0% found this document useful (0 votes)
46 views

A2 It Notes

This document provides a summary of notes for the CAIE A2 Level IT theory syllabus, covering the following topics in 3 sentences or less each: 1. Networks, including components like switches, hubs, wireless access points, and network interface cards. 2. Network security issues such as hacking, malware, and denial of service attacks. Methods of protection include encryption, malware security software, and physical security measures. 3. Satellite communication systems, which use satellites in different orbit levels (low-earth orbit, medium-earth orbit, and geostationary orbit) to transmit microwaves between satellites and the earth.

Uploaded by

nyereceo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

A2 It Notes

This document provides a summary of notes for the CAIE A2 Level IT theory syllabus, covering the following topics in 3 sentences or less each: 1. Networks, including components like switches, hubs, wireless access points, and network interface cards. 2. Network security issues such as hacking, malware, and denial of service attacks. Methods of protection include encryption, malware security software, and physical security measures. 3. Satellite communication systems, which use satellites in different orbit levels (low-earth orbit, medium-earth orbit, and geostationary orbit) to transmit microwaves between satellites and the earth.

Uploaded by

nyereceo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

ZNOTES.

ORG

UPDATED TO 2022-2024 SYLLABUS

CAIE A2 LEVEL
IT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE A2 LEVEL IT

Wireless communication: ‎
Bluetooth: uses frequencies between 2402 and 2480
1. Networks MHz and is used for communication between short
‎distances.‎
Wi-Fi: operates in 2.4GHz and 5GHz. Used to connect
1.1. ‎Network Components
portable devices, etc. Doesn’t use line of sight.‎
Switch: sends data packets to the desired port ‎ Radio: Both Bluetooth and Wi-Fi use radio waves. RFID
Hub: sends data packets to all ports. It's called a multi- chips use radio waves to identify the location of an
port repeater.‎ ‎object with an RFID chip. It is also used in wireless key
Wireless access point: connects WIFI-enabled devices to a cards and a few secure NFC payment methods.‎
network using radio waves of 2.4GHz or 5GHz.‎ Bandwidth is essential when accessing content within a
Network interface card: needed to connect to a network time limit or in real-time. Large files download ‎quicker
or any device. Connects to the motherboard.‎ with greater bandwidth. A high bitrate is generally
Wireless NIC: can connect to a network without wires. You required to keep the ‎buffer from emptying when watching
can add wireless NIC through a USB/dongle to a ‎device streams.‎
which doesn’t have it enabled.‎ Types of transmission media ‎
Router: connects a LAN to a WAN (like the internet) and Cables: unshielded twisted pair (Ethernet cable) is
determines the most efficient route for data to reach ‎the widely used. Suitable over distances up to 100 metres.
destination.‎ ‎Electrical interference is also present. Shielded
Repeater: Active hub which retransmits data packets to twisted pairs are used for high bandwidths.‎
prevent signal degradation.‎ Wireless: fewer frequencies are available, so there is
Gateway: connects two networks of different types.‎ less bandwidth than copper. It is also susceptible to
Firewall: prevents external users from gaining interference.‎
unauthorised access.‎ Optical: total bandwidth higher than copper
Server: computer on a network which provides resources Protocol: a set of rules that ensure that data is
that client devices can use. ‎ transferred correctly. ‎
File server: makes files available POP: defines rules for email client software to retrieve
Print server: deals with all print jobs, maintains a mails. Downloads all messages on client ‎computer
‘queue’ and allows priority users to jump the queue. ‎It and deletes from server. Part of application layer.‎
can also charge users for print using a credit system.‎ IMAP: alternative method for email client software.
Mail server: receives and sends emails for an Mail is left on server and copy is downloaded.
organisation.‎ ‎S upports multiple folders unlike POP. Is a part of
Application server: delivers software to clients.‎ application layer.‎
Proxy: deals with all requests to the internet. It sits TCP/IP: basic communication protocol used on the
between the LAN and the gateway.‎ internet. ‎
Bandwidth: measures the range of frequencies on a FTP: part of the TCP/IP suite and defines file transfer
communication channel. ‎ rules.‎
Bitrate: transmission rate of data HTTP: part of the TCP/IP suite. Used by web browsers
Bit streaming: streaming of bits; files are sent to the to send requests to a web server to view a web ‎page.
device for viewing without downloading. In a video, a few HTTPS is the secure version.‎
‎frames are sent to fill a buffer (temporary area of BitTorrent protocol specifies how multiple downloads
storing). The buffer is emptied as the frames are ‎viewed.‎ occur from the same file concurrently. Several ‎clients
download portions of the file and connect to send the files
Methods of transmitting ‎
Circuit switching: packet path decided before directly to each other. ‎
communication, one route for all packets A torrent is a metadata file identifying URLs or trackers to
Packet switching: each pack takes its route and is coordinate communication between peers.‎
routed between nodes.‎ Abstraction layers:‎
Message switching: transmits a whole data set

together without a predefined route.‎
Optical communication ‎
Infrared: low bandwidth, affected by sunlight, uses line
of sight, cheap ‎
Fibre optics: no electric interference, great speeds,
can’t be ‘tapped’, light, don’t suffer from signal
‎degradation.‎
Laser: Can cover large distances, line of sight, can be
used to connect to LANs, and is secure.‎

