You are on page 1of 3

Type equation here .

Revision Questions-
Q1. Tick whether the following are features of emails or traditional faxes.

Q2. Tick whether the following statements are true or false.

Q3. Tick whether the following statements would most appropriately apply to the internet or an
intranet.

Q4. Use examples to describe the difference between a weak password and a strong password.
Q5. Describe how data is sent from a networked computer to a computer on a different network.
Q6. Describe two similarities between physical faxing and electronic faxing.

CAIE-CLS-INT1-YALE-MATH 1|Page
Q7. Describe three differences between physical faxing and electronic faxing.
Q8. Describe what an ISP is and, apart from security measures, describe what it offers its customers.
Q9. Juanita has a computer and a contract with an ISP. When she searches the internet she does not
find relevant information quickly.
Describe three ways she could reduce the amount of excess information she gets without changing
either her computer or ISP. 
Q10. Give three reasons why some companies have intranets.
Q11. In order to make reliable information available to all students, schools often put the information
on their intranet. Describe what is meant by an intranet. 
Q12. Explain, using examples, what is meant by authentication techniques.
Q13. Describe the differences in use between WiFi and Bluetooth.
Q14. Fiona wants to communicate with her friend Myfanwy using her mobile phone.
Describe four ways she could do this.
Q15. Most data protection acts include the principle that data should be stored securely.
List four other principles of a typical data protection act.
Q16. Describe the details of computer addresses that are stored by a router.
Q17. Internet banking can be used by bank customers to check their account balance.
Many ways of logging into such a system involve the use of passwords.
Describe three methods of minimising the possibility of passwords being misused if intercepted.
Q18. Discuss the effectiveness of different methods which could be used to prevent unauthorised
access to a laptop computer.
Q19. A school’s Science department has a network which uses WiFi. A teacher has a laptop computer
and whilst in school wishes to connect to this network.
Write down the name of this type of network.
Q20. Explain what is meant by VOIP.
Q21. Name two items of computer hardware that are needed in order to make a VOIP phone call from
one computer to another.
Q22. A piece of programming code which maliciously deletes files is called a______________.
Q23. The scrambling of data to make it unreadable by unauthorised users is called___________.
Q24. The use of computers has led to some employees changing their working patterns.
Complete the following sentences.
(a) Two or more employees doing the same job but working at different times is called job _______.
(b) When a person is employed to work fewer hours than the normal working week, this is called
___________.

CAIE-CLS-AFL-YALE-MATH 2|page
(c) When employees work the full normal hours in a week but work at times which suit them and the
employer, this is called __________.
(d) When an employee works the full normal hours in a week but works fewer days, this is
_______________.
Q25. The introduction of computers into the workplace has caused some changes in employment.
a) Identify two different types of job where employment has decreased.
b) Identify two different types of job where employment has increased.
Q26. There are many microprocessor-controlled devices used in the modern home.
Describe two drawbacks in terms of lifestyle changes this has produced for the users of such devices.
Q27. There are many microprocessor-controlled devices used in the modern home.
Describe four benefits in terms of lifestyle for users of such devices.

CAIE-CLS-AFL-YALE-MATH 3|page

You might also like