ICT Theory
ICT Theory
Software
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
It consists of a control unit (CU) that manages the input Backing and Secondary Storage
and output devices, an arithmetic and logic unit (ALU) that
performs computations and makes logical judgments, and Required to store signi cant amounts of data
tiny memory regions known as registers. permanently.
It processes the input and produces the outcome of the Most commonly in the form of Hard disk drives and Solid-
processing in the form of output. state drives.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
N.B: Mainly used by end-users who don’t have great up the desk space.
knowledge of how the computer works. 3. Because they aren’t portable, les must be copied
3. Dialogue-based user interface: use the human voice to another portable storage device to take work
to give commands to a computer system. no need for elsewhere.
a driver to take their hands o the steering wheel. In a
home, it is especially useful for people with disabilities Mobile Computers
because many tasks can be carried out by the spoken
word only. Possible to use it as a security feature 1. Laptop computer:
because voice recognition could be used to identify a
person. Still unreliable, with many commands not (Or notebook) refers to a type of computer where the
being recognized or needing to be repeated several monitor, keyboard, pointing device and processor are all
times (especially if there is background noise). Can be together in one unit. This makes them extremely portable.
quite complex to setup. User needs to know which lightweight (to aid portability). Low power consumption
commands can be used. (and also long battery life). Low heat output (cooling is
4. Gesture-based user interface: relies on human very important).
interaction by the moving of hands, head or even feet. Uses:
Replaces mechanical input devices. No physical 1. o ce and business work
contact is required. Very natural interface for a human 2. educational use
operator. No training is needed to interface with the 3. used as a gaming device.
computer. It is possible for unintentional movement to 4. general entertainment
be picked up. Only works near the camera or sensor Advantages:
(maximum of 1.5 meters). May only accept a limited 1. Portability: all components are in a single unit, so
number of movements (for example, it may take they can be taken anywhere.
several attempts to determine exactly what nger 2. Because of one single unit, there are no trailing
movements are recognized). wires and desk clutter.
3. take up much less room on a desk, so they can be
easily used in public spaces.
1.4. Types of Computers 4. portability allows them to take full advantage of
Wi-Fi features.
Desktop Computers
Disadvantages:
1. portability makes it easier for them to be stolen.
Desktop usually refers to a general-purpose computer
2. limited battery life means the user needs to carry
that is made up of a separate monitor, keyboard, mouse,
a charger at all times.
and processor unit. It is distinguished from, for example, a
3. keyboards and pointing devices may be awkward
laptop computer by the fact that it is made up of several
to use.
separate components, which makes it not very portable.
4. not easy to upgrade, like adding more RAM.
Uses:
1. o ce and business work
2. Smartphones:
2. educational use
3. general entertainment
Allow normal phone calls to be made, but also have an
4. gaming device
operating system (such as iOS, Android, or Windows),
Advantages:
allowing them to run a number of computer applications
1. They are easier and less costly to upgrade and
(known as apps or applets). Smartphones communicate
expand.
with the internet either by using Wi-Fi hot spots or by
2. Spare parts are standardized, which makes them
using 3G/4G/5G mobile phone networks.
cheaper.
Uses:
3. They tend to have better speci cations for a given
1. They allow users to send/receive emails.
price.
2. They allow users to use a number of apps.
4. No critical power consumption because they plug
3. They allow users to use a camera feature (to take
into a wall socket.
photos or videos).
5. Due to xed positions, they are less likely to be
4. They allow users to use an MP3/4 player (for music
damaged or stolen.
and videos).
6. As they usually have wired connections, they have
Advantages:
more stable internet access.
1. very small in size and lightweight, makes them
Disadvantages:
portable.
1. They are not particularly portable because they
2. connecting to the internet while on the move.
are made up of separate components.
3. because they use Wi-Fi and mobile phone
2. More complicated because all the components
networks, they can be used almost anywhere.
need to be hooked up by wiring, which also clutters
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
4. they have apps which can tell instant location, Some of the latest smartphones have been designed as a
which is a feature that isn’t available in either hybrid between a tablet and a smartphone, referred to as
desktops or laptops. a phablet. They have much larger screens than a
5. they have reasonable battery life. smartphone but are smaller than a tablet.
Disadvantages:
1. small screens and keyboards make pages di cult
to read.
2. more di cult and slower when typing things in.
3. Web browsing and photography can quickly drain
the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops.
