0% found this document useful (0 votes)
18 views11 pages

CAT Mid Exam Preparation 2025

The document provides an overview of various computer and technology concepts, including software bugs, input devices, and network technologies. It discusses the advantages and disadvantages of multi-function printers, wireless devices, and cloud storage, as well as strategies for password management and preventing online threats. Additionally, it covers topics such as VoIP, digital gaps, and the importance of ergonomics in the workplace.

Uploaded by

ntwayagaeresego9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views11 pages

CAT Mid Exam Preparation 2025

The document provides an overview of various computer and technology concepts, including software bugs, input devices, and network technologies. It discusses the advantages and disadvantages of multi-function printers, wireless devices, and cloud storage, as well as strategies for password management and preventing online threats. Additionally, it covers topics such as VoIP, digital gaps, and the importance of ergonomics in the workplace.

Uploaded by

ntwayagaeresego9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

CAT PREPARATION 2025 02June2025

SYSTEM TECHNOLOGIES
Software bug
Mistakes or errors that were inadvertently introduced when programmers wrote the system.
Patch
An update that can be downloaded to fix a specific bug in your computer.
Service pack
A release of connections and new features since the release of the original software and they are released
at a fixed interval.
Input devices:
The effect of a disk fragmentation
 Disk fragmentation refers to the more the scattered the files are, the slower your computer. The
more the files you store on your computer, the slower it becomes.
Uses for text-to-speech software
To convert written text to speech that is useful for:
 Voice recognition
 Note taking
 Education or training
 Dictation
 Transcription
How to solve the problem if keyboard is not working
Keys are sticky Switch off the computer, unplug the keyboard and clean it
Not responding If it`s wireless, batteries probably need to be replaced
If it`s wired, disconnect and then reconnect
If not working, try using another port

Solution to copy the document to the flash drive


 Insert the flash drive into your computer`s USB port
 Open the file explorer or finder on your computer
 Locate the document you want to copy
 Right click on the document and select copy
 Navigate to the flash drive on the explorer or finder
 Right click inside the flash drive folder and select paste
Function of a multi-function printer
 Scanning documents
 Photocopying documents
 Faxing documents
Hardware specifications that need to be considered when buying a printer
 Speed
 Colour
 Resolution
 Cost per page
 Mobility
Operating system
System software that controls all the activities that take place in a computer
Application software
A group of programs that perform specific tasks for us as users
Why it may not be possible to upgrade operating system
If the computer`s hardware or existing software is not compatible with the newer version, it
may not be possible.

Instances where software might cause a computer to become slower


 Malware
 Viruses
 Outdated or incompatible software
 Overloading the system
Virtual memory
Definition: A memory management technique that uses a combination of Random Access Memory and hard
drive storage to provide additional memory for running applications
The influence: Slower performance. When the system uses virtual memory, it can lead to slower
performance because hard drives are much slower than RAM.
Wireless devices
Advantages:
 You don`t need cables to connect to the internet
 You will have mobile access to the internet 24/7 from anywhere in the world.
 You can use you smartphone to access the internet
Disadvantages
 If you are in an area that has poor coverage, you may have limited or slow access.
 You never really escape communication such as e-mails and browsing, which may result in
information overload.
 Your online privacy or security could be an issue
Disadvantages of a Multi-function printer
If one function breaks, the whole device may be unusable
Higher cost of repair or replacement

INTERNET AND NETWORK TECHNOLOGIES


Voice over Internet Protocol (VoIP)
A protocol that allows telephone calls to be made over LANs, WANs and the internet.
Advantages of VoIP:
 VoIP calls re cheaper than normal phone calls
 The software is generally free
 It allows you to transfer files, as well as make video conference calls
Click-jacking
A type of online attack where an attacker tricks a user into clicking on something different from what they
intended to click.
Ways on how to prevent click-jacking
 Have good password policies
 Check for spelling and errors
 Be cautious with links and downloads
 Verify the website
Uncapped
Internet or data plans that do not have a specific data limit you can download or upload.
Shaped
Term used to describe the preference given to certain internet services
Unshaped
All the internet services are given the same preference.

