Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Caie Igcse: Updated To 2023-2025 Syllabus

Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

ZNOTES.

ORG

UPDATED TO 2023-2025 SYLLABUS

CAIE IGCSE
ICT (0417)
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE ICT (0417)

is now called the microprocessor


interprets and executes the commands of the computer
1. ## 1.1. THEORY hardware and software
single integrated circuit board found on the computer
motherboard
Types and Components of made up of:
Control unit: controls the input and output devices
Computer Systems associated with the computer
Arithmetic and logic unit: carries out calculations and
Hardware & Software makes logical decisions
Immediate access store (RAM)
Hardware
Internal Hard Disk Drive (HDD) or Solid State Drive
Tangible physical components of a computer system (SSD)
You can feel it or touch it
Internal Hardware Devices: computer’s main internal storage
Processor this stores the application software, operating system and
Motherboard files
RAM & ROM they have fast data transfer rates and data access times
Video & Sound Cards large memory capacity to store data
Internal Storage devices like Hard disk drive(HDD) &
Solid state drive(SSD) RAM:
External Hardware Devices:
Random access memory (RAM) is an internal chip
Monitor
where data is
stored temporarily
Keyboard
Memory can be written to and read from
Mouse
Stores anything that needs to be changed
Printer
All program and data being used are on RAM
External Storage Devices
Contents lost when computer is turned off
Referred to as volatile memory
Software
ROM:
Programs that control computer systems
Set of instructions that make computer do something Read only memory (ROM) is memory used to store
You cannot physically touch software permanent
information
Relates to ideas & instructions for using physical objects Used to contain configuration data for a computer etc.
Chips cannot be altered, only read from
Two types of software: Data not lost when computer is turned off
Referred to as non-volatile memory
Application software: BIOS:
Programs that allow the user to do specific task ROM contains boot file, referred to as BIOS (basic
Design to carry out tasks input/output
system)
Can be general purpose software or custom-made Tells computers what to do when it first starts
software
(specialist software) Does hardware check when computer is turned on
E.g. Spread sheets, databases, word processing Then it loads operating system into RAM
System Software:
BIOS stores date, time and system configuration
Programs that allow the hardware to run properly
Control computer's hardware and application
program Input & Output Devices
Communicate with user
E.g. Operating system, device drivers, compilers Input devices:
Purpose is to provide data for processing
1.2. The Main Components of Computer Data is raw facts which alone have no meaning
Examples: keyboard, mouse
Systems Output devices:
Displays result of processing
CPU Information is processed data which has been given
meaning

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Examples: monitor, printer Interface type Advantages Disadvantages


-user is in direct
-user has to learn
communication
Secondary/Backing Storage many commands
with the computer
for simple functions
Stores data/information & programs not being used at \n -low resolution,
\n -command has to
current time cheap monitors can
be in correct
Backing store device = reader or recorder be used \n -less
format, spelling (no
Example: Hard disk drive expensive than GUI
errors can be made
Backing store media = hardware containing data
Command Line \n -possible to alter
or else command
Example: Hard disk Interface (CLI) computer’s
will not work) \n -
configuration
often difficult to
settings \n -can
change a command
Basic Computer Model type commands to
after it is typed in \n
carry out any task
-all commands
on the computer
need to be typed in,
(not limited to icons
time consuming
on the screen)
-expensive
compared to CLI \n
-user-friendly \n - -takes up more
user doesn’t need computer memory
to learn any \n -user is limited to
commands \n -can choose from the
1.3. Operating Systems Graphical User click on icons to icons present on
Interface (GUI) open applications, the screen \n -
Enables users to communicate with computer systems simpler than typing requires an
Controls operation of input, output & backing storage In commands \n - operating system
Supervises loading, running & storage of application easy to explore the (eg. WIndows)
program system which takes up
Deals with error in application programs memory and is
Maintains security of whole computer system expensive
Maintains a computer log
Two main types of interfaces: CLI & GUI
1.4. Types of Computers

CLI - Command Line Interface Desktop/Personal Computers

Types commands to tell the computer what to do Refers to general-purpose computers


The user must know all the commands PC refers to IBM compatible computers, distinguishing
Must not make typing errors them from the
Macs
Used by technicians Made up of separate monitor, keyboard, mouse and
Can access everything on the computer system processing unit
GUI users can only access places they have icons for Advantages
\ Spare parts standardized results in low costs
Tend to have better specifications
GUI - Graphical User Interface Less power consumption since computer is plugged
into an electric socket always
Uses graphics to stand for the complicated actions A large casing allows good dissipation of heat build-up
Uses icons Internet access is more stable because the computer
Uses a mouse to select the icons is in one position
Screen divided into windows allows different things on Disadvantages
each Not portable since they are made up of separate
WIMP - Windows Icons Menus Pointers components
Wiring clutters up desk space
Interface type Advantages Disadvantages Necessary to copy files as they aren't portable
takes up a lot of desk space

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Laptop/Notebook Computers Advantages:


Smallest lightest most portable
Refers to computers where monitor, keyboard, pointing Integrated/virtual keyboard
device and
processor together in a single unit Often the least expensive device
Extremely portable systems More practical for day-to-day use
Low weight Disadvantages:
Low power consumption Small screen may be difficult to use
The processor doesn't generate too much heat Not as powerful as other devices
Advantages Often has the lowest battery life
Portable because monitor, pointing device, keyboard, Small size makes it easy to steal/lose
processor &
backing store units are together in one
box Smartwatches
No trailing wires
Full advantage of Wi-Fi Have the same functions as a smartphone
Can link into any multimedia system Uses OLED (organic light emitting diode) technology
Disadvantages Can link to smartphones using Bluetooth
Easy to steal features:
Limited battery; need to carry charger Internet connectivity
Keyboard and pointing device awkward to use Ability to message via text or video
Heat dissipation is difficult due to laptop structure Weather forecasts
GPS
Advantages:
Tablet Computer Very easy to use for monitoring health and fitness
Convenient as notifications are delivered straight to
These are small hand-held devices that can perform users wrist
many functions
that PCs & laptops do Disadvantages:
Use touch screens to operate Large and bulky (heavy on the wrist as they have to
On-screen virtual keyboard replaces physical keyboard accommodate the battery and screen to display apps)
Often used by graphic designers to digitalize their content Usually unattractive in design
with a
stylus pen
Can be used like a PC and/or a Smartphone Mainframe computers
anti glare displays
front and back facing cameras Large, very powerful computer systems
longer battery life than laptops Are used to run commercial applications, such as banking
light or insurance, where huge amounts of data need to be
cloud storage facilities and SSD processed everyday
equipped with sensors Features:
Advantages: Have several CPUs
Small, light & portable Fast processor speeds
Built-in cameras for photos & videos Multiple operating systems
Touchscreen can be used with a stylus pen Huge storage capacity
Long battery life Huge internal memory (RAM)
Fast to switch on Often use time sharing or batch processing
No generation of heat because of SSD
Disadvantages: 1.5. Impact of Emerging Technologies
Less storage spaces
Lacks power of laptop/PC This is technology that is being newly developed
Digital keyboard can be difficult to use These can have several impacts on our society
Touchscreen may be difficult to use for detailed work

Artificial Intelligence (AI)


Smartphone
Technology that focuses on creating a computer system
Modern phones that can perform similar tasks to all the that can
closely mimic or simulate human intelligence
above AI can be used to:
Main use of smartphones is social media & day-to-day Enhance video games and computer tactics
planning Help decision making steps in expert systems
Use varies from person to person Make robots to imitate human behaviour

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Understand different human languages Dangerous jobs such as bomb disposal


Impact on everyday life: Exploring extreme environments such as volcanoes
Can be used to accurately predict hazardous weather Repetitive manufacturing jobs such as welding
conditions
and signal warnings automatically Moving heavy objects such as large engines
Take over menial tasks for humans; increasing our Examples of robotics:
leisure time Drones: used by civilians in surveying the landscape
Can be used for safer automated travel; cars that can with GPS, and checking weather phenomena. Drones
drive and
park by themselves are also used by military for reconnaissance missions
Increases home safety by being able to tell the Robots in surgical procedures: allow the surgeons to
difference
between owner & intruder; call authorities perform the procedures with more precision, flexibility
automatically and control.
Improved medical care as decision making skills and Impacts on everyday life:
precision
can be enhanced Increased personal time since robots can take over
domestic
chores
Increased manufacturing efficiency since robots are
Biometrics much faster
and less expensive than human labour
Unemployment as robots replace humans in
A part of a person’s body is used to identify that individual autonomous jobs
Can be: Safer working environments since robots can perform
Fingerprints tasks that
are too dangerous for humans
Retina
Iris
Face Quantum Cryptography
Voice
These are all unique to everyone thus can be used as an Technology that allows messages and data to be sent with
authentication technique complete
privacy; basically, advanced encryption
Must be added initially to a system to use as identification Older encryption is based on mathematics, but this new
Impacts on everyday life: tech uses
physics
Better security at the airport since most use at least Makes it much more complex to decrypt
one form
of biometric check if not more Impacts on everyday life:
Increased security in certain places as only authorized Completely secure voting ensuring that votes cannot
personnel can gain entry be tampered
with or changed
Reduced vehicle theft since newer car doors come Completely secure communication eliminating the risk
with a
fingerprint lock on the door handle of being
read/heard by the wrong eyes/ears
More secure mobile devices as most now have some Completely secure bank transactions so money goes
sort of
biometrics integrated into them exactly where
it is intended
Completely secure personal information preventing
hackers access
to intrusive details about a person
Vision Enhancement

LVES: low vision enhancement systems: video projected Computer Assisted Translation (CAT)
inside a
headset in front of the user’s eyes. Brings the
objects closer for
the viewer. When human translators use computer software to help
NVE: Night vision enhancement: dim light is captured and in the
translation process
passed through a light intensifier tube, which converts Can reduce translation time
light to electrons. Electrons pass through another tube May not be 100% accurate
where they are amplified to produce more electrons. Common CAT tools:
Amplified electrons pass through to the end of the tube Spell checkers
where they hit a screen coated in phosphor dots that glow Translation memory software
when collided with. this creates an image several times Language search-engine software
brighter and clearer than the original Impacts on everyday life:
More accurate documents since most software can
automatically
detect errors
Robotics More multilingual society since anyone with an
internet
connection can now essentially learn multiple
Programmed machinery widely used to do physically languages using
translators
demanding tasks Quicker translations
Can be automated or manually operated
Used to perform several tasks:

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

3D & Holographic Imaging

Technology that makes images appear to be 3-


dimensional by adding a
layer of depth
Holograms use 2 regular 2D images and manipulate
them to produce a
3-dimensional image QWERTY- layout
Different laser beams are used to record the 2D images Ergonomic- reduces health related problems
onto a single
photographic plate Uses
This creates an illusion of one 3D images Keyboards are used to input data into application
Impact on everyday life: software
Improved security since majority of credit/ID cards & Also used to for typing commands to the computer
bank notes
use holograms to prevent forgery (CTRL + P)
Better movie experiences since 3D viewing can Advantages
provide a more
immersive experience for the Enables fast entry of new text into a document
audience Well-tried technology & well-known method of entry
Greater data storage since holographic layers can Most people find them easy to use
potentially
decrease the thickness of disc storage Easy to do verification check as data is entered, as it
appears
on the screen simultaneously
Disadvantages
Virtual Reality (VR) Users with limited arm/wrist use can find keyboards
hard to use
When computers create an artificial environment that
Entering data is slow when compared to direct data
users can
virtually interact with
entry (e.g.
Optical mark recognition)
Uses: They use up desk space as they are quite large
Allow architects to walk around a virtual version of
their
design
Training soldiers for combat by allowing them to fight Numeric Keypads
against
virtual enemies
Training surgeons by allowing them to operate on
virtual
patients
Playing games and enhance the level of immersion
General VR equipment:
Eye goggles that produce 3D images to develop the
artificial
environment A numeric keypad is used to enter numbers only
Special gloves or controllers to perform precise Although some have function key to allow input of
actions inside
the simulation alphabetical
characters
Headphones to control what is heard in the virtual Uses
world Used in Automatic teller machines (ATMs), where
Powerful computer to run the entire VR system in real customers can
key in their personal identification
time number (PIN), or an amount
of money
Impacts on everyday life: Used to key in phone numbers into telephones
Improved medical surgeons/soldiers Electronic point of sale (EPOS) terminals have numeric
Stronger buildings keypads
in case the barcode reader fails
Treatment of phobias as certain situations can be Used in Chip and PIN devices to key in PIN, or amount
treated using
simulations of money
More realistic education as students can learn in a Used to enable fast entry of numeric data into a
more
interactive environment spread sheet
Advantages
Numeric keypads are faster than standard keyboards
2. ## 2.1. THEORY for entry of
numeric data
Since many are small devices (e.g. mobile phones),
they are easy
to carry around
Input & Output Devices Disadvantages
Can be difficult to use due to the very small keys
Difficult to use for entering text
Input Devices & their Uses Sometimes the order of numbers isn’t very intuitive

Keyboards
Mouse

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

An example of a pointing device They are more difficult when doing operations such as
The ball underneath the mouse is used to detect ‘drag and
drop’
movement
The left button is for selecting by double on it and the right
is to
bring drop-down menus Tracker Ball
There is usually a scroll button which speeds up the
process of
moving through a document
Uses
Used for opening, closing and minimising software
Used for grouping, moving and deleting files Tracker ball is like a mouse except that it has a ball on the
Useful when editing images (e.g. controlling the size top of
the device
and
position of the image) Users control the pointer on the screen by rotating the
Used for controlling the position of a pointer on the ball
screen to
allow: Uses
Selection from a menu Have the same pointing/cursor control capability as a
Selecting an icon mouse
Scrolling up/down and right/left Used in applications where the user has a disability
Advantages (RSI)
Faster to select an option by a mouse than a keyboard Used in a control room environment, where it is faster
Enables rapid navigation through applications and the than a
mouse to navigate through process screens
internet and more robust than a
mouse
Mice are small and don’t take much area Advantages
Disadvantages Tracker balls don’t need the same fine control as a
People with restricted hand/wrist movement can find it mouse
hard to
operate a mouse People with limited hand/wrist movement find easier
Easily damaged and can easily be clogged up with dirt to use than
a mouse
They are hard to use if there is no flat surface The pointer can be positioned more accurately on the
available screen than
with a mouse
They take less desk space than mice since they are
stationary
Touchpad
Disadvantages
Touchpads are used in many laptop computers as a Tracker balls are not supplied with the computer as
pointing device standard, so
they are more expensive
The pointer is controlled by the user moving their finger User may need training since they are not standard
on the
touchpad equipment
Uses
Used for opening, closing and minimising software
Remote Control
Used for grouping, moving and deleting files
Useful when editing images (e.g. controlling the size A remote control is used to control the operation of other
and
position of the image) devices
remotely by using infra-red signals
Used for controlling the position of a pointer on the Uses
screen to
allow: In home entertainment devices such as Televisions,
Selection from a menu DVD
player/recorder and satellite system
Selecting an icon Used to control multimedia systems
Advantages
Used in industrial applications to remotely control
Faster to select an option by a touchpad than a
processes,
stop and start machinery
keyboard Advantages
Enables rapid navigation through applications and the Enable devices to be operated from any distance,
internet which is useful
for people with disabilities
Since the touchpad is integrated into laptop computer, Some chemical processes are hazardous, so it is safer
there is
no separate mouse, aiding portability to operate
equipment from a distance
They can be used when no flat surfaces are available Disadvantages
Disadvantages People with limited hand/wrist movement can find
People with limited hand/wrist movement can find them hard to
use
touchpads hard
to use The signal between the control and the device can be
It can be more difficult to control the pointer when easily
blocked
compared to
a mouse

