ICT IGCSE questions

5.0(1)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/274

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

275 Terms

1
New cards

Backup

A copy of data created to protect against damage or loss.

2
New cards

User ID

A unique identifier used to log on to a network.

3
New cards

Email filtering

A process to classify and separate spam mails from legitimate emails.

4
New cards

User privilege

The level of access and permissions assigned to a user once they log in to a network.

5
New cards

Administrator

The top-level privilege for a network, responsible for managing passwords and files on the server.

6
New cards

Block and report

Actions to be taken when encountering suspicious or inappropriate users in a network area.

7
New cards

Nickname

An alternative name used instead of a real name on the internet.

8
New cards

Private chat rooms

Online spaces where users should be cautious about sharing personal information.

9
New cards

Password

A combination of letters and numbers used to secure access to a system or account.

10
New cards

Password verification

The process of typing in a password twice to ensure accuracy and prevent input errors.

11
New cards

Password reset

The action of having an administrator change a forgotten password.

12
New cards

Password recovery

The process of retrieving a forgotten password through an email address.

13
New cards

Authentication techniques

Methods that use features of the human body, such as fingerprints or voice recognition, to confirm identity.

14
New cards

Secure webpage

A webpage that starts with "https" and may display a padlock sign, indicating a secure connection.

15
New cards

Phishing

A fraudulent operation that uses emails to gather personal and financial information from recipients.

16
New cards

Digital certificate

An electronic passport used to secure data sent over the internet and verify the sender's trusted source.

17
New cards

Pharming

A scam where malicious code misdirects users to fraudulent websites without their knowledge.

18
New cards

Personal information storage

Concerns about storing personal information and the risk of identity theft.

19
New cards

Spoof websites

Websites created to mimic legitimate ones and gather personal information from users.

20
New cards

Email sender trustworthiness

Digital certificates can confirm the trustworthiness of an email sender.

21
New cards

Phishing email filtering

ISPs attempt to filter out phishing emails to protect their users.

22
New cards

Wireless Personal Area Networking (WPAN)

Bluetooth is an example of this wireless technology.

23
New cards

URLs

Web browsers use URLs to retrieve files from the internet.

24
New cards

Spread spectrum transmission

Radio waves used to provide wireless links between devices and internet connection.

25
New cards

Web addresses

Two forms include standard form (4 numbers) and alphanumeric form.

26
New cards

Small home network

A network created within a home to share resources.

27
New cards

Site address composition

Includes computer name, domain name, domain type, and country code.

28
New cards

HTTP

The protocol commonly used in web addresses.

29
New cards

Camera to mobile phone transfer

Photos can be transferred using this system.

30
New cards

Internet access

Users can access the internet through a web browser.

31
New cards

Email

A method for sending text and attachments from one computer to another over a network.

32
New cards

Dial-up

The slowest type of internet access that ties up a telephone line.

33
New cards

Cable networks

Provide internet access through local cable television operators.

34
New cards

Internet Service Provider (ISP)

A company that provides users with access to the internet.

35
New cards

Router/modem

Connects a LAN to the internet and requires a username and password.

36
New cards

Network environment advantages

Sharing resources, communication between users, and network administrator control and monitoring.

37
New cards

Internet uses

Web browsing, email, file sharing, video conferencing, online banking, entertainment, advertising & blogging, social media.

38
New cards

Wireless LANs (WLANs)

LANs that do not involve any wiring or cabling and use radio or infrared signals.

39
New cards

Access Points (APs)

Used in WLANs to provide wireless network connections over a short distance.

40
New cards

Spread spectrum technology

Usually used by APs in WLANs.

41
New cards

Intranet

A private internet accessible only to specific users.

42
New cards

Biometrics

The use of unique physical characteristics, such as fingerprints, for identification.

43
New cards

Fingerprint scanner

Used in schools to verify and record student attendance.

44
New cards

Embedded processor

A type of computer that controls robots and receives instructions.

45
New cards

Advantages of using robots for repetitive tasks

Efficiency, no wages required, continuous work, and sensor-equipped for gathering information.

46
New cards

Disadvantages of using robots for repetitive tasks

Initial cost, potential denial of access due to fingerprint damages, magnetic field interference with ID cards, and privacy concerns.

47
New cards

Spreadsheets

Used to record students' performances, compare performances, and eliminate the need for paper records.

48
New cards

Software for organizing examinations

Ensures proper enrollment, prints timetables, assigns examination rooms and invigilators, and gathers results in a student database.

49
New cards

School management system

A software system that helps manage various aspects of a school, such as attendance, timetables, bookings, and substitutions.

50
New cards

Absenteeism

The act of being absent or missing from school or work.

51
New cards

Digital tickets

Electronic tickets that are used for various purposes, such as booking seats or tracking attendance.

