A2 It Notes
A2 It Notes
ORG
CAIE A2 LEVEL
IT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE A2 LEVEL IT
Wireless communication:
Bluetooth: uses frequencies between 2402 and 2480
1. Networks MHz and is used for communication between short
distances.
Wi-Fi: operates in 2.4GHz and 5GHz. Used to connect
1.1. Network Components
portable devices, etc. Doesn’t use line of sight.
Switch: sends data packets to the desired port Radio: Both Bluetooth and Wi-Fi use radio waves. RFID
Hub: sends data packets to all ports. It's called a multi- chips use radio waves to identify the location of an
port repeater. object with an RFID chip. It is also used in wireless key
Wireless access point: connects WIFI-enabled devices to a cards and a few secure NFC payment methods.
network using radio waves of 2.4GHz or 5GHz. Bandwidth is essential when accessing content within a
Network interface card: needed to connect to a network time limit or in real-time. Large files download quicker
or any device. Connects to the motherboard. with greater bandwidth. A high bitrate is generally
Wireless NIC: can connect to a network without wires. You required to keep the buffer from emptying when watching
can add wireless NIC through a USB/dongle to a device streams.
which doesn’t have it enabled. Types of transmission media
Router: connects a LAN to a WAN (like the internet) and Cables: unshielded twisted pair (Ethernet cable) is
determines the most efficient route for data to reach the widely used. Suitable over distances up to 100 metres.
destination. Electrical interference is also present. Shielded
Repeater: Active hub which retransmits data packets to twisted pairs are used for high bandwidths.
prevent signal degradation. Wireless: fewer frequencies are available, so there is
Gateway: connects two networks of different types. less bandwidth than copper. It is also susceptible to
Firewall: prevents external users from gaining interference.
unauthorised access. Optical: total bandwidth higher than copper
Server: computer on a network which provides resources Protocol: a set of rules that ensure that data is
that client devices can use. transferred correctly.
File server: makes files available POP: defines rules for email client software to retrieve
Print server: deals with all print jobs, maintains a mails. Downloads all messages on client computer
‘queue’ and allows priority users to jump the queue. It and deletes from server. Part of application layer.
can also charge users for print using a credit system. IMAP: alternative method for email client software.
Mail server: receives and sends emails for an Mail is left on server and copy is downloaded.
organisation. S upports multiple folders unlike POP. Is a part of
Application server: delivers software to clients. application layer.
Proxy: deals with all requests to the internet. It sits TCP/IP: basic communication protocol used on the
between the LAN and the gateway. internet.
Bandwidth: measures the range of frequencies on a FTP: part of the TCP/IP suite and defines file transfer
communication channel. rules.
Bitrate: transmission rate of data HTTP: part of the TCP/IP suite. Used by web browsers
Bit streaming: streaming of bits; files are sent to the to send requests to a web server to view a web page.
device for viewing without downloading. In a video, a few HTTPS is the secure version.
frames are sent to fill a buffer (temporary area of BitTorrent protocol specifies how multiple downloads
storing). The buffer is emptied as the frames are viewed. occur from the same file concurrently. Several clients
download portions of the file and connect to send the files
Methods of transmitting
Circuit switching: packet path decided before directly to each other.
communication, one route for all packets A torrent is a metadata file identifying URLs or trackers to
Packet switching: each pack takes its route and is coordinate communication between peers.
routed between nodes. Abstraction layers:
Message switching: transmits a whole data set
together without a predefined route.
Optical communication
Infrared: low bandwidth, affected by sunlight, uses line
of sight, cheap
Fibre optics: no electric interference, great speeds,
can’t be ‘tapped’, light, don’t suffer from signal
degradation.
Laser: Can cover large distances, line of sight, can be
used to connect to LANs, and is secure.
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
Corruption of data
Loss of key personnel
Impacts:
Loss of revenue.
Damage to organisation’s image.
Effect on other business activities.
Risk = likelihood x impact
Recovery management:
Restoration of backups.
Replacement of hardware
Reinstallation of software.
Emergency replacement of key personnel.
Emergency office accommodation.
Resources needed to recover must be planned for.
Recovery point objective (RPO) must be identified. It’s the
estimated max amount of time that the business activity
has to recover systems and resume operations.
Know how long recovery would take. Advantages Disadvantages
Maximum tolerable downtime (MTD) should be Problems identified early in
considered. It’s the max time a business activity could Requirement analysis may be
process.Cheaper to make
tolerate not having essential system functionality. rushed so prototypes aren’t
changes in early stages than
Backed up data should be tested regularly to ensure the reflection of expectations.
later.
backup process has succeeded and data is accessible.
