0% found this document useful (0 votes)
13 views14 pages

Only Contain CH 6 and 8

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views14 pages

Only Contain CH 6 and 8

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Only Contain Ch 6 and 8

CAIE IGCSE ICT

Distracts the audience from the sole content of the


presentation
1. ICT Applications It is very easy to make a presentation with too many
features
1.1. Communication
Media streaming
Newsletters and posters Real-time transition of audio and video les over the

fi
internet
Paper-based communication is used to inform people
allows users to access content without downloading it to
about their interests
their devices
Schools use these to inform parents about events/dates
popular services include Spotify, YouTube, and social
Advantages
media websites
Released regularly
uses bu ering, which makes sure the video plays back
The recipients have a permanent copy

ff
smoothly without freezing. While the bu er receives data
Disadvantages

ff
packets, it sends previously received ones to the playback
Requires distribution

s
device so that there are no gaps in the played data
There are no special e ects, sound/video/animation

e
Advantages
ff
There are printing costs, paper/ink
Users can access any information at any time and

t
The targeted audience may or may not receive the
from any location
information

o
O ers an extensive library of content

ff
N
Compared to traditional cable or satellite TV
Websites
subscriptions, media streaming can be more cost-
Collection of webpages, text, graphics, video, and sound e ective

d
ff
Disadvantages
Hosted on a web server on the internet

a
Need to write code or use a web authoring application Heavily relies on a stable and high-speed internet
connection.

w
Hyperlinks to other pages can be added
Interactive websites require programming knowledge Not all content is available on every streaming

a
Can use a camera, scanner, and microphone to input data platform due to licensing agreements and exclusivity

F
Usually, hire space from the web hosting company deals.
Advantages You don’t own the media when streaming media, so if
Ability to add sound/video/animation the streaming service removes a movie or a TV show

n
Links to other websites/hyperlinks from its library, it may no longer be accessible to you.

a
The use of hot spots
ePublications

y
Buttons to navigate/move around the website
Hit counters to see who has visited the websites

y
digital versions of printed materials, such as eBooks,
worldwide advertising capability
eMagazines, and eNewspapers.

a
Disadvantages
It can be read on electronic devices.
Can be hacked and modi ed, or viruses introduced

R
Advantages
fi
Need for a computer and internet connection
aid portability
Lack of portability compared with the paper-based
they are often more a ordable than paperback books.
system
ff
O er interactive elements that enhance the reading
Need to maintain the website once it is set up
ff
experience.
Disadvantages
Multimedia Presentations
reading from an electronic device for a prolonged
Uses a mixture of media to present information: time can cause eyestrain
animations, video, sound, transitions, hyperlinks ePublications lack the tactile experience and physical
Produced using software packages presence that some readers enjoy
Used with a projector so a large audience can view compatibility issues can arise if the ePublications is in
a format that is not supported by the reader's device
Advantages
Use of sound and animation/video e ects or software
ff
Interactive/hyperlinks built into presentations
More likely to hold the audience’s attention Mobile Communication
Disadvantages
Mobile devices support many forms of communication, such
Need for special equipment – expensive
as:
It may require internet access

WWW.ZNOTES.ORG
Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

1. Short message service (SMS) messaging: permits 3. Flood water management: Computer modelling plays a
extremely quick communication with another person via vital role in ood water management by simulating water ow

fl
fl
typing on a keyboard (a mobile phone or tablet's keyboard is behaviour, predicting ood extents, and assessing potential

fl
frequently virtual). Its bene t is that the recipient can get the ood risks. It helps design and optimise ood mitigation

fi
fl
fl
text whenever they choose without being available. measures, such as levees and oodplain zoning, allowing

fl
2. Phone calls: Making calls while on the go is among the authorities to make informed decisions, develop e ective

ff
most fundamental applications of a mobile phone. Mobile emergency response plans, and minimize the impact of
phones are the perfect method to stay in correspondence ooding on communities.

fl
anywhere there is a network signal because they are 4. Tra c management: Computer modelling simulates and

ffi
compact and have an independent battery. analyses tra c ow, predicts congestion patterns, and

ffi
fl
3. Voice over Internet Protocol (VoIP): a communication optimises tra c control strategies. It aids in designing

ffi
technique for Internet users. VoIP transforms sound captured e cient road networks, optimizing signal timings, and

ffi
by the built-in mic of the cell phone into individual data evaluating the impact of transportation infrastructure
packets that may be transmitted via the internet to their projects. This enables authorities to make informed
intended recipient. decisions, alleviate congestion, and improve overall tra c

ffi
4. Video calls: enables real-time video conversing between e ciency for better urban mobility.

