0% found this document useful (0 votes)
28 views10 pages

ICT Questions

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views10 pages

ICT Questions

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Information and Communication Technology

~Aastha Jain
Basics:
Q1. Ways in which personal data could be misused with prevention:
Ans. Ways in which it could be misused:
 Hackers may read the data and pass it on
 Hackers may delete the data
 Hackers may amend the dataWays in which it can be prevented:

 Username/ Passwords
 Do not connect to network
 If connected to network use dedicated lines
 Physical security: use locks on computer room doors
 Firewall
Q4. Advantages and disadvantages of video conferencing:
Ans. Advantages:
 Workers can use own office so documents do not get lost in transit/bulky documents/equipment do not have to
be carried around
 Company can call meeting at short notice
 Employees can work from home
 Company does not have to pay travelling expenses
 Company does not have to pay hotel expenses
 Company does not have to pay for conference room facilities
 Travelling time is saved
 Might be dangerous to fly/travel
 Disabled people may find it difficult to travel
Disadvantages:
 Takes time to train employees
 Difficult to call international meetings because of time differences
 Initial cost of hardware
 Equipment can break down
 Strength of signal/bandwidth/lip-sync can be a problem/connection can be lost/power cuts
 Loss of personal/social contact
 Takes time for workers to learn new technology
 Can’t sign documents
Q6. Why pen drives are preferred over CDs:
 Pen drives have greater storage capacity
 Pen drives are more portable
 Not all machines have CD drives
 Faster access to data
 More robust
 More secure are biometric data can be incorporated
 Don’t need specialist hardware/software for pen drives
Q14. The main memory in computers is becoming very large. Why is backing storage still need?
 Data in the main memory can be lost if computer shuts down
 Data in the main memory can be corrupted
 Data in the main memory can be accidently deleted
 Data/software may need to be switched from machine to machine
Q15. Describe the role of a proxy server when a LAN is connected to the internet:
 Can act as web server
 Can act as buffer(b/w internet and LAN)
 Server passes on requests to the internet
 Passes the requested pages to individual computers
 Can cache/store the webpages
 Subsequent requests for that/those web page(s) are responded more quickly
 Can be used to monitor internet usage
 Can block certain sites

Networks:
Q1. Advantages and disadvantages of having computers networked:
Ans. Advantages:
 Share hardware/software
 Share data/information
 Electronic communication
 Users can be more effectively controlled/monitored
Disadvantages:
 Work can be misused more easily
 Viruses more easily spread
 Printer queues
 Slower access to the internet
 If server crashes all computers are affected
 Increased security risk
Q2. Describe the advantages and disadvantages to the shops from shopping from home using the internet.
Ans. Advantages:
 Fewer staff needed/less spent on wages
 Fewer shops needed/less spent on rates/rent
 Less actual cash handled/fewer robberies
 Less money spent on security staff
 Potentially larger customer base
Disadvantages:
 Initial outlay on computers is expensive
 Need to retrain staff
 Less customer loyalty/loss of customers due to lack of personal touch
 Costs of system maintenance
 Greater costs due to more delivery staff
Q3. Describe the advantages and disadvantages to the customers from shopping from home using the internet.
Ans. Advantages:
 Less danger of mugging
 Don’t have to waste time travelling (long distances to shops)
 Elderly/Disabled people don’t have to travel/leave home to shop
 Don’t have to spend money on travelling expenses
 Greater choice of goods
 Can shop when shops are closed
 Easier to search what you are looking for
Disadvantages:
 Lack of socialising/social contacts
 Customers must have a computer/internet access/(basic) computer skills
 Hackers may intercept data and defraud customer
 Deprived of personal touch
 Phone bills can increase
 Without broadband other household members cannot use phone
 Cannot see/feel goods in reality
 More vulnerable to phishing
 Goods sometimes don’t arrive/substitute goods may be sent/take longer to arrive
 Must have credit/debit card if COD not available
 Shipping charges may be added
Q4. Differences between internet and intranet:
 Internet is INTERnational NETwork
 It’s WAN
 Can access from anywhere
 Greater amount of information available
 Unlimited access
 Intranet is INTernal Restricted Access NETwork
 Usually LAN
 Password controlled pages
 Behind a firewall
 Restricted access
Q5. Difference b/w WAN and LAN:
 WAN is wide area network
 WAN covers a large geographical area/worldwide
 The internet is a WAN
 LAN is local area network
 LAN covers a small area such as one building/a school network is a LAN
 A WAN consists of connected LANs
 More difficult to share peripherals using a WAN
Q7. Ways to evaluate the reliability of information found on a website:
 Check the last part of the URL/.gov, .ac, .ed, .sch should be reliable/.org, .co, .com are less reliable
 See if responsible bodies have endorsed the site e.g. NGFL
 Check the date of last update
 Are any advertisements present
 Are there links to and from the website to and from known reliable websites?
 Checking the author’s credentials
Q9. Disadvantages of bluetooth for creating networks:
 Very slow data transfer speeds
 Short distance of coverage/limited signal strength
 Greater risk of interception of data/less secure
 Supports limited number of devices in a network
 ls

