IGCSE Revision Theory Pt1

October 12, 2022 | Author: Anonymous | Category: N/A
Share Embed Donate


Short Description

Download IGCSE Revision Theory Pt1...

Description

 

ICT IGCSE Theory Revision Questions Chapter 1: Types & Components of a Computer System Chapter 2: Input & Output Devices Chapter 3: Storage Devices and Media Chapter 4: Networks Chapter 5: The Effects of Using ICT

Name: www.yahmad.co.uk

 

Chapter 1: Types & Components of a Computer System What is the difference between Hardware and software?

Briefly describe the purpose of the following hardware components: Central Processing Unit (CPU): Motherboard:

Internal Hard Disk:

Sound Card:

Graphics Card:

What are the differences between ROM & RAM? ROM: RAM:

What are the differences between Application & System Software? Application:

System:

Examples with use: Word Processing - Used to prepare reports, school essays

Examples with use:

What is measure and control software used for?

www.yahmad.co.uk

 

What are the main functions f unctions of an operating System?

What are the differences between the CLI & GUI interfaces? CLI: GUI:

Advantages:

Advantages:

Disadvantages:

Disadvantages:

Describe the four main features of the graphical user interface? W I M P

What are the differences between Main Memory and Backing Storage? (4) Main Memory (ROM/RAM/Cache): Backing Storage:

Type of computer and use: Personal Computer:

Advantages

Laptop:

Tablet:

Smart Phone:

www.yahmad.co.uk

Disadvantages

 

2015  – 16 Exam Questions There are a number of different types of computer. Write down the type of computer that best fits the following descriptions.  A computer that that is difficult to move move and has a separate separate monitor monitor and keyboard. keyboard.

 A portable computer computer that includes includes a physical physical keyboard.

 A thin portable portable computer that that has a touch screen screen and a battery battery in a single unit, not normally normally used to make phone calls.

 A mobile phone phone that can be be used as a computer. computer.

Smart phones are used to send and receive emails with and without attachments attachments.. Describe four other ways in which emails can be managed on a smart phone.

Discuss the advantages and disadvantages disadvantages to a teacher of using a tablet computer instead of another type of computer

www.yahmad.co.uk

 

Tick the type of computer which would be most appropriate for each use of ICT.

Tick whether the following are examples of applications software or systems software.

Tick whether the following statements about desktop and laptop computers are true or false false..

Discuss why different user interfaces require the use of different types of input device.

www.yahmad.co.uk

 

Chapter 2: Input & Output Devices List 2 Examples:    

Describe the role of an Input Device? (1)

 

Describe the role of an Output Device? (1)

List 2 Examples: 

  



Describe the role of a Sensor? (1)

List 3 Examples:         

Why does a computer not understand Physical Variables (real world) read from Sensors? (3)

Describe the role of an Actuator? (1)

List 3 Examples:         

Input Device Numeric Key Pad

USE:

Advantage

Mouse

Touch Pad

Web Camera

Microphone

Light Pen

www.yahmad.co.uk

Disadvantage

 

OMR:

Use:

Advantage:

OCR:

Use:

Advantage:

MICR:

Use:

Advantage:

Keyboard:

Disadvantage of Using a Keyboard to input data over the direct data input devices?

Magnetic Strip Readers

Advantages

Disadvantages

Advantages

Disadvantages

Advantages

Disadvantages

Advantages

Disadvantages

Use: Chip and Pin Readers

Use: Contactless Cards

Use:

RFID (Radio Frequency Identification) 

Use:

www.yahmad.co.uk

 

Type of Printer: Dot Matrix:

Use

Advantages

Disadvantages

Inkjet Printer:

Laser Printer:

3D Printer

Wide Format Printer/Plotter

Compare the use of Magnetic Strip Reader, Chip and Pin Reader, Contactless Cards Point, barcode scanner and number pad at the POS (Point of Sale)?

www.yahmad.co.uk

 

Describe the input and output devices used in a video conference?

Describe the input and output devices used in a teachers classroom

Compare the advantages and disadvantages of the CRT and the LCD monitor?

Compare the use of the Dot Matrix, Inkjet and Laser Printers identifying advantages and disadvantages?

www.yahmad.co.uk

 

2015  – 16 Exam Questions

The inbuilt device which moves the cursor when using a laptop is called a _____________ The device used for selecting an icon so a bar code label can be printed in a supermarket is called a _________________ The device used for controlling a pointer on a screen when the user has limited motor skills is called a _______________ ___________________ ____ This is provided with a laptop to imitate the functions of a mouse. ________________ ________________ This is not a mouse but is used to manoeuvre objects around the screen in computer video games. __________________ This is used to type in text. __________________ This is used for direct input of hard copy images __________________

www.yahmad.co.uk

 

Data can be input to a computer using different devices. Write down the most appropriate input device which will enable you to: (a) type an essay: __________________ (b) select options from a drop down menu whilst moving the device: __________________ (c) read the temperature: __________________ (d) fly an aircraft in a video game: __________________ Data can be input to a computer using direct data entry methods. Write down the most appropriate device to input the following: (a) information from the chip in an electronic passport:  ________________  ________ __________ __ (b) text from an id card:  ________________  ________ __________ __ (c) account details from the front of a credit card at an EFTPOS terminal:  ________________  ________ __________  __   (d) account details from the back of a credit card at an EFTPOS terminal:  ________________  ________ __________ __ Describe how MICR is used to read these details from the cheque.

