Caie Igcse Ict Theory
Caie Igcse Ict Theory
ORG
CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Aleksandra for personal use only.
CAIE IGCSE ICT
Application software:
1. Types and Components of Provides services that allow the user to do specific
tasks.
Computer Systems It can be general-purpose software or custom-made
software. (Specialist software)
E.g., Spreadsheets, databases, and word processors.
1.1. Hardware & Software System Software:
The software is designed to provide a platform all
Hardware other software to run on. For example:
1. Compilers: The software translates the High-
the electronic, physical components that make up a level language into Machine code (Language
typical computer system. These may include input and Processor).
output devices as well. 2. Linkers: A Software that creates the links
Internal Hardware Devices: between Language processors into workable
Central processing unit solutions (Data definition language).
Processor 3. Device drivers: A software that enables the
Motherboard device to work with another, externally
Internal memory consisting of RAM & ROM connected device.
Graphics & Sound Cards 4. Utilities: A system software that provides the
Internal Storage devices like Hard disk drives (HDD) necessary facilities (Antivirus, Scan Disk, Disk
and solid-state drives (SSD) Defragmentation, etc.)
Network interface card (NIC) 5. Operating systems: To enable computer
External Hardware Devices: systems to function and allow users to
Monitor communicate with computer systems, special
Keyboard software, known as operating systems (OS),
Mouse have been developed.
Printer
External Storage Devices Analogue and Digital Data
Software Computers can only understand data in the form of binary
digits (0,1); this is commonly known as digital data. However,
The techniques, methods, commands, and instructions data in the real world is analogue, not limited to two specific
tell the device what to do and how to do it. values.
They are the programs which control the computer
system and process data.
Relates to ideas & instructions for using physical objects.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Mobile Computers
1. Laptop computer:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
(Or notebook) refers to a type of computer where the Allow normal phone calls to be made, but also have an
monitor, keyboard, pointing device and processor are all operating system (such as iOS, Android, or Windows),
together in one unit. This makes them extremely allowing them to run a number of computer applications
portable. lightweight (to aid portability). Low power (known as apps or applets). Smartphones communicate
consumption (and also long battery life). Low heat output with the internet either by using Wi-Fi hot spots or by
(cooling is very important). using 3G/4G/5G mobile phone networks.
Uses: Uses:
1. office and business work 1. They allow users to send/receive emails.
2. educational use 2. They allow users to use a number of apps.
3. used as a gaming device. 3. They allow users to use a camera feature (to take
4. general entertainment photos or videos).
Advantages: 4. They allow users to use an MP3/4 player (for
1. Portability: all components are in a single unit, so music and videos).
they can be taken anywhere. Advantages:
2. Because of one single unit, there are no trailing 1. very small in size and lightweight, makes them
wires and desk clutter. portable.
3. take up much less room on a desk, so they can be 2. connecting to the internet while on the move.
easily used in public spaces. 3. because they use Wi-Fi and mobile phone
4. portability allows them to take full advantage of networks, they can be used almost anywhere.
Wi-Fi features. 4. they have apps which can tell instant location,
Disadvantages: which is a feature that isn’t available in either
1. portability makes it easier for them to be stolen. desktops or laptops.
2. limited battery life means the user needs to carry 5. they have reasonable battery life.
a charger at all times. Disadvantages:
3. keyboards and pointing devices may be awkward 1. small screens and keyboards make pages difficult
to use. to read.
4. not easy to upgrade, like adding more RAM. 2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
2. Smartphones: the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops.
7. The data transfer rate using mobile phone
networks can be slower than with Wi-Fi.
3. Tablets:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Artificial Intelligence (AI): There are many definitions of Unemployment, robots are capable of doing tedious
artificial intelligence (AI). Essentially, AI is a machine or human tasks with much more efficiency and excellence
application which carries out a task that requires some than humans.
degree of intelligence. Dependency on technology could lead to problems in the
The use of language future.
recognizing a person’s face, the ability to operate De-skilling: Tasks that used to be considered a talent are
machinery, such as a car, aeroplane, train, and so on, now part of general, tedious processes that are done on
and analyzing data to predict the outcome of a future a regular basis by machines.
event, such as weather forecasting. Impact: Extended Reality refers to combined real and virtual
Whenever AI is mentioned, people usually think of environments. The two most common examples at the
science fiction fantasies and think of robots. The moment are:
science fiction writer Isaac Asimov even went as far Augmented reality (AR) is a merger between the
as producing his three laws of robotics: » Robots may virtual and physical (real) world; it lays objects onto
not injure a human through action or inaction. » pre-existing objects. e.g., Pokémon GO! Impact: safety
Robots must obey orders given by humans without and rescue operations’ training, shopping and retail
question. » A robot must protect itself unless it (getting a better look at a car before the purchase),
conflicts with the two laws above. Everyday uses: healthcare (better understanding of a patient’s body)
An autonomous (driverless) vehicle – we already have Virtual reality (VR) enables an entirely new world to
driverless trains and autopilots on aeroplanes, but be created, unlike AR, which has no link to the actual
future developments include driverless cars. surroundings of the user. It requires the user to be
Robotic research is leading to improvements in specially equipped with a VR headset, joystick, and
technology to help amputees and people with headphones.
disabilities. Impact: Military applications, educational
Robots are used to help people carry out dangerous purposes (looking at ancient buildings),
or unpleasant tasks – for example, bomb disposal. healthcare, media (interactive special effects in a
movie), scientific visualization (part of molecular
Negative impacts of AI structures/cells).
1. Keyboards:
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Input of data into applications software Sometimes, they have small keys, which can make input
Typing in commands to the computer more difficult.
Sometimes, the order of the numbers on the keypad is
Advantages: not intuitive.
Fast entry of new text into a document.
Well-known method.
Easy to use for most people.
Easier to do verification checks as data is entered (can
immediately compare the source document with typed
data on the screen).
Disadvantages: 3. Mouse:
It can be difficult to use if the user has limited arm/wrist Uses:
use.
Slow method when compared to direct data entry. Opening, closing and minimizing software
It is a fairly large device that uses up valuable desk space. Grouping, moving and deleting files.
Image editing, for example, controls the size and position
of a drawing pasted into a document.
Controlling the position of a pointer on the screen to
allow selection.
Advantages:
Advantages:
Disadvantages: 4. Touchpad:
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Opening, closing and minimizing software Does not need the same fine control as a mouse.
Grouping, moving and deleting files. It is easier to use than a mouse if the operator has
Image editing, for example, controls the size and position problems with their wrist.
of a drawing pasted into a document. More accurately position the pointer on the screen.
Controlling the position of a pointer on the screen to They are more robust than a mouse.
allow selection. Needs less desk space than a mouse or keyboard.
Advantages: Disadvantages:
Faster than a keyboard for choosing options. It is not supplied with the computer as a standard;
Used to navigate applications and the internet. therefore, it is more costly.
Because the touchpad is integrated into the laptop Users may need training because it is not standard
computer, there is no need for a separate mouse; this equipment.
aids the portability and is a big advantage if no flat
surfaces are available.
Disadvantages:
6. Remote Control:
Uses:
Advantages:
Uses:
It can be operated from any reasonable distance.
