Igcse Ict 0417 Theory Notes
Igcse Ict 0417 Theory Notes
WWW.ZNOTES.ORG
CIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Keyboards
Mouse
WWW.ZNOTES.ORG
CAIE IGCSE ICT
An example of a pointing device They are more difficult when doing operations such as
The ball underneath the mouse is used to detect ‘drag and drop’
movement
The left button is for selecting by double on it and the right
is to bring drop-down menus Tracker Ball
There is usually a scroll button which speeds up the
process of moving through a document
Uses
Used for opening, closing and minimising software
Used for grouping, moving and deleting files Tracker ball is like a mouse except that it has a ball on the
Useful when editing images (e.g. controlling the size top of the device
and position of the image) Users control the pointer on the screen by rotating the
Used for controlling the position of a pointer on the ball
screen to allow: Uses
Selection from a menu Have the same pointing/cursor control capability as a
Selecting an icon mouse
Scrolling up/down and right/left Used in applications where the user has a disability
Advantages (RSI)
Faster to select an option by a mouse than a keyboard Used in a control room environment, where it is faster
Enables rapid navigation through applications and the than a mouse to navigate through process screens
internet and more robust than a mouse
Mice are small and don’t take much area Advantages
Disadvantages Tracker balls don’t need the same fine control as a
People with restricted hand/wrist movement can find it mouse
hard to operate a mouse People with limited hand/wrist movement find easier
Easily damaged and can easily be clogged up with dirt to use than a mouse
They are hard to use if there is no flat surface The pointer can be positioned more accurately on the
available screen than with a mouse
They take less desk space than mice since they are
stationary
Touchpad
Disadvantages
Touchpads are used in many laptop computers as a Tracker balls are not supplied with the computer as
pointing device standard, so they are more expensive
The pointer is controlled by the user moving their finger User may need training since they are not standard
on the touchpad equipment
Uses
Used for opening, closing and minimising software
Remote Control
Used for grouping, moving and deleting files
Useful when editing images (e.g. controlling the size A remote control is used to control the operation of other
and position of the image) devices remotely by using infra-red signals
Used for controlling the position of a pointer on the Uses
screen to allow: In home entertainment devices such as Televisions,
Selection from a menu DVD player/recorder and satellite system
Selecting an icon Used to control multimedia systems
Advantages
Used in industrial applications to remotely control
Faster to select an option by a touchpad than a
processes, stop and start machinery
keyboard Advantages
Enables rapid navigation through applications and the Enable devices to be operated from any distance,
internet which is useful for people with disabilities
Since the touchpad is integrated into laptop computer, Some chemical processes are hazardous, so it is safer
there is no separate mouse, aiding portability to operate equipment from a distance
They can be used when no flat surfaces are available Disadvantages
Disadvantages People with limited hand/wrist movement can find
People with limited hand/wrist movement can find them hard to use
touchpads hard to use The signal between the control and the device can be
It can be more difficult to control the pointer when easily blocked
compared to a mouse
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Light turned into electronic signal through light sensitive Type of sensor Applications
sensors and automatically converted to a digital file Automatic greenhouse, chemical
format. pH
processes, environmental monitoring
Advantages
Easy to edit footage in a video editing.
Advantages
High quality video captured, therefore
Readings by sensors are more accurate than taken by
Disadvantages
humans
Storage medium (Memory cards) more expensive to Readings are continuous, there is no break in
buy than films.
monitoring
Because it is a continuous process any necessary
Microphone action or warning will be initiated immediately
The system can be automatic, removing the need for
human intervention, this is particularly important if the
process is hazardous
Disadvantages
Faulty sensors can give spurious results
Graphic Tablet
Can be connected directly to a computer
Sounds can be inputted and manipulated
Uses
Microphones are used to input speech/sounds to be
used in various applications
They are used in voice recognition software- for A graphic tablet is used with a stylus to produce freehand
conversion of speech into text, and recognition of drawings
commands Uses
Advantages Graphics tablets are used to produce drawings,
Faster to read in text than to type it using a keyboard computer graphics
Possible to manipulate sound in real time using In countries where characters are complex e.g. japan,
special software they are used as a form of input
If used in a voice activation system, this has the They are used in computer aided design (CAD) work
advantage of improving safety Advantages
Disadvantages It is possible to modify drawings before they are input
Sound files can use up a lot of computer memory They offer an accurate method of drawing
Voice recognition software isn’t as accurate as typing Disadvantages
in manually They are more expensive than other pointing devices
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Webcams have limited features and the picture is Provide a more secure payment system than requiring
often of poor quality a signature or using magnetic stripe, since the PIN
They need to be connected to a computer typed in must match up with the PIN stored on the chip
Provide a more robust system than magnetic stripe
2.2. Direct Data Entry & Associated since the chip does not need to be in contact with the
reader
Devices Disadvantages
Customer needs to be careful when typing in the PIN,
Magnetic Stripe readers so nobody reads it giving an opportunity for Fraud
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
Tend to be heavy, weight hazard if not supported High power consumption
properly Slow response time
Run very hot, can cause fires if left unattended – Note: Old LCD monitors used CCFL (cold cathode
especially if they are old fluorescent lamp) technology to light up the screen.
Consume more power than TFT monitors
They can flicker, this leads to headaches and eyesight
problems with prolonged use LED Monitor:
IPS/LCD Monitor
WWW.ZNOTES.ORG
CAIE IGCSE ICT
It is then possible to direct the presentation without These have been linked to health hazards in the office
being tied to the computer
Most multimedia projectors take input from various
types of video format e.g. PAL, NTSC or SECAM Inkjet Printer
Uses
Used for training presentations (allows the whole
audience to see the images from a computer)
Also used for advertising presentations (shown at
exhibitions, shopping malls etc.)
Home cinema systems (projecting the images from a
DVD or television) use multimedia projectors
Used to produce good quality hard copies – the quality is
Advantages
not as good as in laser printers but much better than that
Enables many people to see a presentation rather
of dot matrix printers
than all of them crowded around a small computer
Do not have large buffers like laser printers, so printing is
screen
done a bit at a time
Avoids the need for several networked computers
Therefore, printing is sometimes paused – the whole page
e.g. when looking at a video clip on the internet,
can’t be stored in the buffer, it must wait for the computer
everybody can see the video on the large screen
to send more data
rather than logging on to several computers
Uses
Disadvantages
Used where low volume outputs are needed
Images can sometimes be fuzzy
Ideal for high quality printing for small print jobs or
Expensive to buy
single pages e.g. for photo quality printouts
Setting up projectors can be a little difficult
Advantages
High quality output
Laser Printer Cheaper to buy than laser printers
Very lightweight and take up little space (small
footprint)
Do not produce ozone and volatile organic
compounds, unlike laser printers
Disadvantages
Output is slow if several copies needed – there is little
buffer capacity to store the pages
Produce very high-quality hard copy output The ink cartridges run out too quickly to be used for
Print rate per page is fast if many pages are being printed large print jobs
Rely on large buffer memories – the data for the whole Printing can smudge if the user is not careful
document is stored before pages can be printed out Can be expensive to run if they are used a lot –
Uses original ink cartridges are expensive
Used where noise levels need to be kept low e.g. in an
office
The best option for fast, high quality, high volume Dot Matrix Printer
printing
Advantages
Printing is fast for high volumes, slightly faster than
inkjet if only a few pages are to be printed
Can handle very large print jobs
Quality is consistently high
Toner cartridges last for a long time; laser printers A type of impact printer
A print head made up of a matrix of pins presses against
can be a cost-effective option if colour outputs are not
an inked ribbon
required
Disadvantages Uses
Can be used in noisy environments e.g. garage
Expensive to buy
Only fast if several copies are being made workshops
Can be used in applications were the print quality is
Colour laser printers tend to be expensive to run since
not very important
four cartridges are needed as well as diffuser kits, etc.
