Znotes
Znotes
ORG
UPDATED TO 2023-2025 SYLLABUS
CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Roronoa for personal use only.
CAIE IGCSE ICT
1. Audience
1.1. Audience Appreciation
To express gratitude and value for the users by providing helpful and relevant information, fostering
positive experiences, and contributing to their understanding and learning.
1.2. Copyright
What makes Copyright Necessary?
Copyright regulation is crucial to safeguard the rights of developers and innovators.
It stops software piracy, which is unauthorised use, replication, or distribution.
It guarantees developers receive compensation for their efforts, fostering additional innovation
and development.
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
Software developers employ various copyright protection strategies, such as Digital Rights
Management (DRM).
Due to DRM methods and systems, copyrighted works are subject to usage, modification, and
distribution restrictions.
Other techniques include software product activation, which needs a unique code to be fully
functional.
Given that pirated software frequently cannot receive automatic upgrades, which renders it
less effective and secure over time, automatic updates may also serve as a kind of copyright
protection.
2. Communication
2.1. Communication with Other ICT users
Using E-mail
E-Mail
Uses:
Email is a technique of sending and receiving messages and files via the Internet.
It is employed in personal communication, business communications, and marketing.
Acceptable language must be used based on the email's recipient, for example, professional
when composing a work-related email.
Employers frequently establish requirements for professional language, substance, and email
frequency.
Email security is critical to preventing sensitive data from being accessed or manipulated.
Netiquette is the proper conduct and politeness when using email.
Don’t be abusive
Don’t send spam
Be clear and concise with your message
Remember that posts are usually public and can be read by anyone.
Always check your spelling and grammar.
Respect people's privacy and do not discuss or publish information that might
embarrass somebody.
Forgive people’s mistakes
Do not use CAPITAL LETTERS to highlight comments
Do not plagiarize
Do not use too many emoticons, as they might annoy your readers.
Email groups enable mass communication to a specific group of subscribers.
Spam
It is defined as any unwanted email delivered via the Internet. These can range from annoying to
genuinely harmful, as they may contain viruses.
The main disadvantages are:
wasting time
annoying people
using up valuable bandwidth on the internet, thus slowing it down
may have viruses or be a part of a phishing scam
can take up significant space in user inboxes
A vital communication tool that allows people to communicate via emails, instant messaging,
and other means.
It acts as a massive database of information on almost any subject
The Internet has transformed business by offering a platform for online purchasing, electronic
payments, and digital transactions, allowing enterprises to reach global consumers.
Raises data security and personal privacy hazards through the possibility of identity theft, data
breaches, and online monitoring.
The spread of propaganda, fake news, and misinformation due to the simplicity with which
content can be created and distributed online.
The digital divide resulting from unequal Internet access threatens to widen existing
disparities.
Definition:
The Internet is a vast network of linked computer networks and gadgets that
communicate with one another using the Internet Protocol Suite (TCP/IP).
The intranet is a secure network that operates within an organization using internet
technologies and protocols, such as TCP/IP.
Extranets are managed private networks that can give access to third-party users and
give users, such as partners, suppliers, or clients, safe access to a portion of the
intranet.
Accessibility:
The Internet is open and accessible to the public, allowing users to access a wide
range of information, services, and resources worldwide.
Intranets are restricted to internal users and typically secured by firewalls and other
security measures to maintain the security of critical corporate data.
Extranet provides authorized external users only limited access, in contrast to the
internet, which is public, or the intranet, which is entirely restricted. To access the
extranet, these users need a secure login.
Purpose:
The Internet acts as a hub for intercultural dialogue, the sharing of knowledge, and
access to a range of Internet resources, including websites, email, social media, online
shopping, and more.
An intranet's main goal is to make it easier for employees to communicate, work
together, and share information.
Extranets make it easier for external stakeholders to collaborate and communicate
with a company. It enables the organization and its reliable clients or partners to share
information, documents, and resources securely.
Many use the terms “Internet” and “World Wide Web” interchangeably. However, they can’t be used in
the same context:
- The internet refers to the global network of computers and other devices connected through routers
and servers. However, the World Wide Web is a collection of websites and webpages
accessed via the Internet.
Speed of Searching
Search engines may scan billions of online pages to locate matches to your search query in a
fraction of a second.
Your internet connection and the effectiveness of the search engine's algorithms influence the
speed.
Amount of Information
Because search engines can deliver a deluge of information, utilising particular and relevant
search phrases is critical.