A good alternative to a mouse for people with conditions In some conditions, e.g., in chemically hazardous
such as RSI. environments, we can control and measure from safe
Used in an industrial control room environment. distances.
Used in some luxury cars to select functions such as
radio. Disadvantages:
Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Advantages:
Difficult to use for people with limited hand/wrist
movements. It's a more realistic experience than both mouse and
Physical obstacles can easily block the signal. joystick.
Easier than a keyboard or joystick to control steering
movements.
Disadvantages:
It is a rather expensive input device as compared to a
mouse or joystick.
Steering movements tend to be over-sensitive, which
gives an unrealistic feel.
Unless it is an expensive simulator, feedback to the
steering wheel is non-existent.
7. Joysticks:
Uses:
Advantages:
9. Touch screen (as an input device):
It is easier than keyboards for screen navigation.
In some applications, the control is more realistic than Uses:
using a mouse.
Automatic teller machines (ATMs) to choose from on-
Disadvantages: screen options.
Point of sale terminals such as in restaurants.
The on-screen pointer is more difficult to use. Interactive whiteboards in education.
Computer-based training (CBT) where answers are
selected during on-screen testing.
Advantages:
Faster entry of options than using a keyboard or mouse.
Very easy method for choosing options.
User-friendly method – no training necessary in its use.
Option to expand the size of the display if necessary.
Disadvantages:
8. Driving wheel:
Uses:
Used in video games, especially car racing games.
Used in simulators to mimic actual vehicle controls.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
A limited number of input options are available. Limited quality, depending on how good the scanner’s
This can lead to problems if an operator uses the system resolution is.
frequently (straining of arm muscles, RSI, etc., are all Fairly slow input method, especially if color mode is
possible). selected.
The screen can get very dirty with constant touching.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Need to be computer literate to know proper use. Temperature sensors are used in automatic washing
Loss of artistry due to clever software doing all the work. machines, central heating systems, ovens, and
Images need to be compressed to reduce the amount of glasshouses.
memory used. Pressure sensors are used in intruder alarm systems and
washing machines.
Light sensors are used in automatic glasshouses, doors,
and street lighting control.
Sound/acoustic sensors are used in intruder alarm
systems, monitoring liquid and powder flow in pipes.
Humidity/moisture sensors are used in automatic
glasshouses, environmental monitoring, and in factories
where moisture levels are crucial.
pH sensors are used in automatic glasshouses, chemical
processes and environmental monitoring.
Advantages: Disadvantages:
It is faster to read text than it is to type it in. Faulty sensors can give spurious results.
It is possible to manipulate sound in real time rather Most sensors are analogue; therefore, they require
than working on a completed recording. conversion using Analogue to Digital Convertors.
It improves security if used as an authentication system.
14. Light pens:
Disadvantages:
Uses:
Sound files use up a lot of computer memory.
Reading data is more error-prone than typing in. Selecting objects on CRT screens
Drawing on screens
Advantages:
13. Sensors:
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Lagging problems while drawing on the screen. It is more secure than contactless cards as the PIN acts
It only works with CRT monitors. as a second security layer.
Rather outdated technology. More robust system than Magnetic Stripe Cards
Disadvantages:
On credit/debit card for use at ATMs 3. Radio Frequency Identification (RFID) reader:
Security device to allow entry to buildings, hotels, etc.
Uses:
Advantages:
Livestock tracking
Faster than keying in data manually. Retail, instead of barcodes, as they don’t need to be
Error-free, no human intervention needed. scanned in.
Secure information isn’t in human-readable form. Admission passes.
Robust, there are no moving parts. Library books, to acknowledge the books which have
been borrowed.
Disadvantages:
Advantages:
If the card is damaged, the data is lost.
Doesn’t work at a distance. No line-of-sight contact is needed.
As the information isn’t human-readable, this can be a Very robust and reliable technology.
disadvantage in some cases. Very fast read rate.
Bidirectional data transfer.
Bulk detection is possible.
Disadvantages:
Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal.
RFID is more expensive than a comparable barcode
system.
2. Chip and PIN reader:
4. Optical Mark Reader/Recognition (OMR):
Uses:
Uses:
Where payments are made using cards
Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Advantages:
Disadvantages:
Advantages:
Advantages:
It is a much faster data entry system than manual typing.
No human intervention, its error free.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
used in advertising to contain information about the They are very heavy and bulky.
advertising company. They run very hot and can cause fires if left unattended.
Wi-Fi authentication They use a lot more power than LCDs.
Used in restaurants, you can see the menu by scanning. Their flickering can lead to headaches.
Image burn-in is a common issue.
Advantages:
Disadvantages:
More than one QR format is available.
QR codes can be used to transmit malicious data.
Advantages:
Very efficient, low power consumption.
Lightweight devices.
Screens can be made in various sizes.
No flickering images.
Very sharp image resolution.
2.3. Output Devices and Their Uses
Disadvantages:
1. Cathode ray tube (CRT) monitors:
Uses:
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Colour and contrast from different angles are They tend to get dirty with frequent use.
inconsistent. Frequent use results in straining of arm muscles, RSI, etc.
Motion blur is a common issue. If large amounts of data are input/output, they aren’t
Lower contrast than CRT monitors. very accurate, and the interface isn’t very fast.
Disadvantages: Disadvantages:
Images can be fuzzy.
Expensive to buy.
Set-up can be complicated.
5. Laser printers:
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
In uses where low noise is required. Slow output if many copies are needed.
If fast, high quality, high-volume printing is required. Can’t do large print jobs.
Printing can smudge if user isn’t careful.
Advantages: Can be expensive if used a lot.
Printing is fast.
They can handle very large print jobs.
Quality is consistently high.
Toner cartridges last for a long time.
Disadvantages:
Advantages:
Can be used in varying environments unlike laser/inkjet
printers.
Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
6. Inkjet printers: Good for continuous printing.
Uses: Disadvantages:
Advantages:
High-quality output
Cheaper than laser printers.
Very lightweight
Don’t produce ozone and volatile organic compounds.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Uses:
Very noisy
Initial cost is more than an inkjet printer. Custom-made prosthetic limbs.
Very slow, poor-quality printing. In aerospace, if parts of the aircraft are made using 3d
printers they can be very lightweight.
Making spare parts for items that aren’t now
manufactured, e.g., parts of a vintage car.
Advantages:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Speaker output can disturb irrelevant people in the same Holds data magnetically.
area, e.g., an office. The surface area of the media is magnetised so that it
Sound quality is high only expensive speakers. can hold bits of data.
They take up a lot of desk space. The device that reads media can also read the bits held
on the surface area
Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Can be used as a backup system to prevent data loss. It can be written over many times.
It can be used to transfer data/files/software between You can use different file formats each time it is used.
computers. It is not as wasteful as the R format because the
files/data can be added later.
Advantages:
Disadvantages:
Data access time and data transfer rate are very fast.
It has a very large memory capacity. It can be relatively expensive media.
It can be used as a method of transferring information Possible to accidentally overwrite data.
between computers.
CD-ROM/DVD-ROM ~ Read Only Memory
Disadvantages:
Uses:
They can be easily damaged if user accidentally drops it
or doesn’t correctly shut down the drive after use. These are read-only memory (ROM), which means they
The data transfer rate is not as fast as for fixed hard disk can’t be written over and can only be read. Permanent
drives. storage method.
