0% found this document useful (0 votes)
30 views53 pages

Revision Theory Open Quiz

Uploaded by

Hala Asim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views53 pages

Revision Theory Open Quiz

Uploaded by

Hala Asim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

ICT IGCSE Theory Revision

Questions

Chapter 1: Types & Components of a Computer System


Chapter 2: Input & Output Devices
Chapter 3: Storage Devices
Chapter 4: Networks
Chapter 5: Effects of Using ICT Devices
Chapter 6: ICT Applications

Page 1 of 53
Student Name:

Chapter 1: Types & Components of a Computer System

Define the term Hardware

Briefly describe the purpose of the following hardware components:


Central Processing
Unit (CPU):

Motherboard:

Internal Hard Disk:

Sound Card:

Graphics Card:

What are the differences between ROM & RAM?


ROM: RAM:

1. 1.

2. 2.

3. 3.

4. 4.

Define the term Software

Page 2 of 53
What are the differences between Application & System Software?
Application: System:

Examples of Application software Examples of System software

1. 1.

2. 2.

What are the main functions of an operating System?

What are the differences between the CLI & GUI interfaces?
CLI: GUI:

Advantages: Advantages:

Disadvantages: Disadvantages:

Page 3 of 53
Describe the four main features of the graphical user interface?

W:
I:
M:
P:

What are the differences between Main Memory and Backing Storage? (4)
Main Memory (RAM/Cache): Backing Storage:

1. 1.

2. 2.

3. 3.

4. 4.

Type of computer and use: Advantages Disadvantages


Personal Computer:
1. 1.

2. 2.

3. 3.

Laptop:
1. 1.

2. 2.

3. 3.

Tablet:
1. 1.

2. 2.

3. 3.

Smart Phone: 1.
1.
2.
2.
3.
3.

Page 4 of 53
2015 – 16 Exam Questions
There are a number of different types of computer.
Write down the type of computer that best fits the following descriptions.

A computer that is difficult to move and has a separate monitor and keyboard.

_____________________________________________________________

A portable computer that includes a physical keyboard.

______________________________________________________________

A thin portable computer that has a touch screen and a battery in a single unit, not normally used to make
phone calls.

_______________________________________________________________

A mobile phone that can be used as a computer.

________________________________________________________________

Discuss the advantages and disadvantages to a teacher of using a tablet computer instead of another
type of computer

Page 5 of 53
Tick the type of computer which would be most appropriate for each use of ICT.

Tick whether the following are examples of applications software or systems software.

Tick whether the following statements about desktop and laptop computers are true or false.

Discuss why different user interfaces require the use of different types of input device.[4]

Page 6 of 53
Technology Definition Usage
Artificial
Intelligence

Biometrics

Quantum
Cryptography

Hologram

3D Printing

Computer Aided
Translator

Vision
Enhancement

Virtual Reality

Page 7 of 53
1. Tick whether the following are examples of applications software or system software.

applications system
software software (✓)
(✓ )
Control software

Compiler

Word processing

Device drivers

Linker

Photo Editing

[2]

2. Tick whether the following statements about desktop and laptop computers are true or false.

true (✓) false (✓)


Most modern laptop computers have web cams built in.

Desktop computers are not very portable.

All desktop computers have a touchpad built in.

Laptop computers are rarely supplied with a mouse.

11. Tick TRUE or FALSE for the following statements.

TRUE FALSE

RAM is volatile

RAM is used to store the startup instructions of a computer

The data in ROM is easier to change than that in RAM

ROM is used to store the data the user is currently working on

Page 8 of 53
Chapter 2: Input & Output Devices
Describe the role of an Input Device? (1) List 2 Examples:

1.

2.

3.

Describe the role of an Output Device? (1) List 2 Examples:

1.

2.

3.

Describe the role of a Sensor? (1) List 3 Examples:

1.

2.

3.

Why does a computer not understand Physical Variables (real world) read from Sensors? (3)

Describe the role of an Actuator? (1) List 3 Examples:

1.

2.

3.

Page 9 of 53
Input Device USE: Advantage Disadvantage
Numeric Key
Pad

Mouse

Touch Pad

Web Camera

Microphone

Light Pen

OMR: Use: Advantage:

OCR: Use: Advantage:

Page 10 of 53
MICR: Use: Advantage:

Keyboard: Disadvantage of Using a Keyboard to input data over the direct data input devices?