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

‎ nreadable. This is done by using an algorithm to


u
change the cipher. It however cannot stop the hacker
‎from destroying stolen data.‎
Malware security: anti malware software monitors the
system for threats and signs of malicious files and
‎disinfects or quarantines the malware.‎
Physical security: Physical locks, protection against
electrical surges, server locations in place where it’s
‎protected from floods and fire are some general
physical security methods. ‎
Data protection act principles: An act to protect people
about whom data is stored. It outlines that data ‎should be
Used fairly and lawfully
Used for limited, specifically stated purposes
Used adequately, relevantly and not excessively
Kept no longer than necessary
1.2. Network security‎ Handled according to data protection rights
Kept safe and secure
Security issues: ‎ Not transferred without adequate protection.‎
Hacking: act of gaining unauthorised access of a Data protection laws are required to protect data subjects
network. With access, the hacker can read, change and the information held about them. To ‎process data
and ‎destroy data.‎ fairly, data subjects must be informed, made aware of the
Malware: used to describe any software designed to purpose, and be asked ‎permission to collect data.‎
cause damage. Types include parasitic viruses which
‎attach themselves to files, macro viruses which attach 1.3. Satellite communication systems‎
to macros, email viruses which arrive as email
‎attachments and worms and Trojan horses.‎ Satellites in space send microwaves down to earth. There
Denial of service attack: DoS is designed to overload a are three different levels or orbit used by ‎satellites: ‎
server’s requests to cause disruption. They’re ‎easy to Low earth orbit [500-1500 km from earth requiring 40-
launch and difficult to track.‎ 80 satellites for global coverage]‎
Security methods:‎ Medium earth orbit [5000-12500 km from earth
Access right: The most common access rights are requiring 8-20 satellites for global coverage]‎
Create, Read, Update and Delete. To gain these rights Geostationary earth orbit [at fixed points 35800 km
‎a user has to identify themselves by a user and pass, from earth requiring just 3 satellites for global
email ids, swipe cards or NFC, or biometric ‎methods. ‎coverage]‎
2 factor authentication can be used at times. Users Satellite broadband cannot be used by people living in
have to be careful to protect their rights ‎access areas not covered by wireless or wired broadband
method. It is possible for companies to disable ‎connection. ‎
particular accounts from being used at certain ‎times One-way satellite broadband sends data for download
of the day to enforce better security.‎ from the internet to client using public switched ‎telephone
Biometric methods: biological characters which can be network (PSTN). Uploading can be very slow using this.‎
measured like fingerprints are often used to Two-way satellite broadband allows client to
‎authenticate a user’s identity. Characteristics are upload/receive data directly from satellite. ‎
unique. Fingerprints and retina scans are generally Television and radio broadcasting is done by radio waves,
‎regarded as secure methods. However, several users cables or satellites. As radio waves depend on
feel they tend to infringe upon their privacy. Voice ‎and ‎frequencies, channels are limited. Satellite offers more
facial recognition have never been very secure ‎ channels as it uses microwaves. ‎
Firewalls: these control what data goes in and out of a Signal is encrypted so only subscribers can watch. ‎
network. It can be a part of the router or a ‎separate A set top box and a satellite dish are required to watch.
software installed. They often include a proxy server Initial cost of equipment can be expensive. ‎
and an Access Control List.‎ Global Positioning Systems use satellites to calculate their
Backups: Backups are required to replace original current location on earth. Trilateration is used ‎to locate
data in case if the original data is lost or damaged. the receiver. ‎
‎However, they do not stop hackers or prevent from GPS can provide real-time location when used with satnav
files getting corrupted due to malicious software if ‎the systems. It uses line of sight however, so finding ‎an exact
software was present in the original data.‎ position can be tricky at times. The signal can also
Encryption: Process of changing data so that if it is degrade due to the atmosphere.‎
accessed without authorisation then it will be

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

Usually desktop systems


2. Project Management Appropriate for small projects
Personal: ‎
Typically for home users for small projects
2.1. Stages
single user software
Simper interface
Collaborative: ‎
Several users can use at once
Web based or client-server model
Info stored on central server

2.3. Project Management Software


Planning: ‎
Conception and initiation: ‎
Milestones identified.‎
Ideas identified and goals set
Templates help to set up software plan.‎
Stakeholders identified
Company standards, House Style is set.‎
Decisions made and requirements identified
Scheduling of tasks: ‎
Feasibility study made
Gantt charts can be created.‎
Planning and design: ‎
Tasks are assigned, dependencies identified.‎
Budget and time scale formulated
Allocation of resources: ‎
Milestones set
Costs can be assigned to resources.‎
Gantt chart made
Resources can be assigned to tasks.‎
Personnel coordinated
Resource conflicts avoided.‎
Execution: ‎
Costings: ‎
Project manager communicates roles and
Records expenses.‎
responsibilities to team.‎
Custom analysis of expenditure and comparison to
Interim targets there for each member
budget possible.‎
Monitoring and control: ‎
Information can be exported.‎
Project manager ensures tasks complete on time.‎
Communications: ‎
Also monitors performance and progress.‎
Synchronised calendars with tasks and deadlines.‎
Monitors and tracks budget and spending.‎
IM/Video chat/Video conferencing possible to
Holds meetings with stakeholders.‎
communicate in real time.‎
Closure: ‎
Shared documents stored in central repository.
Handover project from team to client.‎
Document changes can be tracked. ‎
Termination of contract.‎
Discussions/Forums for tasks and milestones. Useful if
Resources released; employees deployed.‎
a member can’t communicate in real-time.‎
Evaluation and success review done.‎
Progress tracker can inform members when a
milestone is achieved or task is completed.‎
2.2. Types of project management Decision making: ‎
software‎ Communications logged and tracked.‎
Graphs, charts and reports used to analyse budget,
Desktop: ‎ scheduling and task progress. ‎
One project manager Critical path for project shown.‎
Sophisticated software
more responsive ‎ 2.4. Disaster recovery management‎
better graphics
License costs incurred Risk assessment carried out to identify potential risks.‎
Collaboration limited Risks quantified using business impact analysis (BIA).‎
Web-based: ‎ Potential hazards: ‎
Can be accessed through browser Power cut
Multiple users can access at once Fire
Documents stored centrally Flood
One version maintained Denial of access to premise
Can’t be used offline Malware
Graphic quality not as good as desktop Unauthorised access to data
Single user: ‎ Theft of data

