Caie Igcse: Updated To 2023-2025 Syllabus
Caie Igcse: Updated To 2023-2025 Syllabus
Caie Igcse: Updated To 2023-2025 Syllabus
ORG
CAIE IGCSE
ICT (0417)
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
LVES: low vision enhancement systems: video projected Computer Assisted Translation (CAT)
inside a
headset in front of the user’s eyes. Brings the
objects closer for
the viewer. When human translators use computer software to help
NVE: Night vision enhancement: dim light is captured and in the
translation process
passed through a light intensifier tube, which converts Can reduce translation time
light to electrons. Electrons pass through another tube May not be 100% accurate
where they are amplified to produce more electrons. Common CAT tools:
Amplified electrons pass through to the end of the tube Spell checkers
where they hit a screen coated in phosphor dots that glow Translation memory software
when collided with. this creates an image several times Language search-engine software
brighter and clearer than the original Impacts on everyday life:
More accurate documents since most software can
automatically
detect errors
Robotics More multilingual society since anyone with an
internet
connection can now essentially learn multiple
Programmed machinery widely used to do physically languages using
translators
demanding tasks Quicker translations
Can be automated or manually operated
Used to perform several tasks:
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Keyboards
Mouse
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
An example of a pointing device They are more difficult when doing operations such as
The ball underneath the mouse is used to detect ‘drag and
drop’
movement
The left button is for selecting by double on it and the right
is to
bring drop-down menus Tracker Ball
There is usually a scroll button which speeds up the
process of
moving through a document
Uses
Used for opening, closing and minimising software
Used for grouping, moving and deleting files Tracker ball is like a mouse except that it has a ball on the
Useful when editing images (e.g. controlling the size top of
the device
and
position of the image) Users control the pointer on the screen by rotating the
Used for controlling the position of a pointer on the ball
screen to
allow: Uses
Selection from a menu Have the same pointing/cursor control capability as a
Selecting an icon mouse
Scrolling up/down and right/left Used in applications where the user has a disability
Advantages (RSI)
Faster to select an option by a mouse than a keyboard Used in a control room environment, where it is faster
Enables rapid navigation through applications and the than a
mouse to navigate through process screens
internet and more robust than a
mouse
Mice are small and don’t take much area Advantages
Disadvantages Tracker balls don’t need the same fine control as a
People with restricted hand/wrist movement can find it mouse
hard to
operate a mouse People with limited hand/wrist movement find easier
Easily damaged and can easily be clogged up with dirt to use than
a mouse
They are hard to use if there is no flat surface The pointer can be positioned more accurately on the
available screen than
with a mouse
They take less desk space than mice since they are
stationary
Touchpad
Disadvantages
Touchpads are used in many laptop computers as a Tracker balls are not supplied with the computer as
pointing device standard, so
they are more expensive
The pointer is controlled by the user moving their finger User may need training since they are not standard
on the
touchpad equipment
Uses
Used for opening, closing and minimising software
Remote Control
Used for grouping, moving and deleting files
Useful when editing images (e.g. controlling the size A remote control is used to control the operation of other
and
position of the image) devices
remotely by using infra-red signals
Used for controlling the position of a pointer on the Uses
screen to
allow: In home entertainment devices such as Televisions,
Selection from a menu DVD
player/recorder and satellite system
Selecting an icon Used to control multimedia systems
Advantages
Used in industrial applications to remotely control
Faster to select an option by a touchpad than a
processes,
stop and start machinery
keyboard Advantages
Enables rapid navigation through applications and the Enable devices to be operated from any distance,
internet which is useful
for people with disabilities
Since the touchpad is integrated into laptop computer, Some chemical processes are hazardous, so it is safer
there is
no separate mouse, aiding portability to operate
equipment from a distance
They can be used when no flat surfaces are available Disadvantages
Disadvantages People with limited hand/wrist movement can find
People with limited hand/wrist movement can find them hard to
use
touchpads hard
to use The signal between the control and the device can be
It can be more difficult to control the pointer when easily
blocked
compared to
a mouse
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Light turned into electronic signal through light sensitive Type of sensor Applications
sensors and automatically converted to a digital file Automatic greenhouse, chemical
format. pH
processes, environmental monitoring
Advantages
Easy to edit footage in a video editing.
Advantages
High quality video captured, therefore
Readings by sensors are more accurate than taken by
Disadvantages
humans
Storage medium (Memory cards) more expensive to Readings are continuous, there is no break in
buy than films.
monitoring
Because it is a continuous process any necessary
Microphone action or
warning will be initiated immediately
The system can be automatic, removing the need for
human
intervention, this is particularly important if the
process is
hazardous
Disadvantages
Faulty sensors can give spurious results
Graphic Tablet
Can be connected directly to a computer
Sounds can be inputted and manipulated
Uses
Microphones are used to input speech/sounds to be
used in
various applications
They are used in voice recognition software- for A graphic tablet is used with a stylus to produce freehand
conversion of
speech into text, and recognition of drawings
commands Uses
AdvantagesFaster to read in text than to type it using a Graphics tablets are used to produce drawings,
keyboard computer graphics
Possible to manipulate sound in real time using In countries where characters are complex e.g. japan,
special software they are
used as a form of input
If used in a voice activation system, this has the They are used in computer aided design (CAD) work
advantage of
improving safety Advantages
Disadvantages It is possible to modify drawings before they are input
Sound files can use up a lot of computer memory They offer an accurate method of drawing
Voice recognition software isn’t as accurate as typing Disadvantages
in
manually They are more expensive than other pointing devices
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Webcams have limited features and the picture is Provide a more secure payment system than requiring
often of poor
quality a signature
or using magnetic stripe, since the PIN
They need to be connected to a computer typed in must match up
with the PIN stored on the chip
Provide a more robust system than magnetic stripe
2.2. Direct Data Entry & Associated since the chip
does not need to be in contact with the
reader
Devices Disadvantages
Customer needs to be careful when typing in the PIN,
Magnetic Stripe readers so nobody
reads it giving an opportunity for Fraud
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
IPS/LCD Monitor
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
It is then possible to direct the presentation without These have been linked to health hazards in the office
being
tied to the computer
Most multimedia projectors take input from various
types of
video format e.g. PAL, NTSC or SECAM Inkjet Printer
Uses
Used for training presentations (allows the whole
audience to
see the images from a computer)
Also used for advertising presentations (shown at
exhibitions,
shopping malls etc.)
Home cinema systems (projecting the images from a
DVD or
television) use multimedia projectors
Used to produce good quality hard copies – the quality is
Advantages
not as
good as in laser printers but much better than that
Enables many people to see a presentation rather
of dot matrix
printers
than all of
them crowded around a small computer
Do not have large buffers like laser printers, so printing is
screen
done a
bit at a time
Avoids the need for several networked computers
Therefore, printing is sometimes paused – the whole page
e.g. when looking at a video clip on the internet,
can’t be
stored in the buffer, it must wait for the computer
everybody can
see the video on the large screen
to send more
data
rather than logging on to
several computers
Uses
Disadvantages
Used where low volume outputs are needed
Images can sometimes be fuzzy
Ideal for high quality printing for small print jobs or
Expensive to buy
single
pages e.g. for photo quality printouts
Setting up projectors can be a little difficult
Advantages
High quality output
Laser Printer Cheaper to buy than laser printers
Very lightweight and take up little space (small
footprint)
Do not produce ozone and volatile organic
compounds, unlike
laser printers
Disadvantages
Output is slow if several copies needed – there is little
buffer
capacity to store the pages
Produce very high-quality hard copy output The ink cartridges run out too quickly to be used for
Print rate per page is fast if many pages are being printed large
print jobs
Rely on large buffer memories – the data for the whole Printing can smudge if the user is not careful
document is
stored before pages can be printed out Can be expensive to run if they are used a lot –
Uses original ink
cartridges are expensive
Used where noise levels need to be kept low e.g. in an
office
The best option for fast, high quality, high volume Dot Matrix Printer
printing
Advantages
Printing is fast for high volumes, slightly faster than
inkjet
if only a few pages are to be printed
Can handle very large print jobs
Quality is consistently high
Toner cartridges last for a long time; laser printers A type of impact printer
A print head made up of a matrix of pins presses against
can be a
cost-effective option if colour outputs are not
an inked
ribbon
required
Disadvantages Uses
Can be used in noisy environments e.g. garage
Expensive to buy
Only fast if several copies are being made workshops
Can be used in applications were the print quality is
Colour laser printers tend to be expensive to run since
not very
important
four
cartridges are needed as well as diffuser kits, etc.
