Podcast
Questions and Answers
What is the duration of the Information and Communication Technology Paper 1 Theory?
What is the duration of the Information and Communication Technology Paper 1 Theory?
What type of pen is recommended to be used for writing answers?
What type of pen is recommended to be used for writing answers?
What is the total mark for this paper?
What is the total mark for this paper?
What is the most appropriate data type for the ISBN 330247204X?
What is the most appropriate data type for the ISBN 330247204X?
Signup and view all the answers
What is the description of a volatile internal memory that stores the current instruction?
What is the description of a volatile internal memory that stores the current instruction?
Signup and view all the answers
What is the description of a printed circuit board containing the CPU and other components of a computer?
What is the description of a printed circuit board containing the CPU and other components of a computer?
Signup and view all the answers
What is the function of a specific printed circuit board in a computer?
What is the function of a specific printed circuit board in a computer?
Signup and view all the answers
What is the purpose of a specific type of printed circuit board?
What is the purpose of a specific type of printed circuit board?
Signup and view all the answers
What is the headteacher trying to do with the photographs?
What is the headteacher trying to do with the photographs?
Signup and view all the answers
What are the photographs saved on?
What are the photographs saved on?
Signup and view all the answers
What is the headteacher creating for the parents of pupils?
What is the headteacher creating for the parents of pupils?
Signup and view all the answers
What is the purpose of the headteacher uploading the photographs?
What is the purpose of the headteacher uploading the photographs?
Signup and view all the answers
What is the primary advantage of using two-factor authentication?
What is the primary advantage of using two-factor authentication?
Signup and view all the answers
What is an example of a biometric method that could be used in two-factor authentication?
What is an example of a biometric method that could be used in two-factor authentication?
Signup and view all the answers
What is the primary purpose of a systems analyst analyzing a company's current computer system?
What is the primary purpose of a systems analyst analyzing a company's current computer system?
Signup and view all the answers
What are three methods of analyzing a company's current computer system?
What are three methods of analyzing a company's current computer system?
Signup and view all the answers
Where will the software documentation be stored in the given scenario?
Where will the software documentation be stored in the given scenario?
Signup and view all the answers
What is the role of the systems analyst in the given scenario?
What is the role of the systems analyst in the given scenario?
Signup and view all the answers
What is one way to reduce the file size of an image?
What is one way to reduce the file size of an image?
Signup and view all the answers
What is the purpose of manually checking the data without reference to the original copy?
What is the purpose of manually checking the data without reference to the original copy?
Signup and view all the answers
Which method is most effective in preventing errors when data is copied from one medium to another?
Which method is most effective in preventing errors when data is copied from one medium to another?
Signup and view all the answers
What is the purpose of checking that the data being entered is reasonable?
What is the purpose of checking that the data being entered is reasonable?
Signup and view all the answers
What is the benefit of reducing the file size of an image?
What is the benefit of reducing the file size of an image?
Signup and view all the answers
Which method is least effective in reducing data entry errors?
Which method is least effective in reducing data entry errors?
Signup and view all the answers
What is the name of the publisher that has made efforts to trace copyright holders?
What is the name of the publisher that has made efforts to trace copyright holders?
Signup and view all the answers
Why are copyright acknowledgements reproduced online?
Why are copyright acknowledgements reproduced online?
Signup and view all the answers
Where can the Copyright Acknowledgements Booklet be freely downloaded?
Where can the Copyright Acknowledgements Booklet be freely downloaded?
Signup and view all the answers
What is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES)?
What is the brand name of the University of Cambridge Local Examinations Syndicate (UCLES)?
Signup and view all the answers
What is Cambridge Assessment International Education part of?
What is Cambridge Assessment International Education part of?
Signup and view all the answers
Why might the publisher make amends at the earliest possible opportunity?
Why might the publisher make amends at the earliest possible opportunity?
Signup and view all the answers
Study Notes
Examination Instructions
- The examination is 1 hour 30 minutes long.
- Candidates must answer all questions on the question paper.
- A black or dark blue pen should be used for writing.
- The candidate's name, centre number, and candidate number should be written in the boxes at the top of the page.
- An HB pencil can be used for diagrams, graphs, or rough working.
Data Types
- An ISBN (International Standard Book Number) is an example of a numeric data type, but in this case, it is represented as a text string (e.g., 330247204X).
Hardware Components
- A volatile internal memory that stores the current instruction is an example of RAM (Random Access Memory).
- A printed circuit board containing the CPU and other components of a computer is an example of a motherboard.
- A printed circuit board that controls the output to a monitor is an example of a graphics card.
- A printed circuit board that is installed in a computer to connect to a network is an example of a network interface card (NIC).
Communication Methods
- Two communication methods to upload photographs onto the school network are:
- Using a USB drive to physically transfer the files.
- Uploading the files through the internet using online storage services (e.g., Google Drive, Dropbox).
Biometric Methods
- Two examples of biometric methods for two-factor authentication are:
- Fingerprint recognition.
- Facial recognition.
System Analysis Methods
- Three methods of analyzing a company's current computer system are:
- Observing how users interact with the system.
- Conducting interviews with system users and stakeholders.
- Analyzing system documentation and technical specifications.
Reducing File Size
- Two ways to reduce the file size of an image are:
- Compressing the image using lossless or lossy compression algorithms.
- Resizing the image to reduce its resolution or dimensions.
Reducing Data Entry Errors
- The most appropriate method for reducing data entry errors is:
- Checking that the data being entered is reasonable (e.g., checking for invalid or out-of-range values).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Practice your Information and Communication Technology skills with this Cambridge IGCSE ICT Theory Paper 1. This 1 hour 30 minutes exam consists of various questions to test your knowledge and understanding of ICT concepts. Prepare yourself for the May/June 2023 exam with this quiz.