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

Corruption of data
Loss of key personnel
Impacts: ‎
Loss of revenue.‎
Damage to organisation’s image.‎
Effect on other business activities.‎
Risk = likelihood x impact
Recovery management: ‎
Restoration of backups.‎
Replacement of hardware
Reinstallation of software.‎
Emergency replacement of key personnel.‎
Emergency office accommodation.‎
Resources needed to recover must be planned for.‎
Recovery point objective (RPO) must be identified. It’s the
estimated max amount of time that the ‎business activity
has to recover systems and resume operations.‎
Know how long recovery would take.‎ Advantages Disadvantages
Maximum tolerable downtime (MTD) should be Problems identified early in
considered. It’s the max time a business activity could Requirement analysis may be
process.Cheaper to make
‎tolerate not having essential system functionality.‎ rushed so prototypes aren’t
changes in early stages than
Backed up data should be tested regularly to ensure the reflection of expectations.
later.
backup process has succeeded and data is ‎accessible.‎
Users get new ideas when
Full systems restorations should be tested periodically by
seeing prototypes and can
attempting to restore whole server backups onto ‎a clean Requirements can be clarified
lead to disappointment when
server and testing them. ‎ and refined.
the features can’t be funded.
(Called feature creep)
2.5. Prototyping‎ End users more involved in Initial costs of developing
process, so more valuable prototype is high compared to
Is a ‘mock-up’ of a software or manufactured solution in a
feedback. traditional designs.
primitive form.‎
Used to demonstrate how product will look and work.‎ In rapid prototyping, the
Developers have better
Usually focussed on UI for the feel.‎ prototype can become rushed
understanding of expectation
Evolutionary/Incremental prototyping:‎ and may have design flaws or
due to feedback.
Iterative approach errors carried to end solution.
Initial prototype developed, reviewed, and refined In throwaway, when users see
according to requirements and feedback.‎ a working interface, they don’t
In evolutionary prototyping,
Throwaway/rapid prototyping: ‎ realise effort and time
users can get used to using
Prototype is discarded and doesn’t become part of the needed to make that into a
parts of system before whole,
final product.‎ working solution. In iterative,
so need for bulk-training is
Requirements fine-tuned early in development.‎ the feedback process can last
reduced.
More cost-effective.‎ too long if regular changes
are wanted by user.

Rapid application development: ‎


Uses prototyping to develop a system in a short time
frame.‎
Requirements gathered through a focus group.‎
This type of user involvement is known as Joint
application development (JAD).‎
Less time spent on planning and design and more
emphasis put on development stage.‎
Strict deadlines there throughout development.‎

Advantages Disadvantages

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

Advantages Disadvantages 2.6. CAD and CAM‎


Requirements not clearly
High level of user involvement
specified so final solution may Computer-aided design (CAD) involves use of computers
so end solution more suitable
not meet needs of entire to design physical products.‎
for end users
organisation. Computer-aided manufacturing (CAM) involves use of
Users often not sure of the Users required throughout computers to manufacture physical products.‎
requirements so evolutionary the project which may lead to
Benefits Drawbacks
approach allows for work overload for users or
requirements to evolve. need for temporary staff. Expensive prototypes not
Lead to loss of jobs and need
necessary as stress testing
System structure may be for employee reskilling.
can be carried out on models
Over ambitious requirements compromised leading to
quickly realised and instability as focus is on User Testing using model doesn’t
CAD drawings can be
simplified. Interface and getting system provide same results as
modified and enhanced
developed quickly. testing using product so at
without manufacturing.
least one prototype needed.
Strict deadlines may cause
Strict deadlines prevent List of required materials User can experience 3D
parts to be rushed and
feature creep automatically produced by model but it isn’t same as
compromise on quality.
CAD drawings. experiencing real thing.
Existing software modules
Less time spent on design, may not be made for the CAD models can be viewed
CAD software is complex so
more on development. same requirements so won’t from many angles and
highly trained staff needed.
be sufficient. elements can be zoomed into.
Software application Software application Components once designed
High initial costs of software.
frameworks allow users to be frameworks don’t produce can be reused.
involved in configuring efficient code so end solution Designs developed by CAD
Fewer designers required so
layouts. won’t run as quickly. will include errors made by
is cheaper.
Users who were not involved designer.
in the JAD may be CAM enables products to be Designs limited to vector
disappointed. mass produced consistently. objects.
CAM more precise than
Waterfall method: manufacturing by hand.
Manufacturers drawings can
be created seamlessly.
CAM removes need for
manual labour so reduces
costs.

3. Emerging Technologies
3.1. Technology and our lifestyle
Smartphone and mobile device intro effects
Positive: better time utilisation
Negative: companies expect employees to be more
User requirements gathered at beginning.‎ available.
Interface and structure designed during design stage.‎
System programmed in implementation stage.‎ 3.2. Three-dimensional printing
Verification confirms if user-requirements are met.‎
Problems discovered are corrected in maintenance Printing where an object is created based upon a
stage.‎ blueprint made with modelling software. It works by taking
Waterfall method fundamentally flawed as it relies on thousands upon thousands of cross-section layers of the
the requirements being clearly defined.‎ model, from the bottom to the top, to create the object.
Uses heated plastic to print a single layer at a time. Takes
a long time to produce object.
Uses include:

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

medicine- casts for broken bones (more flexible and Input errors in voice activated systems.
don’t cover broken body part), prosthetics, Programming errors cause incorrect output.
replacement organs (solves organ waitlist/match Question whether company or user should pay
problem), artificial blood vessels accident cost of self-driving car
houses (quick rehousing if natural disaster occurs)
tools, automobile parts, spare parts for space vehicles 3.5. Augmented Reality
(team doesn’t need to abort mission if part damaged)
Negative effects: Computer-generated images overlaid by technology on
print items like guns the real world.
If ‘bio-plastic’ isn’t used, environment concerns caused. Working: o Camera sends real world image and signal.
Software finds point where overlay is needed.
3.3. 3 4th gen and 5th gen cellular Overlay image created on computer screen.
Benefits: o Real-time translation of signs in other
communications languages.
AR Games like Minecraft Earth, Pokémon Go, AR cards
Each generation development improves speed and
used in Nintendo 3ds.
capability of the wireless connection for data.
Google Glass where glasses lens overlays information
Voice is still mostly carried using 2G technology.
in real-time and share images.
3G services work by cellular based technology. The signal
Issues: o Object recognition difficult due to camera angle
is passed from each cellular mast or phone tower.
and different lighting.
4G further increased upload/download speeds and
Vision impeded with Google Glass.
reduced latency.
Security issues when streaming data using Google
Reduced latency leads to a quicker response time to
Glass as Bluetooth is used to connect to phone.
requests.
5G is in development; however, to provide 5G access,
parts of radio network would need to be restructured. 3.6. Biometrics
Use of technology that tracks user values like heart rate
Measures several samples of data and stores it. A match
is then determined between input and stored data to
authorise.
Uses:
Fingerprint recognition, hand scanners for security.
Biometric passports containing biometric data like
Healthcare benefits: facial or iris image scan.
Specialist doctors can guide operation through video In fitness devices (measure heart rate).
call. Issues:
Patients receive best medical attention. Personal details are stored in a database. This
Doctors are well-rested as travelling isn’t needed. sensitive information may be exposed in a database
Work benefits: breach.
Keep in touch with clients on the move. Fake biometric material may be presented by a user.
Video-conferencing for meetings. Considered as an invasion of privacy by some.
Navigation apps to aid travel.
3.7. Cloud Computing
3.4. Artificial Intelligence
Servers store and process data instead of your computer.
Ability of a computer to make decisions based upon Uses:
stimuli, like a human. Services which allow you to upload your own files and
Use programming rules and are hard to create. manage them. Can be accessed from anywhere while
Can be learnt from actions taken and modifying online.
behaviour. Data can be uploaded from numerous devices; each
Benefits: device gains cloud access. Can easily share files on
Voice-activated systems for the disabled. personal devices using this.
Self-driving cars for disabled. Can be used to process data, hence not affecting
Greater entertainment in games as challenge console performance if there is a large amount of
difficulty increased. data to be processed. Therefore tasks beyond console
Expert systems for easy diagnosis/problem solving performance capabilities can be conducted.
Issues: Issues:

