GCSE ICT (OCR)

?
What is hardware?
Hardware is the physical components of a computer that can be touched
1 of 250
What is software?
The set of instructions that the computer follows
2 of 250
What's the function of an input device?
A component used for entering data
3 of 250
What's the function of a processor?
A component that decides what instructions mean and what to do
4 of 250
What's the function of an output device
An output device shows the results of processing
5 of 250
What's the function of main and internal memory?
To store the data being used or about to be used
6 of 250
What's the function of backing storage?
To store data/instructions when the computer is switched off
7 of 250
Uses of a desktop(2)?
Web searching/email and running applications in homes and offices
8 of 250
Advantages of a desktop(5)?
More internal memory, more hard disk space, faster processors, better graphics processors and larger monitors
9 of 250
Disadvantages of a desktop(3)?
Fixed position, large physical size and too heavy to carry
10 of 250
Uses of a laptop?
Same as a desktop
11 of 250
Advantages of a laptop(4)?
Small/lightweight, portable, access internet via wireless and can be used anywhere
12 of 250
Disadvantages of a laptop(5)?
Easily lost/broken/stolen, small screen and keyboard can lead to health issues, no built in mouse, specification for the money is not as good as a desktop and high specification laptops are expensive and not as portable
13 of 250
Uses of a netbook?
Same as a laptop
14 of 250
Advantages of a netbook?
Same as a laptop
15 of 250
Disadvantages of a netbook(7)?
Same as a laptop+even smaller in size and limited specification
16 of 250
Uses of an embedded system(1)?
Used in domestic and industrial appliances
17 of 250
Advantages of an embedded system(3)?
Performs one task, main instructions dont need altering and user can input simple instructions (eg washing temperature)
18 of 250
Disadvantages of an embedded system(3)?
Cannot be re-tasked, performs one task at a time, limited specification
19 of 250
Uses of a smartphone?
Mobile telephone with computer facilties
20 of 250
Advantages of a smartphone(5)?
Same as a laptop+can connect to internet via 3G, 4G and WiFi
21 of 250
Disadvantages of a smartphone(8)?
Same as a netbook+non standard operating system/incompatible programs
22 of 250
Uses of mainframes/supercomputers?
Large and very fast computers used in banks, insurance companies and universities
23 of 250
Advantages of a mainframe/supercomputer
Can process large amounts of data very quickly and very fast calculations
24 of 250
Disadvantages of a mainframe/supercomputer(2)?
Expensive and take up alot of room
25 of 250
What are the 10 standard Input devices?
Joystick/game controller, keyboard, keypad, microphone, mouse, touchscreen, webcam, sensors, remote control and graphics tablet
26 of 250
Uses of a joystick/game controller(2)?
Good for moving on screen objects such as in a computer game, not so good for entering characters
27 of 250
Uses of a keyboard(2)?
Used for entering characters (eg when typing), not so good for special characters
28 of 250
Uses of a keypad(2)
Good for entering numbers, not so good for other characters
29 of 250
Uses of a microphone?
Good for capturing sound such as voices
30 of 250
Uses of a mouse(2)?
Selecting icons and choosing options from menus, can be used but not so good for drawing shapes
31 of 250
Uses of a touch screen(2)?
Entering data by touching (eg an image in a restaurant), also is an output device because it displays images and text
32 of 250
Uses of a webcam?
Capturing still images/video
33 of 250
Uses of sensors?
Capture physical conditions in the environment such as light, temperature and pressure
34 of 250
Uses of remote control?
Sending user commands (eg a TV)
35 of 250
Uses of a graphics tablet?
Drawing images and pictures directly on to a computer
36 of 250
What are the 4 standard output devices?
Monitor, printer, speakers/headphones and actuator
37 of 250
Uses of a monitor(2)?
Found on most computer systems, shows the results of processing
38 of 250
Uses of a printer(3)?
Used for producing hardcopies of data, inkjet printers are used at home for general printing and photographs, laser printers produce fast high quality printouts but not so good for photographs
39 of 250
Uses of speakers/headphones?
Produce sound, headphones used for privacy but not as good sound quality as speakers
40 of 250
Uses of actuators?
Produce movement (eg a motor)
41 of 250
What are the 3 specialized input devices?
Braille keyboard, foot mouse and puff/**** switch
42 of 250
Uses of a braille keyboard(2)?
Specialised keyboard with braille keys for visually impaired users, not easy to learn
43 of 250
Uses of a foot mouse?
Foot operated switch with mouse functions for physically impaired users
44 of 250
Uses of a puff/**** switch?
Mouth operated switch for use by physically impaired users
45 of 250
What are the 5 properties of ROM?
Data is permanent, non volatile, cannot be written to, data cannot be altered, can store instructions for use when a computer starts up
46 of 250
What are the 5 properties of RAM?
