matrix:
Use
Advantages
Disadvantages
Inkjet Printer:
Laser Printer:
3D Printer
Wide Format Printer/Plotter
Compare the use of Magnetic Strip Reader, Chip and Pin Reader, Contactless Cards Point, barcode scanner and number pad at the POS (Point of Sale)?
www.yahmad.co.uk
Describe the input and output devices used in a video conference?
Describe the input and output devices used in a teachers classroom
Compare the advantages and disadvantages of the CRT and the LCD monitor?
Compare the use of the Dot Matrix, Inkjet and Laser Printers identifying advantages and disadvantages?
www.yahmad.co.uk
2015 – 16 Exam Questions
The inbuilt device which moves the cursor when using a laptop is called a _____________ The device used for selecting an icon so a bar code label can be printed in a supermarket is called a _________________ The device used for controlling a pointer on a screen when the user has limited motor skills is called a _______________ ___________________ ____ This is provided with a laptop to imitate the functions of a mouse. ________________ ________________ This is not a mouse but is used to manoeuvre objects around the screen in computer video games. __________________ This is used to type in text. __________________ This is used for direct input of hard copy images __________________
www.yahmad.co.uk
Data can be input to a computer using different devices. Write down the most appropriate input device which will enable you to: (a) type an essay: __________________ (b) select options from a drop down menu whilst moving the device: __________________ (c) read the temperature: __________________ (d) fly an aircraft in a video game: __________________ Data can be input to a computer using direct data entry methods. Write down the most appropriate device to input the following: (a) information from the chip in an electronic passport: ________________ ________ __________ __ (b) text from an id card: ________________ ________ __________ __ (c) account details from the front of a credit card at an EFTPOS terminal: ________________ ________ __________ __ (d) account details from the back of a credit card at an EFTPOS terminal: ________________ ________ __________ __ Describe how MICR is used to read these details from the cheque.
Discuss why different user interfaces require the use of different types of input device.
www.yahmad.co.uk
Chapter 3: Storage Devices and Media What is Secondary Storage?
List 3 Storage Mediums:
What is meant by Backup?
Why would you backup:
How would you make a personal backup?
How would businesses backup?
List features of the Main Memory
List features of Backing Storage
Compare the differences between Serial and Direct Access?
List the different types of storage Medium: Magnetic Storage Optical Media Solid ‘state’ ‘state’ Devices
Compare the differences between Magnetic, Optical and Solid State storage medium?
www.yahmad.co.uk
Name Fixed Internal Hard Drive
Storage Medium (Magnetic) Use Advantages
Disadvantages
Storage Medium (Optical) Use Advantages
Disadvantages
Portable Hard Drive Magnetic Tapes
Name CD-ROM
DVDROM Blu-Ray
Compare the differences between CD/DVD R, CD/DVD RW and DVD RAM
Name USB Memory Stick
Storage Medium (Solid ‘state’) ‘state’) Use Advantages
Memory Card
www.yahmad.co.uk
Disadvantages
2015 – 16 Exam Questions Describe the characteristics characteristics and uses of different types of DVD
Compare and contrast the use of optical discs and the use of fixed magnetic disks to store data.
www.yahmad.co.uk
Chapter 4: Networks What is a Computer Network?
Advantages of using Networks
Disadvantages of using Networks
Understand how a Router works and its purpose?
Data Packets contain the following information:
Compare the differences between the following devices? Switch
Hub
How does a Switch learn each workstations w orkstations MAC address?
www.yahmad.co.uk
Network Devices Modem:
Describe the role of each Network Device?
Network Interface Card: Bridge:
Server
What are the differences between Bluetooth and Wifi? Bluetooth Wifi
What software is required when using the Internet?
What are the differences between the internet and Intranet? Internet Intranet
www.yahmad.co.uk
Provide a brief description of the following follow ing types of Networks? LAN WAN WLAN
Diagram
Accessing the Internet Device
Advantage
Laptop Computer
Desktop
Tablets
Smart Phones
www.yahmad.co.uk
Disadvantage
How can hackers affect your network and data? Threat to Data:
Threat to Network:
Should the internet be policed?
What are Authentication techniques and why use them?
Advantages
Disadvantages
The use of passwords? Advantages
Disadvantages
Features of a strong password?
What other types of information could be asked for to verify a customer’s customer’s account?
www.yahmad.co.uk
Alternatives Methods of Authentication (Network Security) Device Overview/Advantage Biometrics Finger Prints Retina Scan Iris Scans Face Scans
Vocal Recognition
Magnetic Swipe Cards
Transaction authentication number (TAN)
Two factor authentication
Security issues regarding data transfer: Viruses & Spyware? What is a computer virus:
What is spyware:
Tips to keep your computer protected from viruses and spyware:
www.yahmad.co.uk
How is a firewall f irewall used to keep your computer protected?
What is the purpose of a Proxy Server?
What is data Encryption? E ncryption? Step 1:
Step 2:
Principles of the Data Protection Act?
Who does the data protection Act protect?
www.yahmad.co.uk
Step 3:
Device Physical Faxing
Overview/Advantage
Email Communication
Electronic Faxing
Fax
Email
Advantages Advantages
Disadvantages Disadvantages
Video Conferencing Overview:
Advantages:
Hardware:
www.yahmad.co.uk
Disadvantages:
Audio Conferencing Overview:
Advantages:
Hardware:
Web-Conferencing Overview:
Advantages:
Hardware:
www.yahmad.co.uk
2015 – 16 Exam Questions Use examples to describe the difference between a weak password and a strong password
Describe how data is sent from a networked computer to a computer on a different network.
