Chapter 01 Types and components of a computer system
Chapter 02 Input and output devices
Chapter 03 Storage devices and media
Chapter 04 Networks and the effects of using them
Chapter 05 The effetcs of using ICT
Chapter 06 ICT applications
Chapter 07 Systems life cycle
Chapter 08 Safety and security
Chapter 09 Audience
Chapter 10 Communication
100

It is a general term for the physical components that make up a computer system.

Computer Hardware

100

A device used to store data permanently

storage device

100

RSI stands for

Repetitive Strain Injury

100

What stage is this,

Look at the existing system and find areas to improve

Analysis Stage

100

Send out to recipients from a mailing list. They are basically unwanted emails.

Spam

200

It is a general term for the programs that control the computer system.

Computer Software

200

storage that can be accessed from anywhere using the internet

Cloud storage

200

It is a tiny cpu built onto a single chip to control electronic devices.

Microprocessor

200

Which stage comes after Design?

Development and Testing

200

Is based on personal experiences and usually updated by one author.

Blog

300

If you are shopping at Walmart and you need to know the price of an item, you could use a _____________.

Barcode Scanner

300

Two or more electronic devices, connected together so that they can exchange data.

Network or Computer Network

300

What is VoIP?

Voice over internet protocol

300

"I went to a company as a system analyst, sat down to see how the current system works. I did not talk to anyone." Which research method is described above?

Observation

300

It is a worldwide public network.

Internet

400

What does OMR stand for?

Optical Mark Recognition

400

used to connect multiple computers to a single LAN network, using BROADCAST to send data.

Hub

400

EFT stands for:

electronic funds transfer

400

The action of sending emails to fraudulently obtain another person's bank details is called:

Phishing

400

A privacy prevention technique by using a unique number while installing a software to prove the software originality.

Product Keys

500

Hardware devices that allow data to be transmitted to the computer is called?

Input Devices

500

Which network device has the capability to send the data packets to a specific port or a device within LAN.

Switch

500

An email sent to the customer which they printouts as their proof of purchase or as printed copy when they go to the theatre or travelling by flight


e-ticket

500

A piece of programming code which maliciously deletes files is called

Virus

500

A software prevention technique where users are required to agree to the term of use before the installation can be completed.

License agreements