Revision Theory Open Quiz
Revision Theory Open Quiz
Questions
Page 1 of 53
Student Name:
Motherboard:
Sound Card:
Graphics Card:
1. 1.
2. 2.
3. 3.
4. 4.
Page 2 of 53
What are the differences between Application & System Software?
Application: System:
1. 1.
2. 2.
What are the differences between the CLI & GUI interfaces?
CLI: GUI:
Advantages: Advantages:
Disadvantages: Disadvantages:
Page 3 of 53
Describe the four main features of the graphical user interface?
W:
I:
M:
P:
What are the differences between Main Memory and Backing Storage? (4)
Main Memory (RAM/Cache): Backing Storage:
1. 1.
2. 2.
3. 3.
4. 4.
2. 2.
3. 3.
Laptop:
1. 1.
2. 2.
3. 3.
Tablet:
1. 1.
2. 2.
3. 3.
Smart Phone: 1.
1.
2.
2.
3.
3.
Page 4 of 53
2015 – 16 Exam Questions
There are a number of different types of computer.
Write down the type of computer that best fits the following descriptions.
A computer that is difficult to move and has a separate monitor and keyboard.
_____________________________________________________________
______________________________________________________________
A thin portable computer that has a touch screen and a battery in a single unit, not normally used to make
phone calls.
_______________________________________________________________
________________________________________________________________
Discuss the advantages and disadvantages to a teacher of using a tablet computer instead of another
type of computer
Page 5 of 53
Tick the type of computer which would be most appropriate for each use of ICT.
Tick whether the following are examples of applications software or systems software.
Tick whether the following statements about desktop and laptop computers are true or false.
Discuss why different user interfaces require the use of different types of input device.[4]
Page 6 of 53
Technology Definition Usage
Artificial
Intelligence
Biometrics
Quantum
Cryptography
Hologram
3D Printing
Computer Aided
Translator
Vision
Enhancement
Virtual Reality
Page 7 of 53
1. Tick whether the following are examples of applications software or system software.
applications system
software software (✓)
(✓ )
Control software
Compiler
Word processing
Device drivers
Linker
Photo Editing
[2]
2. Tick whether the following statements about desktop and laptop computers are true or false.
TRUE FALSE
RAM is volatile
Page 8 of 53
Chapter 2: Input & Output Devices
Describe the role of an Input Device? (1) List 2 Examples:
1.
2.
3.
1.
2.
3.
1.
2.
3.
Why does a computer not understand Physical Variables (real world) read from Sensors? (3)
1.
2.
3.
Page 9 of 53
Input Device USE: Advantage Disadvantage
Numeric Key
Pad
Mouse
Touch Pad
Web Camera
Microphone
Light Pen
Page 10 of 53
MICR: Use: Advantage:
Keyboard: Disadvantage of Using a Keyboard to input data over the direct data input devices?
Readers
Use:
Readers
Use:
Use:
Page 11 of 53
Advantages Disadvantages
RFID (Radio
Frequency
Identification)
Use:
Inkjet Printer:
Laser Printer:
3D Printer
Wide Format
Printer/Plotter
Page 12 of 53
Compare the use of Magnetic Strip Reader, Chip and Pin Reader, Contactless Cards
Point, barcode scanner and number pad at the POS (Point of Sale)?
Compare the advantages and disadvantages of the CRT and the LCD monitor?
Page 13 of 53
Compare the use of the Dot Matrix, Inkjet and Laser Printers identifying advantages and
disadvantages?
The inbuilt device which moves the cursor when using a laptop is called a _____________
The device used for selecting an icon so a bar code label can be printed in a supermarket is called a
_________________
The device used for controlling a pointer on a screen when the user
has limited motor skills is called a ___________________
This is not a mouse but is used to manoeuvre objects around the screen in computer video
Page 14 of 53
games. __________________
Data can be input to a computer using different devices. Write down the most appropriate input
device which will enable you to:
__________________
__________________
(c) account details from the front of a credit card at an EFTPOS terminal:
__________________
(d) account details from the back of a credit card at an EFTPOS terminal:
__________________
Describe how MICR is used to read these details from the cheque.