Expert systems/Computer modelling/Systems designed by programmers:


Q1. Reasons why some situations need to be modelled:
Ans. Real thing may be:
 Too dangerous
 Too expensive
 Too large a time scale required
 Wasteful of materials
 Too vast a scale
Q5. Explain the verification checks:
1. Data is entered twice/By two people/Data versions are compared by computer/If versions are different, typist
is alerted
2. Data on screen or in system/is visually compared with/that data on original copy
Q6. Difference between verification and validation check:
 Validation is checking data entered. It is acceptable/reasonable/within a given range
 Verification is checking versions of data have been entered identically/is checking data has been copied
correctly from one medium to another
Q7. Name the different validation checks:
 Range check
 Check digit
 Control total
 Hash total
 Invalid character check/type check
 Picture/format check/input mask
 Presence check
 Existency check
 Length check
Q8. Describe how an expert system for diagnosing diseases will be created andevaluated:
 Doctors interviewed for requirements
 Data is collected from experts
 Knowledge base is designed/created
 Rule base is designed/created
 Interfence engine is designed/created
 Output format is designed/created
 Input Screen is designed/created
 Ailments with known diagnosis are used to test the system and results valuated
 Does new system match original system specification
 Interviewing experts in that field about effectiveness of system
Q9. Where are expert systems usually used?
 Medical diagnosis
 Car engine fault diagnosis
 Mineral/oil prospecting
 Tax
 Careers
 Chess games
 Animal/plant/rock classification/identification
Q10. Describe features that would help a user navigate between input forms.
 Button to close form
 Button to first record/form
 Button to end file/new record
 Button to previous record/form
 Button to next record/form
 Submit/continue button
 Space to enter required record number
 Search facility/engine
 Button to go to sub forms
Q11. Examples of computer modelling:
 Flight/pilot stimulation/training
 Large scale chemical experiments
 Design of fairground rides
 Design of large buildings/bridges
 Traffic control
 Building fire stimulation
 Car driving stimulations
 Drug trials
Q13. Effects of microprocessor controlled labour saving devices on a person’s lifestyle:
 They do much of housework
 Do not need to do many things manually
 Do not need to be in house when food is cooking
 Do not need to be in house when clothes are being washed
 Can leave home to go shopping/work any time of the day
 Greater social interaction/more family time
 More time to go out/more leisure time/more time to do other things/work
 Can lead to unhealthy eating due to dependency on ready meals
 Can lead to laziness/lack of fitness
 Can encourage a healthy lifestyle cause of smart fridges analysing food constituents
 Microprocessor controlled burglar alarm provides sense of security
 Do not have to leave home to get fit
 Manual household skills are lost

