Term 1 Theory Summary Concepts - Grade 12 by Sirantwi
Term 1 Theory Summary Concepts - Grade 12 by Sirantwi
BY SIRANTWI
BY SIRANTWI
1.3 Benefits of Computer Usage: Reasons for Using Computer /Computing Devices/ICT
1.3.1 Efficiency
• Speed: Computers process data and perform tasks faster than
humans.
• Automation: Automate repetitive tasks, saving time and effort.
• Multitasking: Perform multiple functions simultaneously, increasing
productivity.
1.3.2 Accuracy
• Error Reduction: Minimize errors in calculations, data processing, and
decision-making.
• Consistency: Ensure uniform results in repeated tasks.
• Precision: Handle complex computations with high levels of precision.
1.3.3 Reliability
• 24/7 Operation: Perform tasks continuously without fatigue.
• Durability: Maintain functionality over extended periods if properly
maintained.
• Data Integrity: Safeguard data through backups and reliable storage
systems.
BY SIRANTWI
1.4. Convergence –
The integration of multiple technologies or functions into a single device or
system.
o For example, smartphones combine the functionalities of a phone, camera,
GPS, music player, internet browser, and more.
o This technological trend blurs the lines between traditionally distinct devices,
allowing users to perform various tasks with one device.
Advantages of Convergent Devices
• Convenience:
Users can perform multiple tasks using a single device, reducing the need to carry
multiple gadgets.
• Cost-Effectiveness:
Purchasing one convergent device is often cheaper than buying multiple devices for
individual functionalities.
• Space-Saving:
Having one device eliminates the need for separate equipment, saving physical space.
• Portability:
Devices like smartphones and tablets are compact and easy to carry, making them
ideal for mobile lifestyles.
• Efficiency:
Tasks like syncing data or accessing information are streamlined, as everything is
centralized in one device.
• Eco-Friendliness/Green computing:
Fewer devices reduce electronic waste (E-waste-throwing of discarded electronic
gadgets into landfill), benefiting the environment.
BY SIRANTWI
• Complexity:
A device with too many features can be overwhelming for some users, leading to
underutilization.
• Higher Energy Consumption:
Running multiple functions on one device can drain the battery quickly.
• Cost of Repairs:
Repairs for advanced convergent devices can be expensive, and damage to one
component might render the whole device unusable.
BY SIRANTWI
BY SIRANTWI
WEEK 2-Week 3
2. Systems Technologies: Hardware
• Troubleshooting: Developing skills to resolve common hardware issues, including addressing sticky mouse problems, scanning errors,
disk errors (e.g., defragmentation), screen resolution adjustments, unresponsive programs, printing issues, and assessing storage space.
BY SIRANTWI
Screen Resolution Blurry, distorted, or incorrect display 1. Adjust resolution to match the monitor’s native
Adjustments size. settings.
2. Update graphics drivers.
Unresponsive Programs Applications freeze or fail to respond 1. Press Ctrl + Alt + Del to open Task Manager and
end the unresponsive task.
Printing Issues • Printer doesn’t respond, ▪ Ensure the printer is powered on and
• poor print quality, connected.
• paper jams. ▪ Check the printer queue for stuck jobs.
• No papers ▪ Clean the printer heads and check ink/toner
• No ink levels.
• Connectivity issues ▪ Clear any paper jams and reload paper
properly.
Assessing Storage Space • System alerts for low disk 1. Delete unnecessary files or transfer them to
space. external storage.
• inability to save files. 2. Use disk cleanup utilities to remove temporary
and junk files.
3. Uninstall unused applications.
4. Consider upgrading to a larger hard drive or
using cloud storage.
Projector /Monitor issues • No Display (Blank Screen) • Ensure cables (HDMI, VGA, DisplayPort, power) are securely
• Flickering Screen connected.
• No Signal Error • Test with a different power socket or adapter.
• Dim or Discoloured Display • Check and adjust display settings in the operating system.
• Select the correct input source (e.g., HDMI, VGA) on the
monitor.
• Test with a different video cable or connect to a different port.
