Caie Igcse: Updated To 2017 Syllabus
Caie Igcse: Updated To 2017 Syllabus
Caie Igcse: Updated To 2017 Syllabus
ORG
CAIE IGCSE
ICT (0417)
SUMMARIZED NOTES ON THE SYLLABUS
CAIE IGCSE ICT (0417)
Processing done by central processing unit Stores data/information & programs not being used at
Three main components: current time
Control unit - coordinates input and output devices Backing store device = reader or recorder
and carries
out program instructions Example: Hard disk drive
Arithmetic and Logical Unit (ALU) - performs Backing store media = hardware containing data
calculations and
logical comparison: A < B? Example: Hard disk
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Can be used like a PC and/or a Smartphone A part of a person’s body is used to identify that individual
Advantages: Can be:
Small light & portable Fingerprints
Built in cameras for photos & videos Retina
Touchscreen can be used with a stylus pen Iris
Long battery life Face
Disadvantages: Voice
Less storage spaces These are all unique to everyone thus can be used as an
Lacks power of laptop/PC authentication technique
Digital keyboard can be difficult to use Must be added initially to a system to use as identification
Touchscreen may be difficult to use for detailed work Impacts on everyday life:
Better security at the airport since most use at least
one form
of biometric check if not more
Smartphone Increased security in certain places as only authorized
personnel can gain entry
Modern phones that can perform similar tasks to all the Reduced vehicle theft since newer car doors come
above with a
fingerprint lock on the door handle
Main use of smartphones is social media & day-to-day More secure mobile devices as most now have some
planning sort of
biometrics integrated into them
Use varies from person to person
Advantages:
Smallest lightest most portable Vision Enhancement
Integrated/virtual keyboard
Often the least expensive device LVES: low vision enhancement systems: video projected
More practical for day-to-day use inside a
headset in front of the user’s eyes. Brings the
Disadvantages: objects closer for
the viewer.
Small screen may be difficult to use NVE: Night vision enhancement: amplifies visible and
Not as powerful as other devices infrared light.
Light passed through image intensifier tube
Often has the lowest battery life where light is converted
to electrons, then amplified
Small size makes it easy to steal/lose (increase in no.) and then light up
screen with phosphor
dust.
1.5. Impact of Emerging Technologies
Robotics
This is technology that is being newly developed
These can have several impacts on our society Programmed machinery widely used to do physically
demanding tasks
Can be automated or manually operated
Artificial Intelligence (AI)
Used to perform several tasks:
Dangerous jobs such as bomb disposal
Technology that focuses on creating a computer system
Exploring extreme environments such as volcanoes
that can
closely mimic or simulate human intelligence
Repetitive manufacturing jobs such as welding
AI can be used to:
Moving heavy objects such as large engines
Enhance video games and computer tactics
Impacts on everyday life:
Help decision making steps in expert systems
Increased personal time since robots can take over
Make robots to imitate human behaviour
domestic
chores
Understand different human languages
Increased manufacturing efficiency since robots are
Impact on everyday life:
much faster
and less expensive than human labour
Can be used to accurately predict hazardous weather
Unemployment as robots replace humans in
conditions
and signal warnings automatically
autonomous jobs
Take over menial tasks for humans; increasing our
Safer working environments since robots can perform
leisure time
tasks that
are too dangerous for humans
Can be used for safer automated travel; cars that can
drive and
park by themselves
Increases home safety by being able to tell the
Quantum Cryptography
difference
between owner & intruder; call authorities
automatically Technology that allows messages and data to be sent with
Improved medical care as decision making skills and complete
privacy; basically, advanced encryption
precision
can be enhanced Older encryption is based on mathematics, but this new
tech uses
physics
Makes it much more complex to decrypt
Biometrics
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
A remote control is used to control the operation of other They are tamperproof, preventing people from
devices
remotely by using infra-red signals keying in
information (which could corrupt the
Uses system)
In home entertainment devices such as Televisions, Disadvantages
DVD
player/recorder and satellite system There is a limited number of options available
Used to control multimedia systems Using touchscreens often can lead to health problems
Used in industrial applications to remotely control e.g.
(straining of arm muscles and RSI)
processes,
stop and start machinery The screen can get very dirty with constant touching
Advantages
Enable devices to be operated from any distance,
which is useful
for people with disabilities Scanners
Some chemical processes are hazardous, so it is safer
to operate
equipment from a distance Used to input information on hardcopy e.g. text document
Disadvantages Uses
People with limited hand/wrist movement can find Used to scan in documents and convert them into a
them hard to
use format for use
in various software packages
The signal between the control and the device can be Old and valuable documents and books can be
easily
blocked scanned, protecting
the original copies from damage
Non-digital photographs can be scanned for storing on
a computer
Joystick Advantages
Images can be stored for editing later
Scanners are much faster and more accurate than
typing in
documents again
It is possible to recover damaged documents and
photographs by
scanning them and then using
appropriate software to produce an
acceptable copy
By gripping the stick, a pointer on the screen can be Disadvantages
controlled The quality can be limited depending on how good the
Buttons are used to make selections scanner
resolution is
Uses
Video/computer games are often controlled by
joysticks Digital Cameras
They are used in simulators to mimic actual controls
Advantages
Easier to navigate round a screen compared to a
keyboard
Control is in three dimensions
Disadvantages
More difficult to control the on-screen pointer with a Photographs are stored in memory
joystick
than with other devices such as mice They can be easily transferred to a computer using a USB
Uses
Digital cameras can produce photographs for direct
Touch Screen transfer to a
computer or to print out
Digital cameras allow short video clips to be produced
User can choose an option by simply touching a Photographs can be uploaded directly into application
button/icon on the
screen software
such as word processor
The selection is automatically made without the need for Advantages
any
pointing device Easier to produce better quality photographs than with
Use a
tradition camera
Used for service tills e.g. petrol stations Easier and faster to upload photographs to a
Used where selections are made on a screen e.g. computer
ATMs, public
information systems, airports and There is no need to develop film and print out
railway stations photographs
(saves paper and no longer needs the
Used in PDA’s chemicals to produce
photographs from films)
Used in Interactive white boards Easy to delete an image from the memory if it’s not
Used in computer-based training (CBT) satisfactory
Advantages The memory card can store several hundred
Enable faster entry of options than a keyboard/mouse photographs
Very easy to choose options Disadvantages
User friendly method for inputting data
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The camera user needs to be computer literate to use Type of sensor Applications
the camera
properly Automatic washing machines, central
There is some artistry lost since clever software Temperature heating systems, automatic green
corrects
errors in the photographs houses, ovens
The resolution is not yet as good as traditional
Burglar alarm systems, robotics,
cameras
Pressure environmental monitoring, Automatic
Images often need to be compressed to reduce the
washing machines
amount of
memory used
It is possible to fill up computer memory very quickly Automatic doors, street lighting
with
several photos of the same subject (to find the Light control, Burglar alarm systems,
perfect snap
shot) automatic greenhouses
Burglar alarm systems, monitoring
Sound
liquid and powder flow in pipes
Video Camera Automatic greenhouses,
Humidity/moisture environmental monitoring, factories
DV (digital video) camera store compressed photo frames where moisture levels are crucial
at 25 MB/s – motion jpeg.
Automatic greenhouse, chemical
Light turned into electronic signal through light sensitive pH
processes, environmental monitoring
sensors and automatically converted to a digital file
format.