Discuss why different user interfaces require the use of different types of input device.

www.yahmad.co.uk

 

Chapter 3: Storage Devices and Media What is Secondary Storage?

List 3 Storage Mediums:

What is meant by Backup?

Why would you backup:

How would you make a personal backup?

How would businesses backup?

List features of the Main Memory

List features of Backing Storage

Compare the differences between Serial and Direct Access?

List the different types of storage Medium: Magnetic Storage Optical Media Solid ‘state’  ‘state’  Devices

Compare the differences between Magnetic, Optical and Solid State storage medium?

www.yahmad.co.uk

 

Name Fixed Internal Hard Drive

Storage Medium (Magnetic) Use Advantages

Disadvantages

Storage Medium (Optical) Use Advantages

Disadvantages

Portable Hard Drive Magnetic Tapes

Name CD-ROM

DVDROM Blu-Ray

Compare the differences between CD/DVD R, CD/DVD RW and DVD RAM

Name USB Memory Stick

Storage Medium (Solid ‘state’) ‘state’)   Use Advantages

Memory Card

www.yahmad.co.uk

Disadvantages

 

2015  – 16 Exam Questions Describe the characteristics characteristics and uses of different types of DVD

Compare and contrast the use of optical discs and the use of fixed magnetic disks to store data.

www.yahmad.co.uk

 

Chapter 4: Networks What is a Computer Network?

Advantages of using Networks

Disadvantages of using Networks

Understand how a Router works and its purpose?

Data Packets contain the following information:

Compare the differences between the following devices? Switch

Hub

How does a Switch learn each workstations w orkstations MAC address?

www.yahmad.co.uk

 

Network Devices Modem:

Describe the role of each Network Device?

Network Interface Card: Bridge:

Server

What are the differences between Bluetooth and Wifi? Bluetooth Wifi

What software is required when using the Internet?

What are the differences between the internet and Intranet? Internet Intranet

www.yahmad.co.uk

 

Provide a brief description of the following follow ing types of Networks? LAN WAN WLAN

Diagram

Accessing the Internet Device

Advantage

Laptop Computer

Desktop

Tablets

Smart Phones

www.yahmad.co.uk

Disadvantage

 

How can hackers affect your network and data? Threat to Data:

Threat to Network:

Should the internet be policed?

What are Authentication techniques and why use them?

Advantages

Disadvantages

The use of passwords? Advantages

Disadvantages

Features of a strong password?

What other types of information could be asked for to verify a customer’s customer’s   account?

www.yahmad.co.uk

 

Alternatives Methods of Authentication (Network Security) Device Overview/Advantage Biometrics   Finger Prints   Retina Scan   Iris Scans   Face Scans 







  Vocal Recognition



Magnetic Swipe Cards

Transaction authentication number (TAN)

Two factor authentication

Security issues regarding data transfer: Viruses & Spyware? What is a computer virus:

What is spyware:

Tips to keep your computer protected from viruses and spyware:

www.yahmad.co.uk

 

How is a firewall f irewall used to keep your computer protected?

What is the purpose of a Proxy Server?

What is data Encryption? E ncryption? Step 1:

Step 2:

Principles of the Data Protection Act?

Who does the data protection Act protect?

www.yahmad.co.uk

Step 3:

 

Device Physical Faxing

Overview/Advantage

Email Communication

Electronic Faxing

Fax

Email

Advantages   Advantages

Disadvantages   Disadvantages

Video Conferencing Overview:

Advantages:

Hardware:

www.yahmad.co.uk

Disadvantages:

 

Audio Conferencing Overview:

Advantages:

Hardware:

Web-Conferencing Overview:

Advantages:

Hardware:

www.yahmad.co.uk

 

2015  – 16 Exam Questions Use examples to describe the difference between a weak password and a strong password

Describe how data is sent from a networked computer to a computer on a different network.

Describe two similarities between physical faxing and electronic faxing.

Describe three differences between physical faxing and electronic faxing.

Describe four items which can be provided by an ISP.

www.yahmad.co.uk

 

Give three reasons why some companies have intranets.

Explain, using examples, what is meant by authentication techniques.

Describe the differences in use between WiFi and Bluetooth.

In order to make reliable information available to all students, schools often put the information on their intranet. Describe what is meant by an intranet.

Most data protection acts include the principle that data should be stored securely. securely. List four other principles of a typical data protection act.

www.yahmad.co.uk

 

Fiona wants to communicate with her friend Myfanwy using her mobile phone. Describe four ways she could do this.

Describe the details of computer addresses that are stored by a router.