ffi
s
multiple participants with a camera-enabled device. Uses an 5. Weather forecasting: Computer modelling plays a pivotal
internet connection or cellular data. Software that may be role in weather forecasting by simulating the Earth's

e
used for video calling includes FaceTime, Skype, and Zoom. atmosphere, oceanic conditions, and other environmental

t
5. Accessing the Internet: Another helpful feature is accessing factors. These models use complex algorithms to predict

o
the net from a mobile device. Any mobile device with a weather patterns, including temperature, precipitation, wind
wireless broadband connection or a mobile phone network speed, and storm systems. By assimilating real-time data,

N
can link to the internet. computer models provide forecasts that aid meteorologists in
predicting weather conditions, issuing warnings, and helping

d
1.2. Modelling Applications society prepare for potential hazards.

a
Advantages of using computer modelling rather than
Advantages of using models:

w
humans:
It can provide more precise and accurate results than

a
using models is less expensive than having to build the
real thing human-based methods, minimizing errors and

F
safer to use a computer model increasing reliability.
allows you to try out various di erent scenarios in Can analyze large amounts of data and perform
complex calculations faster than humans
ff
n
advance
nearly impossible to try out some tasks in advance in real It can be reused and updated easily, reducing the

a
life due to high risk need for repetitive manual analysis and potentially

y
faster to use a computer model than to do the real thing lowering costs in the long run.
Disadvantages of using computer modelling rather than

y
Disadvantages of using models: humans:

a
It may overlook nuanced factors or intangible
a model can’t be completely reliant as the output is

R
elements that humans can consider, leading to
entirely based on the input potential gaps or inaccuracies in the analysis.
frequently, computer modelling can be a very costly Based on assumptions and simpli cations, introducing
option
fi
a level of uncertainty.
human reluctance is a common problem in this Their programmed algorithms and data inputs bind
technology models. They may struggle to adapt to unforeseen
circumstances or rapidly changing conditions that
Some of the applications of computer modelling include:
humans can more readily navigate and respond to.
1. Personal nance: Computer modelling involves using
fi
mathematical algorithms and data analysis to simulate
various nancial scenarios, such as investment strategies, 1.3. Computer-controlled Systems
fi
retirement planning, and risk assessment, aiding individuals
in making informed decisions and optimizing their nancial Robotics in manufacturing: involves using automated
fi
goals. machines to perform tasks such as assembly, welding,
2. Bridge and building design: Computer modelling is crucial and packaging. These robots are designed to mimic
in bridge and building design. It allows engineers to simulate human actions with precision and speed, increasing
and analyze structural behaviour, assess load capacities, and productivity and quality control. They o er bene ts like
ff
fi
predict the response to external forces. It aids in optimizing enhanced worker safety, improved e ciency, and the
ffi
designs, ensuring structural integrity, and minimizing ability to handle repetitive tasks, revolutionizing the
potential risks before construction begins. manufacturing industry.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

Advantages: Advantages:
can work in environments that may be harmful to Absenteeism can be addressed more quickly.
humans Parents are kept updated.
can work non-stop Reduced workload for teachers.
low running costs, majorly due to reduced employees; Disadvantages:
thus less wages need to be given Operating the software will require training.
have higher productivity The initial cost of the software is very high.
provide greater consistency Unauthorized access will have to be prevented as
can do long, boring, tedious tasks there is lot of personal information
can carry out di erent tasks by tting them with Learner registration and attendance
ff
fi
di erent-end e ectors ID cards with magnetic tapes: The students will have
ff
ff
Disadvantages: to swipe their ID cards, which contain the student’s
robots nd it di cult to do unusual tasks name, school’s name, date of birth and the
fi
ffi
can cause higher unemployment registration ID when they enter and leave the school;
robots do many of the tasks once done by humans, this way, time is saved, and the attendance is more
leading to deskilling accurate.

s
robots are independent of the skills base; factory Biometrics: Every student’s ngerprint is stored on a

fi
headquarters can be moved internationally database along with their personal information, the

e
initial set-up and maintenance of robots can be students must put their nger on a ngerprint scanner

t
fi
fi
expensive to enter or leave the school premises.

o
Production line control: Computer-controlled systems in Advantages of biometrics over magnetic ID cards
production line control involve using computers and Unique ngerprints disable attendance forgery

fi
N
software to monitor, coordinate, and optimize Portability makes them easy to lose
manufacturing processes. These systems ensure e cient Easy to be stolen due to small size
ffi
d
coordination of machinery, manage inventory, track ID cards can be easily cloned
production metrics, and automate tasks. They enable Disadvantages of biometrics over magnetic ID cards

a
real-time data analysis, error detection, and adjustment, It is time-consuming for all ngerprints to be

w fi
improving productivity, reducing downtime, and individually collected

a
enhancing overall operational e ciency in the production Expensive equipment is required to read ngerprints
ffi
fi
line. If the nger is cut/damaged, the ngerprint won’t be

