Caie Igcse Ict Theory

Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

ZNOTES.

ORG

UPDATED TO 2023-2025 SYLLABUS

CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Abdallah for personal use only.
CAIE IGCSE ICT

<b>Application software:</b>
1. Types and Components of Provides services that allow the user to do specific
tasks.
Computer Systems It can be general-purpose software or custom-made
software. (Specialist software)
E.g., Spreadsheets, databases, and word processors.
1.1. Hardware & Software <b>System Software:</b>
The software is designed to provide a platform all
<b>Hardware</b> other software to run on. For example:
1. Compilers: The software translates the High-
the electronic, physical components that make up a level language into Machine code (Language
typical computer system. These may include input and Processor).
output devices as well. 2. Linkers: A Software that creates the links
<b>Internal Hardware Devices:</b> between Language processors into workable
Central processing unit solutions (Data definition language).
Processor 3. Device drivers: A software that enables the
Motherboard device to work with another, externally
Internal memory consisting of RAM & ROM connected device.
Graphics & Sound Cards 4. Utilities: A system software that provides the
Internal Storage devices like Hard disk drives (HDD) necessary facilities (Antivirus, Scan Disk, Disk
and solid-state drives (SSD) Defragmentation, etc.)
Network interface card (NIC) 5. Operating systems: To enable computer
<b>External Hardware Devices:</b> systems to function and allow users to
Monitor communicate with computer systems, special
Keyboard software, known as operating systems (OS),
Mouse have been developed.
Printer
External Storage Devices <b>Analogue and Digital Data</b>
<b>Software</b> Computers can only understand data in the form of binary
digits (0,1); this is commonly known as digital data. However,
The techniques, methods, commands, and instructions data in the real world is analogue, not limited to two specific
tell the device what to do and how to do it. values.
They are the programs which control the computer
system and process data.
Relates to ideas & instructions for using physical objects.

<b>Two types of software:</b>

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

The figures show how data changes in analogue and <b>Input & Output Devices</b>
digital forms; analogue data forms smooth curves,
whereas digital data changes in discrete steps. | Input devices | Output devices | | ----------------------------------
So, for a computer to process real-world data, it first -------------------------------------------------------------------------- | -------
needs to convert the received data into digital form. This -------------------------------------------------------------------------------------
is done by hardware known as ADC (analogue to digital ------------ | | An input device is any hardware that enables
converter), and its output is given back in analogue form data entry. | An output shows the result or solution of the
using DAC (digital to analogue converter). input <i>after</i> it has been processed. | | An input device
can only send data. | An output device can only receive data.
1.2. The Main Components of Computer | | Input devices are necessary for a computer to receive
commands from the user for processing to be permitted. |
Systems Output devices are needed in order to display the outcome of
the processing that took place to the user. | | Input devices
<b>Central Processing Unit (CPU)</b> are complex as they must ensure proper communication
between the computer and the user. | Output devices are
The component of the computer that understands and simpler as they only need to display the finale. |
executes hardware and software operations. Nowadays,
it’s also known as a microprocessor. It is a single Input devices are pieces of hardware that allow users to
integrated circuit at the core of most PCs and is also enter data into computers.
present in many household gadgets and equipment An output device displays the computer's output in a
where some control or monitoring is required. human-readable format. For example, words on a printer
It consists of a control unit (CU) that manages the input or moving graphics on a monitor.
and output devices, an arithmetic and logic unit (ALU)
that performs computations and makes logical <b>Backing and Secondary Storage</b>
judgments, and tiny memory regions known as registers.
It processes the input and produces the outcome of the Required to store significant amounts of data
processing in the form of output. permanently.
Most commonly in the form of Hard disk drives and Solid-
<b>Internal Memory</b> state drives.

1. Random access memory (RAM): temporary memory <b>Differentiating between internal memory and backing
storage, lost after power is shut down, performs read storage:</b>
and write functions, is used to store data that are
1. RAM contents are lost when power is lost, ROM is
currently in use, and can be increased in size to
read-only, and backing storage is permanent even
improve operational speed.
without power.
2. Read-only memory (ROM): permanent memory
2. RAM and ROM are much smaller than backing
storage, non-volatile, can only be read from, used to
storage.
store computer’s configuration data, such as BIOS.
3. RAM and ROM are significantly faster in accessing
<i>N.B: The BIOS (basic input/output system) stores the data than backing storage.
date, time and system configuration on a non-volatile chip 4. Backing storage is much cheaper than internal
called a CMOS (complementary metal oxide semiconductor) memory.
– this is usually battery powered.</i> 5. Internal memories are fixed, and backing storage can
Differentiating between Internal memories: be fixed or portable.
6. Internal memories can be directly read by the CPU,
1. RAM is a temporary memory device, whereas ROM is while backing storage needs to be moved into the
a permanent one. RAM before being read by the CPU.
2. RAM is volatile, ROM is non-volatile.
3. RAM can be written to and from, but ROM can only be 1.3. Operating Systems
read from.
4. RAM is used to store data, files, programs, and parts
of OS that are currently in use. However, ROM is used
in storing start-up data,

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Controls operation of input, output & backing storage 1. Command line interface: user needs to type in
Supervises loading, running & storage of application commands to communicate with the computer. The
programs. user is in direct communication with the computer.
Deals with errors in application programs. Not restricted to pre-defined options. Possible to alter
Maintains security of the whole computer system computer configuration settings. Needs to learn many
Maintains a computer log. commands for basic operations. All commands need
to be typed in, which is time-consuming. Very error
Operating systems offer various types of user interfaces, for prone, as commands must have correct format,
example: spelling etc.
N.B: Mainly used by programmers who need to have
direct communication with the computer.
2. Graphical user interface: Uses WIMP (windows icons
menu and pointing device). The user does not need to
learn any commands. It is more user-friendly; icons
are used to represent applications. A pointing device
is used to click on an icon to launch the application,
this is simpler than typing in commands. This type of
interface uses up considerably more computer
memory than a CLI interface. The user is limited to
the icons provided on the screen. Needs a more
complex operating system.
N.B: Mainly used by end-users who don’t have great
knowledge of how the computer works.
3. Dialogue-based user interface: use the human voice
to give commands to a computer system. no need for
a driver to take their hands off the steering wheel. In a
home, it is especially useful for people with disabilities
because many tasks can be carried out by the spoken
word only. Possible to use it as a security feature
because voice recognition could be used to identify a
person. Still unreliable, with many commands not
being recognized or needing to be repeated several
times (especially if there is background noise). Can be
quite complex to setup. User needs to know which
commands can be used.
4. Gesture-based user interface: relies on human
interaction by the moving of hands, head or even feet.
Replaces mechanical input devices. No physical
contact is required. Very natural interface for a
human operator. No training is needed to interface
with the computer. It is possible for unintentional
movement to be picked up. Only works near the
camera or sensor (maximum of 1.5 meters). May only
accept a limited number of movements (for example,
it may take several attempts to determine exactly
what finger movements are recognized).

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

(Or notebook) refers to a type of computer where the


1.4. Types of Computers monitor, keyboard, pointing device and processor are all
together in one unit. This makes them extremely
Desktop Computers portable. lightweight (to aid portability). Low power
consumption (and also long battery life). Low heat output
Desktop usually refers to a general-purpose computer
(cooling is very important).
that is made up of a separate monitor, keyboard, mouse, Uses:
and processor unit. It is distinguished from, for example, 1. office and business work
a laptop computer by the fact that it is made up of several 2. educational use
separate components, which makes it not very portable. 3. used as a gaming device.
Uses:
4. general entertainment
1. office and business work Advantages:
2. educational use 1. Portability: all components are in a single unit, so
3. general entertainment they can be taken anywhere.
4. gaming device 2. Because of one single unit, there are no trailing
Advantages:
wires and desk clutter.
1. They are easier and less costly to upgrade and 3. take up much less room on a desk, so they can be
expand. easily used in public spaces.
2. Spare parts are standardized, which makes them 4. portability allows them to take full advantage of
cheaper. Wi-Fi features.
3. They tend to have better specifications for a given
Disadvantages:
price. 1. portability makes it easier for them to be stolen.
4. No critical power consumption because they plug 2. limited battery life means the user needs to carry
into a wall socket. a charger at all times.
5. Due to fixed positions, they are less likely to be
3. keyboards and pointing devices may be awkward
damaged or stolen.
to use.
6. As they usually have wired connections, they have 4. not easy to upgrade, like adding more RAM.
more stable internet access.
Disadvantages: 2. Smartphones:
1. They are not particularly portable because they
are made up of separate components.
2. More complicated because all the components
need to be hooked up by wiring, which also
clutters up the desk space.
3. Because they aren’t portable, files must be copied
to another portable storage device to take work
elsewhere.

Mobile Computers
1. Laptop computer:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Allow normal phone calls to be made, but also have an They work similarly to a smartphone. The only main
operating system (such as iOS, Android, or Windows), difference is that they are somewhat bigger in size as
allowing them to run a number of computer applications compared to a smartphone.
(known as apps or applets). Smartphones communicate Uses:
with the internet either by using Wi-Fi hot spots or by 1. They allow users to send/receive emails.
using 3G/4G/5G mobile phone networks. 2. They allow users to use a number of apps.
Uses: 3. They allow users to use a camera feature (to take
1. They allow users to send/receive emails. photos or videos).
2. They allow users to use a number of apps. 4. They allow users to use an MP3/4 player (for
3. They allow users to use a camera feature (to take music and videos).
photos or videos). Advantages of tablets compared to laptops:
4. They allow users to use an MP3/4 player (for 1. very fast to switch on (no time delay waiting for
music and videos). the operating system to load up).
Advantages: 2. fully portable – they are so lightweight that they
1. very small in size and lightweight, makes them can be carried anywhere.
portable. 3. touch screen technology means they are simple to
2. connecting to the internet while on the move. use and don’t need any other input devices.
3. because they use Wi-Fi and mobile phone 4. not much heat, they use solid-state technology.
networks, they can be used almost anywhere. 5. The battery life of a tablet is a lot longer.
4. they have apps which can tell instant location, 6. when the power button is pressed, it goes into
which is a feature that isn’t available in either standby but remains connected to the internet so
desktops or laptops. the user still hears alerts when emails or other
5. they have reasonable battery life. ‘events’ are received.
Disadvantages: Disadvantages of tablets compared to laptops:
1. small screens and keyboards make pages difficult 1. tend to be rather expensive when compared to
to read. laptops.
2. more difficult and slower when typing things in. 2. they often have limited memory/storage when
3. Web browsing and photography can quickly drain compared to a laptop.
the battery. 3. typing on a touch screen can be slow and error-
4. Memory size in most phones is not very large prone compared to a standard keyboard.
when compared to laptops and desktops. 4. laptops tend to support more file formats than
5. Not all website features are compatible with tablets.
smartphone operating systems.
6. Because of their small size, it is much easier to 4. Phablets:
lose a smartphone or for it to be stolen compared
to laptops or desktops. Some of the latest smartphones have been designed as a
7. The data transfer rate using mobile phone hybrid between a tablet and a smartphone, referred to as
networks can be slower than with Wi-Fi. a phablet. They have much larger screens than a
smartphone but are smaller than a tablet.
3. Tablets:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Artificial Intelligence (AI): There are many definitions of


artificial intelligence (AI). Essentially, AI is a machine or
application which carries out a task that requires some
degree of intelligence.
The use of language
recognizing a person’s face, the ability to operate
machinery, such as a car, aeroplane, train, and so on,
and analyzing data to predict the outcome of a future
event, such as weather forecasting. Impact:
Whenever AI is mentioned, people usually think of
science fiction fantasies and think of robots. The
science fiction writer Isaac Asimov even went as far
Uses: as producing his three laws of robotics: » Robots may
Entertainment (streaming of music, videos, and not injure a human through action or inaction. »
television programs). Robots must obey orders given by humans without
Gaming (including group games). question. » A robot must protect itself unless it
As a camera or video camera. conflicts with the two laws above. Everyday uses:
Internet use (online sales, social networks, using QR An autonomous (driverless) vehicle – we already have
codes, and so on). driverless trains and autopilots on aeroplanes, but
Sending/receiving emails. future developments include driverless cars.
Global positioning system (use of maps to navigate to Robotic research is leading to improvements in
a location). technology to help amputees and people with
Calendar functions. disabilities.
Telephone banking (sending and receiving money Robots are used to help people carry out dangerous
using banking apps). or unpleasant tasks – for example, bomb disposal.
Voice over Internet Protocol: telephone network using
the internet, which also allows video calling. Negative impacts of AI
Instant access to social networks (social contact with
friends no matter where you are in the world).
Instant messaging.
Office and business management (allows rapid voice
and video communication).
Education use (using interactive software to teach or
learn from).
Remotely control devices.

Laptops are the most expandable of these devices, while


smartphones are the most portable. Tablets and
phablets fall somewhere in between, offering a balance
of portability and expandability. The choice of device
will depend on your specific needs and use case.

