0% found this document useful (0 votes)
25 views30 pages

Znotes

The document provides a comprehensive overview of the CAIE IGCSE ICT syllabus, focusing on audience appreciation, planning ICT solutions, copyright principles, and effective communication methods. It emphasizes the importance of understanding audience needs, copyright protection, and proper email etiquette, while also detailing the characteristics and risks associated with internet usage. Additionally, it discusses safety and security measures related to ICT devices, including physical safety concerns.

Uploaded by

aiden3inches210
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views30 pages

Znotes

The document provides a comprehensive overview of the CAIE IGCSE ICT syllabus, focusing on audience appreciation, planning ICT solutions, copyright principles, and effective communication methods. It emphasizes the importance of understanding audience needs, copyright protection, and proper email etiquette, while also detailing the characteristics and risks associated with internet usage. Additionally, it discusses safety and security measures related to ICT devices, including physical safety concerns.

Uploaded by

aiden3inches210
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 30

ZNOTES.

ORG
UPDATED TO 2023-2025 SYLLABUS

CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Roronoa for personal use only.
CAIE IGCSE ICT

1. Audience
1.1. Audience Appreciation
To express gratitude and value for the users by providing helpful and relevant information, fostering
positive experiences, and contributing to their understanding and learning.

Planning ICT Solutions


 The first step to building effective ICT solutions is identifying and understanding the intended
audience's needs. These needs can be functional, like processing information, or aesthetic, like
a visually appealing interface.
 After identifying the needs, select the appropriate technology and tools to create a solution.
This choice depends on factors like the complexity of the task, the budget available, and the
technical expertise of the users.
 An essential aspect to remember while designing ICT solutions is to ensure they are user-
friendly. This means they should be intuitive to use, require minimal training, and have easy-
to-understand instructions.
 Additionally, ICT solutions should be accessible to all users, including those with disabilities.
This could involve adding features like voice commands, larger text options, or compatibility
with assistive devices.
 Once the solution is created, it is crucial to test it to ensure it functions as expected and fulfils
the users' needs effectively.

Analysing Audience Requirements


 Designing an ICT solution requires an understanding of the target audience. The study should
consider elements affecting the audience's capacity to use the solution, like age, technical
proficiency, and expertise.
 The solution creator should know the audience's requirements for information. This could serve
as a design cue for the data processing elements and the information architecture.
 How the audience utilizes and consumes the content also influences the design. For instance,
the answer should be mobile-friendly if the audience accesses it mostly through mobile
devices.
 Finally, the designer should consider any unique requirements of the audience, such as visual
or auditory impairments. These requirements should be taken into account when designing the
solution ensuring inclusivity.

1.2. Copyright
What makes Copyright Necessary?
 Copyright regulation is crucial to safeguard the rights of developers and innovators.
 It stops software piracy, which is unauthorised use, replication, or distribution.
 It guarantees developers receive compensation for their efforts, fostering additional innovation
and development.

Principles of Copyright in a Computer Software


 Copyright law prohibits the unauthorized copying, distribution, or modification of software.
 It also includes the End-User License Agreement (EULA), which outlines what the software can
and cannot be used for
 Violations of these principles, such as software piracy, can lead to legal consequences.

Preventing Software Copyright Violation

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Software developers employ various copyright protection strategies, such as Digital Rights
Management (DRM).
 Due to DRM methods and systems, copyrighted works are subject to usage, modification, and
distribution restrictions.
 Other techniques include software product activation, which needs a unique code to be fully
functional.
 Given that pirated software frequently cannot receive automatic upgrades, which renders it
less effective and secure over time, automatic updates may also serve as a kind of copyright
protection.

2. Communication
2.1. Communication with Other ICT users
Using E-mail
E-Mail
Uses:

 Email is a technique of sending and receiving messages and files via the Internet.
 It is employed in personal communication, business communications, and marketing.
 Acceptable language must be used based on the email's recipient, for example, professional
when composing a work-related email.
 Employers frequently establish requirements for professional language, substance, and email
frequency.
 Email security is critical to preventing sensitive data from being accessed or manipulated.
 Netiquette is the proper conduct and politeness when using email.
 Don’t be abusive
 Don’t send spam
 Be clear and concise with your message
 Remember that posts are usually public and can be read by anyone.
 Always check your spelling and grammar.
 Respect people's privacy and do not discuss or publish information that might
embarrass somebody.
 Forgive people’s mistakes
 Do not use CAPITAL LETTERS to highlight comments
 Do not plagiarize
 Do not use too many emoticons, as they might annoy your readers.
 Email groups enable mass communication to a specific group of subscribers.

Guidelines set by employers:


WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 It is up to companies to decide if personal emails should be permitted on their systems


 Companies may specify which company devices are allowed to be used
 There needs to be a company standard style when sending emails
 It must be made clear what email content is not permitted
 Employees should be told only to use their accounts when sending emails
 There must be clear rules regarding the confidentiality of information
 Staff need to be aware of the method and duration of storing emails
 Incoming emails should only be read by the recipient
 Company policy on how to deal with and prevent viruses must be laid out
 Monitoring of emails may be carried out, and staff must be aware that the company has the
right to read all emails
 Suitable ongoing training will take place to ensure staff follow company policy at all times

Carbon Copies (Cc) and Blind Carbon Copies (Bcc)


 Carbon copies are used to send the email to multiple recipients.
 Blind carbon copies are made to send the email to multiple recipients without them
acknowledging that it has been sent to other recipients.
 Forward enables users to send an already existing email to a new recipient.
 To attach files to be sent with an email, we make use of Attachments.

Spam
It is defined as any unwanted email delivered via the Internet. These can range from annoying to
genuinely harmful, as they may contain viruses.
The main disadvantages are:

 wasting time
 annoying people
 using up valuable bandwidth on the internet, thus slowing it down
 may have viruses or be a part of a phishing scam
 can take up significant space in user inboxes

To minimize the spam you receive:

 use spam filters


 avoid disclosing your email address publicly
 don’t click on links in spam emails or reply to them

2.2. Effective Use of the Internet


Characteristics of the Internet:
 Allows individuals from all around the world to connect and chat with one another
instantaneously
 It runs on a distributed network design, which means a single central authority does not
control it.
 It is mainly used for transmitting data in a variety of formats, such as text, photos, audio, and
video.

Uses of the Internet:

 A vital communication tool that allows people to communicate via emails, instant messaging,
and other means.
 It acts as a massive database of information on almost any subject
 The Internet has transformed business by offering a platform for online purchasing, electronic
payments, and digital transactions, allowing enterprises to reach global consumers.

