0% found this document useful (0 votes)
30 views6 pages

Revision k1 Ws Part 1

The document provides information about key IT skills including definitions of common computer terms and devices. It includes questions about topics like storage capacity, hardware ports, and functions of devices. It also covers concepts such as file compression, firewalls, and encryption.

Uploaded by

steisi ziuu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views6 pages

Revision k1 Ws Part 1

The document provides information about key IT skills including definitions of common computer terms and devices. It includes questions about topics like storage capacity, hardware ports, and functions of devices. It also covers concepts such as file compression, firewalls, and encryption.

Uploaded by

steisi ziuu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Information Technology Key Skills

Revision Worksheet K1

Answer ALL questions.

1. Write True or False next to the following statements.

The higher the speed of the processor, the faster the computer True
a operates.
False
b A 1.6GHz CPU is faster than a 2.4GHz CPU.

As the computer boots, parts of the operating system and drivers are True
c loaded into RAM.
True
d An open application takes up a certain amount of memory in RAM.

We usually store films, video clips, songs and documents in RAM for False
e later viewing.

2. The table below shows different types of storage together with their capacity. Sort
them in order of capacity.

Storage Device Storage Device

Blu Ray Disc (25GB) Smallest CD ROM

2TB Network Drive Memory Card

CD Rom (700MB) Pen Drive

Pen Drive (8GB) Blu Ray Disc

Memory Card (4GB) 250GB Hard Disc

250GB Hard Disk Largest 2TB Network Drive

Page 1 of 6
3. For each of the following computer devices, write the name and a short sentence to
describe its function. The first one has been done for you as an example.

Bar Code Reader – used to convert printed bar


codes to digital data.

b
Usb flash drive – is a portable storage
device, which can be used instead of a
floppy disk or CD.
c

Microphone – is an input device, used to capture audio


by converting sound waves into electrical signals.

d
Speakers are output devices which are
connected to the computer and generate
sound.

e
Scanner – is an input device which is used to
scan or take a picture of a document and
present it on the computer screen.

f
Webcam – is an input device which is used to
capture image and present it on the computer
screen.

g
Printer – is an output device which is used to
convert electronic data into flat media such as
paper in various sizes.

Page 2 of 6
4. (a) The two figures below show a USB port and an HDMI port. Identify the ports by
writing the name under each port.

i. _____________HDMI_______ ii. _________USB___________


port port

(b) Complete the following paragraphs using the words in the table below.

ports computer audio digital printers connection

Nowadays, the Universal Serial Bus (USB) is the most widely used hardware interface

for attaching peripherals to a ___computer__________________. There are at least two

USB

__________ports___________ on laptops and four on desktop computers. After


appearing in

1997, USB became the standard for connecting keyboards, mice,

____printers_________________ and hard drives, eventually replacing the PC's serial

and parallel ports. It is also used as a power source for many small electronic devices.

High-Definition Multimedia Interface (HDMI) is the modern standard for connecting

audio/video devices. It has replaced older _connection____________________ methods

such as composite and S-video. HDMI transfers ____digital_________________ signal,

and can handle both video and ______audio_______________ signals. HDMI is also

Page 3 of 6
one of the easiest ways to connect your various devices, and requires very little

configuration.

5. The figure below shows the properties of a hard disk. Analyse the data carefully and fill
in the gaps with the correct information.

a. The storage capacity of this

hard disk is

__149_________GB while

__82.1_________GB are
used.

b. The file system of this hard

disk is NTFS and it

has __66.8________GB

of free space.

c. Some of the files on a hard

disk can be

__compressed____________ to

save __disk____________
space.

Page 4 of 6
6. State whether the following statements about hard disks are True or False.

a Hard disks cannot be used for additional storage. False

All desktop computers have an internal hard disk for


b True
storage.

One cannot back up files on an external hard disk


c False
connected to a computer through a USB connector.

Disk clean up can be used on a hard disks to free disk


d True
space.

7. Fill in the blanks using the words shown in the table below.

hacker firewall encrypted anti-spyware

a. Internet based attacks on your computer are prevented by

___________firewall__________ software.

b. _Anti-spyware____________________ software will minimize the risk of your

computer from being infected by malicious programs.

c. Using an unsecured network is sometimes unavoidable. In such a case, the data

should be sent in an __encrypted____________________ format.

d. A computer __hacker____________________ is a skilled programmer who uses

unauthorised access to exploit information available on a computer.

Page 5 of 6
8. Match each term to its definition.
Term/s Definition
A type of malware designed to provide
A VOIP E
unauthorized remote access to a user’s computer.
The process of transforming information to make
B Dropbox G
it unreadable for unauthorized users.

C File Compression A Phone calls routed via LAN or the internet.


A digital audio file made available on the
D Network Port H
Internet for downloading.
A self-replicating computer program that
E Trojan Virus F penetrates an operating system with the intent of
spreading malicious code.
Used to connect the computer to a router or
F Worm Virus D
modem for an internet/network connection.
A free cloud storage service for sharing and
G Encryption B storing files including photos, documents and
videos.
A method in which the logical size of a file is
H Podcast C reduced to save disk space for easier and faster
transmission over a network or the Internet.

Page 6 of 6

You might also like