1.5. Impact of Emerging Technologies

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Unemployment, robots are capable of doing tedious Fast entry of new text into a document.
human tasks with much more efficiency and excellence Well-known method.
than humans. Easy to use for most people.
Dependency on technology could lead to problems in the Easier to do verification checks as data is entered (can
future. immediately compare the source document with typed
De-skilling: Tasks that used to be considered a talent are data on the screen).
now part of general, tedious processes that are done on
a regular basis by machines. Disadvantages:
Extended Reality refers to combined real and virtual It can be difficult to use if the user has limited arm/wrist
environments. The two most common examples at the use.
moment are: Slow method when compared to direct data entry.
Augmented reality (AR) is a merger between the
It is a fairly large device that uses up valuable desk space.
virtual and physical (real) world; it lays objects onto
pre-existing objects. e.g., Pokémon GO! Impact: safety
and rescue operations’ training, shopping and retail
(getting a better look at a car before the purchase),
healthcare (better understanding of a patient’s body)
Virtual reality (VR) enables an entirely new world to
be created, unlike AR, which has no link to the actual
surroundings of the user. It requires the user to be
specially equipped with a VR headset, joystick, and
headphones.
Impact: Military applications, educational 2. Numeric keypads:
purposes (looking at ancient buildings),
healthcare, media (interactive special effects in a Uses:
movie), scientific visualization (part of molecular
Automatic teller machines (ATMs), where the customer
structures/cells).
can key in their PIN, amount of money, etc.
Mobile phones allow phone numbers, etc., to be keyed in.
2. Input & Output Devices Point of sale terminals (POS) in case the barcode reader
fails to read the barcode – the number has to be keyed in
manually by the operator.
2.1. Input Devices and Their Uses Chip and PIN devices when paying by credit/debit cards.
Fast entry of numeric data into a spreadsheet.
An input device is any hardware device that allows a user
to enter data or instructions into a computer directly. Advantages:
An input device can send data to another device, but it
cannot receive data from another device. Faster than standard keyboards when entering numeric
Input devices are necessary for a computer to receive data.
commands from its users and data to process; they are Because many are small devices, they are very easy to
under the user's control or can be direct data entry. carry around.

Input devices can be complicated because they must ensure Disadvantages:


the user can interact with the computer correctly. Sometimes, they have small keys, which can make input
more difficult.
1. Keyboards: Sometimes, the order of the numbers on the keypad is
not intuitive.
Uses:

Input of data into applications software


Typing in commands to the computer

Advantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

3. Mouse: People with limited hand/wrist movement find the device


difficult to use.
Uses: It can be more difficult to control the pointer when
compared to a normal mouse.
Opening, closing and minimizing software Drag and drop operations are more complicated using a
Grouping, moving and deleting files. touchpad.
Image editing, for example, controls the size and position
of a drawing pasted into a document.
Controlling the position of a pointer on the screen to
allow selection.

Advantages:

It is a faster method for choosing an option than a


keyboard.
It's a very quick way of navigating through applications
and the internet.
Does not need a large desk area when compared to a
keyboard.
5. Tracker ball:
Disadvantages:
Uses:
It can be more difficult for people with restricted
hand/wrist movement than using a keyboard for data A good alternative to a mouse for people with conditions
entry. such as RSI.
Easy to damage, the older type of mouse quickly Used in an industrial control room environment.
becomes clogged up with dirt. Used in some luxury cars to select functions such as
Difficult to use if no flat surface is readily available. radio.

Advantages:

Does not need the same fine control as a mouse.


It is easier to use than a mouse if the operator has
problems with their wrist.
More accurately position the pointer on the screen.
They are more robust than a mouse.
Needs less desk space than a mouse or keyboard.
4. Touchpad: Disadvantages:
Uses:

Opening, closing and minimizing software


Grouping, moving and deleting files.
Image editing, for example, controls the size and position
of a drawing pasted into a document.
Controlling the position of a pointer on the screen to
allow selection.
Advantages:

Faster than a keyboard for choosing options.


Used to navigate applications and the internet.
Because the touchpad is integrated into the laptop
computer, there is no need for a separate mouse; this
aids the portability and is a big advantage if no flat
surfaces are available.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

It is not supplied with the computer as a standard; 7. Joysticks:


therefore, it is more costly.
Users may need training because it is not standard Uses:
equipment.
Used in video games.
Used in simulators to mimic the actual controls.

Advantages:

It is easier than keyboards for screen navigation.


In some applications, the control is more realistic than
using a mouse.

Disadvantages:

The on-screen pointer is more difficult to use.

6. Remote Control:
Uses:
Televisions, satellite systems, DVD/Blu-ray players and
Hi-Fi systems, to alter controls such as volume, on/off,
etc.
Used to control multimedia systems.
Used in industrial applications to remotely control
processes.

Advantages:
8. Driving wheel:
It can be operated from any reasonable distance.
In some conditions, e.g., in chemically hazardous Uses:
environments, we can control and measure from safe
Used in video games, especially car racing games.
distances.
Used in simulators to mimic actual vehicle controls.
Disadvantages:
Advantages:
Difficult to use for people with limited hand/wrist
It's a more realistic experience than both mouse and
movements.
joystick.
Physical obstacles can easily block the signal.
Easier than a keyboard or joystick to control steering
movements.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

It is a rather expensive input device as compared to a A limited number of input options are available.
mouse or joystick. This can lead to problems if an operator uses the system
Steering movements tend to be over-sensitive, which frequently (straining of arm muscles, RSI, etc., are all
gives an unrealistic feel. possible).
Unless it is an expensive simulator, feedback to the The screen can get very dirty with constant touching.
steering wheel is non-existent.

9. Touch screen (as an input device):


Uses: 10. Scanners:
Automatic teller machines (ATMs) to choose from on-
Uses:
screen options.
Point of sale terminals such as in restaurants. Scanning documents and converting them into different
Interactive whiteboards in education. formats
Computer-based training (CBT) where answers are Scanning in old documents to protect them in case the
selected during on-screen testing. original is lost/damaged.
Scanning in photographs for storage
Advantages:
Scanning in barcodes at POS terminals.
Faster entry of options than using a keyboard or mouse.
Advantages:
Very easy method for choosing options.
User-friendly method – no training necessary in its use. Images can be stored for editing at a later date.
Option to expand the size of the display if necessary. When used with OCR, they are much faster and more
accurate than typing the documents in.
Disadvantages:
It is possible to recover damaged documents by scanning
and producing an acceptable copy.

Disadvantages:
Limited quality, depending on how good the scanner’s
resolution is.
Fairly slow input method, especially if color mode is
selected.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT
Disadvantages:
11. Digital Cameras:
Sound files use up a lot of computer memory.
Uses: Reading data is more error-prone than typing in.

Taking photographs is still better than using smartphones


and tablets.
Data-capture device, e.g., as a reversing aid in cars.
Dentistry, to help capture pictures for better diagnosis.
The creation of virtual reality tours around houses,
buildings, etc.

Advantages:

Easier to produce better-quality photographs than with a


traditional camera.
Uploading photographs to a computer is faster than 13. Sensors:
scanning hard copies.
Memory cards can store many thousands of Uses:
photographs. Temperature sensors are used in automatic washing
There is no need to develop film and printouts; it saves machines, central heating systems, ovens, and
money and is more environmentally friendly. glasshouses.
Unwanted images can quickly be deleted from a memory Pressure sensors are used in intruder alarm systems and
card. washing machines.
Light sensors are used in automatic glasshouses, doors,
Disadvantages:
and street lighting control.
Need to be computer literate to know proper use. Sound/acoustic sensors are used in intruder alarm
Loss of artistry due to clever software doing all the work. systems, monitoring liquid and powder flow in pipes.
Images need to be compressed to reduce the amount of Humidity/moisture sensors are used in automatic
memory used. glasshouses, environmental monitoring, and in factories
where moisture levels are crucial.
pH sensors are used in automatic glasshouses, chemical
processes and environmental monitoring.

Advantages:
Readings are more accurate as compared to human
operators.
Readers are continuous, with no breaks in the monitoring.
Because it is a continuous process, any action or
warnings needed will be initiated immediately.
Automatic systems don’t need human intervention.
12. Microphones:
Disadvantages:
Uses:
Faulty sensors can give spurious results.
To input speech to be used in various applications. Most sensors are analogue; therefore, they require
Input in voice recognition software for authentication. conversion using Analogue to Digital Convertors.
As a sensor to pick up sound in an intruder alarm system.
Used in audio conferencing or VoIP applications. 14. Light pens:
Advantages: Uses:
It is faster to read text than it is to type it in. Selecting objects on CRT screens
It is possible to manipulate sound in real time rather than Drawing on screens
working on a completed recording.
It improves security if used as an authentication system. Advantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Greater accuracy than touch screens Where payments are made using cards
Small makes them portable and capable of being used in
small spaces. Advantages:
Easy-to-use technology. It is more secure than contactless cards as the PIN acts
Disadvantages: as a second security layer.
More robust system than Magnetic Stripe Cards
Lagging problems while drawing on the screen.
It only works with CRT monitors. Disadvantages:
Rather dated technology. Be very careful so the PIN isn’t seen by anyone while
being typed in.

2.2. Direct Data Entry & Associated


Devices
1. Magnetic Stripe Readers:
3. Radio Frequency Identification (RFID) reader:
Uses:
Uses:
On credit/debit card for use at ATMs
Security device to allow entry to buildings, hotels, etc. Livestock tracking
Retail, instead of barcodes, as they don’t need to be
Advantages: scanned in.
Admission passes.
Faster than keying in data manually. Library books, to acknowledge the books which have
Error-free, no human intervention needed. been borrowed.
Secure information isn’t in human-readable form.
Robust, there are no moving parts. Advantages:

Disadvantages: No line-of-sight contact is needed.


Very robust and reliable technology.
If the card is damaged, the data is lost. Very fast read rate.
Doesn’t work at a distance. Bidirectional data transfer.
As the information isn’t human-readable, this can be a Bulk detection is possible.
disadvantage in some cases.
Disadvantages:

Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal.
RFID is more expensive than a comparable barcode
system.

4. Optical Mark Reader/Recognition (OMR):


Uses:
2. Chip and PIN reader:
Used in MCQs checking.
Uses: Used in reading voting papers.

Advantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT
Advantages:
Very fast way of inputting survey results.
It is more accurate because there is no human Much faster than manually keying in data.
intervention. Allow automatic stock control.
More accurate than OCR methods. They are a tried and trusted technology.

Disadvantages: Disadvantages:

Designing the forms can be complicated to ensure the Relatively expensive system to administer.
marks are correctly positioned. Not fool-proof, barcodes can be swapped between items.
If there are problems, they need to be manually checked, Can be more easily damaged than RFID tags or magnetic
which can be time-consuming. stripes.

5. Optical Character Recognition/Reader:


7. Quick response (QR) code scanner:
Uses:
Uses:
Processing passports and identity cards.
Converting hard copy documents into electronic form. used in advertising to contain information about the
Used in automatic number plate recognition (ANPR) advertising company.
systems. Wi-Fi authentication
Digitizing historic hard copies for archiving. Used in restaurants, you can see the menu by scanning.
Advantages: Advantages:

It is a much faster data entry system than manual typing. hold much more information than normal barcode.
No human intervention, its error free. fewer errors than with barcodes.
QR codes are easier to read because the cameras can
Disadvantages: even read them on a smartphone.
System has difficulty in reading different handwritings. It is possible to encrypt QR codes.
Still not a very accurate technique. Disadvantages:

6. Barcode readers:
Uses:

Used in supermarkets for stock control.


In libraries, to keep track of books.
As a safety function to ensure checking of electrical
equipment on a daily basis.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT
Advantages:
More than one QR format is available.
QR codes can be used to transmit malicious data. Very efficient, low power consumption.
Lightweight devices.
Screens can made in various sizes.
No flickering images.
Very sharp image resolution.
Disadvantages:

Colour and contrast from different angles are


inconsistent.
Motion blur is a common issue.
Lower contrast than CRT monitors.

2.3. Output Devices and Their Uses


1. Cathode ray tube (CRT) monitors:
Uses:

Their large screens allow complex diagrams to be


created in Computer-aided design.
Used with light pens to allow designs to be created.

Advantages:
3. Touch screen (as an output devices):
Can be seen at a wider range of angles, unlike LCDs.
Allow the use of light pens. Uses:

Disadvantages: ATMs
POS terminals
They are very heavy and bulky. Information kiosks.
They run very hot and can cause fires if left unattended.
They use a lot more power than LCDs. Advantages:
Their flickering can lead to headaches.
Don’t need additional input devices.
Image burn-in is a common issue.
They are very interactive, and many functions, such as
swiping, can be done.
They add a high-tech feel to devices and interfaces.

Disadvantages:

2. Liquid Crystal Display (LCD) screens:


Uses:

Main output device for modern computers.


Mobile phones, laptops, video games use LCD screens.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

They tend to get dirty with frequent use. Printing is fast.


Frequent use results in straining of arm muscles, RSI, etc. They can handle very large print jobs.
If large amounts of data are input/output, they aren’t very Quality is consistently high.
accurate, and the interface isn’t very fast. Toner cartridges last for a long time.

Disadvantages:

They are only considerably fast if several copies are


being made.
Color laser printers are expensive to run.
They produce ozone and volatile organic compounds
because of their printing method and toner.

4. Multimedia projectors:
Uses:
Training presentations to allow the whole audience to see
images.
Advertising presentations.
Home cinema systems.
6. Inkjet printers:
Advantages:
Uses:
More people can watch as they don’t have to crowd
around a laptop. Where low-output volumes are required.
Avoids the need for several networked computers. Where high-quality printing is required for single pages.

Disadvantages: Advantages:
Images can be fuzzy. High-quality output
Expensive to buy. Cheaper than laser printers.
Set-up can be complicated. Very lightweight
Don’t produce ozone and volatile organic compounds.

Disadvantages:

5. Laser printers:
Uses:
In uses where low noise is required.
If fast, high quality, high-volume printing is required.

Advantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Slow output if many copies are needed. Producing architectural drawings


Can’t do large print jobs. Producing engineering drawings
Printing can smudge if user isn’t careful. Drawing animation characters.
Can be expensive if used a lot.
Advantages:

Very high-quality output.


can produce large, monochrome and color drawings very
accurately.
Can print on a variety on materials.

