Computer Hardware and Software Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Match the following descriptions with the correct type of memory:

RAM = Data is stored temporarily ROM = Data is read but cannot be easily written

Match the following devices with their typical usage environments:

Desktop = Static environment; typically used in one place Laptop = Mobile devices with a large keyboard and display Smartphone = Highly portable; designed for use on the go

Match the following software types with their functions:

Application software = Examples include word processor, video editing software, apps. System software = Examples include compilers, operating systems, device drivers.

Match each input device to its corresponding application:

<p>Touchscreen = Interacting directly with a display Digital camera = Capturing photographs or videos Microphone = Recording audio Scanner = Converting physical documents into digital format</p> Signup and view all the answers

Match each output device to its corresponding function:

<p>Speakers = Produce audio output LCD monitors = Display visual output Laser printer = Produce high quality text and graphics on paper. Multimedia projector = Project visual ouput onto a large screen.</p> Signup and view all the answers

Match the printer type with the way it creates images:

<p>Laser printer = Uses toner to create images. Inkjet printer = Sprays ink through nozzles onto paper. Dot matrix printer = Uses impact to create images with dots. 3D printer = Builds models by layering materials.</p> Signup and view all the answers

Match the correct storage media for each use case:

<p>Fixed Hard Disk = Storing a database of books in a school library Memory card = Storing photographs in a digital camera Blu-ray = Companies distributing HD movies Magnetic Tape = Storing the backup of a file server</p> Signup and view all the answers

Match the network type with its description:

<p>WAN = The internet and the network of ATMs used by banks WLAN = Wireless communication over fairly short distances using radio or infrared signals instead of cables. LAN = Network that covers a small geographic area (e.g., a building).</p> Signup and view all the answers

Match the following descriptions with the correct method of data input:

<p>OMR = Used to read multiple-choice examination responses, relies on simply detecting where marks have been made on a page OCR = While more accurate than data entered into a computer by keyboard, there are still problems recognizing all types of handwriting. MICR = Used to read magnetic data on checks. Detects characters using magnetic ink.</p> Signup and view all the answers

Match the video conference advantage with its main benefit:

<p>Easier access to experts = Facilitates inclusion of external expertise without travel. Short notice conferences = Enables quick decision-making and response to urgent issues. Reduced costs = Decreases expenses related to travel, accommodation, and transportation. Technical problems can affect quality = Internet technical difficulties could negatively impact the quality.</p> Signup and view all the answers

Match the Bluetooth/WiFi characteristic to a suitable purpose:

<p>Bluetooth = Sound data (phones) or file transfer (computers) WiFi = Need a WiFi adapter, a wireless router and wireless access point for network connectivitiy</p> Signup and view all the answers

Match the increased job sector with an ICT advancement:

<p>Network managers/technicians = Managing and maintaining network infrastructures. Web design = Creating and designing websites. Computer imagery = Producing digital images and animations. Computer Programmers = Creating new softwares and systems</p> Signup and view all the answers

Match the application of sensors in monitoring process:

<p>Vital signs in hospital = Sensors measure pulse rate, heart rate, blood pressure, etc. The data recorded = Data from the sensors is stored in a computer's memory. Computer compares the data = The computer compares the data from the sensors with values stored in memory. Readouts = Results are output on a screen in the form of graphs.</p> Signup and view all the answers

Match the implementation method with it's best use case:

<p>Direct = The benefits are immediate, but if there is a system failure there could be a disaster. (New system). Parallel = Time consuming since the data in entered into 2 systems simultaneously. Phased = If part fails, a failure point will result but not a disaster. Parts are integrated bit by bit (new system).</p> Signup and view all the answers

Match the following descriptions to the type of documentation they represent:

<p>User documentation = Sample runs (with results and actual test data used) Technical documentation = Minimum memory requirements</p> Signup and view all the answers

Match the term to its definition:

