Ict most repeated questions

Chapter 1: Software and Hardware

  • Definition of Hardware

    • Physical components of a computer system.

  • Definition of Software

    • General term for programs that control computer systems and process data.

  • Types of Software:

    • Application Software: Specific tasks (e.g., word processors, photo editing).

    • System Software: Enables hardware function and user interaction (e.g., operating systems).

User Interfaces

  • Graphical User Interface (GUI):

    • User-friendly; no need to learn commands, uses icons.

    • Menus aid in selecting actions.

  • Command Line Interface (CLI):

    • Requires learning commands and typing them accurately.

    • Understanding computer paths important for operation.

RAM vs. ROM

  • RAM (Random Access Memory):

    • Temporary storage; data lost when powered off; volatile memory.

  • ROM (Read-Only Memory):

    • Permanent storage; retains data when powered off; non-volatile memory.

Differences in Devices

  • Laptops vs. Desktops vs. Smartphones:

    • Discuss variations in form factor, portability, and usage environments.

Application Software vs. System Software

  • Application Software: Programs for specific tasks (e.g., office applications).

  • System Software: Programs that manage hardware operations.

Virtual Reality

  • Definition: Creates an interactive artificial environment.

  • Applications: Used in architecture, pilot training, surgical training, and gaming.

  • General Equipment Used: Goggles, gloves, sensors, powerful computers.

Chapter 2 - Input and Output Devices

  • Input Devices:

    • Keyboards, mice, touchpads, scanners, digital cameras, sensors, graphic tablets, etc.

  • Output Devices:

    • CRT, LCD monitors, printers, speakers, multimedia projectors.

Reading Data from RFID Chips

  • Communication via radio signals (interrogation waves); act as passive transponders.

Printer Comparison

  • Dot Matrix Printers:

    • Impact printers, slow, noisy, lower output quality; used for multi-part outputs.

  • 3D Printers:

    • Produce solid objects, useful in CAD applications, beneficial in medical fields.

  • Laser Printers:

    • High-quality, high-volume, fast printing; quiet operation compared to inkjet.

  • Inkjet Printers:

    • Cheaper than lasers, ideal for low volume; slower and prone to smudging.

Chapter 3 - Storage Devices

  • Comparative Storage:

    • Fixed Hard Disk, Blu-ray, Magnetic Tape, Memory Card.

  • Pen Drive vs. CD-R:

    • Both are portable storage, with pen drives being more robust and having greater capacity.

  • Advantages of SSD over HDD:

    • No moving parts, more reliable, lightweight, energy-efficient, cooler running.

Chapter 4 - Networking

  • Internet vs. Intranet:

    • Internet: public, global; Intranet: private to organizations; more reliable, relevant data.

  • Network Types:

    • WAN: Wide Area Network for long distances (e.g., the internet).

    • LAN: Local Area Network for smaller areas (e.g., a building).

    • WLAN: Wireless Local Area Network allows short-distance wireless communication.

Video Conferencing

  • Description and hardware required: webcam, screen, speakers, microphone.

Encryption

  • Definition: Process of converting information into a coded format, requiring a secret key for decoding.

Data Routing with Routers

  • Data packets are sent using IP addresses to find the best route.

Chapter 5 - Employment Changes Due to ICT

  • Decreased Employment: Manual jobs, bank cashiers.

  • Increased Employment: IT roles such as web design, system analysts.

Advantages and Disadvantages of Microprocessor-Controlled Devices

Online Shopping and Banking

  • Advantages:

    • Global access, convenient, accessible 24/7.

  • Disadvantages:

    • Potential isolation, security risks, lack of physical inspection of products.

Chapter 6 - Computer Security

  • Methods for Securing Personal Data:

    • Limit personal info sharing, use trusted websites, maintain privacy settings.

Biometrics vs. Traditional Security

  • Advantages and disadvantages of using biometric security systems.

Chapter 7 - System Implementation

  • Types of system implementation: parallel, direct, phased.

  • Verification Methods:

    • Double entry and visual checks.

Methods of Researching Current Systems

  • Observations, interviews, questionnaires, examining documents.

Chapter 8 - Data Protection Principles

  • Overview of data protection laws and user rights.

Spam Email and Security Measures

  • Using filters, avoiding spam interactions, and maintaining privacy.

Chapter 9 - Copyright and Software Protection

  • Importance of copyright laws for software and ways to prevent piracy.

Chapter 10 - Evaluating Information Reliability

  • Criteria for assessing information online, advantages, and disadvantages of cloud storage.

robot