100% found this document useful (6 votes)
2K views52 pages

Igcse Ict 0417 Theory Notes

Uploaded by

Ahmad Asghar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (6 votes)
2K views52 pages

Igcse Ict 0417 Theory Notes

Uploaded by

Ahmad Asghar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

THEORY NOTES PAPER 01

single integrated circuit board found on the computer


motherboard
1. Types and Components of made up of:
Control unit: controls the input and output devices
Computer Systems associated with the computer
Arithmetic and logic unit: carries out calculations and
1.1. Hardware & Software makes logical decisions
Immediate access store (RAM)
Hardware
Internal Hard Disk Drive (HDD) or Solid State Drive
Tangible physical components of a computer system (SSD)
You can feel it or touch it
Internal Hardware Devices: computer’s main internal storage
Processor this stores the application software, operating system,
Motherboard and files
RAM & ROM they have fast data transfer rates and data access times
Video & Sound Cards large memory capacity to store data
Internal Storage devices like Hard disk drives (HDD) &
Solid state drives (SSD) RAM:
External Hardware Devices:
Random access memory (RAM) is an internal chip
Monitor
where data is stored temporarily
Keyboard
Memory can be written to and read from
Mouse
Stores anything that needs to be changed
Printer
All programs and data being used are on RAM
External Storage Devices
Contents are lost when the computer is turned off
Referred to as volatile memory
Software
ROM:
Programs that control computer systems
Set of instructions that make the computer do something Read-only memory (ROM) is memory used to store
You cannot physically touch the software permanent information
Relates to ideas & instructions for using physical objects Used to contain configuration data for a computer etc.
Chips cannot be altered, only read from
Two types of software: Data is not lost when the computer is turned off
Referred to as non-volatile memory
Application software: BIOS:
Programs that allow the user to do specific tasks ROM contains a boot file, referred to as BIOS (basic
Design to carry out tasks input/output system)
It can be general-purpose software or custom-made Tells computers what to do when it first starts
software (specialist software) Does hardware check when the computer is turned on
E.g. Spreadsheets, databases, word processing Then it loads the operating system into the RAM
System Software: BIOS stores the date, time and system configuration
Programs that allow the hardware to run properly
Control the computer's hardware and application
program Input & Output Devices
Communicate with user
E.g. Operating system, device drivers, compilers Input devices:
The purpose is to provide data for processing
1.2. The Main Components of Computer Data is raw facts that alone have no meaning
Examples: keyboard, mouse
Systems Output devices:
Displays the result of processing
CPU Information is processed data that has been given
meaning
is now called the microprocessor Examples: monitor, printer
interprets and executes the commands of the computer
hardware and software

WWW.ZNOTES.ORG
CIE IGCSE ICT

Secondary/Backing Storage Interface type Advantages Disadvantages


-user is in direct
Stores data/information & programs not being used at the -user has to learn
communication
current time many commands
with the computer
Backing store device = reader or recorder for simple functions
\n -low resolution,
Example: Hard disk drive \n -command has to
cheap monitors can
Backing store media = hardware containing data be in correct
be used \n -less
Example: Hard disk format, spelling (no
expensive than GUI
errors can be made
Command Line \n -possible to alter
or else command
Interface (CLI) computer’s
Basic Computer Model will not work) \n -
configuration
often difficult to
settings \n -can
change a command
type commands to
after it is typed in \n
carry out any task
-all commands
on the computer
need to be typed in,
(not limited to icons
time consuming
on the screen)
-expensive
compared to CLI \n
-user-friendly \n - -takes up more
user doesn’t need computer memory
1.3. Operating Systems
to learn any \n -user is limited to
Enables users to communicate with computer systems commands \n -can choose from the
Graphical User click on icons to icons present on
Controls operation of input, output & backing storage
Interface (GUI) open applications, the screen \n -
Supervises loading, running & storage of application
program simpler than typing requires an
Deals with error in application programs In commands \n - operating system
Maintains security of whole computer system easy to explore the (eg. WIndows)
Maintains a computer log system which takes up
Two main types of interfaces: CLI & GUI memory and is
expensive

CLI - Command Line Interface 1.4. Types of Computers


Types commands to tell the computer what to do
The user must know all the commands
Desktop/Personal Computers
Must not make typing errors
Refers to general-purpose computers
Used by technicians
PC refers to IBM compatible computers, distinguishing
Can access everything on the computer system
them from the Macs
GUI users can only access places they have icons for
Made up of separate monitor, keyboard, mouse and
\
processing unit
Advantages
GUI - Graphical User Interface
Spare parts standardized results in low costs
Uses graphics to stand for the complicated actions Tend to have better specifications
Uses icons Less power consumption since computer is plugged
Uses a mouse to select the icons into an electric socket always
Screen divided into windows allows different things on A large casing allows good dissipation of heat build-up
each Internet access is more stable because the computer
is in one position
WIMP - Windows Icons Menus Pointers
Disadvantages
Interface type Advantages Disadvantages Not portable since they are made up of separate
components
Wiring clutters up desk space
Necessary to copy files as they aren't portable
takes up a lot of desk space

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Laptop/Notebook Computers Advantages:


Smallest lightest most portable
Refers to computers where monitor, keyboard, pointing Integrated/virtual keyboard
device and processor together in a single unit Often the least expensive device
Extremely portable systems More practical for day-to-day use
Low weight Disadvantages:
Low power consumption Small screen may be difficult to use
The processor doesn't generate too much heat Not as powerful as other devices
Advantages Often has the lowest battery life
Portable because monitor, pointing device, keyboard, Small size makes it easy to steal/lose
processor & backing store units are together in one
box Smartwatches
No trailing wires
Full advantage of Wi-Fi Have the same functions as a smartphone
Can link into any multimedia system Uses OLED (organic light emitting diode) technology
Disadvantages Can link to smartphones using Bluetooth
Easy to steal features:
Limited battery; need to carry charger Internet connectivity
Keyboard and pointing device awkward to use Ability to message via text or video
Heat dissipation is difficult due to laptop structure Weather forecasts
GPS
Advantages:
Tablet Computer Very easy to use for monitoring health and fitness
Convenient as notifications are delivered straight to
These are small hand-held devices that can perform users wrist
many functions that PCs & laptops do Disadvantages:
Use touch screens to operate Large and bulky (heavy on the wrist as they have to
On-screen virtual keyboard replaces physical keyboard accommodate the battery and screen to display apps)
Often used by graphic designers to digitalize their content Usually unattractive in design
with a stylus pen
Can be used like a PC and/or a Smartphone Mainframe computers
anti glare displays
front and back facing cameras Large, very powerful computer systems
longer battery life than laptops Are used to run commercial applications, such as banking
light or insurance, where huge amounts of data need to be
cloud storage facilities and SSD processed everyday
equipped with sensors Features:
Advantages: Have several CPUs
Small, light & portable Fast processor speeds
Built-in cameras for photos & videos Multiple operating systems
Touchscreen can be used with a stylus pen Huge storage capacity
Long battery life Huge internal memory (RAM)
Fast to switch on Often use time sharing or batch processing
No generation of heat because of SSD
Disadvantages: 1.5. Impact of Emerging Technologies
Less storage spaces
Lacks power of laptop/PC This is technology that is being newly developed
Digital keyboard can be difficult to use These can have several impacts on our society
Touchscreen may be difficult to use for detailed work

Artificial Intelligence (AI)


Smartphone
Technology that focuses on creating a computer system
Modern phones that can perform similar tasks to all the that can closely mimic or simulate human intelligence
above AI can be used to:
Main use of smartphones is social media & day-to-day Enhance video games and computer tactics
planning Help decision making steps in expert systems
Use varies from person to person Make robots to imitate human behaviour

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Understand different human languages Dangerous jobs such as bomb disposal


Impact on everyday life: Exploring extreme environments such as volcanoes
Can be used to accurately predict hazardous weather Repetitive manufacturing jobs such as welding
conditions and signal warnings automatically Moving heavy objects such as large engines
Take over menial tasks for humans; increasing our Examples of robotics:
leisure time Drones: used by civilians in surveying the landscape
Can be used for safer automated travel; cars that can with GPS, and checking weather phenomena. Drones
drive and park by themselves are also used by military for reconnaissance missions
Increases home safety by being able to tell the Robots in surgical procedures: allow the surgeons to
difference between owner & intruder; call authorities perform the procedures with more precision, flexibility
automatically and control.
Improved medical care as decision making skills and Impacts on everyday life:
precision can be enhanced Increased personal time since robots can take over
domestic chores
Increased manufacturing efficiency since robots are
Biometrics much faster and less expensive than human labour
Unemployment as robots replace humans in
A part of a person’s body is used to identify that individual autonomous jobs
Can be: Safer working environments since robots can perform
Fingerprints tasks that are too dangerous for humans
Retina
Iris
Face Quantum Cryptography
Voice
These are all unique to everyone thus can be used as an Technology that allows messages and data to be sent with
authentication technique complete privacy; basically, an advanced encryption
Must be added initially to a system to use as identification An analog of normal cryptography i.e it still follows the
Impacts on everyday life: church-Turin. The only difference is the speed at which
Better security at the airport since most use at least they work.
one form of biometric check if not more Makes it much more complex to decrypt
Increased security in certain places as only authorized Impacts on everyday life:
personnel can gain entry Completely secure voting ensuring that votes cannot
Reduced vehicle theft since newer car doors come be tampered with or changed
with a fingerprint lock on the door handle Completely secure communication eliminating the risk
More secure mobile devices as most now have some of being read/heard by the wrong eyes/ears
sort of biometrics integrated into them Completely secure bank transactions so money goes
exactly where it is intended
Completely secure personal information preventing
Vision Enhancement hackers access to intrusive details about a person

LVES: low vision enhancement systems: video projected


inside a headset in front of the user’s eyes. Brings the Computer Assisted Translation (CAT)
objects closer for the viewer.
NVE: Night vision enhancement: dim light is captured and When human translators use computer software to help
passed through a light intensifier tube, which converts in the translation process
light to electrons. Electrons pass through another tube Can reduce translation time
where they are amplified to produce more electrons. May not be 100% accurate
Amplified electrons pass through to the end of the tube Common CAT tools:
where they hit a screen coated in phosphor dots that glow Spell checkers
when collided with. this creates an image several times Translation memory software
brighter and clearer than the original Language search-engine software
Impacts on everyday life:
More accurate documents since most software can
Robotics automatically detect errors
More multilingual society since anyone with an
Programmed machinery widely used to do physically internet connection can now essentially learn multiple
demanding tasks languages using translators
Can be automated or manually operated Quicker translations
Used to perform several tasks:

WWW.ZNOTES.ORG
CAIE IGCSE ICT

3D & Holographic Imaging

Technology that makes images appear to be 3-


dimensional by adding a layer of depth
Holograms use 2 regular 2D images and manipulate
them to produce a 3-dimensional image QWERTY- layout
Different laser beams are used to record the 2D images Ergonomic- reduces health related problems
onto a single photographic plate Uses
This creates an illusion of one 3D images Keyboards are used to input data into application
Impact on everyday life: software
Improved security since majority of credit/ID cards & Also used to for typing commands to the computer
bank notes use holograms to prevent forgery (CTRL + P)
Better movie experiences since 3D viewing can Advantages
provide a more immersive experience for the Enables fast entry of new text into a document
audience Well-tried technology & well-known method of entry
Greater data storage since holographic layers can Most people find them easy to use
potentially decrease the thickness of disc storage Easy to do verification check as data is entered, as it
appears on the screen simultaneously
Disadvantages
Virtual Reality (VR) Users with limited arm/wrist use can find keyboards
hard to use
When computers create an artificial environment that
Entering data is slow when compared to direct data
users can virtually interact with
entry (e.g. Optical mark recognition)
Uses: They use up desk space as they are quite large
Allow architects to walk around a virtual version of
their design
Training soldiers for combat by allowing them to fight Numeric Keypads
against virtual enemies
Training surgeons by allowing them to operate on
virtual patients
Playing games and enhance the level of immersion
General VR equipment:
Eye goggles that produce 3D images to develop the
artificial environment A numeric keypad is used to enter numbers only
Special gloves or controllers to perform precise Although some have function key to allow input of
actions inside the simulation alphabetical characters
Headphones to control what is heard in the virtual Uses
world Used in Automatic teller machines (ATMs), where
Powerful computer to run the entire VR system in real customers can key in their personal identification
time number (PIN), or an amount of money
Impacts on everyday life: Used to key in phone numbers into telephones
Improved medical surgeons/soldiers Electronic point of sale (EPOS) terminals have numeric
Stronger buildings keypads in case the barcode reader fails
Treatment of phobias as certain situations can be Used in Chip and PIN devices to key in PIN, or amount
treated using simulations of money
More realistic education as students can learn in a Used to enable fast entry of numeric data into a
more interactive environment spread sheet
Advantages
Numeric keypads are faster than standard keyboards
2. ## 2.1. for entry of numeric data
Since many are small devices (e.g. mobile phones),
they are easy to carry around
Input & Output Devices Disadvantages
Can be difficult to use due to the very small keys
Difficult to use for entering text
Input Devices & their Uses Sometimes the order of numbers isn’t very intuitive

Keyboards
Mouse

WWW.ZNOTES.ORG
CAIE IGCSE ICT

An example of a pointing device They are more difficult when doing operations such as
The ball underneath the mouse is used to detect ‘drag and drop’
movement
The left button is for selecting by double on it and the right
is to bring drop-down menus Tracker Ball
There is usually a scroll button which speeds up the
process of moving through a document
Uses
Used for opening, closing and minimising software
Used for grouping, moving and deleting files Tracker ball is like a mouse except that it has a ball on the
Useful when editing images (e.g. controlling the size top of the device
and position of the image) Users control the pointer on the screen by rotating the
Used for controlling the position of a pointer on the ball
screen to allow: Uses
Selection from a menu Have the same pointing/cursor control capability as a
Selecting an icon mouse
Scrolling up/down and right/left Used in applications where the user has a disability
Advantages (RSI)
Faster to select an option by a mouse than a keyboard Used in a control room environment, where it is faster
Enables rapid navigation through applications and the than a mouse to navigate through process screens
internet and more robust than a mouse
Mice are small and don’t take much area Advantages
Disadvantages Tracker balls don’t need the same fine control as a
People with restricted hand/wrist movement can find it mouse
hard to operate a mouse People with limited hand/wrist movement find easier
Easily damaged and can easily be clogged up with dirt to use than a mouse
They are hard to use if there is no flat surface The pointer can be positioned more accurately on the
available screen than with a mouse
They take less desk space than mice since they are
stationary
Touchpad
Disadvantages
Touchpads are used in many laptop computers as a Tracker balls are not supplied with the computer as
pointing device standard, so they are more expensive
The pointer is controlled by the user moving their finger User may need training since they are not standard
on the touchpad equipment
Uses
Used for opening, closing and minimising software
Remote Control
Used for grouping, moving and deleting files
Useful when editing images (e.g. controlling the size A remote control is used to control the operation of other
and position of the image) devices remotely by using infra-red signals
Used for controlling the position of a pointer on the Uses
screen to allow: In home entertainment devices such as Televisions,
Selection from a menu DVD player/recorder and satellite system
Selecting an icon Used to control multimedia systems
Advantages
Used in industrial applications to remotely control
Faster to select an option by a touchpad than a
processes, stop and start machinery
keyboard Advantages
Enables rapid navigation through applications and the Enable devices to be operated from any distance,
internet which is useful for people with disabilities
Since the touchpad is integrated into laptop computer, Some chemical processes are hazardous, so it is safer
there is no separate mouse, aiding portability to operate equipment from a distance
They can be used when no flat surfaces are available Disadvantages
Disadvantages People with limited hand/wrist movement can find
People with limited hand/wrist movement can find them hard to use
touchpads hard to use The signal between the control and the device can be
It can be more difficult to control the pointer when easily blocked
compared to a mouse