F
fi
fi
Autonomous vehicles: Self-driving cars and drones guided readable, and access will be denied.
by computer algorithms. There is an invasion of privacy in storing ngerprints

fi
n
enhance safety on a school database.
reduce tra c congestion Learner’s performance

a
ffi
increase fuel e ciency Spreadsheets can be used to record students’

y
ffi
Advantages of using computer-controlled systems rather performances. It is easier to compare each other’s

y
than humans: performances and an individual student’s
increased e ciency and productivity performance over the academic year.

a
ffi
greater consistency Computer-aided learning

R
ability to work in any environment The use of computer-based technologies to help
reduced human error students acquire academic material is known as
can work with large or delicate items computer-aided learning (CAL). They are meant to
Disadvantages of using computer-controlled systems supplement classroom instruction, not serve its
rather than humans: purpose. Students will take online assessments to
very high instalment costs track their progress while learning on computers.
very high maintenance costs Although CAL cannot consistently assist a student with
dependency on reliable an issue, in certain circumstances, students would
lack of exibility need to get other aid.
fl
requires costly backup systems
1.5. Booking Systems
1.4. School Management Systems
These web-based platforms and applications allow users to
Computer-controlled School Management Systems: reserve and purchase tickets or services for various events
Comprehensive software applications that automate and industries. Some of the applications for online bookings
administrative tasks, such as attendance tracking, grading, include:
scheduling, and student information management, improving 1. Travel industry: Booking ights, hotels, and holiday
fl
educational institutions' e ciency, accuracy, and packages provides a convenient platform for travellers to
ffi
organization. plan and book their trips.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

2. Concerts: Reserving tickets for live music events allows What goes on behind the
Sequence at ATM
music fans to secure their spot at popular concerts. scenes
3. Cinemas: Booking movie tickets in advance enables Several options are given:
cinema-goers to reserve seats and avoid queues. change PIN, pay in cheques,
4. Sporting events: Purchasing tickets for sports matches and pay a bill, see balance, get
competitions o ers sports enthusiasts an easy way to attend
money
ff
their favourite events.
The customer selects the
Advantages: cash option & several cash
convenience and accessibility options are shown
instant con rmation and ticketing The customer’s account is
fi
ability to compare prices and options accessed to see if they have
promotions and personalized o ers su cient funds, it is checked to
ff
ffi
faster to change/update see if they are withdrawing
The customer accepts one of
automated reminders via email/text more than their daily limit.
the options or types in a
repeated bookings can be easily made If the limit is not exceeded and
di erent amount
cost-saving as there are fewer wages due to reduced

s
all other checks are OK, then

ff
sta requirements the transaction is authorized,

e
ff
Disadvantages: and the machine then counts

t
potential for technical issues out the cash
possible security and privacy concerns

o
The customer is asked if they
transaction and booking fees want a receipt

N
impersonal customer service
The card is returned
dependent on a stable internet connection
can lead to unemployment Money is dispensed Customer’s account is updated

1.6. Banking Applications

a d
Advantages:
possible to withdraw at any time of the day

w
o er many banking services without having to go to

a
Online banking systems depend on the ability to update
ff
the bank
les instantly to avoid double scheduling, which might

F
possible to access an account from anywhere in the
fi
occur if the system reaction time is slow.
world
The use of computer technology has revolutionized how
usually provides quicker service than waiting in a

n
we do our banking transactions, for example:
queue at a bank
Internet banking

a
Disadvantages:
The use of automated teller machines (ATMs)
often in places where theft can take place at night

y
Chip and PIN technology
potential for shoulder sur ng

y
fi
some banks charge customers for using ATMs
Automated Teller Machines (ATMs)

a
cash withdrawal limits are often imposed on people

R
Automated teller machines (ATMs) are places where
customers can get cash (or carry out certain other banking Electronic Funds Transfer (EFT):
activities, such as ordering a statement) using their credit or
It is possible to send money transfer instructions directly to a
debit card.
bank's computer system via electronic funds transfer (EFT)
What goes on behind the
Sequence at ATM technology. The system depends on electronic money
scenes
transfers between accounts; no cash is moved. The computer
Customer puts card into Contact is made with bank’s system automatically moves the requested amount from one
ATM computer account to another when it receives an EFT command.
PIN is checked to see if it is
correct Advantages:
Card is checked to see if it is very secure payment method
PIN is entered using the valid very quick payment method
keypad The transaction is closed if the less expensive than cheques
card is stolen or the number of the customer has the right to dispute an EFT payment
for up to 60 days
PIN attempts allowed is
Disadvantages:
exceeded.
the bank transaction can’t be reversed without full
dispute investigations
customer needs to have funds available immediately

