Z Notes Theory
Z Notes Theory
//0417
TABLE OF CONTENTS
3 CHAPTER 1
7 CHAPTER 2
19 CHAPTER 4
25 CHAPTER 5
26 CHAPTER 6
ICT Applications
40 CHAPTER 7
46 CHAPTER 8
51 CHAPTER 9
Audience
52 CHAPTER 10
Communication
PAGE 1 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
54 CHAPTER 11
File Management
54
CHAPTER 12
Images
54
CHAPTER 13
Layout
54
CHAPTER 14
Styles
54
CHAPTER 15
Proofing
55 CHAPTER 16
Document Production
55 CHAPTER 17
Data Manipulation
55 CHAPTER 18
Data Analysis
56 CHAPTER 19
Website Authoring
PAGE 2 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
objects Two types of software:
1. TYPES AND COMPONENTS OF COMPUTER • Application software:
SYSTEMS o Programs that allow the user to do specific
task o Design to carry out tasks
1.1 Hardware & Software o Can be general purpose software or
Hardware custom-made software (specialist software)
• Tangible physical components of a computer system o E.g. Spread sheets, databases, word
• You can feel it or touch it processing • System Software:
• Internal Hardware Devices: o Programs that allow the hardware to run properly o
o Processor Control computer's hardware and application program
o Motherboard o Communicate with user
o E.g. Operating system, device drivers, compilers
o RAM & ROM
o Video & Sound Cards
1.2 The Main Components of Computer
o Internal Hard Disk Drives Systems
• External Hardware Devices: CPU
o Monitor • Processing done by central processing unit
o Keyboard •
o Mouse
o Printer
o External Storage Devices
Software
• Programs that control computer systems
• Set of instructions that make computer do
something • You cannot physically touch software
• Relates to ideas & instructions for using physical
Three main components: o RAM > ROM (usually; except washing
o Control unit - coordinates input and output machines) o Stores anything that needs to be
devices and carries out program instructions changed
o Arithmetic and Logical Unit (ALU) - o All program and data being used are on
performs calculations and logical comparison: RAM o Contents lost when computer is
A < B? turned off o Referred to as volatile memory
o Immediate access store (IAS) - holds data and • ROM:
program instruction in current use o Read only memory (ROM) is memory used to
• Microprocessor: store permanent information
o Used instead of CPU o Used to contain configuration data for a computer
o Single integrated circuit etc. o Chips cannot be altered, only read from
Internal/Main Memory o Data not lost when computer is turned off
• Stores all data: application software, operating system, o Referred to as non-volatile memory
data files • BIOS:
• Consists of ROM and RAM o ROM contains boot file, referred to as BIOS
• Both RAM and ROM are integrated chips (basic input/output system)
• RAM: o Tells computers what to do when it first starts o
o Random access memory (RAM) is an internal Does hardware check when computer is turned on
chip where data is stored temporarily o Then it loads operating system into RAM
o Memory can be written to and read from o BIOS stores date, time and system configuration
PAGE 3 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Input & Output Devices 1.3 Operating Systems
• Input devices: • Enables users to communicate with computer systems
o Purpose is to provide data for processing o • Controls operation of input, output & backing storage
Data is raw facts which alone have no meaning o • Supervises loading, running & storage of application
Examples: keyboard, mouse program
• Output devices: • Deals with error in application programs
o Displays result of processing • Maintains security of whole computer system
o Information is processed data which has been • Maintains a computer log
given meaning • Two main types of interfaces: CLI & GUI
o Examples: monitor, printer CLI - Command Line Interface
• Types commands to tell the computer what to do
Secondary/Backing Storage o The user must know all the commands
• Stores data/information & programs not being used at o Must not make typing errors
current time • Used by technicians
• Backing store device = reader or recorder
• Can access everything on the computer system •
o Example: Hard disk drive
GUI users can only access places they have icons for
• Backing store media = hardware containing data
• Advantages
o Example: Hard disk
o Knowing the correct commands, this can be
Basic Computer Model much faster than any other interface type
o Uses much less RAM than any other interface
type o Low resolution, cheap monitors can be used
o CLI does not require Windows to run • Disadvantages
• Disadvantages o Larger amount of hard disk space than other
o Can be confusing interfaces o Significantly more memory (RAM) to run
o Commands must be typed precisely, if there is than other interface type
a spelling error the command will fail o GUI use more processing power than other types
o If you mistype an instruction, it is often necessary of interfaces
to start all over again o GUI can be slow for experienced programmers to
o Large number of commands need to be use, they find CLI much faster
learned GUI - Graphical User Interface
• Uses graphics to stand for the complicated actions 1.4 Types of Computers
• Uses icons Desktop/Personal Computers
• Uses a mouse to selector the icons • Refers to general purpose computers
• Screen divided into windows allows different things on • PC refers to IBM compatible computers, distinguishing
each them from the Macs
• WIMP - Windows Icons Menus Pointers • Made up of separate monitor, keyboard, mouse and
• Advantages processing unit
o Easy to use because requires little IT knowledge o • Advantages
Easy to explore and find your way around the system o o Spare parts standardized results in low
Do not have to learn complicated commands o costs o Tend to have better specifications
Exchange data between different software o Good o Large casing allows good dissipation of heat build up
help facilities provided with GUIs
PAGE 4 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Disadvantages
o Not portable since they are made up of
separate components
o Wiring clutters up desk space
o Necessary to copy files as they aren't o Easy to steal
portable Laptop/Notebook Computers o Limited battery; need to carry charger
• Refers to computers where monitor, keyboard, pointing o Keyboard and pointing device awkward to use o
device and processor together in a single unit • Extremely Heat dissipation is difficult due to laptop structure
portable systems Tablet Computer
o Low weight • These are small hand-held devices that can perform
o Low power consumption many functions that PCs & laptops do
o Processor doesn't generate too much • Often use touch screens to operate
heat • Advantages • On-screen virtual keyboard replaces physical keyboard
o Portable because monitor, pointing device, keyboard, • Often used by graphic designers to digitalize their
processor & backing store units are together in one box content with a stylus pen
o No trailing wires • Can be used like a PC and/or a
o Full advantage of Wi-Fi Smartphone • Advantages:
o Can link into any multimedia system o Small light & portable
• Disadvantages o Built in cameras for photos & videos
o Touchscreen can be used with a stylus This is technology that is being newly developed •
pen o Long battery life These can have several impacts on our society
• Disadvantages: Artificial Intelligence (AI)
o Less storage spaces • Technology that focuses on creating a computer system
o Lacks power of laptop/PC that can closely mimic or simulate human intelligence • AI
o Digital keyboard can be difficult to use can be used to:
o Touchscreen may be difficult to use for detailed work o Enhance video games and computer tactics
Smartphone o Help decision making steps in expert
• Modern phones that can perform similar tasks to all the systems o Make robots to imitate human
above behaviour
• Main use of smartphones is social media & day-to-day o Understand different human languages
planning • Impact on everyday life:
• Use varies from person to person o Can be used to accurately predict hazardous
• Advantages: weather conditions and signal warnings automatically
o Smallest lightest most portable o Take over menial tasks for humans; increasing our
o Integrated/virtual keyboard leisure time
o Often the least expensive device o Can be used for safer automated travel; cars that
o More practical for day-to-day use can drive and park by themselves
• Disadvantages: o Increases home safety by being able to tell the
o Small screen may be difficult to use difference between owner & intruder; call authorities
automatically
o Not as powerful as other devices
o Improved medical care as decision making skills
o Often has the lowest battery life
and precision can be enhanced
o Small size makes it easy to steal/lose
PAGE 5 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Biometrics o Reduced vehicle theft since newer car doors
• A part of a person’s body is used to identify that come with a fingerprint lock on the door handle
individual o More secure mobile devices as most now have
• Can be: some sort of biometrics integrated into them
o Fingerprints Vision Enhancement
o Retina • LVES: low vision enhancement systems: video projected
o Iris inside a headset in front of the user’s eyes. Brings the
o Face objects closer for the viewer.
o Voice • NVE: Night vision enhancement: amplifies visible and
• These are all unique to everyone thus can be used as an infrared light. Light passed through image intensifier
authentication technique tube where light is converted to electrons, then
amplified (increase in no.) and then light up screen with
• Must be added initially to a system to use as
phosphor dust.
identification
Robotics
• Impacts on everyday life:
• Programmed machinery widely used to do physically
o Better security at the airport since most use at
demanding tasks
least one form of biometric check if not more
• Can be automated or manually operated
o Increased security in certain places as only
authorized personnel can gain entry • Used to perform several tasks:
o Dangerous jobs such as bomb disposal
o Exploring extreme environments such as labour o Unemployment as robots replace humans
volcanoes o Repetitive manufacturing jobs such as in autonomous jobs
welding o Moving heavy objects such as large o Safer working environments since robots can
engines perform tasks that are too dangerous for humans
• Impacts on everyday life: Quantum Cryptography
o Increased personal time since robots can take • Technology that allows messages and data to be sent
over domestic chores with complete privacy; basically, advanced encryption •
o Increased manufacturing efficiency since robots Older encryption is based on mathematics, but this new
are much faster and less expensive than human tech uses physics
• Makes it much more complex to decrypt
• Impacts on everyday life:
o Completely secure voting ensuring that votes
cannot be tampered with or changed
o Completely secure communication eliminating the
risk of being read/heard by the wrong eyes/ears o
Completely secure bank transactions so money goes
exactly where it is intended
o Completely secure personal information
preventing hackers access to intrusive details about a
person Computer Assisted Translation (CAT)
• When human translators use computer software to help
in the translation process
• Can reduce translation time
• May not be 100% accurate
• Common CAT tools:
o Spell checkers
o Translation memory software
o Language search-engine software
• Impacts on everyday life:
o More accurate documents since most software
can automatically detect errors
o More multilingual society since anyone with an
internet connection can now essentially learn multiple
languages using translators
o Quicker translations
3D & Holographic Imaging
• Technology that makes images appear to be 3-
dimensional by adding a layer of depth
• Holograms use 2 regular 2D images and manipulate
them to produce a 3-dimensional image
PAGE 6 OF 57
CIE IGCSE INFO.COMM.TECH.