Advantages
Produce ozone and volatile organic compounds
because of their printing method and type of toner/ink Can be used in environments which would be a
problem for laser and inkjet printers – dusty, dirty or
used
moist atmospheres
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Carbon copies or multi-part outputs can be produced Used to produce prototypes which work from CAD
Very cheap to run and maintain packages, photograph images, stored drawings etc.
Easy to use if continuous stationary is required e.g. Scale models are produced in colour before the real
long print jobs such as wage slips thing is manufactured
Disadvantages The ultimate objective is to produce organic objects
Very noisy – not good in an office environment using this layering technology (such as replacement
Cost more than an inkjet printer to buy human organs)
Very slow Advantages
Printing is of poor quality Save a lot of money, other methods of making
prototypes are very time consuming and expensive
The powders used can often be ground up and reused
Wide Format Printer Physical scale models are produced with working
parts, which gives a better idea of how the product will
look
Disadvantages
Expensive to buy
Slow at producing their output
Product is sometimes a little rough, often further work
Devices that produce hard copies but operate in a needs to be done
different way to printers
Not limited to normal printer paper size and can produce
Speakers
highly accurate, very large drawings and posters
The most common types are pen plotters, electrostatic
(similar method to laser printers) and inkjet plotters
With pen plotters, coloured pens are controlled by a
computer and the paper can move backwards and
forwards to allow accurate shapes to be drawn
Uses
Used to produce large drawings e.g. blueprints of
buildings; are often used with CAD applications Can be connected directly to a computer or are built into
Used to produce large pictures for use on billboards the monitor or casing (as in laptop computers)
or giant posters Uses a digital to analogue converter (DAC) to convert
They can also print on plastic coated paper digital data from the computer to analogue from so the
If the pens are replaced by cutting tools, it is possible to speakers can process it; the signal is then amplified
make large signs through the speakers.
Advantages Uses
Can produce huge printouts Used to output sound from multimedia presentations
Print quality is extremely high Used in home entertainment centres
Disadvantages They can help blind people through audio output of
Slow in operation text on the screen (together with speech generation
Expensive to buy and maintain software)
Used to play downloaded sound files
Advantages
3D Printer
Usually long lasting and durable (if operated within
their intended power levels)
Often provided with the computer/laptop although
these may not be the best quality
Disadvantages
Can take up a lot of desk space, compared to
headphones
A new type of printer that produces solid 3D models using Can distract people around you, everyone can hear
modified inkjet technology called tomography what you are playing
Very thin layers of fine powder (plaster, resin, starch) are May not be able to hear the full sound spectrum, this
bonded together as a 3D model is slowly built up requires multiple speakers
Items produced are known as prototypes
Uses
Actuators
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Lower number of write cycles causing performance to Commonly used to connect computers and other network
diminish over time capable devices to the internet
They can be connected to through cables or wirelessly
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Main task is to receive data from different ports and send Laptop computers
it to each device Peripheral devices such as printers
The information will be received to the device whether its Wi-Fi Hotspots
relevant, or not Wi-Fi systems rely on AP (radio frequency technology)
to enable the device to receive and send signals
Wi-Fi hotspots are places where you can access Wi-Fi
Bridges (free or paid)
Hotspots are found in public places like Airports,
It connects 2 different types of networks together e.g. a hotels, and cafés
bus and star network War driving: The act of driving and searching for
It can only connect networks that use the same way for unsecured Wi-Fi hotspots
handling messages
This gives a risk to the Wi-Fi system
They do this by changing the form of message to suite the
different type of network
Bluetooth
Switches Bluetooth is an example of wireless personal area
networking (WPAN) technology
More efficient than hubs in distributing data
Spread spectrum transmission (radio waves) is used to
Each device has an access control media address MAC provide wireless links between to devices such as mobile
which identifies it uniquely phones and allow connection to the internet
MAC Address: a number unique to each device connected A small home network can be created with this system
to the network (like fingerprints) Uses
Data sent will have a mac address which tells the source
Transfer photos from camera to mobile phone
and receiving device Wirelessly connect different external devices
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Advantages Disadvantages
4.9. Using Different Types of Computers
Smallest most portable of all Websites are often not fully
to Access the Internet devices displayed
People more likely to carry Small screen size makes
LAPTOP COMPUTERS this wherever they go viewing websites difficult
Much easier to connect to Small keyboards make it
Advantages Disadvantages
internet on-the-go difficult to type
More portable than desktops
Less portable than Allow children access to
can access internet in more
tablets/smartphones internet anywhere; can be
locations
dangerous
Larger screen than tablets & Screens not as large as
smartphones which allows desktop PCs may not appear
easier reading as clearly 4.10. Network Security Issues
Keyboards are bigger than CPUs are not as powerful as
Connection to a network exposes a user to:
those on tablets/smartphones those in desktops
Hacking: Unauthorised access given to computer.
Touchpads allows easy Phishing: Phishing involves getting sensitive
navigation even on slanted information such as usernames, passwords, and
surfaces credit card detail, for malicious reasons, by mimicking
a reliable webpage on the network
DESKTOP COMPUTERS Pharming: Explained in chapter 8 card 2 (E-Safety)
Viruses: Explained in chapter 8 card 2 (E-Safety)
Advantages Disadvantages
Most websites are designed Not portable so are limited to
to be viewed on a desktop use in one room Policing the Internet
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Currently, the internet has no boundaries magnetic stripe reader that authenticates the user after
Anything and everything can be put online reading iron-based magnetic particles on a band of magnetic
For Policing: material on the card which is also called a magstripe.
Prevent illegal material being posted
People can easily find info on how to become hackers ID Cards: Usually a photo ID with a QR
or make bombs
or barcode that authenticates the user.
Prevent children from accessing undesirable websites
Could reduce the amount of incorrect information
Against Policing:
Material already available in other sources i.e. books
Very expensive
Users would have to fund Passports: Have an RFID chip on it that
Difficult to enforce rules
Against freedom of information responds to a signal sent by a RFID reader that sends
Laws already exist to deal with perpetrators information about the passport holder to the computer
system
Strong passwords: A random mix of alphabets (uppercase Fingerprint Scanning: Scans the pattern
and lowercase), numbers, and keyboard symbols (@, %, ^
on fingers and verifies it against a stored database of
etc.)
authenticated fingerprints using pattern-matching software
Weak passwords: Easy to guess, e.g. users name or date
to allow access to a user.
of birth or 1234556, etc.
