IGCSE ICT 1-Give 1-Giv e adv antages antages of using using sensors sensors rather than entering the data manually. Faster to input data more accurate accurate data entry / no human error error Capture and entry is a single process No need to pay staff to enter data
2- Describe the term „Bluetooth‟. Wireless communication comm unication / wireless wireless connection Short range / up to 10 meters Radio waves Unlicensed Unlicensed / anyone can set up connection Relativel Relatively y slow slow compared com pared to other connections
3- Identify the risks risks to the data stor stored ed on a computer c omputer when connected connec ted to the internet i nternet and for each eac h give the actions that can be taken to reduce the risk. risk. Risk Hackers
Action Firewall Passwords Encryption Install operating operat ing system system security updates Change default settings on routers Anti-Adware / spyware / phishing Don‟t repl r eply y to suspicious emails
Identity theft / phishing / spyware Viruses
Install anti-virus anti- virus software softwar e Update regularly regularly Treat unknown files / email attachments with caution Use a browser add-on to block known attack sites
4-De scribe scribe the benef be nefits its of using using a wired connection, rather than a wir w ireless eless connection, to acce ss the network. Benefit Wired generally faster/bigger bandwidth than wireless Wired more reliable/stable Wired not affected af fected by by walls etc. Wired simple to configure
Explanation Better performance when playing games Less risk of interference interference (from other devices) Can be further away from the router Very easy for beginners to set up
5-Identify 5-Ide ntify the advantages of buying clothes clothes online online rather than than v isiti isiting ng a shop. shop.
Print document In order to print this document from Scribd, you'll
No need to leave leave home / travel tra vel to shops shops / take children children shopping first need to download it. No queuing Online Online discounts / special offers of fers / lower lower overheads passed to customers Available 24/7 Cancel Download And Print Know instantly if in stock Immediate confirmation Comparing prices with other retailers Wider range ra nge of retail ret ailers/stock ers/stock availabl available e Ability to search for items
6-Identify 6-Ide ntify the disadvantages of of b uying children‟s clothes online rather than v isiti isiting ng a shop. Can‟t try clothes clothes on / check goods g oods / wrong items may be sent Children‟s Children‟s clothing sizes often inconsistent Can‟t j udge quality quality Bogus websites No cash payments / you need a card or an account Have to wait for goods g oods to be delivered delivered / can‟t have the goods imm ediately ediately Sales advice not available Have to pay postage / del delivery charge
7- Give facili f acilities ties that could be provided p rovided on the websi web site te to help potential customers. customers. For each e ach facility, facility, give giv e an advantage adv antage to the company and an adv antage to the customer. Facility Facility email / contact us FAQ / customer customer support support pages sign-ups sign- ups for newsletter newsletter / Special Special offers... search facility
Company adv. adv . no need to make mak e phones cuts down on support staff requirement gives targeted advertising advertising
Method for customers to post comments e.g. forum, reviews reviews Customer history
present active pages / create specialized specialized pages / present tailored info to t o client client Develops good customer relationships Improve customer service Target advertising advertising
Customer account facility Size guide
More accurate entry Improved security Improved customer service
Customer Customer adv. adv . 24 / 7 no need for f or phone calls receives receives offers, upgrade info etc. easy to find what you need
Provides independent comments about the goods Can quickl quickly y go back to other items you have looked at Convenience Helps Helps select select the correct size
8-When a product is is ordered ordered online the customers data is is kept in a database. What are are the legal impacts on the website? we bsite? Data should should be k ept secure Data should should be accurate a ccurate Data should should not be misused
Print document In order to print this document from Scribd, you'll
No need to leave leave home / travel tra vel to shops shops / take children children shopping first need to download it. No queuing Online Online discounts / special offers of fers / lower lower overheads passed to customers Available 24/7 Cancel Download And Print Know instantly if in stock Immediate confirmation Comparing prices with other retailers Wider range ra nge of retail ret ailers/stock ers/stock availabl available e Ability to search for items
6-Identify 6-Ide ntify the disadvantages of of b uying children‟s clothes online rather than v isiti isiting ng a shop. Can‟t try clothes clothes on / check goods g oods / wrong items may be sent Children‟s Children‟s clothing sizes often inconsistent Can‟t j udge quality quality Bogus websites No cash payments / you need a card or an account Have to wait for goods g oods to be delivered delivered / can‟t have the goods imm ediately ediately Sales advice not available Have to pay postage / del delivery charge
7- Give facili f acilities ties that could be provided p rovided on the websi web site te to help potential customers. customers. For each e ach facility, facility, give giv e an advantage adv antage to the company and an adv antage to the customer. Facility Facility email / contact us FAQ / customer customer support support pages sign-ups sign- ups for newsletter newsletter / Special Special offers... search facility
Company adv. adv . no need to make mak e phones cuts down on support staff requirement gives targeted advertising advertising
Method for customers to post comments e.g. forum, reviews reviews Customer history
present active pages / create specialized specialized pages / present tailored info to t o client client Develops good customer relationships Improve customer service Target advertising advertising
Customer account facility Size guide
More accurate entry Improved security Improved customer service
Customer Customer adv. adv . 24 / 7 no need for f or phone calls receives receives offers, upgrade info etc. easy to find what you need
Provides independent comments about the goods Can quickl quickly y go back to other items you have looked at Convenience Helps Helps select select the correct size
8-When a product is is ordered ordered online the customers data is is kept in a database. What are are the legal impacts on the website? we bsite? Data should should be k ept secure Data should should be accurate a ccurate Data should should not be misused
Print document
In order to print this document from Scribd, you'll
Data should be collected collected fairly fa irly first to download it. about them Individuals should be able to need see the data held Data should should be held for only only as long long as necessary Data shoul sho uld d only be used us ed for the purpose for which it was coll collected Cancel Download And Print Data must m ust be be kept up-toup-to-date date
9-Identify 9-Ide ntify the benefits of using using a network in in a school school Centrally Centrally manage mana ge student student use Share printers / peripherals peripherals Staff can upload upload files to share with students (Files to be shared) uploaded uploaded into central area / coll collaborative working Access from any machine ma chine / roaming prof profil ile e Easy to install install software softwar e / software softwa re only only needs to be be installed installed on server Security centrally managed Backup centrally managed Comm unicate with other workstations work stations without using the internet / internal email em ail Simultaneous access to the internet / only only one internet connection needed Terminal Term inalss often cheaper than standalone machines