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

cannot guarantee the recipient’s identity Advantages:


convenience and availability
Credit/debit card transactions easy account management
branch visiting won’t be a requirement
Several credit/debit cards come with a magnetic stripe and a interest rates may be better
chip; the chip houses essential data like the PIN. This more accessible to shop around for the best account
technique is intended to increase security because it is Disadvantages:
superior to a signature. A chip and PIN card to make security of transactions
purchases is an example of an electronic funds transfer (EFT). requires a reliable internet connection
More risk of fraud
Advantages of credit cards:
Easier to make errors
customer protection if ordered goods don’t arrive
Physical cash can't be deposited/withdrawn
internationally accepted payment method
interest-free loan if money is paid back within the
agreed time period 1.7. Computers in Medicine
can make purchases online
Disadvantages of credit cards: Information Systems in Medicine

s
can be charged high interest rates

e
annual fees often apply Patient records: Healthcare professionals maintain
databases to communicate information between them

t
easy to end up with credit damage
security risks in online transactions and pharmacists (for instance, to guarantee no

o
Advantages of debit cards: medications are administered that interact dangerously

N
money comes from the user’s current account, there with one another).
is no interest Pharmacy records: Pharmacy records maintain a
safer than carrying cash comprehensive record of patient prescriptions. This

d
can make online purchases includes details like the prescribed medication, dosage,

a
Disadvantages of debit cards: quantity dispensed, prescribing physician's information,
less customer protection if goods don’t arrive and the date of dispensing. These records help track

w
no credit allowed; funds are needed at the time of medication usage and can be used to verify prescription

a
purchase accuracy and detect potential drug interactions or

F
security risks in online transactions allergies.

Cheques 3D Printers

a n
Individuals and organizations use cheques as a form of
payment. When issuing a cheque, the payer writes the
Using 3D printers in medicine:
Prosthetics: 3D printers print out arti cial body parts

y
fi
recipient's name, the payment amount, and the date on the such as false teeth, arti cial limbs, hearing aids, etc.
fi
y
cheque. The recipient then deposits or presents the cheque This is a less expensive method of replacing body
parts.

a
to their bank for processing. The payer's bank veri es the
Tissue engineering: it is the eld of combining cells,
fi
fund’s availability, and upon clearance, the speci ed amount

R
fi
biomaterials, and engineering principles to create
fi
is transferred from the payer's account to the recipient's
account, completing the transaction. functional tissues or organs, aiming to repair or
replace damaged or diseased tissue in the human
Advantages: body.
more convenient and safer than cash Arti cial blood vessels are synthetic structures
fi
can be post-dated designed to mimic the function of natural blood
can be traced if they are lost vessels, facilitating the ow of blood and nutrients
fl
Disadvantages: throughout the body to support tissue repair and
aren’t legal tender and can be refused regeneration.
slow method of payment Customized medicines are personalized drug
easier for fraudsters than other methods formulations tailored to individual patients' speci c
fi
relatively expensive payment method needs. They utilize advanced technology and precise
measurements to create medications with accurate
Internet Banking dosages and unique compositions, optimizing
treatment outcomes.
Enable online access to banking services via a secure website
or app, allowing for transfers, bill payments, account
management, and more.
1.8. Expert Systems

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

It is an AI-based computer program that emulates the How an expert system is used to produce possible
decision-making capabilities of human experts. It uses solutions
knowledge and rules to provide accurate advice or solutions
in a speci c domain. Below is an example of how an expert system works to
fi
Examples include: diagnose a medical issue:

Diagnostics The interactive screen asks questions for the doctor to


Mineral prospecting answer using a keyboard or a touch screen.
Tax and nancial calculations The inference engine compares the symptoms with the
fi
Strategy games knowledge base, using the rule base to nd matches.

fi
Identi cation of plants, animals and chemical compounds The system suggests the possible illness with a probability
fi
Route scheduling for delivery vehicles of each, cures, and recommendations on the next step.
The explanation system will explain how that particular
diagnosis was suggested.

1.9. Computers in the Retail Industry

e
Point of sale (POS) terminals: Computerized systems used at
checkout counters to handle purchases and oversee stock. It
s
t
is extensively used in retail stores to process sales

o
transactions. They enable quick and secure payment

N
processing through various methods, including cash,
credit/debit cards, mobile payments, and digital wallets. POS
terminals calculate totals, generate itemized receipts, update

d
inventory, and provide real-time sales data for e ective
Components of an Expert System

ff
business management.

a
1. User Interface

w
Some features include:
This is the only thing that the end user sees
update stock les immediately

a
Allows the user to interact with the system
fi
track inventory levels in real-time

F
Often requires training to operate e ectively
prevent stock discrepancies and ensure accurate
ff
2. Explanation system records
monitor inventory levels and reorder when stock is

n
Informs the user of the reasoning behind the expert lower than a prede ned value

a
fi
system’s conclusions streamline supply chain management and minimize

y
It will supply a conclusion and any suggested actions to stockouts
take

y
It will also give the percentage probability of the accuracy Electronic funds transfer at Point of sale (EFTPOS) terminals:

a
of its conclusions Devices for processing electronic payments; they allow
customers to make payments using debit or credit cards by