Contents can be changed, volatile, can be written to, data can be altered, stores data/code in use or about to be used
47 of 250
What is an EEPROM?
EEPROMs can be electrically erased and rewritten, they are used for storing the set of instructions in BIOS which a computer uses on startup
48 of 250
Describe flash memory?
non volatile, can be re-written many times, used in cameras/phones/USB's
49 of 250
What are the 7 standard storage mediums?
Magnetic hard disk, CD, DVD, Blu-Ray, floppy disk, flash memory and external magnetic hard disk
50 of 250
What's the use of a magnetic hard disk?
Used to store operating system and data/files when the computer is turned off
51 of 250
Advantages of a magnetic hard disk?(2)
Very large storage capacity and relatively cheap for large storage capacity
52 of 250
Disadvantages of a magnetic hard disk?(2)
Easily damaged by knocks/heat/magnetic field, not very suitable for removable media as it can't be moved when in use
53 of 250
What does a CD store?
Music, computer data and games
54 of 250
Advantages of a CD?(3)
CD-R's are cheap to buy, CD-RW's are re-writable and all modern computers can use them
55 of 250
Disadvantages of a CD?(3)
CD-ROM cannot be re-written, small storage capacity and easily damaged
56 of 250
What does a DVD store?
Movies and computer games
57 of 250
Advantages of a DVD?(3)
DVD-R's are cheap to buy, large storage capacity and all modern computers can use them
58 of 250
Disadvantages of a DVD?(3)
DVD-DL and DVD-RW are expensive, incompatible with older CD drives and easily damaged
59 of 250
What does a Blu-Ray store?
HD movies and computer games
60 of 250
Advantages of Blu-Ray?(2)
Very large storage capacity and more resilient to damage than CD/DVD
61 of 250
Disadvantages of Blu-Ray(3)?
Devices and media are expensive, incompatible with CD/DVD drives and easily damaged
62 of 250
What does a floppy disk store?
Small files such as configuration details
63 of 250
Advantages of a floppy disk(3)?
Easily transported, all older computers can use them and not as easily damaged as magnetic hard disk's
64 of 250
Disadvantages of a floppy disk(4)?
Not used in modern computers, very small storage capacity, easily lost or stolen and can be damaged by magnetic field
65 of 250
What does flash memory store?
Computer data/files, solid state hard disk
66 of 250
Advantages of flash memory(3)?
Large storage capacity, all modern computers can use them and not easily damaged
67 of 250
Disadvantages of flash memory(4)?
Large storage capacities are very expensive, slower access to data than hard disk's, easily lost or stolen and data can only be re-written a certain number of times before it is lost
68 of 250
What does an external magnetic hard disk store?
Same as a hard disk
69 of 250
Advantages of an external magnetic hard disk(3)?
Same as a hard disk+connected via USB
70 of 250
Disadvantages of an external hard disk(2)?
Needs separate power supply and easily damaged
71 of 250
What are the 8 generic software types for creating and managing data/information?
Word processors for writing letters, desktop publishing for magasines, spreadsheets for financial models, databases for keeping records, multimedia software for presentations+sound/video, presentation software, web authoring software and programming
72 of 250
What are the 4 generic software types for creating and managing images/video?
Photo editing software, animation software, video editing software and graphics manipulation software
73 of 250
What are the 3 generic software types for communicating with others?
Web browsing software, communications software (eg social networks) and gaming software
74 of 250
How is programme code produced?
Editors type and create the source code (computers don't understand), compilers turn source code into object code (computers do understand), debuggers find errors in the code and linkers join the different parts of the code
75 of 250
What are the six features of a good user interface?
Logical to use, options/tools are in a logical order, colours+window sizes similar, suitable colour scheme (not too bright or pale), the tools (buttons) will be in logical places and there will be a sensible amount of information on screen at a time
76 of 250
What are the 5 advantages of a GUI?
Don't need a detailed knowledge of computing, easy for new users, don't need to know comands, uses images to represent applications and restricts user access to system
77 of 250
What are the 3 disadvantages of a GUI?
Doesn't access whole system, needs a large amount of main memory and needs more processing power than a CLI
78 of 250
What are the 3 advantages of a CLI?
Allows access to all of the system, complex commands can be used and repetitive commands can be used to carry out sequences of tasks
79 of 250
What are the 3 disadvantages of a CLI?
Not easy for most users, need a detailed knowledge of commands and how they work and easy to make mistakes and damage data/files
80 of 250
What are the 4 advantages of a menu interface?
Easy to use, don't need to know commands, can be spoken and doesn't need much processing power
81 of 250