//0417
• Different laser beams are used to record the 2D images
onto a single photographic plate
• This creates an illusion of one 3D images
• Impact on everyday life:
immersion • General VR equipment:
o Improved security since majority of credit/ID cards & o Eye goggles that produce 3D images to develop
bank notes use holograms to prevent forgery o Better the artificial environment
movie experiences since 3D viewing can provide a more o Special gloves or controllers to perform precise
immersive experience for the audience o Greater data actions inside the simulation
storage since holographic layers can potentially decrease o Headphones to control what is heard in the
the thickness of disc storage Virtual Reality (VR) virtual world
• When computers create an artificial environment that o Powerful computer to run the entire VR system in
users can virtually interact with real time
• Uses: • Impacts on everyday life:
o Allow architects to walk around a virtual version o Improved medical surgeons/soldiers
of their design o Stronger buildings
o Training soldiers for combat by allowing them to o Treatment of phobias as certain situations can
fight against virtual enemies be treated using simulations
o Training surgeons by allowing them to operate o More realistic education as students can learn in
on virtual patients a more interactive environment
o Playing games and enhance the level of
large Numeric Keypads
2.INPUT & OUTPUT DEVICES • A numeric keypad is used to
enter numbers only
2.1 Input Devices & their Uses • Although some have function
Keyboards key to allow input of alphabetical
• QWERTY- layout characters
• Ergonomic- reduces • Uses
health related problems o Used in Automatic teller machines (ATMs),
• Uses where customers can key in their personal
o Keyboards are used identification number (PIN), or an amount of
to input data into application software money
o Also used to for typing commands to the o Used to key in phone numbers into telephones o
computer (CTRL + P) Electronic point of sale (EPOS) terminals have numeric
• Advantages keypads in case the barcode reader fails
o Enables fast entry of new text into a document o o Used in Chip and PIN devices to key in PIN, or
Well-tried technology & well-known method of entry amount of money
o Most people find them easy to use o Used to enable fast entry of numeric data into
o Easy to do verification check as data is entered, as a spread sheet
it appears on the screen simultaneously • Advantages
• Disadvantages o Numeric keypads are faster than standard
o Users with limited arm/wrist use can find keyboards for entry of numeric data
keyboards hard to use o Since many are small devices (e.g. mobile
o Entering data is slow when compared to direct phones), they are easy to carry around
data entry (e.g. Optical mark recognition)
o They use up desk space as they are quite
PAGE 7 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Disadvantages
o Can be difficult to use due to the very small
keys o Difficult to use for entering text
o Sometimes the order of numbers isn’t very
intuitive Mouse
• An example of a pointing device ▪ Scrolling up/down and right/left
• The ball underneath the mouse is used to detect • Advantages
movement o Faster to select an option by a mouse than a
• The left button is for selecting by double on it and the keyboard o Enables rapid navigation through
right is to bring drop-down menus applications and the internet
• There is usually a scroll button which speeds up the o Mice are small and don’t take much area
process of moving through a document • Disadvantages
• Uses o People with restricted hand/wrist movement can
o Used for opening, closing and minimising software find it hard to operate a mouse
o Used for grouping, moving and deleting files o o Easily damaged and can easily be clogged up with dirt
Useful when editing images (e.g. controlling the size o They are hard to use if there is no flat surface available
and position of the image) Touchpad
o Used for controlling the position of a pointer on • Touchpads are used in many laptop computers as a
the screen to allow: pointing device
▪ Selection from a menu • The pointer is controlled by the user moving their finger
▪ Selecting an icon on the touchpad
• Uses top of the device
o Used for opening, closing and minimising software • Users control the pointer on the
o Used for grouping, moving and deleting files o screen by rotating the ball
Useful when editing images (e.g. controlling the size • Uses
and position of the image) o Have the same pointing/cursor control capability as
o Used for controlling the position of a pointer on a mouse
the screen to allow: o Used in applications where the user has a
▪ Selection from a menu disability (RSI)
▪ Selecting an icon o Used in a control room environment, where it is
• Advantages faster than a mouse to navigate through process
o Faster to select an option by a touchpad than screens and more robust than a mouse
a keyboard
• Advantages
o Enables rapid navigation through applications and
o Tracker balls don’t need the same fine control as
the internet a mouse
o Since the touchpad is integrated into laptop o People with limited hand/wrist movement find
computer, there is no separate mouse, aiding portability easier to use than a mouse
o They can be used when no flat surfaces are available • o The pointer can be positioned more accurately on
Disadvantage the screen than with a mouse
o People with limited hand/wrist movement can o They take less desk space than mice since they
find touchpads hard to use are stationary
o It can be more difficult to control the pointer • Disadvantages
when compared to a mouse o Tracker balls are not supplied with the computer
o They are more difficult when doing operations such as standard, so they are more expensive
as ‘drag and drop’ o User may need training since they are not
Tracker Ball standard equipment
• Tracker ball is like a mouse
except that it has a ball on the
PAGE 8 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Remote Control Televisions, DVD player/recorder and satellite
• A remote control is used to control the operation of system
other devices remotely by using infra-red signals • o Used to control multimedia systems
Uses o Used in industrial applications to remotely
o In home entertainment devices such as control processes, stop and start machinery
•
Advantages stations
o Enable devices to be operated from any o Used in PDA’s
distance, which is useful for people with o Used in Interactive white boards
disabilities o Used in computer based training (CBT)
o Some chemical processes are hazardous, so it is • Advantages
safer to operate equipment from a distance o Enable faster entry of options than a
• Disadvantages keyboard/mouse ▪ Very easy to choose options
o People with limited hand/wrist movement can ▪ User friendly method for inputting data
find them hard to use ▪ They are tamperproof, preventing people from
o The signal between the control and the device can keying in information (which could corrupt the
be easily blocked system)
Joystick • Disadvantages
• By gripping the stick, a pointer o There is a limited number of options available o
on the screen can be controlled Using touchscreens often can lead to health problems
• Buttons are used to make e.g. (straining of arm muscles and RSI)
selections o The screen can get very dirty with constant
• Uses touching Scanners
o Video/computer games are • Used to input information on hardcopy e.g. text
often controlled by joysticks document
o They are used in simulators to mimic actual • Uses
controls • Advantages o Used to scan in documents and convert them into a
o Easier to navigate round a screen compared to format for use in various software packages o Old and
a keyboard valuable documents and books can be scanned,
o Control is in three dimensions protecting the original copies from damage o
• Disadvantages Non-digital photographs can be scanned for storing on a
o More difficult to control the on-screen pointer with computer
a joystick than with other devices such as mice Touch • Advantages
Screen o Images can be stored for editing later
• User can choose an option by simply touching a o Scanners are much faster and more accurate
button/icon on the screen than typing in documents again
• The selection is automatically made without the need for o It is possible to recover damaged documents and
any pointing device photographs by scanning them and then using
• Use appropriate software to produce an acceptable copy •
o Used for service tills e.g. petrol stations Disadvantages
o Used where selections are made on a screen e.g. o The quality can be limited depending on how good
ATMs, public information systems, airports and railway the scanner resolution is
PAGE 9 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Digital Cameras
• Photographs are stored in memory
• They can be easily transferred to a computer using a USB
• Uses
o Digital cameras can produce
photographs for direct transfer o The camera user needs to be computer literate to
to a computer or to print out use the camera properly
o Digital cameras allow short o There is some artistry lost since clever
video clips to be produced software corrects errors in the photographs
o Photographs can be uploaded directly into o The resolution is not yet as good as
application software such as word processor traditional cameras
• Advantages o Images often need to be compressed to reduce
o Easier to produce better quality photographs the amount of memory used
than with a tradition camera o It is possible to fill up computer memory very
o Easier and faster to upload photographs to a quickly with several photos of the same subject (to
computer o There is no need to develop film and print find the perfect snap shot)
out photographs (saves paper and no longer needs the Microphone
chemicals to produce photographs from films) o Easy to • Can be connected directly to a
delete an image from the memory if it’s not satisfactory computer
o The memory card can store several • Sounds can be inputted and
hundred photographs manipulated
• Disadvantages • Uses
o Microphones are used to input speech/sounds to automatic greenhouses
be used in various applications SOUND Burglar alarm systems, monitoring liquid and
o They are used in voice recognition software- for powder
conversion of speech into text, and recognition of flow in pipes
commands HUMIDITY/MOISTURE Automatic greenhouses,
• Advantages environmental monitoring,
Faster to read in text than to type it using a keyboard o factories where moisture levels
Possible to manipulate sound in real time using special are crucial
software PH Automatic greenhouse, chemical processes,
o If used in a voice activation system, this has environmental
the advantage of improving safety monitoring
• Disadvantages • Advantages
o Sound files can use up a lot of computer memory o o Readings by sensors are more accurate than taken
Voice recognition software isn’t as accurate as typing by humans
in manually o Readings are continuous, there is no break
Sensors in monitoring
TYPE OF SENSOR APPLICATIONS o Because it is a continuous process any necessary
TEMPERATURE Automatic washing machines, central action or warning will be initiated immediately o The
heating systems, system can be automatic, removing the need for human
automatic green houses, ovens intervention, this is particularly important if the process
PRESSURE Burglar alarm systems, robotics, is hazardous
environmental monitoring, • Disadvantages
Automatic washing machines o Faulty sensors can give spurious results
LIGHT Automatic doors, street lighting control, Burglar
alarm systems,
PAGE 10 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Graphic Tablet
• A graphic tablet is used with a stylus to produce
freehand drawings
• Uses
o Graphics tablets are used
to
produce drawings, computer format.
graphics • Advantages:
o In countries where characters are complex e.g. o Easy to edit footage in a video editing.
japan they are used as a form of input o High quality video captured, therefore
o They are used in computer aided design (CAD) work • Disadvantages:
o Storage medium (Memory cards) more expensive
• Advantages to buy than films.
o It is possible to modify drawings before they are Web Cam
input o They offer an accurate method of drawing • • Connected directly to a computer
Disadvantages via a USB port
o They are more expensive than other pointing • Uses
devices Video Camera o While chatting online webcams
• DV (digital video) camera store compressed photo can be used to have
frames at 25 MB/s – motion jpeg. conversations
• Light turned into electronic signal through light sensitive o Used to enable video
sensors and automatically converted to a digital file conferencing to take place
• Advantages o System is error free, no typing involved
o Can be left on constantly and activated when o Information is secure since there is no typing and the
required o Allow people to keep in contact with each information can’t be read directly by a person o Can
other without the need to travel, particularly useful for prevent access to restricted/secure areas o Magnetic
disabled or elderly people stripes are unaffected by oil water and moisture
• Disadvantages o No moving parts therefore physically
o Webcams have limited features and the picture robust • Disadvantages
is often of poor quality o If the magnetic stripe is damaged the data is lost
o They need to be connected to a computer o Card needs to be in close contact with the reader
2.2 Direct Data Entry & Associated Devices o Since the information is not human readable,
Magnetic Stripe readers they
• Used to read information on the need to find a way to show the information to the
magnetic stripe customer (e.g. hotel room number not printed on
• The stripe contains useful cards)
information such as start and Chip & PIN readers
• The device has a slot where
expiry date
the card is placed, and the
• Uses
chip is read
o Credit and debit cards have magnetic stripes that
are used by ATMS or EFTPOS (electronic funds • A small screen is part of the
transfer point of sale) terminal reader which gives
o Security cards for entering building e.g. hotel instructions to the operator
rooms o Travel systems e.g. train and underground • Uses
tickets • Advantages o Chip and PIN readers are
o Data entry is fast compared with keying in using used where payments are made using cards e.g. travel
a keyboard or keypad agents
PAGE 11 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Advantages since the chip does not need to be in contact with the
o Provide a more secure payment system than requiring reader
a signature or using magnetic stripe, since the PIN • Disadvantages
typed in must match up with the PIN stored on the chip o Customer needs to be careful when typing in the
o Provide a more robust system than magnetic stripe PIN, so nobody reads it giving an opportunity for Fraud
Radio Frequency Identification (RFID) Readers • RFID • Optical mark recognition is a
readers work in similar ways to a bar code reader • An system which can read marks
RFID tag is attached to/inside a surface written in pen or pencil
• The reader reads the data held on the tag which is then • Uses
input into the computer system for processing • Radio o OMR devices are used to
waves are used to transmit data thus can be used read questionnaires, multiple choice examinations
through most materials papers and other types of forms in the form of lines or
• Uses shaded areas
o Used in retail or supermarkets as barcode • Advantages
alternatives o Used to identify pets o A very fast way of inputting results of a survey
o Used in passports o Since there is no typing, it is more accurate
• Advantages than keying in data
o Can hold a lot of data o OMR is more accurate than OCR
o Can be read from long distances • Disadvantages
o Does not require direct line of sight o Forms need to be carefully designed to make sure
o Information can be read faster than that the marks/shadings are correctly positioned to
barcodes o Can alter information gather accurate information
• Disadvantages o There can be problems if forms aren’t filled correctly,
o Thieves can steal information easily sometimes they must be checked manually before
o RFID tags are expensive being read by an OMR, this is both time consuming and
o Radio waves can experience interference expensive
Magnetic Ink Character Reader Optical Character Reader
(MICR) • Optical Character recognition
is
• Magnetic ink character recognition
is a system which can read a software that takes
scanned
characters printed in a special ink
text and converts it into a
• Uses
computer readable form
o Used to process cheques in banking operations
• Uses
– cheque is read using a batch processing method •
o Processing of passports and Identity cards o OCR is
Advantages
used when scanning documents to modify them using a
o MICR offers great security than OCR since the
suitable software
oriented characters cannot be altered
• Advantages
o There is no manual input, thus errors are reduced o
o Much faster data entry system than manually keying
If somebody writes over the magnetic ink characters, it
in data
can still be read
o Since there is no manual data entry, the number
• Disadvantages
of errors is reduced
o Only certain characters can be read, and the
• Disadvantages
number of different characters is very limited
o The system has difficulty reading
o It is a more expensive method than other
handwriting o It is still not a very accurate
methods used for direct data entry
technique
Optical Mark Reader
PAGE 12 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Barcode readers
• Used to read information in the
form of a barcode
• Handheld scanners or wands are
very common for reading
barcodes no need to change the prices individually on each
• Uses item
o Used in supermarkets and other shops where • Disadvantages
the goods are marked with a barcode o Barcode scanning is an expensive system to
o Used in libraries to scan user’s library card and administer since every item in the shops needs a
barcodes on books (to keep track of books on loan) o barcode and every barcode needs to be entered on the
Used as a safety function in many companies to ensure system
that electrical equipment is checked on a regular basis • o Also, there is a need to invest in the computer
Advantages technology together with staff training, which can all
o Faster than keying in information, and fewer be expensive
mistakes are made o The system is not fool proof- barcode can be
o Used as a way of recording data, can improve swapped around on items
safety o Barcodes enable automatic stock control
2.3 Output Devices & their Uses
o Barcode scanning is a tried and trusted
CRT Monitor
technology o When an item price is changed, only
• Cathode Ray Tube monitors
the central database needs to be updated, there is
• Least expensive type of monitor, becoming rarer as TFT
monitors take over main output device
• Come in various sizes • The progress in TFT technology is one
• Picture created is made up of tiny dots (red green or of the reasons for the rapid development of laptop
blue), the intensity of the colour of the dot determines computers
the colour perceived by the eye • The screen is made up of thousands of tiny pixels which
• Uses are made up of transistors controlled by a
o Primary output device for computers, user microprocessor
can immediately see what they are typing in • Each pixel has three transistors-red, green or blue; the
o Used with light pens to allow designs to be created intensity of each determines the colour of the pixel seen. •
on screen Uses
• Advantages o Primary output device for computers, user
o Produce higher quality images than TFT can immediately see what they are typing in
monitors o Angle of viewing is better than a TFT o Integral part of laptop computers
monitor o They work with light pens in CAD and • Advantages
CAM
o Lightweight, so no weight hazards like CRT
applications (Computer Aided
monitors o Less glare produced than in CRT
Design/Manufacturing) • Disadvantages monitors; also emit less radiation
o Tend to be heavy, weight hazard if not o Consume much less power and generate less
supported properly heat than CRT monitors
o Run very hot, can cause fires if left unattended • Disadvantages
– especially if they are old o Angle of viewing is critical, image appears unclear
o Consume more power than TFT monitors if viewed slightly from the side
o They can flicker, this leads to headaches and o This is an issue if several people are looking at
eyesight problems with prolonged use the screen at the same time
TFT Monitor o They cannot yet be used with light pens,
• Thin Film Transistor monitors
• Taking over from CRT monitors as the
PAGE 13 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
IPS/LCD Monitor modern projectors only work with digital inputs • IPS
• Front layer made from liquid crystal diodes; grouped (In-plane switching) is the technology used in LCD
together to form pixels (RGB or RGBY-more vivid colours) • monitors.
