0% found this document useful (0 votes)
221 views49 pages

Znotes Ict

cool

Uploaded by

Perez Abakwile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
221 views49 pages

Znotes Ict

cool

Uploaded by

Perez Abakwile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
  • Types and Components of Computer Systems
  • Operating Systems
  • Mobile and Emerging Technologies
  • Input & Output Devices
  • Storage Devices & Media

ZNOTES.

ORG

UPDATED TO 2017 SYLLABUS

CAIE IGCSE
ICT (0417)
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE ICT (0417)

Control unit - coordinates input and output devices


and carries
out program instructions
1. Types and Components of Arithmetic and Logical Unit (ALU) - performs
calculations and
logical comparison: A < B?
Computer Systems Immediate access store (IAS) - holds data and
program
instruction in current use
1.1. Hardware & Software Microprocessor:
Used instead of CPU
Single integrated circuit
Hardware

They are the physical components that make up a


Internal/Main Memory
computer system
You can feel it or touch it
Stores all data: application software, operating system,
Hardware can be internal or external data files
Internal Hardware Devices:
Consists of ROM and RAM
Processor
Both RAM and ROM are integrated chips
Motherboard
RAM:
RAM & ROM
Random access memory (RAM) is an internal chip
Video & Sound Cards
where data is
stored temporarily
Internal Hard Disk Drives
Memory can be written to and read from
External Hardware Devices:
RAM > ROM (usually; except washing machines)
Monitor Stores anything that needs to be changed
Keyboard
All program and data being used are on RAM
Mouse Contents lost when computer is turned off
Printer
Referred to as volatile memory
External Storage Devices
ROM:
Read only memory (ROM) is memory used to store
permanent
information
Software
Used to contain configuration data for a computer
etc.
Programs that control computer systems
Set of instructions that make the computer do something Chips cannot be altered, only read from
You cannot physically touch software Data not lost when computer is turned off
Relates to ideas & instructions for using physical objects Referred to as non-volatile memory
BIOS:
Two types of software: ROM contains boot file, referred to as BIOS (basic
input/output
system)
Application software: Tells computers what to do when it first starts
Programs that allow the user to do specific task Does hardware check when computer is turned on
Design to carry out tasks Then it loads operating system into RAM
Can be general purpose software or custom-made BIOS stores date, time and system configuration
software
(specialist software)
E.g. Spread sheets, databases, word processing
 
System Software:
Programs that allow the hardware to run properly
Input & Output Devices
Control computer's hardware and application
program Input devices:
Communicate with user Purpose is to provide data for processing
E.g. Operating system, device drivers, compilers Data is raw facts which alone have no meaning
Examples: keyboard, mouse
1.2. The Main Components of Computer Output devices:
Displays result of processing
Systems Information is processed data which has been given
meaning
CPU Examples: monitor, printer

Processing done by central processing unit


Three main components: Secondary/Backing Storage

[Link]
CAIE IGCSE ICT (0417)

Stores data/information & programs not being used at Uses a mouse to select the icons
current time Screen divided into windows allows different things on
Backing store device = reader or recorder each
Example: Hard disk drive WIMP - Windows Icons Menus Pointers
Backing store media = hardware containing data Advantages
Example: Hard disk Easy to use because requires little IT knowledge
Easy to explore and find your way around the system
Do not have to learn complicated commands
Basic Computer Model Exchange data between different software
Good help facilities provided with GUIs
Disadvantages
Larger amount of hard disk space than other
interfaces
Significantly more memory (RAM) to run than other
interface type
GUI use more processing power than other types of
interfaces
GUI can be slow for experienced programmers to use,
they find CLI much faster
1.3. Operating Systems
1.4. Types of Computers
Enables users to communicate with computer systems
Controls operation of input, output & backing storage Desktop/Personal Computers
Supervises loading, running & storage of application
program Refers to general purpose computers
Deals with error in application programs PC refers to IBM compatible computers, distinguishing
Maintains security of whole computer system them from the
Macs
Maintains a computer log Made up of separate monitor, keyboard, mouse and
Two main types of interfaces: CLI & GUI processing unit
Advantages
Spare parts standardized results in low costs
CLI - Command Line Interface Tend to have better specifications
Large casing allows good dissipation of heat build up
Types commands to tell the computer what to do
Disadvantages
The user must know all the commands
Not portable since they are made up of separate
Must not make typing errors
components
Used by technicians
Wiring clutters up desk space
Can access everything on the computer system
Necessary to copy files as they aren't portable
GUI users can only access places they have icons for
Advantages
Knowing the correct commands, this can be much Laptop/Notebook Computers
faster than any other interface type
Uses much less RAM than any other interface type Refers to computers where monitor, keyboard, pointing
Low resolution, cheap monitors can be used device and
processor together in a single unit
CLI does not require Windows to run Extremely portable systems
Disadvantages Low weight
Can be confusing Low power consumption
Commands must be typed precisely, if there is a Processor doesn't generate too much heat
spelling error the command will fail Advantages
If you mistype an instruction, it is often necessary to Portable because monitor, pointing device, keyboard,
start all over again processor &
backing store units are together in one
Large number of commands need to be learned box
No trailing wires
Full advantage of Wi-Fi
GUI - Graphical User Interface Can link into any multimedia system
Disadvantages
Uses graphics to stand for the complicated actions
Easy to steal
Uses icons
Limited battery; need to carry charger

[Link]
CAIE IGCSE ICT (0417)

Keyboard and pointing device awkward to use Impact on everyday life:


Heat dissipation is difficult due to laptop structure Can be used to accurately predict hazardous weather
conditions
and signal warnings automatically
Take over menial tasks for humans; increasing our
Tablet Computer leisure time
Can be used for safer automated travel; cars that can
These are small hand-held devices that can perform drive and
park by themselves
many functions
that PCs & laptops do Increases home safety by being able to tell the
Often use touch screens to operate difference
between owner & intruder; call authorities
On-screen virtual keyboard replaces physical keyboard automatically
Often used by graphic designers to digitalize their content Improved medical care as decision making skills and
with a
stylus pen precision
can be enhanced
Can be used like a PC and/or a Smartphone
Advantages:
Small light & portable Biometrics
Built in cameras for photos & videos
Touchscreen can be used with a stylus pen A part of a person’s body is used to identify that
Long battery life individual
Disadvantages: Can be:
Less storage spaces Fingerprints
Lacks power of laptop/PC Retina
Digital keyboard can be difficult to use Iris
Touchscreen may be difficult to use for detailed work Face
Voice
These are all unique to everyone thus can be used as an
Smartphone authentication technique
Must be added initially to a system to use as identification
Modern phones that can perform similar tasks to all the Impacts on everyday life:
above Better security at the airport since most use at least
Main use of smartphones is social media & day-to-day one form
of biometric check if not more
planning Increased security in certain places as only authorized
Use varies from person to person personnel can gain entry
Advantages: Reduced vehicle theft since newer car doors come
Smallest lightest most portable with a
fingerprint lock on the door handle
Integrated/virtual keyboard More secure mobile devices as most now have some
Often the least expensive device sort of
biometrics integrated into them
More practical for day-to-day use
Disadvantages:
Small screen may be difficult to use Vision Enhancement
Not as powerful as other devices
Often has the lowest battery life LVES: low vision enhancement systems: video projected
Small size makes it easy to steal/lose inside a
headset in front of the user’s eyes. Brings the
objects closer for
the viewer.
1.5. Impact of Emerging Technologies NVE: Night vision enhancement: amplifies visible and
infrared light.
Light passed through image intensifier tube
This is technology that is being newly developed where light is converted
to electrons, then amplified
These can have several impacts on our society (increase in no.) and then light up
screen with phosphor
dust.

Artificial Intelligence (AI)


Robotics
Technology that focuses on creating a computer system
that can
closely mimic or simulate human intelligence Programmed machinery widely used to do physically
AI can be used to: demanding tasks
Enhance video games and computer tactics Can be automated or manually operated
Help decision making steps in expert systems Used to perform several tasks:
Make robots to imitate human behaviour Dangerous jobs such as bomb disposal
Understand different human languages Exploring extreme environments such as volcanoes
Repetitive manufacturing jobs such as welding

[Link]
CAIE IGCSE ICT (0417)

Moving heavy objects such as large engines Improved security since majority of credit/ID cards &
Impacts on everyday life: bank notes
use holograms to prevent forgery
Increased personal time since robots can take over Better movie experiences since 3D viewing can
domestic
chores provide a more
immersive experience for the
Increased manufacturing efficiency since robots are audience
much faster
and less expensive than human labour Greater data storage since holographic layers can
Unemployment as robots replace humans in potentially
decrease the thickness of disc storage
autonomous jobs
Safer working environments since robots can perform
tasks that
are too dangerous for humans Virtual Reality (VR)

When computers create an artificial environment that


Quantum Cryptography users can
virtually interact with
Uses:
Technology that allows messages and data to be sent Allow architects to walk around a virtual version of
with complete
privacy; basically, advanced encryption their
design
Older encryption is based on mathematics, but this new Training soldiers for combat by allowing them to fight
tech uses
physics against
virtual enemies
Makes it much more complex to decrypt Training surgeons by allowing them to operate on
Impacts on everyday life: virtual
patients
Completely secure voting ensuring that votes cannot Playing games and enhance the level of immersion
be tampered
with or changed General VR equipment:
Completely secure communication eliminating the Eye goggles that produce 3D images to develop the
risk of being
read/heard by the wrong eyes/ears artificial
environment
Completely secure bank transactions so money goes Special gloves or controllers to perform precise
exactly where
it is intended actions inside
the simulation
Completely secure personal information preventing Headphones to control what is heard in the virtual
hackers access
to intrusive details about a person world
Powerful computer to run the entire VR system in real
time
Computer Assisted Translation (CAT) Impacts on everyday life:
Improved medical surgeons/soldiers
When human translators use computer software to help Stronger buildings
in the
translation process Treatment of phobias as certain situations can be
Can reduce translation time treated using
simulations
May not be 100% accurate More realistic education as students can learn in a
Common CAT tools: more
interactive environment
Spell checkers
Translation memory software
Language search-engine software 2. Input & Output Devices
Impacts on everyday life:
More accurate documents since most software can
automatically
detect errors 2.1. Input Devices & their Uses
More multilingual society since anyone with an
internet
connection can now essentially learn multiple Keyboards
languages using
translators
Quicker translations

3D & Holographic Imaging

Technology that makes images appear to be 3- QWERTY- layout


dimensional by adding a
layer of depth Ergonomic- reduces health related problems
Holograms use 2 regular 2D images and manipulate them Uses
to produce a
3-dimensional image Keyboards are used to input data into application
Different laser beams are used to record the 2D images software
onto a single
photographic plate Also used to for typing commands to the computer
This creates an illusion of one 3D images (CTRL + P)
Impact on everyday life: Advantages

[Link]
CAIE IGCSE ICT (0417)

Enables fast entry of new text into a document Used for controlling the position of a pointer on the
Well-tried technology & well-known method of entry screen to
allow:
Most people find them easy to use Selection from a menu
Easy to do verification check as data is entered, as it Selecting an icon
appears
on the screen simultaneously Scrolling up/down and right/left
Disadvantages Advantages
Users with limited arm/wrist use can find keyboards Faster to select an option by a mouse than a keyboard
hard to use Enables rapid navigation through applications and the
Entering data is slow when compared to direct data internet
entry (e.g.
Optical mark recognition) Mice are small and don’t take much area
They use up desk space as they are quite large Disadvantages
People with restricted hand/wrist movement can find
it hard to
operate a mouse
Numeric Keypads Easily damaged and can easily be clogged up with dirt
They are hard to use if there is no flat surface
available

Touchpad
A numeric keypad is used to enter numbers only
Touchpads are used in many laptop computers as a
Although some have function key to allow input of pointing device
alphabetical
characters The pointer is controlled by the user moving their finger
Uses
on the
touchpad
Used in Automatic teller machines (ATMs), where
Uses
customers can
key in their personal identification Used for opening, closing and minimising software
number (PIN), or an amount
of money Used for grouping, moving and deleting files
Used to key in phone numbers into telephones Useful when editing images (e.g. controlling the size
Electronic point of sale (EPOS) terminals have numeric
and
position of the image)
keypads
in case the barcode reader fails
Used for controlling the position of a pointer on the
Used in Chip and PIN devices to key in PIN, or amount screen to
allow:
of money Selection from a menu
Used to enable fast entry of numeric data into a Selecting an icon
spread sheet
Advantages
Advantages
Faster to select an option by a touchpad than a
Numeric keypads are faster than standard keyboards
keyboard
for entry of
numeric data Enables rapid navigation through applications and the
Since many are small devices (e.g. mobile phones), internet
they are easy
to carry around
Since the touchpad is integrated into laptop
Disadvantages
computer, there is
no separate mouse, aiding
Can be difficult to use due to the very small keys portability
Difficult to use for entering text They can be used when no flat surfaces are available
Sometimes the order of numbers isn’t very intuitive Disadvantages
People with limited hand/wrist movement can find
Mouse touchpads hard
to use
It can be more difficult to control the pointer when
An example of a pointing device compared to
a mouse
The ball underneath the mouse is used to detect They are more difficult when doing operations such as
movement ‘drag and
drop’
The left button is for selecting by double on it and the
right is to
bring drop-down menus
Tracker Ball
There is usually a scroll button which speeds up the
process of
moving through a document
Uses
Used for opening, closing and minimising software
Used for grouping, moving and deleting files
Useful when editing images (e.g. controlling the size Tracker ball is like a mouse except that it has a ball on the
and
position of the image) top of
the device

[Link]
CAIE IGCSE ICT (0417)

Users control the pointer on the screen by rotating the Video/computer games are often controlled by
ball joysticks
Uses They are used in simulators to mimic actual controls
Have the same pointing/cursor control capability as a Advantages
mouse Easier to navigate round a screen compared to a
Used in applications where the user has a disability keyboard
(RSI) Control is in three dimensions
Used in a control room environment, where it is faster Disadvantages
than a
mouse to navigate through process screens More difficult to control the on-screen pointer with a
and more robust than a
mouse joystick
than with other devices such as mice
Advantages
Tracker balls don’t need the same fine control as a
mouse Touch Screen
People with limited hand/wrist movement find easier
to use than
a mouse User can choose an option by simply touching a
The pointer can be positioned more accurately on the button/icon on the
screen
screen than
with a mouse The selection is automatically made without the need for
They take less desk space than mice since they are any
pointing device
stationary Use
Disadvantages Used for service tills e.g. petrol stations
Tracker balls are not supplied with the computer as Used where selections are made on a screen e.g.
standard, so
they are more expensive ATMs, public
information systems, airports and
User may need training since they are not standard railway stations
equipment Used in PDA’s
Used in Interactive white boards
Used in computer-based training (CBT)
Remote Control Advantages
Enable faster entry of options than a keyboard/mouse
A remote control is used to control the operation of other Very easy to choose options
devices
remotely by using infra-red signals User friendly method for inputting data
Uses They are tamperproof, preventing people from
In home entertainment devices such as Televisions, keying in
information (which could corrupt the
DVD
player/recorder and satellite system system)
Used to control multimedia systems Disadvantages
Used in industrial applications to remotely control There is a limited number of options available
processes,
stop and start machinery Using touchscreens often can lead to health problems
Advantages e.g.
(straining of arm muscles and RSI)
Enable devices to be operated from any distance, The screen can get very dirty with constant touching
which is useful
for people with disabilities
Some chemical processes are hazardous, so it is safer
to operate
equipment from a distance Scanners
Disadvantages
People with limited hand/wrist movement can find Used to input information on hardcopy e.g. text
them hard to
use document
The signal between the control and the device can be Uses
easily
blocked Used to scan in documents and convert them into a
format for use
in various software packages
Old and valuable documents and books can be
Joystick scanned, protecting
the original copies from damage
Non-digital photographs can be scanned for storing
on a computer
Advantages
Images can be stored for editing later
Scanners are much faster and more accurate than
typing in
documents again
By gripping the stick, a pointer on the screen can be
It is possible to recover damaged documents and
controlled
photographs by
scanning them and then using
Buttons are used to make selections
appropriate software to produce an
acceptable copy
Uses

[Link]
CAIE IGCSE ICT (0417)

Disadvantages
The quality can be limited depending on how good Microphone
the scanner
resolution is

Digital Cameras

Can be connected directly to a computer


Sounds can be inputted and manipulated
Photographs are stored in memory Uses
They can be easily transferred to a computer using a USB Microphones are used to input speech/sounds to be
Uses used in
various applications
Digital cameras can produce photographs for direct They are used in voice recognition software- for
transfer to a
computer or to print out conversion of
speech into text, and recognition of
Digital cameras allow short video clips to be produced commands
Photographs can be uploaded directly into application Advantages
software
such as word processor Faster to read in text than to type it using a keyboard
Advantages Possible to manipulate sound in real time using
Easier to produce better quality photographs than special software
with a
tradition camera If used in a voice activation system, this has the
Easier and faster to upload photographs to a advantage of
improving safety
computer Disadvantages
There is no need to develop film and print out Sound files can use up a lot of computer memory
photographs
(saves paper and no longer needs the Voice recognition software isn’t as accurate as typing
chemicals to produce
photographs from films) in
manually
Easy to delete an image from the memory if it’s not
satisfactory
The memory card can store several hundred Sensors
photographs
Disadvantages Type of sensor Applications
The camera user needs to be computer literate to use Automatic washing machines,
the camera
properly Temperature central heating systems, automatic
There is some artistry lost since clever software green houses, ovens
corrects
errors in the photographs
Burglar alarm systems, robotics,
The resolution is not yet as good as traditional
Pressure environmental monitoring,
cameras
Automatic washing machines
Images often need to be compressed to reduce the
amount of
memory used Automatic doors, street lighting
It is possible to fill up computer memory very quickly Light control, Burglar alarm systems,
with
several photos of the same subject (to find the automatic greenhouses
perfect snap
shot) Burglar alarm systems, monitoring
Sound
liquid and powder flow in pipes
Automatic greenhouses,
Video Camera Humidity/moisture environmental monitoring, factories
where moisture levels are crucial
DV (digital video) camera store compressed photo frames
at 25 MB/s – motion jpeg. Automatic greenhouse, chemical
Light turned into electronic signal through light sensitive pH processes, environmental
sensors and automatically converted to a digital file monitoring
format.
Advantages Advantages
Easy to edit footage in a video editing. Readings by sensors are more accurate than taken by
High quality video captured, therefore humans
Disadvantages Readings are continuous, there is no break in
Storage medium (Memory cards) more expensive to monitoring
buy than films.