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Joystick Non-digital photographs can be scanned for storing on


a computer
Advantages
Images can be stored for editing later
Scanners are much faster and more accurate than
typing in documents again
It is possible to recover damaged documents and
By gripping the stick, a pointer on the screen can be
photographs by scanning them and then using
controlled
appropriate software to produce an acceptable copy
Buttons are used to make selections
Disadvantages
Uses
The quality can be limited depending on how good the
Video/computer games are often controlled by
scanner resolution is
joysticks
They are used in simulators to mimic actual controls
Advantages Digital Cameras
Easier to navigate round a screen compared to a
keyboard
Control is in three dimensions
Disadvantages
More difficult to control the on-screen pointer with a
joystick than with other devices such as mice
Photographs are stored in memory
They can be easily transferred to a computer using a USB
Touch Screen Uses
Digital cameras can produce photographs for direct
User can choose an option by simply touching a transfer to a computer or to print out
button/icon on the screen Digital cameras allow short video clips to be produced
The selection is automatically made without the need for Photographs can be uploaded directly into application
any pointing device software such as word processor
Use Advantages
Used for service tills e.g. petrol stations Easier to produce better quality photographs than with
Used where selections are made on a screen e.g. a tradition camera
ATMs, public information systems, airports and Easier and faster to upload photographs to a
railway stations computer
Used in PDA’s There is no need to develop film and print out
Used in Interactive white boards photographs (saves paper and no longer needs the
Used in computer-based training (CBT) chemicals to produce photographs from films)
Advantages Easy to delete an image from the memory if it’s not
Enable faster entry of options than a keyboard/mouse satisfactory
Very easy to choose options The memory card can store several hundred
User friendly method for inputting data photographs
They are tamperproof, preventing people from Disadvantages
keying in information (which could corrupt the The camera user needs to be computer literate to use
system) the camera properly
Disadvantages There is some artistry lost since clever software
There is a limited number of options available corrects errors in the photographs
Using touchscreens often can lead to health problems The resolution is not yet as good as traditional
e.g. (straining of arm muscles and RSI) cameras
The screen can get very dirty with constant touching Images often need to be compressed to reduce the
amount of memory used
It is possible to fill up computer memory very quickly
Scanners with several photos of the same subject (to find the
perfect snap shot)
Used to input information on hardcopy e.g. text document
Uses
Used to scan in documents and convert them into a Video Camera
format for use in various software packages
Old and valuable documents and books can be DV (digital video) camera store compressed photo frames
scanned, protecting the original copies from damage at 25 MB/s – motion jpeg.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Light turned into electronic signal through light sensitive Type of sensor Applications
sensors and automatically converted to a digital file Automatic greenhouse, chemical
format. pH
processes, environmental monitoring
Advantages
Easy to edit footage in a video editing.
Advantages
High quality video captured, therefore
Readings by sensors are more accurate than taken by
Disadvantages
humans
Storage medium (Memory cards) more expensive to Readings are continuous, there is no break in
buy than films.
monitoring
Because it is a continuous process any necessary
Microphone action or warning will be initiated immediately
The system can be automatic, removing the need for
human intervention, this is particularly important if the
process is hazardous
Disadvantages
Faulty sensors can give spurious results

Graphic Tablet
Can be connected directly to a computer
Sounds can be inputted and manipulated
Uses
Microphones are used to input speech/sounds to be
used in various applications
They are used in voice recognition software- for A graphic tablet is used with a stylus to produce freehand
conversion of speech into text, and recognition of drawings
commands Uses
Advantages Graphics tablets are used to produce drawings,
Faster to read in text than to type it using a keyboard computer graphics
Possible to manipulate sound in real time using In countries where characters are complex e.g. japan,
special software they are used as a form of input
If used in a voice activation system, this has the They are used in computer aided design (CAD) work
advantage of improving safety Advantages
Disadvantages It is possible to modify drawings before they are input
Sound files can use up a lot of computer memory They offer an accurate method of drawing
Voice recognition software isn’t as accurate as typing Disadvantages
in manually They are more expensive than other pointing devices

Sensors Web Cam

Type of sensor Applications


Automatic washing machines, central
Temperature heating systems, automatic green
houses, ovens
Burglar alarm systems, robotics,
Connected directly to a computer via a USB port
Pressure environmental monitoring, Automatic Uses
washing machines While chatting online webcams can be used to have
Automatic doors, street lighting conversations
Light control, Burglar alarm systems, Used to enable video conferencing to take place
automatic greenhouses Advantages
Burglar alarm systems, monitoring Can be left on constantly and activated when required
Sound
liquid and powder flow in pipes Allow people to keep in contact with each other
Automatic greenhouses, without the need to travel, particularly useful for
Humidity/moisture environmental monitoring, factories disabled or elderly people
where moisture levels are crucial Disadvantages

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Webcams have limited features and the picture is Provide a more secure payment system than requiring
often of poor quality a signature or using magnetic stripe, since the PIN
They need to be connected to a computer typed in must match up with the PIN stored on the chip
Provide a more robust system than magnetic stripe
2.2. Direct Data Entry & Associated since the chip does not need to be in contact with the
reader
Devices Disadvantages
Customer needs to be careful when typing in the PIN,
Magnetic Stripe readers so nobody reads it giving an opportunity for Fraud

Radio Frequency Identification (RFID) Readers

RFID readers work in similar ways to a bar code reader


Used to read information on the magnetic stripe An RFID tag is attached to/inside a surface
The stripe contains useful information such as start and The reader reads the data held on the tag which is then
expiry date input into the computer system for processing
Uses Radio waves are used to transmit data thus can be used
Credit and debit cards have magnetic stripes that are through most materials
used by ATMS or EFTPOS (electronic funds transfer Uses
point of sale) terminal Used in retail or supermarkets as barcode
Security cards for entering building e.g. hotel rooms alternatives
Travel systems e.g. train and underground tickets Used to identify pets
Advantages Used in passports
Data entry is fast compared with keying in using a Advantages
keyboard or keypad Can hold a lot of data
System is error free, no typing involved Can be read from long distances
Information is secure since there is no typing and the Does not require direct line of sight
information can’t be read directly by a person Information can be read faster than barcodes
Can prevent access to restricted/secure areas Can alter information
Magnetic stripes are unaffected by oil water and Disadvantages
moisture Thieves can steal information easily
No moving parts therefore physically robust RFID tags are expensive
Disadvantages Radio waves can experience interference
If the magnetic stripe is damaged the data is lost \
Card needs to be in close contact with the reader
Since the information is not human readable, they
Magnetic Ink Character Reader (MICR)
need to find a way to show the information to the
customer (e.g. hotel room number not printed on
cards)

Chip & PIN readers


Magnetic ink character recognition is a system which can
read characters printed in a special ink
Uses
Used to process cheques in banking operations –
cheque is read using a batch processing method
Advantages
The device has a slot where the card is placed, and the MICR offers great security than OCR since the oriented
chip is read characters cannot be altered
A small screen is part of the reader which gives There is no manual input, thus errors are reduced
instructions to the operator If somebody writes over the magnetic ink characters,
Uses it can still be read
Chip and PIN readers are used where payments are Disadvantages
made using cards e.g. travel agents Only certain characters can be read, and the number
Advantages of different characters is very limited

WWW.ZNOTES.ORG
CAIE IGCSE ICT

It is a more expensive method than other methods


used for direct data entry

Optical Mark Reader

Used to read information in the form of a barcode


Handheld scanners or wands are very common for
reading barcodes
Uses
Optical mark recognition is a system which can read Used in supermarkets and other shops where the
marks written in pen or pencil goods are marked with a barcode
Uses Used in libraries to scan user’s library card and
OMR devices are used to read questionnaires, barcodes on books (to keep track of books on loan)
multiple choice examinations papers and other types Used as a safety function in many companies to
of forms in the form of lines or shaded areas ensure that electrical equipment is checked on a
Advantages regular basis
A very fast way of inputting results of a survey Advantages
Since there is no typing, it is more accurate than Faster than keying in information, and fewer mistakes
keying in data are made
OMR is more accurate than OCR Used as a way of recording data, can improve safety
Disadvantages Barcodes enable automatic stock control
Forms need to be carefully designed to make sure that Barcode scanning is a tried and trusted technology
the marks/shadings are correctly positioned to gather When an item price is changed, only the central
accurate information database needs to be updated, there is no need to
There can be problems if forms aren’t filled correctly, change the prices individually on each item
sometimes they must be checked manually before Disadvantages
being read by an OMR, this is both time consuming Barcode scanning is an expensive system to
and expensive administer since every item in the shops needs a
barcode and every barcode needs to be entered on
the system
Optical Character Reader
Also, there is a need to invest in the computer
technology together with staff training, which can all
be expensive
The system is not fool proof- barcode can be swapped
around on items

Optical Character recognition is a software that takes


scanned text and converts it into a computer readable 2.3. Output Devices & their Uses
form
Uses CRT Monitor
Processing of passports and Identity cards
Cathode Ray Tube monitors
OCR is used when scanning documents to modify
them using a suitable software Least expensive type of monitor, becoming rarer as TFT
Advantages monitors take over
Much faster data entry system than manually keying Come in various sizes
Picture created is made up of tiny dots (red green or
in data
blue), the intensity of the colour of the dot determines the
Since there is no manual data entry, the number of
errors is reduced colour perceived by the eye
Disadvantages Uses
The system has difficulty reading handwriting Primary output device for computers, user can
immediately see what they are typing in
It is still not a very accurate technique
Used with light pens to allow designs to be created on
screen
Advantages
Produce higher quality images than TFT monitors
Barcode readers
Angle of viewing is better than a TFT monitor
They work with light pens in CAD and CAM
applications (Computer Aided Design/Manufacturing)
Disadvantages

WWW.ZNOTES.ORG
Tend to be heavy, weight hazard if not supported High power consumption
properly Slow response time
Run very hot, can cause fires if left unattended – Note: Old LCD monitors used CCFL (cold cathode
especially if they are old fluorescent lamp) technology to light up the screen.
Consume more power than TFT monitors
They can flicker, this leads to headaches and eyesight
problems with prolonged use LED Monitor:

Front layer made from liquid crystal diodes; grouped


TFT Monitor together to form pixels (RGB or RGBY-more vivid colours)
For the image to show up on-screen a light source of LED
backlight is used.
Advantages (over LCD monitors):
Lighter and thinner
Longer life
Lower power consumption
Greater contrast and more vivid colour
Relatively more robust
Thin Film Transistor monitors Disadvantages
Taking over from CRT monitors as the main output device Glare gives viewers headaches
The progress in TFT technology is one of the reasons for Images too sharp, so can cause eye strain
the rapid development of laptop computers
The screen is made up of thousands of tiny pixels which
are made up of transistors controlled by a Touch Screen
microprocessor
Each pixel has three transistors-red, green or blue; the Automatic selection without a pointing device
intensity of each determines the colour of the pixel seen. Uses
Uses Automatic teller machines
Primary output device for computers, user can EFTPOS (electronic fund transfer point of sales)
immediately see what they are typing in PDA
Integral part of laptop computers Smartphones
Advantages Public information points
Lightweight, so no weight hazards like CRT monitors Advantages
Less glare produced than in CRT monitors; also emit Faster data entry
less radiation Easy to choose options
Consume much less power and generate less heat User-friendly and intuitive
than CRT monitors Disadvantages
Disadvantages Limited options
Angle of viewing is critical; image appears unclear if Frequent usage can lead to RSI, etc.
viewed slightly from the side Constant usage results in the screen getting dirty;
This is an issue if several people are looking at the visibility and sensitivity decreases
screen at the same time
They cannot yet be used with light pens,
Multimedia Projector

IPS/LCD Monitor

Front layer made from liquid crystal diodes; grouped


together to form pixels (RGB or RGBY-more vivid colours)
Receive analogue and digital signals, although most
Receive analogue and digital signals, although most
modern projectors only work with digital inputs
modern projectors only work with digital inputs
IPS (In-plane switching) is the technology used in LCD
The signal source is usually from a computer, television,
monitors.
or DVD player
Advantages
The image from the source is magnified and projected
Colour can be seen accurately from different viewing
onto a large screen
angles
The devices usually work with a remote control, but can
No lightening on touching
also use virtual mouse technology – cordless PC mouse
Disadvantages
(has a laser pointer)
Expensive

WWW.ZNOTES.ORG
CAIE IGCSE ICT

It is then possible to direct the presentation without These have been linked to health hazards in the office
being tied to the computer
Most multimedia projectors take input from various
types of video format e.g. PAL, NTSC or SECAM Inkjet Printer
Uses
Used for training presentations (allows the whole
audience to see the images from a computer)
Also used for advertising presentations (shown at
exhibitions, shopping malls etc.)
Home cinema systems (projecting the images from a
DVD or television) use multimedia projectors
Used to produce good quality hard copies – the quality is
Advantages
not as good as in laser printers but much better than that
Enables many people to see a presentation rather
of dot matrix printers
than all of them crowded around a small computer
Do not have large buffers like laser printers, so printing is
screen
done a bit at a time
Avoids the need for several networked computers
Therefore, printing is sometimes paused – the whole page
e.g. when looking at a video clip on the internet,
can’t be stored in the buffer, it must wait for the computer
everybody can see the video on the large screen
to send more data
rather than logging on to several computers
Uses
Disadvantages
Used where low volume outputs are needed
Images can sometimes be fuzzy
Ideal for high quality printing for small print jobs or
Expensive to buy
single pages e.g. for photo quality printouts
Setting up projectors can be a little difficult
Advantages
High quality output
Laser Printer Cheaper to buy than laser printers
Very lightweight and take up little space (small
footprint)
Do not produce ozone and volatile organic
compounds, unlike laser printers
Disadvantages
Output is slow if several copies needed – there is little
buffer capacity to store the pages
Produce very high-quality hard copy output The ink cartridges run out too quickly to be used for
Print rate per page is fast if many pages are being printed large print jobs
Rely on large buffer memories – the data for the whole Printing can smudge if the user is not careful
document is stored before pages can be printed out Can be expensive to run if they are used a lot –
Uses original ink cartridges are expensive
Used where noise levels need to be kept low e.g. in an
office
The best option for fast, high quality, high volume Dot Matrix Printer
printing
Advantages
Printing is fast for high volumes, slightly faster than
inkjet if only a few pages are to be printed
Can handle very large print jobs
Quality is consistently high
Toner cartridges last for a long time; laser printers A type of impact printer
A print head made up of a matrix of pins presses against
can be a cost-effective option if colour outputs are not
an inked ribbon
required
Disadvantages Uses
Can be used in noisy environments e.g. garage
Expensive to buy
Only fast if several copies are being made workshops
Can be used in applications were the print quality is
Colour laser printers tend to be expensive to run since
not very important
four cartridges are needed as well as diffuser kits, etc.
Advantages
Produce ozone and volatile organic compounds
because of their printing method and type of toner/ink Can be used in environments which would be a
problem for laser and inkjet printers – dusty, dirty or
used
moist atmospheres

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Carbon copies or multi-part outputs can be produced Used to produce prototypes which work from CAD
Very cheap to run and maintain packages, photograph images, stored drawings etc.
Easy to use if continuous stationary is required e.g. Scale models are produced in colour before the real
long print jobs such as wage slips thing is manufactured
Disadvantages The ultimate objective is to produce organic objects
Very noisy – not good in an office environment using this layering technology (such as replacement
Cost more than an inkjet printer to buy human organs)
Very slow Advantages
Printing is of poor quality Save a lot of money, other methods of making
prototypes are very time consuming and expensive
The powders used can often be ground up and reused
Wide Format Printer Physical scale models are produced with working
parts, which gives a better idea of how the product will
look
Disadvantages
Expensive to buy
Slow at producing their output
Product is sometimes a little rough, often further work
Devices that produce hard copies but operate in a needs to be done
different way to printers
Not limited to normal printer paper size and can produce
Speakers
highly accurate, very large drawings and posters
The most common types are pen plotters, electrostatic
(similar method to laser printers) and inkjet plotters
With pen plotters, coloured pens are controlled by a
computer and the paper can move backwards and
forwards to allow accurate shapes to be drawn
Uses
Used to produce large drawings e.g. blueprints of
buildings; are often used with CAD applications Can be connected directly to a computer or are built into
Used to produce large pictures for use on billboards the monitor or casing (as in laptop computers)
or giant posters Uses a digital to analogue converter (DAC) to convert
They can also print on plastic coated paper digital data from the computer to analogue from so the
If the pens are replaced by cutting tools, it is possible to speakers can process it; the signal is then amplified
make large signs through the speakers.
Advantages Uses
Can produce huge printouts Used to output sound from multimedia presentations
Print quality is extremely high Used in home entertainment centres
Disadvantages They can help blind people through audio output of
Slow in operation text on the screen (together with speech generation
Expensive to buy and maintain software)
Used to play downloaded sound files
Advantages
3D Printer
Usually long lasting and durable (if operated within
their intended power levels)
Often provided with the computer/laptop although
these may not be the best quality
Disadvantages
Can take up a lot of desk space, compared to
headphones
A new type of printer that produces solid 3D models using Can distract people around you, everyone can hear
modified inkjet technology called tomography what you are playing
Very thin layers of fine powder (plaster, resin, starch) are May not be able to hear the full sound spectrum, this
bonded together as a 3D model is slowly built up requires multiple speakers
Items produced are known as prototypes
Uses
Actuators

WWW.ZNOTES.ORG
CAIE IGCSE ICT

A type of controlling device


Transducers that are used to take signals from a 3. Storage Devices and Media
computer and convert them into some form of motion e.g.
operating motors, pumps, switches and valves
3.1. What is backing up of data?
Digital signals are sent from the computer to an actuator
to operate a device
Backing up refers to the copying of files or data into a
Conversion of the digital signal to analogue is required different medium
first (using a DAC) Examples of different mediums files can be copied to are:
disk
tape
Motors
flash drive

Why do we back up data?