What are the 3 disadvantages of a menu interface?
Bad designs are slow to navigate, takes time to find specific options and takes up a large space on screen
82 of 250
What are the 6 main methods of communication?
Instant message, chat roomsl text message, email, video conference and fax
83 of 250
What are the 2 features of instant messages and chat rooms?
Typed messages, video is possible
84 of 250
What are the 3 advantages of instant messaging and chat rooms?
Conversation in real time, quick to type a reply and can be saved for future reference
85 of 250
What is the extra advantage of chat rooms compared to instant messaging?
Is usually moderated
86 of 250
What are the 2 disadvantages of instant messaging and chat rooms?
Have to be logged in at the same time and may not know who the other people are
87 of 250
What are the 2 features of text messaging?
Typed messages, can send pictures
88 of 250
What's the advantage of text messaging?
Don't need to be online at the same time
89 of 250
What are the 5 disadvantages of text messaging?
Not possible to know if a message has arrived or been read, sending pictures is slow and low quality, costs money (subscription or PAYG), may not know who the other person is and people only identified by number not name
90 of 250
What are the 3 features of email?
Typed messages, can attacth files and complex software
91 of 250
What are the 5 advantages of email?
Don't need to be online at the same time, messages can be saved/edited/forwarded, messages can be filtered into folders, messages can be filtered to stop unwanted emails and costs less than post/telephone
92 of 250
What are the 5 disadvantages of email?
Must have an internet connection and email address, many messages are spam, cannot send large attachments due to mailbox restrictions, address must be accurate and authenticating documents for legal purposes is complicated
93 of 250
What's the feature of fax?
Sends a document image over a telephone lines
94 of 250
What are the 3 advantages of fax?
Cheaper than post, arrives more quickly than post and can be used for legal documents (very secure)
95 of 250
what are the 3 disadvantages of fax?
Usually no colour, no moving images/attachments and not always secure depending on placement
96 of 250
What's the feature of video conferencing?
Uses cameras/microphones/monitors/speakers to send/receive images/voices over a network/internet
97 of 250
What are the 5 advantages of video conferencing?
Meetings can be called at short notice, save travel cost, save travel time, save venue hiring cost and can keep i contact with people who work from home
98 of 250
What are the 5 disadvantages of video conferencing?
High initial cost, requires reliable internet connection, some people don't like being on camera, lack of personal contact and difficulty when distributing documents
99 of 250
Which network topology would a school use?
Schools and homes most often use star networks. Bus networks are not used very often today
100 of 250
What's a device on a network called?
A node
101 of 250
What does each node require to connect to a network?
A network interface card (NIC)
102 of 250
What is a network hub?
A network hub connects nodes together and sends data to every part of the network
103 of 250
What is a network switch?
A switch is the same as hub but can be programmed to send data only where it's needed
104 of 250
What is a router?
A router connects different networks together (eg a home network and the internet)
105 of 250
What is Wi-Fi used for?
To connect mobile devices (eg laptop/netbook/smartphone) to a network
106 of 250
What's a WAP?
A wireless access point is used to allow mobile devices to connect to a network
107 of 250
What is the purpose of a terminator in a bus network?
To prevent signal echoes
108 of 250
What are the 4 advantages of a bus network?
Easy to install, easy to add extra workstations, uses less cable than a star network and best choice for temporary networks
109 of 250
What are the 6 disadvantages of a bus network?
Full reliance on central cable, data travels slowly with many workstations, data collisions occur with many workstations, low security (data visible to everyone), limited cable length and workstation upper limit
110 of 250
What are the 3 advantages of a ring network?
Data transmission simple (one direction), no data collisions and extra workstations do not affect performance
111 of 250
What are the 5 disadvantages of a ring network?
Full reliance on all systems running at once, full reliance on central cable, data transmission is slow (travels through every system), problems difficult to identify and network requires shut down to add workstations
112 of 250
What are the 3 advantages of a star network?
One connection does not affect others, very few data collisions and very secure (all interactions go through server)
113 of 250
What are the 3 disadvantages of a star network?
Expensive (lots of cabling), requires expert installation and full reliance on server
114 of 250
What kind of data should you use a line graph for?
Continous
115 of 250
What kind of data should you use a bar graph for?