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

Security issue as service can be hacked into and data Similar to normal encryption using mathematical
can be stolen which may lead to identity theft if data algorithms, however key generated through photons.
personal. Transmission through fibre-optic cables.
Constant internet connection needed to access Photon key generated through polarising, i.e. creating
service which may be an issue if provider has a power vibrations in different directions in individual photons.
outage. Regular file syncing should therefore be done To unscramble, a filter reverses polarisation.
to make data accessible at all times. Not possible to accurately measure activity after
polarisation, hence very safe.
3.8. Computer-assisted translation Currently successful only at short distances (60 km)

Computer is given text/document and after removal of 3.12. Robotics


anything not text, translation is done.
Benefits: Creation of computers that perform tasks humans cannot
Quick real-time translations in foreign countries. or are less-efficient at.
Translate whole documents and websites. Requires sensors attached to robot id dependant on
Issues: environment it is in.
Direct translations given instead of meaning behind Benefits:
sentence. Sentence structure also kept same so Does mundane, repetitive tasks.
grammar in translated sentence may be messy. Does tasks which may be dangerous to humans.
Difficult to pick correct meaning of word with multiple Provides entertainment.
meanings. Issues:
Some words have no actual direct translation. Replaces human jobs.
Ability scares people at times.
3.9. Holographic and Fourth-generation Emotional response null unless programmed with AI.

Optical Data Storage


3.13. QR codes
Holographic data storage works by recording data
Barcode made of black and white squares.
throughout the volume of the medium; magnetic and
Benefits:
optical work by storing data on surface of medium.
Provide information, saves space on packaging etc.
Benefits:
Marketing purposes to attract users to scan for info.
Holographic is a developing medium of high-capacity
Can be used as trigger to open different app or
data storage. Stores bits in parallel, layer upon layer,
register data within app.
unlike magnetic and optical, which store data linearly.
Issues:
Archive vast amounts of data for a long time as
Need light to process image
medium degrades less than others.
Distort when resized o need space so other stuff
Issues:
doesn’t interfere during recognition.
The belief is that archiving ability isn’t a necessary
Need stable internet connection to view links in code
benefit as technology advancements would make the
method obsolete.
Drive to read data costs thousands of dollars; each 3.14. Wearable computing
medium used to store data would also cost a few
hundred. Clothing or accessories involving computer-based
Fourth gen optical media will bring about the potential to component.
hold 1TB of data by using smaller pits and lands and more Fitness devices measure activity like steps taken, calories
layers. Third gen stores about 400GB. burnt, and sleeping pattern.
Smartwatches have similar functions but costly.
Wearable tech like shirts can display messages/GIFs, and
3.10. Holographic imaging are fashion statements.
All are subject to moisture which can cause damage.
Known as holography; is the ability to make holograms.
Uses Bluetooth for connectivity so not very secure.
Hologram: free standing 3D image which doesn’t have
depth.
With time it may be possible to transmit holograms. 3.15. Ultra-high-definition tv
Ultra-wide screens (2560x1080) and standard desktop
3.11. Quantum Cryptography monitors (1920x1080) count as 2K aka HD.
4K has twice as many pixels horizontally while maintaining
aspect ratios. 8K is coming with Ultra-HD.

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

Issues: Checks to carry out before finishing mail merge:‎


Everyday television programs aren’t made at such a Run spell checker and grammar checker on master
high resolution. document.‎
Difficult to stream Ultra-HD content as large Visually check for errors on master document.‎
bandwidth needed. Many also stream using online Visually check for any errors on previewed or merged
providers. documents.‎
4K and 8K is expensive. To provide context, 4K is Check that correct records have been included in the
commonly used in the movie-making and cinema filter.‎
industry. Errors may be there even after spell checker as it won’t
detect errors in words which sound same but are ‎spelt
3.16. Vision enhancement different. It also won’t identify extra spaces, field codes, or
errors in names.‎
Normally provided in form of glasses/lens.
Corrects stimulus entering eye to enhance vision. Often 4.3. Why use mail merge?‎
tailored to the person’s current vision to be effective.
Enables colour-blind people to view the world normally. Mail merge saves time and increases accuracy as:‎
Source data may already exist. So time isn’t wasted re-
3.17. Virtual Reality (VR) entering data for each document.‎
Accuracy improved as source data usually validated
3D space made by computer. User put into space using a and verified. ‎
headset which displays the space and their position in it. Letters are personalised rather than being generic
Uses 2 camera feeds, one for each eye, to mimic vision. easily.‎
Handsets or gloves monitor hand positions enabling Quicker to proof-read on master document than
interaction. several individual documents.‎
Benefits: Master documents can be reused in future.‎
In games Filters applied so documents only made for a select
In medical, so surgery practice can be simulated. category. ‎
In training programs like flight simulators.
Issues:
Calibration not perfect so may cause motion sickness.
5. Role and Impact of IT in
Seizures experienced due to VR, so epileptic users
need to be cautious.
Society
Injure self by walking into object in real world.
5.1. What is an E-business?
4. Mail Merge E-business: business that performs a majority of its
operations online.
4.1. Mail Merge
5.2. Online shopping
Mail merge: process of merging data from a source file
into a master document. ‎ Advantages:
Master document: created using pixels. Each pixel has Receive products quickly, save travelling time
one colour. ‎ Greater options and choices available.
Source file: contains the data that will be included in each Better for the environment as less vehicles used to
mail merged document. Formats include:‎ travel.
Database table Disadvantages:
Database query Product size and quality can’t be judged when buying.
Spreadsheet This increases product returns and people argue that
Word processed table the number of vehicles used to collect returns balance
Variable length text file out the advantage of using less vehicles to travel.
Fixed length text file
Email contacts 5.3. Online Banking
Prompts: asks user what data should be. Used for items
which change as per occasion and are not in data ‎source Online Banking: computerised version of the majority of
but needed in the master document.‎ services that a normal bank would offer.
Setup:
4.2. Error-free accuracy