To safeguard against loss of data when the original


Turned on or off by the actuator secondary storage device fails. The secondary storage
Uses device can fail due to hardware failure, problems caused
Used in many domestic appliances by files being overwritten or by corruption of files.
Automatic washing machines (to make the drum To safeguard against damage caused by hackers. Even if
rotate) the hacker’s primary intention wasn’t to hack the data in a
Cookers (to switch on fans) computer, the very act of hacking into files could lead to
Water pumps in central heating systems the possible corruption of data or data loss.
Automatic greenhouses to open windows and switch When files need to be used elsewhere, the data can be
on fans copied into a medium and transferred to another
Used to control robot arms in the industry medium.
Operate fans, disk drives and DVD drives in computers
3.2. Two Methods of Accessing Data:
Buzzers Serial Access:
Switched on or off by the actuator
This involves starting from the beginning of the file and
Uses
accessing each record to get to the file required
Used in cookers and microwave ovens to tell the
It is a very slow form of data access
operator when the cooking process is complete
It is used in systems where the speed of accessing data is
Used in burglar alarm systems to warn if intruders are
not important
present
It is used in magnetic tape systems
examples where serial access is used:
utility billing
Heaters
clearing of bank cheques
Actuators are connected to switches which turn the producing pay slips
heater on or off
Uses Direct Access:
Used in automatic washing machines, cookers and
This is used to access data stored in any record by typing
central heating systems
in the required key field
Used in automatic greenhouses to control the
Typing in a key field will allow the user to access a
temperature
particular record directly from the calculated position
It is used in optical storage media, magnetic disks and
Lights solid state media
Accessing data is much faster
The actuator is connected to the switch that turns the
lights on or off 3.3. Magnetic Backing Storage Media
Uses
Security lights Depend on the magnetic properties of certain materials.
Used in greenhouses to control the lighting conditions Magnetic material is coated on the surface of a disk which
can be magnetised to represent a 1 or 0 and data is read
accordingly.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Fixed Hard Disks/Drives Data transfer rate is fast


Disadvantages
Available on all computers and is the main method used Access time is very slow (need to go through all
for data storage previous files to reach the one required)
Uses a read/write head to write and read data from it When updating another tape is needed
Disk surface coated in magnetic film, storage is done by Affected by magnetic fields
altering binary codes to 1s or 0s
These hard disks are used to store the Disk Operating 3.4. Optical Backing Storage Media
System (DOS), application software and files
Uses
CD-ROM/DVD-ROM
Used to store operating systems and working data
Used for storing application software Laser light is used to read data stored on CDs or DVDs
Real time systems and online systems used fixed hard Use a thin layer of metal alloy or light-sensitive organic
drives dye to read the data
Used in file servers for computer networks Spiral track included
Advantages Read only memory – cannot be overwritten
Very fast data transfer rate Data is stored as a series of pits and lands formed by a
Fast access times to data laser beam etching the surface at manufacturing stage
Have very large memory capacities Uses
Disadvantages CD-ROM stores music files and computer games
Can be easily damaged DVD-ROM used to store films, computer data and
They lack portability more sophisticated gaming software
Many moving parts compared to Solid State Drives Advantages
(SSD) Holds more data than floppy disks
Large memory capacity
Less expensive than hard disk drives
Portable & Removable Hard Disks/Drives
Disadvantages
Data transfer rate and data access time are slower
Like fixed hard disks but are usually connected via
universal serial bus port
CD-R/DVD-R
Can be removed and connected to other computers
Uses
The letter ‘R’ means the disc is recordable only once and
Can be used as backup systems to prevent loss of
then it becomes ROM
data
Use a thin layer of an organic dye as the recording media
Can be used to transfer data, files and software
DVDs also use an additional silver alloy or gold reflector
between computers
Laser beam produces heated spots and unheated spots
Advantages
and the laser beam can distinguish between the two and
Data access time and transfer rate is very fast
interpreting the data as 1s or 0s
Large memory capacities
Uses
Can be used to transfer files or data between
They are used for home recording of music (CD-Rs)
computers
and films (DVD-Rs)
Disadvantages
They are used to store data for later use
Can be easily damaged
Used in applications where it is necessary to prevent
the deletion or over-writing of important data
Advantages
Magnetic Tapes & Drives
Cheaper than RW disks
Thin strip of plastic which is coated in a magnetic layer Once burned (and finalized) they are like ROM
Read and written by read/write head Disadvantages
Uses Can only be reordered once
Application where batch processing is used Not all CD/DVD players and can read CD-R
Used as a backup media
Long term archiving of data due to the large memory
capacity of Magnetic tapes
CD-RW/DVD-RW
Advantages
‘RW’ means that these disks are re-writable media can be
Less expensive compared to hard disk of equivalent
written over several times
memory capacity
Unlike CD-R/DVD-R they don’t become ROMs
Very robust technology

WWW.ZNOTES.ORG
CAIE IGCSE ICT

The recording layer uses a special phase-changing metal Blu-Ray Discs


alloy
The alloy can switch between crystalline and amorphous Uses
(non-crystalline) phases, thus changing its reflectivity to Blu-ray disks are used in home video consoles
light, depending on the laser beam power Used for storing and playing back films
Spots are produced which can be read by a laser PCs can use this technology for data storage or
System allows data to be written, erased and re-written backing up hard drives
many times Camcorders can use this media to store film footage
Uses Advantage
CD-RWs and DVD-RWs are used to record radio and Very large storage capacity
television programs Data transfer rate is very fast
They are used in closed circuit television (CCTV) Data access speed is faster than with other optical
systems media
Advantages Disadvantage
Can be re used many times Disks are relatively expensive
Different file formats can be used each time Blu-ray disks still have encryption problems
Less wasteful than R format since files or data can be
added at a later stage 3.5. Solid State Backing Storage
Disadvantages
Relatively expensive media Solid state systems control the movement of electrons
Possible to accidentally overwrite within a microchip: if the transistor conducts a current,
this is equivalent to a 1, otherwise it is a 0
Have no moving parts, consume much less power and are
DVD-RAM
extremely robust
Used primarily as removable storage devices and are
Recent addition to optical media group
Unlike other CD and DVD formats, DVD-RAMs have collectively known as flash memory
Flash memory makes use of NAND chips whereas
several discrete concentric tracks rather than a single
EEPROM (Electronically Erasable Programmable Read-
spiral track
Only Memory) uses NOR chips
Gives them advantage that writing, and reading can occur
at the same time Devices using EEPROM are more expensive compared to
flash memory
Makes it possible to watch an already recorded television
program at the same time as a different program is being
recorded Solid State Drives
Recording layer is made from similar phase-changing
material to that used in RW technology Supports reading/writing data & maintains stored data in
Shiny and dull marks represent data to a computer where a permanent state even without power
they are interpreted Functions much like a hard drive but different tech
Uses Built with an array of semiconductors that form its
DVD-RAMs are used in recording devices such as memory and operated using an integrated circuit
satellite receivers to allow simultaneous recording Uses
and playback Used to store operating systems and working data
They are used in camcorders to store films Used for storing application software
Advantages Used in file servers for computer networks
Have a long life (30 years) Advantages
Can be re written on more than the DVD-RWs (100,000 Faster than hard disks because they do not need to
times) ‘spin up’ the disk
Very reliable as they have built in verification software Robust because no mechanical parts
to ensure accuracy of data Read performance is fast even when data fragmented
Access is very fast Less susceptible to data loss
No need to finalize the disk No moving parts so it is more reliable
Very large capacities Lighter, quieter and require less power than hard
Ability to read and write data at the same time disks
Disadvantage Data access times is faster than HDD
DVD-RAMS are not as compatible as R or RW, many Disadvantages
systems will not recognize this format More expensive than hard disks
More expensive than DVD-RW Have a smaller capacity than modern hard disks

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Lower number of write cycles causing performance to Commonly used to connect computers and other network
diminish over time capable devices to the internet
They can be connected to through cables or wirelessly

Flash Drives/Memory Sticks


Function
Otherwise called pen drive/memory stick/USB stick
Can store several GBs of data and use solid state Makes decisions on messages being passed between the
technology networks
Connected to a computer through USB port and power to Reads information about the message and decides where
operate drawn from host computer the message should go and the best route for it to get
Some expensive software increasingly uses these storage there
methods as a form of security Formats the messages making it suitable for the new
Uses network
Used to transport files between computers
Used as a security device – a dongle – to prevent
software piracy How it Works
Advantages
Very compact and portable media To send data to a specific device, a router needs a
something like an address
Very robust
Not affected by magnetic fields Internet Protocol Address: a unique number assigned to
Disadvantages all computers and devices connected to the internet which
Not possible to write protect the data and files can determine its exact physical location
Small physical size and are easy to lose. A router can use this IP to send data from the internet to
the exact device that requested it
Lower storage capacity than hard disk
Storing IP Addresses:
Routers store IP addresses in a routing table
Flash Memory Cards Routing tables list all the different routes to other
networks
A form of electrically erasable programmable read only Routing table determines best route for data
memory (EEPROM)
Uses
Used to store photos on digital cameras Sending Data between Devices
Mobile phones use them as memory cards
Used in MP3 players to store music Routers can also send ‘packets’ of data between devices
on different networks
Used as a backup in hand held devices
Advantages Each packet contains the data itself and the IP address of
the device being sent to
Very compact
Very robust Occurs globally using multiple routers & re-routing until
Disadvantages the data reaches its intended IP address
Very expensive per GB of memory when compared to
hard drive disks 4.2. Common Network Devices
Has a finite life in terms of the number of times they
can be read from/written to. Network Interface Cards
Lower storage capacity than hard disks
Used to connect individual computers/devices to a
network
4. ## 4.1. NICs come in two distinct types:
Wired: cards that have ports which allow network
cables to be plugged in directly
Networks & the Effects of Wireless: cards that connect to networks using Wi-Fi
signals
Using them
Hubs
Routers
They are devices that can have multiple devices
A device that enables data to be sent between different connected to them
types of networks

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Main task is to receive data from different ports and send Laptop computers
it to each device Peripheral devices such as printers
The information will be received to the device whether its Wi-Fi Hotspots
relevant, or not Wi-Fi systems rely on AP (radio frequency technology)
to enable the device to receive and send signals
Wi-Fi hotspots are places where you can access Wi-Fi
Bridges (free or paid)
Hotspots are found in public places like Airports,
It connects 2 different types of networks together e.g. a hotels, and cafés
bus and star network War driving: The act of driving and searching for
It can only connect networks that use the same way for unsecured Wi-Fi hotspots
handling messages
This gives a risk to the Wi-Fi system
They do this by changing the form of message to suite the
different type of network
Bluetooth
Switches Bluetooth is an example of wireless personal area
networking (WPAN) technology
More efficient than hubs in distributing data
Spread spectrum transmission (radio waves) is used to
Each device has an access control media address MAC provide wireless links between to devices such as mobile
which identifies it uniquely phones and allow connection to the internet
MAC Address: a number unique to each device connected A small home network can be created with this system
to the network (like fingerprints) Uses
Data sent will have a mac address which tells the source
Transfer photos from camera to mobile phone
and receiving device Wirelessly connect different external devices

Modems 4.4. Accessing the Internet


It stands for modulator demodulator. User can access by web browser
Converts computer’s digital signals (modulates it) into
analogue for transmission through telephone lines Type of access Description
Reverse this process- analogue signal from a telephone Slowest type (60kbps), Telephone
line into digital for a computer to process the data Dial up internet access line gets tied up while a dial up
(demodulates it) modem is in operation
The main use it to connect to computer networks over Local cable television operators
long distances using existing telephone lines Cable internet access give user access through cable
networks
Types of Modems:
Fastest download speed
Internet access via DSL
Dial-up modems: operate at 60 kilobits/sec connections (at least 11000kbps)
slow compared to modern standards
Asymmetric: faster at downloading than uploading
(ADSL) asymmetric digital subscriber line modems
4.5. Web Browser
operate at 11,000 kilobits/sec
Software used to retrieve, present & traverse the World
Don’t tie up line while accessing internet, which allows
Wide Web
simultaneous internet access and usage of telephone
World Wide Web: system of interlinked hypertext
Cable modems: allow cable TV users to receive TV signals
documents accessed via the Internet
as well as internet access

4.3. Wi-Fi & Bluetooth HTTP Proxy Server

Wi-Fi Type of server that acts as a buffer between a WAN and a


LAN
Any system which allows you to connect to a network or Retrieves web pages and passes them onto the computer
computer through wireless communication that made a request
Examples: Stores any page retrieved on the server, which means
WLANs that when a different computer requests the same page it
PDAs would be available

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Speeds up the browsing process Online Banking


Advertising & Blogging
Social Media
Websites

Web is made up of millions of websites and web pages Intranet


Web pages are documents on a computer screen
containing various multimedia and text, pictures Like the internet but only accessible to specific users
A website consists of many of these pages linked together Basically, a private internet where outsiders cannot
connect to it
Uses of an Intranet:
Uniform Resource Locator (URL) Web Browsing
Email
Web browsers use URLs to retrieve files
File Sharing
They are multiple ways of locating on the internet Schools: share information and learning resources
Standard form: 4 numbers e.g. 194.106.220.19 with students
Alphanumeric form: Businesses: share private information within a large
protcol://web address/path/filename company securely
Where; Protocol is usually http
Site address consists of: computer name, domain
name, domain type, and country code Comparing Internet & Intranet
Path is the web page
Filename is the item on the page Internet Intranet
Phrase Internal Restricted
International Network
4.6. Email Origin Access Network
Purpose Globally share data Privately share data
A method for sending text and attachments from one
Specific company or
computer to another over a network Audience Wide range of people
organisation
Advantages
Speed of sending and receiving replies is quick Anywhere if you are Only from within the
Access
connected company
Low cost (no stamps, paper etc.)
Not needing to leave home to send the mail
Disadvantages
Possibility of virus threats and hacking Local Area Networks (LAN)
Need for the email address to be correct
Not over a large geographical area (e.g. in one building)
Inability to send bulky objects via emails
Typical LAN will consist of several computers and devices
Devices and computers will be connected to hubs or
4.7. Internet Service Provider (ISP) switches
One of the hubs or switches will usually be connected to a
These are companies that provide users with access to
router/modem to allow LAN to connect to the internet
the internet
In doing so it then becomes part of a wide area network
Provider in return for these services is charged a monthly
Advantages
or annual fee
The sharing of resources
After paying this fee, a username and password are
Communication between users
issued which can be used to connect to the internet
Network administrator can control and monitor all
aspects of the network
4.8. Common Network Environments Disadvantages
Easier spread of viruses throughout the whole
Internet network
Development of printer queues
A worldwide collection of networks and computers that Slower access to external networks e.g. internet
have joined together Increased security risk
Uses of the Internet: If main server breaks down, usually the networks will
Web Browsing no longer function
Email
File Sharing
Entertainment Wireless LANs (WLANs)
Video Conferencing

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Do not involve any wiring or cabling Advantages Disadvantages