CD-ROM is used to store music files and to store
3.3. Optical Media and Optical Storage software, computer games and reference software.
DVD-ROM has much larger storage and is used to store
Devices films.
Used in applications where there is a real need to
Holds data by burning ‘dots’ onto the surface with a high- prevent deletion or overwriting of important data.
powered laser.
The data that reads the media can read the data by Advantages:
shining a lower-powered laser over the dots.
They are less expensive than hard disk drive systems.
CD-R/DVD-R ~ Write Once Only They are very portable as they are small and light.
Data stored on them is read-only, so it cannot be
Uses: accidentally overwritten.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Uses: Uses:
Home video consoles. Transporting files between computers or using them as a
Storing and playing back movies. backing store.
Computers can use this technology for data storage or Used as a security device to prevent software piracy
backing hard drives. (known as a dongle).
Camcorders can use this media to store movies.
Advantages:
Advantages:
Very compact and portable media.
Very large storage capacity. Very robust.
Very fast data transfer rate. Does not need additional software to work on most
The data access speed is also greater than with other computers.
optical media. They are not affected by magnetic fields.
Blu-ray discs automatically come with a secure
encryption system. Disadvantages:
Holds data on devices that don’t have any moving parts. Different types of memory cards:
» SD cards (secure digital card)
Solid-state drives (SSD) » XD cards (extreme digital card)
» CFast card (compact, fast card).
Uses: Uses:
Storage device to store files, applications, OSs, and so on. Storing photos on digital cameras.
Used as mobile phone memory cards.
Advantages: Used in MP3 players to store music files.
Used as a backing store in hand-held computer devices.
They are more reliable as they have no moving parts.
They are considerably lighter and suitable for laptops. Advantages:
They do not have to ‘get up to speed’ before they work
correctly. Very compact.
They have lower power consumption. Because they have no moving parts, they are very
They run much cooler than HDDs. durable.
Because they have no moving parts, they are very thin. They can hold large amounts of data.
SSD data access time is only 0.1 milliseconds compared Compact cameras and smartphones can read and write
to 10 milliseconds for HDD. memory cards, allowing users to transport extensive
Data transfer speed for SSDs is also much faster than for collections of photographs, songs, etc.
HDDs. Disadvantages:
Disadvantages:
SSD endurance - SSDs are conservatively rated at only
20GB write operations per day over three years.
More expensive than magnetic hard disks.
Smaller storage capacity than magnetic hard disks.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Expensive per gigabyte of memory when compared to Each NIC is given a unique hardwired media access
HDDs. control (MAC) address.
Have a lower storage capacity than hard disks. Media access control (MAC) address: a number that
Have a finite life regarding the number of times they can uniquely identifies a device when connected to a
be read from or written to. network.
Memory cards, specifically the micro SD card, are the The first six hex digits identify the manufacturer’s code,
smallest sized devices available, making them more likely and the next 6 identify the device’s serial number.
to be lost, stolen or damaged. The storage should be
sized cause the amount of storage does not prevent the 2. Hubs: they are hardware devices that can have
drive from being stolen several other devices connected to them. They are
Users must often purchase a card reader or USB used to connect devices together to form a local area
converter to view the data. network (LAN). It takes a data packet received by one
of its ports and sends it to all relevant or irrelevant
devices that are connected to it.
4. Networks & the Effects of It is not very secure to broadcast data to all devices.
Using Them Unnecessary network traffic.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Bridges connect LANs together; routers connect various 1. Public Cloud - The customer and the cloud storage
types of networks together. provider are different companies.
Bridges scan MAC addresses while routers scan the IP 2. Private Cloud - The customer and the cloud storage
addresses. provider are a single organization.
Both send out data in the form of data packets. 3. Hybrid Cloud - Combines public and private cloud
Bridges connect networks with the same protocol; options and allows sensitive data to remain private
routers can connect networks with different protocols. while providing public cloud services for less sensitive
The router uses routing tables to direct data packets, but information.
bridges don’t.
Bridges have only two ports; routers have multiple ports. Cloud data is duplicated and stored on other servers to
ensure availability during system failures, upgrades, and
Wi-Fi & Bluetooth maintenance.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Characteristics:
Private Intranet that also allows access by selected
It is an open network, meaning everyone can access the parties that reside outside of the organization. These
same resources and information as everybody else. parties, for example, maybe customers, key stakeholders
People from all over the world can communicate with or clients.
each other in real-time. Users will have an authorization level once they have
Available to anyone who has a suitable device and access successfully logged in, which will determine which
to any one of the interconnected networks. resources they may access.
Similarities between the Internet, Intranet and extranet
Uses: are as follows:
Education and training They are all web-based technologies
Social Networking They allow users to access information remotely
They all use client-server architecture
Online shopping
Entertainment They all use security measures such as
authentication and encryption
2. Intranet: They all promote and facilitate information and
resource sharing
Usually private and are used to send information Differences between the internet, intranet and extranet
securely and safely. are as follows:
Access to an organization’s Intranet is restricted and only The internet is a global network, whereas an
accessible to authorized users such as employees. intranet/extranet is a private network contained
Intranets have many advantages over the internet, such within an organization
as: The use of the internet covers a wide range of
better bandwidth than the internet, purposes, whereas an intranet/extranet is designed
data is kept within the organization, for specific users and purposes.
less chance of hacking and attacks, Much information is publicly available, whereas an
administrators can manage access to external sites intranet/extranet is not.
and links. The Internet is not owned solely by one person or
organization, whereas the organization usually owns
Characteristics: intranets/extranets.
A private network that is accessible to employees within Network Types
a company or organization.
Usually behind a firewall to ensure security. 1. Local Area Network (LAN): networks usually
Allows for document sharing and the use of contained within a single building or small
collaboration tools between users. geographical location. It is made up of hubs and/or
It can be customized to meet the specific requirements switches, which will connect several devices together.
of the business. One hub or switch commonly connects to a router,
Users will require a username and password to access allowing LAN connectivity to other outside networks
the Intranet. such as the Internet.
3. Extranet: Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Allows centralized management of updates, backups and 3. Wide Area Networks (WAN): is formed by several
software installations. LANs connected through a router. It is expensive.
Can secure its devices with the use of firewalls, antivirus However, it comes with a more enhanced security.
software and other security features to prevent Additional hardware is needed for a WAN: Routers,
unauthorized access. modems, and proxy servers.
A LAN allows users on the network to share resources
such as printers and other peripherals. Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
There are many ways to enhance the security of your 1. Zero login: A security concept that eliminates
password, such as the following: traditional login methods, such as usernames and
Ensure that the password is changed regularly in case passwords, using biometrics or other authentication
it has been obtained illegally or accidentally factors for seamless and password-less access.
Ensure that the password uses a combination of 2. Biometric Recognition: These authentication
uppercase, lowercase, numbers and special methods use unique physical or behavioural
characters to make the password more difficult to characteristics, such as fingerprints, iris scans, or
guess. voice recognition, to verify a person's identity.
iloveict is a weak password 3. Magnetic Stripes: These are authentication features
1lov3ICT# is a strong password on cards storing data magnetically. They enable
Anti-spyware software can be run regularly to ensure secure identification and authorization by containing
that your information, including your password, is not encoded information that magnetic stripe readers
passed to an unauthorized third-party user. can read.
