Internet and Data Protection Quiz
46 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main role of an Internet Service Provider (ISP)?

  • To develop software applications
  • To manufacture networking hardware
  • To manage local area networks (LAN)
  • To provide users with access to the internet (correct)
  • A router/modem connects a LAN to the internet.

    True

    Name one disadvantage of having a shared network environment.

    Easier spread of viruses

    After paying the ISP fee, users receive a __________ and password to connect to the internet.

    <p>username</p> Signup and view all the answers

    Match the following advantages and disadvantages of network environments:

    <p>Sharing of resources = Advantage Easier spread of viruses = Disadvantage Communication between users = Advantage Slower access to external networks = Disadvantage</p> Signup and view all the answers

    What is a characteristic of a strong password?

    <p>A random mix of characters, numbers, and symbols</p> Signup and view all the answers

    Weak passwords are difficult for attackers to guess.

    <p>False</p> Signup and view all the answers

    Name one consequence of failing to abide by the Data Protection Act.

    <p>Fines or imprisonment</p> Signup and view all the answers

    A strong password should include a mix of _____, numbers, and keyboard symbols.

    <p>alphabets</p> Signup and view all the answers

    Match the data protection principles with their descriptions:

    <p>Fair and lawful processing = Data must be processed in a fair and lawful manner Stated purpose = Data can only be processed for the specified purpose Adequate and relevant = Data must not be excessive Accuracy = Data must be accurate and kept up to date</p> Signup and view all the answers

    What is one advantage of using RFID readers?

    <p>They can hold a lot of data</p> Signup and view all the answers

    Optical Character Recognition (OCR) can read handwriting with high accuracy.

    <p>False</p> Signup and view all the answers

    What does MICR stand for?

    <p>Magnetic Ink Character Reader</p> Signup and view all the answers

    RFID readers can operate through most __________.

    <p>materials</p> Signup and view all the answers

    Match the following recognition systems with their primary use:

    <p>RFID = Identifying pets and passports MICR = Processing checks OMR = Reading multiple choice examination papers OCR = Converting scanned text to digital format</p> Signup and view all the answers

    Which of the following is a disadvantage of using RFID technology?

    <p>Information can be altered</p> Signup and view all the answers

    Optical Mark Reader (OMR) requires forms to be designed specifically to ensure accuracy.

    <p>True</p> Signup and view all the answers

    What is a key disadvantage of Optical Mark Recognition (OMR)?

    <p>Forms need to be correctly designed and filled out.</p> Signup and view all the answers

    The major use of OCR is in the processing of __________.

    <p>passports and identity cards</p> Signup and view all the answers

    What is a primary advantage of using Optical Mark Reader (OMR)?

    <p>It offers faster input for surveys</p> Signup and view all the answers

    What is a significant disadvantage of CRT monitors?

    <p>Viewing angle is critical, and the image may appear unclear from the side.</p> Signup and view all the answers

    TFT monitors are considered more expensive than CRT monitors.

    <p>True</p> Signup and view all the answers

    What technology do IPS displays utilize?

    <p>In-plane switching</p> Signup and view all the answers

    A __________ monitor is known for being lightweight and having low glare compared to CRT monitors.

    <p>LCD</p> Signup and view all the answers

    Which of the following is NOT a primary use of a CRT monitor?

    <p>High-resolution digital graphics display</p> Signup and view all the answers

    Match the output devices with their characteristics:

    <p>CRT Monitor = Rarer and becoming less popular LCD Monitor = Uses liquid crystal diodes Multimedia Projector = Receives both analogue and digital signals TFT Monitor = Provides better color accuracy</p> Signup and view all the answers

    LCD monitors emit more radiation than CRT monitors.

    <p>False</p> Signup and view all the answers

    What kind of technology is primarily used in modern multimedia projectors?

    <p>Digital inputs</p> Signup and view all the answers

    What is one advantage of using multimedia projectors?

    <p>They project images onto a large screen.</p> Signup and view all the answers

    LED monitors have lower power consumption compared to old LCD monitors.

    <p>True</p> Signup and view all the answers

    What technology did old LCD monitors use for lighting?

    <p>CCFL (cold cathode fluorescent lamp)</p> Signup and view all the answers

    The primary advantage of using a multimedia projector is that it allows _____ to see a presentation.

    <p>many people</p> Signup and view all the answers

    Match the following terms with their descriptions:

    <p>RGB = A color model used to emit light LCD = A type of monitor that uses liquid crystals CCFL = Old technology for backlighting LCD screens LED = A light source used in modern monitors</p> Signup and view all the answers

    Which of the following is a disadvantage of multimedia projectors?