10-A school has set set up an intranet as part of the network. Identify the ways in which the intranet intranet can be used by students studen ts or teachers. teac hers. Communicate with other workstations (via intranet) intranet)
Students: • can collect homework • can submit submit homework • Notice boards • Administration e.g. absence recording, recording, pupil pupils‟ s‟ marks mark s Teachers: • Central area for accessing student data • Notice boards • Central area for administration documents • Central area for educational information • Can post homework for students students 11- Identify Iden tify health guidelines that should should be included Take regular regular breaks Adjust seats to suit self / proper posture – correct Height / back support Adjust monitor – correct angle / not reflecting light / contrast Use wrist rests / other erg onomic equipment equipment provided / use wrist / hand exercises Focus on a distant object to avoid eye strain
12- Stude nts use use the internet to research topics for school. school. Discuss Discuss the factors that they should should consider consider during during their research and when Using Using the informatio information n gathered in their own work. work. When researching: researching: Should Should consider that not all all inform ation found on the internet is accurate
Print document
In order to print this document from Scribd, you'll
Check the „reliability‟ and validity of the author / use reliable websites firstseveral need to sources download it. Compare information from Use websites recommended by teachers / other reliable people / trusted organizations Recognize that some information may be biased Cancel Download And Print Consider relevance of the inform ation provided When using the information (e.g. in a report): Copyright rules must be considered Must get permission to use the information Acknowledge source Avoid plagiarism
13-Identify the positive effects on organizations resulting from the widespread use of ICT. Improved communication with customers / suppliers Improved internal communication Wider access to markets New methods of production Reduction in staff as IT takes over jobs Flexible working (home working and hot-desking) For staff reduces costs of office space / can select Staff from wider area / m ay be able to hire cheaper staff Improved image / brand awareness
14-Identify the negative effect on organizations resulting from the widespread use of ICT. Increased problems of data security More competition from organizations from wider area Increased training Flexible working for staff –more difficult to monitor / difficult to team build
15-ICT has also impacted on society. One effect is a widening gap between „Information rich‟ and „information poor‟ societies. Discuss the factors that have contributed to this widening gap Lack of communication networks in some countries / regions restricts access Cost of technology prohibitive for some societies / individuals Link between economic development and ICT use Access to digital technologies provides: Access to more information about a wide range of topics Better education / training leading to better jobs (gap reduction) Access to up-to-date information e.g. news Ability to share ideas with like-minded people Those without access can‟t take advantage and fall further behind. Impact on different groups (rich, poor, level of education, age, location)
16-Identify the device that can be used for both input and v isual output Touchscreen and information point
Print document
In order to print this document from Scribd, you'll first need to download it.
17- Give an example of a strong password. Explain why this password is strong B! j2D? F 8a Password 6 characters min length Cancel Download And Print Includes upper/lower case Includes symbols/punctuation Includes letters and numbers Word not related to user / random (mix of characters) Includes spaces
18-Identify the precautions that should be taken to protect passwords Don‟t tell anyone Don‟t write it down Change regularly Don‟t let anyone see you entering it Use different passwords for different accounts Don't click yes when prompted by a system 'Remember this password?' / don't enter your Password when prompted suspiciously
19- State the ways in which access rights impact upon the user. Each user has a profile Restricts access to certain programs Restricts access to certain data / files Restricts access to certain parts of the system Restricts what a user can do on the system e.g. installing software
20-Benefits of being in a network Set access rights Share / transfer documents / files / folders / data Share peripherals /appropriate stated piece of hardware Sharing internet connection / only 1 internet connection needed (1) Security can be centrally managed / management of firewall, antivirus etc. User account control (not access rights) Central monitoring of every machine Central control of backup Files (to share) can be uploaded centrally Central software administration / software can be installed and updated easily / faster May be cheaper to buy network version of software Can use any workstation / hot-desking Comm unicate with other workstations without using the internet / internal email Intranet
21-How large RAM will help better performance in entertainment use. Multimedia takes up a lot of storage space / RAM RAM temporarily holds data and instructions for the software Large RAM means less swapping with the hard disk OR small RAM means more swapping with the hard disk Large RAM helps multimedia run smoothly Larger RAM allows multitasking
Print document
In order to print this document from Scribd, you'll first need to download it.
Providing faster access to software and data than hard drive 22-Explain the purpose of a software license. Cancel Download And Print Gives the right / permission to use /download the software If the user has a license it is legal to use the software / it is illegal without a license License shows that the software has been obtained legally /bought To acknowledge the author of the software Software producer / owner will receive payment Will be able to take legal action if anyone copies the software without permission / prevents illegal copying / piracy
23-Identify the precautions that should be taken to help stay safe on the internet. Don‟t give out personal inform ation, unless you are sure of the recipient Use copy lists with care Use social networking sites with care Make use of privacy settings (public/private) / use block lists / filters Don‟t post pictures/text detailing your location Don‟t link to friends of friends. Be careful about arranging physical meetings
24-Discuss the advantages and disadvantages of downloading and streaming Downloading : • Entire video must be saved on user‟s computer system initially • Often very large files • Need large storage • Can view whenever user wants • Can keep the files for as long as they want • May be able to edit • Don‟t need to have internet access once saved Streaming: • Don‟t have to store the files on com puter • Can start watching as soon as streaming begins • Must view when being streamed • Need internet access • Rely on good signal • Quality may be affected by buffering 25- What type of software maintains environmental conditions? Control software
26- Describe ways of reducing the risk of unauthorized access. Install a firewall: A shield that will prevent hackers / prevents the network being 'seen' Accessing data from outside the network / Access via the internet Encryption: Data is meaningless to anyone trying to view the data. Scrambled information Meaningless to unauthorized viewers / without key / password
Print document In order to print this document from Scribd, you'll first need to download it.