Disadvantages:

Very slow printing.


Expensive equipment to purchase initially.
Have a very large physical footprint compared to a
printer.
7. Dot matrix printers:
Uses:
Used in environments where noise isn’t a major issue.
Carbon copies or multi-part outputs can be produced.
Widely used in till receipts.

Advantages:
Can be used in varying environments unlike laser/inkjet
printers.
Carbon copies or multi-part outputs can be produced. 9. 3D printers:
Very cheap to run and maintain.
Good for continuous printing. Uses:
Disadvantages: Custom-made prosthetic limbs.
In aerospace, if parts of the aircraft are made using 3d
Very noisy
printers they can be very lightweight.
Initial cost is more than an inkjet printer.
Making spare parts for items that aren’t now
Very slow, poor-quality printing.
manufactured, e.g., parts of a vintage car.
Advantages:

Manufacturing objects has become much easier.


Even though the initial cost is high, it is still cheaper than
the more conventional way.
Parts for machinery that aren’t available can be made.
Disadvantages:

8. (Graph) Plotters:
Uses:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Potential to make counterfeit items. Speaker output can disturb irrelevant people in the same
Could lead to manufacture of dangerous items by almost area, e.g., an office.
anyone. Sound quality is high only expensive speakers.
Job loss potential. They take up a lot of desk space.

10. Speaker: 11. Actuators:


Uses: Uses:
Used in all phones and most computers. Used to turn on motors, buzzers, and switches.
Helps visually impaired people. Allow a computer to control physical devices,
Plays downloaded sound files.
Advantages:
Advantages:
Allow remote operation of many devices.
Amplified sounds can be much louder than the original Relatively inexpensive devices.
sound.
Amplified sounds can be enough to be heard by a huge Disadvantages:
crowd. They are an additional device in the system that could go
Very simple technology. wrong.
They are especially useful for blind people, for instance,
As analogue devices, signals need to be converted using
reading e-books. a DAC.
Disadvantages:
3. Storage Devices and Media
3.1. Backing-Up Data
Backing up refers to copying files or data into a different
medium in case of damage or loss of original copy.

Why do we back up data?


To safeguard against loss of data.
To safeguard against damages caused by hackers.
In case files need to be sent elsewhere, to protect the
original format of files.

3.2. Magnetic Backing Storage Media


Holds data magnetically.
The surface area of the media is magnetised so that it
can hold bits of data.
The device that reads media can also read the bits held
on the surface area

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Magnetic tape drives They can be easily damaged if user accidentally drops it
or doesn’t correctly shut down the drive after use.
Uses: The data transfer rate is not as fast as for fixed hard disk
drives.
used in applications where batch processing is used.
used as a backup media where vast amounts of data
need to be stored.
3.3. Optical Media and Optical Storage
used in long-term archiving of data, they have huge data Devices
storage capacities and are known to be very stable.
Holds data by burning ‘dots’ onto the surface with a high-
Advantages: powered laser.
The data that reads the media can read the data by
They are generally less expensive than hard disk drives.
shining a lower-powered laser over the dots.
It is a very robust technology.
They have a huge data storage capacity.
CD-R/DVD-R ~ Write Once Only
The data transfer rate is fast.

Disadvantages: Uses:

Prolonged data access times (uses serial access). Home recordings of music and (CD-R) and films (DVD-R).
When updating, another tape is needed to store the final Used to store data to be kept for later use to be
updated version. transferred to another computer.
They are affected by magnetic fields, a strong field can Advantages:
corrupt data stored on the tape.
Cheaper medium than RW disks.
Fixed Hard Disks/Drives Once burned (and finalised), they behave like a ROM.

Uses: Disadvantages:

To store the OS, systems software and working data/files. It can only be recorded once; if an error occurs, then the
Storing applications files. disk has to be thrown away.
Used in real-time systems and in online systems. Not all CD/DVD players can read CD-R/DVD-R.
Used in file servers for computer networks.
CD-RW/DVD-RW ~ Read and Write
Advantages:
Uses:
They have a very fast data transfer rate and fast access
times to data. Used to record television programs which can be
They have a very large memory capacity. recorded over, time and time again.
Used in CCTV systems.
Disadvantages: It can be used as a backup device for files and data.
It can be fairly easily damaged. Advantages:
They have many moving parts which affect overall
reliability. It can be written over many times.
Their read/write operation can be quite noisy when You can use different file formats each time it is used.
compared to solid-state drives. It is not as wasteful as the R format because the files/data
can be added later.
Portable Hard Disk Drives
Disadvantages:
Uses:
It can be relatively expensive media.
Can be used as a backup system to prevent data loss. Possible to accidentally overwrite data.
It can be used to transfer data/files/software between
computers. CD-ROM/DVD-ROM ~ Read Only
Advantages: Uses:
Data access time and data transfer rate are very fast.
It has a very large memory capacity.
It can be used as a method of transferring information
between computers.
Disadvantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

These are read-only memory (ROM), which means they Relatively expensive discs.
can’t be written over and can only be read. Permanent Encryption problems when used to store videos.
storage method. The introduction of HD (high definition) DVD players has
CD-ROM is used to store music files and to store reduced the advantages of using Blu-ray technology.
software, computer games and reference software.
DVD-ROM has much larger storage and is used to store 3.4. Solid State Backing Storage
films.
Used in applications where there is a real need to Holds data on devices that don’t have any moving parts.
prevent deletion or overwriting of important data.

Advantages:
Solid-state drives (SSD)

They are less expensive than hard disk drive systems. Uses:
They are very portable as they are small and light. Storage device to store files, applications, OSs, and so on.
Data stored on them is read-only, so it cannot be
accidentally overwritten. Advantages:
Disadvantages: They are more reliable as they have no moving parts.
They are considerably lighter and suitable for laptops.
Hold far less data than hard disk drives or memory sticks. They do not have to ‘get up to speed’ before they work
Very slow data transfer rate and data access times, as correctly.
compared to hard disk drives. They have lower power consumption.
You cannot add your files to the disks because they are They run much cooler than HDDs.
both read-only. Because they have no moving parts, they are very thin.
SSD data access time is only 0.1 milliseconds compared
Blu-Ray Discs to 10 milliseconds for HDD.
The main differences between DVD and Blu-ray are: Data transfer speed for SSDs is also much faster than for
HDDs.
1. Blu-ray uses a blue laser rather than a red laser. (The
wavelength of blue light is 405nm, much smaller than Disadvantages:
the 650nm red laser) This makes pits and lands much SSD endurance - SSDs are conservatively rated at only
smaller, so they store five times more data than 20GB write operations per day over three years.
DVDs. More expensive than magnetic hard disks.
2. Blu-ray disks automatically come with a secure Smaller storage capacity than magnetic hard disks.
encryption system, which helps to prevent piracy and
copyright infringement. Pen drives (Memory sticks)
3. The data transfer rate for a DVD is 10 Mbps, and for a
Blu-ray disc, it is 36 Mbps. Uses:
Uses: Transporting files between computers or using them as a
backing store.
Home video consoles. Used as a security device to prevent software piracy
Storing and playing back movies. (known as a dongle).
Computers can use this technology for data storage or
backing hard drives. Advantages:
Camcorders can use this media to store movies.
Very compact and portable media.
Advantages: Very robust.
Does not need additional software to work on most
Very large storage capacity. computers.
Very fast data transfer rate. They are not affected by magnetic fields.
The data access speed is also greater than with other
optical media. Disadvantages:
Blu-ray discs automatically come with a secure
encryption system. Cannot protect the data/files by making it ‘read-only’.
Easy to lose (due to the small physical size).
Disadvantages: The user needs to be very careful when removing a
memory stick from a computer - incorrect removal will
corrupt the data on the memory stick and make it
useless.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT
When a data packet is received, the router checks if the
Flash Memory cards packet is intended for it or another network. The data packet
is routed to the local switch/hub if it's meant for its network. If
Different types of memory cards: not, the data packet is sent to the relevant router, which
» SD cards (secure digital card) sends it to the relevant device.
» XD cards (extreme digital card)
» CFast card (compact, fast card). They consult routing cables to know where to send the
Uses: data.

Storing photos on digital cameras. Common Network Devices


Used as mobile phone memory cards.
Used in MP3 players to store music files. 1. Network Interface Cards (NIC): These are needed to
Used as a backing store in hand-held computer devices. allow a device to connect to a network. Turns binary
data into an electrical signal that allows network
Advantages: access. Usually integrated into the motherboard.
Very compact. Each NIC is given a unique hardwired media access
Because they have no moving parts, they are very control (MAC) address.
durable. Media access control (MAC) address: a number that
They can hold large amounts of data. uniquely identifies a device when connected to a network.
Compact cameras and smartphones can read and write The first six hex digits identify the manufacturer’s code,
memory cards, allowing users to transport extensive and the next 6 identify the device’s serial number.
collections of photographs, songs, etc.
2. Hubs: they are hardware devices that can have
Disadvantages: several other devices connected to them. They are
used to connect devices together to form a local area
Expensive per gigabyte of memory when compared to
HDDs. network (LAN). It takes a data packet received by one
Have a lower storage capacity than hard disks. of its ports and sends it to all relevant or irrelevant
Have a finite life regarding the number of times they can devices that are connected to it.
be read from or written to. It is not very secure to broadcast data to all devices.
Memory cards, specifically the micro SD card, are the Unnecessary network traffic.
smallest sized devices available, making them more likely
to be lost, stolen or damaged. The storage should be 3. Switches: intelligent hubs. Used to connect devices to
sized cause the amount of storage does not prevent the form a LAN. Unlike hubs, the switches store the MAC
drive from being stolen addresses of all devices on a lookup table. So, it only
Users must often purchase a card reader or USB sends data to the relevant device.
converter to view the data. In summary:

Both are used to connect devices in LAN.


4. Networks & the Effects of Both use data packets.
Hubs send data to every device on the network.
Using Them Switches send data to a relevant device only.
Switches have better security.
Switches use lookup tables to determine the destination
4.1. Networks for a data packet.
Switches use MAC addresses for relevant device
Routers locations.
A device that enables data to be sent between different types
of networks. It can be connected through cables or wirelessly 4. Bridges: Devices that connect one LAN to another
to connect a LAN to the internet. LAN that use the same protocol. Unlike routers, they
It can be used for: can’t communicate with external networks, such as
the Internet.
connecting networks and devices to the internet, Comparison:
storing computer addresses,
routing data packets.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Bridges connect LANs together; routers connect various 1. Public Cloud - The customer and the cloud storage
types of networks together. provider are different companies.
Bridges scan MAC addresses while routers scan the IP 2. Private Cloud - The customer and the cloud storage
addresses. provider are a single organization.
Both send out data in the form of data packets. 3. Hybrid Cloud - Combines public and private cloud
Bridges connect networks with the same protocol; options and allows sensitive data to remain private
routers can connect networks with different protocols. while providing public cloud services for less sensitive
The router uses routing tables to direct data packets, but information.
bridges don’t.
Bridges have only two ports; routers have multiple ports. Cloud data is duplicated and stored on other servers to
ensure availability during system failures, upgrades, and
Wi-Fi & Bluetooth maintenance.

Both are used for wireless communication between devices. Advantages:


They both use electromagnetic radiation as the carrier of Services can be scaled up or down according to changing
data transmission. requirements.
Bluetooth uses: Cloud storage eliminates the need for a business to
When transferring data between 2 or more devices that purchase expensive equipment for infrastructure and
are very close together. maintenance.
When the speed of data transmission isn’t crucial. Readily available globally, allowing both remote working
For low-bandwidth applications. and data sharing.
Providers offer high levels of ensuring that services are
Wi-Fi uses: always available.
It can offer an almost unlimited amount of storage.
Full-scale networks. A backup of the data from the cloud will allow full data
When the data transfer rate is crucial. recovery in case of incidents.
For uses where a higher range and better security are Files can be synced across multiple devices.
required. There is no need to carry storage devices around.
Differences and similarities: Disadvantages:
Bluetooth uses a transmission frequency of 2.4 GHz, A stable internet connection is always required.
whereas Wi-Fi uses a 2.4 – 5.0 GHz range. Data storage in clouds may be vulnerable to security
Wi-Fi has a much faster data transfer rate. breaches.
Wi-Fi has a higher geographical range in which it is The user depends on the storage provider for reliability
effective. and availability of services.
Bluetooth only allows up to 7 devices to be connected The services may become expensive as the amount of
simultaneously, whereas the number of devices storage or bandwidth required increases.
connected to a Wi-Fi network depends on the
router/routers used. Common Network Environments
Bluetooth uses key-matching encryption. However, Wi-Fi
uses WPA (Wi-Fi protected access) and WEP (wireless 1. Internet:
equivalent privacy).
The Internet is a very large global network that consists
Cloud Computing of many other interconnected networks
The World Wide Web is a vast collection of web pages
This method is where data is stored on remote servers that can be accessed using a web browser.
accessed online. The World Wide Web allows you to access information
The three types of cloud storage are: by using the internet