[Link]
CAIE IGCSE ICT (0417)

Because it is a continuous process any necessary


action or
warning will be initiated immediately
The system can be automatic, removing the need for
human
intervention, this is particularly important if
the process is
hazardous Used to read information on the magnetic stripe
Disadvantages The stripe contains useful information such as start and
Faulty sensors can give spurious results expiry date
Uses
Credit and debit cards have magnetic stripes that are
Graphic Tablet used by
ATMS or EFTPOS (electronic funds transfer
point of sale)
terminal
Security cards for entering building e.g. hotel rooms
Travel systems e.g. train and underground tickets
Advantages
Data entry is fast compared with keying in using a
A graphic tablet is used with a stylus to produce freehand keyboard or
keypad
drawings System is error free, no typing involved
Uses Information is secure since there is no typing and the
Graphics tablets are used to produce drawings, information can’t be read directly by a person
computer graphics Can prevent access to restricted/secure areas
In countries where characters are complex e.g. japan, Magnetic stripes are unaffected by oil water and
they are
used as a form of input moisture
They are used in computer aided design (CAD) work No moving parts therefore physically robust
Advantages Disadvantages
It is possible to modify drawings before they are input If the magnetic stripe is damaged the data is lost
They offer an accurate method of drawing Card needs to be in close contact with the reader
Disadvantages Since the information is not human readable, they
They are more expensive than other pointing devices need to find a
way to show the information to the
customer (e.g. hotel room
number not printed on
cards)
Web Cam

Chip & PIN readers

Connected directly to a computer via a USB port


Uses
While chatting online webcams can be used to have
conversations The device has a slot where the card is placed, and the
Used to enable video conferencing to take place chip is read
Advantages A small screen is part of the reader which gives
Can be left on constantly and activated when required instructions to the
operator
Allow people to keep in contact with each other Uses
without the need
to travel, particularly useful for Chip and PIN readers are used where payments are
disabled or elderly people made using
cards e.g. travel agents
Disadvantages Advantages
Webcams have limited features and the picture is Provide a more secure payment system than
often of poor
quality requiring a signature
or using magnetic stripe, since
They need to be connected to a computer the PIN typed in must match up
with the PIN stored
on the chip
2.2. Direct Data Entry & Associated Provide a more robust system than magnetic stripe
since the chip
does not need to be in contact with the
Devices reader
Disadvantages
Magnetic Stripe readers Customer needs to be careful when typing in the PIN,
so nobody
reads it giving an opportunity for Fraud

[Link]
CAIE IGCSE ICT (0417)

OMR devices are used to read questionnaires,


Radio Frequency Identification (RFID) Readers multiple choice
examinations papers and other types
of forms in the form of
lines or shaded areas
RFID readers work in similar ways to a bar code reader Advantages
An RFID tag is attached to/inside a surface A very fast way of inputting results of a survey
The reader reads the data held on the tag which is then Since there is no typing, it is more accurate than
input into
the computer system for processing keying in
data
Radio waves are used to transmit data thus can be used OMR is more accurate than OCR
through most
materials Disadvantages
Uses Forms need to be carefully designed to make sure
Used in retail or supermarkets as barcode alternatives that the
marks/shadings are correctly positioned to
Used to identify pets gather accurate
information
Used in passports There can be problems if forms aren’t filled correctly,
Advantages sometimes they must be checked manually before
Can hold a lot of data being read by an
OMR, this is both time consuming
Can be read from long distances and expensive
Does not require direct line of sight
Information can be read faster than barcodes
Can alter information Optical Character Reader
Disadvantages
Thieves can steal information easily
RFID tags are expensive
Radio waves can experience interference
\
Optical Character recognition is a software that takes
scanned text
and converts it into a computer readable
Magnetic Ink Character Reader (MICR) form
Uses
Processing of passports and Identity cards
OCR is used when scanning documents to modify
them using a
suitable software
Advantages
Much faster data entry system than manually keying
Magnetic ink character recognition is a system which can
in data
read
characters printed in a special ink
Since there is no manual data entry, the number of
Uses
errors is
reduced
Used to process cheques in banking operations –
Disadvantages
cheque is read
using a batch processing method
The system has difficulty reading handwriting
Advantages
It is still not a very accurate technique
MICR offers great security than OCR since the
oriented
characters cannot be altered  
There is no manual input, thus errors are reduced
If somebody writes over the magnetic ink characters,
it can
still be read Barcode readers
Disadvantages
Only certain characters can be read, and the number
of different
characters is very limited
It is a more expensive method than other methods
used for direct
data entry
Used to read information in the form of a barcode
Optical Mark Reader Handheld scanners or wands are very common for
reading barcodes
Uses
Used in supermarkets and other shops where the
goods are marked
with a barcode
Optical mark recognition is a system which can read Used in libraries to scan user’s library card and
marks written in
pen or pencil barcodes on
books (to keep track of books on loan)
Uses

[Link]
CAIE IGCSE ICT (0417)

Used as a safety function in many companies to


ensure that
electrical equipment is checked on a
regular basis
Advantages
Faster than keying in information, and fewer mistakes
are made
Used as a way of recording data, can improve safety
Barcodes enable automatic stock control Thin Film Transistor monitors
Barcode scanning is a tried and trusted technology Taking over from CRT monitors as the main output device
When an item price is changed, only the central The progress in TFT technology is one of the reasons for
database needs
to be updated, there is no need to the rapid
development of laptop computers
change the prices
individually on each item The screen is made up of thousands of tiny pixels which
Disadvantages are made up
of transistors controlled by a
Barcode scanning is an expensive system to microprocessor
administer since
every item in the shops needs a Each pixel has three transistors-red, green or blue; the
barcode and every barcode needs
to be entered on intensity
of each determines the colour of the pixel seen.
the system Uses
Also, there is a need to invest in the computer Primary output device for computers, user can
technology
together with staff training, which can all immediately see
what they are typing in
be expensive Integral part of laptop computers
The system is not fool proof- barcode can be swapped Advantages
around on
items Lightweight, so no weight hazards like CRT monitors
Less glare produced than in CRT monitors; also emit
less
radiation
2.3. Output Devices & their Uses
Consume much less power and generate less heat
than CRT monitors
CRT Monitor Disadvantages
Angle of viewing is critical; image appears unclear if
Cathode Ray Tube monitors
viewed
slightly from the side
Least expensive type of monitor, becoming rarer as TFT
This is an issue if several people are looking at the
monitors take
over
screen at
the same time
Come in various sizes
They cannot yet be used with light pens,
Picture created is made up of tiny dots (red green or
blue), the
intensity of the colour of the dot determines
the colour perceived
by the eye IPS/LCD Monitor
Uses
Primary output device for computers, user can Front layer made from liquid crystal diodes; grouped
immediately see
what they are typing in together to
form pixels (RGB or RGBY-more vivid colours)
Used with light pens to allow designs to be created on Receive analogue and digital signals, although most
screen modern
projectors only work with digital inputs
Advantages IPS (In-plane switching) is the technology used in LCD
Produce higher quality images than TFT monitors monitors.
Angle of viewing is better than a TFT monitor Advantages
They work with light pens in CAD and CAM Colour can be seen accurately from different viewing
applications (Computer
Aided Design/Manufacturing) angles
Disadvantages No lightening on touching
Tend to be heavy, weight hazard if not supported Disadvantages
properly Expensive
Run very hot, can cause fires if left unattended – High power consumption
especially if
they are old Slow response time
Consume more power than TFT monitors Note: Old LCD monitors used CCFL (cold cathode
They can flicker, this leads to headaches and eyesight fluorescent lamp)
technology to light up the screen.
problems
with prolonged use

LED Monitor:
TFT Monitor
Front layer made from light emitting diodes; grouped
together to
form pixels (RGB or RGBY-more vivid colours)

[Link]
CAIE IGCSE ICT (0417)

For the image to show up on-screen a light source of LED Home cinema systems (projecting the images from a
backlight
is used. DVD or
television) use multimedia projectors
Advantages (over LCD monitors): Advantages
Lighter and thinner Enables many people to see a presentation rather
Longer life than all of
them crowded around a small computer
Lower power consumption screen
Greater contrast and more vivid colour Avoids the need for several networked computers
Relatively more robust e.g. when looking at a video clip on the internet,
Disadvantages everybody can
see the video on the large screen
Glare gives viewers headaches rather than logging on to
several computers
Images too sharp, so can cause eye strain Disadvantages
Images can sometimes be fuzzy
Expensive to buy
Touch Screen Setting up projectors can be a little difficult

Automatic selection without a pointing device


Uses Laser Printer
Automatic teller machines
EFTPOS (electronic fund transfer point of sales)
PDA
Smartphones
Public information points
Advantages
Faster data entry
Easy to choose options Produce very high-quality hard copy output
User-friendly and intuitive Print rate per page is fast if many pages are being printed
Disadvantages Rely on large buffer memories – the data for the whole
Limited options document is
stored before pages can be printed out
Frequent usage can lead to RSI, etc. Uses
Constant usage results in the screen getting dirty; Used where noise levels need to be kept low e.g. in an
visibility
and sensitivity decreases office
The best option for fast, high quality, high volume
printing
Multimedia Projector Advantages
Printing is fast for high volumes, slightly faster than
inkjet
if only a few pages are to be printed
Can handle very large print jobs
Quality is consistently high
Toner cartridges last for a long time; laser printers can
be a
cost-effective option if colour outputs are not
Receive analogue and digital signals, although most
required
modern
projectors only work with digital inputs
Disadvantages
The signal source is usually from a computer, television,
Expensive to buy
or DVD
player
Only fast if several copies are being made
The image from the source is magnified and projected
Colour laser printers tend to be expensive to run
onto a large
screen
since four
cartridges are needed as well as diffuser
The devices usually work with a remote control, but can
kits, etc.
also use
virtual mouse technology – cordless PC mouse
Produce ozone and volatile organic compounds
(has a laser pointer)
because of their
printing method and type of
It is then possible to direct the presentation without
toner/ink used
being
tied to the computer
These have been linked to health hazards in the office
Most multimedia projectors take input from various
types of
video format e.g. PAL, NTSC or SECAM
Uses Inkjet Printer
Used for training presentations (allows the whole
audience to
see the images from a computer)
Also used for advertising presentations (shown at
exhibitions,
shopping malls etc.)

[Link]
CAIE IGCSE ICT (0417)

Disadvantages
Very noisy – not good in an office environment
Cost more than an inkjet printer to buy
Very slow
Printing is of poor quality

Used to produce good quality hard copies – the quality is


not as
good as in laser printers but much better than that Wide Format Printer
of dot matrix
printers
Do not have large buffers like laser printers, so printing is
done a
bit at a time
Therefore, printing is sometimes paused – the whole
page can’t be
stored in the buffer, it must wait for the
computer to send more
data
Uses
Devices that produce hard copies but operate in a
Used where low volume outputs are needed
different way to
printers
Ideal for high quality printing for small print jobs or
Not limited to normal printer paper size and can produce
single
pages e.g. for photo quality printouts
highly
accurate, very large drawings and posters
Advantages
The most common types are pen plotters, electrostatic
High quality output
(similar
method to laser printers) and inkjet plotters
Cheaper to buy than laser printers
With pen plotters, coloured pens are controlled by a
Very lightweight and take up little space (small
computer
and the paper can move backwards and
footprint)
forwards to allow accurate
shapes to be drawn
Do not produce ozone and volatile organic
Uses
compounds, unlike
laser printers
Used to produce large drawings e.g. blueprints of
Disadvantages
buildings; are
often used with CAD applications
Output is slow if several copies needed – there is little
Used to produce large pictures for use on billboards
buffer
capacity to store the pages
or giant
posters
The ink cartridges run out too quickly to be used for
They can also print on plastic coated paper
large
print jobs
If the pens are replaced by cutting tools, it is possible to
Printing can smudge if the user is not careful
make
large signs
Can be expensive to run if they are used a lot –
Advantages
original ink
cartridges are expensive
Can produce huge printouts
Print quality is extremely high
Disadvantages
Dot Matrix Printer
Slow in operation
Expensive to buy and maintain

3D Printer

A type of impact printer


A print head made up of a matrix of pins presses against
an inked
ribbon
Uses
Can be used in noisy environments e.g. garage
workshops A new type of printer that produces solid 3D models
Can be used in applications were the print quality is using modified
inkjet technology called tomography
not very
important Very thin layers of fine powder (plaster, resin, starch) are
Advantages bonded
together as a 3D model is slowly built up
Can be used in environments which would be a Items produced are known as prototypes
problem for laser
and inkjet printers – dusty, dirty or Uses
moist atmospheres Used to produce prototypes which work from CAD
Carbon copies or multi-part outputs can be produced packages,
photograph images, stored drawings etc.
Very cheap to run and maintain Scale models are produced in colour before the real
Easy to use if continuous stationary is required e.g. thing is
manufactured
long print
jobs such as wage slips

[Link]
CAIE IGCSE ICT (0417)

The ultimate objective is to produce organic objects e.g. operating motors, pumps,
switches and valves
using this
layering technology (such as replacement Digital signals are sent from the computer to an actuator
human organs) to operate
a device
Advantages Conversion of the digital signal to analogue is required
Save a lot of money, other methods of making first
(using a DAC)
prototypes are very
time consuming and expensive
The powders used can often be ground up and
reused Motors
Physical scale models are produced with working
parts, which
gives a better idea of how the product
will look
Disadvantages
Expensive to buy
Turned on or off by the actuator
Slow at producing their output
Uses
Product is sometimes a little rough, often further
Used in many domestic appliances
work needs to
be done
Automatic washing machines (to make the drum
rotate)
Cookers (to switch on fans)
Speakers
Water pumps in central heating systems
Automatic greenhouses to open windows and switch
on fans
Used to control robot arms in the industry
Operate fans, disk drives and DVD drives in
computers

