ICT most repeated questions Chapter 1 : 1 – what is software and hardware ? Hardware is a physical components that makes a computer system Software is a general term of programs that control the computer system and processing data. Type of software : application and system 2 – Difference between GUI(Graphical user Interface) and CLI (Command Line Interface) GUI user doesn’t need to learn any commands while CLI needs to learn a number of commands to carry out basic operations GUI is more user-friendly ; icons are used to represent applications while in CLI all commands needs to be typed in correct format and spelling In CLI you have to remember the exact path and name of application while GUI menus are offered to help choose an action In CLI it is more important that users understand how a computer works 3 – Describe the difference between RAM and ROM RAM data stored temporarily while ROM stores permanent information Youstina 1 RAM memory can be written and read but in ROM it’s only read In RAM content is lost when computer is turned off while in ROM data cannot be changed or lost when the power off RAM is volatile memory while in ROM non-volatile memory 4 – Difference between laptop , desktop and smartphone 5 – Difference between application software and system software Application software is a program that allows the user to do specific task . For example : word processor , spreadsheet , database , control measuring software , apps (applications ) software , Photo editing software , video editing software and graphic manipulate software. System software is a program that allows the hardware to run properly and allow the user to communicate with the computer. For Example : compiler , interpreter , linkers , device driver and operating systems 6 – What is meant by virtual reality and general equipment used Create an artificial environment that users can interact with , help in architects , train pilot , train surgeons and play games . Youstina 2 general equipment used : eye goggles , gloves , headphones , sensor and powerful computer Chapter 2 : 1 – Difference between OMR , OCR and MICR 2 – What are Input and output devices Input devices : Keyboards , Concept keyboard , Numeric Keypads , Mouse , Touchpad , Tracker ball , remote control , joystick , driving wheel , touchscreens , scanners , digital camera , video cameras , microphone , sensors , graphic tablet , webcams , light pen , magnetic stripe readers , contactless Youstina 3 card readers , chip and pin readers , radio frequency identification readers , magnetic ink character reader , optical mark recognition , optical character recognition and barcode reader Output devices : CRT monitors , TFT monitors , LCD and LED monitors , multimedia projectors , printers ( laser , inkjet , Dot matrix and 3D printer) , speakers , wide format printers and control applications ( actuators , motors , buzzers , lights and heaters ) 3 – Describe how data is read from the RFID chip The washing machine sends out (interrogation waves) radio signal to read the data from the RFID . They act as a passive transponder . 4 – Difference between 3D printer , laser printer , inkjet printer and dot matrix printer . Youstina 4 Youstina 5 Chapter 3 : 1 – Difference between fixed hard disk , Blue-ray , magnetic tape and memory card 2 – Compare and contrast between pen drive than a CD-R Similarities Pen drive and CD-R are storage devices Pen drive and CD-R are portable Difference Not every computer has a CD drive , but most PCs have a USB port Pen drive is more robust Pen drive stores more data Pen drive is solid state whereas CD-R is optical 3 – Advantages of SSD compared to HDD They have no moving parts therefore more reliable . Moreover , they are very thin as there are no moving parts They are considerably lighter They have lower power consumption They run much cooler than HDDs Youstina 6 Chapter 4 : 1 – Difference between internet and intranet Internet is public but intranet is within one organization (private) Internet is global but intranet can be policed / managed Internet has more information than intranet Data on the intranet is more reliable and relevant to the organization than which on the internet 2 – WAN , WLAN and LAN Wide area network (Wan) : Wan are used where computers or networks are situated a long distance from each other geographically .For example , in a different city or country . If a number of LANs are joined together using a router , they can form a WAN . The most common examples of WAN are the internet and the network of ATMs used by banks . Wireless Local Area Network (WLAN) : WLANs are similar to LANs but there are no wires and cables . In other words, they provide wireless communication over fairly short distances using radio or infrared signals instead of cables . The main wireless technologies that are used to form a WLAN are Bluetooth and WIFI. Local Area Network (LAN) : It is a network that covers small geographic area, for example a building. A typical Youstina 7 LAN will consist of a number of computers and devices (for example, printers) that are connected together to hubs or switches by cables. 