Receive analogue and digital signals, although most • Advantages:
o Colour can be seen accurately from different • The signal source is usually from a computer, television,
viewing angles or DVD player
o No lightening on touching • The image from the source is magnified and projected
• Disadvantages: onto a large screen
o Expensive • The devices usually work with a remote control, but can
o High power consumption also use virtual mouse technology – cordless PC mouse
o Slow response time (has a laser pointer)
• Note: Old LCD monitors used CCFL (cold cathode o It is then possible to direct the presentation
fluorescent lamp) technology to light up the screen. without being tied to the computer
LED Monitor: o Most multimedia projectors take input from
• Front layer made from liquid crystal diodes; grouped various types of video format e.g. PAL, NTSC or SECAM
together to form pixels (RGB or RGBY-more vivid colours) • • Uses
For the image to show up on-screen a light source of LED o Used for training presentations (allows the
backlight is used. whole audience to see the images from a
• Advantages (over LCD monitors): computer) o Also used for advertising
o Lighter and thinner presentations (shown at exhibitions, shopping
o Longer life malls etc.)
o Lower power consumption o Home cinema systems (projecting the images from
o Greater contrast and more vivid colour a DVD or television) use multimedia projectors •
o Relatively more robust Advantages
• Disadvantages: o Enables many people to see a presentation rather
o Glare gives viewers headaches than all of them crowded around a small computer
screen o Avoids the need for several networked
o Images too sharp, so can cause eye strain
computers o e.g. when looking at a video clip on the
Touch Screen
internet, everybody can see the video on the large
• Automatic selection without a pointing
screen rather than logging on to several computers
device • Uses:
• Disadvantages
o Automatic teller machines
o Images can sometimes be fuzzy
o EFTPOS (electronic fund transfer point of
o Expensive to buy
sales) o PDA
o Setting up projectors can be a little difficult
o Smartphones
o Public information points
Laser Printer
ADVANTAGES DISADVANTAGES
• Produce very high-quality hard copy
Faster data entry Limited options output
Multimedia Projector
• Print rate per page is fast if many
• Receive analogue and digital
pages are being printed
signals, although most modern
• Rely on large buffer memories – the
projectors only work with digital
inputs
Easy to choose options etc. data for the whole document is
Constant usage results in the stored before pages can be
User-friendly and intuitive
screen getting dirty; visibility and printed out
Frequent usage can lead to RSI,
sensitivity decreases
PAGE 14 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Uses volume printing
o Used where noise levels need to be kept low e.g. in
an office
o The best option for fast, high quality, high
• Advantages office Inkjet Printer
o Printing is fast for high volumes, slightly faster • Used to produce good quality hard
than inkjet if only a few pages are to be printed copies – the quality is not as good as in
o Can handle very large print jobs laser printers but much better than
o Quality is consistently high that of dot matrix printers
o Toner cartridges last for a long time; laser printers • Do not have large buffers like laser
can be a cost-effective option if colour outputs are printers, so printing is done a bit at a
not required time
• Disadvantages • Therefore, printing is sometimes paused – the whole
o Expensive to buy page can’t be stored in the buffer, it must wait for the
o Only fast if several copies are being made computer to send more data
o Colour laser printers tend to be expensive to run • Uses
since four cartridges are needed as well as diffuser kits, o Used where low volume outputs are needed o
etc. o Produce ozone and volatile organic compounds Ideal for high quality printing for small print jobs or
because of their printing method and type of toner/ink single pages e.g. for photo quality printouts
used • Advantages
o These have been linked to health hazards in the o High quality output
o Cheaper to buy than laser printers moist atmospheres
o Very lightweight and take up little space o Carbon copies or multi-part outputs can be
(small footprint) produced o Very cheap to run and maintain
o Do not produce ozone and volatile o Easy to use if continuous stationary is required
organic compounds, unlike laser printers e.g. long print jobs such as wage slips
• Disadvantages • Disadvantages
o Output is slow if several copies needed – there is o Very noisy – not good in an office
little buffer capacity to store the pages environment o Cost more than an inkjet printer
o The ink cartridges run out too quickly to be used to buy
for large print jobs o Very slow
o Printing can smudge if the user is not careful o Can o Printing is of poor quality
be expensive to run if they are used a lot – original ink Wide Format Printer
cartridges are expensive • Devices that produce hard
Dot Matrix Printer copies but operate in a
• A type of impact printer different way to printers
• A print head made up of a matrix • Not limited to normal printer
of pins presses against an inked paper size and can produce
ribbon highly accurate, very large
• Uses drawings and posters
o Can be used in noisy environments e.g. • The most common types are
garage workshops pen plotters, electrostatic
o Can be used in applications were the print quality (similar method to laser printers) and inkjet plotters o
is not very important With pen plotters, coloured pens are controlled by a
• Advantages computer and the paper can move backwards and
o Can be used in environments which would be a forwards to allow accurate shapes to be drawn
problem for laser and inkjet printers – dusty, dirty or
PAGE 15 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Uses
o Used to produce large drawings e.g. blueprints of
buildings; are often used with CAD applications o Used
to produce large pictures for use on billboards or giant
posters
▪ They can also print on plastic coated paper • If the (plaster, resin, starch) are bonded together as a 3D
pens are replaced by cutting tools, it is possible to make model is slowly built up
large signs • Items produced are known as prototypes
• Advantages • Uses
o Can produce huge printouts o Used to produce prototypes which work from CAD
o Print quality is extremely high packages, photograph images, stored drawings etc. o
• Disadvantages Scale models are produced in colour before the real
o Slow in operation thing is manufactured
o Expensive to buy and maintain o The ultimate objective is to produce organic
3D Printer objects using this layering technology (such as
• A new type of printer that replacement human organs)
produces solid 3D models using
modified inkjet technology • Advantages
called o Save a lot of money, other methods of making
tomography prototypes are very time consuming and expensive o
• Very thin layers of fine powder The powders used can often be ground up and reused o
Physical scale models are produced with working parts,
which gives a better idea of how the product will look • Advantages
• Disadvantages o Usually long lasting and durable (if operated
o Expensive to buy within their intended power levels)
o Slow at producing their output o Often provided with the computer/laptop
o Product is sometimes a little rough, often further although these may not be the best quality
work needs to be done • Disadvantages
Speakers o Can take up a lot of desk space, compared
• Can be connected directly to a computer or are built into to headphones
the monitor or casing (as in o Can distract people around you, everyone can
laptop computers) hear what you are playing
• Uses a digital to analogue o May not be able to hear the full sound spectrum,
converter (DAC) to convert this requires multiple speakers
digital Actuators
data from the computer to analogue from so the • A type of controlling device
speakers can process it; the signal is then amplified • Transducers that are used to take signals from a
through the speakers. computer and convert them into some form of motion
• Uses e.g. operating motors, pumps, switches and valves
o Used to output sound from multimedia • Digital signals are sent from the computer to an actuator
presentations o Used in home entertainment centres to operate a device
o They can help blind people through audio output • Conversion of the digital signal to analogue is required
of text on the screen (together with speech first (using a DAC)
generation software)
o Used to play downloaded sound files
PAGE 16 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Motors present
• Turned on or off by the actuator Heaters
• Uses • Actuators are connected to switches which turn the
o Used in many domestic appliances heater on or off
o Automatic washing machines (to • Uses
make the drum rotate) o Used in automatic washing machines, cookers
o Cookers (to switch on fans) and central heating systems
o Water pumps in central heating systems o Used in automatic greenhouses to control
o Automatic greenhouses to open windows and the temperature
switch on fans Lights
o Used to control robot arms in the industry o • The actuator is connected to the switch that turns the
Operate fans, disk drives and DVD drives in computers lights on or off
Buzzers • Uses
• Switched on or off by the actuator o Security lights
• Uses o Used in greenhouses to control the lighting conditions
o Used in cookers and microwave ovens to tell the
operator when the cooking process is complete o Used 3. STORAGE DEVICES & MEDIA
in burglar alarm systems to warn if intruders are
3.1 Magnetic Backing Storage Media
Fixed Hard Disks/Drives • Uses a read/write head to write and read data from it •
• Disk surface coated in magnetic film, storage is done by
altering binary codes to 1s or 0s
• Uses
o Used to store operating systems and working
data o Used for storing application software
o Real time systems and online systems used fixed
hard drives
o Used in file servers for computer
networks • Advantages
o Very fast data transfer rate and fast access times
to data
o Have very large memory capacities
• Disadvantages
o Can be easily damaged
o They lack portability
Portable & Removable Hard Disks/Drives
• Like fixed hard disks but are usually connected via
universal serial bus
• Uses
o Can be used as backup systems to prevent loss of
data o Can be used to transfer data, files and software
between computers
• Advantages
o Data access time and transfer rate is very
fast o Large memory capacities
o Can be used to transfer information
between computers
• Disadvantages
o Can be easily damaged
Magnetic Tapes & Drives
• Thin strip of plastic which is coated in a magnetic layer
• Read and written by read/write head
• Uses
o Application where batch processing is
used o Used as a backup media
• Advantages
o Generally, less expensive and very robust
Available on all computers and is the main method used
technology o Data transfer rate is fast
for data storage
PAGE 17 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Disadvantages o Used as a backup in hand held devices
o Access time is very slow • Advantages
o When updating another tape is needed o Very compact
Memory Cards o Very robust
• A form of electrically erasable programmable read only • Disadvantages
memory (EEPROM) o Very expensive per Gb of memory when compared
• Uses to hard drive disks
o Used to store photos on digital cameras o Has a finite life in terms of the number of times
o Mobile phones use them as memory they can be read from/written to.
cards o Used in MP3 players to store music
3.2 Optical Backing Storage Media
CD-ROM/DVD-ROM
• Read only memory – cannot be overwritten • Data is
stored as a series of pits and lands formed by a laser
beam etching the surface at manufacturing stage • Uses
o Store music files and software.
o Very large storage capacity and are used to store
films. • Advantages
o Holds more data than floppy disks
o Less expensive than hard disk drives
• Disadvantages
o Data transfer rate and data access time are
slower CD-R/DVD-R
• The letter ‘R’ means the disc is recordable only once and
then it becomes ROM
• Use a thin layer of an organic dye as the recording
media • DVDs also use an additional silver alloy or gold
reflector • Laser beam produces heated spots and
unheated spots • Uses
o They are used for home recording of music
(CD-Rs) and films (DVD-Rs)
o They are used to store data for later use
o Used in applications where it is necessary to
prevent the deletion or over-writing of important
data
• Advantages
o Cheaper than RW disks
o Once burned (and finalized) they are like
ROM • Disadvantages
o Can only be reordered once
PAGE 18 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Uses
o DVD-RAMs are used in recording devices such as
satellite receivers to allow simultaneous recording and
playback
o They are used in camcorders to store films
• Advantages
o Have a long life (30 years) Uses
o Can be re written on more than the o Used to store operating systems and working
DVD-RWs (100,000 times) data o Used for storing application software
o Very reliable as they have built in verification o Used in file servers for computer
software to ensure accuracy of data networks • Advantages
o Access is very fast o Faster than hard disks because they do not need
o No need to finalize the disk to ‘spin up’ the disk
o Very large capacities o Robust because no mechanical parts
o Ability to read and write data at the same o Read performance is fast even when data
time • Disadvantage fragmented o Less susceptible to data loss
o DVD-RAMS are not as compatible as R or RW, o Lighter, quieter and require less power than hard
many systems will not recognize this format disks • Disadvantages
o More expensive than DVD-RW o More expensive than hard disks
Blu-Ray Discs o Have a smaller capacity than modern hard disks o
• Uses Lower number of write cycles causing performance to
o Blu-ray disks are used in home video diminish over time
consoles o Used for storing and playing back Flash Drives
films • Otherwise called pen drive/memory stick/USB
o PCs can use this technology for data storage or stick • Can store several GBs of data and use solid
backing up hard drives state technology
o Camcorders can use this media to store film • Connected to a computer through USB port and power
footage • Advantage to operate drawn from host computer
o Very large storage capacity • Some expensive software increasingly uses these storage
o Data transfer rate is very fast methods as a form of security
o Data access speed is faster than with other • Uses
optical media o Used to transport files between computers o
• Disadvantage Used as a security device – a dongle – to prevent
o Disks are relatively expensive software piracy
o Blu-ray disks still have encryption problems • Advantage
o Very compact and portable media
3.3 Solid State Backing Storage o Very robust
• Solid state systems control the movement of electrons • Disadvantage
within a microchip: if the transistor conducts a current, o Not possible to write protect the data and
this is equivalent to a 1, otherwise it is a 0 files o Small physical size and are easy to lose.
• Have no moving parts, consume much less power and o Lower storage capacity than hard disk
are extremely robust
• Used primarily as removable storage devices and are 4. NETWORKS & THE EFFECTS OF USING THEM
collectively known as flash memory
Solid State Drives 4.1 Routers
• Supports reading/writing data & maintains stored data in • A device that enables data to be sent between different
a permanent state even without power types of networks
• Functions much like a hard drive but different tech • Commonly used to connect computers and other
• Built with an array of semiconductors that form its network capable devices to the internet
memory and operated using an integrated circuit • • They can be connected to through cables or wirelessly
PAGE 19 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Function get there
• Makes decisions on messages being passed between the • Formats the messages making it suitable for the new
networks network
• Reads information about the message and decides How it Works
where the message should go and the best route for it to • To send data to a specific device, a router needs a
something like an address Bridges
• Internet Protocol Address: a unique number assigned to • It connects 2 different types of networks together e.g. a
all computers and devices connected to the internet bus and star network
which can determine its exact physical location • It can only connect networks that use the same way for
• A router can use this IP to send data from the internet to handling messages
the exact device that requested it • They do this by changing the form of message to suite
• Storing IP Addresses: the different type of network
o Routers store IP addresses in a routing table o Switches
Routing tables list all the different routes to other • More efficient than hubs in distributing data • Each
networks device has an access control media address MAC which
o Routing table determines best route for identifies it uniquely
data Sending Data between Devices • MAC Address: a number unique to each device
• Routers can also send ‘packets’ of data between devices connected to the network (like fingerprints)
on different networks • Data sent will have a mac address which tells the source
• Each packet contains the data itself and the IP address of and receiving device
the device being sent to Modems
• Occurs globally using multiple routers & re-routing until • It stands for modulator demodulator.