Q14. Describe the inputs, outputs and processing involved in a house burglar alarm system.
Ans. Inputs:
 Pressure pad
 Light sensors
 Temperature sensors
 Contact switches/push switch
 Input keypad
 Pass number input to keypad
 Zones selected
 Sound sensor
 Infrared sensor/proximity sensor
 Motion sensor/movement sensor
 Digital/video camera
Processing:
 Microprocessor continually monitors sensors
 If light sensor beam interrupted:
 If movement sensor activated:
 If contact switch activated:
 If pressure sensed by processor is greater than pre-set value:
 If temperature sensed by processor is greater than pre-set value:
 Microprocessor sends signals to output device
Output:
 Alarm light flashes/lights come on
 Alarm sound
 Signal automatically sent to police
Q17. Evaluation strategies with purpose:
 S: Compare the solution with the original task requirements/design belief
 P: To ensure that requirements have been met
 S: Identify any limitations/necessary improvements to the system
 P: So that system works without problems
 S: Collect data from the users on the new system
 P: To see how well they are coping with the new system/to see how well the new system works
 S: Analyse/evaluate the users’ responses to the results of testing/using the system
 P: So that users needs re taken into account
Q18. Features of a well deigned screen input form:
 Data fills screen
 Clearly defined input area for each field
 Tick boxes/radio buttons to enter choices
 Drop down menus to select data options
 Appropriate spacing for each filed
 An easy to read font/font size
 A sensible font colour/background colour
 Easy to follow instructions for completing screen/help icon
 No overlapping items
Q20. Why pilots are trained using flight simulators rather than by flying real aircrafts:
 If airplane crashed you wouldn’t need to replace it saving money
 If the airplane crashed nobody is injured
 It is easy to recreate extreme weather conditions
 It is easy to recreate unusual flying conditions
 Can recreate mechanical/computer failure from previous real situations
 Cheaper fuel costs
Q21. Describe actions which might need to be taken as a result of testing a system:
 Data files may need to be amended/improved
 Validation rules may need to be amended/improved
 Input methods may need to be amended/improved
 Output formats may need to be amended/improved
 Errors in processing/calculations may need amending/correcting
 Errors may mean that parts of system need amending/correcting
 If system does not work at all may need to restart at the design system
Q22. What items in a system need to be tested?
 Data/file structures
 Validation routines
 Input methods/data entry screens
 Output formats/reports
 Error messages
 Processing/calculations
Q24. Describe what is meant by live data and how it is used to test a system:
 Data that has already been used I the previous system
 Data that has known result
 A table of expected results drawn up
 Live data is input to the system
 Actual results are recorded
 The results are compared
 Any resulting differences will highlight limitations of the system
Q25. Items present in technical but not user documentation:
 Program coding
 Program flowcharts
 System flowcharts
 File structures
 List of variables
 Validation routines
Q26: Benefits and drawbacks of computer modelling:
Benefits:
 Real thing may be too expensive to build
 Real thing requires too large a time scale
 Real thing would be too wasteful of materials
 Real thing is too vast a scale
 Easier to change data/variables
 Costs less to change data/variables
 The real thing may be impossible to access/create
 Real thing may be too dangerous
 You can test predictions more easily/model can make predictions more accurately
 You can ask many whatif questions which would be impractical in real life
Drawbacks:
 Can never allow for all eventualities
 Difficult to exactly recreate a lifelike situation
 Hardware and software may be expensive
 Workers will need to be trained to use the system

Steps questions:
Q5. Batch processing of bank cheques:
 Cheques are collected together
 During the course of the day
 Cheques are then processed all at once
 Cheques are processed overnight
 Bank accounts updated following morning
 No human intervention
Q6. Navigation buttons on screen input:
 Back/previous record button/arrow/facility
 Forward/net record button/arrow/facility
 New record button/arrow/facility
 Submit/save button/facility
 Last record button/facility
 Exit button/return to homepage button/facility
 Move to top of page if long button
 Search facility
Q7. Describe the online processing of data, using the booking of airline tickets as an example:
 User/customer is in direct contact with the main computer/CPU
 Appears that nobody else can access system at that point/processing is almost immediate
 Computer asks customer for details of flight
 Computer asks for personal details of passengers
 Computer searches for matching flights
 Computer may display list of seats available
 Computer may ask customer to select a seat
 (Customer selects seat from those available and) computer flags seat as booked
 Computer asks customer to complete payment details
 Computer checks details are valid by communicating with customer’s bank
 Computer checks if sufficient funds
 Airline’s database is updated immediately
 Number of seats available reduces by number booked
 Prevents double booking
 Confirmation/e-ticket may be sent to customer by email

Health and safety of self and data:


