ICT Assessment Test 2
ICT Assessment Test 2
2. Tick whether the following are examples of Internal Memory or Backing Storage. [2]
4. Kim has just discovered a large amount of spam emails in her inbox and is worried it may be
a phishing attempt.
a) Describe the possible effects on Allen’s computer system if he opens the file. [2]
b) Describe how Allen can help prevent his computer from downloading viruses from the
internet. [3]
7. When using the internet it is easy to accidently give your personal details to others. Give two
examples of personal data. [2]
Buzzer CD/RW Drive Keyboard LCD Monitor Speaker Solid State Drive
Tracker ball Webcam
9. A famer has purchased a computerised feeding system for her goats. A goat has an RFID tag
attached to its ear, which is recognised by the computer. The system uses a passive RFID tag.
Total Marks: 80 1
17/08/2021
10. What are the risks typically associated with RSI (Repetitive Strain Injury). [2]
11. Mention any three preventions that could reduce RSI. [3]
a) Advantages. [4]
b) Disadvantages. [4]
14. What type of sensors would you typically find in a computer controlled greenhouse? [3]
16. Spyware is software that gathers user information through their network connections
without them being aware that it is happening. Mention ways to avoid harmful spyware
from being installed not your computer. [4]
17. Describe three differences between physical faxing and electronic faxing. [3]
18. A schools’ science department has a network which uses Wi-Fi. A teacher has a laptop
computer and whilst in school wishes to connect to this network.
19. There are a number of different networks device associated with computers. Give the most
appropriate type of communication device that fits the following descriptions.
20. Explain how the number of jobs available to workers has been affected by the use of ICT in
commerce and industry, using specific examples. Refer in your answer to jobs created as
well as jobs losses. [5]
Total Marks: 80 2
17/08/2021
a) The action of sending emails to fraudulently obtain a person’s bank details is called.
b) The action of illegally installing malicious code which redirects a person to a fraudulent
website with the purpose of obtaining that persons bank details is called.
c) Unsolicited bulk emails are called.
d) The action of sending text messages to fraudulent obtain 1another person’s bank
details.
22. Describe three strategies that you could use to minimise the dangers of using social
networking sites to make new friends. [3]
Total Marks: 80 3