3 – Advantages and Disadvantages of using video conference Video Conference : 4 – Describe what is meant by web conference Web conferencing is simply having a conference by using the Internet. The only requirement is a computer and a stable Internet connection. It is the same idea of using an application or website (Whatsapp or Facebook for example) to have a group chat, but of course in a more formal way. The following are some features of web conferencing: Participants can leave or join the conference as they wish. Youstina 8 Sending instant messages is the main way of communication in web conferences. It is possible to transmit images or videos using the webcam throughout the conference. Documents can be shared by uploading them to the website/application before the conference begins. 5- Name hardware devices they would need for video conference Web camera , Screen , speakers , Microphone 6 – Advantages and Disadvantages of Bluetooth and WIFI 7 – What is meant by Encryption Encryption is the process of converting information into a form that is meaningless to anyone except holders of a 'secret key'. 8 – Explain how the data from a router is routed Routers send packets of data between computers on different networks . Each data packet contains the IP address of the computer/ network that the data is being sent to then the router will use the IP address to work out the best route in which to send the data to its destination . The data will be received Youstina 9 routers on other networks which will read the IP address and re-route the data until it ends up at the exact device it was intended for . Chapter 5 : 1 – Jobs where employment has increased and decreased Areas where ICT has decreased employment : manual repetitive jobs , shop work , bank cashiers , office workers , telephone exchange and library work Areas where ICT has increased employment : Network managers/ technicians , web design , computer imagery , system analyst , computer programmers and computer engineers 2 – Advantages and Disadvantages of using microprocessorcontrolled devices Youstina 10 3 – Advantages and Disadvantages of using methods to help minimize the health problems of using the computer Chapter 6: 1 – Advantages and Disadvantages of booking online , online shopping or internet banking Advantages : No need to travel / reducing costs and time-wasting. Youstina 11 Users have access to a worldwide market and can look for products that are cheaper. Disabled and elderly people can access any shop without to leave home. Shopping and banking can be done at any time 24/7 Shopping from the supermarket probably took up a lot of time than online. No face-to-face discussion with staff. Internet banking saves time. The shops and banks save money , not having as many staff working for them Disadvantages : There is the possibility of isolation and lack of socialization because people stay at home. Health risks associated with online shopping or banking (lack of exercise). Security issues. It is necessary to have a computer and to pay for the internet Unlike high street shopping, it is only possible to see a picture of the goods, which might not portray the exact color of a dress. High street shops and banks are closing because of the increase in online shopping or banking and this is leading to ‘ghost towns’ forming It is easier to make errors with online banking and transfer money incorrectly to different accounts 2 – Advantages and Disadvantages of using robots rather than humans Youstina 12 Advantages : Higher productivity. More consistent results Work non-stop without breaks They don’t get bored by repetitive tasks. They don’t go on strike. Disadvantages : Expensive to purchase and setup first time Often need to be reprogrammed for every new task production errors may occur 3 – Role of microprocessor A microprocessor is really just a tiny CPU built into a single chip . Microprocessor controlled devices affect our lives in lots of different ways including in our homes , our leisure time , how we interact socially . They even have an affect on our needs to actually leave our houses . labor-saving devices example , Automatic washing machines , microwaves ovens , cookers , automatic dishwashers , robotic vacuum cleaners , breadmaking machines and smart fridge and freezers . How does the microprocessor work ? For example in automatic cooker : An automatic cooker has temperature sensors and a number of controls to set the cooking time. The microprocessor checks the set time against the current time and when they are equal, the cooker heating elements are switched on. Once the cooker starts the cooking process, the microprocessor then constancy checks the end time against current time, when they are equal, the cooking process is stopped.The microprocessor checks the temperature data sent from a sensor and turns the heating Youstina 13 element on if the value less than the pre-set value chosen by the user. 4– Advantages and Disadvantages of using Expert system 5 – Components of Expert system Knowledge base Inference engine Rules base User interface 6 – Describe the computer processing involved in EFT using contactless card 7 – Input and processing involved in booking online The customer clicks on the performance they wish to see. A date and time is typed in The required number of seats is also entered. The seating display in the theatre is shown on the screen. Youstina 14 The user selects their seat(s) by highlighting the actual seats on the screen, display and then clicks CONFIRM to go to the next part of the process. The database searched to check the availability of the selected seats If the seats