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

If physical stock countless than automatic stock count,


possible theft could be indicated.
How it works:
Product has barcode containing info on product
When scanned, product ID is identified and recorded.
Product level of warehouse is deducted by one.

Services: 5.6. Digital currency


Check bank balance
View bank statements Internet based form of money
Set up direct debits Value fluctuates a lot
Apply for loans and overdrafts Can be used instantly without the need of exchange rates.
Paying bills Is anonymous.
Transferring money between accounts This makes it more appealing to criminals too.
Benefits: All details are stored in an encrypted file so if the file is
Don’t need to leave home for everything lost/corrupted/deleted or you lose the key, you lose the
Need to visit branch less money
Avoid bank queues
Service available 24/7
View transactions without needing to wait for paper
5.7. Data mining
statements to be delivered.
Involves sorting through data, finding new trends
identifying patterns to establish relationships, and
5.4. Electronic funds transfer applying a theory to new data sets in order to try and
validate the changes that are occurring. The goal is to
Transfer of funds electronically. predict changes before they occur.
Methods: Analysis methods: o Anomaly detection - Identify unusual
Credit card. No actual money changes hand, money data that may require further investigation.
moved electronically by adding and subtracting Association rule - Finding relationships between
amount from respective accounts. variables.
Direct debit. Person sets up agreement with a Cluster detection - Identifying groups and subgroups
business to allow business to take a set amount of in data.
money from their account. This can be a one-time Classification - classifying data into existing
thing or regular. The person doesn’t need to groups/categories.
remember to pay the business each time as money is Regression - creating predictive models based on a
automatically transferred. range of variables.
Safety is however an issue. Identity theft is a common
form of a potential compromise in safety and the victim
may lose privy to financial details, credit card number,
5.8. Social networking
name, address and contact, DOB, etc which can cause
Features:
huge damage as purchases could be made on victims
IM – enables real time text communication
account.
Blogs/microblogs/vlogs – one-way communication
channel, often personal
5.5. Automatic stock control Forums – post questions, discuss topics.
Effect:
Control stock levels Allows for different forms of expression.
Control needed as too much stock means storage costs Find others with same interests.
increase; too little stock means items might run out when ‘Fandoms’/fans make you feel welcome, belonged and
needed. closer to the social media figure.
Easy to see how much stock present. Anonymous
Can be real-time or batch. Real time calculates as and Frequent hashtags, abbreviations, acronyms difficult
when stock is added or removed from warehouse. Batch to decipher by people with certain disabilities.
uses a transaction file to record whatever is added or Fear that young won’t be able to recognise body
removed from warehouse and is used to update the language or social cues, hence won’t be able to
master file in database. socialise.
Can be programmed to reorder when stocks reach Online bullying
certain level. Data/activity tracked and sold
Identity theft

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

Criminal activities Advantages Disadvantages


Impossible to delete data once posted. Host controls content on Difficult to tell if person is
Social media figures may abuse power of large screen following.
following and launch political campaigns etc.
Time consuming for host to
Saves travelling time set up equipment and
5.9. Video Conferencing content.
Saves travel costs Software can be costly
Is when computers used to provide video link between
people. Host will need training to use
Equipment needed: Pre-recorded content can be software. Attendees may also
Computer system used. need training to navigate
Webcam around ‘room’.
Microphone Documentation can be made
Needs a good stable
Speakers available for attendees to
broadband connection
Good broadband connection download.
Video conferencing software

ADVANTAGES DISADVANTAGES 5.11. Teleworking


No need to pay travel Video conferencing system
Using IT to work away from home
expenses can be costly to buy
Advantages:‎
Employees maybe in different Freedom over hours you work, but may be restricted
No need to travel time-zones outside working to office hours if employer requires it.‎
hours. Save on travel costs, (also benefits environment)‎
People seen and heard so Not possible to see all people Employers need only small building to manage and
body language seen using camera use less energy.‎
Equipment breakdowns would Disadvantages: ‎
Documents can be shown and account for missing a part of Distractions at home
emailed call and could be complicated Extra electricity used by being home all day.‎
and time consuming to fix Less control over employees
Confidentiality
Reliable and fast internet
connection needed which can
be costly 5.12. Technology in sports‎
Advantages:‎
5.10. Web Conferencing Aid referees
See if ball over line using recorded footage ‎
Real-time communication where number of people are More accurate
viewing same content on computer screen at same ‎time.‎
Players can challenge decision
Process:‎ Disadvantages:‎
Link sent to attendees Stops flow of game
Attendees download software and join room via link Some feel system not that accurate.‎
Enter login details
Host can upload documents to room for viewing
and/or downloading.‎ 5.13. Technology in medicine‎
Host controls content on screen and can hand over
Measure heart rate
screen controls over some content to attendees to
‎read on their own pace.‎ Analyse DNA samples
Artificial limbs
Equipment needed:‎
Nanotechnology to make drugs and target delivery which
Computer system
reduces damage/unnecessary treatment to ‎healthy cells
Webcam (optional, only needed if video required)‎
Smart devices to monitor
Microphone (necessary for host, otherwise optional)‎
Speakers Training
Simulate procedures
Good broadband connection
Web conferencing software
5.14. Technology in manufacturing‎
Advantages Disadvantages
Robotics to create assembly lines of products