Frequent password changes can help reduce the chances
of password interception too 4.13. Data Protection Act
Passwords must not be shared; their strength is then of
little use. Failure to abide to rules can lead to fines or imprisonment
Magnetic Stripes: Card swiped through a 1. Data must be Fairly and lawfully processed
2. Data can only be processed for the Stated purpose
3. Data must be Adequate, Relevant and not Excessive
WWW.ZNOTES.ORG
CAIE IGCSE ICT
A system that scans documents electronically and This is a method of communication between people at 2
converts them into a bit map image (a bit is a binary digit or more separate locations
and is a 1 or a 0) It is done in real time and makes use of LAN, if internal, or
Then transmitted as a series of electrical signals through WAN if through the internet
the telephone network Uses hardware like; webcam, microphones, speakers and
Receiving fax machine converts the electronic image and monitors
prints it out on paper It also uses special software like CODEC converts and
It is also possible to generate fax signals from a computer compresses analogue data into digital data to send down
to allow documents to be sent to a fax machine digital lines
Saves printing out the document first and then passing it How it works:
through the fax machine Delegates at one end speak into a microphone and
Fax/modem software in the computer converts the image consider the webcam
into a form fax machines can be recognized The other delegates can see them and hear them
Physical Faxing: dedicated fax machine connected via using speakers and monitors
telephone line that copies and electronically sends files to However, there are several problems with these as
the dialled recipient the conference call often lags and quality not always
Electronic Faxing/Online Faxing: uses the internet to send high.
documents through computers. Also, as travelling tickets increase in price, terrorists
can use this way of communicating with each other,
Physical Faxing Electronic Faxing increasing risk
Associated with a phone no. Associated with an email
Only address and phone no.
Audio-Conferencing
Need actual fax machine, Cheaper- no fax machine,
paper, etc. paper and ink Same as video-conferencing but without webcam
No encryption Better safety- encryption VOIP is often used
The signal can get busy No busy signal issues VOIP (Voice over internet protocol) is a method used to
talk to people over internet
VOIP converts sound (picked up by a microphone) into
Email discrete digital packets that can be sent to a destination
via internet
A method for sending text and attachments from one Advantage: free and can be used all over the world
computer to another over a network Disadvantage: sound quality is usually bad
Security Issues:
Identity and service theft
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Viruses and malware Reduced chances for loss of documents as all of them
Spamming (sending junk mail) are stored on one computer
Phishing attacks (illegitimate scams) This leads to need for fewer staff and increase in
efficiency
Spreadsheets:
5. ## 5.1. can be used to calculate wage/salary slips
Calculations are easily done on this software
Spreadsheets are used to produce graphs for the
The Effects of Using ICT analysis of situations
Usage of this software has led to reduction in staff
Effects of IT on Employment Staff no longer needed to calculate wages and
salaries manually
IT led to unemployment in many areas Databases
Manufacturing - robots have taken over many tasks Updating personnel data (eg salary, home address,
and are much faster. Example in welding car bodies, phone number etc) can be done on databases
spray painting items and manufacturing circuit regularly
boards. Staff records can be centralised in one database and
Computer controlled warehouses – automatic, does data can be transferred between sites
not need people very quick and easy to use
Labour intensive work - printing industry and filing This leads to reduced need for Human Resources staff
New jobs have been created in ICT however, Databases lead to the need for remaining
Writing software staff to be retrained to use the new technology
Maintenance of robots
Internet related jobs 5.2. Effects of IT on Working Patterns
Effects on People: Part-time working: A contract where someone works
fewer hours per week than a full-time employee, in shifts.
People need to be retrained due to new technology
Flexible working (flexi-time): Workers can choose their
Cleaner working environment
working time but will have to complete the day’s work.
De-skilling of workforce
Job sharing: Two or more part-time workers divide their
Computers can now do tasks that required high skill level
Safer working environment job, replacing one full-time worker.
Compressed hours: Employees can work longer hours per
Fewer manual tasks such as heavy lifting
day but over fewer days, completing the workload sooner.
Effect on Companies:
5.3. Microprocessor-Controlled Devices
Can employ less people
Robots do not take holiday, get sick or need breaks in the Home
Greater consistency in products made
Positive effects Negative effects
Negative impact of ICT on employment Lead to more leisure time
since devices can be Unhealthy diets
introduction of ICT to the workplace has led to
programmed to do tasks
redundancies of many employees which can cause them
People become lazy and rely
to lose a source of income More time to socialize
skills such as filing and carrying out numerical analysis is
on devices
effectively replaced by sophisticated software Becoming very sophisticated
Dependency on technology
and can make use of
increases
Types of software that have impacted offices the most: embedded web technology
More wasteful society since
Word processors: Save energy - switch off
devices thrown away if they
Possible to modify and update word documents automatically
There’s no longer a requirement to store physical files fail, not economic to repair
on shelves and offices which would take up space and Easier to program device
Leaving on standby wastes
make the office look messy and full rather than set timings &
resources
No longer a need for large office space to store dates manually
documents
Documents are only printed out when required 5.4. Potential Health Problems
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Repetitive Strain Injury (RSI) Paper-based communication used to inform people about
their interests
This is when joints such as the shoulder, wrist or fingers Schools use these to inform parents about events/dates
swell, causing pain Advantages
Damage gets worse if left untreated Released regularly
Can lead to hand/arm immobility The recipients have a permanent copy
Disadvantages
Causes Prevention Requires distribution
Typing for extended periods There are no special effects; sound/video/animation
Take periodic breaks
of time There are printing costs; paper/ink
Use ergonomic keyboard &
Typing with incorrect posture Websites
mouse
Clicking on mouse
Use a wrist rest Collection of webpages, text, graphics, video and sound
rapidly/extendedly Hosted on a web server on the internet
Ensure sufficient space for Need to write code or use a web authoring application
Holding mouse incorrectly
comfortable work Hyperlinks to other pages can be added
Working in a cramped space Interactive websites require programming knowledge
Can use a camera, scanner, microphone to input data
Back Problems Usually hire space from web hosting company
Advantages
Headaches are a potential consequence Ability to add sound/video/animation
Links to other websites/hyperlinks
Causes Prevention The use of hot spots
Not sitting upright while Buttons to navigate/move around the website
Take periodic breaks
working Hit counters to see who has visited the websites
Use adjustable chairs with Disadvantages
Sitting with poor posture Can be hacked and modified or viruses introduced
good back support
Need for a computer and internet connection
Working in a cramped space Sit upright with good posture
Lack of portability compared with paper-based system
Incorrect computer screen Need to maintain website once it is set up
Keep feet flat on floor
positioning
Multimedia Presentations
Eye Problems
Uses a mixture of media to present information:
Headaches are a potential consequence animations, video, sound, transitions, hyperlinks
Produced using software packages
Causes Prevention Used with a projector so large audience can view
Staring at a computer for Advantages
Take periodic breaks
extended periods of time Use of sound and animation/video effects
Working with poor room lighting Use TFT rather than CRT Interactive/hyperlinks built into presentations
More likely to hold audience’s attention
Computer screen glare/flicker Use anti-glare screens
Disadvantages
Dirt can cause eye strain Ensure good room lighting
Need for special equipment – expensive
No direct light on screen May require internet access
Clean dirt
Music Scores