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Joystick Non-digital photographs can be scanned for storing on


a computer
Advantages
Images can be stored for editing later
Scanners are much faster and more accurate than
typing in
documents again
It is possible to recover damaged documents and
By gripping the stick, a pointer on the screen can be
photographs by
scanning them and then using
controlled
appropriate software to produce an
acceptable copy
Buttons are used to make selections
Disadvantages
Uses
The quality can be limited depending on how good the
Video/computer games are often controlled by
scanner
resolution is
joysticks
They are used in simulators to mimic actual controls
Advantages Digital Cameras
Easier to navigate round a screen compared to a
keyboard
Control is in three dimensions
Disadvantages
More difficult to control the on-screen pointer with a
joystick
than with other devices such as mice
Photographs are stored in memory
They can be easily transferred to a computer using a USB
Touch Screen Uses
Digital cameras can produce photographs for direct
User can choose an option by simply touching a transfer to a
computer or to print out
button/icon on the
screen Digital cameras allow short video clips to be produced
The selection is automatically made without the need for Photographs can be uploaded directly into application
any
pointing device software
such as word processor
Use Advantages
Used for service tills e.g. petrol stations Easier to produce better quality photographs than with
Used where selections are made on a screen e.g. a
tradition camera
ATMs, public
information systems, airports and Easier and faster to upload photographs to a
railway stations computer
Used in PDA’s There is no need to develop film and print out
Used in Interactive white boards photographs
(saves paper and no longer needs the
Used in computer-based training (CBT) chemicals to produce
photographs from films)
Advantages Easy to delete an image from the memory if it’s not
Enable faster entry of options than a keyboard/mouse satisfactory
Very easy to choose options The memory card can store several hundred
User friendly method for inputting data photographs
They are tamperproof, preventing people from Disadvantages
keying in
information (which could corrupt the The camera user needs to be computer literate to use
system) the camera
properly
Disadvantages There is some artistry lost since clever software
There is a limited number of options available corrects
errors in the photographs
Using touchscreens often can lead to health problems The resolution is not yet as good as traditional
e.g.
(straining of arm muscles and RSI) cameras
The screen can get very dirty with constant touching Images often need to be compressed to reduce the
amount of
memory used
It is possible to fill up computer memory very quickly
Scanners with
several photos of the same subject (to find the
perfect snap
shot)
Used to input information on hardcopy e.g. text document
Uses
Used to scan in documents and convert them into a Video Camera
format for use
in various software packages
Old and valuable documents and books can be DV (digital video) camera store compressed photo frames
scanned, protecting
the original copies from damage at 25 MB/s – motion jpeg.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Light turned into electronic signal through light sensitive Type of sensor Applications
sensors and automatically converted to a digital file Automatic greenhouse, chemical
format. pH
processes, environmental monitoring
Advantages
Easy to edit footage in a video editing.
Advantages
High quality video captured, therefore
Readings by sensors are more accurate than taken by
Disadvantages
humans
Storage medium (Memory cards) more expensive to Readings are continuous, there is no break in
buy than films.
monitoring
Because it is a continuous process any necessary
Microphone action or
warning will be initiated immediately
The system can be automatic, removing the need for
human
intervention, this is particularly important if the
process is
hazardous
Disadvantages
Faulty sensors can give spurious results

Graphic Tablet
Can be connected directly to a computer
Sounds can be inputted and manipulated
Uses
Microphones are used to input speech/sounds to be
used in
various applications
They are used in voice recognition software- for A graphic tablet is used with a stylus to produce freehand
conversion of
speech into text, and recognition of drawings
commands Uses
AdvantagesFaster to read in text than to type it using a Graphics tablets are used to produce drawings,
keyboard computer graphics
Possible to manipulate sound in real time using In countries where characters are complex e.g. japan,
special software they are
used as a form of input
If used in a voice activation system, this has the They are used in computer aided design (CAD) work
advantage of
improving safety Advantages
Disadvantages It is possible to modify drawings before they are input
Sound files can use up a lot of computer memory They offer an accurate method of drawing
Voice recognition software isn’t as accurate as typing Disadvantages
in
manually They are more expensive than other pointing devices

Sensors Web Cam

Type of sensor Applications


Automatic washing machines, central
Temperature heating systems, automatic green
houses, ovens
Burglar alarm systems, robotics,
Connected directly to a computer via a USB port
Pressure environmental monitoring, Automatic Uses
washing machines While chatting online webcams can be used to have
Automatic doors, street lighting conversations
Light control, Burglar alarm systems, Used to enable video conferencing to take place
automatic greenhouses Advantages
Burglar alarm systems, monitoring Can be left on constantly and activated when required
Sound
liquid and powder flow in pipes Allow people to keep in contact with each other
Automatic greenhouses, without the need
to travel, particularly useful for
Humidity/moisture environmental monitoring, factories disabled or elderly people
where moisture levels are crucial Disadvantages

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Webcams have limited features and the picture is Provide a more secure payment system than requiring
often of poor
quality a signature
or using magnetic stripe, since the PIN
They need to be connected to a computer typed in must match up
with the PIN stored on the chip
Provide a more robust system than magnetic stripe
2.2. Direct Data Entry & Associated since the chip
does not need to be in contact with the
reader
Devices Disadvantages
Customer needs to be careful when typing in the PIN,
Magnetic Stripe readers so nobody
reads it giving an opportunity for Fraud

Radio Frequency Identification (RFID) Readers

RFID readers work in similar ways to a bar code reader


Used to read information on the magnetic stripe An RFID tag is attached to/inside a surface
The stripe contains useful information such as start and The reader reads the data held on the tag which is then
expiry date input into
the computer system for processing
Uses Radio waves are used to transmit data thus can be used
Credit and debit cards have magnetic stripes that are through most
materials
used by
ATMS or EFTPOS (electronic funds transfer Uses
point of sale)
terminal Used in retail or supermarkets as barcode
Security cards for entering building e.g. hotel rooms alternatives
Travel systems e.g. train and underground tickets Used to identify pets
Advantages Used in passports
Data entry is fast compared with keying in using a Advantages
keyboard or
keypad Can hold a lot of data
System is error free, no typing involved Can be read from long distances
Information is secure since there is no typing and the Does not require direct line of sight
information can’t be read directly by a person Information can be read faster than barcodes
Can prevent access to restricted/secure areas Can alter information
Magnetic stripes are unaffected by oil water and Disadvantages
moisture Thieves can steal information easily
No moving parts therefore physically robust RFID tags are expensive
Disadvantages Radio waves can experience interference
If the magnetic stripe is damaged the data is lost \
Card needs to be in close contact with the reader
Since the information is not human readable, they
Magnetic Ink Character Reader (MICR)
need to find a
way to show the information to the
customer (e.g. hotel room
number not printed on
cards)

Chip & PIN readers


Magnetic ink character recognition is a system which can
read
characters printed in a special ink
Uses
Used to process cheques in banking operations –
cheque is read
using a batch processing method
Advantages
The device has a slot where the card is placed, and the MICR offers great security than OCR since the oriented
chip is read characters cannot be altered
A small screen is part of the reader which gives There is no manual input, thus errors are reduced
instructions to the
operator If somebody writes over the magnetic ink characters,
Uses it can
still be read
Chip and PIN readers are used where payments are Disadvantages
made using
cards e.g. travel agents Only certain characters can be read, and the number
Advantages of different
characters is very limited

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

It is a more expensive method than other methods


used for direct
data entry

Optical Mark Reader

Used to read information in the form of a barcode


Handheld scanners or wands are very common for
reading barcodes
Uses
Optical mark recognition is a system which can read Used in supermarkets and other shops where the
marks written in
pen or pencil goods are marked
with a barcode
Uses Used in libraries to scan user’s library card and
OMR devices are used to read questionnaires, barcodes on
books (to keep track of books on loan)
multiple choice
examinations papers and other types Used as a safety function in many companies to
of forms in the form of
lines or shaded areas ensure that
electrical equipment is checked on a
Advantages regular basis
A very fast way of inputting results of a survey Advantages
Since there is no typing, it is more accurate than Faster than keying in information, and fewer mistakes
keying in
data are made
OMR is more accurate than OCR Used as a way of recording data, can improve safety
Disadvantages Barcodes enable automatic stock control
Forms need to be carefully designed to make sure that Barcode scanning is a tried and trusted technology
the
marks/shadings are correctly positioned to gather When an item price is changed, only the central
accurate
information database needs
to be updated, there is no need to
There can be problems if forms aren’t filled correctly, change the prices
individually on each item
sometimes they must be checked manually before Disadvantages
being read by an
OMR, this is both time consuming Barcode scanning is an expensive system to
and expensive administer since
every item in the shops needs a
barcode and every barcode needs
to be entered on
the system
Optical Character Reader
Also, there is a need to invest in the computer
technology
together with staff training, which can all
be expensive
The system is not fool proof- barcode can be swapped
around on
items

Optical Character recognition is a software that takes


scanned text
and converts it into a computer readable 2.3. Output Devices & their Uses
form
Uses CRT Monitor
Processing of passports and Identity cards
Cathode Ray Tube monitors
OCR is used when scanning documents to modify
them using a
suitable software Least expensive type of monitor, becoming rarer as TFT
Advantages monitors take
over
Much faster data entry system than manually keying Come in various sizes
Picture created is made up of tiny dots (red green or
in data
blue), the
intensity of the colour of the dot determines the
Since there is no manual data entry, the number of
errors is
reduced colour perceived
by the eye
Disadvantages Uses
The system has difficulty reading handwriting Primary output device for computers, user can
immediately see
what they are typing in
It is still not a very accurate technique
Used with light pens to allow designs to be created on
  screen
Advantages
Produce higher quality images than TFT monitors
Barcode readers
Angle of viewing is better than a TFT monitor
They work with light pens in CAD and CAM
applications (Computer
Aided Design/Manufacturing)
Disadvantages

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Tend to be heavy, weight hazard if not supported High power consumption


properly Slow response time
Run very hot, can cause fires if left unattended – Note: Old LCD monitors used CCFL (cold cathode
especially if
they are old fluorescent lamp)
technology to light up the screen.
Consume more power than TFT monitors
They can flicker, this leads to headaches and eyesight
problems
with prolonged use LED Monitor:

Front layer made from liquid crystal diodes; grouped


TFT Monitor together to
form pixels (RGB or RGBY-more vivid colours)
For the image to show up on-screen a light source of LED
backlight
is used.
Advantages (over LCD monitors):
Lighter and thinner
Longer life
Lower power consumption
Greater contrast and more vivid colour
Relatively more robust
Thin Film Transistor monitors Disadvantages
Taking over from CRT monitors as the main output device Glare gives viewers headaches
The progress in TFT technology is one of the reasons for Images too sharp, so can cause eye strain
the rapid
development of laptop computers
The screen is made up of thousands of tiny pixels which
are made up
of transistors controlled by a Touch Screen
microprocessor
Each pixel has three transistors-red, green or blue; the Automatic selection without a pointing device
intensity
of each determines the colour of the pixel seen. Uses
Uses Automatic teller machines
Primary output device for computers, user can EFTPOS (electronic fund transfer point of sales)
immediately see
what they are typing in PDA
Integral part of laptop computers Smartphones
Advantages Public information points
Lightweight, so no weight hazards like CRT monitors Advantages
Less glare produced than in CRT monitors; also emit Faster data entry
less
radiation Easy to choose options
Consume much less power and generate less heat User-friendly and intuitive
than CRT monitors Disadvantages
Disadvantages Limited options
Angle of viewing is critical; image appears unclear if Frequent usage can lead to RSI, etc.
viewed
slightly from the side Constant usage results in the screen getting dirty;
This is an issue if several people are looking at the visibility
and sensitivity decreases
screen at
the same time
They cannot yet be used with light pens,
Multimedia Projector

IPS/LCD Monitor

Front layer made from liquid crystal diodes; grouped


together to
form pixels (RGB or RGBY-more vivid colours)
Receive analogue and digital signals, although most
Receive analogue and digital signals, although most
modern
projectors only work with digital inputs
modern
projectors only work with digital inputs
IPS (In-plane switching) is the technology used in LCD
The signal source is usually from a computer, television,
monitors.
or DVD
player
Advantages
The image from the source is magnified and projected
Colour can be seen accurately from different viewing
onto a large
screen
angles
The devices usually work with a remote control, but can
No lightening on touching
also use
virtual mouse technology – cordless PC mouse
Disadvantages
(has a laser pointer)
Expensive

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

It is then possible to direct the presentation without These have been linked to health hazards in the office
being
tied to the computer
Most multimedia projectors take input from various
types of
video format e.g. PAL, NTSC or SECAM Inkjet Printer
Uses
Used for training presentations (allows the whole
audience to
see the images from a computer)
Also used for advertising presentations (shown at
exhibitions,
shopping malls etc.)
Home cinema systems (projecting the images from a
DVD or
television) use multimedia projectors
Used to produce good quality hard copies – the quality is
Advantages
not as
good as in laser printers but much better than that
Enables many people to see a presentation rather
of dot matrix
printers
than all of
them crowded around a small computer
Do not have large buffers like laser printers, so printing is
screen
done a
bit at a time
Avoids the need for several networked computers
Therefore, printing is sometimes paused – the whole page
e.g. when looking at a video clip on the internet,
can’t be
stored in the buffer, it must wait for the computer
everybody can
see the video on the large screen
to send more
data
rather than logging on to
several computers
Uses
Disadvantages
Used where low volume outputs are needed
Images can sometimes be fuzzy
Ideal for high quality printing for small print jobs or
Expensive to buy
single
pages e.g. for photo quality printouts
Setting up projectors can be a little difficult
Advantages
High quality output
Laser Printer Cheaper to buy than laser printers
Very lightweight and take up little space (small
footprint)
Do not produce ozone and volatile organic
compounds, unlike
laser printers
Disadvantages
Output is slow if several copies needed – there is little
buffer
capacity to store the pages
Produce very high-quality hard copy output The ink cartridges run out too quickly to be used for
Print rate per page is fast if many pages are being printed large
print jobs
Rely on large buffer memories – the data for the whole Printing can smudge if the user is not careful
document is
stored before pages can be printed out Can be expensive to run if they are used a lot –
Uses original ink
cartridges are expensive
Used where noise levels need to be kept low e.g. in an
office
The best option for fast, high quality, high volume Dot Matrix Printer
printing
Advantages
Printing is fast for high volumes, slightly faster than
inkjet
if only a few pages are to be printed
Can handle very large print jobs
Quality is consistently high
Toner cartridges last for a long time; laser printers A type of impact printer
A print head made up of a matrix of pins presses against
can be a
cost-effective option if colour outputs are not
an inked
ribbon
required
Disadvantages Uses
Can be used in noisy environments e.g. garage
Expensive to buy
Only fast if several copies are being made workshops
Can be used in applications were the print quality is
Colour laser printers tend to be expensive to run since
not very
important
four
cartridges are needed as well as diffuser kits, etc.
Advantages
Produce ozone and volatile organic compounds
because of their
printing method and type of toner/ink Can be used in environments which would be a
problem for laser
and inkjet printers – dusty, dirty or
used
moist atmospheres

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Carbon copies or multi-part outputs can be produced Used to produce prototypes which work from CAD
Very cheap to run and maintain packages,
photograph images, stored drawings etc.
Easy to use if continuous stationary is required e.g. Scale models are produced in colour before the real
long print
jobs such as wage slips thing is
manufactured
Disadvantages The ultimate objective is to produce organic objects
Very noisy – not good in an office environment using this
layering technology (such as replacement
Cost more than an inkjet printer to buy human organs)
Very slow Advantages
Printing is of poor quality Save a lot of money, other methods of making
prototypes are very
time consuming and expensive
The powders used can often be ground up and reused
Wide Format Printer Physical scale models are produced with working
parts, which
gives a better idea of how the product will
look
Disadvantages
Expensive to buy
Slow at producing their output
Product is sometimes a little rough, often further work
Devices that produce hard copies but operate in a needs to
be done
different way to
printers
Not limited to normal printer paper size and can produce
Speakers
highly
accurate, very large drawings and posters
The most common types are pen plotters, electrostatic
(similar
method to laser printers) and inkjet plotters
With pen plotters, coloured pens are controlled by a
computer
and the paper can move backwards and
forwards to allow accurate
shapes to be drawn
Uses
Used to produce large drawings e.g. blueprints of
buildings; are
often used with CAD applications Can be connected directly to a computer or are built into
Used to produce large pictures for use on billboards the
monitor or casing (as in laptop computers)
or giant
posters Uses a digital to analogue converter (DAC) to convert
They can also print on plastic coated paper digital data
from the computer to analogue from so the
If the pens are replaced by cutting tools, it is possible to speakers can process it;
the signal is then amplified
make
large signs through the speakers.
Advantages Uses
Can produce huge printouts Used to output sound from multimedia presentations
Print quality is extremely high Used in home entertainment centres
Disadvantages They can help blind people through audio output of
Slow in operation text on the
screen (together with speech generation
Expensive to buy and maintain software)
Used to play downloaded sound files
Advantages
3D Printer
Usually long lasting and durable (if operated within
their
intended power levels)
Often provided with the computer/laptop although
these may not
be the best quality
Disadvantages
Can take up a lot of desk space, compared to
headphones
A new type of printer that produces solid 3D models using Can distract people around you, everyone can hear
modified
inkjet technology called tomography what you are
playing
Very thin layers of fine powder (plaster, resin, starch) are May not be able to hear the full sound spectrum, this
bonded
together as a 3D model is slowly built up requires
multiple speakers
Items produced are known as prototypes
Uses
Actuators

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

A type of controlling device


Transducers that are used to take signals from a 3. ## 3.1. THEORY
computer and
convert them into some form of motion e.g.
operating motors, pumps,
switches and valves
Digital signals are sent from the computer to an actuator Storage devices and media
to operate
a device
Conversion of the digital signal to analogue is required What is backing up of data?
first
(using a DAC)
Backing up refers to the copying of files or data into a
different medium
Motors
Examples of different mediums files can be copied to are:
disk
tape
flash drive

Turned on or off by the actuator Why do we back up data?