the data reaches its intended IP address • Converts computer’s digital signals (modulates it) into
analogue for transmission through telephone lines •
4.2 Common Network Devices Reverse this process- analogue signal from a telephone
Network Interface Cards line into digital for a computer to process the data
• Used to connect individual computers/devices to a
(demodulates it)
network
• The main use it to connect to computer networks over
• NICs come in two distinct types:
long distances using existing telephone lines
o Wired: cards that have ports which allow
Types of Modems:
network cables to be plugged in directly
• Dial-up modems: operate at 60 kilobits/sec
o Wireless: cards that connect to networks using
o slow compared to modern standards
Wi-Fi signals
Hubs • Asymmetric: faster at downloading than uploading
o (ADSL) asymmetric digital subscriber line
• They are devices that can have multiple devices
modems operate at 11,000 kilobits/sec
connected to them
o Don’t tie up line while accessing internet, which
• Main task is to receive data from different ports and
allows simultaneous internet access and usage of
send it to each device
telephone • Cable modems: allow cable TV users to
• The information will be received to the device whether
receive TV signals as well as internet access
its relevant, or not
PAGE 20 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
4.3 Wi-Fi & Bluetooth
Wi-Fi
• Any system which allows you to connect to a network or
computer through wireless communication
• Examples: • Bluetooth is an example of wireless personal area
o WLANs networking (WPAN) technology
o PDAs • Spread spectrum transmission (radio waves) is used to
o Laptop computers provide wireless links between to devices such as mobile
o Peripheral devices such as printers phones and allow connection to the internet
• Wi-Fi Hotspots • A small home network can be created with this system
o Wi-Fi systems rely on AP (radio frequency • Uses:
technology) to enable the device to receive and send o Transfer photos from camera to mobile
signals o Wi-Fi hotspots are places where you can phone o Wirelessly connect different external
access Wi-Fi (free or paid) devices
o Hotspots are found in public places like
Airports, hotels, and cafés 4.4 Accessing the Internet
o War driving: The act of driving and searching • User can access by web browser
for unsecured Wi-Fi hotspots TYPE OF
o This gives a risk to the Wi-Fi system
ACCESSDESCRIPTION
Bluetooth
4.5 Web Browser
• Software used to retrieve, present & traverse the World website consists of many of these pages linked
Wide Web together
• World Wide Web: system of interlinked hypertext Uniform Resource Locator (URL)
documents accessed via the Internet • Web browsers use URLs to retrieve files
HTTP Proxy Server • They are multiple ways of locating on the internet
• Type of server that acts as a buffer between a WAN and • Standard form: 4 numbers e.g. 194.106.220.19 •
a LAN Alphanumeric form:
• Retrieves web pages and passes them onto the • protcol://web address/path/filename
computer that made a request o Where; Protocol is usually http
• Stores any page retrieved on the server, which means o Site address consists of: computer name,
that when a different computer requests the same page domain name, domain type, and country code
it would be available o Path is the web page
• Speeds up the browsing process o Filename is the item on the page
Websites
• Web is made up of millions of websites and web pages 4.6 Email
• Web pages are documents on a computer screen • A method for sending text and attachments from one
containing various multimedia and text, pictures • A computer to another over a network
DIAL UP • Telephone line gets tied up while a dial o Speed of sending and receiving
INTERNET up modem is in operation replies is quick o Low cost (no
ACCESS stamps, paper etc.)
• Local cable television operators give o Not needing to leave home to
CABLE user access through cable networks send the mail • Disadvantages
INTERNET
• Fastest download speed connections o Possibility of virus threats and
ACCESS
(at least 11000kbps) hacking o Need for the email
INTERNET
• Advantages address to be correct o Inability to
ACCESS VIA DSL
• Slowest type (60kbps) send bulky objects via emails
PAGE 21 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
4.7 Internet Service Provider (ISP) or annual fee
• These are companies that provide users with access to • After paying this fee, a username and password are
the internet issued which can be used to connect to the internet
• Provider in return for these services is charged a monthly
4.8 Common Network Environments
Internet o Communication between users
• A worldwide collection of networks and computers that o Network administrator can control and monitor
have joined together all aspects of the network
• Uses of the Internet: • Disadvantages
o Web Browsing o Easier spread of viruses throughout the whole
o Email network o Development of printer queues
o File Sharing o Slower access to external networks e.g.
o Entertainment internet o Increased security risk
o Video Conferencing o If main server breaks down, usually the networks
o Online Banking will no longer function
o Advertising & Blogging Wireless LANs (WLANs)
o Social Media • Do not involve any wiring or cabling
Intranet • Provide wireless network connection overs a short
• Like the internet but only accessible to specific users distance
• Basically, a private internet where outsiders cannot • They use radio or infrared signal's instead of cables
connect to it • Devices known as Access Points (APs) are used for a
• Uses of an Intranet: larger range
o Web Browsing • APs usually use spread spectrum technology (larger
o Email range)
o File Sharing • Advantages
o Schools: share information and learning o All computers can access the same services
resources with students and resources
o Businesses: share private information within a o No cabling is involved
large company securely o The system is more flexible
Comparing Internet & Intranet o Adding new computers and devices is very
INTERNET INTRANET easy o Cost is reduced, and safety is improved
• One of the hubs or switches will usually be connected to • Disadvantages
a router/modem to allow LAN to connect to the internet • o Security is an issue
In doing so it then becomes part of a wide area network • o Problems and interference can affect the
Advantages signal o The data transfer is slow than in the
o The sharing of resources wired LAN
Phrase Origin Wide Area Networks (WAN) connected through
International Network Internal Restricted • WAN is formed by several LANs being
Access Network
Purpose Globally share data Privately share data Audience • Some companies set up Private WANs, it is expensive
Wide range of people Specific company or organisation however it comes with a more enhanced security
a router or a modem
Access Anywhere if you are connected to the internet and communicate via
• It is common to use an Internet
Local Area Networks (LAN) this
Only from within the company service provider (ISP) for connections
• Not over a large geographical area (e.g. in one building) network system
• Typical LAN will consist of several computers and • Additional hardware is needed for a WAN: Routers,
devices • Devices and computers will be connected to modems and proxy servers
hubs or switches
PAGE 22 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
4.9 Using Different Types of Computers to MOBILE PHONES
Access the Internet ADVANTAGES DISADVANTAGES
• Smallest most portable of all • Websites are often not fully
LAPTOP COMPUTERS
devices displayed
ADVANTAGES DISADVANTAGES
• More portable than desktops can access internet in more locations • Larger screen than tablets &
smartphones which allows • Screens not as large as carry this wherever they Small keyboards make it
easier reading desktop PCs may not appear go difficult to type
• Keyboards are bigger than as clearly • Much easier to connect • Allow children access to
those on • CPUs are not as powerful as to internet on-the-go internet anywhere; can
• Less portable than those in desktops
• Small screen size makes be dangerous
tablets/smartphones • People more likely to
viewing websites difficult •
tablets/smartphones 4.10 Network Security Issues
• Touchpads allows easy • Connection to a network exposes a user to: o Hacking:
navigation even on slanted Unauthorised access given to computer. o Phishing:
surfaces Phishing involves getting sensitive information such as
DESKTOP COMPUTERS usernames, passwords, and credit
ADVANTAGES DISADVANTAGES
• Most websites are designed to be viewed card detail, for
on a desktop • Have larger keyboards malicious reasons, by
making it easier to type on mimicking a reliable
webpage on the
• Screens are larger so giving an easier and
network
better viewing experience
• Usually use wired internet connections o Pharming: Explained
which is more stable/reliable than Wi-Fi in section 8.2
• Not portable so are limited to use in one o Viruses: Explained in
room section 8.2
• Require keyboard and mouse as extra Policing the Internet
peripheral devices
• Currently, the internet
• Screen and Monitor consume separate
has no boundaries
power.
• Anything and
• Cannot usually connect to devices like everything can be put
Bluetooth speakers without external online • For Policing:
adapter
o Prevent illegal
material being posted
o People can easily
find info on how to
become hackers or
make bombs
• Robust • Take
up large desk
space
o Prevent
children from
accessing
undesirable websites
• Good heat dissipation- large body. Policing:
• Bulky to carry around o Could reduce the amount of
incorrect information • Against
TABLET COMPUTERS o Material already available in other sources i.e.
ADVANTAGES DISADVANTAGES books o Very expensive
• Smaller & lighter than desktops & which is less reliable than wired o Laws already exist to deal with
laptops making it easier to carry • Screens are smaller than those on perpetrators Inappropriate Websites
• Larger screen than smartphones laptops & • Risk of finding undesirable websites
• On-screen keyboards larger than desktops • Risk of doubtful websites which are
• On-screen keyboard is not easy to
those on smartphones not genuine • They could lead to
• Larger & less portable than type on
problems such as undesirable web
smartphones o Users would have to fund
links, security risks
• Uses Wi-Fi to connect to the interneto Difficult to enforce rules
o Against freedom of information
PAGE 23 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
4.11 Password Interception • This software can install other spyware software, read
Spyware cookies and personal information, and change the
• Spyware is software that gathers user information default home page or web browser
through their network connections without them being • Anti-spyware can be used to search out this software
and correct the corruption
PAGE 24 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Fax/modem software in the computer converts the o Delegates at one end speak into a microphone
image into a form fax machines can be recognized • and consider the webcam
Physical Faxing: dedicated fax machine connected via o The other delegates can see them and hear them
telephone line that copies and electronically sends files using speakers and monitors
to the dialled recipient o However, there are several problems with these as
• Electronic Faxing/Online Faxing: uses the internet to the conference call often lags and quality not always
send documents through computers. high. o Also, as travelling tickets increase in price,
PHYSICAL FAXING ELECTRONIC FAXING terrorists
• How it works:
Associated with a phone no. Only Associated with an email address and paper and ink
Need actual fax machine, paper, etc. phone no. Cheaper- no fax machine, can use this way of communicating
with each other, increasing risk • Same as video-conferencing but
Audio-Conferencing without webcam
No encryption Better safety- encryption The signal can • VOIP (Voice over internet protocol) is a method used to
get busy No busy signal issues talk to people over internet
• VOIP converts sound (picked up by a microphone) into
Email discrete digital packets that can be sent to a destination
• A method for sending text and attachments from one via internet
computer to another over a network • Advantage: free and can be used all over the
Comparing Faxing & Email world • Disadvantage: sound quality is usually bad
Fax Email
• VOIP is often used
Singed faxes are legally files) theft o Viruses and
acceptable • Security Issues: malware
More secure (user id and o Identity and service
password needed to access
Poor quality prints at times Digital files (no need to
o Spamming (sending junk mail) o Phishing
print – eco-friendly)
attacks (illegitimate scams)
Delay is telephone line busy Better quality
Faster sending of Employment
Slow if several documents need to be
documents per document and even if • IT led to unemployment in many
sent
multiple recipients areas
Every recipient must be dialled up one 5. THE EFFECTS OF USING ICT o Manufacturing - robots have taken
by one over many tasks and are much faster
Files can be transferred between any 5.1 Effects of IT on
device connected to the internet
PAGE 26 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Disadvantages Music Scores
o Requires distribution • Music samplers and mixers allow original tracks that
o There are no special effects; were recorded in a studio to be modified
sound/video/animation o There are printing costs; • Electronic instruments can play back through electronic
paper/ink effects machines
Websites • Synthesizers combine simple wave forms to produce
• Collection of webpages, text, graphics, video and complex music creations
sound • Hosted on a web server on the internet • Electronic organs can mimic any other instrument •
• Need to write code or use a web authoring Music scores can be generated from music itself using
application • Hyperlinks to other pages can be added software
• Interactive websites require programming knowledge • Software can automatically correct music notes in a
• Can use a camera, scanner, microphone to input data score
• Usually hire space from web hosting company • • There is no need to understand music notation to write a
Advantages music score
o Ability to add sound/video/animation •
o Links to other websites/hyperlinks
o The use of hot spots
o Buttons to navigate/move around the website
o Hit counters to see who has visited the websites
• Disadvantages
o Can be hacked and modified or viruses introduced o
Need for a computer and internet connection o Lack of
portability compared with paper based system o Need
to maintain website once it is set up Multimedia
Presentations
• Uses a mixture of media to present information:
animations, video, sound, transitions, hyperlinks •
Produced using software packages
• Used with a projector so large audience can view
• Advantages
o Use of sound and animation/video effects o
Interactive/hyperlinks built into presentations o
More likely to hold audience’s attention
• Disadvantages
o Need for special equipment – expensive
o May require internet access
Music notes are automatically printed out in the correct professionals who can produce expert posters • Some
format posters require larger printers than A4 • Sequence in
Cartoons which a flier or poster is produced on a computer
• Animations can be produced using computer hardware system
and software • A word processor or DTP application is opened o
• With 3D animations objects are designed on a computer The user creates frames, boxes and text boxes o If
and a 3D skeleton is produced necessary, photos are taken, using a camera o The
• Parts of the skeleton are moved by the animator using images are uploaded from the camera, loaded
key frames from a CD/DVD, scanned from hard-copy photos or
• The difference in appearance of the skeleton in these downloaded from the internet
key frames is automatically calculated by the software o The photos are saved to a file
and is known as tweening or morphing o The photos are imported or copied and pasted into
• The final stage is to make a realistic image by a the document
technique known as rendering o The photos are edited and typed in or imported from
Flyers & Posters a file and then put into required style
• A Word processor/Desktop publisher is used to create it Mobile Phones
• Need to hold minimum amount of information and be • Wireless devices that allow users to make phone calls
accessible very quickly from anywhere with cell reception
• Need to make an immediate impact when people look at • They connect to the telephone system using radio signals
them • This requires them to be in range of a mobile tower
• Anyone can produce them but there are highly skilled
PAGE 27 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Used for communication via
o Phone calls
o Text messaging
o Social Media
Internet Telephony/VOIP
• VOIP (Voice over internet protocol) is a method used to o Makes it clear to reader who the sender is
talk to people over internet o Information includes company logo, name,
• VOIP converts sound (picked up by a microphone) into address, contact numbers
discrete digital packets that can be sent to a destination o Gives a professional impression
via the internet o Easy to reply to
Publicity & Corporate Image Publications • Flyers:
• Business Cards: o Generally printed on single sheets of A4 paper o
o Miniature printed documents that provide Handed out directly to people for promotions o
information about the business/organisation Cheap to produce and easily distributable (locally)
o Usually printed on thick cards o Information includes company logo, promoted
o Easily distributable to potential clients product or service, contact details
o Information includes company logo, services, o Makes it easier to target a specific
address, contact numbers, email, website audience • Brochures:
o Gives a professional impression o Also called leaflets & are like flyers
• Letterheads: o Difference is that they are often folded into
o Found at the top of official printed documents to sections o Left on counters for pick up rather than
be mailed to clients or for internal use
handed out o Information includes company logo, ▪ What format do you want it in?
promoted product or service, contact details o Give instructions about how to answer
o Makes it easier to target a specific audience questions o How will the data be collected?
