Comprehensive Exam Graded A+
Advantages of entertainment systems? - ANSWER--Good hard disk storage for storing
tv/films, music and games.
-Built in internet connectivity capabilities (WiFi).
-Access to streaming and online gaming services.
Can PNG be compressed or decompressed? - ANSWER-Compressed
For data to be reliable what 2 criteria must it fit? - ANSWER-1. Completeness
2. Accuracy
Give 2 examples of a PC - ANSWER-1. Desktop
2. laptop
Give 4 examples of servers? - ANSWER-1. Mail servers
2. web servers
3. print servers
4. file servers
Give an example of a vibration output on a games console? - ANSWER-rumbling in a
car game when you go off track/fighting game when you're hit.
Having less administrative staff means... - ANSWER--Business saves money.
-Reduces human error.
How are PCs able to perform common tasks? - ANSWER-By installing a new software
application the computer becomes capable of performing a new function.
How are PCs used in personal lives? - ANSWER-Accessing Internet, surfing the
web/email, gaming (requires expensive graphics card normally)
How are PCs used in workplace? - ANSWER-Word processing, desktop publishing,
spreadsheets, database management systems, creative tasks (music, film editing).
How can an attacker spoof the network? - ANSWER-By using fake credentials and
presenting them to the network they can fool the system into giving access to services
meant for another device.
How can an intuitive interface be easy to use? - ANSWER-can be achieved by making it
easy to use and keeping the interface similar to paper forms or previous systems.
,How can error reduction be achieved in a user interface? - ANSWER-can be achieved
through validation/verification checks, input masks and warning messages.
How can extracting be performed? - ANSWER-by choosing specific fields and using
filters to select data that meet specific criteria.
How can packet sniffers be used maliciously? - ANSWER-might be used to gain
passwords or credit cards numbers that have been transmitted over the network.
How can sorting organise data? - ANSWER-by retrieving any field in ascending or
descending order.
How can spoofing be used to perform a Denial of Service attack? - ANSWER-They can
then send masses of data to overload the network making it unusable to the business.
How can we automatically order stock from our homes? - ANSWER-A stock
management server can be connected via the internet to the servers at the warehouse.
How can we extract and sort data that is organised into a database. - ANSWER-by
using queries
How can you prevent eye strain? - ANSWER-Regular breaks, good lighting, good
quality monitors.
How can you prevent RSI? - ANSWER-Wrist rests, adjustable equipment to allow good
seating position, regular breaks.
How can you prevent tripping? - ANSWER-Tie loose cables back, use cable ducting or
run cabling through the walls/ceiling.
How do barcode scanners capture data? - ANSWER-They capture data by reading the
width of dark and light bars. When the barcode is read it matches it to a database of
products on the computer and returns information.
How do disk/registry cleaners improve performance? - ANSWER-Reduces read/write
times
How do firewalls prevent harm? - ANSWER-Blocks off any suspicious data
How do mail servers work? - ANSWER--When you write an email/press send on PC,
goes to outgoing mail server.
-This mail server then sends across a network to recipient's mail server and stores in
their mailbox.
-When recipient logs into their email client the mail server will forward email to their
computer.
,How do PCs connect to a server? - ANSWER-Via Ethernet cable and WiFi (forming a
network)
How do print servers work? - ANSWER-By using a print server, you can send your files
to print from any computer on the network.
How do SSDs store data? - ANSWER--The semiconductor chips can be switched on
and off.
-On represents a 1 an doff represents a 0.
How do web servers work? - ANSWER--Web server stores the web page and
associated files.
-Client computer makes request for a web page to server (by entering URL).
-Web server locates correct files and sends back to client.
How does a digital camera store photos/videos as digital data? - ANSWER-By using a
grid of photosensors that convert light into digital pixels that our computer can store,
usually on a memory card.
How does a fragmented disk affect the OS performance? - ANSWER-When you ask for
it to load an application or a file the operating system will find it harder to locate all the
data required for those applications & files and so will slow down the loading time.
How does advertising use IT system? - ANSWER-through the use of online advertising,
print advertising & video adverts.
How does anti-virus detect malware? - ANSWER-scanning newly added files and
software, as well as through regularly scheduled scans of the storage devices
connected to your system.
How does copyright impact an individual/business? - ANSWER-you cost them money
by using their material for free.
How does creative tasks use IT system? - ANSWER-for things like CAD, graphics
design and music/film editing.
How does data analysis use IT system? - ANSWER-to spot patterns and trends and
make future predictions.
How does data logging use IT system? - ANSWER-through the use of sensors to
monitor a process and automatically log the data.
How does general office tasks use IT system? - ANSWER-to produce documents,
writeup notes, manage finances, communicate and schedule appointments.
, How does malware affect the OS? - ANSWER-By corrupting data, affecting network
traffic and disabling or taking over various functions of the operating system.
How does manufacturing use IT system? - ANSWER-for Computer-Aided
Manufacturing of products like car parts and clothing.
How does MICR verify cheques? - ANSWER-The magnetised ink is used to write a
code on the bottom of the cheque. The MICR device reads the magnetic field of the
characters to read the code to ensure it is a legitimate cheque.
How does optical storage work? - ANSWER--Uses a laser to mark the disks in a
pattern.
-Light is bounced of the disk.
-Marked areas are pit and represent 0s.
-Non-marked areas are lands and represent a 1.
How does security use IT system? - ANSWER-such as door/window and motion
sensors connected to an alarm, security cameras & RFID sensors to detect theft.
How does SIP work? - ANSWER--SIP signalling packet is sent from the person to the
recipient.
-SIP packet is received, recipients VoIP phone starts to ring.
How does stock management use IT system? - ANSWER-monitors and controls their
stock and can allow the implementation of automated and JIT stock control.
How does video conferencing benefit businesses? - ANSWER--Saves time and money
as employees don't need to travel to the same location.
-Helps support employees working from home.
How does VPN work? - ANSWER-by encrypting the data that is being transmitted over
the internet.
How has design and manufacturing helped businesses? - ANSWER-Made them more
efficient.
How has digital devices made a business more productive? - ANSWER-Less time is
spent correcting human error.
How has IT systems impacted on copyright? - ANSWER-have made it extremely easy
to share and download copyright material without the permission of the copyright holder.
How is OMR used in the lottery? - ANSWER-Pre-printed forms like lottery tickets are
designed so that when marks are placed on it, the OMR device can detect what
numbers you select from the mark's location on the form.