Ict most repeated questions
Chapter 1: Software and Hardware
Definition of Hardware
Physical components of a computer system.
Definition of Software
General term for programs that control computer systems and process data.
Types of Software:
Application Software: Specific tasks (e.g., word processors, photo editing).
System Software: Enables hardware function and user interaction (e.g., operating systems).
User Interfaces
Graphical User Interface (GUI):
User-friendly; no need to learn commands, uses icons.
Menus aid in selecting actions.
Command Line Interface (CLI):
Requires learning commands and typing them accurately.
Understanding computer paths important for operation.
RAM vs. ROM
RAM (Random Access Memory):
Temporary storage; data lost when powered off; volatile memory.
ROM (Read-Only Memory):
Permanent storage; retains data when powered off; non-volatile memory.
Differences in Devices
Laptops vs. Desktops vs. Smartphones:
Discuss variations in form factor, portability, and usage environments.
Application Software vs. System Software
Application Software: Programs for specific tasks (e.g., office applications).
System Software: Programs that manage hardware operations.
Virtual Reality
Definition: Creates an interactive artificial environment.
Applications: Used in architecture, pilot training, surgical training, and gaming.
General Equipment Used: Goggles, gloves, sensors, powerful computers.
Chapter 2 - Input and Output Devices
Input Devices:
Keyboards, mice, touchpads, scanners, digital cameras, sensors, graphic tablets, etc.
Output Devices:
CRT, LCD monitors, printers, speakers, multimedia projectors.
Reading Data from RFID Chips
Communication via radio signals (interrogation waves); act as passive transponders.
Printer Comparison
Dot Matrix Printers:
Impact printers, slow, noisy, lower output quality; used for multi-part outputs.
3D Printers:
Produce solid objects, useful in CAD applications, beneficial in medical fields.
Laser Printers:
High-quality, high-volume, fast printing; quiet operation compared to inkjet.
Inkjet Printers:
Cheaper than lasers, ideal for low volume; slower and prone to smudging.
Chapter 3 - Storage Devices
Comparative Storage:
Fixed Hard Disk, Blu-ray, Magnetic Tape, Memory Card.
Pen Drive vs. CD-R:
Both are portable storage, with pen drives being more robust and having greater capacity.
Advantages of SSD over HDD:
No moving parts, more reliable, lightweight, energy-efficient, cooler running.
Chapter 4 - Networking
Internet vs. Intranet:
Internet: public, global; Intranet: private to organizations; more reliable, relevant data.
Network Types:
WAN: Wide Area Network for long distances (e.g., the internet).
LAN: Local Area Network for smaller areas (e.g., a building).
WLAN: Wireless Local Area Network allows short-distance wireless communication.
Video Conferencing
Description and hardware required: webcam, screen, speakers, microphone.
Encryption
Definition: Process of converting information into a coded format, requiring a secret key for decoding.
Data Routing with Routers
Data packets are sent using IP addresses to find the best route.
Chapter 5 - Employment Changes Due to ICT
Decreased Employment: Manual jobs, bank cashiers.
Increased Employment: IT roles such as web design, system analysts.
Advantages and Disadvantages of Microprocessor-Controlled Devices
Online Shopping and Banking
Advantages:
Global access, convenient, accessible 24/7.
Disadvantages:
Potential isolation, security risks, lack of physical inspection of products.
Chapter 6 - Computer Security
Methods for Securing Personal Data:
Limit personal info sharing, use trusted websites, maintain privacy settings.
Biometrics vs. Traditional Security
Advantages and disadvantages of using biometric security systems.
Chapter 7 - System Implementation
Types of system implementation: parallel, direct, phased.
Verification Methods:
Double entry and visual checks.
Methods of Researching Current Systems
Observations, interviews, questionnaires, examining documents.
Chapter 8 - Data Protection Principles
Overview of data protection laws and user rights.
Spam Email and Security Measures
Using filters, avoiding spam interactions, and maintaining privacy.
Chapter 9 - Copyright and Software Protection
Importance of copyright laws for software and ways to prevent piracy.
Chapter 10 - Evaluating Information Reliability
Criteria for assessing information online, advantages, and disadvantages of cloud storage.