Advantages of the Internet:

 users have access to an incredible amount of information, empowering them to learn


 enables individuals and businesses to connect and communicate with people from different
parts of the world in real-time
 the Internet has made many things easier to complete, thus providing simplicity and
effectiveness

Disadvantages of the Internet:

 Raises data security and personal privacy hazards through the possibility of identity theft, data
breaches, and online monitoring.
 The spread of propaganda, fake news, and misinformation due to the simplicity with which
content can be created and distributed online.
 The digital divide resulting from unequal Internet access threatens to widen existing
disparities.

The differences between the internet, intranet, and extranet:


WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Definition:
 The Internet is a vast network of linked computer networks and gadgets that
communicate with one another using the Internet Protocol Suite (TCP/IP).
 The intranet is a secure network that operates within an organization using internet
technologies and protocols, such as TCP/IP.
 Extranets are managed private networks that can give access to third-party users and
give users, such as partners, suppliers, or clients, safe access to a portion of the
intranet.
 Accessibility:
 The Internet is open and accessible to the public, allowing users to access a wide
range of information, services, and resources worldwide.
 Intranets are restricted to internal users and typically secured by firewalls and other
security measures to maintain the security of critical corporate data.
 Extranet provides authorized external users only limited access, in contrast to the
internet, which is public, or the intranet, which is entirely restricted. To access the
extranet, these users need a secure login.
 Purpose:
 The Internet acts as a hub for intercultural dialogue, the sharing of knowledge, and
access to a range of Internet resources, including websites, email, social media, online
shopping, and more.
 An intranet's main goal is to make it easier for employees to communicate, work
together, and share information.
 Extranets make it easier for external stakeholders to collaborate and communicate
with a company. It enables the organization and its reliable clients or partners to share
information, documents, and resources securely.

Many use the terms “Internet” and “World Wide Web” interchangeably. However, they can’t be used in
the same context:
- The internet refers to the global network of computers and other devices connected through routers
and servers. However, the World Wide Web is a collection of websites and webpages
accessed via the Internet.

The Functionality of the Internet


 Internet service providers (ISP): A company that provides internet access. Typically, a
monthly fee is charged for this service. Users' accounts are created when registering with an
ISP and acquiring login information such as user ID and password.
 Uniform Resource Locator (URL): The address of a web page on the WWW. It is a text-
based address that uniquely identifies the location of any resource available on the internet.
The three main components are:
 Protocol:
 It is the communication protocol used to transfer data between the client and the
server
 E.g. HTTP, HTTPS, FTP, and others
 Domain:
 it is the name of the server where the resource is located
 it can be a name or an IP address
 Webpage/file name:
 it is the location of the file or resource on the server
 it can contain the name of the file or directory where the resource is located
 A URL looks like this:
 protocol://domain/path/filename
 E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is a URL that consists of the HTTPS
protocol, the domain name "www.hoddereducation.co.uk", the path is “IGCSE” and the
filename is “ICT”
 A hyperlink is a word/phrase/image which references data that the reader can follow by
clicking or tapping, usually taking you to another web page
 A web browser is a software application used to locate, retrieve, and display content on the
WWW, including web pages, images, video, and other files

Use of Search Engines


There are two fundamental methods for obtaining information via the Internet. The first method is to
enter the URL if you know the website's address. If you don't know where to look, the second option is
to employ a search engine to locate the information you seek.
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Advantages of using the Internet to find information


 information tends to be up to date because it is quicker and easier to amend
 The Internet has vast amounts of information
 searching for information using a search engine is fast and easy
 people can look for information in the comfort of their own home
 information on the internet is essentially free of charge
 webpages may have multimedia elements, making learning more interesting
 Disadvantages of using the Internet to find information
 it isn’t regulated; anything can be posted
 always the risk of accessing inappropriate websites
 too easy to be distracted by the many distractions available on the internet
 Some research skills are lost when using the internet, as search engines do all the
work for you.

Speed of Searching
 Search engines may scan billions of online pages to locate matches to your search query in a
fraction of a second.
 Your internet connection and the effectiveness of the search engine's algorithms influence the
speed.

Amount of Information
 Because search engines can deliver a deluge of information, utilising particular and relevant
search phrases is critical.
 Adding quotation marks for specific phrases, "+" signs for required terms, and "-" signs for
omitting terms can help narrow the search.

Finding Relevant and Reliable Information


 The search engine algorithm determines the relevancy of information by considering
parameters such as keyword frequency & page quality.
 Reliable information is often obtained from recognized sources such as educational,
government, or well-known industry websites.

Evaluating Information Found on the Internet


 Although the internet provides much information, not all are genuine or dependable.
 Consider the source's reputation and trustworthiness when determining the information's
dependability.
 Check the accuracy of information by comparing it to other reliable sources.
 Assess whether the information is skewed, keeping an eye out for views pushing a particular
point of view.
 Check if the material is current, as obsolete information might be deceptive.

Internet Protocols
Protocols are rules on which the sender and recipient agree when data is exchanged between devices.
1. Hypertext transfer protocol (HTTP): when a web page is being accessed, entering http:// at the
front of an address tells the web browser that ‘HTTP rules’ for communication are to be obeyed.
2. Hypertext transfer protocol secure (HTTPS): A secure version of HTTP that encrypts data for
security.
3. File transfer protocol (FTP): network protocol used when transferring files from one computer to
another over the internet. It is similar to HTTP, but the protocol specifically transfers files.
4. Secure sockets layer (SSL): a protocol that allows data to be sent and received securely over the
internet.

Risks of Using the Internet


 Inappropriate and unlawful content: The internet may attract people to potentially dangerous
or illegal materials.
 Data restriction: Parental, educational, and ISP restrictions can all be used to restrict access to
specific information or websites.

3. Safety & Security


3.1. Physical Safety
1. Electrocution: ICT devices require electrical power to charge or run; the electrical device can
cause electrocution, caused by the electric current moving through a body, causing fatal injuries
and/or death.
There are multiple causes for electrocution, including:
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Contact between liquid substances and electronic devices: Keep liquids away from
electrical equipment.
 Open cables: Ensure that cables are entirely insulated and packed, and use circuit
breakers or fuses to prevent electrical overload.

2. Fire: ICT devices require electricity to charge or run; too many devices using a single socket can
cause the plug socket to overload, and heat is generated by too much electricity, causing the wiring to
degrade and ignite a fire.
The causes and reduction tactics for fire include:

 Socket overload: Ensure enough plug sockets in the room, don’t plug too many devices into
the same socket, and don’t leave devices plugged in and unattended.
 Overheated equipment: Ensure that equipment is properly ventilated and not obstructed,
keep flammable materials away from heat sources, regularly check equipment for signs of
wear or damage, use fire extinguishers in case of emergencies, turn off or unplug devices
when away from the location, do not cover any air vents on devices.