Advantages
Advantages
Readings by sensors are more accurate than taken by
Easy to edit footage in a video editing.
humans
High quality video captured, therefore
Readings are continuous, there is no break in
Disadvantages
monitoring
Storage medium (Memory cards) more expensive to
Because it is a continuous process any necessary
buy than films.
action or
warning will be initiated immediately
The system can be automatic, removing the need for
Microphone human
intervention, this is particularly important if the
process is
hazardous
Disadvantages
Faulty sensors can give spurious results
Graphic Tablet
Sensors
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Connected directly to a computer via a USB port The device has a slot where the card is placed, and the
Uses chip is read
While chatting online webcams can be used to have A small screen is part of the reader which gives
conversations instructions to the
operator
Used to enable video conferencing to take place Uses
Advantages Chip and PIN readers are used where payments are
Can be left on constantly and activated when required made using
cards e.g. travel agents
Allow people to keep in contact with each other Advantages
without the need
to travel, particularly useful for Provide a more secure payment system than requiring
disabled or elderly people a signature
or using magnetic stripe, since the PIN
Disadvantages typed in must match up
with the PIN stored on the chip
Webcams have limited features and the picture is Provide a more robust system than magnetic stripe
often of poor
quality since the chip
does not need to be in contact with the
They need to be connected to a computer reader
Disadvantages
2.2. Direct Data Entry & Associated Customer needs to be careful when typing in the PIN,
so nobody
reads it giving an opportunity for Fraud
Devices
Magnetic Stripe readers Radio Frequency Identification (RFID) Readers
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
IPS/LCD Monitor
Front layer made from liquid crystal diodes; grouped Receive analogue and digital signals, although most
together to
form pixels (RGB or RGBY-more vivid colours) modern
projectors only work with digital inputs
Receive analogue and digital signals, although most The signal source is usually from a computer, television,
modern
projectors only work with digital inputs or DVD
player
IPS (In-plane switching) is the technology used in LCD The image from the source is magnified and projected
monitors. onto a large
screen
Advantages The devices usually work with a remote control, but can
Colour can be seen accurately from different viewing also use
virtual mouse technology – cordless PC mouse
angles (has a laser pointer)
No lightening on touching It is then possible to direct the presentation without
Disadvantages being
tied to the computer
Expensive Most multimedia projectors take input from various
High power consumption types of
video format e.g. PAL, NTSC or SECAM
Slow response time Uses
Note: Old LCD monitors used CCFL (cold cathode Used for training presentations (allows the whole
fluorescent lamp)
technology to light up the screen. audience to
see the images from a computer)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Also used for advertising presentations (shown at Used to produce good quality hard copies – the quality is
exhibitions,
shopping malls etc.) not as
good as in laser printers but much better than that
Home cinema systems (projecting the images from a of dot matrix
printers
DVD or
television) use multimedia projectors Do not have large buffers like laser printers, so printing is
Advantages done a
bit at a time
Enables many people to see a presentation rather Therefore, printing is sometimes paused – the whole page
than all of
them crowded around a small computer can’t be
stored in the buffer, it must wait for the computer
screen to send more
data
Avoids the need for several networked computers Uses
e.g. when looking at a video clip on the internet, Used where low volume outputs are needed
everybody can
see the video on the large screen Ideal for high quality printing for small print jobs or
rather than logging on to
several computers single
pages e.g. for photo quality printouts
Disadvantages Advantages
Images can sometimes be fuzzy High quality output
Expensive to buy Cheaper to buy than laser printers
Setting up projectors can be a little difficult Very lightweight and take up little space (small
footprint)
Do not produce ozone and volatile organic
Laser Printer compounds, unlike
laser printers
Disadvantages
Output is slow if several copies needed – there is little
buffer
capacity to store the pages
The ink cartridges run out too quickly to be used for
large
print jobs
Printing can smudge if the user is not careful
Can be expensive to run if they are used a lot –
Produce very high-quality hard copy output original ink
cartridges are expensive
Print rate per page is fast if many pages are being printed
Rely on large buffer memories – the data for the whole
document is
stored before pages can be printed out Dot Matrix Printer
Uses
Used where noise levels need to be kept low e.g. in an
office
The best option for fast, high quality, high volume
printing
Advantages
Printing is fast for high volumes, slightly faster than A type of impact printer
inkjet
if only a few pages are to be printed A print head made up of a matrix of pins presses against
Can handle very large print jobs an inked
ribbon
Quality is consistently high Uses
Toner cartridges last for a long time; laser printers Can be used in noisy environments e.g. garage
can be a
cost-effective option if colour outputs are not workshops
required Can be used in applications were the print quality is
Disadvantages not very
important
Expensive to buy Advantages
Only fast if several copies are being made Can be used in environments which would be a
Colour laser printers tend to be expensive to run since problem for laser
and inkjet printers – dusty, dirty or
four
cartridges are needed as well as diffuser kits, etc. moist atmospheres
Produce ozone and volatile organic compounds Carbon copies or multi-part outputs can be produced
because of their
printing method and type of toner/ink Very cheap to run and maintain
used Easy to use if continuous stationary is required e.g.
These have been linked to health hazards in the office long print
jobs such as wage slips
Disadvantages
Very noisy – not good in an office environment
Inkjet Printer Cost more than an inkjet printer to buy
Very slow
Printing is of poor quality
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Speakers
Devices that produce hard copies but operate in a
different way to
printers
Not limited to normal printer paper size and can produce
highly
accurate, very large drawings and posters
The most common types are pen plotters, electrostatic
(similar
method to laser printers) and inkjet plotters
With pen plotters, coloured pens are controlled by a
computer
and the paper can move backwards and
forwards to allow accurate
shapes to be drawn Can be connected directly to a computer or are built into
Uses the
monitor or casing (as in laptop computers)
Used to produce large drawings e.g. blueprints of Uses a digital to analogue converter (DAC) to convert
buildings; are
often used with CAD applications digital data
from the computer to analogue from so the
Used to produce large pictures for use on billboards speakers can process it;
the signal is then amplified
or giant
posters through the speakers.
They can also print on plastic coated paper Uses
If the pens are replaced by cutting tools, it is possible to Used to output sound from multimedia presentations
make
large signs Used in home entertainment centres
Advantages They can help blind people through audio output of
Can produce huge printouts text on the
screen (together with speech generation
Print quality is extremely high software)
Disadvantages Used to play downloaded sound files
Slow in operation Advantages
Expensive to buy and maintain Usually long lasting and durable (if operated within
their
intended power levels)
Often provided with the computer/laptop although
3D Printer these may not
be the best quality
Disadvantages
Can take up a lot of desk space, compared to
headphones
Can distract people around you, everyone can hear
what you are
playing
May not be able to hear the full sound spectrum, this
requires
multiple speakers
A new type of printer that produces solid 3D models using
modified
inkjet technology called tomography
Very thin layers of fine powder (plaster, resin, starch) are
Actuators
bonded
together as a 3D model is slowly built up
Items produced are known as prototypes
A type of controlling device
Uses Transducers that are used to take signals from a
Used to produce prototypes which work from CAD
computer and
convert them into some form of motion e.g.
packages,
photograph images, stored drawings etc.
