1. Chapter 1 Types and components of Computer Systems
    1. Software
      1. May-June 2020 Q1
        1. Define the term software
          1. Software is programs and data
          2. Programs for controlling the operation of a computer
          3. Programs for processing of electronic data
          4. Oxford Textbook pg 1 & 2
        2. Types of software
          1. System software
          2. Applications software
          3. Oxford Textbook pg 2
    2. CPU
      1. May-June 2020 Q3a
        1. Describe the CPU including its role
          1. An item of hardware
          2. It carries out the instructions of a computer program
          3. It performs basic arithmetic calculations
          4. It performs logical operations
          5. It performs input/output operations of the computer
          6. It contains the internal storage/control unit
          7. Oxford Textbook pg 3
    3. CLI
      1. May-June 2020 Q2
        1. Tick for correct statements
          1. The user has to type in every instruction
          2. Each instruction has to be typed in correctly
          3. The user is in direct communication with the computer
          4. Oxford Textbook pg 5
    4. GUI
      1. May-June 2020 Q2
        1. Tick for correct statements
          1. The user does not need to learn any of the instructions
          2. Oxford Textbook pg 5
    5. Type of Computers
      1. May-June 2020 Q7
        1. Pros and cons of Laptop as compared to Desktop
          1. Max 3
          2. Advantages
          3. All elements are together in one unit therefore takes up less space
          4. They are portable
          5. Can be used in more places than a desktop
          6. Disadvantages
          7. Easier to steal/lose
          8. Limited battery life so more likely to run out of power
          9. Pointing devices can be more difficult to use
          10. In built webscams can be more difficult to use rather than a desktop
          11. If one piece of hardware breaks it can be more difficult to replace
          12. Desktops have a better hear dispersion rate
          13. More likely to be damaged as they are portable
          14. Screen size may be smaller
          15. Less powerful
        2. Oxford Textbook pg 6 & 7
  2. Chapter 2 Input and output devices
    1. Direct data entry devices
      1. May-June 2020 Q3b
        1. Chip reader
          1. Oxford Textbook pg 17 & 18
        2. Bar code reader
          1. Oxford Textbook pg 19 & 20
        3. RFID reader
          1. Oxford Textbook pg 18
        4. Magnetic Ink Character Reader/MICR
          1. Oxford Textbook pg 18
  3. Chapter 4 Networks and the effects of using them
    1. Types of Network
      1. May-June 2020 Q6
        1. WAN VS LAN VS WLAN
          1. Given examples and decide the type of connection
          2. Oxford Textbook pg 38
    2. Data Protection Act
      1. May-June 2020 Q10
        1. Stated Most data protection acts include the principle that data should be accurate and, where necessary, kept up to date. List others
          1. Oxford Textbook pg 42-43
  4. Chapter 6 ICT Applications
    1. Point of Sale (POS)
      1. May-June 2020 Q9a
        1. Devices
      2. May-June 2020 Q9b
        1. Steps needed to update stock sale when an item is scanned at the point of sale (POS) Terminal.
      3. Oxford Textbook pg 70-71
    2. Student Registration system
      1. May-June 2020 Q10b
        1. Advantages and disadvantages of using Fingerprint data
          1. Advantages
          2. Disadvantages
        2. Oxford Textbook pg 63
  5. Chapter 7 The Systems Life Cycle
    1. Testing Strategies
      1. May-June 2020 Q4b
        1. Abnormal or Normal
          1. Blood Group
          2. Oxford Textbook pg 83
    2. Validation
      1. May-June 2020 Q4d
        1. The age changes every year therefore it will need to be changed regularly; Administration of the database becomes more time consuming
        2. The age of the donor can be easily and automatically calculated from their date of birth; improving accuracy
        3. Data only needs to be entered once; reducing errors
        4. Oxford Textbook pg 81, 82 ,83
      2. May-June 2020 Q4e
        1. Name the most appropriate validation check for the Health_number
          1. Length check
          2. Range Check
          3. Oxford Textbook pg 81
    3. Analysis
      1. May-June 2020 Q10a
        1. Analysis steps for Student Registration system (relate to Chapter 6)
          1. Oxford Textbook pg 79-80
  6. Chapter 8 Safety and security
    1. Phishing. Pharming and Smishing
      1. May-June 2020 Q5A
        1. Compare and contrast phishing and pharming.
          1. Max 4
          2. Comparisons
          3. Both use the internet
          4. Both redirect the user to a fake website
          5. Both can lead to fraud and identity theft
          6. Both use websites that look legitimate
          7. Personal data is compromised
          8. Differences
          9. Pharming
          10. In pharming malicious code is uploaded to the computer
          11. In pharming the code redirects the user to a fake website without their knowledge
          12. Website in pharming appears to be genuine
          13. In pharming spyware can be used to record key presses
          14. Phishing
          15. With phishing emails are sent to the computer
          16. In phishing clicking a link sends user to a fake website
          17. The email in phishing appears to have come from a trusted source
        2. Oxford Textbook pg 93
      2. May-June 2020 Q5b
        1. Smishing
          1. Methods to prevent smishing
          2. Avoid clicking on any unknown texts with links
          3. Avoid clicking links in texts from people you do not know
          4. Do not reply to text messages that have asked you about any of your personal finances/details
          5. Report any suspicious activity
          6. Be on the lookout for messages that contain the number 5000 or any number that is not a phone number as this is used by smishers.
          7. If the text messages urge you for a quick reply then that is a clear sign of smishing.
          8. Do extensive research before replying to any message.
          9. There are plenty websites that allow anyone to run searches based on a phone number and see any relatable information about whether or not a number is legitimate.
          10. Never call back a phone number that was associated with the text from an unknown source.
          11. If the message states 'Dear user, congratulations, you have won.' It is a clear sign of smishing.
          12. Check the time when the unknown message was sent
          13. If the text message was sent at an usual time, then that is another sign of smishing.
          14. Oxford Textbook pg 93
    2. Personal Data
      1. May-June 2020 Q8a
        1. Benefits and drawbacks of trying to keep personal data confidential and secure.
          1. Benefits
          2. Max 5
          3. Drawbacks
          4. Max 5
          5. Oxford Textbook pg 89-90
    3. Spam
      1. May-June 2020 Q8b
        1. what is meant by the term spam email.
      2. May-June 2020 Q8c
        1. Explain why spam email should be prevented.
      3. Oxford Textbook pg 91-92
    4. Authentication Methods
      1. Biometric
        1. Examples of Biometrics
          1. Oxford Textbook pg 92
  7. Chapter 18 Data Manipulation
    1. Data Type
      1. May-June 2020 Q4a
        1. Question 1
        2. Numeric: Integer/Text: Alphanumeric
        3. Question 2
        4. Date/time
        5. Question 3
        6. Boolean/logical
        7. Question 4
        8. Text/Alphanumeric
        9. Oxford Textbook pg 174
    2. Query
      1. May-June 2020 Q4c
        1. Oxford Textbook pg 178
        2. Gender = F AND Blood_group = A OR Blood_group =AB