Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2, Exams of Nursing

BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+

Typology: Exams

2024/2025

Available from 10/26/2024

NURSINGGRADER01
NURSINGGRADER01 🇺🇸

3.9

(12)

1.6K documents

1 / 24

Toggle sidebar

Related documents


Partial preview of the text

Download BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2 and more Exams Nursing in PDF only on Docsity! BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ Multifunctional Devices - CORRECT ANSWERS Devices that can perform multiple functions. Personal Computers - CORRECT ANSWERS Small, inexpensive computers for use by individual users. Mobile Devices - CORRECT ANSWERS Smartphones and tablets are made with portability in mind to give people computer and internet access whilst on the go. Servers - CORRECT ANSWERS Powerful computers that provide services to other computers connected to a network. Entertainment Systems - CORRECT ANSWERS Devices for watching TV, listening to music or playing video games. Digital Camera - CORRECT ANSWERS Capture images and videos digitally using an image sensor and store them as digital data. Navigation Systems - CORRECT ANSWERS Devices that use GPS (Global Positioning Satellite) receiver to locate the user's position on a digital map. Communication Devices/Systems - CORRECT ANSWERS Devices that send and receive analogue or digital data to and from another device. Data Capture and Collection Systems - CORRECT ANSWERS Devices that collect and input data through automatic systems rather than direct data entry. Uses of Digital Devices - CORRECT ANSWERS Education Personal Social BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ Retail Organisational Creative Input Device Examples - CORRECT ANSWERS Keyboard Mouse Scanner Graphics Tablet Microphone Webcam Sensors Output Devices Examples - CORRECT ANSWERS Monitors Projector Printer Plotter Speakers Headphones Accessibility Devices - CORRECT ANSWERS Peripheral devices, specifically created to allow accessibility for people with disabilities. Adaptive Technology - CORRECT ANSWERS Designed specifically to aid people with disabilities. Can include both hardware and software. Accessibility/Adaptive Devices Examples - CORRECT ANSWERS Trackball mouse Touch screen/large screen keyboard Eye motion sensors BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ A lot of devices have built in capability Optical Disks - - CORRECT ANSWERS Stability of writable media can be questionable Fragile and easy to damage Magnetic Tape - CORRECT ANSWERS Used for large data backups Magnetic Tape + - CORRECT ANSWERS Very large storage capacity Very cheap Magnetic Tape - - CORRECT ANSWERS Data is accessed serially which is slow Requires specialist equipment Real Time Operating Systems - CORRECT ANSWERS Provides fast response. Best used where inputs must be processed and responded to immediately, like traffic light and air traffic control. Single User Single Task OS - CORRECT ANSWERS One user can use the system at a time, and one application can run at a time. Requires fewer resources. Single User Multitasking OS - CORRECT ANSWERS One user can use the system at a time, but many applications can run simultaneously. Multi User Operating System - CORRECT ANSWERS Many users can use the system at the same time, and can run many applications simultaneously. (Cloud Computing) Factors Affecting Performance - CORRECT ANSWERS Slow hard-disk read/write (fragmentation) BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ Number of Cires Limited CPU speed Limited RAM Viruses/Worms/Spyware Roles of Operating Systems - CORRECT ANSWERS Networking Security Memory Management Multitasking Device Drivers Networking - CORRECT ANSWERS Operating Systems simplify networking in a computer. Security - CORRECT ANSWERS Features are commonly built into operating systems to help improve security. Include user authentication, antivirus and firewall software, backup facilities Memory Management - CORRECT ANSWERS Operating system manages the computer's resources. Processes to allocate memory, how much memory to allocate to each process, when to unallocate memory and then to transfer data to the pagefile. Multitasking - CORRECT ANSWERS Most OS allow you to run more than one application simultaneously. Device Drivers - CORRECT ANSWERS OS comes with generic device drivers that work with a wide variety of different peripheral devices. Command Line Interface - CORRECT ANSWERS The user interacts with the computer by typing in commands. BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ Graphical User Interface - CORRECT ANSWERS Users interact with the device by controlling a pointer or touch screen to select icons and menus displayed on screen. Menu Based Interface - CORRECT ANSWERS Users interact using a simple menu that presents options to choose