Give 2 examples of computer modelling
personal finance, bridge and building design, flood water management, traffic management, weather forecasting
State the stages of the system life cycle
Analysis, design, testing, implementation, documentation, evaluation
Name 3 common physical safety issues
Trailing cables, Spilling drinks, Electrical overload and others
Name 3 purposes of a presentation
Entertain, inform, educate, persuade, advertise, motivate and others
What is spam?
Spam is junk mail that you haven’t asked for
Describe the functions of Point of Sale (POS) terminals in retail
where a customer pays for an item which then updates the stock files and orders new stock automatically
Name 5 validation routines
range, character, length, type, format, presence, check digit
What is the difference between phishing and pharming
Phishing redirects you to a fake website through a a link in an email while with pharming the server redirects you to the website
What is a dongle?
A device which contains a license key which can be plugged into a computer
Where does the term 'blog' come from?
Web log
What is OMR?
Technology used to capture human-marked data from documents. It detects marks made by individuals on paper forms and interpret them into digital data.
List 3 things that could be included in a system specification
Requirement specification, purpose of the system, data that needs to be input & output, how the data needs to be processed
Name a right of the data subject
To have inaccurate data corrected. To obtain and reuse the data for their own purposes. To object to the processing of their data. and others
Give 3 examples of work protected by copyright
movies, books, music, art/paintings
What is the role of an ISP?
Large organisations which give people internet access.
What are 3 benefits of 3D printing for medical tools and equipment?
Customising and personalising medical products, drugs, and equipment, Reducing costs, Increasing productivity, Extending the power of information in design and manufacturing
Is 'hardware and software requirements' part of user or technical documentation?
Both.
What is cloning/skimming? (in relation to fraud)
The copying of stolen credit or debit card information to a new card
Software has been installed on the school network. State the type of licence that must be bought to make this action legal.
Software liscence
What is the difference between the 'internet' and the 'world wide web'
The internet is a network of networks connecting computers all over the world while the www is a service on the internet
Explain how school management systems contribute to learner registration and attendance in educational institutions.
School management systems streamline learner registration and attendance processes by providing digital platforms to efficiently manage and track student information.
What is pilot running?
A new system is trialled in just one part of the organisation (if successful it is rolled out to other areas)
What is asymmetric encryption?
Encryption which uses two keys - one to encrypt the message and one to decrypt it.
How many years is work protected by copyright
For the life of the author plus 70 years after the author's death
What does the part of a URL, '.ac' stand for?
Academia