Discreet
116 of 250
When is an area graph appropiate for use?
When there are 2 or more variables
117 of 250
What are the 6 ways of capturing data automatically?
A reader or scanner (for barcodes and magnetic stripes), OCR, OMR, RFIS, voice recognition and sensors
118 of 250
How does an OCR capture data?
By reading data from printed documents
119 of 250
How does an OMR capture data?
By gathering data from pre-printed documents
120 of 250
How does a radio frequency identification scanner capture data?
By reading RFID chips/tags
121 of 250
How does voice recognition capture data?
By turning speech into computer data
122 of 250
How do sensors capture data?
By gathering data about physical parameters
123 of 250
What are the 6 standard data types?
Text, date, integer, real, boolean and image
124 of 250
Example of text use?
Names and telephone numbers
125 of 250
Example of date use?
DOB and date of events
126 of 250
Example of integer use?
Number of students
127 of 250
Example of 'real' use?
Prices
128 of 250
Example of boolean use?
Gender
129 of 250
What does boolean store?
A value that has only 2 choices
130 of 250
What are the 6 standard validation checks?
Range, format, length, presence, existence and check digit
131 of 250
What does range check do?
Checks if data is within a set range
132 of 250
Example of range use?
A date is between 3rd March and 22nd October
133 of 250
What does format check do?
Checks that characters are allowed or in the correct position
134 of 250
Example of format check use?
Check an e-mail address
135 of 250
What does length check do?
Checks that the correct number of characters has been entered
136 of 250
Example of length check use?
A postcode
137 of 250
What does presence check do?
Checks that data has been entered
138 of 250
What does existence check do?
Checks that the entry matches stored data
139 of 250
What does check digit do?
Checks if data is allowed or can exist
140 of 250
Example of check digit use?
Barcodes are correct
141 of 250
What does control total do?
A calculation that adds up a total of a set of numbers and checks the total is meaningful
142 of 250
Example of control total use?
The total of a set of prices which shows if the data has changed
143 of 250
What does hash total do?
A calculation that adds up a set up of numbers but the sum has no meaning
144 of 250
Example of hash total use?
The total is re-calculated to check the data has not been compromised, such as account number where the total has no meaning
145 of 250
Example of hash total use?
The total is re-calculated to check the data has not been compromised, such as account number where the total has no meaning
146 of 250
What's relative cell referencing?
Relative cell referencing allows cell references to change automatically when copying or replicating cells
147 of 250
What's absolute cell referencing?
Absolute cell referencing prevents cell references form changing automatically when copying or replicating cells
148 of 250
What's the use of =SUM()?
To add up all the values of the cells in a range
149 of 250
What's the use of =AVERAGE()?
Work out the average of all the values of the cells in a range
150 of 250
What's the use =COUNTIF()?
Count the number of times a value occurs
151 of 250
What's the use of =LOOKUP()?
Look in a range of cells to find a value
152 of 250
What are databases?
Databases are files of data that are manipulated by database management software (DBMS)
153 of 250
What's a relational database?
Relational databases keep data in tables that are related to each other
154 of 250
What's a primary key?
A primary key is the field in a record that holds unique data allowing the record to be indentified amongst other records
155 of 250
What are secondary keys used for?
Sorting
156 of 250
What are foreign keys used for?
To link tables
157 of 250
Give 4 examples of relationships between tables?
One to one, one to many, many to one and many to many
158 of 250
What's the difference between relational and flat file databases?
Flat file databases store data in a single table whereas relational databases have more than one table with links between the fields using key fields
159 of 250
What are spreadsheets used for?
Manipulating numbers
160 of 250
Give 3 examples of how spreadsheets can be used by different groups?
By teachers for keeping records of exam scores, at home for finance monitoring and by engineers to carry out calculations when designing new structures
161 of 250
Describe computer models?
Computer models use formulas and functions to perform calculations on variables to see the outcome of changes without creating the real thing
162 of 250
What are the 6 advantages of computer models?
Safety issues can be examined without danger, outcome can be seen quickly, the real thing may have a long time scale, impossible to study real thing directly, variables can be altered to view effects of changes and a model can be re-used infinitely
163 of 250
What are 2 examples of situations where computer models are useful?
Global warming because of its long timescale and a volcanic eruption because it cannot be studied directly