Advantages
Produce ozone and volatile organic compounds
because of their
printing method and type of toner/ink Can be used in environments which would be a
problem for laser
and inkjet printers – dusty, dirty or
used
moist atmospheres
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Carbon copies or multi-part outputs can be produced Used to produce prototypes which work from CAD
Very cheap to run and maintain packages,
photograph images, stored drawings etc.
Easy to use if continuous stationary is required e.g. Scale models are produced in colour before the real
long print
jobs such as wage slips thing is
manufactured
Disadvantages The ultimate objective is to produce organic objects
Very noisy – not good in an office environment using this
layering technology (such as replacement
Cost more than an inkjet printer to buy human organs)
Very slow Advantages
Printing is of poor quality Save a lot of money, other methods of making
prototypes are very
time consuming and expensive
The powders used can often be ground up and reused
Wide Format Printer Physical scale models are produced with working
parts, which
gives a better idea of how the product will
look
Disadvantages
Expensive to buy
Slow at producing their output
Product is sometimes a little rough, often further work
Devices that produce hard copies but operate in a needs to
be done
different way to
printers
Not limited to normal printer paper size and can produce
Speakers
highly
accurate, very large drawings and posters
The most common types are pen plotters, electrostatic
(similar
method to laser printers) and inkjet plotters
With pen plotters, coloured pens are controlled by a
computer
and the paper can move backwards and
forwards to allow accurate
shapes to be drawn
Uses
Used to produce large drawings e.g. blueprints of
buildings; are
often used with CAD applications Can be connected directly to a computer or are built into
Used to produce large pictures for use on billboards the
monitor or casing (as in laptop computers)
or giant
posters Uses a digital to analogue converter (DAC) to convert
They can also print on plastic coated paper digital data
from the computer to analogue from so the
If the pens are replaced by cutting tools, it is possible to speakers can process it;
the signal is then amplified
make
large signs through the speakers.
Advantages Uses
Can produce huge printouts Used to output sound from multimedia presentations
Print quality is extremely high Used in home entertainment centres
Disadvantages They can help blind people through audio output of
Slow in operation text on the
screen (together with speech generation
Expensive to buy and maintain software)
Used to play downloaded sound files
Advantages
3D Printer
Usually long lasting and durable (if operated within
their
intended power levels)
Often provided with the computer/laptop although
these may not
be the best quality
Disadvantages
Can take up a lot of desk space, compared to
headphones
A new type of printer that produces solid 3D models using Can distract people around you, everyone can hear
modified
inkjet technology called tomography what you are
playing
Very thin layers of fine powder (plaster, resin, starch) are May not be able to hear the full sound spectrum, this
bonded
together as a 3D model is slowly built up requires
multiple speakers
Items produced are known as prototypes
Uses
Actuators
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
CD-RW/DVD-RW Disadvantage
DVD-RAMS are not as compatible as R or RW, many
‘RW’ means that these disks are re-writable media can be systems will not
recognize this format
written
over several times More expensive than DVD-RW
Unlike CD-R/DVD-R they don’t become ROMs
The recording layer uses a special phase-changing metal
alloy Blu-Ray Discs
The alloy can switch between crystalline and amorphous
(non-crystalline) phases, thus changing its reflectivity to Uses
light,
depending on the laser beam power Blu-ray disks are used in home video consoles
Spots are produced which can be read by a laser Used for storing and playing back films
PCs can use this technology for data storage or
System allows data to be written, erased and re-written
many times backing up hard
drives
Uses Camcorders can use this media to store film footage
CD-RWs and DVD-RWs are used to record radio and Advantage
Very large storage capacity
television
programs
They are used in closed circuit television (CCTV) Data transfer rate is very fast
Data access speed is faster than with other optical
systems
Advantages media
Can be re used many times Disadvantage
Different file formats can be used each time Disks are relatively expensive
Blu-ray disks still have encryption problems
Less wasteful than R format since files or data can be
added at
a later stage
Disadvantages 3.5. Solid State Backing Storage
Relatively expensive media
Possible to accidentally overwrite Solid state systems control the movement of electrons
within a
microchip: if the transistor conducts a current,
this is equivalent
to a 1, otherwise it is a 0
DVD-RAM Have no moving parts, consume much less power and are
extremely
robust
Recent addition to optical media group Used primarily as removable storage devices and are
Unlike other CD and DVD formats, DVD-RAMs have collectively
known as flash memory
several discrete
concentric tracks rather than a single Flash memory makes use of NAND chips whereas
spiral track EEPROM (Electronically Erasable Programmable Read-
Gives them advantage that writing, and reading can occur Only Memory) uses NOR chips
at the same
time Devices using EEPROM are more expensive compared to
Makes it possible to watch an already recorded television flash memory
program at
the same time as a different program is being
recorded
Recording layer is made from similar phase-changing Solid State Drives
material to that
used in RW technology
Shiny and dull marks represent data to a computer where Supports reading/writing data & maintains stored data in
they are
interpreted a permanent
state even without power
Uses Functions much like a hard drive but different tech
DVD-RAMs are used in recording devices such as Built with an array of semiconductors that form its
satellite
receivers to allow simultaneous recording memory and
operated using an integrated circuit
and playback Uses
They are used in camcorders to store films Used to store operating systems and working data
Advantages Used for storing application software
Have a long life (30 years) Used in file servers for computer networks
Can be re written on more than the DVD-RWs (100,000 Advantages
times) Faster than hard disks because they do not need to
Very reliable as they have built in verification software ‘spin up’ the
disk
to
ensure accuracy of data Robust because no mechanical parts
Access is very fast Read performance is fast even when data fragmented
No need to finalize the disk Less susceptible to data loss
Very large capacities No moving parts so it is more reliable
Ability to read and write data at the same time
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Function
Flash Drives/Memory Sticks
Makes decisions on messages being passed between the
Otherwise called pen drive/memory stick/USB stick
networks
Can store several GBs of data and use solid state Reads information about the message and decides where
technology
the message
should go and the best route for it to get
Connected to a computer through USB port and power to
there
operate drawn
from host computer
Formats the messages making it suitable for the new
Some expensive software increasingly uses these storage
network
methods as a
form of security
Uses
Used to transport files between computers How it Works
Used as a security device – a dongle – to prevent
software
piracy To send data to a specific device, a router needs a
Advantages something like
an address
Very compact and portable media Internet Protocol Address: a unique number assigned to
Very robust all
computers and devices connected to the internet which
Not affected by magnetic fields can determine
its exact physical location
Disadvantages A router can use this IP to send data from the internet to
Not possible to write protect the data and files the exact
device that requested it
Small physical size and are easy to lose. Storing IP Addresses:
Lower storage capacity than hard disk Routers store IP addresses in a routing table
Routing tables list all the different routes to other
networks
Flash Memory Cards Routing table determines best route for data
4. ## 4.1. THEORY Wired: cards that have ports which allow network
cables to be
plugged in directly
Wireless: cards that connect to networks using Wi-Fi
Networks & the Effects of signals
Using them
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Bluetooth
Switches
Bluetooth is an example of wireless personal area
More efficient than hubs in distributing data networking (WPAN)
technology
Each device has an access control media address MAC
Spread spectrum transmission (radio waves) is used to
which identifies
it uniquely provide
wireless links between to devices such as mobile
MAC Address: a number unique to each device connected phones and allow
connection to the internet
to the
network (like fingerprints) A small home network can be created with this system
Data sent will have a mac address which tells the source Uses
and
receiving device Transfer photos from camera to mobile phone
Wirelessly connect different external devices
Modems
4.4. Accessing the Internet
It stands for modulator demodulator.