Magnetic Advantages Disadvantages


Strip

Readers
Use:

Chip and Pin Advantages Disadvantages

Readers

Use:

Contactless Advantages Disadvantages


Cards

Use:

Page 11 of 53
Advantages Disadvantages

RFID (Radio
Frequency
Identification)

Use:

Type of Use Advantages Disadvantages


Printer:
Dot Matrix:

Inkjet Printer:

Laser Printer:

3D Printer

Wide Format
Printer/Plotter

Page 12 of 53
Compare the use of Magnetic Strip Reader, Chip and Pin Reader, Contactless Cards
Point, barcode scanner and number pad at the POS (Point of Sale)?

Describe the input and output devices used in a video conference?

Describe the input and output devices used in a teachers classroom

Compare the advantages and disadvantages of the CRT and the LCD monitor?

Page 13 of 53
Compare the use of the Dot Matrix, Inkjet and Laser Printers identifying advantages and
disadvantages?

2015 – 16 Exam Questions

The inbuilt device which moves the cursor when using a laptop is called a _____________

The device used for selecting an icon so a bar code label can be printed in a supermarket is called a
_________________

The device used for controlling a pointer on a screen when the user
has limited motor skills is called a ___________________

This is provided with a laptop to imitate the functions of a mouse. ________________

This is not a mouse but is used to manoeuvre objects around the screen in computer video
Page 14 of 53
games. __________________

This is used to type in text. __________________

This is used for direct input of hard copy images __________________

Data can be input to a computer using different devices. Write down the most appropriate input
device which will enable you to:

(a) type an essay: __________________


(b) select options from a drop down menu whilst moving the device: __________________
(c) read the temperature: __________________
(d) fly an aircraft in a video game: __________________

Data can be input to a computer using direct data entry methods.


Write down the most appropriate device to input the following:

(a) information from the chip in an electronic passport:

__________________

(b) text from an id card:

__________________

(c) account details from the front of a credit card at an EFTPOS terminal:

__________________

(d) account details from the back of a credit card at an EFTPOS terminal:

__________________

Describe how MICR is used to read these details from the cheque.

Discuss why different user interfaces require the use of different types of input device.

Page 15 of 53
Chapter 3: Storage Devices and Media

What is Secondary Storage? List 3 Storage Mediums:

1.

2.

3.

What is meant by Backup? Why would you backup:

How would you make a personal How would businesses backup?


backup?

List features of the Main Memory List features of Backing Storage

1. 1.

2. 2.

3. 3.

Compare the differences between Serial and Direct Access?

Page 16 of 53
List the different types of storage Medium:
Magnetic Storage Optical Media Solid ‘state’
Devices

Compare the differences between Magnetic, Optical and Solid-State storage medium?

Storage Medium (Magnetic)


Name Use Advantages Disadvantages
Fixed Internal
Hard
Drive

Portable Hard
Drive

Magnetic Tapes

Page 17 of 53
Storage Medium (Optical)
Name Use Advantages Disadvantages
CD-ROM

DVD-
ROM

Blu-Ray

Compare the differences between CD/DVD R, CD/DVD RW and DVD RAM and mention
usages of each:

Page 18 of 53
Storage Medium (Solid ‘state’)
Name Use Advantages Disadvantages
USB Memory
Stick

Memory Card

Page 19 of 53
2015 – 16 Exam Questions

Describe the characteristics and uses of different types of DVD

Compare and contrast the use of optical discs and the use of fixed magnetic disks to store data.

Page 20 of 53
Chapter 4: Networks
What is a Computer Network?

Advantages of using Networks Disadvantages of using Networks

Understand how a Router works and its purpose?

Data Packets contain the following information:

Compare the differences between the following devices?


Switch Hub

Page 21 of 53
How does a Switch learn each workstations MAC address?

Network Describe the role of each Network Device?


Devices
Modem:

Network
Interface
Card:

Bridge:

Server

What are the differences between Bluetooth and Wifi?


Bluetooth Wifi

What software is required when using the Internet?

What are the differences between the internet and Intranet?


Internet Intranet

Page 22 of 53
Provide a brief description of the following types of Networks?
LAN WAN WLAN

Diagram

Accessing the Internet


Device Advantage Disadvantage

Laptop
Computer

Desktop

Tablets

Smart Phones
Page 23 of 53
How can hackers affect your network and data?

Threat to Data:

Threat to Network:

Should the internet be Advantages Disadvantages


policed?

What are The use of passwords?


Authentication Advantages Disadvantages
techniques and why
use them?

Features of a strong password?

What other types of information could be asked for to verify a customer’s account?

