Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

ICT Notes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

ZNOTES.

ORG

UPDATED TO 2023 - 2025 SYLLABUS

CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE ICT

3. Device drivers: A software that enables the


device to work with another, externally
1. ## 1.1. THEORY connected device.
4. Utilities: A system software that provides the
necessary facilities, (Antivirus, Scan Disk, Disk
Types and Components of Defragmentation etc.)
5. Operating systems: enable computer systems
Computer Systems to function and allow users to communicate
with computer systems, special software,
Hardware & Software known as operating systems (OS), have been
developed.
Hardware
Analogue and digital data
the electronic physical components that make up a typical
computer system. These may include input and output
Computers can only understand data in the form of binary
devices as well.
digits (0,1), this is commonly known as digital data. However,
Internal Hardware Devices:
data in the real world is analogue, it isn’t limited to two
Central processing unit
specific values.
Processor
Motherboard
Internal memory consisting of; RAM & ROM
Graphics & Sound Cards
Internal Storage devices like Hard disk drive (HDD) &
Solid-state drive (SSD)
Network interface card (NIC)
External Hardware Devices:
Monitor
Keyboard
Mouse
Printer
External Storage Devices

Software

The techniques, methods, commands, and instructions,


which tell the device what to do and how to do it. They are
the programs that control the computer system and
process data. The figures show how data changes in analogue and digital
Relates to ideas & instructions for using physical objects. forms, analogue data forms smooth curves whereas digital
data changes in discrete steps.
Two types of software:
So, for a computer to be able to process real-world data, it
Application software: first needs to convert the received data into digital form. This
Provides services that allow the user to do specific is done by hardware known as ADC (analogue to digital
tasks. converter), and its output is given back in analogue form
Can be general purpose software or custom-made using DAC (digital to analogue converter).
software. (Specialist software)
E.g., Spread sheets, databases, word processing. 1.2. The Main Components of Computer
System Software:
The software designed to provide a platform on which
Systems
all other software can run. For example:
1. Compilers: The software used to translate the Central Processing Unit (CPU)
High-level language into Machine code
(Language Processor). The component of the computer that understands and
2. Linkers: A Software that creates the links executes hardware and software operations. Nowadays,
it’s also known as a microprocessor. It is a single
between Language processors into workable
integrated circuit that is at the core of most PCs and is
solutions (Data definition language).

WWW.ZNOTES.ORG
CAIE IGCSE ICT

also present in many household gadgets and equipment Input devices Output devices
where some control or monitoring is required. Input devices are complex as
It consists of a control unit (CU) that manages the input Output devices are simpler as
they need to ensure proper
and output devices, an arithmetic and logic unit (ALU) that they only need to display the
communication between
performs computations and makes logical judgments, and finale.
computer and user.
tiny memory regions known as registers.
It processes the input and produces the outcome of the
processing in the form of output.
Backing/Secondary Storage

Internal Memory Required to permanently store significant amounts of


data.
1. Random access memory (RAM): temporary memory Most commonly in form of Hard disk drives and Solid-
storage, lost after power is shut down, performs read state drives.
and write functions, used to store data that’s currently
Differentiating between internal memory and backing
in use, can be increased in size to improve operational
storage:
speed.
2. Read only memory (ROM): permanent memory 1. RAM contents are lost when power is lost, and ROM is
storage, non-volatile, can only be read from, used to read-only, backing storage is permanent even without
store computer’s configuration data, such as BIOS. power.
2. RAM and ROM are much smaller as compared to
N.B: The BIOS (basic input/output
backing storage.
system) stores the date, time and
3. RAM and ROM are significantly faster in accessing
system configuration on a non-volatile
data as compared to backing storage.
chip called a CMOS (complementary
4. Backing storage is much cheaper than internal
metal oxide semiconductor) – this is
memory.
usually battery powered.
5. Internal memories are fixed, backing storage can be
Differentiating between Internal memories: fixed or portable.
6. Internal memories can be directly read by the CPU,
1. RAM is temporary memory device, whereas ROM is while backing storage needs to be moved into the
permanent memory device. RAM before being read by the CPU.
2. RAM is volatile, ROM is non-volatile.
3. RAM can be written to and read from, but ROM can 1.3. Operating Systems
only be read from.
4. RAM is used to store data, files, programs and parts of Controls operation of input, output & backing storage
OS in current use. However, ROM is used in storing Supervises loading, running & storage of application
start-up data. program.
Deals with error in application programs.
Maintains security of whole computer system
Input & Output Devices
Maintains a computer log.
Input devices are pieces of hardware that allow users to Operating systems offer various types of user interfaces, for
enter data into computers. example:
An output device displays the computer's output in a
human-readable format. As words on a printer, for 1. Command line interface: user needs to type in
example, or moving graphics on a monitor. commands to communicate with the computer. The
user is in direct communication with the computer.
Input devices Output devices Not restricted to pre-defined options. Possible to alter
An input device is any An output shows the result or computer configuration settings. Needs to learn many
hardware that enables data solution of the input after it commands for basic operations. All commands need
entry. has been processed. to be typed in, time-consuming. Very error prone, as
An input device can only send An output device can only commands must have correct format, spelling etc.
data. receive data. N.B: Mainly used by programmers who need to have
direct communication with the computer.
Input devices are necessary Output devices are needed in
2. Graphical user interface: Uses WIMP (windows icons
for a computer to receive order to display the outcome
menu and pointing device). The user does not need to
commands from the user for of the processing that took
learn any commands. It is more user-friendly; icons
processing to be permitted. place to the user.
are used to represent applications. A pointing device

