ICT Flashcards

1
Q

List the 5 things you must know when planning document

A

What is the purpose of the document ?
Who is the target audience ?
How will I make it suitable for this audience ?
What is the appropriate medium ?
What is the appropriate package ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Window keyboard short cuts
cut
copy
paste
select all
undo
redo
screenshot for whole screen
screenshot for current window

A

CTRL X
CTRL C OR CTRL INSERT
CTRL V OR SHIFT INSERT
CTRL A
CTRL Z
CTRL Y
PRT SCR
ALT PRT SCR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain what the term “drag and drop” means

A

Is to move a selected object
like an image or highlight text
to another part of screen
using a mouse or similar device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is meant by corporate house style

A

Corporate branding/a method of recognising a company through elements like its logo/colour scheme etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List 4 elements that could be changed when applying a corporate house style to a document

A

Colour schemes
Font style
Point sizes
Logo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Apart from on documents identify 4 places where a corporate house style maybe displayed

A

Business cards
Websites
TV advertisements
Bill boards/advertising hoardings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain how a spell check program works

A

1 A spell check searches through its dictionary… …and tries to find a match with the word in the document. If a match is not found it indicates a potential error… …usually by underlining the word with a red wavy line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain why same words that are spelt correctly may be shown as incorrect by a spell check

A

A spell check searches through a dictionary to find a match with the word in the document.
If a match is not found it is displayed as a potential error.
Names of people/places may not be in the dictionary.
Highly technical/specialist terms may not be in the dictionary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Select the correct response to complete this sentence
Microsoft shows you a grammer error using

A

a blue wavy underline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identify which of the following would not be a good method of getting the info you need

A

Usse a tv advert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name three problems that could arise if you did not know enough about your audience

A

fonts too small
* colours used prevented colour-blind people from seeing the text
* the level of language used was too advanced for the audience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

State which of the following is the definition of a target audience

A

People who will see or use the presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define copyright

A

The exclusive legal right, given to the originator for a fixed number of years, to print,
publish, perform, film, or record literary, artistic, or musical material. This right can be
assigned to someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify which of the following describes software copy right theft commonly known as software piracy

A

i, ii and iii.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name two ways that manufacturers can help to prevent software piracy

A

Serial numbers/Product keys, license agreements, holograms, online verification,
tamper proofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain what is meant by intelluctual property rights

A

It is paying to use the ideas and skills of other people. They are known as their
intellectual property.
* If a person or a firm spends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An inbox is where you can find

A

B Emails sent to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following would be valid email addres

A

firstname.lastname@test.com and 123456789@example-one.com

19
Q

Describe what you should do when you receive an email that contains a link

A

Check that you know the person or organisation that sent you the email. Banks, financial
services, etc. will never send an email with a link for you to follow. You could be
sent a link if you have just requested to change your password.

20
Q

Describe what you should do when you receive an email that contains a link

A

Check that you know the person or organisation that sent you the email. Banks, financial
services, etc. will never send an email with a link for you to follow. You could be
sent a link if you have just requested to change your password.

21
Q

Describe what a web browser is

A

Software that allows a user to communicate with web servers.

22
Q

Explain the diifference between the www and the internet

A

The internet is a global network of networks. The world wide web is a service that runs
on the internet and provides interlinked pages of information and resources.

23
Q

There are ways for you to evaluate the information you find on the internet explain three of them

A

Check if there are dates for when information was uploaded, check the people/
organisation responsible for the website, check for bias, check there are sources given for
claims or ‘facts’ presented.

24
Q

State what a protocol

A

A rule or a procedure that must be followed.

25
Q

Give the protocol that is used in the following cases

A

HTTP, FTP, HTTPS, SSL

26
Q

Explain what a spam is

A

Unsolicited email sent in bulk.

27
Q

Describe the main reasons that spam emails are spent

A

as advertising for goods and services, like junk mail
* to try to get money from people by asking them to help move money
* to insert malware into the recipient’s device.

28
Q

Describe three ways that people sending spam coould find your email addres

A

use software to scan the web for the @ symbol
* use software to generate common user names and pair them with common domains
* buying lists that have been compiled, e.g. from firms and organisations to whom
people have voluntarily submitted their email addresses when signing up or joining

29
Q

Disucss methods of preventing spam

A

never give out or post your email address publicly
never reply to spam messages
download spam filtering tools
do not use your personal email address when registering for any online services.
Spammers monitor these groups and harvest the email addresses

30
Q

Using examples explain the differece between spam, malware and phishing

A

Spam is an unsolicited and unwanted electronic message you receive from someone you
have never contacted usually advertising goods and services, e.g. giving you details about
a new car or game.
Malware is any software that has been created to cause damage to computers and the
software and data that they process, e.g. virus, trojan, worm, ransomware.
Phishing is the use of emails to try to get a recipient to respond or click on a link in order
to commit fraud. They usually purport to come from a bank or financial organisation
asking you to respond or they will close your account.

31
Q

State what is meant by the term folder

A

A graphical representation of a directory

32
Q

Name the type of folder system to be used in managing your files

A

Hierarchical

33
Q

Which two of the following graphic file forats are often used on the internet

A

.gif and .jpg

34
Q

State which statement are true and which are false

A

T [1]
ii T [1]
iii T [1]
iv T

35
Q

State which of the following is a valid filename to use to store the instructions for the manual of your printer

A

Invalid, invalid, invalid, valid

36
Q

Describe how you would save a document to a different file namee

A

Use Save As

37
Q

Give an example of a lossy compressio file format

A

.mp3, .gif

38
Q

A lossless compression file format

A

.zip, .png

39
Q

State what is meant by file compression

A

Formatting the file so that it requires less memory for its storage.

40
Q

List the benefits of compressing a file or folder

A

Take up less space on local disk drive, faster to send online, easier to store online.

41
Q

State the purpose of .rtf file

A

text file that retains formatting and can be opened in many different programs.

42
Q

Define the following words with reference to images
resize
crop
rotate
reflect
text wrap

A

change the width and/or height of an image [2]
b remove part of an image [2]
c turn the image clockwise or anticlockwise through a certain number of degrees [2]
d make a mirror image of an existing image or shape [2]
e the way in which text flows around, under or over an image.

43
Q

Analyse the methods that can be used for reducing the file size of an image and suggest situations where each would be the most appropriate method

A

An image is made up of thousands of points or elements called elements. Each of these elements
is called a pixel. The greater the number of pixels in a given area, the greater will be the detail and
accuracy of the image.
The colour of each pixel is stored as a number of bits and therefore the greater the number of
bits used to store that data, the greater the number of different colours that can be represented.
With two bits, two colours can be represented, with three bits, eight colours and with four bits,
sixteen. Modern cameras now use 24 bits for each pixel, so giving 16,777,216 different colours.
The number of pixels and the number of bits used to represent the colour of each one
obviously affects the size of the file. If the number of bits is reduced then the image will
become less detailed, especially if it is enlarged, but our eyes are less likely to notice if the
number of colours is reduced as we often cannot distinguish between small differences.