Complete ICT Exam Tutorial: Operating Systems, Malware, Expert Systems, Algorithms & Cyber Security Notes

Complete ICT Tutorial for Exams

Operating Systems, Expert Systems, Malware, Algorithms, Social Media, UHD Television, Prosthetics & Cyber Security

1. Operating System (OS)

An Operating System (OS) is system software that manages computer hardware and software resources and provides services for computer programs.

Examples of Operating Systems

  • Microsoft Windows
  • Linux
  • Android
  • macOS

Main Tasks of an Operating System

1. Memory Management

The operating system allocates and controls RAM for programs and applications.

  • Allocates memory to applications
  • Prevents programs from interfering with each other
  • Frees memory after use

2. File Management

The operating system manages files and folders stored on storage devices.

  • Create files and folders
  • Delete and rename files
  • Control file permissions

3. Process Management

The operating system manages the execution of programs and multitasking.

  • Runs multiple applications
  • Allocates CPU time
  • Schedules tasks

Other Functions

  • Device management
  • Security management
  • User interface management

Exam Answer

An operating system is system software that manages computer hardware and software resources. Describe three tasks of an operating system.

  1. Memory management – Controls and allocates RAM for running applications.
  2. File management – Organizes, stores and retrieves files and folders.
  3. Process management – Controls execution of programs and supports multitasking.

2. Data Collection Methods

Data collection is the process of gathering information for analysis and decision making.

Direct Sources

Data collected directly from original sources.

  • Questionnaires
  • Interviews
  • Surveys
  • Observation

Indirect Sources

Data collected from already existing information.

  • Websites
  • Research reports
  • Government publications
  • Sales records

Exam Answer

A company is investigating the quality of products provided by a local supermarket. The company is using direct and indirect sources to collect data. Give two examples of how the company could collect data for each source.

Direct Sources:

  • Conducting customer interviews
  • Using customer questionnaires

Indirect Sources:

  • Checking supermarket sales reports
  • Reading online reviews and reports

3. Proprietary Software & Open Source Software

Proprietary Software

Software owned by a company where the source code is not publicly available.

Examples

  • Microsoft Office
  • Adobe Photoshop

Advantages

  • Professional support
  • Reliable updates

Disadvantages

  • Expensive
  • Limited customization

Open Source Software

Software where the source code is freely available to users.

Examples

  • LibreOffice
  • Mozilla Firefox

Advantages

  • Free to use
  • Can be modified
  • Community support

Disadvantages

  • Limited official support
  • Possible compatibility issues

Exam Answer

Describe what is meant by proprietary software and open-source software.

Proprietary software is software owned by a company where users cannot access or modify the source code.

Open-source software is software where the source code is publicly available and users can modify and distribute it freely.

4. Expert Systems

An expert system is an Artificial Intelligence system that imitates the decision-making ability of a human expert.

Components of an Expert System

1. Knowledge Base

Stores facts and expert knowledge.

2. Inference Engine

Processes rules and makes decisions.

3. User Interface

Allows communication between user and system.

4. Rule Base

Contains IF-THEN rules.

5. Explanation System

Explains how decisions were made.

6. Knowledge Engineer

Collects and updates expert knowledge.

Exam Answer

Many different components are used in expert systems. Describe the role of the all components such as inference engine in an expert system.

  1. Knowledge Base – Stores facts and expert knowledge.
  2. Inference Engine – Processes rules and produces conclusions.
  3. User Interface – Allows users to enter data and receive output.
  4. Rule Base – Contains logical IF-THEN rules.
  5. Explanation System – Explains how conclusions were reached.
  6. Knowledge Engineer – Collects and updates knowledge from experts.

5. Algorithms & Pseudocode

What is an Algorithm?

A step-by-step procedure used to solve a problem.

What is Pseudocode?

A simple way of representing program logic using English-like statements.

REPEAT … UNTIL Loop

REPEAT
   statements
UNTIL condition

Pseudocode to Find Smallest Number

Exam Answer

Write a pseudocode algorithm, using a REPEAT … UNTIL loop, that allows eight numbers to be entered and which will then display the smallest number.

