Complete ICT Tutorial for Exams
Operating Systems, Expert Systems, Malware, Algorithms, Social Media, UHD Television, Prosthetics & Cyber Security
1. Operating System (OS)
An Operating System (OS) is system software that manages computer hardware and software resources and provides services for computer programs.
Examples of Operating Systems
- Microsoft Windows
- Linux
- Android
- macOS
Main Tasks of an Operating System
1. Memory Management
The operating system allocates and controls RAM for programs and applications.
- Allocates memory to applications
- Prevents programs from interfering with each other
- Frees memory after use
2. File Management
The operating system manages files and folders stored on storage devices.
- Create files and folders
- Delete and rename files
- Control file permissions
3. Process Management
The operating system manages the execution of programs and multitasking.
- Runs multiple applications
- Allocates CPU time
- Schedules tasks
Other Functions
- Device management
- Security management
- User interface management
Exam Answer
An operating system is system software that manages computer hardware and software resources. Describe three tasks of an operating system.
- Memory management – Controls and allocates RAM for running applications.
- File management – Organizes, stores and retrieves files and folders.
- Process management – Controls execution of programs and supports multitasking.
2. Data Collection Methods
Data collection is the process of gathering information for analysis and decision making.
Direct Sources
Data collected directly from original sources.
- Questionnaires
- Interviews
- Surveys
- Observation
Indirect Sources
Data collected from already existing information.
- Websites
- Research reports
- Government publications
- Sales records
Exam Answer
A company is investigating the quality of products provided by a local supermarket. The company is using direct and indirect sources to collect data. Give two examples of how the company could collect data for each source.
Direct Sources:
- Conducting customer interviews
- Using customer questionnaires
Indirect Sources:
- Checking supermarket sales reports
- Reading online reviews and reports
3. Proprietary Software & Open Source Software
Proprietary Software
Software owned by a company where the source code is not publicly available.
Examples
- Microsoft Office
- Adobe Photoshop
Advantages
- Professional support
- Reliable updates
Disadvantages
- Expensive
- Limited customization
Open Source Software
Software where the source code is freely available to users.
Examples
- LibreOffice
- Mozilla Firefox
Advantages
- Free to use
- Can be modified
- Community support
Disadvantages
- Limited official support
- Possible compatibility issues
Exam Answer
Describe what is meant by proprietary software and open-source software.
Proprietary software is software owned by a company where users cannot access or modify the source code.
Open-source software is software where the source code is publicly available and users can modify and distribute it freely.
4. Expert Systems
An expert system is an Artificial Intelligence system that imitates the decision-making ability of a human expert.
Components of an Expert System
1. Knowledge Base
Stores facts and expert knowledge.
2. Inference Engine
Processes rules and makes decisions.
3. User Interface
Allows communication between user and system.
4. Rule Base
Contains IF-THEN rules.
5. Explanation System
Explains how decisions were made.
6. Knowledge Engineer
Collects and updates expert knowledge.
Exam Answer
Many different components are used in expert systems. Describe the role of the all components such as inference engine in an expert system.
- Knowledge Base – Stores facts and expert knowledge.
- Inference Engine – Processes rules and produces conclusions.
- User Interface – Allows users to enter data and receive output.
- Rule Base – Contains logical IF-THEN rules.
- Explanation System – Explains how conclusions were reached.
- Knowledge Engineer – Collects and updates knowledge from experts.
5. Algorithms & Pseudocode
What is an Algorithm?
A step-by-step procedure used to solve a problem.
What is Pseudocode?
A simple way of representing program logic using English-like statements.
REPEAT … UNTIL Loop
statements
UNTIL condition
Pseudocode to Find Smallest Number
Exam Answer
Write a pseudocode algorithm, using a REPEAT … UNTIL loop, that allows eight numbers to be entered and which will then display the smallest number.
count ← 1
INPUT number
smallest ← number
REPEAT
INPUT number
IF number < smallest THEN
smallest ← number
ENDIF
count ← count + 1
UNTIL count = 8
DISPLAY smallest
END
6. Malware & Cyber Security
Malware is malicious software designed to damage systems or steal information.