Provide wireless network connection overs a short Have larger keyboards Require keyboard and mouse
distance making it easier to type on as extra peripheral devices
They use radio or infrared signal's instead of cables
Screens are larger so giving
Devices known as Access Points (APs) are used for a Screen and Monitor consume
an easier and better viewing
larger range separate power.
experience
APs usually use spread spectrum technology (larger
range) Cannot usually connect to
Usually use wired internet
Advantages devices like Bluetooth
connections which is more
All computers can access the same services and speakers without external
stable/reliable than Wi-Fi
resources adapter
No cabling is involved Robust Take up large desk space
The system is more flexible Good heat dissipation- large
Adding new computers and devices is very easy
Bulky to carry around
body.
Cost is reduced, and safety is improved
Disadvantages TABLET COMPUTERS
Security is an issue
Problems and interference can affect the signal Advantages Disadvantages
The data transfer is slow than in the wired LAN
Smaller & lighter than
Larger & less portable than
desktops & laptops making it
smartphones
Wide Area Networks (WAN) easier to carry
Uses Wi-Fi to connect to the
Larger screen than
WAN is formed by several LANs being connected through internet which is less reliable
smartphones
a router or a modem than wired
Some companies set up Private WANs, it is expensive On-screen keyboards larger Screens are smaller than
however it comes with a more enhanced security
than those on smartphones those on laptops & desktops
It is common to use an Internet service provider (ISP) for
On-screen keyboard is not
connections to the internet and communicate via this
easy to type on
network system
Additional hardware is needed for a WAN: Routers,
modems and proxy servers MOBILE PHONES

Advantages Disadvantages
4.9. Using Different Types of Computers
Smallest most portable of all Websites are often not fully
to Access the Internet devices displayed
People more likely to carry Small screen size makes
LAPTOP COMPUTERS this wherever they go viewing websites difficult
Much easier to connect to Small keyboards make it
Advantages Disadvantages
internet on-the-go difficult to type
More portable than desktops
Less portable than Allow children access to
can access internet in more
tablets/smartphones internet anywhere; can be
locations
dangerous
Larger screen than tablets & Screens not as large as
smartphones which allows desktop PCs may not appear
easier reading as clearly 4.10. Network Security Issues
Keyboards are bigger than CPUs are not as powerful as
Connection to a network exposes a user to:
those on tablets/smartphones those in desktops
Hacking: Unauthorised access given to computer.
Touchpads allows easy Phishing: Phishing involves getting sensitive
navigation even on slanted information such as usernames, passwords, and
surfaces credit card detail, for malicious reasons, by mimicking
a reliable webpage on the network
DESKTOP COMPUTERS Pharming: Explained in chapter 8 card 2 (E-Safety)
Viruses: Explained in chapter 8 card 2 (E-Safety)
Advantages Disadvantages
Most websites are designed Not portable so are limited to
to be viewed on a desktop use in one room Policing the Internet

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Currently, the internet has no boundaries magnetic stripe reader that authenticates the user after
Anything and everything can be put online reading iron-based magnetic particles on a band of magnetic
For Policing: material on the card which is also called a magstripe.
Prevent illegal material being posted
People can easily find info on how to become hackers ID Cards: Usually a photo ID with a QR
or make bombs
or barcode that authenticates the user.
Prevent children from accessing undesirable websites
Could reduce the amount of incorrect information
Against Policing:
Material already available in other sources i.e. books
Very expensive
Users would have to fund Passports: Have an RFID chip on it that
Difficult to enforce rules
Against freedom of information responds to a signal sent by a RFID reader that sends
Laws already exist to deal with perpetrators information about the passport holder to the computer
system

Inappropriate Websites Physical Tokens: A security token

Risk of finding undesirable websites (sometimes called an authentication token) is a small


Risk of doubtful websites which are not genuine hardware device that the owner carries to authorize access
They could lead to problems such as undesirable web to a network service. The device may be in the form of a
smart card or may be embedded in a commonly used object
links, security risks
such as a key fob.

4.11. Password Interception Retina Scans: Scans the

Spyware unique pattern of blood vessels in the eye of a user using an


unperceived beam of low-energy infrared light into a person's
Spyware is software that gathers user information eye as they look through the scanner's eyepiece.
through their network connections without them being
Iris Scans: A scanner scans and
aware that this is happening
Once spyware is installed, it monitors all key presses and compares the pattern in the iris of a user to a database of
transmits the information back to the person who sent out stored iris patterns, if it finds a match, the user is
the spyware authenticated. Iris scans are generally more accurate than
This software can install other spyware software, read retinal scans.
cookies and personal information, and change the default
home page or web browser Face Recognition: Verifies the face of
Anti-spyware can be used to search out this software and
the person attempting to access the data using a face
correct the corruption
recognition algorithm and identifies facial features by
extracting landmarks, or features, from an image of the
Weak & Strong Passwords subject's face.

Strong passwords: A random mix of alphabets (uppercase Fingerprint Scanning: Scans the pattern
and lowercase), numbers, and keyboard symbols (@, %, ^
on fingers and verifies it against a stored database of
etc.)
authenticated fingerprints using pattern-matching software
Weak passwords: Easy to guess, e.g. users name or date
to allow access to a user.
of birth or 1234556, etc.
Frequent password changes can help reduce the chances
of password interception too 4.13. Data Protection Act
Passwords must not be shared; their strength is then of
little use. Failure to abide to rules can lead to fines or imprisonment

4.12. Authentication Techniques Rules (SAREF DES SAS)

Magnetic Stripes: Card swiped through a 1. Data must be Fairly and lawfully processed
2. Data can only be processed for the Stated purpose
3. Data must be Adequate, Relevant and not Excessive

WWW.ZNOTES.ORG
CAIE IGCSE ICT

4. Data must be Accurate Comparing Faxing & Email


5. Data must not be kept longer than necessary (Short
time) Fax Email
6. Data must be processed in accordance with the data More secure (user id and
Subject’s right Singed faxes are legally
password needed to access
7. Data must be kept Secure acceptable
files)
8. Data must not be transferred to another country
Digital files (no need to print –
unless (Domestic) they have adequate protection Poor quality prints at times
eco-friendly)
Delay is telephone line busy Better quality
Guidelines Files can be transferred
Slow if several documents
between any device
Do not leave personal information lying around need to be sent
connected to the internet
Lock all filing cabinets when leaving an office
Faster sending of documents
Do not leave computer without locking or logging off Every recipient must be
per document and even if
Protect passwords dialled up one by one
multiple recipients
Change passwords regularly
Do not fax or email anything of sensitive nature. Expensive to buy No dedicated device needed

4.14. Network Communication 4.15. Web-Conferencing

Facsimile (Fax) Video-Conferencing

A system that scans documents electronically and This is a method of communication between people at 2
converts them into a bit map image (a bit is a binary digit or more separate locations
and is a 1 or a 0) It is done in real time and makes use of LAN, if internal, or
Then transmitted as a series of electrical signals through WAN if through the internet
the telephone network Uses hardware like; webcam, microphones, speakers and
Receiving fax machine converts the electronic image and monitors
prints it out on paper It also uses special software like CODEC converts and
It is also possible to generate fax signals from a computer compresses analogue data into digital data to send down
to allow documents to be sent to a fax machine digital lines
Saves printing out the document first and then passing it How it works:
through the fax machine Delegates at one end speak into a microphone and
Fax/modem software in the computer converts the image consider the webcam
into a form fax machines can be recognized The other delegates can see them and hear them
Physical Faxing: dedicated fax machine connected via using speakers and monitors
telephone line that copies and electronically sends files to However, there are several problems with these as
the dialled recipient the conference call often lags and quality not always
Electronic Faxing/Online Faxing: uses the internet to send high.
documents through computers. Also, as travelling tickets increase in price, terrorists
can use this way of communicating with each other,
Physical Faxing Electronic Faxing increasing risk
Associated with a phone no. Associated with an email
Only address and phone no.
Audio-Conferencing
Need actual fax machine, Cheaper- no fax machine,
paper, etc. paper and ink Same as video-conferencing but without webcam
No encryption Better safety- encryption VOIP is often used
The signal can get busy No busy signal issues VOIP (Voice over internet protocol) is a method used to
talk to people over internet
VOIP converts sound (picked up by a microphone) into
Email discrete digital packets that can be sent to a destination
via internet
A method for sending text and attachments from one Advantage: free and can be used all over the world
computer to another over a network Disadvantage: sound quality is usually bad
Security Issues:
Identity and service theft

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Viruses and malware Reduced chances for loss of documents as all of them
Spamming (sending junk mail) are stored on one computer
Phishing attacks (illegitimate scams) This leads to need for fewer staff and increase in
efficiency
Spreadsheets:
5. ## 5.1. can be used to calculate wage/salary slips
Calculations are easily done on this software
Spreadsheets are used to produce graphs for the
The Effects of Using ICT analysis of situations
Usage of this software has led to reduction in staff
Effects of IT on Employment Staff no longer needed to calculate wages and
salaries manually
IT led to unemployment in many areas Databases
Manufacturing - robots have taken over many tasks Updating personnel data (eg salary, home address,
and are much faster. Example in welding car bodies, phone number etc) can be done on databases
spray painting items and manufacturing circuit regularly
boards. Staff records can be centralised in one database and
Computer controlled warehouses – automatic, does data can be transferred between sites
not need people very quick and easy to use
Labour intensive work - printing industry and filing This leads to reduced need for Human Resources staff
New jobs have been created in ICT however, Databases lead to the need for remaining
Writing software staff to be retrained to use the new technology
Maintenance of robots
Internet related jobs 5.2. Effects of IT on Working Patterns
Effects on People: Part-time working: A contract where someone works
fewer hours per week than a full-time employee, in shifts.
People need to be retrained due to new technology
Flexible working (flexi-time): Workers can choose their
Cleaner working environment
working time but will have to complete the day’s work.
De-skilling of workforce
Job sharing: Two or more part-time workers divide their
Computers can now do tasks that required high skill level
Safer working environment job, replacing one full-time worker.
Compressed hours: Employees can work longer hours per
Fewer manual tasks such as heavy lifting
day but over fewer days, completing the workload sooner.
Effect on Companies:
5.3. Microprocessor-Controlled Devices
Can employ less people
Robots do not take holiday, get sick or need breaks in the Home
Greater consistency in products made
Positive effects Negative effects
Negative impact of ICT on employment Lead to more leisure time
since devices can be Unhealthy diets
introduction of ICT to the workplace has led to
programmed to do tasks
redundancies of many employees which can cause them
People become lazy and rely
to lose a source of income More time to socialize
skills such as filing and carrying out numerical analysis is
on devices
effectively replaced by sophisticated software Becoming very sophisticated
Dependency on technology
and can make use of
increases
Types of software that have impacted offices the most: embedded web technology
More wasteful society since
Word processors: Save energy - switch off
devices thrown away if they
Possible to modify and update word documents automatically
There’s no longer a requirement to store physical files fail, not economic to repair
on shelves and offices which would take up space and Easier to program device
Leaving on standby wastes
make the office look messy and full rather than set timings &
resources
No longer a need for large office space to store dates manually
documents
Documents are only printed out when required 5.4. Potential Health Problems

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Repetitive Strain Injury (RSI) Paper-based communication used to inform people about
their interests
This is when joints such as the shoulder, wrist or fingers Schools use these to inform parents about events/dates
swell, causing pain Advantages
Damage gets worse if left untreated Released regularly
Can lead to hand/arm immobility The recipients have a permanent copy
Disadvantages
Causes Prevention Requires distribution
Typing for extended periods There are no special effects; sound/video/animation
Take periodic breaks
of time There are printing costs; paper/ink
Use ergonomic keyboard &
Typing with incorrect posture Websites
mouse
Clicking on mouse
Use a wrist rest Collection of webpages, text, graphics, video and sound
rapidly/extendedly Hosted on a web server on the internet
Ensure sufficient space for Need to write code or use a web authoring application
Holding mouse incorrectly
comfortable work Hyperlinks to other pages can be added
Working in a cramped space Interactive websites require programming knowledge
Can use a camera, scanner, microphone to input data
Back Problems Usually hire space from web hosting company
Advantages
Headaches are a potential consequence Ability to add sound/video/animation
Links to other websites/hyperlinks
Causes Prevention The use of hot spots
Not sitting upright while Buttons to navigate/move around the website
Take periodic breaks
working Hit counters to see who has visited the websites
Use adjustable chairs with Disadvantages
Sitting with poor posture Can be hacked and modified or viruses introduced
good back support
Need for a computer and internet connection
Working in a cramped space Sit upright with good posture
Lack of portability compared with paper-based system
Incorrect computer screen Need to maintain website once it is set up
Keep feet flat on floor
positioning
Multimedia Presentations
Eye Problems
Uses a mixture of media to present information:
Headaches are a potential consequence animations, video, sound, transitions, hyperlinks
Produced using software packages
Causes Prevention Used with a projector so large audience can view
Staring at a computer for Advantages
Take periodic breaks
extended periods of time Use of sound and animation/video effects
Working with poor room lighting Use TFT rather than CRT Interactive/hyperlinks built into presentations
More likely to hold audience’s attention
Computer screen glare/flicker Use anti-glare screens
Disadvantages
Dirt can cause eye strain Ensure good room lighting
Need for special equipment – expensive
No direct light on screen May require internet access
Clean dirt
Music Scores

6. ## 6.1. Music samplers and mixers allow original tracks that were
recorded in a studio to be modified
Electronic instruments can play back through electronic
ICT Applications effects machines
Synthesizers combine simple wave forms to produce
complex music creations
Communication Applications Electronic organs can mimic any other instrument
Music scores can be generated from music itself using
Newsletters software
Software can automatically correct music notes in a score

WWW.ZNOTES.ORG
CAIE IGCSE ICT

There is no need to understand music notation to write a VOIP converts sound (picked up by a microphone) into
music score discrete digital packets that can be sent to a destination
Music notes are automatically printed out in the correct via the internet
format
Publicity & Corporate Image
Cartoons
Publications
Animations can be produced using computer hardware
and software Business Cards:
With 3D animations objects are designed on a computer Miniature printed documents that provide information
and a 3D skeleton is produced about the business/organisation
Parts of the skeleton are moved by the animator using key Usually printed on thick cards
frames Easily distributable to potential clients
The difference in appearance of the skeleton in these key Information includes company logo, services, address,
frames is automatically calculated by the software and is contact numbers, email, website
known as tweening or morphing Gives a professional impression
The final stage is to make a realistic image by a technique Letterheads:
known as rendering Found at the top of official printed documents to be
mailed to clients or for internal use
Flyers & Posters Makes it clear to reader who the sender is
Information includes company logo, name, address,
A Word processor/Desktop publisher is used to create it contact numbers
Need to hold minimum amount of information and be Gives a professional impression
accessible very quickly Easy to reply to
Need to make an immediate impact when people look at Flyers:
them Generally printed on single sheets of A4 paper
Anyone can produce them but there are highly skilled Handed out directly to people for promotions
professionals who can produce expert posters Cheap to produce and easily distributable (locally)
Some posters require larger printers than A4 Information includes company logo, promoted product
Sequence in which a flier or poster is produced on a or service, contact details
computer system Makes it easier to target a specific audience
A word processor or DTP application is opened Brochures:
The user creates frames, boxes and text boxes Also called leaflets & are like flyers
If necessary, photos are taken, using a camera Difference is that they are often folded into sections
The images are uploaded from the camera, loaded Left on counters for pick up rather than handed out
from a CD/DVD, scanned from hard-copy photos or Information includes company logo, promoted product
downloaded from the internet or service, contact details
The photos are saved to a file Makes it easier to target a specific audience
The photos are imported or copied and pasted into the
document 6.2. Data Handling Applications
The photos are edited and typed in or imported from a
file and then put into required style Surveys
Mobile Phones All data handling starts with data collection
Data capture forms can be used for many applications
Wireless devices that allow users to make phone calls Decide what needs to be collected and then what
from anywhere with cell reception questions should be used to collect it
They connect to the telephone system using radio signals
Paper or electronically
This requires them to be in range of a mobile tower Rules for creating forms
Used for communication via Make them look official
Phone calls Spaces should be thought about giving enough space
Text messaging for answers
Social Media Restrict the amount of possible answers, do not use
open questions
Internet Telephony/VOIP If open questions are used limit the amount of space
available for answers
VOIP (Voice over internet protocol) is a method used to
Asking for ‘Name’ needs to be carefully thought about
talk to people over internet
Are you asking for sensitive information?