R
3. Inference engine securely transferring funds from their bank accounts. EFTPOS
terminals authenticate and authorize transactions in real-
The main processing element of the system
time, providing convenience and security for customers and
It acts like a search engine examining the knowledge base businesses during retail purchases.
Responsible for gathering information The process of checking credit and debit cards at a
This is the problem-solving part of the system supermarket EFTPOS is much the same as was described for
Attempts to use information gathered from the user to
paying a restaurant bill in Section 6.6.
nd a matching object
Some functions of EFTPOS include:
fi
4. Knowledge base Use of chip and PIN cards:
It is a repository of facts Enhance security with two-factor authentication
stores all the knowledge about an area of expertise Require customers to enter a personal identi cation
fi
a collection of objects and their attributes number (PIN)
Use of contactless cards:
5. Rules base Allow for faster transactions
Enable customers to tap their card on the terminal
The rules base is a set of inference rules. Use of Near Field Communication (NFC):
Used by the inference engine to draw conclusions
They follow logical thinking

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

Facilitate payments through smartphones and other Used at POS terminals for scanning and reading the
devices information stored in barcodes.
Increase convenience for customers Many digital devices have OMR scanners, which may be
Communication between supermarket computers and used to scan QR codes.
bank computers: Advantages:
Share transaction details securely very fast way of inputting the results of a survey
Enable instant payment processing and veri cation more accurate than keying in data

fi
more accurate than OCR methods
Internet Shopping Disadvantages:
designing the forms is a very complex job
Characteristics of Internet Shopping: there can be problems if they haven’t been lled

fi
correctly
Online stores accessible through web browsers
often only work with black pens or pencils
A wide variety of products and services are available
Convenient and often open 24/7 2. Optical Character Recognition (OCR)

Advantages (To customer) : Automatic Number Plate Recognition (ANPR) systems:

s
The sensor sends a signal to instruct a camera to
access to the global market

e
capture an image of the front of the vehicle
comparison between di erent products e ortlessly
An algorithm is used to locate and isolate the number

t
ff
ff
can shop from anywhere in the world
plate from the image taken by the camera.

o
able to avoid queues and busy stores
The brightness and contrast of the number plate are

N
Advantages (To business) : rst adjusted. Each character on the number plate is
fi
then segmented.
can target prices and services based on buying data Each character is then recognized using OCR

d
can update stock availability and prices more quickly than software. The characters are converted into a string of

a
a physical store editable text by the software.
cheaper to publicize special o ers This text string is then stored in a database.

w
ff
international customer base A barrier is raised, and the motorist is issued with a

a
increased pro ts due to lower sta ticket. The ticket shows the date and time of entering
fi
ff
F
the car park.
Disadvantages ( To customer): When the car returns to the car park, they insert their
ticket into a machine that calculates their charges and
security concerns

n
registers the payment into the database.
can’t correctly examine products before purchase

a
occasionally, products may take weeks before being Advantages:
Used to automatically monitor the average speed of

y
delivered
vehicles over a stretch of road.
additional shipping and handling costs

y
There is no need to employ a car park or security
lack of face-to-face interaction with sta

a
guards.
ff
Disadvantages ( To business): It's a much faster system than checking a ticket at the

R
exit.
increased competition It can automatically control the entry and exit to a car
digital fraud and security concerns park or private roads.
technical issues and downtime It can be used as a security system to prevent illegal
costs of delivery and return parking.
fake negative reviews can lead to a lousy company It can be used to analyze driver behaviour.
reputation It can be used in inner-city congestion charging
systems.
1.10. Recognition Systems Disadvantages:
A lack of manned security car park surveillance could
1. Optical Mark recognition (OMR) media in schools: lead to vandalism.
There could be an invasion of privacy due to recording
School registers: Paper-based registers are fed into OMR drivers’ number plates.
to be scanned and stored in a database. Damaged or very dirty number plates will not be
Multiple-choice examination papers: The position of a recognized.
mark is stored in a computer’s memory after being read The ANPR system only recognizes the number plate
by the OMR, a device using a template that maps out the and not the car so that a car can be tted with a
fi
X-Y coordinates of each tablet (pen/pencil mark).

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

cloned number plate, thus bypassing car park security, Disadvantages:


for example. Limited range
compatibility issues with some devices
3. RFID in tracking stock:
5. Biometric recognition:
Tracking of stock using RFID involves either tracking
livestock (on a farm) or goods in a shop, supermarket, or Usually refers to automated technologies for
distribution centre. authenticating and verifying human body characteristics
RFID in passports: such as face, iris, retina, nger, thumb, hand and voice.

