Revision Notes
Revision Notes
ORG
CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE ICT
Software
WWW.ZNOTES.ORG
CAIE IGCSE ICT
also present in many household gadgets and equipment Input devices Output devices
where some control or monitoring is required. Input devices are complex as
It consists of a control unit (CU) that manages the input Output devices are simpler as
they need to ensure proper
and output devices, an arithmetic and logic unit (ALU) that they only need to display the
communication between
performs computations and makes logical judgments, and finale.
computer and user.
tiny memory regions known as registers.
It processes the input and produces the outcome of the
processing in the form of output.
Backing/Secondary Storage
WWW.ZNOTES.ORG
CAIE IGCSE ICT
is used to click on an icon to launch the application, 6. as they usually have wired connections, they have
this is simpler than typing in commands. This type of more stable internet access.
interface uses up considerably more computer Disadvantages:
memory than a CLI interface. The user is limited to the 1. not particularly portable because they are made
icons provided on the screen. Needs a more complex up of separate components.
operating system. 2. More complicated because all the components
N.B: Mainly used by end-users who don’t have great need to be hooked up by wiring, which also clutters
knowledge of how the computer works. up the desk space.
3. Dialogue-based user interface: use the human voice 3. Because they aren’t portable, files need to be
to give commands to a computer system. no need for copied to another portable storage device to take
a driver to take their hands off the steering wheel. In a work elsewhere.
home, it is especially useful for people with disabilities,
because many tasks can be carried out by the spoken
word only. Possible to use it as a security feature Mobile Computers:
because voice recognition could be used to identify a
person. Still unreliable, with many commands not 1. Laptop computer:
being recognized or needing to be repeated several
times (especially if there is background noise). Can be (Or notebook) refers to a type of computer where the
quite complex to setup. User needs to know which monitor, keyboard, pointing device and processor are all
commands can be used. together in one single unit. This makes them extremely
4. Gesture-based user interface: rely on human portable. lightweight (to aid portability). Low power
interaction by the moving of hands, head or even the consumption (and also long battery life). Low heat output
feet. Replaces mechanical input devices. No physical (cooling is very important).
contact required. Very natural interface for a human Uses:
operator. No training needed to interface with the 1. office and business work
computer. Possible for unintentional movement to be 2. educational use
3. used as a gaming device.
picked up. Only works near to the camera or sensor
4. general entertainment
(maximum of 1.5 meters). May only accept a limited
number of movements (for example, it may take Advantages:
several attempts to find out exactly what finger 1. Portability, all components are in a single unit so
movements are recognized). that they can be taken anywhere.
2. because of one single unit, there are no trailing
wires, and desk cluttering.
1.4. Types of Computers 3. take up much less room on a desk, so they can be
easily used in public spaces.
Desktop Computers 4. portability allows them to take full advantage of
Wi-Fi features.
Desktop usually refers to a general-purpose computer
Disadvantages:
that is made up of a separate monitor, keyboard, mouse,
1. portability makes it easier for them to be stolen.
and processor unit. It is distinguished from, for example, a
2. limited battery life means user needs to carry
laptop computer by the fact that it is made up of several
charger at all times.
separate components, which makes it not very portable. 3. keyboards and pointing devices may be awkward
Uses:
to use.
1. office and business work
4. not easy to upgrade, like adding more RAM.
2. educational use
3. general entertainment 2. Smartphones:
4. gaming device
Advantages: Allow normal phone calls to be made, but also have an
1. they are easier and less costly to upgrade and operating system (such as iOS, Android, or Windows)
expand. allowing them to run a number of computer applications
2. spare parts are standardized, which makes them (known as apps or applets). Smartphones communicate
cheaper. with the internet either by using Wi-Fi hot spots or by
3. they tend to have better specifications for a given using 3G/4G/5G mobile phone networks.
price. Uses:
4. no critical power consumption because they plug 1. They allow users to send/receive emails.
into a wall socket. 2. They allow users to use a number of apps.
5. due to fixed position, they are less likely to be 3. They allow users to use a camera feature (to take
damaged or stolen. photos or videos).
WWW.ZNOTES.ORG
CAIE IGCSE ICT
4. They allow users to use a MP3/4 player (for music 3. typing on a touch screen can be slow and error
and videos). prone compared to a standard keyboard.
Advantages: 4. laptops tend to support more file formats than
1. very small in size and lightweight, makes them tablets.
portable.
2. connecting to the internet while on the move. 4. Phablets:
3. because they use Wi-Fi and mobile phone
networks, they can be used almost anywhere. Some of the latest smartphones have been designed as a
4. they have apps which can tell instant location, hybrid between a tablet and a smartphone; these are
which is a feature that isn’t available in either referred to as a phablet. They have much larger screens
desktops or laptops. than a smartphone but are smaller than a tablet.
5. they have reasonable battery life.
Disadvantages:
1. small screens and keyboards make pages difficult
to read.
2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops. Uses:
7. The data transfer rate using mobile phone 1. Entertainment (streaming of music, videos, and
networks can be slower than with Wi-Fi. television programs).
2. Gaming (including group games).
3. Tablets: 3. As a camera or video camera.
4. Internet use (online sales, social networks, using
They work similarly to a smartphone. The only main QR codes, and so on).
difference is that they are much somewhat bigger in size 5. Sending/receiving emails.
as compared to a smartphone. 6. Global positioning system (use of maps to navigate
Uses: to a location).
1. They allow users to send/receive emails. 7. Calendar functions.
2. They allow users to use a number of apps. 8. Telephone banking (sending and receiving money
3. They allow users to use a camera feature (to take using banking apps).
photos or videos). 9. Voice over Internet Protocol: telephone network
4. They allow users to use a MP3/4 player (for music using the internet, which also allows video calling.
and videos). 10. Instant access to social networks (social contact
Advantages of tablets compared to laptops: with friends no matter where you are in the world).
1. very fast to switch on (no time delay waiting for the 11. Instant messaging.
operating system to load up). 12. Office and business management (allows rapid
2. fully portable – they are so lightweight that they voice and video communication).
can be carried anywhere. 13. Education use (using interactive software to teach
3. touch screen technology means they are simple to or learn from).
use and don’t need any other input devices. 14. Remotely control devices.
4. not much heat, they use solid-state technology. Laptops are the most expandable of these devices,
5. battery life of a tablet is a lot longer. while smartphones are the most portable. Tablets
6. when the power button is pressed, it goes into and phablets fall somewhere in between, offering
standby, but remains connected to the internet so a balance of portability and expandability. The
the user still hears alerts when emails or other choice of which device to use will depend on your
‘events’ are received. specific needs and use case.