WWW.ZNOTES.ORG
CAIE IGCSE ICT

People may not feel comfortable being truthful Sensors are used to send data to a computer where the
What names do you want? data is processed
First name, family name etc. The computer simply reviews the data from the sensors
Date of Birth (by comparing it to data stored in memory) and updates
What format do you want it in? its files and/or gives a warning signal if the values are
Give instructions about how to answer questions outside given parameters
How will the data be collected? No changes to the process are made
Paper surveys are scanned using OMR or OCR Examples:
Advantages Scientific experiments
Faster to get results Weather stations
Fewer errors
It is easier to do statistical analysis
Less expensive to carry out; requires fewer people
Online questionnaires Analogue & Digital Data
Usually use radio buttons
Digital data: discrete, fixed value (used by computers)
No data preparation needed
Analogue data/signals: continuous value that varies
Results sent directly to database for analysis
smoothly
Analogue device = measure length, weight,
temperature etc.
Address Lists E.g. Thermometer – represents temp. by the height of
the liquid column
An address book on a computer or mobile phone might have Sensors: measure physical and analogue qualities
a contact’s home address, phone number, email address, Analogue data from sensors needs to be converted into
personal information like the date of birth etc. digital data using an analogue to digital data converter
(ADC) so that the computer can understand and process
the data from the sensors
If the computer sends signals to motors, valves, etc. then
this data also needs to be converted to analogue using a
digital to analogue converter (DAC) so that the computer
can effectively control these devices

Clubs & Society Records

Need to keep a record on members usually in a database Analogue to Digital Converter (ADC)
Usually payment details, contact details and interests
It makes it easy to match people with interests and send Used when you want to attach an analogue input device to
information about what they are interested in a digital device such as a computer.
This can be done my using mail merging This is so the analogue data can be
Easy to check memberships and send out reminders understood/processed by the computer since computers
It is important to follow the data protection act only work w/digital data
E.g. When processing data sent from a sensor

School Reports
Digital to Analogue Converter (DAC)
Database applications such as SIMS store large amounts
of data which can be used to create annual and termly Used when you want to attach an analogue output device
school reports to a digital device such as a computer
Things able to be gathered from here are: E.g. If the computer is being used to control a device
Data individual to student – tests/exam results (motor/valve) the device will be controlled by variable
Student progress – target grades being met or not voltages; the DAC will be used to send out analogue
Number of absences – create a percentage of amount signals
of days attended school
Teacher comments – adds comments on to report

Pollution Monitoring
6.3. Measurement Applications
Example: monitoring oxygen levels in a river

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Sensors read data from the river (oxygen levels and Will not function in a power cut if no backup power
acidity levels using a pH sensor) present (expensive to have reliable backup power)
The data from the sensors is converted into digital using
an ADC 6.4. Microprocessors in Control
The computer stores the received data
The oxygen levels and acidity levels are compared to the Applications
historical data stored in memory and they are also
compared to alarm levels stored in memory Sensors are used to send data to a computer where the
One of two things will now happen: either the data is data is processed
transferred to a CD/DVD or to a memory stick and taken The computer reviews the data from the sensors (by
away for analysis later or the computer is connected into comparing it to data stored in memory)
a mobile phone network and transmits the data back If the values are outside the given parameters/pre-set
automatically to the monitoring station value it acts to try and get the values within acceptable
ranges
It does this by sending signals to devices controlling the
process
Intensive Care Units in Hospitals

Sensors read key vital signs (such as pulse/heart rate,


temperature, blood pressure, respiration, etc.) Turtle Graphics
The data from the sensors is converted into digital using
an ADC Based on computer language called LOGO and is now
The data is stored in the computer memory usually known as turtle graphics
The computer compares the data from the sensor with It is the control of the movement of a ‘turtle’ on a
the values stored in its memory computer screen by several key instructions which can be
The results are output on a screen in the form of graphs typed in
and/or digital read-outs The use of ‘repeat’ instructions makes a piece of code
An alarm is activated if any of the data is outside more efficient
acceptable parameters
Command Meaning
The system continues to monitor the patient until the
computer is turned off FORWARD x Move x cm forward
BACKWARD x Move x cm backward
LEFT d Turn left through d degrees
Advantages of Using Computers in RIGHT d Turn right through d degrees
REPEAT n Repeat next set of instructions n times
Measurement
ENDREPEAT Finish the repeat loop
The computer will not forget to take readings PENUP Lift the pen up
The computer’s response time is much faster, which is PENDOWN Lower the pen
particularly important in the patient monitoring example
Doctors, nurses, scientists, etc. can all get on with other
tasks while the monitoring is done automatically
Computer give 24 hours cover every day (i.e. 24/7) Automatic Washing Machines
The readings will tend to be more accurate
Readings can be taken more frequently if they are done Have a microprocessor in them which contains the
by a computer and sensors software which controls the washing machine
It could also be safer if whatever is being monitored may Appling the factors
have potential hazards (e.g. children falling into the river Inputs
whilst attempting to take readings) Pressure sensor on the door to detect if open or
closed
Sensor to detect if the required level of water is in
Temperature sensor to check temperature
Disadvantages of Using Computers in Outcome
Clothes have been washed
Measurement
Outputs
Expensive to purchase and set up Heater
If performed for educational purposes, reduced practical Motor to spin drum
hands-on experience and learning.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Lights on machine to show user stage the cycle is


at
Actuators to turn the inlet valves on to allow hot Burglar Alarms
and cold water into the machine
Actuator to turn the outlet valve on to let the water Burglar alarms detect any intrusion.
out of the machine when the wash is complete Sensors such as motion sensors, door and window
An actuator to control the pump sensors, magnetic sensors, multi-functional sensors
Processing (vibration, shutter, and temperature) measure the
Software to make decisions which will allow the physical quantity and inputs the value to a
clothes to be washed microprocessor.
Time taken before next inputs The microprocessor compares the input values with
Timer as part of the software the preset values, if changes are detected, the
Time different cycles (when to add microprocessor sends signals to the actuator
soap/conditioner/etc.) The actuator activates the sirens or gives a phone call
Time delay in measuring temperature or messages the input mobile number.
Needs to be time for changes to have effect
Unmanageable situations
Door may not be shut
Glasshouse
Needs to draw user’s attention
Usually a buzzer and light
Temperature controlled the same as central heating
system
Humidity must also be controlled
Central Heating System Humidity sensor tells computer how humid it is
Computer then decides to turn the water supply to
Applying factors sprayers
Inputs Windows also operated by the computer
Inputs from the user Need to find the balance of how often to have windows
Room temperature required open
Time systems turns on/off Blinds that can be computer controlled
Inputs from the system Light sensor measures light intensity
Actual room temperature When sun is strong the computer actuates electric
Clock giving the time motors which close blinds
Outcome Control in glasshouse is more likely to be used in
Heating or cooling room during the required times commercial areas or large glasshouses not in gardens
Outputs
Boiler 6.5. Modelling Applications
Air conditioner
Processing A mathematical computer model is created to manipulate
Check time against the one input and switches on variables and see real time changes in terms of figures.
when that time is reached Used to find how mechanisms control a system.
Same done to check when to turn off Advantages:
When on, microprocessor reads temperature from Cheaper than building physical system to test
sensor and compares it with desired temperature Safer than building system and experimenting
If too low, it will heat up by turning the boiler on Easier to experiment with various scenarios
and if it’s too high it will turn the air conditioner Quicker as no need to build system
on Near-impossible tests involving space and volcanic
These will stay on until desired temperature is scenarios can be modelled risk-free
reached What if analysis can be conducted that allow a certain
figure to be computed by letting the computer change
other variables that affect the value needed to be set.
E.g.
Automatic Cookers

Have temperature sensors and timers with manual


controls to set start and end times, and temperature for
cooking.
Working similar to Central Heating System.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Productivity is higher, since they do not need holidays, are


not ill etc.
There is greater consistency – every car coming off a
production line is identical
They can do boring, repetitive tasks, leaving humans free
to do more skilled work

Disadvantages

Robots find it difficult to do ‘unusual’ tasks (e.g. one-off


glassware for a chemical company)
They replace skilled labour, leading to unemployment
Since robots do many of the tasks once done by humans,
there is a risk of de-skilling
When making a computer model, consider:
Because robots are independent of the skills base,
What and how data should be collected
factories can be moved anywhere in the world, again
Working of the system in real life.
causing unemployment

6.6. Applications in Manufacturing 6.7. School Management Systems


Industries
Learner registration and attendance
Robotics ID cards with magnetic tapes: The students will have
to swipe their ID cards, which contain the student’s
Robots are used in many areas of manufacturing, from name, school’s name, date of birth and the
heavy work right through to delicate operations e.g. car registration ID, when they enter and leave the school,
bodies, welding bodywork, manufacturing of microchips this way time is saved and the attendance is more
etc. accurate.
Control of robots is either through embedded Biometrics: Every student’s fingerprint is stored on a
microprocessors or linked to a computer system database along with their personal information, the
Programming of the robot to do a task is generally done in students must put their finger on a fingerprint scanner
two ways: to enter or leave the school premises.
The robot is programmed with a sequence of
instructions which allow it to carry out a series of tasks Advantages Disadvantages
Alternatively, a human operator manually carries out Fingerprints are unique, so
a series of tasks and how each task is done is relayed another student can’t give Collecting every student’s
back to the robot (embedded processor) or controlling their attendance for fingerprint initially is time-
computer. The sequence of instructions is somebody else, like with an ID consuming.
remembered so that the robot can automatically carry card.
out each task identically each time (e.g. assembling Fingerprint scanners are
parts in a television) ID cards can be lost, whereas
more expensive than
Robots are often equipped with sensors so they can fingerprints can’t be.
magnetic stripe readers.
gather important information about their surroundings
Magnetic fields can affect an Damages on the finger will
Sensors also prevent them from doing ‘stupid things’, such
ID card. deny access.
as stopping a robot spraying a car if no car is present, or
stopping the spraying operation if the supply of paint has There is an invasion of privacy
Copies of ID cards can be
run out etc. in storing fingerprints on a
made easily.
Robots are very good at repetitive tasks
school database.
However, if there are many different tasks (e.g. making
specialist glassware for some scientific work) then it is Learner performance
often better to still use human operators Spreadsheets can be used to record students’
performances. It is easier to compare each other’s
Advantages performances and an individual student’s
performance over the academic year.
Robots can work in environments harmful to human Organising examinations
operators Makes sure that the students are enrolled for the right
The can work non-stop (24/7) exams.
They are less expensive in the long term (they don’t need Prints the exam timetables.
wages) however they are expensive to buy initially Allots examination rooms and the invigilator.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Gathers the results and puts them into the student


Disadvantages
database. Advantages
Creating timetables and managing teaching
No double booking as very Set-up and Maintenance
cover/substitution
minimal delay. expensive
Considers the student’s choices, availability of
Immediate booking and Computer and reliable
teachers and rooms, subject clashes and the number
selection of seats internet access required
of hours needed for each subject to produce accurate
timetables that can easily be made changes to and Sever crashes can result in
Bookings can be made any
cover with teacher to be substituted. the bookings completely
time
School management systems: stopping
Digital ticket; printing and Need for website to be well
Advantages Disadvantages postage costs designed to ensure ease of
Absenteeism can be Operating the software will reduced/eliminated use
addressed more easily. need some training. QR codes for authentication; No special relation built with
The initial cost of the software no need for human, can use booking agent who can give
Parents are kept updated.
is expensive. scanner; reduced costs special promotions etc.
Unauthorised access will have
Reduced workload for
to be prevented as there is in booking seats if the response is not immediate then can
teachers. cause problems like double booking)
lots of personal information.
They are helpful for the
decision making of the
administration department
Real-time Process Control

An example of online processing


6.8. Booking Systems Very different to real-time (transaction) processing
System usually involves sensors and feedback loops
Booking systems are used for transport (flights, trains and In real-time process control, physical quantities are
buses), cinemas and theatres continually monitored and input is processed sufficiently
quickly to influence the input source
Theatre booking system example:

Customer clicks on performance they wish to see 6.9. Banking Applications


They enter date and time of performance and required
number of seats Online banking systems rely on the ability to update files
A seating display at theatre is then shown on screen and immediately, thus preventing double booking, which could
user clicks where they want to sit happen if the system response time was slow
Database searched to check availability of selected seats. The use of computer technology has revolutionized how
If seating plan shown on screen, this isn’t required we do our banking transactions, for example:
If seats available, seat numbers are shown together with Internet banking
total price The use of automated teller machines (ATMs)
If customer is happy with this, they select ‘confirm’ Chip and PIN technology
The seats are now temporarily set at ‘no longer available’
The customer then enters their personal details or
indicates that they are a returning customer
Automated teller machines (ATMs)
They select a payment method and make the payment
The theatre seats are then booked in the customer’s Automated teller machines (ATMs) are places where
name
customers can get cash (or carry out certain other
The final details are shown on the screen, together with a
banking activities such as order a statement) using their
reference number
credit or debit card
An email is sent to the customer which they print out as
their proof of purchase. In some cases, this also acts as What goes on behind the
their printed ticket when they go to the theatre – an e Sequence at ATM
scenes
ticket
Customer puts card into Contact is made with bank’s
The database is updated with the transaction
ATM computer

Disadvantages
Advantages

WWW.ZNOTES.ORG
CAIE IGCSE ICT

What goes on behind the The system suggests the possible illness with a
Sequence at ATM
scenes probability of each, cures and recommendations on
PIN is checked to see if it is the next step to be taken.
The explanation system will explain how that
PIN is entered using the correct
keypad Card is checked to see if it is particular diagnosis was suggested.
valid Using 3D printers in medicine:
Surgical and diagnostic aids: A CT or MRI is used to
A number of options are
produce images of the internal parts of the body. A 3D
given: change PIN, top up
printer can then be used to reproduce the internal
mobile, see balance, get
organs as a solid object.
money
Prosthetics: 3D printers are used to print out artificial
The customer selects the body parts such as false tooth, artificial limbs, hearing
cash option & several cash aids, etc. This is a less expensive method of replacing
options are shown body parts.
The customer’s account is Tissue engineering: Used to produce layers of cells to
The customer accepts one of accessed to see if they have replace damaged tissues.
the options or types in a sufficient funds, it is checked to Design of medical tools and equipment: Tools can be
different amount see if they are withdrawing made faster and with reduced costs. They can also be
more than their daily limit made changes to easily, whereas it wasn’t the same
The customer is asked if they with traditional methods.
want a receipt
The card is returned Transaction is okay 6.11. Computers in Libraries
Money is dispensed Customer’s account is updated
Many library systems are computer controlled
They usually involve the use of barcodes on the books
6.10. Computers in Medicine being borrowed and on the borrower’s library card
The following describes a computerized library system
Patient records: Database that holds patient details and based on barcodes
can be accessed from any computer within the hospital There are two files:
intranet. Book file, containing fields for example: barcode, book
Patient identification: Barcodes on wristbands of the title, name of author etc.
patients can be used to access their patient record. Borrower’s file, containing fields for example:
Pharmacy records: borrower’s number, borrower’s name etc.
Generates labels for drugs When a borrower takes out a book, the book’s code is
Checks if the patient is allergic to a particular drug. scanned
Patient monitoring: The book details are then found on book file
Sensors measure changes in temperature, heart rate, The borrower’s library card barcode is then scanned for
breathing rate, brain activity, blood pressure, blood the borrower’s unique number
sugar levels and oxygen levels in the patient’s body. The book file is linked to the borrower’s file and both files
The analogue signals from the sensors are converted are updated to indicate which book has been borrowed
into digital signals using an analogue to digital and when it is due back
converter. The borrower’s file is interrogated daily by the computer
Graphs are produced to show trends over time. to see which books are overdue for return:
The readings are constantly compared with the pre- The computer reads a record from the book file
set values, if the values aren’t in the prescribed range, It compares the date due back with the current date
the medical staffs are notified. If the date due back is less than (or equal to) the
Hospital management system: All the above-mentioned current date (i.e. earlier date) …
points come under the hospital management system …using the barcode number of the book…
which holds all of them, and can be used to access data …the book file is linked to the borrower’s file…
from all the departments. …and the corresponding record is read from the
Expert systems: borrower’s file
The interactive screen asks a series of question for The customer details are then found and a letter or
the doctor to answers, using a keyboard or a touch email is automatically sent out
screen. The next record in the book file is then read…
The inference engine compares the symptoms with …until the whole file has been checked
the knowledge base, using the rule base to find
matches
6.12. Expert Systems

WWW.ZNOTES.ORG
CAIE IGCSE ICT

These systems have been developed to mimic the Components of an Expert System
expertise and knowledge of an expert in a particular field
Examples include: User Interface
Diagnosing a person’s illness
Diagnostics (finding faults in a car engine, finding This is the only thing that the end user sees
faults on a circuit board, etc.) Allows the user to interact with the system
Prospecting for oil and minerals Often requires training to operate effectively
Tax and financial calculations
Knowledge base
Chess games
Identification of plants, animals and chemical This is a database designed to allow the complex storage
compounds and retrieval requirements of a computerized knowledge-
Road scheduling for delivery vehicles based management system (in support of an expert
system)

