ICT most repeated questions
Chapter 1 :
1 – what is software and hardware ?
Hardware is a physical components that makes a computer
system
Software is a general term of programs that control the
computer system and processing data. Type of software :
application and system
2 – Difference between GUI(Graphical user Interface) and CLI
(Command Line Interface)
GUI user doesn’t need to learn any commands while CLI
needs to learn a number of commands to carry out basic
operations
GUI is more user-friendly ; icons are used to represent
applications while in CLI all commands needs to be typed in
correct format and spelling
In CLI you have to remember the exact path and name of
application while GUI menus are offered to help choose an
action
In CLI it is more important that users understand how a
computer works
3 – Describe the difference between RAM and ROM
RAM data stored temporarily while ROM stores permanent
information
Youstina
1
RAM memory can be written and read but in ROM it’s only
read
In RAM content is lost when computer is turned off while in
ROM data cannot be changed or lost when the power off
RAM is volatile memory while in ROM non-volatile memory
4 – Difference between laptop , desktop and smartphone
5 – Difference between application software and system
software
Application software is a program that allows the user to do
specific task . For example : word processor , spreadsheet ,
database , control measuring software , apps (applications
) software , Photo editing software , video editing software
and graphic manipulate software.
System software is a program that allows the hardware to
run properly and allow the user to communicate with the
computer. For Example : compiler , interpreter , linkers ,
device driver and operating systems
6 – What is meant by virtual reality and general equipment
used
Create an artificial environment that users can interact with ,
help in architects , train pilot , train surgeons and play games .
Youstina
2
general equipment used : eye goggles , gloves , headphones ,
sensor and powerful computer
Chapter 2 :
1 – Difference between OMR , OCR and MICR
2 – What are Input and output devices
Input devices : Keyboards , Concept keyboard , Numeric
Keypads , Mouse , Touchpad , Tracker ball , remote control ,
joystick , driving wheel , touchscreens , scanners , digital
camera , video cameras , microphone , sensors , graphic tablet
, webcams , light pen , magnetic stripe readers , contactless
Youstina
3
card readers , chip and pin readers , radio frequency
identification readers , magnetic ink character reader , optical
mark recognition , optical character recognition and barcode
reader
Output devices : CRT monitors , TFT monitors , LCD and LED
monitors , multimedia projectors , printers ( laser , inkjet , Dot
matrix and 3D printer) , speakers , wide format printers and
control applications ( actuators , motors , buzzers , lights and
heaters )
3 – Describe how data is read from the RFID chip
The washing machine sends out (interrogation waves) radio
signal to read the data from the RFID . They act as a passive
transponder .
4 – Difference between 3D printer , laser printer , inkjet printer
and dot matrix printer .
Youstina
4
Youstina
5
Chapter 3 :
1 – Difference between fixed hard disk , Blue-ray , magnetic
tape and memory card
2 – Compare and contrast between pen drive than a CD-R
Similarities
Pen drive and CD-R are storage devices
Pen drive and CD-R are portable
Difference
Not every computer has a CD drive , but most PCs have a USB
port
Pen drive is more robust
Pen drive stores more data
Pen drive is solid state whereas CD-R is optical
3 – Advantages of SSD compared to HDD
They have no moving parts therefore more reliable . Moreover ,
they are very thin as there are no moving parts
They are considerably lighter
They have lower power consumption
They run much cooler than HDDs
Youstina
6
Chapter 4 :
1 – Difference between internet and intranet
Internet is public but intranet is within one organization (private)
Internet is global but intranet can be policed / managed
Internet has more information than intranet
Data on the intranet is more reliable and relevant to the
organization than which on the internet
2 – WAN , WLAN and LAN
Wide area network (Wan) : Wan are used where computers or
networks are situated a long distance from each other
geographically .For example , in a different city or country . If a
number of LANs are joined together using a router , they can
form a WAN . The most common examples of WAN are the
internet and the network of ATMs used by banks .
Wireless Local Area Network (WLAN) : WLANs are similar to
LANs but there are no wires and cables . In other words, they
provide wireless communication over fairly short distances
using radio or infrared signals instead of cables . The main
wireless technologies that are used to form a WLAN are
Bluetooth and WIFI.
Local Area Network (LAN) : It is a network that covers small
geographic area, for example a building. A typical
Youstina
7
LAN will consist of a number of computers and devices (for
example, printers) that are connected together to hubs or
switches by cables.
