Section 1: Embedded Systems and Digital Communication
Key Concepts
1. Embedded Systems:
o Examples: Smart speakers, washing machines, and traffic lights.
o Use of ROM: Stores permanent instructions (e.g., the boot-up program).
2. Digital Communication:
o Types: Wi-Fi, NFC, and Bluetooth.
o Securing communication: Encryption protects data during transmission.
Activity: Match the Terms
Match the following terms with their definitions:
Term Definition
Embedded System A computer system designed for a specific function.
Encryption Secures data by converting it into a coded format.
Bandwidth The amount of data transferred in a given time frame.
Tethering Sharing an internet connection from one device.
MCQs
1. Which of the following measures processor speed?
o A) KiB
o B) GHz
o C) Dpi
o D) MBps
2. Which type of digital communication has the greatest bandwidth?
o A) Infra-red
o B) NFC
o C) Wi-Fi
o D) 3G
3. What secures data exchanged in a network?
o A) Copyright
o B) Access rights
o C) Encryption
o D) Compression
AFL Case Study: Smart Speaker Connectivity
Scenario:
A smart speaker connects to the internet using a Wi-Fi router and a gateway.
Tasks:
1. Draw a labeled diagram showing how the smart speaker connects to the internet.
2. Explain the role of ROM in the smart speaker.
3. Describe one benefit of tethering to provide internet access.
Section 2: Internet Accessibility
Key Concepts
1. Barriers to Internet Access:
2. Benefits of Internet Distribution:
Activity: Analyse Accessibility Issues
List three causes of limited internet access:
1. Unable to afford a digital device
2. Lack of service
3.
MCQs
1. Which one of these is a feature of online shopping?
o A) Requires file permissions
o B) Uses CAPTCHA to verify users
o C) Needs a hosted application
o D) Depends on utility software
2. What are two benefits of internet music distribution for companies?
o A) Higher costs, Better storage
o B) Lower distribution costs, Wider reach
o C) Improved copyright, Reduced production times
o D) Fewer technical issues, Simplified promotion
AFL Case Study: Chapa’s Online Store
Scenario:
Chapa uses an online store to shop for a laptop. The store uses CAPTCHA for security.
Tasks:
1. List two advantages of online shopping over high street shopping. A lot of options,
2. Describe two features of smartphones that support online shopping while traveling.
Portable, cloud based service
Section 3: ICT Security Measures
Key Concepts
1. Authentication and Security:
o CAPTCHA, file permissions, and encryption ensure safe access.
o Regular backups protect data from loss.
2. Data Compression:
o Reduces file sizes to save storage and improve transfer speeds.
Activity: Evaluate Security Features
Scenario:
A company uses encryption to protect customer data.
Tasks:
1. Explain why encryption is essential in digital communication. It secures the
connection enabling users from stealing data
2. List two other security measures the company could implement. Firewalls, Anti virus
software
MCQs
1. What is the purpose of encryption?
o A) Compress data
o B) Convert data to a secure format
o C) Share data more efficiently
o D) Improve hardware performance
2. Which one of these methods improves data transmission security?
o A) Data compression
o B) Copyright protection
o C) Access rights
o D) Encryption
AFL Case Study: Streaming Services
Scenario:
A streaming platform allows users to access music online.
Tasks:
1. Compare two benefits of streaming over downloading music. Streaming uses less
storage while listening. Downloading does not need internet when istening to music
2. Evaluate the impact of streaming on music companies.
High Latency
1. What is latency?
o A) The speed at which a CPU processes data
o B) The delay in data transmission over a network
o C) The amount of bandwidth available on a network
o D) The maximum data transfer rate
2. Which of the following is a characteristic of high latency?
o A) Immediate loading of web pages
o B) Delayed streaming of online videos
o C) Instantaneous online gaming response
o D) Faster file downloads
Transactional Data (Q7)
3. What is transactional data?
o A) Data collected when a user makes a transaction or interaction
o B) Data stored in spreadsheets
o C) Data about physical transactions only
o D) Data used for encryption
4. Which of the following is a way transactional data can improve user experience
for online photographs?
o A) Adjusting the resolution automatically
o B) Organizing photos by location or time
o C) Storing photos on local devices only
o D) Sharing photos without metadata
Internet and Employment (Q8)
5. Which of the following is an impact of the Internet on employment?
o A) Reduced remote work opportunities
o B) Increased access to global job markets
o C) Declining demand for ICT skills
o D) Fewer opportunities for collaboration
6. How has the Internet positively impacted job recruitment?
o A) By making jobs harder to find
o B) By enabling companies to reach global candidates
o C) By eliminating online applications
o D) By increasing reliance on printed resumes
Secure Passwords (Q9)
7. What is a key characteristic of a secure password?
o A) At least eight characters with no special symbols
o B) A minimum of eight characters, including upper/lowercase letters,
numbers, and symbols
o C) All letters and no numbers or symbols
o D) A phrase without any numbers
8. Why is a mixture of letters, numbers, and symbols recommended in a password?
o A) To improve storage requirements
o B) To make the password easier to remember
o C) To reduce the risk of unauthorized access
o D) To prevent secure password recovery
Hosted Applications and Storage (Q10)
9. Which of the following is a benefit of hosted applications for a business?
o A) Reduced data security
o B) Increased flexibility for remote access
o C) Higher maintenance costs
o D) Limited accessibility for employees
10. Which type of computer is typically used for hosting online applications?
o A) Desktop
o B) Server
o C) Laptop
o D) Tablet
Storage Devices (Q11)
11. Rank the following devices by read/write speed (fastest to slowest): SSD, HDD,
Optical Drive.
o A) HDD > Optical Drive > SSD
o B) Optical Drive > HDD > SSD
o C) SSD > HDD > Optical Drive
o D) SSD > Optical Drive > HDD
12. Which of the following factors affects the read/write speed of a hard disk drive?
o A) The size of the disk
o B) The speed of the spinning disk (RPM)
o C) The type of backup software installed
o D) The number of connected peripherals
13. What is one environmental benefit of buying pre-owned devices?
o A) Increased e-waste
o B) Reduced production of new devices
o C) Limited functionality
o D) Higher costs for repairs
14. Which type of software is used to create copies of applications?
o A) Control
o B) Utility
o C) Office-productivity
o D) Project management
Cookies and Privacy (Q12)
15. What are cookies used for?
o A) To store user preferences and activity for personalized experiences
o B) To encrypt user data
o C) To manage software licenses
o D) To create backup copies of files
16. Why are laws about cookies and informed consent important?
o A) To reduce website performance
o B) To protect user privacy and data from unauthorized use
o C) To increase website advertising revenue
o D) To eliminate cookie usage entirely
Accessibility (Q13)
17. Which of the following is a peripheral device for improving accessibility?
o A) Touchscreen
o B) Adaptive keyboard
o C) Monitor
o D) Printer
18. How can screen readers improve learning for visually impaired students?
o A) By enlarging text on a screen
o B) By converting text into audio
o C) By improving battery life
o D) By storing data locally
Miscellaneous ICT Concepts
19. What is a hosted application?
o A) Software installed on a local hard drive
o B) Software accessed via the Internet
o C) Software that requires physical disks for installation
o D) Software designed for smartphones only
20. Which factor does NOT directly affect network latency?
o A) The distance between devices
o B) The quality of the network infrastructure
o C) The number of users on the network
o D) The operating system of connected devices