You are on page 1of 33

1

Revision Blanks for IGCSE ICT


Input Devices
Name 10 input devices and for each give a use in the real world + advantages
and disadvantages for each
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.

2
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..

3
+ve/ve
.
Device.

..
Use
..
+ve/ve
.
Output Devices
Name 8 output devices other than printers and for each give a use in the real
world
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.

4
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..
+ve/ve
.
Device.

..
Use
..

5
+ve/ve
.
Name 3 different types of printers and for each one, name an advantage and a
disadvantage
Printer
.
Adv
.
Disadv

Printer
.
Adv
.
Disadv
.
Printer
.
Adv
.
Disadv
.
Storage Devices
Name the three different types of storage medium and for each, give two
examples
Medium..
Example 1..
size

Approximate

Use
.
Example 2 ..
size

Approximate

Use
.
Medium..

6
Example 1..
size

Approximate

Use
.

Example 2 ..
size

Approximate

Use
.
Medium..
Example 1..
size

Approximate

Use
.
Example 2 ..
size

Approximate

Use
.
Name 4 sensors and give a use for each of them in the real world
Sensor Use
.
Sensor Use
.
Sensor Use
.
Sensor Use
.
Computer Networks
What does a router do? (3)

7
1)

2)

3)

What is WIFI?

.
Why is it used?

What is Bluetooth

Why is it used

..
What hardware would you need to set up a small network?

What software would you need?

Explain what ISP


is

What is an authentication
technique

Give 4 examples stating an advantage of that technique


Technique .
Adv.
Technique .
Adv. Technique

8
.
Adv. Technique
.
Adv.
Give two advantages of setting up LAN in a school

..

..

.
What is an
intranet

Give three uses business


intranet

What is difference between a LAN ,a WAN and WLAN start by writing them in
full.

..

..

..

..
Explain the use of each of the following network device.
Hub
..
Switch
.
Bridge
.
Proxy server.

.
What is encryption

..
Why is it used

How does a Fax


work
..
Give an advantage of each of the following comparing it with one of the others
E-mail, fax, mobile phone, video conferencing
Email
..

..
Fax
..

..
MP
..

..
VC
..

..
Data Types
List the 6 different data types that can be used in a data base

..
Explain the following terms
File
..

10
Record
..

Field
..
.
Key field
..
..

Explain 3 differences between a flat file and a relation database


1.
..

2.
..

3.
..

What is the difference between a primary key and a secondary key.


..

..

Analogue data is .. form


series of .. And
produce analogue data
data

Digital Data is a
.. produce digital

The device needed to convert analogue to digital data is called


.
The Effects of Using ICT
Explain the term software copyright

..

11

Give 3 ways you can break software copyright


1.
..

2.
..

3.
..

How can you prevent viruses


1.
..

2.
..

3.
..

If an organization has undergone computerization there are effects on the


employees, name 4
1.
..

2.
..

3.
..

4.
..

Name 3 labour saving devices used in the home, that have been programmed
.
..

12
Name 3 positive effects this has created
1.
..

2.
..

3.
..

Name 3 negative effects this has created


1.
..

2.
..

3.
..

Name 3 difference between a wiki and a blog


1.
..

2.
..

3.
..

Name 3 positive effects of social networking sites


1.
..

2.
..

13
3.
..

Name 3 negative effects this has created


1.
..

2.
..

3.
..

Explain phishing in at least 3 points


1.
..

2.
..

3.
..

Explain pharming in at least 3 points


1.
..

2.
..

3.
..

Explain 3 ways in which you would help judge the reliability of a wed-site
1.
..

14
2.
..

3.
..

Explain 3 ways in which you would mistrust the reliability of a website


1.
..

2.
..

3.
..

What is spam?
..

How can it be used maliciously?


..

List 4 health problems associated with working with computers. For each one,
say specifically how the condition is caused and what you do to prevent it
Problem
..
Caused
by
..
Cure
..
Problem
..
Caused
by
..

15
Cure
..
Problem
..
Caused
by
..
Cure
..
Problem
..
Caused
by
..
Cure
..
List 4 health problems associated with working with computers. For each one,
say specifically how the problem might arise and what you do to prevent it
Problem
..
Caused
by
..
Cure
..
Problem
..
Caused
by
..
Cure
..
Problem
..
Caused
by
..

16
Cure
..
Problem
..
Caused
by
..
Cure
..

The ways in which ICT is used


For each of the following, say what type of software would be used to create
these and in each case, list the type of content there would be, for example: text.
Newsletter Software.. Content
..
Website Software.. Content
..
Multimedia Presentation Software.. Content

Music Score Software.. Content


..
CartoonSoftware.. Content
..
Flyer Software.. Content
..
Data Handling Use of Databases
Give 3 examples of what a database could be used for in school.
To search for .. To list for
..
To sort ..
Database for ..
.
Used for ..

17
Database for ..
.
Used for ..

Database for ..
.
Used for ..

Measurement Applications
Explain how computer measurement could be used in (What would be
measuredWhy use computers)
1. Scientific experiments What is measured

Why computers
2. Electronic timing What is measured

Why computers
3. Environmental monitoring What is measured

Why computers

List the sensors and the device that they would be involved in controlling in:
A washing machine
Sensor Device
.
Sensor Device
.
Sensor Device
.
Greenhouse
Sensor Device
.
Sensor Device
.
Sensor Device
.

18
Security System
Sensor Device
.
Sensor Device
.
Sensor Device
.
Steps involved in controlling a heating system
Initial input ..

Stored in ..

Microprocessor sends ..

(.) Sensor ..

Mention of conversion..

Reading from sensor ..

If..

If..

Important words: pre-set value, compare, analogue, digital, actuator


Modelling is ..

Examples of modelling
.
..

Computer Modeling (Reasons for)

19
1.
..

2.
..

3.
..

Describe Batch processing, giving 2 examples


1.
..

2.
..

3.
..

Example ..
Example..
Describe on-line processing, giving 2 examples
1.
..

2.
..

3.
..

Example ..
Example..
Describe real-time processing, giving 2 examples
1.
..

20
2.
..

3.
..

Example ..
Example..
Communication
List 5 different means of communicating directly. For each, give an advantage
and disadvantage
1. .
Adv
..
Disadv

2. .
Adv
..
Disadv

3. .
Adv
..
Disadv

4. .
Adv
..
Disadv

5. .
Adv
..

21
Disadv

What is internet telephony Service?

Name 3 ways you could identify corporate image


1.
..

2.
..

3.
..

Name 4 different forms of media which could demonstrate cooperate image.


1. .

2.

3. .
..

4.

Name 3 advantages of using robots on production lines.


1.
..

2.
..

3.
..

Give 3 difference methods of registering pupils for school.


1.
..

22
2.
..

3.
..

What software would be used to store pupil records?


..
Give 5 tasks an ATM can perform.
1.
..

2.
..

3.
..
..
4.
..

5.

.
What stored on the chip of a credit/credit card.
.
.

.
What is the difference between a credit card and a debit card
..

.
Design a booking form to be used by the box office in a Theatre.

23

Internet Banking
Describe two authentication techniques for internet banking

Describe one authentication techniques for phone banking

.
State tasks you could carry out using internet banking
1.
..

2.
..

3.
..
..
4.
..

24
5.

.
Expert Systems
Name the parts of an Expert System
1.
..

2.
..

3.
..
..
4.
..

5.

.
Name 4 expert systems apart from medical Diagnosis.
1.
..

2.
..

3.
..
..
4.
..

5.

25

Expert how a medical diagnosis expert system works.


1.
..

2.
..

3.
..
..
4.
..

5.

.
6.
..

7.
..

8.
..
..
Name the 4 databases in a Hospital
1.
..

2.

3.
..

Library
State 3 input devices that could be used in a library and for each give an
example of the data that would be input.
Device ..
..

Data

26
Device ..
..

Data

Device ..
..

Data

Stock Control - Explain how an automatic stock control system would work in a
typical supermarket.
1.
..

2.
..

3.
..
..
4.
..

5.

.
6.
..

Explain how an EFTPOS system works in a typical supermarket.


1.
..

2.
..

3.
..
..

27
4.
..

5.

.
6.
..

7.
..

8.
..
..

System Analysis
Name each of the 4 methods of researching/analysing the current system to be
updated. Name an advantages and disadvantages of each compared with one
other method.

Method

.
Adv
.
Disadv

Method

.
Adv
.
Disadv

Method

28
Adv
.
Disadv

Method

.
Adv
.
Disadv

Name 5 features should the analyser try to identify in the research.


1.
..

2.
..

3.
..
..
4.
..

5.

Design
List 4 items that a SA would have to design.
1.
..

2.

3.
..

29
What do validation and verification have in common?

.
Explain the two different methods of verification. (DO NOT MENTION PROOF
READING!)
Method 1

.
Method 2

.
Name 5 different validations and explain each with an example.
V Check
Explained

.
Explained

.
V Check
Explained

.
Explained

.
V Check
Explained

.
Explained

.
V Check

30
Explained

.
Explained

.
V Check
Explained

.
Explained

.
Testing
What is a live data?

..
Explain (using the fact that a salary has to be entered between 10,000 and
40,000) Normal, Abnormal and Extreme data.
Normal

Abnormal

.
Normal

Name 4 aspects of the system that might need to be improved after testing.
1.
..

2.

3.
..

Implementation

31
Name each of the 4 methods of implementing the new system. Name and
advantage and disadvantage of each compared with one other method.
Method

.
Adv
.
Disadv

Method

.
Adv
.
Disadv

Method

.
Adv
.
Disadv

Method

.
Adv
.
Disadv

Explain why one method of implementation might not be suitable in a particular


situation.

32
Documentation
Explain who would use User documentation and why .

.
List 5 components of User and 5 components of Technical.
User

Technical

.
..
.
..
.
Evaluation
Explain 3 reasons why you would need to evaluate a system.
1.
..

2.
..

3.
..
..
Explain 3 ways in which evaluate a new system.
1.
..

2.
..

33
3.
..
..

You might also like