<p>Double entry = Utilizing two people. Visual check = Checking for errors by the person who is entering the data.</p> Signup and view all the answers

Match the security threat with its method:

<p>Smishing = Uses SMS to send text messages with phone/URLs. You have won a prize. Phishing = User should be cautious when opening emails, especially with attachments. Pharming = Malicious code is installed and directs you to a fake website.</p> Signup and view all the answers

Match IT health problem with a solution:

<p>Back and neck problem = Adjustable chair to maintain the correct position. Eyestrain = Using LCD screens that do not flicker can prevent this from happening. Heavy falling equipment = Use strong desks to support hardware weight wise. Fire Risk = Equip the area with CO2/dry extinguishers.</p> Signup and view all the answers

Match an advantage with biometrics rather than traditional security methods:

<p>Biometrics are unique = Others cannot sign an individual in if it were a card/passcode. More secure = User has to be present. More relieable = Typing in passcodes can lead to errors or data entry. Difficult to forge = Passwords can be copied.</p> Signup and view all the answers

Match the area with cookies:

<p>Remember the users details = Store information about the visit and are used the next time the user visits the site Offers a more tailored experience for users = Is a small text file sent to a users web browser when they visit a site Remember the users preferences = Make website interaction more streamlined to the individaul using the site. Target Products = Aids marketing and revenue by tailoring adds.</p> Signup and view all the answers

Match the following advantages to each method of cloud data storage:

<p>You Don't have to pay for storage capacity = Free up storage on the computer, mobile phone, or tablet. Ability to synchronize files = Have data automatically updated across all devices. No need to carry memory sticks = Access your files from home. Ideal for Collaboration = It allows several users to edit and collaborate on a single file or document.</p> Signup and view all the answers

Match the following arguments for internet control with their intended results:

<p>Prevent illegal information = By some control incorrect information will not be published on websites. Protect Vunerable Groups = Protect children from being subjected to unideal results. Prevent illegal material being posted = Would prevent illegal material being posted on websites. Easier discovery of making a bomb = Would deter the production of dangerous information.</p> Signup and view all the answers

Match the following elements to the blog web:

<p>Content on blog can be edited = Bloggers cannot be prosecuted for posting offensive material. Updated quickly = Bases on personal experiences and usually edited by one author. Website log format = Blog entries are on order. Can have offensive material = Bloggers can be prosecuted for posting offensive material.</p> Signup and view all the answers

Match each stage of the online booking process with its description:

<p>First: Choose Performance = Customer clicks on the performance wish to see. Second: The typing of information = Date and time are typed in. Third: Number of attendees = The reuqired number of seats is entered. Fourth: Approval = The seating display in the theatre is shown on the screen.</p> Signup and view all the answers

Match the type of web display to the information needed and displayed:

<p>Bright and cheerful colours = Animations and sounds should be used Balance of pictures and text = Needed for teens and adults. Clear instructions = Needed for seniors.</p> Signup and view all the answers

Match the action with the type of copyright infringement:

<p>Make a software copy and then sell it = This violates copyright laws. Use software on a network or in multiple computers without a license = This violates copyright laws by exceeding licensed use. Rent out a software package without permission = Engaging in unauthorized commercial use. Use the name of copyrighted software without agreement = Misleading and copyright.</p> Signup and view all the answers

Match the result to it's respective method of protecting against software piracy:

<p>The user will be asked to enter a product key = This prevents unauthorized installation. OK/I Agree to the license agreement is activated = Compliance ensures authorized use of licensed parameters. The hologram sticker = Guarantee of genuine software. Some software run only if dongle is plugged into USB port = Ensure protection from an outside party.</p> Signup and view all the answers

Match the method for creating a strong password to what it prevents.