4. Smart Cards: Smart cards are portable devices with
Other Authentication Methods integrated circuits to store and process data. They
are used for authentication, identification, and secure
transactions in various applications such as banking,
telecommunications, and access control.
5. Physical Tokens: It is a type of authentication that
takes the shape of a solid object. The user
demonstrates ownership of the token through
interaction with a login system. Physical tokens have
embedded clocks that create one-time passwords
(OTPs) when a PIN and other authentication
information are entered.
6. Electronic Tokens are applications that users install
on their hardware, such as smartphones. Say a
person wants to access a website on a tablet
computer. To access this website, users must first
authenticate themselves using electronic tokens. The
user has already set up the electronic token app with
their smartphone. The user launches the app on their
smartphone when the website asks them to verify
their identity. The program creates an OTP that is
only good for a short period of time.
Anti-malware Software
Anti-malware software is designed to protect devices
against viruses and malicious software. It has 3 primary
purposes: detect, prevent and remove malicious
software. It is installed onto a computer system and will
operate in the background.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Standard features of Anti-Malware software include the Disadvantages:
following:
Potential time lag in responses/delays when talking.
Comparing the scanned files against an extensive Images can jerk.
database of known threats It is very expensive to set up in the first place.
Real-time scanning Problems if the delegates live in different countries with
Regular updates to gather an up-to-date list of known large time zone differences.
threats Requires IT knowledge to some extent.
Quarantine of infected files It's not the best for people who consider travelling a job
Quarantining files allows threats to be automatically perk.
deleted. Completely reliant on stable internet connections.
Allows the user to determine if the file is a legitimate
threat and not a false positive. 2. Audio Conferencing: Meetings held using audio
(sound) technology are called audio conferencing.
Heuristic Checking: Instead of relying solely on a database The normal telephone network can be used for audio
of known viruses, this method looks for behavioural patterns conferencing, frequently called a phone conference.
and other features in a file to identify possible risks.
The hardware required is:
Electronic Conferencing a computer (with built-in microphones and speakers)
1. Video Conferencing: It is a form of audio and video external microphone and/or speakers
communication. It serves as a stand-in for face-to- an internet phone
face meetings between several persons who may a standard phone.
reside abroad or in another region of the country. It Advantages:
utilizes a network in some way and is done in real-
time. Allows participants to join meetings from any location.
Eliminates the need for travel expenses, such as
The basic hardware includes: transportation, accommodation, and meals.
webcams, Saves time by eliminating travel time and allowing
large monitors/television screens, meetings to be scheduled and conducted quickly.
microphones, Disadvantages:
speakers.
Lacks the visual aspect of face-to-face meetings, which
The software used are: can hinder communication.
Webcam and microphone software drivers It can limit interaction and engagement compared to in-
CODEC (coder and de-coder) person or video conferencing.
Echo cancellation software Heavily relies on technology, and technical issues such as
poor audio quality, background noise, or connectivity
Advantages: problems are common.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Social Interactions
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
The positive aspects include: Consider an autonomous vehicle approaching a set of
red-lighting traffic signals.
easier to make new friends using chat rooms
easier to find people who share similar interests/hobbies The vehicle's control system must first recognize the
less expensive to keep in touch using VoIP technology. road sign before consulting the database to determine
the appropriate action.
The negative aspects include: The CPU must instruct the actuators to apply the brakes
and put the gear in "park" since the traffic light is red.
people do not meet face-to-face as much (social
isolation) The light must be continuously watched until it turns
a lack of social interaction may make people more green.
anxious about meeting people in real life After that, the CPU will again tell the actuators to engage
When communicating online, people can act less politely first gear, let go of the brakes, and open the throttle
(accelerator).
or more harshly, and cybercrime is a serious issue,
especially for teenagers. Advantages of an autonomous car, bus, or van:
Monitoring and Controlling Transport safer due to the removal of human error
due to the more efficient operation of vehicles, it is
Uses: better for the environment
reduced traffic congestion
monitoring traffic on motorways increased lane capacity
congestion zone monitoring
reduced travel times
automatic number plate recognition (ANPR)
stress-free parking for motorists
automatic traffic light control
air traffic control systems Disadvantages:
railway signalling systems
very high installation prices
Advantages of transport monitoring and control driver and passenger reluctance of the new technology
systems: reduction in taxi requirements could lead to
unemployment
smart motorways keep updating according to changing
maintenance of the sensors and cameras is crucial
traffic conditions the ever-present fear of hacking into the vehicle’s control
more efficient system
traffic offences can be remotely penalized using ANPR
car thefts can be spotted using ANPR Advantages of an autonomous train:
minimizes human errors, reducing the rate of accidents
improved punctuality
Disadvantages: reduced running costs due to fewer staff
no human error
If a hacker breaches security, the vehicle could be minimized energy consumption
controlled by them.
possible to increase the frequency of trains as the
The system might come to a halt if it malfunctions.
possibility of delays is removed
Systems with a poor design could compromise safety. more straightforward to update changes in train
The easy tracking of harmless people's movements is schedules
made possible by ANPR equipment. Who can access such
data? Disadvantages:
Autonomous vehicles in transport
To properly execute their activities, autonomous cars
require sensors, cameras, actuators, microprocessors (along
with very complex algorithms). Automobile control systems
can accomplish essential tasks by sensing information from
cameras and ultrasonics.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Minimizing health risks: use LCDs instead of CRTs, take
fear of the system being hacked into regular breaks, use anti-glare screens, and do regular eye
initial instalment costs are very high testing.
ensuring passenger behaviour is vital, especially during 4. Headaches: pain or discomfort in the head or face area.
rush hours. Cause: incorrect lighting, screen reflections, flickering
human reluctance to new technology screens, etc.
without drivers, CCTV monitoring will be continuously Minimizing health risks: use anti-glare screens, take regular
required breaks, regular eye-testing.
Advantages of autonomous aeroplanes: 5. Ozone irritation: inflammation and irritation of the
tissues lining human airways
improvement in passenger comfort Cause: inhalation of ozone released by laser printers in an
reduced running costs, fewer staff office.
as most accidents are due to pilot-induced errors, safety Minimizing health risks: proper ventilation, laser printers
is improved should be housed in a separate room, replace laser printers
improved aerodynamics as an outcome of the removal of with inkjet printers, if possible.
the cockpit
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Collection of webpages, text, graphics, video, and sound Real-time transition of audio and video files over the
Hosted on a web server on the internet internet
Need to write code or use a web authoring application allows users to access content without downloading it to
Hyperlinks to other pages can be added their devices
Interactive websites require programming knowledge popular services include Spotify, YouTube, and social
Can use a camera, scanner, and microphone to input media websites
data uses buffering, which makes sure the video plays back
Usually, hire space from the web hosting company smoothly without freezing. While the buffer receives data
Advantages packets, it sends previously received ones to the
Ability to add sound/video/animation playback device so that there are no gaps in the played
Links to other websites/hyperlinks data
The use of hot spots Advantages
Buttons to navigate/move around the website Users can access any information at any time and
Hit counters to see who has visited the websites from any location
worldwide advertising capability Offers an extensive library of content
Disadvantages Compared to traditional cable or satellite TV
Can be hacked and modified, or viruses introduced subscriptions, media streaming can be more cost-
Need for a computer and internet connection effective
Lack of portability compared with the paper-based Disadvantages
system Heavily relies on a stable and high-speed internet
Need to maintain the website once it is set up connection.
