0% found this document useful (0 votes)
16 views9 pages

June Test

The document discusses various topics related to computers and technology. It covers hardware and software components of computers, input/output devices, operating systems, types of computers, storage media, networks, security issues, and video conferencing equipment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views9 pages

June Test

The document discusses various topics related to computers and technology. It covers hardware and software components of computers, input/output devices, operating systems, types of computers, storage media, networks, security issues, and video conferencing equipment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

1.

A table computer consists of both hardware and software


a) Define the term hardware [2]
……………………………………………………………………………………………………
…………………………………………………………………………………………….... [2]
b) State the two types of software used by computers.
1. ..................................................................................................
2. .............................................................................................. [2]

2. One input device used on table computer is a touch screen


Name two other input devices built into a tablet computer
1……………………………………………………………………………………………………….
2………………………………………………………………………………………………………. [2]

3. Bluetooth is a method of wireless communication.


State two devices found in the home which could be connected via
Bluetooth.

1 .........................................................................................................

2 ......................................................................................................... [2]
4. Database, presentation, spreadsheet and word processing software are used
by a medical Centre.

Tick (✓) the most appropriate piece of software to carry out the tasks shown.

spreadsheet presentatio database


word processing (✓)
(✓) n (✓) (✓)

Producing a letter to send


out to patients

Creating graphs to show


numbers of people
attending the medical
centre

Creating queries from


patients’ details

Creating an interactive
display of services offered

[4]
5.

Write down the name of the interface shown above.


…………………………………………………………………………………………………… [1]

6. Smartphones use a Graphical User Interface (GUI).


a) Give three benefits of using a GUI.
1. ……………………………………………………………………………………………
………………………………………………………………………………………
2. ……………………………………………………………………………………………
………………………………………………………………………………………
3. ……………………………………………………………………………………………
…………………………………………………………………………………… [3]
7. Tick (✓) whether the following are features of operating systems containing a
command line interface (CLI) or a graphical user interface (GUI).

GUI (✓) CLI (✓)

Instructions have to be typed.

Applications are represented by icons.

Options are chosen from a menu.

Many instructions have to be memorized.

[4]

8. There are a number of different types of computer. Write down the type of
computer that best fits the following descriptions.
a) A computer that is difficult to move and has a separate monitor and
keyboard
…………………………………………………………………………………………….. [1]
b) A portable computer that includes a physical keyboard.
……………………………………………………………………………………………… [1]
c) A thin portable computer that has a touch screen and a battery in a
single unit, not normally used to make phone calls.
……………………………………………………………………………………………… [1]
d) A mobile phone that can be used as a computer.
………………………………………………………………………………………………. [1]
9. Tick (✓) whether the following are optical, magnetic or solid-state storage
media. [4]

magnetic Solid state optical


(✓) (✓) (✓)

SSD

CD

USB Drive

Portable hard disk drive

10. Hubs and switches are both used to enable devices to communicate with each
other in a network.
Describe the differences and similarities in the use of hubs and switches in a
network.
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………… [4]
11. A student has downloaded a file which contains a virus.
a) Describe the possible effects on his computer system if he opens the
file.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
………………………………………………………………………………………………. [2]
b) Explain how the student could prevent the computer from being
infected by viruses.
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………… [3]
c) Some files containing viruses have to be quarantined as they cannot be
deleted.
i. State the type of files that may have to be quarantined rather
than deleted.
…………………………………………………………………………………… [1]
ii. Explain how the software detects and quarantines the file.
..............................................................................................
..............................................................................................
..............................................................................................
..............................................................................................
..............................................................................................
..............................................................................................
......................................................................................... [3]

12. Circle two items that contain personal data. [2]

Bank card bar code laser printer

Medical record mouse sensor


13. A student has set up a password for his laptop computer. The password he
has chosen is Px2zY!Cg3?bd
a) Discuss the benefits and drawbacks of using this password.
........................................................................................................
........................................................................................................
........................................................................................................
........................................................................................................
........................................................................................................
........................................................................................................
........................................................................................................
........................................................................................................
........................................................................................................
........................................................................................................
........................................................................................................
........................................................................................................
........................................................................................................
................................................................................................... [6]
14. Workers in an office log onto the office computer network using a password.
Aaron is using his name as his password.
a) Give two reasons why this is not a good idea.
1......................................................................................................
......................................................................................................
2......................................................................................................
....................................................................................................[2]
15. The student could have protected his laptop computer by using two-factor
authentication. This could have combined his password with a biometric
method.
State two examples of biometric methods he could use.
1..............................................................................................................
2...........................................................................................................[2]

16. A company is setting up video conference.


Name three computer hardware devices they would need.
………………………………………………………………………………………………………………
………………………………………………………………………………………………………………
………………………………………………………………………………………………………… [3]
17. Members of the team can use video-conferencing to join business meetings
from different locations around the world.
Describe, giving reasons, three disadvantages of using video-conferencing
for business meetings rather than meeting in person.
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
..................................................................................................................
............................................................................................................ [6]
18. Audio conferencing refers to meetings held between people using audio
(sound) equipment. Audio conferencing can be done over the standard
telephone network (often referred to as a phone conference).
a) Describe four procedures to be carried out when making a phone
conference
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
……………………………………………………………………………………………………
…………………………………………….................................................... [8]

You might also like