WWW.ZNOTES.ORG
CAIE IGCSE ICT

is used to click on an icon to launch the application, 6. as they usually have wired connections, they have
this is simpler than typing in commands. This type of more stable internet access.
interface uses up considerably more computer Disadvantages:
memory than a CLI interface. The user is limited to the 1. not particularly portable because they are made
icons provided on the screen. Needs a more complex up of separate components.
operating system. 2. More complicated because all the components
N.B: Mainly used by end-users who don’t have great need to be hooked up by wiring, which also clutters
knowledge of how the computer works. up the desk space.
3. Dialogue-based user interface: use the human voice 3. Because they aren’t portable, files need to be
to give commands to a computer system. no need for copied to another portable storage device to take
a driver to take their hands off the steering wheel. In a work elsewhere.
home, it is especially useful for people with disabilities,
because many tasks can be carried out by the spoken
word only. Possible to use it as a security feature Mobile Computers:
because voice recognition could be used to identify a
person. Still unreliable, with many commands not 1. Laptop computer:
being recognized or needing to be repeated several
times (especially if there is background noise). Can be (Or notebook) refers to a type of computer where the
quite complex to setup. User needs to know which monitor, keyboard, pointing device and processor are all
commands can be used. together in one single unit. This makes them extremely
4. Gesture-based user interface: rely on human portable. lightweight (to aid portability). Low power
interaction by the moving of hands, head or even the consumption (and also long battery life). Low heat output
feet. Replaces mechanical input devices. No physical (cooling is very important).
contact required. Very natural interface for a human Uses:
operator. No training needed to interface with the 1. office and business work
computer. Possible for unintentional movement to be 2. educational use
3. used as a gaming device.
picked up. Only works near to the camera or sensor
4. general entertainment
(maximum of 1.5 meters). May only accept a limited
number of movements (for example, it may take Advantages:
several attempts to find out exactly what finger 1. Portability, all components are in a single unit so
movements are recognized). that they can be taken anywhere.
2. because of one single unit, there are no trailing
wires, and desk cluttering.
1.4. Types of Computers 3. take up much less room on a desk, so they can be
easily used in public spaces.
Desktop Computers 4. portability allows them to take full advantage of
Wi-Fi features.
Desktop usually refers to a general-purpose computer
Disadvantages:
that is made up of a separate monitor, keyboard, mouse,
1. portability makes it easier for them to be stolen.
and processor unit. It is distinguished from, for example, a
2. limited battery life means user needs to carry
laptop computer by the fact that it is made up of several
charger at all times.
separate components, which makes it not very portable. 3. keyboards and pointing devices may be awkward
Uses:
to use.
1. office and business work
4. not easy to upgrade, like adding more RAM.
2. educational use
3. general entertainment 2. Smartphones:
4. gaming device
Advantages: Allow normal phone calls to be made, but also have an
1. they are easier and less costly to upgrade and operating system (such as iOS, Android, or Windows)
expand. allowing them to run a number of computer applications
2. spare parts are standardized, which makes them (known as apps or applets). Smartphones communicate
cheaper. with the internet either by using Wi-Fi hot spots or by
3. they tend to have better specifications for a given using 3G/4G/5G mobile phone networks.
price. Uses:
4. no critical power consumption because they plug 1. They allow users to send/receive emails.
into a wall socket. 2. They allow users to use a number of apps.
5. due to fixed position, they are less likely to be 3. They allow users to use a camera feature (to take
damaged or stolen. photos or videos).

WWW.ZNOTES.ORG
CAIE IGCSE ICT

4. They allow users to use a MP3/4 player (for music 3. typing on a touch screen can be slow and error
and videos). prone compared to a standard keyboard.
Advantages: 4. laptops tend to support more file formats than
1. very small in size and lightweight, makes them tablets.
portable.
2. connecting to the internet while on the move. 4. Phablets:
3. because they use Wi-Fi and mobile phone
networks, they can be used almost anywhere. Some of the latest smartphones have been designed as a
4. they have apps which can tell instant location, hybrid between a tablet and a smartphone; these are
which is a feature that isn’t available in either referred to as a phablet. They have much larger screens
desktops or laptops. than a smartphone but are smaller than a tablet.
5. they have reasonable battery life.
Disadvantages:
1. small screens and keyboards make pages difficult
to read.
2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops. Uses:
7. The data transfer rate using mobile phone 1. Entertainment (streaming of music, videos, and
networks can be slower than with Wi-Fi. television programs).
2. Gaming (including group games).
3. Tablets: 3. As a camera or video camera.
4. Internet use (online sales, social networks, using
They work similarly to a smartphone. The only main QR codes, and so on).
difference is that they are much somewhat bigger in size 5. Sending/receiving emails.
as compared to a smartphone. 6. Global positioning system (use of maps to navigate
Uses: to a location).
1. They allow users to send/receive emails. 7. Calendar functions.
2. They allow users to use a number of apps. 8. Telephone banking (sending and receiving money
3. They allow users to use a camera feature (to take using banking apps).
photos or videos). 9. Voice over Internet Protocol: telephone network
4. They allow users to use a MP3/4 player (for music using the internet, which also allows video calling.
and videos). 10. Instant access to social networks (social contact
Advantages of tablets compared to laptops: with friends no matter where you are in the world).
1. very fast to switch on (no time delay waiting for the 11. Instant messaging.
operating system to load up). 12. Office and business management (allows rapid
2. fully portable – they are so lightweight that they voice and video communication).
can be carried anywhere. 13. Education use (using interactive software to teach
3. touch screen technology means they are simple to or learn from).
use and don’t need any other input devices. 14. Remotely control devices.
4. not much heat, they use solid-state technology. Laptops are the most expandable of these devices,
5. battery life of a tablet is a lot longer. while smartphones are the most portable. Tablets
6. when the power button is pressed, it goes into and phablets fall somewhere in between, offering
standby, but remains connected to the internet so a balance of portability and expandability. The
the user still hears alerts when emails or other choice of which device to use will depend on your
‘events’ are received. specific needs and use case.
Disadvantages of tablets compared to laptops:
1. tend to be rather expensive when compared to
1.5. Impact of Emerging Technologies
laptops.
2. they often have limited memory/storage when Artificial Intelligence (AI): There are many definitions of
compared to a laptop. artificial intelligence (AI). Essentially, AI is a machine or