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
BY SIRANTWI
5. Error Reduction:
o Specific input methods reduce errors in certain tasks. For example, voice
commands minimize the need for manual input in scenarios like navigating
maps while driving.
Challenges in Integration
• Learning Curve: Users may require training to efficiently use multiple input modes.
• Cost: Advanced systems with integrated inputs can be expensive.
• Compatibility Issues: Ensuring that different input methods work seamlessly across
platforms and devices.
BY SIRANTWI
▪ Lens options
• Fixed Lens cameras (like point-and-shoot): simple and compact
but limit versatility.
• Interchangeable Lens cameras (like DSLRs and mirrorless):
allow you to use different lenses, offering more flexibility in focal
length
BY SIRANTWI
BY SIRANTWI
• Advantages of 3D Printer:
o Allows rapid prototyping and customization.
o Reduces waste compared to traditional manufacturing.
• Disadvantages:
o High initial cost and maintenance.
o Limited material options for some printers.
Voice Recognition
• Technology that identifies and confirms a speaker based on unique voice patterns.
• Uses of Voice recognition:
o Security systems (voice biometrics for authentication).
o Personalized services (e.g., recognizing individual users in smart devices).
o Forensic analysis.
Advantages of Voice Recognition:
1. Convenience: Enables hands-free and secure authentication.
2. Personalization: Differentiates between multiple users in shared environments.
3. Security: Hard to replicate voice patterns accurately.
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
BY SIRANTWI
Storage Concepts
Key Factors:
• Capacity: The amount of data a storage device or medium can hold, typically
measured in gigabytes (GB) or terabytes (TB).
o Example: SSDs offer capacities ranging from 128 GB to 4 TB or more.
• Volatility: Determines whether data is retained when power is lost.
o Volatile: RAM (temporary storage). loses content when power is lost
o Non-Volatile: SSDs, SD cards, and hard drives (retain data without power).
• Durability: The physical robustness of a storage device to withstand wear and tear or
environmental conditions.
o SSDs: More durable due to lack of moving parts compared to HDDs.
• Backup: The ability to copy and protect data in case of failure or loss.
o Example: External SSDs, HDDs, Flash drives or SD cards for secondary backups.
▪ Backup vs archive
• Making copies of data for data protection, recovery in case of
loss, corruption or system failure.
o Backup is short term
• Archive-long term storage of data for historical or legal
requirements
• Fit for Purpose: Refers to the suitability of a storage type for specific tasks based on
speed, capacity, and portability.
o Example: SSDs for performance-critical tasks, SD cards for portable storage.
BY SIRANTWI
Processing Concepts
1. Processor (CPU):
o The brain of the computer, responsible for executing instructions.
Factors to check for CPU:
o Clock speed (measured in GHz) and the number of cores.
▪ Example: A quad-core processor with 3.5 GHz is suitable for
multitasking and moderate tasks like gaming or video editing.
Cores: The number of processing units in a CPU.
o More cores = better multitasking.
o Example: Dual-core for basic tasks, Quad-core or higher for heavy workloads.
Clock Speed: The speed at which the CPU processes data, measured in GHz.
o Example: 2.5 GHz is suitable for basic tasks, while 3.5+ GHz is better for
demanding applications.
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
4. Motherboard: Acts as the backbone of the system, connects all the components of the
system.
• Must support the CPU socket type, RAM type, and GPU interface (e.g., PCIe).
• Consider future expandability (e.g., extra slots for RAM or GPUs).
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
4. Software
• Software refers to a collection of programs, data, and instructions that tell a
computer how to perform specific tasks.
• Application software-programs designed to performs specific task.
o word processors (e.g., Microsoft Word), spreadsheets (e.g., Microsoft
Excel), web browsers (e.g., Google Chrome), or video games.