Page 24 of 53
Alternatives Methods of Authentication (Network Security)
Device Overview/Advantage
Biometrics
 Finger Prints
 Retina Scan
 Iris Scans
 Face Scans
 Vocal
Recognition

Magnetic Swipe Cards

Transaction
authentication number
(TAN)

Two factor
authentication

Security issues regarding data transfer: Viruses & Spyware?

What is a computer virus:

What is spyware:

Page 25 of 53
Tips to keep your computer protected from viruses and spyware:

How is a firewall used to keep your computer protected?

What is the purpose of a Proxy Server?

What is data Encryption?


Step 1: Step 2: Step 3:

Principles of the Data Protection Act?

Page 26 of 53
Who does the data protection Act protect?

Device Overview/Advantage
Physical Faxing

Email
Communication

Electronic Faxing

Fax Email
Advantages

Disadvantages

Page 27 of 53
Video Conferencing
Overview: Advantages: Disadvantages:

Hardware:

Audio Conferencing
Overview: Advantages: Hardware:

Web-Conferencing
Overview: Advantages: Hardware:

Page 28 of 53
Page 29 of 53
2015 – 16 Exam Questions

Use examples to describe the difference between a weak password and a strong password

Describe how data is sent from a networked computer to a computer on a different network.

Describe two similarities between physical faxing and electronic faxing.

Describe three differences between physical faxing and electronic faxing.

Describe four items which can be provided by an ISP.

Page 30 of 53
Give three reasons why some companies have intranets.

Explain, using examples, what is meant by authentication techniques.

Describe the differences in use between WiFi and Bluetooth.

In order to make reliable information available to all students, schools often put the information on
their intranet. Describe what is meant by an intranet.

Most data protection acts include the principle that data should be stored securely. List four other
principles of a typical data protection act.

Page 31 of 53
Fiona wants to communicate with her friend Myfanwy using her mobile phone.
Describe four ways she could do this.

Describe the details of computer addresses that are stored by a router.

Internet banking can be used by bank customers to check their account balance.
Many ways of logging into such a system involve the use of passwords.

Describe three methods of minimising the possibility of passwords being misused if intercepted.

Juanita has a computer and a contract with an ISP. When she searches the internet she does not
find relevant information quickly.

Describe three ways she could reduce the amount of excess information she gets without changing
either her computer or ISP.

Page 32 of 53
Discuss the effectiveness of different methods which could be used to prevent unauthorised
access to a laptop computer.

Tick whether the following statements would most appropriately apply to the internet or an intranet.

A piece of programming code which maliciously deletes files is called


_________________
The scrambling of data to make it unreadable by unauthorised users is called
_________________

A school’s Science department has a network which uses WiFi. A teacher has a laptop computer
and whilst in school wishes to connect to this network.

Write down the name of this type of network.


_________________

In order to access the network the laptop must be within range of a type of WiFi network device.

Write down the name of this type of device.


_________________

Describe how this device is connected to the network using an ethernet cable.
_________________

Page 33 of 53
WiFi networks can be limited in their range.
Describe one other disadvantage of a WiFi network compared to a cabled network.

Explain what is meant by VOIP.

Name two items of computer hardware that are needed in order to make a VOIP phone call from one
computer to another.

Tick whether the following are features of emails or traditional faxes.

Tick whether the following statements are true or false.

Describe what an ISP is and, apart from security measures, describe what it offers its customers.

Page 34 of 53
Chapter 5: The Effects of Using ICT
ICT effect on Employment?

Identify and describe increased areas of employment due to ICT:

Identify and describe decreased areas of employment due to ICT:

Describe how ICT has changed the way we can work at home?

Employee
Advantages Disadvantages

Employer
Advantages Disadvantages

Page 35 of 53
Compare Full Time working hours to compressed working hours?

Describe Part Time (flexi-Time):

Describe Job Sharing:

Describe what microprocessor devices are?

Advantages: Disadvantages:

Health Risk and Reason Prevention

Page 36 of 53
Use of IT equipment to minimise the health risks:

Strategies to minimise the health risks:

Page 37 of 53
2015 – 16 Exam Questions
The use of computers has led to some employees changing their working patterns.
Complete the following sentences.
(a) Two or more employees doing the same job but working at different times is called __________________.

(b) When a person is employed to work fewer hours than the normal working week, this is called
__________________.

(c) When employees work the full normal hours in a week but work at times which suit them and the
employer, this is called ___________________.

(d) When an employee works the full normal hours in a week but works fewer days, this is
____________________.

The introduction of computers into the workplace has caused some changes in employment.
Identify different types of job where employment has decreased.

Identify different types of job where employment has increased.