WWW.ZNOTES.ORG
CAIE IGCSE ICT

application which carries out a task that requires some An input device can send data to another device, but it
degree of intelligence. – the use of language, – cannot receive data from another device.
recognizing a person’s face, – the ability to operate Input devices are necessary for a computer to receive
machinery, such as a car, airplane, train, and so on, – commands from its users and data to process; the
analyzing data to predict the outcome of a future event, devices are under the control of the user or can be direct
for example weather forecasting. Impact: Whenever AI is data entry.
mentioned, people usually think of science fiction
fantasies and think of robots. The science fiction writer Input devices can be complicated because they must ensure
Isaac Asimov even went as far as producing his three laws that the user can interact with the computer correctly.
of robotics: » Robots may not injure a human through
action or inaction. » Robots must obey order given by 1. Keyboards:
humans without question. » A robot must protect itself
Uses:
unless it conflicts with the two laws above. Everyday uses:
1. An autonomous (driverless) vehicle – we already Input of data into applications software
have driverless trains and autopilots on airplanes, Typing in commands to the computer
but future developments include driverless cars.
2. Robotic research is leading to improvements in Advantages:
technology to help amputees and people with
disabilities. Fast entry of new text into a document.
3. Robots are used to help people carry out Well-known method.
dangerous or unpleasant tasks – for example, Easy to use for most people.
bomb disposal, Negative impacts of AI: Easier to do verification checks as data is entered (can
immediately compare the source document with typed
4. Unemployment, robots are capable of doing
tedious human tasks with much more efficiency data on the screen).
and excellence than humans.
Disadvantages:
5. Dependency on technology could lead to problems
in the future. Can be difficult to use if the user has limited arm/wrist
6. De-skilling: tasks that used to be considered a use.
talent are now part of general, tedious processes Slow method when compared to direct data entry.
that are done on a regular process by machines. Fairly large device that uses up valuable desk space.
Extended reality: refers to real and virtual combined
environments. The two most common examples at the
moment are: » Augmented reality (AR) is a merger
between the virtual and physical (real) world, it lays
objects onto the pre-existing objects. e.g., Pokémon GO!
Impact: safety and rescue operations’ training, shopping
and retail (getting a better look at a car before the
purchase), healthcare (better understanding of a patient’s
body) » Virtual reality (VR) enables an entirely new world
to be created, unlike AR, this has no link to the actual 2. Numeric keypads:
surroundings of the user. It requires the user to be
specially equipped with a VR headset, joystick, and Uses:
headphones. Impact: Military applications, educational
purposes (looking at ancient buildings), healthcare, media Automatic teller machines (ATMs), where the customer
(interactive special effects in a movie), scientific can key in their PIN, amount of money, etc.
visualization (part of molecular structures/cells). Mobile phones to allow phone numbers, etc. to be keyed
in.
Point of sale terminals (POS) in case the barcode reader
2. ## 2.1. THEORY fails to read the barcode – the number has to be keyed in
manually by the operator.
Chip and PIN devices when paying by credit/debit cards.
Input & Output Devices Fast entry of numeric data into a spreadsheet.

Advantages:
Input Devices & their Uses
Faster than standard keyboards when entering numeric
An input device is any hardware device that allows a user data.
to enter data or instructions into a computer directly.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Because many are small devices, they are very easy to Advantages:
carry around.
faster than a keyboard for choosing options.
Disadvantages: used to navigate applications and the internet.
Because the touchpad is integrated into the laptop
Sometimes have small keys which can make input more computer, there is no need for a separate mouse, this
difficult. aids the portability and is a big advantage if there are no
Sometimes the order of the numbers on the keypad is not flat surfaces available.

Disadvantages:

People with limited hand/wrist movement find the device


difficult to use.
intuitive. Can be more difficult to control the pointer when
compared to a normal mouse.
3. Mouse: Drag and drop operations are more complicated using a

Uses:

opening, closing and minimizing software


grouping, moving and deleting files.
image editing, for example, controlling the size and
position of a drawing pasted into a document.
controlling the position of a pointer on the screen to allow
selection.

Advantages: touchpad.

Faster method for choosing an option rather than using a 5. Tracker ball:
keyboard.
Very quick way of navigating through applications and the Uses:
internet.
Does not need a large desk area when compared to a good alternative to a mouse for people with conditions
keyboard. such as RSI.
Used in an industrial control room environment.
Disadvantages: Used in some luxury cars to select functions such as
radio.
Can be more difficult for people with restricted hand/wrist
movement than using a keyboard for data entry. Advantages:
Easy to damage, and the older type of mouse quickly
becomes clogged up with dirt. Does not need the same fine control as a mouse.
Difficult to use if no flat surface readily available. Easier to use than a mouse if the operator has problems
with their wrist.
More accurate positioning of the pointer on screen.
They are more robust than a mouse.
Needs less desk space than a mouse or keyboard.

Disadvantages:

Not supplied with the computer as standard, therefore


more costly.
4. Touchpad: Users may need training because it is not standard
equipment.
Uses:

opening, closing and minimizing software


grouping, moving and deleting files.
image editing, for example, controlling the size and
position of a drawing pasted into a document.
controlling the position of a pointer on the screen to allow
selection.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Uses:

Used in video games.


Used in simulators, to mimic the actual controls.

Advantages:

Easier than keyboards for screen navigation.


In some applications, the control is more realistic than
using a mouse.

Disadvantages:

The on-screen pointer is more difficult to use.


6. Remote control:

Uses:

Televisions, satellite systems, DVD/Blu-ray players and Hi-


Fi systems, to alter controls such as volume, on/off etc.
Used to control multimedia systems.
Used in industrial applications to remotely control
processes.

Advantages:

Can be operated from any reasonable distance.


Safer in some conditions, e.g., in chemically hazardous
environments, we can control and measure from safe
distances.
8. Driving wheel:
Disadvantages:
Uses:
Difficult to use for people with limited hand/wrist
movements. Used in video games, especially car racing games.
The signal can easily be blocked by physical obstacles. Used in simulators, to mimic actual vehicle controls.

Advantages:

More realistic experience than both mouse and joystick.


Easier than a keyboard or joystick to control steering
movements.

Disadvantages:

Rather expensive input device as compared to a mouse or


joystick.
Steering movements tend to be over-sensitive, which
gives an unrealistic feel.
Unless it is an expensive simulator, feedback to steering
wheel is non-existent.

7. Joysticks:
9. Touch screen (as an input device):

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Uses: Fairly slow input method, especially if color mode is

Automatic teller machines (ATMs) to choose from on-


screen options.
Point of sale terminals such as in restaurants.
Interactive white boards in education.
Computer-based training (CBT) where answers are
selected during on-screen testing.

Advantages:
selected.
Faster entry of options than using keyboard or mouse.
Very easy method for choosing options. 11. Digital Cameras:
User-friendly method – no training necessary in its use.
Uses:
Option to expand the size of the display if necessary.
Taking photographs, still better than smartphones and
Disadvantages:
tablets.
Limited number of input options available. Data-capture device, e.g., as a reversing aid in cars.
Can lead to problems if an operator has to use the system Dentistry, to help capturing pictures for better diagnosis.
frequently (straining of arm muscles, RSI, etc. are all The creation of virtual reality tours around houses,
possible). buildings etc.
The screen can get very dirty with constant touching.
Advantages:

Easier to produce better-quality photographs than with a


traditional camera.
Faster to upload photographs to a computer than
scanning in hard copies.
Memory cards can store many thousands of photographs.
No need to develop film and make printouts, saves money
and is more environmentally friendly.
Unwanted images can easily be deleted from memory
card.

Disadvantages:

Need to be computer literate to know proper use.


10. Scanners: Loss of artistry due to clever software doing all the work.
Images need to be compressed to reduce amount of
Uses: memory used.

Scanning in documents and converting into different


formats
Scanning in old documents to protect them, in case
original is lost/damaged.
Scanning in photographs for storage
Scanning in barcodes at POS terminals.

Advantages:

Images can be stored for editing at a later date.


When used with OCR, they are much faster and more
12. Microphones:
accurate than typing the documents in.
Possible to recover damaged documents by scanning in Uses:
and producing an acceptable copy.
To input speech to be used in various applications.
Disadvantages: Input in voice recognition software for authentication.
Limited quality, depending on how good the scanner’s As a sensor, to pick up sound, in an intruder alarm
resolution is. system.
Used in audio conferencing or VoIP applications.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Advantages: Drawing on screens

Faster to read in text than it is to type it in. Advantages:


Possible to manipulate sound in real time rather than
working on a completed recording. Greater accuracy than touch screens
Improves security, if used as an authentication system. Small, makes them portable as well as capable of being
used in small spaces.
Disadvantages: Easy-to-use technology.

Sound files use up a lot of computer memory. Disadvantages:


Reading in data is more error prone than typing in.
Lagging problems while drawing on screen.
Only works with CRT monitors.
Rather dated technology.

13. Sensors:

Uses:
2.2. Direct Data Entry & Associated
Temperature sensors are used in automatic washing Devices
machines, central heating systems, ovens, automatic
glasshouses.
1. Magnetic Stripe Readers:
Pressure sensors are used in intruder alarm systems,
washing machines. Uses:
Light sensors are used in automatic glasshouses,
automatic doors, street lighting control. On credit/debit card for use at ATMs
Sound/acoustic sensors are used in intruder alarm Security device to allow entry to buildings, hotels, etc.
systems, monitoring liquid and powder flow in pipes.
Humidity/moisture sensors are used in automatic Advantages:
glasshouses, environmental monitoring, in factories
Faster than keying in data manually.
where moisture levels are crucial.
Error-free, no human intervention needed.
pH sensors are used in automatic glasshouses, chemical
Secure, information isn’t in human-readable form.
processes and environmental monitoring.
Robust, there are no moving parts.
Advantages:
Disadvantages:
Readings are more accurate as compared to human
If the card is damaged, the data is lost.
operators.
Doesn’t work at a distance.
Readers are continuous, no breaks in the monitoring.
As the information isn’t human readable, this can be a
Because it is a continuous process, any action or warnings
disadvantage in some cases.
needed will be initiated immediately.
Automatic systems don’t need human intervention.

Disadvantages:

Faulty sensors can give spurious results.


Most sensors are analogue; therefore, they require
conversion using Analogue to Digital Convertors.

14. Light pens:

Uses: 2. Chip and PIN reader:

Selecting object on CRT screens Uses:

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Where payments are made using cards Very fast way of inputting survey results.
More accurate because there is no human intervention.
Advantages: More accurate than OCR methods.
More secure than contactless cards as the PIN acts as a Disadvantages:
second security layer.
More robust system than Magnetic Stripe Cards The designing of the forms can be complicated to make
sure the marks are correctly positioned.
Disadvantages: If there are problems, they need to be manually checked,
which can be time-consuming.
Need to be very careful, so the PIN isn’t seen by anyone
while being typed in.

5. Optical Character Recognition/Reader:

Uses:

Processing passports and identity cards.


Converting hard copy documents into electronic form.
3. Radio Frequency Identification (RFID) reader: Used in automatic number plate recognition (ANPR)
systems.
Uses: Digitizing historic hard copies for archiving.
Livestock tracking Advantages:
Retail, instead of barcodes, as they don’t need to be
scanned in. Much faster data entry system than manual typing.
Admission passes. No human intervention, its error free.
Library books, to acknowledge the books which have been
borrowed. Disadvantages:

Advantages: System has difficulty in reading different handwritings.


Still not a very accurate technique.
No line-of-sight contact is needed.
Very robust and reliable technology.
Very fast read rate.
Bidirectional data transfer.
Bulk detection is possible.

Disadvantages:

Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal. 6. Barcode readers:
RFID is more expensive than a comparable barcode
system. Uses:

4. Optical Mark Reader/Recognition (OMR): Used in supermarkets for stock control.


In libraries, to keep track of books.
Uses: As a safety function to ensure checking of electrical
equipment on a daily basis.
Used in MCQs checking.
Used in reading voting papers. Advantages:

Advantages: Much faster than manually keying in data.


Allow automatic stock control.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

They are a tried and trusted technology. QR codes can be used to transmit malicious data.

Disadvantages:

Relatively expensive system to administer.


Not fool-proof, barcodes can be swapped between items.
Can be more easily damaged than RFID tags or magnetic

stripes.

7. Quick response (QR) code scanner:

Uses:

used in advertising to contain information about the


advertising company.
Wi-Fi authentication
Used in restaurants, you can see the menu by scanning.
2.3. Output Devices & their Uses
Advantages:
1. Cathode ray tube (CRT) monitors:
hold much more information than normal barcode.
fewer errors than with barcodes. Uses:
QR codes are easier to read because they can even be
read by the cameras on a smartphone. Their large screens allow complex diagrams to be created
It is possible to encrypt QR codes. in Computer-aided design.
Used with light pens to allow designs to be created.
Disadvantages:
Advantages:
More than one QR format is available.
Can be clearly seen at a wider range of angles unlike
LCDs.
Allow the use of light pens.

Disadvantages:

They are very heavy and bulky.


They run very hot and can cause fires if left unattended.
They use a lot more power than LCDs.
Their flickering can lead to headaches.
Image burn-in is a common issue.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

2. Liquid Crystal Display (LCD) screens:

Uses:

Main output device for modern computers.


Mobile phones, laptops, video games use LCD screens.

Advantages:

Very efficient, low power consumption.


Lightweight devices.
Screens can made in various sizes.
No flickering images.
Very sharp image resolution.

Disadvantages: 4. Multimedia projectors:


Color and contrast from different angles are inconsistent. Uses:
Motion blur is a common issue.
Lower contrast than CRT monitors. Training presentations to allow whole audience to see
images.
Advertising presentations.
Home cinema systems.

Advantages:

More people can watch as they don’t have to crowd


around a laptop.
Avoids the need for several networked computers.

Disadvantages:

Images can be fuzzy.


Expensive to buy.
Set-up can be complicated.

3. Touch screen (as an output devices):

Uses:

ATMs
POS terminals
Information kiosks.

Advantages:
5. Laser printers:
Don’t need additional input devices.
Uses:
They are very interactive, many functions such as swiping
can be done.
In uses where low noise is required.
They add a high-tech feel to devices and interfaces. If fast, high quality, high-volume printing is required.
Disadvantages: Advantages:
They tend to get dirty with frequent use. Printing is fast.
Frequent use results in straining of arm muscles, RSI, etc.
They can handle very large print jobs.
If large amounts of data are being input/output, they Quality is consistently high.
aren’t very accurate, and the interface isn’t very fast. Toner cartridges last for a long time.