Can be connected directly to a computer or are built into Buzzers


the
monitor or casing (as in laptop computers)
Switched on or off by the actuator
Uses a digital to analogue converter (DAC) to convert
Uses
digital data
from the computer to analogue from so the
Used in cookers and microwave ovens to tell the
speakers can process it;
the signal is then amplified
operator when
the cooking process is complete
through the speakers.
Used in burglar alarm systems to warn if intruders are
Uses
present
Used to output sound from multimedia presentations
Used in home entertainment centres
They can help blind people through audio output of Heaters
text on the
screen (together with speech generation
software) Actuators are connected to switches which turn the
Used to play downloaded sound files heater on or off
Advantages Uses
Usually long lasting and durable (if operated within Used in automatic washing machines, cookers and
their
intended power levels) central heating
systems
Often provided with the computer/laptop although Used in automatic greenhouses to control the
these may not
be the best quality temperature
Disadvantages
Can take up a lot of desk space, compared to
headphones Lights
Can distract people around you, everyone can hear
what you are
playing The actuator is connected to the switch that turns the
May not be able to hear the full sound spectrum, this lights on or
off
requires
multiple speakers Uses
Security lights
Used in greenhouses to control the lighting conditions
Actuators

A type of controlling device 3. Storage Devices & Media


Transducers that are used to take signals from a
computer and
convert them into some form of motion

[Link]
CAIE IGCSE ICT (0417)

3.1. Magnetic Backing Storage Media CD-ROM/DVD-ROM

Read only memory – cannot be overwritten


Fixed Hard Disks/Drives
Data is stored as a series of pits and lands formed by a
laser beam
etching the surface at manufacturing stage
Available on all computers and is the main method used
Uses
for data
storage
Uses a read/write head to write and read data from it Store music files and software.
Very large storage capacity and are used to store
Disk surface coated in magnetic film, storage is done by
films.
altering
binary codes to 1s or 0s
Advantages
Uses
Holds more data than floppy disks
Used to store operating systems and working data
Less expensive than hard disk drives
Used for storing application software
Disadvantages
Real time systems and online systems used fixed hard
Data transfer rate and data access time are slower
drives
Used in file servers for computer networks  
Advantages
Very fast data transfer rate and fast access times to
data CD-R/DVD-R
Have very large memory capacities
Disadvantages The letter ‘R’ means the disc is recordable only once and
then it
becomes ROM
Can be easily damaged
They lack portability Use a thin layer of an organic dye as the recording media
DVDs also use an additional silver alloy or gold reflector
Laser beam produces heated spots and unheated spots
Portable & Removable Hard Disks/Drives Uses
They are used for home recording of music (CD-Rs)
Like fixed hard disks but are usually connected via and films
(DVD-Rs)
universal serial
bus They are used to store data for later use
Uses Used in applications where it is necessary to prevent
Can be used as backup systems to prevent loss of the
deletion or over-writing of important data
data Advantages
Can be used to transfer data, files and software Cheaper than RW disks
between
computers Once burned (and finalized) they are like ROM
Advantages Disadvantages
Data access time and transfer rate is very fast Can only be reordered once
Large memory capacities Not all CD/DVD players and can read CD-R
Can be used to transfer information between
computers
Disadvantages CD-RW/DVD-RW
Can be easily damaged
‘RW’ means that these disks are re-writable media can be
written
over several times
Magnetic Tapes & Drives Unlike CD-R/DVD-R they don’t become ROMs
The recording layer uses a special phase-changing metal
Thin strip of plastic which is coated in a magnetic layer alloy
Read and written by read/write head The alloy can switch between crystalline and amorphous
Uses (non-crystalline) phases, thus changing its reflectivity to
Application where batch processing is used light,
depending on the laser beam power
Used as a backup media Spots are produced which can be read by a laser
Advantages System allows data to be written, erased and re-written
Generally, less expensive and very robust technology many times
Data transfer rate is fast Uses
Disadvantages CD-RWs and DVD-RWs are used to record radio and
Access time is very slow television
programs
When updating another tape is needed They are used in closed circuit television (CCTV)
systems
3.2. Optical Backing Storage Media Advantages
Can be re used many times

[Link]
CAIE IGCSE ICT (0417)

Different file formats can be used each time Disks are relatively expensive
Less wasteful than R format since files or data can be Blu-ray disks still have encryption problems
added at
a later stage
Disadvantages 3.3. Solid State Backing Storage
Relatively expensive media
Possible to accidentally overwrite Solid state systems control the movement of electrons
within a
microchip: if the transistor conducts a current,
this is equivalent
to a 1, otherwise it is a 0
DVD-RAM
Have no moving parts, consume much less power and are
Recent addition to optical media group extremely
robust
Used primarily as removable storage devices and are
Unlike other CD and DVD formats, DVD-RAMs have
collectively
known as flash memory
several discrete
concentric tracks rather than a single
spiral track
Gives them advantage that writing, and reading can occur
Solid State Drives
at the same
time
Makes it possible to watch an already recorded television Supports reading/writing data & maintains stored data in
program at
the same time as a different program is being a permanent
state even without power
recorded Functions much like a hard drive but different tech
Recording layer is made from similar phase-changing Built with an array of semiconductors that form its
material to that
used in RW technology memory and
operated using an integrated circuit
Shiny and dull marks represent data to a computer where Uses
they are
interpreted Used to store operating systems and working data
Uses Used for storing application software
DVD-RAMs are used in recording devices such as Used in file servers for computer networks
satellite
receivers to allow simultaneous recording Advantages
and playback Faster than hard disks because they do not need to
They are used in camcorders to store films ‘spin up’ the
disk
Advantages Robust because no mechanical parts
Have a long life (30 years) Read performance is fast even when data fragmented
Can be re written on more than the DVD-RWs Less susceptible to data loss
(100,000 times) Lighter, quieter and require less power than hard
Very reliable as they have built in verification software disks
to
ensure accuracy of data Disadvantages
Access is very fast More expensive than hard disks
No need to finalize the disk Have a smaller capacity than modern hard disks
Very large capacities Lower number of write cycles causing performance to
Ability to read and write data at the same time diminish
over time
Disadvantage
DVD-RAMS are not as compatible as R or RW, many
systems will not
recognize this format Flash Drives/Memory Sticks
More expensive than DVD-RW
Otherwise called pen drive/memory stick/USB stick
Can store several GBs of data and use solid state
Blu-Ray Discs technology
Connected to a computer through USB port and power to
Uses operate drawn
from host computer
Blu-ray disks are used in home video consoles Some expensive software increasingly uses these storage
Used for storing and playing back films methods as a
form of security
PCs can use this technology for data storage or Uses
backing up hard
drives Used to transport files between computers
Camcorders can use this media to store film footage Used as a security device – a dongle – to prevent
Advantage software
piracy
Very large storage capacity Advantages
Data transfer rate is very fast Very compact and portable media
Data access speed is faster than with other optical Very robust
media Disadvantages
Disadvantage Not possible to write protect the data and files

[Link]
CAIE IGCSE ICT (0417)

Small physical size and are easy to lose. Routing tables list all the different routes to other
Lower storage capacity than hard disk networks
Routing table determines best route for data

Flash Memory Cards


Sending Data between Devices
A form of electrically erasable programmable read only
memory (EEPROM) Routers can also send ‘packets’ of data between devices
Uses on different
networks
Used to store photos on digital cameras Each packet contains the data itself and the IP address of
Mobile phones use them as memory cards the
device being sent to
Used in MP3 players to store music Occurs globally using multiple routers & re-routing until
Used as a backup in hand held devices the data
reaches its intended IP address
Advantages
Very compact 4.2. Common Network Devices
Very robust
Disadvantages
Network Interface Cards
Very expensive per Gb of memory when compared to
hard drive disks Used to connect individual computers/devices to a
Has a finite life in terms of the number of times they network
can be read from/written to. NICs come in two distinct types:
Wired: cards that have ports which allow network

4. Networks & the Effects of cables to be


plugged in directly
Wireless: cards that connect to networks using Wi-Fi

Using them signals

4.1. Routers Hubs

A device that enables data to be sent between different They are devices that can have multiple devices
connected to them
types of
networks
Commonly used to connect computers and other Main task is to receive data from different ports and send
it to
each device
network capable devices
to the internet
They can be connected to through cables or wirelessly The information will be received to the device whether its
relevant,
or not

Function
Bridges
Makes decisions on messages being passed between the
networks It connects 2 different types of networks together e.g. a
bus and
star network
Reads information about the message and decides where
the message
should go and the best route for it to get It can only connect networks that use the same way for
handling
messages
there
Formats the messages making it suitable for the new They do this by changing the form of message to suite the
different
type of network
network

How it Works Switches

More efficient than hubs in distributing data


To send data to a specific device, a router needs a
something like
an address Each device has an access control media address MAC
which identifies
it uniquely
Internet Protocol Address: a unique number assigned to
MAC Address: a number unique to each device connected
all
computers and devices connected to the internet
which can determine
its exact physical location to the
network (like fingerprints)
Data sent will have a mac address which tells the source
A router can use this IP to send data from the internet to
the exact
device that requested it and
receiving device
Storing IP Addresses:
Routers store IP addresses in a routing table
Modems

[Link]
CAIE IGCSE ICT (0417)

It stands for modulator demodulator. User can access by web browser


Converts computer’s digital signals (modulates it) into
analogue for
transmission through telephone lines Type of access Description
Reverse this process- analogue signal from a telephone Slowest type (60kbps), Telephone
line into
digital for a computer to process the data Dial up internet access line gets tied up while a dial up
(demodulates it) modem is in operation
The main use is to connect to computer networks over Local cable television operators
long distances using existing telephone lines Cable internet access give user access through cable
networks
Types of Modems:
Fastest download speed
Internet access via DSL
Dial-up modems: operate at 60 kilobits/sec connections (at least 11000kbps)
slow compared to modern standards
Asymmetric: faster at downloading than uploading
(ADSL) asymmetric digital subscriber line modems
4.5. Web Browser
operate at
11,000 kilobits/sec
Software used to retrieve, present & traverse the World
Don’t tie up line while accessing internet, which allows
Wide Web
simultaneous internet access and usage of telephone
World Wide Web: system of interlinked hypertext
Cable modems: allow cable TV users to receive TV signals
documents
accessed via the Internet
as well as
internet access

4.3. Wi-Fi & Bluetooth HTTP Proxy Server

Wi-Fi Type of server that acts as a buffer between a WAN and a


LAN
Any system which allows you to connect to a network or Retrieves web pages and passes them onto the computer
computer
through wireless communication that made a
request
Examples: Stores any page retrieved on the server, which means
WLANs that when a
different computer requests the same page it
PDAs would be available
Laptop computers Speeds up the browsing process
Peripheral devices such as printers
Wi-Fi Hotspots
Wi-Fi systems rely on AP (radio frequency technology) Websites
to enable
the device to receive and send signals
Web is made up of millions of websites and web pages
Wi-Fi hotspots are places where you can access Wi-Fi
Web pages are documents on a computer screen
(free or
paid)
containing various
multimedia and text, pictures
Hotspots are found in public places like Airports,
A website consists of many of these pages linked together
hotels, and
cafés
War driving: The act of driving and searching for
unsecured
Wi-Fi hotspots
Uniform Resource Locator (URL)
This gives a risk to the Wi-Fi system
Web browsers use URLs to retrieve files
They are multiple ways of locating on the internet
Bluetooth Standard form: 4 numbers e.g. [Link]
Alphanumeric form:
Bluetooth is an example of wireless personal area
protcol://web address/path/filename
networking (WPAN)
technology
Where; Protocol is usually http
Spread spectrum transmission (radio waves) is used to
Site address consists of: computer name, domain
provide
wireless links between to devices such as mobile
name, domain
type, and country code
phones and allow
connection to the internet
Path is the web page
A small home network can be created with this system
Filename is the item on the page
Uses
Transfer photos from camera to mobile phone
Wirelessly connect different external devices 4.6. Email
A method for sending text and attachments from one
4.4. Accessing the Internet
computer to
another over a network
Advantages

[Link]
CAIE IGCSE ICT (0417)

Speed of sending and receiving replies is quick Internet Intranet


Low cost (no stamps, paper etc.) Anywhere if you are Only from within the
Not needing to leave home to send the mail Access
connected company
Disadvantages
Possibility of virus threats and hacking
Need for the email address to be correct
Local Area Networks (LAN)
Inability to send bulky objects via emails
Not over a large geographical area (e.g. in one building)
4.7. Internet Service Provider (ISP) Typical LAN will consist of several computers and devices
Devices and computers will be connected to hubs or
These are companies that provide users with access to switches
the internet One of the hubs or switches will usually be connected to
Provider in return for these services is charged a monthly a
router/modem to allow LAN to connect to the internet
or annual
fee In doing so it then becomes part of a wide area network
After paying this fee, a username and password are Advantages
issued which can
be used to connect to the internet The sharing of resources
Communication between users
4.8. Common Network Environments Network administrator can control and monitor all
aspects of the
network
Internet Disadvantages
Easier spread of viruses throughout the whole
A worldwide collection of networks and computers that network
have joined
together Development of printer queues
Uses of the Internet: Slower access to external networks e.g. internet
Web Browsing Increased security risk
Email If main server breaks down, usually the networks will
File Sharing no longer
function
Entertainment
Video Conferencing
Online Banking
Wireless LANs (WLANs)
Advertising & Blogging
Do not involve any wiring or cabling
Social Media
Provide wireless network connection overs a short
distance
Intranet They use radio or infrared signal's instead of cables
Devices known as Access Points (APs) are used for a
Like the internet but only accessible to specific users larger range
Basically, a private internet where outsiders cannot APs usually use spread spectrum technology (larger
connect to it range)
Uses of an Intranet: Advantages
Web Browsing All computers can access the same services and
Email resources
File Sharing No cabling is involved
Schools: share information and learning resources The system is more flexible
with students Adding new computers and devices is very easy
Businesses: share private information within a large Cost is reduced, and safety is improved
company
securely Disadvantages
Security is an issue
Problems and interference can affect the signal
Comparing Internet & Intranet The data transfer is slow than in the wired LAN

Internet Intranet
Phrase Internal Restricted
Wide Area Networks (WAN)
International Network
Origin Access Network
WAN is formed by several LANs being connected through
Purpose Globally share data Privately share data a router or a
modem
Specific company or Some companies set up Private WANs, it is expensive
Audience Wide range of people
organisation however it comes
with a more enhanced security

[Link]
CAIE IGCSE ICT (0417)

It is common to use an Internet service provider (ISP) for Advantages Disadvantages


connections to the internet and communicate via this On-screen keyboard is not
network system
easy to type on
Additional hardware is needed for a WAN: Routers,
modems and proxy
servers
MOBILE PHONES

4.9. Using Different Types of Computers Advantages Disadvantages


to Access the Internet Smallest most portable of all Websites are often not fully
devices displayed
LAPTOP COMPUTERS People more likely to carry Small screen size makes
this wherever they go viewing websites difficult
Advantages Disadvantages Much easier to connect to Small keyboards make it
More portable than desktops internet on-the-go difficult to type
Less portable than
can access internet in more Allow children access to
tablets/smartphones
locations internet anywhere; can be
Larger screen than tablets & Screens not as large as dangerous
smartphones which allows desktop PCs may not appear
easier reading as clearly
4.10. Network Security Issues
Keyboards are bigger than
CPUs are not as powerful as
those on Connection to a network exposes a user to:
those in desktops
tablets/smartphones Hacking: Unauthorised access
given to computer.
Touchpads allows easy Phishing: Phishing involves
getting sensitive
navigation even on slanted information such as usernames, passwords, and
surfaces credit card detail, for malicious reasons, by mimicking
a
reliable webpage on the network
DESKTOP COMPUTERS Pharming: Explained in chapter 8 card 2 (E-Safety)
Viruses: Explained in chapter 8 card 2 (E-Safety)
Advantages Disadvantages
Most websites are designed Not portable so are limited to
Policing the Internet
to be viewed on a desktop use in one room
Have larger keyboards Require keyboard and mouse Currently, the internet has no boundaries
making it easier to type on as extra peripheral devices Anything and everything can be put online
Screens are larger so giving For Policing:
Screen and Monitor consume
an easier and better viewing Prevent illegal material being posted
separate power.
experience People can easily find info on how to become hackers
Cannot usually connect to or make
bombs
Usually use wired internet Prevent children from accessing undesirable websites
devices like Bluetooth
connections which is more Could reduce the amount of incorrect information
speakers without external
stable/reliable than Wi-Fi Against Policing:
adapter
Material already available in other sources i.e. books
Robust Take up large desk space
Very expensive
Good heat dissipation- large Users would have to fund
Bulky to carry around
body. Difficult to enforce rules
Against freedom of information
TABLET COMPUTERS Laws already exist to deal with perpetrators

Advantages Disadvantages
Smaller & lighter than Inappropriate Websites
Larger & less portable than
desktops & laptops making it
smartphones Risk of finding undesirable websites
easier to carry
Risk of doubtful websites which are not genuine
Uses Wi-Fi to connect to the
Larger screen than They could lead to problems such as undesirable web
internet which is less reliable
smartphones links, security
risks
than wired
On-screen keyboards larger Screens are smaller than
4.11. Password Interception
than those on smartphones those on laptops & desktops

[Link]
CAIE IGCSE ICT (0417)

Spyware unique pattern of blood vessels in the


eye of a user using an
unperceived beam of low-energy infrared
light into a
Spyware is software that gathers user information person's eye as they look through the scanner's
eyepiece.
through their
network connections without them being
aware that this is happening Iris Scans: A scanner scans and
Once spyware is installed, it monitors all key presses and
compares the pattern in the iris of a user to a database of
transmits
the information back to the person who sent
stored iris
patterns, if it finds a match, the user is
out the spyware
authenticated. Iris scans are
generally more accurate than
This software can install other spyware software, read
retinal scans.
cookies and
personal information, and change the default
home page or web
browser Face Recognition: Verifies the face of
Anti-spyware can be used to search out this software and
correct the
corruption the person attempting to access the data using a face
recognition
algorithm and identifies facial features by
extracting landmarks, or
features, from an image of the
Weak & Strong Passwords subject's face.