3 – Advantages and Disadvantages of using video conference
Video Conference :
4 – Describe what is meant by web conference
Web conferencing is simply having a conference by using
the Internet. The only requirement is a computer and a stable
Internet connection. It is the same idea of using an application
or website (Whatsapp or Facebook for example) to have a
group chat, but of course in a more formal way.
The following are some features of web conferencing:
Participants can leave or join the conference as they wish.
Youstina
8
Sending instant messages is the main way of communication in
web conferences.
It is possible to transmit images or videos using the webcam
throughout the conference.
Documents can be shared by uploading them to the
website/application before the conference begins.
5- Name hardware devices they would need for video
conference
Web camera , Screen , speakers , Microphone
6 – Advantages and Disadvantages of Bluetooth and WIFI
7 – What is meant by Encryption
Encryption is the process of converting information into a form
that is meaningless to anyone except holders of a 'secret key'.
8 – Explain how the data from a router is routed
Routers send packets of data between computers on different
networks . Each data packet contains the IP address of the
computer/ network that the data is being sent to then the router
will use the IP address to work out the best route in which to
send the data to its destination . The data will be received
Youstina
9
routers on other networks which will read the IP address and
re-route the data until it ends up at the exact device it was
intended for .
Chapter 5 :
1 – Jobs where employment has increased and decreased
Areas where ICT has decreased employment : manual
repetitive jobs , shop work , bank cashiers , office workers ,
telephone exchange and library work
Areas where ICT has increased employment : Network
managers/ technicians , web design , computer imagery ,
system analyst , computer programmers and computer
engineers
2 – Advantages and Disadvantages of using microprocessorcontrolled devices
Youstina
10
3 – Advantages and Disadvantages of using methods to help
minimize the health problems of using the computer
Chapter 6:
1 – Advantages and Disadvantages of booking online , online
shopping or internet banking
Advantages :
No need to travel / reducing costs and time-wasting.
Youstina
11
Users have access to a worldwide market and can look for
products that are cheaper.
Disabled and elderly people can access any shop without to
leave home.
Shopping and banking can be done at any time 24/7
Shopping from the supermarket probably took up a lot of time
than online.
No face-to-face discussion with staff.
Internet banking saves time.
The shops and banks save money , not having as many staff
working for them
Disadvantages :
There is the possibility of isolation and lack of socialization
because people stay at home.
Health risks associated with online shopping or banking (lack
of exercise).
Security issues.
It is necessary to have a computer and to pay for the internet
Unlike high street shopping, it is only possible to see a picture
of the goods, which might not portray the exact color of a dress.
High street shops and banks are closing because of the
increase
in online shopping or banking and this is leading to ‘ghost
towns’ forming
It is easier to make errors with online banking and transfer
money incorrectly to different accounts
2 – Advantages and Disadvantages of using robots rather than
humans
Youstina
12
Advantages :
Higher productivity.
More consistent results
Work non-stop without breaks
They don’t get bored by repetitive tasks.
They don’t go on strike.
Disadvantages :
Expensive to purchase and setup first time
Often need to be reprogrammed for every new task
production errors may occur
3 – Role of microprocessor
A microprocessor is really just a tiny CPU built into a single chip
. Microprocessor controlled devices affect our lives in lots of
different ways including in our homes , our leisure time , how
we interact socially . They even have an affect on our needs to
actually leave our houses . labor-saving devices example ,
Automatic washing machines , microwaves ovens , cookers ,
automatic dishwashers , robotic vacuum cleaners , breadmaking machines and smart fridge and freezers .
How does the microprocessor work ?
For example in automatic cooker :
An automatic cooker has temperature sensors and a number of
controls to set the cooking time. The microprocessor checks
the set time against the current time and when they are equal,
the cooker heating elements are switched on. Once the cooker
starts the cooking process, the microprocessor then constancy
checks the end time against current time, when they are equal,
the cooking process is stopped.The microprocessor checks the
temperature data sent from a sensor and turns the heating
Youstina
13
element on if the value less than the pre-set value chosen by
the user.
4– Advantages and Disadvantages of using Expert system
5 – Components of Expert system
Knowledge base
Inference engine
Rules base
User interface
6 – Describe the computer processing involved in EFT using
contactless card
7 – Input and processing involved in booking online
The customer clicks on the performance they wish to see.
A date and time is typed in
The required number of seats is also entered.
The seating display in the theatre is shown on the screen.