Characteristics:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

It is an open network, meaning everyone can access the Private Intranet that also allows access by selected
same resources and information as everybody else. parties that reside outside of the organization. These
People from all over the world can communicate with parties, for example, maybe customers, key stakeholders
each other in real-time. or clients.
Available to anyone who has a suitable device and access Users will have an authorization level once they have
to any one of the interconnected networks. successfully logged in, which will determine which
resources they may access.
Uses: Similarities between the Internet, Intranet and extranet
Education and training are as follows:
Social Networking They are all web-based technologies
Online shopping They allow users to access information remotely
They all use client-server architecture
Entertainment
They all use security measures such as
2. Intranet: authentication and encryption
They all promote and facilitate information and
Usually private and are used to send information resource sharing
securely and safely. Differences between the internet, intranet and extranet
Access to an organization’s Intranet is restricted and only are as follows:
accessible to authorized users such as employees. The internet is a global network, whereas an
Intranets have many advantages over the internet, such intranet/extranet is a private network contained
as: within an organization
better bandwidth than the internet, The use of the internet covers a wide range of
data is kept within the organization, purposes, whereas an intranet/extranet is designed
less chance of hacking and attacks, for specific users and purposes.
administrators can manage access to external sites Much information is publicly available, whereas an
and links. intranet/extranet is not.
The Internet is not owned solely by one person or
Characteristics: organization, whereas the organization usually owns
intranets/extranets.
A private network that is accessible to employees within a
company or organization. Network Types
Usually behind a firewall to ensure security.
Allows for document sharing and the use of collaboration 1. Local Area Network (LAN): networks usually
tools between users. contained within a single building or small
It can be customized to meet the specific requirements of geographical location. It is made up of hubs and/or
the business. switches, which will connect several devices together.
Users will require a username and password to access One hub or switch commonly connects to a router,
the Intranet. allowing LAN connectivity to other outside networks
such as the Internet.
3. Extranet:
Advantages:

Allows centralized management of updates, backups and


software installations.
Can secure its devices with the use of firewalls, antivirus
software and other security features to prevent
unauthorized access.
A LAN allows users on the network to share resources
such as printers and other peripherals.
Disadvantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

The network may not function correctly in case of Setting up and maintaining a WAN can be expensive,
hardware failure. especially compared to LANs.
They are more prone to attacks than standalone Cover larger distances and rely on public networks or
computers. leased lines, which can introduce latency and affect
Data and peripheral accessing can be slow, based on performance.
network traffic. WANs are subject to the reliability and availability of
LAN networks require maintenance to ensure the external service providers.
software is up-to-date.

2. Wireless Local Area Network (WLAN): Local Area 4.2. Network Issues and
Networks allow devices to connect wirelessly rather Communication
than using physical cables. Wireless Access Points
(WAPs) are connected to an existing wired network, Connection to a network exposes a user to:
which provides wireless connectivity. Support a vast Hacking: Unauthorized access given to the computer.
range of devices, such as smartphones and laptops, This can lead to identity theft or the misuse of
are very popular in public areas such as shopping personal information.
malls. Phishing: Phishing involves getting sensitive
information, such as usernames, passwords, and
Advantages: credit card details, for malicious reasons by
Allows users to connect anywhere in the range of a mimicking a reliable webpage on the network
Wireless Access Point (WAP). Pharming: This is malicious code installed on a user’s
They can be used in various indoor and outdoor computer or a web server; the code will redirect the
environments, making them highly flexible. user to a fake website without their knowledge (the
As the requirements change, additional WAPs can be user doesn’t have to take any action, unlike phishing).
added relatively easily. Viruses: Program code that replicates (copies itself)
Printer access can be given to wireless devices. to delete or corrupt files and cause the computer to
malfunction
Disadvantages:
Passwords
The strength of their signals can be affected by obstacles
such as walls. It is a common form of security often accompanied by a
Speeds can be affected by high-traffic areas. username or email address.
It can sustain interference from other devices which can
affect performance and connectivity. There are many ways to enhance the security of your
Can be vulnerable to security threats due to signal password, such as the following:
interception. Ensure that the password is changed regularly in case
it has been obtained illegally or accidentally
3. Wide Area Networks (WAN): is formed by several Ensure that the password uses a combination of
LANs connected through a router. It is expensive. uppercase, lowercase, numbers and special
However, it comes with a more enhanced security. characters to make the password more difficult to
Additional hardware is needed for a WAN: Routers, guess.
modems, and proxy servers. iloveict is a weak password
1lov3ICT# is a strong password
Advantages: Anti-spyware software can be run regularly to ensure
Provide the ability to connect geographically dispersed that your information, including your password, is not
locations, such as offices in different cities or countries. passed to an unauthorized third-party user.
Offer the flexibility to scale up or down based on the
organisation's needs. Other Authentication Methods
Administrators can monitor and manage the network
infrastructure from a single location.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

1. Zero login: A security concept that eliminates Comparing the scanned files against an extensive
traditional login methods, such as usernames and database of known threats
passwords, using biometrics or other authentication Real-time scanning
factors for seamless and password-less access. Regular updates to gather an up-to-date list of known
2. Biometric Recognition: These authentication threats
methods use unique physical or behavioural Quarantine of infected files
characteristics, such as fingerprints, iris scans, or Quarantining files allows threats to be automatically
voice recognition, to verify a person's identity. deleted.
3. Magnetic Stripes: These are authentication features Allows the user to determine if the file is a legitimate
on cards storing data magnetically. They enable threat and not a false positive.
secure identification and authorization by containing
encoded information that magnetic stripe readers Heuristic Checking: Instead of relying solely on a database
can read. of known viruses, this method looks for behavioural patterns
4. Smart Cards: Smart cards are portable devices with and other features in a file to identify possible risks.
integrated circuits to store and process data. They
are used for authentication, identification, and secure Electronic Conferencing
transactions in various applications such as banking,
telecommunications, and access control. 1. Video Conferencing: It is a form of audio and video
communication. It serves as a stand-in for face-to-
5. Physical Tokens: It is a type of authentication that
face meetings between several persons who may
takes the shape of a solid object. The user
reside abroad or in another region of the country. It
demonstrates ownership of the token through
interaction with a login system. Physical tokens have utilizes a network in some way and is done in real-
embedded clocks that create one-time passwords time.
(OTPs) when a PIN and other authentication The basic hardware includes:
information are entered.
6. Electronic Tokens are applications that users install webcams,
on their hardware, such as smartphones. Say a large monitors/television screens,
person wants to access a website on a tablet microphones,
computer. To access this website, users must first speakers.
authenticate themselves using electronic tokens. The
user has already set up the electronic token app with The software used are:
their smartphone. The user launches the app on their Webcam and microphone software drivers
smartphone when the website asks them to verify CODEC (coder and de-coder)
their identity. The program creates an OTP that is only Echo cancellation software
good for a short period of time.
Advantages:
Anti-malware Software
It is much easier to access important documents or bring
Anti-malware software is designed to protect devices in ‘experts’ at key parts of the conference.
against viruses and malicious software. It has 3 primary It is possible to hold conferences at short notice.
purposes: detect, prevent and remove malicious Reduced travelling costs.
software. It is installed onto a computer system and will There is no need to pay for hotel accommodation or
operate in the background. venue hire.
Reduces the cost of taking people away from work for two
Standard features of Anti-Malware software include the or three days to travel.
following: Using video conferencing is better than having delegates
travel to potentially unsafe places worldwide.
Disadvantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Potential time lag in responses/delays when talking. Allows participants to see each other through video,
Images can jerk. providing a more immersive and engaging experience
It is very expensive to set up in the first place. than audio conferencing.
Problems if the delegates live in different countries with Often offer screen sharing capabilities, enabling
large time zone differences. participants to share presentations, documents, or other
Requires IT knowledge to some extent. visual content in real-time.
It's not the best for people who consider travelling a job Often provide features like chat, polling, hand raising, and
perk. Q&A sessions, fostering interactivity and engagement
Completely reliant on stable internet connections. among participants.

2. Audio Conferencing: Meetings held using audio Disadvantages:


(sound) technology are called audio conferencing.
The normal telephone network can be used for audio Heavily relies on internet connectivity and technical
conferencing, frequently called a phone conference. infrastructure.
They can be susceptible to distractions and multitasking.
The hardware required is: It often has various features and settings that
participants need to familiarize themselves with,
a computer (with built-in microphones and speakers) especially if they are new to the platform.
external microphone and/or speakers
an internet phone
a standard phone. 5. The Effects of Using IT
Advantages:
5.1. Microprocessor-Controlled
Allows participants to join meetings from any location.
Eliminates the need for travel expenses, such as Devices
transportation, accommodation, and meals.
Saves time by eliminating travel time and allowing A microprocessor-driven labour-saving machine enables
meetings to be scheduled and conducted quickly. users to focus on other activities while the machine
completes its work. The second generation of devices
Disadvantages: containing microprocessors is more user-friendly and
has more functionality, such as "intelligent tuning" in
Lacks the visual aspect of face-to-face meetings, which television sets.
can hinder communication.
It can limit interaction and engagement compared to in- Advantages of microprocessor-controlled labor-saving
person or video conferencing. devices:
Heavily relies on technology, and technical issues such as
poor audio quality, background noise, or connectivity no need to do manual tasks at home
problems are common. more time for leisure activities
no need to stay home while chores are being done
3. Web Conferencing: web-enabled devices allow devices to be switched on or
Web conferencing, often known as webinars or off while the owner is out
webcasts, makes use of the Internet to enable automated burglar alarms give a higher sense of security
conference calls. This system makes use of numerous and well-being
computers that are interconnected over the internet. smart fridges and freezers prevent food waste by
It operates in real-time, just like video conferencing, keeping track of products’ expiry, availability, etc.
and enables the following meeting types:
» business meetings to discuss new ideas Disadvantages of microprocessor-controlled labor-saving
» presentations devices:
» online education or training.

Advantages:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

unhealthy lifestyle due to inactivity caused by devices monitoring traffic on motorways


doing all tasks congestion zone monitoring
tend to make people lazy automatic number plate recognition (ANPR)
potential deskilling automatic traffic light control
any device containing a microprocessor and can air traffic control systems
communicate using the internet displays a threat of railway signalling systems
cybersecurity breaches
Advantages of transport monitoring and control systems:
General advantages of using a microprocessor-controlled
device: smart motorways keep updating according to changing
traffic conditions
save energy due to being efficient, as well as turning off more efficient
after inactivity traffic offences can be remotely penalized using ANPR
can be easier 'programming' these devices to perform car thefts can be spotted using ANPR
tasks rather than turning knobs and pressing buttons minimizes human errors, reducing the rate of accidents
manually
Disadvantages:
General disadvantages of microprocessor-controlled
devices: If a hacker breaches security, the vehicle could be
controlled by them.
lead to more wasteful devices The system might come to a halt if it malfunctions.
can be more complex to operate for technophobes Systems with a poor design could compromise safety.
leaving devices on standby is wasteful The easy tracking of harmless people's movements is
made possible by ANPR equipment. Who can access such
Data Security Issues data?

Any home appliance managed remotely could provide Autonomous vehicles in transport
hackers access to your personal information. These devices To properly execute their activities, autonomous cars require
frequently have default (or no) password settings, which sensors, cameras, actuators, microprocessors (along with
makes it simple for attackers to get sensitive information. For very complex algorithms). Automobile control systems can
instance, it is easy to discover holiday dates by hacking into a accomplish essential tasks by sensing information from
central heating controller (or the software used to interface cameras and ultrasonics.
with it), making a home an obvious target for break-ins. It is Consider an autonomous vehicle approaching a set of
likely for a hacker to obtain important information, such as red-lighting traffic signals.
credit card numbers, if the refrigerator or freezer
automatically orders goods from a retailer. The vehicle's control system must first recognize the
road sign before consulting the database to determine
Social Interactions the appropriate action.
The CPU must instruct the actuators to apply the brakes
The positive aspects include: and put the gear in "park" since the traffic light is red.
The light must be continuously watched until it turns
easier to make new friends using chat rooms green.
easier to find people who share similar interests/hobbies After that, the CPU will again tell the actuators to engage
less expensive to keep in touch using VoIP technology. first gear, let go of the brakes, and open the throttle
(accelerator).
The negative aspects include:
Advantages of an autonomous car, bus, or van:
people do not meet face-to-face as much (social
isolation)
a lack of social interaction may make people more
anxious about meeting people in real life
When communicating online, people can act less politely
or more harshly, and cybercrime is a serious issue,
especially for teenagers.