6. ## 6.1. Music samplers and mixers allow original tracks that were
recorded in a studio to be modified
Electronic instruments can play back through electronic
ICT Applications effects machines
Synthesizers combine simple wave forms to produce
complex music creations
Communication Applications Electronic organs can mimic any other instrument
Music scores can be generated from music itself using
Newsletters software
Software can automatically correct music notes in a score
WWW.ZNOTES.ORG
CAIE IGCSE ICT
There is no need to understand music notation to write a VOIP converts sound (picked up by a microphone) into
music score discrete digital packets that can be sent to a destination
Music notes are automatically printed out in the correct via the internet
format
Publicity & Corporate Image
Cartoons
Publications
Animations can be produced using computer hardware
and software Business Cards:
With 3D animations objects are designed on a computer Miniature printed documents that provide information
and a 3D skeleton is produced about the business/organisation
Parts of the skeleton are moved by the animator using key Usually printed on thick cards
frames Easily distributable to potential clients
The difference in appearance of the skeleton in these key Information includes company logo, services, address,
frames is automatically calculated by the software and is contact numbers, email, website
known as tweening or morphing Gives a professional impression
The final stage is to make a realistic image by a technique Letterheads:
known as rendering Found at the top of official printed documents to be
mailed to clients or for internal use
Flyers & Posters Makes it clear to reader who the sender is
Information includes company logo, name, address,
A Word processor/Desktop publisher is used to create it contact numbers
Need to hold minimum amount of information and be Gives a professional impression
accessible very quickly Easy to reply to
Need to make an immediate impact when people look at Flyers:
them Generally printed on single sheets of A4 paper
Anyone can produce them but there are highly skilled Handed out directly to people for promotions
professionals who can produce expert posters Cheap to produce and easily distributable (locally)
Some posters require larger printers than A4 Information includes company logo, promoted product
Sequence in which a flier or poster is produced on a or service, contact details
computer system Makes it easier to target a specific audience
A word processor or DTP application is opened Brochures:
The user creates frames, boxes and text boxes Also called leaflets & are like flyers
If necessary, photos are taken, using a camera Difference is that they are often folded into sections
The images are uploaded from the camera, loaded Left on counters for pick up rather than handed out
from a CD/DVD, scanned from hard-copy photos or Information includes company logo, promoted product
downloaded from the internet or service, contact details
The photos are saved to a file Makes it easier to target a specific audience
The photos are imported or copied and pasted into the
document 6.2. Data Handling Applications
The photos are edited and typed in or imported from a
file and then put into required style Surveys
Mobile Phones All data handling starts with data collection
Data capture forms can be used for many applications
Wireless devices that allow users to make phone calls Decide what needs to be collected and then what
from anywhere with cell reception questions should be used to collect it
They connect to the telephone system using radio signals
Paper or electronically
This requires them to be in range of a mobile tower Rules for creating forms
Used for communication via Make them look official
Phone calls Spaces should be thought about giving enough space
Text messaging for answers
Social Media Restrict the amount of possible answers, do not use
open questions
Internet Telephony/VOIP If open questions are used limit the amount of space
available for answers
VOIP (Voice over internet protocol) is a method used to
Asking for ‘Name’ needs to be carefully thought about
talk to people over internet
Are you asking for sensitive information?
WWW.ZNOTES.ORG
CAIE IGCSE ICT
People may not feel comfortable being truthful Sensors are used to send data to a computer where the
What names do you want? data is processed
First name, family name etc. The computer simply reviews the data from the sensors
Date of Birth (by comparing it to data stored in memory) and updates
What format do you want it in? its files and/or gives a warning signal if the values are
Give instructions about how to answer questions outside given parameters
How will the data be collected? No changes to the process are made
Paper surveys are scanned using OMR or OCR Examples:
Advantages Scientific experiments
Faster to get results Weather stations
Fewer errors
It is easier to do statistical analysis
Less expensive to carry out; requires fewer people
Online questionnaires Analogue & Digital Data
Usually use radio buttons
Digital data: discrete, fixed value (used by computers)
No data preparation needed
Analogue data/signals: continuous value that varies
Results sent directly to database for analysis
smoothly
Analogue device = measure length, weight,
temperature etc.
Address Lists E.g. Thermometer – represents temp. by the height of
the liquid column
An address book on a computer or mobile phone might have Sensors: measure physical and analogue qualities
a contact’s home address, phone number, email address, Analogue data from sensors needs to be converted into
personal information like the date of birth etc. digital data using an analogue to digital data converter
(ADC) so that the computer can understand and process
the data from the sensors
If the computer sends signals to motors, valves, etc. then
this data also needs to be converted to analogue using a
digital to analogue converter (DAC) so that the computer
can effectively control these devices
Need to keep a record on members usually in a database Analogue to Digital Converter (ADC)
Usually payment details, contact details and interests
It makes it easy to match people with interests and send Used when you want to attach an analogue input device to
information about what they are interested in a digital device such as a computer.
This can be done my using mail merging This is so the analogue data can be
Easy to check memberships and send out reminders understood/processed by the computer since computers
It is important to follow the data protection act only work w/digital data
E.g. When processing data sent from a sensor
School Reports
Digital to Analogue Converter (DAC)
Database applications such as SIMS store large amounts
of data which can be used to create annual and termly Used when you want to attach an analogue output device
school reports to a digital device such as a computer
Things able to be gathered from here are: E.g. If the computer is being used to control a device
Data individual to student – tests/exam results (motor/valve) the device will be controlled by variable
Student progress – target grades being met or not voltages; the DAC will be used to send out analogue
Number of absences – create a percentage of amount signals
of days attended school
Teacher comments – adds comments on to report
Pollution Monitoring
6.3. Measurement Applications
Example: monitoring oxygen levels in a river
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Sensors read data from the river (oxygen levels and Will not function in a power cut if no backup power
acidity levels using a pH sensor) present (expensive to have reliable backup power)
The data from the sensors is converted into digital using
an ADC 6.4. Microprocessors in Control
The computer stores the received data
The oxygen levels and acidity levels are compared to the Applications
historical data stored in memory and they are also
compared to alarm levels stored in memory Sensors are used to send data to a computer where the
One of two things will now happen: either the data is data is processed
transferred to a CD/DVD or to a memory stick and taken The computer reviews the data from the sensors (by
away for analysis later or the computer is connected into comparing it to data stored in memory)
a mobile phone network and transmits the data back If the values are outside the given parameters/pre-set
automatically to the monitoring station value it acts to try and get the values within acceptable
ranges
It does this by sending signals to devices controlling the
process
Intensive Care Units in Hospitals
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Disadvantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Disadvantages
Advantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT
What goes on behind the The system suggests the possible illness with a
Sequence at ATM
scenes probability of each, cures and recommendations on
PIN is checked to see if it is the next step to be taken.
