Igcse Workbook
Igcse Workbook
1 computer systems
1 Name the parts of a computer system shown below:
a
............................................................................................................................................................................
b
............................................................................................................................................................................
c
............................................................................................................................................................................
d
............................................................................................................................................................................
e
............................................................................................................................................................................
f
............................................................................................................................................................................
Photocopying prohibited
4 Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
2 Choose items from the following list to identify the definition in the table.
» compiler » graphics editing software » source code
» control and measurement » linker » spreadsheet
software » operating system » utilities
» database » sensor software » video editing software
» device driver
....................................................................................
....................................................................................
....................................................................................
3 Some of the statements that follow are true and some are false. Tick (✓) the appropriate
column to indicate which are true and which are false.
Statement True (✓) False (✓)
A network interface card allows a user to access websites on the World Wide Web
Read-only memory (ROM) is a type of non-volatile memory
Spreadsheets and word processors are examples of applications software
Video cards and sound cards are typical examples of computer software
Solid-state drives make use of laser light to read and write data
Photocopying prohibited
Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
5
4 Computers can have command line interfaces (CLI) and graphical user interfaces (GUI).
a Give two advantages and two disadvantages of both types of user interface.
Advantages Disadvantages
1 ......................................................... 1 .........................................................
............................................................. .............................................................
CLI
2 ......................................................... 2 .........................................................
............................................................. .............................................................
1 ......................................................... 1 .........................................................
............................................................. .............................................................
GUI
2 ......................................................... 2 .........................................................
............................................................. .............................................................
b Give one example of who might use each type of user interface.
CLI: ....................................................................................................................................................................
.............................................................................................................................................................................
GUI: ...................................................................................................................................................................
.............................................................................................................................................................................
ii Give two features of each device which makes it different to the other devices.
iii Give two uses of each device; all six uses given must be different.
i Name: ......................................................................................................................
ii Feature 1: ....................................................................................................................................................
.......................................................................................................................................................................
Feature 2: ....................................................................................................................................................
.......................................................................................................................................................................
Photocopying prohibited
6 Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
.......................................................................................................................................................................
Use 2: ..........................................................................................................................................................
.......................................................................................................................................................................
i Name: ......................................................................................................................
ii Feature 1: ....................................................................................................................................................
.......................................................................................................................................................................
Feature 2: ....................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
Use 2: ..........................................................................................................................................................
.......................................................................................................................................................................
i Name: ......................................................................................................................
ii Feature 1: ....................................................................................................................................................
.......................................................................................................................................................................
Feature 2: ....................................................................................................................................................
.......................................................................................................................................................................
Photocopying prohibited
Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
7
.......................................................................................................................................................................
Use 2: ..........................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
Photocopying prohibited
8 Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
7 Eight statements are given in the following table. Indicate, by placing a tick (✓) in the
appropriate box, which of the statements are true and which are false.
Statement True (✓) False (✓)
Analogue data is made up of a series of discrete,
discontinuous values
Random-access memory (RAM) contents cannot
be altered by a computer user
Read-only memory (ROM) contains parts of the
operating system currently in use
Input devices are necessary to allow computers to
receive commands from a user
Output devices are needed by a computer so it can
share the results of its processing with a human
Read-only memory (ROM) can be increased in size
to improve the operational speed of a computer
Solid state drives (SSD) have a much faster
data access time than internal memory, such as
random-access memory (RAM)
Before data on a hard disk drive (HDD) can be read
by the CPU, it must first be moved into random-
access memory (RAM)
i
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
ii
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
iii .......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
Photocopying prohibited
Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
9
b Discuss the positive and negative effects of the impact of AI on our everyday lives.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
9 Discuss how augmented reality (AR) and virtual reality (VR) will have an impact in many areas of
everyday life in the future. Your answer should include:
» features of AR and VR
» areas where AR and VR will have an impact
» how and why AR and VR will have an impact on the areas you have named.
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
Photocopying prohibited
10 Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
..................................................................................................................................................................................
10 In each of the following questions, only one of the responses is correct. Choose one of the
four options given.
Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition Photocopying prohibited
11