Monitoring and Controlling Transport


Uses:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

safer due to the removal of human error


due to the more efficient operation of vehicles, it is better 5.2. Potential Health Problems related
for the environment to the Prolonged use of IT Equipment
reduced traffic congestion
increased lane capacity Long-term exposure to computing devices may affect user
reduced travel times well-being.
stress-free parking for motorists Mentioned below are some of the health issues,
accompanied by their causes and prevention tactics:
Disadvantages: 1. Repetitive strain injury (RSI): A condition affecting the
very high installation prices muscles and nerves
driver and passenger reluctance of the new technology Cause: repetitive movements and overuse of muscles, such
reduction in taxi requirements could lead to as wrists
unemployment Minimizing health risks: regular breaks, ergonomic
maintenance of the sensors and cameras is crucial equipment, correct typing techniques.
the ever-present fear of hacking into the vehicle’s control 2. Back and neck strain: Back pain and other related issues.
system Cause: due to prolonged use of monitors
Minimizing health risks: use adjustable chairs, footrests, and
Advantages of an autonomous train: tiltable screens.
3. Eyestrain: strain and fatigue, unwanted harm to vision.
improved punctuality Cause: due to bad lighting and prolonged screen usage.
reduced running costs due to fewer staff Minimizing health risks: use LCDs instead of CRTs, take
no human error regular breaks, use anti-glare screens, and do regular eye
minimized energy consumption testing.
possible to increase the frequency of trains as the 4. Headaches: pain or discomfort in the head or face area.
possibility of delays is removed Cause: incorrect lighting, screen reflections, flickering
more straightforward to update changes in train screens, etc.
schedules Minimizing health risks: use anti-glare screens, take regular
breaks, regular eye-testing.
Disadvantages:
5. Ozone irritation: inflammation and irritation of the tissues
fear of the system being hacked into lining human airways
initial instalment costs are very high Cause: inhalation of ozone released by laser printers in an
ensuring passenger behaviour is vital, especially during office.
rush hours. Minimizing health risks: proper ventilation, laser printers
human reluctance to new technology should be housed in a separate room, replace laser printers
without drivers, CCTV monitoring will be continuously with inkjet printers, if possible.
required

Advantages of autonomous aeroplanes: 6. ICT Applications


improvement in passenger comfort
reduced running costs, fewer staff 6.1. Communication
as most accidents are due to pilot-induced errors, safety
is improved Newsletters and posters
improved aerodynamics as an outcome of the removal of
the cockpit

Disadvantages:
security aspects due to the absence of pilots
emergencies may be challenging to deal with
hacking into the system
passenger reluctance
software glitches can be catastrophic

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Paper-based communication is used to inform people Uses a mixture of media to present information:
about their interests animations, video, sound, transitions, hyperlinks
Schools use these to inform parents about events/dates Produced using software packages
Advantages Used with a projector so a large audience can view
Released regularly Advantages
The recipients have a permanent copy Use of sound and animation/video effects
Disadvantages Interactive/hyperlinks built into presentations
Requires distribution More likely to hold the audience’s attention
There are no special effects, sound/video/animation Disadvantages
There are printing costs, paper/ink Need for special equipment – expensive
The targeted audience may or may not receive the It may require internet access
information Distracts the audience from the sole content of the
presentation
Websites It is very easy to make a presentation with too many
features
Collection of webpages, text, graphics, video, and sound
Hosted on a web server on the internet Media streaming
Need to write code or use a web authoring application
Hyperlinks to other pages can be added Real-time transition of audio and video files over the
Interactive websites require programming knowledge internet
Can use a camera, scanner, and microphone to input allows users to access content without downloading it to
data their devices
Usually, hire space from the web hosting company popular services include Spotify, YouTube, and social
Advantages media websites
Ability to add sound/video/animation uses buffering, which makes sure the video plays back
Links to other websites/hyperlinks smoothly without freezing. While the buffer receives data
The use of hot spots packets, it sends previously received ones to the playback
Buttons to navigate/move around the website device so that there are no gaps in the played data
Hit counters to see who has visited the websites Advantages
worldwide advertising capability Users can access any information at any time and
Disadvantages from any location
Can be hacked and modified, or viruses introduced Offers an extensive library of content
Need for a computer and internet connection Compared to traditional cable or satellite TV
Lack of portability compared with the paper-based subscriptions, media streaming can be more cost-
system effective
Need to maintain the website once it is set up Disadvantages
Heavily relies on a stable and high-speed internet
Multimedia Presentations connection.
Not all content is available on every streaming
platform due to licensing agreements and exclusivity
deals.
You don’t own the media when streaming media, so if
the streaming service removes a movie or a TV show
from its library, it may no longer be accessible to you.

ePublications

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

digital versions of printed materials, such as eBooks, using models is less expensive than having to build the
eMagazines, and eNewspapers. real thing
It can be read on electronic devices. safer to use a computer model
Advantages allows you to try out various different scenarios in
aid portability advance
they are often more affordable than paperback nearly impossible to try out some tasks in advance in real
books. life due to high risk
Offer interactive elements that enhance the reading faster to use a computer model than to do the real thing
experience.
Disadvantages Disadvantages of using models:
reading from an electronic device for a prolonged a model can’t be completely reliant as the output is
time can cause eyestrain
entirely based on the input
ePublications lack the tactile experience and physical frequently, computer modelling can be a very costly
presence that some readers enjoy option
compatibility issues can arise if the ePublications is in human reluctance is a common problem in this
a format that is not supported by the reader's device technology
or software
Some of the applications of computer modelling include:
Mobile Communication 1. Personal finance: Computer modelling involves using
mathematical algorithms and data analysis to simulate
Mobile devices support many forms of communication, such various financial scenarios, such as investment strategies,
as: retirement planning, and risk assessment, aiding individuals
1. Short message service (SMS) messaging: permits in making informed decisions and optimizing their financial
extremely quick communication with another person via goals.
typing on a keyboard (a mobile phone or tablet's keyboard is 2. Bridge and building design: Computer modelling is
frequently virtual). Its benefit is that the recipient can get the crucial in bridge and building design. It allows engineers to
text whenever they choose without being available. simulate and analyze structural behaviour, assess load
2. Phone calls: Making calls while on the go is among the capacities, and predict the response to external forces. It
most fundamental applications of a mobile phone. Mobile aids in optimizing designs, ensuring structural integrity, and
phones are the perfect method to stay in correspondence minimizing potential risks before construction begins.
anywhere there is a network signal because they are 3. Flood water management: Computer modelling plays a
compact and have an independent battery. vital role in flood water management by simulating water
3. Voice over Internet Protocol (VoIP): a communication flow behaviour, predicting flood extents, and assessing
technique for Internet users. VoIP transforms sound captured potential flood risks. It helps design and optimise flood
by the built-in mic of the cell phone into individual data mitigation measures, such as levees and floodplain zoning,
packets that may be transmitted via the internet to their allowing authorities to make informed decisions, develop
intended recipient. effective emergency response plans, and minimize the
4. Video calls: enables real-time video conversing between impact of flooding on communities.
multiple participants with a camera-enabled device. Uses an 4. Traffic management: Computer modelling simulates and
internet connection or cellular data. Software that may be analyses traffic flow, predicts congestion patterns, and
used for video calling includes FaceTime, Skype, and Zoom. optimises traffic control strategies. It aids in designing
5. Accessing the Internet: Another helpful feature is efficient road networks, optimizing signal timings, and
accessing the net from a mobile device. Any mobile device evaluating the impact of transportation infrastructure
with a wireless broadband connection or a mobile phone projects. This enables authorities to make informed
network can link to the internet. decisions, alleviate congestion, and improve overall traffic
efficiency for better urban mobility.
6.2. Modelling Applications
Advantages of using models:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT
5. Weather forecasting: Computer modelling plays a pivotal
role in weather forecasting by simulating the Earth's 6.4. School Management Systems
atmosphere, oceanic conditions, and other environmental
factors. These models use complex algorithms to predict Computer-controlled School Management Systems:
weather patterns, including temperature, precipitation, wind Comprehensive software applications that automate
speed, and storm systems. By assimilating real-time data, administrative tasks, such as attendance tracking, grading,
computer models provide forecasts that aid meteorologists scheduling, and student information management, improving
in predicting weather conditions, issuing warnings, and educational institutions' efficiency, accuracy, and
helping society prepare for potential hazards. organization.
Advantages of using computer modelling rather than
humans:
It can provide more precise and accurate results than
human-based methods, minimizing errors and
increasing reliability.
Can analyze large amounts of data and perform
complex calculations faster than humans
It can be reused and updated easily, reducing the
need for repetitive manual analysis and potentially
lowering costs in the long run.
Disadvantages of using computer modelling rather
than humans:
It may overlook nuanced factors or intangible
elements that humans can consider, leading to
potential gaps or inaccuracies in the analysis.
Based on assumptions and simplifications,
introducing a level of uncertainty.
Their programmed algorithms and data inputs bind
models. They may struggle to adapt to unforeseen
circumstances or rapidly changing conditions that
humans can more readily navigate and respond to.

6.3. Computer-controlled Systems

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT
Automated teller machines (ATMs) are places where
6.5. Booking Systems customers can get cash (or carry out certain other banking
activities, such as ordering a statement) using their credit or
These web-based platforms and applications allow users to debit card.
reserve and purchase tickets or services for various events If the limit is not exceeded and all other checks are OK, then
and industries. Some of the applications for online bookings the transaction is authorized, and the machine then counts
include: out the cash
1. Travel industry: Booking flights, hotels, and holiday Advantages:
packages provides a convenient platform for travellers to possible to withdraw at any time of the day
plan and book their trips.
offer many banking services without having to go to
2. Concerts: Reserving tickets for live music events allows
the bank
music fans to secure their spot at popular concerts. possible to access an account from anywhere in the
3. Cinemas: Booking movie tickets in advance enables world
cinema-goers to reserve seats and avoid queues. usually provides quicker service than waiting in a
4. Sporting events: Purchasing tickets for sports matches
queue at a bank
and competitions offers sports enthusiasts an easy way to
Disadvantages:
attend their favourite events. often in places where theft can take place at night
Advantages: potential for shoulder surfing
convenience and accessibility some banks charge customers for using ATMs
instant confirmation and ticketing cash withdrawal limits are often imposed on people
ability to compare prices and options
promotions and personalized offers Electronic Funds Transfer (EFT):
faster to change/update
It is possible to send money transfer instructions directly to a
automated reminders via email/text
repeated bookings can be easily made bank's computer system via electronic funds transfer (EFT)
cost-saving as there are fewer wages due to reduced technology. The system depends on electronic money
staff requirements transfers between accounts; no cash is moved. The
computer system automatically moves the requested
Disadvantages:
amount from one account to another when it receives an EFT
potential for technical issues
possible security and privacy concerns command.
transaction and booking fees Advantages:
impersonal customer service very secure payment method
dependent on a stable internet connection very quick payment method
can lead to unemployment less expensive than cheques
the customer has the right to dispute an EFT payment
6.6. Banking Applications for up to 60 days
Disadvantages:
Online banking systems depend on the ability to update the bank transaction can’t be reversed without full
files instantly to avoid double scheduling, which might dispute investigations
occur if the system reaction time is slow. customer needs to have funds available immediately
The use of computer technology has revolutionized how cannot guarantee the recipient’s identity
we do our banking transactions, for example:
Internet banking Credit/debit card transactions
The use of automated teller machines (ATMs)
Chip and PIN technology Several credit/debit cards come with a magnetic stripe and a
chip; the chip houses essential data like the PIN. This
Automated Teller Machines (ATMs) technique is intended to increase security because it is
superior to a signature. A chip and PIN card to make
purchases is an example of an electronic funds transfer
(EFT).

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Advantages of credit cards: Advantages:


customer protection if ordered goods don’t arrive convenience and availability
internationally accepted payment method easy account management
interest-free loan if money is paid back within the branch visiting won’t be a requirement
agreed time period interest rates may be better
can make purchases online more accessible to shop around for the best account
Disadvantages of credit cards: Disadvantages:
can be charged high interest rates security of transactions
annual fees often apply requires a reliable internet connection
easy to end up with credit damage More risk of fraud
security risks in online transactions Easier to make errors
Advantages of debit cards: Physical cash can't be deposited/withdrawn
money comes from the user’s current account, there
is no interest 6.7. Computers in Medicine
safer than carrying cash
can make online purchases Information Systems in Medicine
Disadvantages of debit cards:
less customer protection if goods don’t arrive Patient records: Healthcare professionals maintain
no credit allowed; funds are needed at the time of databases to communicate information between them
purchase and pharmacists (for instance, to guarantee no
security risks in online transactions medications are administered that interact dangerously
with one another).
Cheques Pharmacy records: Pharmacy records maintain a
comprehensive record of patient prescriptions. This
Individuals and organizations use cheques as a form of includes details like the prescribed medication, dosage,
payment. When issuing a cheque, the payer writes the quantity dispensed, prescribing physician's information,
recipient's name, the payment amount, and the date on the and the date of dispensing. These records help track
cheque. The recipient then deposits or presents the cheque
medication usage and can be used to verify prescription
to their bank for processing. The payer's bank verifies the
accuracy and detect potential drug interactions or
fund’s availability, and upon clearance, the specified amount allergies.
is transferred from the payer's account to the recipient's
account, completing the transaction. 3D Printers
Advantages:
more convenient and safer than cash
can be post-dated
can be traced if they are lost
Disadvantages:
aren’t legal tender and can be refused
slow method of payment
easier for fraudsters than other methods
relatively expensive payment method

Internet Banking
Enable online access to banking services via a secure
website or app, allowing for transfers, bill payments, account
management, and more.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Using 3D printers in medicine:


Prosthetics: 3D printers print out artificial body parts
such as false teeth, artificial limbs, hearing aids, etc.
This is a less expensive method of replacing body
parts.
Tissue engineering: it is the field of combining cells,
biomaterials, and engineering principles to create
functional tissues or organs, aiming to repair or
replace damaged or diseased tissue in the human
body.
Artificial blood vessels are synthetic structures
designed to mimic the function of natural blood
vessels, facilitating the flow of blood and nutrients Components of an Expert System
throughout the body to support tissue repair and 1. User Interface
regeneration.
Customized medicines are personalized drug This is the only thing that the end user sees
formulations tailored to individual patients' specific Allows the user to interact with the system
needs. They utilize advanced technology and precise Often requires training to operate effectively
measurements to create medications with accurate
dosages and unique compositions, optimizing 2. Explanation system
treatment outcomes.
Informs the user of the reasoning behind the expert
system’s conclusions
6.8. Expert Systems It will supply a conclusion and any suggested actions to
take
It is an AI-based computer program that emulates the It will also give the percentage probability of the accuracy
decision-making capabilities of human experts. It uses of its conclusions
knowledge and rules to provide accurate advice or solutions
in a specific domain. 3. Inference engine
Examples include:
The main processing element of the system
Diagnostics It acts like a search engine examining the knowledge
Mineral prospecting base
Tax and financial calculations Responsible for gathering information
Strategy games This is the problem-solving part of the system
Identification of plants, animals and chemical compounds Attempts to use information gathered from the user to
Route scheduling for delivery vehicles find a matching object

4. Knowledge base
It is a repository of facts
stores all the knowledge about an area of expertise
a collection of objects and their attributes

5. Rules base

The rules base is a set of inference rules.


