Network 2
Network 2
ORG
CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for NELSON for personal use only.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by NELSON at Muthangari International school on 14/01/25.
CAIE IGCSE ICT
Differences and similarities: Disadvantages:
Bluetooth uses a transmission frequency of 2.4 GHz, A stable internet connection is always required.
whereas Wi-Fi uses a 2.4 – 5.0 GHz range. Data storage in clouds may be vulnerable to security
Wi-Fi has a much faster data transfer rate. breaches.
Wi-Fi has a higher geographical range in which it is The user depends on the storage provider for reliability
effective. and availability of services.
Bluetooth only allows up to 7 devices to be connected The services may become expensive as the amount of
simultaneously, whereas the number of devices storage or bandwidth required increases.
connected to a Wi-Fi network depends on the
router/routers used. Common Network Environments
Bluetooth uses key-matching encryption. However, Wi-Fi
uses WPA (Wi-Fi protected access) and WEP (wireless 1. Internet:
equivalent privacy).
The Internet is a very large global network that consists
Cloud Computing of many other interconnected networks
The World Wide Web is a vast collection of web pages
This method is where data is stored on remote servers that can be accessed using a web browser.
accessed online. The World Wide Web allows you to access information
The three types of cloud storage are: by using the internet
Characteristics:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by NELSON at Muthangari International school on 14/01/25.
CAIE IGCSE ICT
A private network that is accessible to employees within 1. Local Area Network (LAN): networks usually
a company or organization. contained within a single building or small
Usually behind a firewall to ensure security. geographical location. It is made up of hubs and/or
Allows for document sharing and the use of switches, which will connect several devices together.
collaboration tools between users. One hub or switch commonly connects to a router,
It can be customized to meet the specific requirements allowing LAN connectivity to other outside networks
of the business. such as the Internet.
Users will require a username and password to access
the Intranet. Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by NELSON at Muthangari International school on 14/01/25.
CAIE IGCSE ICT
The strength of their signals can be affected by obstacles Connection to a network exposes a user to:
such as walls. Hacking: Unauthorized access given to the
Speeds can be affected by high-traffic areas. computer. This can lead to identity theft or the
It can sustain interference from other devices which can misuse of personal information.
affect performance and connectivity. Phishing: Phishing involves getting sensitive
Can be vulnerable to security threats due to signal information, such as usernames, passwords, and
interception. credit card details, for malicious reasons by
mimicking a reliable webpage on the network
3. Wide Area Networks (WAN): is formed by several Pharming: This is malicious code installed on a user’s
LANs connected through a router. It is expensive. computer or a web server; the code will redirect the
However, it comes with a more enhanced security. user to a fake website without their knowledge (the
Additional hardware is needed for a WAN: Routers, user doesn’t have to take any action, unlike phishing).
modems, and proxy servers. Viruses: Program code that replicates (copies itself)
Advantages: to delete or corrupt files and cause the computer to
malfunction
Provide the ability to connect geographically dispersed
locations, such as offices in different cities or countries. Passwords
Offer the flexibility to scale up or down based on the
organisation's needs. It is a common form of security often accompanied by a
Administrators can monitor and manage the network username or email address.
infrastructure from a single location. There are many ways to enhance the security of your
Disadvantages: password, such as the following:
Ensure that the password is changed regularly in case
Setting up and maintaining a WAN can be expensive, it has been obtained illegally or accidentally
especially compared to LANs. Ensure that the password uses a combination of
Cover larger distances and rely on public networks or uppercase, lowercase, numbers and special
leased lines, which can introduce latency and affect characters to make the password more difficult to
performance. guess.
WANs are subject to the reliability and availability of iloveict is a weak password
external service providers. 1lov3ICT# is a strong password
Anti-spyware software can be run regularly to ensure
1.2. Network Issues and that your information, including your password, is not
passed to an unauthorized third-party user.
Communication
Other Authentication Methods
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by NELSON at Muthangari International school on 14/01/25.
