An ink-jet printer is best described as An input device An output

advertisement

Name: Form:

1. An ink-jet printer is best described as a. An input device b. An output device c. A storage device d. Computer memory

2. Smoke alarms are often fitted in homes. Which one of the following devices can be used to detect smoke? a. An OCR reader b. A mouse c. A thermometer d. A sensor

3. A computer peripheral is best described as: a. An off-line device b.

A device which is part of a computer’s operating system c. A device which is part of the CPU d. A device which is attached to and under the control of a computer

4. Give the names of two input devices you might find on a laptop computer

5. Liquid crystal displays are used with laptop computers. They are also becoming more popular with desktop computers. Give one reason why they are chosen for desktop systems.

6. RAM is a type of volatile memory used by computers. a. What do the letters RAM stand for? b. Explain what is meant by ‘volatile memory’ c. Why is RAM needed in a personal computer?

7. Explain the purpose of the following: a. Cache b. Printer buffer

8. Which of the following is an example of software? a. Hard disk b. CD-ROM c. Wordprocessor d. DVD drive

9. Which of the following is an example of an applications package? a. The operating system b. Wordprocessing software c. A network operating system d. A hard disk

10. Which of the following is not performed by an operating system? a. Allocating space for files on a disk b. Issuing an instruction to a printer to start printing c. Managing the flow of data from a keyboard d. Searching for a record on a database

11. An airline seat booking system is an example of: a. i. A real-time system ii. An offline system iii. A single-user system iv. An operating system b. Explain your answer to part a.

12. A user buys a new computer system. Included with the system are the operating system and an integrated package. a. What is meant by an integrated package? b. Give one advantage of using an integrated package c. Give one disadvantage o fusing an integrated package

13. Graphic User Interfaces (GUIs) are found on many computers a. Why do computers need a user interface? b. Give one input device, other than a keyboard, that can be used with a graphical user interface c. Give four features of a graphical user interface d. i, Give one other type of user interface ii. Give two benefits to an inexperienced users offered by a graphical user interface compared with this type of interface.

14. A company gets a piece of software specifically written. a. Give two advantages to a company of buying an existing software package, rather than having one specifically written. b. Give one disadvantage to a company of buying an existing software package, rather than having one specifically written.

15. In data logging, the logging period is: a. The time that the computer is switched on for b. The time over which measurements are made c. How often the individual readings are taken d. A record kept by the operating system

16. Which one of the following applications is least likely to use barcode reading as a method of data capture? a. Recording loans and returns in a library b. Reading the data on cheques c. Recording the book numbers (called ISBNs) of books in a bookshop d. Stock control in a supermarket

17. Match up the input devices with the data entry methods

Barcode reader

Optical mark reader

Magnetic stripe reader

Optical character reader

Recording the fact that a book has been returned to a library after a loan

Recording the answers given by students in a multiple-choice test

Reading the account numbers when a customer pays a gas bill

In a supermarket for reading and then obtaining the details (price, description) of a product

18. A lottery ticket is an example of a document that contains data. Marks are made on a sheet that is then read by a machine. a. Give one reason why the staff in the shop selling the lottery ticket do not simply key in the number s as the customer says them b. Give the name of the form of data capture that is used to capture the details on the lottery ticket c. Give one advantage of this form of data capture

19. One method of data capture involves a person talking to a computer. a. What is the name given to this method of data capture? b. Give the name of an input device that is needed for this method of data capture c. Give one advantage of this type of system d. Give one disadvantage of this type of system

Sometimes data is captures automatically using signals e. Give the name of an application where data is captured automatically f. Describe why the data is captured automatically in the application you have named

20. Briefly explain the difference between the terms ‘data’ and ‘information’

21. Data can be quantitative or qualitative. Briefly describe the difference between these two terms.

22. Which one of the following statements is false? a. Validation is performed by a computer program b. Errors caused by mistyping are called transcription errors c. Letters or numbers that are swapped around by mistake are called transposition errors d. Validation checks are able to detect all errors

23. Which of these is not classed as a method of verification? a. range check b. presence check c. character type check d. double entry of data

24. An extra digit added to the end of a long number such as an ISBN is called a: a. Check digit b. Parity digit c. Binary digit d. Length check

25. An application form for a passport arrives at the passport office where the details are typed into a computer. The details are then verified after typing. Explain briefly how the details may be verified.

26. Fill in the gaps in the paragraph below using the words from the list correct presence range digit input processing output sensible software

Data validation is the checking of data when _____________, using

___________ to make sure it is ____________.

Two common methods of data validation are a ___________ check and a

_________ check.

27. Why is the use of data validation so important?

28. Before data is entered into a computer, it is often coded. Why is this done? a. Codes prevent unauthorised access b. It makes it harder for people to understand what the data means c. Codes are quicker to type in d. Codes can be kept secret

29. Which of the following parts of a database are in the right order, with the largest first? a. File, field, record b. File, record, field c. Field, record, file d. Record, field, file

30. To find specific information from a database you would need to perform a: a. Query b. Print c. Sort d. Validation

31. A primary school holds personal details about its pupils. At present the data is kept manually in filing cabinets. The headteacher of the school would like to keep the details on a computer system. She is currently looking into putting the pupils’ details on a database. a. Give three advantages of holding these pupils’ details on a database b. Give two disadvantages of holding the pupils’ details on a database c. Each pupil is given a unique number when they join the school.

Give one reason why this unique number is used d. Other than name, address and telephone number, give the names of five different fields that could be held in the pupils’ database.

32. A file kept to show any changes made to another file is called a: a. Transaction log b. Floppy disk c. Back-up file d. Secret file

33. Personal details and credit card details are encrypted before being sent over the Internet. This is to ensure that: a. They are tuned into code to prevent hackers from reading them b. The card details are correct c. The details can be sent along a telephone line d. They are backed up

34. Which of these is not a natural hazard that could cause damage to computer systems? a. Earthquakes b. Floods c. Lighting d. Theft

35. In a medical centre, data about the patients is stored on the hard disk of the network server. a. Give two physical precautions that could be taken to keep the data secure b. Doctors need to see al the information about patients.

Receptionists only need to see some of the information about patients. Describe one way in which software could be used to restrict access to patient information.

36. What does ICT stand for?

Download