Used by the inference engine to draw conclusions
They follow logical thinking

How an expert system is used to produce possible


solutions
Below is an example of how an expert system works to
diagnose a medical issue:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

The interactive screen asks questions for the doctor to Use of chip and PIN cards:
answer using a keyboard or a touch screen. Enhance security with two-factor authentication
The inference engine compares the symptoms with the Require customers to enter a personal identification
knowledge base, using the rule base to find matches. number (PIN)
The system suggests the possible illness with a Use of contactless cards:
probability of each, cures, and recommendations on the Allow for faster transactions
next step. Enable customers to tap their card on the terminal
The explanation system will explain how that particular Use of Near Field Communication (NFC):
diagnosis was suggested. Facilitate payments through smartphones and other
devices
6.9. Computers in the Retail Industry Increase convenience for customers
Communication between supermarket computers and
Point of sale (POS) terminals: Computerized systems used bank computers:
at checkout counters to handle purchases and oversee stock. Share transaction details securely
It is extensively used in retail stores to process sales Enable instant payment processing and verification
transactions. They enable quick and secure payment
processing through various methods, including cash, Internet Shopping
credit/debit cards, mobile payments, and digital wallets. POS
Characteristics of Internet Shopping:
terminals calculate totals, generate itemized receipts,
update inventory, and provide real-time sales data for Online stores accessible through web browsers
effective business management. A wide variety of products and services are available
Some features include: Convenient and often open 24/7
update stock files immediately Advantages (To customer):
track inventory levels in real-time
prevent stock discrepancies and ensure accurate access to the global market
records comparison between different products effortlessly
monitor inventory levels and reorder when stock is can shop from anywhere in the world
lower than a predefined value able to avoid queues and busy stores
streamline supply chain management and minimize
stockouts Advantages (To business):

Electronic funds transfer at Point of sale (EFTPOS) can target prices and services based on buying data
terminals: Devices for processing electronic payments; they can update stock availability and prices more quickly than
allow customers to make payments using debit or credit a physical store
cards by securely transferring funds from their bank cheaper to publicize special offers
accounts. EFTPOS terminals authenticate and authorize international customer base
transactions in real-time, providing convenience and security increased profits due to lower staff
for customers and businesses during retail purchases. Disadvantages (To customer):
The process of checking credit and debit cards at a
supermarket EFTPOS is much the same as was described for security concerns
paying a restaurant bill in Section 6.6. can’t correctly examine products before purchase
Some functions of EFTPOS include: occasionally, products may take weeks before being
delivered
additional shipping and handling costs
lack of face-to-face interaction with staff

Disadvantages (To business):


increased competition
digital fraud and security concerns
technical issues and downtime
costs of delivery and return
fake negative reviews can lead to a lousy company
reputation

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Automatic Number Plate Recognition (ANPR)


6.10. Recognition Systems systems:
The sensor sends a signal to instruct a camera to
1. Optical Mark recognition (OMR) media in schools: capture an image of the front of the vehicle
School registers: Paper-based registers are fed into An algorithm is used to locate and isolate the number
OMR to be scanned and stored in a database. plate from the image taken by the camera.
Multiple-choice examination papers: The position of a The brightness and contrast of the number plate are
mark is stored in a computer’s memory after being read first adjusted. Each character on the number plate is
by the OMR, a device using a template that maps out the then segmented.
X-Y coordinates of each tablet (pen/pencil mark). Each character is then recognized using OCR
Used at POS terminals for scanning and reading the software. The characters are converted into a string
information stored in barcodes. of editable text by the software.
Many digital devices have OMR scanners, which may be This text string is then stored in a database.
used to scan QR codes. A barrier is raised, and the motorist is issued with a
Advantages: ticket. The ticket shows the date and time of entering
very fast way of inputting the results of a survey the car park.
more accurate than keying in data When the car returns to the car park, they insert their
more accurate than OCR methods ticket into a machine that calculates their charges and
Disadvantages: registers the payment into the database.
designing the forms is a very complex job Advantages:
there can be problems if they haven’t been filled Used to automatically monitor the average speed of
correctly vehicles over a stretch of road.
often only work with black pens or pencils There is no need to employ a car park or security
guards.
2. Optical Character Recognition (OCR) It's a much faster system than checking a ticket at the
exit.
It can automatically control the entry and exit to a car
park or private roads.
It can be used as a security system to prevent illegal
parking.
It can be used to analyze driver behaviour.
It can be used in inner-city congestion charging
systems.
Disadvantages:
A lack of manned security car park surveillance could
lead to vandalism.
There could be an invasion of privacy due to
recording drivers’ number plates.
Damaged or very dirty number plates will not be
recognized.
The ANPR system only recognizes the number plate
and not the car so that a car can be fitted with a
cloned number plate, thus bypassing car park
security, for example.

3. RFID in tracking stock:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Tracking of stock using RFID involves either tracking Enables short-range wireless communication between
livestock (on a farm) or goods in a shop, supermarket, or devices.
distribution centre. Allows payment using a smartphone.
RFID in passports: Advantages:
The data on the RFID chip is read when the passport is Convenient and secure method of payment
scanned. allows for contactless transactions
Your photo is clicked and compared to the RFID chip Disadvantages:
image. Limited range
If face recognition passes, some checks are made to compatibility issues with some devices
ensure you are eligible to enter the country, and if you
are, the gate opens automatically. 5. Biometric recognition:
RFID in automobiles:
Usually refers to automated technologies for
Tags allow or deny access to parking in a secure, authenticating and verifying human body characteristics
private car park. such as face, iris, retina, finger, thumb, hand and voice.
RFID tags in lorries and delivery vans can be used at Advantages:
weigh stations to ensure the vehicle is not carrying very high accuracy
too much weight.
very easy to use
RFID tags can be used on a car production line to very fast verification time
track its progress through assembly. non-intrusive method
RFID in contactless payments: relatively inexpensive technology
The embedded chip on credit/debit cards and the Disadvantages:
antenna enable customers to wave their card over a
it can make mistakes if the skin is dirty or damaged
reader at the point of sale terminals to make very expensive to install and set up
payments uses a lot of memory for the data to be stored
Smartphone apps can also be used to make a person’s voice can be quickly recorded and used for
contactless payments. unauthorized access
Advantages:
an illness, such as a cold, can change a person’s
No line-of-sight contact is necessary. voice, making absolute identification difficult or
It is a very robust and reliable technology. impossible
Tags are much more difficult to forge than barcodes.
RFID tags can reduce the number of staff needed in,
for example, a warehouse because tracking items is 6.11. Satellite Systems
automatic (thus reducing costs).
It provides a very fast read rate. Global Positioning Systems (GPS)
It allows bi-directional data transfer.
Bulk detection is possible. Used to determine the exact location of several modes of
Disadvantages: transport
Tag collision is when the signals from two or more Cars usually refer to GPS as satellite navigation systems
tags overlap, interfering with each other. Satellites surrounding the Earth transmit signals to the
Because RFID uses radio waves, they are relatively surface
easy to jam or interrupt. Computers installed in the mode of transport receive and
It is relatively easy to hack into the data/signal interpret these signals
transmitted by the tag. Knowing their position on the Earth depends on very
The initial cost of an RFID system is more expensive accurate timing – atomic clocks are used in the satellites,
than a comparable barcode system. which are accurate to within a fraction of a second per
day
4. Near Field Communication (NFC): Each satellite transmits data indicating its position & time
The computer on board the mode of transport calculates
its exact position based on the information from at least
three satellites

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT
Satellite Navigation (satnav):
Using satellite signals for communication.
Used to determine the exact location of a car. Used by media companies when sending
The computers onboard can be used to show directions stories/videos/pictures from remote locations.
to a destination.
Advantages:
Advantages:
They have good global coverage.
Better focus as there isn’t a need to constantly check They are cheaper, faster, and safer than laying cables in
paper maps. difficult or treacherous terrain.
Reduces fines by warning drivers about upcoming speed They have very high bandwidth.
changes. It is relatively easy to expand the network.
The system shows an Estimated Time of Arrival (ETA). Security in satellite transmission is very good because
It is possible to program in the fastest route to avoid data is coded, and the receiver requires decoding
towns. equipment.
The system can also give helpful information such as the During emergency situations, it is relatively easy to move
location of petrol stations. stations on the ground from one place to another.
They are well-suited for broadcasting.
Disadvantages: Enable mobile communication in very remote locations.
If the maps are not updated, they can give incorrect Disadvantages:
instructions.
Road closures due to accidents or roadworks can cause There is a time delay in receipt of the signals.
problems. The signals received can be affected by bad weather.
The loss of satellite signals can cause problems. Sunspot activity can affect the performance of a satellite.
The system will give incorrect information if an incorrect They must be monitored and controlled regularly to
start-point or end-point is keyed in. remain in the correct orbit.

Geographic Information Systems (GIS)


7. System’s Life Cycle
Used to capture, manage, analyze, and display
geographically referenced information.
Use to determine the distance between two places.
7.1. Stages of Sytem's Life Cycle:
Used to find the nearest petrol station or restaurant, etc.
1. Analysis
To protect animal and plant life in certain vulnerable
2. Design
places.
3. Development & Testing
It can be used in geography, science, or engineering 4. Implementation
lessons.
5. Documentation
Advantages: 6. Evaluation

Allows geographical and thematic data of any kind to be Analysis of the Current System
combined to show how they are connected to each other.
It allows the handling and exploration of vast amounts of The current system is studied using four different
data. methodologies. These are the four techniques:
It allows data to be integrated from a wide range of very
different sources.

Disadvantages:

The learning curve on GIS software can be very long.


GIS software is very expensive.
GIS requires enormous amounts of data to be input.
It isn't easy to make GIS programs that are both fast and
user-friendly.

Media Communication Systems

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Observation: Data inputted, processed, and outputted into the system


involves watching users interact with the system to are identified.
figure out its workings Problems with the current system are identified. What
it is used for understanding how users interact with could be improved?
the current system The requirements of the user and the potential new
Advantages: provides first-hand, unbiased system are identified. What is the new system meant to
information do?
Disadvantages: can be time-consuming, may not Problems: issues that users face with the current system
reveal all issues User requirements: what needs to be added to the new
Interviews: system
direct one-to-one conversations with users on their Information requirements: data or information the new
experience with the current system system must process
used to gather comprehensive information about
individual users New System Requirements Specification:
Advantages: allows for in-depth exploration of issues • Once the systems analysts have completed the systems life
Disadvantages: relatively expensive, time-consuming, cycle analysis stage, they should be fully aware of the current
no user-anonymity, which may affect the response system's limitations.
Questionnaires: • The next step will be to design a new system (normally
set of predetermined questions is given to the users computer-based) to resolve the problems identified by the
to complete and give their opinion on the current users and the systems analyst.
system • The Requirements Specification will be created, outlining
it is majorly used in collecting data from a larger the required improvements and expectations for the new
group of people system.
Advantages: allows for quantitative analysis, efficient
data collection, questions can be answered quickly System Specification
Disadvantages: limited by predetermined questions,
may suffer from low response rates, users may Hardware and Software Selection
exaggerate answers due to anonymity
Examination of existing documents:
reviewing system documentation, user guides, or
reports
understanding the current system's design and any
known issues
Advantages: provides insights into the system's
history, can reveal previously unknown issues
Disadvantages: it may be outdated, incomplete, time-
consuming, and rather expensive.

Record and Analyse Information about the Current


System
Identifying key aspects of the current system

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

It is vital to identify the suitable hardware needed for the Data capture forms: These are designed to collect data
new system from users in a structured format. They come in two
contemplating system requirements, compatibility, types: paper-based and electronic-based. Paper-based
costs data-capturing forms must be carefully designed with
justifying choices based on user needs and system headings, concise instructions, character and information
performance fields, checkboxes, and enough writing space. Text boxes,
Hardware that needs to be considered: on-screen help, drop-down menus, radio buttons,
barcode readers, automatic validation, and control buttons for data entry
scanners, are all features of computer-based forms.
touch screens, Consider a user-friendly layout, clear instructions, and
3D printers, appropriate data fields.
monitors,
speakers. Output Formats
Identifying suitable software needed for the new system
considering functionality, compatibility, and ease of Screen layouts: how information is presented to users
use on a screen
justifying choices based on user requirements and Report layouts: how information is organized in a
system efficiency printed or digital report
Software that needs to be considered: Consider readability, visual appeal, and efficient use of
operating system, space
applications software,
size of storage, Validation Routines
type of storage.
It is a method of examining data submitted to a computer to
determine if it meets specific requirements. It is a routine
7.2. Design check that the computer does as part of its programming.
1. Range check: ensures data is within a specified range of
Once the analysis has taken place and the systems analyst values
has some idea of the scale of the problem and what needs to 2. Character check: ensures data contains only allowed
be done, the next stage is to design the critical parts of the characters
recommended system. 3. Length check: ensures data is of a specified length
4. Type check: ensures data is of the correct data type
File/Data Structures 5. Format check: ensures data conforms to a specific format
Field length: number of characters allowed in a field 6. Presence check: ensures data is present and not left blank
7. Check digit: a digit added to a number to verify its
Field name: an identifier for the field in the data structure
Data type: specifies the kind of data that can be stored in accuracy
a field, e.g., text, numbers, dates
Coding of data: using codes to represent data, e.g. M for 7.3. Development and Testing
male, F for female
Guarantees the system's functionality before it is put into
Input Formats use.
Identification and removal of errors, thus improving
system reliability and performance.

