Theory Flashcards
Which type of chart is recommended to illustrate a trend over a period of time?
Line chart
Line charts are typically used for showing trends over time.
What is the term for a device on a network that allows or prevents access to certain ports or communication channels?
Firewall
Firewalls are essential for network security.
________ is the process of tricking users into following a hidden link on a web page.
Click-jacking
Click-jacking is a security vulnerability that can lead to unauthorized actions.
A trend whereby objects and devices are connected to each other via the internet is called ________.
IoT
IoT stands for the Internet of Things.
When an internet service is given a higher priority than other services, it is called ________.
Shaping
Shaping helps manage bandwidth and prioritize traffic.
True or False: Two-factor authentication is a security measure that requires only a username and password.
False
Two-factor authentication requires an additional verification step, such as a one-time pin.
Which word processing feature cannot be used to make multiple changes at the same time when formatting a document?
Styles
Styles apply a specific format but do not allow for multiple changes like Find and Replace.
Match the term ‘evidence’ from COLUMN B to its definition in COLUMN A.
2.2
Evidence refers to data organized in a meaningful way.
A device used by hearing-impaired people is commonly referred to as a ________.
Vibrating panel
This device assists in communication for those with hearing loss.
True or False: Spyware is a banner or pop-up window that appears while you are browsing the internet.
False
Spyware is software that secretly gathers user information without permission.
What is the term for data organized in a meaningful way?
Information
Information is processed data that is useful for decision-making.
What type of cable is used to transmit high-quality video and audio signals?
HDMI
HDMI stands for High-Definition Multimedia Interface.
________ is an example of a hard copy.
Printed output
A hard copy refers to physical printed documents.
Which feature ensures that a watermark only displays on the first two pages of a document?
Section break
Section breaks are used to control formatting in specific parts of a document.
What is the term for the field property setting in Access that ensures a field cannot be left blank?
Required
This setting is crucial for maintaining data integrity.
A control on the Developer Tab best suited for use with open-ended questions is a ________.
Drop-down form field
Drop-down fields allow users to select from predefined options.
What is spyware?
A banner or pop-up window that appears while you are browsing the internet.
Spyware can track user activity without consent.
What is a data label?
A visual indicator on a graph of related sets of values in a worksheet.
Data labels help in identifying data points clearly.
What is an error in the program code known as?
A Trojan.
Trojans can disguise themselves as legitimate software.
What does 802.11 refer to?
A set of specific standards and protocols for a wireless network.
802.11 is commonly associated with Wi-Fi technology.
What is a radio button group?
Allows a user to select multiple options in a form.
Radio buttons are typically used for single-choice selections.
What application suite is advertised in both laptops A and B?
Office 365.
Office 365 includes various productivity applications.
Give two reasons why an operating system is required.
- Manages hardware resources
- Provides a user interface.
Suggest an alternative operating system for any of the laptops above.
Linux.
Linux is known for its flexibility and open-source nature.
Identify a high-definition input device in the advertisement.
720p webcam with privacy shutter.
High-definition webcams are essential for video conferencing.
Give one advantage of SSDs over HDDs in laptops.
Faster data access speeds.
SSDs significantly improve boot and load times.
Give two reasons why you would recommend Laptop B.
- More RAM
- Better processor.
Define the term resolution.
The detail an image holds, measured in pixels.
Higher resolution means more detail.
Name the process of creating folders and organizing files to work more efficiently on a computer.
File management.
Name two locations where you could create shortcuts to folders/applications on a computer.
- Desktop
- Taskbar.
Give two disadvantages of using online storage compared to local storage.
- Dependent on internet connectivity
- Potential security risks.
Give one example of multitasking.
Running a word processor and a web browser simultaneously.
Explain two ways in which to safeguard data from being deleted or altered.
- Regular backups
- Use of antivirus software.
Briefly explain the purpose of drivers.
To allow the operating system to communicate with hardware devices.
Give two advantages for using web-based applications.
- Accessibility from any device
- Automatic updates.
Give two examples of Windows utility programs.
- Disk Cleanup
- Task Manager.
Give two reasons why buffering occurs when streaming a video.
- Slow internet connection
- High video quality settings.
Discuss two reasons why having a server in a school network is advisable.