7. The data transfer rate using mobile phone Uses:
networks can be slower than with Wi-Fi. Entertainment (streaming of music, videos, and
television programs).
3. Tablets: Gaming (including group games).
As a camera or video camera.
They work similarly to a smartphone. The only main Internet use (online sales, social networks, using QR
di erence is that they are somewhat bigger in size as codes, and so on).
compared to a smartphone. Sending/receiving emails.
Uses: Global positioning system (use of maps to navigate to
1. They allow users to send/receive emails. a location).
2. They allow users to use a number of apps. Calendar functions.
3. They allow users to use a camera feature (to take Telephone banking (sending and receiving money
photos or videos). using banking apps).
4. They allow users to use an MP3/4 player (for music Voice over Internet Protocol: telephone network using
and videos). the internet, which also allows video calling.
Advantages of tablets compared to laptops: Instant access to social networks (social contact with
1. very fast to switch on (no time delay waiting for the friends no matter where you are in the world).
operating system to load up). Instant messaging.
2. fully portable – they are so lightweight that they O ce and business management (allows rapid voice
can be carried anywhere. and video communication).
3. touch screen technology means they are simple to Education use (using interactive software to teach or
use and don’t need any other input devices. learn from).
4. not much heat, they use solid-state technology. Remotely control devices.
5. The battery life of a tablet is a lot longer.
6. when the power button is pressed, it goes into Laptops are the most expandable of these devices, while
standby but remains connected to the internet so smartphones are the most portable. Tablets and phablets fall
the user still hears alerts when emails or other somewhere in between, o ering a balance of portability and
‘events’ are received. expandability. The choice of device will depend on your
Disadvantages of tablets compared to laptops: speci c needs and use case.
1. tend to be rather expensive when compared to
laptops. 1.5. Impact of Emerging Technologies
2. they often have limited memory/storage when
compared to a laptop. Arti cial Intelligence (AI): There are many de nitions of
3. typing on a touch screen can be slow and error- arti cial intelligence (AI). Essentially, AI is a machine or
prone compared to a standard keyboard. application which carries out a task that requires some
4. laptops tend to support more le formats than degree of intelligence.
tablets. The use of language
recognizing a person’s face, the ability to operate
4. Phablets: machinery, such as a car, aeroplane, train, and so on,
and analyzing data to predict the outcome of a future
event, such as weather forecasting. Impact:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Whenever AI is mentioned, people usually think of Input devices can be complicated because they must ensure
science ction fantasies and think of robots. The the user can interact with the computer correctly.
science ction writer Isaac Asimov even went as far as
producing his three laws of robotics: » Robots may not 1. Keyboards:
injure a human through action or inaction. » Robots
must obey orders given by humans without question. » Uses:
A robot must protect itself unless it con icts with the
Input of data into applications software
two laws above. Everyday uses:
Typing in commands to the computer
An autonomous (driverless) vehicle – we already have
driverless trains and autopilots on aeroplanes, but Advantages:
future developments include driverless cars.
Robotic research is leading to improvements in Fast entry of new text into a document.
technology to help amputees and people with Well-known method.
disabilities. Easy to use for most people.
Robots are used to help people carry out dangerous or Easier to do veri cation checks as data is entered (can
unpleasant tasks – for example, bomb disposal. immediately compare the source document with typed
data on the screen).
Negative impacts of AI
Disadvantages:
Unemployment, robots are capable of doing tedious
human tasks with much more e ciency and excellence It can be di cult to use if the user has limited arm/wrist
than humans. use.
Dependency on technology could lead to problems in the Slow method when compared to direct data entry.
future. It is a fairly large device that uses up valuable desk space.
De-skilling: Tasks that used to be considered a talent are
now part of general, tedious processes that are done on a
regular basis by machines.
Extended Reality refers to combined real and virtual
environments. The two most common examples at the
moment are:
Augmented reality (AR) is a merger between the
virtual and physical (real) world; it lays objects onto
pre-existing objects. e.g., Pokémon GO! Impact: safety
and rescue operations’ training, shopping and retail 2. Numeric keypads:
(getting a better look at a car before the purchase),
healthcare (better understanding of a patient’s body) Uses:
Virtual reality (VR) enables an entirely new world to be
created, unlike AR, which has no link to the actual Automatic teller machines (ATMs), where the customer
surroundings of the user. It requires the user to be can key in their PIN, amount of money, etc.
specially equipped with a VR headset, joystick, and Mobile phones allow phone numbers, etc., to be keyed in.
headphones. Point of sale terminals (POS) in case the barcode reader
Impact: Military applications, educational purposes fails to read the barcode – the number has to be keyed in
(looking at ancient buildings), healthcare, media manually by the operator.