Cannot be read without decryption
WEP / WPA / WPA2: Is the „key‟ to access the Wi-Fi Signal is meaningless to anyone who intercepts it Cancel Download And Print Scrambled / encrypted sig nal Key is a long list of randomly generated letters and numbers Installing anti-virus Software: Prevents Trojans / spyware from stealing data 27- Stored data are vulnerable. Define the risks and actions regarding it. Risk Virus / malware
Accidental deletion / accidental damage / accidental corruption
Malicious damage Physical problems E.g. fire, flood Hardware or software malfunction (must be specific item)
Method Anti-virus software / antimalware Treat unknown files / email attachments with caution Backup Access rights Password on files Read only files File recovery software Backup Access rights Password on files Backup Backup
28- Describe the impact of ICT on people working in manufacturing Many unskilled jobs lost / more skilled jobs created Jobs taken over by robots / CAD systems / CAM systems Jobs have changed e.g. maintaining systems Employees need to be retrained to cope with new systems New jobs have been created Job migration to take advantage of high skill areas Safer working conditions / better working environment
29- Describe the impact of ICT on people working in education. Teacher‟s job changed due to new methods, e.g . availability of information requiring facilitation of learning CAL / Learning platforms / use of VLE Interactive white boards/ other new technology in classrooms Management Information systems
30- Describe the impact of ICT on people working in retail. Move to internet shopping has reduced number of shop work ers Increase in jobs in on line retail. Example of how technology changes the role of retail staff New business opportunities due to wider online market
Print document
In order to print this document from Scribd, you'll
31- The internet gives people access to a huge amount of information. first needthis to download it. The internet is not regulated; has benefits and drawbacks. One drawback is that the information might not be reliable. Give the ways in which a user could check the reliability of information. Cancel Download And Print • Check other sources of information • Ask an expert • Use more than one website • Use trusted sources, e.g. government sites • Use books / mag azines • Use other forms of digital media e.g. reference CDs/DVDs • „Look and feel‟ of the site e.g. poor spelling and grammar • Check that the date is recent
32- Discuss the benefits and other drawbacks of the lack of internet regulation. Benefits: All information is open to the world via the internet so any corruption done by organization or authority can be easily found out and they can‟t hide it. When bad things happen people can write blogs on the web, communicate with people who have the same thoughts and take action and steps accordingly. People are open to share their opinion on the internet and say what they feel, there is no restriction applied on their subject of speech. They can express their mood with people and be open-minded with the world to share their expressions. Drawbacks: Inform ation found on the internet is not reliable due to any regulation. Fake and phishing sites have a tendency and chance to be established on the internet and victimize other people. Inappropriate inform ation is spread throughout the internet which is prohibited for some countries but they are not being maintained. Anonymity in the internet opens a road of communication between criminals and terrorists. 33- Benefits of storing data on USB flash drive. Portable / easy to carry Very strong / difficult to break/Solid state device Can be used to transfer data between machines / access data on diff erent machines Most computers have USB ports Widely available / relatively inexpensive Encrypted USB available/can be encrypted
34- Drawbacks of storing data on USB flash drive. Easy to lose Can easily transfer/pick up viruses Corrupt if incorrectly disconnected
35- Why backup should be made Accidental damage: Data may be accidently overwritten / erased / corrupted Deliberate damage: Malware/viruses may damage the data System / hardware failure Physical problems e.g. data may be lost due to fire / flood / computer theft 36- What decisions should be made before creating a backup Which software to use for backup
Print document In order to print this document from Scribd, you'll
Media/device (determined by total file size) first need to download it. Where to keep the backup e.g. away from computer Can it be stored securely e.g. encryption/passwords What files to back up e.g. find/ select Cancel Download And Print How often to make a backup Can it be automated? Who has access to backup / how many copies should be kept When to run the backup
37- What do the bars of the barcode represent? Item/product number Item/product code Item/product ID Item/product reference
38- What do the parts of the barcode represent? Country of origin Product ID/info Manufacture Id Check digit
39- Benefits of using barcodes/reader Saves time as items will be processed faster Less time spent queuing Accurate bills/no (human) errors Itemized bills/purchased items identified
40- How barcode adds item to sale? Barcode input> Information sent to database> Item found> Price identified> Price displayed> Receipt printed
41- Why microchip is better than magnetic stripe? Reason More difficult to steal data from a chip Data can be more easily updated on a chip / updated during transaction More difficult to corrupt data/damage a chip
Extension Better encryption/ you can read a magnetic stripe on a tape reader/PIN is needed Has built in processing power/ greater memory/storage Chip protected by plastic coating/ magnetic stripe affected by stray fields/ scratches
42- What is the info that is shown by project management software? Timeline / Completion date/time to complete the project Task breakdown/order of tasks Staff/Resources needed
43- Methods, advantages and disadvantages of laser and inkjet printer. Method
Benefit
Drawback
Print document
In order to print this document from Scribd, you'll
Laser
Inkjet
Laser draws patterns first need to download it. on drum Very fast Electrostatic pattern High quality attracts toner Cancel Download And Print It is quiet Toner fused onto paper Good quality Color printing is Ink sprayed onto readily available paper Relatively cheap to purchase
Expensive to purchase color options are more expensive Relatively slow compared to laser Can smudge Cost per page more than laser
44- How a network can be configured so that the files accessed can be maintained according to user‟s relev ancy? Set up user names / log-ins and passwords Set profiles Assign privileges / Access rights / Access permissions Folder/File level passwords/File encryption
45- Items to reduce health risks on computer usage Suitable lighting Wrist rests Adjustable chairs/chairs with lumbar support/ergonomic furniture or chairs Swiveling/adjustable screens Screen glare shields Foot rests Ergonomic mouse RCD/Residual current device
46- Actions to reduce health risks on computer usage Posture: Adjust chairs to suit them/ sit with correct posture Adjust angle/height of monitor Eye Strain: Adjust brightness/contrast of screen Adjust font/icon size Regularly focus on distant objects Position monitor to reduce reflection / adjust blinds to reduce reflection Sit at a suitable distance from monitor Attending regular eye examinations 47- What are the rights people have on Data Protection Act that a company regulates? See the data on request Know who stores your personal data/opt out of sharing data Have errors corrected Prevent processing for direct marketing Object to processing causing dam age or distress Object to decisions made by automated means Claim compensation for damages caused by breach of the Act
Print document In order to print this document from Scribd, you'll need to download 48- Benefits of companyfirst and employee of it. working at home.