are available, the total price is shown + the seat numbers If the customer is happy with this, they select CONFIRM on the screen 8 – sensors monitoring process There are many ways in which sensors monitor process like in weather station , measuring a patients vital signs in hospital or measuring pollution in river . Let’s say how sensors monitor the measuring of patient vital sign in a hospital : Sensors read key vital signs (such aspulse rate, heart rate, temperature, blood pressure, respiration, etc.) .The data from the sensors is converted into digital using an ADC. The data is stored in the computer’s memory. The computer compares the data from the sensors with the values stored in its memory The results are output on a screen in the form of graphs and/or numerical readouts An alarm is activated if any of the data is outside acceptable input Values The system continues to measure the patient’s vital signs until the computer is turned off. Chapter 7: Youstina 15 1 – Difference between parallel running , direct changeover and phased implementation 2 – Types of verification Verification is a way of preventing errors when data is copied from one medium to another, there are two ways for verification check: Youstina 16 Double entry : data is entered twice, using two people, and is then compared Visual check : checking for errors by the person who is entering the data; compare the entered data with the original document 3 – methods of implementation Youstina 17 4 – Difference between technical documentation and user documentation User documentation : How to load/install/run the software How to save files / search/sort data How to do print outs How to add, delete or amend records The purpose of the system/ program/ software package Limitations of the system Screen layouts / Print layouts Hardware requirements Software requirements Sample runs (with results and actual test data used) Youstina 18 Error handling/meaning of errors Troubleshooting guide/help lines/FAQs How to log in/log out Tutorials Error messages/meaning of error messages Glossary of terms. Technical documentation : Program listing/coding Programming language used Program flowcharts/algorithms Systems flowcharts Purpose of the system/program/software Limitations of the system Input formats Hardware requirements Software requirements Minimum memory requirements known ‘bugs’ in the system List of variables used (and their meaning/description) File structures Sample runs (with results and actual test data used) Output formats Validation rules Meaning of error messages Youstina 19 5 – Explain what other testing should have been carried before implementation The whole system should have been tested The operator should have checked the meter reading against the previous one The bill should have been checked before it was sent Linkages between modules should have been tested 6 –Methods of researching the current system Observing of the users Interviewing the manager Questionnaire given out to users Examination of existing documents 7 –Advantages and Disadvantages of using interview Chapter 8: 1 – List principals of a typical data protection act Data must be fairly and lawfully processed Data can be only processed for the stated purpose Data must be adequate, relevant and not excessive. Youstina 20 Data must be accurate. Data must not be kept longer than necessary. Data must be processed in accordance with the data subject's rights. Data must be kept secure. Data must not be transferred to another country unless they also have adequate protection 2 – Methods to minimize the likehood of receiving spam emails Use a spam filter/anti-spam software Do not reply to spam/suspicious messages Do not click on any links/attachments in a spam/suspicious message Use a disposable email address Use a complex email user name Do not give out your email address online/do not register using email on untrusted websites/opt out of marketing Read messages as text Do not use your email address as an online username Changing to an email provider who filter spam 3 – Types of biometrics Fingerprint scans Signature recognition Retina scans Iris recognition Face recognition Voice recognition Youstina 21 4 – Advantages and Disadvantages of using biometrics rather than traditional security methods 5 – what is meant by personal data and how to keep it secure Personal data like ( name , Birth date , address , medical history, banking details) Some personnel data referred to as (Sensitive personnel data ) includes ethnic origin, political views, religion, sexual orientation, criminal activity How to keep it secure ? Don’t give out any personal information to people who are unknown to you. Don’t send people photos of yourself - either online or via a mobile phone unless the person known to you. Always maintain your privacy settings When accessing the internet make sure the websites being visited can be trusted Only use recommended websites by teachers Only open emails from known sources. Only send email people you know Youstina 22 Using social networking sites, instant messaging or chat room 6 – Difference between smishing , pharming and phising Youstina 23 7 – Health problems associated with the continual use of computers and how to minimize it Youstina 24 8 – Health problems associated with the prolonged use of IT equipment and how to prevent the problem 9 – How to create strong password Youstina 25 Use mix of numbers and letters where some are upper case and some lower case . For example , (Syl2@#TT90Kj=0) Do not write your name as a password 10 – What is meant by hacking and how to prevent this? 11 – What are cookies and why are they important to companies A small text file sent to a user’s web browser when they visit a web site. It is important to Store information about the visit and are used the next time the user visits the site Remember the user’s details Remember the user’s preferences Remember items a user bought Remember passwords Remember what they searched for Target products Offers a tailored experience for users Chapter 9: Youstina 26 1 – Improvement that would make presentation more appealing to kids, teenagers and adults 2 – What is meant by software copyright? Software / Music CDs, videos and articles from magazines and books is protected by copyright laws 3 – Actions that would break copyright Make a software copy and then sell it Use software on a network or in multiple computers without a license Rent out a software package without permission Use the name of copyrighted software without agreement 4 – Ways to protect software from piracy Before installation of software the user will be asked to enter Product key Youstina 27 The user will be asked OK/I Agree to the license agreement before installation The original software always come with the sticker informing the purchaser it is illegal to make copy ( hologram form) Some software required to be original CD/DVD available in the drive Some software run only if dongle is plugged into USB port Chapter 10: 1 – Difference between Email and Fax 2 – How you would evaluate the reliability of information found on the internet Anyone can setup website, so information not necessarily reliable or accurate. Some commercial web site will be based to advertise their products, If the advertising only related to their own products It could be unreliable If the web site URL ending with .gov or .org … mostly is reliable Youstina 28 If you compare the information on the web site with the information in the book, this will help to show if the information reliable or no . It is good idea to see if responsible bodies endorsed ( support and permit ) the website Check if the website linked to reliable or unreliable web sites Check if the website have a testimonials or recommendation this can indicate reliability If the last update was long time ago , this mean the information is not reliable If the author of the website is good credential, then the information is more likely reliable 3 – Advantages and Disadvantages of using cloud to store data Advantages : No need to carry memory sticks if you want to access your files from home You don’t have to pay for large storage capacity on your computer/tablet or mobile phone Cloud will ensure that your files are backed up and will reduce the possibility of losing data Ability to synchronize files because automatically updated across all devices Cloud storage is ideal for collaboration purposes, it allows several users to edit and collaborate on a single file or document Disadvantages : It may be affected by internet connection and latency . If your internet connection is down , you lose access to the software . Your bandwidth will affect speed of data transfer Youstina 29 User cannot personalize setting/ defaults Not protected by your own security measures , such as firewall and antivirus software 4 – Advantages and Disadvantages of policing the internet Arguments in favor of some form of internet control: It would prevent illegal material being posted on websites People find it much easier to discover information (Ex. make a bomb) By some control would prevent children and other vulnerable groups from being subjected to undesirable websites. By some control would stop incorrect information being published on websites. Arguments against some form of internet control: Material published on websites is already available from other sources. It would be very expensive to police all websites It would be difficult to enforce rules and regulations on a global scale. It can be argued that policing would go against freedom of information Many topics and comments posted on websites are already illegal and laws already exist Who is to decide what is illegal or offensive, many things are only offensive to certain people but others NO 5 – Difference between Blog, Wiki and VOIP Youstina 30 VOIP is a voice over internet protocol and it is a method for the delivery of voice communication over internet. For example: Broadband telephone or broadband phone service 6 – Advantages and Disadvantages of students using the internet to carry out researches Advantages : Information on the internet is up-to-date The internet limitless of information Searching using a search engine is fast and easy. Information on the internet is usually free of charge. Pages on the internet can have multimedia elements , which can make learning is interesting Disadvantages : Anything can be posted on a web page and information may be incorrect. There is always the risk of accessing inappropriate websites It is too easy to be distracted when searching on the internet Youstina 31 Some research skills are lost when using the internet as search engines do all the work for you GOOD LUCK in Tomorrows Exam w isa it comes easy w kolo ya5od A+ Youstina 32