Strong passwords: A random mix of alphabets (uppercase Fingerprint Scanning: Scans the pattern
and
lowercase), numbers, and keyboard symbols (@, %, ^
on fingers and verifies it against a stored database of
etc.)
authenticated
fingerprints using pattern-matching software
Weak passwords: Easy to guess, e.g. users name or date
to allow access to a
user.
of birth or
1234556, etc.
Frequent password changes can help reduce the chances
of password
interception too 4.13. Data Protection Act
Passwords must not be shared; their strength is then of
little use. Failure to abide to rules can lead to fines or
imprisonment
4.12. Authentication Techniques
Rules (SAREF DES SAS)
Magnetic Stripes: Card swiped through a
1. Data must be Fairly and lawfully processed
magnetic stripe reader that authenticates the user after
2. Data can only be processed for the Stated purpose
reading
iron-based magnetic particles on a band of magnetic
3. Data must be A**dequate, Relevant and not Excessive
material on
the card which is also called a magstripe.
4. Data must be Accurate
ID Cards: Usually a photo ID with a QR 5. Data must not be kept longer than necessary (Short
time)
or barcode that authenticates the user. 6. Data must be processed in accordance with the data
Subject’s right
7. Data must be kept Secure
8. Data must not be transferred to another country
unless
(Domestic) they have adequate protection

Passports: Have an RFID chip on it that


Guidelines
responds to a signal sent by a RFID reader that sends
information about
the passport holder to the computer Do not leave personal information lying around
system Lock all filing cabinets when leaving an office
Do not leave computer without locking or logging off
Physical Tokens: A security token
Protect passwords
(sometimes called an authentication token) is a small Change passwords regularly
hardware
device that the owner carries to authorize access Do not fax or email anything of sensitive nature.
to a network service.
The device may be in the form of a
smart card or may be embedded in a
commonly used object 4.14. Network Communication
such as a key fob.

Retina Scans: Scans the


Facsimile (Fax)

A system that scans documents electronically and


converts them into
a bit map image (a bit is a binary digit

[Link]
CAIE IGCSE ICT (0417)

and is a 1 or a 0) It is done in real time and makes use of LAN, if internal, or


Then transmitted as a series of electrical signals through WAN if
through the internet
the
telephone network Uses hardware like; webcam, microphones, speakers and
Receiving fax machine converts the electronic image and monitors
prints it
out on paper It also uses special software like CODEC converts and
It is also possible to generate fax signals from a computer compresses
analogue data into digital data to send down
to allow
documents to be sent to a fax machine digital lines
Saves printing out the document first and then passing it How it works:
through
the fax machine Delegates at one end speak into a microphone and
Fax/modem software in the computer converts the image consider the
webcam
into a form
fax machines can be recognized The other delegates can see them and hear them
Physical Faxing: dedicated fax machine connected via using speakers
and monitors
telephone
line that copies and electronically sends files to However, there are several problems with these as
the dialled
recipient the conference
call often lags and quality not always
Electronic Faxing/Online Faxing: uses the internet to send high.
documents through computers. Also, as travelling tickets increase in price, terrorists
can
use this way of communicating with each other,
Physical Faxing Electronic Faxing increasing risk
Associated with a phone no. Associated with an email
Only address and phone no.
Audio-Conferencing
Need actual fax machine, Cheaper- no fax machine,
paper, etc. paper and ink
Same as video-conferencing but without webcam
No encryption Better safety- encryption VOIP is often used
The signal can get busy No busy signal issues VOIP (Voice over internet protocol) is a method used to
talk to
people over internet
VOIP converts sound (picked up by a microphone) into
Email discrete
digital packets that can be sent to a destination
via internet
A method for sending text and attachments from one Advantage: free and can be used all over the world
computer to
another over a network Disadvantage: sound quality is usually bad
Security Issues:
Identity and service theft
Comparing Faxing & Email Viruses and malware
Spamming (sending junk mail)
Fax Email Phishing attacks (illegitimate scams)
More secure (user id and
Singed faxes are legally
password needed to access
acceptable
files) 5. The Effects of Using ICT
Digital files (no need to print
Poor quality prints at times
– eco-friendly) 5.1. Effects of IT on Employment
Delay is telephone line busy Better quality
Files can be transferred IT led to unemployment in many areas
Slow if several documents Manufacturing - robots have taken over many tasks
between any device
need to be sent and are much
faster
connected to the internet
Computer controlled warehouses – automatic, does
Faster sending of documents
Every recipient must be not need people
per document and even if
dialled up one by one Labour intensive work - printing industry and filing
multiple recipients
New jobs have been created in ICT
Expensive to buy No dedicated device needed Writing software
Maintenance of robots
4.15. Web-Conferencing Internet related jobs

Effects on People:
Video-Conferencing
People need to be retrained due to new technology
This is a method of communication between people at 2 Cleaner working environment
or more
separate locations De-skilling of workforce

[Link]
CAIE IGCSE ICT (0417)

Computers can now do tasks that required high skill level Causes Prevention
Safer working environment Clicking on mouse
Fewer manual tasks such as heavy lifting Use a wrist rest
rapidly/extendedly
Effect on Companies: Ensure sufficient space for
Holding mouse incorrectly
comfortable work
Can employ less people
Working in a cramped space
Robots do not take holiday, get sick or need breaks
Greater consistency in products made
Back Problems

5.2. Effects of IT on Working Patterns Headaches are a potential consequence

Part-time working: A contract where someone works Causes Prevention


fewer hours
per week than a full-time employee, in shifts. Not sitting upright while
Flexible working (flexi-time): Workers can choose their
Take periodic breaks
working
working
time but will have to complete the day’s work.
Use adjustable chairs with
Job sharing: Two or more part-time workers divide their Sitting with poor posture
good back support
job,
replacing one full-time worker.
Working in a cramped space Sit upright with good posture
Compressed hours: Employees can work longer hours per
day but
over fewer days, completing the workload Incorrect computer screen
Keep feet flat on floor
sooner. positioning

5.3. Microprocessor-Controlled Devices Eye Problems

in the Home Headaches are a potential consequence

Positive effects Negative effects Causes Prevention


Lead to more leisure time Staring at a computer for
Take periodic breaks
since devices can be Unhealthy diets extended periods of time
programmed to do tasks Working with poor room
Use TFT rather than CRT
People become lazy and rely lighting
More time to socialize
on devices Computer screen glare/flicker Use anti-glare screens
Becoming very sophisticated Dirt can cause eye strain Ensure good room lighting
Dependency on technology
and can make use of No direct light on screen
increases
embedded web technology Clean dirt
More wasteful society since
Save energy - switch off
devices thrown away if they
automatically
fail, not economic to repair 6. ICT Applications
Easier to program device
Leaving on standby wastes
rather than set timings & 6.1. Communication Applications
resources
dates manually
Newsletters
5.4. Potential Health Problems
Paper-based communication used to inform people
Repetitive Strain Injury (RSI) about their
interests
Schools use these to inform parents about events/dates
This is when joints such as the shoulder, wrist or fingers Advantages
swell,
causing pain Released regularly
Damage gets worse if left untreated The recipients have a permanent copy
Can lead to hand/arm immobility Disadvantages
Requires distribution
Causes Prevention There are no special effects; sound/video/animation
Typing for extended periods There are printing costs; paper/ink
Take periodic breaks
of time
 
Use ergonomic keyboard &
Typing with incorrect posture
mouse Websites

[Link]
CAIE IGCSE ICT (0417)

Collection of webpages, text, graphics, video and sound Animations can be produced using computer hardware
Hosted on a web server on the internet and software
Need to write code or use a web authoring application With 3D animations objects are designed on a computer
Hyperlinks to other pages can be added and a 3D
skeleton is produced
Interactive websites require programming knowledge Parts of the skeleton are moved by the animator using
Can use a camera, scanner, microphone to input data key frames
Usually hire space from web hosting company The difference in appearance of the skeleton in these key
Advantages frames is
automatically calculated by the software and is
Ability to add sound/video/animation known as tweening or
morphing
Links to other websites/hyperlinks The final stage is to make a realistic image by a technique
The use of hot spots known as
rendering
Buttons to navigate/move around the website
Hit counters to see who has visited the websites  
Disadvantages
Can be hacked and modified or viruses introduced Flyers & Posters
Need for a computer and internet connection
A Word processor/Desktop publisher is used to create it
Lack of portability compared with paper-based system
Need to hold minimum amount of information and be
Need to maintain website once it is set up
accessible very
quickly
  Need to make an immediate impact when people look at
them
Multimedia Presentations Anyone can produce them but there are highly skilled
professionals
who can produce expert posters
Uses a mixture of media to present information: Some posters require larger printers than A4
animations, video,
sound, transitions, hyperlinks Sequence in which a flier or poster is produced on a
Produced using software packages computer system
Used with a projector so large audience can view A word processor or DTP application is opened
Advantages The user creates frames, boxes and text boxes
Use of sound and animation/video effects If necessary, photos are taken, using a camera
Interactive/hyperlinks built into presentations The images are uploaded from the camera, loaded
More likely to hold audience’s attention from a CD/DVD,
scanned from hard-copy photos or
Disadvantages downloaded from the internet
Need for special equipment – expensive The photos are saved to a file
May require internet access The photos are imported or copied and pasted into
the document
  The photos are edited and typed in or imported from
a file and
then put into required style
Music Scores
 
Music samplers and mixers allow original tracks that were
recorded
in a studio to be modified Mobile Phones
Electronic instruments can play back through electronic
effects
machines Wireless devices that allow users to make phone calls
Synthesizers combine simple wave forms to produce from anywhere
with cell reception
complex music
creations They connect to the telephone system using radio signals
Electronic organs can mimic any other instrument This requires them to be in range of a mobile tower
Music scores can be generated from music itself using Used for communication via
software Phone calls
Software can automatically correct music notes in a score Text messaging
There is no need to understand music notation to write a Social Media
music score
Music notes are automatically printed out in the correct  
format
Internet Telephony/VOIP
 
VOIP (Voice over internet protocol) is a method used to
Cartoons talk to
people over internet
VOIP converts sound (picked up by a microphone) into
discrete
digital packets that can be sent to a destination

[Link]
CAIE IGCSE ICT (0417)

via the internet People may not feel comfortable being truthful
What names do you want?
  First name, family name etc.
Date of Birth
Publicity & Corporate Image What format do you want it in?
Give instructions about how to answer questions
Publications
How will the data be collected?
Business Cards: Paper surveys are scanned using OMR or OCR
Miniature printed documents that provide Advantages
information about the
business/organisation Faster to get results
Usually printed on thick cards Fewer errors
Easily distributable to potential clients It is easier to do statistical analysis
Information includes company logo, services, address, Less expensive to carry out; requires fewer people
contact
numbers, email, website Online questionnaires
Gives a professional impression Usually use radio buttons
Letterheads: No data preparation needed
Found at the top of official printed documents to be Results sent directly to database for analysis
mailed to
clients or for internal use
 
Makes it clear to reader who the sender is
Information includes company logo, name, address, Address Lists
contact
numbers
Gives a professional impression An address book on a computer or mobile phone might have
Easy to reply to a contact’s
home address, phone number, email address,
Flyers: personal information like the
date of birth etc.
Generally printed on single sheets of A4 paper
Handed out directly to people for promotions
Cheap to produce and easily distributable (locally)
Information includes company logo, promoted
product or service,
contact details
Makes it easier to target a specific audience  
Brochures:
Also called leaflets & are like flyers Clubs & Society Records
Difference is that they are often folded into sections
Left on counters for pick up rather than handed out Need to keep a record on members usually in a database
Information includes company logo, promoted Usually payment details, contact details and interests
product or service,
contact details It makes it easy to match people with interests and send
Makes it easier to target a specific audience information
about what they are interested in
This can be done my using mail merging
Easy to check memberships and send out reminders
6.2. Data Handling Applications
It is important to follow the data protection act

Surveys  

All data handling starts with data collection School Reports


Data capture forms can be used for many applications
Decide what needs to be collected and then what Database applications such as SIMS store large amounts
questions should
be used to collect it of data which
can be used to create annual and termly
Paper or electronically school reports
Rules for creating forms Things able to be gathered from here are:
Make them look official Data individual to student – tests/exam results
Spaces should be thought about giving enough space Student progress – target grades being met or not
for answers Number of absences – create a percentage of amount
Restrict the amount of possible answers, do not use of days
attended school
open
questions Teacher comments – adds comments on to report
If open questions are used limit the amount of space
available
for answers
6.3. Measurement Applications
Asking for ‘Name’ needs to be carefully thought about
Are you asking for sensitive information?

[Link]
CAIE IGCSE ICT (0417)

Sensors are used to send data to a computer where the Sensors read data from the river (oxygen levels and
data is
processed acidity levels
using a pH sensor)
The computer simply reviews the data from the sensors The data from the sensors is converted into digital using
(by comparing
it to data stored in memory) and updates an ADC
its files and/or gives a
warning signal if the values are The computer stores the received data
outside given parameters The oxygen levels and acidity levels are compared to the
No changes to the process are made historical
data stored in memory and they are also
Examples: compared to alarm levels
stored in memory
Scientific experiments One of two things will now happen: either the data is
Weather stations transferred to
a CD/DVD or to a memory stick and taken
away for analysis later or
the computer is connected into
  a mobile phone network and transmits
the data back
automatically to the monitoring station
Analogue & Digital Data
 
Digital data: discrete, fixed value (used by computers)
Analogue data/signals: continuous value that varies Intensive Care Units in Hospitals
smoothly
Analogue device = measure length, weight, Sensors read key vital signs (such as pulse/heart rate,
temperature etc. temperature,
blood pressure, respiration, etc.)
E.g. Thermometer – represents temp. by the height of The data from the sensors is converted into digital using
the liquid
column an ADC
Sensors: measure physical and analogue qualities The data is stored in the computer memory
Analogue data from sensors needs to be converted into The computer compares the data from the sensor with
digital data
using an analogue to digital data converter the values
stored in its memory
(ADC) so that the
computer can understand and process The results are output on a screen in the form of graphs
the data from the sensors and/or
digital read-outs
If the computer sends signals to motors, valves, etc. then An alarm is activated if any of the data is outside
this data
also needs to be converted to analogue using a acceptable
parameters
digital to analogue
converter (DAC) so that the computer The system continues to monitor the patient until the
can effectively control these
devices computer is
turned off

   

Analogue to Digital Converter (ADC) Advantages of Using Computers in

Used when you want to attach an analogue input device Measurement


to a digital
device such as a computer.
This is so the analogue data can be The computer will not forget to take readings
understood/processed by the
computer since computers The computer’s response time is much faster, which is
only work w/digital data particularly
important in the patient monitoring example
E.g. When processing data sent from a sensor Doctors, nurses, scientists, etc. can all get on with other
tasks
while the monitoring is done automatically
  Computer give 24 hours cover every day (i.e. 24/7)
The readings will tend to be more accurate
Digital to Analogue Converter (DAC) Readings can be taken more frequently if they are done
by a computer
and sensors
Used when you want to attach an analogue output device It could also be safer if whatever is being monitored may
to a digital
device such as a computer have
potential hazards (e.g. children falling into the river
E.g. If the computer is being used to control a device whilst
attempting to take readings)
(motor/valve)
the device will be controlled by variable
voltages; the DAC will be
used to send out analogue  
signals
Disadvantages of Using Computers in
 
Measurement
Pollution Monitoring
Expensive to purchase and set up
Example: monitoring oxygen levels in a river If performed for educational purposes, reduced practical
hands-on
experience and learning.