Test Designs
Test data structures, file structures, input formats, output
formats, and validation routines
Ensure all components function correctly and interact
seamlessly

Test Strategies

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Test each module: verify individual components function The old system is replaced by the new system
as intended immediately
Test each function: ensure all features work correctly Used when quick implementation is necessary
Test the whole system: confirm overall system Advantages
performance and integration fast implementation
cost-effective as only one system is in operation
Test Plan Disadvantages
High risk of failure
Test data: specific data used for testing purposes no fallback
Expected outcomes: predicted results based on test data users can’t be trained on the new system
Actual outcomes: results obtained from testing
Remedial action: steps taken to fix identified issues 2. Parallel Running

Test Data Types Both current and new systems run simultaneously for a
period before the old system is phased out
The following data types will be explained using the example Used when a smooth transition with minimal risk is
of months in a year. required
Advantages
Normal data: valid and expected data values within the Lower risk
range of acceptability have an expected outcome. E.g., easy system comparison
any whole number between 1 and 12. Disadvantages
Abnormal data: invalid or unexpected data values. This Time-consuming
can either be: resource-intensive
Data outside the range of acceptability or
Data that is the wrong data type 3. Pilot Running
In this case, examples could be…
The new system is implemented in a small, controlled
any value less than 1 (i.e. 0, -6, etc.)
environment before full-scale implementation
any value greater than 12 (i.e. 13, 15, etc.)
Used when testing the new system in a real-world setting
letters or nun-numeric data (i.e. July, etc.)
Advantages
non-integral values (i.e. 3.5, 4.2, etc.) Low risk as only trialled in one
Extreme data: values at the limits of acceptability (E.g. 1
department/centre/branch
or 12)
allows for fine-tuning
staff have time to train with the new system
What is live data?
few errors as it's fully tested
Data that has been used with the current system Disadvantages
Hence, the results are already known Slower implementation
potential inconsistencies
confusion as there are two systems in use
7.4. Implementation There is no backup for the department/center/branch
using the new system
The system must then be fully implemented after it has been
thoroughly tested. 4. Phased Implementation
We will now think more carefully about switching to the new
system. Four popular techniques are utilized to transition
from the old system to the new one.
Before selecting the approach best suited for a given
application, the pros and cons of each must be carefully
considered.

4 Methods of Implementation
1. Direct changeover:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT
Instruction and guidance for end-users on how to operate the
The new system is implemented in stages, with each system. Used to help users effectively use the system and
stage replacing a part of the old system overcome problems
Used when a gradual transition is preferred to minimize
disruption Purpose of the system: Explanation of the system's
Advantages intended function and goals
reduced risk Limitations: Known constraints or issues with the system
easier to manage Hardware & software requirements: Necessary
Disadvantages equipment and software to run the system
Takes longer Loading/running/installing software: Instructions for
potential compatibility issues setting up the system on user devices
Saving files: Procedures for storing data within the
7.5. Documentation system
Printing data: Steps to produce hard copies of system
In the life cycle of a system, documentation enables the data
correct recording of design, implementation, testing, and Adding records: Instructions for creating new entries in
maintenance data, facilitating effective communication, the system
troubleshooting, and potential future improvements. Deleting/editing records: Guidelines for modifying or
Technical documentation: detailed information on the removing existing entries in the system
system's inner workings and programming for Input format: Structure and format for entering data
developers and IT staff into the system
Output format: Structure and format for presenting
Used to maintain, repair, and update the system with data generated by the system
improvements Sample runs: Examples of system operation, including
input and expected output
Purpose of the system/program: Explanation of the Error messages: Explanations of system warnings and
system's intended function and goals error notifications
Limitations: Known constraints or issues with the system Error handling: Steps to resolve issues and errors within
Program listing: The code or scripts used in the system the system
Program language: The programming language used to Troubleshooting guide/helpline: Assistance for
develop the system diagnosing and addressing common problems
Program flowcharts/algorithms: Visual representations Frequently Asked Questions: Answers to common user
or descriptions of the system's logic and processes inquiries
System flowcharts: Visual representations of the Glossary of Terms: Definitions of key terms and
interactions between system components concepts related to the system
Hardware & software requirements: Necessary
equipment and software to run the system
File structures: Organization and layout of the system's 7.6. Evaluation
files and data
List of variables: Collection of variables used within the It measures a system's productivity, efficiency, and
system, including their names and purposes compliance with its goals to identify its strengths,
shortcomings, and potential development areas. This
Input format: Structure and format for entering data
into the system assessment informs decision-making and improves overall
Output format: Structure and format for presenting performance over the course of a system's life cycle.
data generated by the system
Sample runs/test runs: Examples of system operation,
Assess the Efficiency of the Solution
including input and expected output
Validation routines: Techniques used to check and
confirm the accuracy of data entered into the system

User Documentation

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Analyse the system's efficiency in time, money, and Collect users' responses to the results of testing the
resource use. Examine whether the system is performing system. Their feedback can provide insights into potential
at its best or if its efficiency could be increased. issues and improvements and help determine overall
Provide examples of specific aspects that contribute user satisfaction.
to the system's efficiency Summarise the testing process, including test data
Identify areas that may be consuming excessive expected and actual outcomes.
resources or time and suggest ways to optimize them Discuss users' reactions to the system, addressing
Questions to ask: any concerns or suggestions they may have
Does it operate quicker than the previous system?
Does it operate by reducing staff time in making Identify Limitations and Suggest Necessary
bookings? Improvements
Does it operate by reducing staff costs?
Based on the analysis of efficiency, ease of use,
Evaluate the Ease of Use appropriateness, and user feedback, identify any
limitations in the system and suggest necessary
Look at the solution's usability and accessibility for the improvements
target market. Check to see if the system is simple to List the limitations and provide explanations for each
understand and use and if users have no trouble one
completing their jobs. Recommend specific changes or enhancements for
Describe the user interface and how it facilitates these issues
interaction with the system
Mention any feedback from users regarding their
experience with the system and address any issues 8. Safety & Security
they encountered
Questions to ask:
Are all the users able to use the system and make
8.1. Physical Safety
bookings easily?
1. Electrocution: ICT devices require electrical power to
Are all the users able to change and cancel bookings
charge or run; the electrical device can cause electrocution,
easily?
caused by the electric current moving through a body,
Can all staff understand how to use the system with
causing fatal injuries and/or death.
minimal training?
There are multiple causes for electrocution, including:
Determine the Suitability of the Solution Contact between liquid substances and electronic
devices: Keep liquids away from electrical equipment.
Examine how well the implemented solution satisfies the Open cables: Ensure that cables are entirely insulated
desired outcome by contrasting it with the original task and packed, and use circuit breakers or fuses to prevent
criteria. electrical overload.
Outline the initial objectives of the system and discuss
how the solution addresses each one 2. Fire: ICT devices require electricity to charge or run; too
Highlight any requirements that may not have been many devices using a single socket can cause the plug socket
fully met and discuss possible reasons for this to overload, and heat is generated by too much electricity,
Questions to ask: causing the wiring to degrade and ignite a fire.
Is the system suitable for each of the departments? The causes and reduction tactics for fire include:
Does it meet the needs of the customers?
Does it meet the needs of the staff?
Does the solution match the original requirements?

Collect and Examine User’s Feedback

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Socket overload: Ensure enough plug sockets in the Data must be processed lawfully, fairly, and
room, don’t plug too many devices into the same transparently, with clear consent from the individual.
socket, and don’t leave devices plugged in and Data should only be collected for specific, explicit, and
unattended. legitimate purposes.
Overheated equipment: Ensure that equipment is Organizations should only collect and retain the minimum
properly ventilated and not obstructed, keep flammable personal data necessary for their stated purpose.
materials away from heat sources, regularly check Data should be accurate and up-to-date, and reasonable
equipment for signs of wear or damage, use fire steps must be taken to rectify or erase inaccurate
extinguishers in case of emergencies, turn off or unplug information.
devices when away from the location, do not cover any Personal data should not be kept longer than necessary
air vents on devices. and should be securely deleted when no longer needed.
Organizations must protect personal data against
3. Trailing cables: Devices can be plugged in using cables. unauthorized or unlawful processing, accidental loss,
Cables that are protruding can cause an accident; you can destruction, or damage.
trip over a cable left out in a location, and body damage can
occur during a fall, for example, breaking bones, ligament Why is data protection legislation required?
damage, bruising, sprains, etc. depending on the area fell on
Trailing cables causes and prevention strategies: Protecting Individual Rights: Data protection
legislation safeguards individuals' right to privacy and
Unorganized/insecure cables: use cable ties to secure control over their personal information.
cables, keep cables packed correctly in, let’s say, a table, Preventing Misuse of Personal Data: It helps prevent
therefore not coming in the way of walking paths, use unauthorized access, identity theft, fraud, and other
wireless devices where possible, and regularly inspect forms of data misuse.
cables for signs of wear or damage. Promoting Trust: Data protection laws build trust
4. Heavy falling equipment: Devices have varying levels of between individuals and organizations by ensuring their
weight, and if a device falls on you, it could cause injury; any personal information is handled responsibly.
device should be placed in a secure location, like a PC on a Encouraging Responsible Data Handling: Legislation
solid desk and not near the edge. promotes responsible data collection, storage, and
Causes and reduction tactics for falling equipment: processing practices among organizations.
Enabling Data Subject Rights: Legislation grants
Improperly secured equipment: Ensure that equipment individuals rights such as access to their data, right to
is properly secured and stable. Regularly check the rectification, erasure, and objection to processing.
stability of locations containing devices.
Equipment on unstable surfaces: Keep equipment Personal Data
away from edges and other potential hazards, and
regularly inspect equipment and locations containing
devices for signs of wear or damage.

8.2. eSafety
Data Protection
The Data Protection Act (DPA) controls personal data
collection, storage and processing.

In the UK, the European Union’s General Data Protection


Regulation (GDPR)
Protects personal data, whether stored on paper or a
computer system

Principles of the Data Protection Act

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Refers to information that can be used to identify an Awareness that personal information should not be
individual shared freely
Examples Awareness of how to act online and avoid falling victim
Personal Name creates a safe and respectful environment.
Address Identify and avoid online scams, phishing attempts, and
Date of birth fraudulent websites that may try to trick them into
A photograph in school uniform sharing personal or financial information.
Medical history Mindful of online behaviour and interactions, protecting
Threats that can be avoided by protecting personal your digital reputation, which can have long-term
data: consequences in your personal and professional life.
Identity theft Control privacy settings on social media platforms,
Privacy breaches limiting who can access/view personal information and
Misuse of the information posts.
Data be sold to third-party companies Avoid encountering explicit or harmful content online,
Individuals could be held to ransom over personal reducing the risk of exposure to inappropriate material or
data gathered online predators.
could be used to commit a physical crime Engage in online gaming responsibly, avoid sharing
How to avoid inappropriate data disclosure: personal details, and behave respectfully towards other
Personal data must be kept confidential and players.
protected through privacy settings on websites such Protecting devices from malware, viruses, and other
as social media or strong passwords on websites online threats, preventing data loss, privacy breaches, or
where personal data is held or used device damage.
Access to personal data should be limited to Develop responsible online behaviours, promoting
authorized individuals respectful conduct while interacting with others online.
Think before you post - consider what information Maintain a healthy balance between online and offline
could be gathered from your image or content lives, reducing the risk of addiction, mental health issues,
Check website details about the collection, storage, or negative impacts on relationships and self-esteem.
and use of personal data
Only access websites where personal data is used or Safety Suggestions
viewed when on a secure, encrypted connection

eSafety
E-safety is knowing about and using the internet safely
and responsibly.
It refers to when an individual is using the internet, email,
social media, or online gaming.
E-safety refers to the individual knowing how to protect
themselves from potential dangers and threats.

The Need for eSafety

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

The internet: Threats


Use trusted websites recommended by teachers or
reputable sources There are multiple methods by which data can be
Utilize search engines that only allow access to age- threatened, including:
appropriate websites and use filters to ensure
inappropriate content is not seen Hacking: Unauthorized access to computer systems or
Never reveal personal information networks to gain control, steal information, or cause
Email: damage, thus leading to identity theft, privacy breaches,
Be aware of the potential dangers of opening or and misuse of data
replying to emails from unknown people, including Phishing: Deceptive emails or messages that are
attachments; potential dangers include phishing, received from trusted sources to trick individuals into
spam revealing personal data
Ensure you know who the email is for when Pharming: Manipulation of DNS (Domain Name System)
considering sending personal data or images via to redirect users to fraudulent websites, often to steal
email, only with people you know and not with personal data
identifiable content like school photos Smishing: Phishing attacks carried out through SMS or
Social media: text messages
Know how to block and report people who send Vishing: (aka voicemail phishing) Phishing attacks
content or messages that are unwanted carried out through voice messages to trick users into
Know where the privacy settings are to reduce the calling the telephone number contained in the message
number of people who can see your posts or images Viruses and malware: Viruses are program codes that
Be aware of the potential dangers of meeting online can replicate/copy themselves to cause data loss or
contacts face to face; do not meet anyone you do not corruption. Malicious software designed to disrupt,
know; if you do, take an adult and meet publicly. damage, or gain unauthorised access to computer
Do not distribute inappropriate images and systems or networks
inappropriate language Card fraud: Unauthorized use of credit or debit card
Respect the confidentiality of personal data belonging information for fraudulent purposes caused by shoulder
to other people surfing, card cloning, or keylogging.
Only accept friend requests from people you know
Parents should be aware of what you are doing Protection of Data
online, discuss what you are doing online
Do not post images or details that can be used to Multiple techniques are implied for the protection of data,
locate you inclusive:
Online gaming: 1. Biometrics:
Do not use real names as usernames Individuals' distinctive physical or behavioural traits, such
Never share personal or financial details with other as fingerprints, faces, or irises, can be used for access
players control and verification. Since biometric data is hard to
Know how to block and report players for fake or duplicate, it offers a more secure form of
inappropriate messages or comments identification.
Sensitive Data is data that might result in loss of an
advantage or level of security if disclosed to others. I.e., 2. Digital certificate:
ethnicity, religion, criminal record, etc. At the same time,
personal data can be used to identify the user, i.e., A digital record that attests to a website's reliability and
passport number, name, age, etc. integrity. A digital certificate is used to provide safe
communication and to build confidence between parties.
Identifier data, the entity's public key, and a third party's
8.3. Security of Data digital signature are frequently found in digital
certificates.