Adding quotation marks for specific phrases, "+" signs for required terms, and "-" signs for
omitting terms can help narrow the search.
Internet Protocols
Protocols are rules on which the sender and recipient agree when data is exchanged between devices.
1. Hypertext transfer protocol (HTTP): when a web page is being accessed, entering http:// at the
front of an address tells the web browser that ‘HTTP rules’ for communication are to be obeyed.
2. Hypertext transfer protocol secure (HTTPS): A secure version of HTTP that encrypts data for
security.
3. File transfer protocol (FTP): network protocol used when transferring files from one computer to
another over the internet. It is similar to HTTP, but the protocol specifically transfers files.
4. Secure sockets layer (SSL): a protocol that allows data to be sent and received securely over the
internet.
Contact between liquid substances and electronic devices: Keep liquids away from
electrical equipment.
Open cables: Ensure that cables are entirely insulated and packed, and use circuit
breakers or fuses to prevent electrical overload.
2. Fire: ICT devices require electricity to charge or run; too many devices using a single socket can
cause the plug socket to overload, and heat is generated by too much electricity, causing the wiring to
degrade and ignite a fire.
The causes and reduction tactics for fire include:
Socket overload: Ensure enough plug sockets in the room, don’t plug too many devices into
the same socket, and don’t leave devices plugged in and unattended.
Overheated equipment: Ensure that equipment is properly ventilated and not obstructed,
keep flammable materials away from heat sources, regularly check equipment for signs of
wear or damage, use fire extinguishers in case of emergencies, turn off or unplug devices
when away from the location, do not cover any air vents on devices.
3. Trailing cables: Devices can be plugged in using cables. Cables that are protruding can cause an
accident; you can trip over a cable left out in a location, and body damage can occur during a fall, for
example, breaking bones, ligament damage, bruising, sprains, etc. depending on the area fell on
Trailing cables causes and prevention strategies:
Unorganized/insecure cables: use cable ties to secure cables, keep cables packed correctly
in, let’s say, a table, therefore not coming in the way of walking paths, use wireless devices
where possible, and regularly inspect cables for signs of wear or damage.
4. Heavy falling equipment: Devices have varying levels of weight, and if a device falls on you, it
could cause injury; any device should be placed in a secure location, like a PC on a solid desk and not
near the edge.
Causes and reduction tactics for falling equipment:
Improperly secured equipment: Ensure that equipment is properly secured and stable.
Regularly check the stability of locations containing devices.
Equipment on unstable surfaces: Keep equipment away from edges and other potential
hazards, and regularly inspect equipment and locations containing devices for signs of wear or
damage.
3.2. eSafety
Data Protection
The Data Protection Act (DPA) controls personal data collection, storage and processing.
In the UK, the European Union’s General Data Protection Regulation (GDPR)
Protects personal data, whether stored on paper or a computer system
Personal Data
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
eSafety
E-safety is knowing about and using the internet safely and responsibly.
It refers to when an individual is using the internet, email, social media, or online gaming.
E-safety refers to the individual knowing how to protect themselves from potential dangers and
threats.
Safety Suggestions
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
Protection of Data
Multiple techniques are implied for the protection of data, inclusive:
1. Biometrics:
Individuals' distinctive physical or behavioural traits, such as fingerprints, faces, or irises, can
be used for access control and verification. Since biometric data is hard to fake or duplicate, it
offers a more secure form of identification.
2. Digital certificate:
A digital record that attests to a website's reliability and integrity. A digital certificate is used to
provide safe communication and to build confidence between parties. Identifier data, the
entity's public key, and a third party's digital signature are frequently found in digital
certificates.
A protocol that creates a secure connection between a client computer and a server. SSL
ensures that information communicated between a server and client stays private and cannot
be intercepted or changed by unauthorized parties. A website's identification for it is the S at
the end of HTTP.
4. Encryption:
It is creating data in a format that cannot be read without a decryption key. Data on hard
drives, emails, cloud storage, and secure websites (HTTPS) are all protected by encryption.
Without a decryption key, it assures that even if unauthorized people obtain data, it cannot be
decoded.
5. Firewall:
A firewall is a network security device that monitors and manages incoming and outgoing
network traffic. Its goal is to separate an internal network from other networks by filtering data
according to established criteria. It assists in preventing malware, unauthorized access, and
other network risks.