• System software- controls and manage activities within the computer.
o Operating System (OS)-controls all activities-eg, windows, android, iOS,
macOS, or Linux
o Role/function of the operating system
▪ Starting the computer
▪ Providing a user interface/(GUI)
▪ Managing applications
▪ Manage hardware
▪ Controls single users and multiple users
▪ Controls multitasking
▪ The Task Manager in the Windows operating system
▪ Management of files
▪ File types and properties
• Metadata-additional information of a file
o Author
o File size
o File path
o Date modified, etc
▪ File management
▪ Schedule updates(scheduler)
▪ File compression-WINZIP, 7ZIP, etc
▪ Backups
▪ Coordinate tasks
▪ Control security-logins/passwords
BY SIRANTWI
Examples of drivers:
1. Printer Driver: Allows a computer to send print jobs to a printer, ensuring proper
formatting and communication between the device and the operating system.
o Example: HP LaserJet Printer Driver that helps the computer communicate
with an HP printer.
2. Graphics Driver (GPU Driver): Enables the operating system to interface with the
graphics card, allowing proper display of images, videos, and games on the monitor.
o Example: NVIDIA GeForce Driver for NVIDIA graphics cards.
3. Network Driver: Allows a computer to connect to and communicate with a network
through Ethernet or Wi-Fi adapters.
o Example: Intel Wi-Fi Driver that allows a computer to connect to wireless
networks.
4. Audio Driver: Enables the operating system to control and use the computer's sound
card, allowing audio playback and recording.
o Example: Realtek Audio Driver for managing sound devices on a computer.
BY SIRANTWI
o Read- A read-only file is a file that can be viewed but not modified or deleted
by a user.
BY SIRANTWI
o Creative commons- nonprofit organization that provides free licenses and legal
tools to creators, enabling them to share their work more easily and openly.
BY SIRANTWI
BY SIRANTWI
1. Accessibility Software
• A software that ensures that technology is inclusive and usable by individuals with
disabilities or specific needs.
• Examples of Accessibility software:
o Screen Readers: Read aloud on-screen text for visually impaired users (e.g.,
JAWS, NVDA).
o Speech Recognition Software: Allows users to control devices or input text
using voice commands (e.g., Dragon NaturallySpeaking).
o Magnification Tools: Magnify portions of the screen for users with low vision
(e.g., ZoomText).
o Closed Captioning: Provides subtitles for audio content, assisting those with
hearing impairments.
o On-Screen Keyboards: Allows users with mobility challenges to input text
without a physical keyboard.
• Advantages of Accessibility software
o Empowers users with disabilities to engage with technology effectively.
o Promotes inclusivity and equity in digital environments.
2. Efficiency Software
• Software that saves time by automating repetitive tasks.
• Examples of Efficiency software:
o Task Automation Tools:
▪ Microsoft Power Automate: Automates workflows between Microsoft
and other apps to save time.
o Scheduling Software: Tools like Microsoft Outlook or Google Calendar
streamline meeting and event organization.
o File Compression Tools: Reduce file sizes for faster sharing and storage
efficiency (e.g., WinRAR, 7-Zip).
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
o Clipboard Managers: Store and manage multiple copied items for quick reuse
(e.g., Ditto, ClipClip).
• Advantages of Efficiency software
o Reduces manual effort through automation.
o Saves time by streamlining repetitive tasks.
3. Productivity Software
• Software that enhances individual and team performance in work or educational
environments.
• Examples of Productive software:
o Office Suites: Microsoft Office, Google Workspace (Docs, Sheets, Slides) for
document creation, editing, and collaboration.
o Project Management Tools: Tools like Microsoft planner for task tracking and
team coordination.
o Time Management Apps: Tools like Microsoft To-Do, or Google Calendar to
prioritize tasks and track time usage.
o Note-Taking Software: Apps like Evernote, OneNote, or Notion for organizing
notes and ideas.
o Cloud Storage: Google Drive, Dropbox, or OneDrive to store and access files
from anywhere.
o E-Mail applications: like Outlook
BY SIRANTWI
• CPU
• RAM
• STORAGE/HDD/SSD
• GPU
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
Activity 01
1.1 Which one of the following is the best example of convergence? (1)
A. Gaming console
B. Camera
C. Programmable calculator
D. Tablet
1.2 Which one of the following files could be downloaded as a podcast? (1)
A. Instructions.pdf
B. Canyon.mp3
C. Game.exe
D. Party.bmp
1.3 Which one of the following is the least likely to improve the (1)
performance of a locally installed application?