Users get new ideas when
Full systems restorations should be tested periodically by
seeing prototypes and can
attempting to restore whole server backups onto a clean Requirements can be clarified
lead to disappointment when
server and testing them. and refined.
the features can’t be funded.
(Called feature creep)
2.5. Prototyping End users more involved in Initial costs of developing
process, so more valuable prototype is high compared to
Is a ‘mock-up’ of a software or manufactured solution in a
feedback. traditional designs.
primitive form.
Used to demonstrate how product will look and work. In rapid prototyping, the
Developers have better
Usually focussed on UI for the feel. prototype can become rushed
understanding of expectation
Evolutionary/Incremental prototyping: and may have design flaws or
due to feedback.
Iterative approach errors carried to end solution.
Initial prototype developed, reviewed, and refined In throwaway, when users see
according to requirements and feedback. a working interface, they don’t
In evolutionary prototyping,
Throwaway/rapid prototyping: realise effort and time
users can get used to using
Prototype is discarded and doesn’t become part of the needed to make that into a
parts of system before whole,
final product. working solution. In iterative,
so need for bulk-training is
Requirements fine-tuned early in development. the feedback process can last
reduced.
More cost-effective. too long if regular changes
are wanted by user.
Advantages Disadvantages
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
3. Emerging Technologies
3.1. Technology and our lifestyle
Smartphone and mobile device intro effects
Positive: better time utilisation
Negative: companies expect employees to be more
User requirements gathered at beginning. available.
Interface and structure designed during design stage.
System programmed in implementation stage. 3.2. Three-dimensional printing
Verification confirms if user-requirements are met.
Problems discovered are corrected in maintenance Printing where an object is created based upon a
stage. blueprint made with modelling software. It works by taking
Waterfall method fundamentally flawed as it relies on thousands upon thousands of cross-section layers of the
the requirements being clearly defined. model, from the bottom to the top, to create the object.
Uses heated plastic to print a single layer at a time. Takes
a long time to produce object.
Uses include:
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
medicine- casts for broken bones (more flexible and Input errors in voice activated systems.
don’t cover broken body part), prosthetics, Programming errors cause incorrect output.
replacement organs (solves organ waitlist/match Question whether company or user should pay
problem), artificial blood vessels accident cost of self-driving car
houses (quick rehousing if natural disaster occurs)
tools, automobile parts, spare parts for space vehicles 3.5. Augmented Reality
(team doesn’t need to abort mission if part damaged)
Negative effects: Computer-generated images overlaid by technology on
print items like guns the real world.
If ‘bio-plastic’ isn’t used, environment concerns caused. Working: o Camera sends real world image and signal.
Software finds point where overlay is needed.
3.3. 3 4th gen and 5th gen cellular Overlay image created on computer screen.
Benefits: o Real-time translation of signs in other
communications languages.
AR Games like Minecraft Earth, Pokémon Go, AR cards
Each generation development improves speed and
used in Nintendo 3ds.
capability of the wireless connection for data.
Google Glass where glasses lens overlays information
Voice is still mostly carried using 2G technology.
in real-time and share images.
3G services work by cellular based technology. The signal
Issues: o Object recognition difficult due to camera angle
is passed from each cellular mast or phone tower.
and different lighting.
4G further increased upload/download speeds and
Vision impeded with Google Glass.
reduced latency.
Security issues when streaming data using Google
Reduced latency leads to a quicker response time to
Glass as Bluetooth is used to connect to phone.
requests.
5G is in development; however, to provide 5G access,
parts of radio network would need to be restructured. 3.6. Biometrics
Use of technology that tracks user values like heart rate
Measures several samples of data and stores it. A match
is then determined between input and stored data to
authorise.
Uses:
Fingerprint recognition, hand scanners for security.
Biometric passports containing biometric data like
Healthcare benefits: facial or iris image scan.
Specialist doctors can guide operation through video In fitness devices (measure heart rate).
call. Issues:
Patients receive best medical attention. Personal details are stored in a database. This
Doctors are well-rested as travelling isn’t needed. sensitive information may be exposed in a database
Work benefits: breach.
Keep in touch with clients on the move. Fake biometric material may be presented by a user.
Video-conferencing for meetings. Considered as an invasion of privacy by some.
Navigation apps to aid travel.
3.7. Cloud Computing
3.4. Artificial Intelligence
Servers store and process data instead of your computer.
Ability of a computer to make decisions based upon Uses:
stimuli, like a human. Services which allow you to upload your own files and
Use programming rules and are hard to create. manage them. Can be accessed from anywhere while
Can be learnt from actions taken and modifying online.
behaviour. Data can be uploaded from numerous devices; each
Benefits: device gains cloud access. Can easily share files on
Voice-activated systems for the disabled. personal devices using this.