Q3. Define encryption in detail:
 Causes data to be scrambled/encoded
 Requires encryption key/software to encrypt
 Requires decryption key/encryption software to decrypt
 Results in data which is not understandable/readable
 Protects sensitive data from being understood if falls into wrong hands
Q4. Actions that break the copyright law of software:
 Giving software copies to others without the owner’s permission
 Making a copy of a disk without the owner’s permission
 Selling copies of the software without the owner’s permission
 Using the software on a network when the licence does not allow it
 Renting out the software on a network when the licence does not allow it
 Renting out the software/sharing software with others without the owner’s permission
 Using the copyright name on another software
 Amending the software/using parts of code in own programs without permission
 Buying pirated software
Q5. Describe some authentication techniques and give benefits and drawbacks of each:
 User ID and password
 Benefit – each user ID could be unique/only user will know the password/data can only be accessed by person
who knows the password/Password can be changed frequently to avoid hackers guessing them/Unsuccessful
logins can throw you out of the system
 Drawback – user might forget password/keylogging software can be used to intercept it
 Biometrics
 Benefit – each user has unique biometrics
 Drawback – equipment is expensive to buy/may be difficult or expensive to get equipment to user
 Magnetic/chip card with PIN
 Benefit – Hacker needs to have the card and know the PIN
 Drawback – can lose the card/can forget PIN
 TAN
 Benefit – Always changing so a hacker would not be able to use it even if they intercepted it when user typed
it in.
 Drawback – need to have card and remember PIN and use it within a short period of time.
Q6. What is software copyright?
Ans. It is lawful protection given to authors and publishers which relates to the software the author/publisher
created/published. It prevents purchaser from making unlimited copies/lend it to others/change the software/sell it
without the company’s permission.
Q7. How software manufacturers attempt to prevent copyright being broken:
 Alteration of the code which is included to block copying
 Digital signature on the CD/DVD itself which prevents writers from copying exactly
 Encryption of the execution code requires a key to run
 Use of a dongle
 Registration system requiring the typing in of a registration code
 “Guards” are hardware or software modules that monitor the running program and ensure that it has not been
tempered with in any way
 Activation code which can be used only on a limited number of machines
Q9. What’s a computer virus?
Ans. A piece of programming software/code which replicates itself and corrupts/deletes files/data. It can corrupt or
erase the contents of the hard disc/can completely fill the hard disc/memory. It is transmitted through email
attachments/portable media.
Q10. What is meant by hacking?
 Gaining unauthorised access to a computer system
 May lead to illegally copying data from a system
 May lead to illegally amending data in a system
 May lead to illegally deleting data form a system
 Gaining unauthorised access to a system but exceeding their authority
Q12. Why are authentication techniques necessary?
 Authentication techniques such as user names and passwords identify the user to the system
 Without authentication anybody would be able to access data
 Hackers would be able to amend/delete data without being prevented
 Would have to rely on other methods such as firewalls to prevent unauthorised access.

Others:
Q1. Robotics are now used in the production of motor cars. Describe the effects this had on the workers who used to
manually produce cars.
 Increased unemployment
 Have had to retrain
 Increased employment(Introduction of new jobs in the IT field)
 Less noise/more pleasant environment
 Safer environment
 Less heavy lifting/healthier work
 Workers can be deskilled
Disadvantages:
 Takes time to train employees
 Difficult to call international meetings because of time differences
 Initial cost of hardware
 Equipment can break down
 Strength of signal/bandwith/lip-sync can be a problem/connection can be lost/power cuts
 Loss of personal/social contact
 Takes time for workers to learn new technology
 Can’t sign documents
Q2. Put formula in cell(s) without typing when it is already present in one cell:
 Highlight the cell in which the formula is/copy/highlight range of cells in which you want the formula/paste
 Highlight the cell in which the formula is/using fill handle or little black cross or cross in bottom right hand
corner of a cell/drag down till required cell
 Highlight the cell in which the formula is/highlight range of cells in which you want the formula/click on
fill/click on down
Q4. Features of a relational database which are not found in a flat file:
 More than on table/file
 Tables are linked
 Primary keys
 Foreign keys
 Less duplication of data
 Data from more than one table can be used in the same report
Q7. How can two flat files be combined to form a relational database?
 The personal details file and test results would be saved as separate tables
 Primary key/key field(s)/foreign key would be identified
 The primary key would be used to link the two tables together
Q8. Features of presentation software not in printed copy with use (school presentation):
1. Animation: To move images or text
2. Video: Video of school plays/performances/sports events
3. Sound: Background music/school concerts/voiceovers/sound effects when changing/opening slide
4. Hyperlinks: To link to other slides
5. Slide transitions: To keep the viewer’s attention
Q9. Explain the use of the $ symbol in the spreadsheet:
Ans. Absolute cell referencing is being used. When formulae are replicated some cell references must remain
unchanged. This makes sure they will stay consistent when replicated.
Q10. Describe how use of robots on car production lines has affected the nature of employment in the car industry:
 Car workers have been made unemployed
 Car workers have had to be retrained
 Car workers have become deskilled
 More technical staff have been employed
 Work areas are cleaner
 There is a healthier environment
 Workers have a safer environment
 Fewer manual tasks
Q12. Use of check digit:
 Computer calculates check digit from numbers in bar code number
 Compares calculated check digit with that recorded in bar code number
 If same, proceeds with transaction, otherwise sounds warning signal/issues error message
Q14. Difference between measurement and control:
Ans. Measurement is the monitoring of physical variables without the microprocessor taking action. Control is when
the microprocessor takes action depending on sensor readings.

You might also like