operating motors, pumps,
switches and valves
Scale models are produced in colour before the real Digital signals are sent from the computer to an actuator
thing is
manufactured
to operate
a device
The ultimate objective is to produce organic objects Conversion of the digital signal to analogue is required
using this
layering technology (such as replacement
first
(using a DAC)
human organs)
Advantages
Save a lot of money, other methods of making Motors
prototypes are very
time consuming and expensive
The powders used can often be ground up and reused
Physical scale models are produced with working
parts, which
gives a better idea of how the product will
look
Disadvantages Turned on or off by the actuator
Expensive to buy Uses
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The letter ‘R’ means the disc is recordable only once and Shiny and dull marks represent data to a computer where
then it
becomes ROM they are
interpreted
Use a thin layer of an organic dye as the recording media Uses
DVDs also use an additional silver alloy or gold reflector DVD-RAMs are used in recording devices such as
Laser beam produces heated spots and unheated spots satellite
receivers to allow simultaneous recording
Uses and playback
They are used for home recording of music (CD-Rs) They are used in camcorders to store films
and films
(DVD-Rs) Advantages
They are used to store data for later use Have a long life (30 years)
Used in applications where it is necessary to prevent Can be re written on more than the DVD-RWs (100,000
the
deletion or over-writing of important data times)
Advantages Very reliable as they have built in verification software
Cheaper than RW disks to
ensure accuracy of data
Once burned (and finalized) they are like ROM Access is very fast
Disadvantages No need to finalize the disk
Can only be reordered once Very large capacities
Not all CD/DVD players and can read CD-R Ability to read and write data at the same time
Disadvantage
DVD-RAMS are not as compatible as R or RW, many
CD-RW/DVD-RW systems will not
recognize this format
More expensive than DVD-RW
‘RW’ means that these disks are re-writable media can be
written
over several times
Unlike CD-R/DVD-R they don’t become ROMs Blu-Ray Discs
The recording layer uses a special phase-changing metal
alloy Uses
The alloy can switch between crystalline and amorphous Blu-ray disks are used in home video consoles
(non-crystalline) phases, thus changing its reflectivity to Used for storing and playing back films
light,
depending on the laser beam power PCs can use this technology for data storage or
Spots are produced which can be read by a laser backing up hard
drives
System allows data to be written, erased and re-written Camcorders can use this media to store film footage
many times Advantage
Uses Very large storage capacity
CD-RWs and DVD-RWs are used to record radio and Data transfer rate is very fast
television
programs Data access speed is faster than with other optical
They are used in closed circuit television (CCTV) media
systems Disadvantage
Advantages Disks are relatively expensive
Can be re used many times Blu-ray disks still have encryption problems
Different file formats can be used each time
Less wasteful than R format since files or data can be
3.3. Solid State Backing Storage
added at
a later stage
Disadvantages
Solid state systems control the movement of electrons
Relatively expensive media
within a
microchip: if the transistor conducts a current,
Possible to accidentally overwrite
this is equivalent
to a 1, otherwise it is a 0
Have no moving parts, consume much less power and are
extremely
robust
DVD-RAM
Used primarily as removable storage devices and are
collectively
known as flash memory
Recent addition to optical media group
Unlike other CD and DVD formats, DVD-RAMs have
several discrete
concentric tracks rather than a single
Solid State Drives
spiral track
Gives them advantage that writing, and reading can occur
Supports reading/writing data & maintains stored data in
at the same
time
a permanent
state even without power
Makes it possible to watch an already recorded television
Functions much like a hard drive but different tech
program at
the same time as a different program is being
Built with an array of semiconductors that form its
recorded
memory and
operated using an integrated circuit
Recording layer is made from similar phase-changing
Uses
material to that
used in RW technology
Used to store operating systems and working data
Used for storing application software
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
They are devices that can have multiple devices Laptop computers
connected to them Peripheral devices such as printers
Main task is to receive data from different ports and send Wi-Fi Hotspots
it to
each device Wi-Fi systems rely on AP (radio frequency technology)
The information will be received to the device whether its to enable
the device to receive and send signals
relevant,
or not Wi-Fi hotspots are places where you can access Wi-Fi
(free or
paid)
Hotspots are found in public places like Airports,
Bridges hotels, and
cafés
War driving: The act of driving and searching for
It connects 2 different types of networks together e.g. a unsecured
Wi-Fi hotspots
bus and
star network This gives a risk to the Wi-Fi system
It can only connect networks that use the same way for
handling
messages
They do this by changing the form of message to suite the Bluetooth
different
type of network
Bluetooth is an example of wireless personal area
networking (WPAN)
technology
Switches Spread spectrum transmission (radio waves) is used to
provide
wireless links between to devices such as mobile
More efficient than hubs in distributing data phones and allow
connection to the internet
Each device has an access control media address MAC A small home network can be created with this system
which identifies
it uniquely Uses
MAC Address: a number unique to each device connected Transfer photos from camera to mobile phone
to the
network (like fingerprints) Wirelessly connect different external devices
Data sent will have a mac address which tells the source
and
receiving device
4.4. Accessing the Internet
4.3. Wi-Fi & Bluetooth Type of server that acts as a buffer between a WAN and a
LAN
Wi-Fi Retrieves web pages and passes them onto the computer
that made a
request
Any system which allows you to connect to a network or Stores any page retrieved on the server, which means
computer
through wireless communication that when a
different computer requests the same page it
Examples: would be available
WLANs Speeds up the browsing process
PDAs
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Websites Intranet
Web is made up of millions of websites and web pages Like the internet but only accessible to specific users
Web pages are documents on a computer screen Basically, a private internet where outsiders cannot
containing various
multimedia and text, pictures connect to it
A website consists of many of these pages linked together Uses of an Intranet:
Web Browsing
Email
Uniform Resource Locator (URL) File Sharing
Schools: share information and learning resources
Web browsers use URLs to retrieve files with students
They are multiple ways of locating on the internet Businesses: share private information within a large
Standard form: 4 numbers e.g. 194.106.220.19 company
securely
Alphanumeric form:
protcol://web address/path/filename
Where; Protocol is usually http Comparing Internet & Intranet
Site address consists of: computer name, domain
name, domain
type, and country code Internet Intranet
Path is the web page Phrase Internal Restricted
Filename is the item on the page International Network
Origin Access Network
Purpose Globally share data Privately share data
4.6. Email Specific company or
Audience Wide range of people
organisation
A method for sending text and attachments from one
Anywhere if you are Only from within the
computer to
another over a network Access
connected company
Advantages
Speed of sending and receiving replies is quick
Low cost (no stamps, paper etc.)
Not needing to leave home to send the mail Local Area Networks (LAN)
Disadvantages
Not over a large geographical area (e.g. in one building)
Possibility of virus threats and hacking
Typical LAN will consist of several computers and devices
Need for the email address to be correct
Inability to send bulky objects via emails Devices and computers will be connected to hubs or
switches
One of the hubs or switches will usually be connected to a
4.7. Internet Service Provider (ISP) router/modem to allow LAN to connect to the internet
In doing so it then becomes part of a wide area network
These are companies that provide users with access to Advantages
the internet The sharing of resources
Provider in return for these services is charged a monthly Communication between users
or annual
fee Network administrator can control and monitor all
After paying this fee, a username and password are aspects of the
network
issued which can
be used to connect to the internet Disadvantages
Easier spread of viruses throughout the whole
4.8. Common Network Environments network
Development of printer queues
Slower access to external networks e.g. internet
Internet
Increased security risk
A worldwide collection of networks and computers that If main server breaks down, usually the networks will
have joined
together no longer
function
Uses of the Internet:
Web Browsing
Email
Wireless LANs (WLANs)
File Sharing
Do not involve any wiring or cabling
Entertainment
Provide wireless network connection overs a short
Video Conferencing
distance
Online Banking
They use radio or infrared signal's instead of cables
Advertising & Blogging
Devices known as Access Points (APs) are used for a
Social Media
larger range
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WAN is formed by several LANs being connected through Uses Wi-Fi to connect to the
Larger screen than
a router or a
modem
internet which is less reliable
smartphones
Some companies set up Private WANs, it is expensive
than wired
however it comes
with a more enhanced security On-screen keyboards larger Screens are smaller than
It is common to use an Internet service provider (ISP) for than those on smartphones those on laptops & desktops
connections to the internet and communicate via this On-screen keyboard is not
network system easy to type on
Additional hardware is needed for a WAN: Routers,
modems and proxy
servers MOBILE PHONES
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Could reduce the amount of incorrect information Passports: Have an RFID chip on it that
Against Policing:
Material already available in other sources i.e. books responds to a signal sent by a RFID reader that sends
Very expensive information about
the passport holder to the computer
Users would have to fund system
Difficult to enforce rules
Physical Tokens: A security token
Against freedom of information
Laws already exist to deal with perpetrators (sometimes called an authentication token) is a small
hardware
device that the owner carries to authorize access
to a network service.