A. Set the default storage location for files created with/by the
application, to an SSD drive.
B. Replace the Intel i5 processor with an Intel i7 processor.
C. Free up memory by closing other applications that are not being
used.
D. Replace the ADSL connection with a fibre connection.
1.4 Which one of the following specifies a category of computer user? (1)
A. GIGO
B. SOHO
C. SATA
D. FIFO
1.5 The process of adding geographical identification metadata to various (1)
media is known as…
A. identity theft.
B. file properties.
C. Geo-tagging.
D. QR coding.
1.6 Which of the following is not true for Ransomware? (1)
A. A type of malware.
B. A product key will protect the victim.
C. Demands some form of payment from the victim.
D. Attacker encrypts files on victim’s computer.
1.7 Which ONE of the following types of software allows you to try out a (1)
program before you buy it?
A. Malware
B. Adware
C. Freeware
D. Shareware
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
1.8 … technology can assist game rangers to monitor and detect poaching (1)
activities.
A. Systems
B. Blockchain
C. Assistive
D. Drone
1.9 The date and time when a photo was taken can be found in the … of (1)
the photo.
A. resolution
B. metadata
C. pixels
D. aspect ratio
1.10 … uses special high-speed memory to store data that is frequently (1)
used to improve computer performance.
A. Syncing
B. Backup
C. Compression
D. Caching
1.11 Which communication technology enables a person to tap his/her bank (1)
card on a device to pay?
A. LTE
B. Wi-Fi
C. NFC
D. Bluetooth
1.12 Which ONE of the following options is NOT a function of the operating (1)
system?
A. Manages computer hardware
B. Provides cloud storage
C. Provides the user interface
D. Manages the programs
[12]
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
Activity 2
Write down only the number of the description from Column A, and next to it the
correct matching capital letter from Column B, for example 2.11 T.
COLUMN A COLUMN B
2.1 The process of moving files to a secondary A. Blockchain
storage medium, to save disk space.
B. Caching
2.2 An example of software where the user must pay
a monthly or yearly fee for the use of the software. C. Add-On
2.3 A technology associated with digital currencies, in
D. 300 dpi
which records of transactions are linked together
and distributed among users. E. Synching
2.4 An example of the resolution of a flatbed scanner.
F. Bitcoin
2.5 The process of rearranging data on a storage
medium for efficient use. G. Office 365
2.6 An addition that enhances the functionality of an
H. 1200 x 800
existing software application.
2.7 The process of ensuring that the same set of I. Archiving
documents or files are consistent and up-to-date
J. Backup
across multiple devices.
2.8 The process of storing data temporarily to K. Extension
facilitate faster access. M.Cache Memory
2.9 A blend of advances in technology that are fast
becoming essential to modern life. N. 5IR
2.10 A string of characters attached to a filename, O. Memory Chip
usually preceded by a full stop and indicating the
format of the file. P. Biometrics
2.11 An integrated circuit that holds programs and Q. Motherboard
data temporarily.
2.12 This user generally requires a good-quality R. Asynchronous
graphics card S. Gamer
2.13 A technology that uses a person's unique
T. Mobility / 4G
physical characteristics to control access
2.14 A collection of instructions that enables a Connection
computer to perform specific tasks
U. Expansion
2.15 What mobile users require.
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
Y. Software
[11]
Activity 3
State whether each of the statements below is TRUE or FALSE.
If the statement is FALSE, then write down the word ‘False’ and, next to it, the
word(s) which should replace the underlined word(s) to make the statement
TRUE. (Note that no marks will be awarded if ‘False’ is given without a suggested
replacement.)
QUESTION ANSWER
The initial start-up instructions for a computer are True
stored in ROM.
NFC devices can connect to each other up to 10 False – Bluetooth
metres apart.
3.1 The contrast ratio of a monitor is the relationship between the darkest shade (1)
of black and the brightest shade of white, in an image produced by the
monitor.
3.2 A wiki, short for "weblog", originally referred to a digital log or online journal. (1)
3.3 A EULA is an agreement or contract between the user of software and the (1)
licensor.
