Year 9 Computing Mid-Term Revision
48 Questions
0 Views

Year 9 Computing Mid-Term Revision

Created by
@ResplendentMars1480

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of computer is known for high performance but limited portability?

  • Desktop (correct)
  • Server
  • Tablet
  • Laptop
  • Which of the following computers is primarily designed for complex calculations and simulations?

  • Tablet
  • Supercomputer (correct)
  • Desktop
  • Laptop
  • Which operating system is NOT mentioned as an example in the content?

  • Windows
  • macOS
  • Linux
  • Android (correct)
  • What is the primary function of the Central Processing Unit (CPU)?

    <p>Perform calculations and control tasks</p> Signup and view all the answers

    What is a common use case for tablets?

    <p>Media consumption</p> Signup and view all the answers

    What type of user interface requires users to input commands in text form?

    <p>Command Line Interface</p> Signup and view all the answers

    Which of the following is considered an example of external hardware?

    <p>Printer</p> Signup and view all the answers

    Which of the following features distinguishes a laptop from a desktop computer?

    <p>Built-in screen and keyboard</p> Signup and view all the answers

    What category of software includes programs like Word Processors and Spreadsheets?

    <p>Application Software</p> Signup and view all the answers

    Which component is not categorized as internal hardware?

    <p>Keyboard</p> Signup and view all the answers

    What is one of the main functions of a server?

    <p>Manage network resources</p> Signup and view all the answers

    Which type of software is primarily responsible for managing computer hardware?

    <p>System Software</p> Signup and view all the answers

    Which of the following user interfaces allows for interaction using spoken commands?

    <p>Voice User Interface</p> Signup and view all the answers

    What function do device drivers serve within the system software category?

    <p>Facilitate communication between the operating system and hardware</p> Signup and view all the answers

    Which of the following is an example of utility software?

    <p>Compiler</p> Signup and view all the answers

    What is the purpose of Random Access Memory (RAM) in a computer?

    <p>Hold temporary data for active tasks</p> Signup and view all the answers

    What is the primary purpose of installing antivirus software?

    <p>To protect against viruses, malware, and other threats</p> Signup and view all the answers

    Which HTML tag is used as the main container for all HTML code in a document?

    <html> Signup and view all the answers

    What does the section of an HTML document contain?

    <p>Information about the page, like its title</p> Signup and view all the answers

    Which tag is used to create an unordered list in HTML?

    <ul> Signup and view all the answers

    What is the function of a password manager?

    <p>To store and create strong passwords securely</p> Signup and view all the answers

    Which HTML tag is primarily used to define a paragraph of text?

    <p> Signup and view all the answers

    What type of list does the

      tag create in HTML?

    <p>A numbered list indicating order</p> Signup and view all the answers

    What is a crucial safety practice when sharing information online?

    <p>Limiting personal information shared on public platforms</p> Signup and view all the answers

    What is one risk associated with weak passwords?

    <p>They can be easily guessed, allowing unauthorized access.</p> Signup and view all the answers

    Which characteristic describes a strong password?

    <p>Contains at least 10 characters with a mix of various elements.</p> Signup and view all the answers

    What is a major tactic used in social engineering?

    <p>Psychological manipulation to obtain confidential information.</p> Signup and view all the answers

    What is phishing primarily designed to achieve?

    <p>To steal data by impersonating trusted entities.</p> Signup and view all the answers

    Which type of phishing specifically targets individuals using personalized details?

    <p>Spear Phishing</p> Signup and view all the answers

    What is impersonation in the context of social engineering tactics?

    <p>Pretending to be someone else to gain trust</p> Signup and view all the answers

    Which tactic involves creating a fabricated scenario to obtain information?

    <p>Pretexting</p> Signup and view all the answers

    How does a VPN enhance online security?

    <p>It encrypts data and hides a user's online activity and location.</p> Signup and view all the answers

    Why is it important to use multi-factor authentication (MFA)?

    <p>It requires a second identification form, enhancing security</p> Signup and view all the answers

    What is a common consequence of password reuse?

    <p>If one account is compromised, others may be at risk.</p> Signup and view all the answers

    What advantage do password managers provide?

    <p>They securely store and manage unique passwords for different services.</p> Signup and view all the answers

    What does the 's' in 'HTTPS' signify?

    <p>Security</p> Signup and view all the answers

    What is a significant risk associated with public Wi-Fi networks?

    <p>Others may attempt to steal your data</p> Signup and view all the answers

    What should you do to protect yourself from phishing scams?

    <p>Be cautious before clicking links or downloading files from unknown sources</p> Signup and view all the answers

    Which of the following is an effective strategy for creating strong passwords?

    <p>Utilizing long and varied combinations of characters</p> Signup and view all the answers

    What is the primary benefit of keeping your software updated?

    <p>It protects against new threats with security updates</p> Signup and view all the answers

    What is the primary function of a bridge in networking?

    <p>To connect two separate networks into one unified network.</p> Signup and view all the answers

    How does a switch differ from a hub in network functionality?

