Znotes Ict
Znotes Ict
ORG
CAIE IGCSE
ICT (0417)
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
Stores data/information & programs not being used at Uses a mouse to select the icons
current time Screen divided into windows allows different things on
Backing store device = reader or recorder each
Example: Hard disk drive WIMP - Windows Icons Menus Pointers
Backing store media = hardware containing data Advantages
Example: Hard disk Easy to use because requires little IT knowledge
Easy to explore and find your way around the system
Do not have to learn complicated commands
Basic Computer Model Exchange data between different software
Good help facilities provided with GUIs
Disadvantages
Larger amount of hard disk space than other
interfaces
Significantly more memory (RAM) to run than other
interface type
GUI use more processing power than other types of
interfaces
GUI can be slow for experienced programmers to use,
they find CLI much faster
1.3. Operating Systems
1.4. Types of Computers
Enables users to communicate with computer systems
Controls operation of input, output & backing storage Desktop/Personal Computers
Supervises loading, running & storage of application
program Refers to general purpose computers
Deals with error in application programs PC refers to IBM compatible computers, distinguishing
Maintains security of whole computer system them from the
Macs
Maintains a computer log Made up of separate monitor, keyboard, mouse and
Two main types of interfaces: CLI & GUI processing unit
Advantages
Spare parts standardized results in low costs
CLI - Command Line Interface Tend to have better specifications
Large casing allows good dissipation of heat build up
Types commands to tell the computer what to do
Disadvantages
The user must know all the commands
Not portable since they are made up of separate
Must not make typing errors
components
Used by technicians
Wiring clutters up desk space
Can access everything on the computer system
Necessary to copy files as they aren't portable
GUI users can only access places they have icons for
Advantages
Knowing the correct commands, this can be much Laptop/Notebook Computers
faster than any other interface type
Uses much less RAM than any other interface type Refers to computers where monitor, keyboard, pointing
Low resolution, cheap monitors can be used device and
processor together in a single unit
CLI does not require Windows to run Extremely portable systems
Disadvantages Low weight
Can be confusing Low power consumption
Commands must be typed precisely, if there is a Processor doesn't generate too much heat
spelling error the command will fail Advantages
If you mistype an instruction, it is often necessary to Portable because monitor, pointing device, keyboard,
start all over again processor &
backing store units are together in one
Large number of commands need to be learned box
No trailing wires
Full advantage of Wi-Fi
GUI - Graphical User Interface Can link into any multimedia system
Disadvantages
Uses graphics to stand for the complicated actions
Easy to steal
Uses icons
Limited battery; need to carry charger
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
Moving heavy objects such as large engines Improved security since majority of credit/ID cards &
Impacts on everyday life: bank notes
use holograms to prevent forgery
Increased personal time since robots can take over Better movie experiences since 3D viewing can
domestic
chores provide a more
immersive experience for the
Increased manufacturing efficiency since robots are audience
much faster
and less expensive than human labour Greater data storage since holographic layers can
Unemployment as robots replace humans in potentially
decrease the thickness of disc storage
autonomous jobs
Safer working environments since robots can perform
tasks that
are too dangerous for humans Virtual Reality (VR)
[Link]
CAIE IGCSE ICT (0417)
Enables fast entry of new text into a document Used for controlling the position of a pointer on the
Well-tried technology & well-known method of entry screen to
allow:
Most people find them easy to use Selection from a menu
Easy to do verification check as data is entered, as it Selecting an icon
appears
on the screen simultaneously Scrolling up/down and right/left
Disadvantages Advantages
Users with limited arm/wrist use can find keyboards Faster to select an option by a mouse than a keyboard
hard to use Enables rapid navigation through applications and the
Entering data is slow when compared to direct data internet
entry (e.g.
Optical mark recognition) Mice are small and don’t take much area
They use up desk space as they are quite large Disadvantages
People with restricted hand/wrist movement can find
it hard to
operate a mouse
Numeric Keypads Easily damaged and can easily be clogged up with dirt
They are hard to use if there is no flat surface
available
Touchpad
A numeric keypad is used to enter numbers only
Touchpads are used in many laptop computers as a
Although some have function key to allow input of pointing device
alphabetical
characters The pointer is controlled by the user moving their finger
Uses
on the
touchpad
Used in Automatic teller machines (ATMs), where
Uses
customers can
key in their personal identification Used for opening, closing and minimising software
number (PIN), or an amount
of money Used for grouping, moving and deleting files
Used to key in phone numbers into telephones Useful when editing images (e.g. controlling the size
Electronic point of sale (EPOS) terminals have numeric
and
position of the image)
keypads
in case the barcode reader fails
Used for controlling the position of a pointer on the
Used in Chip and PIN devices to key in PIN, or amount screen to
allow:
of money Selection from a menu
Used to enable fast entry of numeric data into a Selecting an icon
spread sheet
Advantages
Advantages
Faster to select an option by a touchpad than a
Numeric keypads are faster than standard keyboards
keyboard
for entry of
numeric data Enables rapid navigation through applications and the
Since many are small devices (e.g. mobile phones), internet
they are easy
to carry around
Since the touchpad is integrated into laptop
Disadvantages
computer, there is
no separate mouse, aiding
Can be difficult to use due to the very small keys portability
Difficult to use for entering text They can be used when no flat surfaces are available
Sometimes the order of numbers isn’t very intuitive Disadvantages
People with limited hand/wrist movement can find
Mouse touchpads hard
to use
It can be more difficult to control the pointer when
An example of a pointing device compared to
a mouse
The ball underneath the mouse is used to detect They are more difficult when doing operations such as
movement ‘drag and
drop’
The left button is for selecting by double on it and the
right is to
bring drop-down menus
Tracker Ball
There is usually a scroll button which speeds up the
process of
moving through a document
Uses
Used for opening, closing and minimising software
Used for grouping, moving and deleting files
Useful when editing images (e.g. controlling the size Tracker ball is like a mouse except that it has a ball on the
and
position of the image) top of
the device
[Link]
CAIE IGCSE ICT (0417)
Users control the pointer on the screen by rotating the Video/computer games are often controlled by
ball joysticks
Uses They are used in simulators to mimic actual controls
Have the same pointing/cursor control capability as a Advantages
mouse Easier to navigate round a screen compared to a
Used in applications where the user has a disability keyboard
(RSI) Control is in three dimensions
Used in a control room environment, where it is faster Disadvantages
than a
mouse to navigate through process screens More difficult to control the on-screen pointer with a
and more robust than a
mouse joystick
than with other devices such as mice
Advantages
Tracker balls don’t need the same fine control as a
mouse Touch Screen
People with limited hand/wrist movement find easier
to use than
a mouse User can choose an option by simply touching a
The pointer can be positioned more accurately on the button/icon on the
screen
screen than
with a mouse The selection is automatically made without the need for
They take less desk space than mice since they are any
pointing device
stationary Use
Disadvantages Used for service tills e.g. petrol stations
Tracker balls are not supplied with the computer as Used where selections are made on a screen e.g.
standard, so
they are more expensive ATMs, public
information systems, airports and
User may need training since they are not standard railway stations
equipment Used in PDA’s
Used in Interactive white boards
Used in computer-based training (CBT)
Remote Control Advantages
Enable faster entry of options than a keyboard/mouse
A remote control is used to control the operation of other Very easy to choose options
devices
remotely by using infra-red signals User friendly method for inputting data
Uses They are tamperproof, preventing people from
In home entertainment devices such as Televisions, keying in
information (which could corrupt the
DVD
player/recorder and satellite system system)
Used to control multimedia systems Disadvantages
Used in industrial applications to remotely control There is a limited number of options available
processes,
stop and start machinery Using touchscreens often can lead to health problems
Advantages e.g.