164 of 250
What are 4 disadvantages of computer models?
Changin 1 or 2 variables may not be realistic in a complex situation, it might not be possible to account for all variables, the real thing may be too complex and a model may not behave the same as the real thing
165 of 250
How would one decide whether to use a spreadsheet or a database?
If calculations using formula are needed use a spreadsheet and if searching and sorting are needed then use a database
166 of 250
What 6 things do designers of software that stores data have to consider?
How data is to be grouped, how data is linked, how data is to be accessed, number of accesses to be made to files, the addition and deletion of data and the type of storage medium
167 of 250
What's a backup?
A copy of a file
168 of 250
What are the 5 ways of making sure work is not lost?
Save work every few minutes, always use a copy, save with different file names, use passwords and keep a copy of the work in several different locations
169 of 250
What are the 6 'rules' for using backups?
Make backups regularly, make more than one backup, use sensible names for the backup, keep each backup separate from the others and the original file, use removable medium for storage and store backups carefully and safely
170 of 250
What is the preferred backup medium and method of a business
3 magnetic tape drives used in rotation (grandfather, father and son) at the end of each day
171 of 250
What's an archive?
An archive is a copy of data that is stored separately for permanent safekeeping, used for reference purposes (eg tax inspection)
172 of 250
What are 4 differences between backups and archives?
Data in a backup is in current use (data in an archive isn't), backups are made at frequent intervals (archives are made at longer intervals), backups can be used for disaster recovery (archives can't) and backups aren't useful for reference/research
173 of 250
What's encryption?
Encryption scrambles data so that it cannot be understood unless 'unscrambled'/decrypted
174 of 250
What's a decryption key used for?
Decrypting or 'unscrambling' data
175 of 250
What's public key encryption?
Encrypting data for transmission over public networks
176 of 250
What's hacking?
Gaining or attempting to gain access to computer data/systems without the required passwords/access rights
177 of 250
Is hacking always illegal?
Only if the hacker does not have permission to try and access the data/systems
178 of 250
What's key logging?
Key logging is the use of software to record the keys pressed to gain access to data/systems, the recordings are transmitted to others who may use them to access computer systems/data
179 of 250
What's a firewall?
A firewall is used to control access to a network or an individual computer system, it checks incoming/outgoing network traffic against a set of rules
180 of 250
What's malware?
Malware is a computer program that accesses other computers without the owners consent and is designed to cause harm to a system
181 of 250
What's a virus?
Software/code/program that copies itself and transmits itself to other computers without permission or knowledge and can alter/damage/delete data in files stored on the system
182 of 250
What's a worm?
A computer program that copies itself and spreads through networks without any external help
183 of 250
What's a trojan horse?
A software application that appears to be useful but may allow unauthorized access to a system
184 of 250
What's spyware?
A program that collects information without a user's consent
185 of 250
What's adware?
Adware is automatically downloaded and installed to advertise or direct a user to advertised material
186 of 250
What are the 5 malware types?
Virus, worm, trojan horse, spyware and adware
187 of 250
What are 5 ways of preventing malware?
Using anti-virus, not downloading files from sites that aren't genuine, not sharing files, not using other's removable media and not accessing the internet
188 of 250
What are the first 2 acts of the DPA (1998)?
Personal data must be lawfully processed and must be used for limited purposes
189 of 250
What are acts 3 and 4 of the DPA (1998)?
Data must be adequate, relevant, not excessive and data must be accurate and up to date
190 of 250
What are acts 5 and 6 of the DPA (1998)?
Data can't be kept for longer than necessary and must be processed with respect to one's rights
191 of 250
What are acts 7 and 8 of the DPA (1998)?
Data must be kept secure and must not be transferred to countries with lower data protection than the U.K.
192 of 250
What does the 'processed lawfully' act mean?
A person cannot be mislead into providing information and the data must be used lawfully
193 of 250
What does the 'processed for limited purposes' act mean?
Data can only be used for the purpose it was obtained
194 of 250
What does the 'adequate, relevant and not excessive' act mean?
Data should be just enough for the task, be relevant to the task and should not include any other data
195 of 250
What does the 'accurate and up to date' act mean?
The person holding the data has a duty to ensure it's accurate and free form errors
