IGCSE ICT Chapter-Based Past Questions
IGCSE ICT Chapter-Based Past Questions
In ICT terminology, hardware refers to the physical components of a computer system like the hard disk drive and peripherals such as microphones and printers. In contrast, software encompasses the programs and applications that instruct the hardware on what tasks to perform. Software includes systems software that helps operate the hardware and applications software that performs specific tasks .
A touch screen qualifies as both an input and output device because it displays graphical user interfaces (output) while simultaneously allowing user input through touch gestures. Users can interact with the screen to provide commands or data, and the system simultaneously displays information or graphics .
Quantum cryptography promises to significantly enhance digital communication security through the use of quantum mechanics principles, making it nearly impossible for eavesdroppers to intercept messages without detection. This level of security is expected to outstrip current methods due to its theoretical ability to secure encryption keys against any computational decryption attempts .
A microphone can serve as an input device by capturing audio to convert into digital data, useful in applications like voice commands or recording. Additionally, it acts as a collaborative tool in virtual meetings or online gaming, allowing real-time voice communication and interaction among users, enhancing user experience and collaboration .
Command-line interfaces (CLI) require users to interact with the computer by typing text-based commands, providing a more text-based and direct form of communication with the system. In contrast, graphical user interfaces (GUI) allow users to interact through visual elements such as icons and buttons, which makes it more intuitive and accessible for non-technical users .
ROM, or Read Only Memory, is non-volatile, meaning it retains data even when the power is off. This contrasts with RAM, which is volatile. ROM is used to store firmware essential for boot processes, making it critical for starting computers. This permanence ensures that essential instructions are always available regardless of system state .
Encryption enhances computer system security by converting data into a coded form that is unreadable without a decryption key. This ensures that unauthorized users cannot access or understand the data, protecting sensitive information from being intercepted or compromised during transmission .
A dongle is commonly used for software licensing to ensure that only authorized users can access the software, acting as a physical key that must be present for the software to run. This prevents unauthorized distribution and use. The hardware aspect adds a layer of security against digital piracy and enables offline verification .
A web camera enhances user interaction by enabling video communication, contributing to more engaging online meetings and social interactions. It allows users to participate in video calls, record videos, and take photos, facilitating real-time visual communication and collaboration, which has become increasingly essential in remote work setups .
System software serves as a bridge between hardware and user applications, managing the basic functions of the computer and enabling other software to run. It includes the operating system and utilities. Applications software, on the other hand, is designed to help users perform specific tasks, such as word processing, browsing the web, or playing games .