Employee
Cancel
Download And Print Company
Less travelling reduces stress
Can have representatives based around the country/reduced costs of visiting clients
Can use travelling time to do other things
Saving from reduced office space / less office space needed
Flexibility/managing workload
Savings equipment costs
Reduced cost of travel (to head office)
Staff may be more productive due to less stress/more relaxed
49- Benefits of Wi-Fi over Bluetooth Not restricted to being next to PC / Wi -Fi has wider range Much faster data transfer rate Wi-Fi is more secure
50- Requirements to connect to the internet Router/ Gateway/ Modem URL / IP address ISP/telephone number/broadband/dial up Web browser software Telephone line/cable/satellite link Comm unication software (to set up initially)
51- Purpose of key in wireless network Is a security method Prevents unauthorized access to the router/gateway/modem/ network / Wi-Fi connection Key is used to encrypt data (during transmission across the network)
52- Methods of communication via the internet. Methods Email VoIP/ Multimedia chat Video conference/ Instant relay chat Forum News group/ mailing list
Reason Message sent very quickly with many files Immediate feedback; live interaction Setup virtual meetings/ discussion Chat with people of same hobby/ profession Notify about upcoming and latest topics on interests
Example Formal letters to office Make phone calls to customers Communicate with head office Chat forums of science Latest news updates
Print document IM
In order to print this document from Scribd, you'll Send quick message To family/ friends first need to download it.
Social Networking Sites
Know updates about friends/ family
RSS (Rich Site Summary)
Cancel Download And Print 53- How phishing attacks are carried out?
Bogus emails sent, requesting personal data Recipient (believing email is genuine) provides personal data (via hyperlink or email) Data is then used for identity theft / fraud
54- What factors should be considered before copying info from the internet? Is the information up to date Is the information biased? Is the information accurate? Is the source / information reliable/ verifiable? Is the information at the right level / understandable / relevant? Are there copyright restrictions on the use of the materials?
55- What actions should be taken when using info from the internet? Copyright rules/ Acknowledge sources / bibliography / references Avoid plagiarism / Don‟t Copy and paste / Write in your own words
56- ICT can be used in many ways to enhance students‟ learning. Using the internet for research is one way in which students‟ learning is enhanced. Using examples, describe other ways in which ICT can be used to enhance Student‟s learning CAL: Learners working independently / at own pace / in own time / may be outside school Use for reinforcement / drill and practice / instant feedback Control technology: Provides “hands on” experience / analysis of data Simulations: Safely carry out experiments / vary situations
VLE: Access to materials Upload work Download assignments Communication methods: Emailing teachers Use of modern technologies: Smart phones / pads Use of the internet (not for research): Comm unicating with students in other countries
Print document
In order to print this document from Scribd, you'll
Better understanding of other cultures first sites need to download it. Learning languages Revision Revision sites
57- What is meant by icon?
Cancel
Download And Print
A small image used to represent and run a function or an application.
58- What facilities are used to make find a desired file easily? Sort / rearrange the folders into alphabetical / date order Use search facility by typing in a part of the folder‟s name Enable file preview / extra-large icons
59- Give the solutions to back-pain and RSI due to computer usage. Backache: - Ergonomic / adjustable furniture - Adjust seat angle / height / Lumbar adjustment - Foot / neck / back rests - Correct posture in chair
RSI: -
Wrist rests / gel pads Ergonomic keyboard / mouse Correct posture Hand / wrist / finger exercises
60-(a) Customers of a shopping website enters their info in an online form which is automatically saved into the website‟s database. What is the benefit of this type of data capture for the website? Don‟t need staff to enter data Makes customers responsible for / reduces data entry errors Data entry forms can make it more likely that valid data is entered
60-(b) What are the benefits of the customers due to their info being saved? Don‟t need to re-enter data (personal details)/ fewer data entry errors Can take advantage of „one click‟ ordering Can be sent offers/promotions
61- How a person can track the delivery route of their online ordered product? They use the order number of their transaction to view the route of delivery
62- How an online shopping site could use the data of their customer‟s transaction log? Can target advertising / offers based on previous sales trends / patterns
Print document
In order to print this document from Scribd, you'll
Can analyze data to help planning / stock control / pricing first need to download Could sell data to third party to get money it.
63- Define Intranet.
Cancel
Download And Print
Network with private/restricted access Used by members of a single organization
64- Advantage of virtual meeting over face-to-face meetings. Meetings can be at short notice No need to pay travelling / hotel costs People don‟t lose time travelling / are only away from desks during meeting time
65- Disadvantages of Virtual meeting. Technical problems may occur / have to be able to connect reliably to the internet Physical items can‟t readily be exchanged Time differences may be an issue Difficult to study body language / eye contact difficult Team building / social interaction is more difficult
66- How username and password increases security of an account? Extra step in login process Need to know username as well as the password Makes it harder to guess / see Reduces possibility of automated attacks
67- Concerns and steps for unrestricted access to internet. Concern: May access inappropriate sites May illegally download music / videos May download malware May „m eet‟ unpleasant characters in chat rooms / be subject to cyber bullying May pass on personal information May become addicted to internet activity Steps: Use parental control software Use antivirus software Restrict / block access to sites via functionality of web browser / filter software / ISP / blacklist Password protect the administrative account 68- The use of computers and other digital devices has both positive and negative effect on people‟s lifestyle. Discuss the positive and negative effects of digital dev ices on people‟s lifestyles. Positive Impact:
Print document
In order to print this document from Scribd, you'll
Technology is improving many aspects of everyday life e.g. communication – must have first need to download it. skills to benefit Communication improves contact with family and friends Can mak e friends with people from different backgrounds using chat rooms / SNS Cancel Download And Print Technology use linked to improvement in reading skills / hand – eye coordination Technology offers wider educational opportunities Availability of valuable sources of information online e.g . health information / fitnes s information / exercise techniques / government websites Can work from home / changes in working patterns
Negative Impact: Time spent on computer rather than socializing / leads to lack of social sk ills Time spent on computer rather than exercising / could lead to health issues Time spent on entertainment / games rather than doing homework / work Health problems arising from using computers e.g. back problems / RSI May lose sleep as technology „takes over‟ life / addictive / may lead to problems at work / school
69- Advantage of wired network over wireless. Wired connections usually faster Wired connections less affected by distance from the hub Wired connections not affected by obstacles Wired connections are less aff ected by the number of users Wired connections don‟t suffer from interference from other devices / more stable Wired connections are potentially more secure
70- The network administrators of a community centre are concerned about the security of data on the network. Describe the concerns that the network administrators may have and identify steps they can take to reduce the risks to the security of data. Concerns: - Unauthorized access to data e.g. hackers - Accidental loss of data - Malicious damage - Virus infection - Physical problems e.g. natural disaster - Hardware malfunction
Methods to reduce risks: - Set up user names and passwords - Set up access rights - Firewall - Encryption - Centralized backup - Backup to external devices / stored off -site / fireproof safe - Anti-virus software - Anti-malware software
Print document In order to print this document from Scribd, you'll first need to download it. Cancel
Download And Print
71- Difference between RAM and ROM RAM ROM RAM is volatile must be constantly refreshed ROM is permanent / lost when computer is switched off RAM can be read and written to ROM is read only / only EPROM can be erased RAM is faster than ROM
ROM is cheaper / Less expensive than RAM
RAM microchips are supplied as modules (several chips on a sm all board) plugged into the motherboard
ROM microchips are installed in the motherboard
72- A message is displayed on the screen- “Printer is out of paper”. How this message is generated. The sensor in the printer detects there is no paper, then it sends signal to the OS, then OS generates the message that is displayed on the screen.