• Paper surveys are scanned using OMR or
6.2 Data Handling Applications
OCR o Advantages
Surveys
▪ Faster to get results
• All data handling starts with data collection o Data
▪ Fewer errors
capture forms can be used for many applications o
▪ It is easier to do statistical analysis
Decide what needs to be collected and then what
questions should be used to collect it ▪ Less expensive to carry out; requires fewer people
o Paper or electronically • Online questionnaires
• Rules for creating forms o Usually use radio buttons
o Make them look official o No data preparation needed
o Spaces should be thought about giving enough o Results sent directly to database for
space for answers analysis Address Lists
An address book on a computer or mobile phone might
o Restrict the amount of possible answers, do not
have a contact’s home address, phone number, email
use open questions
address, personal information like the date of birth etc.
o If open questions are used limit the amount of
space available for answers
o Asking for ‘Name’ needs to be carefully thought
about ▪ Are you asking for sensitive information?
➢ People may not feel comfortable being truthful
▪ What names do you want?
➢ First name, family name etc.
o Date of Birth
PAGE 28 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Clubs & Society Records (by comparing it to data stored in memory) and updates
• Need to keep a record on members usually in a its files and/or gives a warning signal if the values are
database • Usually payment details, contact details and outside given parameters
interests • It makes it easy to match people with interests • No changes to the process are made
and send • Examples:
information about what they are interested o Scientific experiments
in • This can be done my using mail merging o Weather stations
• Easy to check memberships and send out Analogue & Digital Data
reminders • It is important to follow the data • Digital data: discrete, fixed value (used by
protection act School Reports computers) • Analogue data/signals: continuous value
• Database applications such as SIMS store large amounts that varies smoothly
of data which can be used to create annual and termly o Analogue device = measure length,
school reports weight, temperature etc.
• Things able to be gathered from here are: o E.g. Thermometer – represents temp. by the height
o Data individual to student – tests/exam results o of the liquid column
Student progress – target grades being met or not o o Sensors: measure physical and analogue qualities •
Number of absences – create a percentage of amount Analogue data from sensors needs to be converted into
of days attended school digital data using an analogue to digital data converter
o Teacher comments – adds comments on to report (ADC) so that the computer can understand and process
the data from the sensors
6.3 Measurement Applications • If the computer sends signals to motors, valves, etc. then
• Sensors are used to send data to a computer where the this data also needs to be converted to analogue using a
data is processed digital to analogue converter (DAC) so that the computer
• The computer simply reviews the data from the sensors can effectively control these devices
Analogue to Digital Converter (ADC) Sensors read data from the river (oxygen levels and
acidity levels using a pH sensor)
• The data from the sensors is converted into digital using
an ADC
• The computer stores the received data
• The oxygen levels and acidity levels are compared to the
historical data stored in memory and they are also
compared to alarm levels stored in memory
• One of two things will now happen: either the data is
transferred to a CD/DVD or to a memory stick and taken
away for analysis later or the computer is connected into
a mobile phone network and transmits the data back
automatically to the monitoring station
Intensive Care Units in Hospitals
• Sensors read key vital signs (such as pulse/heart rate,
temperature, blood pressure, respiration, etc.) • The data
from the sensors is converted into digital using an ADC
• The data is stored in the computer memory • The
computer compares the data from the sensor with the
values stored in its memory
• The results are output on a screen in the form of graphs
and/or digital read-outs
• An alarm is activated if any of the data is outside
acceptable parameters
particularly important in the patient monitoring • If performed for educational purposes, reduced practical
example • Doctors, nurses, scientists, etc. can all get on hands-on experience and learning.
with other tasks while the monitoring is done • Will not function in a power cut if no backup power
automatically • Computer give 24 hours cover every day present (expensive to have reliable backup power)
(i.e. 24/7) • The readings will tend to be more accurate •
Readings can be taken more frequently if they are done 6.4 Microprocessors in Control Applications
by a computer and sensors • Sensors are used to send data to a computer where the
data is processed
• The computer reviews the data from the sensors (by o Inputs
comparing it to data stored in memory) ▪ Pressure sensor on the door to detect if open or
• If the values are outside the given parameters/pre-set closed
value it acts to try and get the values within acceptable ▪ Sensor to detect if the required level of water is in
ranges ▪ Temperature sensor to check temperature o
• It does this by sending signals to devices controlling Outcome
the process ▪ Clothes have been washed
Turtle Graphics o Outputs
• Based on computer language called LOGO and is now ▪ Heater
usually known as turtle graphics ▪ Motor to spin drum
• It is the control of the movement of a ‘turtle’ on a ▪ Lights on machine to show user stage the cycle is at ▪
computer screen by several key instructions which can Actuators to turn the inlet valves on to allow hot and
be typed in cold water into the machine
• The use of ‘repeat’ instructions makes a piece of code ▪ Actuator to turn the outlet valve on to let the water
more efficient out of the machine when the wash is complete ▪ An
COMMAND MEANING actuator to control the pump
FORWARD �� Move �� cm forward o Processing
BACKWARD �� Move �� cm backward ▪ Software to make decisions which will allow the
LEFT �� Turn left through �� degrees RIGHT �� clothes to be washed
Turn right through �� degrees REPEAT �� Repeat o Time taken before next inputs
next set of instructions �� times ENDREPEAT Finish ▪ Timer as part of the software
the repeat loop ➢ Time different cycles (when to add
PENUP Lift the pen up soap/conditioner/etc.)
PENDOWN Lower the pen ➢ Time delay in measuring temperature
➢ Needs to be time for changes to have effect
Automatic Washing Machines o Unmanageable situations
• Have a microprocessor in them which contains the ▪ Door may not be shut
software which controls the washing machine • ▪ Needs to draw user’s attention
Appling the factors ▪ Usually a buzzer and light
PAGE 30 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Central Heating System ▪ Same done to check when to turn off
• Applying factors ▪ When on, microprocessor reads temperature from
o Inputs sensor and compares it with desired temperature ➢
▪ Inputs from the user If too low, it will heat up by turning the boiler on
➢ Room temperature required and if it’s too high it will turn the air conditioner
➢ Time systems turns on/off on ➢ These will stay on until desired temperature is
▪ Inputs from the system reached
➢ Actual room temperature Automatic Cookers
➢ Clock giving the time • Have temperature sensors and timers with manual
o Outcome controls to set start and end times, and temperature for
▪ Heating or cooling room during the required times cooking.
o Outputs • Working similar to Central Heating System.
▪ Boiler Burglar Alarms
▪ Air conditioner • Burglar alarms detect any intrusion.
o Processing o Sensors such as motion sensors, door and window
sensors, magnetic sensors, multi-functional sensors
▪ Check time against the one input and switches on
(vibration, shutter, and temperature) measure the
when that time is reached
physical quantity and inputs the value to a
microprocessor. Computer then decides to turn the water supply to
o The microprocessor compares the input values sprayers
with the preset values, if changes are detected, the • Windows also operated by the computer
microprocessor sends signals to the actuator o Need to find the balance of how often to
o The actuator activates the sirens or gives a phone have windows open
call or messages the input mobile number. • Blinds that can be computer controlled
Glasshouse o Light sensor measures light intensity
• Temperature controlled the same as central heating o When sun is strong the computer actuates
system electric motors which close blinds
• Humidity must also be controlled • Control in glasshouse is more likely to be used in
o Humidity sensor tells computer how humid it is o commercial areas or large glasshouses not in
gardens
PAGE 31 OF 57
CIE IGCSE INFO.COMM.TECH.
//0417
• Robots are used in many areas of manufacturing, from
heavy work right through to delicate operations e.g. car
bodies, welding bodywork, manufacturing of microchips
etc.
• Control of robots is either through embedded
PAGE 32 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Organising examinations a reference number
o Makes sure that the students are enrolled for the • An email is sent to the customer which they print out as
right exams. their proof of purchase. In some cases, this also acts as
o Prints the exam timetables. their printed ticket when they go to the theatre – an e
o Allots examination rooms and the invigilator. o ticket
Gathers the results and puts them into the student • The database is updated with the transaction
database. Advantages: Disadvantages
• Creating timetables and managing teaching
• The final details are shown on the screen, together with
cover/substitution subject clashes and the number of easily be made changes to and cover
o Considers the student’s choices, hours needed for each subject to with teacher to be substituted.
availability of teachers and rooms, produce accurate timetables that can SCHOOL MANAGEMENT SYSTEMS
ADVANTAGES DISADVANTAGES Bookings can be made any time Computer and reliable internet access
required Sever crashes can result in the
No double booking as very minimal
Digital ticket; printing bookings completely stopping
delay. Immediate booking and
Need for website to be well
selection of seats Set-up and Maintenance expensive
• Absenteeism can be • Operating the software and postage costs designed to ensure ease of
addressed more easily. • will need some training. • reduced/eliminate use
Parents are kept updated. • The initial cost of the d QR codes for No special relation built
Reduced workload for software is expensive. • authentication; no need with booking agent who
teachers. Unauthorised access will for human, can use can give special
• They are helpful for the have to be prevented as scanner; reduced costs promotions etc.
decision making of the there is lots of personal
Booking Systems • An example of online processing
administration department 6.8 • It is used in things like booking seats
in a flight or at a
information.
Real-time (transaction) Processing
• Booking systems are used for transport (flights, trains sent the response to it should be immediate to prevent
and buses), cinemas and theatres any problems (e.g. in booking seats if the response is not
Theatre booking system example: immediate then can cause problems like double
• Customer clicks on performance they wish to see • booking)
They enter date and time of performance and required Real-time Process Control
number of seats • An example of online processing
• A seating display at theatre is then shown on screen and • Very different to real-time (transaction) processing
user clicks where they want to sit • System usually involves sensors and feedback loops
• Database searched to check availability of selected seats. • In real-time process control, physical quantities are
If seating plan shown on screen, this isn’t required • If continually monitored and input is processed sufficiently
seats available, sear numbers are shown together with quickly to influence the input source
total price
• If customer is happy with this, they select
‘confirm’ • The seats are now temporarily set at ‘no
longer available’
• The customer then enters their personal details or
indicates that they are a returning customer • They
select a payment method and make the payment • The
theatre seats are then booked in the customer’s name
theatre
• This type of processing is required so when a query is
PAGE 33 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Although ATMs are very convenient for customers, they
6.9 Banking Applications do have a few disadvantages:
• Online banking systems rely on the ability to update files o Often in places where theft can take place unnoticed
immediately, thus preventing double booking, which o ‘Fake’ ATMs can be set up to gather information
could happen if the system response time was slow about the card and retain the card
• The use of computer technology has revolutionized how o Some banks charge customers for the use of ATMs o
we do our banking transactions, for example: o Someone else could see the PIN being entered and could
Internet banking use it to commit fraud at a later date (also known as
o The use of automated teller machines ‘shoulder surfing”)
(ATMs) o Chip and PIN technology Clearing Cheques
Automated teller machines (ATMs) • The recipient deposits the check to their bank (Bank A),
• Automated teller machines (ATMs) are places where from where the cheque is sent to a clearing centre. • A
customers can get cash (or carry out certain other sorter/reader reads the sort code (unique 6-digit figure),
banking activities such as order a statement) using their cheque number, the account number and amount on
credit or debit car the cheque.
• Depending on the sort code, the cheque is sent to its
SEQUENCE AT ATMWHAT GOES ON BEHIND THE
SCENES respective exchange centre
Customer puts card into ATM
PAGE 34 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Internet Banking o Sensors measure changes in temperature, heart
• Using a username and a password, logging on to a rate, breathing rate, brain activity, blood pressure,
banking site from your computer or smart phone to blood sugar levels and oxygen levels in the patient’s
make payments, transfer money, view statements, apply body.
loans, etc. o The analogue signals from the sensors are
converted into digital signals using an analogue to
TO THE BANK digital converter.
ADVANTAGES DISADVANTAGES o Graphs are produced to show trends over time.
• Patient monitoring:
• Costs reduced, as some of the run online the hospital management system which
branches can be closed. banking. holds all of them, and can be used to
• Fewer employees hence reduced • Redundancy costs have to be paid for access data from all the departments.
wage bill. staffs who lose their job. • Expert systems:
• Less qualified workers are accepted o The readings are constantly o The interactive screen asks a series
which reduces wage costs. compared with the pre-set values, if of question for the doctor to answers,
• Personal services are reduced, so the values aren’t in the prescribed using a keyboard or a touch screen. o
customers may move their accounts. range, the medical staffs are notified. The inference engine compares the
• Loans are easier to lend face-to-face. • Hospital management system: All the symptoms with the knowledge base,
using the rule base to find
• IT officials are needed to set up and above-mentioned points come under
TO THE CUSTOMER matches
ADVANTAGES DISADVANTAGES o The system suggests the possible illness with a
• Travelling costs and time are saved. at the bank. • Cash can’t be withdrawn. how that particular diagnosis was
• Can be accessed 24/7. • Easier way of probability of each, cures and suggested.
tracking balances. recommendations on the next step to • Using 3D printers in medicine:
• Prone to hacking. be taken. o Surgical and diagnostic aids: A CT or
o The explanation system will explain MRI is used to
• Lack of personal service that you get
6.10 Computers in Medicine o Design of medical tools and equipment: Tools can
• Patient records: Database that holds patient details and be made faster and with reduced costs. They can also
can be accessed from any computer within the hospital be made changes to easily, whereas it wasn’t the
intranet. same with traditional methods.
• Patient identification: Barcodes on wristbands of the
patients can be used to access their patient record. •
Pharmacy records:
o Generates labels for drugs
o Checks if the patient is allergic to a particular drug.
produce images of the internal parts of the body. A 3D
printer can then be used to reproduce the internal
organs as a solid object.
o Prosthetics: 3D printers are used to print out
artificial body parts such as false tooth, artificial
limbs, hearing aids, etc. This is a less expensive
method of replacing body parts.
o Tissue engineering: Used to produce layers of cells
to replace damaged tissues.