[Link]
CAIE IGCSE ICT (0417)

Will not function in a power cut if no backup power Lights on machine to show user stage the cycle is
present
(expensive to have reliable backup power) at
Actuators to turn the inlet valves on to allow hot
and cold
water into the machine
6.4. Microprocessors in Control
Actuator to turn the outlet valve on to let the
Applications water out of
the machine when the wash is
complete
Sensors are used to send data to a computer where the An actuator to control the pump
data is
processed Processing
The computer reviews the data from the sensors (by Software to make decisions which will allow the
comparing it to
data stored in memory) clothes to
be washed
If the values are outside the given parameters/pre-set Time taken before next inputs
value it acts
to try and get the values within acceptable Timer as part of the software
ranges Time different cycles (when to add
It does this by sending signals to devices controlling the soap/conditioner/etc.)
process Time delay in measuring temperature
Needs to be time for changes to have effect
 
Unmanageable situations
Door may not be shut
Turtle Graphics
Needs to draw user’s attention
Based on computer language called LOGO and is now Usually a buzzer and light
usually known as
turtle graphics
 
It is the control of the movement of a ‘turtle’ on a
computer screen
by several key instructions which can be Central Heating System
typed in
The use of ‘repeat’ instructions makes a piece of code Applying factors
more
efficient Inputs
Inputs from the user
Command Meaning
Room temperature required
FORWARD x Move x cm forward Time systems turns on/off
BACKWARD x Move x cm backward Inputs from the system
LEFT d Turn left through d degrees Actual room temperature
Clock giving the time
RIGHT d Turn right through d degrees
Outcome
REPEAT n Repeat next set of instructions n times Heating or cooling room during the required times
ENDREPEAT Finish the repeat loop Outputs
PENUP Lift the pen up Boiler
Air conditioner
PENDOWN Lower the pen
Processing
Check time against the one input and switches on
 
when that
time is reached
Same done to check when to turn off
Automatic Washing Machines
When on, microprocessor reads temperature from
Have a microprocessor in them which contains the sensor and
compares it with desired temperature
software which
controls the washing machine If too low, it will heat up by turning the boiler
Appling the factors on and
if it’s too high it will turn the air
conditioner on
Inputs
These will stay on until desired temperature is
Pressure sensor on the door to detect if open or
closed reached
Sensor to detect if the required level of water is in  
Temperature sensor to check temperature
Outcome Automatic Cookers
Clothes have been washed
Outputs Have temperature sensors and timers with manual
Heater controls to set
start and end times, and temperature for
Motor to spin drum cooking.
Working similar to Central Heating System.

[Link]
CAIE IGCSE ICT (0417)

Burglar Alarms

Burglar alarms detect any intrusion.


Sensors such as motion sensors, door and window
sensors,
magnetic sensors, multi-functional sensors
(vibration, shutter,
and temperature) measure the
physical quantity and inputs the
value to a
microprocessor.
The microprocessor compares the input values with
the preset
values, if changes are detected, the
microprocessor sends
signals to the actuator
The actuator activates the sirens or gives a phone call
When making a computer model, consider:
or
messages the input mobile number.
What and how data should be collected
  Working of the system in real life.

Glasshouse 6.6. Applications in Manufacturing


Temperature controlled the same as central heating Industries
system
Humidity must also be controlled Robotics
Humidity sensor tells computer how humid it is
Computer then decides to turn the water supply to Robots are used in many areas of manufacturing, from
sprayers heavy work
right through to delicate operations e.g. car
Windows also operated by the computer bodies, welding
bodywork, manufacturing of microchips
Need to find the balance of how often to have etc.
windows open Control of robots is either through embedded
Blinds that can be computer controlled microprocessors or
linked to a computer system
Light sensor measures light intensity Programming of the robot to do a task is generally done
When sun is strong the computer actuates electric in two ways:
motors which
close blinds The robot is programmed with a sequence of
Control in glasshouse is more likely to be used in instructions which
allow it to carry out a series of
commercial areas
or large glasshouses not in gardens tasks
Alternatively, a human operator manually carries out
a series of
tasks and how each task is done is relayed
6.5. Modelling Applications back to the robot
(embedded processor) or
controlling computer. The sequence of
instructions is
A mathematical computer model is created to manipulate
remembered so that the robot can automatically
variables
and see real time changes in terms of figures.
carry out each task identically each time (e.g.
Used to find how mechanisms control a system.
assembling parts
in a television)
Advantages:
Robots are often equipped with sensors so they can
Cheaper than building physical system to test
gather important
information about their surroundings
Safer than building system and experimenting
Sensors also prevent them from doing ‘stupid things’,
Easier to experiment with various scenarios
such as
stopping a robot spraying a car if no car is
Quicker as no need to build system
present, or stopping
the spraying operation if the supply
Near-impossible tests involving space and volcanic
of paint has run out etc.
scenarios
can be modelled risk-free
Robots are very good at repetitive tasks
What if analysis can be conducted that allow a certain
However, if there are many different tasks (e.g. making
figure to
be computed by letting the computer change
specialist
glassware for some scientific work) then it is
other variables that
affect the value needed to be set.
often better to still
use human operators
E.g.

Advantages

Robots can work in environments harmful to human


operators
The can work non-stop (24/7)

[Link]
CAIE IGCSE ICT (0417)

They are less expensive in the long term (they don’t need Prints the exam timetables.
wages)
however they are expensive to buy initially Allots examination rooms and the invigilator.
Productivity is higher, since they do not need holidays, Gathers the results and puts them into the student
are not ill
etc. database.
There is greater consistency – every car coming off a Creating timetables and managing teaching
production
line is identical cover/substitution
They can do boring, repetitive tasks, leaving humans free Considers the student’s choices, availability of
to do more
skilled work teachers and
rooms, subject clashes and the number
of hours needed for each
subject to produce accurate
Disadvantages timetables that can easily be made
changes to and
cover with teacher to be substituted.
Robots find it difficult to do ‘unusual’ tasks (e.g. one-off School management systems:
glassware for a chemical company)
They replace skilled labour, leading to unemployment Advantages Disadvantages
Since robots do many of the tasks once done by humans, Absenteeism can be Operating the software will
there is a
risk of de-skilling addressed more easily. need some training.
Because robots are independent of the skills base,
The initial cost of the
factories can be
moved anywhere in the world, again Parents are kept updated.
software is expensive.
causing unemployment
Unauthorised access will
Reduced workload for have to be prevented as
6.7. School Management Systems teachers. there is lots of personal
information.
Learner registration and attendance
They are helpful for the
ID cards with magnetic tapes: The students will have
decision making of the
to
swipe their ID cards, which contain the student’s
administration department
name, school’s
name, date of birth and the
registration ID, when they enter and
leave the school,
this way time is saved and the attendance is
more 6.8. Booking Systems
accurate.
Biometrics: Every student’s fingerprint is stored on a Booking systems are used for transport (flights, trains
database along with their personal information, the and buses),
cinemas and theatres
students
must put their finger on a fingerprint
scanner to enter or leave
the school premises. Theatre booking system example:

Advantages Disadvantages Customer clicks on performance they wish to see


They enter date and time of performance and required
Fingerprints are unique, so
number of seats
another student can’t give Collecting every student’s
A seating display at theatre is then shown on screen and
their attendance for fingerprint initially is time-
user clicks
where they want to sit
somebody else, like with an consuming.
Database searched to check availability of selected seats.
ID card.
If
seating plan shown on screen, this isn’t required
Fingerprint scanners are If seats available, seat numbers are shown together with
ID cards can be lost, whereas
more expensive than total price
fingerprints can’t be.
magnetic stripe readers. If customer is happy with this, they select ‘confirm’
Magnetic fields can affect an Damages on the finger will The seats are now temporarily set at ‘no longer available’
ID card. deny access. The customer then enters their personal details or
There is an invasion of indicates that
they are a returning customer
Copies of ID cards can be They select a payment method and make the payment
privacy in storing fingerprints
made easily. The theatre seats are then booked in the customer’s
on a school database.
name
Learner performance The final details are shown on the screen, together with a
Spreadsheets can be used to record students’ reference
number
An email is sent to the customer which they print out as
performances. It is
easier to compare each other’s
performances and an individual
student’s their proof
of purchase. In some cases, this also acts as
performance over the academic year. their printed ticket
when they go to the theatre – an e
Organising examinations ticket
Makes sure that the students are enrolled for the The database is updated with the transaction
right exams.

[Link]
CAIE IGCSE ICT (0417)

What goes on behind the


Disadvantages Sequence at ATM
Advantages scenes
No double booking as very Set-up and Maintenance PIN is checked to see if it is
minimal delay. expensive PIN is entered using the correct
Immediate booking and Computer and reliable keypad Card is checked to see if it is
selection of seats internet access required valid
Sever crashes can result in A number of options are
Bookings can be made any given: change PIN, top up
the bookings completely
time mobile, see balance, get
stopping
Digital ticket; printing and Need for website to be well money
postage costs designed to ensure ease of The customer selects the
reduced/eliminated use cash option & several cash
QR codes for authentication; No special relation built with options are shown
no need for human, can use booking agent who can give The customer’s account is
scanner; reduced costs special promotions etc. The customer accepts one accessed to see if they have
of the options or types in a sufficient funds, it is checked
in
booking seats if the response is not immediate then can different amount to see if they are withdrawing
cause
problems like double booking) more than their daily limit
  The customer is asked if
they want a receipt
Real-time Process Control The card is returned Transaction is okay
Money is dispensed Customer’s account is updated
An example of online processing
Very different to real-time (transaction) processing
System usually involves sensors and feedback loops 6.10. Computers in Medicine
In real-time process control, physical quantities are
continually
monitored and input is processed sufficiently Patient records: Database that holds patient details and
quickly to influence
the input source can be
accessed from any computer within the hospital
intranet.
6.9. Banking Applications Patient identification: Barcodes on wristbands of the
patients
can be used to access their patient record.
Online banking systems rely on the ability to update files Pharmacy records:
immediately, thus preventing double booking, which Generates labels for drugs
could happen if
the system response time was slow Checks if the patient is allergic to a particular drug.
The use of computer technology has revolutionized how Patient monitoring:
we do our
banking transactions, for example: Sensors measure changes in temperature, heart rate,
Internet banking breathing
rate, brain activity, blood pressure, blood
The use of automated teller machines (ATMs) sugar levels and
oxygen levels in the patient’s body.
Chip and PIN technology The analogue signals from the sensors are converted
into digital
signals using an analogue to digital
  converter.
Graphs are produced to show trends over time.
Automated teller machines (ATMs) The readings are constantly compared with the pre-
set values, if
the values aren’t in the prescribed range,
Automated teller machines (ATMs) are places where the medical staffs
are notified.
customers can get
cash (or carry out certain other Hospital management system: All the above-mentioned
banking activities such as order a
statement) using their points come
under the hospital management system
credit or debit card which holds all of them, and
can be used to access data
from all the departments.
What goes on behind the Expert systems:
Sequence at ATM
scenes The interactive screen asks a series of question for
Customer puts card into Contact is made with bank’s the doctor
to answers, using a keyboard or a touch
ATM computer screen.
The inference engine compares the symptoms with
the knowledge
base, using the rule base to find
matches

[Link]
CAIE IGCSE ICT (0417)

The system suggests the possible illness with a These systems have been developed to mimic the
probability of
each, cures and recommendations on expertise and
knowledge of an expert in a particular field
the next step to be taken. Examples include:
The explanation system will explain how that Diagnosing a person’s illness
particular
diagnosis was suggested. Diagnostics (finding faults in a car engine, finding
Using 3D printers in medicine: faults on a
circuit board, etc.)
Surgical and diagnostic aids: A CT or MRI is used to Prospecting for oil and minerals
produce
images of the internal parts of the body. A 3D Tax and financial calculations
printer can then
be used to reproduce the internal Chess games
organs as a solid object. Identification of plants, animals and chemical
Prosthetics: 3D printers are used to print out artificial compounds
body parts such as false tooth, artificial limbs, hearing Road scheduling for delivery vehicles
aids,
etc. This is a less expensive method of replacing
body parts.
Tissue engineering: Used to produce layers of cells to
replace damaged tissues.
Design of medical tools and equipment: Tools can be
made
faster and with reduced costs. They can also be
made changes to
easily, whereas it wasn’t the same
Expert System Setup
with traditional methods.
Experts in the field are interviewed to find out what is
6.11. Computers in Libraries needed in
the expert system
Data is then collected from these experts
Many library systems are computer controlled A knowledge base is designed and then created
They usually involve the use of barcodes on the books The rules base is designed and created
being borrowed
and on the borrower’s library card The inference engine is designed and created
The following describes a computerized library system The input screen and output format are also designed
based on
barcodes and created –
this is known as the user interface
There are two files: The expert system is tested against known conditions and
Book file, containing fields for example: barcode, book scenarios
title,
name of author etc. It is also checked to see if it meets the original
Borrower’s file, containing fields for example: specification
borrower’s
number, borrower’s name etc. Experts are interviewed about how effective it is before
When a borrower takes out a book, the book’s code is the expert
system goes out on general release
scanned
The book details are then found on book file Advantages
The borrower’s library card barcode is then scanned for
Expert systems provide consistent answers
the
borrower’s unique number
They never ‘forget’ to answer a question when
The book file is linked to the borrower’s file and both files
determining the logic
are
updated to indicate which book has been borrowed
Using expert systems reduces the time taken to solve a
and when it is due
back problem
The borrower’s file is interrogated daily by the computer
A less skilled worker force is needed, which gives the
to see
which books are overdue for return:
potential of
saving money, but also allows areas of the
The computer reads a record from the book file
world access to expertise
which they could not normally
It compares the date due back with the current date
afford
If the date due back is less than (or equal to) the
current date
(i.e. earlier date) … Disadvantages
…using the barcode number of the book…
…the book file is linked to the borrower’s file… They tend to lack common sense in some of the decision-
…and the corresponding record is read from the making
processes
borrower’s file Errors in the knowledge base can lead to incorrect
The customer details are then found and a letter or decisions being
made
email is
automatically sent out It can be expensive to set up in the first place
The next record in the book file is then read… Considerable training is necessary to ensure the system is
…until the whole file has been checked sued
correctly by the operators

 
6.12. Expert Systems

[Link]
CAIE IGCSE ICT (0417)

Components of an Expert System information back to the computer


system allowing it to
update its files
User Interface Barcodes are made up of alternating dark and light lines
of varying
thickness
This is the only thing that the end user sees A number underneath the barcode usually consists of
Allows the user to interact with the system four parts:
country code, manufacturer’s code, product
Often requires training to operate effectively code, and a check digit
The check digit is a form of validation which is used to
Knowledge base
make sure
no errors occurred during the reading of the
This is a database designed to allow the complex storage barcode
and
retrieval requirements of a computerized knowledge- Every time the barcode is read, this calculation is
based management
system (in support of an expert performed to
ensure that it has been scanned correctly
system)
 