Uses
Used in many domestic appliances To safeguard against loss of data when the original
Automatic washing machines (to make the drum secondary storage device fails. The secondary storage
rotate) device can fail due to hardware failure, problems caused
Cookers (to switch on fans) by files being overwritten or by corruption of files.
Water pumps in central heating systems To safeguard against damage caused by hackers. Even if
Automatic greenhouses to open windows and switch the hacker’s primary intention wasn’t to hack the data in a
on fans computer, the very act of hacking into files could lead to
Used to control robot arms in the industry the possible corruption of data or data loss.
Operate fans, disk drives and DVD drives in computers When files need to be used elsewhere, the data can be
copied into a medium and transferred to another
medium.
Buzzers
3.2. There are 2 methods of accessing
Switched on or off by the actuator
Uses data:
Used in cookers and microwave ovens to tell the
operator when
the cooking process is complete Serial access:
Used in burglar alarm systems to warn if intruders are
present This involves starting from the beginning of the file and
accessing each record to get to the file required
It is a very slow form of data access
Heaters It is used in systems where the speed of accessing data is
not important
Actuators are connected to switches which turn the It is used in magnetic tape systems
heater on or off examples where serial access is used:
Uses utility billing
Used in automatic washing machines, cookers and clearing of bank cheques
central heating
systems producing pay slips
Used in automatic greenhouses to control the
temperature Direct access:

This is used to access data stored in any record by typing


Lights in the required key field
Typing in a key field will allow the user to access a
The actuator is connected to the switch that turns the particular record directly from the calculated position
lights on or
off
It is used in optical storage media, magnetic disks and
Uses solid state media
Security lights
Accessing data is much faster
Used in greenhouses to control the lighting conditions

Storage Devices & Media

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Used as a backup media


3.3. Magnetic Backing Storage Media
Long term archiving of data due to the large memory
capacity of Magnetic tapes
Depend on the magnetic properties of certain materials.
Advantages
Magnetic material is coated on the surface of a disk which
Less expensive compared to hard disk of equivalent
can be magnetised to represent a 1 or 0 and data is read
memory capacity
accordingly.
Very robust technology
Fixed Hard Disks/Drives Data transfer rate is fast
Disadvantages
Available on all computers and is the main method used Access time is very slow (need to go through all
for data
storage previous files to reach the one required)
Uses a read/write head to write and read data from it When updating another tape is needed
Disk surface coated in magnetic film, storage is done by Affected by magnetic fields
altering
binary codes to 1s or 0s
These hard disks are used to store the Disk Operating 3.4. Optical Backing Storage Media
System (DOS), application software and files
Uses CD-ROM/DVD-ROM
Used to store operating systems and working data
Used for storing application software Laser light is used to read data stored on CDs or DVDs
Real time systems and online systems used fixed hard Use a thin layer of metal allow or light-sensitive organic
drives dye to read the data
Used in file servers for computer networks Spiral track included
Advantages Read only memory – cannot be overwritten
Very fast data transfer rate Data is stored as a series of pits and lands formed by a
Fast access times to data laser beam
etching the surface at manufacturing stage
Have very large memory capacities Uses
Disadvantages CD-ROM stores music files and computer games
Can be easily damaged DVD-ROM used to store films, computer data and
They lack portability more sophisticated gaming software
Many moving parts compared to Solid State Drives Advantages
(SSD) Holds more data than floppy disks
Large memory capacity
Less expensive than hard disk drives
Portable & Removable Hard Disks/Drives Disadvantages
Data transfer rate and data access time are slower
Like fixed hard disks but are usually connected via
universal serial bus port CD-R/DVD-R
Can be removed and connected to other computers
Uses The letter ‘R’ means the disc is recordable only once and
Can be used as backup systems to prevent loss of then it
becomes ROM
data Use a thin layer of an organic dye as the recording media
Can be used to transfer data, files and software DVDs also use an additional silver alloy or gold reflector
between
computers Laser beam produces heated spots and unheated spots
Advantages and the laser beam can distinguish between the two and
Data access time and transfer rate is very fast interpreting the data as 1s or 0s
Large memory capacities Uses
Can be used to transfer files or data between They are used for home recording of music (CD-Rs)
computers and films
(DVD-Rs)
Disadvantages They are used to store data for later use
Can be easily damaged Used in applications where it is necessary to prevent
the
deletion or over-writing of important data
Advantages
Magnetic Tapes & Drives
Cheaper than RW disks
Once burned (and finalized) they are like ROM
Thin strip of plastic which is coated in a magnetic layer
Disadvantages
Read and written by read/write head
Can only be reordered once
Uses
Not all CD/DVD players and can read CD-R
Application where batch processing is used

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

CD-RW/DVD-RW Disadvantage
DVD-RAMS are not as compatible as R or RW, many
‘RW’ means that these disks are re-writable media can be systems will not
recognize this format
written
over several times More expensive than DVD-RW
Unlike CD-R/DVD-R they don’t become ROMs
The recording layer uses a special phase-changing metal
alloy Blu-Ray Discs
The alloy can switch between crystalline and amorphous
(non-crystalline) phases, thus changing its reflectivity to Uses
light,
depending on the laser beam power Blu-ray disks are used in home video consoles
Spots are produced which can be read by a laser Used for storing and playing back films
PCs can use this technology for data storage or
System allows data to be written, erased and re-written
many times backing up hard
drives
Uses Camcorders can use this media to store film footage
CD-RWs and DVD-RWs are used to record radio and Advantage
Very large storage capacity
television
programs
They are used in closed circuit television (CCTV) Data transfer rate is very fast
Data access speed is faster than with other optical
systems
Advantages media
Can be re used many times Disadvantage
Different file formats can be used each time Disks are relatively expensive
Blu-ray disks still have encryption problems
Less wasteful than R format since files or data can be
added at
a later stage
Disadvantages 3.5. Solid State Backing Storage
Relatively expensive media
Possible to accidentally overwrite Solid state systems control the movement of electrons
within a
microchip: if the transistor conducts a current,
this is equivalent
to a 1, otherwise it is a 0
DVD-RAM Have no moving parts, consume much less power and are
extremely
robust
Recent addition to optical media group Used primarily as removable storage devices and are
Unlike other CD and DVD formats, DVD-RAMs have collectively
known as flash memory
several discrete
concentric tracks rather than a single Flash memory makes use of NAND chips whereas
spiral track EEPROM (Electronically Erasable Programmable Read-
Gives them advantage that writing, and reading can occur Only Memory) uses NOR chips
at the same
time Devices using EEPROM are more expensive compared to
Makes it possible to watch an already recorded television flash memory
program at
the same time as a different program is being
recorded
Recording layer is made from similar phase-changing Solid State Drives
material to that
used in RW technology
Shiny and dull marks represent data to a computer where Supports reading/writing data & maintains stored data in
they are
interpreted a permanent
state even without power
Uses Functions much like a hard drive but different tech
DVD-RAMs are used in recording devices such as Built with an array of semiconductors that form its
satellite
receivers to allow simultaneous recording memory and
operated using an integrated circuit
and playback Uses
They are used in camcorders to store films Used to store operating systems and working data
Advantages Used for storing application software
Have a long life (30 years) Used in file servers for computer networks
Can be re written on more than the DVD-RWs (100,000 Advantages
times) Faster than hard disks because they do not need to
Very reliable as they have built in verification software ‘spin up’ the
disk
to
ensure accuracy of data Robust because no mechanical parts
Access is very fast Read performance is fast even when data fragmented
No need to finalize the disk Less susceptible to data loss
Very large capacities No moving parts so it is more reliable
Ability to read and write data at the same time

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Lighter, quieter and require less power than hard


Routers
disks
Data access times is faster than HDD
A device that enables data to be sent between different
Disadvantages
types of
networks
More expensive than hard disks
Commonly used to connect computers and other network
Have a smaller capacity than modern hard disks
capable devices
to the internet
Lower number of write cycles causing performance to
They can be connected to through cables or wirelessly
diminish
over time

Function
Flash Drives/Memory Sticks
Makes decisions on messages being passed between the
Otherwise called pen drive/memory stick/USB stick
networks
Can store several GBs of data and use solid state Reads information about the message and decides where
technology
the message
should go and the best route for it to get
Connected to a computer through USB port and power to
there
operate drawn
from host computer
Formats the messages making it suitable for the new
Some expensive software increasingly uses these storage
network
methods as a
form of security
Uses
Used to transport files between computers How it Works
Used as a security device – a dongle – to prevent
software
piracy To send data to a specific device, a router needs a
Advantages something like
an address
Very compact and portable media Internet Protocol Address: a unique number assigned to
Very robust all
computers and devices connected to the internet which
Not affected by magnetic fields can determine
its exact physical location
Disadvantages A router can use this IP to send data from the internet to
Not possible to write protect the data and files the exact
device that requested it
Small physical size and are easy to lose. Storing IP Addresses:
Lower storage capacity than hard disk Routers store IP addresses in a routing table
Routing tables list all the different routes to other
networks
Flash Memory Cards Routing table determines best route for data

A form of electrically erasable programmable read only


memory (EEPROM) Sending Data between Devices
Uses
Used to store photos on digital cameras Routers can also send ‘packets’ of data between devices
Mobile phones use them as memory cards on different
networks
Used in MP3 players to store music Each packet contains the data itself and the IP address of
Used as a backup in hand held devices the
device being sent to
Advantages Occurs globally using multiple routers & re-routing until
Very compact the data
reaches its intended IP address
Very robust
Disadvantages
4.2. Common Network Devices
Very expensive per GB of memory when compared to
hard drive disks
Network Interface Cards
Has a finite life in terms of the number of times they
can be read from/written to.
Used to connect individual computers/devices to a
Lower storage capacity than hard disks network
NICs come in two distinct types:

4. ## 4.1. THEORY Wired: cards that have ports which allow network
cables to be
plugged in directly
Wireless: cards that connect to networks using Wi-Fi
Networks & the Effects of signals

Using them

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Hubs Any system which allows you to connect to a network or


computer
through wireless communication
They are devices that can have multiple devices Examples:
connected to them WLANs
Main task is to receive data from different ports and send PDAs
it to
each device Laptop computers
The information will be received to the device whether its Peripheral devices such as printers
relevant,
or not Wi-Fi Hotspots
Wi-Fi systems rely on AP (radio frequency technology)
to enable
the device to receive and send signals
Bridges Wi-Fi hotspots are places where you can access Wi-Fi
(free or
paid)
It connects 2 different types of networks together e.g. a Hotspots are found in public places like Airports,
bus and
star network hotels, and
cafés
It can only connect networks that use the same way for War driving: The act of driving and searching for
handling
messages unsecured
Wi-Fi hotspots
They do this by changing the form of message to suite the This gives a risk to the Wi-Fi system
different
type of network

Bluetooth
Switches
Bluetooth is an example of wireless personal area
More efficient than hubs in distributing data networking (WPAN)
technology
Each device has an access control media address MAC
Spread spectrum transmission (radio waves) is used to
which identifies
it uniquely provide
wireless links between to devices such as mobile
MAC Address: a number unique to each device connected phones and allow
connection to the internet
to the
network (like fingerprints) A small home network can be created with this system
Data sent will have a mac address which tells the source Uses
and
receiving device Transfer photos from camera to mobile phone
Wirelessly connect different external devices
Modems
4.4. Accessing the Internet
It stands for modulator demodulator.
Converts computer’s digital signals (modulates it) into User can access by web browser
analogue for
transmission through telephone lines
Reverse this process- analogue signal from a telephone Type of access Description
line into
digital for a computer to process the data Slowest type (60kbps), Telephone
(demodulates it) Dial up internet access line gets tied up while a dial up
The main use it to connect to computer networks over modem is in operation
long distances
using existing telephone lines Local cable television operators
Cable internet access give user access through cable
Types of Modems:
networks
Dial-up modems: operate at 60 kilobits/sec Fastest download speed
Internet access via DSL
slow compared to modern standards connections (at least 11000kbps)
Asymmetric: faster at downloading than uploading
(ADSL) asymmetric digital subscriber line modems
4.5. Web Browser
operate at
11,000 kilobits/sec
Don’t tie up line while accessing internet, which allows
Software used to retrieve, present & traverse the World
simultaneous internet access and usage of telephone
Wide Web
Cable modems: allow cable TV users to receive TV signals
World Wide Web: system of interlinked hypertext
as well as
internet access
documents
accessed via the Internet

4.3. Wi-Fi & Bluetooth


HTTP Proxy Server
Wi-Fi
Type of server that acts as a buffer between a WAN and a
LAN

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Retrieves web pages and passes them onto the computer Web Browsing
that made a
request Email
Stores any page retrieved on the server, which means File Sharing
that when a
different computer requests the same page it Entertainment
would be available Video Conferencing
Speeds up the browsing process Online Banking
Advertising & Blogging
Social Media
Websites

Web is made up of millions of websites and web pages Intranet


Web pages are documents on a computer screen
containing various
multimedia and text, pictures Like the internet but only accessible to specific users
A website consists of many of these pages linked together Basically, a private internet where outsiders cannot
connect to it
Uses of an Intranet:
Uniform Resource Locator (URL) Web Browsing
Email
Web browsers use URLs to retrieve files
File Sharing
They are multiple ways of locating on the internet
Schools: share information and learning resources
Standard form: 4 numbers e.g. 194.106.220.19 with students
Alphanumeric form: Businesses: share private information within a large
protcol://web address/path/filename company
securely
Where; Protocol is usually http
Site address consists of: computer name, domain
name, domain
type, and country code Comparing Internet & Intranet
Path is the web page
Filename is the item on the page Internet Intranet
Phrase Internal Restricted
International Network
4.6. Email Origin Access Network
Purpose Globally share data Privately share data
A method for sending text and attachments from one
Specific company or
computer to
another over a network Audience Wide range of people
organisation
Advantages
Speed of sending and receiving replies is quick Anywhere if you are Only from within the
Access
connected company
Low cost (no stamps, paper etc.)
Not needing to leave home to send the mail
Disadvantages
Possibility of virus threats and hacking Local Area Networks (LAN)
Need for the email address to be correct
Inability to send bulky objects via emails Not over a large geographical area (e.g. in one building)
Typical LAN will consist of several computers and devices
Devices and computers will be connected to hubs or
4.7. Internet Service Provider (ISP) switches
One of the hubs or switches will usually be connected to a
These are companies that provide users with access to
router/modem to allow LAN to connect to the internet
the internet
In doing so it then becomes part of a wide area network
Provider in return for these services is charged a monthly
Advantages
or annual
fee The sharing of resources
After paying this fee, a username and password are
Communication between users
issued which can
be used to connect to the internet
Network administrator can control and monitor all
aspects of the
network
4.8. Common Network Environments Disadvantages
Easier spread of viruses throughout the whole
Internet network
Development of printer queues
A worldwide collection of networks and computers that Slower access to external networks e.g. internet
have joined
together Increased security risk
Uses of the Internet:

