Year 9 Computing Mid-Term: Hardware & Software Basics
48 Questions
0 Views

Year 9 Computing Mid-Term: Hardware & Software Basics

Created by
@EngrossingSard9785

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a characteristic of desktop computers?

  • Lightweight and touchscreen-based
  • Highly portable with moderate performance
  • High performance but less portable (correct)
  • Primarily used for media consumption
  • Which type of computer is specifically designed for complex calculations and simulations?

  • Laptop
  • Supercomputer (correct)
  • Server
  • Tablet
  • What type of user interface primarily involves interaction through icons and menus?

  • Command Line Interface (CLI)
  • Voice User Interface (VUI)
  • Text-Based Input Interface
  • Graphical User Interface (GUI) (correct)
  • What is a primary use case for laptops?

    <p>Education and business trips</p> Signup and view all the answers

    Which of the following is NOT a characteristic of tablets?

    <p>High performance for complex tasks</p> Signup and view all the answers

    What role do servers play in a network?

    <p>Manage network resources and services</p> Signup and view all the answers

    Which operating system is an example of a popular CLI?

    <p>Linux</p> Signup and view all the answers

    Which type of user interface allows interaction using spoken commands?

    <p>Voice User Interface (VUI)</p> Signup and view all the answers

    What is a defining characteristic of strong passwords?

    <p>At least 10 characters long</p> Signup and view all the answers

    Which of the following is a risk associated with password reuse?

    <p>Compromised passwords can lead to multiple account breaches.</p> Signup and view all the answers

    What is the purpose of a password manager?

    <p>To store and manage unique passwords securely.</p> Signup and view all the answers

    Which tactic is commonly associated with social engineering?

    <p>Phishing emails</p> Signup and view all the answers

    What form of phishing targets specific individuals using personalized details?

    <p>Spear phishing</p> Signup and view all the answers

    What is a potential risk of using public Wi-Fi networks?

    <p>Exposure to data interception</p> Signup and view all the answers

    What is one way a VPN protects user data?

    <p>By encrypting data between devices</p> Signup and view all the answers

    Which technology provides extremely fast speeds and low latency but struggles with obstacles?

    <p>5G mmWave</p> Signup and view all the answers

    Which of the following is NOT a type of phishing?

    <p>Interspecting</p> Signup and view all the answers

    Which technology is specifically designed for precise location tracking and fast data transfer?

    <p>UWB</p> Signup and view all the answers

    What is a primary function of a router in a networking environment?

    <p>To connect different networks and provide internet access</p> Signup and view all the answers

    Which of the following statements about 4G technology is true?

    <p>It is used for mobile browsing, streaming, and app usage.</p> Signup and view all the answers

    Which device connects devices in a network by directing data only to the intended recipient?

    <p>Switch</p> Signup and view all the answers

    What advantage does 5G Sub-6 GHz technology have over standard 4G technology?

    <p>Wider coverage with similar speeds</p> Signup and view all the answers

    What is the main feature of NFC technology?

    <p>Secure data exchange through contactless payments</p> Signup and view all the answers

    What role does a NIC play in a networking setup?

    <p>To enable a device to connect to a network</p> Signup and view all the answers

    What is the primary function of a bridge in networking?

    <p>To connect two separate networks as a single network</p> Signup and view all the answers

    Which statement about switches is correct?

    <p>They direct data only to the intended recipient device.</p> Signup and view all the answers

    What distinguishes a Network Interface Card (NIC) from other network devices?

    <p>It provides a unique MAC address for identification.</p> Signup and view all the answers

    Which wireless technology is best suited for transferring small amounts of data over a short range?

    <p>Bluetooth</p> Signup and view all the answers

    Which technology is primarily used for secure data exchange at very short ranges?

    <p>NFC</p> Signup and view all the answers

    What is a disadvantage of using a hub in a network?

    <p>It broadcasts data to all devices, regardless of the recipient.</p> Signup and view all the answers

    In what context is RFID technology commonly used?

    <p>For tracking inventory and toll payments</p> Signup and view all the answers

    Which of the following statements is true about Wi-Fi technology?

    <p>It offers longer range connectivity than Bluetooth.</p> Signup and view all the answers

    What is the main purpose of using multi-factor authentication (MFA)?

    <p>To add an extra layer of security</p> Signup and view all the answers

    Which technique involves pretending to be someone else to gain trust?

    <p>Impersonation</p> Signup and view all the answers

    What precaution can you take to ensure that your data is encrypted while browsing?

    <p>Look for 'HTTPS' in website URLs</p> Signup and view all the answers

    How can one protect themselves when using public Wi-Fi?

    <p>Use a Virtual Private Network (VPN)</p> Signup and view all the answers

    Which of the following is NOT a recommended practice for protecting personal data online?

    <p>Using easily memorable passwords</p> Signup and view all the answers

    What is the purpose of phishing in social engineering?

    <p>To steal sensitive data using fake communication</p> Signup and view all the answers

    What should you be cautious of when dealing with unknown emails or messages?

    <p>They can be phishing scams attempting to steal your information</p> Signup and view all the answers

    Why should passwords be long and complex?

    <p>To reduce the chance of being guessed by attackers</p> Signup and view all the answers

    What is the primary purpose of antivirus software?

    <p>To protect against viruses and malware</p> Signup and view all the answers

    Why is it important to limit the personal information you share online?

    <p>To reduce the potential for identity theft or privacy invasion</p> Signup and view all the answers

    What is a primary function of a password manager?

    <p>To create and manage strong passwords</p> Signup and view all the answers

    What does the tag signify in an HTML document?

    <p>The document is using the latest version of HTML</p> Signup and view all the answers

    Which section of an HTML document contains metadata like the title?