Disadvantages of tablets compared to laptops:
1. tend to be rather expensive when compared to
1.5. Impact of Emerging Technologies
laptops.
2. they often have limited memory/storage when Artificial Intelligence (AI): There are many definitions of
compared to a laptop. artificial intelligence (AI). Essentially, AI is a machine or
WWW.ZNOTES.ORG
CAIE IGCSE ICT
application which carries out a task that requires some An input device can send data to another device, but it
degree of intelligence. – the use of language, – cannot receive data from another device.
recognizing a person’s face, – the ability to operate Input devices are necessary for a computer to receive
machinery, such as a car, airplane, train, and so on, – commands from its users and data to process; the
analyzing data to predict the outcome of a future event, devices are under the control of the user or can be direct
for example weather forecasting. Impact: Whenever AI is data entry.
mentioned, people usually think of science fiction
fantasies and think of robots. The science fiction writer Input devices can be complicated because they must ensure
Isaac Asimov even went as far as producing his three laws that the user can interact with the computer correctly.
of robotics: » Robots may not injure a human through
action or inaction. » Robots must obey order given by 1. Keyboards:
humans without question. » A robot must protect itself
Uses:
unless it conflicts with the two laws above. Everyday uses:
1. An autonomous (driverless) vehicle – we already Input of data into applications software
have driverless trains and autopilots on airplanes, Typing in commands to the computer
but future developments include driverless cars.
2. Robotic research is leading to improvements in Advantages:
technology to help amputees and people with
disabilities. Fast entry of new text into a document.
3. Robots are used to help people carry out Well-known method.
dangerous or unpleasant tasks – for example, Easy to use for most people.
bomb disposal, Negative impacts of AI: Easier to do verification checks as data is entered (can
immediately compare the source document with typed
4. Unemployment, robots are capable of doing
tedious human tasks with much more efficiency data on the screen).
and excellence than humans.
Disadvantages:
5. Dependency on technology could lead to problems
in the future. Can be difficult to use if the user has limited arm/wrist
6. De-skilling: tasks that used to be considered a use.
talent are now part of general, tedious processes Slow method when compared to direct data entry.
that are done on a regular process by machines. Fairly large device that uses up valuable desk space.
Extended reality: refers to real and virtual combined
environments. The two most common examples at the
moment are: » Augmented reality (AR) is a merger
between the virtual and physical (real) world, it lays
objects onto the pre-existing objects. e.g., Pokémon GO!
Impact: safety and rescue operations’ training, shopping
and retail (getting a better look at a car before the
purchase), healthcare (better understanding of a patient’s
body) » Virtual reality (VR) enables an entirely new world
to be created, unlike AR, this has no link to the actual 2. Numeric keypads:
surroundings of the user. It requires the user to be
specially equipped with a VR headset, joystick, and Uses:
headphones. Impact: Military applications, educational
purposes (looking at ancient buildings), healthcare, media Automatic teller machines (ATMs), where the customer
(interactive special effects in a movie), scientific can key in their PIN, amount of money, etc.
visualization (part of molecular structures/cells). Mobile phones to allow phone numbers, etc. to be keyed
in.
Point of sale terminals (POS) in case the barcode reader
2. ## 2.1. THEORY fails to read the barcode – the number has to be keyed in
manually by the operator.
Chip and PIN devices when paying by credit/debit cards.
Input & Output Devices Fast entry of numeric data into a spreadsheet.
Advantages:
Input Devices & their Uses
Faster than standard keyboards when entering numeric
An input device is any hardware device that allows a user data.
to enter data or instructions into a computer directly.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Because many are small devices, they are very easy to Advantages:
carry around.
faster than a keyboard for choosing options.
Disadvantages: used to navigate applications and the internet.
Because the touchpad is integrated into the laptop
Sometimes have small keys which can make input more computer, there is no need for a separate mouse, this
difficult. aids the portability and is a big advantage if there are no
Sometimes the order of the numbers on the keypad is not flat surfaces available.
Disadvantages:
Uses:
Advantages: touchpad.
Faster method for choosing an option rather than using a 5. Tracker ball:
keyboard.
Very quick way of navigating through applications and the Uses:
internet.
Does not need a large desk area when compared to a good alternative to a mouse for people with conditions
keyboard. such as RSI.
Used in an industrial control room environment.
Disadvantages: Used in some luxury cars to select functions such as
radio.
Can be more difficult for people with restricted hand/wrist
movement than using a keyboard for data entry. Advantages:
Easy to damage, and the older type of mouse quickly
becomes clogged up with dirt. Does not need the same fine control as a mouse.
Difficult to use if no flat surface readily available. Easier to use than a mouse if the operator has problems
with their wrist.
More accurate positioning of the pointer on screen.
They are more robust than a mouse.
Needs less desk space than a mouse or keyboard.
Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Uses:
Advantages:
Disadvantages:
Uses:
Advantages:
Advantages:
Disadvantages:
7. Joysticks:
9. Touch screen (as an input device):
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Advantages:
selected.
Faster entry of options than using keyboard or mouse.
Very easy method for choosing options. 11. Digital Cameras:
User-friendly method – no training necessary in its use.
Uses:
Option to expand the size of the display if necessary.
Taking photographs, still better than smartphones and
Disadvantages:
tablets.
Limited number of input options available. Data-capture device, e.g., as a reversing aid in cars.
Can lead to problems if an operator has to use the system Dentistry, to help capturing pictures for better diagnosis.
frequently (straining of arm muscles, RSI, etc. are all The creation of virtual reality tours around houses,
possible). buildings etc.
The screen can get very dirty with constant touching.
Advantages:
Disadvantages:
Advantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
13. Sensors:
Uses:
2.2. Direct Data Entry & Associated
Temperature sensors are used in automatic washing Devices
machines, central heating systems, ovens, automatic
glasshouses.
1. Magnetic Stripe Readers:
Pressure sensors are used in intruder alarm systems,
washing machines. Uses:
Light sensors are used in automatic glasshouses,
automatic doors, street lighting control. On credit/debit card for use at ATMs
Sound/acoustic sensors are used in intruder alarm Security device to allow entry to buildings, hotels, etc.
systems, monitoring liquid and powder flow in pipes.
Humidity/moisture sensors are used in automatic Advantages:
glasshouses, environmental monitoring, in factories
Faster than keying in data manually.
where moisture levels are crucial.
Error-free, no human intervention needed.
pH sensors are used in automatic glasshouses, chemical
Secure, information isn’t in human-readable form.
processes and environmental monitoring.
Robust, there are no moving parts.
Advantages:
Disadvantages:
Readings are more accurate as compared to human
If the card is damaged, the data is lost.
operators.
Doesn’t work at a distance.
Readers are continuous, no breaks in the monitoring.
As the information isn’t human readable, this can be a
Because it is a continuous process, any action or warnings
disadvantage in some cases.
needed will be initiated immediately.
Automatic systems don’t need human intervention.
Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Where payments are made using cards Very fast way of inputting survey results.
More accurate because there is no human intervention.
Advantages: More accurate than OCR methods.
More secure than contactless cards as the PIN acts as a Disadvantages:
second security layer.
More robust system than Magnetic Stripe Cards The designing of the forms can be complicated to make
sure the marks are correctly positioned.
Disadvantages: If there are problems, they need to be manually checked,
which can be time-consuming.
Need to be very careful, so the PIN isn’t seen by anyone
while being typed in.
Uses:
Disadvantages:
Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal. 6. Barcode readers:
RFID is more expensive than a comparable barcode
system. Uses:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
They are a tried and trusted technology. QR codes can be used to transmit malicious data.
Disadvantages:
stripes.
Uses:
Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Uses:
Advantages:
Advantages:
Disadvantages:
Uses:
ATMs
POS terminals
Information kiosks.
Advantages:
5. Laser printers:
Don’t need additional input devices.
Uses:
They are very interactive, many functions such as swiping
can be done.
In uses where low noise is required.
They add a high-tech feel to devices and interfaces. If fast, high quality, high-volume printing is required.
Disadvantages: Advantages:
They tend to get dirty with frequent use. Printing is fast.
Frequent use results in straining of arm muscles, RSI, etc.
They can handle very large print jobs.
If large amounts of data are being input/output, they Quality is consistently high.
aren’t very accurate, and the interface isn’t very fast. Toner cartridges last for a long time.
Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
They are only considerably fast if several copies are being Advantages:
made.
Color laser printers are expensive to run. Can be used in varying environments unlike laser/inkjet
They produce ozone and volatile organic compounds printers.
because of their printing method and toner. Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
Good for continuous printing.
Disadvantages:
Very noisy
Initial cost is more than an inkjet printer.
Very slow, poor-quality printing.
6. Inkjet printers:
Uses:
Advantages:
8. (Graph) Plotters:
Disadvantages:
Uses:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Advantages:
Disadvantages:
Advantages:
Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
This involves starting from the beginning of the file and Used in file servers for computer networks.
accessing each record to get to the file required.
It is a very slow form of data access. Advantages:
Used where speed isn’t vital.
They have a very fast data transfer rate and fast access
Examples where serial access is used:
times to data.
utility billing
They have a very large memory capacities.
clearing of bank cheques
producing pay slips Disadvantages:
Uses:
Magnetic Backing Storage
Can be used as backup systems to prevent data loss.
Media Can be used to transfer data/files/software between
computers.
Holds data magnetically.
Advantages:
Surface area of the media are magnetized so that they
can hold bits of data. Data access time and data transfer rate are very fast.
The device that reads media can also read the bits held Have a very large memory capacity.
on the surface area Can be used as a method of transferring information
between computers.
3.3. Magnetic tape drives
Disadvantages:
Uses:
They can be easily damaged if user accidently drops it or
used in application where batch processing is used. doesn’t correctly shut down the drive after use.
used as a backup media where vast amounts of data Data transfer rate is not as fast as for fixed hard disk
needs to be stored. drives.
used in long-term archiving of data, they have huge data
storage capacities and are known to be very stable.
Optical Backing Storage
Advantages:
Media
They are generally less expensive than hard disk drives.
It is a very robust technology.
Holds data by burning ‘dots’ onto the surface with a high
They have a huge data storage capacity.
powered laser.
The data transfer rate is fast.
The data that reads the media can read the data by
Disadvantages: shining a lower powered laser over the dots.
Very slow data access times (uses serial access). 3.4. CD-R/DVD-R
When updating, another tape is needed to store the final
updated version. Uses:
They are affected by magnetic fields, a strong field can
Home recordings of music and (CD-R) and films (CD-R).
corrupt data stored on the tape.
Used to store data to be kept for later use to be
transferred to another computer.
Fixed Hard Disks/Drives
Advantages:
Uses:
Cheaper medium than RW disks.
To store the OS, systems software and working data/files.
Once burned (and finalized) they behave like a ROM.
Storing applications files.
Used in real-time systems and in online systems. Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Can only be recorded once; if an error occurs then the much smaller so they store five times more data than
disk has to be thrown away. DVDs.
Not all CD/DVD players can read CD-R/DVD-R. 2. Blu-ray disks automatically come with a secure
encryption system which helps to prevent piracy and
CD-RW/DVD-RW copyright infringement.
3. The data transfer rate for a DVD is 10 Mbps and for a
Uses: Blu-ray disc it is 36 Mbps.
CD-ROM/DVD-ROM Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
More expensive than magnetic hard disks. Users will often be required to purchase a card reader or
Smaller storage capacity than magnetic hard disks. USB converter to view the data.
Advantages: Routers
Very compact and portable media. A device that enables data to be sent between different types
Very robust. of networks. Used to connect a LAN to the internet, can be
Does not need additional software to work on most connected through cables or wirelessly.
computers. It can be used for:
They are not affected by magnetic fields.
connecting networks and devices to the internet,
Disadvantages: storing computer addresses,
routing data packets.
Cannot write protect the data/files by making it ‘read-only’.
Easy to lose (due to the small physical size). When a data packet is received, the router checks if the
The user needs to be very careful when removing a packet is intended for it or another network. If it’s meant for
memory stick from a computer - incorrect removal will its own network, then the data packet is routed to the local
corrupt the data on the memory stick and make it useless. switch/hub. If not, the data packet is sent to the relevant
router, which send it to the relevant device.
Flash Memory cards
They consult routing tables to know where to send the
Different types of memory cards: data.
» SD cards (secure digital card)
» XD cards (extreme digital card)
» CFast card (compactfast card). Common Network Devices
Uses:
1. Network Interface Cards (NIC): needed to allow a
Storing photos on digital cameras.
device to connect to a network. Turns binary data into
Used as mobile phone memory cards.
electrical signal that allows network access. Usually
Used in MP3 players to store music files.
integrated into the motherboard.
Used as a backing store in hand-held computer devices.
Each NIC is given a unique hardwired media access
Advantages:
control (MAC) address.
Very compact. Media access control (MAC) address: a number which
Because of no moving parts, they are very durable. uniquely identifies a device when connected to a network.
They can hold large amounts of data. First 6 hex digits identify the manufacturer’s code and the
Compact cameras and smartphones are able to read and next 6 identify the device’s serial number.
write memory cards allow the user to transport large
2. Hubs: they are hardware devices that can have a
collections of photographs, songs etc.
number of other devices connected to them. They are
Disadvantages: used to connect devices together to form a local area
network (LAN). It takes a data packet received by one
Expensive per gigabyte of memory when compared to of its ports and sends it all relevant or irrelevant
HDDs. device connected to it.
Have a lower storage capacity than hard disks.
Have a finite life regarding number of times they can be Not very secure, broadcast data to all devices.
read from or written to. Unnecessary network traffic.
Memory cards, specifically the micro SD card, are the
3. Switches: intelligent hubs. Used to connect devices to
smallest storage devices available; this means they are
form a LAN. Unlike hubs, the switches store MAC
more likely to be lost, stolen or damaged.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
addresses of all devices on a lookup table. So, it only Bluetooth uses key matching encryption however, Wi-Fi
sends data to relevant device. uses WPA (Wi-Fi protected access), and WEP (wireless
In summary: equivalent privacy).
WWW.ZNOTES.ORG
CAIE IGCSE ICT
The world wide web is the vast collection of web pages They all use client server architecture
that can be accessed using a web browser They all use security measures such as
The world wide web allows you to access information by authentication and encryption
using the internet They all promote and facilitate information and
resource sharing
Characteristics: Differences between the internet, intranet and extranet
are as follows:
It is an open network meaning everyone has access to the
The internet is a global network whereas an
same resources and information as everybody else.
intranet/extranet is a private network contained within
People from all over the world can communicate with
an organization
each other in real-time.
The use of the internet covers a wide range of
Available to anyone who has a suitable device and access
purposes whereas an intranet/extranet is designed for
to any one of the interconnected networks.
specific users and purposes
Uses: Much of the information is publicly available whereas
an intranet/extranet is not
Education and training The internet is not owned solely by one person or
Social Networking organization whereas intranets/extranets are owned
Online shopping usually by the organization.
Entertainment
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
computer. To access this website, users must first Much easier to access important documents or bring in
authenticate themselves using electronic tokens. With ‘experts’ at key parts of the conference.
their smartphone, the user has already set up the Possible to hold conferences at short notice.
electronic token app. The user launches the app on Reduced travelling costs.
their smartphone when the website asks them to No need to pay for hotel accommodation or venue hire.
verify their identity. The program creates an OTP that Reduces the cost of taking people away from their work
is only good for a short period of time. for two or three days to travel.
Better to use video conferencing than have delegates
travel to potentially unsafe places around the world.
Anti-malware software
Disadvantages:
An anti-malware software is designed to protect devices Potential time lag in responses/delays when talking.
against viruses and malicious software. It has 3 mains Images can jerk.
purposes, detect, prevent and remove malicious software. It
Very expensive to set up in the first place.
is installed onto a computer system and will operate in the Problems if the delegates live in different countries where
background. the time zone differences are large.
Common features of Anti-Malware software include the Requires IT knowledge to some extent.
following:
Not the best for people who consider travelling a job-perk.
Completely reliant on stable internet connections.
Comparing the scanned files against a large database of
known threats 2. Audio Conferencing: Meetings held using audio
Real-time scanning (sound) technology are referred to as audio
Regular updates to gather an up to date list of known conferencing. The normal telephone network can be
threats
used for audio conferencing, which is frequently
Quarantine of infected files referred to as a phone conference.
Quarantining files allows threats to be automatically
deleted. The hardware required is:
Allows the user to determine if the file is a legitimate
threat and not a false positive. a computer (with built-in microphones and speakers)
external microphone and/or speakers
Heuristic Checking: Instead of relying solely on a database of an internet phone
known viruses, this method looks for behavioral patterns and a standard phone.
other features in a file to identify possible risks there.
Advantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
no need to do manual tasks at home people do not meet face-to-face as much (social isolation)
more time for leisure activities a lack of social interaction may make people more
anxious of meeting people in real life
no need to stay home while chores are being done
web-enabled devices allow devices to be switched on or when communicating online, people can act less polite or
off while the owner is out more harshly, and cybercrime is a serious issue,
automated burglar alarms give a higher sense of security especially for teenagers.
and well-being
smart fridges and freezers prevent food waste by keeping Monitoring and controlling transport
track of products’ expiry, availability, etc.
Uses:
Disadvantages of microprocessor-controlled labor-saving
devices: monitoring traffic on motorways
congestion zone monitoring
unhealthy lifestyle due to inactivity caused by devices automatic number plate recognition (ANPR)
doing all tasks automatic traffic light control
tend to make people lazy air traffic control systems
potential deskilling railway signalling systems
any device containing a microprocessor and can
communicate using the internet displays a threat of Advantages of transport monitoring and control systems:
cybersecurity breaches
smart motorways keep updating according to changing
traffic conditions
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Advantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Cheques 3D Printers
WWW.ZNOTES.ORG
CAIE IGCSE ICT
It is an AI-based computer program that emulates the How an expert system is used to produce possible
decision-making capabilities of human experts. It uses solutions
knowledge and rules to provide accurate advice or solutions
in a specific domain. Given below is an example of how an expert system works to
Examples include: diagnose a medical issue:
This is the only thing that the end user sees Some features include:
Allows the user to interact with the system update stock files immediately
Often requires training to operate effectively track inventory levels in real-time
prevent stock discrepancies and ensure accurate
2. Explanation system
records
Informs the user of the reasoning behind the expert monitor inventory levels and reorder when stock is
system’s conclusions lower than a predefined value
Will supply a conclusion and any suggested actions to take streamline supply chain management and minimize
It will also give the percentage probability of the accuracy stockouts
of its conclusions
Electronic funds transfer at Point of sale (EFTPOS) terminals:
3. Inference engine Devices used for processing electronic payments, they allow
customers to make payments using debit or credit cards by
The main processing element of the system securely transferring funds from their bank accounts. EFTPOS
Acts like a search engine examining the knowledge base terminals authenticate and authorize transactions in real
Responsible for gathering information time, providing convenience and security for both customers
This is the problem solving part of the system and businesses during retail purchases.
Attempts to use information gathered from the user to The process of checking credit and debit cards at a
find a matching object supermarket EFTPOS is much the same as was described for
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Use of chip and PIN cards: 1. Optical Mark recognition (OMR) media in schools:
Enhance security with two-factor authentication
School registers: Paper-based registers are fed into OMR
Require customers to enter a personal identification
to be scanned and then stored in a database.
number (PIN)
Multiple-choice examination papers: The position of a
Use of contactless cards:
mark is stored in a computer’s memory after being read
Allow for faster transactions by the OMR a device using a template that maps out the
Enable customers to tap their card on the terminal
X-Y coordinates of each lozenge (pen/pencil mark).
Use of Near Field Communication (NFC):
Used at POS terminals for scanning and reading the
Facilitate payments through smartphones and other
information stored in barcodes.
devices Many digital devices have OMR scanners in them, these
Increase convenience for customers
may be used for scanning QR codes.
Communication between supermarket computers and
Advantages:
bank computers:
very fast way of inputting the results of a survey
Share transaction details securely more accurate than keying in data
Enable instant payment processing and verification more accurate than OCR methods
Disadvantages:
designing the forms is a very complex job
Internet Shopping
there can be problems if they haven’t been filled
Characteristics of Internet Shopping: correctly
often only work with black pens or pencils
Online stores accessible through web browsers
A wide variety of products and services are available 2. Optical Character Recognition (OCR)
Convenient and often open 24/7
Automatic Number Plate Recognition (ANPR) systems:
Advantages (To customer) : The sensor sends a signal to instruct a camera to
capture an image of the front of the vehicle
access to global market An algorithm is used to locate and isolate the number
comparison between different products effortlessly plate from the image taken by the camera.
can shop from anywhere in the world The brightness and contrast of the number plate are
able to avoid queues and busy stores first adjusted. Each character on the number plate is
then segmented.
Advantages (To business) : Each character is then recognized using OCR
software. The characters are converted into a string of
can target prices, and services based on buying data
editable text by the software.
can update stock availability and prices more quickly than
This text string is then stored in a database.
a physical store
A barrier is raised and the motorist is issued with a
cheaper to publicize special offers
ticket. The ticket shows the date and time of entering
international customer base
the car park.
increased profits due to lower staff
When the car returns to the car park, they insert their
Disadvantages ( To customer): ticket into a machine that calculates their charges and
registers the payment into the database.
security concerns Advantages:
can’t properly examine products before purchase Used to automatically monitor the average speed of
occasionally, products may take weeks before being vehicles over a stretch of road.
delivered No need to employ a car park or security guards.
additional shipping and handling costs Much faster system than having to check a ticket at
lack of face-to-face interaction with staff the exit.
Can be used to automatically control the entry and exit
Disadvantages ( To business):
to a car park or private roads.
increased competition Can be used as a security system; preventing illegal
digital fraud and security concerns parking.
technical issues and downtime Can be used to analyze driver behavior.
costs of delivery and return Can be used in inner-city congestion charging
fake negative reviews can lead to a bad company systems.
reputation Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
A lack of manned security car park surveillance could 4. Near Field Communication (NFC):
lead to vandalism.
There could be an invasion of privacy issues due to the Enables short-range wireless communication between
recording of drivers’ number plates. devices.
Damaged or very dirty number plates will not be Allows payment using a smartphone.
recognized. Advantages:
ANPR system only recognizes the number plate and Convenient and secure method of payment
not the car, so it is possible for a car to be fitted with a allows for contactless transactions
cloned number plate thus bypassing car park security, Disadvantages:
for example. Limited range
compatibility issues with some devices
3. RFID in tracking stock:
5. Biometric recognition:
Tracking of stock using RFID involves either tracking
livestock (on a farm) or goods in a shop, supermarket, or Usually refers to automated technologies for
distribution center. authenticating and verifying human body characteristics
RFID in passports: such as face, iris, retina, finger, thumb, hand and voice.
The data on the RFID chip is read when the passport is Advantages:
scanned. very high accuracy
A photo of you is clicked which is then compared with very easy to use
the image stored in the RFID chip. very fast verification time
If the face recognition passes, some checks are made non-intrusive method
in turn to make sure you are eligible to enter the relatively inexpensive technology
country, and if you are, the gate opens automatically. Disadvantages:
RFID in automobiles: it can make mistakes if the skin is dirty or damaged
Tags allow or deny access to parking in a secure, very expensive to install and set up
private car park. uses a lot of memory for the data to be stored
RFID tags in lorries and delivery vans can be used at a person’s voice can be easily recorded and used for
weigh stations to ensure the vehicle is not carrying too unauthorized access
much weight. an illness, such as a cold, can change a person’s voice,
RFID tags can be used on a car production line to track making absolute identification difficult or impossible
its progress through the assembly process.
RFID in contactless payments: 6.11. Satellite Systems
The embedded chip on credit/debit cards and the
antenna enable customers to wave their card over a Global Positioning Systems (GPS)
reader at the point of sale terminals to make
payments Used to determine the exact location of several modes of
Smartphone apps can also be used to make transport
contactless payments. Cars usually refer to GPS as satellite navigation systems
Advantages: Satellites surrounding the Earth transmit signals to the
No line-of-sight contact is necessary. surface
It is a very robust and reliable technology. Computers installed in the mode of transport receive and
Tags are much more difficult to forge than barcodes. interpret these signals
RFID tags can reduce the number of staff needed in, Knowing their position on the Earth depends on very
for example, a warehouse because tracking of items is accurate timing – atomic clocks are used in the satellites
automatic (thus reducing costs). which are accurate to within a fraction of a second per
It provides a very fast read rate. day
It allows bi-directional data transfer. Each satellite transmits data indicating its position & time
Bulk detection is possible. The computer on board the mode of transport calculates
Disadvantages: its exact position based on the information from at least
Tag collision – this is when the signals from two or three satellites
more tags overlap, interfering with each other.
Because RFID uses radio waves, they are relatively Satellite Navigation (satnav):
easy to jam or interrupt.
Used to determine the exact location of a car.
Relatively easy to hack into the data/signal transmitted
The computers onboard can be used to show directions to
by the tag.
a destination.
e initial cost of an RFID system is more expensive than
a comparable barcode system. Advantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Better focus as there isn’t a need to constantly check They have very high bandwidth.
paper maps. It is relatively easy to expand the network.
Reduces fines by warning drivers about upcoming speed Security in satellite transmission is very good due to the
changes. fact that data is coded and the receiver requires decoding
The system shows an Estimated Time of Arrival (ETA). equipment.
Possible to program in the fastest route, a route to avoid During emergency situations, it is relatively easy to move
towns. stations on the ground from one place to another.
The system can also give useful information such as the They are well-suited for broadcasting.
location of petrol stations. Enable mobile communication in very remote locations.
Disadvantages: Disadvantages:
If the maps are not kept up to date, they can give incorrect There is a time delay in receipt of the signals.
instructions. The signals received can be affected by bad weather.
Road closures due to accidents or roadworks can cause Sunspot activity can affect the performance of a satellite.
problems. they need to be monitored and controlled on a regular
The loss of satellite signals can cause problems. basis to ensure they remain in the correct orbit.
If an incorrect start-point or end-point is keyed in the
system will give incorrect information.
7. The systems life cycle
Geographic Information Systems (GIS)
Stages of Analysis:
Used to capture, manage, analyze, and display
geographically referenced information. 1. Analysis
Use to determine the distance between two places. 2. Design
Used to find the nearest petrol station or restaurant, etc. 3. Development & Testing
To protect animal and plant life in certain vulnerable 4. Implementation
places. 5. Documentation
Can be used in geography, science, or engineering 6. Evaluation
lessons.
7.1. Analysis of the current system
Advantages:
The current system is studied using four different
Allows geographical and thematic data of any kind to be
combined in a way that shows how they are connected to methodologies. These are the four techniques:
each other. Observation:
It allows the handling and exploration of huge amounts of
involves watching users interact with the system to
data. figure out its workings
It allows data to be integrated from a wide range of very
it is used for understanding how users interact with
different sources. the current system
Disadvantages: Advantages: provides first-hand, unbiased information
Disadvantages: can be time-consuming, may not
The learning curve on GIS software can be very long. reveal all issues
GIS software is very expensive. Interviews:
GIS requires enormous amounts of data to be input. direct one-to-one conversations with users on their
It is difficult to make GIS programs that are both fast and experience with the current system
user-friendly. used to gather comprehensive information about
individual users
Media Communication Systems Advantages: allows for in-depth exploration of issues
Disadvantages: relatively expensive, time-consuming,
Using satellite signals for communication. no user-anonymity which may affect the response
Used by media companies when sending Questionnaires:
stories/videos/pictures from remote locations. set of predetermined questions is given to the users to
complete and give their opinion on the current system
Advantages: it is majorly used in collecting data from a larger
They have good global coverage. group of people
They are cheaper, faster, and safer than laying cables in Advantages: allows for quantitative analysis, efficient
difficult or treacherous terrain. data collection, questions can be answered quickly
WWW.ZNOTES.ORG
CAIE IGCSE ICT
New System Requirements Specification: Data capture forms: designed to collect data from users
• Once the systems analysts have completed the analysis in a structured format, they come in two types: paper-
stage of the systems life cycle they should be fully aware of based and electronic-based. Paper-based data-capturing
the limitations of the current system. forms need to be carefully designed with headings,
• The next step will be to design a new system (normally concise instructions, character and information fields,
computer-based) to resolve the problems identified by the checkboxes, and enough writing space. Text boxes, on-
users and the systems analyst. screen help, drop-down menus, radio buttons, automatic
• The Requirements Specification will be created which will validation, and control buttons for data entry are all
outline the required improvements and expectations for the features of computer-based forms.
new system. Consider a user-friendly layout, clear instructions, and
appropriate data fields
Hardware and Software Selection Screen layouts: how information is presented to users on
a screen
Vital to identify the suitable hardware needed for the new Report layouts: how information is organized in a printed
system or digital report
contemplating system requirements, compatibility, Consider readability, visual appeal, and efficient use of
costs space
justifying choices based on user needs and system
performance Validation routines
Hardware that needs to be considered:
barcode readers, It is a method of examining data that has been submitted to a
scanners, computer to determine if it meets specific requirements. It is
touch screens,
WWW.ZNOTES.ORG
CAIE IGCSE ICT
a routine check that the computer does as part of its Extreme data: values at the limits of acceptability (E.g. 1
programming. or 12)
1. Range check: ensures data is within a specified range of
values What is live data?
2. Character check: ensures data contains only allowed
characters Data that has been used with the current system
3. Length check: ensures data is of a specified length Hence, the results are already known
4. Type check: ensures data is of the correct data type
5. Format check: ensures data conforms to a specific format 7.4. System Implementation
6. Presence check: ensures data is present and not left blank
7. Check digit: a digit added to a number to verify its accuracy The system must then be fully implemented after it has been
thoroughly tested.
7.3. Testing We will now think more carefully about switching to the new
system. Four popular techniques are utilized to transition
Guarantees the system's functionality before it is put into from the old system to the new one.
use. Before selecting the approach best suited for a given
Identification and removal of errors, thus improving application, the pros and cons of each must be carefully
system reliability and performance. considered.
Test data structures, file structures, input formats, output 1. Direct changeover:
formats, and validation routines
The old system is replaced by the new system
Ensure all components function correctly and interact
immediately
seamlessly
Used when quick implementation is necessary
Advantages
Test strategies
fast implementation
Test each module: verify individual components function cost-effective as only one system is in operation
as intended Disadvantages
Test each function: ensure all features work correctly High risk of failure
Test the whole system: confirm overall system no fallback
performance and integration users can’t be trained on the new system
2. Parallel Running
Test plan
Both current and new systems run simultaneously for a
Test data: specific data used for testing purposes period before the old system is phased out
Expected outcomes: predicted results based on test data Used when a smooth transition with minimal risk is
Actual outcomes: results obtained from testing required
Remedial action: steps taken to fix identified issues Advantages
Lower risk
Test data types easy system comparison
Disadvantages
The following data types will be explained using the example
Time-consuming
of months in a year.
resource-intensive
Normal data: valid and expected data values within the
3. Pilot Running
range of acceptability, have an expected outcome. E.g.
any whole number between 1-12. The new system is implemented in a small, controlled
Abnormal data: invalid or unexpected data values. This environment before full-scale implementation
can either be: Used when testing the new system in a real-world setting
Data outside the range of acceptability or Advantages
Data that is the wrong data type Low risk as only trialed in one
In this case, examples could be… department/center/branch
any value less than 1 (i.e. 0, -6, etc.) allows for fine-tuning
any value greater than 12 (i.e. 13, 15, etc.) staff have time to train with the new system
letters or nun-numeric data (i.e. July, etc.) few errors as it's fully tested
non-integral values (i.e. 3.5, 4.2, etc.) Disadvantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Determine the suitability of the solution: 2. Fire: ICT devices require electricity to charge or run, too
many devices using a single socket can cause the plug socket
Examine how well the implemented solution satisfies the to overload, and heat is generated by too much electricity,
desired outcome by contrasting it with the original task causing the wiring to degrade and ignite a fire.
criteria. The causes and reduction tactics for fire include:
Outline the initial objectives of the system and discuss
how the solution addresses each one Socket overload: Ensure enough plug sockets in the room,
Highlight any requirements that may not have been don’t plug too many devices into the same plug
fully met and discuss possible reasons for this socket, and don’t leave devices plugged in and
Questions to ask: unattended.
Overheated equipment: Ensure that equipment is
Is the system suitable for each of the departments?
Does it meet the needs of the customers? properly ventilated and not obstructed, keep flammable
Does it meet the needs of the staff? materials away from heat sources, regularly check
equipment for signs of wear or damage, use fire
Does the solution match the original requirements?
extinguishers in case of emergencies, turn off or unplug
Collect and examine user feedback: devices when away from the location, do not cover any air
vents on devices.
Collect users' responses to the results of testing the
3. Trailing cables: Devices can be plugged in using cables,
system. Their feedback can provide insights into potential
cables that are protruding can cause an accident, you can trip
issues and improvements, and help determine overall
over a cable left out in a location, and body damage can occur
user satisfaction
during a fall, for example, breaking bones, ligament damage,
Summarise the testing process, including test data,
bruising, sprains, etc. depending on the area fell on
expected outcomes, and actual outcomes
Trailing cables causes and prevention strategies:
Discuss users' reactions to the system, addressing
any concerns or suggestions they may have Unorganized/insecure cables: use cable ties to secure
cables, keep cables properly packed under, let’s say, a
Identify limitations and suggest necessary table, therefore not coming in the way of walking paths,
improvements: use wireless devices where possible, and regularly
inspect cables for signs of wear or damage.
Based on the analysis of efficiency, ease of use,
appropriateness, and user feedback, identify any 4. Heavy falling equipment: Devices have varying levels of
limitations in the system and suggest necessary weight and if a device falls on you it could cause injury, any
improvements device should be placed in a secure location, like a PC on a
List the limitations and provide explanations for each strong desk and not near the edge.
one Causes and reduction tactics for falling equipment:
Recommend specific changes or enhancements for
these issues Improperly secured equipment: Ensure that equipment is
properly secured and stable, regularly check the stability
of locations containing devices.
8. ## 8.1. THEORY Equipment on unstable surfaces: Keep equipment away
from edges and other potential hazards, and regularly
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
develop responsible online behaviors, promoting Hacking: Unauthorized access to computer systems or
respectful conduct while interacting with others online. networks to gain control, steal information, or cause
maintain a healthy balance between online and offline damage, thus leading to identity theft, privacy breaches,
lives, reducing the risk of addiction, mental health issues, and misuse of data
or negative impacts on relationships and self-esteem. Phishing: Deceptive emails or messages that are received
from trusted sources to trick individuals into revealing
Safety Suggestions: personal data
Pharming: Manipulation of DNS (Domain Name System)
The internet: to redirect users to fraudulent websites, often to steal
Use trusted websites recommended by teachers or personal data
reputable sources Smishing: Phishing attacks carried out through SMS or
Utilize search engines that only allow access to age- text messages
appropriate websites and use filters to ensure Vishing: (aka voicemail phishing) Phishing attacks carried
inappropriate content is not seen out through voice messages to trick users into calling the
Never reveal personal information telephone number contained in the message
Email: Viruses and malware: Viruses are program codes that can
Be aware of the potential dangers of opening or replicate/copy themselves to cause data loss or
replying to emails from unknown people, including corruption. Malicious software designed to disrupt,
attachments, potential dangers include phishing, damage, or gain unauthorized access to computer
spam systems or networks
Ensure you know who the email is for when Card fraud: Unauthorized use of credit or debit card
considering sending personal data or images via information for fraudulent purposes which can be caused
email, only with people you know and not with by shoulder surfing, card cloning, or keylogging.
identifiable content like school photos
Social media:
Know how to block and report people who send Protection of data
content or messages that are unwanted
Know where the privacy settings are to reduce the Multiple techniques are implied for the protection of data,
number of people who can see your posts or images inclusive:
Be aware of the potential dangers associated with 1. Biometrics:
meeting online contacts face to face, do not meet
anyone you do not know, if you do, take an adult and Individuals' distinctive physical or behavioral traits, such
meet publicly. as fingerprints, faces, or irises, can be used for access
Do not distribute inappropriate images and control and verification. Since biometric data is hard to
inappropriate language fake or duplicate, it offers a more secure form of
Respect the confidentiality of personal data belonging identification.
to other people
Only accept friend requests from people you know 2. Digital certificate:
Parents should be aware of what you are doing online,
A digital record that attests to a website's reliability and
discuss what you are doing online
veracity A digital certificate is used to provide safe
Do not post images or details that can be used to
communication and to build confidence between parties.
locate you
Identifier data, the entity's public key, and a third party's
Online gaming:
digital signature are frequently found in digital
Do not use real names as usernames
certificates.
Never share personal or financial details with other
players 3. Secure Socket Layer (SSL):
Know how to block and report players for
inappropriate messages or comments a protocol that creates a secure connection between a
Sensitive Data is data that might result in loss of an client computer and a server. SSL ensures that
advantage or level of security if disclosed to others. ie, information communicated between a server and client
ethnicity, religion, criminal record, etc. At the same time, stays private and cannot be intercepted or changed by
personal data can be used to identify the user, i.e., unauthorized parties. a website's identification for it is the
passport number, name, age, etc. S at the end of HTTP.
4. Encryption:
8.3. Threats to data
Creating data in a format that cannot be read without a
There are multiple methods by which data can be threatened, decryption key Data on hard drives, emails, cloud storage,
including: and secure websites (HTTPS) are all protected by
WWW.ZNOTES.ORG
CAIE IGCSE ICT
encryption. Without a decryption key, it assures that even An essential aspect to remember while designing ICT
if unauthorized people obtain data, it cannot be decoded. solutions is to ensure that they are user-friendly. This
means that they should be intuitive to use, require
5. Firewall: minimal training, and have easy-to-understand
instructions
A firewall is a network security device used to monitor and
Additionally, ICT solutions should be accessible to all
manage incoming and outgoing network traffic. Its goal is
users, including those with disabilities. This could involve
to separate an internal network from other networks by
adding features like voice commands, large text options,
filtering data according to established criteria. It assists in
or compatibility with assistive devices
preventing malware, unauthorized access, and other
Once the solution is created, it is crucial to test it to
network risks.
ensure it functions as expected and fulfills the users'
6. Two-factor authentication: needs effectively
A security mechanism that requests two different kinds of Analyzing audience requirements:
identification from users to confirm their identity To
provide an additional degree of protection outside of just Designing an ICT solution requires an understanding of
a username and password, 2FA was created. Typically, it the target audience. The study should take into account
combines something that uniquely identifies a user, like elements that may affect the audience's capacity to use
biometric data with something the user has, like a the solution, like their age, technical proficiency, and
smartphone and a token, or something they know, like a expertise.
password. The audience's requirements for information should be
known by the solution creator. This could serve as a
7. User ID and password: design cue for the data processing elements and the
information architecture.
A typical authentication technique uses a password plus a
The design is also influenced by how the audience utilizes
secret code (user ID) as a means of identification To
and consumes the content. For instance, the answer
strengthen the security of data, user IDs and passwords
should be mobile-friendly if the audience accesses it
are used to restrict access to only authorized users. Using
mostly through mobile devices.
secure passwords and changing them frequently is critical
Finally, the designer should take into account any unique
to ensure security. When creating passwords, it is advised
requirements of the audience, such as visual or auditory
to utilize a mix of uppercase, lowercase, digits, and
impairments. These requirements should be taken into
special characters.
account when designing the solution, ensuring inclusivity.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Guidelines set by employers: allows individuals from all around the world to
instantaneously connect and chat with one another
It is up to companies to decide if personal emails should
Runs on a distributed network design, which means it is
be permitted on their systems
not controlled by a single central authority.
Companies may specify which company devices are
mostly used for transmitting data in a variety of formats
allowed to be used
such as text, photos, audio, and video
There needs to be a company standard style when
sending emails Uses of the Internet:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
a vital communication tool that allows people to Internet resources including websites, email, social
communicate via emails, instant messaging, and other media, online shopping, and more.
means. An intranet's main goal is to make it easier for
acts as a massive database of information on almost any employees to communicate, work together, and share
subject information.
internet has transformed business by offering a platform Extranets are made to make it easier for a company's
for online purchasing, electronic payments, and digital external stakeholders to collaborate and
transactions, allowing enterprises to reach global communicate with it. It enables the organization and
consumers. its reliable clients or partners to securely share
information, documents, and resources.
Advantages of the Internet:
Many people use the terms “Internet” and “World wide web”
users have access to an incredible amount of information, interchangeably, however, they can’t be used under the same
empowering them to learn context:
enables individuals and businesses to connect and - The internet refers to the global network of computers and
communicate with people from different parts of the other devices connected through routers and servers,
world in real-time however, the world wide web is a collection of websites and
the Internet has made many things easier to complete, webpages that are accessed via the internet.
thus providing simplicity and effectiveness
Blog:
Disadvantages of the Internet: it is a website or section of a website that continually
shares new information, frequently written informally
raises hazards to data security and personal privacy
or conversationally similar to a journal.
through the possibility of identity theft, data breaches, and
usually presented in a reverse chronological manner
online monitoring.
usually managed by individuals or small groups
the spread of propaganda, fake news, and misinformation
allow for reader comments, facilitating some level of
due to the simplicity with which content can be created
discussion
and distributed online.
often focus on specific topics, such as food, travel,
the digital divide that results from unequal Internet access
fashion, technology, or personal experiences
threatens to widen already existing disparities.
also, serve as a platform for sharing opinions or
The differences between the internet, intranet, and extranet: insights
Forum:
Definition: an online discussion site where people can hold
The Internet is a vast network of linked computer conversations in the form of posted messages
networks and gadgets that communicate with one often organized around specific topics or interests,
another using the Internet Protocol Suite (TCP/IP). and divided into categories known as threads
The intranet is a secure network that operates within primarily focused on peer-to-peer interaction
an organization using internet technologies and may require users to create an account before posting
protocols, such as TCP/IP. can be moderated or unmoderated
Extranets are managed private networks that can give moderated forum refers to an online discussion
access to third-party users and give users, such forum in which all the posts are checked by an
as partners, suppliers, or clients, safe access to a administrator before they are allowed to be
portion of the intranet. posted.
Accessibility: The internet is essentially a huge unmoderated
Internet is open and accessible to the public, allowing forum. No one ‘owns’ the internet, and it is
users to access a wide range of information, services, essentially not policed.
and resources from all around the world. Wiki:
Intranets are restricted to internal users and typically a type of website that allows users to add, remove, or
secured by firewalls and other security measures to edit content
maintain the security of critical corporate data. designed to facilitate collaboration and knowledge
Extranet provides authorized external users only sharing from many people
limited access, in contrast to the internet, which is holds information on many topics which can be
public, or the intranet, which is entirely restricted. To searched
access the extranet, these users need a secure login. posts are not in chronological order
Purpose: structure is determined by the content or its users
Internet acts as a hub for intercultural dialogue, the most famous wiki is Wikipedia, an online encyclopedia
sharing of knowledge, and access to a range of changes can be tracked and reverted if necessary,
and the content is usually written in a neutral style
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Internet protocols: 4. Secure sockets layer (SSL): a protocol that allows data to be
sent and received securely over the internet.
Protocols are sets of rules that the 'sender' and 'recipient'
agree on when data is exchanged between devices. Risks of using the Internet:
1. Hypertext transfer protocol (HTTP): when a web page is
being accessed, entering http:// at the front of an address Inappropriate and unlawful content: The internet may
tells the web browser that ‘http rules’ for communication are attract people to potentially dangerous or illegal
to be obeyed. materials.
2. Hypertext transfer protocol secure (HTTPS): A secure Data restriction: Parental, educational, and ISP
version of HTTP that encrypts data for security. restrictions can all be used to restrict access to specific
3. File transfer protocol (FTP): network protocol used when information or websites.
transferring files from one computer to another computer
over the internet. It is similar to HTTP, but the protocol is
specifically for the transfer of files.
WWW.ZNOTES.ORG
CAIE IGCSE
ICT