Inference engine

This is software that attempts to derive answers from the


knowledge base using a form of reasoning
It is how expert systems appear to use human-like
Expert System Setup reasoning when accessing information from the
knowledge base in an effort to find a conclusion to a given
Experts in the field are interviewed to find out what is
problem
needed in the expert system The inference engine is a type of reasoning engine
Data is then collected from these experts
A knowledge base is designed and then created Rules base
The rules base is designed and created
The inference engine is designed and created This is made up of a series of ‘inference rules’ (e.g. IF the
The input screen and output format are also designed and country is in South America AND the language used is
created – this is known as the user interface Portuguese THEN the country must be Brazil)
The expert system is tested against known conditions and These inference rules are used by the inference engine to
scenarios draw conclusions
It is also checked to see if it meets the original They closely follow human-like reasoning
specification
Experts are interviewed about how effective it is before
the expert system goes out on general release
Suggesting Diagnoses
Advantages
The interactive screen asks a series of question for the
Expert systems provide consistent answers doctor to answers, using a keyboard or a touch screen.
They never ‘forget’ to answer a question when The inference engine compares the symptoms with the
determining the logic knowledge base, using the rule base to find matches.
Using expert systems reduces the time taken to solve a The system suggests the possible illness with a probability
problem of each, cures and recommendations on the next step to
A less skilled worker force is needed, which gives the be taken.
potential of saving money, but also allows areas of the The explanation system will explain how that particular
world access to expertise which they could not normally diagnoses was suggested.
afford
6.13. Computers in the Retail Industry
Disadvantages

They tend to lack common sense in some of the decision- Automatic Stock Control
making processes
Errors in the knowledge base can lead to incorrect Automatic stock control systems rely on the use of
decisions being made barcodes
It can be expensive to set up in the first place Barcodes now appear on most products sold in shops
Considerable training is necessary to ensure the system They allow quick identification of product details once the
is used correctly by the operators barcode has been scanned by a barcode reader
Supermarkets use electronic point of sale (EPOS)
terminals, which incorporate a barcode reader that scans
the barcode, retrieve the price of the article and relay

WWW.ZNOTES.ORG
CAIE IGCSE ICT

information back to the computer system allowing it to People are worried about giving their card details
update its files online.
Barcodes are made up of alternating dark and light lines Packing and postal charges are added
of varying thickness Personal services that you get from stores are
A number underneath the barcode usually consists of four missed.
parts: country code, manufacturer’s code, product code, Returning the products is harder
and a check digit No relaxation that you get from actual shopping
The check digit is a form of validation which is used to Bogus sites are present where you pay and never
make sure no errors occurred during the reading of the receive the product
barcode To seller:
Every time the barcode is read, this calculation is Advantages
performed to ensure that it has been scanned correctly No need to pay rents
No fixed working hours
Less/no shoplifting
Sell goods to customers anywhere in the world
Electronic Funds Transfer at Point of Sale (EFTPOS) Cheaper to contact customers (via e-mail)
Site warehouse where rental is cheap
Many credit cards are equipped with a chip as well as a
Sell goods 24/7
magnetic stripe – containing the PIN
Disadvantages
This system is designed to enhance security since it is
ICT knowledge needed to set up website
better than relying only on a signature
Unemployment
When paying for items using a chip and PIN card, a form
Business abroad is lost if the prices are cheaper
of electronic funds transfer (EFT) takes place
there
Paying for a meal example At times of network failures, there will be no
access
Waiter inserts card into chip and PIN reader Not everybody can access the internet, so a few
Restaurant’s bank contact customer’s bank customers are lost
Card is checked to if valid Customer’s personal data can be hacked
If card is stolen or expired, then transaction is terminated Postal charges discourage people at times
Customer enters PIN using keypad
PIN is read from chip on card and is compared to one just 6.14. Recognition Systems
keyed in
If they are the same, the transaction can proceed Automatic Number Plate Recognition (ANPR) systems:
Check is then made on whether they have enough funds A sensor sends signals to a microprocessor, which
If there are not enough funds available, transaction is instructs a camera to capture the front of a vehicle.
terminated. Otherwise, transaction is authorized OCR software is used to read the number plate from
Authorization code is sent to restaurant the image. The characters are then converted to text
Price of meal is deducted from customer’s account format in order to store it in a database
Same amount of money is credited to restaurant’s bank Processing of cheques:
account The value of a cheque is printed in special ink
Receipt is produced as proof of purchase containing iron particles when a cheque is presented.
MICR is used to read the characters at the bottom of
the cheque.
Internet Shopping A batch processing method is then used to process all
the cheques at the end of a specific time period.
Online shopping: Shopping over the internet. OMR media in schools:
To customer: School registers: Paper-based registers are fed into
Advantages OMR to be scanned and are then stored on a
Cheaper goods (the company doesn’t have to pay database.
rent for stores and doesn’t need more employees) Multiple-choice examination papers: The position of a
Wide range of products mark is stored in a computer’s memory after being
Delivery at your doorstep read by the OMR device using a template that maps
You can shop 24/7 out the X-Y coordinates of each lozenge (pen/pencil
Shop from any part of the world mark).
You save the travelling costs of going for shopping RFID in passports:
Disadvantages The data on the RFID chip is read when the passport is
Quality isn’t assured scanned.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

A photo of you is clicked which is then compared with Car park management: the system reads the
the image stored in the RFID chip. registration number and if allowed into the car park,
If the face-recognition passes, some checks are made the barrier is raised.
in turn to make sure you are eligible to enter the Electronic toll collection: the system recognizes the
country, and if you are, the gate opens automatically. vehicle and deducts the fare accordingly.
RFID in contactless payments:
The embedded chip on credit/debit cards and the
antenna enable customers to wave their card over a
reader at the point of sale terminals to make Cookies
payments
Cookies are small files sent to a user’s computer via their
Smartphone apps can also be used to make
web browser when they visit certain websites
contactless payments.
They store information about the users and this data is
accessed each time they visit the website
6.15. Monitoring & Tracking Systems For example:
They remember who the user is and send messages
Public monitoring/tracking: such as “Welcome Sarah” each time they log onto the
Ankle monitor: uses RFID chip to give out the person’s website
location and other details. It is tamper proof and will They recognize the user’s buying preferences e.g. if a
alert authorities if tried to remove. user buys CDs, pop ups related to their buying habits
Phone call tracking: the service provider tracks the will appear on the user’s screen each time they visit
calls and the exact position from which they were the website
made Without cookies, web server would have no way of
Worker monitoring/tracking: Workers are knowing that the user had visited website before
monitored/tracked in the following ways: For this reason, cookies could be used to monitor one’s
Supermarket workers: have the number of items internet activity
passing through the tills over a period of time
monitored.
Internet use is monitored by network managers: they
6.16. Satellite Systems
can check sites visited and time spent on that site
during working hours. Global Positioning Systems (GPS)
Emails can be read: Employers can check that no
Used to determine the exact location of several modes of
personal mails are sent during office hours.
transport
Delivery drivers: Their location can be tracked using
Cars usually refer to GPS as satellite navigation systems
GPS systems. It can also be checked if they are
Satellites surrounding the Earth transmit signals to the
following the shortest route and aren’t speeding.
surface
Key logging: Software that records the keys pressed by a
Computers installed in the mode of transport receive and
user on the keyboard. They are used to find username
interpret these signals
and passwords of a user.
Knowing their position on the Earth depends on very
Employee call monitors: Allows the employer to listen to
accurate timing – atomic clocks are used in the satellites
employee’s telephone calls. There are three ways it can
which are accurate to within a fraction of a second per
be used:
day
Monitor: The manager/supervisor can listen to calls
Each satellite transmits data indicating its position & time
without the employee or the customer’s awareness.
The computer on board the mode of transport calculates
Whisper: The manager can help the employee with the
its exact position based on the information from at least
call, but the customer can’t hear the manager speak.
three satellites
Barge: Both the employee and the customer can hear
the manager
Employee call monitors: Allows the employer to listen to
employee’s telephone calls. Call monitors can be used: Satellite Navigation
to improve the employee’s performance
to allow the manager/supervisor to join a call where Used to determine the exact location of a car.
necessary The computers onboard can be used to show
as a training tool directions to a destination.
Uses of Automatic Number Plate Recognition (ANPR)
systems:
Traffic enforcement: the system can check if a vehicle
is taxed, recognize cars parked illegally, cars speeding Geographic Information Systems (GIS)
or going through red lights so a fine can be imposed.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Used to capture, manage, analyse and display 3. identify the problems with the current system
geographically referenced information. 4. Finalize objectives with the clients to make sure the
Use to determine distance between two places. new system will meet their requirements
Used to find the nearest petrol station or restaurant, 5. Finalize customer requirements
etc. 6. interpret customer requirements and what needs to
To protect animal and plant life in certain vulnerable be done to achieve them
places. 7. Produce a cost-benefit analysis
Can be used in geography, science or engineering 8. Identify suitable hardware and software for the new
lessons. system
9. Produce a data flow diagram

Media Communication Systems

Using satellite signals for communication.


Used by media companies when sending
stories/videos/pictures from remote locations.

4 Common Methods of Fact Finding


7. System Life Cycle
Observation

7.1. Introduction Involves watching personnel using the existing system to


find out exactly how it works
A systems analysis team is often brought in to review an Advantages
existing system and suggest several improvements The analyst obtains reliable data
The existing system is usually a paper-based system that It is possible to see exactly what is being done
needs to be changed to a computer operating one, or a It is a relatively inexpensive method
computer-based system that needs to be updated with Disadvantages
the newest technology. People are generally uncomfortable being watched
and may work in a different way
7.2. Stages in the System Life Cycle If workers perform tasks that violate standard
procedures, they may not do this while being watched
1. Analysis
Interviews
2. Design
3. Development and testing Involves a one-to-one question-and-answer session
4. Implementation between the analyst and the employee/customer
5. Documentation Advantages
6. Evaluation It gives the opportunity to motivate the interviewee
into giving open and honest answers to the analyst’s
7.3. Analysis questions
It allows the analyst to probe for more feedback from
The basic steps in the analysis stage can be summarized the interviewee, as it is easier to extend a question
as follows: It is possible to modify questions as the interview
proceeds and ask questions specific to the interviewee
It is a good method if the analyst wants to probe
deeply into one specific aspect of the existing system
Disadvantages
It can be rather time consuming
It is relatively expensive, due to the use of the analyst’s
time
The interviewee cannot remain anonymous

Questionnaires

Involves sending out questionnaires to the work force


and/or to customers to find out views of the existing
1. Collect data from the current system
2. Describe the current system in terms of the inputs, system and find out how some key tasks are carried out
outputs and processing taking place Advantages

WWW.ZNOTES.ORG
CAIE IGCSE ICT

The questions can be answered quite quickly to give choices which customers can choose from (eg.
It is a relatively inexpensive method Male or Female)
Individuals can remain anonymous if they want Large fonts and visible text colours
It allows quick analysis of the data increases visibility in form so there are fewer chances
Disadvantages of mistakes
Often the number of returned questionnaire is low Drop-down menus
The questions are rather inflexible since they have to On-screen help
be generic reduces chances of error in case customers are
There is no immediate way to clarify a vague or confused
incomplete answer to a question Automatic validation
checks if entered information meets the criteria and is
Looking at Existing Paperwork acceptable
Allows the analyst to see how the paper files are kept, look at Control buttons
operating instructions and training manuals, check the when reviewing the output screen display, it is vital to
accounts, etc. check that instructions are clear, font sizes and text colour
is visible, the full screen is utilized and the size of output
Advantages
fields are correct.
It allows information to be obtained which was not
possible by any of the other methods
Verification
The analyst can see for themselves how the paper
system operates
A way of preventing errors when data is copied from one
It allows the analyst to get some idea of the scale of
medium to another
the problem, memory size requirements, type of
input/output devices needed Double entry: data is entered twice, by two different
Disadvantages people
It can be very time consuming The computer compares the two entries, either after
Because of the analyst’s time, it is a relatively data entry or during the data entry process, and
expensive method identifies any differences
Visual check: person entering the data compares the data
7.4. Design with the original document (not the same as proof-
reading)
Once the analysis has taken place and the systems
analyst has some idea of the scale of the problem and Validation
what needs to be done, the next stage is to design the key
parts of the recommended system. Process where data is checked to see if it satisfies certain
A list of tasks is summarized here criteria when input into a computer, for example, to see if the
Designing data capture forms/input forms data falls within accepted boundaries.
Designing screen layouts Validation
How it works Example
Designing output forms and reports rule
Producing systems flowcharts and/or pseudo code checks if the entered
a person’s age should
Selecting and designing validation rules that need to Range check data is within an
be 0< but >150
be used acceptable range
Selecting the most appropriate data verification crosscheck entered if ‘Senior Manager’ is
methods Lookup check data with data stored an existing option in a
Designing and agreeing the file structures and tables in an existing table query
Selecting and designing the hardware requirements
if a field needs 6
Selecting and designing the software requirements checks that the
characters, then
Producing algorithms or program flowcharts entered data has a
Length check entering 7 characters
Designing a testing strategy/plan required number of
should give rise to an
characters
error message
What to include in data input forms
a person’s name
Character No invalid characters
Heading should not contain any
check can be entered
to make clear the purpose of the form numbers
Text boxes checks that entered
date should be in the
clarity on where to enter information Format check data is in a specific
format dd/mm/yyyy
limits the information entered format
Tick boxes

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Validation If specialist hardware is needed (e.g. for people with


How it works Example
rule disabilities), then it will be necessary to finalize how these
in a data entry form, if devices are used with the system when it is implemented
a person’s name is a This will be followed by thorough testing to ensure the
to check if data is user screens are user-friendly and that the correct output
Presence required field and no
actually entered and is associated with the inputs to the system
check data is entered, this
not missed out
should give an error
message
Testing strategies
an extra digit that is Testing strategies are done in modular form
added at the end of a a digit is missed out or the system is broken up into parts (modules) and each
Check digit number. it is an incorrect digit is part is developed and tested separately
calculated from the entered any problems in the testing mean that only the module
digits in the number will need to be modified and tested again
if ‘Mr’ is typed out into Once the development of each module is completed, the
checks if fields
Consistency a field then the whole system needs to be tested (i.e. all modules
correspond (tie up)
check GENDER field must be functioning together)
with each other
M or Male Even though each individual module may work
satisfactorily, when they are all put together there may be
data clashes, incompatibility and memory issues
7.5. Development & Testing All of this may lead to a need to improve the input and
output methods, file and database structures, validation
Once the design stage is completed, it is then necessary
and verification methods
to create the system and fully test it
Then the system will need to be fully tested again
The testing strategy has to make sure that the new
It is a very time-consuming process but the system must
system meets client requirements, has solved the
be as perfect as possible before it goes live
identified problem from the old system, removes any
Testing will use many different types of data, which will
bugs or potential errors in the system and produces the
fall into one of three categories: normal, extreme or
correct output
abnormal
this is done in the following stages
Test data used
Development stages
Normal: this is data which is acceptable and has an
If the system contains files (e.g. a database) then the file
expected (known) outcome. This data should be
structure needs to be finalized at this stage (e.g. what
accepted by the system
type of data is being stored in each field, length of each
e.g. the month can be any whole number in the
field, which field will be the key field, how the data files will
range 1 to 12
be linked, etc.)
Extreme: data entered is at the limits of acceptability
Once the file structure has been determined, it is then
and should be accepted by the system.
created and fully tested to make sure it is robust when the
extreme data would be the months 1 or 12
system actually goes live
Abnormal: unacceptable data is entered and should
Since it is important that correct data is stored in files,
be rejected or cause an error message
there are certain techniques that need to be adopted to
e.g. all the following values are not allowed as
make sure the data populating the file and database is at
inputs for the month:
least of the right type & that it conforms to certain rules.
Negative numbers (e.g. -1, -15)
Validation routines and verification methods are used to
Any value greater than 12 (e.g. 32, 45)
ensure this happens
Letters or other non-numeric data (e.g. July)
Again, routines have to be fully tested to ensure they trap
Non-integer values (e.g. 3.5, 10.75)
unwanted data but also to make sure any data
Live: data with known outcomes whose results are
transferred from a paper-based system to an electronic
compared with the existing system
system has been done accurately
e.g. ‘13’ is entered and should be rejected for the
Any system being developed will have some form of user
month field but is accepted in the current system.
interface
This proves that validation rules need to be
The types of hardware were chosen in the design stage
improved.
How these are used to interface with the final system now
needs to be identified, for example how the screens will
be used to collect the data and the way the output will be 7.6. Implementation
presented