Not all content is available on every streaming
Multimedia Presentations platform due to licensing agreements and exclusivity
deals.
Uses a mixture of media to present information: You don’t own the media when streaming media, so if
animations, video, sound, transitions, hyperlinks the streaming service removes a movie or a TV show
Produced using software packages from its library, it may no longer be accessible to you.
Used with a projector so a large audience can view
Advantages ePublications
Use of sound and animation/video effects
Interactive/hyperlinks built into presentations
More likely to hold the audience’s attention
Disadvantages
Need for special equipment – expensive
It may require internet access
Distracts the audience from the sole content of the
presentation
It is very easy to make a presentation with too many
features
Media streaming
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
5. Accessing the Internet: Another helpful feature is
digital versions of printed materials, such as eBooks, accessing the net from a mobile device. Any mobile device
eMagazines, and eNewspapers. with a wireless broadband connection or a mobile phone
It can be read on electronic devices. network can link to the internet.
Advantages
aid portability
they are often more affordable than paperback 6.2. Modelling Applications
books.
Offer interactive elements that enhance the reading Advantages of using models:
experience. using models is less expensive than having to build the
Disadvantages real thing
reading from an electronic device for a prolonged safer to use a computer model
time can cause eyestrain allows you to try out various different scenarios in
ePublications lack the tactile experience and physical advance
presence that some readers enjoy nearly impossible to try out some tasks in advance in real
compatibility issues can arise if the ePublications is in life due to high risk
a format that is not supported by the reader's device faster to use a computer model than to do the real thing
or software
Disadvantages of using models:
Mobile Communication
a model can’t be completely reliant as the output is
Mobile devices support many forms of communication, such entirely based on the input
as: frequently, computer modelling can be a very costly
1. Short message service (SMS) messaging: permits option
extremely quick communication with another person via human reluctance is a common problem in this
typing on a keyboard (a mobile phone or tablet's keyboard is technology
frequently virtual). Its benefit is that the recipient can get the
text whenever they choose without being available. Some of the applications of computer modelling include:
2. Phone calls: Making calls while on the go is among the 1. Personal finance: Computer modelling involves using
most fundamental applications of a mobile phone. Mobile mathematical algorithms and data analysis to simulate
phones are the perfect method to stay in correspondence various financial scenarios, such as investment strategies,
anywhere there is a network signal because they are retirement planning, and risk assessment, aiding individuals
compact and have an independent battery. in making informed decisions and optimizing their financial
3. Voice over Internet Protocol (VoIP): a communication goals.
technique for Internet users. VoIP transforms sound 2. Bridge and building design: Computer modelling is
captured by the built-in mic of the cell phone into individual crucial in bridge and building design. It allows engineers to
data packets that may be transmitted via the internet to simulate and analyze structural behaviour, assess load
their intended recipient. capacities, and predict the response to external forces. It
4. Video calls: enables real-time video conversing between aids in optimizing designs, ensuring structural integrity, and
multiple participants with a camera-enabled device. Uses an minimizing potential risks before construction begins.
internet connection or cellular data. Software that may be 3. Flood water management: Computer modelling plays a
used for video calling includes FaceTime, Skype, and Zoom. vital role in flood water management by simulating water
flow behaviour, predicting flood extents, and assessing
potential flood risks. It helps design and optimise flood
mitigation measures, such as levees and floodplain zoning,
allowing authorities to make informed decisions, develop
effective emergency response plans, and minimize the
impact of flooding on communities.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
4. Traffic management: Computer modelling simulates and
analyses traffic flow, predicts congestion patterns, and 6.4. School Management Systems
optimises traffic control strategies. It aids in designing
efficient road networks, optimizing signal timings, and Computer-controlled School Management Systems:
evaluating the impact of transportation infrastructure Comprehensive software applications that automate
projects. This enables authorities to make informed administrative tasks, such as attendance tracking, grading,
decisions, alleviate congestion, and improve overall traffic scheduling, and student information management,
efficiency for better urban mobility. improving educational institutions' efficiency, accuracy, and
5. Weather forecasting: Computer modelling plays a pivotal organization.
role in weather forecasting by simulating the Earth's
atmosphere, oceanic conditions, and other environmental
factors. These models use complex algorithms to predict
weather patterns, including temperature, precipitation, wind
speed, and storm systems. By assimilating real-time data,
computer models provide forecasts that aid meteorologists
in predicting weather conditions, issuing warnings, and
helping society prepare for potential hazards.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Enable online access to banking services via a secure
website or app, allowing for transfers, bill payments, account Using 3D printers in medicine:
management, and more. Prosthetics: 3D printers print out artificial body parts
such as false teeth, artificial limbs, hearing aids, etc.
Advantages: This is a less expensive method of replacing body
convenience and availability parts.
easy account management Tissue engineering: it is the field of combining cells,
branch visiting won’t be a requirement biomaterials, and engineering principles to create
interest rates may be better functional tissues or organs, aiming to repair or
more accessible to shop around for the best account replace damaged or diseased tissue in the human
Disadvantages: body.
security of transactions Artificial blood vessels are synthetic structures
requires a reliable internet connection designed to mimic the function of natural blood
More risk of fraud vessels, facilitating the flow of blood and nutrients
Easier to make errors throughout the body to support tissue repair and
Physical cash can't be deposited/withdrawn regeneration.
Customized medicines are personalized drug
6.7. Computers in Medicine formulations tailored to individual patients' specific
needs. They utilize advanced technology and precise
Information Systems in Medicine measurements to create medications with accurate
dosages and unique compositions, optimizing
Patient records: Healthcare professionals maintain treatment outcomes.
databases to communicate information between them
and pharmacists (for instance, to guarantee no 6.8. Expert Systems
medications are administered that interact dangerously
with one another). It is an AI-based computer program that emulates the
Pharmacy records: Pharmacy records maintain a decision-making capabilities of human experts. It uses
comprehensive record of patient prescriptions. This knowledge and rules to provide accurate advice or solutions
includes details like the prescribed medication, dosage, in a specific domain.
quantity dispensed, prescribing physician's information, Examples include:
and the date of dispensing. These records help track
medication usage and can be used to verify prescription Diagnostics
accuracy and detect potential drug interactions or Mineral prospecting
allergies. Tax and financial calculations
Strategy games
3D Printers Identification of plants, animals and chemical
compounds
Route scheduling for delivery vehicles
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Below is an example of how an expert system works to
diagnose a medical issue:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
security concerns
can’t correctly examine products before purchase
occasionally, products may take weeks before being
delivered
additional shipping and handling costs
lack of face-to-face interaction with staff
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
3. RFID in tracking stock: 4. Near Field Communication (NFC):
Enables short-range wireless communication between
devices.
Allows payment using a smartphone.
Advantages:
Convenient and secure method of payment
allows for contactless transactions
Disadvantages:
Limited range
compatibility issues with some devices
5. Biometric recognition:
Usually refers to automated technologies for
authenticating and verifying human body characteristics
such as face, iris, retina, finger, thumb, hand and voice.