6. Two-factor authentication:
A security mechanism that requests two different kinds of identification from users to confirm
their identity. To provide additional protection outside of just a username and password, 2FA
was created. Typically, it combines something that uniquely identifies a user, like biometric
data, with something the user has, like a smartphone and a token or something they know, like
a password.
A typical authentication technique uses a password plus a secret code (user ID) to identify. To
strengthen data security, user IDs and passwords restrict access to only authorized users.
Using secure passwords and changing them frequently is critical to ensure security. When
creating passwords, it is advised to utilize a mix of uppercase, lowercase, digits, and special
characters.
4. ICT Applications
4.1. Communication
Newsletters and posters
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
Websites
Collection of webpages, text, graphics, video, and sound
Hosted on a web server on the internet
Need to write code or use a web authoring application
Hyperlinks to other pages can be added
Interactive websites require programming knowledge
Can use a camera, scanner, and microphone to input data
Usually, hire space from the web hosting company
Advantages
Ability to add sound/video/animation
Links to other websites/hyperlinks
The use of hot spots
Buttons to navigate/move around the website
Hit counters to see who has visited the websites
worldwide advertising capability
Disadvantages
Can be hacked and modified, or viruses introduced
Need for a computer and internet connection
Lack of portability compared with the paper-based system
Need to maintain the website once it is set up
Multimedia Presentations
Uses a mixture of media to present information: animations, video, sound, transitions,
hyperlinks
Produced using software packages
Used with a projector so a large audience can view
Advantages
Use of sound and animation/video effects
Interactive/hyperlinks built into presentations
More likely to hold the audience’s attention
Disadvantages
Need for special equipment – expensive
It may require internet access
Distracts the audience from the sole content of the presentation
It is very easy to make a presentation with too many features
Media streaming
Real-time transition of audio and video files over the internet
allows users to access content without downloading it to their devices
popular services include Spotify, YouTube, and social media websites
uses buffering, which makes sure the video plays back smoothly without freezing. While the
buffer receives data packets, it sends previously received ones to the playback device so that
there are no gaps in the played data
Advantages
Users can access any information at any time and from any location
Offers an extensive library of content
Compared to traditional cable or satellite TV subscriptions, media streaming can be
more cost-effective
Disadvantages
Heavily relies on a stable and high-speed internet connection.
Not all content is available on every streaming platform due to licensing agreements
and exclusivity deals.
You don’t own the media when streaming media, so if the streaming service removes a
movie or a TV show from its library, it may no longer be accessible to you.
ePublications
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
Mobile Communication
Mobile devices support many forms of communication, such as:
1. Short message service (SMS) messaging: permits extremely quick communication with another
person via typing on a keyboard (a mobile phone or tablet's keyboard is frequently virtual). Its benefit
is that the recipient can get the text whenever they choose without being available.
2. Phone calls: Making calls while on the go is among the most fundamental applications of a mobile
phone. Mobile phones are the perfect method to stay in correspondence anywhere there is a network
signal because they are compact and have an independent battery.
3. Voice over Internet Protocol (VoIP): a communication technique for Internet users. VoIP
transforms sound captured by the built-in mic of the cell phone into individual data packets that may
be transmitted via the internet to their intended recipient.
4. Video calls: enables real-time video conversing between multiple participants with a camera-
enabled device. Uses an internet connection or cellular data. Software that may be used for video
calling includes FaceTime, Skype, and Zoom.
5. Accessing the Internet: Another helpful feature is accessing the net from a mobile device. Any
mobile device with a wireless broadband connection or a mobile phone network can link to the
internet.
using models is less expensive than having to build the real thing
safer to use a computer model
allows you to try out various different scenarios in advance
nearly impossible to try out some tasks in advance in real life due to high risk
faster to use a computer model than to do the real thing
a model can’t be completely reliant as the output is entirely based on the input
frequently, computer modelling can be a very costly option
human reluctance is a common problem in this technology
Advantages:
convenience and accessibility
instant confirmation and ticketing
ability to compare prices and options
promotions and personalized offers
faster to change/update
automated reminders via email/text
repeated bookings can be easily made
cost-saving as there are fewer wages due to reduced staff requirements
Disadvantages:
potential for technical issues
possible security and privacy concerns
transaction and booking fees
impersonal customer service
dependent on a stable internet connection
can lead to unemployment
Advantages:
possible to withdraw at any time of the day
offer many banking services without having to go to the bank
possible to access an account from anywhere in the world
usually provides quicker service than waiting in a queue at a bank
Disadvantages:
often in places where theft can take place at night
potential for shoulder surfing
some banks charge customers for using ATMs
cash withdrawal limits are often imposed on people
Advantages:
very secure payment method
very quick payment method
less expensive than cheques
the customer has the right to dispute an EFT payment for up to 60 days
Disadvantages:
the bank transaction can’t be reversed without full dispute investigations
customer needs to have funds available immediately
cannot guarantee the recipient’s identity
Cheques
Individuals and organizations use cheques as a form of payment. When issuing a cheque, the payer
writes the recipient's name, the payment amount, and the date on the cheque. The recipient then
deposits or presents the cheque to their bank for processing. The payer's bank verifies the fund’s
availability, and upon clearance, the specified amount is transferred from the payer's account to the
recipient's account, completing the transaction.