3. Trailing cables: Devices can be plugged in using cables. Cables that are protruding can cause an
accident; you can trip over a cable left out in a location, and body damage can occur during a fall, for
example, breaking bones, ligament damage, bruising, sprains, etc. depending on the area fell on
Trailing cables causes and prevention strategies:

 Unorganized/insecure cables: use cable ties to secure cables, keep cables packed correctly
in, let’s say, a table, therefore not coming in the way of walking paths, use wireless devices
where possible, and regularly inspect cables for signs of wear or damage.

4. Heavy falling equipment: Devices have varying levels of weight, and if a device falls on you, it
could cause injury; any device should be placed in a secure location, like a PC on a solid desk and not
near the edge.
Causes and reduction tactics for falling equipment:

 Improperly secured equipment: Ensure that equipment is properly secured and stable.
Regularly check the stability of locations containing devices.
 Equipment on unstable surfaces: Keep equipment away from edges and other potential
hazards, and regularly inspect equipment and locations containing devices for signs of wear or
damage.

3.2. eSafety
Data Protection
The Data Protection Act (DPA) controls personal data collection, storage and processing.

 In the UK, the European Union’s General Data Protection Regulation (GDPR)
 Protects personal data, whether stored on paper or a computer system

Principles of the Data Protection Act


 Data must be processed lawfully, fairly, and transparently, with clear consent from the
individual.
 Data should only be collected for specific, explicit, and legitimate purposes.
 Organizations should only collect and retain the minimum personal data necessary for their
stated purpose.
 Data should be accurate and up-to-date, and reasonable steps must be taken to rectify or
erase inaccurate information.
 Personal data should not be kept longer than necessary and should be securely deleted when
no longer needed.
 Organizations must protect personal data against unauthorized or unlawful processing,
accidental loss, destruction, or damage.

Why is data protection legislation required?


 Protecting Individual Rights: Data protection legislation safeguards individuals' right to
privacy and control over their personal information.
 Preventing Misuse of Personal Data: It helps prevent unauthorized access, identity theft,
fraud, and other forms of data misuse.
 Promoting Trust: Data protection laws build trust between individuals and organizations by
ensuring their personal information is handled responsibly.
 Encouraging Responsible Data Handling: Legislation promotes responsible data collection,
storage, and processing practices among organizations.
 Enabling Data Subject Rights: Legislation grants individuals rights such as access to their
data, right to rectification, erasure, and objection to processing.

Personal Data

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Refers to information that can be used to identify an individual


 Examples
 Personal Name
 Address
 Date of birth
 A photograph in school uniform
 Medical history
 Threats that can be avoided by protecting personal data:
 Identity theft
 Privacy breaches
 Misuse of the information
 Data be sold to third-party companies
 Individuals could be held to ransom over personal data gathered
 could be used to commit a physical crime
 How to avoid inappropriate data disclosure:
 Personal data must be kept confidential and protected through privacy settings on
websites such as social media or strong passwords on websites where personal data is
held or used
 Access to personal data should be limited to authorized individuals
 Think before you post - consider what information could be gathered from your image
or content
 Check website details about the collection, storage, and use of personal data
 Only access websites where personal data is used or viewed when on a secure,
encrypted connection

eSafety
 E-safety is knowing about and using the internet safely and responsibly.
 It refers to when an individual is using the internet, email, social media, or online gaming.
 E-safety refers to the individual knowing how to protect themselves from potential dangers and
threats.

The Need for eSafety


 Awareness that personal information should not be shared freely
 Awareness of how to act online and avoid falling victim creates a safe and respectful
environment.
 Identify and avoid online scams, phishing attempts, and fraudulent websites that may try to
trick them into sharing personal or financial information.
 Mindful of online behaviour and interactions, protecting your digital reputation, which can have
long-term consequences in your personal and professional life.
 Control privacy settings on social media platforms, limiting who can access/view personal
information and posts.
 Avoid encountering explicit or harmful content online, reducing the risk of exposure to
inappropriate material or online predators.
 Engage in online gaming responsibly, avoid sharing personal details, and behave respectfully
towards other players.
 Protecting devices from malware, viruses, and other online threats, preventing data loss,
privacy breaches, or device damage.
 Develop responsible online behaviours, promoting respectful conduct while interacting with
others online.
 Maintain a healthy balance between online and offline lives, reducing the risk of addiction,
mental health issues, or negative impacts on relationships and self-esteem.

Safety Suggestions

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

3.3. Security of Data


Threats
There are multiple methods by which data can be threatened, including:

 Hacking: Unauthorized access to computer systems or networks to gain control, steal


information, or cause damage, thus leading to identity theft, privacy breaches, and misuse of
data
 Phishing: Deceptive emails or messages that are received from trusted sources to trick
individuals into revealing personal data
 Pharming: Manipulation of DNS (Domain Name System) to redirect users to fraudulent
websites, often to steal personal data
 Smishing: Phishing attacks carried out through SMS or text messages
 Vishing: (aka voicemail phishing) Phishing attacks carried out through voice messages to trick
users into calling the telephone number contained in the message
 Viruses and malware: Viruses are program codes that can replicate/copy themselves to
cause data loss or corruption. Malicious software designed to disrupt, damage, or gain
unauthorised access to computer systems or networks
 Card fraud: Unauthorized use of credit or debit card information for fraudulent purposes
caused by shoulder surfing, card cloning, or keylogging.

Protection of Data
Multiple techniques are implied for the protection of data, inclusive:
1. Biometrics:

 Individuals' distinctive physical or behavioural traits, such as fingerprints, faces, or irises, can
be used for access control and verification. Since biometric data is hard to fake or duplicate, it
offers a more secure form of identification.

2. Digital certificate:

 A digital record that attests to a website's reliability and integrity. A digital certificate is used to
provide safe communication and to build confidence between parties. Identifier data, the
entity's public key, and a third party's digital signature are frequently found in digital
certificates.

3. Secure Socket Layer (SSL):

 A protocol that creates a secure connection between a client computer and a server. SSL
ensures that information communicated between a server and client stays private and cannot
be intercepted or changed by unauthorized parties. A website's identification for it is the S at
the end of HTTP.

4. Encryption:

 It is creating data in a format that cannot be read without a decryption key. Data on hard
drives, emails, cloud storage, and secure websites (HTTPS) are all protected by encryption.
Without a decryption key, it assures that even if unauthorized people obtain data, it cannot be
decoded.

5. Firewall:

 A firewall is a network security device that monitors and manages incoming and outgoing
network traffic. Its goal is to separate an internal network from other networks by filtering data
according to established criteria. It assists in preventing malware, unauthorized access, and
other network risks.