    <p>Switches are more intelligent and direct data to specific devices.</p> Signup and view all the answers

    What characteristic distinguishes Wi-Fi from Bluetooth technology?

    <p>Wi-Fi has a longer range than Bluetooth.</p> Signup and view all the answers

    Which technology is specifically used for contactless payments?

    <p>NFC</p> Signup and view all the answers

    What is the main purpose of a Network Interface Card (NIC)?

    <p>To allow a device to connect to a network with a unique MAC address.</p> Signup and view all the answers

    What is a key feature of RFID technology?

    <p>It uses radio waves to identify and track objects.</p> Signup and view all the answers

    Why are hubs considered outdated for modern networks?

    <p>They broadcast data to all devices without targeting specific recipients.</p> Signup and view all the answers

    What kind of network does Bluetooth primarily serve?

    <p>Personal Area Networks (PANs) for nearby device connectivity.</p> Signup and view all the answers

    Study Notes

    Year 9 Computing Mid-Term Revision

    • Hardware and Software Basics

      • Internal Hardware: Components inside a computer (CPU, GPU, RAM, ROM, motherboard).
        • CPU: Main processor for calculations and controls.
        • GPU: Specialized processor for images, videos, and animations.
      • External Hardware: Components connected externally to a computer (keyboard, mouse, monitor, printer, headphones, microphone, speakers).
        • Examples in table format provided.
      • Software:
        • System Software: Manages the hardware and provides a platform for applications (operating systems, utility software, compilers, device drivers, and backup tools).
        • Application Software: Designed for end-users to perform tasks (word processors, web browsers, etc).
          • Examples in table format provided.
    • Types of Computers

      • Desktop: High performance, less portable.
      • Laptop: Portable, moderate performance.
      • Tablet: Lightweight, touchscreen, light computing tasks.
      • Supercomputer: High computing power, used for complex calculations.
      • Server: Manages network resources, providing services to other computers.
        • Comparison table provided.
    • Operating Systems (OS)

      • Key Concepts: OS provides an interface between hardware and users, managing resources and applications (Windows, macOS, Linux).
      • Examples in provided text.
    • User Interfaces (UI)

      • Types:
        • GUI: Graphical User Interface (icons, buttons, menus—Windows, macOS, iOS).
        • CLI: Command Line Interface (text-based commands—Linux Terminal).
        • VUI: Voice User Interface (spoken commands—Amazon Alexa, Google Assistant, Siri).
        • Gesture-Based: Using physical gestures (gaming consoles like Nintendo Wii).
        • Comparison table provided.
    • Networking and Telecommunications

      • Networking Concepts:
        • IP Address: Unique number identifying a device (e.g., 192.168.1.1).
        • Domain Name: Human-friendly name for websites (e.g., google.com).
        • DNS: Translates domain names to IP addresses.
        • LAN: Local Area Network (small area like home or office).
        • WAN: Wide Area Network (large geographical area; examples include the internet connecting multiple LANs).
        • WLAN: Wireless Local Area Network (e.g., Wi-Fi).
      • Network Devices:
        • Router: Connects networks, directs data packets (often provides Wi-Fi at home).
        • Modem: Converts digital data to format for transmission over different connections (e.g., DSL, cable—often works alongside a router).
        • Bridge: Connects two separate networks; combines network traffic.
        • Hub: Basic device, broadcasts data to all connected devices.
        • Switch: Connects multiple devices in a LAN, directs data efficiently.
        • NIC: Network Interface Card (allows a device to connect).
      • Wireless Technologies:
        • Bluetooth: Short-range wireless technology.
        • Wi-Fi: Wireless networking technology.
        • RFID: Radio-Frequency Identification (identifies and tracks objects).
        • NFC: Near Field Communication (short-range data exchange).
    • Cybersecurity

      • Passwords:
        • Weak Passwords: Simple, easy to guess (e.g., "password123").
        • Strong Passwords: Complex, including uppercase, lowercase, symbols, numbers.
        • Password Reuse: A significant security risk—if one site is compromised, attackers can access multiple accounts.
        • Password Managers: Securely store, manage, and generate unique passwords.
      • Social Engineering & Phishing: Manipulating users into revealing sensitive information.
        • Social Engineering: Psychological manipulation.
        • Phishing: Impersonating trusted entities (e.g., banks) to steal data (email, spear phishing, vishing, smishing).
      • Protection Measures:
        • Multi-Factor Authentication (MFA): Adds an extra layer of security.
        • HTTPS: Encrypted web communication.
        • Public Wi-Fi caution: Be careful when using public Wi-Fi.
        • Software Updates: Keep software up-to-date.
    • Hypertext Markup Language (HTML)

      • Tags: Create elements and structure web pages.
        • Specific tags for various tasks (headings, paragraphs, lists, images).
        • Closing tags essential for proper HTML structure.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your understanding of hardware and software basics in this Year 9 Computing Mid-Term Revision quiz. Covering topics such as internal and external hardware components, types of computers, and the distinctions between system and application software, this quiz is essential for your preparation.

    More Like This

    Use Quizgecko on...
    Browser
    Browser