ICT IGCSE questions

studied byStudied by 1 person
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 274

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

275 Terms

1

Backup

A copy of data created to protect against damage or loss.

New cards
2

User ID

A unique identifier used to log on to a network.

New cards
3

Email filtering

A process to classify and separate spam mails from legitimate emails.

New cards
4

User privilege

The level of access and permissions assigned to a user once they log in to a network.

New cards
5

Administrator

The top-level privilege for a network, responsible for managing passwords and files on the server.

New cards
6

Block and report

Actions to be taken when encountering suspicious or inappropriate users in a network area.

New cards
7

Nickname

An alternative name used instead of a real name on the internet.

New cards
8

Private chat rooms

Online spaces where users should be cautious about sharing personal information.

New cards
9

Password

A combination of letters and numbers used to secure access to a system or account.

New cards
10

Password verification

The process of typing in a password twice to ensure accuracy and prevent input errors.

New cards
11

Password reset

The action of having an administrator change a forgotten password.

New cards
12

Password recovery

The process of retrieving a forgotten password through an email address.

New cards
13

Authentication techniques

Methods that use features of the human body, such as fingerprints or voice recognition, to confirm identity.

New cards
14

Secure webpage

A webpage that starts with "https" and may display a padlock sign, indicating a secure connection.

New cards
15

Phishing

A fraudulent operation that uses emails to gather personal and financial information from recipients.

New cards
16

Digital certificate

An electronic passport used to secure data sent over the internet and verify the sender's trusted source.

New cards
17

Pharming

A scam where malicious code misdirects users to fraudulent websites without their knowledge.

New cards
18

Personal information storage

Concerns about storing personal information and the risk of identity theft.

New cards
19

Spoof websites

Websites created to mimic legitimate ones and gather personal information from users.

New cards
20

Email sender trustworthiness

Digital certificates can confirm the trustworthiness of an email sender.

New cards
21

Phishing email filtering

ISPs attempt to filter out phishing emails to protect their users.

New cards
22

Wireless Personal Area Networking (WPAN)

Bluetooth is an example of this wireless technology.

New cards
23

URLs

Web browsers use URLs to retrieve files from the internet.

New cards
24

Spread spectrum transmission

Radio waves used to provide wireless links between devices and internet connection.

New cards
25

Web addresses

Two forms include standard form (4 numbers) and alphanumeric form.

New cards
26

Small home network

A network created within a home to share resources.

New cards
27

Site address composition

Includes computer name, domain name, domain type, and country code.

New cards
28

HTTP

The protocol commonly used in web addresses.

New cards
29

Camera to mobile phone transfer

Photos can be transferred using this system.

New cards
30

Internet access

Users can access the internet through a web browser.

New cards
31

Email

A method for sending text and attachments from one computer to another over a network.

New cards
32

Dial-up

The slowest type of internet access that ties up a telephone line.

New cards
33

Cable networks

Provide internet access through local cable television operators.

New cards
34

Internet Service Provider (ISP)

A company that provides users with access to the internet.

New cards
35

Router/modem

Connects a LAN to the internet and requires a username and password.

New cards
36

Network environment advantages

Sharing resources, communication between users, and network administrator control and monitoring.

New cards
37

Internet uses

Web browsing, email, file sharing, video conferencing, online banking, entertainment, advertising & blogging, social media.

New cards
38

Wireless LANs (WLANs)

LANs that do not involve any wiring or cabling and use radio or infrared signals.

New cards
39

Access Points (APs)

Used in WLANs to provide wireless network connections over a short distance.

New cards
40

Spread spectrum technology

Usually used by APs in WLANs.

New cards
41

Intranet

A private internet accessible only to specific users.

New cards
42

Biometrics

The use of unique physical characteristics, such as fingerprints, for identification.

New cards
43

Fingerprint scanner

Used in schools to verify and record student attendance.

New cards
44

Embedded processor

A type of computer that controls robots and receives instructions.

New cards
45

Advantages of using robots for repetitive tasks

Efficiency, no wages required, continuous work, and sensor-equipped for gathering information.

New cards
46

Disadvantages of using robots for repetitive tasks

Initial cost, potential denial of access due to fingerprint damages, magnetic field interference with ID cards, and privacy concerns.

New cards
47

Spreadsheets

Used to record students' performances, compare performances, and eliminate the need for paper records.

New cards
48

Software for organizing examinations

Ensures proper enrollment, prints timetables, assigns examination rooms and invigilators, and gathers results in a student database.

New cards
49

School management system

A software system that helps manage various aspects of a school, such as attendance, timetables, bookings, and substitutions.

New cards
50

Absenteeism

The act of being absent or missing from school or work.

New cards
51

Digital tickets

Electronic tickets that are used for various purposes, such as booking seats or tracking attendance.

New cards
52

Timetables

Schedules that outline the timing and sequence of classes or activities.

New cards
53

Teaching cover/substitution

The process of finding a replacement teacher when the original teacher is absent.

New cards
54

Booking system

A system that allows users to make reservations or bookings for various services or events.

New cards
55

Ticket database

A database that stores information related to tickets, such as transaction details and reference numbers.

New cards
56

Wide area network (WAN)

A network that covers a large geographical area and allows for the global sharing of data.

New cards
57

Intranet

A private network that allows for the secure sharing of information within a specific company or organization.

New cards
58

Internet service provider (ISP)

A company that provides internet access to users.