6. Two-factor authentication:

 A security mechanism that requests two different kinds of identification from users to confirm
their identity. To provide additional protection outside of just a username and password, 2FA
was created. Typically, it combines something that uniquely identifies a user, like biometric
data, with something the user has, like a smartphone and a token or something they know, like
a password.

7. User ID and password:

 A typical authentication technique uses a password plus a secret code (user ID) to identify. To
strengthen data security, user IDs and passwords restrict access to only authorized users.
Using secure passwords and changing them frequently is critical to ensure security. When
creating passwords, it is advised to utilize a mix of uppercase, lowercase, digits, and special
characters.

4. ICT Applications
4.1. Communication
Newsletters and posters

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Paper-based communication is used to inform people about their interests


 Schools use these to inform parents about events/dates
 Advantages
 Released regularly
 The recipients have a permanent copy
 Disadvantages
 Requires distribution
 There are no special effects, sound/video/animation
 There are printing costs, paper/ink
 The targeted audience may or may not receive the information

Websites
 Collection of webpages, text, graphics, video, and sound
 Hosted on a web server on the internet
 Need to write code or use a web authoring application
 Hyperlinks to other pages can be added
 Interactive websites require programming knowledge
 Can use a camera, scanner, and microphone to input data
 Usually, hire space from the web hosting company
 Advantages
 Ability to add sound/video/animation
 Links to other websites/hyperlinks
 The use of hot spots
 Buttons to navigate/move around the website
 Hit counters to see who has visited the websites
 worldwide advertising capability
 Disadvantages
 Can be hacked and modified, or viruses introduced
 Need for a computer and internet connection
 Lack of portability compared with the paper-based system
 Need to maintain the website once it is set up
Multimedia Presentations
 Uses a mixture of media to present information: animations, video, sound, transitions,
hyperlinks
 Produced using software packages
 Used with a projector so a large audience can view
 Advantages
 Use of sound and animation/video effects
 Interactive/hyperlinks built into presentations
 More likely to hold the audience’s attention
 Disadvantages
 Need for special equipment – expensive
 It may require internet access
 Distracts the audience from the sole content of the presentation
 It is very easy to make a presentation with too many features

Media streaming
 Real-time transition of audio and video files over the internet
 allows users to access content without downloading it to their devices
 popular services include Spotify, YouTube, and social media websites
 uses buffering, which makes sure the video plays back smoothly without freezing. While the
buffer receives data packets, it sends previously received ones to the playback device so that
there are no gaps in the played data
 Advantages
 Users can access any information at any time and from any location
 Offers an extensive library of content
 Compared to traditional cable or satellite TV subscriptions, media streaming can be
more cost-effective
 Disadvantages
 Heavily relies on a stable and high-speed internet connection.
 Not all content is available on every streaming platform due to licensing agreements
and exclusivity deals.
 You don’t own the media when streaming media, so if the streaming service removes a
movie or a TV show from its library, it may no longer be accessible to you.

ePublications

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 digital versions of printed materials, such as eBooks, eMagazines, and eNewspapers.


 It can be read on electronic devices.
 Advantages
 aid portability
 they are often more affordable than paperback books.
 Offer interactive elements that enhance the reading experience.
 Disadvantages
 reading from an electronic device for a prolonged time can cause eyestrain
 ePublications lack the tactile experience and physical presence that some readers
enjoy
 compatibility issues can arise if the ePublications is in a format that is not supported by
the reader's device or software

Mobile Communication
Mobile devices support many forms of communication, such as:
1. Short message service (SMS) messaging: permits extremely quick communication with another
person via typing on a keyboard (a mobile phone or tablet's keyboard is frequently virtual). Its benefit
is that the recipient can get the text whenever they choose without being available.
2. Phone calls: Making calls while on the go is among the most fundamental applications of a mobile
phone. Mobile phones are the perfect method to stay in correspondence anywhere there is a network
signal because they are compact and have an independent battery.
3. Voice over Internet Protocol (VoIP): a communication technique for Internet users. VoIP
transforms sound captured by the built-in mic of the cell phone into individual data packets that may
be transmitted via the internet to their intended recipient.
4. Video calls: enables real-time video conversing between multiple participants with a camera-
enabled device. Uses an internet connection or cellular data. Software that may be used for video
calling includes FaceTime, Skype, and Zoom.
5. Accessing the Internet: Another helpful feature is accessing the net from a mobile device. Any
mobile device with a wireless broadband connection or a mobile phone network can link to the
internet.

4.2. Modelling Applications


Advantages of using models:

 using models is less expensive than having to build the real thing
 safer to use a computer model
 allows you to try out various different scenarios in advance
 nearly impossible to try out some tasks in advance in real life due to high risk
 faster to use a computer model than to do the real thing

Disadvantages of using models:

 a model can’t be completely reliant as the output is entirely based on the input
 frequently, computer modelling can be a very costly option
 human reluctance is a common problem in this technology

Some of the applications of computer modelling include:


1. Personal finance: Computer modelling involves using mathematical algorithms and data analysis
to simulate various financial scenarios, such as investment strategies, retirement planning, and risk
assessment, aiding individuals in making informed decisions and optimizing their financial goals.
2. Bridge and building design: Computer modelling is crucial in bridge and building design. It
allows engineers to simulate and analyze structural behaviour, assess load capacities, and predict the
response to external forces. It aids in optimizing designs, ensuring structural integrity, and minimizing
potential risks before construction begins.
3. Flood water management: Computer modelling plays a vital role in flood water management by
simulating water flow behaviour, predicting flood extents, and assessing potential flood risks. It helps
design and optimise flood mitigation measures, such as levees and floodplain zoning, allowing
authorities to make informed decisions, develop effective emergency response plans, and minimize
the impact of flooding on communities.
4. Traffic management: Computer modelling simulates and analyses traffic flow, predicts congestion
patterns, and optimises traffic control strategies. It aids in designing efficient road networks,
optimizing signal timings, and evaluating the impact of transportation infrastructure projects. This
enables authorities to make informed decisions, alleviate congestion, and improve overall traffic
efficiency for better urban mobility.
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
5. Weather forecasting: Computer modelling plays a pivotal role in weather forecasting by
simulating the Earth's atmosphere, oceanic conditions, and other environmental factors. These models
use complex algorithms to predict weather patterns, including temperature, precipitation, wind speed,
and storm systems. By assimilating real-time data, computer models provide forecasts that aid
meteorologists in predicting weather conditions, issuing warnings, and helping society prepare for
potential hazards.