Converts computer’s digital signals (modulates it) into User can access by web browser
analogue for
transmission through telephone lines
Reverse this process- analogue signal from a telephone Type of access Description
line into
digital for a computer to process the data Slowest type (60kbps), Telephone
(demodulates it) Dial up internet access line gets tied up while a dial up
The main use it to connect to computer networks over modem is in operation
long distances
using existing telephone lines Local cable television operators
Cable internet access give user access through cable
Types of Modems:
networks
Dial-up modems: operate at 60 kilobits/sec Fastest download speed
Internet access via DSL
slow compared to modern standards connections (at least 11000kbps)
Asymmetric: faster at downloading than uploading
(ADSL) asymmetric digital subscriber line modems
4.5. Web Browser
operate at
11,000 kilobits/sec
Don’t tie up line while accessing internet, which allows
Software used to retrieve, present & traverse the World
simultaneous internet access and usage of telephone
Wide Web
Cable modems: allow cable TV users to receive TV signals
World Wide Web: system of interlinked hypertext
as well as
internet access
documents
accessed via the Internet
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Retrieves web pages and passes them onto the computer Web Browsing
that made a
request Email
Stores any page retrieved on the server, which means File Sharing
that when a
different computer requests the same page it Entertainment
would be available Video Conferencing
Speeds up the browsing process Online Banking
Advertising & Blogging
Social Media
Websites
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
If main server breaks down, usually the networks will DESKTOP COMPUTERS
no longer
function
Advantages Disadvantages
Most websites are designed Not portable so are limited to
Wireless LANs (WLANs)
to be viewed on a desktop use in one room
Do not involve any wiring or cabling Have larger keyboards Require keyboard and mouse
Provide wireless network connection overs a short making it easier to type on as extra peripheral devices
distance Screens are larger so giving
Screen and Monitor consume
They use radio or infrared signal's instead of cables an easier and better viewing
separate power.
Devices known as Access Points (APs) are used for a experience
larger range Cannot usually connect to
APs usually use spread spectrum technology (larger Usually use wired internet
devices like Bluetooth
range) connections which is more
speakers without external
Advantages stable/reliable than Wi-Fi
adapter
All computers can access the same services and
Robust Take up large desk space
resources
No cabling is involved Good heat dissipation- large
Bulky to carry around
The system is more flexible body.
Adding new computers and devices is very easy
Cost is reduced, and safety is improved TABLET COMPUTERS
Disadvantages
Security is an issue Advantages Disadvantages
Problems and interference can affect the signal Smaller & lighter than
Larger & less portable than
The data transfer is slow than in the wired LAN desktops & laptops making it
smartphones
easier to carry
Uses Wi-Fi to connect to the
Wide Area Networks (WAN) Larger screen than
internet which is less reliable
smartphones
WAN is formed by several LANs being connected through than wired
a router or a
modem On-screen keyboards larger Screens are smaller than
Some companies set up Private WANs, it is expensive than those on smartphones those on laptops & desktops
however it comes
with a more enhanced security On-screen keyboard is not
It is common to use an Internet service provider (ISP) for easy to type on
connections to the internet and communicate via this
network system MOBILE PHONES
Additional hardware is needed for a WAN: Routers,
modems and proxy
servers Advantages Disadvantages
Smallest most portable of all Websites are often not fully
4.9. Using Different Types of Computers devices displayed
to Access the Internet People more likely to carry Small screen size makes
this wherever they go viewing websites difficult
LAPTOP COMPUTERS Much easier to connect to Small keyboards make it
internet on-the-go difficult to type
Advantages Disadvantages Allow children access to
More portable than desktops internet anywhere; can be
Less portable than
can access internet in more dangerous
tablets/smartphones
locations
Larger screen than tablets & Screens not as large as 4.10. Network Security Issues
smartphones which allows desktop PCs may not appear
easier reading as clearly Connection to a network exposes a user to:
Keyboards are bigger than CPUs are not as powerful as Hacking: Unauthorised access
given to computer.
those on tablets/smartphones those in desktops Phishing: Phishing involves
getting sensitive
Touchpads allows easy information such as usernames, passwords, and
navigation even on slanted credit card detail, for malicious reasons, by mimicking
surfaces a
reliable webpage on the network
Pharming: Explained in chapter 8 card 2 (E-Safety)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
1. Data must be Fairly and lawfully processed A method for sending text and attachments from one
2. Data can only be processed for the Stated purpose computer to
another over a network
3. Data must be A**dequate, Relevant and not Excessive
4. Data must be Accurate
5. Data must not be kept longer than necessary (Short Comparing Faxing & Email
time)
6. Data must be processed in accordance with the data Fax Email
Subject’s right More secure (user id and
Singed faxes are legally
7. Data must be kept Secure password needed to access
acceptable
8. Data must not be transferred to another country files)
unless
(Domestic) they have adequate protection Digital files (no need to print –
Poor quality prints at times
eco-friendly)
Delay is telephone line busy Better quality
Guidelines
Files can be transferred
Slow if several documents
Do not leave personal information lying around between any device
need to be sent
Lock all filing cabinets when leaving an office connected to the internet
Do not leave computer without locking or logging off Faster sending of documents
Every recipient must be
Protect passwords per document and even if
dialled up one by one
Change passwords regularly multiple recipients
Do not fax or email anything of sensitive nature.
Expensive to buy No dedicated device needed
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Disadvantage: sound quality is usually bad No longer a need for large office space to store
Security Issues: documents
Identity and service theft Documents are only printed out when required
Viruses and malware Reduced chances for loss of documents as all of them
Spamming (sending junk mail) are stored on one computer
Phishing attacks (illegitimate scams) This leads to need for fewer staff and increase in
efficiency
Spreadsheets:
5. ## 5.1. THEORY can be used to calculate wage/salary slips
Calculations are easily done on this software
Spreadsheets are used to produce graphs for the
The Effects of Using ICT analysis of situations
Usage of this software has led to reduction in staff
Effects of IT on Employment Staff no longer needed to calculate wages and
salaries manually
IT led to unemployment in many areas Databases
Manufacturing - robots have taken over many tasks Updating personnel data (eg salary, home address,
and are much faster. Example in welding car bodies, phone number etc) can be done on databases
spray painting items and manufacturing circuit regularly
boards. Staff records can be centralised in one database and
Computer controlled warehouses – automatic, does data can be transferred between sites
not need people very quick and easy to use
Labour intensive work - printing industry and filing This leads to reduced need for Human Resources staff
New jobs have been created in ICT however, Databases lead to the need for remaining
Writing software staff to be retrained to use the new technology
Maintenance of robots
Internet related jobs 5.2. Effects of IT on Working Patterns
Effects on People: Part-time working: A contract where someone works
fewer hours
per week than a full-time employee, in shifts.
People need to be retrained due to new technology
Cleaner working environment Flexible working (flexi-time): Workers can choose their
working
time but will have to complete the day’s work.
De-skilling of workforce
Job sharing: Two or more part-time workers divide their
Computers can now do tasks that required high skill level
job,
replacing one full-time worker.