The explanation system will explain how that
PIN is entered using the correct
keypad Card is checked to see if it is particular diagnosis was suggested.
valid Using 3D printers in medicine:
Surgical and diagnostic aids: A CT or MRI is used to
A number of options are
produce images of the internal parts of the body. A 3D
given: change PIN, top up
printer can then be used to reproduce the internal
mobile, see balance, get
organs as a solid object.
money
Prosthetics: 3D printers are used to print out artificial
The customer selects the body parts such as false tooth, artificial limbs, hearing
cash option & several cash aids, etc. This is a less expensive method of replacing
options are shown body parts.
The customer’s account is Tissue engineering: Used to produce layers of cells to
The customer accepts one of accessed to see if they have replace damaged tissues.
the options or types in a sufficient funds, it is checked to Design of medical tools and equipment: Tools can be
different amount see if they are withdrawing made faster and with reduced costs. They can also be
more than their daily limit made changes to easily, whereas it wasn’t the same
The customer is asked if they with traditional methods.
want a receipt
The card is returned Transaction is okay 6.11. Computers in Libraries
Money is dispensed Customer’s account is updated
Many library systems are computer controlled
They usually involve the use of barcodes on the books
6.10. Computers in Medicine being borrowed and on the borrower’s library card
The following describes a computerized library system
Patient records: Database that holds patient details and based on barcodes
can be accessed from any computer within the hospital There are two files:
intranet. Book file, containing fields for example: barcode, book
Patient identification: Barcodes on wristbands of the title, name of author etc.
patients can be used to access their patient record. Borrower’s file, containing fields for example:
Pharmacy records: borrower’s number, borrower’s name etc.
Generates labels for drugs When a borrower takes out a book, the book’s code is
Checks if the patient is allergic to a particular drug. scanned
Patient monitoring: The book details are then found on book file
Sensors measure changes in temperature, heart rate, The borrower’s library card barcode is then scanned for
breathing rate, brain activity, blood pressure, blood the borrower’s unique number
sugar levels and oxygen levels in the patient’s body. The book file is linked to the borrower’s file and both files
The analogue signals from the sensors are converted are updated to indicate which book has been borrowed
into digital signals using an analogue to digital and when it is due back
converter. The borrower’s file is interrogated daily by the computer
Graphs are produced to show trends over time. to see which books are overdue for return:
The readings are constantly compared with the pre- The computer reads a record from the book file
set values, if the values aren’t in the prescribed range, It compares the date due back with the current date
the medical staffs are notified. If the date due back is less than (or equal to) the
Hospital management system: All the above-mentioned current date (i.e. earlier date) …
points come under the hospital management system …using the barcode number of the book…
which holds all of them, and can be used to access data …the book file is linked to the borrower’s file…
from all the departments. …and the corresponding record is read from the
Expert systems: borrower’s file
The interactive screen asks a series of question for The customer details are then found and a letter or
the doctor to answers, using a keyboard or a touch email is automatically sent out
screen. The next record in the book file is then read…
The inference engine compares the symptoms with …until the whole file has been checked
the knowledge base, using the rule base to find
matches
6.12. Expert Systems
WWW.ZNOTES.ORG
CAIE IGCSE ICT
These systems have been developed to mimic the Components of an Expert System
expertise and knowledge of an expert in a particular field
Examples include: User Interface
Diagnosing a person’s illness
Diagnostics (finding faults in a car engine, finding This is the only thing that the end user sees
faults on a circuit board, etc.) Allows the user to interact with the system
Prospecting for oil and minerals Often requires training to operate effectively
Tax and financial calculations
Knowledge base
Chess games
Identification of plants, animals and chemical This is a database designed to allow the complex storage
compounds and retrieval requirements of a computerized knowledge-
Road scheduling for delivery vehicles based management system (in support of an expert
system)
Inference engine
They tend to lack common sense in some of the decision- Automatic Stock Control
making processes
Errors in the knowledge base can lead to incorrect Automatic stock control systems rely on the use of
decisions being made barcodes
It can be expensive to set up in the first place Barcodes now appear on most products sold in shops
Considerable training is necessary to ensure the system They allow quick identification of product details once the
is used correctly by the operators barcode has been scanned by a barcode reader
Supermarkets use electronic point of sale (EPOS)
terminals, which incorporate a barcode reader that scans
the barcode, retrieve the price of the article and relay
WWW.ZNOTES.ORG
CAIE IGCSE ICT
information back to the computer system allowing it to People are worried about giving their card details
update its files online.
Barcodes are made up of alternating dark and light lines Packing and postal charges are added
of varying thickness Personal services that you get from stores are
A number underneath the barcode usually consists of four missed.
parts: country code, manufacturer’s code, product code, Returning the products is harder
and a check digit No relaxation that you get from actual shopping
The check digit is a form of validation which is used to Bogus sites are present where you pay and never
make sure no errors occurred during the reading of the receive the product
barcode To seller:
Every time the barcode is read, this calculation is Advantages
performed to ensure that it has been scanned correctly No need to pay rents
No fixed working hours
Less/no shoplifting
Sell goods to customers anywhere in the world
Electronic Funds Transfer at Point of Sale (EFTPOS) Cheaper to contact customers (via e-mail)
Site warehouse where rental is cheap
Many credit cards are equipped with a chip as well as a
Sell goods 24/7
magnetic stripe – containing the PIN
Disadvantages
This system is designed to enhance security since it is
ICT knowledge needed to set up website
better than relying only on a signature
Unemployment
When paying for items using a chip and PIN card, a form
Business abroad is lost if the prices are cheaper
of electronic funds transfer (EFT) takes place
there
Paying for a meal example At times of network failures, there will be no
access
Waiter inserts card into chip and PIN reader Not everybody can access the internet, so a few
Restaurant’s bank contact customer’s bank customers are lost
Card is checked to if valid Customer’s personal data can be hacked
If card is stolen or expired, then transaction is terminated Postal charges discourage people at times
Customer enters PIN using keypad
PIN is read from chip on card and is compared to one just 6.14. Recognition Systems
keyed in
If they are the same, the transaction can proceed Automatic Number Plate Recognition (ANPR) systems:
Check is then made on whether they have enough funds A sensor sends signals to a microprocessor, which
If there are not enough funds available, transaction is instructs a camera to capture the front of a vehicle.
terminated. Otherwise, transaction is authorized OCR software is used to read the number plate from
Authorization code is sent to restaurant the image. The characters are then converted to text
Price of meal is deducted from customer’s account format in order to store it in a database
Same amount of money is credited to restaurant’s bank Processing of cheques:
account The value of a cheque is printed in special ink
Receipt is produced as proof of purchase containing iron particles when a cheque is presented.
MICR is used to read the characters at the bottom of
the cheque.
Internet Shopping A batch processing method is then used to process all
the cheques at the end of a specific time period.