Disadvantages:

WWW.ZNOTES.ORG
CAIE IGCSE ICT

They are only considerably fast if several copies are being Advantages:
made.
Color laser printers are expensive to run. Can be used in varying environments unlike laser/inkjet
They produce ozone and volatile organic compounds printers.
because of their printing method and toner. Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
Good for continuous printing.

Disadvantages:

Very noisy
Initial cost is more than an inkjet printer.
Very slow, poor-quality printing.

6. Inkjet printers:

Uses:

Where low-output volumes are required.


Where high-quality printing is required for single pages.

Advantages:
8. (Graph) Plotters:

High-quality output Uses:


Cheaper than laser printers.
Producing architectural drawings
Very lightweight
Producing engineering drawings
Don’t produce ozone and volatile organic compounds.
Drawing animation characters.
Disadvantages:
Advantages:
Slow output if many copies are needed.
Very high-quality output.
Can’t do large print jobs.
can produce large, monochrome and color drawings very
Printing can smudge if user isn’t careful.
accurately.
Can be expensive if used a lot.
Can print on a variety on materials.

Disadvantages:

Very slow printing.


Expensive equipment to purchase initially.
Have a very large physical footprint compared to a

7. Dot matrix printers:

Uses:

Used in environments where noise isn’t a major issue. printer.


Carbon copies or multi-part outputs can be produced.
Widely used in till receipts. 9. 3D printers:

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Uses: They take up a lot of desk space.

Custom-made prosthetic limbs.


In aerospace, if parts of the aircraft are made using 3d
printers they can be very lightweight.
Making spare parts for items that aren’t now
manufactured, e.g., parts of a vintage car.

Advantages:

Manufacturing objects has become much easier.


Even though the initial cost is high, it is still cheaper than
the more conventional way.
Parts for machinery that aren’t available can be made.

Disadvantages:

Potential to make counterfeit items.


Could lead to manufacture of dangerous items by almost
11. Actuators:
anyone.
Uses:

Used to turn on motors, buzzer, switches.


Allow a computer to control physical devices,

Advantages:

Allow remote operation of many devices.


Relatively inexpensive devices.

Disadvantages:

They are an addition device in the system that could go


wrong.
Job loss potential. As they are analogue devices, signals need to be
converted using a DAC.
10. Speaker:

Uses: 3. ## 3.1. THEORY


Used in all phones and most computers.
Helps visually impaired people.
Plays downloaded sound files.
Storage devices and media
Advantages: What is backing up of data?
Amplified sounds can be much louder than the original
Backing up refers to the copying of files or data into a
sound.
different medium incase damage to or loss of original
Amplified sounds can be enough to be heard by a huge
copy.
crowd.
Very simple technology.
Why do we back up data?
They are especially useful for blind people, for instance,
reading e-books.
To safeguard against loss of data.
Disadvantages: To safeguard against damages caused by hackers.
In case files need to be sent elsewhere, to protect original
Speaker output can be disturbing to irrelevant people format of files.
present in the same area, e.g., an office.
Sound quality is high only in expensive speakers. 3.2. Data Access Types:
1. Serial access:

WWW.ZNOTES.ORG
CAIE IGCSE ICT

This involves starting from the beginning of the file and Used in file servers for computer networks.
accessing each record to get to the file required.
It is a very slow form of data access. Advantages:
Used where speed isn’t vital.
They have a very fast data transfer rate and fast access
Examples where serial access is used:
times to data.
utility billing
They have a very large memory capacities.
clearing of bank cheques
producing pay slips Disadvantages:

2. Direct access: Can be fairly easily damaged.


They have many moving parts which affect overall
This is used to access data stored in any record by typing reliability.
in the required key field. Their read/write operation can be quite noisy when
Typing in a key field will allow the user to access a compared to solid-state drives.
particular record directly from the calculated position.
Much faster data access speed. Portable Hard Disk Drives

Uses:
Magnetic Backing Storage
Can be used as backup systems to prevent data loss.
Media Can be used to transfer data/files/software between
computers.
Holds data magnetically.
Advantages:
Surface area of the media are magnetized so that they
can hold bits of data. Data access time and data transfer rate are very fast.
The device that reads media can also read the bits held Have a very large memory capacity.
on the surface area Can be used as a method of transferring information
between computers.
3.3. Magnetic tape drives
Disadvantages:
Uses:
They can be easily damaged if user accidently drops it or
used in application where batch processing is used. doesn’t correctly shut down the drive after use.
used as a backup media where vast amounts of data Data transfer rate is not as fast as for fixed hard disk
needs to be stored. drives.
used in long-term archiving of data, they have huge data
storage capacities and are known to be very stable.
Optical Backing Storage
Advantages:
Media
They are generally less expensive than hard disk drives.
It is a very robust technology.
Holds data by burning ‘dots’ onto the surface with a high
They have a huge data storage capacity.
powered laser.
The data transfer rate is fast.
The data that reads the media can read the data by
Disadvantages: shining a lower powered laser over the dots.

Very slow data access times (uses serial access). 3.4. CD-R/DVD-R
When updating, another tape is needed to store the final
updated version. Uses:
They are affected by magnetic fields, a strong field can
Home recordings of music and (CD-R) and films (CD-R).
corrupt data stored on the tape.
Used to store data to be kept for later use to be
transferred to another computer.
Fixed Hard Disks/Drives
Advantages:
Uses:
Cheaper medium than RW disks.
To store the OS, systems software and working data/files.
Once burned (and finalized) they behave like a ROM.
Storing applications files.
Used in real-time systems and in online systems. Disadvantages:

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Can only be recorded once; if an error occurs then the much smaller so they store five times more data than
disk has to be thrown away. DVDs.
Not all CD/DVD players can read CD-R/DVD-R. 2. Blu-ray disks automatically come with a secure
encryption system which helps to prevent piracy and
CD-RW/DVD-RW copyright infringement.
3. The data transfer rate for a DVD is 10 Mbps and for a
Uses: Blu-ray disc it is 36 Mbps.

Used to record television programs which can be Uses:


recorded over, time and time again.
Used in CCTV systems. Home video consoles.
Can be used as a backup device for files and data. Storing and playing back movies.
Computers can use this technology for data storage or
Advantages: backing hard drives.
Camcorders can use this media to store movies.
Can be written over many times.
Can use different file formats each time it is used. Advantages:
Not as wasteful as R format because the files/data can be
added at a later stage. Very large storage capacity.
Very fast data transfer rate.
Disadvantages: The data access speed is also greater than with other
optical media.
Can be relatively expensive media.
Blu-ray discs automatically come with a secure encryption
Possible to accidently overwrite data.
system.