There are many microprocessor controlled devices used in the modern home.
Describe two drawbacks in terms of lifestyle changes this has produced for the users of such devices.

There are many microprocessor-controlled devices used in the modern home.


Describe four benefits in terms of lifestyle for users of such devices.

Page 38 of 53
Key Words

Chapter 1: Types & Components of a Computer System


Hardware

Software

System
Software

Operating
System

Application
Software

GUI

CLI

RAM

ROM

PC/Desktop

Laptop

BIOS

CMOS

Page 39 of 53
Key Words

Chapter 2: Input and Output Devices


Input Device

Output Device

Sensor

ADC

OMR

OCR

MICR

Dot_ Matrix
Printer

Ink Jet Printer

Laser Printer

Magnetic Strip
Readers

Chip and Pin


Readers

Contactless
Cards

RFID

Barcode
Scanner

POS

Page 40 of 53
Key Words

Chapter 3: Input and Output Devices


Secondary
Storage

Backup

Serial
(Sequential
Access)
Direct Access

Magnetic
Storage Devices
Fixed Internal
Hard drive

Portable Hard
drive

Magnetic Tapes

Optical Media

CD-ROM

DVD-ROM

Blu-Ray

CD/DVD R

CD/DVD RW

Solid State

USB Memory
Stick

Memory Card

Page 41 of 53
Key Words

Chapter 4: Networks
Computer Network

Router

Data Packet

Switch

Hub

Modem

Server

Network Interface
Card (NIC)

Bridge

Bluetooth

Server

Internet

Intranet

LAN

WAN

WLAN

Hackers

Page 42 of 53
Computer Virus

Spyware

Firewall

Proxy Server

Authentication
Techniques

User name &


Password

Biometrics

Transaction
Authentication
Number (TAN)

Two Factor
Authentication

Data Encryption

Fax

Email

VOIP

ISP

Page 43 of 53
Key Words

Chapter 5: The Effects of Using ICT


Employment

Employee

Full Time Working


Hours

Part Time Working


Hours

Compressed
Working Hours

Job Sharing

Microprocessor
Devices

Health Risks

Page 44 of 53
Chapter 6: ICT Applications

Using ICT in paper-based communication


Examples:

1.

2.

3.

4.

Advantages Disadvantages

1. 1.

2. 2.

3. 3.

4. 4.

using ICT in computer-based communication


Examples:

1.

2.

3.

Advantages Disadvantages

1. 1.

2. 2.

3. 3.

4. 4.

Page 45 of 53
2.

Computer based Data Handling Applications


Definition:

Examples

1.

2.

3.

4.

Advantages Disadvantages

1. 1.

2. 2.

3. 3.

4. 4.

Computer Based Survey


Definition

Advantages of using Computer based Surveys

1.

2.

3.

Page 46 of 53
Address List
Definition

Advantages

1.

2.

3.

Club and Society Records


Definition

Advantages

1.

2.

3.

School Record
Definition

Advantages

1.

2.

3.

Measurements Applications
Definition

Page 47 of 53
Examples of Sensors used for measurements

Advantages of Computer based Measurements

1.

2.

3.

4.

Weather Stations measurements


Explain:

Sensors used in Weather Stations (mention three sensors)

Measuring Patients vital signs in hospital


Explain:

Sensors used (mention three sensors)

Page 48 of 53
Measuring Pollution in a river
Explain:

Sensors used (mention three sensors)

Measurement & Control Application


Definition:

Advantages of Measuring and controlling at the same time

1.

2.

3.

Examples of typical sensors used Examples of Actuators devices used

1. 1.

2. 2.

3. 3.

4. 4.

Page 49 of 53
Automatic Cooker /Oven
Operation:

sensor Used (mention one sensor)

Central Heating System


Operation:

sensor Used (mention one sensor)

Chemical Process Control


Operation:

sensor Used (mention two sensor)

Page 50 of 53
Glass (green) House Control
Operation:

sensors Used (mention three sensors)

1.

2.

3.

Modelling Applications
Definition

The Four Advantages of Modelling

1.

2.

3.

4.

Traffic Light Simulation


How Model Carried Out in an intersection:

sensors Used

Page 51 of 53
Manufacturing Applications
Definition

Why We Use Robotics (applications)

1.

2.

3.

Advantages Disadvantages

1. 1.

2. 2.

3. 3.

School Management Systems


Definition:

System Parts in school

1.

2.

3.

Using Biometrics input devices


Examples of Biometrics inputs:

1.

2.

3.

Page 52 of 53
Advantages Disadvantages

1. 1.

2. 2.

3.

Page 53 of 53

You might also like