Information Processing
Computer networks
Web technologies
Computer misuse
Word Processing
100

A __________ error occurs when numbers or characters are entered in the wrong order


transposition

100

Provide an example of a PAN

a phone to smart watch connection

an iPad to macbook connection

100

What language is used to create webpages?

HTML

100

Name one advantage of information technology on work patterns.

The Internet and WANs have allowed employees to work from home (flexible hours, a more relaxed atmosphere and no commuting)


100

In which tab in Microsoft word can you find the "Mail Merge"

Mailings tab

200

In data validation, a ________ check ensures that data is actually entered

presence 

200

1G, 2G, 3G, 4G are all examples of what type of network?

mobile networks

200

What is WWW ? Explain.

A system of interlinked hypertext documents accessed via the internet, allowing users to view and navigate web pages that may contain text, images, videos, and other multimedia.

200

Name on disadvantage of information technology in terms of employment

Practical skilled jobs on the decline

Possible redundancies if a more efficient IT-based system replaces workers

200

Explain the purpose of creating a fillable form on Microsoft Word.

It is a convenient way to collect data from surveys, feedback, or any other purpose where you need to collect information.

300

What are the three methods of data verification

proof reading

double entry

visual check

300

What is bandwidth?

the speed at which data is carried across a transmission medium.

300

I am the quickest but most expensive network layout. What am I?

star

300

How has ICT impacted education?

access to information

collaborative teaching and learning

plagiarism

online tutoring

300

When creating a fillable form in Microsoft Word, which form control is used to solicit a yes/no type of response

Check box

400

When evaluating the reliability of information obtained from online sources, assessing the authenticity determines whether the information is up to date. TRUE or FALSE

FALSE

400

What are the two types of network configurations?

point to point and broadcast

400

Explain the process of "downloading" and "uploading"

Download: The process of receiving data from a remote server to a local device

Upload: The process of sending data from a local device to a remote server

400

___________ is the scrambling of data during storage or transmission so it cannot be understood by someone who does not have the key or software to convert it back to the original form.

Data encryption

400

Explain the purpose of a mail merge

Mail Merge is a powerful feature in Microsoft Word that allows you to create personalized documents by merging a document template with a data source.

500

Explain what a turnaround document is

A turnaround document is a computer-generated form that is sent to a third party, who is supposed to fill in the document and return it to the issuer. The information on the form is then used as the basis for data entry back into the computer system

500

Explain the difference between intranet, extranet and intranet

The internet is public and can be accessed by anyone.

Intranet is a subset of the internet and is used by companies/organizations. It can be accessed by employees.

An extranet is an organization’s private network and its available only for selected users (third parties).

500

What does FTP stand for and how is it used

File transfer protocol is used to transfer files between a client and a server on a computer network. FTP is commonly used for uploading and downloading files from web servers.

500

Explain what happens during a Dos (Denial of Service) attack

A Denial-of-Service (DoS) attack is a malicious attempt to disrupt the normal functioning of a computer, network, or service by overwhelming it with a flood of illegitimate requests.