1/81
A comprehensive set of flashcards covering key theory and practical concepts from the CAIE IGCSE ICT (0417) syllabus, including hardware, software, networking, security, system life cycle, data handling, web development, and emerging technologies.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the main difference between hardware and software?
Hardware is the tangible, physical component of a computer system, whereas software is the set of programs/instructions that control the hardware and cannot be physically touched.
Give two examples of internal hardware devices.
Examples include the processor (CPU), motherboard, RAM, ROM, internal HDD/SSD, or video/sound cards.
Give two examples of external hardware devices.
Examples include monitor, keyboard, mouse, printer, or external storage drives.
What are the two main categories of software?
Application software (performs user-oriented tasks) and system software (controls hardware and runs applications).
Name the three main parts of the CPU (microprocessor).
Control Unit (CU), Arithmetic & Logic Unit (ALU), and Immediate Access Store (RAM).
State one key characteristic of RAM.
RAM is volatile, meaning its contents are lost when the computer is powered off; it stores data/programs that are currently in use.
State one key characteristic of ROM.
ROM is non-volatile and permanently stores data such as the BIOS that is needed to boot the computer.
What is the function of the BIOS?
The BIOS performs hardware checks on start-up and loads the operating system into RAM.
Define an input device and give one example.
An input device provides data for processing; e.g., a keyboard, mouse, or scanner.
Define an output device and give one example.
An output device displays the results of processing; e.g., a monitor or printer.
What is secondary/backing storage used for?
Storing data and programs that are not currently being used, providing long-term, non-volatile storage.
Name the two main types of user interface in an operating system.
Command Line Interface (CLI) and Graphical User Interface (GUI).
Give one advantage and one disadvantage of a CLI.
Advantage: low hardware requirements and powerful for experts; Disadvantage: user must memorise commands and cannot make typing errors.
Give one advantage and one disadvantage of a GUI.
Advantage: user-friendly, no need to learn commands; Disadvantage: requires more memory and is more expensive than CLI.
State one advantage of a desktop computer over a laptop.
Desktops generally have better specifications and easier upgrade options at a lower cost.
State one disadvantage of a desktop computer compared with a laptop.
They are not portable and take up more desk space.
List two advantages of using a laptop.
Portability and the ability to utilise Wi-Fi anywhere.
What is Artificial Intelligence (AI) mainly concerned with?
Creating computer systems that mimic or simulate human intelligence.
Give one everyday benefit of biometrics.
Improved security, e.g., fingerprint locks on smartphones or secure access to buildings.
Differentiate between LVES and NVE vision enhancement.
LVES enlarges images on a headset for low-vision users; NVE amplifies dim light for clear night-time viewing.
What is quantum cryptography used for?
Sending data/messages with complete privacy by using principles of quantum physics.
Define Computer-Assisted Translation (CAT).
Software tools that aid human translators, such as spell-checkers, translation memory, and language search engines.
Explain the basic principle of virtual reality (VR).
Computers create an artificial 3-D environment that users can interact with using goggles, gloves, and other interfaces.
State two typical uses of sensors in computing.
Monitoring temperature in greenhouses and detecting pressure in burglar alarms.
What is the main advantage of direct data entry like magnetic stripe readers?
Fast, error-free data capture without manual typing.
Why is MICR preferred for cheque processing?
Magnetic ink characters are difficult to alter and can still be read even if over-written, providing high security.
Give one advantage of OMR over OCR.
OMR is generally faster and more accurate because it only detects marks, not characters.
What is the role of a router in networking?
Routes packets between different networks based on IP addresses and determines the best path.
Differentiate between a hub and a switch.
A hub broadcasts data to all ports; a switch sends data only to the device with the matching MAC address.
What is Wi-Fi ‘war driving’?
Driving around to locate unsecured Wi-Fi hotspots for potential misuse.
What is the purpose of an ISP?
To provide customers with access to the internet, usually for a monthly fee.
State one advantage and one disadvantage of LANs.
Advantage: resource sharing and easier communication; Disadvantage: viruses spread easily and security risks increase.
Define hacking.
Unauthorised access to a computer system, often to steal, alter, or delete data.
What does encryption achieve in data security?
Transforms data into an unreadable form so that only authorised parties with the key can decode it.
Explain the difference between phishing and pharming.
Phishing uses emails to trick users into revealing data; pharming silently redirects users to fake websites via malicious code.
Why is SSL indicated by ‘https’ and a padlock icon?
Because SSL encrypts data transmitted between browser and server, ensuring secure communication.
Give one reason for backing up data.
To safeguard against data loss due to hardware failure or file corruption.
Compare serial access with direct access storage.
Serial access reads data sequentially (slow), while direct access retrieves data directly by key field (fast).
State one advantage of a fixed hard disk drive.
Very fast data transfer rate and large storage capacity.
Give one disadvantage of magnetic tape storage.
Very slow access time because data is read sequentially.