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

If main server breaks down, usually the networks will DESKTOP COMPUTERS
no longer
function
Advantages Disadvantages
Most websites are designed Not portable so are limited to
Wireless LANs (WLANs)
to be viewed on a desktop use in one room
Do not involve any wiring or cabling Have larger keyboards Require keyboard and mouse
Provide wireless network connection overs a short making it easier to type on as extra peripheral devices
distance Screens are larger so giving
Screen and Monitor consume
They use radio or infrared signal's instead of cables an easier and better viewing
separate power.
Devices known as Access Points (APs) are used for a experience
larger range Cannot usually connect to
APs usually use spread spectrum technology (larger Usually use wired internet
devices like Bluetooth
range) connections which is more
speakers without external
Advantages stable/reliable than Wi-Fi
adapter
All computers can access the same services and
Robust Take up large desk space
resources
No cabling is involved Good heat dissipation- large
Bulky to carry around
The system is more flexible body.
Adding new computers and devices is very easy
Cost is reduced, and safety is improved TABLET COMPUTERS
Disadvantages
Security is an issue Advantages Disadvantages
Problems and interference can affect the signal Smaller & lighter than
Larger & less portable than
The data transfer is slow than in the wired LAN desktops & laptops making it
smartphones
easier to carry
Uses Wi-Fi to connect to the
Wide Area Networks (WAN) Larger screen than
internet which is less reliable
smartphones
WAN is formed by several LANs being connected through than wired
a router or a
modem On-screen keyboards larger Screens are smaller than
Some companies set up Private WANs, it is expensive than those on smartphones those on laptops & desktops
however it comes
with a more enhanced security On-screen keyboard is not
It is common to use an Internet service provider (ISP) for easy to type on
connections to the internet and communicate via this
network system MOBILE PHONES
Additional hardware is needed for a WAN: Routers,
modems and proxy
servers Advantages Disadvantages
Smallest most portable of all Websites are often not fully
4.9. Using Different Types of Computers devices displayed
to Access the Internet People more likely to carry Small screen size makes
this wherever they go viewing websites difficult
LAPTOP COMPUTERS Much easier to connect to Small keyboards make it
internet on-the-go difficult to type
Advantages Disadvantages Allow children access to
More portable than desktops internet anywhere; can be
Less portable than
can access internet in more dangerous
tablets/smartphones
locations
Larger screen than tablets & Screens not as large as 4.10. Network Security Issues
smartphones which allows desktop PCs may not appear
easier reading as clearly Connection to a network exposes a user to:
Keyboards are bigger than CPUs are not as powerful as Hacking: Unauthorised access
given to computer.
those on tablets/smartphones those in desktops Phishing: Phishing involves
getting sensitive
Touchpads allows easy information such as usernames, passwords, and
navigation even on slanted credit card detail, for malicious reasons, by mimicking
surfaces a
reliable webpage on the network
Pharming: Explained in chapter 8 card 2 (E-Safety)

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Viruses: Explained in chapter 8 card 2 (E-Safety)


4.12. Authentication Techniques
Magnetic Stripes: Card swiped through a
Policing the Internet
magnetic stripe reader that authenticates the user after
Currently, the internet has no boundaries
reading
iron-based magnetic particles on a band of magnetic
Anything and everything can be put online
material on
the card which is also called a magstripe.
For Policing:
Prevent illegal material being posted ID Cards: Usually a photo ID with a QR
People can easily find info on how to become hackers
or make
bombs or barcode that authenticates the user.
Prevent children from accessing undesirable websites
Could reduce the amount of incorrect information
Against Policing:
Material already available in other sources i.e. books
Very expensive
Passports: Have an RFID chip on it that
Users would have to fund
Difficult to enforce rules
responds to a signal sent by a RFID reader that sends
Against freedom of information information about
the passport holder to the computer
Laws already exist to deal with perpetrators system

Physical Tokens: A security token


Inappropriate Websites
(sometimes called an authentication token) is a small
Risk of finding undesirable websites hardware
device that the owner carries to authorize access
Risk of doubtful websites which are not genuine to a network service.
The device may be in the form of a
They could lead to problems such as undesirable web smart card or may be embedded in a
commonly used object
links, security
risks such as a key fob.

Retina Scans: Scans the


4.11. Password Interception
unique pattern of blood vessels in the
eye of a user using an
Spyware unperceived beam of low-energy infrared
light into a person's
eye as they look through the scanner's
eyepiece.
Spyware is software that gathers user information
through their
network connections without them being Iris Scans: A scanner scans and
aware that this is happening
Once spyware is installed, it monitors all key presses and compares the pattern in the iris of a user to a database of
transmits
the information back to the person who sent out stored iris
patterns, if it finds a match, the user is
the spyware authenticated. Iris scans are
generally more accurate than
retinal scans.
This software can install other spyware software, read
cookies and
personal information, and change the default
Face Recognition: Verifies the face of
home page or web
browser
Anti-spyware can be used to search out this software and the person attempting to access the data using a face
correct the
corruption recognition
algorithm and identifies facial features by
extracting landmarks, or
features, from an image of the
subject's face.
Weak & Strong Passwords
Fingerprint Scanning: Scans the pattern
Strong passwords: A random mix of alphabets (uppercase
and
lowercase), numbers, and keyboard symbols (@, %, ^ on fingers and verifies it against a stored database of
etc.) authenticated
fingerprints using pattern-matching software
Weak passwords: Easy to guess, e.g. users name or date to allow access to a
user.
of birth or
1234556, etc.
Frequent password changes can help reduce the chances 4.13. Data Protection Act
of password
interception too
Passwords must not be shared; their strength is then of Failure to abide to rules can lead to fines or imprisonment
little use.

Rules (SAREF DES SAS)

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

1. Data must be Fairly and lawfully processed A method for sending text and attachments from one
2. Data can only be processed for the Stated purpose computer to
another over a network
3. Data must be A**dequate, Relevant and not Excessive
4. Data must be Accurate
5. Data must not be kept longer than necessary (Short Comparing Faxing & Email
time)
6. Data must be processed in accordance with the data Fax Email
Subject’s right More secure (user id and
Singed faxes are legally
7. Data must be kept Secure password needed to access
acceptable
8. Data must not be transferred to another country files)
unless
(Domestic) they have adequate protection Digital files (no need to print –
Poor quality prints at times
eco-friendly)
Delay is telephone line busy Better quality
Guidelines
Files can be transferred
Slow if several documents
Do not leave personal information lying around between any device
need to be sent
Lock all filing cabinets when leaving an office connected to the internet
Do not leave computer without locking or logging off Faster sending of documents
Every recipient must be
Protect passwords per document and even if
dialled up one by one
Change passwords regularly multiple recipients
Do not fax or email anything of sensitive nature.
Expensive to buy No dedicated device needed

4.14. Network Communication 4.15. Web-Conferencing


Facsimile (Fax)
Video-Conferencing
A system that scans documents electronically and
This is a method of communication between people at 2
converts them into
a bit map image (a bit is a binary digit
or more
separate locations
and is a 1 or a 0)
It is done in real time and makes use of LAN, if internal, or
Then transmitted as a series of electrical signals through
WAN if
through the internet
the
telephone network
Uses hardware like; webcam, microphones, speakers and
Receiving fax machine converts the electronic image and
monitors
prints it
out on paper
It also uses special software like CODEC converts and
It is also possible to generate fax signals from a computer
compresses
analogue data into digital data to send down
to allow
documents to be sent to a fax machine
digital lines
Saves printing out the document first and then passing it
How it works:
through
the fax machine
Delegates at one end speak into a microphone and
Fax/modem software in the computer converts the image
consider the
webcam
into a form
fax machines can be recognized
The other delegates can see them and hear them
Physical Faxing: dedicated fax machine connected via
using speakers
and monitors
telephone
line that copies and electronically sends files to
However, there are several problems with these as
the dialled
recipient
the conference
call often lags and quality not always
Electronic Faxing/Online Faxing: uses the internet to send
high.
documents through computers.
Also, as travelling tickets increase in price, terrorists
Physical Faxing Electronic Faxing can
use this way of communicating with each other,
increasing risk
Associated with a phone no. Associated with an email
Only address and phone no.
Need actual fax machine, Cheaper- no fax machine, Audio-Conferencing
paper, etc. paper and ink
No encryption Better safety- encryption Same as video-conferencing but without webcam
VOIP is often used
The signal can get busy No busy signal issues
VOIP (Voice over internet protocol) is a method used to
talk to
people over internet
VOIP converts sound (picked up by a microphone) into
Email
discrete
digital packets that can be sent to a destination
via internet
Advantage: free and can be used all over the world

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Disadvantage: sound quality is usually bad No longer a need for large office space to store
Security Issues: documents
Identity and service theft Documents are only printed out when required
Viruses and malware Reduced chances for loss of documents as all of them
Spamming (sending junk mail) are stored on one computer
Phishing attacks (illegitimate scams) This leads to need for fewer staff and increase in
efficiency
Spreadsheets:
5. ## 5.1. THEORY can be used to calculate wage/salary slips
Calculations are easily done on this software
Spreadsheets are used to produce graphs for the
The Effects of Using ICT analysis of situations
Usage of this software has led to reduction in staff
Effects of IT on Employment Staff no longer needed to calculate wages and
salaries manually
IT led to unemployment in many areas Databases
Manufacturing - robots have taken over many tasks Updating personnel data (eg salary, home address,
and are much faster. Example in welding car bodies, phone number etc) can be done on databases
spray painting items and manufacturing circuit regularly
boards. Staff records can be centralised in one database and
Computer controlled warehouses – automatic, does data can be transferred between sites
not need people very quick and easy to use
Labour intensive work - printing industry and filing This leads to reduced need for Human Resources staff
New jobs have been created in ICT however, Databases lead to the need for remaining
Writing software staff to be retrained to use the new technology
Maintenance of robots
Internet related jobs 5.2. Effects of IT on Working Patterns
Effects on People: Part-time working: A contract where someone works
fewer hours
per week than a full-time employee, in shifts.
People need to be retrained due to new technology
Cleaner working environment Flexible working (flexi-time): Workers can choose their
working
time but will have to complete the day’s work.
De-skilling of workforce
Job sharing: Two or more part-time workers divide their
Computers can now do tasks that required high skill level
job,
replacing one full-time worker.
Safer working environment
Compressed hours: Employees can work longer hours per
Fewer manual tasks such as heavy lifting
day but
over fewer days, completing the workload sooner.
Effect on Companies:
5.3. Microprocessor-Controlled Devices
Can employ less people
Robots do not take holiday, get sick or need breaks in the Home
Greater consistency in products made
Positive effects Negative effects
Negative impact of ICT on employment Lead to more leisure time
since devices can be Unhealthy diets
introduction of ICT to the workplace has led to
programmed to do tasks
redundancies of many employees which can cause them
to lose a source of income People become lazy and rely
More time to socialize
skills such as filing and carrying out numerical analysis is on devices
effectively replaced by sophisticated software Becoming very sophisticated
Dependency on technology
and can make use of
Types of software that have impacted offices the most: increases
embedded web technology

Word processors:
More wasteful society since
Save energy - switch off
Possible to modify and update word documents devices thrown away if they
automatically
fail, not economic to repair
There’s no longer a requirement to store physical files
on shelves and offices which would take up space and Easier to program device
Leaving on standby wastes
make the office look messy and full rather than set timings &
resources
dates manually

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

5.4. Potential Health Problems Newsletters

Paper-based communication used to inform people about


Repetitive Strain Injury (RSI)
their
interests
Schools use these to inform parents about events/dates
This is when joints such as the shoulder, wrist or fingers
Advantages
swell,
causing pain
Damage gets worse if left untreated Released regularly
Can lead to hand/arm immobility The recipients have a permanent copy
Disadvantages
Causes Prevention Requires distribution
There are no special effects; sound/video/animation
Typing for extended periods
Take periodic breaks There are printing costs; paper/ink
of time
Use ergonomic keyboard &  
Typing with incorrect posture
mouse
Clicking on mouse Websites
Use a wrist rest
rapidly/extendedly
Collection of webpages, text, graphics, video and sound
Ensure sufficient space for
Holding mouse incorrectly Hosted on a web server on the internet
comfortable work
Need to write code or use a web authoring application
Working in a cramped space Hyperlinks to other pages can be added
Interactive websites require programming knowledge
Back Problems Can use a camera, scanner, microphone to input data
Usually hire space from web hosting company
Headaches are a potential consequence Advantages
Ability to add sound/video/animation
Causes Prevention
Links to other websites/hyperlinks
Not sitting upright while The use of hot spots
Take periodic breaks
working Buttons to navigate/move around the website
Use adjustable chairs with Hit counters to see who has visited the websites
Sitting with poor posture
good back support Disadvantages
Working in a cramped space Sit upright with good posture Can be hacked and modified or viruses introduced
Incorrect computer screen Need for a computer and internet connection
Keep feet flat on floor Lack of portability compared with paper-based system
positioning
Need to maintain website once it is set up

Eye Problems  

Headaches are a potential consequence Multimedia Presentations


Causes Prevention Uses a mixture of media to present information:
Staring at a computer for animations, video,
sound, transitions, hyperlinks
Take periodic breaks
extended periods of time Produced using software packages
Working with poor room lighting Use TFT rather than CRT Used with a projector so large audience can view
Advantages
Computer screen glare/flicker Use anti-glare screens
Use of sound and animation/video effects
Dirt can cause eye strain Ensure good room lighting
Interactive/hyperlinks built into presentations
No direct light on screen More likely to hold audience’s attention
Clean dirt Disadvantages
Need for special equipment – expensive
May require internet access
6. ## 6.1. THEORY
 

ICT Applications Music Scores

Music samplers and mixers allow original tracks that were


Communication Applications recorded
in a studio to be modified

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Electronic instruments can play back through electronic Wireless devices that allow users to make phone calls
effects
machines from anywhere
with cell reception
Synthesizers combine simple wave forms to produce They connect to the telephone system using radio signals
complex music
creations This requires them to be in range of a mobile tower
Electronic organs can mimic any other instrument Used for communication via
Music scores can be generated from music itself using Phone calls
software Text messaging
Software can automatically correct music notes in a score Social Media
There is no need to understand music notation to write a
music score  
Music notes are automatically printed out in the correct
format Internet Telephony/VOIP

  VOIP (Voice over internet protocol) is a method used to


talk to
people over internet
Cartoons VOIP converts sound (picked up by a microphone) into
discrete
digital packets that can be sent to a destination
Animations can be produced using computer hardware via the internet
and software
With 3D animations objects are designed on a computer  
and a 3D
skeleton is produced
Parts of the skeleton are moved by the animator using key Publicity & Corporate Image
frames
Publications
The difference in appearance of the skeleton in these key
frames is
automatically calculated by the software and is Business Cards:
known as tweening or
morphing Miniature printed documents that provide information
The final stage is to make a realistic image by a technique about the
business/organisation
known as
rendering Usually printed on thick cards
Easily distributable to potential clients
 
Information includes company logo, services, address,
contact
numbers, email, website
Flyers & Posters
Gives a professional impression
A Word processor/Desktop publisher is used to create it Letterheads:
Need to hold minimum amount of information and be Found at the top of official printed documents to be
accessible very
quickly mailed to
clients or for internal use
Need to make an immediate impact when people look at Makes it clear to reader who the sender is
them Information includes company logo, name, address,
Anyone can produce them but there are highly skilled contact
numbers
professionals
who can produce expert posters Gives a professional impression
Some posters require larger printers than A4 Easy to reply to
Sequence in which a flier or poster is produced on a Flyers:
computer system Generally printed on single sheets of A4 paper
A word processor or DTP application is opened Handed out directly to people for promotions
The user creates frames, boxes and text boxes Cheap to produce and easily distributable (locally)
If necessary, photos are taken, using a camera Information includes company logo, promoted product
The images are uploaded from the camera, loaded or service,
contact details
from a CD/DVD,
scanned from hard-copy photos or Makes it easier to target a specific audience
downloaded from the internet Brochures:
The photos are saved to a file Also called leaflets & are like flyers
The photos are imported or copied and pasted into the Difference is that they are often folded into sections
document Left on counters for pick up rather than handed out
The photos are edited and typed in or imported from a Information includes company logo, promoted product
file and
then put into required style or service,
contact details
Makes it easier to target a specific audience
 
6.2. Data Handling Applications
Mobile Phones
Surveys

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

All data handling starts with data collection School Reports


Data capture forms can be used for many applications
Decide what needs to be collected and then what Database applications such as SIMS store large amounts
questions should
be used to collect it of data which
can be used to create annual and termly
Paper or electronically school reports
Rules for creating forms Things able to be gathered from here are:
Make them look official Data individual to student – tests/exam results
Spaces should be thought about giving enough space Student progress – target grades being met or not
for answers Number of absences – create a percentage of amount
Restrict the amount of possible answers, do not use of days
attended school
open
questions Teacher comments – adds comments on to report
If open questions are used limit the amount of space
available
for answers 6.3. Measurement Applications
Asking for ‘Name’ needs to be carefully thought about
Are you asking for sensitive information? Sensors are used to send data to a computer where the
People may not feel comfortable being truthful data is
processed
What names do you want? The computer simply reviews the data from the sensors
First name, family name etc. (by comparing
it to data stored in memory) and updates
Date of Birth its files and/or gives a
warning signal if the values are
What format do you want it in? outside given parameters
Give instructions about how to answer questions No changes to the process are made
How will the data be collected? Examples:
Paper surveys are scanned using OMR or OCR Scientific experiments
Advantages Weather stations
Faster to get results
Fewer errors  
It is easier to do statistical analysis
Less expensive to carry out; requires fewer people Analogue & Digital Data
Online questionnaires
Usually use radio buttons Digital data: discrete, fixed value (used by computers)
No data preparation needed Analogue data/signals: continuous value that varies
Results sent directly to database for analysis smoothly
Analogue device = measure length, weight,
  temperature etc.
E.g. Thermometer – represents temp. by the height of
Address Lists the liquid
column
Sensors: measure physical and analogue qualities
An address book on a computer or mobile phone might have Analogue data from sensors needs to be converted into
a contact’s
home address, phone number, email address, digital data
using an analogue to digital data converter
personal information like the
date of birth etc. (ADC) so that the
computer can understand and process
the data from the sensors
If the computer sends signals to motors, valves, etc. then
this data
also needs to be converted to analogue using a
digital to analogue
converter (DAC) so that the computer
can effectively control these
devices
 