    <p>They have high power consumption.</p> Signup and view all the answers

    Multimedia projectors require multiple networked computers for effective presentations.

    <p>False</p> Signup and view all the answers

    What is the primary use of multimedia projectors in advertising?

    <p>To display presentations at exhibitions and shopping malls.</p> Signup and view all the answers

    What is one of the primary uses of DVD-RAMs?

    <p>Simultaneous recording and playback</p> Signup and view all the answers

    DVD-RAMs can be rewritten more times than DVD-RWs.

    <p>True</p> Signup and view all the answers

    What is one disadvantage of DVD-RAMs compared to DVD-RW?

    <p>More expensive than DVD-RW</p> Signup and view all the answers

    Blu-ray disks have a larger _______ capacity than other optical media.

    <p>storage</p> Signup and view all the answers

    Match the storage devices with their primary advantages:

    <p>DVD-RAM = Long life up to 30 years Flash Drive = Compact and portable media Blu-Ray Disk = Very large storage capacity Solid State Drive = No mechanical parts</p> Signup and view all the answers

    Which technology allows data access speed to be faster compared to other optical media?

    <p>Blu-ray Disks</p> Signup and view all the answers

    Flash Drives are not robust and are difficult to transport.

    <p>False</p> Signup and view all the answers

    What potential issue do Blu-ray disks have regarding data?

    <p>Encryption problems</p> Signup and view all the answers

    DVD-RAMs can read and write data at the same time, which is a significant _______.

    <p>advantage</p> Signup and view all the answers

    What is a common use for Flash Drives?

    <p>Transporting files between computers</p> Signup and view all the answers

    Study Notes

    CIE IGCSE Info & Comm. Tech. 0417

    • Updated to 2017-19 Syllabus
    • Summarized notes on the theory section

    Table of Contents

    • Chapter 1: Types and Components of Computer Systems (page 3)
    • Chapter 2: Input & Output Devices (page 2)
    • Chapter 3: Storage Devices & Media (page 2)
    • Chapter 4: Networks & the Effects of Using them (page 2)
    • Chapter 5: The Effects of Using ICT (page 2)
    • Chapter 6: ICT Applications (page 2)
    • Chapter 7: System Life Cycle (page 2)
    • Chapter 8: Safety & Security (page 2)
    • Chapter 9: Audience (page 2)
    • Chapter 10: Communication (page 2)
    • Chapter 11: File Management (page 3)
    • Chapter 12: Images (page 3)
    • Chapter 13: Layout (page 3)
    • Chapter 14: Styles (page 3)
    • Chapter 15: Proofing (page 3)
    • Chapter 16: Document Production (page 3)
    • Chapter 17: Data Manipulation (page 3)
    • Chapter 18: Data Analysis (page 3)
    • Chapter 19: Website Authoring (page 3)

    1. Types and Components of Computer Systems

    • Hardware: Tangible components (page 4)
      • Internal: Processor, Motherboard, RAM, ROM, Video & Sound Cards, Internal Hard Disk Drives
      • External: Monitor, Keyboard, Mouse, Printer, External Storage Devices
    • Software: Programs controlling computer systems (page 4)
      • Application Software: Programs for specific tasks, e.g., word processing, spreadsheets, databases
      • System Software: Programs to allow hardware to function, e.g., operating system, device drivers, compilers

    1.2 The Main Components of Computer Systems (page 4)

    • CPU: Central processing unit
      • Control Unit: Coordinates input/output devices, executes instructions
      • Arithmetic Logic Unit (ALU): Performs calculations and comparisons
      • Immediate Access Store (IAS): Holds current data and instructions
    • Internal/Main Memory
      • Random Access Memory (RAM): Stores data temporarily, volatile
      • Read Only Memory (ROM): Stores permanent information, non-volatile
      • BIOS: Boot file (basic input/output system)
    • External/Secondary Memory: Backing store devices, store data not currently in use (page 5)

    2. Input & Output Devices

    • Input Devices: Provide data to the computer (page 5)
      • Examples: keyboards, mouse, etc.
    • Output Devices: Display results of processing (page 5)
      • Examples: monitors, printers, etc.