Youstina
14
The user selects their seat(s) by highlighting the actual seats
on the screen, display and then clicks CONFIRM to go to the
next part of the process.
The database searched to check the availability of the selected
seats
If the seats are available, the total price is shown + the seat
numbers
If the customer is happy with this, they select CONFIRM on the
screen
8 – sensors monitoring process
There are many ways in which sensors monitor process like in
weather station , measuring a patients vital signs in hospital or
measuring pollution in river .
Let’s say how sensors monitor the measuring of patient vital
sign in a hospital :
Sensors read key vital signs (such aspulse rate, heart rate,
temperature, blood pressure, respiration, etc.) .The data from
the sensors is converted into digital using an ADC.
The data is stored in the computer’s memory.
The computer compares the data from the sensors with the
values stored in its memory
The results are output on a screen in the form of graphs and/or
numerical readouts
An alarm is activated if any of the data is outside acceptable
input Values
The system continues to measure the patient’s vital signs until
the computer is turned off.
Chapter 7:
Youstina
15
1 – Difference between parallel running , direct changeover and
phased implementation
2 – Types of verification
Verification is a way of preventing errors when data is copied
from one medium to another, there are two ways for verification
check:
Youstina
16
Double entry : data is entered twice, using two people, and is
then compared
Visual check : checking for errors by the person who is
entering the data; compare the entered data with the original
document
3 – methods of implementation
Youstina
17
4 – Difference between technical documentation and user
documentation
User documentation :
How to load/install/run the software
How to save files / search/sort data
How to do print outs
How to add, delete or amend records
The purpose of the system/ program/ software package
Limitations of the system
Screen layouts / Print layouts
Hardware requirements
Software requirements
Sample runs (with results and actual test data used)
Youstina
18
Error handling/meaning of errors
Troubleshooting guide/help lines/FAQs
How to log in/log out
Tutorials
Error messages/meaning of error messages
Glossary of terms.
Technical documentation :
Program listing/coding
Programming language used
Program flowcharts/algorithms
Systems flowcharts
Purpose of the system/program/software
Limitations of the system
Input formats
Hardware requirements
Software requirements
Minimum memory requirements
known ‘bugs’ in the system
List of variables used (and their meaning/description)
File structures
Sample runs (with results and actual test data used)
Output formats
Validation rules
Meaning of error messages
Youstina
19
5 – Explain what other testing should have been carried before
implementation
The whole system should have been tested
The operator should have checked the meter reading against
the previous one
The bill should have been checked before it was sent
Linkages between modules should have been tested
6 –Methods of researching the current system
Observing of the users
Interviewing the manager
Questionnaire given out to users
Examination of existing documents
7 –Advantages and Disadvantages of using interview
Chapter 8:
1 – List principals of a typical data protection act
Data must be fairly and lawfully processed
Data can be only processed for the stated purpose
Data must be adequate, relevant and not excessive.
Youstina
20
Data must be accurate.
Data must not be kept longer than necessary.
Data must be processed in accordance with the data subject's
rights.
Data must be kept secure.
Data must not be transferred to another country unless they
also have adequate protection
2 – Methods to minimize the likehood of receiving spam emails
Use a spam filter/anti-spam software
Do not reply to spam/suspicious messages
Do not click on any links/attachments in a spam/suspicious
message
Use a disposable email address
Use a complex email user name
Do not give out your email address online/do not register using
email on untrusted websites/opt out of marketing
Read messages as text
Do not use your email address as an online username
Changing to an email provider who filter spam
3 – Types of biometrics
Fingerprint scans
Signature recognition
Retina scans
Iris recognition
Face recognition
Voice recognition
Youstina
21
4 – Advantages and Disadvantages of using biometrics rather
than traditional security methods
5 – what is meant by personal data and how to keep it secure
Personal data like ( name , Birth date , address , medical
history, banking details)
Some personnel data referred to as (Sensitive personnel data )
includes ethnic origin, political views, religion, sexual
orientation, criminal activity
How to keep it secure ?
Don’t give out any personal information to people who are
unknown to you.
Don’t send people photos of yourself - either online or via a
mobile phone unless the person known to you.
Always maintain your privacy settings
When accessing the internet make sure the websites being
visited can be trusted
Only use recommended websites by teachers
Only open emails from known sources.