<p>Mix numbers and letters = Adding letters and characters that range in variety can defend against a hack. Do not write your name = Prevents a hacker from discovering common passwords. Using strong password = Hacker will have a challenge from code and data being breached.</p> Signup and view all the answers

Match the type of ICT data with its requirement for storage:

<p>Data processed only for stated purposes = Data must be only for the stated purpose. Data processed fairly and lawfully = Data must be managed fairly and lawfully. Personal data in general = personal data like (name, Birth date, address, medical history, banking details). Data must be lawful and only used fairly = Data must be fair.</p> Signup and view all the answers

Match the health risk listed with the correct way to minimize or eliminate the hazard:

<p>Eyestrain = Ensure there is no screen flicker to prevent problems with the eye vision. Heavy falling equipment = Use strong desks and tables to support hardware. Back and Neck Pain = Use adjustable chairs that give the correct position.</p> Signup and view all the answers

Match each type of biometrics with it's definition:

<p>Finger print scan = Used to activate accounts or doors. Retina Scan = Scans the pattenr to find the identity. Signature recognition = Used as a form of analysis on a key person.</p> Signup and view all the answers

Email VS Fax, when do you use each?

<p>Messages being edited = Use a processor. Image being basic = Fax is for basic image transfer. Transmission has been slowed due to bandwidth, data caps or other reasons = Fax is still a possible outcome. Attachment has added sound files = Email if used for atttached sounds.</p> Signup and view all the answers

Match the type of website with the method information is reliable or not:

<p>Commerical Website = Advertise their products, if not It advertisement is unrelieable. Setup website = Anyone can configure this web. Commercial Website = Based to advertise their products that advertising is unreleated.</p> Signup and view all the answers

Flashcards

What is hardware?

Physical components that constitute a computer system.

What is software?

Programs controlling computer systems and processing data; includes application and system types.

What is GUI (Graphical User Interface)?

User-friendly interface utilizing icons; fewer commands to learn.

What is CLI (Command Line Interface)?

Interface requiring typed commands; understanding computer operation is important.

Signup and view all the flashcards

What is RAM?

Stores data temporarily while ROM stores permanent information.

Signup and view all the flashcards

What is ROM?

Volatile memory loses data when power is off; data cannot be changed or lost.

Signup and view all the flashcards

What is application software?

Allows users to perform specific tasks.

Signup and view all the flashcards

What is system software?

Allows hardware to run properly and enables user-computer communication.

Signup and view all the flashcards

What is virtual reality?

Creating interactive artificial environments used in various fields.

Signup and view all the flashcards

What is MICR?

Used to read magnetic data on cheques

Signup and view all the flashcards

What is OCR?

Used when entering handwritten text.

Signup and view all the flashcards

What is OMR?

Used to read multiple-choice examination responses.

Signup and view all the flashcards

What are input devices?

Keyboards, mouse, touchscreens, etc.

Signup and view all the flashcards

What are output devices?

CRT, TFT, LCD, LED monitors, printers, speakers.

Signup and view all the flashcards

How data is read from the RFID chip?

Radio signal to read data from the RFID.

Signup and view all the flashcards

What does a laser printer use?

A printer that uses toner.

Signup and view all the flashcards

Which printer uses continuous stationery?

A printer that uses continuous stationery.

Signup and view all the flashcards

What is encryption?

Data is converted into a form that is meaningless to anyone except holders of a 'secret key'.

Signup and view all the flashcards

How a router is routed?

Router sends packets of data between computers on different networks.

Signup and view all the flashcards

Areas where ICT has decreased employment?

Manual repetitive jobs, shop work, bank cashiers, office workers.

Signup and view all the flashcards

Areas where ICT has increased employment?

Network managers, web design, computer imagery, system analyst, etc.

Signup and view all the flashcards

Data protection act principle?

Data must be fairly and lawfully processed.

Signup and view all the flashcards

How to minimize spam likelihood?

Use spam filter/anti-spam software, do not reply to spam messages.

Signup and view all the flashcards

What are types of biometrics?

Fingerprint/retina/iris/face/voice recognition, signature scans.

Signup and view all the flashcards

What is smishing?

Using SMS system to send out fake text message containing URL or telephone number to obtain personnel information.

Signup and view all the flashcards

What is phishing?

Trying to gather personal information using deceptive emails and website.

Signup and view all the flashcards

What is pharming?

Malicious code installed in the user computer to redirect the user to a fake website.

Signup and view all the flashcards

What is double entry verification?

Data is entered twice, using two people, and is then compared.

Signup and view all the flashcards

What is visual check verification?

Checking for errors by the person who is entering the data; compare the entered data with the original document.

Signup and view all the flashcards

What is hacking?

Unauthorized access to the computer system, data can be deleted, corrupt, and edited.

Signup and view all the flashcards

Way to protect from hacking?

Using firewall, strong password, encryption, protection softwares.

Signup and view all the flashcards

What is cookie?

A small text file sent to a user's web browser when they visit a web site.

Signup and view all the flashcards

What is meant by software copyright?

Software/music CDs/articles from magazines can be protected by copyright laws.

Signup and view all the flashcards

How to protect software from piracy?

Ask for product key, software should be original CD/DVD.

Signup and view all the flashcards

What is VOIP?

Sending of voice communication over the internet.

Signup and view all the flashcards

Study Notes

Chapter 1

  • Hardware constitutes the physical components to create a computer system.
  • Software refers to the programs to control a computer system and process data.
  • Software types include application software and system software.

GUI vs CLI

  • GUI (Graphical User Interface) does not require users to learn commands.
  • CLI (Command Line Interface) requires users to learn commands for operations.
  • GUI is more user-friendly, utilizing icons to represent applications.
  • CLI requires commands to be typed accurately.
  • CLI needs remembering the exact path and application name.
  • GUI offers direct help menus to choose actions.
  • CLI needs users to understand computer workings.

RAM vs ROM

  • RAM (Random Access Memory) temporarily stores data.
  • ROM (Read-Only Memory) permanently stores information.
  • RAM memory can be written and read, ROM can only be read.
  • RAM data is lost when a computer is turned off.
  • ROM data is retained when there is no power.
  • RAM is volatile memory.
  • ROM is non-volatile memory.

Laptops vs Desktops vs Smartphones

  • Desktop computers are typically stationary.
  • Desktop computers need to be connected to a power source.
  • Smartphones are compact enough to fit in a pocket.
  • Laptops are mobile devices with a screen and large keyboard.

Application Software

  • Application software assists users in performing specific tasks.
  • A word processor, database, and photo/video editing software are examples of application software.

System Software

  • System software programs enable hardware to run correctly.
  • System software allows users to communicate with the computer.
  • Compilers, linkers, and operating systems, are examples of system software.

Virtual Reality

  • Virtual reality refers to an artificial environment for user interaction.
  • Virtual reality helps train pilots, surgeons, and architects.

VR Equipment

  • Virtual reality general equipment includes: eye goggles, gloves, headphones, sensors, and powerful computers.

Chapter 2

OMR, OCR and MICR

  • MICR (Magnetic Ink Character Recognition) is used to read magnetic data on cheques.
  • OCR (Optical Character Recognition) is used when entering handwritten text and to read car number plates.
  • OMR (Optical Mark Recognition) is used to read multiple-choice exams using the position of marks compared to a memory template.

Input Devices

  • Input examples: keyboards, mouse, touchpad, tracker ball, remote control, joystick, driving wheel, touchscreens, scanners, cameras, microphone, sensors, graphic tablet, webcams, light pen, magnetic stripe readers, contactless card readers, chip and pin readers, radio frequency ID readers or magnetic ink/optical character/mark/barcode readers.

Output Devices

  • Output examples: CRT, TFT, LCD and LED monitors, multimedia projectors, printers, speakers and control applications like actuators and heaters.

RFID Chips

  • Data is read by a washing machine by sending out radio signals.
  • RFID chips function like passive transponders.

Printers

  • 3D printers, laser printers, inkjet printers and dot matrix printers all fulfill different printing needs.

Chapter 3

Storage Options

  • Fixed hard disks are commonly used for storing databases in school libraries.
  • Memory cards are suitable for storing digital camera photographs.
  • Blu-ray discs are used by companies to distribute HD movies.
  • Magnetic tape is used for backing up file servers.

CD-R vs Pen Drive

  • Both pen drives and CD-Rs are storage devices
  • Both pen drives and CD-Rs are portable
  • Most PCs have a USB port; Not every computer has a CD drive
  • Pen drives are more robust
  • Pen drives have more data
  • Pen drives are solid state
  • CD-Rs are optical

SSD vs HDD

  • Solid State Drives (SSDs) have moving parts, thus are more reliable.
  • SSDs are thinner, and lighter than HDDs.
  • SSDs consume less power and run cooler.

Chapter 4

Internet vs. Intranet

  • The internet is public while an intranet is private, operating within an organization.
  • The internet is global; the intranet is policed or managed.
  • The internet has more information.
  • Data on the intranet is more relevant and internally reliable.

Networks

  • WANs (Wide Area Networks) connects computers geographically separated and is used by banks.
  • WLANs (Wireless Local Area Networks) provide wireless communication over short distances
  • Bluetooth and WIFI are primary technologies to form a WLAN.
  • LANs (Local Area Networks) networks cover a small geographic area and connect hubs or switches through cables.

Video Conferencing

  • Accessing documents/experts is easier.
  • Holding conferences at short notice is simple with lower travel costs.

Web Conferencing

  • Web conferencing occurs via the internet using a computer and stable internet connection.
  • Web conferencing is the same as online group chats, more formal.
  • Participants can join/leave at will.
  • Sending instant messages is the primary mode of communication in web conferences.
  • Images or videos can be shared using webcams.
  • Documents can be shared before a conference.
  • Minimum hardware includes: Web camera, screen, speakers, and a microphone.

Bluetooth and WIFI

  • Bluetooth facilitates data transfer between two devices.
  • WIFI is suited to full scale networks.
  • Devices connected via Bluetooth need proximity; WIFI offers a larger range.
  • Bluetooth uses a lower bandwidth.
  • WIFI has better security.

Encryption

  • Encryption turns data into a 'secret key' meaningless information to unauthorized parties.

Routers and Data Routing

  • Routers forward data packets using IP addresses between networks.
  • Routers determine and send packets via a data best routes.

Chapter 5

ICT Employment effect

  • ICT has decreased employment in repetitive jobs, shop work, telephone exchanges and bank cashiers.
  • ICT has increased employment for web designers, system analysts, Network managers/ technicians and computer engineers.

Microprocessors

  • Microprocessors reduce manual tasks, give people time for leisure activities.
  • Microprocessors can make people lazy and cause unhealthy lifestyles.

Microprocessor Use

  • Microprocessors switch on/off central heating can be controlled with a smartphone.
  • Burglar alarms can people feel more secure.
  • Smart fridges and freezers leads to a healthy lifestyle.
  • Programmed devices save energy and can be managed with QR codes.
  • Some people are not be familiar with certain technologies; and some electronics are irreparable.

Chapter 6

Online Benefits

  • Online booking, shopping, and banking don't need travel.
  • Online activity reduces costs and time.
  • Worldwide market access for cheaper products
  • Those with mobility issues are more able to shop
  • Online shopping and banking is available 24/7
  • Online shopping saves time compared to the supermarket.
  • Internet banking saves time and reduces staffing needs.

Online Pitfalls

  • There is possible isolation because people stay in home.
  • Online activity has health risks and security issues.
  • A computer and internet access is needed.
  • Products might not portray the exact color.
  • High street shops are closing, leading to 'ghost towns'.
  • It's easier to make errors with online banking.

Robots

  • Robots give advantages in productivity, consistency and are not prone to boredom.
  • Set up costs and new task programming are disadvantages to robots.
  • Microprocessors act like tiny CPUs; in devices like automatic cookers, which feature temperature sensors.
  • The cooker then checks end time against current time, the cooking process is stopped, and heating data is sent from a sensor to turn off cooking.

Sensor Data

  • Computers read key vital signs.
  • The data is converted into digital and stored in the computer.
  • The computer compares vitals and outputs graphs
  • Activates an alarm if anything is wrong.
  • Devices monitor until turned off

Expert System

  • Expert systems give fewer mistakes from greater knowledge and are more consistent/cheaper
  • Expert systems cannot provide sound judgement and need lots of training to use

Chapter 7

EFT

  • Reader checks the amount to pay
  • Data is read using RFID / NFC
  • Banks are contacted
  • Check if valid and process transaction
  • The price of the meal is deducted from the customer's account and paid to the restaurant.

Online Booking

  • Clients click on their performance
  • Type in a date and time
  • Enter seat numbers
  • Shown seating displays
  • Select seats and click confirm.
  • Database searched to check seats.
  • If available, the show price with seating number
  • Then select confirm

Implementation

  • Direct implementation stops the old system overnight and disaster may happen if the new system fails
  • Parallel implementation runs both side by side until ready but means extra staff needed
  • Phased implementation fails a little at a time but will evaluate separate

Verification

  • Double entry is when data is entered twice by two people.
  • Visual check is to compare what is entered and what data is

Documentation

  • Technical documentation is needed.
  • User documentation: How things work, layouts, requirements, examples

Pre-Implementation

  • System is tested along with everything else such as checking meter readings or bills.

Research

  • Find out by observing, interviewing, questionarring and examine what docs exist.

Interviewing

  • Takes time but allows more open answers by analysts

Chapter 8

Data Protection Act

  • Data must be fairly processed, accurate, relevant, secure, not kept too long and processed for its purpose.

Spam E-mail

  • Can used spam filters, do not reply or click links, use disposables, use complex names do not give out accounts and read in tests.

Biometrics

  • Biometrics include fingerprint scans, signature recognition, retina scans, iris recognition, face and voice recognition.

Biometrics vs Traditional security

  • Security can be copied
  • Harder to forge
  • They cannot sign without infringement
  • Eyes and fingerprints are always read

Personal and Personnel Data

  • Personal includes name, birthday, address and banking history
  • Ensure you trust people you talk to
  • Maintain privacy and use recommendations

Email

  • Only share people you know and who have been recommended

Chapter 9

Socila Messaging

  • Avoid by not using, and trusting settings and people

Health with computers

  • Sit in correct positions
  • Chairs and footrests can help
  • Correct positions and wristrests can help
  • Exercise and proper keybaords can assist

Chapter 10

Health Problems

  • Eyestriain, headaches and irritations with lighting effects.
  • Electrocutions from cheap equipment, wires or drinking.
  • Fire is always an high risk

Passwords

  • Use numbers and letters (Caps as well)
  • Avoid name brands

Prevention

  • Unauthorized access is needed with firewalls, strong passwords, encryption and software

Cookies

  • Great to store passwords, preferences and tailored options

Chapter 10 - 11

Media Forms

  • Email and Fax transfer data

Evaluating information

  • Setup website and is accurate
  • Sites are designed to sell. Mostly reliable with .gov or .org

Storing Data

  • Easy access, you don't pay for storage and are backed up.
  • Everything is updated and helps collaboration
  • Affected by connection

Internet Security

  • Prevents things and reduces information

File Sharing

  • Blogs, wikis and voip, helps research

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Hardware vs Software
61 questions

Hardware vs Software

CheaperSuccess6627 avatar
CheaperSuccess6627
Hardware y Software
3 questions

Hardware y Software

RapturousHarp avatar
RapturousHarp
Use Quizgecko on...
Browser
Browser