PAGE 35 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
following describes a computerized library system
6.11 Computers in Libraries based on barcodes
• Many library systems are computer controlled • They • There are two files:
usually involve the use of barcodes on the books being o Book file, containing fields for example: barcode,
borrowed and on the borrower’s library card • The
book title, name of author etc. o Identification of plants, animals and
o Borrower’s file, containing fields for chemical compounds
example: borrower’s number, borrower’s name o Road scheduling for delivery vehicles
etc.
• When a borrower takes out a book, the book’s code is
scanned
• The book details are then found on book file • The
borrower’s library card barcode is then scanned for the
borrower’s unique number
• The book file is linked to the borrower’s file and both
files are updated to indicate which book has been Expert System Setup
borrowed and when it is due back • Experts in the field are interviewed to find out what is
• The borrower’s file is interrogated daily by the computer needed in the expert system
to see which books are overdue for return: • Data is then collected from these experts
o The computer reads a record from the book file o • A knowledge base is designed and then
It compares the date due back with the current date created • The rules base is designed and created
o If the date due back is less than (or equal to) the • The inference engine is designed and created • The
current date (i.e. earlier date) … input screen and output format are also designed and
o …using the barcode number of the book… created – this is known as the user interface • The
o …the book file is linked to the borrower’s expert system is tested against known conditions and
file… o …and the corresponding record is read scenarios
from the borrower’s file • It is also checked to see if it meets the original
o The customer details are then found and a letter specification
or email is automatically sent out
• Experts are interviewed about how effective it is before
o The next record in the book file is then
the expert system goes out on general release
read… o …until the whole file has been Advantages
checked • Expert systems provide consistent answers •
6.12 Expert Systems They never ‘forget’ to answer a question when
• These systems have been developed to mimic the determining the logic
expertise and knowledge of an expert in a particular field • Using expert systems reduces the time taken to solve a
• Examples include: problem
o Diagnosing a person’s illness • A less skilled worker force is needed, which gives the
o Diagnostics (finding faults in a car engine, potential of saving money, but also allows areas of the
finding faults on a circuit board, etc.) world access to expertise which they could not normally
o Prospecting for oil and minerals afford
o Tax and financial calculations
o Chess games
PAGE 36 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Disadvantages
• They tend to lack common sense in some of the
decision-making processes
• Errors in the knowledge base can lead to incorrect
decisions being made
• It can be expensive to set up in the first place • how expert systems appear to use human-like
Considerable training is necessary to ensure the system reasoning when accessing information from the
is sued correctly by the operators knowledge base in an effort to find a conclusion to a
Components of an Expert System given problem
User Interface • The inference engine is a type of reasoning
• This is the only thing that the end user sees • engine Rules base
Allows the user to interact with the system • • This is made up of a series of ‘inference rules’ (e.g. IF the
Often requires training to operate effectively country is in South America AND the language used is
Knowledge base Portuguese THEN the country must be Brazil)
• This is a database designed to allow the complex storage • These inference rules are used by the inference engine
and retrieval requirements of a computerized to draw conclusions
knowledge-based management system (in support of an • They closely follow human-like reasoning
expert system) Suggesting Diagnoses
Inference engine • The interactive screen asks a series of question for the
• This is software that attempts to derive answers from doctor to answers, using a keyboard or a touch screen. •
the knowledge base using a form of reasoning • It is The inference engine compares the symptoms with the
knowledge base, using the rule base to find matches. • • Barcodes are made up of alternating dark and light lines
The system suggests the possible illness with a of varying thickness
probability of each, cures and recommendations on the • A number underneath the barcode usually consists of
next step to be taken. four parts: country code, manufacturer’s code, product
• The explanation system will explain how that particular code, and a check digit
diagnoses was suggested. • The check digit is a form of validation which is used to
6.13 Computers in the Retail Industry make sure no errors occurred during the reading of the
Automatic Stock Control barcode
• Automatic stock control systems rely on the use of • Every time the barcode is read, this calculation is
barcodes performed to ensure that it has been scanned correctly
• Barcodes now appear on most products sold in shops • Electronic Funds Transfer at Point of Sale (EFTPOS) •
They allow quick identification of product details once the Many credit cards are equipped with a chip as well as a
barcode has been scanned by a barcode reader • magnetic stripe – containing the PIN
Supermarkets use electronic point of sale (EPOS) • This system is designed to enhance security since it is
terminals, which incorporate a barcode reader that scans better than relying only on a signature
the barcode, retrieve the price of the article and relay • When paying for items using a chip and PIN card, a form
information back to the computer system allowing it to of electronic funds transfer (EFT) takes place
update its files
PAGE 37 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Paying for a meal example ADVANTAGES DISADVANTAGES
• Waiter inserts card into chip and PIN reader
TO SELLER
• Restaurant’s bank contact customer’s terminated. Otherwise, transaction is Sell goods to customers
bank • Card is checked to if valid authorized • Authorization code is sent anywhere in the world • Cheaper to
• If card is stolen or expired, then to restaurant contact customers (via e-mail) • Site
transaction is terminated • Price of meal is deducted from warehouse where rental is cheap
• Customer enters PIN using keypad customer’s account • Same amount of • Sell goods 24/7
• PIN is read from chip on card and is money is credited to restaurant’s bank • ICT knowledge needed to set up
compared to one just keyed in account website
• If they are the same, the transaction • Receipt is produced as proof of • Unemployment
can proceed • Check is then made on purchase • Business abroad is lost if the prices
whether they have enough funds • If Internet Shopping are cheaper there
there are not enough funds available, • No need to pay rents • No fixed • At times of network failures, there
transaction is working hours • Less/no shoplifting • will be no access
• Not everybody can access the • Customer’s personal data can be • Postal charges discourage people at
internet, so a few customers are lost hacked times
PAGE 38 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• RFID in passports:
o The data on the RFID chip is read when the passport
is scanned.
o A photo of you is clicked which is then compared
with the image stored in the RFID chip.
o If the face-recognition passes, some checks are calls and the exact position from which they were
made in turn to make sure you are eligible to enter the made
country, and if you are, the gate opens automatically. • • Worker monitoring/tracking: Workers are
RFID in contactless payments: monitored/tracked in the following ways:
o The embedded chip on credit/debit cards and the o Supermarket workers: have the number of
antenna enable customers to wave their card over a items passing through the tills over a period of
reader at the point of sale terminals to make time monitored.
payments o Internet use is monitored by network managers:
o Smartphone apps can also be used to they can check sites visited and time spent on that site
make contactless payments. during working hours.
o Emails can be read: Employers can check that
6.15 Monitoring & Tracking Systems no personal mails are sent during office hours.
• Public monitoring/tracking: o Delivery drivers: Their location can be tracked
o Ankle monitor: uses RFID chip to give out the using GPS systems. It can also be checked if they are
person’s location and other details. It is tamper proof following the shortest route and aren’t speeding.
and will alert authorities if tried to remove. • Key logging: Software that records the keys pressed by a
o Phone call tracking: the service provider tracks the user on the keyboard. They are used to find username
and passwords of a user. o Car park management: the system reads the
• Employee call monitors: Allows the employer to listen to registration number and if allowed into the car park,
employee’s telephone calls. There are three ways it can the barrier is raised.
be used: o Electronic toll collection: the system recognizes
o Monitor: The manager/supervisor can listen to the vehicle and deducts the fare accordingly.
calls without the employee or the customer’s Cookies
awareness. o Whisper: The manager can help the • Cookies are small files sent to a user’s computer via their
employee with the call, but the customer can’t hear web browser when they visit certain websites • They store
the manager speak. information about the users and this data is accessed
o Barge: Both the employee and the customer can each time they visit the website
hear the manager • For example:
• Employee call monitors: Allows the employer to listen to o They remember who the user is and send messages
employee’s telephone calls. Call monitors can be used: o such as “Welcome Sarah” each time they log onto the
to improve the employee’s performance website
o to allow the manager/supervisor to join a call o They recognize the user’s buying preferences e.g. if
where necessary a user buys CDs, pop ups related to their buying
o as a training tool habits will appear on the user’s screen each time
• Uses of Automatic Number Plate Recognition(ANPR) they visit the website
systems: • Without cookies, web server would have no way of
o Traffic enforcement: the system can check if a knowing that the user had visited website before • For
vehicle is taxed, recognize cars parked illegally, cars this reason, cookies could be used to monitor one’s
speeding or going through red lights so a fine can be internet activity
imposed.
PAGE 39 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
6.16 Satellite Systems
Global Positioning Systems (GPS)
• Used to determine the exact location of several modes
of transport
• Cars usually refer to GPS as satellite navigation systems The computers onboard can be used to show
• Satellites surrounding the Earth transmit signals to the directions to a destination.
surface Geographic Information Systems (GIS)
• Computers installed in the mode of transport receive • Used to capture, manage, analyse and display
and interpret these signals geographically referenced information.
• Knowing their position on the Earth depends on very o Use to determine distance between two places. o
accurate timing – atomic clocks are used in the satellites Used to find the nearest petrol station or restaurant,
which are accurate to within a fraction of a second per etc.
day o To protect animal and plant life in certain
• Each satellite transmits data indicating its position & vulnerable places.
time o Can be used in geography, science or
• The computer on board the mode of transport calculates engineering lessons.
its exact position based on the information from at least Media Communication Systems
three satellites • Using satellite signals for communication.
Satellite Navigation o Used by media companies when sending
• Used to determine the exact location of a car. o stories/videos/pictures from remote locations.
7. SYSTEM LIFE CYCLE objectives
Introduction with the customer
• A systems analysis team is often brought in to review an 5. Identifying and agreeing
existing system and suggest several improvements • The the customer’s
existing method used may be either a manual paper requirements
based system or a computer-based operation that is no 6. Interpreting the
longer regarded as adequate for the task customer’s requirements
7. Producing a cost-benefit analysis
7.1 Analysis 8. Producing a data flow diagram
• The basic steps in the analysis stage can be summarized
as follows:
1. Fact finding/collecting data from the current
system
2. Description of the
current
system –
establishing the
inputs, outputs 4 Common Methods of Fact Finding
and Observation
processing being • Involves watching personnel using the existing system to
done find out exactly how it works
3. Identification of the • Advantages
problems with the o The analyst obtains reliable data
current o It is possible to see exactly what us being
system done o It is a relatively inexpensive method
4. Agreeing the
PAGE 40 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Disadvantages • Involves sending out questionnaires to the work force
o People are generally uncomfortable being and/or to customers to find out views of the existing
watched and may work in a different way system and find out how some key tasks are carried out •
o If workers perform tasks that violate standard Advantages
procedures, they may not do this while being watched o The questions can be answered quite
Interviews quickly o It is a relatively inexpensive method
• Involves a one-to-one question-and-answer session o Individuals can remain anonymous if they
between the analyst and the employee/customer • want o It allows quick analysis of the data
Advantages • Disadvantages
o It gives the opportunity to motivate the o Often the number of returned questionnaire is low
interviewee into giving open and honest answers to o The questions are rather inflexible since they have
the analyst’s questions to be generic
o It allows the analyst to probe for more feedback o There is no immediate way to clarify a vague
from the interviewee, as it is easier to extend a question or incomplete answer to a question
o It is possible to modify questions as the interview Looking at Existing Paperwork
proceeds and ask questions specific to the interviewee o Allows the analyst to see how the paper files are kept,
It is a good method if the analyst wants to probe deeply look at operating instructions and training manuals, check
into one specific aspect of the existing system • the accounts, etc.
Disadvantages • Advantages
o It can be rather time consuming o It allows information to be obtained which was
o It is relatively expensive, due to the use of not possible by any of the other methods
the analyst’s time o The analyst can see for themselves how the
o The interviewee cannot remain paper system operates
anonymous Questionnaires
of the problem, memory size requirements, type of
input/output devices needed
• Disadvantages
o It can be very time consuming
o Because of the analyst’s time, it is a
relatively expensive method
7.2 Design
• Once the analysis has taken place and the systems
analyst has some idea of the scale of the problem and
what needs to be done, the next stage is to design the
key parts of the recommended system
• A list of tasks is summarized here
o Designing data capture forms/input forms
o Designing screen layouts
o Designing output forms and reports
o Producing systems flowcharts and/or pseudo code
o Selecting and designing validation rules that need
to be used
o Selecting the most appropriate data
verification methods
o Designing and agreeing the file structures and
tables o Selecting and designing the hardware
requirements o Selecting and designing the software
requirements o Producing algorithms or program
flowcharts o Designing a testing strategy/plan
Verification
• A way of preventing errors when data is copied from one
medium to another
• Double entry: data is entered twice, using two different
people
o The computer compares the two entries, either
after data entry or during the data entry process,
and identifies any differences
• Visual check: checking for errors by comparing entered
data on the screen with the data in the original
document (not the same as proof reading)
o It allows the analyst to get some idea of the scale
PAGE 41 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Validation given/acceptable values.