Safer working environment
Compressed hours: Employees can work longer hours per
Fewer manual tasks such as heavy lifting
day but
over fewer days, completing the workload sooner.
Effect on Companies:
5.3. Microprocessor-Controlled Devices
Can employ less people
Robots do not take holiday, get sick or need breaks in the Home
Greater consistency in products made
Positive effects Negative effects
Negative impact of ICT on employment Lead to more leisure time
since devices can be Unhealthy diets
introduction of ICT to the workplace has led to
programmed to do tasks
redundancies of many employees which can cause them
to lose a source of income People become lazy and rely
More time to socialize
skills such as filing and carrying out numerical analysis is on devices
effectively replaced by sophisticated software Becoming very sophisticated
Dependency on technology
and can make use of
Types of software that have impacted offices the most: increases
embedded web technology
Word processors:
More wasteful society since
Save energy - switch off
Possible to modify and update word documents devices thrown away if they
automatically
fail, not economic to repair
There’s no longer a requirement to store physical files
on shelves and offices which would take up space and Easier to program device
Leaving on standby wastes
make the office look messy and full rather than set timings &
resources
dates manually
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Eye Problems
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Electronic instruments can play back through electronic Wireless devices that allow users to make phone calls
effects
machines from anywhere
with cell reception
Synthesizers combine simple wave forms to produce They connect to the telephone system using radio signals
complex music
creations This requires them to be in range of a mobile tower
Electronic organs can mimic any other instrument Used for communication via
Music scores can be generated from music itself using Phone calls
software Text messaging
Software can automatically correct music notes in a score Social Media
There is no need to understand music notation to write a
music score
Music notes are automatically printed out in the correct
format Internet Telephony/VOIP
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Digital to Analogue Converter (DAC) Readings can be taken more frequently if they are done
by a computer
and sensors
Used when you want to attach an analogue output device It could also be safer if whatever is being monitored may
to a digital
device such as a computer have
potential hazards (e.g. children falling into the river
E.g. If the computer is being used to control a device whilst
attempting to take readings)
(motor/valve)
the device will be controlled by variable
voltages; the DAC will be
used to send out analogue
signals
Disadvantages of Using Computers in
Measurement
Pollution Monitoring
Expensive to purchase and set up
Example: monitoring oxygen levels in a river If performed for educational purposes, reduced practical
Sensors read data from the river (oxygen levels and hands-on
experience and learning.
acidity levels
using a pH sensor) Will not function in a power cut if no backup power
The data from the sensors is converted into digital using present
(expensive to have reliable backup power)
an ADC
The computer stores the received data 6.4. Microprocessors in Control
The oxygen levels and acidity levels are compared to the
Applications
historical
data stored in memory and they are also
compared to alarm levels
stored in memory
Sensors are used to send data to a computer where the
One of two things will now happen: either the data is
data is
processed
transferred to
a CD/DVD or to a memory stick and taken
The computer reviews the data from the sensors (by
away for analysis later or
the computer is connected into
comparing it to
data stored in memory)
a mobile phone network and transmits
the data back
If the values are outside the given parameters/pre-set
automatically to the monitoring station
value it acts
to try and get the values within acceptable
ranges
It does this by sending signals to devices controlling the
Intensive Care Units in Hospitals process
Sensors read key vital signs (such as pulse/heart rate,
temperature,
blood pressure, respiration, etc.)
The data from the sensors is converted into digital using
Turtle Graphics
an ADC
Based on computer language called LOGO and is now
The data is stored in the computer memory
usually known as
turtle graphics
The computer compares the data from the sensor with
It is the control of the movement of a ‘turtle’ on a
the values
stored in its memory
computer screen
by several key instructions which can be
The results are output on a screen in the form of graphs
typed in
and/or
digital read-outs
The use of ‘repeat’ instructions makes a piece of code
An alarm is activated if any of the data is outside
more
efficient
acceptable
parameters
The system continues to monitor the patient until the Command Meaning
computer is
turned off
FORWARD x Move x cm forward
BACKWARD x Move x cm backward
LEFT d Turn left through d degrees
Advantages of Using Computers in
RIGHT d Turn right through d degrees
Measurement REPEAT n Repeat next set of instructions n times
ENDREPEAT Finish the repeat loop
The computer will not forget to take readings
The computer’s response time is much faster, which is PENUP Lift the pen up
particularly
important in the patient monitoring example PENDOWN Lower the pen
Doctors, nurses, scientists, etc. can all get on with other
tasks
while the monitoring is done automatically
Computer give 24 hours cover every day (i.e. 24/7)
The readings will tend to be more accurate Automatic Washing Machines
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Have a microprocessor in them which contains the If too low, it will heat up by turning the boiler on
software which
controls the washing machine and
if it’s too high it will turn the air conditioner
Appling the factors on
Inputs These will stay on until desired temperature is
Pressure sensor on the door to detect if open or reached
closed
Sensor to detect if the required level of water is in
Temperature sensor to check temperature
Outcome Automatic Cookers
Clothes have been washed
Have temperature sensors and timers with manual
Outputs
controls to set
start and end times, and temperature for
Heater
cooking.
Motor to spin drum
Working similar to Central Heating System.
Lights on machine to show user stage the cycle is
at
Actuators to turn the inlet valves on to allow hot
and cold
water into the machine Burglar Alarms
Actuator to turn the outlet valve on to let the water
out of
the machine when the wash is complete Burglar alarms detect any intrusion.
An actuator to control the pump Sensors such as motion sensors, door and window
Processing sensors,
magnetic sensors, multi-functional sensors
Software to make decisions which will allow the (vibration, shutter,
and temperature) measure the
clothes to
be washed physical quantity and inputs the
value to a
Time taken before next inputs microprocessor.
Timer as part of the software The microprocessor compares the input values with
Time different cycles (when to add the preset
values, if changes are detected, the
soap/conditioner/etc.) microprocessor sends
signals to the actuator
Time delay in measuring temperature The actuator activates the sirens or gives a phone call
Needs to be time for changes to have effect or
messages the input mobile number.
Unmanageable situations
Door may not be shut
Needs to draw user’s attention
Usually a buzzer and light Glasshouse
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Disadvantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Automated teller machines (ATMs) are places where The interactive screen asks a series of question for
customers can get
cash (or carry out certain other the doctor
to answers, using a keyboard or a touch
banking activities such as order a
statement) using their screen.
credit or debit card The inference engine compares the symptoms with
the knowledge
base, using the rule base to find
What goes on behind the matches
Sequence at ATM
scenes The system suggests the possible illness with a
Customer puts card into Contact is made with bank’s probability of
each, cures and recommendations on
ATM computer the next step to be taken.
PIN is checked to see if it is The explanation system will explain how that
PIN is entered using the correct particular
diagnosis was suggested.
keypad Card is checked to see if it is Using 3D printers in medicine:
valid Surgical and diagnostic aids: A CT or MRI is used to
produce
images of the internal parts of the body. A 3D
A number of options are
printer can then
be used to reproduce the internal
given: change PIN, top up
organs as a solid object.
mobile, see balance, get
Prosthetics: 3D printers are used to print out artificial
money
body parts such as false tooth, artificial limbs, hearing
The customer selects the aids,
etc. This is a less expensive method of replacing
cash option & several cash body parts.
options are shown Tissue engineering: Used to produce layers of cells to
The customer’s account is replace damaged tissues.
The customer accepts one of accessed to see if they have Design of medical tools and equipment: Tools can be
the options or types in a sufficient funds, it is checked to made
faster and with reduced costs. They can also be
different amount see if they are withdrawing made changes to
easily, whereas it wasn’t the same
more than their daily limit with traditional methods.