    <p>Head</p> Signup and view all the answers

    Which HTML tag is used to create the largest heading on a webpage?

    <h1> Signup and view all the answers

    What is the purpose of the

      tag in HTML?

    <p>To create an unordered list</p> Signup and view all the answers

    When should you use the

      tag instead of the
        tag?

    <p>When creating a list with numbers in a specific order</p> Signup and view all the answers

    Study Notes

    Year 9 Computing Mid-Term Revision: Hardware and Software Basics

    • Internal Hardware: Components inside a computer, including the CPU, GPU, RAM, ROM, and motherboard.
    • CPU (Central Processing Unit): The main processor handling calculations, logic, and controlling most computer tasks.
    • GPU (Graphics Processing Unit): A specialized processor for rendering images, videos, and animations.
    • External Hardware: Components connected to the computer, such as keyboard, mouse, printer, speakers, microphone, headphones, and monitor.

    Hardware Examples

    • Internal: CPU, RAM, HDD (Hard Disk Drive), ROM, GPU, Motherboard
    • External: Mouse, Printer, Monitor, Keyboard, Microphone, Speakers, Headphones

    Software

    • System Software: Manages hardware and provides a platform for application software. Examples include operating systems (Windows, macOS), device drivers, utilities (compilers, backup, compression).
    • Application Software: Designed for end-users to perform specific tasks. Examples include word processors, web browsers, spreadsheets, presentation software, image editing software, video editing software, and database management software.

    Types of Computers

    • Desktop Computers: High performance, less portable.
    • Laptops: Portable, moderate power.
    • Tablets: Lightweight, touchscreen, primarily for media consumption and light tasks
    • Supercomputers: High computing power, very expensive, used for complex calculations, simulations, data processing
    • Servers: Manage network resources, provide services to other computers.

    Operating Systems (OS)

    • OS (Operating System): Provides an interface between hardware and users, managing applications and resources. Examples include Windows, macOS, and Linux.

    User Interfaces (UI)

    • GUI (Graphical User Interface): Interaction through icons, buttons, and menus (e.g., Windows, macOS, iOS).
    • CLI (Command Line Interface): Text-based interface, used by experts (e.g., Linux).
    • VUI (Voice User Interface): Users interact using spoken commands (e.g., Amazon Alexa, Siri).
    • Gesture-Based Interface: Interaction using physical gestures (e.g., gaming consoles).

    Networking Concepts

    • IP Address: Unique number identifying a device on a network (e.g., 192.168.1.1).
    • Domain Name: Human-friendly name for websites (e.g., google.com).
    • DNS (Domain Name System): Translates domain names to IP addresses.
    • LAN (Local Area Network): Covers small areas (e.g., home, office). Connects devices close together, high-speed data transfer.
    • WAN (Wide Area Network): Covers large geographical areas, connecting multiple LANs (e.g., internet).
    • WLAN (Wireless Local Area Network): Uses wireless technology (e.g., Wi-Fi).

    Network Devices

    • Router: Connects networks (e.g., home network to internet), directs data packets, often provides Wi-Fi.
    • Modem: Converts digital data to a format suitable for transmission over connections (e.g., telephone lines, cable), often works alongside a router for internet access.

    Other Technologies

    • Bridge: Connects two separate networks into a single network.
    • Hub: Basic network device, broadcasts data to all connected devices, less intelligent than switches.
    • Switch: Connects multiple devices in a LAN, directs data only to the intended recipient.
    • NIC (Network Interface Card): Hardware component that allows devices to connect to a network.
    • Bluetooth: Short-range wireless technology for connecting devices (e.g., headphones, keyboards, phones).
    • Wi-Fi: Wireless networking technology used to connect devices to the internet.
    • RFID (Radio Frequency Identification): Uses radio waves to identify and track tags on objects, typically used in inventory, security, toll payments.
    • NFC (Near-Field Communication): Short-range type of RFID that works for secure data exchange.
    • UWB (Ultra-Wideband): Precise location tracking and high-speed data transfer over short distances.
    • 4G: Fourth-generation mobile network technology, higher internet speeds on mobile devices.
    • 5G: Fifth-generation mobile network technology, very fast speeds and low latency.

    Cybersecurity

    • Weak Passwords: Simple, easily guessed.
    • Strong Passwords: Complex, including uppercase and lowercase letters, numbers, and symbols.
    • Password Reuse Risk: If one site is breached, attackers can access multiple accounts.
    • Password Managers: Securely store, manage, and generate strong passwords.
    • Social Engineering: Psychological manipulation to trick into divulging confidential information.
    • Phishing: A form of social engineering using impersonation of trusted entities to steal data (e.g., email, voice, text messages).
    • Protection Measures: Use strong passwords, enable MFA, watch HTTPS, avoid public Wi-Fi, use VPN, keep software updated, and be cautious of clicking unknown links.

    HyperText Markup Language (HTML)

    • Tags: Elements used to create content (e.g., heading, paragraph, image).
    • HTML Structure: <!DOCTYPE html>, <html>, <head>; <title>, <body>
    • Elements: <h1> (largest heading), <p> (paragraph), <ul> (unordered list), <ol> (ordered list), <li> (list item), <img> (image).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Revise key concepts of hardware and software in this Year 9 Computing mid-term quiz. Study essential components like CPU, GPU, and the differences between system and application software. Test your understanding of internal and external hardware components.

    More Like This

    Information Systems and Software Quiz
    10 questions
    Introduction to Software Types
    6 questions
    Computer Components Overview
    10 questions
    Computer Basics Quiz
    10 questions

    Computer Basics Quiz

    VirtuousConnotation1499 avatar
    VirtuousConnotation1499
    Use Quizgecko on...
    Browser
    Browser