• Process where data is checked to see if it satisfies certain o E.g. A person’s age should be in range > 0 but <
criteria when input into a computer, for example to see 150 • Length Check: Checks if the input data contains
if the data falls within accepted boundaries the required number of characters
• Range Check: Checks whether data is within o E.g. If a field needs six digits then inputting a five- or
seven-digit number, for example should cause an error • Once the file structure has been determined, it is then
message created and fully tested to make sure it is robust when
• Character/type Check: Checks that the input data does the system actually goes live
not contain invalid characters • Since it is important that correct data is stored in files,
o E.g. A person’s name should not contain any there are certain techniques that need to be adopted to
numbers, but a person’s height should only contain digits make sure the data populating the file and database is at
• Format/picture Check: Checks that data is in a specific least of the right type & that it conforms to certain rules
format • Validation routines and verification methods are used to
o E.g. Date should be in the form dd/mm/yyyy • Limit ensure this happens
Check: Similar to range check except that only one of the • Again, routines have to be fully tested to ensure they
limits (boundaries) is checked trap unwanted data but also to make sure any data
o E.g. Input data must be > 10 transferred from a paper-based system to an electronic
• Presence Check: Checks if data is actually present and system has been done accurately
has not been missed out • Any system being developed will have some form of user
o E.g. In an electronic form, a person’s telephone interface
number may be a required field and if no data is • The types of hardware were chosen in the design stage •
present this should give rise to an error How these are used to interface with the final system now
message needs to be identified, for example how the screens will
• Consistency Check: Checks if fields correspond (tie up) be used to collect the data and the way the output will be
with each other presented
o E.g. If ‘Mr’ has been typed into a field called title • If specialist hardware is needed (e.g. for people with
then the gender field must contain either ‘M’ or ‘Male • disabilities), then it will be necessary to finalize how
Check Digit: Look at an extra digit which is calculated these devices are used with the system when it is
from the digits of a number and then put on the end of implemented
the number • This will be followed by thorough testing to ensure the
o E.g. Check digits can identify three types of user screens are user friendly and that the correct
error: ▪ If two digits have been inverted during output is associated with the inputs to the system
input ▪ An incorrect digit entered twice Testing strategies
▪ A digit missed out altogether • Testing of each module needs to be done to ensure each
one functions correctly on its own
7.3 Development & Testing • Once the development of each module is completed, the
• Once the design stage is completed, it is then necessary whole system needs to be tested (i.e. all modules
to create the system and fully test it functioning together)
• This section considers some of the development stages • Even though each individual module may work
and testing strategies which are often adopted by satisfactorily, when they are all put together there may
system analysts be data clashes, incompatibility and memory issues
Development stages • All of this may lead to a need to improve the input and
• If the system contains files (e.g. a database) then the file output methods, file and database structures, validation
structure needs to be finalized at this stage (e.g. what and verification methods
type of data is being stored in each field, length of each • Then the system will need to be fully tested again
field, which field will be the key field, how the data files
will be linked, etc.)
PAGE 42 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• It is a very time-consuming process but the system must
be as perfect as possible before it goes live
• Testing will use many different types of data, which will
fall into one of three categories: normal, extreme or
abnormal
• Let us suppose one of the fields in a database is the date ▪ Non-integer values (e.g. 3.5, 10.75)
and this must be in the form dd/mm/yyyy, where each
element of the date must be numeric: 7.4 Implementation
o Normal: this is data which is acceptable/valid and • Once the system is fully tested, the next stage is to fully
has an expected (known) outcome, e.g. the month implement it
can be any whole number in the range 1 to 12 • We will now consider changeover to the new system in
o Extreme: this is data at the limits of more depth
acceptability/validity, e.g. the month can be either of • There are four common methods used for changing over
the two end values i.e. 1 or 12 from the old system to the new system
o Abnormal: this is data outside the limits of • Each one has advantages and disadvantages which need
acceptability/validity and should be rejected or cause to be weighed up before the most appropriate method is
an error message chosen for a particular application
o For example, all the following values are not
allowed as inputs for the month:
▪ Negative numbers (e.g. -1, -15)
▪ Any value greater than 12 (e.g. 32, 45)
▪ Letters or other non-numeric data (e.g. July)
used there is no need to pay for two sets of staff
o There is less likelihood of a malfunction since the
new system will have been fully tested
• Disadvantages
o This method can be disastrous if the new system
fails Parallel Running
• The old and new systems are run side by side for a time
before the new system takes over altogether •
Advantages
o If the new system fails, the old system is still
available as a back-up
o It is possible to train staff gradually
o Staff have time to get used to the new
system • Disadvantage
4 Common Methods of Changing Systems
o It is more expensive than direct changeover, since
Direct
extra staff are needed to run both systems together
• The old system is stopped overnight and the new system
Pilot Implementation
introduced immediately
• The new system is introduced into one part of the
• Advantages
company (e.g. into a warehouse of a supermarket) and
o The benefits are immediate
its performance assessed
o Costs are reduced - since only one system is
PAGE 43 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Advantages costs are also less than parallel running, since only one
o If the new system fails, only one part of the part of the system is being used in the pilot •
company is affected Disadvantages
o It is possible to train staff in one area only, which is o It is more expensive than direct changeover, since
much faster and less costly than parallel running o The each pilot scheme needs to be evaluated before the
next stage is introduced the system further at some later stage
Phased Implementation • There is some overlap between the two types of
• Initially, only part of the new system is introduced • Only documentation, but the basic requirements are shown
when it proves to work satisfactorily is the next part below
introduced, and so on, until old system is fully replaced • Technical Documentation
Advantages • Technical documentation is designed to help
o If the latest part fails, it is only necessary to go back programmers & analysts who need to make
in the system to the point of failure, hence failure is improvements or repair/maintain to the system •
not disastrous This can consist of any of the following:
o It is possible to ensure the system works o purpose of the
properly before expanding system/program/software o program
• Disadvantages listing/coding
o This is more expensive than direct changeover, since o programming language used
it is necessary to evaluate each phase before moving o flowchart/algorithm
to the next stage o input formats
Comparing Changeover Methods o hardware requirements
CHANGEOVER o software requirements
METHODDIRECT PARALLEL PILOT PHASED RELATIVE o minimum memory requirements
o known bugs in the system
COSTSLow High Medium Medium INPUT o list of variables used (and their
7.5 Documentation meaning/description) o file structures
o sample runs (with test data and results)
• Once the new system is fully developed, a considerable
o output formats
amount of documentation needs to be produced o
For the end user o validation rules
o For people who may need to modify or develop o meaning of error messages
Low* Low Medium Medium
NEEDED BY THE USER
INPUT
NEEDED BY SYSTEMS
TEAM
IMPACT OF
Medium High Low Medium
PAGE 44 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
User Documentation package o how to log in/log out
• User documentation is designed to help users to learn o how to load/run the software
how to use the software or system o how to save files
• This can consist of any of the following: o how to do a search
o the purpose of the system/program/software o how to sort data
o how to do printouts o evaluate the user’s responses to using the new
o how to add, delete or amend records system o compare test results from the new system
o screen layouts (input) with results from the old system
o print layouts (output) o compare the performance of the new system with
o hardware requirements the performance of the old system
o software requirements o observe users performing set tasks, comparing
o sample runs (with test data and results) old with new
o error handling/meaning of errors o measure the time taken to complete tasks,
o troubleshooting guide/help lines/FAQs comparing old with new
o tutorials o interview users to gather responses about how
well the new system works
7.6 Evaluation o give out questionnaires to gather responses about
• Once a system is up and running it is necessary to do the ease of use of the new system
some evaluation and carry out any maintenance, if • Some results from the evaluation may require changes
necessary. to either hardware or software. Hardware may need to
• This is done to ensure the efficiency of the system, the be updated because:
ease of use of the system, and the appropriateness of o of feedback from end users
the system. o new hardware comes on the market, making
• The following is a list of some of the things considered change necessary
when evaluating how well the new system has worked. o there are changes within the company which
This can ultimately lead back to a re-design of part of the require new devices to be added or updated
system if there is strong evidence to suggest that • Software may need to be updated
changes need be made. because: o of feedback from end users
• To evaluate the system, the analyst will: o changes to the company structure or how the
o compare the final solution with the company works may need modifications to the
original requirement software
o identify any limitations in the system o changes in legislation may need modifications to
o identify any necessary improvements that need to the software
be made
PAGE 45 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Personal Data
8. SAFETY & SECURITY • Any data regarding a living person who can be identified
against the data or the data along with any other
8.1 Physical Safety information.
• Examples of personal data:
SAFETY HAZARD WAYS OF ELIMINATING OR o Full Name
MINIMIZING HAZARD
o Home Address
• Use a residual circuit breaker
o Banking details (A/C no, pin, etc.)
(RCB)
ELECTROCUTION FROM SPILLING DRINKS
be used to blackmail
victims of data
breaches
TRIPPING OVER TRAILING WIRES • If personal data is
leaked (data breach),
the following can
HEAVY EQUIPMENT FALLING occur:
o Identity theft
o Bank fraud
o Damages to
personal property
FIRE RISK FROM OVERLOADING
o Kidnapping (if
SOCKETS OR
kidnappers get access
EQUIPMENT
to the victim’s
OVERHEATING
address.
o Etc.
• To prevent the
8.2 E-Safety above, it is essential
• Check insulation on wires regularly that personal data is
protected.
• Do not allow drinks near computers
• Personal data can be
• Check equipment regularly • Cable
leaked intentionally
ducts- make wires safe • Cover
and unintentionally.
wires/tuck them away • Use wireless
Electronic data is at
connections • Strong desk/tables to
risk due to: hacking,
support heavy hardware viruses, spyware,
• Use large desks and tables so that phishing, pharming,
hardware doesn’t fall off edge Smishing, vishing,
• Have a CO2 fire extinguisher nearby ransomware1, spam,
• Don’t cover equipment vents can moderated and
cause equipment to un-moderated
overheat forums, cookies, etc.
• Make sure hardware is fully • If a student shares a
maintained photograph of
• Do not overload sockets with too themselves in their
o Medical history (suffered from
many items school uniform on social media, then
depression, etc.) o Personal data like
paedophiles, child predators,
ethnic origin, political views, criminal
kidnappers, etc. can physically reach the
activity, mental health history,
student. This should not be done
o Sexual orientation and religion can
• E-safety refers to the safety of data and personal
information while using the internet.
• E-safety is required to make sure a user’s personal
information is not made vulnerable and even leaked to
hacker’s for e.g., which can lead to identity fraud, bank
A/C issues, etc.
1
A malicious program that encrypts data on a computer system
and demands for a ransom to provide and decrypt the data
PAGE 46 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Internet Safety
• To keep personal data safe, one must:
o Not give unknown people (on the internet) personal
information or send pictures of oneself to them. o
Maintain privacy settings to control which cookies are
on their computer
o Use learner friendly search engines and websites
recommended by your educational institution, e.g.
Znotes.org
o The website being accessed is from a trusted source,
or has a padlock symbol/ https protocol (s for secure):
user to reveal their age, sex etc.
o Cyber-attacks involving viruses, ransomware, etc.
• Do not download random .exe (executable file formats), ones, or seem too good to be true, for e.g.lotrei.net
.php, .bat, .com etc. instead of lottery.com
• Users should when being redirected to other websites.
• Therefore, technology enables unauthorised users to
gain access to otherwise inaccessible information. • If a
into a contact list to ensure wanted emails are not
filtered out by mistake
Encryption
• The conversion of data to code by encoding
it • Done by using encryption software
• Since data is encoded, it appears meaningless to a
hacker
• This technique prevents illegal access
• Necessary to use decryption software to decode the data
• Banks and organisations will never ask for a PIN to be
entered on website like this. • Used to protect sensitive data e.g. banking details •
Effects of phishing, pharming and Smishing on a user: • Encryption keys are complex algorithms which makes
Personal and sensitive information is lost, which can be codes almost unbreakable
used for previously stated purposes. Computer Viruses
Moderated & Unmoderated Forums • It is a malicious program that replicates itself and is
designed to cause harm to a computer system. They
Online forums are places on the internet where people
spread through downloadable files, external store media
can join discussions on almost any topic and also add their
(e.g. pen drives, etc.)
views.
o May cause the computer to crash
• There are two types of forums: o Loss of files, corruption of the data
MODERATED FORUMS UNMODERATED FORUMS • Viruses infect computers through email attachments,
Spam illegal software or downloaded files
• Spam is electronic junk mail and is a type of advertising
• Prevention of Viruses
from a company sent out to a target mailing list •
o Anti-virus software - Detects and then removes
Harmless but can clog up networks and slow them down
or isolates and use firewalls
• It is more of a nuisance than a security risk
o Do not use illegal software
• Many ISPs are good at filtering out spam, and prevent o Only download from reputable sites
the user from getting these spam emails. The threats of using credit cards online and prevention:
• It is often necessary to put a legitimate email address
• No moderator who checks the • Key logging/spywares: records the
• Has a moderator who checks comments keys pressed on a keyboard.
comments • Spams, rude and offensive o Can be used to obtain credit card
before they are posted • There will be comments present details, passwords and personal
no spams or rude and offensive • Diversions from topic are possible information.
comments o Use virtual keyboards to type in
• Personal information can be
• No diversions from the topic obtained from you • Not secure due to password. o Install anti-spyware
• Highly secure due to moderation lack of moderation software.
PAGE 49 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Bogus sites: sites that look exactly like the original sites, as responses to messages or mails.
but aren’t. • Tasks carried out by firewall:
o They can steal your card details and o Examining ‘traffic’
personal information when you make o Checking weather incoming or outgoing data
purchases. meets criteria
o Always type in URLs, sometimes links in the mails o If data fails the criteria, the firewall blocks ‘traffic’ o
can be of bogus sites. Firewall can keep a list of all undesirable IP addresses o
• Phishing, pharming and Smishing: Helping to prevent viruses or hackers entering the
o They trick you to reveal card and personal details user’s computer
Methods of Internet Security
o Open attachments only from PASSWORDS • Inexpensive, as nothing
trusted sources. o Install other than a
• Hacking into secure sites to obtain
computer is
anti-spyware software. the details: o Encrypting the details required
AUTHENTICATION METHOD will make it of no use to the hacker. • Can be easily hacked
ADVANTAGES DISADVANTAGES o Use strong passwords. • Can be forgotten
o Use firewalls. • Your data is stored remotely SIGNATURE RECOGNITION • Damages will prevent access
• Tapping into wireless and not on your computer, • Highly
networks: so you don’t have control recognized
o Always use a password over the physical security of everywhere
• Very high
controlled Wi-Fi since it is your data.
accuracy
relatively hard to tap into a • Some of the data stored • Easy to use • Relatively low
secured Wi-Fi. may be personal data which storage
*ALL PREVENTION are open to hackers, and requirement
TECHNIQUES WRITTEN HERE have to be encrypted in order
• Problems occur if sign is not
ALSO APPLY FOR THE to prevent hackers from consistent
THREATS IN GENERAL (NOT obtaining them. • High error rate (one in 50)
• Non-intrusive • Very little
SPECIFIC TO CREDIT CARDS) • The company providing the time to
* storage may go out of identify
Cloud Storage FINGERPRINT SCANS • Relatively low expensive
• Intrusive
will have to put in all its efforts and etc.
safety measures in order to keep your Firewalls
business. In this case what has to be
data safe. • A firewall sits between the user’s
done to the data will have to be
• If the company providing the storage computer and an external network
considered.