 
Clubs & Society Records
Analogue to Digital Converter (ADC)
Need to keep a record on members usually in a database
Usually payment details, contact details and interests Used when you want to attach an analogue input device to
It makes it easy to match people with interests and send a digital
device such as a computer.
information
about what they are interested in This is so the analogue data can be
This can be done my using mail merging understood/processed by the
computer since computers
Easy to check memberships and send out reminders only work w/digital data
It is important to follow the data protection act E.g. When processing data sent from a sensor
   

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Digital to Analogue Converter (DAC) Readings can be taken more frequently if they are done
by a computer
and sensors
Used when you want to attach an analogue output device It could also be safer if whatever is being monitored may
to a digital
device such as a computer have
potential hazards (e.g. children falling into the river
E.g. If the computer is being used to control a device whilst
attempting to take readings)
(motor/valve)
the device will be controlled by variable
voltages; the DAC will be
used to send out analogue  
signals
Disadvantages of Using Computers in
 
Measurement
Pollution Monitoring
Expensive to purchase and set up
Example: monitoring oxygen levels in a river If performed for educational purposes, reduced practical
Sensors read data from the river (oxygen levels and hands-on
experience and learning.
acidity levels
using a pH sensor) Will not function in a power cut if no backup power
The data from the sensors is converted into digital using present
(expensive to have reliable backup power)
an ADC
The computer stores the received data 6.4. Microprocessors in Control
The oxygen levels and acidity levels are compared to the
Applications
historical
data stored in memory and they are also
compared to alarm levels
stored in memory
Sensors are used to send data to a computer where the
One of two things will now happen: either the data is
data is
processed
transferred to
a CD/DVD or to a memory stick and taken
The computer reviews the data from the sensors (by
away for analysis later or
the computer is connected into
comparing it to
data stored in memory)
a mobile phone network and transmits
the data back
If the values are outside the given parameters/pre-set
automatically to the monitoring station
value it acts
to try and get the values within acceptable
  ranges
It does this by sending signals to devices controlling the
Intensive Care Units in Hospitals process

 
Sensors read key vital signs (such as pulse/heart rate,
temperature,
blood pressure, respiration, etc.)
The data from the sensors is converted into digital using
Turtle Graphics
an ADC
Based on computer language called LOGO and is now
The data is stored in the computer memory
usually known as
turtle graphics
The computer compares the data from the sensor with
It is the control of the movement of a ‘turtle’ on a
the values
stored in its memory
computer screen
by several key instructions which can be
The results are output on a screen in the form of graphs
typed in
and/or
digital read-outs
The use of ‘repeat’ instructions makes a piece of code
An alarm is activated if any of the data is outside
more
efficient
acceptable
parameters
The system continues to monitor the patient until the Command Meaning
computer is
turned off
FORWARD x Move x cm forward
  BACKWARD x Move x cm backward
LEFT d Turn left through d degrees
Advantages of Using Computers in
RIGHT d Turn right through d degrees
Measurement REPEAT n Repeat next set of instructions n times
ENDREPEAT Finish the repeat loop
The computer will not forget to take readings
The computer’s response time is much faster, which is PENUP Lift the pen up
particularly
important in the patient monitoring example PENDOWN Lower the pen
Doctors, nurses, scientists, etc. can all get on with other
tasks
while the monitoring is done automatically  
Computer give 24 hours cover every day (i.e. 24/7)
The readings will tend to be more accurate Automatic Washing Machines

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Have a microprocessor in them which contains the If too low, it will heat up by turning the boiler on
software which
controls the washing machine and
if it’s too high it will turn the air conditioner
Appling the factors on
Inputs These will stay on until desired temperature is
Pressure sensor on the door to detect if open or reached
closed
Sensor to detect if the required level of water is in  
Temperature sensor to check temperature
Outcome Automatic Cookers
Clothes have been washed
Have temperature sensors and timers with manual
Outputs
controls to set
start and end times, and temperature for
Heater
cooking.
Motor to spin drum
Working similar to Central Heating System.
Lights on machine to show user stage the cycle is
at  
Actuators to turn the inlet valves on to allow hot
and cold
water into the machine Burglar Alarms
Actuator to turn the outlet valve on to let the water
out of
the machine when the wash is complete Burglar alarms detect any intrusion.
An actuator to control the pump Sensors such as motion sensors, door and window
Processing sensors,
magnetic sensors, multi-functional sensors
Software to make decisions which will allow the (vibration, shutter,
and temperature) measure the
clothes to
be washed physical quantity and inputs the
value to a
Time taken before next inputs microprocessor.
Timer as part of the software The microprocessor compares the input values with
Time different cycles (when to add the preset
values, if changes are detected, the
soap/conditioner/etc.) microprocessor sends
signals to the actuator
Time delay in measuring temperature The actuator activates the sirens or gives a phone call
Needs to be time for changes to have effect or
messages the input mobile number.
Unmanageable situations
Door may not be shut  
Needs to draw user’s attention
Usually a buzzer and light Glasshouse

  Temperature controlled the same as central heating


system
Central Heating System Humidity must also be controlled
Humidity sensor tells computer how humid it is
Applying factors Computer then decides to turn the water supply to
Inputs sprayers
Inputs from the user Windows also operated by the computer
Room temperature required Need to find the balance of how often to have windows
Time systems turns on/off open
Inputs from the system Blinds that can be computer controlled
Actual room temperature Light sensor measures light intensity
Clock giving the time When sun is strong the computer actuates electric
Outcome motors which
close blinds
Heating or cooling room during the required times Control in glasshouse is more likely to be used in
Outputs commercial areas
or large glasshouses not in gardens
Boiler
Air conditioner
6.5. Modelling Applications
Processing
Check time against the one input and switches on
A mathematical computer model is created to manipulate
when that
time is reached variables
and see real time changes in terms of figures.
Same done to check when to turn off Used to find how mechanisms control a system.
When on, microprocessor reads temperature from
Advantages:
sensor and
compares it with desired temperature
Cheaper than building physical system to test
Safer than building system and experimenting

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Easier to experiment with various scenarios stopping


the spraying operation if the supply of paint has
Quicker as no need to build system run out etc.
Near-impossible tests involving space and volcanic Robots are very good at repetitive tasks
scenarios
can be modelled risk-free However, if there are many different tasks (e.g. making
What if analysis can be conducted that allow a certain specialist
glassware for some scientific work) then it is
figure to
be computed by letting the computer change often better to still
use human operators
other variables that
affect the value needed to be set.
E.g.
Advantages

Robots can work in environments harmful to human


operators
The can work non-stop (24/7)
They are less expensive in the long term (they don’t need
wages)
however they are expensive to buy initially
Productivity is higher, since they do not need holidays, are
not ill
etc.
There is greater consistency – every car coming off a
production
line is identical
They can do boring, repetitive tasks, leaving humans free
to do more
skilled work

Disadvantages

Robots find it difficult to do ‘unusual’ tasks (e.g. one-off


glassware for a chemical company)
They replace skilled labour, leading to unemployment
When making a computer model, consider: Since robots do many of the tasks once done by humans,
What and how data should be collected there is a
risk of de-skilling
Working of the system in real life. Because robots are independent of the skills base,
factories can be
moved anywhere in the world, again
causing unemployment
6.6. Applications in Manufacturing
Industries 6.7. School Management Systems
Robotics Learner registration and attendance
ID cards with magnetic tapes: The students will have
Robots are used in many areas of manufacturing, from to
swipe their ID cards, which contain the student’s
heavy work
right through to delicate operations e.g. car name, school’s
name, date of birth and the
bodies, welding
bodywork, manufacturing of microchips registration ID, when they enter and
leave the school,
etc. this way time is saved and the attendance is
more
Control of robots is either through embedded accurate.
microprocessors or
linked to a computer system Biometrics: Every student’s fingerprint is stored on a
Programming of the robot to do a task is generally done in database along with their personal information, the
two ways: students
must put their finger on a fingerprint scanner
The robot is programmed with a sequence of to enter or leave
the school premises.
instructions which
allow it to carry out a series of tasks
Alternatively, a human operator manually carries out Advantages Disadvantages
a series of
tasks and how each task is done is relayed Fingerprints are unique, so
back to the robot
(embedded processor) or controlling another student can’t give Collecting every student’s
computer. The sequence of
instructions is their attendance for fingerprint initially is time-
remembered so that the robot can automatically
carry somebody else, like with an ID consuming.
out each task identically each time (e.g. assembling
card.
parts
in a television)
Fingerprint scanners are
Robots are often equipped with sensors so they can ID cards can be lost, whereas
more expensive than
gather important
information about their surroundings fingerprints can’t be.
magnetic stripe readers.
Sensors also prevent them from doing ‘stupid things’, such
as
stopping a robot spraying a car if no car is present, or Magnetic fields can affect an Damages on the finger will
ID card. deny access.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Advantages Disadvantages The customer then enters their personal details or


There is an invasion of privacy indicates that
they are a returning customer
Copies of ID cards can be They select a payment method and make the payment
in storing fingerprints on a
made easily. The theatre seats are then booked in the customer’s
school database.
name
The final details are shown on the screen, together with a
Learner performance
reference
number
Spreadsheets can be used to record students’
An email is sent to the customer which they print out as
performances. It is
easier to compare each other’s
their proof
of purchase. In some cases, this also acts as
performances and an individual
student’s
their printed ticket
when they go to the theatre – an e
performance over the academic year.
ticket
Organising examinations
The database is updated with the transaction
Makes sure that the students are enrolled for the right
exams.

Prints the exam timetables. Disadvantages


Advantages
Allots examination rooms and the invigilator.
Gathers the results and puts them into the student No double booking as very Set-up and Maintenance
minimal delay. expensive
database.
Creating timetables and managing teaching Immediate booking and Computer and reliable
cover/substitution selection of seats internet access required
Considers the student’s choices, availability of Sever crashes can result in
Bookings can be made any
teachers and
rooms, subject clashes and the number the bookings completely
time
of hours needed for each
subject to produce accurate stopping
timetables that can easily be made
changes to and Digital ticket; printing and Need for website to be well
cover with teacher to be substituted. postage costs designed to ensure ease of
School management systems: reduced/eliminated use

Advantages Disadvantages QR codes for authentication; No special relation built with


no need for human, can use booking agent who can give
Absenteeism can be Operating the software will
scanner; reduced costs special promotions etc.
addressed more easily. need some training.
The initial cost of the software in
booking seats if the response is not immediate then can
Parents are kept updated.
is expensive. cause
problems like double booking)
Unauthorised access will have  
Reduced workload for
to be prevented as there is
teachers.
lots of personal information. Real-time Process Control
They are helpful for the
decision making of the An example of online processing
administration department Very different to real-time (transaction) processing
System usually involves sensors and feedback loops
In real-time process control, physical quantities are
6.8. Booking Systems continually
monitored and input is processed sufficiently
quickly to influence
the input source
Booking systems are used for transport (flights, trains and
buses),
cinemas and theatres
6.9. Banking Applications
Theatre booking system example:
Online banking systems rely on the ability to update files
Customer clicks on performance they wish to see immediately, thus preventing double booking, which could
They enter date and time of performance and required happen if
the system response time was slow
number of seats The use of computer technology has revolutionized how
A seating display at theatre is then shown on screen and we do our
banking transactions, for example:
user clicks
where they want to sit Internet banking
Database searched to check availability of selected seats. The use of automated teller machines (ATMs)
If
seating plan shown on screen, this isn’t required Chip and PIN technology
If seats available, seat numbers are shown together with
total price  
If customer is happy with this, they select ‘confirm’
The seats are now temporarily set at ‘no longer available’ Automated teller machines (ATMs)

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Automated teller machines (ATMs) are places where The interactive screen asks a series of question for
customers can get
cash (or carry out certain other the doctor
to answers, using a keyboard or a touch
banking activities such as order a
statement) using their screen.
credit or debit card The inference engine compares the symptoms with
the knowledge
base, using the rule base to find
What goes on behind the matches
Sequence at ATM
scenes The system suggests the possible illness with a
Customer puts card into Contact is made with bank’s probability of
each, cures and recommendations on
ATM computer the next step to be taken.
PIN is checked to see if it is The explanation system will explain how that
PIN is entered using the correct particular
diagnosis was suggested.
keypad Card is checked to see if it is Using 3D printers in medicine:
valid Surgical and diagnostic aids: A CT or MRI is used to
produce
images of the internal parts of the body. A 3D
A number of options are
printer can then
be used to reproduce the internal
given: change PIN, top up
organs as a solid object.
mobile, see balance, get
Prosthetics: 3D printers are used to print out artificial
money
body parts such as false tooth, artificial limbs, hearing
The customer selects the aids,
etc. This is a less expensive method of replacing
cash option & several cash body parts.
options are shown Tissue engineering: Used to produce layers of cells to
The customer’s account is replace damaged tissues.
The customer accepts one of accessed to see if they have Design of medical tools and equipment: Tools can be
the options or types in a sufficient funds, it is checked to made
faster and with reduced costs. They can also be
different amount see if they are withdrawing made changes to
easily, whereas it wasn’t the same
more than their daily limit with traditional methods.
The customer is asked if they
want a receipt 6.11. Computers in Libraries
The card is returned Transaction is okay
Money is dispensed Customer’s account is updated Many library systems are computer controlled
They usually involve the use of barcodes on the books
being borrowed
and on the borrower’s library card
6.10. Computers in Medicine The following describes a computerized library system
based on
barcodes
Patient records: Database that holds patient details and There are two files:
can be
accessed from any computer within the hospital Book file, containing fields for example: barcode, book
intranet. title,
name of author etc.
Patient identification: Barcodes on wristbands of the Borrower’s file, containing fields for example:
patients
can be used to access their patient record. borrower’s
number, borrower’s name etc.
Pharmacy records: When a borrower takes out a book, the book’s code is
Generates labels for drugs scanned
Checks if the patient is allergic to a particular drug. The book details are then found on book file
Patient monitoring: The borrower’s library card barcode is then scanned for
Sensors measure changes in temperature, heart rate, the
borrower’s unique number
breathing
rate, brain activity, blood pressure, blood The book file is linked to the borrower’s file and both files
sugar levels and
oxygen levels in the patient’s body. are
updated to indicate which book has been borrowed
The analogue signals from the sensors are converted and when it is due
back
into digital
signals using an analogue to digital The borrower’s file is interrogated daily by the computer
converter. to see
which books are overdue for return:
Graphs are produced to show trends over time. The computer reads a record from the book file
The readings are constantly compared with the pre- It compares the date due back with the current date
set values, if
the values aren’t in the prescribed range, If the date due back is less than (or equal to) the
the medical staffs
are notified. current date
(i.e. earlier date) …
Hospital management system: All the above-mentioned …using the barcode number of the book…
points come
under the hospital management system …the book file is linked to the borrower’s file…
which holds all of them, and
can be used to access data …and the corresponding record is read from the
from all the departments. borrower’s file
Expert systems:

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

The customer details are then found and a letter or Errors in the knowledge base can lead to incorrect
email is
automatically sent out decisions being
made
The next record in the book file is then read… It can be expensive to set up in the first place
…until the whole file has been checked Considerable training is necessary to ensure the system
is used correctly by the operators
6.12. Expert Systems  

These systems have been developed to mimic the


Components of an Expert System
expertise and
knowledge of an expert in a particular field
Examples include: User Interface
Diagnosing a person’s illness
Diagnostics (finding faults in a car engine, finding This is the only thing that the end user sees
faults on a
circuit board, etc.) Allows the user to interact with the system
Prospecting for oil and minerals Often requires training to operate effectively
Tax and financial calculations
Chess games Knowledge base
Identification of plants, animals and chemical
This is a database designed to allow the complex storage
compounds
and
retrieval requirements of a computerized knowledge-
Road scheduling for delivery vehicles
based management
system (in support of an expert
system)