 Advantages of using computer modelling rather than humans:


 It can provide more precise and accurate results than human-based methods,
minimizing errors and increasing reliability.
 Can analyze large amounts of data and perform complex calculations faster than
humans
 It can be reused and updated easily, reducing the need for repetitive manual analysis
and potentially lowering costs in the long run.
 Disadvantages of using computer modelling rather than humans:
 It may overlook nuanced factors or intangible elements that humans can consider,
leading to potential gaps or inaccuracies in the analysis.
 Based on assumptions and simplifications, introducing a level of uncertainty.
 Their programmed algorithms and data inputs bind models. They may struggle to
adapt to unforeseen circumstances or rapidly changing conditions that humans can
more readily navigate and respond to.

4.3. Computer-controlled Systems


4.4. School Management Systems
Computer-controlled School Management Systems: Comprehensive software applications that
automate administrative tasks, such as attendance tracking, grading, scheduling, and student
information management, improving educational institutions' efficiency, accuracy, and organization.
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

4.5. Booking Systems


These web-based platforms and applications allow users to reserve and purchase tickets or services
for various events and industries. Some of the applications for online bookings include:
1. Travel industry: Booking flights, hotels, and holiday packages provides a convenient platform for
travellers to plan and book their trips.
2. Concerts: Reserving tickets for live music events allows music fans to secure their spot at popular
concerts.
3. Cinemas: Booking movie tickets in advance enables cinema-goers to reserve seats and avoid
queues.
4. Sporting events: Purchasing tickets for sports matches and competitions offers sports enthusiasts
an easy way to attend their favourite events.

 Advantages:
 convenience and accessibility
 instant confirmation and ticketing
 ability to compare prices and options
 promotions and personalized offers
 faster to change/update
 automated reminders via email/text
 repeated bookings can be easily made
 cost-saving as there are fewer wages due to reduced staff requirements
 Disadvantages:
 potential for technical issues
 possible security and privacy concerns
 transaction and booking fees
 impersonal customer service
 dependent on a stable internet connection
 can lead to unemployment

4.6. Banking Applications


 Online banking systems depend on the ability to update files instantly to avoid double
scheduling, which might occur if the system reaction time is slow.
 The use of computer technology has revolutionized how we do our banking transactions, for
example:
 Internet banking
 The use of automated teller machines (ATMs)
 Chip and PIN technology

Automated Teller Machines (ATMs)


Automated teller machines (ATMs) are places where customers can get cash (or carry out certain other
banking activities, such as ordering a statement) using their credit or debit card.
Sequence at ATM What goes on behind the scenes

Customer puts card into ATM


Contact is made with bank’s computer

PIN is checked to see if it is correct


Card is checked to see if it is valid
PIN is entered using the keypad
The transaction is closed if the card is stolen or the
number of PIN attempts allowed is exceeded.
Several options are given: change
PIN, pay in cheques, pay a bill, see
balance, get money
The customer selects the cash
option & several cash options are
shown
The customer’s account is accessed to see if they
have sufficient funds, it is checked to see if they are
The customer accepts one of the
withdrawing more than their daily limit.
options or types in a different
If the limit is not exceeded and all other checks are
amount
OK, then the transaction is authorized, and the
machine then counts out the cash
The customer is asked if they want
a receipt
The card is returned
Money is dispensed Customer’s account is updated

 Advantages:
 possible to withdraw at any time of the day
 offer many banking services without having to go to the bank
 possible to access an account from anywhere in the world
 usually provides quicker service than waiting in a queue at a bank
 Disadvantages:
 often in places where theft can take place at night
 potential for shoulder surfing
 some banks charge customers for using ATMs
 cash withdrawal limits are often imposed on people

Electronic Funds Transfer (EFT):


It is possible to send money transfer instructions directly to a bank's computer system via electronic
funds transfer (EFT) technology. The system depends on electronic money transfers between
accounts; no cash is moved. The computer system automatically moves the requested amount from
one account to another when it receives an EFT command.
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Advantages:
 very secure payment method
 very quick payment method
 less expensive than cheques
 the customer has the right to dispute an EFT payment for up to 60 days
 Disadvantages:
 the bank transaction can’t be reversed without full dispute investigations
 customer needs to have funds available immediately
 cannot guarantee the recipient’s identity

Credit/debit card transactions


Several credit/debit cards come with a magnetic stripe and a chip; the chip houses essential data like
the PIN. This technique is intended to increase security because it is superior to a signature. A chip and
PIN card to make purchases is an example of an electronic funds transfer (EFT).

 Advantages of credit cards:


 customer protection if ordered goods don’t arrive
 internationally accepted payment method
 interest-free loan if money is paid back within the agreed time period
 can make purchases online
 Disadvantages of credit cards:
 can be charged high interest rates
 annual fees often apply
 easy to end up with credit damage
 security risks in online transactions
 Advantages of debit cards:
 money comes from the user’s current account, there is no interest
 safer than carrying cash
 can make online purchases
 Disadvantages of debit cards:
 less customer protection if goods don’t arrive
 no credit allowed; funds are needed at the time of purchase
 security risks in online transactions

Cheques
Individuals and organizations use cheques as a form of payment. When issuing a cheque, the payer
writes the recipient's name, the payment amount, and the date on the cheque. The recipient then
deposits or presents the cheque to their bank for processing. The payer's bank verifies the fund’s
availability, and upon clearance, the specified amount is transferred from the payer's account to the
recipient's account, completing the transaction.

 Advantages:
 more convenient and safer than cash
 can be post-dated
 can be traced if they are lost
 Disadvantages:
 aren’t legal tender and can be refused
 slow method of payment
 easier for fraudsters than other methods
 relatively expensive payment method

Internet Banking
Enable online access to banking services via a secure website or app, allowing for transfers, bill
payments, account management, and more.

 Advantages:
 convenience and availability
 easy account management
 branch visiting won’t be a requirement
 interest rates may be better
 more accessible to shop around for the best account
 Disadvantages:
 security of transactions
 requires a reliable internet connection
 More risk of fraud
 Easier to make errors
 Physical cash can't be deposited/withdrawn

4.7. Computers in Medicine


Information Systems in Medicine

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Patient records: Healthcare professionals maintain databases to communicate information


between them and pharmacists (for instance, to guarantee no medications are administered
that interact dangerously with one another).
 Pharmacy records: Pharmacy records maintain a comprehensive record of patient
prescriptions. This includes details like the prescribed medication, dosage, quantity dispensed,
prescribing physician's information, and the date of dispensing. These records help track
medication usage and can be used to verify prescription accuracy and detect potential drug
interactions or allergies.