52
New cards

Timetables

Schedules that outline the timing and sequence of classes or activities.

53
New cards

Teaching cover/substitution

The process of finding a replacement teacher when the original teacher is absent.

54
New cards

Booking system

A system that allows users to make reservations or bookings for various services or events.

55
New cards

Ticket database

A database that stores information related to tickets, such as transaction details and reference numbers.

56
New cards

Wide area network (WAN)

A network that covers a large geographical area and allows for the global sharing of data.

57
New cards

Intranet

A private network that allows for the secure sharing of information within a specific company or organization.

58
New cards

Internet service provider (ISP)

A company that provides internet access to users.

59
New cards

LAN (Local Area Network)

A network that covers a small area, such as a building, and allows for local sharing of data.

60
New cards

Routers, modems, and proxy servers

Hardware devices used in a WAN to facilitate the connection and transmission of data.

61
New cards

Phishing

A fraudulent practice of obtaining sensitive information, such as usernames and passwords, by posing as a trustworthy entity.

62
New cards

Pharming

A technique used to redirect users to fraudulent websites without their knowledge.

63
New cards

Tablet computers

Portable devices with touchscreens that can be used for various purposes, including accessing the internet.

64
New cards

Network security issues

Concerns and challenges related to protecting a network from unauthorized access, hacking, phishing, and viruses.

65
New cards

Video camera

A device used to capture and record video footage.

66
New cards

DV camera

A digital video camera that records footage in a digital format.

67
New cards

Webcam

A camera that is connected to a computer and used for video conferencing or online chatting.

68
New cards

Chip & PIN readers

Devices used for secure payment transactions by reading the chip on a payment card and requiring a PIN.

69
New cards

Optical Mark Reader (OMR)

A device used to read marks written on questionnaires or examination papers.

70
New cards

RFID readers

Devices used to read data from RFID tags, which are attached to or inside objects.

71
New cards

User ID and password protection

A security measure that requires users to provide a unique ID and password to access personal internet journals and email services.

72
New cards

Blogs

Online platforms where individuals can post their observations and thoughts on various topics.

73
New cards

Email groups

Groups of email addresses that make it easier to send out multiple emails by grouping them under one name.

74
New cards

Offensive comments on blogs

Comments that can lead to prosecution as they are not immune from the law.

75
New cards

Spammers

Individuals who create email groups by buying addresses of people from a certain company and sending mass emails.

76
New cards

Wikis

Web pages with an edit button that allow users to easily create and edit web pages without using a web browser.

77
New cards

World Wide Web (WWW)

A system of interlinked hypertext documents accessed via the internet.

78
New cards

Social networking sites

Platforms that enable people to share photos, music, videos, interests, and views with others who share the same interests.

79
New cards

Protocols

A set of rules followed between the sender and recipient of data being transferred between devices.

80
New cards

HyperText Transfer Protocol (HTTP)

A protocol followed between sending and receiving devices when data is being transferred using the internet.

81
New cards

HTTPS

The secure variant of HTTP, which encrypts the data being transferred.

82
New cards

Hyperlink

Data that redirects the user to another webpage or section of the same webpage/file when clicked.

83
New cards

File Transfer Protocol (FTP)

Used to upload website files to the web hosting space, requiring login details to the web hosting server.

84
New cards

Advantages of getting information from websites

Easier access to information through search engines and linking keywords to find relevant information.

85
New cards

Challenges of using information from the internet

Unreliable, inaccurate, or biased information and information overload.

86
New cards

Selecting reliable websites for information

Ensuring the use of websites that properly cite their sources.

87
New cards

Images

Visual content that can be edited and used to enhance content.

88
New cards

Wikis

Anyone can use wikis, but the content should be treated with caution.

89
New cards

Digital to analogue converters (DACs)

Allow for the production of physical scale models and reuse of powders.

90
New cards

Fixed hard disks/drives

The main method used for data storage on computers.

91
New cards

Magnetic backing storage media

Used in many domestic appliances.

92
New cards

Read/write head

Used to write and read data from magnetic storage media.

93
New cards

Advantages of fixed hard disks/drives

Fast data transfer rate, fast access times, and large memory capacities.

94
New cards

Disadvantages of fixed hard disks/drives

Lack of portability and susceptibility to damage.

95
New cards

Buzzers

Used in burglar alarm systems, cookers, and microwave ovens.

96
New cards

Heaters as storage devices

Used in automatic washing machines, cookers, and central heating systems.

97
New cards

Portable and removable hard disks/drives

Used to transfer data, files, and software between computers.

98
New cards

Advantages of lights as storage devices

Fast data access time and transfer rate, large memory capacities, and ability to transfer information between computers.

99
New cards

Disadvantages of lights as storage devices

Susceptibility to damage.

100
New cards

Magnetic tapes and drives

Used in applications where batch processing is used and as backup media.