The device may be in the form of a
Inappropriate Websites smart card or may be embedded in a
commonly used object
such as a key fob.
Risk of finding undesirable websites
Risk of doubtful websites which are not genuine Retina Scans: Scans the
They could lead to problems such as undesirable web
links, security
risks unique pattern of blood vessels in the
eye of a user using an
unperceived beam of low-energy infrared
light into a person's
eye as they look through the scanner's
eyepiece.
4.11. Password Interception
Iris Scans: A scanner scans and
Spyware
compares the pattern in the iris of a user to a database of
Spyware is software that gathers user information stored iris
patterns, if it finds a match, the user is
through their
network connections without them being authenticated. Iris scans are
generally more accurate than
aware that this is happening retinal scans.
Once spyware is installed, it monitors all key presses and
transmits
the information back to the person who sent out Face Recognition: Verifies the face of
the spyware
the person attempting to access the data using a face
This software can install other spyware software, read
recognition
algorithm and identifies facial features by
cookies and
personal information, and change the default
extracting landmarks, or
features, from an image of the
home page or web
browser
subject's face.
Anti-spyware can be used to search out this software and
correct the
corruption Fingerprint Scanning: Scans the pattern
Guidelines
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
in the Home Working with poor room lighting Use TFT rather than CRT
Computer screen glare/flicker Use anti-glare screens
Positive effects Negative effects Dirt can cause eye strain Ensure good room lighting
Lead to more leisure time No direct light on screen
since devices can be Unhealthy diets Clean dirt
programmed to do tasks
People become lazy and rely
More time to socialize
on devices 6. ICT Applications
Becoming very sophisticated
Dependency on technology
and can make use of
embedded web technology
increases 6.1. Communication Applications
More wasteful society since
Save energy - switch off Newsletters
devices thrown away if they
automatically
fail, not economic to repair
Paper-based communication used to inform people about
Easier to program device their
interests
Leaving on standby wastes
rather than set timings & Schools use these to inform parents about events/dates
resources
dates manually Advantages
Released regularly
5.4. Potential Health Problems The recipients have a permanent copy
Disadvantages
Requires distribution
Repetitive Strain Injury (RSI)
There are no special effects; sound/video/animation
There are printing costs; paper/ink
This is when joints such as the shoulder, wrist or fingers
swell,
causing pain
Damage gets worse if left untreated
Can lead to hand/arm immobility
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Publications Advantages
Faster to get results
Business Cards: Fewer errors
Miniature printed documents that provide information It is easier to do statistical analysis
about the
business/organisation Less expensive to carry out; requires fewer people
Usually printed on thick cards Online questionnaires
Easily distributable to potential clients Usually use radio buttons
Information includes company logo, services, address, No data preparation needed
contact
numbers, email, website Results sent directly to database for analysis
Gives a professional impression
Letterheads:
Found at the top of official printed documents to be
mailed to
clients or for internal use Address Lists
Makes it clear to reader who the sender is
Information includes company logo, name, address, An address book on a computer or mobile phone might have
contact
numbers a contact’s
home address, phone number, email address,
Gives a professional impression personal information like the
date of birth etc.
Easy to reply to
Flyers:
Generally printed on single sheets of A4 paper
Handed out directly to people for promotions
Cheap to produce and easily distributable (locally)
Information includes company logo, promoted product
or service,
contact details
Makes it easier to target a specific audience Clubs & Society Records
Brochures:
Also called leaflets & are like flyers Need to keep a record on members usually in a database
Difference is that they are often folded into sections Usually payment details, contact details and interests
Left on counters for pick up rather than handed out It makes it easy to match people with interests and send
Information includes company logo, promoted product information
about what they are interested in
or service,
contact details This can be done my using mail merging
Makes it easier to target a specific audience Easy to check memberships and send out reminders
It is important to follow the data protection act
6.2. Data Handling Applications
All data handling starts with data collection Database applications such as SIMS store large amounts
Data capture forms can be used for many applications of data which
can be used to create annual and termly
Decide what needs to be collected and then what school reports
questions should
be used to collect it Things able to be gathered from here are:
Paper or electronically Data individual to student – tests/exam results
Rules for creating forms Student progress – target grades being met or not
Make them look official Number of absences – create a percentage of amount
Spaces should be thought about giving enough space of days
attended school
for answers Teacher comments – adds comments on to report
Restrict the amount of possible answers, do not use
open
questions
6.3. Measurement Applications
If open questions are used limit the amount of space
available
for answers
Sensors are used to send data to a computer where the
Asking for ‘Name’ needs to be carefully thought about
data is
processed
Are you asking for sensitive information?
The computer simply reviews the data from the sensors
People may not feel comfortable being truthful
(by comparing
it to data stored in memory) and updates
What names do you want?
its files and/or gives a
warning signal if the values are
First name, family name etc.
outside given parameters
Date of Birth
No changes to the process are made
What format do you want it in?
Examples:
Give instructions about how to answer questions
Scientific experiments
How will the data be collected?
Weather stations
Paper surveys are scanned using OMR or OCR
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Digital data: discrete, fixed value (used by computers) Sensors read key vital signs (such as pulse/heart rate,
Analogue data/signals: continuous value that varies temperature,
blood pressure, respiration, etc.)
smoothly The data from the sensors is converted into digital using
Analogue device = measure length, weight, an ADC
temperature etc. The data is stored in the computer memory
E.g. Thermometer – represents temp. by the height of The computer compares the data from the sensor with
the liquid
column the values
stored in its memory
Sensors: measure physical and analogue qualities The results are output on a screen in the form of graphs
Analogue data from sensors needs to be converted into and/or
digital read-outs
digital data
using an analogue to digital data converter An alarm is activated if any of the data is outside
(ADC) so that the
computer can understand and process acceptable
parameters
the data from the sensors The system continues to monitor the patient until the
If the computer sends signals to motors, valves, etc. then computer is
turned off
this data
also needs to be converted to analogue using a
digital to analogue
converter (DAC) so that the computer
can effectively control these
devices
Advantages of Using Computers in
Measurement
Analogue to Digital Converter (ADC)
The computer will not forget to take readings
Used when you want to attach an analogue input device to The computer’s response time is much faster, which is
a digital
device such as a computer. particularly
important in the patient monitoring example
This is so the analogue data can be Doctors, nurses, scientists, etc. can all get on with other
understood/processed by the
computer since computers tasks
while the monitoring is done automatically
only work w/digital data Computer give 24 hours cover every day (i.e. 24/7)
E.g. When processing data sent from a sensor The readings will tend to be more accurate
Readings can be taken more frequently if they are done
by a computer
and sensors
It could also be safer if whatever is being monitored may
Digital to Analogue Converter (DAC) have
potential hazards (e.g. children falling into the river
whilst
attempting to take readings)
Used when you want to attach an analogue output device
to a digital
device such as a computer
E.g. If the computer is being used to control a device
(motor/valve)
the device will be controlled by variable Disadvantages of Using Computers in
voltages; the DAC will be
used to send out analogue
signals Measurement
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Disadvantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Biometrics: Every student’s fingerprint is stored on a Customer clicks on performance they wish to see
database along with their personal information, the They enter date and time of performance and required
students
must put their finger on a fingerprint scanner number of seats
to enter or leave
the school premises. A seating display at theatre is then shown on screen and
user clicks
where they want to sit
Advantages Disadvantages Database searched to check availability of selected seats.
