CAIE IGCSE ICT (0417) – Theory & Practical Review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/81

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards covering key theory and practical concepts from the CAIE IGCSE ICT (0417) syllabus, including hardware, software, networking, security, system life cycle, data handling, web development, and emerging technologies.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

82 Terms

1
New cards

What is the main difference between hardware and software?

Hardware is the tangible, physical component of a computer system, whereas software is the set of programs/instructions that control the hardware and cannot be physically touched.

2
New cards

Give two examples of internal hardware devices.

Examples include the processor (CPU), motherboard, RAM, ROM, internal HDD/SSD, or video/sound cards.

3
New cards

Give two examples of external hardware devices.

Examples include monitor, keyboard, mouse, printer, or external storage drives.

4
New cards

What are the two main categories of software?

Application software (performs user-oriented tasks) and system software (controls hardware and runs applications).

5
New cards

Name the three main parts of the CPU (microprocessor).

Control Unit (CU), Arithmetic & Logic Unit (ALU), and Immediate Access Store (RAM).

6
New cards

State one key characteristic of RAM.

RAM is volatile, meaning its contents are lost when the computer is powered off; it stores data/programs that are currently in use.

7
New cards

State one key characteristic of ROM.

ROM is non-volatile and permanently stores data such as the BIOS that is needed to boot the computer.

8
New cards

What is the function of the BIOS?

The BIOS performs hardware checks on start-up and loads the operating system into RAM.

9
New cards

Define an input device and give one example.

An input device provides data for processing; e.g., a keyboard, mouse, or scanner.

10
New cards

Define an output device and give one example.

An output device displays the results of processing; e.g., a monitor or printer.

11
New cards

What is secondary/backing storage used for?

Storing data and programs that are not currently being used, providing long-term, non-volatile storage.

12
New cards

Name the two main types of user interface in an operating system.

Command Line Interface (CLI) and Graphical User Interface (GUI).

13
New cards

Give one advantage and one disadvantage of a CLI.

Advantage: low hardware requirements and powerful for experts; Disadvantage: user must memorise commands and cannot make typing errors.

14
New cards

Give one advantage and one disadvantage of a GUI.

Advantage: user-friendly, no need to learn commands; Disadvantage: requires more memory and is more expensive than CLI.

15
New cards

State one advantage of a desktop computer over a laptop.

Desktops generally have better specifications and easier upgrade options at a lower cost.

16
New cards

State one disadvantage of a desktop computer compared with a laptop.

They are not portable and take up more desk space.

17
New cards

List two advantages of using a laptop.

Portability and the ability to utilise Wi-Fi anywhere.

18
New cards

What is Artificial Intelligence (AI) mainly concerned with?

Creating computer systems that mimic or simulate human intelligence.

19
New cards

Give one everyday benefit of biometrics.

Improved security, e.g., fingerprint locks on smartphones or secure access to buildings.

20
New cards

Differentiate between LVES and NVE vision enhancement.

LVES enlarges images on a headset for low-vision users; NVE amplifies dim light for clear night-time viewing.

21
New cards

What is quantum cryptography used for?

Sending data/messages with complete privacy by using principles of quantum physics.

22
New cards

Define Computer-Assisted Translation (CAT).

Software tools that aid human translators, such as spell-checkers, translation memory, and language search engines.

23
New cards

Explain the basic principle of virtual reality (VR).

Computers create an artificial 3-D environment that users can interact with using goggles, gloves, and other interfaces.

24
New cards

State two typical uses of sensors in computing.

Monitoring temperature in greenhouses and detecting pressure in burglar alarms.

25
New cards

What is the main advantage of direct data entry like magnetic stripe readers?

Fast, error-free data capture without manual typing.

26
New cards

Why is MICR preferred for cheque processing?

Magnetic ink characters are difficult to alter and can still be read even if over-written, providing high security.

27
New cards

Give one advantage of OMR over OCR.

OMR is generally faster and more accurate because it only detects marks, not characters.

28
New cards

What is the role of a router in networking?

Routes packets between different networks based on IP addresses and determines the best path.

29
New cards

Differentiate between a hub and a switch.

A hub broadcasts data to all ports; a switch sends data only to the device with the matching MAC address.

30
New cards

What is Wi-Fi ‘war driving’?

Driving around to locate unsecured Wi-Fi hotspots for potential misuse.

31
New cards

What is the purpose of an ISP?

To provide customers with access to the internet, usually for a monthly fee.

32
New cards

State one advantage and one disadvantage of LANs.

Advantage: resource sharing and easier communication; Disadvantage: viruses spread easily and security risks increase.

33
New cards

Define hacking.

Unauthorised access to a computer system, often to steal, alter, or delete data.

34
New cards

What does encryption achieve in data security?

Transforms data into an unreadable form so that only authorised parties with the key can decode it.

35
New cards

Explain the difference between phishing and pharming.

Phishing uses emails to trick users into revealing data; pharming silently redirects users to fake websites via malicious code.

36
New cards

Why is SSL indicated by ‘https’ and a padlock icon?

Because SSL encrypts data transmitted between browser and server, ensuring secure communication.

37
New cards

Give one reason for backing up data.

To safeguard against data loss due to hardware failure or file corruption.

38
New cards

Compare serial access with direct access storage.

Serial access reads data sequentially (slow), while direct access retrieves data directly by key field (fast).

39
New cards

State one advantage of a fixed hard disk drive.

Very fast data transfer rate and large storage capacity.

40
New cards

Give one disadvantage of magnetic tape storage.

Very slow access time because data is read sequentially.