Online shopping: Shopping over the internet. OMR media in schools:
To customer: School registers: Paper-based registers are fed into
Advantages OMR to be scanned and are then stored on a
Cheaper goods (the company doesn’t have to pay database.
rent for stores and doesn’t need more employees) Multiple-choice examination papers: The position of a
Wide range of products mark is stored in a computer’s memory after being
Delivery at your doorstep read by the OMR device using a template that maps
You can shop 24/7 out the X-Y coordinates of each lozenge (pen/pencil
Shop from any part of the world mark).
You save the travelling costs of going for shopping RFID in passports:
Disadvantages The data on the RFID chip is read when the passport is
Quality isn’t assured scanned.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
A photo of you is clicked which is then compared with Car park management: the system reads the
the image stored in the RFID chip. registration number and if allowed into the car park,
If the face-recognition passes, some checks are made the barrier is raised.
in turn to make sure you are eligible to enter the Electronic toll collection: the system recognizes the
country, and if you are, the gate opens automatically. vehicle and deducts the fare accordingly.
RFID in contactless payments:
The embedded chip on credit/debit cards and the
antenna enable customers to wave their card over a
reader at the point of sale terminals to make Cookies
payments
Cookies are small files sent to a user’s computer via their
Smartphone apps can also be used to make
web browser when they visit certain websites
contactless payments.
They store information about the users and this data is
accessed each time they visit the website
6.15. Monitoring & Tracking Systems For example:
They remember who the user is and send messages
Public monitoring/tracking: such as “Welcome Sarah” each time they log onto the
Ankle monitor: uses RFID chip to give out the person’s website
location and other details. It is tamper proof and will They recognize the user’s buying preferences e.g. if a
alert authorities if tried to remove. user buys CDs, pop ups related to their buying habits
Phone call tracking: the service provider tracks the will appear on the user’s screen each time they visit
calls and the exact position from which they were the website
made Without cookies, web server would have no way of
Worker monitoring/tracking: Workers are knowing that the user had visited website before
monitored/tracked in the following ways: For this reason, cookies could be used to monitor one’s
Supermarket workers: have the number of items internet activity
passing through the tills over a period of time
monitored.
Internet use is monitored by network managers: they
6.16. Satellite Systems
can check sites visited and time spent on that site
during working hours. Global Positioning Systems (GPS)
Emails can be read: Employers can check that no
Used to determine the exact location of several modes of
personal mails are sent during office hours.
transport
Delivery drivers: Their location can be tracked using
Cars usually refer to GPS as satellite navigation systems
GPS systems. It can also be checked if they are
Satellites surrounding the Earth transmit signals to the
following the shortest route and aren’t speeding.
surface
Key logging: Software that records the keys pressed by a
Computers installed in the mode of transport receive and
user on the keyboard. They are used to find username
interpret these signals
and passwords of a user.
Knowing their position on the Earth depends on very
Employee call monitors: Allows the employer to listen to
accurate timing – atomic clocks are used in the satellites
employee’s telephone calls. There are three ways it can
which are accurate to within a fraction of a second per
be used:
day
Monitor: The manager/supervisor can listen to calls
Each satellite transmits data indicating its position & time
without the employee or the customer’s awareness.
The computer on board the mode of transport calculates
Whisper: The manager can help the employee with the
its exact position based on the information from at least
call, but the customer can’t hear the manager speak.
three satellites
Barge: Both the employee and the customer can hear
the manager
Employee call monitors: Allows the employer to listen to
employee’s telephone calls. Call monitors can be used: Satellite Navigation
to improve the employee’s performance
to allow the manager/supervisor to join a call where Used to determine the exact location of a car.
necessary The computers onboard can be used to show
as a training tool directions to a destination.
Uses of Automatic Number Plate Recognition (ANPR)
systems:
Traffic enforcement: the system can check if a vehicle
is taxed, recognize cars parked illegally, cars speeding Geographic Information Systems (GIS)
or going through red lights so a fine can be imposed.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Used to capture, manage, analyse and display 3. identify the problems with the current system
geographically referenced information. 4. Finalize objectives with the clients to make sure the
Use to determine distance between two places. new system will meet their requirements
Used to find the nearest petrol station or restaurant, 5. Finalize customer requirements
etc. 6. interpret customer requirements and what needs to
To protect animal and plant life in certain vulnerable be done to achieve them
places. 7. Produce a cost-benefit analysis
Can be used in geography, science or engineering 8. Identify suitable hardware and software for the new
lessons. system
9. Produce a data flow diagram
Questionnaires
WWW.ZNOTES.ORG
CAIE IGCSE ICT
The questions can be answered quite quickly to give choices which customers can choose from (eg.
It is a relatively inexpensive method Male or Female)
Individuals can remain anonymous if they want Large fonts and visible text colours
It allows quick analysis of the data increases visibility in form so there are fewer chances
Disadvantages of mistakes
Often the number of returned questionnaire is low Drop-down menus
The questions are rather inflexible since they have to On-screen help
be generic reduces chances of error in case customers are
There is no immediate way to clarify a vague or confused
incomplete answer to a question Automatic validation
checks if entered information meets the criteria and is
Looking at Existing Paperwork acceptable
Allows the analyst to see how the paper files are kept, look at Control buttons
operating instructions and training manuals, check the when reviewing the output screen display, it is vital to
accounts, etc. check that instructions are clear, font sizes and text colour
is visible, the full screen is utilized and the size of output
Advantages
fields are correct.
It allows information to be obtained which was not
possible by any of the other methods
Verification
The analyst can see for themselves how the paper
system operates
A way of preventing errors when data is copied from one
It allows the analyst to get some idea of the scale of
medium to another
the problem, memory size requirements, type of
input/output devices needed Double entry: data is entered twice, by two different
Disadvantages people
It can be very time consuming The computer compares the two entries, either after
Because of the analyst’s time, it is a relatively data entry or during the data entry process, and
expensive method identifies any differences
Visual check: person entering the data compares the data
7.4. Design with the original document (not the same as proof-
reading)
Once the analysis has taken place and the systems
analyst has some idea of the scale of the problem and Validation
what needs to be done, the next stage is to design the key
parts of the recommended system. Process where data is checked to see if it satisfies certain
A list of tasks is summarized here criteria when input into a computer, for example, to see if the
Designing data capture forms/input forms data falls within accepted boundaries.