Discuss why different user interfaces require the use of different types of input device.
Page 15 of 53
Chapter 3: Storage Devices and Media
1.
2.
3.
1. 1.
2. 2.
3. 3.
Page 16 of 53
List the different types of storage Medium:
Magnetic Storage Optical Media Solid ‘state’
Devices
Compare the differences between Magnetic, Optical and Solid-State storage medium?
Portable Hard
Drive
Magnetic Tapes
Page 17 of 53
Storage Medium (Optical)
Name Use Advantages Disadvantages
CD-ROM
DVD-
ROM
Blu-Ray
Compare the differences between CD/DVD R, CD/DVD RW and DVD RAM and mention
usages of each:
Page 18 of 53
Storage Medium (Solid ‘state’)
Name Use Advantages Disadvantages
USB Memory
Stick
Memory Card
Page 19 of 53
2015 – 16 Exam Questions
Compare and contrast the use of optical discs and the use of fixed magnetic disks to store data.
Page 20 of 53
Chapter 4: Networks
What is a Computer Network?
Page 21 of 53
How does a Switch learn each workstations MAC address?
Network
Interface
Card:
Bridge:
Server
Page 22 of 53
Provide a brief description of the following types of Networks?
LAN WAN WLAN
Diagram
Laptop
Computer
Desktop
Tablets
Smart Phones
Page 23 of 53
How can hackers affect your network and data?
Threat to Data:
Threat to Network:
What other types of information could be asked for to verify a customer’s account?
Page 24 of 53
Alternatives Methods of Authentication (Network Security)
Device Overview/Advantage
Biometrics
Finger Prints
Retina Scan
Iris Scans
Face Scans
Vocal
Recognition
Transaction
authentication number
(TAN)
Two factor
authentication
What is spyware:
Page 25 of 53
Tips to keep your computer protected from viruses and spyware:
Page 26 of 53
Who does the data protection Act protect?
Device Overview/Advantage
Physical Faxing
Email
Communication
Electronic Faxing
Fax Email
Advantages
Disadvantages
Page 27 of 53
Video Conferencing
Overview: Advantages: Disadvantages:
Hardware:
Audio Conferencing
Overview: Advantages: Hardware:
Web-Conferencing
Overview: Advantages: Hardware:
Page 28 of 53
Page 29 of 53
2015 – 16 Exam Questions
Use examples to describe the difference between a weak password and a strong password
Describe how data is sent from a networked computer to a computer on a different network.
Page 30 of 53
Give three reasons why some companies have intranets.
In order to make reliable information available to all students, schools often put the information on
their intranet. Describe what is meant by an intranet.
Most data protection acts include the principle that data should be stored securely. List four other
principles of a typical data protection act.
Page 31 of 53
Fiona wants to communicate with her friend Myfanwy using her mobile phone.
Describe four ways she could do this.
Internet banking can be used by bank customers to check their account balance.
Many ways of logging into such a system involve the use of passwords.
Describe three methods of minimising the possibility of passwords being misused if intercepted.
Juanita has a computer and a contract with an ISP. When she searches the internet she does not
find relevant information quickly.
Describe three ways she could reduce the amount of excess information she gets without changing
either her computer or ISP.
Page 32 of 53
Discuss the effectiveness of different methods which could be used to prevent unauthorised
access to a laptop computer.
Tick whether the following statements would most appropriately apply to the internet or an intranet.
A school’s Science department has a network which uses WiFi. A teacher has a laptop computer
and whilst in school wishes to connect to this network.
In order to access the network the laptop must be within range of a type of WiFi network device.
Describe how this device is connected to the network using an ethernet cable.
_________________
Page 33 of 53
WiFi networks can be limited in their range.
Describe one other disadvantage of a WiFi network compared to a cabled network.
Name two items of computer hardware that are needed in order to make a VOIP phone call from one
computer to another.
Describe what an ISP is and, apart from security measures, describe what it offers its customers.