(straining of arm muscles and RSI)
Enable devices to be operated from any distance, The screen can get very dirty with constant touching
which is useful
for people with disabilities
Some chemical processes are hazardous, so it is safer
to operate
equipment from a distance Scanners
Disadvantages
People with limited hand/wrist movement can find Used to input information on hardcopy e.g. text
them hard to
use document
The signal between the control and the device can be Uses
easily
blocked Used to scan in documents and convert them into a
format for use
in various software packages
Old and valuable documents and books can be
Joystick scanned, protecting
the original copies from damage
Non-digital photographs can be scanned for storing
on a computer
Advantages
Images can be stored for editing later
Scanners are much faster and more accurate than
typing in
documents again
By gripping the stick, a pointer on the screen can be
It is possible to recover damaged documents and
controlled
photographs by
scanning them and then using
Buttons are used to make selections
appropriate software to produce an
acceptable copy
Uses
[Link]
CAIE IGCSE ICT (0417)
Disadvantages
The quality can be limited depending on how good Microphone
the scanner
resolution is
Digital Cameras
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
LED Monitor:
TFT Monitor
Front layer made from light emitting diodes; grouped
together to
form pixels (RGB or RGBY-more vivid colours)
[Link]
CAIE IGCSE ICT (0417)
For the image to show up on-screen a light source of LED Home cinema systems (projecting the images from a
backlight
is used. DVD or
television) use multimedia projectors
Advantages (over LCD monitors): Advantages
Lighter and thinner Enables many people to see a presentation rather
Longer life than all of
them crowded around a small computer
Lower power consumption screen
Greater contrast and more vivid colour Avoids the need for several networked computers
Relatively more robust e.g. when looking at a video clip on the internet,
Disadvantages everybody can
see the video on the large screen
Glare gives viewers headaches rather than logging on to
several computers
Images too sharp, so can cause eye strain Disadvantages
Images can sometimes be fuzzy
Expensive to buy
Touch Screen Setting up projectors can be a little difficult
[Link]
CAIE IGCSE ICT (0417)
Disadvantages
Very noisy – not good in an office environment
Cost more than an inkjet printer to buy
Very slow
Printing is of poor quality
3D Printer
[Link]
CAIE IGCSE ICT (0417)
The ultimate objective is to produce organic objects e.g. operating motors, pumps,
switches and valves
using this
layering technology (such as replacement Digital signals are sent from the computer to an actuator
human organs) to operate
a device
Advantages Conversion of the digital signal to analogue is required
Save a lot of money, other methods of making first
(using a DAC)
prototypes are very
time consuming and expensive
The powders used can often be ground up and
reused Motors
Physical scale models are produced with working
parts, which
gives a better idea of how the product
will look
Disadvantages
Expensive to buy
Turned on or off by the actuator
Slow at producing their output
Uses
Product is sometimes a little rough, often further
Used in many domestic appliances
work needs to
be done
Automatic washing machines (to make the drum
rotate)
Cookers (to switch on fans)
Speakers
Water pumps in central heating systems
Automatic greenhouses to open windows and switch
on fans
Used to control robot arms in the industry
Operate fans, disk drives and DVD drives in
computers
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
Different file formats can be used each time Disks are relatively expensive
Less wasteful than R format since files or data can be Blu-ray disks still have encryption problems
added at
a later stage
Disadvantages 3.3. Solid State Backing Storage
Relatively expensive media
Possible to accidentally overwrite Solid state systems control the movement of electrons
within a
microchip: if the transistor conducts a current,
this is equivalent
to a 1, otherwise it is a 0
DVD-RAM
Have no moving parts, consume much less power and are
Recent addition to optical media group extremely
robust
Used primarily as removable storage devices and are
Unlike other CD and DVD formats, DVD-RAMs have
collectively
known as flash memory
several discrete
concentric tracks rather than a single
spiral track
Gives them advantage that writing, and reading can occur
Solid State Drives
at the same
time
Makes it possible to watch an already recorded television Supports reading/writing data & maintains stored data in
program at
the same time as a different program is being a permanent
state even without power
recorded Functions much like a hard drive but different tech
Recording layer is made from similar phase-changing Built with an array of semiconductors that form its
material to that
used in RW technology memory and
operated using an integrated circuit
Shiny and dull marks represent data to a computer where Uses
they are
interpreted Used to store operating systems and working data
Uses Used for storing application software
DVD-RAMs are used in recording devices such as Used in file servers for computer networks
satellite
receivers to allow simultaneous recording Advantages
and playback Faster than hard disks because they do not need to
They are used in camcorders to store films ‘spin up’ the
disk
Advantages Robust because no mechanical parts
Have a long life (30 years) Read performance is fast even when data fragmented
Can be re written on more than the DVD-RWs Less susceptible to data loss
(100,000 times) Lighter, quieter and require less power than hard
Very reliable as they have built in verification software disks
to
ensure accuracy of data Disadvantages
Access is very fast More expensive than hard disks
No need to finalize the disk Have a smaller capacity than modern hard disks
Very large capacities Lower number of write cycles causing performance to
Ability to read and write data at the same time diminish
over time
Disadvantage
DVD-RAMS are not as compatible as R or RW, many
systems will not
recognize this format Flash Drives/Memory Sticks
More expensive than DVD-RW
Otherwise called pen drive/memory stick/USB stick
Can store several GBs of data and use solid state
Blu-Ray Discs technology
Connected to a computer through USB port and power to
Uses operate drawn
from host computer
Blu-ray disks are used in home video consoles Some expensive software increasingly uses these storage
Used for storing and playing back films methods as a
form of security
PCs can use this technology for data storage or Uses
backing up hard
drives Used to transport files between computers
Camcorders can use this media to store film footage Used as a security device – a dongle – to prevent
Advantage software
piracy
Very large storage capacity Advantages
Data transfer rate is very fast Very compact and portable media
Data access speed is faster than with other optical Very robust
media Disadvantages
Disadvantage Not possible to write protect the data and files
[Link]
CAIE IGCSE ICT (0417)
Small physical size and are easy to lose. Routing tables list all the different routes to other
Lower storage capacity than hard disk networks
Routing table determines best route for data
A device that enables data to be sent between different They are devices that can have multiple devices
connected to them
types of
networks
Commonly used to connect computers and other Main task is to receive data from different ports and send
it to
each device
network capable devices
to the internet
They can be connected to through cables or wirelessly The information will be received to the device whether its
relevant,
or not
Function
Bridges
Makes decisions on messages being passed between the
networks It connects 2 different types of networks together e.g. a
bus and
star network
Reads information about the message and decides where
the message
should go and the best route for it to get It can only connect networks that use the same way for
handling
messages
there
Formats the messages making it suitable for the new They do this by changing the form of message to suite the
different
type of network
network
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
Internet Intranet
Phrase Internal Restricted
Wide Area Networks (WAN)
International Network
Origin Access Network
WAN is formed by several LANs being connected through
Purpose Globally share data Privately share data a router or a
modem
Specific company or Some companies set up Private WANs, it is expensive
Audience Wide range of people
organisation however it comes
with a more enhanced security
[Link]
CAIE IGCSE ICT (0417)
Advantages Disadvantages
Smaller & lighter than Inappropriate Websites
Larger & less portable than
desktops & laptops making it
smartphones Risk of finding undesirable websites
easier to carry
Risk of doubtful websites which are not genuine
Uses Wi-Fi to connect to the
Larger screen than They could lead to problems such as undesirable web
internet which is less reliable
smartphones links, security
risks
than wired
On-screen keyboards larger Screens are smaller than
4.11. Password Interception
than those on smartphones those on laptops & desktops
[Link]
CAIE IGCSE ICT (0417)
Strong passwords: A random mix of alphabets (uppercase Fingerprint Scanning: Scans the pattern
and
lowercase), numbers, and keyboard symbols (@, %, ^
on fingers and verifies it against a stored database of
etc.)