Fingerprints are unique, so If
seating plan shown on screen, this isn’t required
another student can’t give Collecting every student’s If seats available, seat numbers are shown together with
their attendance for fingerprint initially is time- total price
somebody else, like with an ID consuming. If customer is happy with this, they select ‘confirm’
card. The seats are now temporarily set at ‘no longer available’
Fingerprint scanners are The customer then enters their personal details or
ID cards can be lost, whereas indicates that
they are a returning customer
more expensive than
fingerprints can’t be. They select a payment method and make the payment
magnetic stripe readers.
The theatre seats are then booked in the customer’s
Magnetic fields can affect an Damages on the finger will
name
ID card. deny access.
The final details are shown on the screen, together with a
There is an invasion of privacy reference
number
Copies of ID cards can be
in storing fingerprints on a An email is sent to the customer which they print out as
made easily.
school database. their proof
of purchase. In some cases, this also acts as
their printed ticket
when they go to the theatre – an e
Learner performance ticket
Spreadsheets can be used to record students’ The database is updated with the transaction
performances. It is
easier to compare each other’s
performances and an individual
student’s
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The use of computer technology has revolutionized how The readings are constantly compared with the pre-
we do our
banking transactions, for example: set values, if
the values aren’t in the prescribed range,
Internet banking the medical staffs
are notified.
The use of automated teller machines (ATMs) Hospital management system: All the above-mentioned
Chip and PIN technology points come
under the hospital management system
which holds all of them, and
can be used to access data
from all the departments.
Expert systems:
Automated teller machines (ATMs) The interactive screen asks a series of question for
the doctor
to answers, using a keyboard or a touch
Automated teller machines (ATMs) are places where screen.
customers can get
cash (or carry out certain other The inference engine compares the symptoms with
banking activities such as order a
statement) using their the knowledge
base, using the rule base to find
credit or debit card matches
The system suggests the possible illness with a
What goes on behind the
Sequence at ATM probability of
each, cures and recommendations on
scenes
the next step to be taken.
Customer puts card into Contact is made with bank’s The explanation system will explain how that
ATM computer particular
diagnosis was suggested.
PIN is checked to see if it is Using 3D printers in medicine:
PIN is entered using the correct Surgical and diagnostic aids: A CT or MRI is used to
keypad Card is checked to see if it is produce
images of the internal parts of the body. A 3D
valid printer can then
be used to reproduce the internal
A number of options are organs as a solid object.
given: change PIN, top up Prosthetics: 3D printers are used to print out artificial
mobile, see balance, get body parts such as false tooth, artificial limbs, hearing
money aids,
etc. This is a less expensive method of replacing
The customer selects the body parts.
cash option & several cash Tissue engineering: Used to produce layers of cells to
options are shown replace damaged tissues.
Design of medical tools and equipment: Tools can be
The customer’s account is
made
faster and with reduced costs. They can also be
The customer accepts one of accessed to see if they have
made changes to
easily, whereas it wasn’t the same
the options or types in a sufficient funds, it is checked to
with traditional methods.
different amount see if they are withdrawing
more than their daily limit
The customer is asked if they 6.11. Computers in Libraries
want a receipt
Many library systems are computer controlled
The card is returned Transaction is okay
They usually involve the use of barcodes on the books
Money is dispensed Customer’s account is updated being borrowed
and on the borrower’s library card
The following describes a computerized library system
6.10. Computers in Medicine based on
barcodes
There are two files:
Patient records: Database that holds patient details and Book file, containing fields for example: barcode, book
can be
accessed from any computer within the hospital title,
name of author etc.
intranet. Borrower’s file, containing fields for example:
Patient identification: Barcodes on wristbands of the borrower’s
number, borrower’s name etc.
patients
can be used to access their patient record. When a borrower takes out a book, the book’s code is
Pharmacy records: scanned
Generates labels for drugs The book details are then found on book file
Checks if the patient is allergic to a particular drug. The borrower’s library card barcode is then scanned for
Patient monitoring: the
borrower’s unique number
Sensors measure changes in temperature, heart rate, The book file is linked to the borrower’s file and both files
breathing
rate, brain activity, blood pressure, blood are
updated to indicate which book has been borrowed
sugar levels and
oxygen levels in the patient’s body. and when it is due
back
The analogue signals from the sensors are converted The borrower’s file is interrogated daily by the computer
into digital
signals using an analogue to digital to see
which books are overdue for return:
converter. The computer reads a record from the book file
Graphs are produced to show trends over time. It compares the date due back with the current date
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
If the date due back is less than (or equal to) the Disadvantages
current date
(i.e. earlier date) …
…using the barcode number of the book… They tend to lack common sense in some of the decision-
…the book file is linked to the borrower’s file… making
processes
…and the corresponding record is read from the Errors in the knowledge base can lead to incorrect
borrower’s file decisions being
made
The customer details are then found and a letter or It can be expensive to set up in the first place
email is
automatically sent out Considerable training is necessary to ensure the system
The next record in the book file is then read… is sued
correctly by the operators
…until the whole file has been checked
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Automatic stock control systems rely on the use of You can shop 24/7
barcodes Shop from any part of the world
Barcodes now appear on most products sold in shops You save the travelling costs of going for shopping
They allow quick identification of product details once the Disadvantages
barcode
has been scanned by a barcode reader Quality isn’t assured
Supermarkets use electronic point of sale (EPOS) People are worried about giving their card details
terminals, which
incorporate a barcode reader that scans online.
the barcode, retrieve the
price of the article and relay Packing and postal charges are added
information back to the computer
system allowing it to Personal services that you get from stores are
update its files missed.
Barcodes are made up of alternating dark and light lines Returning the products is harder
of varying
thickness No relaxation that you get from actual shopping
A number underneath the barcode usually consists of four Bogus sites are present where you pay and never
parts:
country code, manufacturer’s code, product code, receive the
product
and a check digit To seller:
The check digit is a form of validation which is used to Advantages
make sure
no errors occurred during the reading of the No need to pay rents
barcode No fixed working hours
Every time the barcode is read, this calculation is Less/no shoplifting
performed to
ensure that it has been scanned correctly Sell goods to customers anywhere in the world
Cheaper to contact customers (via e-mail)
Site warehouse where rental is cheap
Sell goods 24/7
Electronic Funds Transfer at Point of Sale (EFTPOS) Disadvantages
ICT knowledge needed to set up website
Many credit cards are equipped with a chip as well as a Unemployment
magnetic
stripe – containing the PIN Business abroad is lost if the prices are cheaper
This system is designed to enhance security since it is there
better than
relying only on a signature At times of network failures, there will be no
When paying for items using a chip and PIN card, a form access
of
electronic funds transfer (EFT) takes place Not everybody can access the internet, so a few
customers
are lost
Paying for a meal example
Customer’s personal data can be hacked
Waiter inserts card into chip and PIN reader Postal charges discourage people at times
Restaurant’s bank contact customer’s bank
Card is checked to if valid 6.14. Recognition Systems
If card is stolen or expired, then transaction is terminated
Customer enters PIN using keypad Automatic Number Plate Recognition (ANPR) systems:
PIN is read from chip on card and is compared to one just A sensor sends signals to a microprocessor, which
keyed in instructs a
camera to capture the front of a vehicle.