Advantages:
very high accuracy
very easy to use
very fast verification time
non-intrusive method
relatively inexpensive technology
Disadvantages:
it can make mistakes if the skin is dirty or damaged
very expensive to install and set up
uses a lot of memory for the data to be stored
a person’s voice can be quickly recorded and used for
unauthorized access
an illness, such as a cold, can change a person’s
voice, making absolute identification difficult or
impossible
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Used to determine the exact location of several modes of Used to capture, manage, analyze, and display
transport geographically referenced information.
Cars usually refer to GPS as satellite navigation systems Use to determine the distance between two places.
Satellites surrounding the Earth transmit signals to the Used to find the nearest petrol station or restaurant, etc.
surface To protect animal and plant life in certain vulnerable
Computers installed in the mode of transport receive places.
and interpret these signals It can be used in geography, science, or engineering
Knowing their position on the Earth depends on very lessons.
accurate timing – atomic clocks are used in the satellites,
which are accurate to within a fraction of a second per Advantages:
day Allows geographical and thematic data of any kind to be
Each satellite transmits data indicating its position & time
combined to show how they are connected to each
The computer on board the mode of transport calculates other.
its exact position based on the information from at least It allows the handling and exploration of vast amounts of
three satellites data.
Satellite Navigation (satnav): It allows data to be integrated from a wide range of very
different sources.
Used to determine the exact location of a car.
The computers onboard can be used to show directions Disadvantages:
to a destination. The learning curve on GIS software can be very long.
Advantages: GIS software is very expensive.
GIS requires enormous amounts of data to be input.
Better focus as there isn’t a need to constantly check It isn't easy to make GIS programs that are both fast and
paper maps. user-friendly.
Reduces fines by warning drivers about upcoming speed
changes. Media Communication Systems
The system shows an Estimated Time of Arrival (ETA).
It is possible to program in the fastest route to avoid Using satellite signals for communication.
towns. Used by media companies when sending
The system can also give helpful information such as the stories/videos/pictures from remote locations.
location of petrol stations.
Advantages:
Disadvantages:
They have good global coverage.
If the maps are not updated, they can give incorrect They are cheaper, faster, and safer than laying cables in
instructions. difficult or treacherous terrain.
Road closures due to accidents or roadworks can cause They have very high bandwidth.
problems. It is relatively easy to expand the network.
The loss of satellite signals can cause problems. Security in satellite transmission is very good because
The system will give incorrect information if an incorrect data is coded, and the receiver requires decoding
start-point or end-point is keyed in. equipment.
During emergency situations, it is relatively easy to move
Geographic Information Systems (GIS) stations on the ground from one place to another.
They are well-suited for broadcasting.
Enable mobile communication in very remote locations.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Data inputted, processed, and outputted into the system It is vital to identify the suitable hardware needed for the
are identified. new system
Problems with the current system are identified. What contemplating system requirements, compatibility,
could be improved? costs
The requirements of the user and the potential new justifying choices based on user needs and system
system are identified. What is the new system meant to performance
do? Hardware that needs to be considered:
Problems: issues that users face with the current system barcode readers,
User requirements: what needs to be added to the new scanners,
system touch screens,
Information requirements: data or information the new 3D printers,
system must process monitors,
speakers.
New System Requirements Specification: Identifying suitable software needed for the new system
• Once the systems analysts have completed the systems life considering functionality, compatibility, and ease of
cycle analysis stage, they should be fully aware of the use
current system's limitations. justifying choices based on user requirements and
• The next step will be to design a new system (normally system efficiency
computer-based) to resolve the problems identified by the Software that needs to be considered:
users and the systems analyst. operating system,
• The Requirements Specification will be created, outlining applications software,
the required improvements and expectations for the new size of storage,
system. type of storage.
System Specification
7.2. Design
Hardware and Software Selection
Once the analysis has taken place and the systems analyst
has some idea of the scale of the problem and what needs
to be done, the next stage is to design the critical parts of
the recommended system.
File/Data Structures
Field length: number of characters allowed in a field
Field name: an identifier for the field in the data
structure
Data type: specifies the kind of data that can be stored in
a field, e.g., text, numbers, dates
Coding of data: using codes to represent data, e.g. M for
male, F for female
Input Formats
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Data capture forms: These are designed to collect data Test data structures, file structures, input formats,
from users in a structured format. They come in two output formats, and validation routines
types: paper-based and electronic-based. Paper-based Ensure all components function correctly and interact
data-capturing forms must be carefully designed with seamlessly
headings, concise instructions, character and
information fields, checkboxes, and enough writing Test Strategies
space. Text boxes, on-screen help, drop-down menus,
radio buttons, automatic validation, and control buttons Test each module: verify individual components function
for data entry are all features of computer-based forms. as intended
Consider a user-friendly layout, clear instructions, and Test each function: ensure all features work correctly
appropriate data fields. Test the whole system: confirm overall system
performance and integration
Output Formats
Test Plan
Screen layouts: how information is presented to users
on a screen Test data: specific data used for testing purposes
Report layouts: how information is organized in a Expected outcomes: predicted results based on test data
printed or digital report Actual outcomes: results obtained from testing
Consider readability, visual appeal, and efficient use of Remedial action: steps taken to fix identified issues
space
Test Data Types
Validation Routines
The following data types will be explained using the example
It is a method of examining data submitted to a computer to of months in a year.
determine if it meets specific requirements. It is a routine
check that the computer does as part of its programming. Normal data: valid and expected data values within the
1. Range check: ensures data is within a specified range of range of acceptability have an expected outcome. E.g.,
any whole number between 1 and 12.
values
Abnormal data: invalid or unexpected data values. This
2. Character check: ensures data contains only allowed
characters can either be:
3. Length check: ensures data is of a specified length Data outside the range of acceptability or
Data that is the wrong data type
4. Type check: ensures data is of the correct data type
In this case, examples could be…
5. Format check: ensures data conforms to a specific
any value less than 1 (i.e. 0, -6, etc.)
format
6. Presence check: ensures data is present and not left any value greater than 12 (i.e. 13, 15, etc.)
blank letters or nun-numeric data (i.e. July, etc.)
non-integral values (i.e. 3.5, 4.2, etc.)