fi
The data on the RFID chip is read when the passport is Advantages:
scanned. very high accuracy
Your photo is clicked and compared to the RFID chip very easy to use
image. very fast veri cation time

fi
If face recognition passes, some checks are made to non-intrusive method
ensure you are eligible to enter the country, and if you relatively inexpensive technology
are, the gate opens automatically. Disadvantages:
RFID in automobiles: it can make mistakes if the skin is dirty or damaged

s
Tags allow or deny access to parking in a secure, very expensive to install and set up

e
private car park. uses a lot of memory for the data to be stored
RFID tags in lorries and delivery vans can be used at a person’s voice can be quickly recorded and used for

t
weigh stations to ensure the vehicle is not carrying too unauthorized access

o
much weight. an illness, such as a cold, can change a person’s voice,

N
RFID tags can be used on a car production line to track making absolute identi cation di cult or impossible

fi
ffi
its progress through assembly.
RFID in contactless payments: 1.11. Satellite Systems

d
The embedded chip on credit/debit cards and the

a
antenna enable customers to wave their card over a
Global Positioning Systems (GPS)
reader at the point of sale terminals to make

w
payments Used to determine the exact location of several modes of

a
Smartphone apps can also be used to make transport

F
contactless payments. Cars usually refer to GPS as satellite navigation systems
Advantages: Satellites surrounding the Earth transmit signals to the
No line-of-sight contact is necessary. surface

n
It is a very robust and reliable technology. Computers installed in the mode of transport receive and

a
Tags are much more di cult to forge than barcodes. interpret these signals
ffi
RFID tags can reduce the number of sta needed in,

y
Knowing their position on the Earth depends on very
ff
for example, a warehouse because tracking items is accurate timing – atomic clocks are used in the satellites,

y
automatic (thus reducing costs). which are accurate to within a fraction of a second per

a
It provides a very fast read rate. day
It allows bi-directional data transfer.

R
Each satellite transmits data indicating its position & time
Bulk detection is possible. The computer on board the mode of transport calculates
Disadvantages: its exact position based on the information from at least
Tag collision is when the signals from two or more three satellites
tags overlap, interfering with each other.
Because RFID uses radio waves, they are relatively Satellite Navigation (satnav):
easy to jam or interrupt.
It is relatively easy to hack into the data/signal Used to determine the exact location of a car.
transmitted by the tag. The computers onboard can be used to show directions to
The initial cost of an RFID system is more expensive a destination.
than a comparable barcode system.
Advantages:
4. Near Field Communication (NFC):
Better focus as there isn’t a need to constantly check
Enables short-range wireless communication between paper maps.
devices. Reduces nes by warning drivers about upcoming speed
fi
Allows payment using a smartphone. changes.
Advantages: The system shows an Estimated Time of Arrival (ETA).
Convenient and secure method of payment It is possible to program in the fastest route to avoid
allows for contactless transactions towns.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

The system can also give helpful information such as the Enable mobile communication in very remote locations.
location of petrol stations.
Disadvantages:
Disadvantages:
There is a time delay in receipt of the signals.
If the maps are not updated, they can give incorrect The signals received can be a ected by bad weather.

ff
instructions. Sunspot activity can a ect the performance of a satellite.

ff
Road closures due to accidents or roadworks can cause They must be monitored and controlled regularly to
problems. remain in the correct orbit.
The loss of satellite signals can cause problems.
The system will give incorrect information if an incorrect
start-point or end-point is keyed in. 2. Safety & Security
Geographic Information Systems (GIS) 2.1. Physical Safety
Used to capture, manage, analyze, and display
1. Electrocution: ICT devices require electrical power to
geographically referenced information.
charge or run; the electrical device can cause electrocution,

s
Use to determine the distance between two places.
caused by the electric current moving through a body,

e
Used to nd the nearest petrol station or restaurant, etc.
causing fatal injuries and/or death.
fi
To protect animal and plant life in certain vulnerable

t
There are multiple causes for electrocution, including:
places.

o
It can be used in geography, science, or engineering Contact between liquid substances and electronic devices:

N
lessons. Keep liquids away from electrical equipment.
Open cables: Ensure that cables are entirely insulated and
Advantages:
packed, and use circuit breakers or fuses to prevent

d
Allows geographical and thematic data of any kind to be electrical overload.

a
combined to show how they are connected to each other.
2. Fire: ICT devices require electricity to charge or run; too

w
It allows the handling and exploration of vast amounts of
many devices using a single socket can cause the plug socket
data.

a
to overload, and heat is generated by too much electricity,
It allows data to be integrated from a wide range of very
causing the wiring to degrade and ignite a re.