Self-driving cars for disabled. Can be used to process data, hence not affecting
Greater entertainment in games as challenge console performance if there is a large amount of
difficulty increased. data to be processed. Therefore tasks beyond console
Expert systems for easy diagnosis/problem solving performance capabilities can be conducted.
Issues: Issues:
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
Security issue as service can be hacked into and data Similar to normal encryption using mathematical
can be stolen which may lead to identity theft if data algorithms, however key generated through photons.
personal. Transmission through fibre-optic cables.
Constant internet connection needed to access Photon key generated through polarising, i.e. creating
service which may be an issue if provider has a power vibrations in different directions in individual photons.
outage. Regular file syncing should therefore be done To unscramble, a filter reverses polarisation.
to make data accessible at all times. Not possible to accurately measure activity after
polarisation, hence very safe.
3.8. Computer-assisted translation Currently successful only at short distances (60 km)
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
Element Purpose Symbol When a system is developed, data needs to be created for
the purpose of testing, called test data.
External Where data originates or is Alpha testing is carried out by the developers or a special
entity destined team before a system is delivered to users.
Beta testing is used when software is being made
available to a large number of users. Beta testers would
System flowchart shows processes that take place within be selected users who test an early release of an
the system and decisions that are made. application after alpha testing.
Black box testing involves selecting input data and
Element Purpose Symbol checking that expected output matches actual output.
Involves testing the whole system or user testing. No
Terminator Start and end of flowchart knowledge of the way the system works is required.
White box testing involves the same process but the
internal structure and logic of the program are known to
Arrow Direction of flow
the tester. Usually takes place with small program
modules.
Process Activity within system
6.4. Installation
Decision with different Parallel is when a new and old system is run at the same
Decision
outputs based on result time.
Advantages: It’s less risky because if the new system
Input data or output data for fails, the old is always there. Accuracies of both
Input/Output
system systems can be compared.
Disadvantages: it’s more expensive as more staff is
required to duplicate data and different hardware may
Data collection form principles:
be needed. Data might be input differently in both.
Avoid colour as it may be printed without colour
Direct or plunge changeover is when all the data is moved
Include instructions on how to complete form
to the new system.
Include instructions about where form should be
Advantages: This is a cheap method, the data used will
returned
be consistent and the new system doesn’t have to be
Indicate compulsory and optional questions
compatible with the old
Give enough space to answer
Disadvantages: it’s very risky and users would need to
Use tick boxes for MCQ questions
be trained in advance.
Indicate how many options allowed from a multiple-
Phased is when parts of new system are installed one at a
choice list
time.
Ensure fonts used consistently and legibly
Advantages: Errors would only affect one part and
Avoid clutter
users can easily be trained.
Explain what scale indicates if there is a question
Disadvantages: using 2 systems might be confusing
about a scale
and there might be delays waiting for the phase to be
When designing screen:
successful. Both systems will also need to be
Use colour sparingly
compatible.
Ensure fonts used consistently and legibly
Pilot takes place when one part of an organisation starts
Avoid clutter
to use the new system and the rest continue with old.
Include instructions on how to complete form
Advantages: Errors will only affect pilot group and the
Indicate compulsory and optional questions
pilot group can train other users.
Give enough space to answer
Disadvantages: the method is very slow, and users
Use tick boxes for MCQ questions
might not like to use the new system. Both systems
Use drop-down boxes or option boxes for MCQ
will need to be compatible.
questions with only one response.
Validation routines should be used wherever possible and
be appropriate in order to reduce number of possible 6.5. Documentation
input errors. Error messages should be positive and guide
users as to what to do to correct error. Technical documentation is an overview of the structure
of the system, how it was put together, and how it works. It
will include a data dictionary to show how data has been
6.3. Development and testing structured within the system. It will also include an
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
installation guide, results of testing and detailed backup speed up loading and transferring the file, and reduce the
routines. amount of memory it takes up on your computer.
It’s needed for people carrying out future maintenance so Lossless compression: Compression of a bitmap graphic
they can understand how the system is configured. which removes repeating patterns of data, but allows the
User documentation is user guide giving instructions to original data to be exactly reconstructed from the
the user. It includes details about how to use the system, compressed data.
alphabetical list of technical terms, a troubleshooting Lossy compression: Compression of a bitmap graphic
section and an index. which uses approximations to remove and discard data
Its needed so the user can learn how to use the system within a graphic that is unlikely to be noticed.
and easily troubleshoot. Run length encoding: A data compression algorithm, that
is supported by most bitmap file formats, which reduces
6.6. Evaluation and maintenance the physical size of a file by encoding a run of repeating
characters in the file into two bytes. The first byte is the
When a system has been installed, it will be evaluated. run length - the number of repeating characters. The
Users will be asked about the system and requirements second byte is the repeating character or value.
would be checked to see if they’re fulfilled.
