Topic 6
Topic 7
Topic 8
Topic 9
Topic 10
100

Give 2 examples of computer modelling

personal finance, bridge and building design, flood water management, traffic management, weather forecasting

100

State the stages of the system life cycle

Analysis, design, testing, implementation, documentation, evaluation

100

Name 3 common physical safety issues

Trailing cables, Spilling drinks, Electrical overload and others

100

Name 3 purposes of a presentation

Entertain, inform, educate, persuade, advertise, motivate and others

100

What is spam?

Spam is junk mail that you haven’t asked for

200

Describe the functions of Point of Sale (POS) terminals in retail

where a customer pays for an item which then updates the stock files and orders new stock automatically

200

Name 5 validation routines

range, character, length, type, format, presence, check digit

200

What is the difference between phishing and pharming

Phishing redirects you to a fake website through a a link in an email while with pharming the server redirects you to the website

200

What is a dongle?

A device which contains a license key which can be plugged into a computer

200

Where does the term 'blog' come from?

Web log

300

What is OMR?

Technology used to capture human-marked data from documents. It detects marks made by individuals on paper forms and interpret them into digital data.

300

List 3 things that could be included in a system specification

Requirement specification, purpose of the system, data that needs to be input & output, how the data needs to be processed

300

Name a right of the data subject

To have inaccurate data corrected. To obtain and reuse the data for their own purposes. To object to the processing of their data. and others

300

Give 3 examples of work protected by copyright

movies, books, music, art/paintings

300

What is the role of an ISP?

Large organisations which give people internet access.

400

What are 3 benefits of 3D printing for medical tools and equipment?

Customising and personalising medical products, drugs, and equipment, Reducing costs, Increasing productivity, Extending the power of information in design and manufacturing


400

Is 'hardware and software requirements' part of user or technical documentation?

Both.

400

What is cloning/skimming? (in relation to fraud)

The copying of stolen credit or debit card information to a new card

400

Software has been installed on the school network. State the type of licence that must be bought to make this action legal.

Software liscence

400

What is the difference between the 'internet' and the 'world wide web'

The internet is a network of networks connecting computers all over the world while the www is a service on the internet

500

Explain how school management systems contribute to learner registration and attendance in educational institutions.

School management systems streamline learner registration and attendance processes by providing digital platforms to efficiently manage and track student information.

500

What is pilot running?

A new system is trialled in just one part of the organisation (if successful it is rolled out to other areas)

500

What is asymmetric encryption?

Encryption which uses two keys - one to encrypt the message and one to decrypt it.

500

How many years is work protected by copyright

For the life of the author plus 70 years after the author's death

500

What does the part of a URL, '.ac' stand for?

Academia