F
di erent sources.

fi
The causes and reduction tactics for re include:
ff
fi
Disadvantages:
Socket overload: Ensure enough plug sockets in the room,

n
The learning curve on GIS software can be very long. don’t plug too many devices into the same socket, and

a
GIS software is very expensive. don’t leave devices plugged in and unattended.

y
GIS requires enormous amounts of data to be input. Overheated equipment: Ensure that equipment is
properly ventilated and not obstructed, keep ammable

y
It isn't easy to make GIS programs that are both fast and
fl
user-friendly. materials away from heat sources, regularly check

a
equipment for signs of wear or damage, use re
fi
R
Media Communication Systems extinguishers in case of emergencies, turn o or unplug
ff
devices when away from the location, do not cover any air
Using satellite signals for communication. vents on devices.
Used by media companies when sending
3. Trailing cables: Devices can be plugged in using cables.
stories/videos/pictures from remote locations.
Cables that are protruding can cause an accident; you can
Advantages: trip over a cable left out in a location, and body damage can
occur during a fall, for example, breaking bones, ligament
They have good global coverage. damage, bruising, sprains, etc. depending on the area fell on
They are cheaper, faster, and safer than laying cables in Trailing cables causes and prevention strategies:
di cult or treacherous terrain.
ffi
They have very high bandwidth. Unorganized/insecure cables: use cable ties to secure
It is relatively easy to expand the network. cables, keep cables packed correctly in, let’s say, a table,
Security in satellite transmission is very good because therefore not coming in the way of walking paths, use
data is coded, and the receiver requires decoding wireless devices where possible, and regularly inspect
equipment. cables for signs of wear or damage.
During emergency situations, it is relatively easy to move
stations on the ground from one place to another. 4. Heavy falling equipment: Devices have varying levels of
They are well-suited for broadcasting. weight, and if a device falls on you, it could cause injury; any

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

device should be placed in a secure location, like a PC on a Personal Data


solid desk and not near the edge.
Causes and reduction tactics for falling equipment: Refers to information that can be used to identify an
individual
Improperly secured equipment: Ensure that equipment is Examples
properly secured and stable. Regularly check the stability Personal Name
of locations containing devices. Address
Equipment on unstable surfaces: Keep equipment away Date of birth
from edges and other potential hazards, and regularly A photograph in school uniform
inspect equipment and locations containing devices for Medical history
signs of wear or damage. Threats that can be avoided by protecting personal data:
Identity theft
2.2. eSafety Privacy breaches
Misuse of the information
Data Protection Data be sold to third-party companies
Individuals could be held to ransom over personal

s
The Data Protection Act (DPA) controls personal data data gathered
collection, storage and processing. could be used to commit a physical crime

e
How to avoid inappropriate data disclosure:

t
In the UK, the European Union’s General Data Protection Personal data must be kept con dential and protected
Regulation (GDPR)

fi
o
through privacy settings on websites such as social
Protects personal data, whether stored on paper or a media or strong passwords on websites where

N
computer system personal data is held or used
Access to personal data should be limited to
Principles of the Data Protection Act

d
authorized individuals
Think before you post - consider what information

a
Data must be processed lawfully, fairly, and transparently,
could be gathered from your image or content
with clear consent from the individual.

w
Check website details about the collection, storage,
Data should only be collected for speci c, explicit, and

a
and use of personal data
fi
legitimate purposes.
Only access websites where personal data is used or

F
Organizations should only collect and retain the minimum
viewed when on a secure, encrypted connection
personal data necessary for their stated purpose.
Data should be accurate and up-to-date, and reasonable

n
eSafety
steps must be taken to rectify or erase inaccurate

a
information. E-safety is knowing about and using the internet safely
Personal data should not be kept longer than necessary

y
and responsibly.
and should be securely deleted when no longer needed. It refers to when an individual is using the internet, email,

y
Organizations must protect personal data against social media, or online gaming.

a
unauthorized or unlawful processing, accidental loss, E-safety refers to the individual knowing how to protect
destruction, or damage.

R
themselves from potential dangers and threats.

Why is data protection legislation required? The Need for eSafety


Protecting Individual Rights: Data protection legislation Awareness that personal information should not be
safeguards individuals' right to privacy and control over shared freely
their personal information. Awareness of how to act online and avoid falling victim
Preventing Misuse of Personal Data: It helps prevent creates a safe and respectful environment.
unauthorized access, identity theft, fraud, and other forms Identify and avoid online scams, phishing attempts, and
of data misuse. fraudulent websites that may try to trick them into sharing
Promoting Trust: Data protection laws build trust between personal or nancial information.
individuals and organizations by ensuring their personal
fi
Mindful of online behaviour and interactions, protecting
information is handled responsibly. your digital reputation, which can have long-term
Encouraging Responsible Data Handling: Legislation consequences in your personal and professional life.
promotes responsible data collection, storage, and Control privacy settings on social media platforms,
processing practices among organizations. limiting who can access/view personal information and
Enabling Data Subject Rights: Legislation grants posts.
individuals rights such as access to their data, right to Avoid encountering explicit or harmful content online,
recti cation, erasure, and objection to processing. reducing the risk of exposure to inappropriate material or
fi
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

online predators. personal data can be used to identify the user, i.e.,
Engage in online gaming responsibly, avoid sharing passport number, name, age, etc.
personal details, and behave respectfully towards other
players. 2.3. Security of Data
Protecting devices from malware, viruses, and other
online threats, preventing data loss, privacy breaches, or
Threats
device damage.
Develop responsible online behaviours, promoting There are multiple methods by which data can be threatened,
respectful conduct while interacting with others online. including:
Maintain a healthy balance between online and o ine

