Cambridge IGCSE ICT Theory Paper 1
30 Questions
118 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the duration of the Information and Communication Technology Paper 1 Theory?

  • 1 hour
  • 2 hours 30 minutes
  • 1 hour 30 minutes (correct)
  • 2 hours
  • What type of pen is recommended to be used for writing answers?

  • Black or dark blue pen (correct)
  • Any type of pen
  • Erasable pen
  • HB pencil
  • What is the total mark for this paper?

  • 70
  • 60
  • 80 (correct)
  • 90
  • What is the most appropriate data type for the ISBN 330247204X?

    <p>Text</p> Signup and view all the answers

    What is the description of a volatile internal memory that stores the current instruction?

    <p>RAM</p> Signup and view all the answers

    What is the description of a printed circuit board containing the CPU and other components of a computer?

    <p>Motherboard</p> Signup and view all the answers

    What is the function of a specific printed circuit board in a computer?

    <p>To control the output to a monitor</p> Signup and view all the answers

    What is the purpose of a specific type of printed circuit board?

    <p>To connect the computer to a network</p> Signup and view all the answers

    What is the headteacher trying to do with the photographs?

    <p>Upload them onto the school network</p> Signup and view all the answers

    What are the photographs saved on?

    <p>A storage device</p> Signup and view all the answers

    What is the headteacher creating for the parents of pupils?

    <p>A newsletter</p> Signup and view all the answers

    What is the purpose of the headteacher uploading the photographs?

    <p>To include them in a newsletter</p> Signup and view all the answers

    What is the primary advantage of using two-factor authentication?

    <p>To provide an additional layer of security</p> Signup and view all the answers

    What is an example of a biometric method that could be used in two-factor authentication?

    <p>Fingerprint scanning</p> Signup and view all the answers

    What is the primary purpose of a systems analyst analyzing a company's current computer system?

    <p>To identify areas for improvement</p> Signup and view all the answers

    What are three methods of analyzing a company's current computer system?

    <p>Interviews, surveys, and observations</p> Signup and view all the answers

    Where will the software documentation be stored in the given scenario?

    <p>On a cloud storage service</p> Signup and view all the answers

    What is the role of the systems analyst in the given scenario?

    <p>To work with a team to create new software</p> Signup and view all the answers

    What is one way to reduce the file size of an image?

    <p>Changing the file format of the image</p> Signup and view all the answers

    What is the purpose of manually checking the data without reference to the original copy?

    <p>To verify the accuracy of the data entered</p> Signup and view all the answers

    Which method is most effective in preventing errors when data is copied from one medium to another?

    <p>Preventing errors when data is copied from one medium to another</p> Signup and view all the answers

    What is the purpose of checking that the data being entered is reasonable?

    <p>To prevent data entry errors</p> Signup and view all the answers

    What is the benefit of reducing the file size of an image?

    <p>Reduced data storage requirements</p> Signup and view all the answers

    Which method is least effective in reducing data entry errors?

    <p>Manually checking the data without reference to the original copy</p> Signup and view all the answers

    What is the name of the publisher that has made efforts to trace copyright holders?

    <p>UCLES</p> Signup and view all the answers

    Why are copyright acknowledgements reproduced online?

    <p>To avoid the issue of disclosure of answer-related information to candidates</p> Signup and view all the answers

    Where can the Copyright Acknowledgements Booklet be freely downloaded?

    <p><a href="http://www.cambridgeinternational.org">www.cambridgeinternational.org</a></p> Signup and view all the answers

    What is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES)?

    <p>Cambridge Assessment</p> Signup and view all the answers

    What is Cambridge Assessment International Education part of?

    <p>Cambridge Assessment</p> Signup and view all the answers

    Why might the publisher make amends at the earliest possible opportunity?

    <p>If they unwittingly include items requiring clearance</p> Signup and view all the answers

    Study Notes

    Examination Instructions

    • The examination is 1 hour 30 minutes long.
    • Candidates must answer all questions on the question paper.
    • A black or dark blue pen should be used for writing.
    • The candidate's name, centre number, and candidate number should be written in the boxes at the top of the page.
    • An HB pencil can be used for diagrams, graphs, or rough working.

    Data Types

    • An ISBN (International Standard Book Number) is an example of a numeric data type, but in this case, it is represented as a text string (e.g., 330247204X).

    Hardware Components

    • A volatile internal memory that stores the current instruction is an example of RAM (Random Access Memory).
    • A printed circuit board containing the CPU and other components of a computer is an example of a motherboard.
    • A printed circuit board that controls the output to a monitor is an example of a graphics card.
    • A printed circuit board that is installed in a computer to connect to a network is an example of a network interface card (NIC).

    Communication Methods

    • Two communication methods to upload photographs onto the school network are:
      • Using a USB drive to physically transfer the files.
      • Uploading the files through the internet using online storage services (e.g., Google Drive, Dropbox).

    Biometric Methods

    • Two examples of biometric methods for two-factor authentication are:
      • Fingerprint recognition.
      • Facial recognition.

    System Analysis Methods

    • Three methods of analyzing a company's current computer system are:
      • Observing how users interact with the system.
      • Conducting interviews with system users and stakeholders.
      • Analyzing system documentation and technical specifications.

    Reducing File Size

    • Two ways to reduce the file size of an image are:
      • Compressing the image using lossless or lossy compression algorithms.
      • Resizing the image to reduce its resolution or dimensions.

    Reducing Data Entry Errors

    • The most appropriate method for reducing data entry errors is:
      • Checking that the data being entered is reasonable (e.g., checking for invalid or out-of-range values).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Practice your Information and Communication Technology skills with this Cambridge IGCSE ICT Theory Paper 1. This 1 hour 30 minutes exam consists of various questions to test your knowledge and understanding of ICT concepts. Prepare yourself for the May/June 2023 exam with this quiz.

    More Like This

    IGCSE ICT 0417 Quiz
    10 questions
    ICT IGCSE Theory
    10 questions

    ICT IGCSE Theory

    InvaluableHawk avatar
    InvaluableHawk
    iGCSE ICT - Theory Flashcards
    61 questions

    iGCSE ICT - Theory Flashcards

    SolicitousPelican7010 avatar
    SolicitousPelican7010
    IGCSE ICT Flashcards on Hardware
    14 questions
    Use Quizgecko on...
    Browser
    Browser