(interactive special e ects in a movie), scienti c Chip and PIN devices when paying by credit/debit cards.
visualization (part of molecular structures/cells). Fast entry of numeric data into a spreadsheet.
Advantages:
2. Input & Output Devices Faster than standard keyboards when entering numeric
data.
2.1. Input Devices and Their Uses Because many are small devices, they are very easy to
carry around.
An input device is any hardware device that allows a user
to enter data or instructions into a computer directly. Disadvantages:
An input device can send data to another device, but it
Sometimes, they have small keys, which can make input
cannot receive data from another device. more di cult.
Input devices are necessary for a computer to receive
commands from its users and data to process; they are
under the user's control or can be direct data entry.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Sometimes, the order of the numbers on the keypad is not Because the touchpad is integrated into the laptop
computer, there is no need for a separate mouse; this
aids the portability and is a big advantage if no at
surfaces are available.
Disadvantages:
intuitive.
People with limited hand/wrist movement nd the device
di cult to use.
3. Mouse: It can be more di cult to control the pointer when
compared to a normal mouse.
Uses:
Drag and drop operations are more complicated using a
Opening, closing and minimizing software
grouping, moving and deleting les.
Image editing, for example, controls the size and position
of a drawing pasted into a document.
Controlling the position of a pointer on the screen to allow
selection.
Advantages:
Disadvantages:
Advantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Uses:
Advantages:
Disadvantages:
Uses:
Advantages:
Disadvantages:
7. Joysticks:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
9. Touch screen (as an input device): Limited quality, depending on how good the scanner’s
resolution is.
Uses: Fairly slow input method, especially if color mode is
Advantages:
selected.
Faster entry of options than using a keyboard or mouse.
Very easy method for choosing options.
11. Digital Cameras:
User-friendly method – no training necessary in its use.
Uses:
Option to expand the size of the display if necessary.
Taking photographs is still better than using smartphones
Disadvantages:
and tablets.
A limited number of input options are available. Data-capture device, e.g., as a reversing aid in cars.
This can lead to problems if an operator uses the system Dentistry, to help capture pictures for better diagnosis.
frequently (straining of arm muscles, RSI, etc., are all The creation of virtual reality tours around houses,
possible). buildings, etc.
The screen can get very dirty with constant touching.
Advantages:
Disadvantages:
Advantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
13. Sensors:
Advantages: Disadvantages:
Readings are more accurate as compared to human If the card is damaged, the data is lost.
operators. Doesn’t work at a distance.
Readers are continuous, with no breaks in the monitoring. As the information isn’t human-readable, this can be a
Because it is a continuous process, any action or warnings disadvantage in some cases.
needed will be initiated immediately.
Automatic systems don’t need human intervention.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Uses: Advantages:
Where payments are made using cards Very fast way of inputting survey results.
It is more accurate because there is no human
Advantages: intervention.
More accurate than OCR methods.
It is more secure than contactless cards as the PIN acts as
a second security layer. Disadvantages:
More robust system than Magnetic Stripe Cards
Designing the forms can be complicated to ensure the
Disadvantages: marks are correctly positioned.
If there are problems, they need to be manually checked,
Be very careful so the PIN isn’t seen by anyone while
which can be time-consuming.
being typed in.
Uses:
Disadvantages:
Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal.
RFID is more expensive than a comparable barcode 6. Barcode readers:
system.
Uses:
4. Optical Mark Reader/Recognition (OMR):
Used in supermarkets for stock control.
Uses: In libraries, to keep track of books.
As a safety function to ensure checking of electrical
Used in MCQs checking. equipment on a daily basis.
Used in reading voting papers.
Advantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Much faster than manually keying in data. QR codes can be used to transmit malicious data.
Allow automatic stock control.
They are a tried and trusted technology.
Disadvantages:
stripes.
Uses:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Uses:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Uses:
ATMs
POS terminals
Information kiosks.
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
They are only considerably fast if several copies are being Advantages:
made.
Color laser printers are expensive to run. Can be used in varying environments unlike laser/inkjet
They produce ozone and volatile organic compounds printers.
because of their printing method and toner. Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
Good for continuous printing.