73- How CAD helps to improve designs. Image can be rotated Accurate measurements / precise details / use precision tools Easily change variables View / create in 3D See what the designs would look like on a model / preview final product Add / edit material effects / patterns / textures / color Use library of shapes Vector graphics / unlimited zoom Resize / edit / erase component Multiple light sources Can send items to 3D printer
74- How settings can be adjusted for the visually impaired ones Screen resolution Display settings / brightness Font size / icon size Use magnifier / zoom in Use narrator / audio description Speech recognition Enlarged On-screen keyboard Calibrate color / change color scheme Adjust thickness of blinking cursor Adjust thickness of focus rectangle Adjust thickness of windows border Mouse settings
Print document
In order to print this document from Scribd, you'll first need to download it. 75- How anti-virus works?
Compare files coming into the computer against known virus codes (signatures) / database Cancel Download And Print of virus files Monitors program s for suspicious behavior Quarantines / flags as dangerous Scans computer / media for malicious files alerts user if issues identified
76- How to reduce virus spread? Don‟t download from unreliable / untrustworthy sites Don‟t click on links in emails unless you trust the sender Don‟t open email attachments unless you trust the sender Enable browser security / site blocking options Don‟t use portable storage devices from unreliable sources Don't give users admin privileges / ability to install software Install / use a hardware firewall
77- How people can work together in a network? Save a file to a central location so all have access / can make changes Use network messag ing system to provide comments securely Will have access to the same software version no compatibility issues Can use collaboration / team-working software to maintain document honesty / control multiple accesses Can use version control / logging software to keep track of versions / changes
78- How checkboxes in a list can be used to search desired object quickly The user can select the desired features Fewer results will be produced / won‟t need to look through so many / will only be given an appropriate list The search will be much faster / save time No typing errors
79- Why reviews in a site hav e to be handled carefully? The reviews may not be genuine / may have been made up Writers may be biased Writers may be expressing personal opinions Poor reviews may have been removed
80- Many students at the college hav e mobile dev ices such as smartphones or tablet Computers. Some staff believe that using these devices enhances learning, others disagree. Discuss the advantages and disadvantages of allowing students to use mobile devices in the college. Advantages Will be able to use the device as a research tool / search internet. Students can access the internet anywhere on the site / not necessarily restricted to a classroom / not all rooms have computers. Students can access the internet in their free tim e not just during lesson.
Print document
In order to print this document from Scribd, you'll
Can carry on using device at home. first need to download May have office applications installed whichit.can be used to make notes. College may not have enough / many computers. Data can be transferred to cloud storage. Cancel Download And Print Have friends as contacts so can share resources Many education apps available to aid learning. Can take advantage of QR codes on learning materials from published resources in college.
Disadvantages May use device at an inappropriate time. May use device for inappropriate actions. 81- Students at College are aged between 11 and 16. The college wants students to stay safe when using the internet. Discuss the adv ice the college could give to students. -Be careful when posting personal information online -Think carefully before posting photos or videos of yourself. Once online it‟s possible that anyone can see them and may be able to download them. They are not your property anymore. -Keep the privacy settings on social networking sites as high as possible. -Be wary when communicating with people you don‟t know. Remember that not everyone online is who they say they are -Don‟t meet up with people you‟ve met online. Speak to your parents/other responsible adult about people suggesting you do -Think carefully about what you say before you post som ething online. Remember that what you say may be misinterpreted or may offend others. -Respect other people‟s views, even if you don‟t agree with someone else‟s views doesn‟t mean you need to be rude -If you see something online that make you feel uncomfortable, unsafe or worried: leave the website, turn off your computer if you want to and tell a tr usted adult immediately. -Cyber-bullying, tell a trusted adult immediately.
82- Advantage of using design view in web designing rather than code v iew No need to learn code Less likely to make mistakes using design view Can see the page as it will look /WHAT YOU SEE IS WHAT YOU GET Easier to rearrange items / make changes to a page Easier to clone / reuse page components
83- State the facilities provided by ISP for web publishing ISP will host/store website on their web server ISP provides a web server to host/store website ISP provides tools to move/upload website (1) to web server ISP offers management tools / online development services to help create web page ISP offers rental / purchasing / managing / provision, of domain names
84- What facilities are used to attract customers to a website? Posts on social network sites Adding details to search engine listing Add keywords/ Meta tags (Description of a link) to website
Print document
In order to print this document from Scribd, you'll
Adding details to directories e.g. yellow pages need topeople‟s download blogs it. Creating a blog / posting first on other Ads or pop-ups on other company‟s websites Using targ eted emails Cancel Download And Print Pay for position on search engine
85- What features are necessary for online shops to provide? Store customer data Access to a database of products „Shopping cart‟ / checkout f acility A secure payment system Automated / email confirmation system Terms and conditions / legal obligations
86- Advantages of using digital reference books rather than hard copy books. Searching for information is usually quicker Easier to carry about / store as are lighter / smaller Easier to replace if lost or damaged Quality of graphics is usually better May include moving images / video / audio Environmentally friendly
87- Advantage of computerized data logging rather than manual data logging. Advantage Human comfort / safety for employees – cold / raining outside, spoil meal times, unsociable hours, less dangerous, cannot work 24/7 etc. More Accurate / more precise readings Reduced / no human error Cheaper – save on wages Consistent – time after time / day after day Faster / Quicker Disadvantage Equipment failure - data logging equipment / transmitting of data / ICT equipment failure Costs – high initial set up cost / more expensive to buy equipment and set up 88- What is podcast? A series of digital media files. Often released episodically. Often downloaded through web / downloaded to a computer/m obile device to watch/listen to.