Types of Malware
Spyware
Secretly monitors user activity and steals information.
Adware
Displays unwanted advertisements.
Ransomware
Encrypts files and demands payment.
Worm
Self-replicating malware spreading through networks.
Virus
Attaches to files and spreads when executed.
Trojan Horse
Malware disguised as legitimate software.
Exam Answer
Malware is intrusive software used by cyber criminals. Describe type of malware such as spyware, adware, ansomware, worm, virus, tronjan horse
- Spyware – Monitors user activities and steals data.
- Adware – Displays unwanted advertisements.
- Ransomware – Encrypts files and demands ransom payment.
- Worm – Self-replicating malware spreading through networks.
- Virus – Infects files and spreads when executed.
- Trojan Horse – Disguised malware providing unauthorized access.
7. Social Media & Government Access
Advantages
- Fast communication
- Easy public feedback
- Online government services
- Improved transparency
- Better accessibility
Exam Answer
Describe how the use of social media can improve access to Government for individuals and organisations.
- Governments can communicate quickly with citizens.
- Citizens can provide online feedback.
- Emergency announcements can be shared instantly.
- Government services become easier to access remotely.
- Transparency and public participation improve.
8. Botnets & Cyber Attacks
A botnet is a network of infected computers controlled remotely by cyber criminals.
How Botnets Work
- Devices become infected with malware
- Hackers remotely control infected devices
- Passwords and data can be stolen
- Security systems may be attacked
Exam Answer
Malicious botnets are used to attack systems and can be a threat to the security of stored data. Explain how these botnets can be used to gain unauthorised access to data.
- Botnets infect many devices using malware.
- Cyber criminals remotely control infected computers.
- Spyware and keyloggers may steal passwords.
- Software vulnerabilities may be exploited.
- Confidential data is sent to attackers.
9. Information Technology & Prosthetics
Prosthetics are artificial devices used to replace missing body parts.
Impact of IT on Prosthetics
- Improved movement using microprocessors
- Better control using sensors
- Customized devices through 3D printing
- Improved quality of life
- AI-controlled prosthetics
Exam Answer
Prosthetics are artificial devices that are used to replace missing body parts to try to restore normal functions. Describe the impact of Information Technology on the development and use of prosthetics.
- IT improves prosthetic design and movement.
- Sensors and AI provide natural movement.
- 3D printing creates customized prosthetics.
- Users gain better mobility and independence.
- Advanced prosthetics may be expensive.
10. UHD Television Systems
Ultra-High Definition (UHD) television provides very high-quality images and sound.
Positive Impacts
- Sharper images
- Better gaming experience
- Improved entertainment
- Growth of streaming services
Negative Impacts
- Higher costs
- Requires faster internet
- Increased screen time
- Large data usage
Exam Answer
Analyse the impact of the introduction of ultra-high definition (UHD) television systems on the lifestyle of individuals.
UHD television improves entertainment quality with clearer images and better sound. It enhances gaming and streaming experiences. However, UHD systems are expensive, require faster internet and may increase screen time and data usage.
Extra Examination Tips
- Always start answers with definitions.
- Use technical terms correctly.
- Write answers using bullet points.
- Add real-world examples wherever possible.
- For analyse questions, include advantages and disadvantages.
- Underline important keywords during exams.
Quick Revision Summary
| Topic | Main Point |
|---|---|
| Operating System | Manages hardware and software |
| Data Collection | Direct and indirect methods |
| Proprietary Software | Closed source software |
| Open Source Software | Source code publicly available |
| Expert System | AI system using expert knowledge |
| Malware | Harmful software |
| Social Media | Improves government communication |
| Botnets | Network of infected devices |
| Prosthetics | IT improves artificial body parts |
| UHD Television | Better quality but higher costs |
No comments:
Post a Comment