Only send email people you know
Youstina
22
Using social networking sites, instant messaging or chat room
6 – Difference between smishing , pharming and phising
Youstina
23
7 – Health problems associated with the continual use of
computers and how to minimize it
Youstina
24
8 – Health problems associated with the prolonged use of IT
equipment and how to prevent the problem
9 – How to create strong password
Youstina
25
Use mix of numbers and letters where some are upper case
and some lower case . For example , (Syl2@#TT90Kj=0)
Do not write your name as a password
10 – What is meant by hacking and how to prevent this?
11 – What are cookies and why are they important to
companies
A small text file sent to a user’s web browser when they visit a
web site. It is important to Store information about the visit and
are used the next time the user visits the site
Remember the user’s details
Remember the user’s preferences
Remember items a user bought
Remember passwords
Remember what they searched for
Target products
Offers a tailored experience for users
Chapter 9:
Youstina
26
1 – Improvement that would make presentation more appealing
to kids, teenagers and adults
2 – What is meant by software copyright?
Software / Music CDs, videos and articles from magazines and
books is protected by copyright laws
3 – Actions that would break copyright
Make a software copy and then sell it
Use software on a network or in multiple computers without a
license
Rent out a software package without permission
Use the name of copyrighted software without agreement
4 – Ways to protect software from piracy
Before installation of software the user will be asked to enter
Product key
Youstina
27
The user will be asked OK/I Agree to the license agreement
before installation
The original software always come with the sticker informing
the purchaser it is illegal to make copy ( hologram form)
Some software required to be original CD/DVD available in the
drive
Some software run only if dongle is plugged into USB port
Chapter 10:
1 – Difference between Email and Fax
2 – How you would evaluate the reliability of information found
on the internet
Anyone can setup website, so information not necessarily
reliable or accurate.
Some commercial web site will be based to advertise their
products, If the advertising only related to their own products It
could be unreliable
If the web site URL ending with .gov or .org … mostly is reliable
Youstina
28
If you compare the information on the web site with the
information in the book, this will help to show if the information
reliable or no .
It is good idea to see if responsible bodies endorsed ( support
and permit ) the website
Check if the website linked to reliable or unreliable web sites
Check if the website have a testimonials or recommendation
this can indicate reliability
If the last update was long time ago , this mean the information
is not reliable
If the author of the website is good credential, then the
information is more likely reliable
3 – Advantages and Disadvantages of using cloud to store data
Advantages :
No need to carry memory sticks if you want to access your files
from home
You don’t have to pay for large storage capacity on your
computer/tablet or mobile phone
Cloud will ensure that your files are backed up and will reduce
the possibility of losing data
Ability to synchronize files because automatically updated
across all devices
Cloud storage is ideal for collaboration purposes, it allows
several users to edit and collaborate on a single file or
document
Disadvantages :
It may be affected by internet connection and latency . If your
internet connection is down , you lose access to the software .
Your bandwidth will affect speed of data transfer
Youstina
29
User cannot personalize setting/ defaults
Not protected by your own security measures , such as firewall
and antivirus software
4 – Advantages and Disadvantages of policing the internet
Arguments in favor of some form of internet control:
It would prevent illegal material being posted on websites
People find it much easier to discover information (Ex. make a
bomb)
By some control would prevent children and other vulnerable
groups from being subjected to undesirable websites.
By some control would stop incorrect information being
published on websites.
Arguments against some form of internet control:
Material published on websites is already available from other
sources.
It would be very expensive to police all websites
It would be difficult to enforce rules and regulations on a global
scale.
It can be argued that policing would go against freedom of
information
Many topics and comments posted on websites are already
illegal and laws already exist
Who is to decide what is illegal or offensive, many things are
only offensive to certain people but others NO
5 – Difference between Blog, Wiki and VOIP
Youstina
30
VOIP is a voice over internet protocol and it is a method for the
delivery of voice communication over internet. For example:
Broadband telephone or broadband phone service
6 – Advantages and Disadvantages of students using the
internet to carry out researches
Advantages :
Information on the internet is up-to-date
The internet limitless of information
Searching using a search engine is fast and easy.
Information on the internet is usually free of charge.
Pages on the internet can have multimedia elements , which
can make learning is interesting
Disadvantages :
Anything can be posted on a web page and information may be
incorrect.
There is always the risk of accessing inappropriate websites
It is too easy to be distracted when searching on the internet
Youstina
31
Some research skills are lost when using the internet as search
engines do all the work for you
GOOD LUCK in Tomorrows Exam w isa
it comes easy w kolo ya5od A+
Youstina
32