If they are the same, the transaction can proceed OCR software is used to read the number plate from
Check is then made on whether they have enough funds the image.
The characters are then converted to text
If there are not enough funds available, transaction is format in order to
store it in a database
terminated.
Otherwise, transaction is authorized Processing of cheques:
Authorization code is sent to restaurant The value of a cheque is printed in special ink
Price of meal is deducted from customer’s account containing iron
particles when a cheque is presented.
Same amount of money is credited to restaurant’s bank MICR is used to read the characters at the bottom of
account the cheque.
Receipt is produced as proof of purchase A batch processing method is then used to process all
the
cheques at the end of a specific time period.
OMR media in schools:
School registers: Paper-based registers are fed into
Internet Shopping
OMR to
be scanned and are then stored on a
database.
Online shopping: Shopping over the internet.
Multiple-choice examination papers: The position of a
To customer:
mark
is stored in a computer’s memory after being
Advantages
read by the OMR
device using a template that maps
Cheaper goods (the company doesn’t have to pay
out the X-Y coordinates of
each lozenge (pen/pencil
rent for
stores and doesn’t need more employees)
mark).
Wide range of products
RFID in passports:
Delivery at your doorstep
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The data on the RFID chip is read when the passport is Car park management: the system reads the
scanned. registration
number and if allowed into the car park,
A photo of you is clicked which is then compared with the barrier is raised.
the image
stored in the RFID chip. Electronic toll collection: the system recognizes the
If the face-recognition passes, some checks are made vehicle and deducts the fare accordingly.
in turn to
make sure you are eligible to enter the
country, and if you are,
the gate opens automatically.
RFID in contactless payments:
The embedded chip on credit/debit cards and the Cookies
antenna enable
customers to wave their card over a
reader at the point of sale
terminals to make Cookies are small files sent to a user’s computer via their
payments web
browser when they visit certain websites
Smartphone apps can also be used to make They store information about the users and this data is
contactless payments. accessed
each time they visit the website
For example:
They remember who the user is and send messages
6.15. Monitoring & Tracking Systems such as “Welcome
Sarah” each time they log onto the
website
Public monitoring/tracking: They recognize the user’s buying preferences e.g. if a
Ankle monitor: uses RFID chip to give out the person’s user buys
CDs, pop ups related to their buying habits
location and other details. It is tamper proof and will will appear on the
user’s screen each time they visit
alert
authorities if tried to remove. the website
Phone call tracking: the service provider tracks the Without cookies, web server would have no way of
calls
and the exact position from which they were knowing that the
user had visited website before
made For this reason, cookies could be used to monitor one’s
Worker monitoring/tracking: Workers are internet
activity
monitored/tracked in the
following ways:
Supermarket workers: have the number of items
passing
through the tills over a period of time 6.16. Satellite Systems
monitored.
Internet use is monitored by network managers: they Global Positioning Systems (GPS)
can
check sites visited and time spent on that site
during working
hours. Used to determine the exact location of several modes of
Emails can be read: Employers can check that no transport
personal
mails are sent during office hours. Cars usually refer to GPS as satellite navigation systems
Delivery drivers: Their location can be tracked using Satellites surrounding the Earth transmit signals to the
GPS
systems. It can also be checked if they are surface
following the
shortest route and aren’t speeding. Computers installed in the mode of transport receive and
Key logging: Software that records the keys pressed by a interpret
these signals
user on
the keyboard. They are used to find username Knowing their position on the Earth depends on very
and passwords of a
user. accurate timing
– atomic clocks are used in the satellites
Employee call monitors: Allows the employer to listen to which are accurate to
within a fraction of a second per
employee’s telephone calls. There are three ways it can day
be used: Each satellite transmits data indicating its position & time
Monitor: The manager/supervisor can listen to calls The computer on board the mode of transport calculates
without
the employee or the customer’s awareness. its exact
position based on the information from at least
Whisper: The manager can help the employee with the three satellites
call,
but the customer can’t hear the manager speak.
Barge: Both the employee and the customer can hear
the
manager
Satellite Navigation
Employee call monitors: Allows the employer to listen to
employee’s telephone calls. Call monitors can be used:
Used to determine the exact location of a car.
to improve the employee’s performance
The computers onboard can be used to show
to allow the manager/supervisor to join a call where
directions to a
destination.
necessary
as a training tool
Uses of Automatic Number Plate Recognition (ANPR)
systems: Geographic Information Systems (GIS)
Traffic enforcement: the system can check if a vehicle
is
taxed, recognize cars parked illegally, cars speeding Used to capture, manage, analyse and display
or going
through red lights so a fine can be imposed. geographically
referenced information.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Use to determine distance between two places. 4 Common Methods of Fact Finding
Used to find the nearest petrol station or restaurant,
etc. Observation
To protect animal and plant life in certain vulnerable
places. Involves watching personnel using the existing system to
Can be used in geography, science or engineering find out
exactly how it works
lessons. Advantages
The analyst obtains reliable data
It is possible to see exactly what us being done
It is a relatively inexpensive method
Media Communication Systems Disadvantages
People are generally uncomfortable being watched
Using satellite signals for communication. and may work in
a different way
Used by media companies when sending If workers perform tasks that violate standard
stories/videos/pictures
from remote locations. procedures, they
may not do this while being watched
Interviews
7. System Life Cycle
Involves a one-to-one question-and-answer session
between the
analyst and the employee/customer
7.1. Introduction Advantages
It gives the opportunity to motivate the interviewee
A systems analysis team is often brought in to review an into giving
open and honest answers to the analyst’s
existing
system and suggest several improvements questions
The existing method used may be either a manual paper- It allows the analyst to probe for more feedback from
based system
or a computer-based operation that is no the
interviewee, as it is easier to extend a question
longer regarded as adequate
for the task It is possible to modify questions as the interview
proceeds and
ask questions specific to the interviewee
7.2. Analysis It is a good method if the analyst wants to probe
deeply into
one specific aspect of the existing system
Disadvantages
The basic steps in the analysis stage can be summarized
as follows: It can be rather time consuming
It is relatively expensive, due to the use of the analyst’s
time
The interviewee cannot remain anonymous
Questionnaires
Advantages
It allows information to be obtained which was not
possible by
any of the other methods
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The analyst can see for themselves how the paper Character/type Check: Checks that the input data does not
system operates contain invalid characters
It allows the analyst to get some idea of the scale of E.g. A person’s name should not contain any numbers,
the
problem, memory size requirements, type of but a
person’s height should only contain digits
input/output devices
needed Format/picture Check: Checks that data is in a specific
Disadvantages format
It can be very time consuming E.g. Date should be in the form dd/mm/yyyy
Because of the analyst’s time, it is a relatively Limit Check: Similar to range check except that only one of
expensive
method the
limits (boundaries) is checked
E.g. Input data must be > 10
7.3. Design Presence Check: Checks if data is actually present and
has not
been missed out
E.g. In an electronic form, a person’s telephone
Once the analysis has taken place and the systems
number may be a
required field and if no data is
analyst has some
idea of the scale of the problem and
present this should give rise
to an error message
what needs to be done, the next
stage is to design the key
Consistency Check: Checks if fields correspond (tie up)
parts of the recommended system
with
each other
A list of tasks is summarized here
E.g. If ‘Mr’ has been typed into a field called title then
Designing data capture forms/input forms
the
gender field must contain either ‘M’ or ‘Male
Designing screen layouts
Check Digit: Look at an extra digit which is calculated from
Designing output forms and reports
the
digits of a number and then put on the end of the