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Once the system is fully tested, the next stage is to fully It is more expensive than direct changeover, since
implement it each pilot scheme needs to be evaluated before the
We will now consider changeover to the new system in next stage is introduced
more depth
There are four common methods used for changing over Phased Implementation
from the old system to the new system
Initially, only part of the new system is introduced
Each one has advantages and disadvantages which need
Only when it proves to work satisfactorily is the next part
to be weighed up before the most appropriate method is
introduced, and so on, until old system is fully replaced
chosen for a particular application
Advantages
If the latest part fails, it is only necessary to go back in
the system to the point of failure, hence failure is not
disastrous
It is possible to ensure the system works properly
before expanding
Disadvantages
This is more expensive than direct changeover, since
it is necessary to evaluate each phase before moving
to the next stage
4 Common Methods of Changing Systems

Direct
Comparing Changeover Methods
The old system is stopped overnight and the new system
introduced immediately Changeover method Direct Parallel Pilot Phased
Advantages
Relative costs Low High Medium Medium
The benefits are immediate
Input needed by the user Medium High Low Medium
Costs are reduced - since only one system is used
there is no need to pay for two sets of staff Input needed by systems
Low* Low Medium Medium
There is less likelihood of a malfunction since the new team
system will have been fully tested Impact of failure High Low Low Medium
Disadvantage
This method can be disastrous if the new system fails
7.7. Documentation
Parallel Running
Once the new system is fully developed, a considerable
The old and new systems are run side by side for a time amount of documentation needs to be produced
before the new system takes over altogether
Advantages For the end user :
If the new system fails, the old system is still available
User documentation
as a back-up
for the end user/customer to learn how to use the system
It is possible to train staff gradually
includes:
Staff have time to get used to the new system
Disadvantage how to save files
It is more expensive than direct changeover, since how to load/open the software
extra staff are needed to run both systems together how to perform a search
how to add,delete or modify records
Pilot Implementation
purpose of the system
The new system is introduced into one part of the screen layouts
company (e.g. into a warehouse of a supermarket) and its print layouts
performance assessed hardware and software requirements
Advantages error handling
If the new system fails, only one part of the company is troubleshooting guide
affected tutorials
It is possible to train staff in one area only, which is how to log in/log out
much faster and less costly than parallel running glossary of terms
The costs are also less than parallel running, since
only one part of the system is being used in the pilot For programmers
Disadvantage

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Technical documentation
for programmers or system analysts to get an overall view of Some results from the evaluation may require changes to
the system either hardware or software.
includes: Hardware may need to be updated because of:
feedback from end users
program listing/coding new technology in the market
programming language changes within the company
hardware and software requirements Software may need to be updated because of:
system flowcharts feedback from the end users
program flowcharts changes in legislation and rules
memory requirements changes within the company
file structures
sample runs
validation rules 8. ## 8.1.
Information common to user documentation and technical
documentation Safety & Security
purpose of the system
limitations of the system Physical Safety
hardware and software requirements
sample runs Ways of eliminating or minimizing
meaning of error messages Safety hazard
hazard
Use a residual circuit breaker
7.8. Evaluation (RCB), Check insulation on wires
Electrocution from
regularly, Do not allow drinks near
Once a system is up and running it is necessary to do spilling drinks
computers, Check equipment
some evaluation and carry out any maintenance, if regularly
necessary. Cable ducts- make wires safe,
this is done to compare the new system with the old Tripping over trailing
Cover wires/tuck them away, Use
system and make sure there are no limitations or wires
wireless connections
improvements to be made and that the new system works
Strong desk/tables to support
better than the old system.
heavy hardware, Use large desks
The following is a list of some of the things considered Heavy equipment falling
when evaluating how well the new system has worked. and tables so that hardware
This can ultimately lead back to a re-design of part of the doesn’t fall off edge
system if there is strong evidence to suggest that changes Have a CO2 fire extinguisher
need be made. nearby, Don’t cover equipment
Fire risk from
To evaluate the system, the analyst will: vents- can cause equipment to
overloading sockets or
compare the final solution with the original overheat, Make sure hardware is
equipment overheating
requirement fully maintained, Do not overload
identify any limitations in the system sockets with too many items
identify any necessary improvements that need to be
made Health Safety
evaluate the user’s responses to using the new system
compare test results from the new system with results
Ways of eliminating or minimizing
from the old system Health hazard
hazard
compare the performance of the new system with the
performance of the old system Back and neck
-use adjustable chairs for sitting
observe users performing set tasks, comparing old problemsfrom \n sitting
with correct posture \n -use
with new in front of the computer
footrests \n -use screens that can
measure the time taken to complete tasks, comparing screen for \n long
be tilted according to user’s choice
old with new periods of time
interview users to gather responses about how well
the new system works
give out questionnaires to gather responses about the
ease of use of the new system

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Ways of eliminating or minimizing Etc.


Health hazard
hazard
-ensure correct posture is To prevent the above, it is essential that personal data is
Repetitive Strain Injury protected.
maintained \n -take regular breaks
(RSI) is \n damage to Personal data can be leaked intentionally and
\n -use ergonomic keyboards \n -
fingers and wrist unintentionally. Electronic data is at risk due to: hacking,
use voice-activated software if
because of \n repetitive viruses, spyware, phishing, pharming, Smishing, vishing,
user is unable to use the keyboard
clicking of keyboard ransomware (A malicious program that encrypts data on
\n -use a wrist rest
a computer system and demands for a ransom to provide
-use anti-glare screens \n -use
and decrypt the data), spam, moderated and un-
Eyestrainbecause of LCD screens as they are better
moderated forums, cookies, etc.
staring at a \n computer than CRT screens \n -ensure there
If a student shares a photograph of themselves in their
screen for extended \n is no screen flicker \n -have eyes
school uniform on social media, then paedophiles, child
periods of time tested regularly \n -take regular predators, kidnappers, etc. can physically reach the
breaks student. This should not be done
Headachescaused by
-use anti-glare screens \n -use
incorrect \n lighting, Internet Safety
window blinds to remove any
screen reflections and \n
reflections of sun’s rays \n -take
staring at the computer To keep personal data safe, one must:
regular breaks \n -have eyes
for long \n periods of Not give unknown people (on the internet) personal
tested regularly
time information or send pictures of oneself to them.
-proper ventilation in the room Maintain privacy settings to control which cookies are
Ozone irritationcaused where laser printer is present \n - on their computer
by laser \n printers in the laser printers should be in a Use learner friendly search engines and websites
office separate room \n -change to other recommended by your educational institution, e.g.
types of printer if possible znotes.org
The website being accessed is from a trusted source,
or has a padlock symbol/ https protocol (s for secure):
8.2. E-Safety
E-safety refers to the safety of data and personal
information while using the internet.
E-safety is required to make sure a user’s personal
information is not made vulnerable and even leaked to
hacker’s for e.g., which can lead to identity fraud, bank A/C
issues, etc.

Personal Data

Any data regarding a living person who can be identified


against the data or the data along with any other
information. Email Safety
Examples of personal data:
Full Name Open emails from known sources, and do not click on
Home Address emails with hyperlinks without confirming with the sender
Banking details (A/C no, pin, etc.) of the email. Think before opening an email from an
Medical history (suffered from depression, etc.) unknown person, never send any other sensitive
Personal data like ethnic origin, political views, information (picture in school uniform, credit card PIN,
criminal activity, mental health history, etc.)
Sexual orientation and religion can be used to Ask their ISP to enable email filtering to classify spam
blackmail victims of data breaches mails as spam.
If personal data is leaked (data breach), the following can Only email people you know
occur: Unsubscribe from any suspicious mailing lists
Identity theft
Bank fraud Social Media Safety
Damages to personal property
Kidnapping (if kidnappers get access to the victim’s Block and report users who seem suspicious or use
address. inappropriate language

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Never use your real name, only use a nickname The creator sends out a legitimate looking email hoping to
Use appropriate language gather personal and financial information from the
Do not enter private chat rooms, as users can lure you recipient of the email
into giving personal information by seeming too nice. The message appears to be from a legitimate source (e.g.
Do not meet anyone off the internet for the first time on a famous bank)
your own, or at least speak to a trusted adult first. When the user clicks on the link, they are sent to a fake
Do not misuse images (of someone to blackmail them, for website that looks exactly like the real one
e.g.) They will be asked for personal info e.g. credit card
Respect the confidentiality of other users details, PINs
Never arrange to meet anyone you met online in person This could lead to identity theft
ISPs attempt to filter out phishing emails
Online Games this can lead to theft of financial data, identity theft and
fraud
Similar measures apply to that taken when using social Smishing is similar to phishing but instead of emails, SMS
media. messages are sent to the recipient, encouraging them to
Additionally, players should be careful about: click on an unknown link and give their personal
In-game violence information
Cyberbullying Vishing is voice mail phishing. this method uses voice mail
Keeping their webcams off (other potentially message to trick the user into calling the telephone
dangerous players have direct access to your image) number mentioned in the message
Predators may use voice masking technology to lure a
user to reveal their age, sex etc. Prevention
Cyber-attacks involving viruses, ransomware, etc.
Always be cautious of opening emails from unknown
sources
Security of Data online Don’t click on attachments that end in .exe, .bat, .com or
.php

8.3. Risks involved with electronic Pharming


devices
Pharming is a scam in which malicious code is installed on
a computer hard disk or a server
Hacking
This code can misdirect users to fraudulent websites
This is the act of gaining unauthorised access to a without their knowledge
Phishing requires an email to be sent to every person who
computer system.
It can lead to corruption or loss of data or a data breach has been targeted, while pharming does not require
emails to be sent out to anyone
it can lead to identity theft as hackers can collect personal
Pharming can target a larger group of people more easily
data and use it to impersonate the user, spreading
rumours about them and damaging their reputation How pharming works:
Some prove that a system is vulnerable - maybe A hacker will infect the computer with a virus, either by
sending an email or installing software on their
employed to test (ethical hacking)
computer when they first visit their website
Some want to steal data
Once infected, the virus sends the user to a fake
Alter or destroy data
website that looks identical to the one they wanted to
For fun or a challenge
Prevention: visit
Use strong passwords and don’t share these Personal info. from the user’s computer can be picked
up by the pharmer/hacker
passwords with anyone
Anti-spyware, anti-virus software or anti-pharming
Use firewalls
Use intrusion detection software software can be used to identify this code and correct
the corruption
Encryption (this wont stop hacking, it will just make the
data unreadable to the hacker. however, they can still Prevention
delete, corrupt or alter the data)
Use anti-spyware software that can remove any malicious
code
Phishing User should be alert for any signs that their computer has
been hacked into or they’re being redirected to a
Phishing is a fraudulent operation involving the use of
fraudulent website
emails

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Spyware and key-logging software Websites/pop-ups can be made to mimic legitimate ones,
or seem too good to be true, for e.g.lotrei.net instead of
This is software which gathers data based on the key lottery.com
presses or clicks made on the keyboard; the gathered
data is sent back to the person who put the software on a
computer system
It can give the hacker access to data entered by the user
which can include passwords or bank account details
The software is able to install other spyware, read cookie
data and also change the user’s default browser

Prevention

Use anti-spyware software


Users should be alert for any suspicious activity on their Banks and organisations will never ask for a PIN to be
computer
entered on a website like this.
When entering a password, it is advisable to use a
pointing device to select characters from a drop-down Moderated & Unmoderated Forums
menu to avoid typing using the keyboard
Online forums are places on the internet where people can
Viruses join discussions on almost any topic and also add their views.

This is program code that replicates or copies itself when There are two types of forums:
installed onto a computer
Is used to delete or corrupt files on a computer or cause a Moderated Forums Unmoderated Forums
computer to malfunction Has a moderator who checks
No moderator who checks the
Can cause the computer to become unresponsive comments before they are
comments
posted
Prevention
There will be no spams or Spams, rude and offensive
Use anti-spyware software rude and offensive comments comments present
Don’t download software from unknown websites Diversions from topic are
No diversions from the topic
It is advisable to not open emails or messages from possible
unknown senders Highly secure due to Personal information can be
moderation obtained from you
Spam
Not secure due to lack of
Spam is electronic junk mail and is a type of advertising moderation
from a company sent out to a target mailing list
Harmless but can clog up networks and slow them down
It is more of a nuisance than a security risk
Many ISPs are good at filtering out spam, and prevent the
Security of data online
user from getting these spam emails.
It is often necessary to put a legitimate email address into Encryption
a contact list to ensure wanted emails are not filtered out
by mistake The conversion of data to code by encoding it
Done by using encryption software
Preventing Phishing, Pharming & Smishing Since data is encoded, it appears meaningless to a hacker
This technique prevents illegal access
User education Necessary to use decryption software to decode the data
Set up anti-malware and anti-spyware software Used to protect sensitive data e.g. banking details
Enabling protocols such as SPF and DKIM Encryption keys are complex algorithms which makes
Do not download random .exe (executable file formats), codes almost unbreakable
.php, .bat, .com etc.
Users should be alert when being redirected to other Secure Socket Layer (SSL)
websites.
If a person on the internet is asking for personal Type of protocol that allows data to be sent and received
information, or to meet in real life or acting suspicious, securely over the internet
they should be reported to cyber security agencies, or When a user logs into a website, SSL encrypts the data
one’s parents/guardians. https or padlock symbol in the status bar

WWW.ZNOTES.ORG
When a user wants to access a secure website: If password is forgotten on a website, it will be sent on
User’s web browser sends a message so it can your e-mail
connect with the required website which is secured
with SSL
Web browser requests that the web server identifies Cloud Storage
itself
Web server responds by sending a copy of its SSL Your data is stored remotely and not on your computer,
certificate so you don’t have control over the physical security of
Web browser checks if the certificate is authentic your data.
Sends signal back to the web browser Some of the data stored may be personal data which are
Starts to transmit data once connection is established open to hackers, and have to be encrypted in order to
If not secure, browser will display an open padlock prevent hackers from obtaining them.
The company providing the storage may go out of
Firewalls business. In this case what has to be done to the data will
have to be considered.
A firewall sits between the user’s computer and an The company providing the storage will have to put in all
external network (internet) and filter information in and its efforts and safety measures in order to keep your data
out of the computer safe.
Tasks carried out by firewall: If the company providing the storage doesn’t backup your
Examining ‘traffic’ data, you may lose it in case of power cuts or fires, etc.
Checking weather incoming or outgoing data meets
criteria Biometric data
If data fails the criteria, the firewall blocks ‘traffic’
Uses features of the human body unique to every
Firewall can keep a list of all undesirable IP addresses
Helping to prevent viruses or hackers entering the individual, such as fingerprints, retina, iris, face and voice
user’s computer recognition. It is used in authentication techniques as it is
very difficult to replicate
Features of a secure webpage: Advantages:
Usernames or passwords don’t have to be
Webpage URL: if the webpage is secure, it will start with remembered
‘https’ instead of ‘http’ Almost impossible to replicate body parts
padlock symbol No one else can gain access, like with a stolen card
They cant be forgotten anywhere as it is part of the
body
Authentication
Disadvantages:
The readers are expensive
-Used to verify that data comes from a trusted source
Damages in fingerprints can deny access
-Works with encryption to strengthen internet security
Some people worry about the privacy issues with their
personal information being stored
User IDs

To log on to a network, a user must type in a user iD


Digital certificate
User ID assigns user privilege once user logs in
The top-level privilege for a network is an administrator:
A digital certificate is an electronic passport used in the
able to set passwords and delete files from the server security of data sent over the internet
etc. They can be attached with mails so that the receiver can
User privilege allows access to their own work area only
know that the mail is sent from a trust source

Passwords The threats of using credit cards online and prevention:

After typing in User ID, the user will be requested to type Key logging/spywares: records the keys pressed on a
in their password. keyboard.
Passwords are shown as starts (***) so nobody Can be used to obtain credit card details, passwords
overlooking can see it and personal information.
To help protect the system, the user has a certain number Use virtual keyboards to type in password.
of attempts allowed before they will be locked out of the Install anti-spyware software.
system Bogus sites: sites that look exactly like the original sites,
If password is forgotten, the administrator must reset it but aren’t.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

