Chapter 1 Types and components of Computer Systems
Software
May-June 2020 Q1
Define the term software
Software is programs and data
Programs for controlling the operation of a computer
Programs for processing of electronic data
Oxford Textbook pg 1 & 2
Types of software
System software
Applications software
Oxford Textbook pg 2
CPU
May-June 2020 Q3a
Describe the CPU including its role
An item of hardware
It carries out the instructions of a computer program
It performs basic arithmetic calculations
It performs logical operations
It performs input/output operations of the computer
It contains the internal storage/control unit
Oxford Textbook pg 3
CLI
May-June 2020 Q2
Tick for correct statements
The user has to type in every instruction
Each instruction has to be typed in correctly
The user is in direct communication with the computer
Oxford Textbook pg 5
GUI
May-June 2020 Q2
Tick for correct statements
The user does not need to learn any of the instructions
Oxford Textbook pg 5
Type of Computers
May-June 2020 Q7
Pros and cons of Laptop as compared to Desktop
Max 3
Advantages
All elements are together in one unit therefore takes up less space
They are portable
Can be used in more places than a desktop
Disadvantages
Easier to steal/lose
Limited battery life so more likely to run out of power
Pointing devices can be more difficult to use
In built webscams can be more difficult to use rather than a desktop
If one piece of hardware breaks it can be more difficult to replace
Desktops have a better hear dispersion rate
More likely to be damaged as they are portable
Screen size may be smaller
Less powerful
Oxford Textbook pg 6 & 7
Chapter 2 Input and output devices
Direct data entry devices
May-June 2020 Q3b
Chip reader
Oxford Textbook pg 17 & 18
Bar code reader
Oxford Textbook pg 19 & 20
RFID reader
Oxford Textbook pg 18
Magnetic Ink Character Reader/MICR
Oxford Textbook pg 18
Chapter 4 Networks and the effects of using them
Types of Network
May-June 2020 Q6
WAN VS LAN VS WLAN
Given examples and decide the type of connection
Oxford Textbook pg 38
Data Protection Act
May-June 2020 Q10
Stated Most data protection acts include the principle that data should be accurate and, where
necessary, kept up to date.
List others
Oxford Textbook pg 42-43
Chapter 6 ICT Applications
Point of Sale (POS)
May-June 2020 Q9a
Devices
May-June 2020 Q9b
Steps needed to update stock sale when an item is scanned at the point of sale (POS) Terminal.
Oxford Textbook pg 70-71
Student Registration system
May-June 2020 Q10b
Advantages and disadvantages of using Fingerprint data
Advantages
Disadvantages
Oxford Textbook pg 63
Chapter 7 The Systems Life Cycle
Testing Strategies
May-June 2020 Q4b
Abnormal or Normal
Blood Group
Oxford Textbook pg 83
Validation
May-June 2020 Q4d
The age changes every year therefore it will need to be changed regularly; Administration of the database becomes more time consuming
The age of the donor can be easily and automatically calculated from their date of birth; improving accuracy
Data only needs to be entered once; reducing errors
Oxford Textbook pg 81, 82 ,83
May-June 2020 Q4e
Name the most appropriate validation check for the Health_number
Length check
Range Check
Oxford Textbook pg 81
Analysis
May-June 2020 Q10a
Analysis steps for Student Registration system (relate to Chapter 6)
Oxford Textbook pg 79-80
Chapter 8 Safety and security
Phishing. Pharming and Smishing
May-June 2020 Q5A
Compare and contrast phishing and pharming.
Max 4
Comparisons
Both use the internet
Both redirect the user to a fake website
Both can lead to fraud and identity theft
Both use websites that look legitimate
Personal data is compromised
Differences
Pharming
In pharming malicious code is uploaded to the computer
In pharming the code redirects the user to a fake website without their knowledge
Website in pharming appears to be genuine
In pharming spyware can be used to record key presses
Phishing
With phishing emails are sent to the computer
In phishing clicking a link sends user to a fake website
The email in phishing appears to have come from a trusted source
Oxford Textbook pg 93
May-June 2020 Q5b
Smishing
Methods to prevent smishing
Avoid clicking on any unknown texts with links
Avoid clicking links in texts from people you do not know
Do not reply to text messages that have asked you about any of your personal finances/details
Report any suspicious activity
Be on the lookout for messages that contain the number 5000 or any number that is not a phone number as this is used by smishers.
If the text messages urge you for a quick reply then that is a clear sign of smishing.
Do extensive research before replying to any message.
There are plenty websites that allow anyone to run searches based on a phone number and see any relatable information about whether or not a number is legitimate.
Never call back a phone number that was associated with the text from an unknown source.
If the message states 'Dear user, congratulations, you have won.' It is a clear sign of smishing.
Check the time when the unknown message was sent
If the text message was sent at an usual time, then that is another sign of smishing.
Oxford Textbook pg 93
Personal Data
May-June 2020 Q8a
Benefits and drawbacks of trying to keep personal data confidential and secure.