CAIE IGCSE ICT
1. Zero login: A security concept that eliminates Comparing the scanned files against an extensive
traditional login methods, such as usernames and database of known threats
passwords, using biometrics or other authentication Real-time scanning
factors for seamless and password-less access. Regular updates to gather an up-to-date list of known
2. Biometric Recognition: These authentication threats
methods use unique physical or behavioural Quarantine of infected files
characteristics, such as fingerprints, iris scans, or Quarantining files allows threats to be automatically
voice recognition, to verify a person's identity. deleted.
3. Magnetic Stripes: These are authentication features Allows the user to determine if the file is a legitimate
on cards storing data magnetically. They enable threat and not a false positive.
secure identification and authorization by containing
encoded information that magnetic stripe readers Heuristic Checking: Instead of relying solely on a database
can read. of known viruses, this method looks for behavioural patterns
4. Smart Cards: Smart cards are portable devices with and other features in a file to identify possible risks.
integrated circuits to store and process data. They
are used for authentication, identification, and secure Electronic Conferencing
transactions in various applications such as banking,
telecommunications, and access control. 1. Video Conferencing: It is a form of audio and video
communication. It serves as a stand-in for face-to-
5. Physical Tokens: It is a type of authentication that
face meetings between several persons who may
takes the shape of a solid object. The user
reside abroad or in another region of the country. It
demonstrates ownership of the token through
interaction with a login system. Physical tokens have utilizes a network in some way and is done in real-
embedded clocks that create one-time passwords time.
(OTPs) when a PIN and other authentication The basic hardware includes:
information are entered.
6. Electronic Tokens are applications that users install webcams,
on their hardware, such as smartphones. Say a large monitors/television screens,
person wants to access a website on a tablet microphones,
computer. To access this website, users must first speakers.
authenticate themselves using electronic tokens. The
user has already set up the electronic token app with The software used are:
their smartphone. The user launches the app on their Webcam and microphone software drivers
smartphone when the website asks them to verify CODEC (coder and de-coder)
their identity. The program creates an OTP that is Echo cancellation software
only good for a short period of time.
Advantages:
Anti-malware Software
It is much easier to access important documents or bring
Anti-malware software is designed to protect devices in ‘experts’ at key parts of the conference.
against viruses and malicious software. It has 3 primary It is possible to hold conferences at short notice.
purposes: detect, prevent and remove malicious Reduced travelling costs.
software. It is installed onto a computer system and will There is no need to pay for hotel accommodation or
operate in the background. venue hire.
Reduces the cost of taking people away from work for
Standard features of Anti-Malware software include the two or three days to travel.
following: Using video conferencing is better than having delegates
travel to potentially unsafe places worldwide.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by NELSON at Muthangari International school on 14/01/25.
CAIE IGCSE ICT
Advantages:
Potential time lag in responses/delays when talking.
Images can jerk. Allows participants to see each other through video,
It is very expensive to set up in the first place. providing a more immersive and engaging experience
Problems if the delegates live in different countries with than audio conferencing.
large time zone differences. Often offer screen sharing capabilities, enabling
Requires IT knowledge to some extent. participants to share presentations, documents, or other
It's not the best for people who consider travelling a job visual content in real-time.
perk. Often provide features like chat, polling, hand raising,
Completely reliant on stable internet connections. and Q&A sessions, fostering interactivity and
engagement among participants.
2. Audio Conferencing: Meetings held using audio
(sound) technology are called audio conferencing. Disadvantages:
The normal telephone network can be used for audio
conferencing, frequently called a phone conference. Heavily relies on internet connectivity and technical
infrastructure.
The hardware required is: They can be susceptible to distractions and multitasking.
It often has various features and settings that
a computer (with built-in microphones and speakers) participants need to familiarize themselves with,
external microphone and/or speakers especially if they are new to the platform.
an internet phone
a standard phone.
Advantages:
Disadvantages:
3. Web Conferencing:
Web conferencing, often known as webinars or
webcasts, makes use of the Internet to enable
conference calls. This system makes use of numerous
computers that are interconnected over the internet.
It operates in real-time, just like video conferencing,
and enables the following meeting types:
» business meetings to discuss new ideas
» presentations
» online education or training.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by NELSON at Muthangari International school on 14/01/25.
CAIE IGCSE
ICT
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by NELSON on Tue Jan 14 2025 for strictly personal use only.
These notes have been created by Bisma Hammad for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).