START

count ← 1

INPUT number
smallest ← number

REPEAT

   INPUT number

   IF number < smallest THEN
      smallest ← number
   ENDIF

   count ← count + 1

UNTIL count = 8

DISPLAY smallest

END

6. Malware & Cyber Security

Malware is malicious software designed to damage systems or steal information.

Types of Malware

Spyware

Secretly monitors user activity and steals information.

Adware

Displays unwanted advertisements.

Ransomware

Encrypts files and demands payment.

Worm

Self-replicating malware spreading through networks.

Virus

Attaches to files and spreads when executed.

Trojan Horse

Malware disguised as legitimate software.

Exam Answer

Malware is intrusive software used by cyber criminals. Describe type of malware such as spyware, adware, ansomware, worm, virus, tronjan horse

  1. Spyware – Monitors user activities and steals data.
  2. Adware – Displays unwanted advertisements.
  3. Ransomware – Encrypts files and demands ransom payment.
  4. Worm – Self-replicating malware spreading through networks.
  5. Virus – Infects files and spreads when executed.
  6. Trojan Horse – Disguised malware providing unauthorized access.

7. Social Media & Government Access

Advantages

  • Fast communication
  • Easy public feedback
  • Online government services
  • Improved transparency
  • Better accessibility

Exam Answer

Describe how the use of social media can improve access to Government for individuals and organisations.

  • Governments can communicate quickly with citizens.
  • Citizens can provide online feedback.
  • Emergency announcements can be shared instantly.
  • Government services become easier to access remotely.
  • Transparency and public participation improve.

8. Botnets & Cyber Attacks

A botnet is a network of infected computers controlled remotely by cyber criminals.

How Botnets Work

  • Devices become infected with malware
  • Hackers remotely control infected devices
  • Passwords and data can be stolen
  • Security systems may be attacked

Exam Answer

Malicious botnets are used to attack systems and can be a threat to the security of stored data. Explain how these botnets can be used to gain unauthorised access to data.

  • Botnets infect many devices using malware.
  • Cyber criminals remotely control infected computers.
  • Spyware and keyloggers may steal passwords.
  • Software vulnerabilities may be exploited.
  • Confidential data is sent to attackers.

9. Information Technology & Prosthetics

Prosthetics are artificial devices used to replace missing body parts.

Impact of IT on Prosthetics

  • Improved movement using microprocessors
  • Better control using sensors
  • Customized devices through 3D printing
  • Improved quality of life
  • AI-controlled prosthetics

Exam Answer

Prosthetics are artificial devices that are used to replace missing body parts to try to restore normal functions. Describe the impact of Information Technology on the development and use of prosthetics.

  • IT improves prosthetic design and movement.
  • Sensors and AI provide natural movement.
  • 3D printing creates customized prosthetics.
  • Users gain better mobility and independence.
  • Advanced prosthetics may be expensive.

10. UHD Television Systems

Ultra-High Definition (UHD) television provides very high-quality images and sound.

Positive Impacts

  • Sharper images
  • Better gaming experience
  • Improved entertainment
  • Growth of streaming services

Negative Impacts

  • Higher costs
  • Requires faster internet
  • Increased screen time
  • Large data usage

Exam Answer

Analyse the impact of the introduction of ultra-high definition (UHD) television systems on the lifestyle of individuals.

UHD television improves entertainment quality with clearer images and better sound. It enhances gaming and streaming experiences. However, UHD systems are expensive, require faster internet and may increase screen time and data usage.

Extra Examination Tips

  • Always start answers with definitions.
  • Use technical terms correctly.
  • Write answers using bullet points.
  • Add real-world examples wherever possible.
  • For analyse questions, include advantages and disadvantages.
  • Underline important keywords during exams.

Quick Revision Summary

Topic Main Point
Operating System Manages hardware and software
Data Collection Direct and indirect methods
Proprietary Software Closed source software
Open Source Software Source code publicly available
Expert System AI system using expert knowledge
Malware Harmful software
Social Media Improves government communication
Botnets Network of infected devices
Prosthetics IT improves artificial body parts
UHD Television Better quality but higher costs

No comments:

Post a Comment