30 Questions
What is the duration of the Information and Communication Technology Paper 1 Theory?
1 hour 30 minutes
What type of pen is recommended to be used for writing answers?
Black or dark blue pen
What is the total mark for this paper?
80
What is the most appropriate data type for the ISBN 330247204X?
Text
What is the description of a volatile internal memory that stores the current instruction?
RAM
What is the description of a printed circuit board containing the CPU and other components of a computer?
Motherboard
What is the function of a specific printed circuit board in a computer?
To control the output to a monitor
What is the purpose of a specific type of printed circuit board?
To connect the computer to a network
What is the headteacher trying to do with the photographs?
Upload them onto the school network
What are the photographs saved on?
A storage device
What is the headteacher creating for the parents of pupils?
A newsletter
What is the purpose of the headteacher uploading the photographs?
To include them in a newsletter
What is the primary advantage of using two-factor authentication?
To provide an additional layer of security
What is an example of a biometric method that could be used in two-factor authentication?
Fingerprint scanning
What is the primary purpose of a systems analyst analyzing a company's current computer system?
To identify areas for improvement
What are three methods of analyzing a company's current computer system?
Interviews, surveys, and observations
Where will the software documentation be stored in the given scenario?
On a cloud storage service
What is the role of the systems analyst in the given scenario?
To work with a team to create new software
What is one way to reduce the file size of an image?
Changing the file format of the image
What is the purpose of manually checking the data without reference to the original copy?
To verify the accuracy of the data entered
Which method is most effective in preventing errors when data is copied from one medium to another?
Preventing errors when data is copied from one medium to another
What is the purpose of checking that the data being entered is reasonable?
To prevent data entry errors
What is the benefit of reducing the file size of an image?
Reduced data storage requirements
Which method is least effective in reducing data entry errors?
Manually checking the data without reference to the original copy
What is the name of the publisher that has made efforts to trace copyright holders?
UCLES
Why are copyright acknowledgements reproduced online?
To avoid the issue of disclosure of answer-related information to candidates
Where can the Copyright Acknowledgements Booklet be freely downloaded?
What is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES)?
Cambridge Assessment
What is Cambridge Assessment International Education part of?
Cambridge Assessment
Why might the publisher make amends at the earliest possible opportunity?
If they unwittingly include items requiring clearance
Study Notes
Examination Instructions
- The examination is 1 hour 30 minutes long.
- Candidates must answer all questions on the question paper.
- A black or dark blue pen should be used for writing.
- The candidate's name, centre number, and candidate number should be written in the boxes at the top of the page.
- An HB pencil can be used for diagrams, graphs, or rough working.
Data Types
- An ISBN (International Standard Book Number) is an example of a numeric data type, but in this case, it is represented as a text string (e.g., 330247204X).
Hardware Components
- A volatile internal memory that stores the current instruction is an example of RAM (Random Access Memory).
- A printed circuit board containing the CPU and other components of a computer is an example of a motherboard.
- A printed circuit board that controls the output to a monitor is an example of a graphics card.
- A printed circuit board that is installed in a computer to connect to a network is an example of a network interface card (NIC).
Communication Methods
- Two communication methods to upload photographs onto the school network are:
- Using a USB drive to physically transfer the files.
- Uploading the files through the internet using online storage services (e.g., Google Drive, Dropbox).
Biometric Methods
- Two examples of biometric methods for two-factor authentication are:
- Fingerprint recognition.
- Facial recognition.
System Analysis Methods
- Three methods of analyzing a company's current computer system are:
- Observing how users interact with the system.
- Conducting interviews with system users and stakeholders.
- Analyzing system documentation and technical specifications.
Reducing File Size
- Two ways to reduce the file size of an image are:
- Compressing the image using lossless or lossy compression algorithms.
- Resizing the image to reduce its resolution or dimensions.
Reducing Data Entry Errors
- The most appropriate method for reducing data entry errors is:
- Checking that the data being entered is reasonable (e.g., checking for invalid or out-of-range values).
Practice your Information and Communication Technology skills with this Cambridge IGCSE ICT Theory Paper 1. This 1 hour 30 minutes exam consists of various questions to test your knowledge and understanding of ICT concepts. Prepare yourself for the May/June 2023 exam with this quiz.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free