Search Header Logo
IGCSE: Theory (Cover)

IGCSE: Theory (Cover)

Assessment

Presentation

Computers

10th Grade

Practice Problem

Medium

Created by

Laura Sherrington

Used 3+ times

FREE Resource

5 Slides • 30 Questions

1

IGCSE: Knowledge Check

2

Independent Learning Lesson

This theory quiz is designed to recap areas we have already looked at, as well as checking understanding of future topics.

Read questions carefully before answering.

3

Direct Data Entry devices

Go to this website and review the information before answering the following questions.
https://igcseictnowcom.wordpress.com/direct-data-entry-devices/

4

Dropdown

Magnetic stripe card readers and chip and PIN card readers

They are both ​
devices used for processing ​
. However, chip and PIN readers necessitate the user to enter a ​
, making them more secure but also vulnerable to ​
. The additional security layer of a PIN reduces the risk of unauthorised use as a person needs to know it. Magnetic stripe readers allow anyone who has it to be able to use the card. Transactions are ​
due to the absence of manual input, so involve fewer data entry errors.

5

Dropdown

RFID uses the same technology as contactless cards. They use ​
to read information that is stored on a tag.

6

Dropdown

Magnetic Ink Character Recognition (MICR) readers are most often used with ​

7

Multiple Select

When a book is borrowed from a library, there are many ways in which the details can be added to the computer.

Select two direct data entry devices which could be used.

1

Bar Code Reader

2

Magnetic Ink Character Reader

3

RFID Reader

4

Keyboard

5

Mouse

8

Fill in the Blank

OCR device scans text from a document and converts it into computer-readble text on the connected computer system. It is often used for processing passports and ID cards.

9

Categorize

Options (15)

Larger touchscreen than a mobile phone

Carried in a pocket

Most people own this device

Highest quality built in camera

Facial recognition technology

Supports stylus pen input for graphic design

Built in physical keyboard for typing

Trackpad for navigation

Longer battery life

Easy to upgrade hardware components

Mobile payment technology

More ergonomic

Permanent fixed position

Less likely to be stolen

Permanent power supply

Move the the advantages of using each device to complete a task

Tablet
Smartphone
Laptop
PC

10

Multiple Select

Question image

Select all of the true statements about PDF documents

1

More difficult to edit a PDF

2

All devices have compatable software to view PDF documents

3

Do not need specialist software to view it e.g. Microsoft Word

4

PDF software can be expensive

5

PDF files are large and slow files to transfer across a network

11

Networks and Communication

You will need to be able to do the following:

  • Identify and describe the use of hardware

  • The uses of wi-fi and bluetooth

  • Common network environments and types

  • Communication

12

Labelling

The diagram shows how a laptop connects to the internet.

Place the labels over the numbered boxes

Drag labels to their correct position on the image

Web browser

Landline

Router

ISP

13

Hotspot

Select the circle that points to the motherboard

14

Hotspot

Select the circle that points to the CPU

15

Hotspot

Select the circle that points to the Network interface card (NIC)

16

Hotspot

Select the circle that points to RAM

17

Multiple Choice

Question image
What does RAM stand for?
1
Random Accurate Maps
2

Real ASCII Memory

3
Read Only Memory
4
Random Access Memory

18

Multiple Choice

What is the purpose of an IP address?

1

Two or more computersthat are connected together for the purpose of communication

2

A network that is geographically confined to one building or site

3

This is volatile memory that is constantly being written to and read from.

4
To uniquely identify a device on a network and enable communication between devices.

19

Fill in the Blank

Uniform Resource Locators (URL) are used to locate websites and resources. A students needs to find a resource on the Ballakermeen website. To download this document the student will go to: https://www.bhs.sch.im/igcseICT/3245.pdf

Write out the only part of the URL which shows the document file name

20

Fill in the Blank

https://www.bhs.sch.im/igcseICT/3245.pdf

Write out the only part of the URL which shows the folder the document is stored in.

21

Fill in the Blank

https://www.bhs.sch.im/igcseICT/3245.pdf

Write out the protocol used

22

Multiple Select

Which two website domains, usually mean that the information on the website is reliable?

1

.gov

2

.org

3

.co.uk

4

.net

5

.com

23

Fill in the Blank

Question image

Name the technology used to connect wireless earphones to a mobile phone

24

Drag and Drop

Wi-Fi and Bluetooth are both technologies that let devices connect ​ , but they serve different purposes. Wi-Fi is designed for connecting devices to the ​
over a ​
range, like your home's network, and it can handle ​
data at faster speeds. Bluetooth, on the other hand, is used for connecting devices over ​
distances, such as linking a wireless headset to your phone or syncing your smartphone with your ​
. Bluetooth is typically simpler and uses less power compared to Wi-Fi​.
Drag these tiles and drop them in the correct blank above
internet
shorter
longer
more
less
car
stationary

25

Fill in the Blank

What does email stand for?

26

Multiple Choice

Question image

What does CC stand for?

1

Carbon Copy

2

Cubic Centimeter

3

Carbon Copier

4

Create Copies

27

Multiple Choice

Question image

What is BCC?

1

Blind carbon copier

2

Blank Carbon Copy

3

Blind Carbon Copy

4

Behind Carbon Copy

28

Multiple Choice

If you want to send someone a copy of your email, but you don't want the other person to see who you sent a copy to, which feature would you use?
1
BCC
2
CC
3
Forward
4
Reply All

29

Security

As soon as your computer is connected to a network, you have to start thinking about security – security of your files, information, passwords etc.

View the Prezi presentation for further notes on this area
https://prezi.com/p/d2mk-ezlunmu/igcse-ict-chapter-8-safety-security/

30

Reorder

Arrange the following steps in the correct order for a secure login process:

Input unique username

Input password

Computer verifies user identity

Grant access

1
2
3
4

31

Multiple Choice

What is phishing?
1
scams through websites
2
scams through emails
3
scams through phone calls
4
scams through text messages

32

Multiple Choice

Question image

What does 's' in https stand for?

1

safety

2

suspicious

3

secure

4

standard

33

Multiple Choice

A software utility that detects, prevents, and removes viruses, worms, and other malware from a computer

1

Anti-virus

2

Firewall

3

Password file

4

Trojan horse

34

Multiple Choice

This filters out specific IP addresses, websites, and other information that may be harmful, by examining network traffic.

1

Router

2

Firewall

3

Anti-virus software

4

Biometric controls

35

Match

Match the most appropriate data protection method to the description

A method which scrambles the data so that it cannot be understood is...

A fingerprint is an example of...

A method of guaranteeing a website is authentic is...

A hardware device that filters the information coming through the Internet connection

into a LAN is...

This requires users to provide two separate forms of identification to verify their identity

Encryption

Biometrics

Digital certificate

Firewall

Two-factor authentication

IGCSE: Knowledge Check

Show answer

Auto Play

Slide 1 / 35

SLIDE