[go: up one dir, main page]

0% found this document useful (0 votes)
87 views5 pages

ICT Revision

Hardware refers to the physical components of a computer system, including internal components like the processor, motherboard, RAM, and hard drive, as well as external components like monitors, keyboards, and printers. Software refers to the programs and instructions that control the operation of the computer and allow users to complete tasks. There are two main types of interfaces for interacting with a computer - the graphical user interface (GUI) which uses visual elements like windows and icons, and the command line interface (CLI) which requires users to enter text commands. Both interfaces have benefits and drawbacks, with GUIs generally being easier for new users but CLIs allowing more flexibility and customization. Biometrics is the use of unique human characteristics like fingerprints,

Uploaded by

Ahamed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views5 pages

ICT Revision

Hardware refers to the physical components of a computer system, including internal components like the processor, motherboard, RAM, and hard drive, as well as external components like monitors, keyboards, and printers. Software refers to the programs and instructions that control the operation of the computer and allow users to complete tasks. There are two main types of interfaces for interacting with a computer - the graphical user interface (GUI) which uses visual elements like windows and icons, and the command line interface (CLI) which requires users to enter text commands. Both interfaces have benefits and drawbacks, with GUIs generally being easier for new users but CLIs allowing more flexibility and customization. Biometrics is the use of unique human characteristics like fingerprints,

Uploaded by

Ahamed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Hardware (physical components):

Physical components which make up the computer system.


Can either be internal or external.
Internal (input): processor, motherboards, RAM, ROM, video cards, sound cards and hard disk drives.
External (output): monitors, keyboards, mouse, speakers and printer.

Software (programs):
Controls the operation of a computer or processing of electronic data.
Two types: applications software and system software.
Application: designed to allow users to complete specific tasks.
Ex: Microsoft word, control software, measuring software, apps, and photo-editing software.
- Browse the internet, write a letter, and manipulate graphics, data, sound, or video.

System: normally involve in the running of the computer


Ex: complier, linkers, device drivers, operating systems, and utilities.
- Operating systems to provide a use interface, allows hardware components to work and
they maintain computer performance.

What is the difference between hardware and software? (4 Marks)


- Hardware is physical components that make up a computer system whereas software are
instructions that tell the computer what to do.
- Hardware cannot be infected by viruses whereas software can.
- You can’t touch software, but you can touch hardware.
- Hardware is divided into 4 categories while software is divided into 2.

Operating systems:
GUI (graphical user interface):
An interface built around visual things
Ex: windows, icons, pointer, menus
Computer monitors, smartphones, tablets, gaming systems.
Advantages:
1. User doesn’t need to learn complex commands
2. This interface does not require training and is easier to use
3. Can use pointing devices, icons, menus (provides visual aid)
4. Includes graphics and colours.
Disadvantages:
1. Takes up more memory than CLI does due to icons.
2. They need significantly more RAM to run
3. Can be slow for experienced programmers to use
4. Its less flexible

CLI (command line interface):


Requires the user to enter command prompts to interact with the computer
- Normally used by experts as its more complicated
- Not restricted to a number of predetermined options
Ex: ATTRIB, CD, Copy, DIR
Advantages:
1. The user has more freedom to use specific commands when interacting with the computer.
2. Possible to alter computer settings.
3. If the user knows the commands, using CLI could be very fast.
Disadvantages:
1. User needs to learn complex commands
2. Commands must be entered in without errors
3. No visual aid
4. It can be very confusing for first time users.

Describe the benefits and drawbacks of using a CLI rather than a GUI (or vice-versa (6 Marks)):
- CLI allows the user to have more freedom to use commands while interacting with the
computer.
- CLI is faster than GUI if the user knows what commands to use
- GUI doesn’t require the user to know complex commands whereas CLI does (must be
entered without mistakes).
- GUI is much easier to use for first time users whereas CLI is harder
- GUI provides visual aid to the user while CLI doesn’t.

Biometrics:
Biometrics is where parts of a person’s body are used for identification purposes.
They are unique from person to person so they can be used to authenticate identity.
Ex: eye recognition, fingerprints, facial recognition, voice recognition.

Impacts of biometrics:
- Improved security
- Increased building security
- Reduction of theft
- More secure mobile phones

Advantages:
- Biometrics are unique
- More difficult to forge
- The user must be present therefore more security
- Data is stored encrypted
Disadvantages:
- Fingerprints / biometrics must be stored
- If a voice isn’t understandable, voice recognition can’t work.
- Equipment and set up is expensive
- Methods could be slower then entering passwords.
Describe the advantages and disadvantages of using fingerprint data entry for students rather than
manual registers: (6 Marks):
1. Biometrics are more secure than traditional passwords
2. They are unique to the individual
3. Biometrics cannot be hacked because they are a physical part of a human
4. Whereas passwords can be guessed or accessed by others
5. If the system stops working, traditional, methods of passwords will still have to act as a backup
6. Storing biometric data will take up more storage than traditional passcodes.

Output devices:
Pieces of computer hardware that are used to communicate the results of data processing performed by
a computer.

Ex: monitor, laser printer, inkjet printer, plotter, speaker, projector, headphones, OMR, etc.

Sensors:
A device which automatically inputs data into a computer system, where the data is constantly changing
and can be measured.
They are used in monitoring and control applications.
The data gathered is physical and analogue computers do not understand analogue data so it converts it
to digital.

A sensor is used to detect data in the surrounding environment that constantly changes such as:
- Temperature
- Light
- Humidity
Data storage:
Where we put data into a known place (saved) which we can come back to later to access it (read).
- Can either be stored temporarily (RAM) or permanently (ROM)
Backing storage devices are used to store data permanently.

Serial data access (sequential access):


Data is accessed by starting at the beginning and searched in order until desired data is found (slow).

Direct data access (random access):


Computer calculates exactly where data has been stored and accesses it (fast).
Secondary storage devices: CD, DVD, USB, External hard drive

Why do we backup data?:


1. Original copies of data may accidentally delete
2. Data could be lost or damaged in the original storage device
3. The original storage device could be lost or stolen
4. Data could be accessed and changed by hackers
5. Original storage device could be destroyed.

What is the difference between RAM and ROM?:


RAM (random access memory): ROM (read only memory):
Stores data that is currently in use by the Stores data long term until we choose to delete
computer. it.
It is volatile (temporarily stored) Non volatile (permanently stored)
Very fast method of storage in terms of reading Slower than ram at reading and writing data.
and writing data

Types of networks
Internet and intranet
Bluetooth vs Wi-Fi

Look at past paper questions as well !!

You might also like