The customer is asked if they
want a receipt 6.11. Computers in Libraries
The card is returned Transaction is okay
Money is dispensed Customer’s account is updated Many library systems are computer controlled
They usually involve the use of barcodes on the books
being borrowed
and on the borrower’s library card
6.10. Computers in Medicine The following describes a computerized library system
based on
barcodes
Patient records: Database that holds patient details and There are two files:
can be
accessed from any computer within the hospital Book file, containing fields for example: barcode, book
intranet. title,
name of author etc.
Patient identification: Barcodes on wristbands of the Borrower’s file, containing fields for example:
patients
can be used to access their patient record. borrower’s
number, borrower’s name etc.
Pharmacy records: When a borrower takes out a book, the book’s code is
Generates labels for drugs scanned
Checks if the patient is allergic to a particular drug. The book details are then found on book file
Patient monitoring: The borrower’s library card barcode is then scanned for
Sensors measure changes in temperature, heart rate, the
borrower’s unique number
breathing
rate, brain activity, blood pressure, blood The book file is linked to the borrower’s file and both files
sugar levels and
oxygen levels in the patient’s body. are
updated to indicate which book has been borrowed
The analogue signals from the sensors are converted and when it is due
back
into digital
signals using an analogue to digital The borrower’s file is interrogated daily by the computer
converter. to see
which books are overdue for return:
Graphs are produced to show trends over time. The computer reads a record from the book file
The readings are constantly compared with the pre- It compares the date due back with the current date
set values, if
the values aren’t in the prescribed range, If the date due back is less than (or equal to) the
the medical staffs
are notified. current date
(i.e. earlier date) …
Hospital management system: All the above-mentioned …using the barcode number of the book…
points come
under the hospital management system …the book file is linked to the borrower’s file…
which holds all of them, and
can be used to access data …and the corresponding record is read from the
from all the departments. borrower’s file
Expert systems:
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The customer details are then found and a letter or Errors in the knowledge base can lead to incorrect
email is
automatically sent out decisions being
made
The next record in the book file is then read… It can be expensive to set up in the first place
…until the whole file has been checked Considerable training is necessary to ensure the system
is used correctly by the operators
6.12. Expert Systems
Inference engine
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Automatic stock control systems rely on the use of Cheaper goods (the company doesn’t have to pay
barcodes rent for
stores and doesn’t need more employees)
Barcodes now appear on most products sold in shops Wide range of products
They allow quick identification of product details once the Delivery at your doorstep
barcode
has been scanned by a barcode reader You can shop 24/7
Supermarkets use electronic point of sale (EPOS) Shop from any part of the world
terminals, which
incorporate a barcode reader that scans You save the travelling costs of going for shopping
the barcode, retrieve the
price of the article and relay Disadvantages
information back to the computer
system allowing it to Quality isn’t assured
update its files People are worried about giving their card details
Barcodes are made up of alternating dark and light lines online.
of varying
thickness Packing and postal charges are added
A number underneath the barcode usually consists of four Personal services that you get from stores are
parts:
country code, manufacturer’s code, product code, missed.
and a check digit Returning the products is harder
The check digit is a form of validation which is used to No relaxation that you get from actual shopping
make sure
no errors occurred during the reading of the Bogus sites are present where you pay and never
barcode receive the
product
Every time the barcode is read, this calculation is To seller:
performed to
ensure that it has been scanned correctly Advantages
No need to pay rents
No fixed working hours
Less/no shoplifting
Electronic Funds Transfer at Point of Sale (EFTPOS) Sell goods to customers anywhere in the world
Cheaper to contact customers (via e-mail)
Many credit cards are equipped with a chip as well as a
Site warehouse where rental is cheap
magnetic
stripe – containing the PIN
Sell goods 24/7
This system is designed to enhance security since it is
Disadvantages
better than
relying only on a signature
ICT knowledge needed to set up website
When paying for items using a chip and PIN card, a form
Unemployment
of
electronic funds transfer (EFT) takes place
Business abroad is lost if the prices are cheaper
Paying for a meal example there
At times of network failures, there will be no
Waiter inserts card into chip and PIN reader access
Restaurant’s bank contact customer’s bank Not everybody can access the internet, so a few
Card is checked to if valid customers
are lost
If card is stolen or expired, then transaction is terminated Customer’s personal data can be hacked
Customer enters PIN using keypad Postal charges discourage people at times
PIN is read from chip on card and is compared to one just
keyed in 6.14. Recognition Systems
If they are the same, the transaction can proceed
Check is then made on whether they have enough funds Automatic Number Plate Recognition (ANPR) systems:
If there are not enough funds available, transaction is A sensor sends signals to a microprocessor, which
terminated.
Otherwise, transaction is authorized instructs a
camera to capture the front of a vehicle.
Authorization code is sent to restaurant OCR software is used to read the number plate from
Price of meal is deducted from customer’s account the image.
The characters are then converted to text
Same amount of money is credited to restaurant’s bank format in order to
store it in a database
account Processing of cheques:
Receipt is produced as proof of purchase The value of a cheque is printed in special ink
containing iron
particles when a cheque is presented.
MICR is used to read the characters at the bottom of
the cheque.
Internet Shopping
A batch processing method is then used to process all
Online shopping: Shopping over the internet. the
cheques at the end of a specific time period.
To customer: OMR media in schools:
Advantages School registers: Paper-based registers are fed into
OMR to
be scanned and are then stored on a
database.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Multiple-choice examination papers: The position of a to allow the manager/supervisor to join a call where
mark
is stored in a computer’s memory after being necessary
read by the OMR
device using a template that maps as a training tool
out the X-Y coordinates of
each lozenge (pen/pencil Uses of Automatic Number Plate Recognition (ANPR)
mark). systems:
RFID in passports: Traffic enforcement: the system can check if a vehicle
The data on the RFID chip is read when the passport is is
taxed, recognize cars parked illegally, cars speeding
scanned. or going
through red lights so a fine can be imposed.
A photo of you is clicked which is then compared with Car park management: the system reads the
the image
stored in the RFID chip. registration
number and if allowed into the car park,
If the face-recognition passes, some checks are made the barrier is raised.
in turn to
make sure you are eligible to enter the Electronic toll collection: the system recognizes the
country, and if you are,
the gate opens automatically. vehicle and deducts the fare accordingly.
RFID in contactless payments:
The embedded chip on credit/debit cards and the
antenna enable
customers to wave their card over a
reader at the point of sale
terminals to make Cookies
payments
Cookies are small files sent to a user’s computer via their
Smartphone apps can also be used to make
web
browser when they visit certain websites
contactless payments.
They store information about the users and this data is
accessed
each time they visit the website
6.15. Monitoring & Tracking Systems For example:
They remember who the user is and send messages
Public monitoring/tracking: such as “Welcome
Sarah” each time they log onto the
Ankle monitor: uses RFID chip to give out the person’s website
location and other details. It is tamper proof and will They recognize the user’s buying preferences e.g. if a
alert
authorities if tried to remove. user buys
CDs, pop ups related to their buying habits
Phone call tracking: the service provider tracks the will appear on the
user’s screen each time they visit
calls
and the exact position from which they were the website
made Without cookies, web server would have no way of
Worker monitoring/tracking: Workers are knowing that the
user had visited website before
monitored/tracked in the
following ways: For this reason, cookies could be used to monitor one’s
Supermarket workers: have the number of items internet
activity
passing
through the tills over a period of time
monitored.
Internet use is monitored by network managers: they
6.16. Satellite Systems
can
check sites visited and time spent on that site
during working
hours. Global Positioning Systems (GPS)
Emails can be read: Employers can check that no
Used to determine the exact location of several modes of
personal
mails are sent during office hours.
transport
Delivery drivers: Their location can be tracked using
Cars usually refer to GPS as satellite navigation systems
GPS
systems. It can also be checked if they are
Satellites surrounding the Earth transmit signals to the
following the
shortest route and aren’t speeding.
surface
Key logging: Software that records the keys pressed by a
Computers installed in the mode of transport receive and
user on
the keyboard. They are used to find username
interpret
these signals
and passwords of a
user.