Producing systems flowcharts and/or pseudo code
number
Selecting and designing validation rules that need to
E.g. Check digits can identify three types of error:
be used
If two digits have been inverted during input
Selecting the most appropriate data verification
An incorrect digit entered twice
methods
A digit missed out altogether
Designing and agreeing the file structures and tables
Selecting and designing the hardware requirements
Selecting and designing the software requirements 7.4. Development & Testing
Producing algorithms or program flowcharts
Designing a testing strategy/plan Once the design stage is completed, it is then necessary
to create
the system and fully test it
This section considers some of the development stages
and testing
strategies which are often adopted by system
Verification analysts
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
How these are used to interface with the final system now chosen for a particular
application
needs to
be identified, for example how the screens will
be used to collect
the data and the way the output will be
presented
If specialist hardware is needed (e.g. for people with
disabilities), then it will be necessary to finalize how these
devices are used with the system when it is implemented
This will be followed by thorough testing to ensure the
user screens
are user friendly and that the correct output
is associated with the
inputs to the system
Testing of each module needs to be done to ensure each The old system is stopped overnight and the new system
one functions
correctly on its own introduced
immediately
Once the development of each module is completed, the Advantages
whole system
needs to be tested (i.e. all modules The benefits are immediate
functioning together) Costs are reduced - since only one system is used
Even though each individual module may work there is no
need to pay for two sets of staff
satisfactorily, when
they are all put together there may be There is less likelihood of a malfunction since the new
data clashes, incompatibility
and memory issues system
will have been fully tested
All of this may lead to a need to improve the input and Disadvantage
output
methods, file and database structures, validation This method can be disastrous if the new system fails
and verification
methods
Parallel Running
Then the system will need to be fully tested again
It is a very time-consuming process but the system must The old and new systems are run side by side for a time
be as
perfect as possible before it goes live before the
new system takes over altogether
Testing will use many different types of data, which will Advantages
fall into
one of three categories: normal, extreme or If the new system fails, the old system is still available
abnormal as a
back-up
Let us suppose one of the fields in a database is the date It is possible to train staff gradually
and this
must be in the form dd/mm/yyyy, where each Staff have time to get used to the new system
element of the date must
be numeric: Disadvantage
Normal: this is data which is acceptable/valid and has It is more expensive than direct changeover, since
an
expected (known) outcome, e.g. the month can be extra staff
are needed to run both systems together
any whole number
in the range 1 to 12
Extreme: this is data at the limits of Pilot Implementation
acceptability/validity, e.g. the month can be either of
the two
end values i.e. 1 or 12 The new system is introduced into one part of the
Abnormal: this is data outside the limits of company (e.g. into
a warehouse of a supermarket) and its
acceptability/validity and should be rejected or cause performance assessed
an error
message Advantages
For example, all the following values are not allowed If the new system fails, only one part of the company is
as inputs
for the month: affected
Negative numbers (e.g. -1, -15) It is possible to train staff in one area only, which is
Any value greater than 12 (e.g. 32, 45) much
faster and less costly than parallel running
Letters or other non-numeric data (e.g. July) The costs are also less than parallel running, since
Non-integer values (e.g. 3.5, 10.75) only one
part of the system is being used in the pilot
Disadvantage
It is more expensive than direct changeover, since
7.5. Implementation each pilot
scheme needs to be evaluated before the
next stage is introduced
Once the system is fully tested, the next stage is to fully
implement it Phased Implementation
We will now consider changeover to the new system in
more depth Initially, only part of the new system is introduced
There are four common methods used for changing over Only when it proves to work satisfactorily is the next part
from the old
system to the new system introduced, and so on, until old system is fully replaced
Each one has advantages and disadvantages which need Advantages
to be weighed
up before the most appropriate method is
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
If the latest part fails, it is only necessary to go back in User documentation is designed to help users to learn
the
system to the point of failure, hence failure is not how to use the
software or system
disastrous This can consist of any of the following:
It is possible to ensure the system works properly the purpose of the system/program/software package
before
expanding how to log in/log out
Disadvantages how to load/run the software
This is more expensive than direct changeover, since how to save files
it is
necessary to evaluate each phase before moving how to do a search
to the next stage how to sort data
how to do printouts
how to add, delete or amend records
screen layouts (input)
Comparing Changeover Methods print layouts (output)
hardware requirements
Changeover method Direct Parallel Pilot Phased software requirements
Relative costs Low High Medium Medium sample runs (with test data and results)
Input needed by the user Medium High Low Medium error handling/meaning of errors
Input needed by systems troubleshooting guide/help lines/FAQs
Low* Low Medium Medium tutorials
team
Impact of failure High Low Low Medium
7.7. Evaluation
7.6. Documentation Once a system is up and running it is necessary to do
some
evaluation and carry out any maintenance, if
Once the new system is fully developed, a considerable necessary.
amount of
documentation needs to be produced This is done to ensure the efficiency of the system, the
For the end user ease of use
of the system, and the appropriateness of the
For people who may need to modify or develop the system.
system further
at some later stage The following is a list of some of the things considered
There is some overlap between the two types of when
evaluating how well the new system has worked.
documentation, but
the basic requirements are shown This can ultimately
lead back to a re-design of part of the
below system if there is strong
evidence to suggest that changes
need be made.
To evaluate the system, the analyst will:
compare the final solution with the original
Technical Documentation
requirement
identify any limitations in the system
Technical documentation is designed to help
identify any necessary improvements that need to be
programmers & analysts
who need to make
made
improvements or repair/maintain to the system
evaluate the user’s responses to using the new system
This can consist of any of the following:
compare test results from the new system with results
purpose of the system/program/software
from the
old system
program listing/coding
compare the performance of the new system with the
programming language used
performance
of the old system
flowchart/algorithm
observe users performing set tasks, comparing old
input formats
with new
hardware requirements
measure the time taken to complete tasks, comparing
software requirements
old with new
minimum memory requirements
interview users to gather responses about how well
known bugs in the system
the new
system works
list of variables used (and their meaning/description)
give out questionnaires to gather responses about the
file structures
ease of
use of the new system
sample runs (with test data and results)
Some results from the evaluation may require changes to
output formats
either
hardware or software. Hardware may need to be
validation rules
updated because:
meaning of error messages
of feedback from end users
new hardware comes on the market, making change
necessary
User Documentation there are changes within the company which require
new devices
to be added or updated
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Software may need to be updated because: If personal data is leaked (data breach), the following can
of feedback from end users occur:
changes to the company structure or how the Identity theft
company works may
need modifications to the Bank fraud
software Damages to personal property
changes in legislation may need modifications to the Kidnapping (if kidnappers get access to the victim’s
software address.
Etc.
To prevent the above, it is essential that personal data is
8. Safety & Security protected.
Personal data can be leaked intentionally and
unintentionally.
Electronic data is at risk due to: hacking,
8.1. Physical Safety viruses, spyware,
phishing, pharming, Smishing, vishing,
ransomware (A malicious
program that encrypts data on
Ways of eliminating or minimizing a computer system and demands for a
ransom to provide
Safety hazard
hazard and decrypt the data), spam, moderated and
un-
Use a residual circuit breaker moderated forums, cookies, etc.