Inference engine

This is software that attempts to derive answers from the


knowledge
base using a form of reasoning
It is how expert systems appear to use human-like
Expert System Setup
reasoning when
accessing information from the
knowledge base in an effort to find a
conclusion to a given
Experts in the field are interviewed to find out what is
problem
needed in
the expert system
The inference engine is a type of reasoning engine
Data is then collected from these experts
A knowledge base is designed and then created Rules base
The rules base is designed and created
The inference engine is designed and created This is made up of a series of ‘inference rules’ (e.g. IF the
The input screen and output format are also designed and country is in South America AND the language used is
created –
this is known as the user interface Portuguese THEN
the country must be Brazil)
The expert system is tested against known conditions and These inference rules are used by the inference engine to
scenarios draw
conclusions
It is also checked to see if it meets the original They closely follow human-like reasoning
specification
Experts are interviewed about how effective it is before  
the expert
system goes out on general release
Suggesting Diagnoses
Advantages
The interactive screen asks a series of question for the
Expert systems provide consistent answers doctor to
answers, using a keyboard or a touch screen.
They never ‘forget’ to answer a question when The inference engine compares the symptoms with the
determining the logic knowledge base,
using the rule base to find matches.
Using expert systems reduces the time taken to solve a The system suggests the possible illness with a probability
problem of each,
cures and recommendations on the next step to
A less skilled worker force is needed, which gives the be taken.
potential of
saving money, but also allows areas of the The explanation system will explain how that particular
world access to expertise
which they could not normally diagnoses
was suggested.
afford

Disadvantages 6.13. Computers in the Retail Industry


They tend to lack common sense in some of the decision- Automatic Stock Control
making
processes

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Automatic stock control systems rely on the use of Cheaper goods (the company doesn’t have to pay
barcodes rent for
stores and doesn’t need more employees)
Barcodes now appear on most products sold in shops Wide range of products
They allow quick identification of product details once the Delivery at your doorstep
barcode
has been scanned by a barcode reader You can shop 24/7
Supermarkets use electronic point of sale (EPOS) Shop from any part of the world
terminals, which
incorporate a barcode reader that scans You save the travelling costs of going for shopping
the barcode, retrieve the
price of the article and relay Disadvantages
information back to the computer
system allowing it to Quality isn’t assured
update its files People are worried about giving their card details
Barcodes are made up of alternating dark and light lines online.
of varying
thickness Packing and postal charges are added
A number underneath the barcode usually consists of four Personal services that you get from stores are
parts:
country code, manufacturer’s code, product code, missed.
and a check digit Returning the products is harder
The check digit is a form of validation which is used to No relaxation that you get from actual shopping
make sure
no errors occurred during the reading of the Bogus sites are present where you pay and never
barcode receive the
product
Every time the barcode is read, this calculation is To seller:
performed to
ensure that it has been scanned correctly Advantages
No need to pay rents
  No fixed working hours
Less/no shoplifting
Electronic Funds Transfer at Point of Sale (EFTPOS) Sell goods to customers anywhere in the world
Cheaper to contact customers (via e-mail)
Many credit cards are equipped with a chip as well as a
Site warehouse where rental is cheap
magnetic
stripe – containing the PIN
Sell goods 24/7
This system is designed to enhance security since it is
Disadvantages
better than
relying only on a signature
ICT knowledge needed to set up website
When paying for items using a chip and PIN card, a form
Unemployment
of
electronic funds transfer (EFT) takes place
Business abroad is lost if the prices are cheaper
Paying for a meal example there
At times of network failures, there will be no
Waiter inserts card into chip and PIN reader access
Restaurant’s bank contact customer’s bank Not everybody can access the internet, so a few
Card is checked to if valid customers
are lost
If card is stolen or expired, then transaction is terminated Customer’s personal data can be hacked
Customer enters PIN using keypad Postal charges discourage people at times
PIN is read from chip on card and is compared to one just
keyed in 6.14. Recognition Systems
If they are the same, the transaction can proceed
Check is then made on whether they have enough funds Automatic Number Plate Recognition (ANPR) systems:
If there are not enough funds available, transaction is A sensor sends signals to a microprocessor, which
terminated.
Otherwise, transaction is authorized instructs a
camera to capture the front of a vehicle.
Authorization code is sent to restaurant OCR software is used to read the number plate from
Price of meal is deducted from customer’s account the image.
The characters are then converted to text
Same amount of money is credited to restaurant’s bank format in order to
store it in a database
account Processing of cheques:
Receipt is produced as proof of purchase The value of a cheque is printed in special ink
containing iron
particles when a cheque is presented.
 
MICR is used to read the characters at the bottom of
the cheque.
Internet Shopping
A batch processing method is then used to process all
Online shopping: Shopping over the internet. the
cheques at the end of a specific time period.
To customer: OMR media in schools:
Advantages School registers: Paper-based registers are fed into
OMR to
be scanned and are then stored on a
database.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Multiple-choice examination papers: The position of a to allow the manager/supervisor to join a call where
mark
is stored in a computer’s memory after being necessary
read by the OMR
device using a template that maps as a training tool
out the X-Y coordinates of
each lozenge (pen/pencil Uses of Automatic Number Plate Recognition (ANPR)
mark). systems:
RFID in passports: Traffic enforcement: the system can check if a vehicle
The data on the RFID chip is read when the passport is is
taxed, recognize cars parked illegally, cars speeding
scanned. or going
through red lights so a fine can be imposed.
A photo of you is clicked which is then compared with Car park management: the system reads the
the image
stored in the RFID chip. registration
number and if allowed into the car park,
If the face-recognition passes, some checks are made the barrier is raised.
in turn to
make sure you are eligible to enter the Electronic toll collection: the system recognizes the
country, and if you are,
the gate opens automatically. vehicle and deducts the fare accordingly.
RFID in contactless payments:
The embedded chip on credit/debit cards and the  
antenna enable
customers to wave their card over a
reader at the point of sale
terminals to make Cookies
payments
Cookies are small files sent to a user’s computer via their
Smartphone apps can also be used to make
web
browser when they visit certain websites
contactless payments.
They store information about the users and this data is
accessed
each time they visit the website
6.15. Monitoring & Tracking Systems For example:
They remember who the user is and send messages
Public monitoring/tracking: such as “Welcome
Sarah” each time they log onto the
Ankle monitor: uses RFID chip to give out the person’s website
location and other details. It is tamper proof and will They recognize the user’s buying preferences e.g. if a
alert
authorities if tried to remove. user buys
CDs, pop ups related to their buying habits
Phone call tracking: the service provider tracks the will appear on the
user’s screen each time they visit
calls
and the exact position from which they were the website
made Without cookies, web server would have no way of
Worker monitoring/tracking: Workers are knowing that the
user had visited website before
monitored/tracked in the
following ways: For this reason, cookies could be used to monitor one’s
Supermarket workers: have the number of items internet
activity
passing
through the tills over a period of time
monitored.
Internet use is monitored by network managers: they
6.16. Satellite Systems
can
check sites visited and time spent on that site
during working
hours. Global Positioning Systems (GPS)
Emails can be read: Employers can check that no
Used to determine the exact location of several modes of
personal
mails are sent during office hours.
transport
Delivery drivers: Their location can be tracked using
Cars usually refer to GPS as satellite navigation systems
GPS
systems. It can also be checked if they are
Satellites surrounding the Earth transmit signals to the
following the
shortest route and aren’t speeding.
surface
Key logging: Software that records the keys pressed by a
Computers installed in the mode of transport receive and
user on
the keyboard. They are used to find username
interpret
these signals
and passwords of a
user.
Knowing their position on the Earth depends on very
Employee call monitors: Allows the employer to listen to
accurate timing
– atomic clocks are used in the satellites
employee’s telephone calls. There are three ways it can
which are accurate to
within a fraction of a second per
be used:
day
Monitor: The manager/supervisor can listen to calls
Each satellite transmits data indicating its position & time
without
the employee or the customer’s awareness.
The computer on board the mode of transport calculates
Whisper: The manager can help the employee with the
its exact
position based on the information from at least
call,
but the customer can’t hear the manager speak.
three satellites
Barge: Both the employee and the customer can hear
the
manager  
Employee call monitors: Allows the employer to listen to
employee’s telephone calls. Call monitors can be used: Satellite Navigation
to improve the employee’s performance

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Used to determine the exact location of a car.


The computers onboard can be used to show
directions to a
destination.

Geographic Information Systems (GIS)

Used to capture, manage, analyse and display


geographically
referenced information.
Use to determine distance between two places.
Used to find the nearest petrol station or restaurant,
1. Collect data from the current system
etc.
2. Describe the current system in terms of the inputs,
To protect animal and plant life in certain vulnerable
outputs and processing taking place
places.
3. identify the problems with the current system
Can be used in geography, science or engineering
4. Finalize objectives with the clients to make sure the
lessons.
new system will meet their requirements
  5. Finalize customer requirements
6. interpret customer requirements and what needs to
Media Communication Systems be done to achieve them
7. Produce a cost-benefit analysis
Using satellite signals for communication. 8. Identify suitable hardware and software for the new
Used by media companies when sending system
stories/videos/pictures
from remote locations. 9. Produce a data flow diagram

7. ## 7.1. THEORY

System Life Cycle


Introduction 4 Common Methods of Fact Finding

A systems analysis team is often brought in to review an Observation


existing
system and suggest several improvements
Involves watching personnel using the existing system to
The existing system is usually a paper-based system that
find out
exactly how it works
needs to be changed to a computer operating one, or a
Advantages
computer-based system that needs to be updated with
the newest technology. The analyst obtains reliable data
It is possible to see exactly what us being done
It is a relatively inexpensive method
7.2. Stages in the System Life Cycle Disadvantages
People are generally uncomfortable being watched
1. Analysis
and may work in
a different way
2. Design If workers perform tasks that violate standard
3. Development and testing procedures, they
may not do this while being watched
4. Implementation
5. Documentation Interviews
6. Evaluation
Involves a one-to-one question-and-answer session
between the
analyst and the employee/customer
7.3. Analysis Advantages
It gives the opportunity to motivate the interviewee
The basic steps in the analysis stage can be summarized
into giving
open and honest answers to the analyst’s
as follows:
questions
It allows the analyst to probe for more feedback from
the
interviewee, as it is easier to extend a question

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

It is possible to modify questions as the interview Selecting the most appropriate data verification
proceeds and
ask questions specific to the interviewee methods
It is a good method if the analyst wants to probe Designing and agreeing the file structures and tables
deeply into
one specific aspect of the existing system Selecting and designing the hardware requirements
Disadvantages Selecting and designing the software requirements
It can be rather time consuming Producing algorithms or program flowcharts
It is relatively expensive, due to the use of the analyst’s Designing a testing strategy/plan
time
The interviewee cannot remain anonymous What to include in data input forms

Questionnaires Heading
to make clear the purpose of the form
Involves sending out questionnaires to the work force
Text boxes
and/or to
customers to find out views of the existing
clarity on where to enter information
system and find out how
some key tasks are carried out limits the information entered
Advantages
Tick boxes
The questions can be answered quite quickly
to give choices which customers can choose from (eg.
It is a relatively inexpensive method
Male or Female)
Individuals can remain anonymous if they want
Large fonts and visible text colours
It allows quick analysis of the data increases visibility in form so there are fewer chances
Disadvantages
of mistakes
Often the number of returned questionnaire is low
Drop-down menus
The questions are rather inflexible since they have to
On-screen help
be
generic
reduces chances of error in case customers are
There is no immediate way to clarify a vague or confused
incomplete
answer to a question
Automatic validation
Looking at Existing Paperwork checks if entered information meets the criteria and is
Allows the analyst to see how the paper files are kept, look at acceptable
operating instructions and training manuals, check the Control buttons
when reviewing the output screen display, it is vital to
accounts, etc.
check that instructions are clear, font sizes and text colour
Advantages is visible, the full screen is utilized and the size of output
It allows information to be obtained which was not fields are correct.
possible by
any of the other methods
The analyst can see for themselves how the paper Verification
system operates
It allows the analyst to get some idea of the scale of A way of preventing errors when data is copied from one
the
problem, memory size requirements, type of medium to
another
input/output devices
needed
Double entry: data is entered twice, by two different
Disadvantages
people
It can be very time consuming
The computer compares the two entries, either after
Because of the analyst’s time, it is a relatively
data entry
or during the data entry process, and
expensive
method
identifies any differences
Visual check: person entering the data compares the data
7.4. Design with the original document (not the same as proof-
reading)
Once the analysis has taken place and the systems
analyst has some idea of the scale of the problem and Validation
what needs to be done, the next stage is to design the key
parts of the recommended system. Process where data is checked to see if it satisfies certain
A list of tasks is summarized here criteria when input into a computer, for example, to see if the
Designing data capture forms/input forms data falls within accepted boundaries.
Designing screen layouts Validation
Designing output forms and reports How it works Example
rule
Producing systems flowcharts and/or pseudo code
checks if the entered
Selecting and designing validation rules that need to a person’s age should
Range check data is within an
be used be 0< but >150
acceptable range

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Validation least of the right type & that it conforms to certain rules.
How it works Example
rule Validation routines and verification methods are used to
crosscheck entered if ‘Senior Manager’ is ensure this happens
Lookup check data with data stored an existing option in a Again, routines have to be fully tested to ensure they trap
in an existing table query unwanted
data but also to make sure any data
transferred from a paper-based
system to an electronic
if a field needs 6
checks that the system has been done accurately
characters, then
entered data has a Any system being developed will have some form of user
Length check entering 7 characters
required number of interface
should give rise to an
characters The types of hardware were chosen in the design stage
error message
How these are used to interface with the final system now
a person’s name needs to
be identified, for example how the screens will
Character No invalid characters
should not contain any be used to collect
the data and the way the output will be
check can be entered
numbers presented
checks that entered If specialist hardware is needed (e.g. for people with
date should be in the
Format check data is in a specific disabilities), then it will be necessary to finalize how these
format dd/mm/yyyy
format devices are used with the system when it is implemented
in a data entry form, if This will be followed by thorough testing to ensure the
a person’s name is a user screens are user-friendly and that the correct output
to check if data is is associated with the inputs to the system
Presence required field and no
actually entered and
check data is entered, this
not missed out Testing strategies
should give an error
message
Testing strategies are done in modular form
an extra digit that is the system is broken up into parts (modules) and each
added at the end of a a digit is missed out or part is developed and tested separately
Check digit number. it is an incorrect digit is any problems in the testing mean that only the module
calculated from the entered will need to be modified and tested again
digits in the number Once the development of each module is completed, the
if ‘Mr’ is typed out into whole system
needs to be tested (i.e. all modules
checks if fields
Consistency a field then the functioning together)
correspond (tie up)
check GENDER field must be Even though each individual module may work
with each other
M or Male satisfactorily, when
they are all put together there may be
data clashes, incompatibility
and memory issues
All of this may lead to a need to improve the input and
7.5. Development & Testing
output
methods, file and database structures, validation
Once the design stage is completed, it is then necessary and verification
methods
to create
the system and fully test it Then the system will need to be fully tested again
It is a very time-consuming process but the system must
The testing strategy has to make sure that the new
be as
perfect as possible before it goes live
system meets client requirements, has solved the
Testing will use many different types of data, which will
identified problem from the old system, removes any
bugs or potential errors in the system and produces the fall into
one of three categories: normal, extreme or
correct output abnormal
this is done in the following stages
Test data used 
Development stages
Normal: this is data which is acceptable and has an
If the system contains files (e.g. a database) then the file expected (known) outcome. This data should be
structure needs to be finalized at this stage (e.g. what accepted by the system
e.g. the month can be any whole number in the
type of
data is being stored in each field, length of each
range 1 to 12
field, which
field will be the key field, how the data files will
Extreme: data entered is at the limits of acceptability
be linked,
etc.)
and should be accepted by the system.
Once the file structure has been determined, it is then
created and
fully tested to make sure it is robust when the extreme data would be the months 1 or 12
system actually goes
live Abnormal: unacceptable data is entered and should
be rejected or cause an error message
Since it is important that correct data is stored in files,
e.g. all the following values are not allowed as
there are certain techniques that need to be adopted to
make sure the data populating the file and database is at inputs for the month:

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Negative numbers (e.g. -1, -15) Pilot Implementation


Any value greater than 12 (e.g. 32, 45)
Letters or other non-numeric data (e.g. July) The new system is introduced into one part of the
Non-integer values (e.g. 3.5, 10.75) company (e.g. into
a warehouse of a supermarket) and its
Live: data with known outcomes whose results are performance assessed
compared with the existing system Advantages
e.g. ‘13’ is entered and should be rejected for the If the new system fails, only one part of the company is
month field but is accepted in the current system. affected
This proves that validation rules need to be It is possible to train staff in one area only, which is
improved. much
faster and less costly than parallel running
The costs are also less than parallel running, since
only one
part of the system is being used in the pilot
7.6. Implementation Disadvantage
It is more expensive than direct changeover, since
Once the system is fully tested, the next stage is to fully
each pilot
scheme needs to be evaluated before the
implement it
next stage is introduced
We will now consider changeover to the new system in
more depth Phased Implementation
There are four common methods used for changing over
from the old
system to the new system Initially, only part of the new system is introduced
Each one has advantages and disadvantages which need Only when it proves to work satisfactorily is the next part
to be weighed
up before the most appropriate method is introduced, and so on, until old system is fully replaced
chosen for a particular
application Advantages
If the latest part fails, it is only necessary to go back in
the
system to the point of failure, hence failure is not
disastrous
It is possible to ensure the system works properly
before
expanding
Disadvantages
This is more expensive than direct changeover, since
it is
necessary to evaluate each phase before moving
to the next stage
4 Common Methods of Changing Systems  