Disadvantages:
Very noisy
Initial cost is more than an inkjet printer.
Very slow, poor-quality printing.
6. Inkjet printers:
Uses:
Advantages:
8. (Graph) Plotters:
Disadvantages:
Uses:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Advantages:
Disadvantages:
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Disadvantages:
CD-R/DVD-R
To store the OS, systems software and working data/ les. Disadvantages:
Storing applications les.
Used in real-time systems and in online systems. It can only be recorded once; if an error occurs, then the
Used in le servers for computer networks. disk has to be thrown away.
Not all CD/DVD players can read CD-R/DVD-R.
Advantages:
CD-RW/DVD-RW
They have a very fast data transfer rate and fast access
times to data. Uses:
They have a very large memory capacity.
Used to record television programs which can be
Disadvantages: recorded over, time and time again.
Used in CCTV systems.
It can be fairly easily damaged.
It can be used as a backup device for les and data.
They have many moving parts which a ect overall
reliability. Advantages:
Their read/write operation can be quite noisy when
compared to solid-state drives. It can be written over many times.
You can use di erent le formats each time it is used.
Portable Hard Disk Drives It is not as wasteful as the R format because the les/data
can be added later.
Uses:
Disadvantages:
Can be used as a backup system to prevent data loss.
It can be used to transfer data/ les/software between It can be relatively expensive media.
computers. Possible to accidentally overwrite data.
Advantages: CD-ROM/DVD-ROM
Data access time and data transfer rate are very fast. Uses:
It has a very large memory capacity.
It can be used as a method of transferring information These are read-only memory (ROM), which means they
between computers. can’t be written over and can only be read. Permanent
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
storage method.
3.4. Solid State Backing Storage
CD-ROM is used to store music les and to store software,
computer games and reference software. Holds data on devices that don’t have any moving parts.
DVD-ROM has much larger storage and is used to store
lms. Solid-state drives (SSD)
Used in applications where there is a real need to prevent
deletion or overwriting of important data. Uses:
They are less expensive than hard disk drive systems. Advantages:
They are very portable as they are small and light.
Data stored on them is read-only, so it cannot be They are more reliable as they have no moving parts.
accidentally overwritten. They are considerably lighter and suitable for laptops.
They do not have to ‘get up to speed’ before they work
Disadvantages: correctly.
They have lower power consumption.
Hold far less data than hard disk drives or memory sticks.
They run much cooler than HDDs.
Very slow data transfer rate and data access times, as
Because they have no moving parts, they are very thin.
compared to hard disk drives.
SSD data access time is only 0.1 milliseconds compared
You cannot add your own les to the disks because they
to 10 milliseconds for HDD.
are both read-only.
Data transfer speed for SSDs is also much faster than for
HDDs.
Blu-Ray Discs
Disadvantages:
The main di erences between DVD and Blu-ray are:
SSD endurance - SSDs are conservatively rated at only
1. Blu-ray uses a blue laser rather than a red laser. (The 20GB write operations per day over three years.
wavelength of blue light is 405nm, much smaller than More expensive than magnetic hard disks.
the 650nm red laser) This makes pits and lands much
Smaller storage capacity than magnetic hard disks.
smaller, so they store ve times more data than DVDs.
2. Blu-ray disks automatically come with a secure Pen drives (Memory sticks)
encryption system, which helps to prevent piracy and
copyright infringement. Uses:
3. The data transfer rate for a DVD is 10 Mbps, and for a
Blu-ray disc, it is 36 Mbps. Transporting les between computers or using them as a
backing store.
Uses: Used as a security device to prevent software piracy
(known as a dongle).
Home video consoles.
Storing and playing back movies. Advantages:
Computers can use this technology for data storage or
backing hard drives. Very compact and portable media.
Camcorders can use this media to store movies. Very robust.
Does not need additional software to work on most
Advantages: computers.
They are not a ected by magnetic elds.
Very large storage capacity.
Very fast data transfer rate. Disadvantages:
The data access speed is also greater than with other
optical media. Cannot protect the data/ les by making it ‘read-only’.
Blu-ray discs automatically come with a secure encryption Easy to lose (due to the small physical size).
system. The user needs to be very careful when removing a
memory stick from a computer - incorrect removal will
Disadvantages: corrupt the data on the memory stick and make it useless.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
» CFast card (compact, fast card). 1. Network Interface Cards (NIC): These are needed to
Uses: allow a device to connect to a network. Turns binary
data into an electrical signal that allows network
Storing photos on digital cameras. access. Usually integrated into the motherboard.