Designing screen layouts Validation
How it works Example
Designing output forms and reports rule
Producing systems flowcharts and/or pseudo code checks if the entered
a person’s age should
Selecting and designing validation rules that need to Range check data is within an
be 0< but >150
be used acceptable range
Selecting the most appropriate data verification crosscheck entered if ‘Senior Manager’ is
methods Lookup check data with data stored an existing option in a
Designing and agreeing the file structures and tables in an existing table query
Selecting and designing the hardware requirements
if a field needs 6
Selecting and designing the software requirements checks that the
characters, then
Producing algorithms or program flowcharts entered data has a
Length check entering 7 characters
Designing a testing strategy/plan required number of
should give rise to an
characters
error message
What to include in data input forms
a person’s name
Character No invalid characters
Heading should not contain any
check can be entered
to make clear the purpose of the form numbers
Text boxes checks that entered
date should be in the
clarity on where to enter information Format check data is in a specific
format dd/mm/yyyy
limits the information entered format
Tick boxes
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Once the system is fully tested, the next stage is to fully It is more expensive than direct changeover, since
implement it each pilot scheme needs to be evaluated before the
We will now consider changeover to the new system in next stage is introduced
more depth
There are four common methods used for changing over Phased Implementation
from the old system to the new system
Initially, only part of the new system is introduced
Each one has advantages and disadvantages which need
Only when it proves to work satisfactorily is the next part
to be weighed up before the most appropriate method is
introduced, and so on, until old system is fully replaced
chosen for a particular application
Advantages
If the latest part fails, it is only necessary to go back in
the system to the point of failure, hence failure is not
disastrous
It is possible to ensure the system works properly
before expanding
Disadvantages
This is more expensive than direct changeover, since
it is necessary to evaluate each phase before moving
to the next stage
4 Common Methods of Changing Systems
Direct
Comparing Changeover Methods
The old system is stopped overnight and the new system
introduced immediately Changeover method Direct Parallel Pilot Phased
Advantages
Relative costs Low High Medium Medium
The benefits are immediate
Input needed by the user Medium High Low Medium
Costs are reduced - since only one system is used
there is no need to pay for two sets of staff Input needed by systems
Low* Low Medium Medium
There is less likelihood of a malfunction since the new team
system will have been fully tested Impact of failure High Low Low Medium
Disadvantage
This method can be disastrous if the new system fails
7.7. Documentation
Parallel Running
Once the new system is fully developed, a considerable
The old and new systems are run side by side for a time amount of documentation needs to be produced
before the new system takes over altogether
Advantages For the end user :
If the new system fails, the old system is still available
User documentation
as a back-up
for the end user/customer to learn how to use the system
It is possible to train staff gradually
includes:
Staff have time to get used to the new system
Disadvantage how to save files
It is more expensive than direct changeover, since how to load/open the software
extra staff are needed to run both systems together how to perform a search
how to add,delete or modify records
Pilot Implementation
purpose of the system
The new system is introduced into one part of the screen layouts
company (e.g. into a warehouse of a supermarket) and its print layouts
performance assessed hardware and software requirements
Advantages error handling
If the new system fails, only one part of the company is troubleshooting guide
affected tutorials
It is possible to train staff in one area only, which is how to log in/log out
much faster and less costly than parallel running glossary of terms
The costs are also less than parallel running, since
only one part of the system is being used in the pilot For programmers
Disadvantage
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Technical documentation
for programmers or system analysts to get an overall view of Some results from the evaluation may require changes to
the system either hardware or software.
includes: Hardware may need to be updated because of:
feedback from end users
program listing/coding new technology in the market
programming language changes within the company
hardware and software requirements Software may need to be updated because of:
system flowcharts feedback from the end users
program flowcharts changes in legislation and rules
memory requirements changes within the company
file structures
sample runs
validation rules 8. ## 8.1.
Information common to user documentation and technical
documentation Safety & Security
purpose of the system
limitations of the system Physical Safety
hardware and software requirements
sample runs Ways of eliminating or minimizing
meaning of error messages Safety hazard
hazard
Use a residual circuit breaker
7.8. Evaluation (RCB), Check insulation on wires
Electrocution from
regularly, Do not allow drinks near
Once a system is up and running it is necessary to do spilling drinks
computers, Check equipment
some evaluation and carry out any maintenance, if regularly
necessary. Cable ducts- make wires safe,
this is done to compare the new system with the old Tripping over trailing
Cover wires/tuck them away, Use
system and make sure there are no limitations or wires
wireless connections
improvements to be made and that the new system works
Strong desk/tables to support
better than the old system.
heavy hardware, Use large desks
The following is a list of some of the things considered Heavy equipment falling
when evaluating how well the new system has worked. and tables so that hardware
This can ultimately lead back to a re-design of part of the doesn’t fall off edge
system if there is strong evidence to suggest that changes Have a CO2 fire extinguisher
need be made. nearby, Don’t cover equipment
Fire risk from
To evaluate the system, the analyst will: vents- can cause equipment to
overloading sockets or
compare the final solution with the original overheat, Make sure hardware is
equipment overheating
requirement fully maintained, Do not overload
identify any limitations in the system sockets with too many items
identify any necessary improvements that need to be
made Health Safety
evaluate the user’s responses to using the new system
compare test results from the new system with results
Ways of eliminating or minimizing
from the old system Health hazard
hazard
compare the performance of the new system with the
performance of the old system Back and neck
-use adjustable chairs for sitting
observe users performing set tasks, comparing old problemsfrom \n sitting
with correct posture \n -use
with new in front of the computer
footrests \n -use screens that can
measure the time taken to complete tasks, comparing screen for \n long
be tilted according to user’s choice
old with new periods of time
interview users to gather responses about how well
the new system works
give out questionnaires to gather responses about the
ease of use of the new system
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Personal Data
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Never use your real name, only use a nickname The creator sends out a legitimate looking email hoping to
Use appropriate language gather personal and financial information from the
Do not enter private chat rooms, as users can lure you recipient of the email
into giving personal information by seeming too nice. The message appears to be from a legitimate source (e.g.
Do not meet anyone off the internet for the first time on a famous bank)
your own, or at least speak to a trusted adult first. When the user clicks on the link, they are sent to a fake
Do not misuse images (of someone to blackmail them, for website that looks exactly like the real one
e.g.) They will be asked for personal info e.g. credit card
Respect the confidentiality of other users details, PINs
Never arrange to meet anyone you met online in person This could lead to identity theft
ISPs attempt to filter out phishing emails
Online Games this can lead to theft of financial data, identity theft and
fraud
Similar measures apply to that taken when using social Smishing is similar to phishing but instead of emails, SMS
media. messages are sent to the recipient, encouraging them to
Additionally, players should be careful about: click on an unknown link and give their personal
In-game violence information
Cyberbullying Vishing is voice mail phishing. this method uses voice mail
Keeping their webcams off (other potentially message to trick the user into calling the telephone
dangerous players have direct access to your image) number mentioned in the message
Predators may use voice masking technology to lure a
user to reveal their age, sex etc. Prevention
Cyber-attacks involving viruses, ransomware, etc.
Always be cautious of opening emails from unknown
sources
Security of Data online Don’t click on attachments that end in .exe, .bat, .com or
.php
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Spyware and key-logging software Websites/pop-ups can be made to mimic legitimate ones,
or seem too good to be true, for e.g.lotrei.net instead of
This is software which gathers data based on the key lottery.com
presses or clicks made on the keyboard; the gathered
data is sent back to the person who put the software on a
computer system
It can give the hacker access to data entered by the user
which can include passwords or bank account details
The software is able to install other spyware, read cookie
data and also change the user’s default browser
Prevention
This is program code that replicates or copies itself when There are two types of forums:
installed onto a computer
Is used to delete or corrupt files on a computer or cause a Moderated Forums Unmoderated Forums
computer to malfunction Has a moderator who checks
No moderator who checks the
Can cause the computer to become unresponsive comments before they are
comments
posted
Prevention
There will be no spams or Spams, rude and offensive
Use anti-spyware software rude and offensive comments comments present
Don’t download software from unknown websites Diversions from topic are
No diversions from the topic
It is advisable to not open emails or messages from possible
unknown senders Highly secure due to Personal information can be
moderation obtained from you
Spam
Not secure due to lack of
Spam is electronic junk mail and is a type of advertising moderation
from a company sent out to a target mailing list
Harmless but can clog up networks and slow them down
It is more of a nuisance than a security risk
Many ISPs are good at filtering out spam, and prevent the
Security of data online
user from getting these spam emails.