Advantages:
more convenient and safer than cash
can be post-dated
can be traced if they are lost
Disadvantages:
aren’t legal tender and can be refused
slow method of payment
easier for fraudsters than other methods
relatively expensive payment method
Internet Banking
Enable online access to banking services via a secure website or app, allowing for transfers, bill
payments, account management, and more.
Advantages:
convenience and availability
easy account management
branch visiting won’t be a requirement
interest rates may be better
more accessible to shop around for the best account
Disadvantages:
security of transactions
requires a reliable internet connection
More risk of fraud
Easier to make errors
Physical cash can't be deposited/withdrawn
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
3D Printers
Using 3D printers in medicine:
Prosthetics: 3D printers print out artificial body parts such as false teeth, artificial
limbs, hearing aids, etc. This is a less expensive method of replacing body parts.
Tissue engineering: it is the field of combining cells, biomaterials, and engineering
principles to create functional tissues or organs, aiming to repair or replace damaged
or diseased tissue in the human body.
Artificial blood vessels are synthetic structures designed to mimic the function of
natural blood vessels, facilitating the flow of blood and nutrients throughout the body
to support tissue repair and regeneration.
Customized medicines are personalized drug formulations tailored to individual
patients' specific needs. They utilize advanced technology and precise measurements
to create medications with accurate dosages and unique compositions, optimizing
treatment outcomes.
Components of an Expert
System
1. User Interface
2. Explanation system
Informs the user of the reasoning behind the expert system’s conclusions
It will supply a conclusion and any suggested actions to take
It will also give the percentage probability of the accuracy of its conclusions
3. Inference engine
4. Knowledge base
It is a repository of facts
stores all the knowledge about an area of expertise
a collection of objects and their attributes
5. Rules base
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
Below is an example of how an expert system works to diagnose a medical issue:
The interactive screen asks questions for the doctor to answer using a keyboard or a touch
screen.
The inference engine compares the symptoms with the knowledge base, using the rule base to
find matches.
The system suggests the possible illness with a probability of each, cures, and
recommendations on the next step.
The explanation system will explain how that particular diagnosis was suggested.
Electronic funds transfer at Point of sale (EFTPOS) terminals: Devices for processing electronic
payments; they allow customers to make payments using debit or credit cards by securely transferring
funds from their bank accounts. EFTPOS terminals authenticate and authorize transactions in real-time,
providing convenience and security for customers and businesses during retail purchases.
The process of checking credit and debit cards at a supermarket EFTPOS is much the same as was
described for paying a restaurant bill in Section 6.6.
Some functions of EFTPOS include:
Internet Shopping
Characteristics of Internet Shopping:
Online stores accessible through web browsers
A wide variety of products and services are available
Convenient and often open 24/7
security concerns
can’t correctly examine products before purchase
occasionally, products may take weeks before being delivered
additional shipping and handling costs
lack of face-to-face interaction with staff
increased competition
digital fraud and security concerns
technical issues and downtime
costs of delivery and return
fake negative reviews can lead to a lousy company reputation
School registers: Paper-based registers are fed into OMR to be scanned and stored in a
database.
Multiple-choice examination papers: The position of a mark is stored in a computer’s
memory after being read by the OMR, a device using a template that maps out the X-Y
coordinates of each tablet (pen/pencil mark).
Used at POS terminals for scanning and reading the information stored in barcodes.
Many digital devices have OMR scanners, which may be used to scan QR codes.