Maintenance takes place after a system has been 7.2. Vector vs Bitmap
delivered to a customer and is being used.
Reasons for requirement: Vector: created using shapes and coordinates, and
Perfective maintenance aims to always look to mathematical formulae and calculation are used to draw
improve the system even if there aren’t any errors. and fill areas.
Adaptive maintenance aims to adapt to changes such Doesn’t pixelate as image is recalculated and redrawn
as new laws, new organisation etc. when size is changed.
Preventative maintenance aims to prevent problems Instructions to create image are saves, not the image
arising in system. Regular checks like hardware itself.
checks are conducted for this. Don’t work as efficiently when an image contains a lot
Corrective maintenance is to correct errors or bugs of data.
discovered in the system. Can look ‘blocky as screen is bitmap display device
(uses pixels). On a lower resolution screen, you can
see the dots. A vector image drawn on the screen is at
7. Graphics Creation the resolution of that screen. On a lower resolution
screen, you will see dots in the rasterised vector
7.1. Fundamentals graphic.
Bitmap: created using pixels. Each pixel has one colour.
Node: An editable point on a line or vector which can be Pixelates as squares(pixels) are enlarged when size is
selected, transformed and moved. changed.
Meta-graphics: images containing a combination of Image itself is saved and goes blurry when resized.
bitmap and vector data. Image quality measured by resolution which is
Tracing: Conversion of a bitmap graphic into a vector number of pixels per measurement (like dpi)
graphic.
Rasterization: Conversion of a vector graphic to a bitmap 7.3. Extras
graphic (at the native resolution of the display device) so
that the vector can be viewed on a display. Duotone: duotone is a reproduction of an image, but only
Pixel: Single unit / picture element of a bitmap graphic – a using two colours
single coloured dot. Short for ‘picture element’. to represent a photograph as a vector, a pixel would need
Pixilation: When a bitmap image is enlarged so much that to be represented as one line, because of the image’s
you can start to make out the individual pixels from which complexity. This is considerably more data per pixel than
it is made. Edges and details lose their sharpness and the just the RGB value, making it much less efficient. It is
whole image can appear blurry or blocky. possible to convert a bitmap image to a vector (known as
Resolution: The amount of detail in an image, which is ‘tracing’). This converts each pixel into vector data by
dependent on how many pixels it contains. Measured in using a threshold to choose how close the RGB values of
Megapixels, dpi, ppi, or pixel dimensions. adjoining pixels need to be in order for the computer to
Resolution independent: Graphics which are redrawn, view them as ‘the same’ and therefore create a shape
when moved or scaled, at the native resolution of the rather than trying to create a single line per pixel. The
display or output device (this applies to vector graphics). threshold value set when the trace is performed will affect
Compression: The re-encoding of data into a format which how good the trace is in terms of image detail.
uses fewer bits of information than the original. This can File types:
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
BMP (Bitmap): range of bmp formats like four-bit (16 Persistence of vision: Is an optical illusion where the
colours), eight-bit (256 colours). human eye is fooled into thinking a series of still images
GIF (Graphic Interchange Format): Compressed represent one image which is moving.
format which allows transparency (as long as not Stage: area in an animation software where you create
created using alpha option). Restricted to 256 colours. the animation
JPEG (Joint Photographic Expert Group): Image Rendering: the process the animation software uses to
compressed when saves, decompressed when show an animated scene with all it components.
opened. Does not allow transparency, transparent Rotoscoping: animation technique where the animator will
areas stored as white or black. trace over footage of something frame by frame, often a
PNG (Portable Network Graphics): lossless subject of real life which has a complex movement
compression, keeps transparency. pattern.
TIFF (Tagged Image File Format): adjusts number of
colours to reduce file size. File type can save effects 8.2. Extras
such as use of layers if saving and opening in same
software. Types of animation:
Use of vectors and bitmaps in webpages: Traditional 2D hand drawn animation. Animator draws
each frame separately and then they are
Vectors Bitmaps
photographed and played back to the viewer in
Scalable Photo-realistic sequence at higher speed.
Complex data so can delay Can be compressed so loads Stop motion Animation. This is where physical objects
loading of site faster. are photographed one frame at a time. The object is
Might pixelate if zoomed then moved and the next frame is recorded. A
variation on this is known as “Claymation” which
Effect of editing: involves the use of objects made from modelling clay
Enhances image or similar.
Bring elements into focus which can help emphasise Key frame animation. The animator will set two key
purpose behind image. frames and the software will generate all the frames
Can set the mood of the scene in an advertisement. in between the two key frames over period of time
Can create a false sense of reality, like airbrushing designated by the animator. Shape tweening and
models to be more ‘beautiful’ can set standards of motion tweening are common methods used within
beauty which are not naturally possible. this type of animation.
Editing images of celebrities and famous figures can 3D animation. powerful computers are used to create
create impression that product or campaign being objects that can be easily manipulated in a 3D
advertised is favoured by the celeb. environment. Motion capture is now often used to
record the movement of real people or objects. This
real-life movement is then processed and applied to a
8. Animation digital version where it can be manipulated and
rendered with different attributes. 3D animation and
motion capture have now replaced, in many cases, the
8.1. Fundamentals traditional method of rotoscoping.
Lesser key frames mean the animation isn’t smooth.
Object: image(s) on screen manipulated as one item
However too many key frames mean more work for the
Layer: object given its own timeline.Animation: series of
animator.
images played one after the other to stimulate
Animation speed can set the mood. A higher fps can be
movement.
used for action-oriented animations, lower for a calm,
Frame: one screen or page where an image is placed.
soothing mood.
Key frame: frame that has a change in animation. Will
have a dot • on the frame in timeline.
Frame rate: number of frames per second. (fps) 9. Programming for the Web
Opacity: lack of transparency Tween: animation where
start and end points are set and the computer generates
the images in the middle. 9.1. JavaScript
Morphing: shape tweening. Allows a shape to transform
into another shape and also includes movement so Programming language that can be used to add
location can be changed too. interactivity to web pages. Can also be integrated with
Onion skinning: The term given to showing several of the other programming languages.
previous frames when working on a new frame.
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
Operator Function
<= Less than or equal to
== Equal to
=== Equal to and same data type
To print/output != Not equal to
!=== Not equal to or not of same data type
Logical operators
String manipulation
Operator Description
word = “Hello World”;
Return letters from position
Variable is a space in memory given a name where data
of startLetter to
can be stored and changed. substring*(startLetter,
*endLetter**subword =
endLetter);*
word.substring(7,11);*subwor
d holds “World”
Starting at start letter, return
letter numbers.*Subword =
substr*(start,noOf);*
word.substr(2,4);*Subword
Data types: will hold “llo”
Replaces first string with
Type Description second*newW =
Number Numeric value replace*(“string”, “string”);* word.replace(“Hello”,
Letters, characters, and numbers. Use “…” / ‘…’ “Ok”);*newW will hold “Ok
String World”
to surround text string.
Boolean True or False Joins stringsword1 =
“h”; *word2 = “world”**final =
Array Series of values of same data type
concat*(“string1”, “string2”);* word1.concat(word1, “ ”,
Object Series of named values of variable or String1 + String2 word2);*or final = word1 + “ ”
+ word2; \n final stores “h
Arithmetic operators world”
WWW.ZNOTES.ORG
CAIE A2 LEVEL IT
developers can understand. Add // before and after text SOME: checks if at least one item meets the conditions
you want to mark as comment. FILTER: returns any array with all elements that meet
Arrays: Data structure that allows you to store multiple the criteria
values under one name. an array value can be extracted FOR EACH: runs task on every element within the
and stored as variable, be replaced or even added. length array
of array can be found too. MAP: runs task on every element within the array and
Conditional statements: returns the new/edited array
IF checks a condition. If true, first block of code is run. Trap errors: detect errors. Try and catch code is used.
ELSE gives an option to run code when condition false HTML forms and control events: Lets you combine
ELSE IF allows multiple conditions with different multiple objects and receive input from user.
outcomes. BUTTON
SWITCH used instead of combining multiple if TEXT BOX
statements as that can get difficult. DROP-DOWN BOX
Loops: RADIO BUTTON
FOR – need to know number of times loop is to run
FOR/IN – used when there’s an object to loop through 9.2. Pop-up boxes
each element
WHILE – runs code when condition true Pop-up box can be used to display text or info. There are
DO/WHILE – condition checked at end of loop. three types of them:
Functions: set of instructions that perform a specific task. ALERT: only displays text
It has a given name and can take values ( parameters) CONFIRM: has two options, ok and cancel.
Iterative methods: function (or task) that is repeated. PROMPT: allows user to enter some text and gives
Every: checks every element in an array against a them options of ok and cancel.
condition.
WWW.ZNOTES.ORG
CAIE A2 LEVEL
IT