- Centralized data management
- Improved resource sharing.
Explain what a blog is.
A website consisting of informational or personal entries in reverse chronological order.
Give two advantages of podcasts.
- Accessibility to a wide audience
- Ability to listen on-the-go.
State two factors that will impact internet data usage.
- Streaming services
- Number of connected devices.
Give two examples where grid computing can be used.
- Scientific research
- Large-scale data analysis.
State two guidelines to follow when communicating with teachers on social media.
- Maintain professionalism
- Respect privacy.
Give two possible reasons why the principal is not receiving a specific email with attachments.
- Email service provider blocking
- Incorrect email address.
Which data collection tool would you recommend for collecting data using a questionnaire?
Online survey tools.
Online tools can streamline data collection and analysis.
Briefly explain what information sifting is.
The process of filtering and organizing data to extract useful information.
How can she ensure that a description of the picture appears in the table of figures?
By adding a caption to the image.
Name two word processing features that can be used to give recognition to the sources.
- Footnotes
- Bibliography.
Briefly explain two ways in which a spreadsheet chart can enhance a PAT report.
- Visual representation of data
- Easier comparison of values.
Name two requirements when setting research questions.
- Clarity
- Relevance.
Give two advantages of ICTs in society.
- Improved communication
- Enhanced access to information.
Discuss two effects of having a malicious bot/zombie computer on a network.
- Increased security risks
- Network performance degradation.
Briefly explain the concept of information overload.
The difficulty in processing too much information.
State two ways in which information overload has an influence on a person’s life.
- Increased stress
- Difficulty in decision-making.
Briefly explain the term identity theft.
The unauthorized use of someone else’s personal information.
State two ways in which you can avoid becoming a victim of identity theft.
- Use strong passwords
- Monitor financial statements.
What is the purpose of a COUNTA function?
To count non-empty cells in a range.
When would one use the SUMIFS function?
To sum cells that meet multiple criteria.
What is the purpose of a COUNTA function?
Counts the number of non-empty cells in a range.
COUNTA is often used to determine the number of entries in a dataset.
When would one use the SUMIFS function?
To sum values that meet multiple specified criteria.
SUMIFS allows for conditional summing based on various conditions.
When will the error message #REF! be displayed in an Excel spreadsheet?
When a cell reference is not valid.
This can occur when cells that were referenced have been deleted.
What other cell information can be used to sort data, excluding cell values?
Cell formatting and cell comments.
Sorting can also consider attributes like color or data type.
Suggest any THREE changes to the HTML code to resemble the screenshot of the web page.
- Change the background color.
- Adjust the font size.
- Modify the header tags.
Specific line numbers and exact changes would depend on the provided HTML code.
What is a database application used for?
To create forms, reports, and queries.
Database applications facilitate data management and retrieval.
Give TWO reasons why the values for the combo box do not appear.
- The data source for the combo box is not set.
- The items in the list are not populated correctly.
This issue can often be resolved by checking the data bindings.
Give TWO examples of functions that can be used in a report footer.
- SUM function.
- AVERAGE function.
Report footers often summarize data, making these functions useful.
Explain how the result of Query 2 will differ from Query 1 when executed.
Query 2 will yield different results based on varying criteria or filters applied.
The specific details depend on the queries’ conditions.
Give THREE hardware specifications to consider when buying a computer for basic computer skills.
- Processor speed.
- RAM size.
- Storage capacity.
These specifications ensure the computer can handle basic tasks efficiently.
Suggest TWO factors to consider when selecting an operating system.
- Compatibility with software applications.
- User interface preference.
The chosen OS should support the necessary applications and be user-friendly.
Give TWO reasons why you would suggest a wireless network for the club.
- Flexibility in device placement.
- Reduced cable clutter.
Wireless networks allow more devices to connect without physical limitations.
Give TWO other criteria, besides color and cost, that you would use when selecting a printer.
- Print speed.
- Print quality.
These factors impact the overall efficiency and effectiveness of printing tasks.
Explain what a duty cycle is.
It refers to the number of pages a printer can print in a month without compromising performance.
Understanding duty cycles helps in selecting printers for specific workloads.
Recommend a suitable optical storage media for making a backup of the database.
DVD or Blu-ray disc.
These media types can store large amounts of data securely.