Advantages:
very fast way of inputting the results of a survey
more accurate than keying in data
more accurate than OCR methods
Disadvantages:
designing the forms is a very complex job
there can be problems if they haven’t been filled correctly
often only work with black pens or pencils
5. Biometric recognition:
Usually refers to automated technologies for authenticating and verifying human body
characteristics such as face, iris, retina, finger, thumb, hand and voice.
Advantages:
very high accuracy
very easy to use
very fast verification time
non-intrusive method
relatively inexpensive technology
Disadvantages:
it can make mistakes if the skin is dirty or damaged
very expensive to install and set up
uses a lot of memory for the data to be stored
a person’s voice can be quickly recorded and used for unauthorized access
an illness, such as a cold, can change a person’s voice, making absolute identification
difficult or impossible
Disadvantages:
If the maps are not updated, they can give incorrect instructions.
Road closures due to accidents or roadworks can cause problems.
The loss of satellite signals can cause problems.
The system will give incorrect information if an incorrect start-point or end-point is keyed in.
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
Advantages:
Allows geographical and thematic data of any kind to be combined to show how they are
connected to each other.
It allows the handling and exploration of vast amounts of data.
It allows data to be integrated from a wide range of very different sources.
Disadvantages:
Advantages:
Disadvantages:
Observation:
involves watching users interact with the system to figure out its workings
it is used for understanding how users interact with the current system
Advantages: provides first-hand, unbiased information
Disadvantages: can be time-consuming, may not reveal all issues
Interviews:
direct one-to-one conversations with users on their experience with the current system
used to gather comprehensive information about individual users
Advantages: allows for in-depth exploration of issues
Disadvantages: relatively expensive, time-consuming, no user-anonymity, which may
affect the response
Questionnaires:
set of predetermined questions is given to the users to complete and give their opinion
on the current system
it is majorly used in collecting data from a larger group of people
Advantages: allows for quantitative analysis, efficient data collection, questions can be
answered quickly
Disadvantages: limited by predetermined questions, may suffer from low response
rates, users may exaggerate answers due to anonymity
Examination of existing documents:
reviewing system documentation, user guides, or reports
understanding the current system's design and any known issues
Advantages: provides insights into the system's history, can reveal previously unknown
issues
Disadvantages: it may be outdated, incomplete, time-consuming, and rather
expensive.
Data inputted, processed, and outputted into the system are identified.
Problems with the current system are identified. What could be improved?
The requirements of the user and the potential new system are identified. What is the new
system meant to do?
Problems: issues that users face with the current system
User requirements: what needs to be added to the new system
Information requirements: data or information the new system must process
System Specification
Hardware and Software Selection
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
It is vital to identify the suitable hardware needed for the new system
contemplating system requirements, compatibility, costs
justifying choices based on user needs and system performance
Hardware that needs to be considered:
barcode readers,
scanners,
touch screens,
3D printers,
monitors,
speakers.
Identifying suitable software needed for the new system
considering functionality, compatibility, and ease of use
justifying choices based on user requirements and system efficiency
Software that needs to be considered:
operating system,
applications software,
size of storage,
type of storage.
5.2. Design
Once the analysis has taken place and the systems analyst has some idea of the scale of the problem
and what needs to be done, the next stage is to design the critical parts of the recommended system.
File/Data Structures
Field length: number of characters allowed in a field
Field name: an identifier for the field in the data structure
Data type: specifies the kind of data that can be stored in a field, e.g., text, numbers, dates
Coding of data: using codes to represent data, e.g. M for male, F for female
Input Formats
Data capture forms: These are designed to collect data from users in a structured format.
They come in two types: paper-based and electronic-based. Paper-based data-capturing forms
must be carefully designed with headings, concise instructions, character and information
fields, checkboxes, and enough writing space. Text boxes, on-screen help, drop-down menus,
radio buttons, automatic validation, and control buttons for data entry are all features of
computer-based forms.
Consider a user-friendly layout, clear instructions, and appropriate data fields.
Output Formats
Screen layouts: how information is presented to users on a screen
Report layouts: how information is organized in a printed or digital report
Consider readability, visual appeal, and efficient use of space
Validation Routines
It is a method of examining data submitted to a computer to determine if it meets specific
requirements. It is a routine check that the computer does as part of its programming.