7. Check digit: a digit added to a number to verify its
Extreme data: values at the limits of acceptability (E.g. 1
accuracy
or 12)
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Before selecting the approach best suited for a given 4. Phased Implementation
application, the pros and cons of each must be carefully
considered. The new system is implemented in stages, with each
stage replacing a part of the old system
4 Methods of Implementation Used when a gradual transition is preferred to minimize
disruption
1. Direct changeover: Advantages
reduced risk
The old system is replaced by the new system easier to manage
immediately Disadvantages
Used when quick implementation is necessary Takes longer
Advantages potential compatibility issues
fast implementation
cost-effective as only one system is in operation
Disadvantages
7.5. Documentation
High risk of failure In the life cycle of a system, documentation enables the
no fallback correct recording of design, implementation, testing, and
users can’t be trained on the new system maintenance data, facilitating effective communication,
2. Parallel Running troubleshooting, and potential future improvements.
Technical documentation: detailed information on the
Both current and new systems run simultaneously for a system's inner workings and programming for
period before the old system is phased out developers and IT staff
Used when a smooth transition with minimal risk is
required Used to maintain, repair, and update the system with
Advantages improvements
Lower risk
easy system comparison
Disadvantages
Time-consuming
resource-intensive
3. Pilot Running
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Purpose of the system/program: Explanation of the Purpose of the system: Explanation of the system's
system's intended function and goals intended function and goals
Limitations: Known constraints or issues with the Limitations: Known constraints or issues with the
system system
Program listing: The code or scripts used in the system Hardware & software requirements: Necessary
Program language: The programming language used to equipment and software to run the system
develop the system Loading/running/installing software: Instructions for
Program flowcharts/algorithms: Visual setting up the system on user devices
representations or descriptions of the system's logic and Saving files: Procedures for storing data within the
processes system
System flowcharts: Visual representations of the Printing data: Steps to produce hard copies of system
interactions between system components data
Hardware & software requirements: Necessary Adding records: Instructions for creating new entries in
equipment and software to run the system the system
File structures: Organization and layout of the system's Deleting/editing records: Guidelines for modifying or
files and data removing existing entries in the system
List of variables: Collection of variables used within the Input format: Structure and format for entering data
system, including their names and purposes into the system
Input format: Structure and format for entering data Output format: Structure and format for presenting
into the system data generated by the system
Output format: Structure and format for presenting Sample runs: Examples of system operation, including
data generated by the system input and expected output
Sample runs/test runs: Examples of system operation, Error messages: Explanations of system warnings and
including input and expected output error notifications
Validation routines: Techniques used to check and Error handling: Steps to resolve issues and errors within
confirm the accuracy of data entered into the system the system
Troubleshooting guide/helpline: Assistance for
User Documentation diagnosing and addressing common problems
Frequently Asked Questions: Answers to common user
Instruction and guidance for end-users on how to operate inquiries
the system. Used to help users effectively use the system Glossary of Terms: Definitions of key terms and
and overcome problems concepts related to the system
7.6. Evaluation
It measures a system's productivity, efficiency, and
compliance with its goals to identify its strengths,
shortcomings, and potential development areas. This
assessment informs decision-making and improves overall
performance over the course of a system's life cycle.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Analyse the system's efficiency in time, money, and Collect and Examine User’s Feedback
resource use. Examine whether the system is performing
at its best or if its efficiency could be increased. Collect users' responses to the results of testing the
Provide examples of specific aspects that contribute system. Their feedback can provide insights into
to the system's efficiency potential issues and improvements and help determine
Identify areas that may be consuming excessive overall user satisfaction.
resources or time and suggest ways to optimize them Summarise the testing process, including test data
Questions to ask: expected and actual outcomes.
Does it operate quicker than the previous system? Discuss users' reactions to the system, addressing
Does it operate by reducing staff time in making any concerns or suggestions they may have
bookings?
Does it operate by reducing staff costs? Identify Limitations and Suggest Necessary
Improvements
Evaluate the Ease of Use
Based on the analysis of efficiency, ease of use,
Look at the solution's usability and accessibility for the appropriateness, and user feedback, identify any
target market. Check to see if the system is simple to limitations in the system and suggest necessary
understand and use and if users have no trouble improvements
completing their jobs. List the limitations and provide explanations for each
Describe the user interface and how it facilitates one
interaction with the system Recommend specific changes or enhancements for
Mention any feedback from users regarding their these issues
experience with the system and address any issues
they encountered
Questions to ask: 8. Safety & Security
Are all the users able to use the system and make
bookings easily?
Are all the users able to change and cancel bookings 8.1. Physical Safety
easily?
Can all staff understand how to use the system with 1. Electrocution: ICT devices require electrical power to
minimal training? charge or run; the electrical device can cause electrocution,
caused by the electric current moving through a body,
Determine the Suitability of the Solution causing fatal injuries and/or death.
There are multiple causes for electrocution, including:
Examine how well the implemented solution satisfies the
Contact between liquid substances and electronic
desired outcome by contrasting it with the original task
devices: Keep liquids away from electrical equipment.
criteria.
Open cables: Ensure that cables are entirely insulated
Outline the initial objectives of the system and
and packed, and use circuit breakers or fuses to prevent
discuss how the solution addresses each one electrical overload.
Highlight any requirements that may not have been
fully met and discuss possible reasons for this 2. Fire: ICT devices require electricity to charge or run; too
Questions to ask: many devices using a single socket can cause the plug socket
Is the system suitable for each of the departments? to overload, and heat is generated by too much electricity,
Does it meet the needs of the customers? causing the wiring to degrade and ignite a fire.
Does it meet the needs of the staff? The causes and reduction tactics for fire include:
Does the solution match the original requirements?
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Socket overload: Ensure enough plug sockets in the Principles of the Data Protection Act
room, don’t plug too many devices into the same
socket, and don’t leave devices plugged in and Data must be processed lawfully, fairly, and
unattended. transparently, with clear consent from the individual.
Overheated equipment: Ensure that equipment is Data should only be collected for specific, explicit, and
properly ventilated and not obstructed, keep flammable legitimate purposes.
materials away from heat sources, regularly check Organizations should only collect and retain the
equipment for signs of wear or damage, use fire minimum personal data necessary for their stated
extinguishers in case of emergencies, turn off or unplug purpose.
devices when away from the location, do not cover any Data should be accurate and up-to-date, and reasonable
air vents on devices. steps must be taken to rectify or erase inaccurate
information.
3. Trailing cables: Devices can be plugged in using cables. Personal data should not be kept longer than necessary
Cables that are protruding can cause an accident; you can and should be securely deleted when no longer needed.
trip over a cable left out in a location, and body damage can Organizations must protect personal data against
occur during a fall, for example, breaking bones, ligament unauthorized or unlawful processing, accidental loss,
damage, bruising, sprains, etc. depending on the area fell on destruction, or damage.
Trailing cables causes and prevention strategies:
Unorganized/insecure cables: use cable ties to secure Why is data protection legislation required?
cables, keep cables packed correctly in, let’s say, a table,
Protecting Individual Rights: Data protection legislation
therefore not coming in the way of walking paths, use
safeguards individuals' right to privacy and control over
wireless devices where possible, and regularly inspect
cables for signs of wear or damage. their personal information.
Preventing Misuse of Personal Data: It helps prevent
4. Heavy falling equipment: Devices have varying levels of unauthorized access, identity theft, fraud, and other
weight, and if a device falls on you, it could cause injury; any forms of data misuse.
device should be placed in a secure location, like a PC on a Promoting Trust: Data protection laws build trust
solid desk and not near the edge. between individuals and organizations by ensuring their
Causes and reduction tactics for falling equipment: personal information is handled responsibly.
Encouraging Responsible Data Handling: Legislation
Improperly secured equipment: Ensure that promotes responsible data collection, storage, and
equipment is properly secured and stable. Regularly processing practices among organizations.
check the stability of locations containing devices. Enabling Data Subject Rights: Legislation grants
Equipment on unstable surfaces: Keep equipment individuals rights such as access to their data, right to
away from edges and other potential hazards, and rectification, erasure, and objection to processing.
regularly inspect equipment and locations containing
devices for signs of wear or damage. Personal Data
8.2. eSafety
Data Protection
The Data Protection Act (DPA) controls personal data
collection, storage and processing.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Refers to information that can be used to identify an Awareness that personal information should not be
individual shared freely
Examples Awareness of how to act online and avoid falling victim
Personal Name creates a safe and respectful environment.
Address Identify and avoid online scams, phishing attempts, and
Date of birth fraudulent websites that may try to trick them into
A photograph in school uniform sharing personal or financial information.
Medical history Mindful of online behaviour and interactions, protecting
Threats that can be avoided by protecting personal your digital reputation, which can have long-term
data: consequences in your personal and professional life.
Identity theft Control privacy settings on social media platforms,
Privacy breaches limiting who can access/view personal information and
Misuse of the information posts.
Data be sold to third-party companies Avoid encountering explicit or harmful content online,
Individuals could be held to ransom over personal reducing the risk of exposure to inappropriate material
data gathered or online predators.
could be used to commit a physical crime Engage in online gaming responsibly, avoid sharing
How to avoid inappropriate data disclosure: personal details, and behave respectfully towards other
Personal data must be kept confidential and players.
protected through privacy settings on websites such Protecting devices from malware, viruses, and other
as social media or strong passwords on websites online threats, preventing data loss, privacy breaches, or
where personal data is held or used device damage.
Access to personal data should be limited to Develop responsible online behaviours, promoting
authorized individuals respectful conduct while interacting with others online.
Think before you post - consider what information Maintain a healthy balance between online and offline
could be gathered from your image or content lives, reducing the risk of addiction, mental health issues,
Check website details about the collection, storage, or negative impacts on relationships and self-esteem.
and use of personal data
Only access websites where personal data is used or Safety Suggestions
viewed when on a secure, encrypted connection
eSafety
E-safety is knowing about and using the internet safely
and responsibly.
It refers to when an individual is using the internet,
email, social media, or online gaming.
E-safety refers to the individual knowing how to protect
themselves from potential dangers and threats.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
A typical authentication technique uses a password plus Designing an ICT solution requires an understanding of
a secret code (user ID) to identify. To strengthen data the target audience. The study should consider elements
security, user IDs and passwords restrict access to only affecting the audience's capacity to use the solution, like
authorized users. Using secure passwords and changing age, technical proficiency, and expertise.
them frequently is critical to ensure security. When The solution creator should know the audience's
creating passwords, it is advised to utilize a mix of requirements for information. This could serve as a
uppercase, lowercase, digits, and special characters. design cue for the data processing elements and the
information architecture.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Software developers employ various copyright protection Email is a technique of sending and receiving messages
strategies, such as Digital Rights Management (DRM). and files via the Internet.
Due to DRM methods and systems, copyrighted works It is employed in personal communication, business
are subject to usage, modification, and distribution communications, and marketing.
restrictions. Acceptable language must be used based on the email's
Other techniques include software product activation, recipient, for example, professional when composing a
which needs a unique code to be fully functional. work-related email.
Given that pirated software frequently cannot receive Employers frequently establish requirements for
automatic upgrades, which renders it less effective and professional language, substance, and email frequency.
secure over time, automatic updates may also serve as a Email security is critical to preventing sensitive data from
kind of copyright protection. being accessed or manipulated.
Netiquette is the proper conduct and politeness when
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Carbon copies are used to send the email to multiple A vital communication tool that allows people to
recipients. communicate via emails, instant messaging, and other
Blind carbon copies are made to send the email to means.
multiple recipients without them acknowledging that it It acts as a massive database of information on almost
has been sent to other recipients. any subject
Forward enables users to send an already existing email The Internet has transformed business by offering a
to a new recipient. platform for online purchasing, electronic payments, and
To attach files to be sent with an email, we make use of digital transactions, allowing enterprises to reach global
Attachments. consumers.
It is defined as any unwanted email delivered via the users have access to an incredible amount of
Internet. These can range from annoying to genuinely information, empowering them to learn
harmful, as they may contain viruses. enables individuals and businesses to connect and
The main disadvantages are: communicate with people from different parts of the
world in real-time
the Internet has made many things easier to complete,
thus providing simplicity and effectiveness
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
The Functionality of the Internet Advantages of using the Internet to find information
information tends to be up to date because it is
Internet service providers (ISP): A company that quicker and easier to amend
provides internet access. Typically, a monthly fee is The Internet has vast amounts of information
charged for this service. Users' accounts are created searching for information using a search engine is
when registering with an ISP and acquiring login fast and easy
information such as user ID and password. people can look for information in the comfort of
Uniform Resource Locator (URL): The address of a web their own home
page on the WWW. It is a text-based address that information on the internet is essentially free of
uniquely identifies the location of any resource available charge
on the internet. The three main components are: webpages may have multimedia elements, making
Protocol: learning more interesting
It is the communication protocol used to transfer Disadvantages of using the Internet to find
data between the client and the server information
E.g. HTTP, HTTPS, FTP, and others it isn’t regulated; anything can be posted
Domain: always the risk of accessing inappropriate websites
it is the name of the server where the resource is too easy to be distracted by the many distractions
located available on the internet
it can be a name or an IP address Some research skills are lost when using the internet,
Webpage/file name: as search engines do all the work for you.
it is the location of the file or resource on the server
it can contain the name of the file or directory where Speed of Searching
the resource is located
A URL looks like this: Search engines may scan billions of online pages to
protocol://domain/path/filename locate matches to your search query in a fraction of a
E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is second.
a URL that consists of the HTTPS protocol, the Your internet connection and the effectiveness of the
domain name "www.hoddereducation.co.uk", the search engine's algorithms influence the speed.
path is “IGCSE” and the filename is “ICT”
A hyperlink is a word/phrase/image which references Amount of Information
data that the reader can follow by clicking or tapping,
usually taking you to another web page Because search engines can deliver a deluge of
A web browser is a software application used to locate, information, utilising particular and relevant search
retrieve, and display content on the WWW, including web phrases is critical.
Adding quotation marks for specific phrases, "+" signs for
pages, images, video, and other files
required terms, and "-" signs for omitting terms can help
Use of Search Engines narrow the search.
There are two fundamental methods for obtaining Finding Relevant and Reliable Information
information via the Internet. The first method is to enter the
The search engine algorithm determines the relevancy of
URL if you know the website's address. If you don't know
information by considering parameters such as keyword
where to look, the second option is to employ a search
frequency & page quality.
engine to locate the information you seek.
Reliable information is often obtained from recognized
sources such as educational, government, or well-known
industry websites.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE ICT
Internet Protocols
Protocols are rules on which the sender and recipient agree
when data is exchanged between devices.
1. Hypertext transfer protocol (HTTP): when a web page is
being accessed, entering http:// at the front of an address
tells the web browser that ‘HTTP rules’ for communication
are to be obeyed.
2. Hypertext transfer protocol secure (HTTPS): A secure
version of HTTP that encrypts data for security.
3. File transfer protocol (FTP): network protocol used when
transferring files from one computer to another over the
internet. It is similar to HTTP, but the protocol specifically
transfers files.
4. Secure sockets layer (SSL): a protocol that allows data to
be sent and received securely over the internet.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Aleksandra at British International School, Serbia on 26/01/25.
CAIE IGCSE
ICT
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Aleksandra on Sun Jan 26 2025 for strictly personal use only.
These notes have been created by Bisma Hammad for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).