authenticated
fingerprints using pattern-matching software
Weak passwords: Easy to guess, e.g. users name or date
to allow access to a
user.
of birth or
1234556, etc.
Frequent password changes can help reduce the chances
of password
interception too 4.13. Data Protection Act
Passwords must not be shared; their strength is then of
little use. Failure to abide to rules can lead to fines or
imprisonment
4.12. Authentication Techniques
Rules (SAREF DES SAS)
Magnetic Stripes: Card swiped through a
1. Data must be Fairly and lawfully processed
magnetic stripe reader that authenticates the user after
2. Data can only be processed for the Stated purpose
reading
iron-based magnetic particles on a band of magnetic
3. Data must be A**dequate, Relevant and not Excessive
material on
the card which is also called a magstripe.
4. Data must be Accurate
ID Cards: Usually a photo ID with a QR 5. Data must not be kept longer than necessary (Short
time)
or barcode that authenticates the user. 6. Data must be processed in accordance with the data
Subject’s right
7. Data must be kept Secure
8. Data must not be transferred to another country
unless
(Domestic) they have adequate protection
[Link]
CAIE IGCSE ICT (0417)
Effects on People:
Video-Conferencing
People need to be retrained due to new technology
This is a method of communication between people at 2 Cleaner working environment
or more
separate locations De-skilling of workforce
[Link]
CAIE IGCSE ICT (0417)
Computers can now do tasks that required high skill level Causes Prevention
Safer working environment Clicking on mouse
Fewer manual tasks such as heavy lifting Use a wrist rest
rapidly/extendedly
Effect on Companies: Ensure sufficient space for
Holding mouse incorrectly
comfortable work
Can employ less people
Working in a cramped space
Robots do not take holiday, get sick or need breaks
Greater consistency in products made
Back Problems
[Link]
CAIE IGCSE ICT (0417)
Collection of webpages, text, graphics, video and sound Animations can be produced using computer hardware
Hosted on a web server on the internet and software
Need to write code or use a web authoring application With 3D animations objects are designed on a computer
Hyperlinks to other pages can be added and a 3D
skeleton is produced
Interactive websites require programming knowledge Parts of the skeleton are moved by the animator using
Can use a camera, scanner, microphone to input data key frames
Usually hire space from web hosting company The difference in appearance of the skeleton in these key
Advantages frames is
automatically calculated by the software and is
Ability to add sound/video/animation known as tweening or
morphing
Links to other websites/hyperlinks The final stage is to make a realistic image by a technique
The use of hot spots known as
rendering
Buttons to navigate/move around the website
Hit counters to see who has visited the websites
Disadvantages
Can be hacked and modified or viruses introduced Flyers & Posters
Need for a computer and internet connection
A Word processor/Desktop publisher is used to create it
Lack of portability compared with paper-based system
Need to hold minimum amount of information and be
Need to maintain website once it is set up
accessible very
quickly
Need to make an immediate impact when people look at
them
Multimedia Presentations Anyone can produce them but there are highly skilled
professionals
who can produce expert posters
Uses a mixture of media to present information: Some posters require larger printers than A4
animations, video,
sound, transitions, hyperlinks Sequence in which a flier or poster is produced on a
Produced using software packages computer system
Used with a projector so large audience can view A word processor or DTP application is opened
Advantages The user creates frames, boxes and text boxes
Use of sound and animation/video effects If necessary, photos are taken, using a camera
Interactive/hyperlinks built into presentations The images are uploaded from the camera, loaded
More likely to hold audience’s attention from a CD/DVD,
scanned from hard-copy photos or
Disadvantages downloaded from the internet
Need for special equipment – expensive The photos are saved to a file
May require internet access The photos are imported or copied and pasted into
the document
The photos are edited and typed in or imported from
a file and
then put into required style
Music Scores
Music samplers and mixers allow original tracks that were
recorded
in a studio to be modified Mobile Phones
Electronic instruments can play back through electronic
effects
machines Wireless devices that allow users to make phone calls
Synthesizers combine simple wave forms to produce from anywhere
with cell reception
complex music
creations They connect to the telephone system using radio signals
Electronic organs can mimic any other instrument This requires them to be in range of a mobile tower
Music scores can be generated from music itself using Used for communication via
software Phone calls
Software can automatically correct music notes in a score Text messaging
There is no need to understand music notation to write a Social Media
music score
Music notes are automatically printed out in the correct
format
Internet Telephony/VOIP
VOIP (Voice over internet protocol) is a method used to
Cartoons talk to
people over internet
VOIP converts sound (picked up by a microphone) into
discrete
digital packets that can be sent to a destination
[Link]
CAIE IGCSE ICT (0417)
via the internet People may not feel comfortable being truthful
What names do you want?
First name, family name etc.
Date of Birth
Publicity & Corporate Image What format do you want it in?
Give instructions about how to answer questions
Publications
How will the data be collected?
Business Cards: Paper surveys are scanned using OMR or OCR
Miniature printed documents that provide Advantages
information about the
business/organisation Faster to get results
Usually printed on thick cards Fewer errors
Easily distributable to potential clients It is easier to do statistical analysis
Information includes company logo, services, address, Less expensive to carry out; requires fewer people
contact
numbers, email, website Online questionnaires
Gives a professional impression Usually use radio buttons
Letterheads: No data preparation needed
Found at the top of official printed documents to be Results sent directly to database for analysis
mailed to
clients or for internal use
Makes it clear to reader who the sender is
Information includes company logo, name, address, Address Lists
contact
numbers
Gives a professional impression An address book on a computer or mobile phone might have
Easy to reply to a contact’s
home address, phone number, email address,
Flyers: personal information like the
date of birth etc.