196 of 250
What does the 'can't be kept for longer than necessary' act mean?
Data should be securely discarded when it's no longer needed
197 of 250
What 3 actions are illegal under the computer misuse act?
Unauthorized accessing of material, accessing material with intention to commit further offences and unauthorized alteration of material
198 of 250
What does the 'unauthorized access of material' action mean?
Permission from the owner is needed, using some else's user name and password is not allowed
199 of 250
What does the 'access to material with intention to commit offences' action mean?
Stealing someone else's personal details is not allowed (eg name, ID or password) and using them to obtain a debit/credit card or to access a bank account to steal money
200 of 250
What does the 'unauthorized alteration of material' action mean?
Changing data stored on a computer is illegal, deliberately sending a virus is a criminal offence
201 of 250
What are the 5 methods to prevent health problems occurring when using computers?
Adequate lighting, appropriate screen resolution, 5 minute break every hour, not continuously tapping keys and not using computers for long periods at a time
202 of 250
What's the use of a head pointer?
Allows a physically impaired person to type keys on a keyboard
203 of 250
What are the first 4 stages of starting a computer?
Power switched on, computer uses BIOS instructions to start, BIOS instructions tell computer where OS is and how to load, operating system loads and starts
204 of 250
What are the final 3 stages of starting a computer?
OS starts utilities and applications used at startup, computer ready for user login with user name and password (if required), computer is ready for use
205 of 250
What is BIOS?
Basic input output system, stores instructions used on startup
206 of 250
What 6 actions can be performed on folders and files?
Create new file, create new folder, rename, delete, move and copy
207 of 250
What are the 6 causes of a failure to print?
Printer switched off/offline, no paper, no ink or toner, no/wrong drivers, wrong printer, wrong access rights
208 of 250
What are the 5 causes of being unable to open a file?
File has been moved, file name has changed, file is corrupted, file extension has changed and wrong password
209 of 250
What's the solution for being unable to open a file because it's corrupted?
Use a backup copy
210 of 250
What are the 3 causes of 'page not found'/error 404?
Page may have been deleted/moved/changed, server is sometimes unavailable and link may be incorrect
211 of 250
What are the 5 advantages of the internet?
Vast amount of information, information can be found quickly, information provided by anyone, information on every topic and information in electronic format
212 of 250
What are the 5 disadvantages of the internet?
There can be too much information, some results aren't useful, it's difficult to dtermine whether information is false, information may be inappropiate for viewing and copyright restrictions may apply
213 of 250
What are the principles of file transfer protocol?
FTP client software is used to connect to an FTP server to upload and download files
214 of 250
What are the 3 advantages of file transfer protocol?
Can transfer large files, can be very secure and files centrally backed up
215 of 250
What are the 4 disadvantages of file transfer protocol?
Firewalls can blockk authorised users, requires expensive file server, requires specialist staff+OS and requires licenses per user
216 of 250
What are the principles of peer to peer file sharing?
Computers are connected and files are transferred directly between them
217 of 250
What are the 4 advantages of peer to peer file sharing?
Does not need a file server, no specialist knowledge needed, easy to setup and one connection does not affect others
218 of 250
What are the 5 disadvantages of peer to peer file sharing?
Often used to share files illegally, can slow down performance whilst in use, file not centrally backed up, files can be hard to find without a logical filing system and prone to virus' (low security)
219 of 250
What's a secondary function of an ADC or DAC?
An ADC or DAC will also isolate the computer from any electrical problems in the sensors, connecting wires or other devices
220 of 250
What's data logging?
A computer collects data about physical variables by connecting the computer to sensors through an ADC
221 of 250
What can stored data from data logging be used for?
The stored data can be analysed, processed and displayed as charts or graphs for use in reports or presentations
222 of 250
What kind of sensor is used in a barcode reader?
Light
223 of 250
What kind of sensor is used in a thermostat?
Temperature
224 of 250
Name 3 ways people's activities can be monitored using ICT?
CCTV, electronic tags and security systems
225 of 250
What are the 6 advantages of using robots in manufacturing?
Humans aren't in dangerous areas, skilled workers not required (reduced costs), robots don't need breaks/holidays, robots can work continuously for long periods, robots work is consistent and job opportunities for robot maintenance/repair