3.4 A hard drive has a shorter life span than an SSD. (1)
3.5 SOHO users are people who work at home and in small offices. (1)
3.6 You will always have access to installed software as compared to web- (1)
based software.
3.7 A touch screen is an input and an output device (1)
3.8 The bigger the screen size, the better it is for your eyes. (1)
[8]
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
Activity 4
4.1 Study the advertisement for a computer below and answer the questions
that follow:
15.6" Touch Full HD Display
Intel Processor up to 5.0 GHz
16 GB DDR4 RAM
1 TB HDD
Nvidia GeForce 6 GB Video Card
Bluetooth | 802.11 b/g/n
DVD writer
Fingerprint Reader
4.1.1 The display (monitor) is specified as ‘Touch’ and ‘Full HD’.
a) What does the ‘Touch’ specification allow the user to do? (1)
b) What technical specification does ‘Full HD’ refer to? (1)
4.1.2 What is the size of the storage device of this computer, in (1)
gigabytes?
4.1.3 Name the connection technology associated with the 802.11 b/g/n (1)
specification.
4.1.4 What does the Fingerprint Reader allow the user to do? (1)
(No one-word answers will be accepted.)
4.1.5 Identify the item in the specifications above, that shows that the (1)
device has a built-in GPU.
4.2 Suggest TWO ways in which one can try to get a non-responding wireless (2)
keyboard
to start working again.
4.3 Give TWO general advantages of converting hardcopies into digital format. (2)
4.4 Give the general term for the computer technology that the person in the (1)
image below is demonstrating.
4.5 Explain why web-based applications typically have lower hardware (1)
requirements
(for the end user), than applications that are installed on your computer.
4.6 Microsoft offers users of Office the opportunity to join the Office Insider (1)
program,
which gives users early access to new versions of the software.
Briefly describe how Microsoft benefits from the Office Insider program.
4.7 Study the items of metadata of a file below and answer the questions that follow.
Camera maker: Samsung
Bit depth: 24
Name: 202008_111814.jpg
4.7.1 What does the ‘Bit depth’ item refer to, or mean? (1)
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
4.7.2 Explain why the user might wish to change the value of the ‘Name’ (1)
item or property.
4.7.3 Explain why the user might wish to change the value of the ‘Name’ (1)
item or property.
4.8 Give TWO ways in which you can try to improve the effectiveness of voice (2)
recognition software, besides changing settings in the software.
4.9 Give TWO features or utilities included with a computer’s operating (2)
system, that are
used to solve problems that occur with hard drives.
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
4.10 Consider the following system report on a hardware item installed on a computer
and answer the questions that follow.
Speed: 1333 MHz
Slots used: 2 of 4
Form factor: DIMM
Hardware reserved: 48.9 MB
4.10.1 What hardware item is being referred to above? (1)
4.10.2 How does one know that this item can be upgraded on this computer? (1)
4.11 Many apps, such as backup and antivirus apps, include a built-in scheduler. What (1)
is the function of a scheduler?
4.12 Answer the questions that follow based on the picture below:
4.12.1 During which stage of the Information Processing Cycle are the above (1)
devices used.
4.12.2 To which port are these devices normally plugged in? (1)
4.12.3 Which device would a student most likely use? Motivate your answer. (2)
4.12.4 Which device is best suited for backing up videos and music? (3)
Motivate your answer by referring to a spec in the screenshot.
4.13 Answer the following questions with regards to a computer’s CPU:
4.13.1 Explain the role that a CPU plays in a computer system. (2)
4.13.2 Give TWO differences to a computer’s performance with a quad-core CPU (2)
compared to a single-core CPU.
4.14 Explain how you would go about fixing the resolution on the computer screen where (2)
images and text appear very big.
4.15 The minimum system requirements to run Game XYZ are:
Study the requirements above and state whether the game will run for each of the
following scenarios. Motivate your answer for each scenario.
4.15.1 On a computer with Windows 11 (64-bit) Home Edition. All other (2)
requirements are met.
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
4.15.2 On a computer with 6000 MB RAM. All other requirements are met. (2)
4.15.3 On a Core i7 computer with 30 GB available space. All other requirements (2)
are met.