Knowing their position on the Earth depends on very
Employee call monitors: Allows the employer to listen to
accurate timing
– atomic clocks are used in the satellites
employee’s telephone calls. There are three ways it can
which are accurate to
within a fraction of a second per
be used:
day
Monitor: The manager/supervisor can listen to calls
Each satellite transmits data indicating its position & time
without
the employee or the customer’s awareness.
The computer on board the mode of transport calculates
Whisper: The manager can help the employee with the
its exact
position based on the information from at least
call,
but the customer can’t hear the manager speak.
three satellites
Barge: Both the employee and the customer can hear
the
manager
Employee call monitors: Allows the employer to listen to
employee’s telephone calls. Call monitors can be used: Satellite Navigation
to improve the employee’s performance
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
7. ## 7.1. THEORY
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
It is possible to modify questions as the interview Selecting the most appropriate data verification
proceeds and
ask questions specific to the interviewee methods
It is a good method if the analyst wants to probe Designing and agreeing the file structures and tables
deeply into
one specific aspect of the existing system Selecting and designing the hardware requirements
Disadvantages Selecting and designing the software requirements
It can be rather time consuming Producing algorithms or program flowcharts
It is relatively expensive, due to the use of the analyst’s Designing a testing strategy/plan
time
The interviewee cannot remain anonymous What to include in data input forms
Questionnaires Heading
to make clear the purpose of the form
Involves sending out questionnaires to the work force
Text boxes
and/or to
customers to find out views of the existing
clarity on where to enter information
system and find out how
some key tasks are carried out limits the information entered
Advantages
Tick boxes
The questions can be answered quite quickly
to give choices which customers can choose from (eg.
It is a relatively inexpensive method
Male or Female)
Individuals can remain anonymous if they want
Large fonts and visible text colours
It allows quick analysis of the data increases visibility in form so there are fewer chances
Disadvantages
of mistakes
Often the number of returned questionnaire is low
Drop-down menus
The questions are rather inflexible since they have to
On-screen help
be
generic
reduces chances of error in case customers are
There is no immediate way to clarify a vague or confused
incomplete
answer to a question
Automatic validation
Looking at Existing Paperwork checks if entered information meets the criteria and is
Allows the analyst to see how the paper files are kept, look at acceptable
operating instructions and training manuals, check the Control buttons
when reviewing the output screen display, it is vital to
accounts, etc.
check that instructions are clear, font sizes and text colour
Advantages is visible, the full screen is utilized and the size of output
It allows information to be obtained which was not fields are correct.
possible by
any of the other methods
The analyst can see for themselves how the paper Verification
system operates
It allows the analyst to get some idea of the scale of A way of preventing errors when data is copied from one
the
problem, memory size requirements, type of medium to
another
input/output devices
needed
Double entry: data is entered twice, by two different
Disadvantages
people
It can be very time consuming
The computer compares the two entries, either after
Because of the analyst’s time, it is a relatively
data entry
or during the data entry process, and
expensive
method
identifies any differences
Visual check: person entering the data compares the data
7.4. Design with the original document (not the same as proof-
reading)
Once the analysis has taken place and the systems
analyst has some idea of the scale of the problem and Validation
what needs to be done, the next stage is to design the key
parts of the recommended system. Process where data is checked to see if it satisfies certain
A list of tasks is summarized here criteria when input into a computer, for example, to see if the
Designing data capture forms/input forms data falls within accepted boundaries.
Designing screen layouts Validation
Designing output forms and reports How it works Example
rule
Producing systems flowcharts and/or pseudo code
checks if the entered
Selecting and designing validation rules that need to a person’s age should
Range check data is within an
be used be 0< but >150
acceptable range
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Validation least of the right type & that it conforms to certain rules.
How it works Example
rule Validation routines and verification methods are used to
crosscheck entered if ‘Senior Manager’ is ensure this happens
Lookup check data with data stored an existing option in a Again, routines have to be fully tested to ensure they trap
in an existing table query unwanted
data but also to make sure any data
transferred from a paper-based
system to an electronic
if a field needs 6
checks that the system has been done accurately
characters, then
entered data has a Any system being developed will have some form of user
Length check entering 7 characters
required number of interface
should give rise to an
characters The types of hardware were chosen in the design stage
error message
How these are used to interface with the final system now
a person’s name needs to
be identified, for example how the screens will
Character No invalid characters
should not contain any be used to collect
the data and the way the output will be
check can be entered
numbers presented
checks that entered If specialist hardware is needed (e.g. for people with
date should be in the
Format check data is in a specific disabilities), then it will be necessary to finalize how these
format dd/mm/yyyy
format devices are used with the system when it is implemented
in a data entry form, if This will be followed by thorough testing to ensure the
a person’s name is a user screens are user-friendly and that the correct output
to check if data is is associated with the inputs to the system
Presence required field and no
actually entered and
check data is entered, this
not missed out Testing strategies
should give an error
message
Testing strategies are done in modular form
an extra digit that is the system is broken up into parts (modules) and each
added at the end of a a digit is missed out or part is developed and tested separately
Check digit number. it is an incorrect digit is any problems in the testing mean that only the module
calculated from the entered will need to be modified and tested again
digits in the number Once the development of each module is completed, the
if ‘Mr’ is typed out into whole system
needs to be tested (i.e. all modules
checks if fields
Consistency a field then the functioning together)
correspond (tie up)
check GENDER field must be Even though each individual module may work
with each other
M or Male satisfactorily, when
they are all put together there may be
data clashes, incompatibility
and memory issues
All of this may lead to a need to improve the input and
7.5. Development & Testing
output
methods, file and database structures, validation
Once the design stage is completed, it is then necessary and verification
methods
to create
the system and fully test it Then the system will need to be fully tested again
It is a very time-consuming process but the system must
The testing strategy has to make sure that the new
be as
perfect as possible before it goes live
system meets client requirements, has solved the
Testing will use many different types of data, which will
identified problem from the old system, removes any
bugs or potential errors in the system and produces the fall into
one of three categories: normal, extreme or
correct output abnormal
this is done in the following stages
Test data used
Development stages
Normal: this is data which is acceptable and has an
If the system contains files (e.g. a database) then the file expected (known) outcome. This data should be
structure needs to be finalized at this stage (e.g. what accepted by the system
e.g. the month can be any whole number in the
type of
data is being stored in each field, length of each
range 1 to 12
field, which
field will be the key field, how the data files will
Extreme: data entered is at the limits of acceptability
be linked,
etc.)
and should be accepted by the system.