Used as mobile phone memory cards.
Used in MP3 players to store music les. Each NIC is given a unique hardwired media access
Used as a backing store in hand-held computer devices. control (MAC) address.
Media access control (MAC) address: a number that
Advantages: uniquely identi es a device when connected to a network.
The rst six hex digits identify the manufacturer’s code,
Very compact.
and the next 6 identify the device’s serial number.
Because they have no moving parts, they are very
durable. 2. Hubs: they are hardware devices that can have
They can hold large amounts of data. several other devices connected to them. They are
Compact cameras and smartphones can read and write used to connect devices together to form a local area
memory cards, allowing users to transport extensive network (LAN). It takes a data packet received by one
collections of photographs, songs, etc. of its ports and sends it to all relevant or irrelevant
devices that are connected to it.
Disadvantages:
It is not very secure to broadcast data to all devices.
Expensive per gigabyte of memory when compared to
Unnecessary network tra c.
HDDs.
Have a lower storage capacity than hard disks. 3. Switches: intelligent hubs. Used to connect devices to
Have a nite life regarding the number of times they can form a LAN. Unlike hubs, the switches store the MAC
be read from or written to. addresses of all devices on a lookup table. So, it only
Memory cards, speci cally the micro SD card, are the sends data to the relevant device.
smallest sized devices available, making them more likely In summary:
to be lost, stolen or damaged. The storage should be
sized cause the amount of storage does not prevent the Both are used to connect devices in LAN.
drive from being stolen Both use data packets.
Users must often purchase a card reader or USB Hubs send data to every device on the network.
converter to view the data. Switches send data to a relevant device only.
Switches have better security.
Switches use lookup tables to determine the destination
4. Networks & the E ects of for a data packet.
Switches use MAC addresses for relevant device
Using Them locations.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Bluetooth uses: A backup of the data from the cloud will allow full data
recovery in case of incidents.
When transferring data between 2 or more devices that Files can be synced across multiple devices.
are very close together. There is no need to carry storage devices around.
When the speed of data transmission isn’t crucial.
For low-bandwidth applications. Disadvantages:
Cloud data is duplicated and stored on other servers to Usually private and are used to send information securely
ensure availability during system failures, upgrades, and and safely.
maintenance. Access to an organization’s Intranet is restricted and only
accessible to authorized users such as employees.
Advantages:
Intranets have many advantages over the internet, such
Services can be scaled up or down according to changing as:
requirements. better bandwidth than the internet,
Cloud storage eliminates the need for a business to data is kept within the organization,
purchase expensive equipment for infrastructure and less chance of hacking and attacks,
maintenance. administrators can manage access to external sites
Readily available globally, allowing both remote working and links.
and data sharing.
Characteristics:
Providers o er high levels of ensuring that services are
always available. A private network that is accessible to employees within a
It can o er an almost unlimited amount of storage. company or organization.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
1. Zero login: A security concept that eliminates Heuristic Checking: Instead of relying solely on a database of
traditional login methods, such as usernames and known viruses, this method looks for behavioural patterns
passwords, using biometrics or other authentication and other features in a le to identify possible risks.
factors for seamless and password-less access.
2. Biometric Recognition: These authentication methods Electronic Conferencing
use unique physical or behavioural characteristics,
such as ngerprints, iris scans, or voice recognition, to 1. Video Conferencing: It is a form of audio and video
verify a person's identity. communication. It serves as a stand-in for face-to-face
3. Magnetic Stripes: These are authentication features meetings between several persons who may reside
on cards storing data magnetically. They enable abroad or in another region of the country. It utilizes a
secure identi cation and authorization by containing network in some way and is done in real-time.
encoded information that magnetic stripe readers can The basic hardware includes:
read.
webcams,
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
large monitors/television screens, Heavily relies on technology, and technical issues such as
microphones, poor audio quality, background noise, or connectivity
speakers. problems are common.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
The negative aspects include: safer due to the removal of human error
due to the more e cient operation of vehicles, it is better
people do not meet face-to-face as much (social isolation) for the environment
a lack of social interaction may make people more reduced tra c congestion
anxious about meeting people in real life increased lane capacity
When communicating online, people can act less politely reduced travel times
or more harshly, and cybercrime is a serious issue, stress-free parking for motorists
especially for teenagers.