Generally printed on single sheets of A4 paper
Handed out directly to people for promotions
Cheap to produce and easily distributable (locally)
Information includes company logo, promoted
product or service,
contact details
Makes it easier to target a specific audience
Brochures:
Also called leaflets & are like flyers Clubs & Society Records
Difference is that they are often folded into sections
Left on counters for pick up rather than handed out Need to keep a record on members usually in a database
Information includes company logo, promoted Usually payment details, contact details and interests
product or service,
contact details It makes it easy to match people with interests and send
Makes it easier to target a specific audience information
about what they are interested in
This can be done my using mail merging
Easy to check memberships and send out reminders
6.2. Data Handling Applications
It is important to follow the data protection act
Surveys
[Link]
CAIE IGCSE ICT (0417)
Sensors are used to send data to a computer where the Sensors read data from the river (oxygen levels and
data is
processed acidity levels
using a pH sensor)
The computer simply reviews the data from the sensors The data from the sensors is converted into digital using
(by comparing
it to data stored in memory) and updates an ADC
its files and/or gives a
warning signal if the values are The computer stores the received data
outside given parameters The oxygen levels and acidity levels are compared to the
No changes to the process are made historical
data stored in memory and they are also
Examples: compared to alarm levels
stored in memory
Scientific experiments One of two things will now happen: either the data is
Weather stations transferred to
a CD/DVD or to a memory stick and taken
away for analysis later or
the computer is connected into
a mobile phone network and transmits
the data back
automatically to the monitoring station
Analogue & Digital Data
Digital data: discrete, fixed value (used by computers)
Analogue data/signals: continuous value that varies Intensive Care Units in Hospitals
smoothly
Analogue device = measure length, weight, Sensors read key vital signs (such as pulse/heart rate,
temperature etc. temperature,
blood pressure, respiration, etc.)
E.g. Thermometer – represents temp. by the height of The data from the sensors is converted into digital using
the liquid
column an ADC
Sensors: measure physical and analogue qualities The data is stored in the computer memory
Analogue data from sensors needs to be converted into The computer compares the data from the sensor with
digital data
using an analogue to digital data converter the values
stored in its memory
(ADC) so that the
computer can understand and process The results are output on a screen in the form of graphs
the data from the sensors and/or
digital read-outs
If the computer sends signals to motors, valves, etc. then An alarm is activated if any of the data is outside
this data
also needs to be converted to analogue using a acceptable
parameters
digital to analogue
converter (DAC) so that the computer The system continues to monitor the patient until the
can effectively control these
devices computer is
turned off
[Link]
CAIE IGCSE ICT (0417)
Will not function in a power cut if no backup power Lights on machine to show user stage the cycle is
present
(expensive to have reliable backup power) at
Actuators to turn the inlet valves on to allow hot
and cold
water into the machine
6.4. Microprocessors in Control
Actuator to turn the outlet valve on to let the
Applications water out of
the machine when the wash is
complete
Sensors are used to send data to a computer where the An actuator to control the pump
data is
processed Processing
The computer reviews the data from the sensors (by Software to make decisions which will allow the
comparing it to
data stored in memory) clothes to
be washed
If the values are outside the given parameters/pre-set Time taken before next inputs
value it acts
to try and get the values within acceptable Timer as part of the software
ranges Time different cycles (when to add
It does this by sending signals to devices controlling the soap/conditioner/etc.)
process Time delay in measuring temperature
Needs to be time for changes to have effect
Unmanageable situations
Door may not be shut
Turtle Graphics
Needs to draw user’s attention
Based on computer language called LOGO and is now Usually a buzzer and light
usually known as
turtle graphics
It is the control of the movement of a ‘turtle’ on a
computer screen
by several key instructions which can be Central Heating System
typed in
The use of ‘repeat’ instructions makes a piece of code Applying factors
more
efficient Inputs
Inputs from the user
Command Meaning
Room temperature required
FORWARD x Move x cm forward Time systems turns on/off
BACKWARD x Move x cm backward Inputs from the system
LEFT d Turn left through d degrees Actual room temperature
Clock giving the time
RIGHT d Turn right through d degrees
Outcome
REPEAT n Repeat next set of instructions n times Heating or cooling room during the required times
ENDREPEAT Finish the repeat loop Outputs
PENUP Lift the pen up Boiler
Air conditioner
PENDOWN Lower the pen
Processing
Check time against the one input and switches on
when that
time is reached
Same done to check when to turn off
Automatic Washing Machines
When on, microprocessor reads temperature from
Have a microprocessor in them which contains the sensor and
compares it with desired temperature
software which
controls the washing machine If too low, it will heat up by turning the boiler
Appling the factors on and
if it’s too high it will turn the air
conditioner on
Inputs
These will stay on until desired temperature is
Pressure sensor on the door to detect if open or
closed reached
Sensor to detect if the required level of water is in
Temperature sensor to check temperature
Outcome Automatic Cookers
Clothes have been washed
Outputs Have temperature sensors and timers with manual
Heater controls to set
start and end times, and temperature for
Motor to spin drum cooking.
Working similar to Central Heating System.
[Link]
CAIE IGCSE ICT (0417)
Burglar Alarms
Advantages
[Link]
CAIE IGCSE ICT (0417)
They are less expensive in the long term (they don’t need Prints the exam timetables.
wages)
however they are expensive to buy initially Allots examination rooms and the invigilator.
Productivity is higher, since they do not need holidays, Gathers the results and puts them into the student
are not ill
etc. database.
There is greater consistency – every car coming off a Creating timetables and managing teaching
production
line is identical cover/substitution
They can do boring, repetitive tasks, leaving humans free Considers the student’s choices, availability of
to do more
skilled work teachers and
rooms, subject clashes and the number
of hours needed for each
subject to produce accurate
Disadvantages timetables that can easily be made
changes to and
cover with teacher to be substituted.
Robots find it difficult to do ‘unusual’ tasks (e.g. one-off School management systems:
glassware for a chemical company)
They replace skilled labour, leading to unemployment Advantages Disadvantages
Since robots do many of the tasks once done by humans, Absenteeism can be Operating the software will
there is a
risk of de-skilling addressed more easily. need some training.
Because robots are independent of the skills base,
The initial cost of the
factories can be
moved anywhere in the world, again Parents are kept updated.
software is expensive.
causing unemployment
Unauthorised access will
Reduced workload for have to be prevented as
6.7. School Management Systems teachers. there is lots of personal
information.
Learner registration and attendance
They are helpful for the
ID cards with magnetic tapes: The students will have
decision making of the
to
swipe their ID cards, which contain the student’s
administration department
name, school’s
name, date of birth and the
registration ID, when they enter and
leave the school,
this way time is saved and the attendance is
more 6.8. Booking Systems
accurate.
Biometrics: Every student’s fingerprint is stored on a Booking systems are used for transport (flights, trains
database along with their personal information, the and buses),
cinemas and theatres
students
must put their finger on a fingerprint
scanner to enter or leave
the school premises. Theatre booking system example:
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
The system suggests the possible illness with a These systems have been developed to mimic the
probability of
each, cures and recommendations on expertise and
knowledge of an expert in a particular field
the next step to be taken. Examples include:
The explanation system will explain how that Diagnosing a person’s illness
particular
diagnosis was suggested. Diagnostics (finding faults in a car engine, finding
Using 3D printers in medicine: faults on a
circuit board, etc.)