ffl
lives, reducing the risk of addiction, mental health issues, Hacking: Unauthorized access to computer systems or
or negative impacts on relationships and self-esteem. networks to gain control, steal information, or cause
damage, thus leading to identity theft, privacy breaches,
Safety Suggestions and misuse of data
Phishing: Deceptive emails or messages that are received
The internet: from trusted sources to trick individuals into revealing

s
Use trusted websites recommended by teachers or personal data
reputable sources Pharming: Manipulation of DNS (Domain Name System)

e
Utilize search engines that only allow access to age- to redirect users to fraudulent websites, often to steal

t
appropriate websites and use lters to ensure personal data
fi
inappropriate content is not seen

o
Smishing: Phishing attacks carried out through SMS or
Never reveal personal information text messages

N
Email: Vishing: (aka voicemail phishing) Phishing attacks carried
Be aware of the potential dangers of opening or out through voice messages to trick users into calling the
replying to emails from unknown people, including

d
telephone number contained in the message
attachments; potential dangers include phishing, Viruses and malware: Viruses are program codes that can

a
spam replicate/copy themselves to cause data loss or

w
Ensure you know who the email is for when corruption. Malicious software designed to disrupt,
considering sending personal data or images via

a
damage, or gain unauthorized access to computer
email, only with people you know and not with systems or networks

F
identi able content like school photos Card fraud: Unauthorized use of credit or debit card
fi
Social media: information for fraudulent purposes caused by shoulder
Know how to block and report people who send

n
sur ng, card cloning, or keylogging.
fi
content or messages that are unwanted

a
Know where the privacy settings are to reduce the Protection of Data

y
number of people who can see your posts or images
Be aware of the potential dangers of meeting online Multiple techniques are implied for the protection of data,

y
contacts face to face; do not meet anyone you do not inclusive:

a
know; if you do, take an adult and meet publicly. 1. Biometrics:

R
Do not distribute inappropriate images and
inappropriate language Individuals' distinctive physical or behavioural traits, such
Respect the con dentiality of personal data belonging as ngerprints, faces, or irises, can be used for access
fi
control and veri cation. Since biometric data is hard to
fi
to other people
fi
Only accept friend requests from people you know fake or duplicate, it o ers a more secure form of
ff
Parents should be aware of what you are doing online, identi cation.
fi
discuss what you are doing online
2. Digital certi cate:
Do not post images or details that can be used to
fi
locate you A digital record that attests to a website's reliability and
Online gaming: integrity. A digital certi cate is used to provide safe
fi
Do not use real names as usernames communication and to build con dence between parties.
fi
Never share personal or nancial details with other Identi er data, the entity's public key, and a third party's
fi
fi
players digital signature are frequently found in digital
Know how to block and report players for certi cates.
fi
inappropriate messages or comments
Sensitive Data is data that might result in loss of an 3. Secure Socket Layer (SSL):
advantage or level of security if disclosed to others. I.e.,
a protocol that creates a secure connection between a
ethnicity, religion, criminal record, etc. At the same time,
client computer and a server. SSL ensures that

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE ICT

information communicated between a server and client 6. Two-factor authentication:


stays private and cannot be intercepted or changed by
unauthorized parties. A website's identi cation for it is the A security mechanism that requests two di erent kinds of

ff
identi cation from users to con rm their identity. To

fi
S at the end of HTTP.

fi
fi
provide additional protection outside of just a username
4. Encryption: and password, 2FA was created. Typically, it combines
something that uniquely identi es a user, like biometric
Creating data in a format that cannot be read without a

fi
data, with something the user has, like a smartphone and
decryption key Data on hard drives, emails, cloud storage, a token or something they know, like a password.
and secure websites (HTTPS) are all protected by
encryption. Without a decryption key, it assures that even 7. User ID and password:
if unauthorized people obtain data, it cannot be decoded.
A typical authentication technique uses a password plus a
5. Firewall: secret code (user ID) to identify. To strengthen data
security, user IDs and passwords restrict access to only
A rewall is a network security device that monitors and authorized users. Using secure passwords and changing
fi
manages incoming and outgoing network tra c. Its goal them frequently is critical to ensure security. When
ffi
s
is to separate an internal network from other networks by creating passwords, it is advised to utilize a mix of
ltering data according to established criteria. It assists in

e
uppercase, lowercase, digits, and special characters.
fi
preventing malware, unauthorized access, and other

t
network risks.

N o
a d
a w
F
a n
y y
R a

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. By: Rayyan Fawad
CAIE IGCSE
ICT

e s
o t
N
a d
a w
F
a n
y y
R a
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Rayyan Fawad on 20/05/24.
These notes have been created by Rayyan Fawad for the 2023-2025 syllabus
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website. Under no conditions may this
document be distributed under the name of false author(s) or sold for financial gain.
“ZNotes” and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy