Year 9 Computing: Hardware and Software Basics
48 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of the Central Processing Unit (CPU)?

  • Store data permanently
  • Handle rendering images and videos
  • Perform calculations and control tasks (correct)
  • Provide audio output
  • Which of the following is an example of internal hardware?

  • Mouse
  • Monitor
  • Printer
  • RAM (correct)
  • Which type of software helps manage hardware resources?

  • Compression Software
  • Application Software
  • System Software (correct)
  • Utility Software
  • Which computer type is most suitable for gaming and office work due to its high performance?

    <p>Desktops</p> Signup and view all the answers

    What is the primary use case for tablets?

    <p>Media consumption</p> Signup and view all the answers

    Which of the following is NOT considered external hardware?

    <p>Motherboard</p> Signup and view all the answers

    Which of the following statements accurately describes supercomputers?

    <p>They perform complex calculations and are very expensive.</p> Signup and view all the answers

    Which type of software would you use to create a document?

    <p>Word Processor</p> Signup and view all the answers

    What type of operating system provides an interface between hardware and users?

    <p>Operating System</p> Signup and view all the answers

    What is the main role of a Graphics Processing Unit (GPU)?

    <p>Handle rendering images, videos, and animations</p> Signup and view all the answers

    Which user interface type utilizes spoken commands for interaction?

    <p>Voice User Interface</p> Signup and view all the answers

    Which of the following best describes application software?

    <p>Software designed for end-users to perform specific tasks</p> Signup and view all the answers

    What is a significant characteristic of laptops compared to desktops?

    <p>Built-in screens and batteries</p> Signup and view all the answers

    Which device is classified as external hardware?

    <p>Monitor</p> Signup and view all the answers

    Which computer type primarily functions to host websites and manage data?

    <p>Servers</p> Signup and view all the answers

    What distinguishes a Command Line Interface (CLI) from a Graphical User Interface (GUI)?

    <p>CLI requires text input for commands, while GUI uses a visual interface.</p> Signup and view all the answers

    What is a primary drawback of 5G mmWave technology?

    <p>Shorter range and limited penetration</p> Signup and view all the answers

    Which combination is characteristic of a strong password?

    <p>At least 10 characters, including a mix of letters, numbers, and symbols</p> Signup and view all the answers

    What is a significant risk associated with password reuse?

    <p>If one site is breached, multiple accounts can be accessed</p> Signup and view all the answers

    Which tactic is associated with social engineering?

    <p>Psychological manipulation</p> Signup and view all the answers

    What defines phishing in the context of cybersecurity?

    <p>Impersonating trusted entities to steal data</p> Signup and view all the answers

    What is vishing in the context of phishing attacks?

    <p>Phone calls used to trick individuals into revealing information</p> Signup and view all the answers

    What is one recommended practice for using public Wi-Fi securely?

    <p>Avoid sensitive transactions</p> Signup and view all the answers

    How does a VPN protect users online?

    <p>By encrypting data and hiding online activity</p> Signup and view all the answers

    What is the main purpose of impersonation in social engineering tactics?

    <p>To pretend to be someone else to gain trust</p> Signup and view all the answers

    Which of the following is NOT a benefit of enabling Multi-Factor Authentication (MFA)?

    <p>Easier login process</p> Signup and view all the answers

    How can you ensure that your web browsing is secure?

    <p>By ensuring websites begin with 'https://'</p> Signup and view all the answers

    What is a risk associated with using public Wi-Fi?

    <p>They may expose personal information to attackers</p> Signup and view all the answers

    Which of the following practices can help protect your personal data from phishing attacks?

    <p>Keep your software updated</p> Signup and view all the answers

    What should you do before clicking on an unknown email link?

    <p>Verify the sender's authenticity</p> Signup and view all the answers

    What is one characteristic of pretexting in social engineering?

    <p>Creating a fabricated scenario to extract information</p> Signup and view all the answers

    What is the primary function of a bridge in networking?

    <p>Combines two separate networks into one</p> Signup and view all the answers

    Which is a key recommended practice when using public Wi-Fi?

    <p>Use a Virtual Private Network (VPN)</p> Signup and view all the answers

    Which device is described as less intelligent than a switch?

    <p>Hub</p> Signup and view all the answers

    What distinguishes a switch from a hub in a network?

    <p>Switch only directs data to the intended recipient</p> Signup and view all the answers

    Which of the following technologies is used primarily for personal area networks (PANs)?

    <p>Bluetooth</p> Signup and view all the answers

    What is the main advantage of Wi-Fi over Bluetooth?

    <p>Longer range for network connections</p> Signup and view all the answers

    What does a NIC (Network Interface Card) provide to a device for network identification?

    <p>Unique MAC address</p> Signup and view all the answers

    RFID technology is primarily utilized for what purpose?

    <p>Identifying and tracking objects</p> Signup and view all the answers

    Which technology works at very short ranges, usually just a few centimeters?

    <p>NFC</p> Signup and view all the answers

    What is the key characteristic of UWB technology?

    <p>Precise location tracking and fast data transfer over short distances.</p> Signup and view all the answers

    Which of the following best describes the primary function of a modem?

    <p>Converts digital data for transmission over various networks.</p> Signup and view all the answers

    How does 5G mmWave technology compare to 5G Sub-6 GHz?