4.16 Explain which utility application you will use to remedy the situation in each of the
following. Motivate your answer.
4.16.1 A file was accidentally deleted and needs to be restored. (2)
4.16.2 The hard drive is overfilled with temporary files, cache, and unnecessary (2)
system files.
4.16.3 Partially sighted user needs assistance in navigating a website. (2)
4.17 Health trackers are often worn by athletes and people who are health conscious. (2)
Name TWO types of outputs a user would expect to find on his/her health tracker.
4.18 Give TWO reasons why the use of online applications/software has become (2)
popular.
4.19 State TWO possible problems associated with 3D printing. (2)
4.20 The SD card on your camera is full. (1)
Which device would you use to upload the photos to your computer without
connecting your camera to the computer?
4.21 Give TWO reasons why the use of online applications/software has become (2)
popular.
[57]
Activity 5
AlexiaSys® is a company that provides networking and other IT services to individuals and
businesses. Their mission is to help people get the most out of their IT investments. The company
has an on-site repair centre, and they offer courses for people wishing to obtain IT certifications.
Tours of the centre are allowed, under strict social distancing rules.
5.1 The school is planning an outing to the centre. (1)
Give ONE example of how GPS technology can be used to plan the outing.
5.2 The network administrator intends to implement a BYOD (‘Bring Your Own Device’)
policy for employees of the company by creating a hotspot.
5.2.1 Name the type of wireless connection that BYOD participants would make (1)
use of.
5.2.2 What is the main advantage that a BYOD policy would hold for the (1)
company?
5.2.3 Give ONE general item that the company might wish to include in their (1)
AUP for employees.
5.3 The company has designed an item made of plastic by using CAD.
5.3.1 What type of printer can be used to ‘print’ this tool? (1)
5.3.2 Give TWO general advantages of the kind of manufacturing referred to in (2)
question 5.3.1 over older, traditional manufacturing methods.
5.4 AlexiaSys® is considering letting some employees practise telecommuting (working
from home).
5.4.1 Give TWO benefits of telecommuting, from the viewpoint of the company. (2)
5.4.2 The company is compiling a list of questions that will help them decide (2)
which employees should be allowed to telecommute.
Suggest TWO technical (ICT-related) questions that might reasonably be
included in this list.
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
5.5 Users who can currently afford only an entry-level computer, are often advised to
purchase an entry-level desktop rather than an entry-level laptop.
5.5.1 Give TWO reasons for this advice. (Disregard any price differences in the (2)
initial purchase price.)
5.5.2 What would be the most likely reason for a user not to follow this advice (1)
(i.e. he decides to purchase an entry-level laptop)?
5.5.3 What would be the advantage in purchasing a ‘hybrid laptop’ instead of an (1)
‘ordinary’ laptop?
5.6 The shop sells devices with ergonomic features designed to reduce the likelihood
of RSI.
5.6.1 Which types of devices are referred to above? (1)
5.6.2 Give ONE specific example of such an ergonomic feature. (1)
5.7 A technician at AlexiaSys® requested a user to install software on their computer (1)
that would allow their computer to be controlled remotely.
Explain the most likely reason for this request.
5.8 A monitor sold by AlexiaSys® includes the following specifications:
Size: 27"
_________: 16:9
Built-in microphone and speakers
5.8.1 Name the specification that the value 16:9 refers to. (1)
5.8.2 Which hardware item, not mentioned above, would allow the user to use (1)
the monitor for video conferencing, without the need for any additional
peripheral devices?
5.9 Give TWO tips that you could offer customers, to help prevent files on their (2)
computers from being corrupted. Exclude any issues relating to malware from your
answer.
5.10 A customer has the following requirements for a computer that she wants to buy: (3)
• The computer must boot up very quickly.
• The computer must be able to run multiple tasks at the same time, without
slowing down.
• The user wants to be able to implement a good backup policy without relying on
the internet.
Give THREE hardware recommendations that would satisfy all these requirements.
5.11 One of the shop assistants saw something about a handwriting recognition feature (1)
of the note-taking app on her tablet.
What is the benefit of the handwriting recognition feature described above?