It is often necessary to put a legitimate email address into Encryption
a contact list to ensure wanted emails are not filtered out
by mistake The conversion of data to code by encoding it
Done by using encryption software
Preventing Phishing, Pharming & Smishing Since data is encoded, it appears meaningless to a hacker
This technique prevents illegal access
User education Necessary to use decryption software to decode the data
Set up anti-malware and anti-spyware software Used to protect sensitive data e.g. banking details
Enabling protocols such as SPF and DKIM Encryption keys are complex algorithms which makes
Do not download random .exe (executable file formats), codes almost unbreakable
.php, .bat, .com etc.
Users should be alert when being redirected to other Secure Socket Layer (SSL)
websites.
If a person on the internet is asking for personal Type of protocol that allows data to be sent and received
information, or to meet in real life or acting suspicious, securely over the internet
they should be reported to cyber security agencies, or When a user logs into a website, SSL encrypts the data
one’s parents/guardians. https or padlock symbol in the status bar
WWW.ZNOTES.ORG
When a user wants to access a secure website: If password is forgotten on a website, it will be sent on
User’s web browser sends a message so it can your e-mail
connect with the required website which is secured
with SSL
Web browser requests that the web server identifies Cloud Storage
itself
Web server responds by sending a copy of its SSL Your data is stored remotely and not on your computer,
certificate so you don’t have control over the physical security of
Web browser checks if the certificate is authentic your data.
Sends signal back to the web browser Some of the data stored may be personal data which are
Starts to transmit data once connection is established open to hackers, and have to be encrypted in order to
If not secure, browser will display an open padlock prevent hackers from obtaining them.
The company providing the storage may go out of
Firewalls business. In this case what has to be done to the data will
have to be considered.
A firewall sits between the user’s computer and an The company providing the storage will have to put in all
external network (internet) and filter information in and its efforts and safety measures in order to keep your data
out of the computer safe.
Tasks carried out by firewall: If the company providing the storage doesn’t backup your
Examining ‘traffic’ data, you may lose it in case of power cuts or fires, etc.
Checking weather incoming or outgoing data meets
criteria Biometric data
If data fails the criteria, the firewall blocks ‘traffic’
Uses features of the human body unique to every
Firewall can keep a list of all undesirable IP addresses
Helping to prevent viruses or hackers entering the individual, such as fingerprints, retina, iris, face and voice
user’s computer recognition. It is used in authentication techniques as it is
very difficult to replicate
Features of a secure webpage: Advantages:
Usernames or passwords don’t have to be
Webpage URL: if the webpage is secure, it will start with remembered
‘https’ instead of ‘http’ Almost impossible to replicate body parts
padlock symbol No one else can gain access, like with a stolen card
They cant be forgotten anywhere as it is part of the
body
Authentication
Disadvantages:
The readers are expensive
-Used to verify that data comes from a trusted source
Damages in fingerprints can deny access
-Works with encryption to strengthen internet security
Some people worry about the privacy issues with their
personal information being stored
User IDs
After typing in User ID, the user will be requested to type Key logging/spywares: records the keys pressed on a
in their password. keyboard.
Passwords are shown as starts (***) so nobody Can be used to obtain credit card details, passwords
overlooking can see it and personal information.
To help protect the system, the user has a certain number Use virtual keyboards to type in password.
of attempts allowed before they will be locked out of the Install anti-spyware software.
system Bogus sites: sites that look exactly like the original sites,
If password is forgotten, the administrator must reset it but aren’t.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Potential Problems Some software will only run if a memory stick is plugged
in USB ports
If products are not built towards a specific audience well
then problems may arise
An older audience may not be able to understand or read
text due to poor font design Creating ICT Solutions
A younger audience may not be able to understand
ICT solutions, for e.g. a website should be made in
certain text due to complex wording & structure
accordance to the legal, moral, ethical and cultural beliefs
Several audiences may just not find content interesting
of the target audience.
since it is not relevant enough to them
Several audiences may not find content attractive enough
and thus not purchase or use it at all
Younger & older audience may not understand how to use Implications of ICT Solutions
the product due to lack of simple instruction
When creating an ICT solution, all the following have to be
9.2. Legal, Moral, Ethical & Cultural considered and the solution must be made in response
and respect to these factors:
Appreciation Legal: Ensure copyright laws are abided by including
not using any coding or branding from existing
Copyright Legislation copyrighted software.
Morality: To distinguish from right or wrong.
A law that protects books, music art and other media that Sometimes it may not be illegal to carry out an act
are written is copyright law however it could be against your morals. For example,
It is an automatic right and does not need applying for setting up a fake website to deceive is not illegal but
The person who owns the rights must be asked before questions your level of morality.
it can be used again Ethics: Is to break a code of conduct. For example,
Software is a specific thing created and written on a disclosure of information about the new software to a
computer rival software publisher or to the press.
Needs to be protected as it is so easy for people to Culture: When software is released in different
copy cultures then care must be taken so that people are
This is a way of protecting software from being used not offended. If certain computer games mock religion
without permission
or cultural beliefs, then again this could cause offence.
Users create a license which determines the terms
and conditions
10. ## 10.1.
Copyright Laws Communication
It is not legal to make a copy of software, then sell it or
give it away to other people Email
Software cannot be used on a network unless a network
license has been acquired National Laws
Not legal to use coding from software in your own
software without permission In some countries, emails are monitored or read, thus
Renting out software without permission is illegal limiting the topics on which you can speak.
It is illegal to use the name of copyrighted software
without permission Acceptable Language
Security
WWW.ZNOTES.ORG
CAIE IGCSE ICT
csv
Comma Separated
Store tabular data
Styles
Value
Graphics Interchange Several organisations use a ‘corporate house style or
gif Moving images
Format corporate branding, which is used to print on websites,
Hypertext Mark-up visiting cards, letters, etc. It refers to a specific style of
htm Webpages fonts and formats used in the making of ICT solutions by
(Language)
organisations.
Joint Photographic
jpg Standard for images A corporate house style when used effectively identifies
Experts Group
the users of the style.
Documents to be Consistent styles enable users to associate a particular
Portable Document
pdf circulated over the organisation with a style and also show consistency in the
Format
internet/email ICT solutions created by the organisation
Portable Network
png Compressed images
Graphic
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Host port to be used for upload being tested, it makes to check if all the hyperlinks are
Username and password redirecting the user to the correct webpage/ section of
The test plan used to test a webpage must be justified the webpage.
based on the elements being tested. E.g. If hyperlinks are
CAIEIGCSE
IC