CD-ROM/DVD-ROM Disadvantages:

Uses: Relatively expensive discs.


encryption problems when used to store videos.
These are read-only memory (ROM) which means they Introduction of HD (high definition) DVD players has
can’t be written over and can only be read. Permanent reduced the advantages of using Blu-ray technology.
storage method.
CD-ROM is used to store music files and to store software,
computer games and reference software. Solid State Backing Storage
DVD-ROM has much larger storage and is used to store
films. Holds data on devices that don’t have any moving devices.
Used in applications where there is a real need to prevent
deletion or overwriting of important data. 3.5. Solid-state drives (SSD)
Advantages: Uses:
They are less expensive than hard disk drive systems.
storage device to store files, applications, OSs, and so on.
Very portable as they are small and light.
Data stored on them is read-only, so it cannot be Advantages:
accidently overwritten.
They are more reliable as they have no moving parts.
Disadvantages: They are considerably lighter, suitable for laptops.
They do not have to ‘get up to speed’ before they work
Hold far less data than hard disk drives or memory sticks.
properly.
Very slow data transfer rate and data access times, as They have a lower power consumptions.
compared to hard disk drives.
They run much cooler than HDDs.
You cannot add your own files to the disks because they Because of no moving parts, they are very thin.
are both read only.
SSD data access time is only 0.1 milliseconds compared
to 10 milliseconds for HDD.
Blu-Ray discs Data transfer speed for SSDs is also much faster than for
HDDs.
The main differences between DVD and Blu-ray are:
Disadvantages:
1. Blu-way uses a blue laser rather than a red laser.
(wavelength of blue light is 405nm, much smaller than SSD endurance - SSDs are conservatively rated at only
the 650nm red laser) This allows pits and lands to be 20GB write operations per day over a three-day period.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

More expensive than magnetic hard disks. Users will often be required to purchase a card reader or
Smaller storage capacity than magnetic hard disks. USB converter to view the data.

Pen drives (Memory sticks)


4. ## 4.1. THEORY
Uses:

Transporting files between computers or using as a Networks & the Effects of


backing store.
Used as a security device to prevent software piracy Using them
(known as a dongle).

Advantages: Routers
Very compact and portable media. A device that enables data to be sent between different types
Very robust. of networks. Used to connect a LAN to the internet, can be
Does not need additional software to work on most connected through cables or wirelessly.
computers. It can be used for:
They are not affected by magnetic fields.
connecting networks and devices to the internet,
Disadvantages: storing computer addresses,
routing data packets.
Cannot write protect the data/files by making it ‘read-only’.
Easy to lose (due to the small physical size). When a data packet is received, the router checks if the
The user needs to be very careful when removing a packet is intended for it or another network. If it’s meant for
memory stick from a computer - incorrect removal will its own network, then the data packet is routed to the local
corrupt the data on the memory stick and make it useless. switch/hub. If not, the data packet is sent to the relevant
router, which send it to the relevant device.
Flash Memory cards
They consult routing tables to know where to send the
Different types of memory cards: data.
» SD cards (secure digital card)
» XD cards (extreme digital card)
» CFast card (compactfast card). Common Network Devices
Uses:
1. Network Interface Cards (NIC): needed to allow a
Storing photos on digital cameras.
device to connect to a network. Turns binary data into
Used as mobile phone memory cards.
electrical signal that allows network access. Usually
Used in MP3 players to store music files.
integrated into the motherboard.
Used as a backing store in hand-held computer devices.
Each NIC is given a unique hardwired media access
Advantages:
control (MAC) address.
Very compact. Media access control (MAC) address: a number which
Because of no moving parts, they are very durable. uniquely identifies a device when connected to a network.
They can hold large amounts of data. First 6 hex digits identify the manufacturer’s code and the
Compact cameras and smartphones are able to read and next 6 identify the device’s serial number.
write memory cards allow the user to transport large
2. Hubs: they are hardware devices that can have a
collections of photographs, songs etc.
number of other devices connected to them. They are
Disadvantages: used to connect devices together to form a local area
network (LAN). It takes a data packet received by one
Expensive per gigabyte of memory when compared to of its ports and sends it all relevant or irrelevant
HDDs. device connected to it.
Have a lower storage capacity than hard disks.
Have a finite life regarding number of times they can be Not very secure, broadcast data to all devices.
read from or written to. Unnecessary network traffic.
Memory cards, specifically the micro SD card, are the
3. Switches: intelligent hubs. Used to connect devices to
smallest storage devices available; this means they are
form a LAN. Unlike hubs, the switches store MAC
more likely to be lost, stolen or damaged.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

addresses of all devices on a lookup table. So, it only Bluetooth uses key matching encryption however, Wi-Fi
sends data to relevant device. uses WPA (Wi-Fi protected access), and WEP (wireless
In summary: equivalent privacy).

Both are used to connect devices in LAN.


Both use data packets.
Cloud Computing
Hubs send data to every device on the network.
Switches send data to a relevant device only. This is a method where data is stored on remote servers
Switches have better security.
accessed through the internet.
Switches use lookup tables to determine the destination
The three types of cloud storage are:
for a data packet.
Switches use MAC addresses for relevant device location. 1. Public Cloud - The customer and the cloud storage
provider are different companies.
4. Bridges: devices that connect one LAN to another LAN 2. Private Cloud - The customer and the cloud storage
that uses the same protocol. Unlike routers, they can’t
provider are a single organization.
communicate with external networks, such as the
3. Hybrid Cloud - Combines both public and private cloud
internet.
options and allows for sensitive data to remain private
Comparison:
whilst providing public cloud services for less sensitive
Bridges connect LANs together; routers connect various information.
types of networks together. Cloud data is duplicated and stored on other servers to
Bridges scan MAC addresses while routers scan the IP
ensure data availability during system failures, upgrades
addresses.
and maintenance periods.
Both send out data in form of data packets.
Bridges connect networks with same protocol, routers can Advantages:
connect networks with different protocols.
Router uses routing tables to direct data packets, bridges Services can be scaled up or down according to changing
don’t. requirements.
Bridges has only two ports, routers have multiple ports. Cloud storage eliminates the need for a business to
purchase expensive equipment for infrastructure and
maintenance.
Wi-Fi & Bluetooth Easily available globally allowing both remote working and
data sharing.
Both are used for wireless communication between devices. Providers offer high levels of ensuring that services are
They both use electromagnetic radiation as the carrier of always available.
data transmission. Can offer an almost unlimited amount of storage.
Bluetooth uses: A backup of the data from the cloud will allow full data
recovery in case of incidents.
When transferring data between 2 or more devices that Files can be synced across multiple devices.
are very close together. No need to carry storage devices around.
When speed of data transmission isn’t crucial.
For low-bandwidth applications. Disadvantages:

Wi-Fi uses: A stable internet connection is always required.


Data storage in clouds may be vulnerable to security
Full-scale networks. breaches.
When data transfer rate is crucial. User is dependent on storage provider for reliability and
For uses where higher range and better security is availability of services.
required. As the amount of storage or bandwidth required
increases, the services may become expensive over time.
Differences and similarities:

Bluetooth uses a transmission frequency of 2.4 GHz,


whereas Wi-Fi uses a range of 2.4 – 5.0 GHz. Common Network Environments
Wi-Fi has a much faster data transfer rate.
Wi-Fi has a higher geographical range in which it is 1. Internet:
effective.
Bluetooth only allows up to 7 devices to be connected at a The Internet is a very large global network that consists of
many other interconnected networks
time, whereas the number of devices connected to a Wi-Fi
network depend on the router/routers used.

WWW.ZNOTES.ORG
CAIE IGCSE ICT

The world wide web is the vast collection of web pages They all use client server architecture
that can be accessed using a web browser They all use security measures such as
The world wide web allows you to access information by authentication and encryption
using the internet They all promote and facilitate information and
resource sharing
Characteristics: Differences between the internet, intranet and extranet
are as follows:
It is an open network meaning everyone has access to the
The internet is a global network whereas an
same resources and information as everybody else.
intranet/extranet is a private network contained within
People from all over the world can communicate with
an organization
each other in real-time.
The use of the internet covers a wide range of
Available to anyone who has a suitable device and access
purposes whereas an intranet/extranet is designed for
to any one of the interconnected networks.
specific users and purposes
Uses: Much of the information is publicly available whereas
an intranet/extranet is not
Education and training The internet is not owned solely by one person or
Social Networking organization whereas intranets/extranets are owned
Online shopping usually by the organization.
Entertainment

2. Intranet: Network types


Usually private and are used to send information securely
1. Local Area Network (LAN): networks that are usually
and safely.
contained within a single building or small
Access to an organization’s Intranet is restricted and only
geographical location. It is made up using hubs and/or
accessible to authorized users such as employees.
switches which will connect several devices together.
Intranets have many advantages over the internet such
It is common for one hub or switch to be connected to
as:
a router which will allow the LAN connectivity to other
better bandwidth than the internet,
outside networks such as the internet.
data is kept within the organization,
less chance of hacking and attacks, Advantages:
administrators can manage access to external sites
and links. Allows centralized management of updates, backups and
software installations.
Characteristics: Can secure its devices with the use of firewalls, antivirus
software and other security features to prevent
Private network that is accessible to employees within a
unauthorized access.
company or organization.
A LAN allows users on the network to share resources
Usually behind a firewall to ensure security.
such as printers and other peripherals.
Allows for document sharing and the use of collaboration
tools between users. Disadvantages:
Can be customized to meet the specific requirements of
the business. Network may not function properly in case of hardware
Users will require a username and password to access failure.
the Intranet. More prone to attacks than standalone computers.
Data and peripheral accessing can be slow, based on
3. Extranet: network traffic.
LAN networks require maintenance to ensure software
Private Intranet that also allows access by selected being up-to-date.
parties that reside outside of the organization. These
parties, for example, maybe customers, key stakeholders 2. Wireless Local Area Network (WLAN): Local Area
or clients. Networks that allow devices to connect wirelessly
Users will have an authorization level once they have rather than using physical cables. Wireless Access
successfully logged in which will determine which Points (WAPs) are connected to an existing wired
resources they may access. network which provides wireless connectivity. Support
Similarities between the Internet, Intranet and extranet a vast range of devices such as smartphones and
are as follows: laptops and are very popular in public areas such as
They are all web based technologies shopping malls.
They allow users to access information remotely

WWW.ZNOTES.ORG
CAIE IGCSE ICT

Advantages: (the user doesn’t have to take any action, unlike


phishing).
Allows users to connect anywhere that is in the range of a Viruses: Program code that replicates (copies itself)
Wireless Access Point (WAP). with the intention of deleting or corrupting files and
Can be used in a variety of environments both indoors causing the computer to malfunction
and out making them highly flexible.
As the requirements change, additional WAPs can be
added relatively easily.
Passwords
Printer’s access can be given to wireless devices.

Disadvantages: A common form of security and are often accompanied by a


username or email address.
The strength of their signals can be affected by obstacles
such as walls. There are many ways to enhance the security of your
password such as the following:
Speeds can be affected by high traffic areas.
Can sustain interference from other devices which can Ensure that the password is changed regularly in case
affect performance and connectivity. it has been obtained illegally or accidentally
Can be vulnerable to security threats due to signal Ensure that the password uses a combination of
interception. uppercase, lowercase, numbers and special
characters to make the password more difficult to
3. Wide Area Networks (WAN): is formed by several guess.
LANs being connected through a router. It is expensive iloveict is a weak password
however it comes with a more enhanced security. 1lov3ICT# is a strong password
Additional hardware is needed for a WAN: Routers, Anti spyware software can be run regularly to ensure that
modems and proxy servers. your information including your password is not being
passed to an unauthorized third party user.
Advantages:

Provide the ability to connect geographically dispersed


locations, such as offices in different cities or countries. Other authentication methods
Offer the flexibility to scale up or down based on the
needs of the organization. 1. Zero login: It is a security concept that aims to
eliminate traditional login methods, such as
Administrators can monitor and manage the network
infrastructure from a single location. usernames and passwords, by using biometrics or
other authentication factors for seamless and
Disadvantages: password-less access.
2. Biometric Recognition: These methods of
Setting up and maintaining a WAN can be expensive, authentication use unique physical or behavioral
especially when compared to LANs. characteristics, such as fingerprints, iris scans, or
Cover larger distances and often rely on public networks voice recognition, to verify a person's identity.
or leased lines, which can introduce latency and affect 3. Magnetic Stripes: These are authentication features
performance. on cards, storing data magnetically. They enable
WANs are subject to the reliability and availability of secure identification and authorization by containing
external service providers. encoded information that can be read by magnetic
stripe readers.
4.2. Security issues regarding data 4. Smart Cards: Smart cards are portable devices that
contain integrated circuits to store and process data.
transfer They are used for authentication, identification, and
secure transactions in various applications such as
Connection to a network exposes a user to:
banking, telecommunications, and access control.
Hacking: Unauthorized access given to computer. Can
5. Physical Tokens: It is a type of authentication that
lead to identity theft or the misuse of personal
takes the shape of a real, solid object. The user
information
demonstrates ownership of the token through
Phishing: Phishing involves getting sensitive
interaction with a login system. Physical tokens have
information such as usernames, passwords, and
embedded clocks that create one-time passwords
credit card detail, for malicious reasons, by mimicking
(OTPs) when a PIN and other authentication
a reliable webpage on the network
information are entered.
Pharming: This is malicious code installed on a user’s
6. Electronic Tokens: These are applications that users
computer or on a web server; the code will redirect
install on their hardware, such as smartphones. Say a
the user to a fake website without their knowledge
person wants to access a website on a tablet

WWW.ZNOTES.ORG
CAIE IGCSE ICT

computer. To access this website, users must first Much easier to access important documents or bring in
authenticate themselves using electronic tokens. With ‘experts’ at key parts of the conference.
their smartphone, the user has already set up the Possible to hold conferences at short notice.
electronic token app. The user launches the app on Reduced travelling costs.
their smartphone when the website asks them to No need to pay for hotel accommodation or venue hire.
verify their identity. The program creates an OTP that Reduces the cost of taking people away from their work
is only good for a short period of time. for two or three days to travel.
Better to use video conferencing than have delegates
travel to potentially unsafe places around the world.
Anti-malware software
Disadvantages:
An anti-malware software is designed to protect devices Potential time lag in responses/delays when talking.
against viruses and malicious software. It has 3 mains Images can jerk.
purposes, detect, prevent and remove malicious software. It
Very expensive to set up in the first place.
is installed onto a computer system and will operate in the Problems if the delegates live in different countries where
background. the time zone differences are large.
Common features of Anti-Malware software include the Requires IT knowledge to some extent.
following:
Not the best for people who consider travelling a job-perk.
Completely reliant on stable internet connections.
Comparing the scanned files against a large database of
known threats 2. Audio Conferencing: Meetings held using audio
Real-time scanning (sound) technology are referred to as audio
Regular updates to gather an up to date list of known conferencing. The normal telephone network can be
threats
used for audio conferencing, which is frequently
Quarantine of infected files referred to as a phone conference.
Quarantining files allows threats to be automatically
deleted. The hardware required is:
Allows the user to determine if the file is a legitimate
threat and not a false positive. a computer (with built-in microphones and speakers)
external microphone and/or speakers
Heuristic Checking: Instead of relying solely on a database of an internet phone
known viruses, this method looks for behavioral patterns and a standard phone.
other features in a file to identify possible risks there.
Advantages:

Electronic Conferencing Allows participants to join meetings from any location.


Eliminates the need for travel expenses, such as
1. Video Conferencing: It is a form of audio and video transportation, accommodation, and meals.
communication. It serves as a stand-in for face-to-face saves time by eliminating travel time and allowing
meetings between a number of persons who may meetings to be scheduled and conducted quickly.
reside abroad or in another region of the country. It
Disadvantages:
utilizes a network in some way and is done in real
time. Lacks the visual aspect of face-to-face meetings, which
can hinder communication.
The basic hardware includes:
Can limit interaction and engagement compared to in-
webcams, person or video conferencing.
large monitors/television screens, Heavily relies on technology, and technical issues such as
microphones, poor audio quality, background noise, or connectivity
speakers. problems are common.

The software used are: 3. Web Conferencing:


Web conferencing, often known as webinars or
webcam and microphone software drivers webcasts, makes use of the internet to enable
CODEC (coder and de-coder) conference calls. This system makes use of numerous
Echo cancellation software computers that are interconnected over the internet. It
operates in real time, just like video conferencing, and
Advantages: enables the following meeting types:
» business meetings to discuss new ideas
» presentations

WWW.ZNOTES.ORG
CAIE IGCSE ICT

» online education or training. General advantages of using a microprocessor-controlled


device:
Advantages:
save energy due to being efficient, as well as turning off
Allows participants to see each other through video, after inactivity
providing a more immersive and engaging experience can be easier 'programming' these devices to perform
compared to audio conferencing. tasks rather than turning knobs and pressing buttons
Often offer screen sharing capabilities, enabling manually
participants to share presentations, documents, or other
visual content in real-time. General disadvantages of microprocessor-controlled devices:
Often provide features like chat, polling, hand raising, and
Q&A sessions, fostering interactivity and engagement lead to more wasteful devices
among participants. can be more complex to operate for technophobes
leaving devices on standby is wasteful
Disadvantages:

Heavily relies on internet connectivity and technical


Data Security Issues
infrastructure.
Any home appliance managed remotely could provide
Can be susceptible to distractions and multitasking.
hackers access to your personal information. These devices
Often have various features and settings that participants
frequently have default (or no) password settings, which
need to familiarize themselves with, especially if they are
makes it simple for attackers to get sensitive information. For
new to the platform.
instance, it is easy to discover holiday dates by hacking into a
central heating controller (or the software used to interface
5. ## 5.1. THEORY with it), making a home an obvious target for break-ins. It is
likely for a hacker to obtain important information, such as
credit card numbers, if the refrigerator or freezer
The Effects of Using IT automatically orders goods from a retailer.

A microprocessor-driven labour-saving machine enables Social interactions


users to focus on other activities while the machine
completes its work. The second generation of devices The positive aspects include:
containing microprocessors is more user-friendly and has
more functionality, such as "intelligent tuning" in easier to make new friends using chat rooms
television sets. easier to find people who share similar interests/hobbies
less expensive to keep in touch using VoIP technology.
Advantages of microprocessor-controlled labor-saving
devices: The negative aspects include:

no need to do manual tasks at home people do not meet face-to-face as much (social isolation)
more time for leisure activities a lack of social interaction may make people more
anxious of meeting people in real life
no need to stay home while chores are being done
web-enabled devices allow devices to be switched on or when communicating online, people can act less polite or
off while the owner is out more harshly, and cybercrime is a serious issue,
automated burglar alarms give a higher sense of security especially for teenagers.
and well-being
smart fridges and freezers prevent food waste by keeping Monitoring and controlling transport
track of products’ expiry, availability, etc.
Uses:
Disadvantages of microprocessor-controlled labor-saving
devices: monitoring traffic on motorways
congestion zone monitoring
unhealthy lifestyle due to inactivity caused by devices automatic number plate recognition (ANPR)
doing all tasks automatic traffic light control
tend to make people lazy air traffic control systems
potential deskilling railway signalling systems
any device containing a microprocessor and can
communicate using the internet displays a threat of Advantages of transport monitoring and control systems:
cybersecurity breaches
smart motorways keep updating according to changing
traffic conditions

WWW.ZNOTES.ORG

You might also like