Disadvantages:
Monitoring and Controlling Transport
very high installation prices
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
driver and passenger reluctance of the new technology Cause: due to prolonged use of monitors
reduction in taxi requirements could lead to Minimizing health risks: use adjustable chairs, footrests, and
unemployment tiltable screens.
maintenance of the sensors and cameras is crucial 3. Eyestrain: strain and fatigue, unwanted harm to vision.
the ever-present fear of hacking into the vehicle’s control Cause: due to bad lighting and prolonged screen usage.
system Minimizing health risks: use LCDs instead of CRTs, take
regular breaks, use anti-glare screens, and do regular eye
Advantages of an autonomous train: testing.
4. Headaches: pain or discomfort in the head or face area.
improved punctuality
Cause: incorrect lighting, screen re ections, ickering
reduced running costs due to fewer sta
screens, etc.
no human error
Minimizing health risks: use anti-glare screens, take regular
minimized energy consumption
breaks, regular eye-testing.
possible to increase the frequency of trains as the
5. Ozone irritation: in ammation and irritation of the tissues
possibility of delays is removed
lining human airways
more straightforward to update changes in train
Cause: inhalation of ozone released by laser printers in an
schedules
o ce.
Disadvantages: Minimizing health risks: proper ventilation, laser printers
should be housed in a separate room, replace laser printers
fear of the system being hacked into with inkjet printers, if possible.
initial instalment costs are very high
ensuring passenger behaviour is vital, especially during
rush hours. 6. ICT Applications
human reluctance to new technology
without drivers, CCTV monitoring will be continuously
required
6.1. Communication
5.2. Potential Health Problems related Collection of webpages, text, graphics, video, and sound
Hosted on a web server on the internet
to the Prolonged use of IT Equipment
Need to write code or use a web authoring application
Long-term exposure to computing devices may a ect user Hyperlinks to other pages can be added
Interactive websites require programming knowledge
well-being.
Can use a camera, scanner, and microphone to input data
Mentioned below are some of the health issues,
accompanied by their causes and prevention tactics: Usually, hire space from the web hosting company
1. Repetitive strain injury (RSI): A condition a ecting the Advantages
Ability to add sound/video/animation
muscles and nerves
Links to other websites/hyperlinks
Cause: repetitive movements and overuse of muscles, such
The use of hot spots
as wrists
Minimizing health risks: regular breaks, ergonomic Buttons to navigate/move around the website
Hit counters to see who has visited the websites
equipment, correct typing techniques.
2. Back and neck strain: Back pain and other related issues. worldwide advertising capability
Disadvantages
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
frequently, computer modelling can be a very costly potential gaps or inaccuracies in the analysis.
option Based on assumptions and simpli cations, introducing
human reluctance is a common problem in this a level of uncertainty.
technology Their programmed algorithms and data inputs bind
models. They may struggle to adapt to unforeseen
Some of the applications of computer modelling include: circumstances or rapidly changing conditions that
1. Personal nance: Computer modelling involves using humans can more readily navigate and respond to.
mathematical algorithms and data analysis to simulate
various nancial scenarios, such as investment strategies,
retirement planning, and risk assessment, aiding individuals
6.3. Computer-controlled Systems
in making informed decisions and optimizing their nancial
Robotics in manufacturing: involves using automated
goals.
machines to perform tasks such as assembly, welding,
2. Bridge and building design: Computer modelling is crucial
and packaging. These robots are designed to mimic
in bridge and building design. It allows engineers to simulate
human actions with precision and speed, increasing
and analyze structural behaviour, assess load capacities, and
productivity and quality control. They o er bene ts like
predict the response to external forces. It aids in optimizing
enhanced worker safety, improved e ciency, and the
designs, ensuring structural integrity, and minimizing
ability to handle repetitive tasks, revolutionizing the
potential risks before construction begins.
manufacturing industry.