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

Effects:‎ Users may do things differently under observation


Robots do dangerous work though.‎
Greater consistency Users may not like to be observed.‎
More accurate Method takes a lot of time.‎
Can do repeated work Document analysis
Run for longer periods of time Analyst sees examples of current documents to
Can be operated 24/7‎ understand what data is collected or output, and
Results in loss of jobs identify ‎processes.‎
Costly Method is not to be used on its own.‎
Competitive disadvantage if company buy machines.‎ Documents only show output, doesn’t show additional
data needed. ‎
5.15. Technology enhanced learning Three types of specifications are used in the system life
cycle.‎
Robotics to create assembly lines of products Requirements specification: Contract between developer
Effects:‎ and client specifying system requirements so the
Students provided with resources and guidance online ‎developer can produce a system matching needs.
Upload work to portal for marking Created by the analyst. It includes-‎
Interactive whiteboard to enhance teaching, resulting Purpose of system
in better understanding.‎ Main objectives of system
Online learning and courses, so learn without paying Data to be output
at own time and pace.‎ Data to be input
MOOCs are mostly free, include filmed lectures and Validation and verification
resources and have forum to interact with other Processes that convert inputs to outputs or store data
‎learners and educators. Also allows people in similar Functional requirements
industries to learn more about their industry from Deadlines for milestones
‎other people within that industry.‎ System specification: specifies all hardware and software
Demonstrations and videos online help learn visually.‎ required for the system. Software needs to be ‎identified
Might take time to find desired video or topic as and hardware depends on the software. The analyst also
there’s no governing body to oversee level of teaching.‎ needs to consider how much storage ‎the data would
require.‎
Design specification: Illustration of how system will look,
6. System Life Cycle what data structures will be and how system will ‎work.
Specification will include-‎
Flowcharts
6.1. Analysis Data flow diagrams (DFD)‎
Data collection forms
Involves finding out working of current system and
Screen layouts ‎
requirements for new system.‎
Validation routines
Questionnaires ‎
Data dictionary
Used when large number of users present.‎
House style (logos, colours, fonts, styles, sizes)‎
Users remain anonymous, so more honest answers
Screen sizes
received.‎
Connectivity diagrams
Doesn’t allow elaboration of answers.‎
Purpose of calculations
Shouldn’t be too long.‎
Closed questions should be asked
Interviews 6.2. Design‎
Direct conversation possible
Interviewee can expand upon answers DFD shows how data moves in a system.‎
Questions and logistics of interview need to be
Element Purpose Symbol
carefully planned.‎
Interviewee may not be honest.‎ Data that flows through
Data flow
Analyst needed to be involved in every interview.‎ system
This is time consuming and costlier.‎
Observation Action that
Processes
Analyst watches processes.‎ uses/manipulates data
Gives a good understanding of current processes and
methods used.‎ Data store Place where data is stored

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

Element Purpose Symbol When a system is developed, data needs to be created for
the purpose of testing, called test data.‎
External Where data originates or is Alpha testing is carried out by the developers or a special
entity destined team before a system is delivered to users. ‎
Beta testing is used when software is being made
available to a large number of users. Beta testers would
System flowchart shows processes that take place within ‎be selected users who test an early release of an
the system and decisions that are made. ‎ application after alpha testing. ‎
Black box testing involves selecting input data and
Element Purpose Symbol checking that expected output matches actual output.
‎Involves testing the whole system or user testing. No
Terminator Start and end of flowchart knowledge of the way the system works is required.‎
White box testing involves the same process but the
internal structure and logic of the program are known ‎to
Arrow Direction of flow
the tester. Usually takes place with small program
modules.‎
Process Activity within system
6.4. Installation‎
Decision with different Parallel is when a new and old system is run at the same
Decision
outputs based on result time.‎
Advantages: It’s less risky because if the new system
Input data or output data for fails, the old is always there. Accuracies of both
Input/Output
system ‎systems can be compared.‎
Disadvantages: it’s more expensive as more staff is
required to duplicate data and different hardware ‎may
Data collection form principles:‎
be needed. Data might be input differently in both.‎
Avoid colour as it may be printed without colour
Direct or plunge changeover is when all the data is moved
Include instructions on how to complete form
to the new system.‎
Include instructions about where form should be
Advantages: This is a cheap method, the data used will
returned
be consistent and the new system doesn’t have to ‎be
Indicate compulsory and optional questions
compatible with the old
Give enough space to answer
Disadvantages: it’s very risky and users would need to
Use tick boxes for MCQ questions
be trained in advance.‎
Indicate how many options allowed from a multiple-
Phased is when parts of new system are installed one at a
choice list
time.‎
Ensure fonts used consistently and legibly
Advantages: Errors would only affect one part and
Avoid clutter
users can easily be trained.‎
Explain what scale indicates if there is a question
Disadvantages: using 2 systems might be confusing
about a scale
and there might be delays waiting for the phase to be
When designing screen:‎
‎successful. Both systems will also need to be
Use colour sparingly
compatible.‎
Ensure fonts used consistently and legibly
‎Pilot takes place when one part of an organisation starts
Avoid clutter
to use the new system and the rest continue with ‎old.‎
Include instructions on how to complete form
Advantages: Errors will only affect pilot group and the
Indicate compulsory and optional questions
pilot group can train other users.‎
Give enough space to answer
Disadvantages: the method is very slow, and users
Use tick boxes for MCQ questions
might not like to use the new system. Both systems
Use drop-down boxes or option boxes for MCQ
‎will need to be compatible.‎
questions with only one response.‎
Validation routines should be used wherever possible and
be appropriate in order to reduce number of ‎possible 6.5. Documentation‎
input errors. Error messages should be positive and guide
users as to what to do to correct error.‎ Technical documentation is an overview of the structure
of the system, how it was put together, and how ‎it works. It
will include a data dictionary to show how data has been
6.3. Development and testing‎ structured within the system. It will ‎also include an