5.12 AlexiaSys® is compiling a list of things to look out for to help people recognise (1)
pirated software.
Suggest ONE item for this list, that would help a person to recognise a pirated DVD.
5.13 Two new printers were added to the network in the shop: an inkjet printer and a
laser printer.
5.13.1 Explain the most likely reason why a test page sent to the inkjet printer (1)
contained strange printing and did not ‘make sense’.
5.13.2 What must be done to ensure that printouts are always sent automatically (1)
to the laser printer?
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
5.14
5.17.1 Briefly explain what a product key is and how it serves as a way to combat (3)
software piracy.
5.17.2 List TWO possible consequences to the user in installing software that is (2)
incompatible with the computer’s hardware.
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
5.17.3 Briefly explain the difference between updating software and upgrading (2)
software.
5.18 Online learning must be seen as a substitute for in-person learning when classroom
tuition is disrupted.
5.18.1 Discuss eLearning and mLearning as part of the online learning (3)
environment.
5.18.2 List TWO possible risks to a school that follows a BYOD approach with (2)
online learning.
5.19 Name THREE ways in which virtual reality (VR) can be used to enhance online (3)
learning.
5.20 Give ONE reason why it is important to make regular backups. (1)
5.21 How is the size of monitors normally measured? (1)
5.22 How can a 3D printer be used to create a distinguishing feature for each car? (1)
5.23 Suggest TWO guidelines to be included in the policy for making backups at (2)
AlexiaSys®, other than making regular backups or setting automatic backups
5.24 Give TWO reasons why a computer may prompt a user to start up the operating (2)
system, e.g. Windows, in safe mode.
[69]
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
INFORMATION MANAGEMENT
1.1. _____ is an aspect that you must be included in a Task Definition for a
research project, such as the PAT
A. Interview
B. Current Situation
C. Report
D. Web site
1.2 Which one of the following is a good example of level THREE
question?
A. Would it be better if?
B. How many
C. Why?
D. What if
1.3 You gathered data from various sources when you did your PAT. You
wish to use graphs to display your data analysis in the report.
Give ONE reason to use a pie chart.
A. When the total of the numbers is 100%
B. Used when there are many data points ISP
C. Used when the order of the categories is important
D. Displays trends
ACTIVITY 2 : MATCHING ITEMS
Choose a term/concept from COLUMN B that matches the description in COLUMN
A. Write only the letter (A–J) next to the question numbers (2.1 to 2.5) in the
ANSWER BOOK, e.g. 2.11 k
COLUMN A COLUMN B
2.1 An instrument used to gather A Plagiarism
information from people using a form.
2.2 A control with a better choice to select B Bibliography
the class from the list
2.3. Passing off someone else’s work as C Questionnaire
your own without their permission
2.4 Can be answered without research D Piracy
2.5 A single reference to a specific source E Combo Box
F Closed questions
G Interview
H Opened Questions
I Citation
J ListBox
TERM 1 THEORY SUMMARY CONCEPTS
BY SIRANTWI
ACTIVITY 3: TRUE/FALSE
Indicate whether the following statements are TRUE or FALSE. Write 'true' or 'false'
next to the question numbers (3.1 to 3.5) in the ANSWER BOOK. If the statement is
true, write 'TRUE'. If the statement is false, write 'FALSE' and change the underlined
word(s) to make the statement TRUE. (Do NOT simply use the word 'NOT' to
change the statement.)
QUESTION ANSWER
The initial start-up instructions are True
stored in the ROM.
An NIC has slots for hardware False – Motherboard
components such as the CPU.
SECTION B
BY SIRANTWI
4.7 Why would it not be a good idea to use a wiki as a source. (2)
BY SIRANTWI
Study the entry form for registration below and answer the questions that
follow:
(3)
5.3 Explain TWO ways in which a teacher can find out whether learners are (2)
guilty of plagiarism in their PAT's.
5.4 The pie diagram below illustrates the steps in the decision-making
process. Each step is allocated a portion of the pie to signify its role in
the overall process.
5.4.1. Briefly explain what happens during step ‘6. Evaluate the (2)
Decision’.