Network switch
A device that connects multiple devices within a network, allowing them to communicate with each other.
Advantages of Asymmetric Digital Subscriber Line (ADSL):
 Most ADSL router include Wi-Fi connectivity so you can access the internet from anywhere in your
house using a laptop, smartphone, tablet etc.
 You can make and receive phone calls on your landline and use the line for internet access at the
same time.
Disadvantages of ADSL:
 ADSL may not be available in your area
 ADSL is not a mobile solution because it is limited to a single physical location and the area that the
Wi-Fi can cover at that location
INFORMATION MANAGEMENT
Crowd funding
Raising funds for a project or venture from a large number of people typically through an online platform.
Information overload
A state where an individual or organization is overwhelmed by the amount of information they receive,
making it difficult to process, absorb and make decisions.
Spoofing
The forgery of an e-mail header so that the e-mail appears to be from a different origin or person.
Strategies one can use to create or manage strong passwords:
 Make use of letters, characters and digits
 Avoid using common passwords such as your name, surname or your date of birth
 Enable a password that only you can know, make it hard
 Enable two-factor authentication
Ways of minimizing the possibilities of being affected by computer-related health risk
 Set up your workstation to promote good posture with feet flat
 Adjust display settings by ensuring that the brightness and contrast of the screen are comfortable for
your eyes.
 Take regular breaks from using the computer to reduce burnout
 Use proper keyboard and mouse techniques by avoiding bending wrists or using excessive force.
Entry level computer
Computers designed for basic computing needs and these computers are perfect for home users, students
and small businesses.
Advantages of using biometric security
 Enhanced security since it`s unique to each individual
 Increased accuracy because biometric systems can accurately identify individuals, reducing errors and
false identities
 Reduced risk of identity theft since biometric data is difficult to duplicate or steal
Advantages of connecting computers to a network
 Resource sharing such as files and other resources among multiple users
 Improved communication among users through e-mail, instant messaging and video conferencing
 Cost effectiveness since it reduces costs by sharing resources and infrastructure
Disadvantages of a wireless network compared to cabled network
 Range limitations since wireless networks have limited range and coverage, requiring additional
hardware such as routers
 Security risks whereby wireless networks are more vulnerable to hacking and eavesdropping due to
the broadcast nature of wireless signals
 Speed reliability because wireless networks typically have slower speeds and are more prone to
dropped connections
Advantages of cloud storage
File extensions are not blocked
The system backs up the files
You can save space on your local hard drive
You can use these systems to synchronise your files
Web browser
A software application that allows one to view and explore web pages on the on the web either via
hyperlinks or in cases where URL is already known, by typing the address in the address bar of the web
browser.
Search engine
A program used to search for documents located on the web by using keywords or phrases
entered by the user when looking for information.
Advantages of using e-banking from a client`s perspective
 You do not have to travel to the bank or wait in long queues
 The transactions are usually faster and normally costing less than when you are in another country or
even country
Portable Document Format (PDF) purpose
To allow people to see the documents with the layout and formatting of the documents intact, even if you
do not own a software used to create the document
Tips to consider regarding the backing up of the data
Only back up your data as the programs themselves can be reinstalled
Back up your files onto a portable external media
Keep the backups off-site I case of theft or a disaster such as fire
Shareware
A software that is often time limited in that you can use for a period of times

Advantages of shareware
Users can test the software before buying it
Cost effective since users can try the software for free or at a low cost
Flexibility since users can evaluate the software`s features and functionality before committing to a
purchase
Key logger
A spyware that records every key stroke you make as you type and can even possibly record the
movements of your mouse and take screenshots of what is displayed on your screen in an attempt to find
your username and passwords
Items that may appear in the Acceptable Use Policy of a school
 Respecting other`s privacy: no sharing of information without permission
 No cyberbullying or harassment
 Protecting school resources: No tampering with school devices or networks
Blog
Websites that are updated often with news and events- read like journal with the most recent entry at the
top
Pages Per Minute (PPM)
A unit used to measure the scanning speed of a scanner, indicating how many pages it can scan is a
minute
Dots Per Inch (DPI)
Number of dots that fit into a square inch of space
Categories of social websites
Social networking sites: Facebook and WhatsApp
Video sharing sites: YouTube and TikTok
Blogging sites: Blogger
Social bookmarking sites: Pinterest

Skype
One of the most popular software packages that allows people to communicate by using VoIP. It allows
you to make video calls if you have a webcam attached to your computer.
Advantages:
You can call normal phones in foreign countries at the cost of a local phone call
Cheaper than normal phone calls
Hardware needed:
Webcam
Device
Speaker
Microphone

Digital gap
Refers to the gap between individuals or groups who have access to modern information and
communication technologies (ICTs) such as computers and the internet and those who do not have, often
due to socioeconomic, geographic or democratic factors.
Really Simple Syndication (RSS) feeder
A web or news feed that automatically provides users with updated content or notifications of new
content.
RSS alerts you:
 New blog entries on blogs you subscribe to
 New music on iTunes
 Items you are interested in on online auction sites such as eBay
SUMIF
A function used to add or sum the values based on a single condition or criteria
SUMIFS
A function used to add or sum the values based on multiple condition or criteria
Ergonomics
The study and design of the workplace for the comfort and safety of people in working
Environments
Reasons why we update software regularly
To download patches and service packs to fix errors or bugs in our existing programs
Close security loopholes that hackers and malware might try to exploit or use
So that the software can detect new forms of viruses
How using a dedicated graphics card can improve the performance of a computer
Increasing frame rates in games and reducing rendering times in graphics-intensive applications
Advantage of using High Definition Multimedia Interface (HDMI) port
It provides better image quality and transmits both video and audio signals in a single cable

You might also like