Once the file structure has been determined, it is then
created and
fully tested to make sure it is robust when the extreme data would be the months 1 or 12
system actually goes
live Abnormal: unacceptable data is entered and should
be rejected or cause an error message
Since it is important that correct data is stored in files,
e.g. all the following values are not allowed as
there are certain techniques that need to be adopted to
make sure the data populating the file and database is at inputs for the month:
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Direct
Comparing Changeover Methods
The old system is stopped overnight and the new system
introduced
immediately Changeover method Direct Parallel Pilot Phased
Advantages Relative costs Low High Medium Medium
The benefits are immediate Input needed by the user Medium High Low Medium
Costs are reduced - since only one system is used Input needed by systems
there is no
need to pay for two sets of staff Low* Low Medium Medium
team
There is less likelihood of a malfunction since the new
Impact of failure High Low Low Medium
system
will have been fully tested
Disadvantage
This method can be disastrous if the new system fails 7.7. Documentation
Parallel Running Once the new system is fully developed, a considerable
amount of
documentation needs to be produced
The old and new systems are run side by side for a time
before the
new system takes over altogether For the end user :
Advantages
If the new system fails, the old system is still available User documentation
as a
back-up for the end user/customer to learn how to use the system
It is possible to train staff gradually includes:
Staff have time to get used to the new system
how to save files
Disadvantage
how to load/open the software
It is more expensive than direct changeover, since
how to perform a search
extra staff
are needed to run both systems together
how to add,delete or modify records
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
purpose of the system compare test results from the new system with results
screen layouts from the
old system
print layouts compare the performance of the new system with the
hardware and software requirements performance
of the old system
error handling observe users performing set tasks, comparing old
troubleshooting guide with new
tutorials measure the time taken to complete tasks, comparing
how to log in/log out old with new
glossary of terms interview users to gather responses about how well
the new
system works
give out questionnaires to gather responses about the
For programmers
ease of
use of the new system
Technical documentation
for programmers or system analysts to get an overall view of Some results from the evaluation may require changes to
the system either
hardware or software.
includes: Hardware may need to be updated because of:
feedback from end users
program listing/coding new technology in the market
programming language changes within the company
hardware and software requirements Software may need to be updated because of:
system flowcharts feedback from the end users
program flowcharts changes in legislation and rules
memory requirements changes within the company
file structures
sample runs
validation rules 8. ## 8.1. THEORY
Information common to user documentation and technical
documentation Safety & Security
purpose of the system
limitations of the system Physical Safety
hardware and software requirements
sample runs Ways of eliminating or minimizing
Safety hazard
meaning of error messages hazard
Use a residual circuit breaker
7.8. Evaluation Electrocution from
(RCB), Check insulation on wires
regularly, Do not allow drinks near
spilling drinks
Once a system is up and running it is necessary to do computers, Check equipment
some
evaluation and carry out any maintenance, if regularly
necessary. Cable ducts- make wires safe,
this is done to compare the new system with the old Tripping over trailing
Cover wires/tuck them away, Use
system and make sure there are no limitations or
wires
wireless connections
improvements to be made and that the new system works Strong desk/tables to support
better than the old system. heavy hardware, Use large desks
The following is a list of some of the things considered Heavy equipment falling
and tables so that hardware
when
evaluating how well the new system has worked.
doesn’t fall off edge
This can ultimately
lead back to a re-design of part of the
Have a CO2 fire extinguisher
system if there is strong
evidence to suggest that changes
nearby, Don’t cover equipment
need be made. Fire risk from
vents- can cause equipment to
To evaluate the system, the analyst will: overloading sockets or
compare the final solution with the original
overheat, Make sure hardware is
equipment overheating
requirement fully maintained, Do not overload
sockets with too many items
identify any limitations in the system
identify any necessary improvements that need to be
made Health Safety
evaluate the user’s responses to using the new system
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Ways of eliminating or minimizing If personal data is leaked (data breach), the following can
Health hazard
hazard occur:
Back and neck Identity theft
-use adjustable chairs for sitting Bank fraud
problemsfrom \n sitting
with correct posture \n -use Damages to personal property
in front of the computer
footrests \n -use screens that can Kidnapping (if kidnappers get access to the victim’s
screen for \n long
be tilted according to user’s choice address.
periods of time
Etc.
-ensure correct posture is
Personal Data
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Personal info. from the user’s computer can be picked Preventing Phishing, Pharming & Smishing
up by the
pharmer/hacker
Anti-spyware, anti-virus software or anti-pharming User education
software can
be used to identify this code and correct Set up anti-malware and anti-spyware software
the corruption Enabling protocols such as SPF and DKIM
Do not download random .exe (executable file formats),
Prevention .php, .bat,
.com etc.
Users should be alert when being redirected to other
Use anti-spyware software that can remove any malicious websites.
code If a person on the internet is asking for personal
User should be alert for any signs that their computer has information, or
to meet in real life or acting suspicious,
been hacked into or they’re being redirected to a they should be reported
to cyber security agencies, or
fraudulent website one’s parents/guardians.
Websites/pop-ups can be made to mimic legitimate ones,
Spyware and key-logging software or seem too
good to be true, for e.g.lotrei.net instead of
lottery.com
This is software which gathers data based on the key
presses or clicks made on the keyboard; the gathered
data is sent back to the person who put the software on a
computer system
It can give the hacker access to data entered by the user
which can include passwords or bank account details
The software is able to install other spyware, read cookie
data and also change the user’s default browser
Prevention
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Since data is encoded, it appears meaningless to a hacker User privilege allows access to their own work area only
This technique prevents illegal access
Necessary to use decryption software to decode the data Passwords
Used to protect sensitive data e.g. banking details
Encryption keys are complex algorithms which makes After typing in User ID, the user will be requested to type
codes almost
unbreakable in their password.
Passwords are shown as starts (***) so nobody
Secure Socket Layer (SSL) overlooking can see it
To help protect the system, the user has a certain number
Type of protocol that allows data to be sent and received of attempts allowed before they will be locked out of the
securely over the internet system
When a user logs into a website, SSL encrypts the data If password is forgotten, the administrator must reset it
https or padlock symbol in the status bar If password is forgotten on a website, it will be sent on
When a user wants to access a secure website: your e-mail
User’s web browser sends a message so it can
connect with the required website which is secured
with SSL Cloud Storage
Web browser requests that the web server identifies
itself Your data is stored remotely and not on your computer,
Web server responds by sending a copy of its SSL so you don’t
have control over the physical security of
certificate your data.
Web browser checks if the certificate is authentic Some of the data stored may be personal data which are
Sends signal back to the web browser open to
hackers, and have to be encrypted in order to
prevent hackers from
obtaining them.
Starts to transmit data once connection is established
If not secure, browser will display an open padlock The company providing the storage may go out of
business. In this
case what has to be done to the data will
Firewalls have to be considered.
The company providing the storage will have to put in all
A firewall sits between the user’s computer and an its
efforts and safety measures in order to keep your data
external network (internet) and filter information in and safe.
out of the computer If the company providing the storage doesn’t backup your
Tasks carried out by firewall: data, you
may lose it in case of power cuts or fires, etc.
Examining ‘traffic’
Checking weather incoming or outgoing data meets Biometric data
criteria
If data fails the criteria, the firewall blocks ‘traffic’ Uses features of the human body unique to every
Firewall can keep a list of all undesirable IP addresses individual, such as fingerprints, retina, iris, face and voice
Helping to prevent viruses or hackers entering the recognition. It is used in authentication techniques as it is
user’s computer very difficult to replicate
Advantages:
Features of a secure webpage: Usernames or passwords don’t have to be
remembered
Webpage URL: if the webpage is secure, it will start with Almost impossible to replicate body parts
‘https’ instead of ‘http’ No one else can gain access, like with a stolen card
padlock symbol They cant be forgotten anywhere as it is part of the
body
Disadvantages:
Authentication The readers are expensive
Damages in fingerprints can deny access
-Used to verify that data comes from a trusted source
Some people worry about the privacy issues with their
-Works with encryption to strengthen internet security
personal information being stored
User IDs
Digital certificate
To log on to a network, a user must type in a user iD
User ID assigns user privilege once user logs in A digital certificate is an electronic passport used in the
The top-level privilege for a network is an administrator: security of data sent over the internet
able to set passwords and delete files from the server They can be attached with mails so that the receiver can
etc.