41
New cards

What does the ‘R’ in CD-R or DVD-R stand for and mean?

'Recordable'; the disc can be written to once and then becomes read-only.

42
New cards

State one advantage of DVD-RAM over DVD-RW.

It allows simultaneous reading and writing and has a longer rewrite life (≈100,000 cycles).

43
New cards

Why are SSDs generally faster than HDDs?

They have no moving parts, so they do not need to spin up or seek mechanically before accessing data.

44
New cards

List two common solid-state storage devices.

Solid-state drives (SSD) and USB flash drives/memory sticks.

45
New cards

What is the main function of a NIC?

To allow a computer to connect to a network, either via cable (wired NIC) or Wi-Fi (wireless NIC).

46
New cards

Define ‘firewall’.

A hardware or software security system that filters incoming and outgoing network traffic based on predetermined rules.

47
New cards

Name the six primary stages of the system life cycle.

Analysis, Design, Development & Testing, Implementation, Documentation, Evaluation.

48
New cards

Give one advantage of parallel running when implementing a new system.

If the new system fails, the old system is still available as backup.

49
New cards

Why is user documentation important?

It teaches end-users how to operate the new system, including login, data entry, troubleshooting, and error messages.

50
New cards

What is RSI and how can it be prevented?

Repetitive Strain Injury; prevent by taking breaks, using ergonomic keyboards/mice, and maintaining correct posture.

51
New cards

List two health hazards associated with prolonged computer use.

Eyestrain and back/neck problems.

52
New cards

What does ‘e-safety’ refer to?

Protecting personal data and maintaining safety when using the internet.

53
New cards

State two guidelines for strong passwords.

Use a combination of upper- & lower-case letters, numbers, and symbols; change passwords regularly.

54
New cards

Explain what cookies do in a web browser.

Small text files stored by websites to remember user preferences and track visits.

55
New cards

Give one advantage and one disadvantage of online shopping for customers.

Advantage: shop 24/7 anywhere; Disadvantage: cannot physically inspect goods and risk of fraud.

56
New cards

What is an expert system?

A computer program that uses a knowledge base and inference engine to mimic human expert decision-making.

57
New cards

Name the three core components of an expert system.

Knowledge base, inference engine, and user interface (plus rules base).

58
New cards

How does a biometric fingerprint scanner improve security?

It authenticates users based on unique physical traits that are difficult to replicate or forget.

59
New cards

What is GIS used for?

Capturing, analysing, and displaying geographically referenced information (e.g., mapping shortest routes).

60
New cards

Describe one use of 3-D printing in medicine.

Creating prosthetics or printing models of organs from MRI scans for surgical planning.

61
New cards

Which network type covers a small area like an office building?

Local Area Network (LAN).

62
New cards

What device converts digital data to analogue for transmission on telephone lines?

A modem (modulator-demodulator).

63
New cards

Define ‘cloud storage’.

Remote data storage on internet servers, accessible via network connection with appropriate authentication.

64
New cards

State one moral or ethical concern when creating ICT solutions.

Ensuring content does not infringe copyright, contain offensive material, or violate user privacy.

65
New cards

What is meant by ‘validation’ during data entry?

Automatic checks (range, length, format, etc.) to ensure data is sensible and meets predefined criteria.

66
New cards

Differentiate between verification and validation.

Verification checks data is copied accurately from one medium to another; validation checks data is reasonable/acceptable when entered.

67
New cards

Give an example of a validation rule and its purpose.

Range check: ensures an entered age is between 0 and 120 to prevent impossible values.

68
New cards

Define ‘flat-file database’.

A single table storing all data; may suffer from duplication and difficulty handling complex queries.

69
New cards

What is a primary key in a database?

A unique field that identifies each record in a table.

70
New cards

Why are relational databases preferred over flat-file databases?

They eliminate data redundancy, support complex queries, and enhance security by linking multiple related tables.

71
New cards

What does CSS stand for and what is its purpose?

Cascading Style Sheet; controls the presentation (layout, fonts, colours) of HTML web pages.

72
New cards

Why are relative file paths normally used for attaching stylesheets?

Because the CSS file is stored in the same directory as the webpage on the server, making maintenance easier when domains change.

73
New cards

Name the three layers of web development.

Content/structure (HTML), presentation (CSS), and behaviour (JavaScript scripting).

74
New cards

What does FTP stand for and when is it used?

File Transfer Protocol; used to upload website files to a web server.

75
New cards

Give one advantage of using a multimedia projector for presentations.

Allows a large audience to view content simultaneously without crowding around a single screen.

76
New cards

Why do laser printers rely on large buffer memory?

They store the entire document before printing, enabling fast, high-quality output of multiple pages.

77
New cards

State one key difference between inkjet and laser printers.

Inkjet printers spray liquid ink and are cheaper to buy but slower for large jobs; laser printers use toner and are faster for high-volume printing.

78
New cards

Explain ‘hotspot’ in Wi-Fi terminology.

A physical location where a wireless access point provides internet connectivity to devices.

79
New cards

What is meant by ‘real-time process control’?

Systems where sensor data is continuously monitored and the computer instantly sends signals to control the process.

80
New cards

State one advantage of using robots in manufacturing.

Robots can operate 24/7, improving consistency and productivity while performing dangerous or repetitive tasks.

81
New cards

Why is evaluation necessary after implementing a system?

To ensure the new system meets objectives, identify limitations, and decide on improvements or maintenance needs.

82
New cards

Give one limitation of biometric authentication.

Readers can be expensive and injuries or changes (e.g., cuts on a finger) may deny access.