Direct
Comparing Changeover Methods
The old system is stopped overnight and the new system
introduced
immediately Changeover method Direct Parallel Pilot Phased
Advantages Relative costs Low High Medium Medium
The benefits are immediate Input needed by the user Medium High Low Medium
Costs are reduced - since only one system is used Input needed by systems
there is no
need to pay for two sets of staff Low* Low Medium Medium
team
There is less likelihood of a malfunction since the new
Impact of failure High Low Low Medium
system
will have been fully tested
Disadvantage
This method can be disastrous if the new system fails 7.7. Documentation
Parallel Running Once the new system is fully developed, a considerable
amount of
documentation needs to be produced
The old and new systems are run side by side for a time
before the
new system takes over altogether For the end user :
Advantages
If the new system fails, the old system is still available User documentation
as a
back-up for the end user/customer to learn how to use the system
It is possible to train staff gradually includes:
Staff have time to get used to the new system
how to save files
Disadvantage
how to load/open the software
It is more expensive than direct changeover, since
how to perform a search
extra staff
are needed to run both systems together
how to add,delete or modify records

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

purpose of the system compare test results from the new system with results
screen layouts from the
old system
print layouts compare the performance of the new system with the
hardware and software requirements performance
of the old system
error handling observe users performing set tasks, comparing old
troubleshooting guide with new
tutorials measure the time taken to complete tasks, comparing
how to log in/log out old with new
glossary of terms interview users to gather responses about how well
the new
system works
give out questionnaires to gather responses about the
For programmers
ease of
use of the new system
Technical documentation

for programmers or system analysts to get an overall view of Some results from the evaluation may require changes to
the system either
hardware or software.
includes: Hardware may need to be updated because of:
feedback from end users
program listing/coding new technology in the market
programming language changes within the company
hardware and software requirements Software may need to be updated because of:
system flowcharts feedback from the end users
program flowcharts changes in legislation and rules
memory requirements changes within the company
file structures
sample runs
validation rules 8. ## 8.1. THEORY
Information common to user documentation and technical
documentation Safety & Security
purpose of the system
limitations of the system Physical Safety
hardware and software requirements
sample runs Ways of eliminating or minimizing
Safety hazard
meaning of error messages hazard
Use a residual circuit breaker
7.8. Evaluation Electrocution from
(RCB), Check insulation on wires
regularly, Do not allow drinks near
spilling drinks
Once a system is up and running it is necessary to do computers, Check equipment
some
evaluation and carry out any maintenance, if regularly
necessary. Cable ducts- make wires safe,
this is done to compare the new system with the old Tripping over trailing
Cover wires/tuck them away, Use
system and make sure there are no limitations or
wires
wireless connections
improvements to be made and that the new system works Strong desk/tables to support
better than the old system. heavy hardware, Use large desks
The following is a list of some of the things considered Heavy equipment falling
and tables so that hardware
when
evaluating how well the new system has worked.
doesn’t fall off edge
This can ultimately
lead back to a re-design of part of the
Have a CO2 fire extinguisher
system if there is strong
evidence to suggest that changes
nearby, Don’t cover equipment
need be made. Fire risk from
vents- can cause equipment to
To evaluate the system, the analyst will: overloading sockets or
compare the final solution with the original
overheat, Make sure hardware is
equipment overheating
requirement fully maintained, Do not overload
sockets with too many items
identify any limitations in the system
identify any necessary improvements that need to be
made Health Safety
evaluate the user’s responses to using the new system

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Ways of eliminating or minimizing If personal data is leaked (data breach), the following can
Health hazard
hazard occur:
Back and neck Identity theft
-use adjustable chairs for sitting Bank fraud
problemsfrom \n sitting
with correct posture \n -use Damages to personal property
in front of the computer
footrests \n -use screens that can Kidnapping (if kidnappers get access to the victim’s
screen for \n long
be tilted according to user’s choice address.
periods of time
Etc.
-ensure correct posture is

Repetitive Strain Injury


maintained \n -take regular breaks To prevent the above, it is essential that personal data is
(RSI) is damage \n to
\n -use ergonomic keyboards \n - protected.
fingers and wrist
use voice-activated software if Personal data can be leaked intentionally and
because of \n repetitive
user is unable to use the keyboard unintentionally.
Electronic data is at risk due to: hacking,
clicking of keyboard
\n -use a wrist rest viruses, spyware,
phishing, pharming, Smishing, vishing,
-use anti-glare screens \n -use ransomware (A malicious
program that encrypts data on
Eyestrainbecause of LCD screens as they are better a computer system and demands for a
ransom to provide
staring at a \n computer than CRT screens \n -ensure there and decrypt the data), spam, moderated and
un-
screen for extended \n is no screen flicker \n -have eyes moderated forums, cookies, etc.
periods of time tested regularly \n -take regular If a student shares a photograph of themselves in their
breaks school
uniform on social media, then paedophiles, child
Headachescaused by predators,
kidnappers, etc. can physically reach the
-use anti-glare screens \n -use
incorrect \n lighting, student. This should not
be done
window blinds to remove any
screen reflections and \n
reflections of sun’s rays \n -take  
staring at the computer
regular breaks \n -have eyes
for long \n periods of
tested regularly Internet Safety
time
-proper ventilation in the room To keep personal data safe, one must:
Ozone irritationcaused where laser printer is present \n - Not give unknown people (on the internet) personal
by laser \n printers in the laser printers should be in a information
or send pictures of oneself to them.
office separate room \n -change to other Maintain privacy settings to control which cookies are
types of printer if possible on their
computer
Use learner friendly search engines and websites
8.2. E-Safety recommended by
your educational institution, e.g.
znotes.org
E-safety refers to the safety of data and personal The website being accessed is from a trusted source,
information while
using the internet. or has a
padlock symbol/ https protocol (s for secure):
E-safety is required to make sure a user’s personal
information is
not made vulnerable and even leaked to
hacker’s for e.g., which can
lead to identity fraud, bank A/C
issues, etc.

Personal Data

Any data regarding a living person who can be identified


against the
data or the data along with any other
information.
Examples of personal data:  
Full Name
Home Address Email Safety
Banking details (A/C no, pin, etc.)
Medical history (suffered from depression, etc.) Open emails from known sources, and do not click on
Personal data like ethnic origin, political views, emails with hyperlinks without confirming with the sender
criminal
activity, mental health history, of the email. Think before opening an email from an
Sexual orientation and religion can be used to unknown person, never send any other sensitive
blackmail victims
of data breaches

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

information (picture in school uniform, credit card PIN, Prevention:


etc.) Use strong passwords and don’t share these
Ask their ISP to eanble email filtering to classfy spam passwords with anyone
mails as
spam. Use firewalls
Only email people you know Use intrusion detection software
Unsubscribe from any suspicious mailing lists Encryption (this wont stop hacking, it will just make the
data unreadable to the hacker. however, they can still
  delete, corrupt or alter the data)

Social Media Safety


Phishing
Blcok and report users who seem suspicous or use
inappropriate
language Phishing is a fraudulent operation involving the use of
Never use your real name, only use a nickname emails
Use appropriate language The creator sends out a legitimate looking email hoping to
Do not enter private chat rooms, as users can lure you gather
personal and financial information from the
into giving
personal inforamtion by seeming too nice. recipient of the email
Do not meet anyone off the internet for the first time on The message appears to be from a legitimate source (e.g.
your own,
or atleast speak to a trusted adult first. a famous
bank)
Do not misuse images (of someone to blackmail them, for When the user clicks on the link, they are sent to a fake
e.g.) website that looks exactly like the real one
Respect the confidentiality of other users They will be asked for personal info e.g. credit card
Never arrange to meet anyone you met online in person details, PINs
This could lead to identity theft
 
ISPs attempt to filter out phishing emails
this can lead to theft of financial data, identity theft and
Online Games fraud
Smishing is similar to phishing but instead of emails, SMS
Similar measures apply to that taken when using social
messages are sent to the recipient, encouraging them to
media.
click on an unknown link and give their personal
Additionally, players should be careful about:
information
In-game violence
Vishing is voice mail phishing. this method uses voice mail
Cyberbullying
message to trick the user into calling the telephone
Keeping their webcams off (other potentially
number mentioned in the message
dangerous players
have direct access to your image)
Predators may use voice masking technology to lure a Prevention
user to
reveal their age, sex etc.
Cyber-attacks involving viruses, ransomware, etc. Always be cautious of opening emails from unknown
sources
Don’t click on attachments that end in .exe, .bat, .com or
Security of Data online .php

8.3. Risks involved with electronic Pharming

devices Pharming is a scam in which malicious code is installed on


a
computer hard disk or a server
Hacking This code can misdirect users to fraudulent websites
without their
knowledge
This is the act of gaining unauthorised access to a Phishing requires an email to be sent to every person who
computer system. has been
targeted, while pharming does not require
It can lead to corruption or loss of data or a data breach emails to be sent out to
anyone
it can lead to identity theft as hackers can collect personal Pharming can target a larger group of people more easily
data and use it to impersonate the user, spreading How pharming works:
rumours about them and damaging their reputation A hacker will infect the computer with a virus, either by
Some prove that a system is vulnerable - maybe sending an email or installing software on their
employed to test
(ethical hacking) computer when
they first visit their website
Some want to steal data Once infected, the virus sends the user to a fake
Alter or destroy data website that looks identical to the one they wanted to
For fun or a challenge visit

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Personal info. from the user’s computer can be picked Preventing Phishing, Pharming & Smishing
up by the
pharmer/hacker
Anti-spyware, anti-virus software or anti-pharming User education
software can
be used to identify this code and correct Set up anti-malware and anti-spyware software
the corruption Enabling protocols such as SPF and DKIM
Do not download random .exe (executable file formats),
Prevention .php, .bat,
.com etc.
Users should be alert when being redirected to other
Use anti-spyware software that can remove any malicious websites.
code If a person on the internet is asking for personal
User should be alert for any signs that their computer has information, or
to meet in real life or acting suspicious,
been hacked into or they’re being redirected to a they should be reported
to cyber security agencies, or
fraudulent website one’s parents/guardians.
Websites/pop-ups can be made to mimic legitimate ones,
Spyware and key-logging software or seem too
good to be true, for e.g.lotrei.net instead of
lottery.com
This is software which gathers data based on the key
presses or clicks made on the keyboard; the gathered
data is sent back to the person who put the software on a
computer system
It can give the hacker access to data entered by the user
which can include passwords or bank account details
The software is able to install other spyware, read cookie
data and also change the user’s default browser

Prevention

Use anti-spyware software


Users should be alert for any suspicious activity on their Banks and organisations will never ask for a PIN to be
computer entered on a website like this.
When entering a password, it is advisable to use a
pointing device to select characters from a drop-down Moderated & Unmoderated Forums
menu to avoid typing using the keyboard
Online forums are places on the internet where people can
Viruses join
discussions on almost any topic and also add their views.

There are two types of forums:


This is program code that replicates or copies itself when
installed onto a computer
Moderated Forums Unmoderated Forums
Is used to delete or corrupt files on a computer or cause a
Has a moderator who checks
computer to malfunction No moderator who checks the
comments before they are
Can cause the computer to become unresponsive comments
posted
Prevention There will be no spams or Spams, rude and offensive
rude and offensive comments comments present
Use anti-spyware software
Diversions from topic are
Don’t download software from unknown websites No diversions from the topic
possible
It is advisable to not open emails or messages from
unknown senders Highly secure due to Personal information can be
moderation obtained from you
Spam Not secure due to lack of
moderation
Spam is electronic junk mail and is a type of advertising
from a company sent out to a target mailing list
Harmless but can clog up networks and slow them down
It is more of a nuisance than a security risk Security of data online
Many ISPs are good at filtering out spam, and prevent the
user from getting these spam emails. Encryption
It is often necessary to put a legitimate email address into
a contact list to ensure wanted emails are not filtered out The conversion of data to code by encoding it
by mistake Done by using encryption software

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Since data is encoded, it appears meaningless to a hacker User privilege allows access to their own work area only
This technique prevents illegal access
Necessary to use decryption software to decode the data Passwords
Used to protect sensitive data e.g. banking details
Encryption keys are complex algorithms which makes After typing in User ID, the user will be requested to type
codes almost
unbreakable in their password.
Passwords are shown as starts (***) so nobody
Secure Socket Layer (SSL) overlooking can see it
To help protect the system, the user has a certain number
Type of protocol that allows data to be sent and received of attempts allowed before they will be locked out of the
securely over the internet system
When a user logs into a website, SSL encrypts the data If password is forgotten, the administrator must reset it
https or padlock symbol in the status bar If password is forgotten on a website, it will be sent on
When a user wants to access a secure website: your e-mail
User’s web browser sends a message so it can
connect with the required website which is secured
with SSL Cloud Storage
Web browser requests that the web server identifies
itself Your data is stored remotely and not on your computer,
Web server responds by sending a copy of its SSL so you don’t
have control over the physical security of
certificate your data.
Web browser checks if the certificate is authentic Some of the data stored may be personal data which are
Sends signal back to the web browser open to
hackers, and have to be encrypted in order to
prevent hackers from
obtaining them.
Starts to transmit data once connection is established
If not secure, browser will display an open padlock The company providing the storage may go out of
business. In this
case what has to be done to the data will
Firewalls have to be considered.
The company providing the storage will have to put in all
A firewall sits between the user’s computer and an its
efforts and safety measures in order to keep your data
external network (internet) and filter information in and safe.
out of the computer If the company providing the storage doesn’t backup your
Tasks carried out by firewall: data, you
may lose it in case of power cuts or fires, etc.
Examining ‘traffic’
Checking weather incoming or outgoing data meets Biometric data
criteria
If data fails the criteria, the firewall blocks ‘traffic’ Uses features of the human body unique to every
Firewall can keep a list of all undesirable IP addresses individual, such as fingerprints, retina, iris, face and voice
Helping to prevent viruses or hackers entering the recognition. It is used in authentication techniques as it is
user’s computer very difficult to replicate
Advantages:
Features of a secure webpage: Usernames or passwords don’t have to be
remembered
Webpage URL: if the webpage is secure, it will start with Almost impossible to replicate body parts
‘https’ instead of ‘http’ No one else can gain access, like with a stolen card
padlock symbol They cant be forgotten anywhere as it is part of the
body
Disadvantages:
Authentication The readers are expensive
Damages in fingerprints can deny access
-Used to verify that data comes from a trusted source
Some people worry about the privacy issues with their
-Works with encryption to strengthen internet security
personal information being stored
User IDs
Digital certificate
To log on to a network, a user must type in a user iD
User ID assigns user privilege once user logs in A digital certificate is an electronic passport used in the
The top-level privilege for a network is an administrator: security of data sent over the internet
able to set passwords and delete files from the server They can be attached with mails so that the receiver can
etc.
know that the mail is sent from a trust source