    <p>It offers faster speeds but struggles with physical obstacles.</p> Signup and view all the answers

    What is the main function of a bridge in networking?

    <p>It connects two separate networks to act as one.</p> Signup and view all the answers

    Which networking device is responsible for directing data only to intended recipients?

    <p>Switch</p> Signup and view all the answers

    What is a key usage of Bluetooth technology?

    <p>Connecting devices for short-range wireless communication.</p> Signup and view all the answers

    Which of these technologies is most commonly used for indoor location tracking?

    <p>UWB</p> Signup and view all the answers

    What is an advantage of 5G technology over 4G?

    <p>Faster speeds and lower latency.</p> Signup and view all the answers

    Study Notes

    Year 9 Computing Mid-Term Revision: Hardware and Software Basics

    • Internal Hardware: Components inside a computer, including the CPU (Central Processing Unit), GPU (Graphics Processing Unit), RAM (Random Access Memory), and motherboard, ROM (Read Only Memory).
    • CPU: The main processor handling calculations, logic, and controlling most computer tasks.
    • GPU: A specialized processor for handling image, video, and animation display.
    • External Hardware: Devices connected to a computer, such as the keyboard, mouse, printer, monitor, speakers, microphone, and headphones.
    • Software: Programs that manage hardware and enable application-specific tasks.
    • System Software: Manages hardware, provides a platform for application software, including operating systems (Windows, macOS) and utility tools (compilers, backup tools).
    • Application Software: Programs designed for users to perform specific tasks like word processors, web browsers, image editing programs, video editing software, and databases.

    Year 9 Computing Mid-Term Revision: Types of Computers

    • Desktop Computers: Traditional PCs, often used for work and gaming, with high performance but limited portability.
    • Laptops: Portable computers with built-in screens, keyboards, and batteries.
    • Tablets: Lightweight touchscreen devices primarily for media consumption and basic computing.
    • Supercomputers: High-powered machines for complex calculations, simulations, and data processing.
    • Servers: Dedicated computers providing services to other computers on a network.

    Year 9 Computing Mid-Term Revision: Operating Systems (OS)

    • OS: An interface between hardware and user applications, managing resources. Examples: Windows, macOS, Linux.

    Year 9 Computing Mid-Term Revision: User Interfaces (UI)

    • GUI (Graphical User Interface): Interaction through icons, buttons, and menus (e.g., Windows, macOS, iOS).
    • CLI (Command Line Interface): Text-based interface using commands (e.g., Linux Terminal).
    • VUI (Voice User Interface): Interaction using spoken commands (e.g., Amazon Alexa, Siri).
    • Gesture-Based Interface: Interaction with physical gestures (e.g., gaming consoles).

    Year 9 Computing Mid-Term Revision: Networking and Telecommunications

    • IP Address: A unique number identifying a device on a network (e.g., 192.168.1.1).
    • Domain Name: A human-readable name for websites (e.g., google.com).
    • DNS (Domain Name System): Translates domain names to IP addresses.
    • LAN (Local Area Network): A small network like a home or office.
    • WAN (Wide Area Network): A large network connecting multiple LANs, like the internet.
    • WLAN (Wireless Local Area Network): Wireless LAN using technologies like Wi-Fi.
    • Network Devices: Routers connect networks, modems convert digital to analog signals, and switches direct data to specific devices.

    Year 9 Computing Mid-Term Revision: Telecommunications and Wireless Technologies

    • Bluetooth: Short-range wireless technology for connecting devices like headphones, keyboards, and phones.
    • Wi-Fi: Wireless technology for connecting devices to the internet or LAN.
    • RFID (Radio-Frequency Identification): Using radio waves to identify and track objects.
    • NFC (Near Field Communication): Short-range RFID for secure data exchange.
    • UWB (Ultra-Wideband): Wireless communication for precise location tracking and data transfers.

    Year 9 Computing Mid-Term Revision: Cybersecurity

    • Passwords: Strong passwords combining upper/lower case letters, numbers, and symbols. Reuse of passwords is a security risk.
    • Password Managers: Securely store, manage and generate unique passwords for each service.
    • Social Engineering: Psychological manipulation to gain confidential information.
    • Phishing: A form of social engineering where attackers impersonate legitimate entities to steal data.
    • Public Wi-Fi: Can be unsafe due to data interception vulnerability.

    Year 9 Computing Mid-Term Revision: Additional Concepts

    • Hardware and Software: Relationship between physical components and software programs.
    • Operating Systems: Fundamental software managing resources and facilitating interaction between hardware and user applications.
    • Cybersecurity: Importance of data protection, data breaches, and relevant countermeasures.

    Year 9 Computing Mid-Term Revision: Web Development (HTML)

    • HTML (HyperText Markup Language)
    • Tags: HTML elements (e.g., <html>, <head>, <body>, <h1>, <p>, <ul>, <ol>, <li>, <img>)
    • Importance of structure

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers the fundamental concepts of internal and external hardware, as well as system and application software. Learn about key components such as the CPU, GPU, RAM, and their roles in computer systems. Prepare for your mid-term revision with essential knowledge on how hardware and software interact.

    More Like This

    Computer System Basics Quiz
    10 questions
    Basic Components of Computer Quiz
    9 questions
    Use Quizgecko on...
    Browser
    Browser