Name ONE factor to consider when selecting a primary key field in a database table.
Uniqueness of the data.
The primary key must uniquely identify each record in the table.
Why would the teacher use an input mask when capturing cellphone numbers?
To ensure data is entered in a consistent format.
Input masks help prevent errors in data entry.
Give an alternative method to capture dates rather than typing the dates in the table.
Using a date picker control.
This method simplifies date entry and reduces errors.
Give ONE other type of website to post details about the competition.
A social media platform.
Social media can reach a broader audience and engage participants.
Give TWO reasons why an add-on/plugin is needed.
- To enhance functionality of the website.
- To support specific media formats.
Add-ons can provide additional features or support for various file types.
Suggest TWO other ways of displaying the URL link.
- Use a URL shortener.
- Embed the link in a text hyperlink.
These methods improve readability and aesthetics.
Suggest ONE spreadsheet feature for ranking contestants according to the highest scoring.
Sorting feature.
Sorting allows for easy organization of data based on scores.
What is an interactive whiteboard?
A digital board that responds to touch input for presentations.
Interactive whiteboards are used for engaging lessons and collaborative work.
Give TWO disadvantages of an interactive whiteboard.
- High cost of technology.
- Requires technical training for effective use.
These factors may limit accessibility and effectiveness in some environments.
State TWO safety measures to consider when using your mobile device at an airport/hotel.
- Keep the device secure and close.
- Avoid connecting to public Wi-Fi networks.
These measures protect personal information and device security.
Why is it important to remove any metadata from photos that will be publicly visible on websites?
To protect personal information and privacy.
Metadata can reveal sensitive data like location and device information.
What term describes the process of receiving multiple small donations from online volunteer contributors?
Crowdfunding.
Crowdfunding allows for collective financial support for projects.
Give TWO advantages of using video conferencing.
- Cost-effective communication.
- Ability to connect with participants from various locations.
Video conferencing saves travel time and expenses while facilitating real-time discussions.
Name TWO devices needed to experience virtual reality (VR).
- VR headset.
- Motion controllers.
These devices are essential for immersive VR experiences.
Name TWO negative health issues that one can experience from using virtual reality equipment.
- Eye strain.
- Motion sickness.
Prolonged use of VR can lead to discomfort and health concerns.
How does augmented reality (AR) enhance the experience for members when visiting historical sites?
By overlaying digital information onto the real world.
AR provides interactive and informative experiences by enhancing the physical environment.
Name a technology that forms part of the Fourth Industrial Revolution (4IR), excluding IoT.
Artificial Intelligence (AI).
AI plays a significant role in automation and data analysis within 4IR.
State THREE criteria that can be used to create a strong password.
- Minimum length of 12 characters.
- Inclusion of upper and lower case letters.
- Use of numbers and symbols.
A strong password enhances security and reduces the risk of unauthorized access.
What is a strong password?
A password that is difficult to guess and meets specific criteria.
Criteria for a strong password may include length, complexity, and unpredictability.
State THREE criteria that can be used to create a strong password.
- At least 12 characters long
- Includes a mix of uppercase and lowercase letters
- Contains numbers and special characters
What will members receive on the Whileno tour?
A brochure on cryptocurrency.
This brochure may provide information on the basics and applications of cryptocurrency.
Give TWO advantages of using cryptocurrency.
- Lower transaction fees
- Increased security and privacy
What are cryptocurrency transactions linked to?
They are linked or chained together in a blockchain.
A blockchain is a decentralized digital ledger that records transactions across many computers.
Briefly explain what a blockchain is.
A blockchain is a digital ledger that records transactions in a secure, transparent, and immutable way.
Each block in the chain contains a number of transactions and is linked to the previous block.
What type of vehicle will the group use on the Whileno tour?
A self-driving bus.
Give TWO reasons why members would prefer NOT to use a self-driving bus.
- Concerns about safety
- Lack of human control
What are autonomous vehicles known for?
Being used in the collecting of big data.
Autonomous vehicles can gather vast amounts of data regarding traffic patterns, road conditions, and user behavior.
Briefly explain what big data is.
Large volumes of data that can be analyzed to reveal patterns, trends, and associations.
Big data is characterized by its volume, variety, and velocity.