Surgical and diagnostic aids: A CT or MRI is used to Prospecting for oil and minerals
produce
images of the internal parts of the body. A 3D Tax and financial calculations
printer can then
be used to reproduce the internal Chess games
organs as a solid object. Identification of plants, animals and chemical
Prosthetics: 3D printers are used to print out artificial compounds
body parts such as false tooth, artificial limbs, hearing Road scheduling for delivery vehicles
aids,
etc. This is a less expensive method of replacing
body parts.
Tissue engineering: Used to produce layers of cells to
replace damaged tissues.
Design of medical tools and equipment: Tools can be
made
faster and with reduced costs. They can also be
made changes to
easily, whereas it wasn’t the same
Expert System Setup
with traditional methods.
Experts in the field are interviewed to find out what is
6.11. Computers in Libraries needed in
the expert system
Data is then collected from these experts
Many library systems are computer controlled A knowledge base is designed and then created
They usually involve the use of barcodes on the books The rules base is designed and created
being borrowed
and on the borrower’s library card The inference engine is designed and created
The following describes a computerized library system The input screen and output format are also designed
based on
barcodes and created –
this is known as the user interface
There are two files: The expert system is tested against known conditions and
Book file, containing fields for example: barcode, book scenarios
title,
name of author etc. It is also checked to see if it meets the original
Borrower’s file, containing fields for example: specification
borrower’s
number, borrower’s name etc. Experts are interviewed about how effective it is before
When a borrower takes out a book, the book’s code is the expert
system goes out on general release
scanned
The book details are then found on book file Advantages
The borrower’s library card barcode is then scanned for
Expert systems provide consistent answers
the
borrower’s unique number
They never ‘forget’ to answer a question when
The book file is linked to the borrower’s file and both files
determining the logic
are
updated to indicate which book has been borrowed
Using expert systems reduces the time taken to solve a
and when it is due
back problem
The borrower’s file is interrogated daily by the computer
A less skilled worker force is needed, which gives the
to see
which books are overdue for return:
potential of
saving money, but also allows areas of the
The computer reads a record from the book file
world access to expertise
which they could not normally
It compares the date due back with the current date
afford
If the date due back is less than (or equal to) the
current date
(i.e. earlier date) … Disadvantages
…using the barcode number of the book…
…the book file is linked to the borrower’s file… They tend to lack common sense in some of the decision-
…and the corresponding record is read from the making
processes
borrower’s file Errors in the knowledge base can lead to incorrect
The customer details are then found and a letter or decisions being
made
email is
automatically sent out It can be expensive to set up in the first place
The next record in the book file is then read… Considerable training is necessary to ensure the system is
…until the whole file has been checked sued
correctly by the operators
6.12. Expert Systems
[Link]
CAIE IGCSE ICT (0417)
This is made up of a series of ‘inference rules’ (e.g. IF the Waiter inserts card into chip and PIN reader
country is in South America AND the language used is Restaurant’s bank contact customer’s bank
Portuguese THEN
the country must be Brazil) Card is checked to if valid
These inference rules are used by the inference engine to If card is stolen or expired, then transaction is terminated
draw
conclusions Customer enters PIN using keypad
They closely follow human-like reasoning PIN is read from chip on card and is compared to one just
keyed in
If they are the same, the transaction can proceed
Check is then made on whether they have enough funds
Suggesting Diagnoses If there are not enough funds available, transaction is
terminated.
Otherwise, transaction is authorized
The interactive screen asks a series of question for the
Authorization code is sent to restaurant
doctor to
answers, using a keyboard or a touch screen.
Price of meal is deducted from customer’s account
The inference engine compares the symptoms with the
Same amount of money is credited to restaurant’s bank
knowledge base,
using the rule base to find matches.
account
The system suggests the possible illness with a
Receipt is produced as proof of purchase
probability of each,
cures and recommendations on the
next step to be taken.
The explanation system will explain how that particular
diagnoses
was suggested. Internet Shopping
6.13. Computers in the Retail Industry Online shopping: Shopping over the internet.
To customer:
Advantages
Automatic Stock Control
Cheaper goods (the company doesn’t have to pay
Automatic stock control systems rely on the use of rent for
stores and doesn’t need more employees)
barcodes Wide range of products
Barcodes now appear on most products sold in shops Delivery at your doorstep
They allow quick identification of product details once the You can shop 24/7
barcode
has been scanned by a barcode reader Shop from any part of the world
Supermarkets use electronic point of sale (EPOS) You save the travelling costs of going for shopping
terminals, which
incorporate a barcode reader that scans Disadvantages
the barcode, retrieve the
price of the article and relay Quality isn’t assured
[Link]
CAIE IGCSE ICT (0417)
People are worried about giving their card details A photo of you is clicked which is then compared with
online. the image
stored in the RFID chip.
Packing and postal charges are added If the face-recognition passes, some checks are made
Personal services that you get from stores are in turn to
make sure you are eligible to enter the
missed. country, and if you are,
the gate opens automatically.
Returning the products is harder RFID in contactless payments:
No relaxation that you get from actual shopping The embedded chip on credit/debit cards and the
Bogus sites are present where you pay and never antenna enable
customers to wave their card over a
receive the
product reader at the point of sale
terminals to make
To seller: payments
Advantages Smartphone apps can also be used to make
No need to pay rents contactless payments.
No fixed working hours
Less/no shoplifting 6.15. Monitoring & Tracking Systems
Sell goods to customers anywhere in the world
Cheaper to contact customers (via e-mail) Public monitoring/tracking:
Site warehouse where rental is cheap Ankle monitor: uses RFID chip to give out the person’s
Sell goods 24/7 location and other details. It is tamper proof and will
Disadvantages alert
authorities if tried to remove.
ICT knowledge needed to set up website Phone call tracking: the service provider tracks the
Unemployment calls
and the exact position from which they were
Business abroad is lost if the prices are cheaper made
there Worker monitoring/tracking: Workers are
At times of network failures, there will be no monitored/tracked in the
following ways:
access Supermarket workers: have the number of items
Not everybody can access the internet, so a few passing
through the tills over a period of time
customers
are lost monitored.
Customer’s personal data can be hacked Internet use is monitored by network managers: they
Postal charges discourage people at times can
check sites visited and time spent on that site
during working
hours.
6.14. Recognition Systems Emails can be read: Employers can check that no
personal
mails are sent during office hours.
Automatic Number Plate Recognition (ANPR) systems: Delivery drivers: Their location can be tracked using
A sensor sends signals to a microprocessor, which GPS
systems. It can also be checked if they are
instructs a
camera to capture the front of a vehicle. following the
shortest route and aren’t speeding.
OCR software is used to read the number plate from Key logging: Software that records the keys pressed by a
the image.
The characters are then converted to text user on
the keyboard. They are used to find username
format in order to
store it in a database and passwords of a
user.
Processing of cheques: Employee call monitors: Allows the employer to listen to
The value of a cheque is printed in special ink employee’s telephone calls. There are three ways it can
containing iron
particles when a cheque is presented. be used:
MICR is used to read the characters at the bottom of Monitor: The manager/supervisor can listen to calls
the cheque. without
the employee or the customer’s awareness.
A batch processing method is then used to process all Whisper: The manager can help the employee with
the
cheques at the end of a specific time period. the call,
but the customer can’t hear the manager
OMR media in schools: speak.
School registers: Paper-based registers are fed into Barge: Both the employee and the customer can hear
OMR to
be scanned and are then stored on a the
manager
database. Employee call monitors: Allows the employer to listen to
Multiple-choice examination papers: The position of a employee’s telephone calls. Call monitors can be used:
mark
is stored in a computer’s memory after being to improve the employee’s performance
read by the OMR
device using a template that maps to allow the manager/supervisor to join a call where
out the X-Y coordinates of
each lozenge (pen/pencil necessary
mark). as a training tool
RFID in passports: Uses of Automatic Number Plate Recognition (ANPR)
The data on the RFID chip is read when the passport systems:
is scanned. Traffic enforcement: the system can check if a vehicle
is
taxed, recognize cars parked illegally, cars speeding
[Link]
CAIE IGCSE ICT (0417)
or going
through red lights so a fine can be imposed. Used to capture, manage, analyse and display
Car park management: the system reads the geographically
referenced information.
registration
number and if allowed into the car park, Use to determine distance between two places.
the barrier is raised. Used to find the nearest petrol station or restaurant,
Electronic toll collection: the system recognizes the etc.
vehicle and deducts the fare accordingly. To protect animal and plant life in certain vulnerable
places.
Can be used in geography, science or engineering
lessons.
Cookies
Cookies are small files sent to a user’s computer via their
web
browser when they visit certain websites Media Communication Systems
They store information about the users and this data is
accessed
each time they visit the website Using satellite signals for communication.
For example: Used by media companies when sending
They remember who the user is and send messages stories/videos/pictures
from remote locations.
such as “Welcome
Sarah” each time they log onto the
website
They recognize the user’s buying preferences e.g. if a 7. System Life Cycle
user buys
CDs, pop ups related to their buying habits
will appear on the
user’s screen each time they visit 7.1. Introduction
the website
Without cookies, web server would have no way of A systems analysis team is often brought in to review an
knowing that the
user had visited website before existing
system and suggest several improvements
For this reason, cookies could be used to monitor one’s The existing method used may be either a manual paper-
internet
activity based system
or a computer-based operation that is no
longer regarded as adequate
for the task
6.16. Satellite Systems
7.2. Analysis
Global Positioning Systems (GPS)
The basic steps in the analysis stage can be summarized
Used to determine the exact location of several modes of as follows:
transport
Cars usually refer to GPS as satellite navigation systems
Satellites surrounding the Earth transmit signals to the
surface
Computers installed in the mode of transport receive and
interpret
these signals
Knowing their position on the Earth depends on very
accurate timing
– atomic clocks are used in the satellites
which are accurate to
within a fraction of a second per
day
Each satellite transmits data indicating its position & time
The computer on board the mode of transport calculates
its exact
position based on the information from at least 1. Fact finding/collecting data from the current system
three satellites 2. Description of the current system – establishing the
inputs, outputs
and processing being done
3. Identification of the problems with the current system
4. Agreeing the objectives with the customer
Satellite Navigation 5. Identifying and agreeing the customer’s requirements
6. Interpreting the customer’s requirements
Used to determine the exact location of a car.
7. Producing a cost-benefit analysis
The computers onboard can be used to show
8. Producing a data flow diagram
directions to a
destination.
[Link]
CAIE IGCSE ICT (0417)
Advantages
4 Common Methods of Fact Finding It allows information to be obtained which was not
possible by
any of the other methods
Observation
The analyst can see for themselves how the paper
Involves watching personnel using the existing system to system operates
find out
exactly how it works It allows the analyst to get some idea of the scale of
Advantages the
problem, memory size requirements, type of
The analyst obtains reliable data input/output devices
needed
It is possible to see exactly what us being done Disadvantages
It is a relatively inexpensive method It can be very time consuming
Disadvantages Because of the analyst’s time, it is a relatively
People are generally uncomfortable being watched expensive
method
and may work in
a different way
If workers perform tasks that violate standard 7.3. Design
procedures, they
may not do this while being watched
Once the analysis has taken place and the systems
Interviews analyst has some
idea of the scale of the problem and
Involves a one-to-one question-and-answer session what needs to be done, the next
stage is to design the
between the
analyst and the employee/customer key parts of the recommended system
Advantages A list of tasks is summarized here
It gives the opportunity to motivate the interviewee Designing data capture forms/input forms
into giving
open and honest answers to the analyst’s Designing screen layouts
questions Designing output forms and reports
Producing systems flowcharts and/or pseudo code
It allows the analyst to probe for more feedback from
the
interviewee, as it is easier to extend a question Selecting and designing validation rules that need to
be used
It is possible to modify questions as the interview
proceeds and
ask questions specific to the Selecting the most appropriate data verification
interviewee methods
It is a good method if the analyst wants to probe Designing and agreeing the file structures and tables
Selecting and designing the hardware requirements
deeply into
one specific aspect of the existing system
Disadvantages Selecting and designing the software requirements
Producing algorithms or program flowcharts
It can be rather time consuming
It is relatively expensive, due to the use of the Designing a testing strategy/plan
analyst’s time
The interviewee cannot remain anonymous
Questionnaires Verification
Involves sending out questionnaires to the work force A way of preventing errors when data is copied from one
and/or to
customers to find out views of the existing medium to
another
system and find out how
some key tasks are carried out Double entry: data is entered twice, sometimes by two
Advantages different people
The questions can be answered quite quickly The computer compares the two entries, either after
It is a relatively inexpensive method data entry
or during the data entry process, and
Individuals can remain anonymous if they want identifies any differences
It allows quick analysis of the data Visual check: checking for errors by comparing entered
Disadvantages data on
the screen with the data in the original document
Often the number of returned questionnaire is low (not the same as
proof reading)
The questions are rather inflexible since they have to
be
generic
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
The old system is stopped overnight and the new system Comparing Changeover Methods
introduced
immediately
Advantages Changeover method Direct Parallel Pilot Phased
The benefits are immediate Relative costs Low High Medium Medium
Costs are reduced - since only one system is used Input needed by the user Medium High Low Medium
there is no
need to pay for two sets of staff Input needed by systems
There is less likelihood of a malfunction since the new Low* Low Medium Medium
team
system
will have been fully tested
Impact of failure High Low Low Medium
Disadvantage
This method can be disastrous if the new system fails
7.6. Documentation
Parallel Running
Once the new system is fully developed, a considerable
The old and new systems are run side by side for a time
amount of
documentation needs to be produced
before the
new system takes over altogether
For the end user
Advantages
For people who may need to modify or develop the
If the new system fails, the old system is still available
system further
at some later stage
as a
back-up
There is some overlap between the two types of
It is possible to train staff gradually
documentation, but
the basic requirements are shown
Staff have time to get used to the new system
below
Disadvantage
It is more expensive than direct changeover, since
extra staff
are needed to run both systems together
Technical Documentation
[Link]
CAIE IGCSE ICT (0417)
Technical documentation is designed to help compare the final solution with the original
programmers & analysts
who need to make requirement
improvements or repair/maintain to the system identify any limitations in the system
This can consist of any of the following: identify any necessary improvements that need to be
purpose of the system/program/software made
program listing/coding evaluate the user’s responses to using the new
programming language used system
flowchart/algorithm compare test results from the new system with
input formats results from the
old system
hardware requirements compare the performance of the new system with the
software requirements performance
of the old system
minimum memory requirements observe users performing set tasks, comparing old
known bugs in the system with new
list of variables used (and their meaning/description) measure the time taken to complete tasks, comparing
file structures old with new
sample runs (with test data and results) interview users to gather responses about how well
output formats the new
system works
validation rules give out questionnaires to gather responses about the
meaning of error messages ease of
use of the new system
Some results from the evaluation may require changes to
either
hardware or software. Hardware may need to be
updated because:
User Documentation of feedback from end users
new hardware comes on the market, making change
User documentation is designed to help users to learn
necessary
how to use the
software or system
there are changes within the company which require
This can consist of any of the following:
new devices
to be added or updated
the purpose of the system/program/software package
Software may need to be updated because:
how to log in/log out
of feedback from end users
how to load/run the software
changes to the company structure or how the
how to save files
company works may
need modifications to the
how to do a search
software
how to sort data
changes in legislation may need modifications to the
how to do printouts
software
how to add, delete or amend records
screen layouts (input)
print layouts (output) 8. Safety & Security
hardware requirements
software requirements
sample runs (with test data and results) 8.1. Physical Safety
error handling/meaning of errors
troubleshooting guide/help lines/FAQs Ways of eliminating or minimizing
Safety hazard
tutorials hazard
Use a residual circuit breaker
7.7. Evaluation Electrocution from
(RCB), Check insulation on wires
regularly, Do not allow drinks near
spilling drinks
Once a system is up and running it is necessary to do computers, Check equipment
some
evaluation and carry out any maintenance, if regularly
necessary. Cable ducts- make wires safe,
Tripping over trailing
This is done to ensure the efficiency of the system, the Cover wires/tuck them away, Use
wires
ease of use
of the system, and the appropriateness of the wireless connections
system. Strong desk/tables to support
The following is a list of some of the things considered heavy hardware, Use large desks
when
evaluating how well the new system has worked. Heavy equipment falling
and tables so that hardware
This can ultimately
lead back to a re-design of part of the doesn’t fall off edge
system if there is strong
evidence to suggest that changes
need be made.
To evaluate the system, the analyst will:
[Link]
CAIE IGCSE ICT (0417)
Personal Data
[Link]
CAIE IGCSE ICT (0417)
Additionally, players should be careful about: Usernames and passwords don’t have to be
In-game violence remembered
Cyber bullying Almost impossible to replicate body parts.
Keeping their webcams off (other potentially Somebody else can’t gain access, like with a stolen
dangerous players
have direct access to your image) card
Predators may use voice masking technology to lure a They can’t be forgotten, like a card
user to
reveal their age, sex etc. Disadvantages
Cyber-attacks involving viruses, ransomware, etc. The readers are expensive
Damages in fingerprints can deny access
8.3. Security of Data Some people worry about their personal
information being
stored
Hacking
Digital Certificate
Hackers are people who get into your computer system
A digital certificate is an electronic passport used in the
without having
the rights. It can lead to corruption or loss
security
of data sent over the internet.
of data or a data
breach
They can be attached with mails so that the receiver can
Some prove that a system is vulnerable - maybe
know that
the mail is sent from a trusted source.
employed to test
(ethical hacking)
Some want to steal data
Secure Socket Layer (SSL)
Alter or destroy data
For fun or a challenge
Type of protocol that allows data to be sent and received
Prevention:
securely
over the internet
Protect with authentication techniques (user ID and
When a user logs onto a website, SSL encrypts the data
password,
etc.)
https or padlock in the status bar
Have a backup of data in case of damage
When user wants to access a secure website:
Firewalls User’s web browser sends a message, so it can
connect with
required website which is secured by
User IDs SSL
Web browser requests that the web server identifies
To log on to a network, a user must type in a user ID
itself
User ID assigns user privilege once user logs in
Web server responds by sending a copy of its SSL
The top-level privilege for a network is an administrator:
certificate
Able to set passwords and delete files from server etc.
Web browser checks if certificate is authentic
User privilege may only allow to access their own work
Sends signal back to web browser
area
Starts to transmit data once connection is established
If not secure, browser will display an open padlock
Passwords
After typing in user ID, the user will be requested to type Features of a Secure Web Page
in their
password
Webpage URL: If the webpage is secure, it will start with
Generally, it is a combination of letters and numbers
‘https’ instead of ‘http’.
Passwords are shown as stars (***) so nobody
overlooking can see
it
Many systems ask for password to be typed in twice as a Padlock sign
verification
check, in case of input errors
To help protect the system, user has a finite number of Phishing
attempts
If password is forgotten, administrator must reset it Phishing is a fraudulent operation involving the use of
If password is forgotten on a website, it will be sent to emails
your
e-mail The creator sends out a legitimate looking email hoping
to gather
personal and financial information from the
Biometric Data recipient of the email
The message appears to be from a legitimate source (e.g.
Uses features of the human body unique to every a famous
bank)
individual, such as
fingerprints, retina, iris, face and voice When the user clicks on the link, they are sent to a spoof
recognitions. It is used
in authentication techniques as it website
is very difficult / impossible to
replicate. They will be asked for personal info e.g. credit card
Advantages details, PINs
[Link]
CAIE IGCSE ICT (0417)
Pharming
Encryption
[Link]
CAIE IGCSE ICT (0417)
This technique prevents illegal access Your data is stored remotely and not on your computer,
Necessary to use decryption software to decode the data so you don’t
have control over the physical security of
Used to protect sensitive data e.g. banking details your data.
Encryption keys are complex algorithms which makes Some of the data stored may be personal data which are
codes almost
unbreakable open to
hackers, and have to be encrypted in order to
prevent hackers from
obtaining them.
Computer Viruses The company providing the storage may go out of
business. In this
case what has to be done to the data will
It is a malicious program that replicates itself and is have to be considered.
designed to
cause harm to a computer system. They The company providing the storage will have to put in all
spread through downloadable
files, external store media its
efforts and safety measures in order to keep your data
(e.g. pen drives, etc.) safe.
May cause the computer to crash If the company providing the storage doesn’t backup your
Loss of files, corruption of the data data, you
may lose it in case of power cuts or fires, etc.
Viruses infect computers through email attachments,
illegal software
or downloaded files Firewalls
Prevention of Viruses
Anti-virus software - Detects and then removes or A firewall sits between the user’s computer and an
isolates and
use firewalls external
network (internet) and filter information in and
Do not use illegal software out of the computer
Only download from reputable sites Tasks carried out by firewall:
Examining ‘traffic’
The threats of using credit cards online and Checking weather incoming or outgoing data meets
prevention: criteria
If data fails the criteria, the firewall blocks ‘traffic’
Key logging/spywares: records the keys pressed on a Firewall can keep a list of all undesirable IP addresses
keyboard. Helping to prevent viruses or hackers entering the
Can be used to obtain credit card details, passwords user’s
computer
and
personal information.
Use virtual keyboards to type in password. Methods of Internet Security
Install anti-spyware software.
Bogus sites: sites that look exactly like the original sites, Authentication
Advantages Disadvantages
but aren’t. Method
They can steal your card details and personal Inexpensive, as
Can be easily hacked,
information when
you make purchases. Passwords nothing other than a
Always type in URLs, sometimes links in the mails can
can be forgotten
computer is required
be of
bogus sites. Highly recognized
Phishing, pharming and Smishing: everywhere, very
They trick you to reveal card and personal details as Fingerprint Intrusive, Damages
high accuracy, Easy
responses
to messages or mails. scans will prevent access
to use, Relatively low
Open attachments only from trusted sources.
storage requirement
Install anti-spyware software.
Non-intrusive, very Problems occur if
Hacking into secure sites to obtain the details:
Signature little time to identify, sign is not consistent,
Encrypting the details will make it of no use to the
recognition Relatively low High error rate (one
hacker.
Use strong passwords. expensive in 50)
Use firewalls. Very intrusive,
Very high accuracy,
Tapping into wireless networks: relatively slow to
no known way to
Always use a password-controlled Wi-Fi since it is Retina scans verify retina scans,
replicate a person’s
relatively
hard to tap into a secured Wi-Fi. very expensive to
retina
install and set up
*ALL PREVENTION TECHNIQUES WRITTEN HERE
ALSO APPLY Very intrusive, Lot of
FOR THE THREATS IN GENERAL (NOT SPECIFIC TO CREDIT Very high accuracy,
memory needed for
CARDS)
* Verification time is
Iris recognition storage, very
usually less than 5
expensive to install
Cloud Storage seconds
and set up
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE ICT (0417)
htm
Hypertext Mark-up
Webpages
15. Proofing
(Language)
jpg
Joint Photographic
Standard for images 15.1. Software Tools
Experts Group
Documents to be When a person’s/organisation’s name is entered or
Portable Document
pdf circulated over the sometimes newly
coined terms are used, spell checkers
Format
internet/email might pick these up as errors,
because they are not found
Portable Network in the dictionary. This makes spell
checkers less efficient.
png Compressed images Validation ensures that the data being entered into an ICT
Graphic
solution
is reasonable and makes sense. Entered data is
Word processed
rtf Rich Text Format checked against set
criteria to be validated.
documents
txt Text (File) Simple Text files
15.2. Proofing Techniques
Sending multiple files
zip as one compressed file
Verification: checking of data when copied from one
over the internet
medium to
another to prevent errors.
Verification is also important and is a way of preventing a
Generic file formats can be opened by any software to difference in data when it’s being transferred from one
access the
data held in them. system to
another. This tries to make sure data entered is
correct, relative
to the source.
11.2. Reduce File Sizes for Storage or
Transmission 16. Document Production
Files that are smaller in size upload and download faster
Widow: A paragraph-ending line that falls at the
than
larger ones and thus are better for transferring data.
beginning of the
following page or column, thus
separated from the rest of the
text.
12. Images Orphan: A paragraph-opening line that appears by itself
at the
bottom of a page or column, thus separated from
the rest of the
text.
An image should be edited when doing so will enhance its
Page, section and column breaks are used to ensure that
usefulness.
widows and
orphans are not present in a document
(these show poor typography).
13. Layout A mail merge document is created in order to create a
standard
template and then use it to send documents
personalised (by the
computer system) for the respective
Headers and footers ensure each page has all the
recipient of the document
required
information like the page numbers, logos, titles,
etc.
A common mnemonic is "An orphan has no past; a widow
has no
future"
17. Data Manipulation
17.1. Create a Database Structure
14. Styles
Flat file databases are tables that have data sorted in
Several organisations use a ‘corporate house style or rows and
columns, whereas relational databases are
corporate
branding, which is used to print on websites, several tables grouped
together to from a link, thus
visiting cards,
letters, etc. It refers to a specific style of preventing unnecessary repetition of
data.
[Link]
CAIE IGCSE ICT (0417)
Primary key: The key field of a table which is unique and Relative cell referencing is made when the cell reference
identifies
each record is
supposed to change when the cell it is referred to in is
Foreign key: The field linked to the primary field of the changing.
It aids more efficient designing of models.
table
linked to through a relationship Absolute cell
referencing is made when the cell
referenced stays constant when the
cell it is referred to in
Relational database Flat-file database is changing. This aids the preparation of
a model when a
Complex queries can be set of data is constantly being referred to
throughout the
Poor at complex queries
carried out model. Cell reference or relative cell reference
describes
Better security Poor at limiting access how far away a cell or group of cells is from some other
cell in the same spreadsheet. Basically, the cell’s address
Harder to update, so
Cater for future requirements A model prepared needs to be tested before being used
inherently inefficient
to ensure that
all results computed are accurate.
Data is only stored once Potential duplication
Definitions:
Require more planning Easy to design Cells: A space for data to be entered a table; a box
Non-unique records formed by
the intersection of columns and rows
Harder to change data Rows: Horizontal boxes that divide the table in
format. segments
Columns: Vertical boxes that divide the table in
At times placeholders for media such as images, sound segments
bites and
video clips are used to enhance the usability of Sheets: A table of data
a database Tabs: A module of a database program that holds the
tables on
the computer,
Pages: Full pieces of papers that contain information
17.2. Test the Data Model held on
one sheet of paper.
Ranges: A group of cells in a table
A model prepared needs to be tested before being used
Named cell: A cell in a table that is given a name (like
to ensure that
all results computed are accurate. The test
‘profit
margin’) and can be referred to using that
plan must be justified
to be apt for the model. E.g. all the
name.
mathematical operations must
be tested in a model that
Named range A group of cells in a table that are given
relies on calculations.
a name
(like ‘Pricing’) and can be referred to using that
Definitions:
name.
Testing: Checking if the designed model delivers the
Nested formulae/function: A formula/function used
expected
outcome when tested with data.
inside a
formula/function as an argument
Test data: The input data used for testing model.
Expected outcome: The output a model is supposed
to give with
the test data. 18.2. Test the Data Model
Actual outcome: The output a model actually gives the
user when
the test data is input. A model prepared needs to be tested before being used
to ensure that
all results computed are accurate. The test
plan must be justified
to be apt for the model. E.g. all the
18. Data Analysis mathematical operations must
be tested in a model that
relies on calculations.
Definitions:
18.1. Create a Data Model Testing: Checking if the designed model delivers the
expected
outcome when tested with data.
Charts: A graphical representation of (usually tabulated)
Test data: The input data used for testing model.
data
Expected outcome: The output a model is supposed
Accurate data ensures the results obtained by the
to give with
the test data.
processing of data
is relevant, which is essential to the
Actual outcome: The output a model actually gives the
usability of the model
user when
the test data is input.
Formulae are mathematical operators defined by the
user to perform a
function, whereas functions are
predefined logical and mathematical
operations a user 19. Website Authoring
can use in a spreadsheet
Mathematical operations are performed in the order
PEMDAS
(Parenthesis [Brackets] Exponents Multiplication
19.1. Web Development Layers
Division Addition
Subtraction). Brackets are used to
notate data used by a function,
e.g. =SUM (A2:A10). Content/Structure layer: Holds the content of the
webpage structure.
[Link]
CAIE IGCSE ICT (0417)
[Link]
CAIE IGCSE
ICT (0417)