3D Printers
 Using 3D printers in medicine:
 Prosthetics: 3D printers print out artificial body parts such as false teeth, artificial
limbs, hearing aids, etc. This is a less expensive method of replacing body parts.
 Tissue engineering: it is the field of combining cells, biomaterials, and engineering
principles to create functional tissues or organs, aiming to repair or replace damaged
or diseased tissue in the human body.
 Artificial blood vessels are synthetic structures designed to mimic the function of
natural blood vessels, facilitating the flow of blood and nutrients throughout the body
to support tissue repair and regeneration.
 Customized medicines are personalized drug formulations tailored to individual
patients' specific needs. They utilize advanced technology and precise measurements
to create medications with accurate dosages and unique compositions, optimizing
treatment outcomes.

4.8. Expert Systems


It is an AI-based computer program that emulates the decision-making capabilities of human experts.
It uses knowledge and rules to provide accurate advice or solutions in a specific domain.
Examples include:
 Diagnostics
 Mineral prospecting
 Tax and financial calculations
 Strategy games
 Identification of plants, animals and chemical compounds
 Route scheduling for delivery vehicles

Components of an Expert
System
1. User Interface

 This is the only thing that the end user sees


 Allows the user to interact with the system
 Often requires training to operate effectively

2. Explanation system

 Informs the user of the reasoning behind the expert system’s conclusions
 It will supply a conclusion and any suggested actions to take
 It will also give the percentage probability of the accuracy of its conclusions

3. Inference engine

 The main processing element of the system


 It acts like a search engine examining the knowledge base
 Responsible for gathering information
 This is the problem-solving part of the system
 Attempts to use information gathered from the user to find a matching object

4. Knowledge base

 It is a repository of facts
 stores all the knowledge about an area of expertise
 a collection of objects and their attributes

5. Rules base

 The rules base is a set of inference rules.


 Used by the inference engine to draw conclusions
 They follow logical thinking
How an expert system is used to produce possible solutions

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
Below is an example of how an expert system works to diagnose a medical issue:

 The interactive screen asks questions for the doctor to answer using a keyboard or a touch
screen.
 The inference engine compares the symptoms with the knowledge base, using the rule base to
find matches.
 The system suggests the possible illness with a probability of each, cures, and
recommendations on the next step.
 The explanation system will explain how that particular diagnosis was suggested.

4.9. Computers in the Retail Industry


Point of sale (POS) terminals: Computerized systems used at checkout counters to handle
purchases and oversee stock. It is extensively used in retail stores to process sales transactions. They
enable quick and secure payment processing through various methods, including cash, credit/debit
cards, mobile payments, and digital wallets. POS terminals calculate totals, generate itemized receipts,
update inventory, and provide real-time sales data for effective business management.

 Some features include:


 update stock files immediately
 track inventory levels in real-time
 prevent stock discrepancies and ensure accurate records
 monitor inventory levels and reorder when stock is lower than a predefined value
 streamline supply chain management and minimize stockouts

Electronic funds transfer at Point of sale (EFTPOS) terminals: Devices for processing electronic
payments; they allow customers to make payments using debit or credit cards by securely transferring
funds from their bank accounts. EFTPOS terminals authenticate and authorize transactions in real-time,
providing convenience and security for customers and businesses during retail purchases.
The process of checking credit and debit cards at a supermarket EFTPOS is much the same as was
described for paying a restaurant bill in Section 6.6.
Some functions of EFTPOS include:

 Use of chip and PIN cards:


 Enhance security with two-factor authentication
 Require customers to enter a personal identification number (PIN)
 Use of contactless cards:
 Allow for faster transactions
 Enable customers to tap their card on the terminal
 Use of Near Field Communication (NFC):
 Facilitate payments through smartphones and other devices
 Increase convenience for customers
 Communication between supermarket computers and bank computers:
 Share transaction details securely
 Enable instant payment processing and verification

Internet Shopping
Characteristics of Internet Shopping:
 Online stores accessible through web browsers
 A wide variety of products and services are available
 Convenient and often open 24/7

Advantages (To customer):

 access to the global market


 comparison between different products effortlessly
 can shop from anywhere in the world
 able to avoid queues and busy stores

Advantages (To business):

 can target prices and services based on buying data


 can update stock availability and prices more quickly than a physical store
 cheaper to publicize special offers
 international customer base
 increased profits due to lower staff

Disadvantages (To customer):

 security concerns
 can’t correctly examine products before purchase
 occasionally, products may take weeks before being delivered
 additional shipping and handling costs
 lack of face-to-face interaction with staff

Disadvantages (To business):


WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 increased competition
 digital fraud and security concerns
 technical issues and downtime
 costs of delivery and return
 fake negative reviews can lead to a lousy company reputation

4.10. Recognition Systems


1. Optical Mark recognition (OMR) media in schools:

 School registers: Paper-based registers are fed into OMR to be scanned and stored in a
database.
 Multiple-choice examination papers: The position of a mark is stored in a computer’s
memory after being read by the OMR, a device using a template that maps out the X-Y
coordinates of each tablet (pen/pencil mark).
 Used at POS terminals for scanning and reading the information stored in barcodes.
 Many digital devices have OMR scanners, which may be used to scan QR codes.
 Advantages:
 very fast way of inputting the results of a survey
 more accurate than keying in data
 more accurate than OCR methods
 Disadvantages:
 designing the forms is a very complex job
 there can be problems if they haven’t been filled correctly
 often only work with black pens or pencils

2. Optical Character Recognition (OCR)


3. RFID in tracking stock:
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
4. Near Field Communication (NFC):

 Enables short-range wireless communication between devices.


 Allows payment using a smartphone.
 Advantages:
 Convenient and secure method of payment
 allows for contactless transactions
 Disadvantages:
 Limited range
 compatibility issues with some devices

5. Biometric recognition:

 Usually refers to automated technologies for authenticating and verifying human body
characteristics such as face, iris, retina, finger, thumb, hand and voice.
 Advantages:
 very high accuracy
 very easy to use
 very fast verification time
 non-intrusive method
 relatively inexpensive technology
 Disadvantages:
 it can make mistakes if the skin is dirty or damaged
 very expensive to install and set up
 uses a lot of memory for the data to be stored
 a person’s voice can be quickly recorded and used for unauthorized access
 an illness, such as a cold, can change a person’s voice, making absolute identification
difficult or impossible

4.11. Satellite Systems


Global Positioning Systems (GPS)
 Used to determine the exact location of several modes of transport
 Cars usually refer to GPS as satellite navigation systems
 Satellites surrounding the Earth transmit signals to the surface
 Computers installed in the mode of transport receive and interpret these signals
 Knowing their position on the Earth depends on very accurate timing – atomic clocks are used
in the satellites, which are accurate to within a fraction of a second per day
 Each satellite transmits data indicating its position & time
 The computer on board the mode of transport calculates its exact position based on the
information from at least three satellites

Satellite Navigation (satnav):

 Used to determine the exact location of a car.


 The computers onboard can be used to show directions to a destination.
Advantages:

 Better focus as there isn’t a need to constantly check paper maps.


