Professional Documents
Culture Documents
Revision Questions
Name:
www.yahmad.co.uk
Chapter 1: Types & Components of a Computer System
Motherboard:
Sound Card:
Graphics Card:
www.yahmad.co.uk
What are the main functions of an operating System?
What are the differences between the CLI & GUI interfaces?
CLI: GUI:
Advantages: Advantages:
Disadvantages: Disadvantages:
W
I
M
P
What are the differences between Main Memory and Backing Storage? (4)
Main Memory (ROM/RAM/Cache): Backing Storage:
Laptop:
Tablet:
Smart Phone:
www.yahmad.co.uk
2015 – 16 Exam Questions
There are a number of different types of computer.
Write down the type of computer that best fits the following descriptions.
A computer that is difficult to move and has a separate monitor and keyboard.
A thin portable computer that has a touch screen and a battery in a single unit, not normally used
to make phone calls.
Smart phones are used to send and receive emails with and without attachments.
Describe four other ways in which emails can be managed on a smart phone.
www.yahmad.co.uk
Tick the type of computer which would be most appropriate for each use of ICT.
Tick whether the following are examples of applications software or systems software.
Tick whether the following statements about desktop and laptop computers are true or false.
Discuss why different user interfaces require the use of different types of input device.
www.yahmad.co.uk
Chapter 2: Input & Output Devices
Describe the role of an Input Device? (1) List 2 Examples:
Why does a computer not understand Physical Variables (real world) read from
Sensors? (3)
Mouse
Touch Pad
Web Camera
Microphone
Light Pen
www.yahmad.co.uk
OMR: Use: Advantage:
Keyboard: Disadvantage of Using a Keyboard to input data over the direct data
input devices?
Use:
Use:
Use:
Use:
www.yahmad.co.uk
Type of Printer: Use Advantages Disadvantages
Dot Matrix:
Inkjet Printer:
Laser Printer:
3D Printer
Wide Format
Printer/Plotter
Compare the use of Magnetic Strip Reader, Chip and Pin Reader, Contactless
Cards Point, barcode scanner and number pad at the POS (Point of Sale)?
www.yahmad.co.uk
Describe the input and output devices used in a video conference?
Compare the advantages and disadvantages of the CRT and the LCD monitor?
Compare the use of the Dot Matrix, Inkjet and Laser Printers identifying
advantages and disadvantages?
www.yahmad.co.uk
2015 – 16 Exam Questions
The inbuilt device which moves the cursor when using a laptop is called a _____________
The device used for selecting an icon so a bar code label can be printed in a supermarket is
called a _________________
The device used for controlling a pointer on a screen when the user
has limited motor skills is called a ___________________
This is not a mouse but is used to manoeuvre objects around the screen in computer video
games. __________________
www.yahmad.co.uk
Data can be input to a computer using different devices. Write down the most appropriate
input device which will enable you to:
Describe how MICR is used to read these details from the cheque.
Discuss why different user interfaces require the use of different types of input device.
www.yahmad.co.uk
Chapter 3: Storage Devices and Media
Compare the differences between Magnetic, Optical and Solid State storage
medium?
www.yahmad.co.uk
Storage Medium (Magnetic)
Name Use Advantages Disadvantages
Fixed Internal
Hard
Drive
Portable Hard
Drive
Magnetic Tapes
DVD-
ROM
Blu-Ray
Memory Card
www.yahmad.co.uk
2015 – 16 Exam Questions
Compare and contrast the use of optical discs and the use of fixed magnetic disks to store
data.
www.yahmad.co.uk
Chapter 4: Networks
What is a Computer Network?
www.yahmad.co.uk
Network Describe the role of each Network Device?
Devices
Modem:
Network
Interface
Card:
Bridge:
Server
www.yahmad.co.uk
Provide a brief description of the following types of Networks?
LAN WAN WLAN
Diagram
Laptop
Computer
Desktop
Tablets
Smart Phones
www.yahmad.co.uk
How can hackers affect your network and data?
Threat to Data:
Threat to Network:
www.yahmad.co.uk
Alternatives Methods of Authentication (Network Security)
Device Overview/Advantage
Biometrics
Finger Prints
Retina Scan
Iris Scans
Face Scans
Vocal
Recognition
Transaction
authentication number
(TAN)
Two factor
authentication
What is spyware:
www.yahmad.co.uk
How is a firewall used to keep your computer protected?
www.yahmad.co.uk
Device Overview/Advantage
Physical Faxing
Email
Communication
Electronic Faxing
Fax Email
Advantages
Disadvantages
Video Conferencing
Overview: Advantages: Disadvantages:
Hardware:
www.yahmad.co.uk
Audio Conferencing
Overview: Advantages: Hardware:
Web-Conferencing
Overview: Advantages: Hardware:
www.yahmad.co.uk
2015 – 16 Exam Questions
Use examples to describe the difference between a weak password and a strong
password
www.yahmad.co.uk
Give three reasons why some companies have intranets.
In order to make reliable information available to all students, schools often put the
information on their intranet. Describe what is meant by an intranet.
Most data protection acts include the principle that data should be stored securely. List
four other principles of a typical data protection act.
www.yahmad.co.uk
Fiona wants to communicate with her friend Myfanwy using her mobile phone.
Describe four ways she could do this.
Internet banking can be used by bank customers to check their account balance.
Many ways of logging into such a system involve the use of passwords.
Juanita has a computer and a contract with an ISP. When she searches the internet she
does not find relevant information quickly.
Describe three ways she could reduce the amount of excess information she gets without
changing either her computer or ISP.
www.yahmad.co.uk
Discuss the effectiveness of different methods which could be used to prevent
unauthorised access to a laptop computer.
Tick whether the following statements would most appropriately apply to the internet or
an intranet.
A school’s Science department has a network which uses WiFi. A teacher has a laptop
computer and whilst in school wishes to connect to this network.
Describe how this device is connected to the network using an ethernet cable.
_________________
www.yahmad.co.uk
WiFi networks can be limited in their range.
Describe one other disadvantage of a WiFi network compared to a cabled network.
Name two items of computer hardware that are needed in order to make a VOIP phone call
from one computer to another.
Describe what an ISP is and, apart from security measures, describe what it offers its
customers.
www.yahmad.co.uk
Chapter 5: The Effects of Using ICT
ICT effect on Employment?
Describe how ICT has changed the way we can work at home?
Employee
Advantages Disadvantages
Employer
Advantages Disadvantages
www.yahmad.co.uk
Describe Part Time (flexi-Time):
Advantages: Disadvantages:
www.yahmad.co.uk
2015 – 16 Exam Questions
The use of computers has led to some employees changing their working patterns.
Complete the following sentences.
(a) Two or more employees doing the same job but working at different times is called
__________________.
(b) When a person is employed to work fewer hours than the normal working week, this is called
__________________.
(c) When employees work the full normal hours in a week but work at times which suit them and
the employer, this is called ___________________.
(d) When an employee works the full normal hours in a week but works fewer days, this is
____________________.
The introduction of computers into the workplace has caused some changes in
employment.
Identify different types of job where employment has decreased.
There are many microprocessor controlled devices used in the modern home.
Describe two drawbacks in terms of lifestyle changes this has produced for the users of
such devices.
www.yahmad.co.uk
Key Words
Chapter 1: Types & Components of a Computer System
Hardware
Software
System
Software
Operating
System
Application
Software
GUI
CLI
RAM
ROM
PC/Desktop
Laptop
Tablet
Smart Phone
www.yahmad.co.uk
Key Words
Chapter 2: Input and Output Devices
Input Device
Output Device
Sensor
ADC
OMR
OCR
MICR
Dot_ Matrix
Printer
Laser Printer
Magnetic Strip
Readers
Contactless
Cards
RFID
Barcode
Scanner
POS
www.yahmad.co.uk
Key Words
Chapter 3: Storage and Media Devices
Secondary
Storage
Backup
Serial
(Sequential
Access)
Direct Access
Magnetic
Storage Devices
Fixed Internal
Hard drive
Portable Hard
drive
Magnetic Tapes
Optical Media
CD-ROM
DVD-ROM
Blu-Ray
CD/DVD R
CD/DVD RW
Solid State
USB Memory
Stick
Memory Card
www.yahmad.co.uk
Key Words
Chapter 4: Networks
Computer Network
Router
Data Packet
Switch
Hub
Modem
Server
Network Interface
Card (NIC)
Bridge
Bluetooth
Server
Internet
Intranet
LAN
WAN
WLAN
Hackers
www.yahmad.co.uk
Computer Virus
Spyware
Firewall
Proxy Server
Authentication
Techniques
Biometrics
Transaction
Authentication
Number (TAN)
Two Factor
Authentication
Data Encryption
Fax
VOIP
ISP
www.yahmad.co.uk
Key Words
Chapter 5: The Effects of Using ICT
Employment
Employee
Compressed
Working Hours
Job Sharing
Microprocessor
Devices
Health Risks
www.yahmad.co.uk