(RCB), Check insulation on wires If a student shares a photograph of themselves in their
Electrocution from
regularly, Do not allow drinks near school
uniform on social media, then paedophiles, child
spilling drinks
computers, Check equipment predators,
kidnappers, etc. can physically reach the
regularly student. This should not
be done
Cable ducts- make wires safe,
Tripping over trailing
Cover wires/tuck them away, Use
wires
wireless connections
Internet Safety
Strong desk/tables to support
heavy hardware, Use large desks
Heavy equipment falling To keep personal data safe, one must:
and tables so that hardware
Not give unknown people (on the internet) personal
doesn’t fall off edge
information
or send pictures of oneself to them.
Have a CO2 fire extinguisher Maintain privacy settings to control which cookies are
nearby, Don’t cover equipment on their
computer
Fire risk from
vents- can cause equipment to Use learner friendly search engines and websites
overloading sockets or
overheat, Make sure hardware is recommended by
your educational institution, e.g.
equipment overheating
fully maintained, Do not overload znotes.org
sockets with too many items The website being accessed is from a trusted source,
or has a
padlock symbol/ https protocol (s for secure):
8.2. E-Safety
E-safety refers to the safety of data and personal
information while
using the internet.
E-safety is required to make sure a user’s personal
information is
not made vulnerable and even leaked to
hacker’s for e.g., which can
lead to identity fraud, bank A/C
issues, etc.
Personal Data
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Preventing Phishing, Pharming & Smishing Spam is electronic junk mail and is a type of advertising
from a
company sent out to a target mailing list
User education Harmless but can clog up networks and slow them down
Set up anti-malware and anti-spyware software It is more of a nuisance than a security risk
Enabling protocols such as SPF and DKIM Many ISPs are good at filtering out spam, and prevent the
Do not download random .exe (executable file formats), user from
getting these spam emails.
.php, .bat,
.com etc. It is often necessary to put a legitimate email address into
Users should be alert and look out for clues when being a
contact list to ensure wanted emails are not filtered out
redirected to other websites. by mistake
Therefore, technology enables unauthorised users to gain
access to
otherwise inaccessible information. Encryption
If a person on the internet is asking for personal
information, or
to meet in real life or acting suspicious, The conversion of data to code by encoding it
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
9. Audience
Potential Problems
9.1. Audience Appreciation If products are not built towards a specific audience well
then
problems may arise
Knowing Your Audience An older audience may not be able to understand or read
text due to
poor font design
When designing ICT solutions, you must consider A younger audience may not be able to understand
audience certain text due to
complex wording & structure
There are 4 main characteristics of an audience Several audiences may just not find content interesting
Age: since it is
not relevant enough to them
Can affect audience’s interests in your product Several audiences may not find content attractive enough
Large fonts and colours attract children and thus
not purchase or use it at all
More stylish and trendy layout attracts young adults Younger & older audience may not understand how to use
Gender the product
due to lack of simple instruction
Design product for a specific gender
Younger girls are often attracted to pink
Males generally prefer blue spectrum 9.2. Legal, Moral, Ethical & Cultural
Income Appreciation
Knowing this will help in attractive pricing strategies
Promoting certain products are targeted for people
Copyright Legislation
within a
specific range of incomes
Interests A law that protects books, music art and other media that
Can help with advertising content are
written is copyright law
Content that meets the exact description of audience’s
It is an automatic right and does not need applying for
interest
is more likely to attract them to your product The person who owns the rights must be asked before
it can be
used again
Software is a specific thing created and written on a
computer
Audience Needs
Needs to be protected as it is so easy for people to
After finding out about your targeted audience you need copy
to aim to
meet those demands This is a way of protecting software from being used
Developers of the ICT product must ensure that they meet without
permission
as many of
these needs as possible Users create a license which determines the terms
Common Needs for Common Audiences: and conditions
Audience Needs
Bright/cheerful colours Copyright Laws
Animations/sounds/pictures
Less text It is not legal to make a copy of software, then sell it or
Young children Simple wording give it
away to other people
Software cannot be used on a network unless a network
Large text
license has
been acquired
Games/activities Not legal to use coding from software in your own
Easy to use software without
permission
Attractive/stylish colours Renting out software without permission is illegal
Interesting content It is illegal to use the name of copyrighted software
Teens & adults Balance of pictures and text without
permission
Clear fonts
Bullet points
Contrasting/easy-to-read colours Software Protection
Include clear instructions
Installed software will require a unique reference number
Use slightly larger font sizes User will have to accept license agreement
Seniors
Fewer technical terms Holograms are used to indicate software is original
Consistent design Software may only run if CD-ROM or DVD-ROM is actually
Easy to use in the drive
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Some software will only run if a memory stick is plugged Copyright laws apply to text in emails. Forwarding a block
in USB
ports of text
or an image without the copyright owner’s
permission, it would be
illegal.
Creating ICT Solutions
Employer Guidelines
ICT solutions, for e.g. a website should be made in
accordance to
the legal, moral, ethical and cultural beliefs If the rules in the ‘contract of employment’ set out by the
of the target
audience. employer
is not obeyed, you would be in breach of your
contract and could be
dismissed.
Implications of ICT Solutions
Security
When creating an ICT solution, all the following have to be
considered and the solution must be made in response Emails containing personal information should be
and respect to
these factors: encrypted to
prevent hackers from understanding the
Legal: Ensure copyright laws are abided by including information if they manage to
hack into the email.
not using
any coding or branding from existing
copyrighted software.
Morality: To distinguish from right or wrong.
Sometimes it
may not be illegal to carry out an act Netiquette
however it could be
against your morals. For example,
setting up a fake website to
deceive is not illegal but Some of the rules that the netiquette contains is:
questions your level of morality. Don’t be abusive
Ethics: Is to break a code of conduct. For example, Don’t send spam
disclosure of information about the new software to a Be precise
rival
software publisher or to the press. Check spelling and grammatical errors
Culture: When software is released in different Ensure attachments are not too large
cultures
then care must be taken so that people are Don’t use CAPITAL LETTERS to highlight comments
not offended. If
certain computer games mock religion Don’t plagiarize
or cultural beliefs, then
again this could cause offence. Don’t use too many emoticons
10. Communication User ID and Password Protection
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Blog
11. File Management
Personal internet journals where the writer posts their
observations
on a topic
No training is needed to do this 11.1. Manage Files Effectively
Blogs range from minor projects (e.g. people gossiping
about a
topic) to important subjects such as politics or Extension
Full form Used for/in:
advertising
products name
Comments are not immune from the law Stylesheets in
Bloggers can be prosecuted for offensive comments css Cascading Stylesheet
webpages
Comma Separated
csv Store tabular data
Value
Wiki Graphics Interchange
gif Moving images
Format
Software allowing users to easily create and edit web Hypertext Mark-up
pages without
using any web browser
htm Webpages
(Language)
A wiki will support hyperlinks and has a very simple syntax Joint Photographic
(language rules) for creating pages jpg Standard for images
Experts Group
Wikis are described as ‘web pages with an edit button’
Documents to be
Anyone can use wikis- content should be treated with Portable Document
pdf circulated over the
caution Format
internet/email
Example of a wiki: Wikipedia
Portable Network
png Compressed images
Graphic
Word processed
Social Networking rtf Rich Text Format
documents
txt Text (File) Simple Text files
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE
ICT (0417)