    1.3 Operating Systems (page 5)

    • Enables users to interact with computer systems
    • Controls input, output, and storage operations
    • Handles errors in application programs
    • Maintains security and system logs
    • Two main types of interfaces: Command Line Interface (CLI), Graphical User Interface (GUI)

    1.4 Types of Computers

    • Desktop/Personal Computers: General-purpose computers (page 5)
    • Laptop/Notebook Computers: Portable, single unit computers (page 6)
    • Tablet Computers: Small, hand-held devices (page 6)
    • Smartphones: Modern phones with various capabilities (page 6)

    1.5 Impact of Emerging Technologies

    • Artificial Intelligence (AI): Technology that mimics human intelligence, often used to enhance video games/assist in decision-making (page 6)

    • Impact on Everyday Life: AI can improve various aspects of daily life (page 6)

    • Biometrics: Using body parts to identify an individual (page 7)

    • Vision Enhancement: Systems that enhance low or night vision for users (page 7)

    • Robotics: Programmed machinery for physically demanding tasks, such as bomb disposal, or for hazardous environments

    • Computer Assisted Translation (CAT): Software that assists in translation (page 7)

    • Quantum Cryptography: Advanced encryption technology using physics (page 7)

    • 3D & Holographic Imaging: 3-dimensional image creation (page 7)

    2.1 Input Devices & Their Uses

    • Keyboards:
      • QWERTY layout, ergonomic considerations reduce health issues
    • Numeric Keypads: Entering numbers quickly
    • Mice: Pointing devices, allows fast navigation
    • Touchpads: Pointing devices for laptop users
    • Trackerball: Pointing device, with a ball on top

    2.2 Direct Data Entry & Associated Devices

    • Magnetic Stripe Readers: Read information from magnetic stripes on cards (page 11)
    • Chip & PIN Readers: Read data stored on chips in cards (page 11)

    3. Storage Devices & Media

    • Fixed Hard Drives: Main storage method in computers (page 17)

    • Portable & Removable Hard Drives: Backup and data transfer (page 17)

    • Magnetic Tapes: Used for large files (page 17)

    • CD-ROM/DVD-ROM: Read-only media for storing data (page 18)

    • CD-R/DVD-R: Recordable once (page 18)

    • CD-RW/DVD-RW: Rewritable (page 18)

    • DVD-RAM: Recordable media (page 18)

    4. Networks & The Effects of Using Them

    • Routers: Decide best routes for data transfer between networks (page 20)

    • Hubs: Receive data from one port and send to all others (page 20)

    • Switches: Distribute data more efficiently, using MAC addresses (page 20)

    • Modems: Convert digital data to analogue for transmission over phone lines (page 20)

    • Wi-Fi/Bluetooth: Wireless technologies for connecting devices to networks (page 21)

    5. Effects of IT on Employment

    • Impact on job markets and the need for workforce retraining

    6. ICT Applications

    • Communication: Newsletters, email, video conferencing

    7. System Life Cycle

    • Analysis: Fact finding about current system and identifying problems (page 40)
    • Design: Planning and developing the new system (page 41)
    • Development & Testing: Creating and testing all components, often using test data
    • Implementation: Transitioning from previous methods/systems (page 43)
    • Evaluation: Assessing and making improvements (page 45)

    8. Safety and Security

    • Physical Safety: Procedures for working safely with electronics, equipment, and potentially hazardous materials
    • E-safety: Considerations for safe use of the internet and avoiding cyber threats (page 46)
      • Phishing: Attempting to acquire sensitive data using deceptive methods
      • Hacking: Unauthorized access attempting to corrupt or steal data or money.
      • Email Safety: Risks to personal information found in emails.

    9 Audience Appreciation

    • Audience Needs: Age, gender, and interests directly impact product design (page 51)

    10 Communication

    • Email: Electronic communication method (page 27)

    11 File Management

    • File Extensions: Files are assigned extensions to indicate their type (page 54)

    12 Images

    • Image editing may provide better clarity/usefulness (page 54)

    13 Layout

    • Headers and Footers aid organisation (page 54)

    14 Styles

    • Corporate style or branding used for consistent look &feel (page 54)

    15 Proofing

    • Validation techniques ensure accuracy of data (page 55) and spell checking is appropriate for various circumstances (page 55)

    16 Document Production

    • Ensuring correct formatting of documents (page 55), e.g. avoiding widows & orphans (page 55)

    17 Data Manipulation

    • Database terminology, such as primary and foreign keys, which are linked tables in databases (page 55)

    18 Data Analysis

    • Creation of data models using logical operations and mathematical equations

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on Internet Service Providers, network environments, and data protection principles with this engaging quiz. Explore topics like strong passwords, RFID technology, and Optical Character Recognition. Perfect for students studying computer science or information technology.

    More Like This

    Use Quizgecko on...
    Browser
    Browser