226 of 250
What are the 4 disadvantages of using robots in manufacturing?
High initial cost, requires expert maintenance/repair, power cuts/breakdowns stop production and workers made redundant or re-trained
227 of 250
What are the 5 advantages to the employee of working from home?
Save travel time, save travel cost, not supervised, no set working hours and can adjust working hours around family/personal matters
228 of 250
What are the 7 disadvantages to the employee of working from home?
Cost of ICT equipment, cost of electricity, need to be motivated, can work too many hours, can get distracted by family/personal matters, requires modern ICT equipment+internet connection and requires own backup and security
229 of 250
What are the 3 advantages to the employer of working from home?
Save travel cost, save office space+costs and might not need as many staff
230 of 250
What are the 4 disadvantages to the employer of working from home?
Cost of ICT equipment, cost to set up internet access to company network, can't supervise staff and files not as secure as in company building
231 of 250
What are the 9 emerging technologies?
Artificial intelligence, robotics, biometrics, vision enhancement, computer-assisted translation, quantum cryptography, 3D/holographic imaging, virtual reality and 3D printing
232 of 250
What's artificial intelligence?
A system that can understand the environment and act accordingly (eg banking to detect card fraud)
233 of 250
What's robotics?
Creating automated machines to carry out specific tasks
234 of 250
What's biometrics?
Identifying people by their physical features, often used by police to find criminals
235 of 250
What's vision enhancement?
Helping people to see better than zoom or enlarged text, includes night vision goggles and driver displays
236 of 250
What's computer assisted translation?
A translation memory that remembers how previous translations were carried out and does the same again
237 of 250
What's quantum cryptography?
An extra secure form of encryption that uses the quantum properties of light
238 of 250
What's 3D/holographic printing?
Uses recorded light patterns to re-create images of objects in 3D
239 of 250
What's virtual reality?
Environment generated by the computer to simulate the real world, requires input and output devices
240 of 250
What's 3D printing?
Adding successive layers of material onto a surface
241 of 250
What are the 4 advantages to the bank of online banking?
Don't need as many branches (reduced costs), Don't need as many branch staff (reduced costs), less cheques (replaced bye electronic transactions) and allows customer access to accounts 24/7
242 of 250
What are the 4 disadvantages to the bank of online banking?
Need secure internet connection, need experienced technicians, access+data security systems must be very reliable/efficent and need call centres open 24/7
243 of 250
What are the 5 advantages to the customer of online banking?
Save travel cost, account access 24/7, access account form anywhere, access call centres 24/7 and authentication is very secure
244 of 250
What are the 5 disadvantages to the customer of online banking?
Cost of ICT systems+internet, need a computer+secure internet, need ICT skills, difficult to understand call centre staff and complicated passwords can be difficult to remember
245 of 250
What's a plotter?
A specialist printer that is able to draw high quality images on a large piece of paper
246 of 250
What's a cookie?
A small file that is stored on a computer when you visit some websites
247 of 250
What are cookies used for?
To remember a person's details
248 of 250
What are the 6 advantages of computerized data logging?
Can be used in remote or dangerous situations, works 24/7, time intervals can be very frequent, can start in the future, don't need a person present and eliminates human error
249 of 250
What are the 4 disadvantages of computerized data logging?
Breakdowns can lead to loss of data, equipment can be expensive, will only work at set intervals and sensors need careful calibration
250 of 250

Other cards in this set

Card 2

Front

What is software?

Back

The set of instructions that the computer follows

Card 3

Front

What's the function of an input device?

Back

Preview of the front of card 3

Card 4

Front

What's the function of a processor?

Back

Preview of the front of card 4

Card 5

Front

What's the function of an output device

Back

Preview of the front of card 5
View more cards

Comments

shamsahussain

Report

very useful thank you 

Billy l 100 l

Report

lier

SAHMED465

Report

Very useful indeed, but extremely long!

Charlotte1401

Report

Was wondering if anyone had used these cards and how useful they were for the exam?

Dahmed

Report

very useful but would be good if they gave us answers than we can memories 

uday1234567

Report

this is not right

[square-bracket]

Report

[im just a form of bracket]

KLISS SMALL

Report

I AM CHRIS SMALLING

Similar ICT resources:

See all ICT resources »See all B061 ICT in todays world resources »