Internet banking can be used by bank customers customers to check their account balance. Many ways of logging into such a system involve the use of passwords. Describe three methods of minimising the possibility of passwords being misused if intercepted.

Juanita has a computer and a contract with an ISP. When she searches the internet she does not find relevant information quickly. Describe three ways she could reduce the amount of excess information she gets without changing either her computer or ISP.

www.yahmad.co.uk

 

Discuss the effectiveness of different methods which could be used to prevent unauthorised access to a laptop computer.

Tick whether the following statements would most appropriately apply apply to the internet or an intranet.

A piece of programming code which maliciously deletes files is called  ________________  _________ ________ _ The scrambling of data to make it unreadable by unauthorised users is called  ________________  _________ ________ _

A school’s Science department has a network which uses WiFi. A teacher te acher has a laptop computer and whilst in school wishes to connect to this network. Write down the name of this type of network.  ________________  _________ ________ _ In order to access the network the laptop must be within range of a type of WiFi network device. Write down the name of this type of device.  ________________  _________ ________ _ Describe how this device is connected to the network using an ethernet cable.  ________________  _________ ________ _

www.yahmad.co.uk

 

WiFi networks can be limited in their range. Describe one other disadvantage of a WiFi network compared to a cabled network.

Explain what is meant by VOIP.

Name two items of computer hardware that are needed in order to make a VOIP phone call from one computer to another.

Tick whether the following are features of emails or traditional faxes.

Tick whether the following statements are true or false.

Describe what an ISP is and, apart from security measures, describe what it offers its customers.

www.yahmad.co.uk

 

Chapter 5: The Effects of Using ICT ICT effect on Employment? Identify and describe increased areas of employment due to ICT:

Identify and describe decreased areas of employment due to ICT:

Describe how ICT has changed the way we can work at home?

Employee Advantages

Disadvantages

Employer Advantages

Disadvantages

Compare Full Time working hours to compressed working hours?

www.yahmad.co.uk

 

Describe Part Time (flexi-Time):

Describe Job Sharing:

Describe what microprocessor devices are?

Advantages:

Disadvantages:

Health Risk and Reason

Prevention

Use of IT equipment to minimise the health risks:

Strategies to minimise the health risks:

www.yahmad.co.uk

 

2015  – 16 Exam Questions The use of computers has led to some employees changing their working patterns. Complete the following sentences. (a) Two or more employees doing the same job but working at different times is called  ________________  _________ _________. __. (b) When a person is employed to work fewer hours than the normal working week, this is called

 ________________  _________ _________. __. (c) When employees work the full normal hours in a week but work at times which suit them and the employer, this is called ___________________.

hours in a week but works fewer days, this is (d) When an employee works the full normal hours  ____________________.  ________________ ____.

The introduction of computers into the workplace has caused some changes in employment. Identify different types of job where employment has decreased decreased..

Identify different types of job where employment has increased increased..

There are many microprocessor controlled devices used in the modern home. Describe two drawbacks in terms of lifestyle changes this has produced for the users of such devices.  devices. 

There are many microprocessor-controlled devices used in the modern home. Describe four benefits in terms of lifestyle for users of such devices. devices.  

www.yahmad.co.uk

 

Key Words Chapter 1: Types & Components of a Computer System   Hardware

Software

System Software Operating System Application Software GUI

CLI

RAM

ROM

PC/Desktop

Laptop

Tablet

Smart Phone

www.yahmad.co.uk

 

Key Words Chapter 2: Input and Output Devices   Input Device

Output Device

Sensor

ADC

OMR

OCR

MICR

Dot_ Matrix Printer Ink Jet Printer

Laser Printer

Magnetic Strip Readers Chip and Pin Readers Contactless Cards RFID

Barcode Scanner POS

www.yahmad.co.uk

 

Key Words Chapter 3: Storage and Media Devices   Secondary Storage Backup

Serial (Sequential Access) Direct Access

Magnetic Storage Devices Fixed Internal Hard drive Portable Hard drive Magnetic Tapes Optical Media CD-ROM

DVD-ROM

Blu-Ray

CD/DVD R

CD/DVD RW Solid State USB Memory Stick Memory Card

www.yahmad.co.uk

 

Key Words Chapter 4: Networks  Computer Network

Router

Data Packet

Switch

Hub

Modem

Server Network Interface Card (NIC) Bridge

Bluetooth Server

Internet

Intranet

LAN

WAN

WLAN

Hackers

www.yahmad.co.uk

 

Computer Virus

Spyware

Firewall

Proxy Server

Authentication Techniques

User name & Password

Biometrics

Transaction Authentication Number (TAN) Two Factor Authentication

Data Encryption

Fax

Email

VOIP

ISP

www.yahmad.co.uk

 

Key Words Chapter 5: The Effects of Using ICT  Employment

Employee

Full Time Working Hours Part Time Working Hours Compressed Working Hours Job Sharing

Microprocessor Devices Health Risks

www.yahmad.co.uk

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF