ICT Skills II Overview

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary role of an operating system in a computer?

  • To protect the computer from viruses.
  • To serve as an application for gaming.
  • To monitor internet speed.
  • To provide a user interface and manage hardware resources. (correct)

Which of the following is NOT a function of an operating system?

  • Conducting web searches. (correct)
  • Controlling software resources.
  • Managing memory usage.
  • Checking the status of hardware devices.

Which type of operating system allows multiple users to operate on the same computer simultaneously?

  • Distributed operating system.
  • Single-user, single-task operating system.
  • Multi-user operating system. (correct)
  • Real-time operating system.

What characterizes a single-user, multi-task operating system?

<p>It allows one user to run multiple programs simultaneously. (B)</p> Signup and view all the answers

Which of the following operating systems is designed to respond to input within a specific time frame?

<p>Real-time operating system. (A)</p> Signup and view all the answers

What is an example of a single-user, multi-task operating system?

<p>Windows. (B)</p> Signup and view all the answers

Which component of a computer is considered hardware?

<p>Keyboard. (D)</p> Signup and view all the answers

What is the primary function of software in relation to hardware?

<p>To make hardware functional and usable. (C)</p> Signup and view all the answers

Which operating system is not considered an interactive operating system?

<p>UNIX (B)</p> Signup and view all the answers

What is the primary function of the Recycle Bin in Windows?

<p>To recover deleted files or folders (B)</p> Signup and view all the answers

Which of the following is the first step in creating a new file?

<p>Right-click in the blank area and select New (D)</p> Signup and view all the answers

What does the Taskbar display in Windows?

<p>The Start button and Date/Time (B)</p> Signup and view all the answers

How can a folder be renamed in Windows?

<p>Right-click and select Rename or press F2 (B)</p> Signup and view all the answers

Which statement correctly describes folders and directories?

<p>They can contain multiple files and subfolders. (B)</p> Signup and view all the answers

What is the initial action needed to create a new folder?

<p>Double-click the Computer icon (D)</p> Signup and view all the answers

Which of the following operating systems is an example of a distributed operating system?

<p>UNIX (A)</p> Signup and view all the answers

What is the first step to rename a file or folder?

<p>Right-click the file or folder and select Rename. (C)</p> Signup and view all the answers

Which keyboard shortcut is used to redo an action?

<p>CTRL + y (A)</p> Signup and view all the answers

What is a recommended practice for maintaining a computer system?

<p>Install updates and security regularly. (B)</p> Signup and view all the answers

What should you always do before cleaning a computer system?

<p>Power off the computer system. (C)</p> Signup and view all the answers

How should cleaning fluid be applied when cleaning computer components?

<p>Soak a cloth with cleaning liquid and wipe the component. (D)</p> Signup and view all the answers

Which of the following is NOT considered a part of routine system maintenance?

<p>Using the computer continuously without breaks (C)</p> Signup and view all the answers

What is advised to keep the keyboard clean?

<p>Using compressed air to blow out dust. (C)</p> Signup and view all the answers

Which type of cloth is recommended for cleaning the computer monitor?

<p>A soft lint-free cloth. (B)</p> Signup and view all the answers

What is the primary purpose of backing up data?

<p>To prevent data loss in case of computer failure (A)</p> Signup and view all the answers

Which of the following is NOT a recommended yearly maintenance task?

<p>Install new software randomly (C)</p> Signup and view all the answers

What type of threat is identified as theft of personal information by a hacker?

<p>Identity Theft (C)</p> Signup and view all the answers

Which virus is known for replicating itself and spreading to all files once it infects a computer?

<p>Worm (D)</p> Signup and view all the answers

What is the recommended action for emails categorized as SPAM?

<p>Delete them immediately without responding (D)</p> Signup and view all the answers

What major benefit does installing anti-virus software provide?

<p>It cleans viruses and prevents future infections (A)</p> Signup and view all the answers

Which of the following is a consequence of not cleaning unnecessary files from your computer regularly?

<p>Reduced computer performance (B)</p> Signup and view all the answers

Which of these is an example of software piracy?

<p>Using a paid software without a license (C)</p> Signup and view all the answers

What is a Trojan Horse in the context of computer security?

<p>A useful software that secretly damages data. (B)</p> Signup and view all the answers

Which of the following best describes an online predator?

<p>A person who builds trusting online relationships for malicious intent. (A)</p> Signup and view all the answers

What is an effective method to ensure password security?

<p>Use a combination of uppercase, lowercase, numbers, and special characters. (A)</p> Signup and view all the answers

What is the recommended method for cleaning the lens of a digital camera?

<p>Use a soft lens brush or a soft, dry cloth. (C)</p> Signup and view all the answers

What is the purpose of installing Antivirus software?

<p>To detect and clean viruses from the computer. (A)</p> Signup and view all the answers

How can data be protected to prevent unauthorized access?

<p>Through data encryption methods. (D)</p> Signup and view all the answers

Which of the following is a method to prevent dirt from affecting a CD or DVD?

<p>Store it in a proper case when not in use. (B)</p> Signup and view all the answers

What should you do to maintain the keyboard's functionality?

<p>Keep it upside-down to allow dust to fall out periodically. (C)</p> Signup and view all the answers

What indicates that a website is secure for entering sensitive information?

<p>The site address starts with https:// and has a lock symbol. (B)</p> Signup and view all the answers

Which of the following actions is NOT recommended for maintaining a computer?

<p>Shutting down the computer improperly. (B)</p> Signup and view all the answers

Which of the following is NOT a characteristic of an Internet scam?

<p>Involves selling legitimate products. (A)</p> Signup and view all the answers

What feature does Bitlocker provide for data protection?

<p>Encrypts the entire hard drive. (C)</p> Signup and view all the answers

What is a common method viruses use to infect computers?

<p>Through infected email attachments. (D)</p> Signup and view all the answers

Which statement about computer viruses is true?

<p>Viruses can modify program behaviors on a computer. (A)</p> Signup and view all the answers

How should data backups be managed according to regular maintenance?

<p>Verify their integrity by restoring or checking periodically. (D)</p> Signup and view all the answers

What is an important step to protect a computer against viruses?

<p>Regularly running anti-virus software and updating it. (B)</p> Signup and view all the answers

Flashcards

Computer Hardware

The physical components of a computer that can be seen and touched, such as the keyboard, monitor, and CPU.

Operating System

The software used to control and manage the hardware and resources of a computer system.

Single-user, single-task operating system

An operating system that allows one user to work on one task at a time.

Single-user, multi-task operating system

An operating system that allows one user to run multiple programs simultaneously.

Signup and view all the flashcards

Multi-user operating system

An operating system that allows multiple users to work on the same computer at different times or simultaneously.

Signup and view all the flashcards

Real-time operating system

A type of operating system that responds to input within a specific time limit, ensuring operations are completed in the same amount of time consistently.

Signup and view all the flashcards

Distributed operating system

An operating system that runs across multiple interconnected computers.

Signup and view all the flashcards

Computer Software

The intangible instructions that tell the hardware what to do. Examples include Windows, macOS, and Linux.

Signup and view all the flashcards

Renaming files or folders

The process of giving a file or folder a new name.

Signup and view all the flashcards

Deleting files or folders

A method to remove files or folders from a computer.

Signup and view all the flashcards

Basic keyboard shortcuts

A set of keyboard shortcuts that streamline common tasks.

Signup and view all the flashcards

Computer system maintenance

The process of keeping the computer system clean and functional to prevent problems.

Signup and view all the flashcards

Keeping the computer dust free

Dust accumulation can harm computer components, so keeping them clean is crucial.

Signup and view all the flashcards

Avoiding food and drinks while using the computer

Spills can damage delicate computer components, making it crucial to avoid eating or drinking near the computer.

Signup and view all the flashcards

Keeping the keyboard clean

Cleaning the keyboard should be done with clean hands to prevent dust and debris from getting trapped.

Signup and view all the flashcards

Handling CDs and DVDs carefully

Handling CDs and DVDs with care prevents scratches and damage, ensuring they function properly.

Signup and view all the flashcards

Taskbar

A component of Windows used to manage tasks, programs, and system information. It displays icons for open programs, the Start button, and the clock.

Signup and view all the flashcards

Start Button

The primary access point to the operating system. Clicking it opens a menu that provides access to various programs and settings.

Signup and view all the flashcards

Recycle Bin

A temporary storage location for deleted files and folders in Windows. It allows you to restore accidentally deleted items.

Signup and view all the flashcards

File

A collection of data stored and managed by a computer system.

Signup and view all the flashcards

File System

A structured method used by operating systems to organize, store, and retrieve files on a computer.

Signup and view all the flashcards

Folder

A method for arranging files into groups or categories. Each directory can contain subfolders and files.

Signup and view all the flashcards

GUI

A type of user interface that uses graphical elements like icons, menus, and windows to interact with the computer.

Signup and view all the flashcards

Creating Folder

The process of creating a new folder on your computer, typically used to organize files.

Signup and view all the flashcards

What is a Trojan Horse?

A malicious program disguised as legitimate software that causes harm once installed.

Signup and view all the flashcards

Who are online predators?

People who use online communication to deceive and exploit others, typically for sexual or financial gain.

Signup and view all the flashcards

Explain internet scams.

Deceptive schemes designed to trick individuals into giving up personal or financial information.

Signup and view all the flashcards

How do passwords protect your computer?

A strong and unique combination of characters that helps protect your computer from unauthorized access.

Signup and view all the flashcards

What are anti-viruses and firewalls?

Software programs and tools that monitor incoming and outgoing data to detect and prevent viruses or intrusions.

Signup and view all the flashcards

What is data encryption?

The process of converting data into an unreadable format, requiring a password or key to unlock it.

Signup and view all the flashcards

What are secure websites?

Websites that utilize security protocols like 'https' and a lock symbol to indicate a secure connection for sharing sensitive information.

Signup and view all the flashcards

How to make a strong password?

A combination of capital letters, lowercase letters, numbers, and special characters to create a strong password.

Signup and view all the flashcards

What are worms?

These viruses easily replicate and spread to all files, making them difficult to remove.

Signup and view all the flashcards

Why is data backup important?

Data backup involves saving your computer's information on another device, like CDs or DVDs, to recover data if the computer malfunctions.

Signup and view all the flashcards

How do you protect your computer from viruses?

The process of installing anti-virus software prevents viruses from entering your computer and cleans any existing viruses before they damage your data.

Signup and view all the flashcards

How do you improve computer performance?

Removing unnecessary files, such as temporary files and images, can help speed up your computer's performance and free up hard disk space.

Signup and view all the flashcards

What is SPAM?

SPAM is unwanted advertising email that you should never respond to and should delete regularly.

Signup and view all the flashcards

What are the types of computer theft?

Physical theft involves stealing your computer hardware. Identity theft involves stealing personal information to gain access to accounts or commit illegal activities. Software piracy involves stealing and distributing unlicensed software copies.

Signup and view all the flashcards

What are threats to a computer?

Threats are activities that can leak your personal information from your computer without your knowledge.

Signup and view all the flashcards

What is a Trojan Horse virus?

Trojan horses are viruses that disguise themselves as harmless programs to gain access to your computer and then cause damage.

Signup and view all the flashcards

What is a computer virus?

A computer virus is a harmful program that can infect other programs and modify their behavior. It may or may not cause damage, but some viruses can delete data or corrupt computer programs.

Signup and view all the flashcards

How can a computer get infected with a virus?

A computer virus can enter your system through infected files, pen drives, CD-ROMs/DVD-ROMs, or email attachments. Some examples include: downloading a file from a suspicious website, plugging in an infected USB drive, or opening a malicious email attachment.

Signup and view all the flashcards

What can't a virus infect?

A computer virus cannot infect files stored on CDs or DVDs if they are closed for writing. It also cannot directly infect hardware like keyboards, mice, or monitors.

Signup and view all the flashcards

What are some general computer maintenance tips?

Regularly cleaning your computer components, like the keyboard, mouse, and monitor, can help prevent dust buildup and ensure proper functionality. Replace any malfunctioning hardware to maintain optimal performance.

Signup and view all the flashcards

Why is it important to keep food and drinks away from your computer?

Keeping food and drinks away from your computer is essential to avoid spills and potential damage to delicate computer components.

Signup and view all the flashcards

How do you clean an optical mouse?

Use a clean, lint-free cloth to wipe the bottom of your optical mouse. Use air or a cotton swab to clean the lens area.

Signup and view all the flashcards

How do you clean a digital camera lens?

Never touch the camera lens directly. Use a soft lens brush or a dry cloth to remove dust. For stubborn dust, use a special lens cleaning solution applied to a tissue before wiping the lens. Never spray fluid directly on the lens.

Signup and view all the flashcards

What is an important step for protecting your computer's data?

To protect your data, regularly back up your computer's files to an external hard drive. Periodically test your backups by restoring or checking the data to ensure everything is working properly.

Signup and view all the flashcards

Study Notes

ICT Skills II Revision Notes

  • ICT skills are crucial for communication, business, and personal connections. Acquiring these skills keeps individuals updated with the latest software and applications.

Computer Hardware and Software

  • A computer system has two main components:
    • Hardware: Physical parts like keyboards, monitors, and CPUs.
    • Software: Non-physical components that direct hardware operations, such as Windows and MS Office.

Operating System

  • An operating system is an interface between the user and computer, controlling program execution and hardware operations.
  • Operating systems manage:
    • Hardware supervision and status monitoring
    • Device and software resource management
    • Memory allocation (free and used)
    • File and directory organization
    • Disk space management

Types of Operating Systems

  • Single-user, single-task: Allows one user to perform one task at a time.
  • Single-user, multitasking: Allows one user to run multiple programs simultaneously. Examples include Windows and MacOS.
  • Multi-user: Enables multiple users to access and work on the same computer concurrently.
  • Real-time: Responds to tasks within specific time constraints.
  • Distributed: Runs on networked computers, seeming as a single integrated system. Windows, UNIX, and LINUX are examples.
  • Interactive (GUI-based): A user-friendly OS with graphical interfaces like Windows using mouse clicks, double clicks and right clicks.
  • Taskbar: The horizontal bar at the bottom of the screen, featuring Start button and access to open programs/files.
  • Start button: Accesses the Start menu for program and feature access.
  • Recycle Bin: A storage area for deleted files and folders that can be restored.

Creating and Managing Files and Folders

  • Files: Individual data units on a computer.
  • Folders/Directories: Organized groups of files for easy access.

Basic Shortcuts

  • Common keyboard shortcuts are included for various operations (e.g., Ctrl+Z for undo, Ctrl+S for save).

Applying Basic Skills for Care and Maintenance of Computer

  • Proper care and routine maintenance are essential to prolong a computer's lifespan.
  • It is important to dust the computer frequently, to prevent spillage of liquids and to handle CDs and DVDs carefully.
  • Users should shut down the computer properly and use preventive maintenance procedures to maintain computer components.

Protecting Computer Against Viruses

  • Viruses are malicious programs that can damage software, delete data, or steal information.
  • Virus infection can occur through infected files, storage devices, or email attachments.
  • Symptoms may include decreased performance, unusual errors, or unexpected program behavior.

Scanning and Cleaning Viruses and Removing SPAM files

  • Install and update antivirus software
  • Regularly scan files downloaded from the Internet
  • Avoid opening suspicious emails or attachments

Removing Temporary Files

  • Temporary files can accumulate and consume disk space.
  • Users can use built-in features to automatically or manually remove them.

Firewall

  • A firewall is a security system to protect computer networks from unauthorized access.
  • Firewalls are essential for computers connected to networks.

Basic Tips for Taking Care of Devices

  • Keyboard, screen, and devices cleanliness are important
  • Avoid overcharging batteries
  • Handling devices with care and caution
  • Use appropriate procedures and tools for cleaning

Prepare a Maintenance Schedule

  • Daily, weekly, and monthly maintenance tasks (including checking and cleaning, backing up data, scanning for viruses) are necessary
  • Regular backups are essential

Threats to Computer

  • Threats include physical theft, identity theft (online scams), and software piracy.

Protecting Your Data

  • Create strong passwords
  • Install antivirus and firewall
  • Encrypt sensitive data
  • Be wary of suspicious links or websites

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser