Revision Notes Ict
Revision Notes Ict
ORG
CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for ShweSin Moe for personal use only.
CAIE IGCSE ICT
Software
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
It consists of a control unit (CU) that manages the input Backing and Secondary Storage
and output devices, an arithmetic and logic unit (ALU) that
performs computations and makes logical judgments, and Required to store significant amounts of data
tiny memory regions known as registers. permanently.
It processes the input and produces the outcome of the Most commonly in the form of Hard disk drives and Solid-
processing in the form of output. state drives.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
N.B: Mainly used by end-users who don’t have great up the desk space.
knowledge of how the computer works. 3. Because they aren’t portable, files must be copied
3. Dialogue-based user interface: use the human voice to another portable storage device to take work
to give commands to a computer system. no need for elsewhere.
a driver to take their hands off the steering wheel. In a
home, it is especially useful for people with disabilities Mobile Computers
because many tasks can be carried out by the spoken
word only. Possible to use it as a security feature 1. Laptop computer:
because voice recognition could be used to identify a
person. Still unreliable, with many commands not (Or notebook) refers to a type of computer where the
being recognized or needing to be repeated several monitor, keyboard, pointing device and processor are all
times (especially if there is background noise). Can be together in one unit. This makes them extremely portable.
quite complex to setup. User needs to know which lightweight (to aid portability). Low power consumption
commands can be used. (and also long battery life). Low heat output (cooling is
4. Gesture-based user interface: relies on human very important).
interaction by the moving of hands, head or even feet. Uses:
Replaces mechanical input devices. No physical 1. office and business work
contact is required. Very natural interface for a human 2. educational use
operator. No training is needed to interface with the 3. used as a gaming device.
computer. It is possible for unintentional movement to 4. general entertainment
be picked up. Only works near the camera or sensor Advantages:
(maximum of 1.5 meters). May only accept a limited 1. Portability: all components are in a single unit, so
number of movements (for example, it may take they can be taken anywhere.
several attempts to determine exactly what finger 2. Because of one single unit, there are no trailing
movements are recognized). wires and desk clutter.
3. take up much less room on a desk, so they can be
easily used in public spaces.
1.4. Types of Computers 4. portability allows them to take full advantage of
Wi-Fi features.
Desktop Computers
Disadvantages:
1. portability makes it easier for them to be stolen.
Desktop usually refers to a general-purpose computer
2. limited battery life means the user needs to carry
that is made up of a separate monitor, keyboard, mouse,
a charger at all times.
and processor unit. It is distinguished from, for example, a
3. keyboards and pointing devices may be awkward
laptop computer by the fact that it is made up of several
to use.
separate components, which makes it not very portable.
4. not easy to upgrade, like adding more RAM.
Uses:
1. office and business work
2. Smartphones:
2. educational use
3. general entertainment
Allow normal phone calls to be made, but also have an
4. gaming device
operating system (such as iOS, Android, or Windows),
Advantages: allowing them to run a number of computer applications
1. They are easier and less costly to upgrade and
(known as apps or applets). Smartphones communicate
expand.
with the internet either by using Wi-Fi hot spots or by
2. Spare parts are standardized, which makes them
using 3G/4G/5G mobile phone networks.
cheaper.
Uses:
3. They tend to have better specifications for a given
1. They allow users to send/receive emails.
price.
2. They allow users to use a number of apps.
4. No critical power consumption because they plug
3. They allow users to use a camera feature (to take
into a wall socket.
photos or videos).
5. Due to fixed positions, they are less likely to be
4. They allow users to use an MP3/4 player (for music
damaged or stolen. and videos).
6. As they usually have wired connections, they have
Advantages:
more stable internet access.
1. very small in size and lightweight, makes them
Disadvantages:
portable.
1. They are not particularly portable because they
2. connecting to the internet while on the move.
are made up of separate components. 3. because they use Wi-Fi and mobile phone
2. More complicated because all the components
networks, they can be used almost anywhere.
need to be hooked up by wiring, which also clutters
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
4. they have apps which can tell instant location, Some of the latest smartphones have been designed as a
which is a feature that isn’t available in either hybrid between a tablet and a smartphone, referred to as
desktops or laptops. a phablet. They have much larger screens than a
5. they have reasonable battery life. smartphone but are smaller than a tablet.
Disadvantages:
1. small screens and keyboards make pages difficult
to read.
2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops.
7. The data transfer rate using mobile phone Uses:
networks can be slower than with Wi-Fi. Entertainment (streaming of music, videos, and
television programs).
3. Tablets: Gaming (including group games).
As a camera or video camera.
They work similarly to a smartphone. The only main Internet use (online sales, social networks, using QR
difference is that they are somewhat bigger in size as codes, and so on).
compared to a smartphone. Sending/receiving emails.
Uses: Global positioning system (use of maps to navigate to
1. They allow users to send/receive emails. a location).
2. They allow users to use a number of apps. Calendar functions.
3. They allow users to use a camera feature (to take Telephone banking (sending and receiving money
photos or videos). using banking apps).
4. They allow users to use an MP3/4 player (for music Voice over Internet Protocol: telephone network using
and videos). the internet, which also allows video calling.
Advantages of tablets compared to laptops: Instant access to social networks (social contact with
1. very fast to switch on (no time delay waiting for the friends no matter where you are in the world).
operating system to load up). Instant messaging.
2. fully portable – they are so lightweight that they Office and business management (allows rapid voice
can be carried anywhere. and video communication).
3. touch screen technology means they are simple to Education use (using interactive software to teach or
use and don’t need any other input devices. learn from).
4. not much heat, they use solid-state technology. Remotely control devices.
5. The battery life of a tablet is a lot longer.
6. when the power button is pressed, it goes into Laptops are the most expandable of these devices, while
standby but remains connected to the internet so smartphones are the most portable. Tablets and phablets fall
the user still hears alerts when emails or other somewhere in between, offering a balance of portability and
‘events’ are received. expandability. The choice of device will depend on your
Disadvantages of tablets compared to laptops: specific needs and use case.
1. tend to be rather expensive when compared to
laptops. 1.5. Impact of Emerging Technologies
2. they often have limited memory/storage when
compared to a laptop. Artificial Intelligence (AI): There are many definitions of
3. typing on a touch screen can be slow and error- artificial intelligence (AI). Essentially, AI is a machine or
prone compared to a standard keyboard. application which carries out a task that requires some
4. laptops tend to support more file formats than degree of intelligence. –
tablets. the use of language
recognizing a person’s face
4. Phablets: the ability to operate machinery, such as a car,
aeroplane, train, and so on,
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
analyzing data to predict the outcome of a future Input devices can be complicated because they must ensure
event, for example, weather forecasting. Impact: the user can interact with the computer correctly.
Whenever AI is mentioned, people usually think of
science fiction fantasies and think of robots. The 1. Keyboards:
science fiction writer Isaac Asimov even went as far as
producing his three laws of robotics: » Robots may not Uses:
injure a human through action or inaction. » Robots
Input of data into applications software
must obey orders given by humans without question. »
Typing in commands to the computer
A robot must protect itself unless it conflicts with the
two laws above. Everyday uses: Advantages:
1. An autonomous (driverless) vehicle – we already
have driverless trains and autopilots on airplanes, Fast entry of new text into a document.
but future developments include driverless cars. Well-known method.
2. Robotic research is leading to improvements in Easy to use for most people.
technology to help amputees and people with Easier to do verification checks as data is entered (can
disabilities. immediately compare the source document with typed
3. Robots are used to help people carry out data on the screen).
dangerous or unpleasant tasks – for example,
bomb disposal, Negative impacts of AI: Disadvantages:
4. Unemployment, robots are capable of doing
It can be difficult to use if the user has limited arm/wrist
tedious human tasks with much more efficiency
use.
and excellence than humans.
Slow method when compared to direct data entry.
5. Dependency on technology could lead to problems It is a fairly large device that uses up valuable desk space.
in the future.
6. De-skilling: Tasks that used to be considered a
talent are now part of general, tedious processes
that are done on a regular basis by machines.
Extended reality refers to real and virtual combined
environments. The two most common examples at the
moment are:
Augmented reality (AR) is a merger between the
virtual and physical (real) world; it lays objects onto
pre-existing objects. e.g., Pokémon GO! Impact: safety 2. Numeric keypads:
and rescue operations’ training, shopping and retail
(getting a better look at a car before the purchase),
Uses:
healthcare (better understanding of a patient’s body)
Virtual reality (VR) enables an entirely new world to be Automatic teller machines (ATMs), where the customer
created, unlike AR, which has no link to the actual can key in their PIN, amount of money, etc.
surroundings of the user. It requires the user to be Mobile phones allow phone numbers, etc., to be keyed in.
specially equipped with a VR headset, joystick, and Point of sale terminals (POS) in case the barcode reader
headphones. Impact: Military applications, educational fails to read the barcode – the number has to be keyed in
purposes (looking at ancient buildings), healthcare, manually by the operator.
media (interactive special effects in a movie), scientific Chip and PIN devices when paying by credit/debit cards.
visualization (part of molecular structures/cells). Fast entry of numeric data into a spreadsheet.
Advantages:
2. Input & Output Devices
Faster than standard keyboards when entering numeric
data.
2.1. Input Devices and Their Uses Because many are small devices, they are very easy to
carry around.
An input device is any hardware device that allows a user
to enter data or instructions into a computer directly. Disadvantages:
An input device can send data to another device, but it
cannot receive data from another device. Sometimes, they have small keys, which can make input
Input devices are necessary for a computer to receive more difficult.
commands from its users and data to process; they are
under the user's control or can be direct data entry.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Sometimes, the order of the numbers on the keypad is not Because the touchpad is integrated into the laptop
computer, there is no need for a separate mouse; this
aids the portability and is a big advantage if no flat
surfaces are available.
Disadvantages:
intuitive. People with limited hand/wrist movement find the device
difficult to use.
3. Mouse: It can be more difficult to control the pointer when
compared to a normal mouse.
Uses:
Drag and drop operations are more complicated using a
Opening, closing and minimizing software
grouping, moving and deleting files.
Image editing, for example, controls the size and position
of a drawing pasted into a document.
Controlling the position of a pointer on the screen to allow
selection.
Advantages:
Disadvantages:
Advantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Uses:
Advantages:
Disadvantages:
Uses:
Advantages:
Advantages:
Disadvantages:
7. Joysticks:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
9. Touch screen (as an input device): Limited quality, depending on how good the scanner’s
resolution is.
Uses: Fairly slow input method, especially if color mode is
Advantages:
selected.
Faster entry of options than using a keyboard or mouse.
Very easy method for choosing options. 11. Digital Cameras:
User-friendly method – no training necessary in its use.
Uses:
Option to expand the size of the display if necessary.
Taking photographs is still better than using smartphones
Disadvantages:
and tablets.
A limited number of input options are available. Data-capture device, e.g., as a reversing aid in cars.
This can lead to problems if an operator uses the system Dentistry, to help capture pictures for better diagnosis.
frequently (straining of arm muscles, RSI, etc., are all The creation of virtual reality tours around houses,
possible). buildings, etc.
The screen can get very dirty with constant touching.
Advantages:
Disadvantages:
Advantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
13. Sensors:
Advantages: Disadvantages:
Readings are more accurate as compared to human If the card is damaged, the data is lost.
operators. Doesn’t work at a distance.
Readers are continuous, with no breaks in the monitoring. As the information isn’t human-readable, this can be a
Because it is a continuous process, any action or warnings disadvantage in some cases.
needed will be initiated immediately.
Automatic systems don’t need human intervention.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Uses: Advantages:
Where payments are made using cards Very fast way of inputting survey results.
It is more accurate because there is no human
Advantages: intervention.
More accurate than OCR methods.
It is more secure than contactless cards as the PIN acts as
a second security layer. Disadvantages:
More robust system than Magnetic Stripe Cards
Designing the forms can be complicated to ensure the
Disadvantages: marks are correctly positioned.
If there are problems, they need to be manually checked,
Be very careful so the PIN isn’t seen by anyone while
which can be time-consuming.
being typed in.
Uses:
Disadvantages:
Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal.
RFID is more expensive than a comparable barcode 6. Barcode readers:
system.
Uses:
4. Optical Mark Reader/Recognition (OMR):
Used in supermarkets for stock control.
Uses: In libraries, to keep track of books.
As a safety function to ensure checking of electrical
Used in MCQs checking. equipment on a daily basis.
Used in reading voting papers.
Advantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Much faster than manually keying in data. QR codes can be used to transmit malicious data.
Allow automatic stock control.
They are a tried and trusted technology.
Disadvantages:
stripes.
Uses:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Uses:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Uses:
ATMs
POS terminals
Information kiosks.
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
They are only considerably fast if several copies are being Advantages:
made.
Color laser printers are expensive to run. Can be used in varying environments unlike laser/inkjet
They produce ozone and volatile organic compounds printers.
because of their printing method and toner. Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
Good for continuous printing.
Disadvantages:
Very noisy
Initial cost is more than an inkjet printer.
Very slow, poor-quality printing.
6. Inkjet printers:
Uses:
Advantages:
8. (Graph) Plotters:
Disadvantages:
Uses:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Advantages:
Disadvantages:
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Disadvantages:
CD-R/DVD-R
Advantages: CD-ROM/DVD-ROM
Data access time and data transfer rate are very fast. Uses:
It has a very large memory capacity.
It can be used as a method of transferring information These are read-only memory (ROM), which means they
between computers. can’t be written over and can only be read. Permanent
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
storage method.
3.4. Solid State Backing Storage
CD-ROM is used to store music files and to store software,
computer games and reference software. Holds data on devices that don’t have any moving devices.
DVD-ROM has much larger storage and is used to store
films. Solid-state drives (SSD)
Used in applications where there is a real need to prevent
deletion or overwriting of important data. Uses:
They are less expensive than hard disk drive systems. Advantages:
They are very portable as they are small and light.
Data stored on them is read-only, so it cannot be They are more reliable as they have no moving parts.
accidentally overwritten. They are considerably lighter, and suitable for laptops.
They do not have to ‘get up to speed’ before they work
Disadvantages: correctly.
They have lower power consumption.
Hold far less data than hard disk drives or memory sticks.
They run much cooler than HDDs.
Very slow data transfer rate and data access times, as
Because of no moving parts, they are very thin.
compared to hard disk drives.
SSD data access time is only 0.1 milliseconds compared
You cannot add your own files to the disks because they
to 10 milliseconds for HDD.
are both read-only.
Data transfer speed for SSDs is also much faster than for
HDDs.
Blu-Ray Discs
Disadvantages:
The main differences between DVD and Blu-ray are:
SSD endurance - SSDs are conservatively rated at only
1. Blu-ray uses a blue laser rather than a red laser. (The
20GB write operations per day over a three-year period.
wavelength of blue light is 405nm, much smaller than More expensive than magnetic hard disks.
the 650nm red laser) This makes pits and lands much
Smaller storage capacity than magnetic hard disks.
smaller, so they store five times more data than DVDs.
2. Blu-ray disks automatically come with a secure Pen drives (Memory sticks)
encryption system, which helps to prevent piracy and
copyright infringement. Uses:
3. The data transfer rate for a DVD is 10 Mbps, and for a
Blu-ray disc, it is 36 Mbps. Transporting files between computers or using as a
backing store.
Uses: Used as a security device to prevent software piracy
(known as a dongle).
Home video consoles.
Storing and playing back movies. Advantages:
Computers can use this technology for data storage or
backing hard drives. Very compact and portable media.
Camcorders can use this media to store movies. Very robust.
Does not need additional software to work on most
Advantages: computers.
They are not affected by magnetic fields.
Very large storage capacity.
Very fast data transfer rate. Disadvantages:
The data access speed is also greater than with other
optical media. Cannot write protect the data/files by making it ‘read-only’.
Blu-ray discs automatically come with a secure encryption Easy to lose (due to the small physical size).
system. The user needs to be very careful when removing a
memory stick from a computer - incorrect removal will
Disadvantages: corrupt the data on the memory stick and make it useless.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
» CFast card (compact, fast card). data into an electrical signal that allows network
Uses: access. Usually integrated into the motherboard.
Storing photos on digital cameras. Each NIC is given a unique hardwired media access
Used as mobile phone memory cards. control (MAC) address.
Used in MP3 players to store music files. Media access control (MAC) address: a number that
Used as a backing store in hand-held computer devices. uniquely identifies a device when connected to a network.
The first six hex digits identify the manufacturer’s code,
Advantages: and the next 6 identify the device’s serial number.
Very compact. 2. Hubs: they are hardware devices that can have
Because of no moving parts, they are very durable. several other devices connected to them. They are
They can hold large amounts of data. used to connect devices together to form a local area
Compact cameras and smartphones can read and write network (LAN). It takes a data packet received by one
memory cards, allowing the user to transport extensive of its ports and sends it to all relevant or irrelevant
collections of photographs, songs etc. devices that are connected to it.
Disadvantages: It is not very secure to broadcast data to all devices.
Unnecessary network traffic.
Expensive per gigabyte of memory when compared to
HDDs. 3. Switches: intelligent hubs. Used to connect devices to
Have a lower storage capacity than hard disks. form a LAN. Unlike hubs, the switches store the MAC
Have a finite life regarding the number of times they can addresses of all devices on a lookup table. So, it only
be read from or written to. sends data to the relevant device.
Memory cards, specifically the micro SD card, are the In summary:
smallest storage devices available, making them more
likely to be lost, stolen or damaged. Both are used to connect devices in LAN.
Users must often purchase a card reader or USB Both use data packets.
converter to view the data. Hubs send data to every device on the network.
Switches send data to a relevant device only.
Switches have better security.
4. Networks & the Effects of Switches use lookup tables to determine the destination
for a data packet.
Using Them Switches use MAC addresses for relevant device
locations.
4.1. Networks 4. Bridges: Devices that connect one LAN to another LAN
that use the same protocol. Unlike routers, they can’t
Routers
communicate with external networks, such as the
A device that enables data to be sent between different types
Internet.
of networks. It can be connected through cables or wirelessly
Comparison:
to connect a LAN to the internet.
It can be used for: Bridges connect LANs together; routers connect various
types of networks together.
connecting networks and devices to the internet,
Bridges scan MAC addresses while routers scan the IP
storing computer addresses,
addresses.
routing data packets.
Both send out data in the form of data packets.
When a data packet is received, the router checks if the Bridges connect networks with the same protocol; routers
packet is intended for it or another network. The data packet can connect networks with different protocols.
The router uses routing tables to direct data packets, but
is routed to the local switch/hub if it's meant for its network. If
not, the data packet is sent to the relevant router, which bridges don’t.
sends it to the relevant device. Bridges have only two ports; routers have multiple ports.
They consult routing cables to know where to send the Wi-Fi & Bluetooth
data.
Both are used for wireless communication between devices.
Common Network Devices They both use electromagnetic radiation as the carrier of
data transmission.
1. Network Interface Cards (NIC): These are needed to Bluetooth uses:
allow a device to connect to a network. Turns binary
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
When transferring data between 2 or more devices that Files can be synced across multiple devices.
are very close together. There is no need to carry storage devices around.
When the speed of data transmission isn’t crucial.
For low-bandwidth applications. Disadvantages:
Cloud data is duplicated and stored on other servers to Usually private and are used to send information securely
ensure availability during system failures, upgrades, and and safely.
maintenance. Access to an organization’s Intranet is restricted and only
accessible to authorized users such as employees.
Advantages: Intranets have many advantages over the internet, such
as:
Services can be scaled up or down according to changing
better bandwidth than the internet,
requirements.
data is kept within the organization,
Cloud storage eliminates the need for a business to
less chance of hacking and attacks,
purchase expensive equipment for infrastructure and
administrators can manage access to external sites
maintenance.
and links.
Readily available globally, allowing both remote working
and data sharing. Characteristics:
Providers offer high levels of ensuring that services are
always available. A private network that is accessible to employees within a
It can offer an almost unlimited amount of storage. company or organization.
A backup of the data from the cloud will allow full data Usually behind a firewall to ensure security.
recovery in case of incidents.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
1. Zero login: A security concept that eliminates Heuristic Checking: Instead of relying solely on a database of
traditional login methods, such as usernames and known viruses, this method looks for behavioural patterns
passwords, using biometrics or other authentication and other features in a file to identify possible risks.
factors for seamless and password-less access.
2. Biometric Recognition: These authentication methods Electronic Conferencing
use unique physical or behavioural characteristics,
such as fingerprints, iris scans, or voice recognition, to 1. Video Conferencing: It is a form of audio and video
communication. It serves as a stand-in for face-to-face
verify a person's identity.
meetings between several persons who may reside
3. Magnetic Stripes: These are authentication features
on cards storing data magnetically. They enable abroad or in another region of the country. It utilizes a
network in some way and is done in real-time.
secure identification and authorization by containing
encoded information that magnetic stripe readers can
The basic hardware includes:
read.
webcams,
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
large monitors/television screens, Heavily relies on technology, and technical issues such as
microphones, poor audio quality, background noise, or connectivity
speakers. problems are common.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
The negative aspects include: safer due to the removal of human error
due to the more efficient operation of vehicles, it is better
people do not meet face-to-face as much (social isolation) for the environment
a lack of social interaction may make people more reduced traffic congestion
anxious about meeting people in real life
increased lane capacity
When communicating online, people can act less politely reduced travel times
or more harshly, and cybercrime is a serious issue, stress-free parking for motorists
especially for teenagers.
Disadvantages:
Monitoring and Controlling Transport
very high installation prices
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
driver and passenger reluctance of the new technology Cause: due to prolonged use of monitors
reduction in taxi requirements could lead to Minimizing health risks: use adjustable chairs, footrests, and
unemployment tiltable screens.
maintenance of the sensors and cameras is crucial 3. Eyestrain: strain and fatigue, unwanted harm to vision.
the ever-present fear of hacking into the vehicle’s control Cause: due to bad lighting and prolonged screen usage.
system Minimizing health risks: use LCDs instead of CRTs, take
regular breaks, use anti-glare screens, and do regular eye
Advantages of an autonomous train: testing.
4. Headaches: pain or discomfort in the head or face area.
improved punctuality
Cause: incorrect lighting, screen reflections, flickering
reduced running costs due to fewer staff
screens, etc.
no human error
Minimizing health risks: use anti-glare screens, take regular
minimized energy consumption
breaks, regular eye-testing.
possible to increase the frequency of trains as the
5. Ozone irritation: inflammation and irritation of the tissues
possibility of delays is removed
lining human airways
more straightforward to update changes in train
Cause: inhalation of ozone released by laser printers in an
schedules
office.
Disadvantages: Minimizing health risks: proper ventilation, laser printers
should be housed in a separate room, replace laser printers
fear of the system being hacked into with inkjet printers, if possible.
initial instalment costs are very high
ensuring passenger behaviour is vital, especially during
rush hours. 6. ICT Applications
human reluctance to new technology
without drivers, CCTV monitoring will be continuously
6.1. Communication
required
5.2. Potential Health Problems related Collection of webpages, text, graphics, video, and sound
to the Prolonged use of IT Equipment Hosted on a web server on the internet
Need to write code or use a web authoring application
Long-term exposure to computing devices may affect user Hyperlinks to other pages can be added
well-being. Interactive websites require programming knowledge
Can use a camera, scanner, and microphone to input data
Mentioned below are some of the health issues,
accompanied by their causes and prevention tactics: Usually, hire space from the web hosting company
1. Repetitive strain injury (RSI): A condition affecting the Advantages
Ability to add sound/video/animation
muscles and nerves
Cause: repetitive movements and overuse of muscles, such Links to other websites/hyperlinks
as wrists The use of hot spots
Minimizing health risks: regular breaks, ergonomic Buttons to navigate/move around the website
equipment, correct typing techniques. Hit counters to see who has visited the websites
2. Back and neck strain: Back pain and other related issues. worldwide advertising capability
Disadvantages
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
frequently, computer modelling can be a very costly potential gaps or inaccuracies in the analysis.
option Based on assumptions and simplifications, introducing
human reluctance is a common problem in this a level of uncertainty.
technology Their programmed algorithms and data inputs bind
models. They may struggle to adapt to unforeseen
Some of the applications of computer modelling include: circumstances or rapidly changing conditions that
1. Personal finance: Computer modelling involves using humans can more readily navigate and respond to.
mathematical algorithms and data analysis to simulate
various financial scenarios, such as investment strategies,
retirement planning, and risk assessment, aiding individuals 6.3. Computer-controlled Systems
in making informed decisions and optimizing their financial
Robotics in manufacturing: involves using automated
goals.
machines to perform tasks such as assembly, welding,
2. Bridge and building design: Computer modelling is crucial
and packaging. These robots are designed to mimic
in bridge and building design. It allows engineers to simulate
human actions with precision and speed, increasing
and analyze structural behaviour, assess load capacities, and
productivity and quality control. They offer benefits like
predict the response to external forces. It aids in optimizing
enhanced worker safety, improved efficiency, and the
designs, ensuring structural integrity, and minimizing
ability to handle repetitive tasks, revolutionizing the
potential risks before construction begins.
manufacturing industry.
3. Flood water management: Computer modelling plays a
Advantages:
vital role in flood water management by simulating water flow
can work in environments that may be harmful to
behaviour, predicting flood extents, and assessing potential
humans
flood risks. It helps design and optimise flood mitigation
can work non-stop
measures, such as levees and floodplain zoning, allowing
low running costs, majorly due to reduced employees;
authorities to make informed decisions, develop effective
thus less wages need to be given
emergency response plans, and minimize the impact of
have higher productivity
flooding on communities.
provide greater consistency
4. Traffic management: Computer modelling simulates and
can do long, boring, tedious tasks
analyses traffic flow, predicts congestion patterns, and
can carry out different tasks by fitting them with
optimises traffic control strategies. It aids in designing
different-end effectors
efficient road networks, optimizing signal timings, and
Disadvantages:
evaluating the impact of transportation infrastructure
robots find it difficult to do unusual tasks
projects. This enables authorities to make informed
can cause higher unemployment
decisions, alleviate congestion, and improve overall traffic
robots do many of the tasks once done by humans,
efficiency for better urban mobility.
leading to deskilling
5. Weather forecasting: Computer modelling plays a pivotal
robots are independent of the skills base; factory
role in weather forecasting by simulating the Earth's
headquarters can be moved internationally
atmosphere, oceanic conditions, and other environmental
initial set-up and maintenance of robots can be
factors. These models use complex algorithms to predict
expensive
weather patterns, including temperature, precipitation, wind
Production line control: Computer-controlled systems in
speed, and storm systems. By assimilating real-time data,
production line control involve using computers and
computer models provide forecasts that aid meteorologists in
software to monitor, coordinate, and optimize
predicting weather conditions, issuing warnings, and helping
manufacturing processes. These systems ensure efficient
society prepare for potential hazards.
coordination of machinery, manage inventory, track
Advantages of using computer modelling rather than production metrics, and automate tasks. They enable
humans: real-time data analysis, error detection, and adjustment,
It can provide more precise and accurate results than improving productivity, reducing downtime, and
human-based methods, minimizing errors and enhancing overall operational efficiency in the production
increasing reliability. line.
Can analyze large amounts of data and perform Autonomous vehicles: Self-driving cars and drones guided
complex calculations faster than humans by computer algorithms.
It can be reused and updated easily, reducing the enhance safety
need for repetitive manual analysis and potentially reduce traffic congestion
lowering costs in the long run. increase fuel efficiency
Disadvantages of using computer modelling rather than Advantages of using computer-controlled systems rather
humans: than humans:
It may overlook nuanced factors or intangible increased efficiency and productivity
elements that humans can consider, leading to greater consistency
ability to work in any environment
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Automated teller machines (ATMs) are places where technology. The system depends on electronic money
customers can get cash (or carry out certain other banking transfers between accounts; no cash is moved. The computer
activities, such as ordering a statement) using their credit or system automatically moves the requested amount from one
debit card. account to another when it receives an EFT command.
What goes on behind the
Sequence at ATM Advantages:
scenes
very secure payment method
Customer puts card into Contact is made with bank’s
very quick payment method
ATM computer
less expensive than cheques
PIN is checked to see if it is the customer has the right to dispute an EFT payment
correct for up to 60 days
Card is checked to see if it is Disadvantages:
PIN is entered using the valid the bank transaction can’t be reversed without full
keypad The transaction is closed if the dispute investigations
card is stolen or the number of customer needs to have funds available immediately
PIN attempts allowed is cannot guarantee the recipient’s identity
exceeded.
Several options are given: Credit/debit card transactions
change PIN, pay in cheques,
pay a bill, see balance, get Several credit/debit cards come with a magnetic stripe and a
money chip; the chip houses essential data like the PIN. This
technique is intended to increase security because it is
The customer selects the
superior to a signature. A chip and PIN card to make
cash option & several cash
purchases is an example of an electronic funds transfer (EFT).
options are shown
The customer’s account is Advantages of credit cards:
accessed to see if they have customer protection if ordered goods don’t arrive
sufficient funds, it is checked to internationally accepted payment method
see if they are withdrawing interest-free loan if money is paid back within the
The customer accepts one of
more than their daily limit. agreed time period
the options or types in a
If the limit is not exceeded and can make purchases online
different amount
all other checks are OK, then Disadvantages of credit cards:
the transaction is authorized, can be charged high interest rates
and the machine then counts annual fees often apply
out the cash easy to end up with credit damage
The customer is asked if they security risks in online transactions
want a receipt Advantages of debit cards:
money comes from the user’s current account, there
The card is returned
is no interest
Money is dispensed Customer’s account is updated
safer than carrying cash
can make online purchases
Advantages: Disadvantages of debit cards:
possible to withdraw at any time of the day less customer protection if goods don’t arrive
offer many banking services without having to go to no credit allowed; funds are needed at the time of
the bank
purchase
possible to access an account from anywhere in the
security risks in online transactions
world
usually provides quicker service than waiting in a Cheques
queue at a bank
Disadvantages: Individuals and organizations use cheques as a form of
often in places where theft can take place at night payment. When issuing a cheque, the payer writes the
potential for shoulder surfing recipient's name, the payment amount, and the date on the
some banks charge customers for using ATMs cheque. The recipient then deposits or presents the cheque
cash withdrawal limits are often imposed on people to their bank for processing. The payer's bank verifies the
fund’s availability, and upon clearance, the specified amount
Electronic Funds Transfer (EFT): is transferred from the payer's account to the recipient's
account, completing the transaction.
It is possible to send money transfer instructions directly to a
bank's computer system via electronic funds transfer (EFT) Advantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
more convenient and safer than cash Artificial blood vessels are synthetic structures
can be post-dated designed to mimic the function of natural blood
can be traced if they are lost vessels, facilitating the flow of blood and nutrients
Disadvantages: throughout the body to support tissue repair and
aren’t legal tender and can be refused regeneration.
slow method of payment Customized medicines are personalized drug
easier for fraudsters than other methods formulations tailored to individual patients' specific
relatively expensive payment method needs. They utilize advanced technology and precise
measurements to create medications with accurate
Internet Banking dosages and unique compositions, optimizing
treatment outcomes.
Enable online access to banking services via a secure website
or app, allowing for transfers, bill payments, account
6.8. Expert Systems
management, and more.
2. Explanation system
3D Printers
Informs the user of the reasoning behind the expert
Using 3D printers in medicine: system’s conclusions
Prosthetics: 3D printers print out artificial body parts
It will supply a conclusion and any suggested actions to
such as false teeth, artificial limbs, hearing aids, etc.
take
This is a less expensive method of replacing body
It will also give the percentage probability of the accuracy
parts.
of its conclusions
Tissue engineering: it is the field of combining cells,
biomaterials, and engineering principles to create 3. Inference engine
functional tissues or organs, aiming to repair or
replace damaged or diseased tissue in the human The main processing element of the system
body. It acts like a search engine examining the knowledge base
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Responsible for gathering information time, providing convenience and security for customers and
This is the problem-solving part of the system businesses during retail purchases.
Attempts to use information gathered from the user to The process of checking credit and debit cards at a
find a matching object supermarket EFTPOS is much the same as was described for
paying a restaurant bill in Section 6.6.
4. Knowledge base Some functions of EFTPOS include:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
costs of delivery and return It can be used as a security system to prevent illegal
fake negative reviews can lead to a lousy company parking.
reputation It can be used to analyze driver behaviour.
It can be used in inner-city congestion charging
6.10. Recognition Systems systems.
Disadvantages:
1. Optical Mark recognition (OMR) media in schools: A lack of manned security car park surveillance could
lead to vandalism.
School registers: Paper-based registers are fed into OMR There could be an invasion of privacy due to recording
to be scanned and stored in a database. drivers’ number plates.
Multiple-choice examination papers: The position of a Damaged or very dirty number plates will not be
mark is stored in a computer’s memory after being read recognized.
by the OMR, a device using a template that maps out the The ANPR system only recognizes the number plate
X-Y coordinates of each tablet (pen/pencil mark). and not the car so that a car can be fitted with a
Used at POS terminals for scanning and reading the cloned number plate, thus bypassing car park security,
information stored in barcodes. for example.
Many digital devices have OMR scanners, which may be
used to scan QR codes. 3. RFID in tracking stock:
Advantages:
Tracking of stock using RFID involves either tracking
very fast way of inputting the results of a survey
livestock (on a farm) or goods in a shop, supermarket, or
more accurate than keying in data
distribution centre.
more accurate than OCR methods
RFID in passports:
Disadvantages:
The data on the RFID chip is read when the passport is
designing the forms is a very complex job
scanned.
there can be problems if they haven’t been filled
Your photo is clicked and compared to the RFID chip
correctly
image.
often only work with black pens or pencils
If face recognition passes, some checks are made to
2. Optical Character Recognition (OCR) ensure you are eligible to enter the country, and if you
are, the gate opens automatically.
Automatic Number Plate Recognition (ANPR) systems: RFID in automobiles:
The sensor sends a signal to instruct a camera to Tags allow or deny access to parking in a secure,
capture an image of the front of the vehicle private car park.
An algorithm is used to locate and isolate the number RFID tags in lorries and delivery vans can be used at
plate from the image taken by the camera. weigh stations to ensure the vehicle is not carrying too
The brightness and contrast of the number plate are much weight.
first adjusted. Each character on the number plate is RFID tags can be used on a car production line to track
then segmented. its progress through assembly.
Each character is then recognized using OCR RFID in contactless payments:
software. The characters are converted into a string of The embedded chip on credit/debit cards and the
editable text by the software. antenna enable customers to wave their card over a
This text string is then stored in a database. reader at the point of sale terminals to make
A barrier is raised, and the motorist is issued with a payments
ticket. The ticket shows the date and time of entering Smartphone apps can also be used to make
the car park. contactless payments.
When the car returns to the car park, they insert their Advantages:
ticket into a machine that calculates their charges and No line-of-sight contact is necessary.
registers the payment into the database. It is a very robust and reliable technology.
Advantages: Tags are much more difficult to forge than barcodes.
Used to automatically monitor the average speed of RFID tags can reduce the number of staff needed in,
vehicles over a stretch of road. for example, a warehouse because tracking items is
There is no need to employ a car park or security automatic (thus reducing costs).
guards. It provides a very fast read rate.
It's a much faster system than checking a ticket at the It allows bi-directional data transfer.
exit. Bulk detection is possible.
It can automatically control the entry and exit to a car Disadvantages:
park or private roads. Tag collision is when the signals from two or more
tags overlap, interfering with each other.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Because RFID uses radio waves, they are relatively Satellite Navigation (satnav):
easy to jam or interrupt.
It is relatively easy to hack into the data/signal Used to determine the exact location of a car.
transmitted by the tag. The computers onboard can be used to show directions to
The initial cost of an RFID system is more expensive a destination.
than a comparable barcode system.
Advantages:
4. Near Field Communication (NFC):
Better focus as there isn’t a need to constantly check
Enables short-range wireless communication between paper maps.
devices. Reduces fines by warning drivers about upcoming speed
Allows payment using a smartphone. changes.
Advantages: The system shows an Estimated Time of Arrival (ETA).
Convenient and secure method of payment It is possible to program in the fastest route to avoid
allows for contactless transactions towns.
Disadvantages: The system can also give helpful information such as the
Limited range location of petrol stations.
compatibility issues with some devices
Disadvantages:
5. Biometric recognition:
If the maps are not updated, they can give incorrect
Usually refers to automated technologies for instructions.
authenticating and verifying human body characteristics Road closures due to accidents or roadworks can cause
such as face, iris, retina, finger, thumb, hand and voice. problems.
Advantages: The loss of satellite signals can cause problems.
very high accuracy The system will give incorrect information if an incorrect
very easy to use start-point or end-point is keyed in.
very fast verification time
non-intrusive method Geographic Information Systems (GIS)
relatively inexpensive technology
Used to capture, manage, analyze, and display
Disadvantages:
geographically referenced information.
it can make mistakes if the skin is dirty or damaged
Use to determine the distance between two places.
very expensive to install and set up
Used to find the nearest petrol station or restaurant, etc.
uses a lot of memory for the data to be stored
To protect animal and plant life in certain vulnerable
a person’s voice can be quickly recorded and used for
places.
unauthorized access
It can be used in geography, science, or engineering
an illness, such as a cold, can change a person’s voice,
lessons.
making absolute identification difficult or impossible
Advantages:
6.11. Satellite Systems
Allows geographical and thematic data of any kind to be
combined to show how they are connected to each other.
Global Positioning Systems (GPS)
It allows the handling and exploration of vast amounts of
Used to determine the exact location of several modes of data.
transport It allows data to be integrated from a wide range of very
Cars usually refer to GPS as satellite navigation systems different sources.
Satellites surrounding the Earth transmit signals to the
Disadvantages:
surface
Computers installed in the mode of transport receive and The learning curve on GIS software can be very long.
interpret these signals GIS software is very expensive.
Knowing their position on the Earth depends on very GIS requires enormous amounts of data to be input.
accurate timing – atomic clocks are used in the satellites, It isn't easy to make GIS programs that are both fast and
which are accurate to within a fraction of a second per user-friendly.
day
Each satellite transmits data indicating its position & time Media Communication Systems
The computer on board the mode of transport calculates
its exact position based on the information from at least Using satellite signals for communication.
three satellites Used by media companies when sending
stories/videos/pictures from remote locations.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
Instruction and guidance for end-users on how to operate the Evaluate the Ease of Use
system. Used to help users effectively use the system and
overcome problems Look at the solution's usability and accessibility for the
target market. Check to see if the system is simple to
Purpose of the system: Explanation of the system's understand and use and if users have no trouble
intended function and goals completing their jobs.
Limitations: Known constraints or issues with the system Describe the user interface and how it facilitates
Hardware & software requirements: Necessary interaction with the system
equipment and software to run the system Mention any feedback from users regarding their
Loading/running/installing software: Instructions for experience with the system and address any issues
setting up the system on user devices they encountered
Saving files: Procedures for storing data within the system Questions to ask:
Printing data: Steps to produce hard copies of system Are all the users able to use the system and make
data bookings easily?
Adding records: Instructions for creating new entries in Are all the users able to change and cancel bookings
the system easily?
Deleting/editing records: Guidelines for modifying or Can all staff understand how to use the system with
removing existing entries in the system minimal training?
Input format: Structure and format for entering data into
the system Determine the Suitability of the Solution
Output format: Structure and format for presenting data
generated by the system Examine how well the implemented solution satisfies the
Sample runs: Examples of system operation, including desired outcome by contrasting it with the original task
input and expected output criteria.
Error messages: Explanations of system warnings and Outline the initial objectives of the system and discuss
error notifications how the solution addresses each one
Error handling: Steps to resolve issues and errors within Highlight any requirements that may not have been
the system fully met and discuss possible reasons for this
Troubleshooting guide/helpline: Assistance for diagnosing Questions to ask:
and addressing common problems Is the system suitable for each of the departments?
Frequently Asked Questions: Answers to common user Does it meet the needs of the customers?
inquiries Does it meet the needs of the staff?
Glossary of Terms: Definitions of key terms and concepts Does the solution match the original requirements?
related to the system
Collect and Examine User’s Feedback
7.6. Evaluation
Collect users' responses to the results of testing the
It measures a system's productivity, efficiency, and system. Their feedback can provide insights into potential
compliance with its goals to identify its strengths, issues and improvements and help determine overall
shortcomings, and potential development areas. This user satisfaction.
assessment informs decision-making and improves overall Summarise the testing process, including test data
expected and actual outcomes.
performance over the course of a system's life cycle.
Discuss users' reactions to the system, addressing
Assess the Efficiency of the Solution any concerns or suggestions they may have
Analyse the system's efficiency in time, money, and Identify Limitations and Suggest Necessary
resource use. Examine whether the system is performing Improvements
at its best or if its efficiency could be increased.
Provide examples of specific aspects that contribute to Based on the analysis of efficiency, ease of use,
the system's efficiency appropriateness, and user feedback, identify any
Identify areas that may be consuming excessive limitations in the system and suggest necessary
resources or time and suggest ways to optimize them improvements
Questions to ask: List the limitations and provide explanations for each
Does it operate quicker than the previous system? one
Does it operate by reducing staff time in making Recommend specific changes or enhancements for
bookings? these issues
Does it operate by reducing staff costs?
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
2. Fire: ICT devices require electricity to charge or run; too Data must be processed lawfully, fairly, and transparently,
many devices using a single socket can cause the plug socket with clear consent from the individual.
to overload, and heat is generated by too much electricity, Data should only be collected for specific, explicit, and
causing the wiring to degrade and ignite a fire. legitimate purposes.
The causes and reduction tactics for fire include: Organizations should only collect and retain the minimum
personal data necessary for their stated purpose.
Socket overload: Ensure enough plug sockets in the room, Data should be accurate and up-to-date, and reasonable
don’t plug too many devices into the same socket, and steps must be taken to rectify or erase inaccurate
don’t leave devices plugged in and unattended. information.
Overheated equipment: Ensure that equipment is Personal data should not be kept longer than necessary
properly ventilated and not obstructed, keep flammable
and should be securely deleted when no longer needed.
materials away from heat sources, regularly check Organizations must protect personal data against
equipment for signs of wear or damage, use fire unauthorized or unlawful processing, accidental loss,
extinguishers in case of emergencies, turn off or unplug
destruction, or damage.
devices when away from the location, do not cover any air
vents on devices. Why is data protection legislation required?
3. Trailing cables: Devices can be plugged in using cables.
Protecting Individual Rights: Data protection legislation
Cables that are protruding can cause an accident; you can
safeguards individuals' right to privacy and control over
trip over a cable left out in a location, and body damage can
their personal information.
occur during a fall, for example, breaking bones, ligament
Preventing Misuse of Personal Data: It helps prevent
damage, bruising, sprains, etc. depending on the area fell on
unauthorized access, identity theft, fraud, and other forms
Trailing cables causes and prevention strategies:
of data misuse.
Unorganized/insecure cables: use cable ties to secure Promoting Trust: Data protection laws build trust between
cables, keep cables packed correctly in, let’s say, a table, individuals and organizations by ensuring their personal
therefore not coming in the way of walking paths, use information is handled responsibly.
wireless devices where possible, and regularly inspect Encouraging Responsible Data Handling: Legislation
cables for signs of wear or damage. promotes responsible data collection, storage, and
processing practices among organizations.
4. Heavy falling equipment: Devices have varying levels of Enabling Data Subject Rights: Legislation grants
weight, and if a device falls on you, it could cause injury; any individuals rights such as access to their data, right to
device should be placed in a secure location, like a PC on a rectification, erasure, and objection to processing.
solid desk and not near the edge.
Causes and reduction tactics for falling equipment: Personal Data
Improperly secured equipment: Ensure that equipment is Refers to information that can be used to identify an
properly secured and stable. Regularly check the stability individual
of locations containing devices. Examples
Equipment on unstable surfaces: Keep equipment away Personal Name
from edges and other potential hazards, and regularly Address
Date of birth
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
There are multiple methods by which data can be threatened, Creating data in a format that cannot be read without a
including: decryption key Data on hard drives, emails, cloud storage,
and secure websites (HTTPS) are all protected by
Hacking: Unauthorized access to computer systems or encryption. Without a decryption key, it assures that even
networks to gain control, steal information, or cause if unauthorized people obtain data, it cannot be decoded.
damage, thus leading to identity theft, privacy breaches,
and misuse of data 5. Firewall:
Phishing: Deceptive emails or messages that are received
from trusted sources to trick individuals into revealing A firewall is a network security device that monitors and
personal data manages incoming and outgoing network traffic. Its goal
Pharming: Manipulation of DNS (Domain Name System) is to separate an internal network from other networks by
to redirect users to fraudulent websites, often to steal filtering data according to established criteria. It assists in
personal data preventing malware, unauthorized access, and other
Smishing: Phishing attacks carried out through SMS or network risks.
text messages
6. Two-factor authentication:
Vishing: (aka voicemail phishing) Phishing attacks carried
out through voice messages to trick users into calling the A security mechanism that requests two different kinds of
telephone number contained in the message identification from users to confirm their identity. To
Viruses and malware: Viruses are program codes that can provide additional protection outside of just a username
replicate/copy themselves to cause data loss or and password, 2FA was created. Typically, it combines
corruption. Malicious software designed to disrupt, something that uniquely identifies a user, like biometric
damage, or gain unauthorized access to computer data, with something the user has, like a smartphone and
systems or networks a token or something they know, like a password.
Card fraud: Unauthorized use of credit or debit card
information for fraudulent purposes caused by shoulder 7. User ID and password:
surfing, card cloning, or keylogging.
A typical authentication technique uses a password plus a
Protection of Data secret code (user ID) to identify. To strengthen data
security, user IDs and passwords restrict access to only
Multiple techniques are implied for the protection of data, authorized users. Using secure passwords and changing
inclusive: them frequently is critical to ensure security. When
1. Biometrics: creating passwords, it is advised to utilize a mix of
uppercase, lowercase, digits, and special characters.
Individuals' distinctive physical or behavioural traits, such
as fingerprints, faces, or irises, can be used for access
control and verification. Since biometric data is hard to 9. Audience
fake or duplicate, it offers a more secure form of
identification. 9.1. Audience Appreciation
2. Digital certificate:
To express gratitude and value for the users by providing
A digital record that attests to a website's reliability and helpful and relevant information, fostering positive
integrity. A digital certificate is used to provide safe experiences, and contributing to their understanding and
communication and to build confidence between parties. learning.
Identifier data, the entity's public key, and a third party's
digital signature are frequently found in digital Planning ICT Solutions
certificates.
The first step to building effective ICT solutions is
3. Secure Socket Layer (SSL): identifying and understanding the intended audience's
needs. These needs can be functional, like processing
a protocol that creates a secure connection between a information, or aesthetic, like a visually appealing
client computer and a server. SSL ensures that interface.
information communicated between a server and client After identifying the needs, select the appropriate
stays private and cannot be intercepted or changed by technology and tools to create a solution. This choice
unauthorized parties. A website's identification for it is the depends on factors like the complexity of the task, the
S at the end of HTTP. budget available, and the technical expertise of the users.
An essential aspect to remember while designing ICT
4. Encryption:
solutions is to ensure they are user-friendly. This means
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
they should be intuitive to use, require minimal training, Other techniques include software product activation,
and have easy-to-understand instructions. which needs a unique code to be fully functional.
Additionally, ICT solutions should be accessible to all Given that pirated software frequently cannot receive
users, including those with disabilities. This could involve automatic upgrades, which renders it less effective and
adding features like voice commands, larger text options, secure over time, automatic updates may also serve as a
or compatibility with assistive devices. kind of copyright protection.
Once the solution is created, it is crucial to test it to
ensure it functions as expected and fulfils the users'
needs effectively. 10. Communication
Analysing Audience Requirements 10.1. Communication with Other ICT
Designing an ICT solution requires an understanding of users Using E-mail
the target audience. The study should consider elements
affecting the audience's capacity to use the solution, like E-Mail
age, technical proficiency, and expertise.
The solution creator should know the audience's Uses:
requirements for information. This could serve as a
design cue for the data processing elements and the Email is a technique of sending and receiving messages
information architecture. and files via the Internet.
How the audience utilizes and consumes the content also It is employed in personal communication, business
influences the design. For instance, the answer should be communications, and marketing.
mobile-friendly if the audience accesses it mostly through Acceptable language must be used based on the email's
mobile devices. recipient, for example, professional when composing a
Finally, the designer should consider any unique work-related email.
requirements of the audience, such as visual or auditory Employers frequently establish requirements for
impairments. These requirements should be taken into professional language, substance, and email frequency.
account when designing the solution ensuring inclusivity. Email security is critical to preventing sensitive data from
being accessed or manipulated.
Netiquette is the proper conduct and politeness when
9.2. Copyright using email.
Don’t be abusive
What makes Copyright Necessary? Don’t send spam
Be clear and concise with your message
Copyright regulation is crucial to safeguard the rights of
Remember that posts are usually public and can be
developers and innovators.
read by anyone.
It stops software piracy, which is unauthorised use,
Always check your spelling and grammar.
replication, or distribution. Respect people's privacy and do not discuss or publish
It guarantees developers receive compensation for their
information that might embarrass somebody.
efforts, fostering additional innovation and development.
Forgive people’s mistakes
Do not use CAPITAL LETTERS to highlight comments
Principles of Copyright in a Computer Software
Do not plagiarize
Do not use too many emoticons, as they might annoy
Copyright law prohibits the unauthorized copying,
your readers.
distribution, or modification of software.
Email groups enable mass communication to a specific
It also includes the End-User License Agreement (EULA),
group of subscribers.
which outlines what the software can and cannot be used
for Guidelines set by employers:
Violations of these principles, such as software piracy, can
lead to legal consequences. It is up to companies to decide if personal emails should
be permitted on their systems
Preventing Software Copyright Violation Companies may specify which company devices are
allowed to be used
Software developers employ various copyright protection There needs to be a company standard style when
strategies, such as Digital Rights Management (DRM). sending emails
Due to DRM methods and systems, copyrighted works are It must be made clear what email content is not permitted
subject to usage, modification, and distribution Employees should be told only to use their accounts when
restrictions. sending emails
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
An intranet's main goal is to make it easier for platforms where users can connect with others and
employees to communicate, work together, and share share content
information. include platforms like Facebook, Twitter, Instagram,
Extranets make it easier for external stakeholders to and LinkedIn
collaborate and communicate with a company. It require users to create a profile and allow them to
enables the organization and its reliable clients or share text, images, videos, and links
partners to share information, documents, and facilitate interaction, collaboration, and information
resources securely. sharing on a large scale
privacy settings allow users to control who can see
Many use the terms “Internet” and “World Wide Web” their content
interchangeably. However, they can’t be used in the same
context: The Functionality of the Internet
- The internet refers to the global network of computers and
other devices connected through routers and servers. Internet service providers (ISP): A company that provides
However, the World Wide Web is a collection of websites and internet access. Typically, a monthly fee is charged for
webpages accessed via the Internet. this service. Users' accounts are created when registering
with an ISP and acquiring login information such as user
Blog:
ID and password.
It is a website or section of a website that continually
Uniform Resource Locator (URL): The address of a web
shares new information, frequently written informally page on the WWW. It is a text-based address that uniquely
or conversationally, similar to a journal.
identifies the location of any resource available on the
usually presented in a reverse chronological manner
internet. The three main components are:
usually managed by individuals or small groups
Protocol:
allow for reader comments, facilitating some level of
It is the communication protocol used to transfer data
discussion between the client and the server
often focus on specific topics, such as food, travel,
E.g. HTTP, HTTPS, FTP, and others
fashion, technology, or personal experiences
Domain:
also serve as a platform for sharing opinions or
it is the name of the server where the resource is
insights
located
Forum:
it can be a name or an IP address
an online discussion site where people can hold
Webpage/file name:
conversations in the form of posted messages
it is the location of the file or resource on the server
often organized around specific topics or interests and
it can contain the name of the file or directory where
divided into categories known as threads
the resource is located
primarily focused on peer-to-peer interaction A URL looks like this:
may require users to create an account before posting
protocol://domain/path/filename
can be moderated or unmoderated
E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is a
A moderated forum is an online discussion forum
URL that consists of the HTTPS protocol, the domain
in which an administrator checks posts before they
name "www.hoddereducation.co.uk", the path is
are allowed to be posted.
“IGCSE” and the filename is “ICT”
The internet is essentially a huge unmoderated
A hyperlink is a word/phrase/image which references
forum. No one ‘owns’ the internet, and it is
data that the reader can follow by clicking or tapping,
essentially not policed.
usually taking you to another web page
Wiki:
A web browser is a software application used to locate,
a type of website that allows users to add, remove, or
retrieve, and display content on the WWW, including web
edit content
pages, images, video, and other files
designed to facilitate collaboration and knowledge
sharing from many people Use of Search Engines
holds information on many topics which can be
searched There are two fundamental methods for obtaining
posts are not in chronological order information via the Internet. The first method is to enter the
structure is determined by the content or its users URL if you know the website's address. If you don't know
The most famous wiki is Wikipedia, an online where to look, the second option is to employ a search engine
encyclopedia to locate the information you seek.
changes can be tracked and reverted if necessary,
and the content is usually written in a neutral style Advantages of using the Internet to find information
Social networking: information tends to be up to date because it is
quicker and easier to amend
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE ICT
The Internet has vast amounts of information Evaluating Information Found on the Internet
searching for information using a search engine is fast
and easy Although the internet provides much information, not all
people can look for information in the comfort of their are genuine or dependable.
own home Consider the source's reputation and trustworthiness
information on the internet is essentially free of when determining the information's dependability.
charge Check the accuracy of information by comparing it to
webpages may have multimedia elements, making other reliable sources.
learning more interesting Assess whether the information is skewed, keeping an
Disadvantages of using the Internet to find information eye out for views pushing a particular point of view.
it isn’t regulated; anything can be posted Check if the material is current, as obsolete information
always the risk of accessing inappropriate websites might be deceptive.
too easy to be distracted by the many distractions
available on the internet Internet Protocols
Some research skills are lost when using the internet,
as search engines do all the work for you. Protocols are rules on which the sender and recipient agree
when data is exchanged between devices.
Speed of Searching 1. Hypertext transfer protocol (HTTP): when a web page is
being accessed, entering http:// at the front of an address
Search engines may scan billions of online pages to locate tells the web browser that ‘HTTP rules’ for communication are
matches to your search query in a fraction of a second. to be obeyed.
Your internet connection and the effectiveness of the 2. Hypertext transfer protocol secure (HTTPS): A secure
search engine's algorithms influence the speed. version of HTTP that encrypts data for security.
3. File transfer protocol (FTP): network protocol used when
Amount of Information transferring files from one computer to another over the
internet. It is similar to HTTP, but the protocol specifically
Because search engines can deliver a deluge of transfers files.
information, utilising particular and relevant search 4. Secure sockets layer (SSL): a protocol that allows data to be
phrases is critical. sent and received securely over the internet.
Adding quotation marks for specific phrases, "+" signs for
required terms, and "-" signs for omitting terms can help Risks of Using the Internet
narrow the search.
Inappropriate and unlawful content: The internet may
Finding Relevant and Reliable Information attract people to potentially dangerous or illegal
materials.
The search engine algorithm determines the relevancy of Data restriction: Parental, educational, and ISP
information by considering parameters such as keyword restrictions can all be used to restrict access to specific
frequency & page quality. information or websites.
Reliable information is often obtained from recognized
sources such as educational, government, or well-known
industry websites.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by ShweSin Moe at undefined on 12/05/24.
CAIE IGCSE
ICT
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by ShweSin Moe on 12/05/24 for strictly personal use only.
These notes have been created by Bisma Hammad for the 2023-2025 syllabus
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website. Under no conditions may this
document be distributed under the name of false author(s) or sold for financial gain.
“ZNotes” and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).