ICT Flashcards

1
Q

What’s hardware

A

Hardware is the physical electronic and electrical components that make up a
computer system. Hardware can be either internal or external.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give an example of hardware

A

Central Processing Unit (CPU), RAM & ROM Keyboard, Mouse, Joysticks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s software

A

Software is instructions that tell computer hardware what to do. Software is useless
unless there is hardware to run it on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give examples of software

A

Operating systems – software that controls the running of the computer.
Application Software – software that allows users to perform specific tasks using a
computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a CPU and what makes up the CPU

A

CPU: It is the part of a computer that performs calculations and runs programs.
The CPU is made up:
Control Unit which controls the input and output devices
Arithmetic Logic Unit (ALU) which carries out calculations and makes logical decisions
Primary Memory (Main Memory) is any data or instructions that are to be processed by the CPU must be placed into main memory This is made up of RAM and ROM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is RAM & ROM and what are their characteristics?

A

Random Access Memory (RAM) is the part of the computer that temporarily stores the instructions. RAM is a volatile storage device. This means that if the computer’s power is turned off the contents of RAM are lost.

Read-Only Memory (ROM) is the software that checks the computer’s hardware and then loads the operating system. ROM is non-volatile storage. This means that it stores data permanently. It is used in most computers to hold the ‘boot up’ program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Magnetic Storage Devices

A

For example: fixed and portable magnetic hard drives and magnetic tape drives
Magnetic Hard Drives are used to store data and programs on desktops and laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Optical Storage Devices

A

For example: CD Drives, DVD Drives and BluRay Drives
A type of secondary storage that uses lasers to store data.
Red laser light is used to read and write data to and from the surface of the disk. However, Blu-ray uses BLUE LASER light.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are solid state storage devices

A

Used in Hard Drives, SD Cards, USB sticks, xD cards and Cfast cards.
Solid state storage devices work by storing data in flash chips electronically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are benefits of smart homes

A

Micro-processors in the home offer a number of potential benefits.
Money savings due to reduced utility bills and food bills.
Increased safety and security in the home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are negative effects of smart homes

A

There are a number of potential risks from the rise of ‘smart homes’.
Security risks, as web enabled devices can be hacked.
Added convenience can make us even lazier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the Negative Effect of Microprocessor-controlled devices on Our Lives

A

Decreased fitness
Laziness
Less social interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Positive Effect of Microprocessor-controlled devices on Our Lives

A

Increased leisure time
Increased relaxation
Increased productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are safety problems with laptops and how can we prevent these?

A

Electrocution from spilling drinks
Ensure all drinks are kept away from the computers, ICT labs or office desks.

Fire from sockets being overloaded
Ensure plug sockets or extension cables are not overloaded.

Equipment overheating
Ensure ventilation in the room is good and equipment is not covered whilst in use.

Tripping over trailing cables
Ensure cable ducts are used to cover wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why should personal data be confidential and protected?

A

Users can be stalked or even kidnapped –
Details can be stolen, copied or passed on.
Users could be blackmailed/ threatened into doing inappropriate things.
Customer details could be sold onto a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can someone avoid inappropriate disclosure of personal data?

A

Ensure privacy settings in social media sites have been activated.
Do not share data via social media or emails with strangers.
Do not post inappropriate images or content.

17
Q

Effects of hacking and how to prevent them

A

Effects of Hacking:
To delete, corrupt, copy and edit files.
Sensitive Data could be sold to competitors.
Identity theft – to steal users’ identity.
To expose a company (for example WikiLeaks).
To cause disruption and stop production.

Strategies to prevent hacking to protect data:
Use of firewalls – sometimes part of the operating system.
Use of strong passwords which are frequently changed.
Use of protection software to detect and block possible hacking attempts.
Hire a professional hacker to test the weak

18
Q

What is a computer virus

A

A computer virus is a piece of programming code/software which can install and replicate itself onto a computer system without the user’s permission.

19
Q

Effects of virus and how to prevent them

A

Effects of a computer virus ?
Causes the computer to crash – become slower
Sometimes files can be deleted – leads to computer malfunction.
Data files can be copied by the hacker or the files could be corrupted.
Could stop production until the virus has been quarantined.