from. Utility Software - CORRECT ANSWERS Used to manage system resources. Disk Utilities - CORRECT ANSWERS File compressors. Backup Disk defragmentation Network Utilities - CORRECT ANSWERS Firewalls antivirus Image File Types - CORRECT ANSWERS GIF JPG PNG BMP GIF - CORRECT ANSWERS small file size but low quality JPG - CORRECT ANSWERS good compression, although compression is lossy and can't be decompressed PNG - CORRECT ANSWERS uses lossless compression to save high quality images in a low file size. Also allows transparency BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ Format Check - CORRECT ANSWERS data must be entered in the correct format. i.e. Postcode must be like LLN NLL. Double check entry - CORRECT ANSWERS data must be entered twice and match. i.e. entering passwords/email addresses twice on a registration form Proofreading Check - CORRECT ANSWERS data must be read through to ensure there are no data entry errors. i.e. a checkbox to confirm all data is correct. Data presentation - CORRECT ANSWERS data is useless unless presented in a way which allows decision makers to use it to inform decisions types of data presentation - CORRECT ANSWERS Graphical - Charts... Pie, Line, Bar, Scatter, Radar and Surface Tabular - tables/spreadsheets Trend Analysis - CORRECT ANSWERS Business that can identify trends quickly and easily, are the ones that stay ahead of the competition. The more data available, the more accurate and valid the trends should be. Error Reduction - CORRECT ANSWERS automating certain aspects - providing drop-down lists and checkboxes. labelling input areas provide warnings when incorrect data is entered using techniques such as colour Moral and Ethical Issues - CORRECT ANSWERS Environmental Unequal Access Online Behaviour BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ Globalisation Freedom of Speech Acceptable Use Health & Safety Copyright Computer Misuse Protection of Data Privacy Accessibility Copyright, Designs and Patents Act 1988 - CORRECT ANSWERS Protects the rights of creators of original pieces. Prevents others from distributing this work without permission. Consumer Rights Act 2015 - CORRECT ANSWERS Covers consumer rights regarding goods and services, including digital content Police and Justice Act 2006 (Computer Misuse) - CORRECT ANSWERS An amendment to the Computer Misuse Act, that covers Denial of Service Attacks (DoS). Copyright (Computer Programs) Regulations 1992 - CORRECT ANSWERS Extends the Copyright, Designs and Patents Act to include computer programs. makes company board directors liable to prosecution for allowing illegally copied software to be used in their organisation. Health and Safety (Display Equipment) Regulations 1992 - CORRECT ANSWERS Regulations that require organisations to make sure display equipment like Computer monitors, meet health and safety standards Disability Discrimination Act 1995 and 2005, Equality Act 2010 - CORRECT ANSWERS Legislation banning discrimination on the basis of disability. BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ British Standards Institute (BSI) Codes of Practice - CORRECT ANSWERS Covers a wide range of subjects, including accessibility. They are in place to ensure compliance with legislation Open Accessibility Framework (OAF) - CORRECT ANSWERS European research project sets out a process for ensuring that IT systems are accessible Web Content Accessibility Guidelines (WCAG) 1.0 and 2.0 - CORRECT ANSWERS Ensures web content is accessible to all, regardless of disability. Choosing an IT System - CORRECT ANSWERS User Needs/Experience Specifications/Compatibility/Connectivity Cost Efficiency/productivity Implementation Security LAN - CORRECT ANSWERS Local Area Network WAN - CORRECT ANSWERS Wide Area Network PAN - CORRECT ANSWERS Personal Area Network VPN - CORRECT ANSWERS Virtual Private Network TCP/IP - CORRECT ANSWERS Transmission Control Protocol/Internet Protocol SMTP - CORRECT ANSWERS Simple Mail Transfer Protocol BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ implementation working practices employee/customer needs cost Threats to Data - CORRECT ANSWERS Malware Hackers (white, grey, black) Phishing Accidental Damage Individual impact of threats - CORRECT ANSWERS Identify fraud Bank fraud Organisations impact of threats - CORRECT ANSWERS loss of reputation loss of income Protecting Data - CORRECT ANSWERS File permissions Backup/recovery procedures passwords physical access control digital certificates protocols Data Protection Act 1998 - CORRECT ANSWERS The main UK legislation for protection of personal data Computer Misuse Act 1990 - CORRECT ANSWERS Protects against attacks on IT systems used to gain unauthorised access, and steal or cause damage to data. BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ Codes of practice - CORRECT ANSWERS Not legal requirements - just guidelines for how organisations handle, share and protect data Online Services - CORRECT ANSWERS Retail Financial Education News Entertainment Productivity Booking Systems Collaborative Working - CORRECT ANSWERS Users in different locations can work on the same project Version Control - CORRECT ANSWERS Locking the file, making it read only, which helps a user know which is the most up to date document Transactional Data - CORRECT ANSWERS Businesses collect data from transactions made by their customers Cookies - CORRECT ANSWERS Used to track browsing habits and target advertising Uses of Transactional Data - CORRECT ANSWERS Ensure Specific Marketing Analyse trends Plan the workforce BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ Targeted Marketing - CORRECT ANSWERS Used to target specific demographics, uses 'likes' to tailor marketing. Relevant to recent search or browsing activity Organisational Use of IT systems - CORRECT ANSWERS Stock Control Data logging/analysis General Office Tasks Creative Tasks Online advertising Manufacturing Security Impact on IT Systems on Organisations - CORRECT ANSWERS User Experience Employee/Customer needs Cost Implementation (timescales, testing, downtime) Replacement/integration with current systems Working practices User support Staff training Security Primary Data - CORRECT ANSWERS Data that is gathered directly from the source Secondary Data - CORRECT ANSWERS Data that already exists BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ Acceptable Use (M&E) - CORRECT ANSWERS Many companies have acceptable use policies that define how employees can use IT systems, such as websites and emails at work. Health and Safety (M&E) - CORRECT ANSWERS Health and safety issues associated with IT systems include the risk of RSI, eye and back problems. Employers have a moral responsibility to carry out risk assessments and provide suitable equipment and working conditions of employees RSI - CORRECT ANSWERS Repetitive Strain Injury Copyright (M&E) - CORRECT ANSWERS Practices when the likelihood of people who produce images, videos etc... and those who sell and distribute them Protection of Data (M&E) - CORRECT ANSWERS Organisations and individuals have an ethical responsibility to protect data of other people that they are using, storing and transmitting. Computer Misuse (M&E) - CORRECT ANSWERS Attacks on computer systems such as viruses and hacking cause harm to individuals and businesses. Effects can include loss of income/jobs, theft of personal wealth etc... Privacy (M&E) - CORRECT ANSWERS Misuse of data can have severe negative impacts. Cyber bullying, identify theft and bank theft... Accessibility (M&E) - CORRECT ANSWERS New IT systems should be accessible to people, regardless of disability. Inaccessible systems can cause upset and stress. White Hat Hacker - CORRECT ANSWERS Someone who hacks in aid of good Grey Hat Hacker - CORRECT ANSWERS Someone who hacks, but the public are unsure whether it's for good or bad reasons BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ Black Hat Hacker - CORRECT ANSWERS Someone who hacks for bad intentions Cat5 Use - CORRECT ANSWERS Telephone communications and ethernet network Cat5 + - CORRECT ANSWERS Versatile and widely available Cheap compared to other options Cat5 - - CORRECT ANSWERS Only useful over shorter distance More susceptible to interference Coaxial Use - CORRECT ANSWERS All types of data communication, commonly used in television cabling Coaxial + - CORRECT ANSWERS Less susceptible to interference - so works over longer connection. Cheap Coaxial - - CORRECT ANSWERS Thickness of the cable makes it difficult to work with. Limited bandwidth Fibre Optic Use - CORRECT ANSWERS Telephone and internet cables, cable television and computer networking Fibre Optic + - CORRECT ANSWERS Improved security as a cable cannot be tapped. Can be used over long distances. BTEC L3 Information Technology Unit 1 - Exam Theory 184Questions and Answers latest 2024/2025 RATED A+ High data transfer rate Fibre Optic - - CORRECT ANSWERS Very expensive specialist skills needed to install VGA Use - CORRECT ANSWERS Analogue connection of video display equipment such as projectors VGA + - CORRECT ANSWERS universally used on high resolution display equipment low cost cabling VGA - - CORRECT ANSWERS Signal affected by distance No DRM (Digital Rights Management) HDMI use - CORRECT ANSWERS Digital connection of both video and sound from devices to display equipment HDMI + - CORRECT ANSWERS Capable of 8k+ resolution Used in computing and entertainment HDMI - - CORRECT ANSWERS Limited length Cabling and technology is more expensive USB/FireWire Use - CORRECT ANSWERS Connecting equipment and peripherals, such as printers, scanners, input devices, cameras... USB/FireWire + - CORRECT ANSWERS High speed capability Backwards capability