New cards
59

LAN (Local Area Network)

A network that covers a small area, such as a building, and allows for local sharing of data.

New cards
60

Routers, modems, and proxy servers

Hardware devices used in a WAN to facilitate the connection and transmission of data.

New cards
61

Phishing

A fraudulent practice of obtaining sensitive information, such as usernames and passwords, by posing as a trustworthy entity.

New cards
62

Pharming

A technique used to redirect users to fraudulent websites without their knowledge.

New cards
63

Tablet computers

Portable devices with touchscreens that can be used for various purposes, including accessing the internet.

New cards
64

Network security issues

Concerns and challenges related to protecting a network from unauthorized access, hacking, phishing, and viruses.

New cards
65

Video camera

A device used to capture and record video footage.

New cards
66

DV camera

A digital video camera that records footage in a digital format.

New cards
67

Webcam

A camera that is connected to a computer and used for video conferencing or online chatting.

New cards
68

Chip & PIN readers

Devices used for secure payment transactions by reading the chip on a payment card and requiring a PIN.

New cards
69

Optical Mark Reader (OMR)

A device used to read marks written on questionnaires or examination papers.

New cards
70

RFID readers

Devices used to read data from RFID tags, which are attached to or inside objects.

New cards
71

User ID and password protection

A security measure that requires users to provide a unique ID and password to access personal internet journals and email services.

New cards
72

Blogs

Online platforms where individuals can post their observations and thoughts on various topics.

New cards
73

Email groups

Groups of email addresses that make it easier to send out multiple emails by grouping them under one name.

New cards
74

Offensive comments on blogs

Comments that can lead to prosecution as they are not immune from the law.

New cards
75

Spammers

Individuals who create email groups by buying addresses of people from a certain company and sending mass emails.

New cards
76

Wikis

Web pages with an edit button that allow users to easily create and edit web pages without using a web browser.

New cards
77

World Wide Web (WWW)

A system of interlinked hypertext documents accessed via the internet.

New cards
78

Social networking sites

Platforms that enable people to share photos, music, videos, interests, and views with others who share the same interests.

New cards
79

Protocols

A set of rules followed between the sender and recipient of data being transferred between devices.

New cards
80

HyperText Transfer Protocol (HTTP)

A protocol followed between sending and receiving devices when data is being transferred using the internet.

New cards
81

HTTPS

The secure variant of HTTP, which encrypts the data being transferred.

New cards
82

Hyperlink

Data that redirects the user to another webpage or section of the same webpage/file when clicked.

New cards
83

File Transfer Protocol (FTP)

Used to upload website files to the web hosting space, requiring login details to the web hosting server.

New cards
84

Advantages of getting information from websites

Easier access to information through search engines and linking keywords to find relevant information.

New cards
85

Challenges of using information from the internet

Unreliable, inaccurate, or biased information and information overload.

New cards
86

Selecting reliable websites for information

Ensuring the use of websites that properly cite their sources.

New cards
87

Images

Visual content that can be edited and used to enhance content.

New cards
88

Wikis

Anyone can use wikis, but the content should be treated with caution.

New cards
89

Digital to analogue converters (DACs)

Allow for the production of physical scale models and reuse of powders.

New cards
90

Fixed hard disks/drives

The main method used for data storage on computers.

New cards
91

Magnetic backing storage media

Used in many domestic appliances.

New cards
92

Read/write head

Used to write and read data from magnetic storage media.

New cards
93

Advantages of fixed hard disks/drives

Fast data transfer rate, fast access times, and large memory capacities.

New cards
94

Disadvantages of fixed hard disks/drives

Lack of portability and susceptibility to damage.

New cards
95

Buzzers

Used in burglar alarm systems, cookers, and microwave ovens.

New cards
96

Heaters as storage devices

Used in automatic washing machines, cookers, and central heating systems.

New cards
97

Portable and removable hard disks/drives

Used to transfer data, files, and software between computers.

New cards
98

Advantages of lights as storage devices

Fast data access time and transfer rate, large memory capacities, and ability to transfer information between computers.

New cards
99

Disadvantages of lights as storage devices

Susceptibility to damage.

New cards
100

Magnetic tapes and drives

Used in applications where batch processing is used and as backup media.

New cards

Explore top notes

note Note
studied byStudied by 59 people
780 days ago
5.0(1)
note Note
studied byStudied by 1 person
15 days ago
5.0(1)
note Note
studied byStudied by 134 people
673 days ago
4.5(2)
note Note
studied byStudied by 29 people
95 days ago
5.0(1)
note Note
studied byStudied by 91 people
354 days ago
5.0(3)
note Note
studied byStudied by 23872 people
666 days ago
4.8(90)
note Note
studied byStudied by 302 people
272 days ago
5.0(2)
note Note
studied byStudied by 31 people
862 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (192)
studied byStudied by 102 people
382 days ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 9 people
806 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 13 people
13 days ago
5.0(2)
flashcards Flashcard (22)
studied byStudied by 17 people
538 days ago
5.0(1)
flashcards Flashcard (70)
studied byStudied by 43 people
303 days ago
5.0(2)
flashcards Flashcard (82)
studied byStudied by 72 people
346 days ago
5.0(1)
flashcards Flashcard (66)
studied byStudied by 29 people
696 days ago
5.0(1)
flashcards Flashcard (50)
studied byStudied by 11 people
6 days ago
5.0(1)
robot