Strategies to prevent computer virus:
Install antivirus software and regularly update it.
Do not use software or USB from unknown sources.
Be careful about clicking on links from untrusted websites.
Be careful about downloading attachments from unknown email addresses.

20
Q

What is Spyware?

A

Is a software which can monitor your use of the computer (internet browsing) and monitor and log key pressed.

21
Q

Effects of spyware and how to prevent them

A

Effects of Spyware?
Spyware software will send the data back to the person who planted the spyware software on your computer. This could include
personal details like passwords and banking account information.
Spyware software could also install additional software to read cookie data and change web browsing preferences.

Strategies to prevent Spyware
The use of anti spyware software which is regularly updated.
The use of a pointing device to select characters when entering sensitive data.

22
Q

What is Phishing?

A

The recipient will receive an email which looks legitimate. The email will normally request the user to update their details which could be their password or payment details. To update the users details they will have to click on a link which will take them to a fake website.

23
Q

Effects of phishing and how to prevent them

A

Effects of Phishing?
The user will be tricked into entering their details into a fake website. The sender of the initial email will have gained personal details from the user. These details can be used fraudulently or for identity theft.

Strategies to prevent Phishing
Use a filter on your email account so that only emails from authorized users appear in your inbox.
Always double check the URL and email address.

24
Q

Injuries from staying on a screen and how to prevent them?

A

Back & Neck problem
Sitting in front of a computer screen for long periods of time

Prevention
Use fully adjustable chairs for correct posture
Use foot rests to reduce posture problems

Repetitive Strain Injury
Damage to fingers & wrists caused by continuous use of a keyboard

Prevention
Rest your wrist
Take breaks
Ensure correct posture of arms

Ozone Irritation
laser printers can cause dry skin & respiratory problems

Prevention
Laser printer should be used in a designated printing room
Change to other printers

25
Q

What is Wi-Fi and why is it used

A

Wi-Fi is a wireless networking technology
A wireless transmitter receives information from a network via its connection
Transmitter converts the received information into radio waves and then transmit them

26
Q

What is Bluetooth and why is it used

A

Bluetooth is a radio-wave technology,
It is mainly designed for communicating over short distances
They use virtually no power
Because they don’t travel far, are theoretically more secure than wireless networks that operate over longer ranges, such as Wi-Fi

27
Q

What are the 3 types of networks

A

LAN is a Local Area Network
LAN covers a small area (normally confined to one building or within a close proximity).

A WAN is Wide Area Network is a network that extends over a large geographical area.
A WAN is often created by joining several LANs together.

A wireless LAN (WLAN) is a LAN that uses radio signals (Wi-Fi) to connect computers instead of cables.
Devices know Access Points (AP) are connected to the wired network at fixed locations.

28
Q

How does a router route data packets and what does the routing do when a data packet arrives

A

It uses headers and forwarding tables to determine the best path for forwarding the data packets

Reads the data packet’s destination address
Looks up all the paths it has available to get to that address
Checks on how busy each path is at the moment
Sends the packet along the least congested (fastest) path

29
Q

How does a router store computer addresses

A

The router has a routing table inside it. This holds a table in memory that contains a list of all the networks it
is connected to, along with the latest information on how busy each path in the network is, at that moment.

30
Q

What the purpose of a router

A

Connects networks and devices to the internet
Transfers data between networks (Receives and Sends Data Packets) (e.g. ROUTING)
It stores information about which computer is connected to which network (Computer Addresses)

31
Q

What are disadvantages of networks

A

Greater risk of hackers.
Greater risk of viruses (spreading and disabling networks).
When the network is down computers can not be used as
standalone computers.
Print queues can be long.

32
Q

What are advantages of networks

A

Easily share files and data.
Share resources such as printers and Internet connections.
Communicate with other network users (e-mail, instant messaging,
video-conferencing, etc.)
Store data centrally (using a file server) for ease of access and
back-up.
Keep all of our settings centrally so we can use any workstation.

33
Q

What is a network

A

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

34
Q

What’s a Switch & a Hub?

A

A switch, like a hub, is a device that connects a number of computers together to make a LAN.

35
Q

What’s the difference between a switch and a hub?

A

A switch receives a message, it checks who it is addressed to, and only sends it to that specific computer but a hub sends it to all of the computers

36
Q

List the ways how to gather information about a computer system

A

Questionnaires
Interviews
Observing people
Looking at the current systems documentation