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

installation guide, results of testing and detailed backup speed up loading and transferring the file, and reduce the
routines. ‎ amount of memory it takes ‎up on your computer. ‎
It’s needed for people carrying out future maintenance so Lossless compression: Compression of a bitmap graphic
they can understand how the system is ‎configured. ‎ which removes repeating patterns of data, but ‎allows the
User documentation is user guide giving instructions to original data to be exactly reconstructed from the
the user. It includes details about how to use the ‎system, compressed data. ‎
alphabetical list of technical terms, a troubleshooting Lossy compression: Compression of a bitmap graphic
section and an index.‎ which uses approximations to remove and discard ‎data
Its needed so the user can learn how to use the system within a graphic that is unlikely to be noticed. ‎
and easily troubleshoot.‎ Run length encoding: A data compression algorithm, that
is supported by most bitmap file formats, which ‎reduces
6.6. ‎Evaluation and maintenance‎ the physical size of a file by encoding a run of repeating
characters in the file into two bytes. The ‎first byte is the
When a system has been installed, it will be evaluated. run length - the number of repeating characters. The
Users will be asked about the system and ‎requirements second byte is the repeating ‎character or value.‎
would be checked to see if they’re fulfilled. ‎
Maintenance takes place after a system has been 7.2. Vector vs Bitmap
delivered to a customer and is being used. ‎
Reasons for requirement:‎ Vector: created using shapes and coordinates, and
Perfective maintenance aims to always look to mathematical formulae and calculation are used to ‎draw
improve the system even if there aren’t any errors.‎ and fill areas. ‎
Adaptive maintenance aims to adapt to changes such Doesn’t pixelate as image is recalculated and redrawn
as new laws, new organisation etc.‎ when size is changed.‎
Preventative maintenance aims to prevent problems Instructions to create image are saves, not the image
arising in system. Regular checks like hardware itself.‎
‎checks are conducted for this.‎ Don’t work as efficiently when an image contains a lot
Corrective maintenance is to correct errors or bugs of data.‎
discovered in the system.‎ Can look ‘blocky as screen is bitmap display device
(uses pixels). On a lower resolution screen, you can
‎see the dots. A vector image drawn on the screen is at
7. Graphics Creation the resolution of that screen. On a lower ‎resolution
screen, you will see dots in the rasterised vector
7.1. Fundamentals graphic.‎
Bitmap: created using pixels. Each pixel has one colour. ‎
Node: An editable point on a line or vector which can be Pixelates as squares(pixels) are enlarged when size is
selected, transformed and moved.‎ changed.‎
Meta-graphics: images containing a combination of Image itself is saved and goes blurry when resized.‎
bitmap and vector data. ‎ Image quality measured by resolution which is
Tracing: Conversion of a bitmap graphic into a vector number of pixels per measurement (like dpi)‎
graphic.‎
Rasterization: Conversion of a vector graphic to a bitmap 7.3. ‎Extras‎
graphic (at the native resolution of the display ‎device) so
that the vector can be viewed on a display.‎ Duotone: duotone is a reproduction of an image, but only
Pixel: Single unit / picture element of a bitmap graphic – a using two colours ‎
single coloured dot. Short for ‘picture element’.‎ to represent a photograph as a vector, a pixel would need
Pixilation: When a bitmap image is enlarged so much that to be represented as one line, because of the ‎image’s
you can start to make out the individual pixels ‎from which complexity. This is considerably more data per pixel than
it is made. Edges and details lose their sharpness and the just the RGB value, making it much less ‎efficient. It is
whole image can appear blurry or ‎blocky.‎ possible to convert a bitmap image to a vector (known as
Resolution: The amount of detail in an image, which is ‘tracing’). This converts each ‎pixel into vector data by
dependent on how many pixels it contains. ‎Measured in using a threshold to choose how close the RGB values of
Megapixels, dpi, ppi, or pixel dimensions.‎ adjoining pixels need to ‎be in order for the computer to
Resolution independent: Graphics which are redrawn, view them as ‘the same’ and therefore create a shape
when moved or scaled, at the native resolution of ‎the rather than trying ‎to create a single line per pixel. The
display or output device (this applies to vector graphics).‎ threshold value set when the trace is performed will affect
Compression: The re-encoding of data into a format which how good ‎the trace is in terms of image detail. ‎
uses fewer bits of information than the ‎original. This can File types: ‎