know that the mail is sent from a trust source
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Communication
Copyright Laws
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Extension
Full form Used for/in:
name
Wiki Stylesheets in
css Cascading Stylesheet
webpages
Software allowing users to easily create and edit web Comma Separated
pages without
using any web browser csv Store tabular data
Value
A wiki will support hyperlinks and has a very simple syntax
Graphics Interchange
(language rules) for creating pages gif Moving images
Format
Wikis are described as ‘web pages with an edit button’
Anyone can use wikis- content should be treated with
Hypertext Mark-up
htm Webpages
caution (Language)
Example of a wiki: Wikipedia Joint Photographic
jpg Standard for images
Experts Group
Documents to be
Portable Document
pdf circulated over the
Social Networking Format
internet/email
10.3. Information on the Internet 11.2. Reduce File Sizes for Storage or
Information is more likely to be up to date than in books, Transmission
since
websites can be updated very quickly
Much easier to get information from websites- search Files that are smaller in size upload and download faster
engines link
key words together and find information that than
larger ones and thus are better for transferring data.
matches the criteria-
cause for popularity
Vast amount of information on the internet- easier to
locate than
using indices in books 12. ## 12.1. PRACTICALS
Information on the internet however may be relevant or
correct, not
reliable, inaccurate or even biased- it does
not go through any
checking process
Images
Information overload can make it difficult for the user to
find
relevant information An image should be edited when doing so will enhance its
Ensure use of reliable websites that properly cite all their usefulness.
sources test
Always look for primary sources of information & form
own
conclusions
Do not quote/use secondary often biased opinions or
13. ## 13.1. PRACTICALS
gossip
Do your research
Layout
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Headers and footers ensure each page has all the Orphan: A paragraph-opening line that appears by itself
required
information like the page numbers, logos, titles, at the
bottom of a page or column, thus separated from
etc. the rest of the
text.
A common mnemonic is "An orphan has no past; a widow Page, section and column breaks are used to ensure that
has no
future" widows and
orphans are not present in a document (these
show poor typography).
A mail merge document is created in order to create a
14. ## 14.1. PRACTICALS standard
template and then use it to send documents
personalised (by the
computer system) for the respective
recipient of the document
Styles
Several organisations use a ‘corporate house style or 17. ## 17.1. PRACTICALS
corporate
branding, which is used to print on websites,
visiting cards,
letters, etc. It refers to a specific style of
fonts and formats
used in the making of ICT solutions by Data Manipulation
organisations.
A corporate house style when used effectively identifies
Create a Database Structure
the users
of the style.
Consistent styles enable users to associate a particular
Flat file databases are tables that have data sorted in
organisation with a style and also show consistency in the rows and
columns, whereas relational databases are
ICT
solutions created by the organisation
several tables grouped
together to from a link, thus
preventing unnecessary repetition of
data.
15. ## 15.1. PRACTICALS Primary key: The key field of a table which is unique and
identifies
each record
Foreign key: The field linked to the primary field of the
Proofing table
linked to through a relationship
Verification: checking of data when copied from one At times placeholders for media such as images, sound
medium to
another to prevent errors. bites and
video clips are used to enhance the usability of a
Verification is also important and is a way of preventing a database
difference in data when it’s being transferred from one
system to
another. This tries to make sure data entered is
17.2. Test the Data Model
correct, relative
to the source.
A model prepared needs to be tested before being used
16. ## 16.1. PRACTICALS to ensure that
all results computed are accurate. The test
plan must be justified
to be apt for the model. E.g. all the
mathematical operations must
be tested in a model that
Document Production relies on calculations.
Definitions:
Testing: Checking if the designed model delivers the
Widow: A paragraph-ending line that falls at the beginning
expected
outcome when tested with data.
of the
following page or column, thus separated from the
Test data: The input data used for testing model.
rest of the
text.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Expected outcome: The output a model is supposed to Nested formulae/function: A formula/function used
give with
the test data. inside a
formula/function as an argument
Actual outcome: The output a model actually gives the
user when
the test data is input.
18.2. Test the Data Model
18. ## 18.1. PRACTICALS A model prepared needs to be tested before being used
to ensure that
all results computed are accurate. The test
plan must be justified
to be apt for the model. E.g. all the
Data Analysis mathematical operations must
be tested in a model that
relies on calculations.
Definitions:
Create a Data Model Testing: Checking if the designed model delivers the
expected
outcome when tested with data.
Charts: A graphical representation of (usually tabulated) Test data: The input data used for testing model.
data Expected outcome: The output a model is supposed to
Accurate data ensures the results obtained by the give with
the test data.
processing of data
is relevant, which is essential to the Actual outcome: The output a model actually gives the
usability of the model user when
the test data is input.
Formulae are mathematical operators defined by the user
to perform a
function, whereas functions are predefined
logical and mathematical
operations a user can use in a 19. ## 19.1. PRACTICALS
spreadsheet
Mathematical operations are performed in the order
PEMDAS
(Parenthesis [Brackets] Exponents Multiplication Website Authoring
Division Addition
Subtraction). Brackets are used to
notate data used by a function,
e.g. =SUM (A2:A10). Web Development Layers
Relative cell referencing is made when the cell reference
is
supposed to change when the cell it is referred to in is Content/Structure layer: Holds the content of the
changing.
It aids more efficient designing of models. webpage structure.
Absolute cell
referencing is made when the cell Presentation layer: The layer responsible for the
referenced stays constant when the
cell it is referred to in formatting of a
webpage(s) or elements (using a
is changing. This aids the preparation of
a model when a stylesheet).
set of data is constantly being referred to
throughout the Behaviour layer: scripting language of a web page or an
model. Cell reference or relative cell reference
describes individual
element
how far away a cell or group of cells is from some other
cell in the same spreadsheet. Basically, the cell’s address
A model prepared needs to be tested before being used
19.2. Create a Webpage
to ensure that
all results computed are accurate.
Tables make the basic structure of a webpage and
Definitions:
organise page
layout.
Cells: A space for data to be entered a table; a box
Anchor: An element in a webpage that creates a hyperlink
formed by
the intersection of columns and rows
between a
source anchor and a destination anchor. These
Rows: Horizontal boxes that divide the table in
can be used to link 2
resources together.
segments
Relative file paths are used for attached stylesheets as
Columns: Vertical boxes that divide the table in
the
stylesheet is going to be stored on a server in the
segments
same directory
as the webpage, and not where it an
Sheets: A table of data
absolute file path says.
Tabs: A module of a database program that holds the
Definitions:
tables on
the computer,
Relative file path: A path referring to a file in the same
Pages: Full pieces of papers that contain information
directory relative to the page the reference is made in.
held on
one sheet of paper.
Absolute file path: The full path of a file, which is not
Ranges: A group of cells in a table
relative to anything, whereas relative links only point
Named cell: A cell in a table that is given a name (like
to a
file or a file path, the browser then redirects the
‘profit
margin’) and can be referred to using that
user to
that location on the current site.
name.
Absolute paths always include the domain name of
Named range A group of cells in a table that are given
the
website
a name
(like ‘Pricing’) and can be referred to using that
These should not be used to refer to locally saved
name.
webpages as the computer the webpage is stored
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
on (the
server) is not the same as where the To upload and publish content on a website using FTP, a
webpage was developed
and thus an absolute file user must
have:
path would point to the wrong
address. FTP client software
All files in one folder
19.3. Use stylesheets Host Name/URL/IP address for FTP
Host port to be used for upload
CSS (cascading stylesheet) is a text-based language which Username and password
is
attached to webpages to set their format. CSS files have The test plan used to test a webpage must be justified
a “.css”
extension based on the elements being tested. E.g. If hyperlinks are
These should be attached using relative file paths as they being tested, it makes to check if all the hyperlinks are
are
stored along with the webpage and thus can be linked redirecting the user to the correct webpage/ section of
relative to
them. the webpage.
Internal CSS have more preference over Inline CSS
If several external stylesheets are attached to one web
page,
the stylesheet attached last (at the bottom of that
20.
part of the
code) is given preference over the other
attached ones).
WWW.ZNOTES.ORG
CAIE IGCSE
ICT (0417)