100% found this document useful (1 vote)
1K views3 pages

ICT Assessment Test 2

This document contains a 22 question ICT assessment test covering topics such as data input/output devices, computer memory, security, viruses, 3D printing, personal details, output devices, RFID technology, RSI, networks, communication devices, effects of ICT on jobs, cybercrime terms, and social networking safety. Some questions are multiple choice, others require short answers describing processes, technologies, dangers, or prevention strategies. The assessment tests a wide range of digital literacy and computer science knowledge.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views3 pages

ICT Assessment Test 2

This document contains a 22 question ICT assessment test covering topics such as data input/output devices, computer memory, security, viruses, 3D printing, personal details, output devices, RFID technology, RSI, networks, communication devices, effects of ICT on jobs, cybercrime terms, and social networking safety. Some questions are multiple choice, others require short answers describing processes, technologies, dangers, or prevention strategies. The assessment tests a wide range of digital literacy and computer science knowledge.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

17/08/2021

ICT Assessment Test 2


1. Data can be input to a computer using direct data entry methods. Write down the most
appropriate device to input the following. [4]

a) Information from the chip in an electronic passport.


b) Text from and ID Card.
c) Account details from the front of a credit card at an EFTPOS Terminal.
d) Account details from the back of a credit card at an EFTPOS Terminal.

2. Tick whether the following are examples of Internal Memory or Backing Storage. [2]

Internal Memory Backing Storage


Random Access Memory
Portable Hard Disk
Pen Drive
Magnetic Tape

3. Describe how security can be improved in a Wi-Fi network. [2]

4. Kim has just discovered a large amount of spam emails in her inbox and is worried it may be
a phishing attempt.

a) Explain some other dangers of opening spam emails. [3]


b) Describe how Kim would recognise a phishing email. [4]

5. Allen has accidently downloaded a file containing a virus.

a) Describe the possible effects on Allen’s computer system if he opens the file. [2]
b) Describe how Allen can help prevent his computer from downloading viruses from the
internet. [3]

6. 3D printers are being used for producing personalised prescription drugs.

a) Give two advantages of using 3D printers for this purpose. [2]


b) Give two disadvantages of using 3D printers for this purpose. [2]

7. When using the internet it is easy to accidently give your personal details to others. Give two
examples of personal data. [2]

8. Circle three items which are used as output devices. [3]

Buzzer CD/RW Drive Keyboard LCD Monitor Speaker Solid State Drive
Tracker ball Webcam

9. A famer has purchased a computerised feeding system for her goats. A goat has an RFID tag
attached to its ear, which is recognised by the computer. The system uses a passive RFID tag.

Total Marks: 80 1
17/08/2021

a) Describe how the RFID tag can be activated. [3]


b) The system recognises the goat and therefore gives the correct feed to the animal.
Describe how RFID technology will be used to give the correct feed to the animals. [3]

10. What are the risks typically associated with RSI (Repetitive Strain Injury). [2]

11. Mention any three preventions that could reduce RSI. [3]

12. Discuss the advantages and disadvantages of having microprocessor-controlled devices in a


household.

a) Advantages. [4]
b) Disadvantages. [4]

13. What is the difference between a Hub and a Switch? [2]

14. What type of sensors would you typically find in a computer controlled greenhouse? [3]

15. Describe two differences between RAM and ROM. [2]

16. Spyware is software that gathers user information through their network connections
without them being aware that it is happening. Mention ways to avoid harmful spyware
from being installed not your computer. [4]

17. Describe three differences between physical faxing and electronic faxing. [3]

18. A schools’ science department has a network which uses Wi-Fi. A teacher has a laptop
computer and whilst in school wishes to connect to this network.

a) Write down the name of this type of network. [1]


b) In order to access the network the laptop must be within range of a type of Wi-Fi
network device.
i) Write down the name of this device. [1]
ii) Describe how this device is connected to the network using an Ethernet cable. [1]
c) Describe one other disadvantage of a Wi-Fi network compared to a cabled network. [2]

19. There are a number of different networks device associated with computers. Give the most
appropriate type of communication device that fits the following descriptions.

a) This device connects a LAN to the internet. [1]


b) This device transmits data to specific computers in a network. [1]
c) This device broadcasts data to all computers in a network. [1]
d) This device connects one LAN to another LAN that uses the same protocol. [1]

20. Explain how the number of jobs available to workers has been affected by the use of ICT in
commerce and industry, using specific examples. Refer in your answer to jobs created as
well as jobs losses. [5]

Total Marks: 80 2
17/08/2021

21. Complete the following sentences. [4]

a) The action of sending emails to fraudulently obtain a person’s bank details is called.
b) The action of illegally installing malicious code which redirects a person to a fraudulent
website with the purpose of obtaining that persons bank details is called.
c) Unsolicited bulk emails are called.
d) The action of sending text messages to fraudulent obtain 1another person’s bank
details.

22. Describe three strategies that you could use to minimise the dangers of using social
networking sites to make new friends. [3]

Total Marks: 80 3

You might also like