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

The threats of using credit cards online and prevention: Authentication


Advantages Disadvantages
Method
Key logging/spywares: records the keys pressed on a
keyboard. Very intrusive, Lot of
Very high accuracy,
Can be used to obtain credit card details, passwords memory needed for
Verification time is
and personal information. Iris recognition storage, very
usually less than 5
Use virtual keyboards to type in password. expensive to install
seconds
Install anti-spyware software. and set up
Bogus sites: sites that look exactly like the original sites, Affected by changes
Non-intrusive,
but aren’t. Face in lighting, person’s
Relatively
They can steal your card details and personal recognition hairstyle, age and
inexpensive
information when you make purchases. spectacles
Always type in URLs, sometimes links in the mails can
be of bogus sites.
Phishing, pharming and Smishing: 9. ## 9.1. THEORY
They trick you to reveal card and personal details as
responses to messages or mails.
Open attachments only from trusted sources. Audience
Install anti-spyware software.
Hacking into secure sites to obtain the details: Audience Appreciation
Encrypting the details will make it of no use to the
hacker.
Knowing Your Audience
Use strong passwords.
Use firewalls. When designing ICT solutions, you must consider
Tapping into wireless networks: audience
Always use a password-controlled Wi-Fi since it is There are 4 main characteristics of an audience
relatively hard to tap into a secured Wi-Fi. Age:
Can affect audience’s interests in your product
*ALL PREVENTION TECHNIQUES WRITTEN HERE ALSO APPLY
Large fonts and colours attract children
FOR THE THREATS IN GENERAL (NOT SPECIFIC TO CREDIT
More stylish and trendy layout attracts young adults
CARDS) *
Gender
Design product for a specific gender
Methods of Internet Security
Younger girls are often attracted to pink
Authentication Males generally prefer blue spectrum
Advantages Disadvantages Income
Method
Knowing this will help in attractive pricing strategies
Inexpensive, as
Can be easily hacked, Promoting certain products are targeted for people
Passwords nothing other than a
can be forgotten within a
specific range of incomes
computer is required
Interests
Highly recognized Can help with advertising content
everywhere, very Content that meets the exact description of audience’s
Fingerprint Intrusive, Damages
high accuracy, Easy interest
is more likely to attract them to your product
scans will prevent access
to use, Relatively low
storage requirement  
Non-intrusive, very Problems occur if
Signature little time to identify, sign is not consistent, Audience Needs
recognition Relatively low High error rate (one
After finding out about your targeted audience you need
expensive in 50)
to aim to
meet those demands
Very intrusive, Developers of the ICT product must ensure that they meet
Very high accuracy,
relatively slow to as many of
these needs as possible
no known way to
Retina scans verify retina scans, Common Needs for Common Audiences:
replicate a person’s
very expensive to
retina
install and set up Audience Needs
Young children Bright/cheerful colours
Animations/sounds/pictures
Less text
Simple wording

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Audience Needs It is not legal to make a copy of software, then sell it or


Large text give it
away to other people
Software cannot be used on a network unless a network
Games/activities
license has
been acquired
Easy to use Not legal to use coding from software in your own
Attractive/stylish colours software without
permission
Interesting content Renting out software without permission is illegal
Teens & adults Balance of pictures and text It is illegal to use the name of copyrighted software
without
permission
Clear fonts
Bullet points  
Contrasting/easy-to-read colours
Include clear instructions
Software Protection
Use slightly larger font sizes Installed software will require a unique reference number
Seniors
Fewer technical terms User will have to accept license agreement
Consistent design Holograms are used to indicate software is original
Easy to use Software may only run if CD-ROM or DVD-ROM is actually
in the drive
  Some software will only run if a memory stick is plugged
in USB
ports
Potential Problems  

If products are not built towards a specific audience well


Creating ICT Solutions
then
problems may arise
An older audience may not be able to understand or read ICT solutions, for e.g. a website should be made in
text due to
poor font design
accordance to
the legal, moral, ethical and cultural beliefs
A younger audience may not be able to understand
of the target
audience.
certain text due to
complex wording & structure
Several audiences may just not find content interesting  
since it is
not relevant enough to them
Several audiences may not find content attractive enough Implications of ICT Solutions
and thus
not purchase or use it at all
Younger & older audience may not understand how to use When creating an ICT solution, all the following have to be
the product
due to lack of simple instruction considered and the solution must be made in response
and respect to
these factors:
Legal: Ensure copyright laws are abided by including
9.2. Legal, Moral, Ethical & Cultural
not using
any coding or branding from existing
Appreciation copyrighted software.
Morality: To distinguish from right or wrong.
Copyright Legislation Sometimes it
may not be illegal to carry out an act
however it could be
against your morals. For example,
A law that protects books, music art and other media that setting up a fake website to
deceive is not illegal but
are
written is copyright law questions your level of morality.
It is an automatic right and does not need applying for Ethics: Is to break a code of conduct. For example,
The person who owns the rights must be asked before disclosure of information about the new software to a
it can be
used again rival
software publisher or to the press.
Software is a specific thing created and written on a Culture: When software is released in different
computer cultures
then care must be taken so that people are
Needs to be protected as it is so easy for people to not offended. If
certain computer games mock religion
copy or cultural beliefs, then
again this could cause offence.
This is a way of protecting software from being used
without
permission
Users create a license which determines the terms 10. ## 10.1. THEORY
and conditions

  Communication
Copyright Laws

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Email services require a user ID to authenticate users


Email
Passwords should contain alphabets, numbers and
special characters
(#, *).
National Laws
Email Groups
Easier to send out multiple mails by grouping them under
In some countries, emails are monitored or read, thus
one name.
limiting the
topics on which you can speak.
Companies and organization can group people according
  to their
target group for marketing purposes.
Spammers can create email groups by buying addresses
Acceptable Language of people from
a certain company and send in easier
ways.
Language used in emails must lie within an acceptable Companies use email groups to set up meetings. Typing
code of
practice. The following is a list of unacceptable out individual
addresses may leave out a few mail IDs.
content that are
beyond the code of practice:
Obscene images
10.2. Internet Fundamentals
Abusive language
Racist, exploitative and violent messages *INTERNET AND INTRANET EXPLAINED IN CHAPTER 4*
Use of illegal materials in messages
The world wide web (WWW) is a system of interlinked
 
hypertext
documents accessed via the Internet
Protocols are a set of rules that are followed between the
Copyright sender
and recipient of data which is being transferred
between devices.
Copyright laws apply to text in emails. Forwarding a block
HyperText Transfer Protocol (HTTP):
A protocol that is
of text
or an image without the copyright owner’s
followed between the sending and receiving
devices when
permission, it would be
illegal.
data is being transferred using the internet.
  HyperText Transfer Protocol secure variant
(HTTPS):
HTTP that is followed when data being transferred is
Employer Guidelines encrypted.**
Hyperlink: Data that redirects
the user to another
If the rules in the ‘contract of employment’ set out by the webpage/section of same webpage/file when
clicked.
employer
is not obeyed, you would be in breach of your File Transfer Protocol(FTP): Used
to upload website files to
contract and could be
dismissed. the web hosting space. To upload these
files successfully,
the user needs:
  An FTP client
Login details to the web hosting server (host and port
Security used,
username and password for FTP.

Emails containing personal information should be  


encrypted to
prevent hackers from understanding the
information if they manage to
hack into the email. Cloud storage:
  The storage of data (remotely) on the internet.
This data is accessible by the user with the requirement of
Netiquette an
appropriate authentication technique (e.g. user ID and
password).
Some of the rules that the netiquette contains is:
Don’t be abusive  
Don’t send spam
Be precise Search Engine:
Check spelling and grammatical errors
Ensure attachments are not too large A search Engine is used to find information on the internet
Don’t use CAPITAL LETTERS to highlight comments without
knowing the (Uniform Resource Locator) of the
Don’t plagiarize webpage holding the
information.
Don’t use too many emoticons
 
 
Blog
User ID and Password Protection

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Personal internet journals where the writer posts their


observations
on a topic 11. ## 11.1. PRACTICALS
No training is needed to do this
Blogs range from minor projects (e.g. people gossiping
about a
topic) to important subjects such as politics or File Management
advertising
products
Comments are not immune from the law Manage Files Effectively
Bloggers can be prosecuted for offensive comments

  Extension
Full form Used for/in:
name
Wiki Stylesheets in
css Cascading Stylesheet
webpages
Software allowing users to easily create and edit web Comma Separated
pages without
using any web browser csv Store tabular data
Value
A wiki will support hyperlinks and has a very simple syntax
Graphics Interchange
(language rules) for creating pages gif Moving images
Format
Wikis are described as ‘web pages with an edit button’
Anyone can use wikis- content should be treated with
Hypertext Mark-up
htm Webpages
caution (Language)
Example of a wiki: Wikipedia Joint Photographic
jpg Standard for images
Experts Group
 
Documents to be
Portable Document
pdf circulated over the
Social Networking Format
internet/email

These sites focus on building online communities of users Portable Network


png Compressed images
who share
the same interests Graphic
Enable people to share photos of themselves, their Word processed
rtf Rich Text Format
favourite music
and videos, what they like to do, what they documents
like to eat etc. txt Text (File) Simple Text files
Example: Facebook Zone Improvement Sending many files
These are becoming the modern way of interacting zip
Plan over the internet/email
socially
They allow people to communicate across the world and
Generic file formats can be opened by any software to
share their
interests and views with many people.
access the
data held in them.

10.3. Information on the Internet 11.2. Reduce File Sizes for Storage or
Information is more likely to be up to date than in books, Transmission
since
websites can be updated very quickly
Much easier to get information from websites- search Files that are smaller in size upload and download faster
engines link
key words together and find information that than
larger ones and thus are better for transferring data.
matches the criteria-
cause for popularity
Vast amount of information on the internet- easier to
locate than
using indices in books 12. ## 12.1. PRACTICALS
Information on the internet however may be relevant or
correct, not
reliable, inaccurate or even biased- it does
not go through any
checking process
Images
Information overload can make it difficult for the user to
find
relevant information An image should be edited when doing so will enhance its
Ensure use of reliable websites that properly cite all their usefulness.
sources test
Always look for primary sources of information & form
own
conclusions
Do not quote/use secondary often biased opinions or
13. ## 13.1. PRACTICALS
gossip
Do your research
Layout

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Headers and footers ensure each page has all the Orphan: A paragraph-opening line that appears by itself
required
information like the page numbers, logos, titles, at the
bottom of a page or column, thus separated from
etc. the rest of the
text.
A common mnemonic is "An orphan has no past; a widow Page, section and column breaks are used to ensure that
has no
future" widows and
orphans are not present in a document (these
show poor typography).
A mail merge document is created in order to create a
14. ## 14.1. PRACTICALS standard
template and then use it to send documents
personalised (by the
computer system) for the respective
recipient of the document
Styles
Several organisations use a ‘corporate house style or 17. ## 17.1. PRACTICALS
corporate
branding, which is used to print on websites,
visiting cards,
letters, etc. It refers to a specific style of
fonts and formats
used in the making of ICT solutions by Data Manipulation
organisations.
A corporate house style when used effectively identifies
Create a Database Structure
the users
of the style.
Consistent styles enable users to associate a particular
Flat file databases are tables that have data sorted in
organisation with a style and also show consistency in the rows and
columns, whereas relational databases are
ICT
solutions created by the organisation
several tables grouped
together to from a link, thus
preventing unnecessary repetition of
data.
15. ## 15.1. PRACTICALS Primary key: The key field of a table which is unique and
identifies
each record
Foreign key: The field linked to the primary field of the
Proofing table
linked to through a relationship

Relational database Flat-file database


Software Tools Complex queries can be
Poor at complex queries
carried out
When a person’s/organisation’s name is entered or Better security Poor at limiting access
sometimes newly
coined terms are used, spell checkers
Harder to update, so
might pick these up as errors,
because they are not found Cater for future requirements
inherently inefficient
in the dictionary. This makes spell
checkers less efficient.
Validation ensures that the data being entered into an ICT Data is only stored once Potential duplication
solution
is reasonable and makes sense. Entered data is Require more planning Easy to design
checked against set
criteria to be validated. Non-unique records
Harder to change data
15.2. Proofing Techniques format.

Verification: checking of data when copied from one At times placeholders for media such as images, sound
medium to
another to prevent errors. bites and
video clips are used to enhance the usability of a
Verification is also important and is a way of preventing a database
difference in data when it’s being transferred from one
system to
another. This tries to make sure data entered is
17.2. Test the Data Model
correct, relative
to the source.
A model prepared needs to be tested before being used
16. ## 16.1. PRACTICALS to ensure that
all results computed are accurate. The test
plan must be justified
to be apt for the model. E.g. all the
mathematical operations must
be tested in a model that
Document Production relies on calculations.
Definitions:
Testing: Checking if the designed model delivers the
Widow: A paragraph-ending line that falls at the beginning
expected
outcome when tested with data.
of the
following page or column, thus separated from the
Test data: The input data used for testing model.
rest of the
text.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Expected outcome: The output a model is supposed to Nested formulae/function: A formula/function used
give with
the test data. inside a
formula/function as an argument
Actual outcome: The output a model actually gives the
user when
the test data is input.
18.2. Test the Data Model

18. ## 18.1. PRACTICALS A model prepared needs to be tested before being used
to ensure that
all results computed are accurate. The test
plan must be justified
to be apt for the model. E.g. all the
Data Analysis mathematical operations must
be tested in a model that
relies on calculations.
Definitions:
Create a Data Model Testing: Checking if the designed model delivers the
expected
outcome when tested with data.
Charts: A graphical representation of (usually tabulated) Test data: The input data used for testing model.
data Expected outcome: The output a model is supposed to
Accurate data ensures the results obtained by the give with
the test data.
processing of data
is relevant, which is essential to the Actual outcome: The output a model actually gives the
usability of the model user when
the test data is input.
Formulae are mathematical operators defined by the user
to perform a
function, whereas functions are predefined
logical and mathematical
operations a user can use in a 19. ## 19.1. PRACTICALS
spreadsheet
Mathematical operations are performed in the order
PEMDAS
(Parenthesis [Brackets] Exponents Multiplication Website Authoring
Division Addition
Subtraction). Brackets are used to
notate data used by a function,
e.g. =SUM (A2:A10). Web Development Layers
Relative cell referencing is made when the cell reference
is
supposed to change when the cell it is referred to in is Content/Structure layer: Holds the content of the
changing.
It aids more efficient designing of models. webpage structure.
Absolute cell
referencing is made when the cell Presentation layer: The layer responsible for the
referenced stays constant when the
cell it is referred to in formatting of a
webpage(s) or elements (using a
is changing. This aids the preparation of
a model when a stylesheet).
set of data is constantly being referred to
throughout the Behaviour layer: scripting language of a web page or an
model. Cell reference or relative cell reference
describes individual
element
how far away a cell or group of cells is from some other
cell in the same spreadsheet. Basically, the cell’s address
A model prepared needs to be tested before being used
19.2. Create a Webpage
to ensure that
all results computed are accurate.
Tables make the basic structure of a webpage and
Definitions:
organise page
layout.
Cells: A space for data to be entered a table; a box
Anchor: An element in a webpage that creates a hyperlink
formed by
the intersection of columns and rows
between a
source anchor and a destination anchor. These
Rows: Horizontal boxes that divide the table in
can be used to link 2
resources together.
segments
Relative file paths are used for attached stylesheets as
Columns: Vertical boxes that divide the table in
the
stylesheet is going to be stored on a server in the
segments
same directory
as the webpage, and not where it an
Sheets: A table of data
absolute file path says.
Tabs: A module of a database program that holds the
Definitions:
tables on
the computer,
Relative file path: A path referring to a file in the same
Pages: Full pieces of papers that contain information
directory relative to the page the reference is made in.
held on
one sheet of paper.
Absolute file path: The full path of a file, which is not
Ranges: A group of cells in a table
relative to anything, whereas relative links only point
Named cell: A cell in a table that is given a name (like
to a
file or a file path, the browser then redirects the
‘profit
margin’) and can be referred to using that
user to
that location on the current site.
name.
Absolute paths always include the domain name of
Named range A group of cells in a table that are given
the
website
a name
(like ‘Pricing’) and can be referred to using that
These should not be used to refer to locally saved
name.
webpages as the computer the webpage is stored

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

on (the
server) is not the same as where the To upload and publish content on a website using FTP, a
webpage was developed
and thus an absolute file user must
have:
path would point to the wrong
address. FTP client software
All files in one folder
19.3. Use stylesheets Host Name/URL/IP address for FTP
Host port to be used for upload
CSS (cascading stylesheet) is a text-based language which Username and password
is
attached to webpages to set their format. CSS files have The test plan used to test a webpage must be justified
a “.css”
extension based on the elements being tested. E.g. If hyperlinks are
These should be attached using relative file paths as they being tested, it makes to check if all the hyperlinks are
are
stored along with the webpage and thus can be linked redirecting the user to the correct webpage/ section of
relative to
them. the webpage.
Internal CSS have more preference over Inline CSS
If several external stylesheets are attached to one web
page,
the stylesheet attached last (at the bottom of that
20.
part of the
code) is given preference over the other
attached ones).

19.4. Test and Publish a Website

WWW.ZNOTES.ORG
CAIE IGCSE
ICT (0417)

Copyright 2023 by ZNotes


These notes have been created by Aliza Mirza for the 2023-2025 syllabus
This website and its content is copyright of ZNotes Foundation - © ZNotes Foundation 2023. All rights reserved.
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website without the express, written
permission of the copyright owner. Under no conditions may this document be distributed under the name of
false author(s) or sold for financial gain; the document is solely meant for educational purposes and it is to remain
a property available to all at no cost. It is current freely available from the website www.znotes.org
This work is licensed under a Creative Commons Attribution-NonCommerical-ShareAlike 4.0 International License.

You might also like