What does the ‘R’ in CD-R or DVD-R stand for and mean?
'Recordable'; the disc can be written to once and then becomes read-only.
State one advantage of DVD-RAM over DVD-RW.
It allows simultaneous reading and writing and has a longer rewrite life (≈100,000 cycles).
Why are SSDs generally faster than HDDs?
They have no moving parts, so they do not need to spin up or seek mechanically before accessing data.
List two common solid-state storage devices.
Solid-state drives (SSD) and USB flash drives/memory sticks.
What is the main function of a NIC?
To allow a computer to connect to a network, either via cable (wired NIC) or Wi-Fi (wireless NIC).
Define ‘firewall’.
A hardware or software security system that filters incoming and outgoing network traffic based on predetermined rules.
Name the six primary stages of the system life cycle.
Analysis, Design, Development & Testing, Implementation, Documentation, Evaluation.
Give one advantage of parallel running when implementing a new system.
If the new system fails, the old system is still available as backup.
Why is user documentation important?
It teaches end-users how to operate the new system, including login, data entry, troubleshooting, and error messages.
What is RSI and how can it be prevented?
Repetitive Strain Injury; prevent by taking breaks, using ergonomic keyboards/mice, and maintaining correct posture.
List two health hazards associated with prolonged computer use.
Eyestrain and back/neck problems.
What does ‘e-safety’ refer to?
Protecting personal data and maintaining safety when using the internet.
State two guidelines for strong passwords.
Use a combination of upper- & lower-case letters, numbers, and symbols; change passwords regularly.
Explain what cookies do in a web browser.
Small text files stored by websites to remember user preferences and track visits.
Give one advantage and one disadvantage of online shopping for customers.
Advantage: shop 24/7 anywhere; Disadvantage: cannot physically inspect goods and risk of fraud.
What is an expert system?
A computer program that uses a knowledge base and inference engine to mimic human expert decision-making.
Name the three core components of an expert system.
Knowledge base, inference engine, and user interface (plus rules base).
How does a biometric fingerprint scanner improve security?
It authenticates users based on unique physical traits that are difficult to replicate or forget.
What is GIS used for?
Capturing, analysing, and displaying geographically referenced information (e.g., mapping shortest routes).
Describe one use of 3-D printing in medicine.
Creating prosthetics or printing models of organs from MRI scans for surgical planning.
Which network type covers a small area like an office building?
Local Area Network (LAN).
What device converts digital data to analogue for transmission on telephone lines?
A modem (modulator-demodulator).
Define ‘cloud storage’.
Remote data storage on internet servers, accessible via network connection with appropriate authentication.
State one moral or ethical concern when creating ICT solutions.
Ensuring content does not infringe copyright, contain offensive material, or violate user privacy.
What is meant by ‘validation’ during data entry?
Automatic checks (range, length, format, etc.) to ensure data is sensible and meets predefined criteria.
Differentiate between verification and validation.
Verification checks data is copied accurately from one medium to another; validation checks data is reasonable/acceptable when entered.
Give an example of a validation rule and its purpose.
Range check: ensures an entered age is between 0 and 120 to prevent impossible values.
Define ‘flat-file database’.
A single table storing all data; may suffer from duplication and difficulty handling complex queries.
What is a primary key in a database?
A unique field that identifies each record in a table.
Why are relational databases preferred over flat-file databases?
They eliminate data redundancy, support complex queries, and enhance security by linking multiple related tables.
What does CSS stand for and what is its purpose?
Cascading Style Sheet; controls the presentation (layout, fonts, colours) of HTML web pages.
Why are relative file paths normally used for attaching stylesheets?
Because the CSS file is stored in the same directory as the webpage on the server, making maintenance easier when domains change.
Name the three layers of web development.
Content/structure (HTML), presentation (CSS), and behaviour (JavaScript scripting).
What does FTP stand for and when is it used?
File Transfer Protocol; used to upload website files to a web server.
Give one advantage of using a multimedia projector for presentations.
Allows a large audience to view content simultaneously without crowding around a single screen.
Why do laser printers rely on large buffer memory?
They store the entire document before printing, enabling fast, high-quality output of multiple pages.
State one key difference between inkjet and laser printers.
Inkjet printers spray liquid ink and are cheaper to buy but slower for large jobs; laser printers use toner and are faster for high-volume printing.
Explain ‘hotspot’ in Wi-Fi terminology.
A physical location where a wireless access point provides internet connectivity to devices.
What is meant by ‘real-time process control’?
Systems where sensor data is continuously monitored and the computer instantly sends signals to control the process.
State one advantage of using robots in manufacturing.
Robots can operate 24/7, improving consistency and productivity while performing dangerous or repetitive tasks.
Why is evaluation necessary after implementing a system?
To ensure the new system meets objectives, identify limitations, and decide on improvements or maintenance needs.
Give one limitation of biometric authentication.
Readers can be expensive and injuries or changes (e.g., cuts on a finger) may deny access.