1. Range check: ensures data is within a specified range of values
2. Character check: ensures data contains only allowed characters
3. Length check: ensures data is of a specified length
4. Type check: ensures data is of the correct data type
5. Format check: ensures data conforms to a specific format
6. Presence check: ensures data is present and not left blank
7. Check digit: a digit added to a number to verify its accuracy
Test Designs
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
Test data structures, file structures, input formats, output formats, and validation routines
Ensure all components function correctly and interact seamlessly
Test Strategies
Test each module: verify that the individual components function as intended
Test each function: ensure all features work correctly
Test the whole system: confirm overall system performance and integration
Test Plan
Test data: specific data used for testing purposes
Expected outcomes: predicted results based on test data
Actual outcomes: results obtained from testing
Remedial action: steps taken to fix identified issues
Normal data: valid and expected data values within the range of acceptability have an
expected outcome. E.g., any whole number between 1 and 12.
Abnormal data: invalid or unexpected data values. This can either be:
Data outside the range of acceptability or
Data that is the wrong data type
In this case, examples could be…
any value less than 1 (i.e. 0, -6, etc.)
any value greater than 12 (i.e. 13, 15, etc.)
letters or nun-numeric data (i.e. July, etc.)
non-integral values (i.e. 3.5, 4.2, etc.)
Extreme data: values at the limits of acceptability (E.g. 1 or 12)
5.4. Implementation
The system must then be fully implemented after it has been thoroughly tested.
We will now think more carefully about switching to the new system. Four popular techniques are
utilized to transition from the old system to the new one.
Before selecting the approach best suited for a given application, the pros and cons of each must be
carefully considered.
4 Methods of Implementation
1. Direct changeover:
Both current and new systems run simultaneously for a period before the old system is phased
out
Used when a smooth transition with minimal risk is required
Advantages
Lower risk
easy system comparison
Disadvantages
Time-consuming
resource-intensive
3. Pilot Running
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
4. Phased Implementation
The new system is implemented in stages, with each stage replacing a part of the old system
Used when a gradual transition is preferred to minimize disruption
Advantages
reduced risk
easier to manage
Disadvantages
Takes longer
potential compatibility issues
5.5. Documentation
In the life cycle of a system, documentation enables the correct recording of design,
implementation, testing, and maintenance data, facilitating effective communication,
troubleshooting, and potential future improvements.
Technical documentation: detailed information on the system's inner workings and
programming for developers and IT staff
Purpose of the system/program: Explanation of the system's intended function and goals
Limitations: Known constraints or issues with the system
Program listing: The code or scripts used in the system
Program language: The programming language used to develop the system
Program flowcharts/algorithms: Visual representations or descriptions of the system's logic
and processes
System flowcharts: Visual representations of the interactions between system components
Hardware & software requirements: Necessary equipment and software to run the system
File structures: Organization and layout of the system's files and data
List of variables: Collection of variables used within the system, including their names and
purposes
Input format: Structure and format for entering data into the system
Output format: Structure and format for presenting data generated by the system
Sample runs/test runs: Examples of system operation, including input and expected output
Validation routines: Techniques used to check and confirm the accuracy of data entered into
the system
User Documentation
Instruction and guidance for end-users on how to operate the system. Used to help users effectively
use the system and overcome problems
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
Purpose of the system: Explanation of the system's intended function and goals
Limitations: Known constraints or issues with the system
Hardware & software requirements: Necessary equipment and software to run the system
Loading/running/installing software: Instructions for setting up the system on user devices
Saving files: Procedures for storing data within the system
Printing data: Steps to produce hard copies of system data
Adding records: Instructions for creating new entries in the system
Deleting/editing records: Guidelines for modifying or removing existing entries in the
system
Input format: Structure and format for entering data into the system
Output format: Structure and format for presenting data generated by the system
Sample runs: Examples of system operation, including input and expected output
Error messages: Explanations of system warnings and error notifications
Error handling: Steps to resolve issues and errors within the system
Troubleshooting guide/helpline: Assistance for diagnosing and addressing common
problems
Frequently Asked Questions: Answers to common user inquiries
Glossary of Terms: Definitions of key terms and concepts related to the system
5.6. Evaluation
It measures a system's productivity, efficiency, and compliance with its goals to identify its strengths,
shortcomings, and potential development areas. This assessment informs decision-making and
improves overall performance over the course of a system's life cycle.
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is authorised for personal use only by Roronoa at Al Ain Juniors
School on 12/03/25.
CAIE IGCSE
ICT
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Roronoa on Wed Mar 12 2025 for strictly personal use only.
These notes have been created by Bisma Hammad for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the
internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage
then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded
to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for
financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration
UK00003478331).