doesn’t backup your data, you may (internet) and filter information in and
• The company providing the storage lose it in case of power cuts or fires, RETINA SCANS • Very high accuracy
• No known • Verification
way to time is usually
replicate a less than 5 • Very intrusive • Lot of memory needed
person’s seconds for
retina • Very intrusive • Relatively slow to verify storage
IRIS RECOGNITION • Very high accuracy retina scans • Very expensive to install and • Very expensive to install and set up
set up
RECOGNITION inexpensive lighting, person’s hairstyle, age
out of the computer • Non-intrusive • Relatively • Affected by and spectacles
FACE changes in
PAGE 50 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Audience Needs
9. AUDIENCE • After finding out about your targeted audience you need
to aim to meet those demands
9.1 Audience Appreciation • Developers of the ICT product must ensure that they
Knowing Your Audience meet as many of these needs as possible
• When designing ICT solutions, you must consider • Common Needs for Common Audiences:
audience AUDIENCE NEEDS
• There are 4 main characteristics of an • Bright/cheerful colours
audience • Age: • Animations/sounds/pictures
o Can affect audience’s interests in more likely to attract them to your Interesting content
your product o Large fonts and product • Balance of pictures and text • Clear
colours attract children fonts
o More stylish and trendy layout YOUNG CHILDREN
• Bullet points
attracts young adults • Gender • Contrasting/easy-to-read colours •
o Design product for a specific Include clear instructions • Use
gender slightly larger font sizes • Fewer
o Younger girls are often attracted technical terms
to pink TEENS & ADULTS
• Consistent design
o Males generally prefer blue
spectrum • Easy to use
• Income
o Knowing this will help in attractive
pricing strategies o Promoting SENIORS
certain products are targeted for • Less text
people within a specific range of • Simple wording
incomes • Large text
• Interests • Games/activities
o Can help with advertising content • Easy to use
o Content that meets the exact • Attractive/stylish colours •
description of audience’s interest is
Potential Problems
• If products are not built towards a specific audience well
then problems may arise
• An older audience may not be able to understand or
read text due to poor font design
• A younger audience may not be able to understand
certain text due to complex wording & structure •
Several audiences may just not find content interesting
since it is not relevant enough to them
• Several audiences may not find content attractive
enough and thus not purchase or use it at all • Younger
& older audience may not understand how to use the
product due to lack of simple instruction
PAGE 51 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
that are written is copyright law
9.2 Legal, Moral, Ethical & Cultural o It is an automatic right and does not need applying
Appreciation for o The person who owns the rights must be asked
Copyright Legislation before it can be used again
• A law that protects books, music art and other media o Software is a specific thing created and written on
a computer Sometimes it may not be illegal to carry out an act
o Needs to be protected as it is so easy for people however it could be against your morals. For example,
to copy setting up a fake website to deceive is not illegal but
o This is a way of protecting software from being questions your level of morality.
used without permission o Ethics: Is to break a code of conduct. For example,
o Users create a license which determines the terms disclosure of information about the new software to a
and conditions rival software publisher or to the press.
Copyright Laws o Culture: When software is released in different
• It is not legal to make a copy of software, then sell it or cultures then care must be taken so that people are
give it away to other people not offended. If certain computer games mock religion
• Software cannot be used on a network unless a network or cultural beliefs, then again this could cause offence.
license has been acquired
• Not legal to use coding from software in your own 10. COMMUNICATION
software without permission
• Renting out software without permission is illegal •
10.1 Email
It is illegal to use the name of copyrighted software National Laws
• In some countries, emails are monitored or read, thus
without permission
limiting the topics on which you can speak.
Software Protection
Acceptable Language
• Installed software will require a unique reference
• Language used in emails must lie within an acceptable
number
code of practice. The following is a list of unacceptable
• User will have to accept license agreement
content that are beyond the code of practice: o
• Holograms are used to indicate software is original
Obscene images
• Software may only run if CD-ROM or DVD-ROM is
o Abusive language
actually in the drive
o Racist, exploitative and violent messages
• Some software will only run if a memory stick is plugged o Use of illegal materials in messages
in USB ports Copyright
Creating ICT Solutions • Copyright laws apply to text in emails. Forwarding a
• ICT solutions, for e.g. a website should be made in block of text or an image without the copyright owner’s
accordance to the legal, moral, ethical and cultural permission, it would be illegal.
beliefs of the target audience. Employer Guidelines
Implications of ICT Solutions • If the rules in the ‘contract of employment’ set out by
• When creating an ICT solution, all the following have to the employer is not obeyed, you would be in breach of
be considered and the solution must be made in your contract and could be dismissed.
response and respect to these factors: Security
o Legal: Ensure copyright laws are abided by • Emails containing personal information should be
including not using any coding or branding from encrypted to prevent hackers from understanding the
existing copyrighted software. information if they manage to hack into the email.
o Morality: To distinguish from right or wrong.
PAGE 52 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
Netiquette
• Some of the rules that the netiquette contains is:
o Don’t be abusive
o Don’t send spam
o Be precise
o Check spelling and grammatical errors • Companies use email groups to set up meetings. Typing
o Ensure attachments are not too large out individual addresses may leave out a few mail IDs.
o Don’t use CAPITAL LETTERS to highlight
comments o Don’t plagiarize 10.2 Internet Fundamentals
o Don’t use too many emoticons *INTERNET AND INTRANET EXPLAINED IN CHAPTER 4*
User ID and Password Protection • The world wide web (WWW) is a system of interlinked
• Email services are require a user ID to authenticate hypertext documents accessed via the Internet •
users • Passwords should contain alphabets, numbers and Protocols are a set of rules that are followed between
special characters (#,*). the sender and recipient of data which is being
• Email Groups transferred between devices.
• Easier to send out multiple mails by grouping them • HyperText Transfer Protocol (HTTP): A protocol that is
under one name. followed between the sending and receiving devices
• Companies and organization can group people according when data is being transferred using the internet.
to their target group for marketing purposes. • Spammers • HyperText Transfer Protocol secure variant (HTTPS):
can create email groups by buying addresses of people HTTP that is followed when data being transferred is
from a certain company and send in easier ways. encrypted.
• Hyperlink: Data that redirects the user to another • Software allowing users to easily create and edit web
webpage/section of same webpage/file when clicked. • pages without using any web browser
File Transfer Protocol(FTP): Used to upload website files • A wiki will support hyperlinks and has a very simple
to the web hosting space. To upload these files syntax (language rules) for creating pages
successfully, the user needs: • Wikis are described as ‘web pages with an edit
o An FTP client button’ • Anyone can use wikis- content should be
o Login details to the web hosting server (host and treated with caution
port used, username and password for FTP. • Example of a wiki: Wikipedia
Cloud storage: Social Networking
• The storage of data (remotely) on the internet. • This • These sites focus on building online communities of
data is accessible by the user with the requirement of an users who share the same interests
appropriate authentication technique (e.g. user ID and • Enable people to share photos of themselves, their
password). favourite music and videos, what they like to do, what
Search Engine: they like to eat etc.
• A search Engine is used to find information on the • Example: Facebook
internet without knowing the (Uniform Resource • These are becoming the modern way of interacting
Locator) of the webpage holding the information. socially
Blog • They allow people to communicate across the world and
• Personal internet journals where the writer posts their share their interests and views with many people.
observations on a topic
• No training is needed to do this 10.3 Information on the Internet
• Blogs range from minor projects (e.g. people gossiping • Information is more likely to be up to date than in books,
about a topic) to important subjects such as politics or since websites can be updated very quickly
advertising products • Much easier to get information from websites- search
• Comments are not immune from the law engines link key words together and find information
• Bloggers can be prosecuted for offensive comments that matches the criteria- cause for popularity
Wiki
PAGE 53 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Vast amount of information on the internet- easier to Transmission
locate than using indices in books • Files that are smaller in size upload and download faster
• Information on the internet however may be relevant or than larger ones and thus are better for transferring
correct, not reliable, inaccurate or even biased- it does data.
not go through any checking process
• Information overload can make it difficult for the user to 12.IMAGES
find relevant information • An image should be edited when doing so will enhance
• Ensure use of reliable websites that properly cite all their its usefulness.
sources
• Always look for primary sources of information & form 13. LAYOUT
own conclusions • Headers and footers ensure each page has all the
• Do not quote/use secondary often biased opinions or required information like the page numbers, logos, titles,
gossip etc.
• Do your research • A common mnemonic is "An orphan has no past; a
widow has no future"
11. FILE MANAGEMENT
14. STYLES
11.1 Manage Files Effectively
11.2 Reduce File Sizes for Storage or
• Several organisations use a ‘corporate which is used to print on websites,
EXTENSION NAME house style or corporate branding,
FULL FORM USED FOR/IN:
fonts and formats used in the making of ICT solutions by
.CSS Cascading Stylesheet Stylesheets in webpages
visiting cards, letters, etc. It refers to a specific style of
a style and also show
.CSV Comma Separated Value consistency in the ICT
.GIF Graphics Interchange Format solutions created by
.HTM Hypertext Mark-up (Language) the organisation
.JPG Joint Photographic Experts Group
.PDF Portable Document Format 15. PROOFING
15.1 Software
.PNG Portable Network Graphic Tools
Store tabular data • When a
Moving images Webpages
Standard for
images
Documents to be circulated over the
internet/email Compressed
images
PAGE 54 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
a difference in data when it’s being transferred from one
15.2 Proofing Techniques system to another. This tries to make sure data entered
• Verification: checking of data when copied from one is correct, relative to the source.
medium to another to prevent errors.
• Verification is also important and is a way of preventing 16. DOCUMENT PRODUCTION
• Widow: A paragraph-ending line that falls at the Data is only stored once Potential duplication
beginning of the following page or column, thus
separated from the rest of the text. Require more planning Easy to design
• Orphan: A paragraph-opening line that appears by itself
at the bottom of a page or column, thus separated from Non-unique records
the rest of the text.
Harder to change
• Page, section and column breaks are used to ensure that data format.
widows and orphans are not present in a document
(these show poor typography).
• A mail merge document is created in order to create a
standard template and then use it to send documents • At times placeholders for media such as images, sound
personalised (by the computer system) for the bites and video clips are used to enhance the usability of
respective recipient of the document a database
17. DATA MANIPULATION
18. DATA ANALYSIS
17.1 Create a Database Structure
18.1 Create a Data Model
• Flat file databases are tables that have data sorted in
• Charts: A graphical representation of (usually tabulated)
rows and columns, whereas relational databases are
data
several tables grouped together to from a link, thus
• Accurate data ensures the results obtained by the
preventing unnecessary repetition of data.
processing of data is relevant, which is essential to the
• Primary key: The key field of a table which is unique and
usability of the model
identifies each record
• Formulae are mathematical operators defined by the
• Foreign key: The field linked to the primary field of the
user to perform a function, whereas functions are
table linked to through a relationship
predefined logical and mathematical operations a user
Relational database Flat-file database can use in a spreadsheet
• Mathematical operations are performed in the order
Complex queries can Poor at complex queries
PEMDAS (Parenthesis [Brackets] Exponents
be carried out
Multiplication Division Addition Subtraction). Brackets
Better security Poor at limiting access are used to notate data used by a function, e.g. =SUM
(A2:A10).
Cater for future Harder to update, so
requirements inherently inefficient
PAGE 55 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Relative cell referencing is made when the cell reference referenced stays constant when the cell it is referred to
is supposed to change when the cell it is referred to in is in is changing. This aids the preparation of a model when
changing. It aids more efficient designing of models. a set of data is constantly being referred to throughout
Absolute cell referencing is made when the cell the model. Cell reference or relative cell reference
describes how far away a cell or group of cells is from
some other cell in the same spreadsheet. Basically, the • Definitions:
cell’s address o Testing: Checking if the designed model delivers
• A model prepared needs to be tested before being used the expected outcome when tested with data.
to ensure that all results computed are accurate. • o Test data: The input data used for testing model. o
Definitions: Expected outcome: The output a model is supposed to
o Cells: A space for data to be entered a table; a give with the test data.
box formed by the intersection of columns and rows o Actual outcome: The output a model actually gives
o Rows: Horizontal boxes that divide the table in the user when the test data is input.
segments
o Columns: Vertical boxes that divide the table 19. WEBSITE AUTHORING
in segments
o Sheets: A table of data 19.1 Web Development Layers
o Tabs: A module of a database program that holds • Content/Structure layer: Holds the content of the
the tables on the computer, webpage structure.
o Pages: Full pieces of papers that contain • Presentation layer: The layer responsible for the
information held on one sheet of paper. formatting of a webpage(s) or elements (using a
o Ranges: A group of cells in a table stylesheet).
o Named cell: A cell in a table that is given a name (like • Behaviour layer: scripting language of a web page or an
‘profit margin’) and can be referred to using that name. individual element
o Named range A group of cells in a table that are given
a name (like ‘Pricing’) and can be referred to using that 19.2 Create a Webpage
name. • Tables make the basic structure of a webpage and
o Nested formulae/function: A formula/function organise page layout.
used inside a formula/function as an argument • Anchor: An element in a webpage that creates a
hyperlink between a source anchor and a destination
18.2 Test the Data Model anchor. These can be used to link 2 resources together.
• A model prepared needs to be tested before being used • Relative file paths are used for attached stylesheets as
to ensure that all results computed are accurate. The the stylesheet is going to be stored on a server in the
test plan must be justified to be apt for the model. E.g. same directory as the webpage, and not where it an
all the mathematical operations must be tested in a absolute file path says.
model that relies on calculations.
PAGE 56 OF 57
CIE IGCSE INFO.COMM.TECH. //0417
• Definitions:
o Relative file path: A path referring to a file in the
same directory relative to the page the reference is
made in. o Absolute file path: The full path of a file,
which is not relative to anything, whereas relative links
only point to a file or a file path, the browser then
redirects the user to that location on the current site.
▪ Absolute paths always include the domain name of
the website
▪ These should not be used to refer to locally saved
webpages as the computer the webpage is stored on
(the server) is not the same as where the webpage
was developed and thus an absolute file path would
point to the wrong address.
PAGE 57 OF 57