Describe two similarities between physical faxing and electronic faxing.
Describe three differences between physical faxing and electronic faxing.
Describe four items which can be provided by an ISP.
www.yahmad.co.uk
Give three reasons why some companies have intranets.
Explain, using examples, what is meant by authentication techniques.
Describe the differences in use between WiFi and Bluetooth.
In order to make reliable information available to all students, schools often put the information on their intranet. Describe what is meant by an intranet.
Most data protection acts include the principle that data should be stored securely. securely. List four other principles of a typical data protection act.
www.yahmad.co.uk
Fiona wants to communicate with her friend Myfanwy using her mobile phone. Describe four ways she could do this.
Describe the details of computer addresses that are stored by a router.
Internet banking can be used by bank customers customers to check their account balance. Many ways of logging into such a system involve the use of passwords. Describe three methods of minimising the possibility of passwords being misused if intercepted.
Juanita has a computer and a contract with an ISP. When she searches the internet she does not find relevant information quickly. Describe three ways she could reduce the amount of excess information she gets without changing either her computer or ISP.
www.yahmad.co.uk
Discuss the effectiveness of different methods which could be used to prevent unauthorised access to a laptop computer.
Tick whether the following statements would most appropriately apply apply to the internet or an intranet.
A piece of programming code which maliciously deletes files is called ________________ _________ ________ _ The scrambling of data to make it unreadable by unauthorised users is called ________________ _________ ________ _
A school’s Science department has a network which uses WiFi. A teacher te acher has a laptop computer and whilst in school wishes to connect to this network. Write down the name of this type of network. ________________ _________ ________ _ In order to access the network the laptop must be within range of a type of WiFi network device. Write down the name of this type of device. ________________ _________ ________ _ Describe how this device is connected to the network using an ethernet cable. ________________ _________ ________ _
www.yahmad.co.uk
WiFi networks can be limited in their range. Describe one other disadvantage of a WiFi network compared to a cabled network.
Explain what is meant by VOIP.
Name two items of computer hardware that are needed in order to make a VOIP phone call from one computer to another.
Tick whether the following are features of emails or traditional faxes.
Tick whether the following statements are true or false.
Describe what an ISP is and, apart from security measures, describe what it offers its customers.
www.yahmad.co.uk
Chapter 5: The Effects of Using ICT ICT effect on Employment? Identify and describe increased areas of employment due to ICT:
Identify and describe decreased areas of employment due to ICT:
Describe how ICT has changed the way we can work at home?
Employee Advantages
Disadvantages
Employer Advantages
Disadvantages
Compare Full Time working hours to compressed working hours?
www.yahmad.co.uk
Describe Part Time (flexi-Time):
Describe Job Sharing:
Describe what microprocessor devices are?
Advantages:
Disadvantages:
Health Risk and Reason
Prevention
Use of IT equipment to minimise the health risks:
Strategies to minimise the health risks:
www.yahmad.co.uk
2015 – 16 Exam Questions The use of computers has led to some employees changing their working patterns. Complete the following sentences. (a) Two or more employees doing the same job but working at different times is called ________________ _________ _________. __. (b) When a person is employed to work fewer hours than the normal working week, this is called
________________ _________ _________. __. (c) When employees work the full normal hours in a week but work at times which suit them and the employer, this is called ___________________.
hours in a week but works fewer days, this is (d) When an employee works the full normal hours ____________________. ________________ ____.
The introduction of computers into the workplace has caused some changes in employment. Identify different types of job where employment has decreased decreased..
Identify different types of job where employment has increased increased..
There are many microprocessor controlled devices used in the modern home. Describe two drawbacks in terms of lifestyle changes this has produced for the users of such devices. devices.
There are many microprocessor-controlled devices used in the modern home. Describe four benefits in terms of lifestyle for users of such devices. devices.
www.yahmad.co.uk
Key Words Chapter 1: Types & Components of a Computer System Hardware
Software
System Software Operating System Application Software GUI
CLI
RAM
ROM
PC/Desktop
Laptop
Tablet
Smart Phone
www.yahmad.co.uk
Key Words Chapter 2: Input and Output Devices Input Device
Output Device
Sensor
ADC
OMR
OCR
MICR
Dot_ Matrix Printer Ink Jet Printer
Laser Printer
Magnetic Strip Readers Chip and Pin Readers Contactless Cards RFID
Barcode Scanner POS
www.yahmad.co.uk
Key Words Chapter 3: Storage and Media Devices Secondary Storage Backup
Serial (Sequential Access) Direct Access
Magnetic Storage Devices Fixed Internal Hard drive Portable Hard drive Magnetic Tapes Optical Media CD-ROM
DVD-ROM
Blu-Ray
CD/DVD R
CD/DVD RW Solid State USB Memory Stick Memory Card
www.yahmad.co.uk
Key Words Chapter 4: Networks Computer Network
Router
Data Packet
Switch
Hub
Modem
Server Network Interface Card (NIC) Bridge
Bluetooth Server
Internet
Intranet
LAN
WAN
WLAN
Hackers
www.yahmad.co.uk
Computer Virus
Spyware
Firewall
Proxy Server
Authentication Techniques
User name & Password
Biometrics
Transaction Authentication Number (TAN) Two Factor Authentication
Data Encryption
Fax
Email
VOIP
ISP
www.yahmad.co.uk
Key Words Chapter 5: The Effects of Using ICT Employment
Employee
Full Time Working Hours Part Time Working Hours Compressed Working Hours Job Sharing
Thank you for interesting in our services. We are a non-profit group that run this website to share documents. We need your help to maintenance this website.