Inference engine
Electronic Funds Transfer at Point of Sale (EFTPOS)
This is software that attempts to derive answers from the
knowledge
base using a form of reasoning Many credit cards are equipped with a chip as well as a
It is how expert systems appear to use human-like magnetic
stripe – containing the PIN
reasoning when
accessing information from the This system is designed to enhance security since it is
knowledge base in an effort to find a
conclusion to a better than
relying only on a signature
given problem When paying for items using a chip and PIN card, a form
The inference engine is a type of reasoning engine of
electronic funds transfer (EFT) takes place

Rules base Paying for a meal example

This is made up of a series of ‘inference rules’ (e.g. IF the Waiter inserts card into chip and PIN reader
country is in South America AND the language used is Restaurant’s bank contact customer’s bank
Portuguese THEN
the country must be Brazil) Card is checked to if valid
These inference rules are used by the inference engine to If card is stolen or expired, then transaction is terminated
draw
conclusions Customer enters PIN using keypad
They closely follow human-like reasoning PIN is read from chip on card and is compared to one just
keyed in
  If they are the same, the transaction can proceed
Check is then made on whether they have enough funds
Suggesting Diagnoses If there are not enough funds available, transaction is
terminated.
Otherwise, transaction is authorized
The interactive screen asks a series of question for the
Authorization code is sent to restaurant
doctor to
answers, using a keyboard or a touch screen.
Price of meal is deducted from customer’s account
The inference engine compares the symptoms with the
Same amount of money is credited to restaurant’s bank
knowledge base,
using the rule base to find matches.
account
The system suggests the possible illness with a
Receipt is produced as proof of purchase
probability of each,
cures and recommendations on the
next step to be taken.  
The explanation system will explain how that particular
diagnoses
was suggested. Internet Shopping

6.13. Computers in the Retail Industry Online shopping: Shopping over the internet.
To customer:
Advantages
Automatic Stock Control
Cheaper goods (the company doesn’t have to pay
Automatic stock control systems rely on the use of rent for
stores and doesn’t need more employees)
barcodes Wide range of products
Barcodes now appear on most products sold in shops Delivery at your doorstep
They allow quick identification of product details once the You can shop 24/7
barcode
has been scanned by a barcode reader Shop from any part of the world
Supermarkets use electronic point of sale (EPOS) You save the travelling costs of going for shopping
terminals, which
incorporate a barcode reader that scans Disadvantages
the barcode, retrieve the
price of the article and relay Quality isn’t assured

[Link]
CAIE IGCSE ICT (0417)

People are worried about giving their card details A photo of you is clicked which is then compared with
online. the image
stored in the RFID chip.
Packing and postal charges are added If the face-recognition passes, some checks are made
Personal services that you get from stores are in turn to
make sure you are eligible to enter the
missed. country, and if you are,
the gate opens automatically.
Returning the products is harder RFID in contactless payments:
No relaxation that you get from actual shopping The embedded chip on credit/debit cards and the
Bogus sites are present where you pay and never antenna enable
customers to wave their card over a
receive the
product reader at the point of sale
terminals to make
To seller: payments
Advantages Smartphone apps can also be used to make
No need to pay rents contactless payments.
No fixed working hours
Less/no shoplifting 6.15. Monitoring & Tracking Systems
Sell goods to customers anywhere in the world
Cheaper to contact customers (via e-mail) Public monitoring/tracking:
Site warehouse where rental is cheap Ankle monitor: uses RFID chip to give out the person’s
Sell goods 24/7 location and other details. It is tamper proof and will
Disadvantages alert
authorities if tried to remove.
ICT knowledge needed to set up website Phone call tracking: the service provider tracks the
Unemployment calls
and the exact position from which they were
Business abroad is lost if the prices are cheaper made
there Worker monitoring/tracking: Workers are
At times of network failures, there will be no monitored/tracked in the
following ways:
access Supermarket workers: have the number of items
Not everybody can access the internet, so a few passing
through the tills over a period of time
customers
are lost monitored.
Customer’s personal data can be hacked Internet use is monitored by network managers: they
Postal charges discourage people at times can
check sites visited and time spent on that site
during working
hours.
6.14. Recognition Systems Emails can be read: Employers can check that no
personal
mails are sent during office hours.
Automatic Number Plate Recognition (ANPR) systems: Delivery drivers: Their location can be tracked using
A sensor sends signals to a microprocessor, which GPS
systems. It can also be checked if they are
instructs a
camera to capture the front of a vehicle. following the
shortest route and aren’t speeding.
OCR software is used to read the number plate from Key logging: Software that records the keys pressed by a
the image.
The characters are then converted to text user on
the keyboard. They are used to find username
format in order to
store it in a database and passwords of a
user.
Processing of cheques: Employee call monitors: Allows the employer to listen to
The value of a cheque is printed in special ink employee’s telephone calls. There are three ways it can
containing iron
particles when a cheque is presented. be used:
MICR is used to read the characters at the bottom of Monitor: The manager/supervisor can listen to calls
the cheque. without
the employee or the customer’s awareness.
A batch processing method is then used to process all Whisper: The manager can help the employee with
the
cheques at the end of a specific time period. the call,
but the customer can’t hear the manager
OMR media in schools: speak.
School registers: Paper-based registers are fed into Barge: Both the employee and the customer can hear
OMR to
be scanned and are then stored on a the
manager
database. Employee call monitors: Allows the employer to listen to
Multiple-choice examination papers: The position of a employee’s telephone calls. Call monitors can be used:
mark
is stored in a computer’s memory after being to improve the employee’s performance
read by the OMR
device using a template that maps to allow the manager/supervisor to join a call where
out the X-Y coordinates of
each lozenge (pen/pencil necessary
mark). as a training tool
RFID in passports: Uses of Automatic Number Plate Recognition (ANPR)
The data on the RFID chip is read when the passport systems:
is scanned. Traffic enforcement: the system can check if a vehicle
is
taxed, recognize cars parked illegally, cars speeding

[Link]
CAIE IGCSE ICT (0417)

or going
through red lights so a fine can be imposed. Used to capture, manage, analyse and display
Car park management: the system reads the geographically
referenced information.
registration
number and if allowed into the car park, Use to determine distance between two places.
the barrier is raised. Used to find the nearest petrol station or restaurant,
Electronic toll collection: the system recognizes the etc.
vehicle and deducts the fare accordingly. To protect animal and plant life in certain vulnerable
places.
  Can be used in geography, science or engineering
lessons.
Cookies
 
Cookies are small files sent to a user’s computer via their
web
browser when they visit certain websites Media Communication Systems
They store information about the users and this data is
accessed
each time they visit the website Using satellite signals for communication.
For example: Used by media companies when sending
They remember who the user is and send messages stories/videos/pictures
from remote locations.
such as “Welcome
Sarah” each time they log onto the
website
They recognize the user’s buying preferences e.g. if a 7. System Life Cycle
user buys
CDs, pop ups related to their buying habits
will appear on the
user’s screen each time they visit 7.1. Introduction
the website
Without cookies, web server would have no way of A systems analysis team is often brought in to review an
knowing that the
user had visited website before existing
system and suggest several improvements
For this reason, cookies could be used to monitor one’s The existing method used may be either a manual paper-
internet
activity based system
or a computer-based operation that is no
longer regarded as adequate
for the task
6.16. Satellite Systems
7.2. Analysis
Global Positioning Systems (GPS)
The basic steps in the analysis stage can be summarized
Used to determine the exact location of several modes of as follows:
transport
Cars usually refer to GPS as satellite navigation systems
Satellites surrounding the Earth transmit signals to the
surface
Computers installed in the mode of transport receive and
interpret
these signals
Knowing their position on the Earth depends on very
accurate timing
– atomic clocks are used in the satellites
which are accurate to
within a fraction of a second per
day
Each satellite transmits data indicating its position & time
The computer on board the mode of transport calculates
its exact
position based on the information from at least 1. Fact finding/collecting data from the current system
three satellites 2. Description of the current system – establishing the
inputs, outputs
and processing being done
  3. Identification of the problems with the current system
4. Agreeing the objectives with the customer
Satellite Navigation 5. Identifying and agreeing the customer’s requirements
6. Interpreting the customer’s requirements
Used to determine the exact location of a car.
7. Producing a cost-benefit analysis
The computers onboard can be used to show
8. Producing a data flow diagram
directions to a
destination.

Geographic Information Systems (GIS)

[Link]
CAIE IGCSE ICT (0417)

There is no immediate way to clarify a vague or


incomplete
answer to a question

Looking at Existing Paperwork


Allows the analyst to see how the paper files are kept, look at
operating instructions and training manuals, check the
  accounts, etc.

Advantages
4 Common Methods of Fact Finding It allows information to be obtained which was not
possible by
any of the other methods
Observation
The analyst can see for themselves how the paper
Involves watching personnel using the existing system to system operates
find out
exactly how it works It allows the analyst to get some idea of the scale of
Advantages the
problem, memory size requirements, type of
The analyst obtains reliable data input/output devices
needed
It is possible to see exactly what us being done Disadvantages
It is a relatively inexpensive method It can be very time consuming
Disadvantages Because of the analyst’s time, it is a relatively
People are generally uncomfortable being watched expensive
method
and may work in
a different way
If workers perform tasks that violate standard 7.3. Design
procedures, they
may not do this while being watched
Once the analysis has taken place and the systems
Interviews analyst has some
idea of the scale of the problem and
Involves a one-to-one question-and-answer session what needs to be done, the next
stage is to design the
between the
analyst and the employee/customer key parts of the recommended system
Advantages A list of tasks is summarized here
It gives the opportunity to motivate the interviewee Designing data capture forms/input forms
into giving
open and honest answers to the analyst’s Designing screen layouts
questions Designing output forms and reports
Producing systems flowcharts and/or pseudo code
It allows the analyst to probe for more feedback from
the
interviewee, as it is easier to extend a question Selecting and designing validation rules that need to
be used
It is possible to modify questions as the interview
proceeds and
ask questions specific to the Selecting the most appropriate data verification
interviewee methods
It is a good method if the analyst wants to probe Designing and agreeing the file structures and tables
Selecting and designing the hardware requirements
deeply into
one specific aspect of the existing system
Disadvantages Selecting and designing the software requirements
Producing algorithms or program flowcharts
It can be rather time consuming
It is relatively expensive, due to the use of the Designing a testing strategy/plan
analyst’s time  
The interviewee cannot remain anonymous

Questionnaires Verification

Involves sending out questionnaires to the work force A way of preventing errors when data is copied from one
and/or to
customers to find out views of the existing medium to
another
system and find out how
some key tasks are carried out Double entry: data is entered twice, sometimes by two
Advantages different people
The questions can be answered quite quickly The computer compares the two entries, either after
It is a relatively inexpensive method data entry
or during the data entry process, and
Individuals can remain anonymous if they want identifies any differences
It allows quick analysis of the data Visual check: checking for errors by comparing entered
Disadvantages data on
the screen with the data in the original document
Often the number of returned questionnaire is low (not the same as
proof reading)
The questions are rather inflexible since they have to
 
be
generic

[Link]
CAIE IGCSE ICT (0417)

Validation Once the file structure has been determined, it is then


created and
fully tested to make sure it is robust when
Process where data is checked to see if it satisfies certain the system actually goes
live
criteria when input into a computer, for example to see if Since it is important that correct data is stored in files,
the data
falls within accepted boundaries there
are certain techniques that need to be adopted to
Range Check: Checks whether data is within make sure the data
populating the file and database is at
given/acceptable
values. least of the right type &
that it conforms to certain rules
E.g. A person’s age should be in range > 0 but < 150 Validation routines and verification methods are used to
Length Check: Checks if the input data contains the ensure this
happens
required
number of characters Again, routines have to be fully tested to ensure they trap
E.g. If a field needs six digits then inputting a five- or unwanted
data but also to make sure any data
seven-digit number, for example should cause an transferred from a paper-based
system to an electronic
error message system has been done accurately
Character/type Check: Checks that the input data does Any system being developed will have some form of user
not
contain invalid characters interface
E.g. A person’s name should not contain any numbers, The types of hardware were chosen in the design stage
but a
person’s height should only contain digits How these are used to interface with the final system
Format/picture Check: Checks that data is in a specific now needs to
be identified, for example how the screens
format will be used to collect
the data and the way the output
E.g. Date should be in the form dd/mm/yyyy will be presented
Limit Check: Similar to range check except that only one If specialist hardware is needed (e.g. for people with
of the
limits (boundaries) is checked disabilities), then it will be necessary to finalize how these
E.g. Input data must be > 10 devices are used with the system when it is implemented
Presence Check: Checks if data is actually present and has This will be followed by thorough testing to ensure the
not
been missed out user screens
are user friendly and that the correct output
E.g. In an electronic form, a person’s telephone is associated with the
inputs to the system
number may be a
required field and if no data is
present this should give rise
to an error message  
Consistency Check: Checks if fields correspond (tie up)
with
each other Testing strategies
E.g. If ‘Mr’ has been typed into a field called title then
Testing of each module needs to be done to ensure each
the
gender field must contain either ‘M’ or ‘Male
one functions
correctly on its own
Check Digit: Look at an extra digit which is calculated
Once the development of each module is completed, the
from the
digits of a number and then put on the end of
whole system
needs to be tested (i.e. all modules
the number
functioning together)
E.g. Check digits can identify three types of error:
Even though each individual module may work
If two digits have been inverted during input
satisfactorily, when
they are all put together there may be
An incorrect digit entered twice
data clashes, incompatibility
and memory issues
A digit missed out altogether
All of this may lead to a need to improve the input and
output
methods, file and database structures, validation
7.4. Development & Testing and verification
methods
Then the system will need to be fully tested again
Once the design stage is completed, it is then necessary It is a very time-consuming process but the system must
to create
the system and fully test it be as
perfect as possible before it goes live
This section considers some of the development stages Testing will use many different types of data, which will
and testing
strategies which are often adopted by system fall into
one of three categories: normal, extreme or
analysts abnormal
Let us suppose one of the fields in a database is the date
 
and this
must be in the form dd/mm/yyyy, where each
element of the date must
be numeric:
Development stages
Normal: this is data which is acceptable/valid and has
If the system contains files (e.g. a database) then the file an
expected (known) outcome, e.g. the month can be
structure needs to be finalized at this stage (e.g. what any whole number
in the range 1 to 12
type of
data is being stored in each field, length of each Extreme: this is data at the limits of
field, which
field will be the key field, how the data files acceptability/validity, e.g. the month can be either of
will be linked,
etc.) the two
end values i.e. 1 or 12

[Link]
CAIE IGCSE ICT (0417)

Abnormal: this is data outside the limits of Pilot Implementation


acceptability/validity and should be rejected or cause
an error
message The new system is introduced into one part of the
For example, all the following values are not allowed company (e.g. into
a warehouse of a supermarket) and its
as inputs
for the month: performance assessed
Negative numbers (e.g. -1, -15) Advantages
Any value greater than 12 (e.g. 32, 45) If the new system fails, only one part of the company
Letters or other non-numeric data (e.g. July) is
affected
Non-integer values (e.g. 3.5, 10.75) It is possible to train staff in one area only, which is
much
faster and less costly than parallel running
The costs are also less than parallel running, since
7.5. Implementation only one
part of the system is being used in the pilot
Disadvantage
Once the system is fully tested, the next stage is to fully
It is more expensive than direct changeover, since
implement it
each pilot
scheme needs to be evaluated before the
We will now consider changeover to the new system in
next stage is introduced
more depth
There are four common methods used for changing over Phased Implementation
from the old
system to the new system
Each one has advantages and disadvantages which need Initially, only part of the new system is introduced
to be weighed
up before the most appropriate method is Only when it proves to work satisfactorily is the next part
chosen for a particular
application introduced, and so on, until old system is fully replaced
Advantages
If the latest part fails, it is only necessary to go back in
the
system to the point of failure, hence failure is not
disastrous
It is possible to ensure the system works properly
before
expanding
Disadvantages
This is more expensive than direct changeover, since
it is
necessary to evaluate each phase before moving
to the next stage
4 Common Methods of Changing Systems
 