 Reduces fines by warning drivers about upcoming speed changes.
 The system shows an Estimated Time of Arrival (ETA).
 It is possible to program in the fastest route to avoid towns.
 The system can also give helpful information such as the location of petrol stations.

Disadvantages:

 If the maps are not updated, they can give incorrect instructions.
 Road closures due to accidents or roadworks can cause problems.
 The loss of satellite signals can cause problems.
 The system will give incorrect information if an incorrect start-point or end-point is keyed in.

Geographic Information Systems (GIS)

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Used to capture, manage, analyze, and display geographically referenced information.


 Use to determine the distance between two places.
 Used to find the nearest petrol station or restaurant, etc.
 To protect animal and plant life in certain vulnerable places.
 It can be used in geography, science, or engineering lessons.

Advantages:

 Allows geographical and thematic data of any kind to be combined to show how they are
connected to each other.
 It allows the handling and exploration of vast amounts of data.
 It allows data to be integrated from a wide range of very different sources.

Disadvantages:

 The learning curve on GIS software can be very long.


 GIS software is very expensive.
 GIS requires enormous amounts of data to be input.
 It isn't easy to make GIS programs that are both fast and user-friendly.

Media Communication Systems


 Using satellite signals for communication.
 Used by media companies when sending stories/videos/pictures from remote locations.

Advantages:

 They have good global coverage.


 They are cheaper, faster, and safer than laying cables in difficult or treacherous terrain.
 They have very high bandwidth.
 It is relatively easy to expand the network.
 Security in satellite transmission is very good because data is coded, and the receiver requires
decoding equipment.
 During emergency situations, it is relatively easy to move stations on the ground from one
place to another.
 They are well-suited for broadcasting.
 Enable mobile communication in very remote locations.

Disadvantages:

 There is a time delay in receipt of the signals.


 The signals received can be affected by bad weather.
 Sunspot activity can affect the performance of a satellite.
 They must be monitored and controlled regularly to remain in the correct orbit.

5. System’s Life Cycle


5.1. Stages of System's Life Cycle:
1. Analysis
2. Design
3. Development & Testing
4. Implementation
5. Documentation
6. Evaluation

Analysis of the Current System


The current system is studied using four different methodologies. These are the four techniques:
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Observation:
 involves watching users interact with the system to figure out its workings
 it is used for understanding how users interact with the current system
 Advantages: provides first-hand, unbiased information
 Disadvantages: can be time-consuming, may not reveal all issues
 Interviews:
 direct one-to-one conversations with users on their experience with the current system
 used to gather comprehensive information about individual users
 Advantages: allows for in-depth exploration of issues
 Disadvantages: relatively expensive, time-consuming, no user-anonymity, which may
affect the response
 Questionnaires:
 set of predetermined questions is given to the users to complete and give their opinion
on the current system
 it is majorly used in collecting data from a larger group of people
 Advantages: allows for quantitative analysis, efficient data collection, questions can be
answered quickly
 Disadvantages: limited by predetermined questions, may suffer from low response
rates, users may exaggerate answers due to anonymity
 Examination of existing documents:
 reviewing system documentation, user guides, or reports
 understanding the current system's design and any known issues
 Advantages: provides insights into the system's history, can reveal previously unknown
issues
 Disadvantages: it may be outdated, incomplete, time-consuming, and rather
expensive.

Record and Analyse Information about the Current System


Identifying key aspects of the current system

 Data inputted, processed, and outputted into the system are identified.
 Problems with the current system are identified. What could be improved?
 The requirements of the user and the potential new system are identified. What is the new
system meant to do?
 Problems: issues that users face with the current system
 User requirements: what needs to be added to the new system
 Information requirements: data or information the new system must process

New System Requirements Specification:


• Once the systems analysts have completed the systems life cycle analysis stage, they should be fully
aware of the current system's limitations.
• The next step will be to design a new system (normally computer-based) to resolve the problems
identified by the users and the systems analyst.
• The Requirements Specification will be created, outlining the required improvements and
expectations for the new system.

System Specification
Hardware and Software Selection
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 It is vital to identify the suitable hardware needed for the new system
 contemplating system requirements, compatibility, costs
 justifying choices based on user needs and system performance
 Hardware that needs to be considered:
 barcode readers,
 scanners,
 touch screens,
 3D printers,
 monitors,
 speakers.
 Identifying suitable software needed for the new system
 considering functionality, compatibility, and ease of use
 justifying choices based on user requirements and system efficiency
 Software that needs to be considered:
 operating system,
 applications software,
 size of storage,
 type of storage.

5.2. Design
Once the analysis has taken place and the systems analyst has some idea of the scale of the problem
and what needs to be done, the next stage is to design the critical parts of the recommended system.
File/Data Structures
 Field length: number of characters allowed in a field
 Field name: an identifier for the field in the data structure
 Data type: specifies the kind of data that can be stored in a field, e.g., text, numbers, dates
 Coding of data: using codes to represent data, e.g. M for male, F for female

Input Formats
 Data capture forms: These are designed to collect data from users in a structured format.
They come in two types: paper-based and electronic-based. Paper-based data-capturing forms
must be carefully designed with headings, concise instructions, character and information
fields, checkboxes, and enough writing space. Text boxes, on-screen help, drop-down menus,
radio buttons, automatic validation, and control buttons for data entry are all features of
computer-based forms.
Consider a user-friendly layout, clear instructions, and appropriate data fields.

Output Formats
 Screen layouts: how information is presented to users on a screen
 Report layouts: how information is organized in a printed or digital report
 Consider readability, visual appeal, and efficient use of space

Validation Routines
It is a method of examining data submitted to a computer to determine if it meets specific
requirements. It is a routine check that the computer does as part of its programming.
1. Range check: ensures data is within a specified range of values
2. Character check: ensures data contains only allowed characters
3. Length check: ensures data is of a specified length
4. Type check: ensures data is of the correct data type
5. Format check: ensures data conforms to a specific format
6. Presence check: ensures data is present and not left blank
7. Check digit: a digit added to a number to verify its accuracy

5.3. Development and Testing


 Guarantees the system's functionality before it is put into use.
 Identification and removal of errors, thus improving system reliability and performance.

Test Designs

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Test data structures, file structures, input formats, output formats, and validation routines
 Ensure all components function correctly and interact seamlessly

Test Strategies
 Test each module: verify that the individual components function as intended
 Test each function: ensure all features work correctly
 Test the whole system: confirm overall system performance and integration

Test Plan
 Test data: specific data used for testing purposes
 Expected outcomes: predicted results based on test data
 Actual outcomes: results obtained from testing
 Remedial action: steps taken to fix identified issues

Test Data Types


The following data types will be explained using the example of months in a year.