89- Difference between data and information with examples Data has no context/no meaning/not interpreted • Data is raw / unorganized facts/just characters • When data is processed, organized or presented in a context, so as to make it useful it becomes information • Suitable examples of data (where the meaning/context is not clear)
Print document In order to print this document from Scribd, you'll
73, 56, 47, 33, 12 firstand needtherefore to downloadmeaning it. • Information has a context (i.e. data with a context) • Information is interpreted data Cancel Download And Print • Suitable examples of information The ages of five people in a house are 73, 56, 47, 33, 12
90- Advantage of Plasma screen over normal screen (CRT) More robust Shock resistant Portable Thinner / lighter Better quality Less glare / reflection
91- Show all the network topologies.
Fully Connected Network Topology
Star Network Topology
Mesh Network Topology
Bus Topology
Ring Topology
92- Why passwords should be changed regularly and why passwords must be entered twice. Someone who have known the password or seen to enter won‟t have access anymore Twice input is needed to resolve data entry mistake and for verification
93- Hardware and software needed to connect to the internet? Hardware: Modem / ISDN (Integrated Services Digital Network) / Router / Modem cable / WiFi / NIC.
Print document
In order to print this document from Scribd, you'll first need to download it.
Software: Communication software / Browser software / Driver software for hardware.
94- Difference between validation and verification. Cancel Download And Print Validation: Check by computer that is the data allowable or not Verification: Check with source document to make sure the data entered is correct.
95- What devices are used in POS terminals? Receipt printer Screen Keypad Weighing scales Barcode reader Card reader
96- Advantage of POS systems for customers and shops. Customer: Shorter queues / itemized bills / accurate bills / quicker data entry Shops: Less crime / increased security Automatic stock order Up to date sales information/ buying patterns Fewer staff; Fewer errors / more accurate Quicker as the data is entered by sensors / reader More profit as less time needed for large amount of customers Easier to change product details No need to price products
97- Why files are compressed? Takes up less memory because many files in one file Quicker to download because many files in one file Size reduced because many files in one file
98- Why computers are used to collect data from experiments? Computer responds instantly to changes Fewer staff so cost is less Works 24 hours per day everyday Keep people away from dangerous processes More accurate and fewer errors Can log data Can analyze data and are more reliable Can use range of sensors
99- What are the roles of CPU (Central Processing Unit) Perform s or carries out calculations and logical operations. Control unit co-ordinates input and output Immediate access store / memory control storage for data program s.
100- What types of backing storage are used by computers.
Print document In order to print this document from Scribd, you'll first need to download it.
Zip drives; Jazz drives; Tape drives; memory sticks; CDROM -RW; Hard drive
Download And Print
Cancel
101- What are the tasks performed by the operating system. Input and output control; Error handling; Resource allocation; Providing a User Interface; Allows user to command the computer; File handling
102- What is the purpose of feedback in a control unit? Ensures system remains stable / operates within level
IP Address Format IPv4 (Internet protocol version 4) is a 32-bit IP address grouped by 8 bits and represented in decimal format known as dotted decimal notation. Each bit in the octet has a value, where 0 ≤ value ≤ 255.
Network
Host 32 Bits
192
168
0
10
8 Bits each
103- What is the purpose of a server, router, wireless access point. Server: Security / file serving / file sharing between users in a network Router: Directs signals to specified route to connect computers. WAP: Transmits and receives radio signals
104- Types of pointing dev ices. Mouse; Joystick; Tracker ball; Track pad; Graphics tablet
105- Types of scanners with specialty. Hand-held scanner: Reads the image while being dragged over it. Flatbed scanner: The image is laid flat on the scanner‟s surface. Sheet-fed scanner: Reads the image as the paper goes through the sheet feeder.
Print document
In order to print this document from Scribd, you'll first needVersus to download it. 106- Difference between OCR MICR.
OCR and MICR both read printed characters. Cancel Download And Print OCR uses reflected light where MICR uses magnetic field patterns. OCR recognizes handwriting and different types of printed text but MICR only recognizes specially shaped characters.
107- Vulnerability of Magnetic stripe card. It is affected by electromagnetic radiation and the data can be copied and edited.
108- How digital photos and videos can be v iewed? Saved on a computer, so backup is easier and more reliable. Sent by email Displayed on a wide variety of devices, such as smartphones and TV screens Broadcast over the internet such as on-demand TV program mes. But some drawbacks following it are that users store more photos and longer videos so more backing storage is needed. High-quality photos and videos can be large files. Sent by email or broadcast over internet they use more bandwidth and slow the network.
109- Properties of Sensors. Sensors are used to input environmental data such as light intensity, pressure and temperature. Each sensor detects only one type of data. Sensors usually produce a low analogue voltage which must be converted to a digital signal for the computer using an ADC.
110- Audio dev ices and related technology. Touch-tone telephone: It mak es a different beep depending on the button pressed. On the end of the line, a computer inputs the beep and determ ines which button has been pressed. Microphone is the basic means of audio input. Voice recognition software enables the computer to know who is talking but not what has been said. Speech recognition is often used for voice command systems. The speaker is identified and spoken words recognized as comm ands. Natural language processing uses speech recognition to interpret natural language. It can be used to dictate a letter or give instructions to computer. Speech synthesis is when a computer reproduces a human speech. The voice is computer generated, most likely by a text-reading program that reads aloud an electronic document.
111- Ad/Dis of Audio input. Ad: People speak to the computer and do not need to learn to operate the keyboard. Dis: Voice and speech recognition software has to be trained to recognize each person‟s speech. This can be lengthy process. Voice and speech recognition is not accurate because people pronounce words differently.
Print document
In order to print this document from Scribd, you'll first need to description. download it. 112- Types of monitors and their
Visual Display Unit (VDUs) vary with different styles and resolution along with color and Cancel Download And Print quality. (Picture element/ pixels are not same as screen dots, because some software packages use pixels that are bigger than the resolution. Graphics card are video/ display cards built into the system unit, it controls the signals going to the monitor. High quality graphics card can produce clear graphics very quickly. Cathode Ray Tube (CRT) : They are bulky, heavy power consuming and gets heated up quickly. Liquid Crystal Display (LCD): They are flat and lighter than CRT. They are compact and consume less power compared to CRT. Plasma Display: They have clear graphics and bright output. Electroluminescent Displays: They have potential to support very large f lexible displays. Touch Screen: It has two-way interface, so it can be used as both input and output device. The touch screen is classified by two types: The capacitive touch screen detects position of the skin touching it where the screen has been discharged. The upper layer is made up of glass. The resistive touch is m ade up of soft layer and they detect it by the changes in electric charge when internal charged and conductive layers are pressed tog ether. It works with anything including skin. Multimedia Projector: They are used to display imag e on a larger separate screen for view of larger audience. Interactive Whiteboard: They are large, touch-sensitive panels. Some use touch screen technology but others use optical curtains which operates by detecting breaks in the curtain.
113- Types and uses of printers. Printers are used to produce printout or hardcopy. An impact printer strikes through inked ribbon into the paper and non-impact uses other methods without placing an impact on the paper (non- striking method).
Dot-matrix is an impact printer with print head that is a matrix of steel pins. The pins strike a carbon ribbon making patterns of dot on the paper. (Monochrome) Inkjet printers spray tiny dots of ink into the paper. They produce good quality output and are quieter. (Monochrome and color) Laser printers use laser light to make patterns on a drum. The drum transfers ink to the paper and then the heating f uses the ink and paper together. They are more expensive than inkjet with excellent quality and faster output. (Monochrome and color) Thermal printers use heated wires to mark dots on the surface of a heat- sensitive paper. Printers use different types of paper, for example: • Single sheets of A4 paper. • Continuous paper is perforated and can be easily separated into single pages. • Pre-printed stationery has information on the paper before computer printing. For example, the name and address of the company
Print document
In order to print this document from Scribd, you'll 114- Ad/dis of printers. first need to download it.
Advantages of printers: Cancel Download And Print • A printout is useful if no computer is available. Disadvantages: • Printing is slow and expensive compared with electronic communications. • Paper is bulky and deteriorates in storage. • Printed materials are more difficult to access and distribute, e.g. digital photos can be emailed and viewed on a multimedia projector .
115- Define plotter. A plotter draws lines on paper using colored pens. A flatbed/ roller bed plotter holds the paper still while the pens move. Other plotters move the pens from left to right while the paper moves forwards and backwards. An upright plotter uses very long sheets of paper. Plotters are used in computer-aided design . Plotters are usually more expensive to buy and slower than printers, but much larger sheets can be printed.
116- What is a Multi-function device (MFD). MFDs combine a printer, scanner and communications link to function as a printer, scanner, and photo-copier or fax machine. MFDs are much less expensive to buy than all the individual devices and use less space on the desktop. It is cost effective to replace them more frequently with modern technology. However, if part of the device is faulty, all the functions may be unavailable. If one function is being used, then the other functions are unavailable for other users. 117- Use of speakers. Many computers have speakers. Headphones are two small speakers built into a headset. Sound is needed, for exam ple, to play music and for speech synthesis (computer produces human speech).
118- Use of sound cards and actuators. Sound cards A sound card controls all input and output of audio. Audio input through a microphone and output through speakers are usually analogue and the sound card handles their conversion into digital signals processed by the computer. It also handles digital audio input, e.g. from multimedia applications. Sound cards have features such as: • Polyphony – plays more than one sound or voice independently at the same time. • Output through one or m ore sound channels, e.g. m ono, stereo (2 channels), or quadraphonic (4 channels). • Surround sound or 3D audio. • Improves the clarity of compressed audio files, e.g. mp3. • Built-in memory for faster sound processing. • USB, optical and other ports to connect to DVD recorders and other devices. • MIDI (Musical Instrument Digital Interface) to connect to electronic instruments.
Print document Actuators
In order to print this document from Scribd, you'll first need to download it.
In control applications, computers make events happen using actuators , e.g. heaters and Cancel Download And Print motors. A buzzer is an actuator that, for example, warns when the m icrowave has cooked our dinner. Actuators can perform physical tasks such as controlling a robot or operating a digger. This can be dangerous for people if their presence is not detected by the computer.
119- Bits and bytes. Bit ( binary digit) patterns in memory and on backing storage represent, e.g. characters, numbers, graphics and sounds. A byte stores 8 bits, each of which can be either 1 o r 0. Different computers access one, two, four or more bytes of data at a time. If a computer can read/write four bytes at once, this is 32-bit computing. Flash memory is a type of ROM that can be written to and read from and is used for the BIOS (basic input/output system) in PCs. This makes sure the computer starts up as it should and that all the parts of the computer work together. 120- M agnetic tapes. A mag netic tape stores a great quantity of data but read/write is slow because it is serial access – the tape is read from the beginning to find the data needed. Magnetic tape cartridges are often used for backup.
121- Types of software. Applications software Office productivity software helps you do office tasks and includes: • Word processing software, e.g. Microsoft Word. Helps you prepare documents that include text and pictures. You can edit the text, change the font and size, check your spelling and grammar, print, and save and retrieve documents. • Desktop publishing (DTP) software, e.g. Microsoft Publisher. Handles page layout better than word processing software. • Spreadsheet software, e.g. Microsoft Excel. Performs calculations on tables of numbers arranged in rows and columns with related headings and charts. If a number is changed, the spreadsheet automatically recalculates. • Database software, e.g. Microsoft Access. Used to maintain records, e.g. a library stores the name, address and membership number of borrowers. A database can search these records and print reports. • Presentation software, e.g. Microsoft PowerPoint, helps you prepare and give a multimedia presentation to an audience. This could include: slides with text, graphics, hyperlinks and notes for the speaker. • Project management software, e.g. Microsoft Project, is used to track the timelines of all the tasks that have to be done to complete a project, e.g. when constructing a building. Timelines are displayed in a Gantt chart. 16Chapter 3: Software Web browser software, communications software and web authoring software • Using web browser software, e.g. Mozilla Firefox, you can access websites by entering their web address or URL (uniform resource locator) or clicking on hyperlinks . • Using a search engine , e.g. Google, you can search the Web by entering keywords. • Email is accessed using:
Print document
In order to print this document from Scribd, you'll
• an email client running on your own computer, e.g. Microsoft Outlook. need to download it. browser. • Webmail, that is, emailfirst accessed using a web • Web authoring software, e.g. Adobe Dreamweaver, is used to create and update websites. A website is a structured collection of web pages written in HTML (Hypertext Cancel Download And Print Markup Language). Image and sound editing software • Graphics software, e.g. Adobe Photoshop, is used to create and retouch, crop and resize images. • Video editing software, e.g. Microsoft Movie Maker, is used to edit videos im ported from digital cameras and camcorders. You can insert titles, transitions, voiceovers and sound effects, and save the video in different formats, e.g. mp4. • Audio editing software, e.g. Audacity, is used to create and edit music and sounds. You can record live music and input digital sound files, insert voiceovers, and change pitch and tempo. Control software Control software is used to monitor and control external devices, e.g. robots, and ICT systems, for purposes such as air conditioning in large buildings. Computers do this using sensors and actuators. Sensors are devices that can measure variables such as pressure, temperature and humidity. Actuators make changes under the control of the computer – some examples are motors, pumps and heaters. Educational software A wide range of educational software supports teaching and learning, e.g. Star French helps you learn French, and Spex Classic helps with teaching design and technology
122- Types of software license. Software is copyrighted. It is illegal to use it without a software lisence . Types of license are: • Licensed software. Purchasers buy the right to use it. • Public domain software is free and has no restrictions on its use but you might not be given the source code. • Open source. Licenses are free and you have access to the source code and are allowed to modify it. • Shareware is licensed software that is initially free to try out. However, you must pay for a license if you decide to make regular use of it. • Creative Commons licenses help software producers communicate the rights they keep for themselves and the rights they give to others.
123- Connections to the internet. • Narrowband users dial up their ISP using a telephone. Data is transm itted at speeds up to 56 Kbps. This is slow but inexpensive. • Broadband is data transmission using: • ADSL (Asymmetric Digital Subscriber L ine), which provides speeds up to 100Mbps and a continuous connection to the Internet; • Cable technology; • Mobile telephone networks, e.g. 3G.
Print document
In order to print this document from Scribd, you'll
TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of rules used on the first need tocommunicate download it. Internet to define how computers with each other. It is a universal standard that enables hardware and different operating systems to communicate. 124- Types of IP.
Cancel
Download And Print
Each computer on the Internet has a unique IP (Internet Protocol) address, e.g. 196.161.232.4. The IP address could be static (it remains the same every time you connect) or it could be dynamic (it changes each time you connect).
125- Difference of web and internet. The Internet and the Web are not the same. The Internet is the network and the Web is the multimedia services that run on it.
126- Ad/dis of static IP. Advantages of Static IP -
Stability – In case of applications such as authenticated services on web servers and file downloads the connection should be stable. In static IP a small interruption in the connection usually does not terminate the packet exchange with the service. Hosting – Since there is no change of IP address, this is suitable f or applications which use Voice over Internet Protocol (VOIP),gaming applications, and Virtual Private Network(VPN). Preferred address for servers – Static IP addresses is ideal if your computer acts as a server. The reason is it gives your file server relatively faster file uploads and downloads. Convenient remote access– When you remotely connect to a computer you need not worry about the changes in the IP address during the connected session. Also when you connect to your computer through applications such as remote desktop, you need not be bothered about losing the IP address. Reduced down time– The IP never resets. In other words your computer need not send any request for renewal. This makes it an ideal choice for seam less connectivity. Disadvantages -
Security– Static IP Address could be a security risk as the IP address is constant. There is a greater chance of hacking the website. Also you cannot easily change the Static IP once it has been hack ed. This makes your system very susceptible to continuous attack. It is imperative to put preventive measures in place before obtaining a static IP such as Internet security suites and router firewalls. Uptime – static IPs are preferred for hosting servers and f ile transfer protocol sites. So the servers have to be on all the time to host these functions. The cost of constantly running a server is exorbitant. Configuration – The process to set a static IP is manual and relatively complex. Occasionally, external software is required for this purpose. Also several consumer level ISPs lack support for static IPs. Keeping pace with technology – The field of computers is rapidly changing. It is possible that a static IP computer running a server becomes obsolete in the near future. It is relatively complex to transfer the server settings from a static IP computer to a new computer. It is wise to invest in an easily upgradable computer to run a static IP server.
Print document
In order to print this document from Scribd, you'll first need to download it.
127- Ad/dis of Dynamic IP.
Advantages of Dynamic IP Address: Cancel Download And Print Security –Computers having Dynamic IP address have relatively lower security risk (as your computer is assigned a new IP address each time you log on). Lower cost - Cost effective as compared to the static kind of address Automatic network configuration –The user does not have to do the network configuration. That is taken care of.
Disadvantages of Dynamic IP Address:
Security issues – DHCP (Dynamic Host Configuration Protocol) automation can be significant security threat in case of a rogue DHCP server. This server is not in the control of the network personnel. If any user connects to it, information over that connection can be intercepted and looked at. Thus network security and user privacy is violated. Network Failure –If only a single DHCP server is in place, it‟s failure causes a system wide issue. In case of server failure, any connected computers that don‟t alre ady have an IP address will try and fail to obtain one. Computers which already have an IP address before the server‟s failure will try to renew it, which will cause the computer losing its IP address. Less Reliable – Note that Dynamic IP addressing should not be used for VOIP, VPN, playing online games as Dynamic IP addressing is less reliable then Static IP addressing and could cause the service to disconnect while you are on a VOIP, VPN or gaming. 128- What are cookies? Cookies are saved on your hard disk by websites and contain personal information that can be accessed by the website. Use a cookie manager to block cookies or remove them using a browser. 129- How payroll system works. Employees each have their own swipe card and their unique employee number is recorded on it. The amount of hours they work is recorded on the swipe card by recording when they arrive ( clock in ) and when they leave ( clock out). All this information is input into the ICT system each day.
Validation checks are made on all the data input and the validated data is written to the unsorted transaction file. Data that does not chang e every week is saved on the old master file. The payroll program matches an employee‟s transaction file record with the corresponding old master file record . The hours worked are calculated from the clock in and clock out times on the sorted transaction file. The hourly rate of pay is found on the old master fi le so that gross pay can be calculated. Tax details on the old master file are used to calculate deductions from the gross pay to arrive at net pay. The cumulative totals on the master file are amended (updated); e.g. the tax paid will be added to the total tax paid this year, and a new master file record is created. Backups of files are automatically generated so that corresponding copies of the sorted transaction fi les and old master files can be used to restore the current files. The ancestral backup system can be used to provide three levels of backup. Validation checks help ensure that data is reasonable.