Direct

The old system is stopped overnight and the new system Comparing Changeover Methods
introduced
immediately
Advantages Changeover method Direct Parallel Pilot Phased
The benefits are immediate Relative costs Low High Medium Medium
Costs are reduced - since only one system is used Input needed by the user Medium High Low Medium
there is no
need to pay for two sets of staff Input needed by systems
There is less likelihood of a malfunction since the new Low* Low Medium Medium
team
system
will have been fully tested
Impact of failure High Low Low Medium
Disadvantage
This method can be disastrous if the new system fails
7.6. Documentation
Parallel Running
Once the new system is fully developed, a considerable
The old and new systems are run side by side for a time
amount of
documentation needs to be produced
before the
new system takes over altogether
For the end user
Advantages
For people who may need to modify or develop the
If the new system fails, the old system is still available
system further
at some later stage
as a
back-up
There is some overlap between the two types of
It is possible to train staff gradually
documentation, but
the basic requirements are shown
Staff have time to get used to the new system
below
Disadvantage
It is more expensive than direct changeover, since  
extra staff
are needed to run both systems together
Technical Documentation

[Link]
CAIE IGCSE ICT (0417)

Technical documentation is designed to help compare the final solution with the original
programmers & analysts
who need to make requirement
improvements or repair/maintain to the system identify any limitations in the system
This can consist of any of the following: identify any necessary improvements that need to be
purpose of the system/program/software made
program listing/coding evaluate the user’s responses to using the new
programming language used system
flowchart/algorithm compare test results from the new system with
input formats results from the
old system
hardware requirements compare the performance of the new system with the
software requirements performance
of the old system
minimum memory requirements observe users performing set tasks, comparing old
known bugs in the system with new
list of variables used (and their meaning/description) measure the time taken to complete tasks, comparing
file structures old with new
sample runs (with test data and results) interview users to gather responses about how well
output formats the new
system works
validation rules give out questionnaires to gather responses about the
meaning of error messages ease of
use of the new system
Some results from the evaluation may require changes to
  either
hardware or software. Hardware may need to be
updated because:
User Documentation of feedback from end users
new hardware comes on the market, making change
User documentation is designed to help users to learn
necessary
how to use the
software or system
there are changes within the company which require
This can consist of any of the following:
new devices
to be added or updated
the purpose of the system/program/software package
Software may need to be updated because:
how to log in/log out
of feedback from end users
how to load/run the software
changes to the company structure or how the
how to save files
company works may
need modifications to the
how to do a search
software
how to sort data
changes in legislation may need modifications to the
how to do printouts
software
how to add, delete or amend records
screen layouts (input)
print layouts (output) 8. Safety & Security
hardware requirements
software requirements
sample runs (with test data and results) 8.1. Physical Safety
error handling/meaning of errors
troubleshooting guide/help lines/FAQs Ways of eliminating or minimizing
Safety hazard
tutorials hazard
Use a residual circuit breaker
7.7. Evaluation Electrocution from
(RCB), Check insulation on wires
regularly, Do not allow drinks near
spilling drinks
Once a system is up and running it is necessary to do computers, Check equipment
some
evaluation and carry out any maintenance, if regularly
necessary. Cable ducts- make wires safe,
Tripping over trailing
This is done to ensure the efficiency of the system, the Cover wires/tuck them away, Use
wires
ease of use
of the system, and the appropriateness of the wireless connections
system. Strong desk/tables to support
The following is a list of some of the things considered heavy hardware, Use large desks
when
evaluating how well the new system has worked. Heavy equipment falling
and tables so that hardware
This can ultimately
lead back to a re-design of part of the doesn’t fall off edge
system if there is strong
evidence to suggest that changes
need be made.
To evaluate the system, the analyst will:

[Link]
CAIE IGCSE ICT (0417)

Ways of eliminating or minimizing Internet Safety


Safety hazard
hazard
To keep personal data safe, one must:
Have a CO2 fire extinguisher
Not give unknown people (on the internet) personal
nearby, Don’t cover equipment
Fire risk from information
or send pictures of oneself to them.
vents- can cause equipment to
overloading sockets or Maintain privacy settings to control which cookies are
overheat, Make sure hardware is
equipment overheating on their
computer
fully maintained, Do not overload
Use learner friendly search engines and websites
sockets with too many items
recommended by
your educational institution, e.g.
[Link]
8.2. E-Safety The website being accessed is from a trusted source,
or has a
padlock symbol/ https protocol (s for secure):
E-safety refers to the safety of data and personal
information while
using the internet.
E-safety is required to make sure a user’s personal
information is
not made vulnerable and even leaked to
hacker’s for e.g., which can
lead to identity fraud, bank
A/C issues, etc.

Personal Data

Any data regarding a living person who can be identified


against the
data or the data along with any other
information.  
Examples of personal data:
Full Name Email Safety
Home Address
Open emails from known sources, and do not click on an
Banking details (A/C no, pin, etc.)
emails wit
hyperlinks without confirming with the sender
Medical history (suffered from depression, etc.)
of the email. Think
before opening an email from an
Personal data like ethnic origin, political views,
unknown person, never send any other
sensitive
criminal
activity, mental health history,
information (picture in school uniform, credit card PIN,
Sexual orientation and religion can be used to
etc.)
blackmail victims
of data breaches
Ask their ISP to enable email filtering to classify spam
If personal data is leaked (data breach), the following can
mails as spam.
occur:
Identity theft  
Bank fraud
Damages to personal property Social Media Safety
Kidnapping (if kidnappers get access to the victim’s
address. Block and report users who seem suspicious or use
Etc. inappropriate language
To prevent the above, it is essential that personal data is Never use you real name, only use a nickname
protected. Use appropriate language
Personal data can be leaked intentionally and Do not enter private chat rooms, as users can lure you
unintentionally.
Electronic data is at risk due to: hacking, into giving personal information by seeming too nice.
viruses, spyware,
phishing, pharming, Smishing, vishing, Do not meet anyone off the internet for the first time on
ransomware (A malicious
program that encrypts data on your own, or at least speak to a trusted adult first.
a computer system and demands for a
ransom to provide Do not misuse images (of someone to blackmail them, for
and decrypt the data), spam, moderated and
un- e.g.)
moderated forums, cookies, etc. Respect the confidentiality of other users
If a student shares a photograph of themselves in their
school
uniform on social media, then paedophiles, child  
predators,
kidnappers, etc. can physically reach the
student. This should not
be done Online Games

  Similar measures apply to that taken when using social


media.

[Link]
CAIE IGCSE ICT (0417)

Additionally, players should be careful about: Usernames and passwords don’t have to be
In-game violence remembered
Cyber bullying Almost impossible to replicate body parts.
Keeping their webcams off (other potentially Somebody else can’t gain access, like with a stolen
dangerous players
have direct access to your image) card
Predators may use voice masking technology to lure a They can’t be forgotten, like a card
user to
reveal their age, sex etc. Disadvantages
Cyber-attacks involving viruses, ransomware, etc. The readers are expensive
Damages in fingerprints can deny access
8.3. Security of Data Some people worry about their personal
information being
stored
Hacking
Digital Certificate
Hackers are people who get into your computer system
A digital certificate is an electronic passport used in the
without having
the rights. It can lead to corruption or loss
security
of data sent over the internet.
of data or a data
breach
They can be attached with mails so that the receiver can
Some prove that a system is vulnerable - maybe
know that
the mail is sent from a trusted source.
employed to test
(ethical hacking)
Some want to steal data
Secure Socket Layer (SSL)
Alter or destroy data
For fun or a challenge
Type of protocol that allows data to be sent and received
Prevention:
securely
over the internet
Protect with authentication techniques (user ID and
When a user logs onto a website, SSL encrypts the data
password,
etc.)
https or padlock in the status bar
Have a backup of data in case of damage
When user wants to access a secure website:
Firewalls User’s web browser sends a message, so it can
connect with
required website which is secured by
User IDs SSL
Web browser requests that the web server identifies
To log on to a network, a user must type in a user ID
itself
User ID assigns user privilege once user logs in
Web server responds by sending a copy of its SSL
The top-level privilege for a network is an administrator:
certificate
Able to set passwords and delete files from server etc.
Web browser checks if certificate is authentic
User privilege may only allow to access their own work
Sends signal back to web browser
area
Starts to transmit data once connection is established
If not secure, browser will display an open padlock
Passwords

After typing in user ID, the user will be requested to type Features of a Secure Web Page
in their
password
Webpage URL: If the webpage is secure, it will start with
Generally, it is a combination of letters and numbers
‘https’ instead of ‘http’.
Passwords are shown as stars (***) so nobody
overlooking can see
it
Many systems ask for password to be typed in twice as a Padlock sign

verification
check, in case of input errors
To help protect the system, user has a finite number of Phishing
attempts
If password is forgotten, administrator must reset it Phishing is a fraudulent operation involving the use of
If password is forgotten on a website, it will be sent to emails
your
e-mail The creator sends out a legitimate looking email hoping
to gather
personal and financial information from the
Biometric Data recipient of the email
The message appears to be from a legitimate source (e.g.
Uses features of the human body unique to every a famous
bank)
individual, such as
fingerprints, retina, iris, face and voice When the user clicks on the link, they are sent to a spoof
recognitions. It is used
in authentication techniques as it website
is very difficult / impossible to
replicate. They will be asked for personal info e.g. credit card
Advantages details, PINs

[Link]
CAIE IGCSE ICT (0417)

This could lead to identity theft


ISPs attempt to filter out phishing emails

Pharming

Pharming is a scam in which malicious code is installed


on a
computer hard disk or a server
This code can misdirect users to fraudulent websites
without their
knowledge
Phishing requires an email to be sent to every person
who has been
targeted, while pharming does not require Banks and organisations will never ask for a PIN to be
emails to be sent out to
anyone entered on
website like this.
Pharming can target a larger group of people more easily
How pharming works: Effects of phishing, pharming and Smishing on a
A hacker will infect the computer with a virus, either
user
by
sending an email or installing software on their
computer when
they first visit their website Personal and sensitive information is lost, which can be
Once infected, the virus sends user to a fake website used for
previously stated purposes.
that looks
identical to the one they wanted to visit
Personal info. from the user’s computer can be picked Moderated & Unmoderated Forums
up by the
pharmer/hacker
Anti-spyware, anti-virus software or anti-pharming Online forums are places on the internet where people can
software can
be used to identify this code and correct join
discussions on almost any topic and also add their views.
the corruption
There are two types of forums:
Smishing
Moderated Forums Unmoderated Forums
An attempt to extract a user’s confidential information via Has a moderator who checks
No moderator who checks
SMS
(short message service) by tricking the user into comments before they are
the comments
downloading a
Trojan horse (a virus that masks itself). posted
It is phishing via SMS. There will be no spams or
Spams, rude and offensive
rude and offensive
Preventing Phishing, Pharming & Smishing comments present
comments
Diversions from topic are
User education No diversions from the topic
possible
Set up anti-malware and anti-spyware software
Enabling protocols such as SPF and DKIM Highly secure due to Personal information can be
Do not download random .exe (executable file formats), moderation obtained from you
.php, .bat,
.com etc. Not secure due to lack of
Users should be alert and look out for clues when being moderation
redirected to other websites.
Therefore, technology enables unauthorised users to gain Spam
access to
otherwise inaccessible information.
If a person on the internet is asking for personal Spam is electronic junk mail and is a type of advertising
information, or
to meet in real life or acting suspicious, from a
company sent out to a target mailing list
they should be reported
to cyber security agencies, or Harmless but can clog up networks and slow them down
one’s parents/guardians. It is more of a nuisance than a security risk
Websites/pop-ups can be made to mimic legitimate ones, Many ISPs are good at filtering out spam, and prevent the
or seem too
good to be true, for [Link] instead of user from
getting these spam emails.
[Link] It is often necessary to put a legitimate email address into
a
contact list to ensure wanted emails are not filtered out
by mistake

Encryption

The conversion of data to code by encoding it


Done by using encryption software
Since data is encoded, it appears meaningless to a hacker

[Link]
CAIE IGCSE ICT (0417)

This technique prevents illegal access Your data is stored remotely and not on your computer,
Necessary to use decryption software to decode the data so you don’t
have control over the physical security of
Used to protect sensitive data e.g. banking details your data.
Encryption keys are complex algorithms which makes Some of the data stored may be personal data which are
codes almost
unbreakable open to
hackers, and have to be encrypted in order to
prevent hackers from
obtaining them.
Computer Viruses The company providing the storage may go out of
business. In this
case what has to be done to the data will
It is a malicious program that replicates itself and is have to be considered.
designed to
cause harm to a computer system. They The company providing the storage will have to put in all
spread through downloadable
files, external store media its
efforts and safety measures in order to keep your data
(e.g. pen drives, etc.) safe.
May cause the computer to crash If the company providing the storage doesn’t backup your
Loss of files, corruption of the data data, you
may lose it in case of power cuts or fires, etc.
Viruses infect computers through email attachments,
illegal software
or downloaded files Firewalls
Prevention of Viruses
Anti-virus software - Detects and then removes or A firewall sits between the user’s computer and an
isolates and
use firewalls external
network (internet) and filter information in and
Do not use illegal software out of the computer
Only download from reputable sites Tasks carried out by firewall:
Examining ‘traffic’
The threats of using credit cards online and Checking weather incoming or outgoing data meets
prevention: criteria
If data fails the criteria, the firewall blocks ‘traffic’
Key logging/spywares: records the keys pressed on a Firewall can keep a list of all undesirable IP addresses
keyboard. Helping to prevent viruses or hackers entering the
Can be used to obtain credit card details, passwords user’s
computer
and
personal information.
Use virtual keyboards to type in password. Methods of Internet Security
Install anti-spyware software.
Bogus sites: sites that look exactly like the original sites, Authentication
Advantages Disadvantages
but aren’t. Method
They can steal your card details and personal Inexpensive, as
Can be easily hacked,
information when
you make purchases. Passwords nothing other than a
Always type in URLs, sometimes links in the mails can
can be forgotten
computer is required
be of
bogus sites. Highly recognized
Phishing, pharming and Smishing: everywhere, very
They trick you to reveal card and personal details as Fingerprint Intrusive, Damages
high accuracy, Easy
responses
to messages or mails. scans will prevent access
to use, Relatively low
Open attachments only from trusted sources.
storage requirement
Install anti-spyware software.
Non-intrusive, very Problems occur if
Hacking into secure sites to obtain the details:
Signature little time to identify, sign is not consistent,
Encrypting the details will make it of no use to the
recognition Relatively low High error rate (one
hacker.
Use strong passwords. expensive in 50)
Use firewalls. Very intrusive,
Very high accuracy,
Tapping into wireless networks: relatively slow to
no known way to
Always use a password-controlled Wi-Fi since it is Retina scans verify retina scans,
replicate a person’s
relatively
hard to tap into a secured Wi-Fi. very expensive to
retina
install and set up
*ALL PREVENTION TECHNIQUES WRITTEN HERE
ALSO APPLY Very intrusive, Lot of
FOR THE THREATS IN GENERAL (NOT SPECIFIC TO CREDIT Very high accuracy,
memory needed for
CARDS)
* Verification time is
Iris recognition storage, very
usually less than 5
expensive to install
Cloud Storage seconds
and set up

[Link]
CAIE IGCSE ICT (0417)

Authentication Audience Needs


Advantages Disadvantages
Method Clear fonts
Affected by changes Bullet points
Non-intrusive,
Face in lighting, person’s Contrasting/easy-to-read colours
Relatively
recognition hairstyle, age and
inexpensive Include clear instructions
spectacles
Use slightly larger font sizes
Seniors
Fewer technical terms
9. Audience Consistent design
Easy to use
9.1. Audience Appreciation
 
Knowing Your Audience
Potential Problems
When designing ICT solutions, you must consider
audience If products are not built towards a specific audience well
There are 4 main characteristics of an audience then
problems may arise
Age: An older audience may not be able to understand or read
Can affect audience’s interests in your product text due to
poor font design
Large fonts and colours attract children A younger audience may not be able to understand
More stylish and trendy layout attracts young adults certain text due to
complex wording & structure
Gender Several audiences may just not find content interesting
Design product for a specific gender since it is
not relevant enough to them
Younger girls are often attracted to pink Several audiences may not find content attractive enough
Males generally prefer blue spectrum and thus
not purchase or use it at all
Income Younger & older audience may not understand how to
Knowing this will help in attractive pricing strategies use the product
due to lack of simple instruction
Promoting certain products are targeted for people
within a
specific range of incomes 9.2. Legal, Moral, Ethical & Cultural
Interests
Can help with advertising content
Appreciation
Content that meets the exact description of
audience’s interest
is more likely to attract them to Copyright Legislation
your product
A law that protects books, music art and other media that
  are
written is copyright law
It is an automatic right and does not need applying for
Audience Needs The person who owns the rights must be asked
before it can be
used again
After finding out about your targeted audience you need Software is a specific thing created and written on a
to aim to
meet those demands computer
Developers of the ICT product must ensure that they Needs to be protected as it is so easy for people to
meet as many of
these needs as possible copy
Common Needs for Common Audiences: This is a way of protecting software from being used
without
permission
Audience Needs Users create a license which determines the terms
Bright/cheerful colours and conditions
Animations/sounds/pictures
 
Less text
Young children Simple wording Copyright Laws
Large text
It is not legal to make a copy of software, then sell it or
Games/activities
give it
away to other people
Easy to use
Software cannot be used on a network unless a network
Teens & adults Attractive/stylish colours license has
been acquired
Interesting content Not legal to use coding from software in your own
Balance of pictures and text software without
permission

[Link]
CAIE IGCSE ICT (0417)

Renting out software without permission is illegal Acceptable Language


It is illegal to use the name of copyrighted software
without
permission Language used in emails must lie within an acceptable
code of
practice. The following is a list of unacceptable
  content that are
beyond the code of practice:
Obscene images
Software Protection Abusive language
Racist, exploitative and violent messages
Installed software will require a unique reference number
Use of illegal materials in messages
User will have to accept license agreement
Holograms are used to indicate software is original  
Software may only run if CD-ROM or DVD-ROM is actually
in the drive Copyright
Some software will only run if a memory stick is plugged
in USB
ports Copyright laws apply to text in emails. Forwarding a block
of text
or an image without the copyright owner’s
  permission, it would be
illegal.