 Normal data: valid and expected data values within the range of acceptability have an
expected outcome. E.g., any whole number between 1 and 12.
 Abnormal data: invalid or unexpected data values. This can either be:
 Data outside the range of acceptability or
 Data that is the wrong data type
 In this case, examples could be…
 any value less than 1 (i.e. 0, -6, etc.)
 any value greater than 12 (i.e. 13, 15, etc.)
 letters or nun-numeric data (i.e. July, etc.)
 non-integral values (i.e. 3.5, 4.2, etc.)
 Extreme data: values at the limits of acceptability (E.g. 1 or 12)

What is live data?


 Data that has been used with the current system
 Hence, the results are already known

5.4. Implementation
The system must then be fully implemented after it has been thoroughly tested.
We will now think more carefully about switching to the new system. Four popular techniques are
utilized to transition from the old system to the new one.
Before selecting the approach best suited for a given application, the pros and cons of each must be
carefully considered.

4 Methods of Implementation
1. Direct changeover:

 The old system is replaced by the new system immediately


 Used when quick implementation is necessary
 Advantages
 fast implementation
 cost-effective as only one system is in operation
 Disadvantages
 High risk of failure
 no fallback
 users can’t be trained on the new system
2. Parallel Running

 Both current and new systems run simultaneously for a period before the old system is phased
out
 Used when a smooth transition with minimal risk is required
 Advantages
 Lower risk
 easy system comparison
 Disadvantages
 Time-consuming
 resource-intensive

3. Pilot Running

 The new system is implemented in a small, controlled environment before full-scale


implementation
 Used when testing the new system in a real-world setting
 Advantages
 Low risk as only trialled in one department/centre/branch
 allows for fine-tuning
 staff have time to train with the new system
 few errors as it's fully tested
 Disadvantages
 Slower implementation
 potential inconsistencies
 confusion as there are two systems in use
 There is no backup for the department/center/branch using the new system

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
4. Phased Implementation

 The new system is implemented in stages, with each stage replacing a part of the old system
 Used when a gradual transition is preferred to minimize disruption
 Advantages
 reduced risk
 easier to manage
 Disadvantages
 Takes longer
 potential compatibility issues

5.5. Documentation
 In the life cycle of a system, documentation enables the correct recording of design,
implementation, testing, and maintenance data, facilitating effective communication,
troubleshooting, and potential future improvements.
 Technical documentation: detailed information on the system's inner workings and
programming for developers and IT staff

Used to maintain, repair, and update the system with improvements

 Purpose of the system/program: Explanation of the system's intended function and goals
 Limitations: Known constraints or issues with the system
 Program listing: The code or scripts used in the system
 Program language: The programming language used to develop the system
 Program flowcharts/algorithms: Visual representations or descriptions of the system's logic
and processes
 System flowcharts: Visual representations of the interactions between system components
 Hardware & software requirements: Necessary equipment and software to run the system
 File structures: Organization and layout of the system's files and data
 List of variables: Collection of variables used within the system, including their names and
purposes
 Input format: Structure and format for entering data into the system
 Output format: Structure and format for presenting data generated by the system
 Sample runs/test runs: Examples of system operation, including input and expected output
 Validation routines: Techniques used to check and confirm the accuracy of data entered into
the system

User Documentation
Instruction and guidance for end-users on how to operate the system. Used to help users effectively
use the system and overcome problems
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

 Purpose of the system: Explanation of the system's intended function and goals
 Limitations: Known constraints or issues with the system
 Hardware & software requirements: Necessary equipment and software to run the system
 Loading/running/installing software: Instructions for setting up the system on user devices
 Saving files: Procedures for storing data within the system
 Printing data: Steps to produce hard copies of system data
 Adding records: Instructions for creating new entries in the system
 Deleting/editing records: Guidelines for modifying or removing existing entries in the
system
 Input format: Structure and format for entering data into the system
 Output format: Structure and format for presenting data generated by the system
 Sample runs: Examples of system operation, including input and expected output
 Error messages: Explanations of system warnings and error notifications
 Error handling: Steps to resolve issues and errors within the system
 Troubleshooting guide/helpline: Assistance for diagnosing and addressing common
problems
 Frequently Asked Questions: Answers to common user inquiries
 Glossary of Terms: Definitions of key terms and concepts related to the system

5.6. Evaluation
It measures a system's productivity, efficiency, and compliance with its goals to identify its strengths,
shortcomings, and potential development areas. This assessment informs decision-making and
improves overall performance over the course of a system's life cycle.

Assess the Efficiency of the Solution


 Analyse the system's efficiency in time, money, and resource use. Examine whether the
system is performing at its best or if its efficiency could be increased.
 Provide examples of specific aspects that contribute to the system's efficiency
 Identify areas that may be consuming excessive resources or time and suggest ways
to optimize them
 Questions to ask:
 Does it operate quicker than the previous system?
 Does it operate by reducing staff time in making bookings?
 Does it operate by reducing staff costs?

Evaluate the Ease of Use


 Look at the solution's usability and accessibility for the target market. Check to see if the
system is simple to understand and use and if users have no trouble completing their jobs.
 Describe the user interface and how it facilitates interaction with the system
 Mention any feedback from users regarding their experience with the system and
address any issues they encountered
 Questions to ask:
 Are all the users able to use the system and make bookings easily?
 Are all the users able to change and cancel bookings easily?
 Can all staff understand how to use the system with minimal training?

Determine the Suitability of the Solution


 Examine how well the implemented solution satisfies the desired outcome by contrasting it
with the original task criteria.
 Outline the initial objectives of the system and discuss how the solution addresses
each one
 Highlight any requirements that may not have been fully met and discuss possible
reasons for this
 Questions to ask:
 Is the system suitable for each of the departments?
 Does it meet the needs of the customers?
 Does it meet the needs of the staff?
 Does the solution match the original requirements?

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT

Collect and Examine User’s Feedback


 Collect users' responses to the results of testing the system. Their feedback can provide
insights into potential issues and improvements and help determine overall user satisfaction.
 Summarise the testing process, including test data expected and actual outcomes.
 Discuss users' reactions to the system, addressing any concerns or suggestions they
may have

Identify Limitations and Suggest Necessary Improvements


 Based on the analysis of efficiency, ease of use, appropriateness, and user feedback, identify
any limitations in the system and suggest necessary improvements
 List the limitations and provide explanations for each one
 Recommend specific changes or enhancements for these issues

WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.

CAIE IGCSE
ICT
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Roronoa on Wed Mar 12 2025 for strictly personal use only.
These notes have been created by Bisma Hammad for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the
internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage
then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded
to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for
financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration
UK00003478331).

You might also like