They can steal your card details and personal


information when you make purchases. Audience
Always type in URLs, sometimes links in the mails can
be of bogus sites.
Audience Appreciation
Phishing, pharming and Smishing:
They trick you to reveal card and personal details as
Knowing Your Audience
responses to messages or mails.
Open attachments only from trusted sources. When designing ICT solutions, you must consider
Install anti-spyware software. audience
Hacking into secure sites to obtain the details: There are 4 main characteristics of an audience
Encrypting the details will make it of no use to the
Age:
hacker. Can affect audience’s interests in your product
Use strong passwords. Large fonts and colours attract children
Use firewalls. More stylish and trendy layout attracts young adults
Tapping into wireless networks: Gender
Always use a password-controlled Wi-Fi since it is Design product for a specific gender
relatively hard to tap into a secured Wi-Fi.
Younger girls are often attracted to pink
Males generally prefer blue spectrum
*ALL PREVENTION TECHNIQUES WRITTEN HERE ALSO APPLY
FOR THE THREATS IN GENERAL (NOT SPECIFIC TO CREDIT Income
CARDS) * Knowing this will help in attractive pricing strategies
Promoting certain products are targeted for people
Methods of Internet Security within a specific range of incomes
Interests
Can help with advertising content
Authentication
Advantages Disadvantages Content that meets the exact description of audience’s
Method
interest is more likely to attract them to your product
Inexpensive, as
Can be easily hacked,
Passwords nothing other than a
can be forgotten Audience Needs
computer is required
Highly recognized After finding out about your targeted audience you need
everywhere, very to aim to meet those demands
Fingerprint Intrusive, Damages
high accuracy, Easy Developers of the ICT product must ensure that they meet
scans will prevent access
to use, Relatively low as many of these needs as possible
storage requirement Common Needs for Common Audiences:
Non-intrusive, very Problems occur if
Signature little time to identify, sign is not consistent, Audience Needs
recognition Relatively low High error rate (one Bright/cheerful colours
expensive in 50) Animations/sounds/pictures
Very intrusive, Less text
Very high accuracy,
relatively slow to Young children Simple wording
no known way to
Retina scans verify retina scans,
replicate a person’s Large text
very expensive to
retina Games/activities
install and set up
Easy to use
Very intrusive, Lot of
Very high accuracy, Attractive/stylish colours
memory needed for
Verification time is
Iris recognition storage, very Interesting content
usually less than 5
expensive to install Teens & adults Balance of pictures and text
seconds
and set up Clear fonts
Affected by changes Bullet points
Non-intrusive,
Face in lighting, person’s
Relatively Contrasting/easy-to-read colours
recognition hairstyle, age and
inexpensive Include clear instructions
spectacles
Use slightly larger font sizes
Seniors
Fewer technical terms
9. ## 9.1. Consistent design
Easy to use

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Potential Problems Some software will only run if a memory stick is plugged
in USB ports
If products are not built towards a specific audience well
then problems may arise
An older audience may not be able to understand or read
text due to poor font design Creating ICT Solutions
A younger audience may not be able to understand
ICT solutions, for e.g. a website should be made in
certain text due to complex wording & structure
accordance to the legal, moral, ethical and cultural beliefs
Several audiences may just not find content interesting
of the target audience.
since it is not relevant enough to them
Several audiences may not find content attractive enough
and thus not purchase or use it at all
Younger & older audience may not understand how to use Implications of ICT Solutions
the product due to lack of simple instruction
When creating an ICT solution, all the following have to be
9.2. Legal, Moral, Ethical & Cultural considered and the solution must be made in response
and respect to these factors:
Appreciation Legal: Ensure copyright laws are abided by including
not using any coding or branding from existing
Copyright Legislation copyrighted software.
Morality: To distinguish from right or wrong.
A law that protects books, music art and other media that Sometimes it may not be illegal to carry out an act
are written is copyright law however it could be against your morals. For example,
It is an automatic right and does not need applying for setting up a fake website to deceive is not illegal but
The person who owns the rights must be asked before questions your level of morality.
it can be used again Ethics: Is to break a code of conduct. For example,
Software is a specific thing created and written on a disclosure of information about the new software to a
computer rival software publisher or to the press.
Needs to be protected as it is so easy for people to Culture: When software is released in different
copy cultures then care must be taken so that people are
This is a way of protecting software from being used not offended. If certain computer games mock religion
without permission
or cultural beliefs, then again this could cause offence.
Users create a license which determines the terms
and conditions
10. ## 10.1.
Copyright Laws Communication
It is not legal to make a copy of software, then sell it or
give it away to other people Email
Software cannot be used on a network unless a network
license has been acquired National Laws
Not legal to use coding from software in your own
software without permission In some countries, emails are monitored or read, thus
Renting out software without permission is illegal limiting the topics on which you can speak.
It is illegal to use the name of copyrighted software
without permission Acceptable Language

Language used in emails must lie within an acceptable


code of practice. The following is a list of unacceptable
Software Protection content that are beyond the code of practice:
Obscene images
Installed software will require a unique reference number Abusive language
User will have to accept license agreement Racist, exploitative and violent messages
Holograms are used to indicate software is original Use of illegal materials in messages
Software may only run if CD-ROM or DVD-ROM is actually
in the drive Copyright
Copyright laws apply to text in emails. Forwarding a block encrypted.**
of text or an image without the copyright owner’s Hyperlink: Data that redirects the user to another
permission, it would be illegal. webpage/section of same webpage/file when clicked.
File Transfer Protocol(FTP): Used to upload website files to
Employer Guidelines the web hosting space. To upload these files successfully,
the user needs:
If the rules in the ‘contract of employment’ set out by the An FTP client
employer is not obeyed, you would be in breach of your Login details to the web hosting server (host and port
contract and could be dismissed. used, username and password for FTP.

Security

Emails containing personal information should be Cloud storage:


encrypted to prevent hackers from understanding the
information if they manage to hack into the email. The storage of data (remotely) on the internet.
This data is accessible by the user with the requirement of
Netiquette an appropriate authentication technique (e.g. user ID and
password).
Some of the rules that the netiquette contains is:
Don’t be abusive
Don’t send spam
Be precise Search Engine:
Check spelling and grammatical errors
A search Engine is used to find information on the internet
Ensure attachments are not too large
without knowing the (Uniform Resource Locator) of the
Don’t use CAPITAL LETTERS to highlight comments
webpage holding the information.
Don’t plagiarize
Don’t use too many emoticons

User ID and Password Protection Blog


Email services require a user ID to authenticate users Personal internet journals where the writer posts their
Passwords should contain alphabets, numbers and observations on a topic
special characters (#, *). No training is needed to do this
Email Groups Blogs range from minor projects (e.g. people gossiping
Easier to send out multiple mails by grouping them under about a topic) to important subjects such as politics or
one name. advertising products
Companies and organization can group people according Comments are not immune from the law
to their target group for marketing purposes. Bloggers can be prosecuted for offensive comments
Spammers can create email groups by buying addresses
of people from a certain company and send in easier
ways.
Companies use email groups to set up meetings. Typing Wiki
out individual addresses may leave out a few mail IDs.
Software allowing users to easily create and edit web
pages without using any web browser
10.2. Internet Fundamentals
A wiki will support hyperlinks and has a very simple syntax
(language rules) for creating pages
*INTERNET AND INTRANET EXPLAINED IN CHAPTER 4*
Wikis are described as ‘web pages with an edit button’
The world wide web (WWW) is a system of interlinked Anyone can use wikis- content should be treated with
hypertext documents accessed via the Internet caution
Protocols are a set of rules that are followed between the Example of a wiki: Wikipedia
sender and recipient of data which is being transferred
between devices.
HyperText Transfer Protocol (HTTP): A protocol that is
Social Networking
followed between the sending and receiving devices when
data is being transferred using the internet.
These sites focus on building online communities of users
HyperText Transfer Protocol secure variant (HTTPS):
who share the same interests
HTTP that is followed when data being transferred is

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Enable people to share photos of themselves, their Extension


Full form Used for/in:
favourite music and videos, what they like to do, what they name
like to eat etc. Word processed
Example: Facebook rtf Rich Text Format
documents
These are becoming the modern way of interacting
txt Text (File) Simple Text files
socially
They allow people to communicate across the world and Zone Improvement Sending many files
zip
share their interests and views with many people. Plan over the internet/email

Generic file formats can be opened by any software to


10.3. Information on the Internet
access the data held in them.
Information is more likely to be up to date than in books,
since websites can be updated very quickly 11.2. Reduce File Sizes for Storage or
Much easier to get information from websites- search Transmission
engines link key words together and find information that
matches the criteria- cause for popularity Files that are smaller in size upload and download faster
Vast amount of information on the internet- easier to
than larger ones and thus are better for transferring data.
locate than using indices in books
Information on the internet however may be relevant or
correct, not reliable, inaccurate or even biased- it does 12. ## 12.1.
not go through any checking process
Information overload can make it difficult for the user to
find relevant information Images
Ensure use of reliable websites that properly cite all their
sources An image should be edited when doing so will enhance its
Always look for primary sources of information & form usefulness.
own conclusions test
Do not quote/use secondary often biased opinions or
gossip
Do your research 13. ## 13.1.
11. ## 11.1. Layout
Headers and footers ensure each page has all the
File Management required information like the page numbers, logos, titles,
etc.
Manage Files Effectively A common mnemonic is "An orphan has no past; a widow
has no future"
Extension
Full form Used for/in:
name
14. ## 14.1.
Stylesheets in
css Cascading Stylesheet
webpages

csv
Comma Separated
Store tabular data
Styles
Value
Graphics Interchange Several organisations use a ‘corporate house style or
gif Moving images
Format corporate branding, which is used to print on websites,
Hypertext Mark-up visiting cards, letters, etc. It refers to a specific style of
htm Webpages fonts and formats used in the making of ICT solutions by
(Language)
organisations.
Joint Photographic
jpg Standard for images A corporate house style when used effectively identifies
Experts Group
the users of the style.
Documents to be Consistent styles enable users to associate a particular
Portable Document
pdf circulated over the organisation with a style and also show consistency in the
Format
internet/email ICT solutions created by the organisation
Portable Network
png Compressed images
Graphic

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Primary key: The key field of a table which is unique and


15. ## 15.1. identifies each record
Foreign key: The field linked to the primary field of the
table linked to through a relationship
Proofing
Relational database Flat-file database

Software Tools Complex queries can be


Poor at complex queries
carried out
When a person’s/organisation’s name is entered or Better security Poor at limiting access
sometimes newly coined terms are used, spell checkers Harder to update, so
Cater for future requirements
might pick these up as errors, because they are not found inherently inefficient
in the dictionary. This makes spell checkers less efficient. Data is only stored once Potential duplication
Validation ensures that the data being entered into an ICT
Require more planning Easy to design
solution is reasonable and makes sense. Entered data is
checked against set criteria to be validated. Non-unique records
Harder to change data
format.
15.2. Proofing Techniques
Verification: checking of data when copied from one At times placeholders for media such as images, sound
medium to another to prevent errors. bites and video clips are used to enhance the usability of a
Verification is also important and is a way of preventing a database
difference in data when it’s being transferred from one
system to another. This tries to make sure data entered is 17.2. Test the Data Model
correct, relative to the source.
A model prepared needs to be tested before being used
to ensure that all results computed are accurate. The test
16. ## 16.1. plan must be justified to be apt for the model. E.g. all the
mathematical operations must be tested in a model that
relies on calculations.
Document Production Definitions:
Testing: Checking if the designed model delivers the
Widow: A paragraph-ending line that falls at the beginning expected outcome when tested with data.
of the following page or column, thus separated from the Test data: The input data used for testing model.
rest of the text. Expected outcome: The output a model is supposed to
Orphan: A paragraph-opening line that appears by itself give with the test data.
at the bottom of a page or column, thus separated from Actual outcome: The output a model actually gives the
the rest of the text. user when the test data is input.
Page, section and column breaks are used to ensure that
widows and orphans are not present in a document (these
show poor typography). 18. ## 18.1.
A mail merge document is created in order to create a
standard template and then use it to send documents
personalised (by the computer system) for the respective Data Analysis
recipient of the document
Create a Data Model
17. ## 17.1. Charts: A graphical representation of (usually tabulated)
data
Data Manipulation Accurate data ensures the results obtained by the
processing of data is relevant, which is essential to the
usability of the model
Create a Database Structure Formulae are mathematical operators defined by the user
to perform a function, whereas functions are predefined
Flat file databases are tables that have data sorted in logical and mathematical operations a user can use in a
rows and columns, whereas relational databases are spreadsheet
several tables grouped together to from a link, thus Mathematical operations are performed in the order
preventing unnecessary repetition of data. PEMDAS (Parenthesis [Brackets] Exponents Multiplication

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Division Addition Subtraction). Brackets are used to


Web Development Layers
notate data used by a function, e.g. =SUM (A2:A10).
Relative cell referencing is made when the cell reference
Content/Structure layer: Holds the content of the
is supposed to change when the cell it is referred to in is
webpage structure.
changing. It aids more efficient designing of models.
Presentation layer: The layer responsible for the
Absolute cell referencing is made when the cell
formatting of a webpage(s) or elements (using a
referenced stays constant when the cell it is referred to in stylesheet).
is changing. This aids the preparation of a model when a Behaviour layer: scripting language of a web page or an
set of data is constantly being referred to throughout the
individual element
model. Cell reference or relative cell reference describes
how far away a cell or group of cells is from some other
cell in the same spreadsheet. Basically, the cell’s address 19.2. Create a Webpage
A model prepared needs to be tested before being used
to ensure that all results computed are accurate. Tables make the basic structure of a webpage and
Definitions: organise page layout.
Anchor: An element in a webpage that creates a hyperlink
Cells: A space for data to be entered a table; a box
formed by the intersection of columns and rows between a source anchor and a destination anchor. These
Rows: Horizontal boxes that divide the table in can be used to link 2 resources together.
segments Relative file paths are used for attached stylesheets as
Columns: Vertical boxes that divide the table in the stylesheet is going to be stored on a server in the
same directory as the webpage, and not where it an
segments
absolute file path says.
Sheets: A table of data
Tabs: A module of a database program that holds the Definitions:
tables on the computer, Relative file path: A path referring to a file in the same
Pages: Full pieces of papers that contain information directory relative to the page the reference is made in.
Absolute file path: The full path of a file, which is not
held on one sheet of paper.
relative to anything, whereas relative links only point
Ranges: A group of cells in a table
to a file or a file path, the browser then redirects the
Named cell: A cell in a table that is given a name (like
‘profit margin’) and can be referred to using that user to that location on the current site.
name. Absolute paths always include the domain name of
the website
Named range A group of cells in a table that are given
These should not be used to refer to locally saved
a name (like ‘Pricing’) and can be referred to using that
webpages as the computer the webpage is stored
name.
Nested formulae/function: A formula/function used on (the server) is not the same as where the
inside a formula/function as an argument webpage was developed and thus an absolute file
path would point to the wrong address.

18.2. Test the Data Model


19.3. Using Stylesheets
A model prepared needs to be tested before being used
CSS (cascading stylesheet) is a text-based language which
to ensure that all results computed are accurate. The test
plan must be justified to be apt for the model. E.g. all the is attached to webpages to set their format. CSS files have
mathematical operations must be tested in a model that a “.css” extension
relies on calculations. These should be attached using relative file paths as they
are stored along with the webpage and thus can be linked
Definitions:
relative to them.
Testing: Checking if the designed model delivers the
Internal CSS have more preference over Inline CSS
expected outcome when tested with data.
Test data: The input data used for testing model. If several external stylesheets are attached to one web
Expected outcome: The output a model is supposed to page, the stylesheet attached last (at the bottom of that
part of the code) is given preference over the other
give with the test data.
attached ones).
Actual outcome: The output a model actually gives the
user when the test data is input.
19.4. Test and Publish a Website
19. ## 19.1. To upload and publish content on a website using FTP, a
user must have:
FTP client software
Website Authoring All files in one folder
Host Name/URL/IP address for FTP

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Host port to be used for upload being tested, it makes to check if all the hyperlinks are
Username and password redirecting the user to the correct webpage/ section of
The test plan used to test a webpage must be justified the webpage.
based on the elements being tested. E.g. If hyperlinks are
CAIEIGCSE
IC

Copyright 2023 by ZNotes


These notes have been created by Aliza Mirza, Akshya SP and Abdul Majeed for the 2023-2025 syllabus
This website and its content is copyright of ZNotes Foundation - © ZNotes Foundation 2023. All rights reserved.
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website without the express, written
permission of the copyright owner. Under no conditions may this document be distributed under the name of
false author(s) or sold for financial gain; the document is solely meant for educational purposes and it is to remain
a property available to all at no cost. It is current freely available from the website www.znotes.org
This work is licensed under a Creative Commons Attribution-NonCommerical-ShareAlike 4.0 International License.

You might also like