Creating ICT Solutions  

ICT solutions, for e.g. a website should be made in Employer Guidelines


accordance to
the legal, moral, ethical and cultural beliefs
of the target
audience. If the rules in the ‘contract of employment’ set out by the
employer
is not obeyed, you would be in breach of your
  contract and could be
dismissed.

Implications of ICT Solutions  

When creating an ICT solution, all the following have to be Security


considered and the solution must be made in response
and respect to
these factors: Emails containing personal information should be
Legal: Ensure copyright laws are abided by including encrypted to
prevent hackers from understanding the
not using
any coding or branding from existing information if they manage to
hack into the email.
copyrighted software.
Morality: To distinguish from right or wrong.  
Sometimes it
may not be illegal to carry out an act
however it could be
against your morals. For example, Netiquette
setting up a fake website to
deceive is not illegal but
Some of the rules that the netiquette contains is:
questions your level of morality.
Don’t be abusive
Ethics: Is to break a code of conduct. For example,
Don’t send spam
disclosure of information about the new software to a
Be precise
rival
software publisher or to the press.
Check spelling and grammatical errors
Culture: When software is released in different
Ensure attachments are not too large
cultures
then care must be taken so that people are
Don’t use CAPITAL LETTERS to highlight comments
not offended. If
certain computer games mock
Don’t plagiarize
religion or cultural beliefs, then
again this could cause
Don’t use too many emoticons
offence.
 
10. Communication User ID and Password Protection

10.1. Email Email services require a user ID to authenticate users


Passwords should contain alphabets, numbers and
National Laws special characters
(#, *).
Email Groups
In some countries, emails are monitored or read, thus Easier to send out multiple mails by grouping them under
limiting the
topics on which you can speak. one name.
Companies and organization can group people according
  to their
target group for marketing purposes.

[Link]
CAIE IGCSE ICT (0417)

Spammers can create email groups by buying addresses  


of people from
a certain company and send in easier
ways. Wiki
Companies use email groups to set up meetings. Typing
out individual
addresses may leave out a few mail IDs. Software allowing users to easily create and edit web
pages without
using any web browser
A wiki will support hyperlinks and has a very simple
10.2. Internet Fundamentals
syntax
(language rules) for creating pages
Wikis are described as ‘web pages with an edit button’
*INTERNET AND INTRANET EXPLAINED IN CHAPTER 4*
Anyone can use wikis- content should be treated with
The world wide web (WWW) is a system of interlinked caution
hypertext
documents accessed via the Internet Example of a wiki: Wikipedia
Protocols are a set of rules that are followed between the
 
sender
and recipient of data which is being transferred
between devices.
Social Networking
HyperText Transfer Protocol (HTTP):
A protocol that is
followed between the sending and receiving
devices
These sites focus on building online communities of users
when data is being transferred using the internet.
who share
the same interests
HyperText Transfer Protocol secure variant
(HTTPS): HTTP
Enable people to share photos of themselves, their
that is followed when data being transferred is
favourite music
and videos, what they like to do, what
encrypted.**
they like to eat etc.
Hyperlink: Data that redirects
the user to another Example: Facebook
webpage/section of same webpage/file when
clicked.
These are becoming the modern way of interacting
File Transfer Protocol(FTP): Used
to upload website files
socially
to the web hosting space. To upload these
files
They allow people to communicate across the world and
successfully, the user needs:
share their
interests and views with many people.
An FTP client
Login details to the web hosting server (host and port
used,
username and password for FTP. 10.3. Information on the Internet
  Information is more likely to be up to date than in books,
since
websites can be updated very quickly
Cloud storage: Much easier to get information from websites- search
engines link
key words together and find information that
The storage of data (remotely) on the internet. matches the criteria-
cause for popularity
This data is accessible by the user with the requirement Vast amount of information on the internet- easier to
of an
appropriate authentication technique (e.g. user ID locate than
using indices in books
and password). Information on the internet however may be relevant or
correct, not
reliable, inaccurate or even biased- it does
 
not go through any
checking process
Information overload can make it difficult for the user to
Search Engine: find
relevant information
Ensure use of reliable websites that properly cite all their
A search Engine is used to find information on the
sources
internet without
knowing the (Uniform Resource Locator)
Always look for primary sources of information & form
of the webpage holding the
information.
own
conclusions
  Do not quote/use secondary often biased opinions or
gossip
Blog Do your research

Personal internet journals where the writer posts their


observations
on a topic 11. File Management
No training is needed to do this
Blogs range from minor projects (e.g. people gossiping 11.1. Manage Files Effectively
about a
topic) to important subjects such as politics or
advertising
products
Extension
Comments are not immune from the law Full form Used for/in:
name
Bloggers can be prosecuted for offensive comments

[Link]
CAIE IGCSE ICT (0417)

Extension fonts and formats


used in the making of ICT solutions by
Full form Used for/in:
name organisations.
Stylesheets in A corporate house style when used effectively identifies
css Cascading Stylesheet the users
of the style.
webpages
Consistent styles enable users to associate a particular
Comma Separated
csv Store tabular data organisation with a style and also show consistency in the
Value
ICT
solutions created by the organisation
Graphics Interchange
gif Moving images
Format

htm
Hypertext Mark-up
Webpages
15. Proofing
(Language)

jpg
Joint Photographic
Standard for images 15.1. Software Tools
Experts Group
Documents to be When a person’s/organisation’s name is entered or
Portable Document
pdf circulated over the sometimes newly
coined terms are used, spell checkers
Format
internet/email might pick these up as errors,
because they are not found
Portable Network in the dictionary. This makes spell
checkers less efficient.
png Compressed images Validation ensures that the data being entered into an ICT
Graphic
solution
is reasonable and makes sense. Entered data is
Word processed
rtf Rich Text Format checked against set
criteria to be validated.
documents
txt Text (File) Simple Text files
15.2. Proofing Techniques
Sending multiple files
zip as one compressed file
Verification: checking of data when copied from one
over the internet
medium to
another to prevent errors.
Verification is also important and is a way of preventing a
Generic file formats can be opened by any software to difference in data when it’s being transferred from one
access the
data held in them. system to
another. This tries to make sure data entered is
correct, relative
to the source.
11.2. Reduce File Sizes for Storage or
Transmission 16. Document Production
Files that are smaller in size upload and download faster
Widow: A paragraph-ending line that falls at the
than
larger ones and thus are better for transferring data.
beginning of the
following page or column, thus
separated from the rest of the
text.
12. Images Orphan: A paragraph-opening line that appears by itself
at the
bottom of a page or column, thus separated from
the rest of the
text.
An image should be edited when doing so will enhance its
Page, section and column breaks are used to ensure that
usefulness.
widows and
orphans are not present in a document
(these show poor typography).
13. Layout A mail merge document is created in order to create a
standard
template and then use it to send documents
personalised (by the
computer system) for the respective
Headers and footers ensure each page has all the
recipient of the document
required
information like the page numbers, logos, titles,
etc.
A common mnemonic is "An orphan has no past; a widow
has no
future"
17. Data Manipulation
17.1. Create a Database Structure
14. Styles
Flat file databases are tables that have data sorted in
Several organisations use a ‘corporate house style or rows and
columns, whereas relational databases are
corporate
branding, which is used to print on websites, several tables grouped
together to from a link, thus
visiting cards,
letters, etc. It refers to a specific style of preventing unnecessary repetition of
data.

[Link]
CAIE IGCSE ICT (0417)

Primary key: The key field of a table which is unique and Relative cell referencing is made when the cell reference
identifies
each record is
supposed to change when the cell it is referred to in is
Foreign key: The field linked to the primary field of the changing.
It aids more efficient designing of models.
table
linked to through a relationship Absolute cell
referencing is made when the cell
referenced stays constant when the
cell it is referred to in
Relational database Flat-file database is changing. This aids the preparation of
a model when a
Complex queries can be set of data is constantly being referred to
throughout the
Poor at complex queries
carried out model. Cell reference or relative cell reference
describes
Better security Poor at limiting access how far away a cell or group of cells is from some other
cell in the same spreadsheet. Basically, the cell’s address
Harder to update, so
Cater for future requirements A model prepared needs to be tested before being used
inherently inefficient
to ensure that
all results computed are accurate.
Data is only stored once Potential duplication
Definitions:
Require more planning Easy to design Cells: A space for data to be entered a table; a box
Non-unique records formed by
the intersection of columns and rows
Harder to change data Rows: Horizontal boxes that divide the table in
format. segments
Columns: Vertical boxes that divide the table in
At times placeholders for media such as images, sound segments
bites and
video clips are used to enhance the usability of Sheets: A table of data
a database Tabs: A module of a database program that holds the
tables on
the computer,
Pages: Full pieces of papers that contain information
17.2. Test the Data Model held on
one sheet of paper.
Ranges: A group of cells in a table
A model prepared needs to be tested before being used
Named cell: A cell in a table that is given a name (like
to ensure that
all results computed are accurate. The test
‘profit
margin’) and can be referred to using that
plan must be justified
to be apt for the model. E.g. all the
name.
mathematical operations must
be tested in a model that
Named range A group of cells in a table that are given
relies on calculations.
a name
(like ‘Pricing’) and can be referred to using that
Definitions:
name.
Testing: Checking if the designed model delivers the
Nested formulae/function: A formula/function used
expected
outcome when tested with data.
inside a
formula/function as an argument
Test data: The input data used for testing model.
Expected outcome: The output a model is supposed
to give with
the test data. 18.2. Test the Data Model
Actual outcome: The output a model actually gives the
user when
the test data is input. A model prepared needs to be tested before being used
to ensure that
all results computed are accurate. The test
plan must be justified
to be apt for the model. E.g. all the
18. Data Analysis mathematical operations must
be tested in a model that
relies on calculations.
Definitions:
18.1. Create a Data Model Testing: Checking if the designed model delivers the
expected
outcome when tested with data.
Charts: A graphical representation of (usually tabulated)
Test data: The input data used for testing model.
data
Expected outcome: The output a model is supposed
Accurate data ensures the results obtained by the
to give with
the test data.
processing of data
is relevant, which is essential to the
Actual outcome: The output a model actually gives the
usability of the model
user when
the test data is input.
Formulae are mathematical operators defined by the
user to perform a
function, whereas functions are
predefined logical and mathematical
operations a user 19. Website Authoring
can use in a spreadsheet
Mathematical operations are performed in the order
PEMDAS
(Parenthesis [Brackets] Exponents Multiplication
19.1. Web Development Layers
Division Addition
Subtraction). Brackets are used to
notate data used by a function,
e.g. =SUM (A2:A10). Content/Structure layer: Holds the content of the
webpage structure.

[Link]
CAIE IGCSE ICT (0417)

Presentation layer: The layer responsible for the


19.3. Use stylesheets
formatting of a
webpage(s) or elements (using a
stylesheet). CSS (cascading stylesheet) is a text-based language which
Behaviour layer: scripting language of a web page or an
is
attached to webpages to set their format. CSS files have
individual
element
a “.css”
extension
These should be attached using relative file paths as they
19.2. Create a Webpage are
stored along with the webpage and thus can be linked
relative to
them.
Tables make the basic structure of a webpage and Internal CSS have more preference over Inline CSS
organise page
layout. If several external stylesheets are attached to one web
Anchor: An element in a webpage that creates a hyperlink page,
the stylesheet attached last (at the bottom of that
between a
source anchor and a destination anchor. part of the
code) is given preference over the other
These can be used to link 2
resources together. attached ones).
Relative file paths are used for attached stylesheets as
the
stylesheet is going to be stored on a server in the
19.4. Test and Publish a Website
same directory
as the webpage, and not where it an
absolute file path says.
To upload and publish content on a website using FTP, a
Definitions:
user must
have:
Relative file path: A path referring to a file in the same
FTP client software
directory relative to the page the reference is made in.
All files in one folder
Absolute file path: The full path of a file, which is not Host Name/URL/IP address for ftp
relative to anything, whereas relative links only point
Host port to be used for upload
to a
file or a file path, the browser then redirects the
Username and password
user to
that location on the current site.
The test plan used to test a webpage must be justified
Absolute paths always include the domain name
based on the
elements being tested. E.g. If hyperlinks are
of the
website
being tested, it makes
to check if all the hyperlinks are
These should not be used to refer to locally saved
redirecting the user to the
correct webpage/ section of
webpages as the computer the webpage is stored
webpage.
on (the
server) is not the same as where the
webpage was developed
and thus an absolute file
path would point to the wrong
address.

[Link]
CAIE IGCSE
ICT (0417)

Copyright 2022 by ZNotes


These notes have been created by Krish Theobald, Akshya SP and Anand Sankar for the 2017 syllabus
This website and its content is copyright of ZNotes Foundation - © ZNotes Foundation 2022. All rights reserved.
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website without the express, written
permission of the copyright owner. Under no conditions may this document be distributed under the name of
false author(s) or sold for financial gain; the document is solely meant for educational purposes and it is to remain
a property available to all at no cost. It is current freely available from the website [Link]
This work is licensed under a Creative Commons Attribution-NonCommerical-ShareAlike 4.0 International License.

ZNOTES.ORG
SUMMARIZED NOTES ON THE THEORY SYLLABUS
ICT (0417)
CAIE IGCSE
UPDATED TO 2017 SYLLABUS
1. Types and Components of
Computer Systems
1.1. Hardware & Software
Hardware
They are the physical components that make up a
Stores data/information & programs not being used at
current time
Backing store device = reader or recorder
Example: Hard dis
Keyboard and pointing device awkward to use
Heat dissipation is difficult due to laptop structure
Tablet Computer
These are s
Moving heavy objects such as large engines
Impacts on everyday life:
Increased personal time since robots can take over
domes
Enables fast entry of new text into a document
Well-tried technology & well-known method of entry
Most people find them easy
Users control the pointer on the screen by rotating the
ball
Uses
Have the same pointing/cursor control capability as a
mouse
Disadvantages
The quality can be limited depending on how good
the scanner
resolution is
Digital Cameras
Photographs are stor
Because it is a continuous process any necessary
action or
warning will be initiated immediately
The system can be automatic,
Radio Frequency Identification (RFID) Readers
RFID readers work in similar ways to a bar code reader
An RFID tag is attached

You might also like