Page 34 of 53
Chapter 5: The Effects of Using ICT
ICT effect on Employment?
Describe how ICT has changed the way we can work at home?
Employee
Advantages Disadvantages
Employer
Advantages Disadvantages
Page 35 of 53
Compare Full Time working hours to compressed working hours?
Advantages: Disadvantages:
Page 36 of 53
Use of IT equipment to minimise the health risks:
Page 37 of 53
2015 – 16 Exam Questions
The use of computers has led to some employees changing their working patterns.
Complete the following sentences.
(a) Two or more employees doing the same job but working at different times is called __________________.
(b) When a person is employed to work fewer hours than the normal working week, this is called
__________________.
(c) When employees work the full normal hours in a week but work at times which suit them and the
employer, this is called ___________________.
(d) When an employee works the full normal hours in a week but works fewer days, this is
____________________.
The introduction of computers into the workplace has caused some changes in employment.
Identify different types of job where employment has decreased.
There are many microprocessor controlled devices used in the modern home.
Describe two drawbacks in terms of lifestyle changes this has produced for the users of such devices.
Page 38 of 53
Key Words
Software
System
Software
Operating
System
Application
Software
GUI
CLI
RAM
ROM
PC/Desktop
Laptop
BIOS
CMOS
Page 39 of 53
Key Words
Output Device
Sensor
ADC
OMR
OCR
MICR
Dot_ Matrix
Printer
Laser Printer
Magnetic Strip
Readers
Contactless
Cards
RFID
Barcode
Scanner
POS
Page 40 of 53
Key Words
Backup
Serial
(Sequential
Access)
Direct Access
Magnetic
Storage Devices
Fixed Internal
Hard drive
Portable Hard
drive
Magnetic Tapes
Optical Media
CD-ROM
DVD-ROM
Blu-Ray
CD/DVD R
CD/DVD RW
Solid State
USB Memory
Stick
Memory Card
Page 41 of 53
Key Words
Chapter 4: Networks
Computer Network
Router
Data Packet
Switch
Hub
Modem
Server
Network Interface
Card (NIC)
Bridge
Bluetooth
Server
Internet
Intranet
LAN
WAN
WLAN
Hackers
Page 42 of 53
Computer Virus
Spyware
Firewall
Proxy Server
Authentication
Techniques
Biometrics
Transaction
Authentication
Number (TAN)
Two Factor
Authentication
Data Encryption
Fax
VOIP
ISP
Page 43 of 53
Key Words
Employee
Compressed
Working Hours
Job Sharing
Microprocessor
Devices
Health Risks
Page 44 of 53
Chapter 6: ICT Applications
1.
2.
3.
4.
Advantages Disadvantages
1. 1.
2. 2.
3. 3.
4. 4.
1.
2.
3.
Advantages Disadvantages
1. 1.
2. 2.
3. 3.
4. 4.
Page 45 of 53
2.
Examples
1.
2.
3.
4.
Advantages Disadvantages
1. 1.
2. 2.
3. 3.
4. 4.
1.
2.
3.
Page 46 of 53
Address List
Definition
Advantages
1.
2.
3.
Advantages
1.
2.
3.
School Record
Definition
Advantages
1.
2.
3.
Measurements Applications
Definition
Page 47 of 53
Examples of Sensors used for measurements
1.
2.
3.
4.
Page 48 of 53
Measuring Pollution in a river
Explain:
1.
2.
3.
1. 1.
2. 2.
3. 3.
4. 4.
Page 49 of 53
Automatic Cooker /Oven
Operation:
Page 50 of 53
Glass (green) House Control
Operation:
1.
2.
3.
Modelling Applications
Definition
1.
2.
3.
4.
sensors Used
Page 51 of 53
Manufacturing Applications
Definition
1.
2.
3.
Advantages Disadvantages
1. 1.
2. 2.
3. 3.
1.
2.
3.
1.
2.
3.
Page 52 of 53
Advantages Disadvantages
1. 1.
2. 2.
3.
Page 53 of 53