3. Secure Socket Layer (SSL):

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

A protocol that creates a secure connection between a The first step to building effective ICT solutions is
client computer and a server. SSL ensures that identifying and understanding the intended audience's
information communicated between a server and client needs. These needs can be functional, like processing
stays private and cannot be intercepted or changed by information, or aesthetic, like a visually appealing
unauthorized parties. A website's identification for it is interface.
the S at the end of HTTP. After identifying the needs, select the appropriate
technology and tools to create a solution. This choice
4. Encryption: depends on factors like the complexity of the task, the
It is creating data in a format that cannot be read without budget available, and the technical expertise of the users.
a decryption key. Data on hard drives, emails, cloud An essential aspect to remember while designing ICT
storage, and secure websites (HTTPS) are all protected solutions is to ensure they are user-friendly. This means
they should be intuitive to use, require minimal training,
by encryption. Without a decryption key, it assures that
even if unauthorized people obtain data, it cannot be and have easy-to-understand instructions.
decoded. Additionally, ICT solutions should be accessible to all
users, including those with disabilities. This could involve
5. Firewall: adding features like voice commands, larger text options,
or compatibility with assistive devices.
A firewall is a network security device that monitors and Once the solution is created, it is crucial to test it to
manages incoming and outgoing network traffic. Its goal ensure it functions as expected and fulfils the users'
is to separate an internal network from other networks by needs effectively.
filtering data according to established criteria. It assists in
preventing malware, unauthorized access, and other Analysing Audience Requirements
network risks.
Designing an ICT solution requires an understanding of
6. Two-factor authentication: the target audience. The study should consider elements
A security mechanism that requests two different kinds of affecting the audience's capacity to use the solution, like
identification from users to confirm their identity. To age, technical proficiency, and expertise.
The solution creator should know the audience's
provide additional protection outside of just a username
requirements for information. This could serve as a
and password, 2FA was created. Typically, it combines
design cue for the data processing elements and the
something that uniquely identifies a user, like biometric
data, with something the user has, like a smartphone and information architecture.
a token or something they know, like a password. How the audience utilizes and consumes the content also
influences the design. For instance, the answer should be
7. User ID and password: mobile-friendly if the audience accesses it mostly through
mobile devices.
A typical authentication technique uses a password plus a Finally, the designer should consider any unique
secret code (user ID) to identify. To strengthen data requirements of the audience, such as visual or auditory
security, user IDs and passwords restrict access to only impairments. These requirements should be taken into
authorized users. Using secure passwords and changing account when designing the solution ensuring inclusivity.
them frequently is critical to ensure security. When
creating passwords, it is advised to utilize a mix of
uppercase, lowercase, digits, and special characters.
9.2. Copyright
What makes Copyright Necessary?
9. Audience Copyright regulation is crucial to safeguard the rights of
developers and innovators.
9.1. Audience Appreciation It stops software piracy, which is unauthorised use,
replication, or distribution.
To express gratitude and value for the users by providing It guarantees developers receive compensation for their
helpful and relevant information, fostering positive efforts, fostering additional innovation and development.
experiences, and contributing to their understanding and
learning.

Planning ICT Solutions

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Principles of Copyright in a Computer Software Email is a technique of sending and receiving messages
and files via the Internet.
Copyright law prohibits the unauthorized copying, It is employed in personal communication, business
distribution, or modification of software. communications, and marketing.
It also includes the End-User License Agreement (EULA), Acceptable language must be used based on the email's
which outlines what the software can and cannot be used recipient, for example, professional when composing a
for work-related email.
Violations of these principles, such as software piracy, Employers frequently establish requirements for
can lead to legal consequences. professional language, substance, and email frequency.
Email security is critical to preventing sensitive data from
Preventing Software Copyright Violation being accessed or manipulated.
Netiquette is the proper conduct and politeness when
Software developers employ various copyright protection using email.
strategies, such as Digital Rights Management (DRM). Don’t be abusive
Due to DRM methods and systems, copyrighted works Don’t send spam
are subject to usage, modification, and distribution Be clear and concise with your message
restrictions. Remember that posts are usually public and can be
Other techniques include software product activation, read by anyone.
which needs a unique code to be fully functional. Always check your spelling and grammar.
Given that pirated software frequently cannot receive Respect people's privacy and do not discuss or
automatic upgrades, which renders it less effective and publish information that might embarrass somebody.
secure over time, automatic updates may also serve as a Forgive people’s mistakes
kind of copyright protection. Do not use CAPITAL LETTERS to highlight comments
Do not plagiarize
10. Communication Do not use too many emoticons, as they might annoy
your readers.
Email groups enable mass communication to a specific
10.1. Communication with Other ICT group of subscribers.

users Using E-mail Guidelines set by employers:

E-Mail
Uses:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

It is up to companies to decide if personal emails should use spam filters


be permitted on their systems avoid disclosing your email address publicly
Companies may specify which company devices are don’t click on links in spam emails or reply to them
allowed to be used
There needs to be a company standard style when 10.2. Effective Use of the Internet
sending emails
It must be made clear what email content is not Characteristics of the Internet:
permitted
Employees should be told only to use their accounts when Allows individuals from all around the world to connect
sending emails and chat with one another instantaneously
There must be clear rules regarding the confidentiality of It runs on a distributed network design, which means a
information single central authority does not control it.
Staff need to be aware of the method and duration of It is mainly used for transmitting data in a variety of
storing emails formats, such as text, photos, audio, and video.
Incoming emails should only be read by the recipient
Company policy on how to deal with and prevent viruses Uses of the Internet:
must be laid out A vital communication tool that allows people to
Monitoring of emails may be carried out, and staff must communicate via emails, instant messaging, and other
be aware that the company has the right to read all means.
emails It acts as a massive database of information on almost
Suitable ongoing training will take place to ensure staff any subject
follow company policy at all times The Internet has transformed business by offering a
platform for online purchasing, electronic payments, and
Carbon Copies (Cc) and Blind Carbon Copies (Bcc) digital transactions, allowing enterprises to reach global
Carbon copies are used to send the email to multiple consumers.
recipients. Advantages of the Internet:
Blind carbon copies are made to send the email to
multiple recipients without them acknowledging that it users have access to an incredible amount of
has been sent to other recipients. information, empowering them to learn
Forward enables users to send an already existing email enables individuals and businesses to connect and
to a new recipient. communicate with people from different parts of the
To attach files to be sent with an email, we make use of world in real-time
Attachments. the Internet has made many things easier to complete,
thus providing simplicity and effectiveness
Spam
Disadvantages of the Internet:
It is defined as any unwanted email delivered via the Internet.
These can range from annoying to genuinely harmful, as Raises data security and personal privacy hazards
they may contain viruses. through the possibility of identity theft, data breaches,
The main disadvantages are: and online monitoring.
The spread of propaganda, fake news, and
wasting time misinformation due to the simplicity with which content
annoying people can be created and distributed online.
using up valuable bandwidth on the internet, thus slowing The digital divide resulting from unequal Internet access
it down threatens to widen existing disparities.
may have viruses or be a part of a phishing scam
can take up significant space in user inboxes The differences between the internet, intranet, and
extranet:
To minimize the spam you receive:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Definition: The Functionality of the Internet


The Internet is a vast network of linked computer
networks and gadgets that communicate with one Internet service providers (ISP): A company that
another using the Internet Protocol Suite (TCP/IP). provides internet access. Typically, a monthly fee is
The intranet is a secure network that operates within charged for this service. Users' accounts are created
an organization using internet technologies and when registering with an ISP and acquiring login
protocols, such as TCP/IP. information such as user ID and password.
Extranets are managed private networks that can Uniform Resource Locator (URL): The address of a web
give access to third-party users and give users, such page on the WWW. It is a text-based address that
as partners, suppliers, or clients, safe access to a uniquely identifies the location of any resource available
portion of the intranet. on the internet. The three main components are:
Accessibility: Protocol:
The Internet is open and accessible to the public, It is the communication protocol used to transfer data
allowing users to access a wide range of information, between the client and the server
services, and resources worldwide. E.g. HTTP, HTTPS, FTP, and others
Intranets are restricted to internal users and typically Domain:
secured by firewalls and other security measures to it is the name of the server where the resource is
maintain the security of critical corporate data. located
Extranet provides authorized external users only it can be a name or an IP address
limited access, in contrast to the internet, which is Webpage/file name:
public, or the intranet, which is entirely restricted. To it is the location of the file or resource on the server
access the extranet, these users need a secure login. it can contain the name of the file or directory where
Purpose: the resource is located
The Internet acts as a hub for intercultural dialogue, A URL looks like this:
the sharing of knowledge, and access to a range of protocol://domain/path/filename
Internet resources, including websites, email, social E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is
media, online shopping, and more. a URL that consists of the HTTPS protocol, the domain
An intranet's main goal is to make it easier for name "www.hoddereducation.co.uk", the path is
employees to communicate, work together, and share “IGCSE” and the filename is “ICT”
information. A hyperlink is a word/phrase/image which references
Extranets make it easier for external stakeholders to data that the reader can follow by clicking or tapping,
collaborate and communicate with a company. It usually taking you to another web page
enables the organization and its reliable clients or A web browser is a software application used to locate,
partners to share information, documents, and retrieve, and display content on the WWW, including web
resources securely. pages, images, video, and other files
Many use the terms “Internet” and “World Wide Web” Use of Search Engines
interchangeably. However, they can’t be used in the same
context: There are two fundamental methods for obtaining
- The internet refers to the global network of computers and information via the Internet. The first method is to enter the
other devices connected through routers and servers. URL if you know the website's address. If you don't know
However, the World Wide Web is a collection of websites where to look, the second option is to employ a search
and webpages accessed via the Internet. engine to locate the information you seek.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE ICT

Advantages of using the Internet to find information Although the internet provides much information, not all
information tends to be up to date because it is are genuine or dependable.
quicker and easier to amend Consider the source's reputation and trustworthiness
The Internet has vast amounts of information when determining the information's dependability.
searching for information using a search engine is Check the accuracy of information by comparing it to
fast and easy other reliable sources.
people can look for information in the comfort of their Assess whether the information is skewed, keeping an
own home eye out for views pushing a particular point of view.
information on the internet is essentially free of Check if the material is current, as obsolete information
charge might be deceptive.
webpages may have multimedia elements, making
learning more interesting Internet Protocols
Disadvantages of using the Internet to find
information Protocols are rules on which the sender and recipient agree
it isn’t regulated; anything can be posted when data is exchanged between devices.
always the risk of accessing inappropriate websites 1. Hypertext transfer protocol (HTTP): when a web page is
too easy to be distracted by the many distractions being accessed, entering http:// at the front of an address
available on the internet tells the web browser that ‘HTTP rules’ for communication
Some research skills are lost when using the internet, are to be obeyed.
as search engines do all the work for you. 2. Hypertext transfer protocol secure (HTTPS): A secure
version of HTTP that encrypts data for security.
Speed of Searching 3. File transfer protocol (FTP): network protocol used when
transferring files from one computer to another over the
Search engines may scan billions of online pages to internet. It is similar to HTTP, but the protocol specifically
locate matches to your search query in a fraction of a transfers files.
second. 4. Secure sockets layer (SSL): a protocol that allows data to
Your internet connection and the effectiveness of the be sent and received securely over the internet.
search engine's algorithms influence the speed.
Risks of Using the Internet
Amount of Information
Inappropriate and unlawful content: The internet may
Because search engines can deliver a deluge of attract people to potentially dangerous or illegal
information, utilising particular and relevant search materials.
phrases is critical. Data restriction: Parental, educational, and ISP
Adding quotation marks for specific phrases, "+" signs for restrictions can all be used to restrict access to specific
required terms, and "-" signs for omitting terms can help information or websites.
narrow the search.

Finding Relevant and Reliable Information


The search engine algorithm determines the relevancy of
information by considering parameters such as keyword
frequency & page quality.
Reliable information is often obtained from recognized
sources such as educational, government, or well-known
industry websites.

Evaluating Information Found on the Internet

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Abdallah at Gems Wesgreen International School on 16/11/24.
CAIE IGCSE
ICT

© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Abdallah on Sat Nov 16 2024 for strictly personal use only.
These notes have been created by Bisma Hammad for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).

You might also like