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

BMP (Bitmap): range of bmp formats like four-bit (16 Persistence of vision: Is an optical illusion where the
colours), eight-bit (256 colours).‎ human eye is fooled into thinking a series of still ‎images
GIF (Graphic Interchange Format): Compressed represent one image which is moving. ‎
format which allows transparency (as long as not Stage: area in an animation software where you create
created ‎using alpha option). Restricted to 256 colours. ‎ the animation
JPEG (Joint Photographic Expert Group): Image Rendering: the process the animation software uses to
compressed when saves, decompressed when show an animated scene with all it components.‎
opened. ‎Does not allow transparency, transparent Rotoscoping: animation technique where the animator will
areas stored as white or black.‎ trace over footage of something frame by ‎frame, often a
PNG (Portable Network Graphics): lossless subject of real life which has a complex movement
compression, keeps transparency.‎ pattern. ‎
TIFF (Tagged Image File Format): adjusts number of
colours to reduce file size. File type can save effects 8.2. Extras
‎such as use of layers if saving and opening in same
software.‎ Types of animation:‎
Use of vectors and bitmaps in webpages: ‎ Traditional 2D hand drawn animation. Animator draws
each frame separately and then they are
Vectors Bitmaps
‎photographed and played back to the viewer in
Scalable Photo-realistic sequence at higher speed. ‎
Complex data so can delay Can be compressed so loads Stop motion Animation. This is where physical objects
loading of site faster. are photographed one frame at a time. The ‎object is
Might pixelate if zoomed then moved and the next frame is recorded. A
variation on this is known as “Claymation” ‎which
Effect of editing: ‎ involves the use of objects made from modelling clay
Enhances image or similar. ‎
Bring elements into focus which can help emphasise Key frame animation. The animator will set two key
purpose behind image.‎ frames and the software will generate all the ‎frames
Can set the mood of the scene in an advertisement.‎ in between the two key frames over period of time
Can create a false sense of reality, like airbrushing designated by the animator. Shape tweening ‎and
models to be more ‘beautiful’ can set standards of motion tweening are common methods used within
‎beauty which are not naturally possible. ‎ this type of animation. ‎
Editing images of celebrities and famous figures can ‎3D animation. powerful computers are used to create
create impression that product or campaign being objects that can be easily manipulated in a 3D
‎advertised is favoured by the celeb.‎ ‎environment. Motion capture is now often used to
record the movement of real people or objects. This
‎real-life movement is then processed and applied to a
8. Animation digital version where it can be manipulated and
‎rendered with different attributes. 3D animation and
motion capture have now replaced, in many ‎cases, the
8.1. Fundamentals traditional method of rotoscoping. ‎
Lesser key frames mean the animation isn’t smooth.
Object: image(s) on screen manipulated as one item ‎
However too many key frames mean more work for ‎the
Layer: object given its own timeline.‎Animation: series of
animator.‎
images played one after the other to stimulate
Animation speed can set the mood. A higher fps can be
movement.‎
used for action-oriented animations, lower for a ‎calm,
Frame: one screen or page where an image is placed.‎
soothing mood.‎
Key frame: frame that has a change in animation. Will
have a dot • on the frame in timeline.‎
Frame rate: number of frames per second. (fps)‎ 9. Programming for the Web
Opacity: lack of transparency Tween: animation where
start and end points are set and the computer generates
the images in the ‎middle.‎ 9.1. JavaScript
Morphing: shape tweening. Allows a shape to transform
into another shape and also includes movement ‎so Programming language that can be used to add
location can be changed too. ‎ interactivity to web pages. Can also be integrated with
Onion skinning: The term given to showing several of the ‎other programming languages.‎
previous frames when working on a new frame. ‎

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

Operator Function
<= Less than or equal to
== Equal to
=== Equal to and same data type
To print/output != Not equal to
!=== Not equal to or not of same data type

Logical operators

Operator Function Explanation


Or to add in set location
&& AND TRUE if both conditions true
|| OR TRUE if either true
! NOT TRUE if false

String manipulation

Operator Description
word = “Hello World”;
Return letters from position
Variable is a space in memory given a name where data
of startLetter to
‎can be stored and changed.‎ substring*(startLetter,
*endLetter**subword =
endLetter);*
word.substring(7,11);*subwor
d holds “World”
Starting at start letter, return
letter numbers.*Subword =
substr*(start,noOf);*
word.substr(2,4);*Subword
Data types: will hold “llo”
Replaces first string with
Type Description second*newW =
Number Numeric value replace*(“string”, “string”);* word.replace(“Hello”,
Letters, characters, and numbers. Use “…” / ‘…’ “Ok”);*newW will hold “Ok
String World”
to surround text string.
Boolean True or False Joins stringsword1 =
“h”; *word2 = “world”**final =
Array Series of values of same data type
concat*(“string1”, “string2”);* word1.concat(word1, “ ”,
Object Series of named values of variable or String1 + String2 word2);*or final = word1 + “ ”
+ word2; \n final stores “h
Arithmetic operators world”

Operator Description Converts string to


uppercase*final =
+ Addition toUpperCase();
word.toUppercase();*final
- Subtraction stores “HELLO WORLD”
* Multiplication Converts string to
/ Division lowercase*final =
toLowerCase();
++ Increment (increase by 1) word.toLowercase();*final
-- Decrement (decrease by 1) stores “hello world”
% Modulus (return whole part of quotient) Returns the character in the
string at number given*letter
charAt( number);
Comparative operators = word.charAt(2);*letter will
now store ‘e’
Operator Function
> Greater than Comments: text in code which interpreter does not run.
< Less than Used to make notes about how your code works ‎so other

>= Greater than or equal to

WWW.ZNOTES.ORG
CAIE A2 LEVEL IT

developers can understand. Add // before and after text SOME: checks if at least one item meets the conditions
you want to mark as comment.‎ FILTER: returns any array with all elements that meet
Arrays: Data structure that allows you to store multiple the criteria
values under one name. an array value can be ‎extracted FOR EACH: runs task on every element within the
and stored as variable, be replaced or even added. length array
of array can be found too. ‎ MAP: runs task on every element within the array and
Conditional statements:‎ returns the new/edited array
IF checks a condition. If true, first block of code is run.‎ Trap errors: detect errors. Try and catch code is used. ‎
ELSE gives an option to run code when condition false HTML forms and control events: Lets you combine
ELSE IF allows multiple conditions with different multiple objects and receive input from user.‎
outcomes.‎ BUTTON
SWITCH used instead of combining multiple if TEXT BOX
statements as that can get difficult.‎ DROP-DOWN BOX
Loops:‎ RADIO BUTTON
FOR – need to know number of times loop is to run
FOR/IN – used when there’s an object to loop through 9.2. Pop-up boxes
each element
WHILE – runs code when condition true Pop-up box can be used to display text or info. There are
DO/WHILE – condition checked at end of loop.‎ three types of them:‎
Functions: set of instructions that perform a specific task. ALERT: only displays text
It has a given name and can take values ‎( parameters)‎ CONFIRM: has two options, ok and cancel. ‎
Iterative methods: function (or task) that is repeated.‎ PROMPT: allows user to enter some text and gives
Every: checks every element in an array against a them options of ok and cancel.‎
condition.‎

WWW.ZNOTES.ORG
CAIE A2 LEVEL
IT

Copyright 2024 by ZNotes


These notes have been created by Prisha Dhoot and Abdul Majeed for the 2022-2024 syllabus
This website and its content is copyright of ZNotes Foundation - © ZNotes Foundation 2024. All rights reserved.
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website without the express, written
permission of the copyright owner. Under no conditions may this document be distributed under the name of
false author(s) or sold for financial gain; the document is solely meant for educational purposes and it is to remain
a property available to all at no cost. It is current freely available from the website www.znotes.org
This work is licensed under a Creative Commons Attribution-NonCommerical-ShareAlike 4.0 International License.

You might also like