Computer Fundamentals
Information processing
Computer Networks
Cybersecurity
Web Design
100

A Joystick is an output device. (TRUE or FALSE)

FALSE

100

What is the difference between data and information

Data is raw unprocessed, facts while information is processed and meaningful.

100

What is a computer network?

A network is group of two or more computers linked together so that they can share resources and communicate

100

Define cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.

100

What does HTML stand for?

Hypertext Markup Language

200

What are two troubleshooting steps you can take if your computer won't power on?

Check power source

Ensure cables are properly plugged in

Try using a different outlet

200

Name three types of errors which can occur when entering data and explain each.

typographical: Spelling error

Software: software failure

Hardware: Hardware failure

Accidental/Deliberate

Transposition: switched numbers like 132 instead of 123

Transmission errors: errors which occur when sending data through different mediums

200

What are two disadvantages of computer networks?

It can be expensive

Viruses can spread across the network

200

Name two external cybersecurity threats.

natural disasters

power surge/spike

terrorist activities

200

This part of the website contains contact information and any copyright, legal or privacy notices.

Footer

300

What is RAM? 

Random Access Memory (RAM) is the physical hardware inside a computer that temporarily stores data, serving as the computer's "working" memory.

300

What is data validation? Provide two examples of data validation checks.

Data validation is the computerized checking of input data for errors before processing. It does not confirm the accuracy of data.

Eg: Range check, length check, consistency check

300

Name the four types of computer networks

LAN: Local area network

PAN Personal area network

WAN: Wide area network

MAN: Metropolitan area network

300

Name two methods of physical security you can implement to protect computer systems

locks

security systems

surveillance

alarms

guards 

fireproofing


300

When creating a website, what are two things you should consider?

target audience

time frame

number of webpages

content

layout

budget

400

Explain one pro and one con of Cloud storage

pros: access, unlimited, free for smaller amouts of storage

cons: requires internet access, may need to pay, vulnerable to theft/hacking.

400

Explain what is meant by Random file access?

With direct or random-access files, it is possible to go directly to a record without having to look at any other records.

400

What are three types/methos of wireless communication?

Infrared, bluetooth,Wifi

400

Explain the social impact of technology in the workplace

Less social contact among employees

Increase in the use of computer games (time wasting)

May be easier to communicate

Privacy concerns with personal data


400

What are breadcrumbs

Website breadcrumbs are a visual navigation tool that helps users locate where they are within a website’s content and how to return to an earlier page

500

Explain the purpose of custom-written software.

Written by programmers within a company or contracted out to a software house to meet the specific needs of a company.

500

Explain what is meant by Index Sequential Access.

Uses an index file to speed up searches on a sequential file.

500

A ______ network layout has no end. A break in a cable would affect the whole network. Which layout am I?

Ring

500

Define computer misuse and provide two examples

Computer misuse refers to any activities wherein a computer is used to improperly or illegally cause harm to somebody else or their property. 

Eg. identity theft, propaganda, phishing attacks, DOS attacks

500

Explain the association between a website and a webpage

A website is made up of connected webpages

M
e
n
u