3. Flood water management: Computer modelling plays a
Advantages:
vital role in ood water management by simulating water ow
can work in environments that may be harmful to
behaviour, predicting ood extents, and assessing potential
humans
ood risks. It helps design and optimise ood mitigation
can work non-stop
measures, such as levees and oodplain zoning, allowing
low running costs, majorly due to reduced employees;
authorities to make informed decisions, develop e ective
thus less wages need to be given
emergency response plans, and minimize the impact of
have higher productivity
ooding on communities.
provide greater consistency
4. Tra c management: Computer modelling simulates and
can do long, boring, tedious tasks
analyses tra c ow, predicts congestion patterns, and
can carry out di erent tasks by tting them with
optimises tra c control strategies. It aids in designing
di erent-end e ectors
e cient road networks, optimizing signal timings, and
Disadvantages:
evaluating the impact of transportation infrastructure
robots nd it di cult to do unusual tasks
projects. This enables authorities to make informed
can cause higher unemployment
decisions, alleviate congestion, and improve overall tra c
robots do many of the tasks once done by humans,
e ciency for better urban mobility.
leading to deskilling
5. Weather forecasting: Computer modelling plays a pivotal
robots are independent of the skills base; factory
role in weather forecasting by simulating the Earth's
headquarters can be moved internationally
atmosphere, oceanic conditions, and other environmental
initial set-up and maintenance of robots can be
factors. These models use complex algorithms to predict
expensive
weather patterns, including temperature, precipitation, wind
Production line control: Computer-controlled systems in
speed, and storm systems. By assimilating real-time data,
production line control involve using computers and
computer models provide forecasts that aid meteorologists in
software to monitor, coordinate, and optimize
predicting weather conditions, issuing warnings, and helping
manufacturing processes. These systems ensure e cient
society prepare for potential hazards.
coordination of machinery, manage inventory, track
Advantages of using computer modelling rather than production metrics, and automate tasks. They enable
humans: real-time data analysis, error detection, and adjustment,
It can provide more precise and accurate results than improving productivity, reducing downtime, and
human-based methods, minimizing errors and enhancing overall operational e ciency in the production
increasing reliability. line.
Can analyze large amounts of data and perform Autonomous vehicles: Self-driving cars and drones guided
complex calculations faster than humans by computer algorithms.
It can be reused and updated easily, reducing the enhance safety
need for repetitive manual analysis and potentially reduce tra c congestion
lowering costs in the long run. increase fuel e ciency
Disadvantages of using computer modelling rather than Advantages of using computer-controlled systems rather
humans: than humans:
It may overlook nuanced factors or intangible increased e ciency and productivity
elements that humans can consider, leading to greater consistency
ability to work in any environment
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Automated teller machines (ATMs) are places where technology. The system depends on electronic money
customers can get cash (or carry out certain other banking transfers between accounts; no cash is moved. The computer
activities, such as ordering a statement) using their credit or system automatically moves the requested amount from one
debit card. account to another when it receives an EFT command.
What goes on behind the
Sequence at ATM Advantages:
scenes
very secure payment method
Customer puts card into Contact is made with bank’s
very quick payment method
ATM computer
less expensive than cheques
PIN is checked to see if it is the customer has the right to dispute an EFT payment
correct for up to 60 days
Card is checked to see if it is Disadvantages:
PIN is entered using the valid the bank transaction can’t be reversed without full
keypad The transaction is closed if the dispute investigations
card is stolen or the number of customer needs to have funds available immediately
PIN attempts allowed is cannot guarantee the recipient’s identity
exceeded.
Several options are given: Credit/debit card transactions
change PIN, pay in cheques,
pay a bill, see balance, get Several credit/debit cards come with a magnetic stripe and a
money chip; the chip houses essential data like the PIN. This
technique is intended to increase security because it is
The customer selects the
superior to a signature. A chip and PIN card to make
cash option & several cash
purchases is an example of an electronic funds transfer (EFT).
options are shown
The customer’s account is Advantages of credit cards:
accessed to see if they have customer protection if ordered goods don’t arrive
su cient funds, it is checked to internationally accepted payment method
see if they are withdrawing interest-free loan if money is paid back within the
The customer accepts one of
more than their daily limit. agreed time period
the options or types in a
If the limit is not exceeded and can make purchases online
di erent amount
all other checks are OK, then Disadvantages of credit cards:
the transaction is authorized, can be charged high interest rates
and the machine then counts annual fees often apply
out the cash easy to end up with credit damage
The customer is asked if they security risks in online transactions
want a receipt Advantages of debit cards:
The card is returned money comes from the user’s current account, there
is no interest
Money is dispensed Customer’s account is updated
safer than carrying cash
can make online purchases
Advantages:
Disadvantages of debit cards:
possible to withdraw at any time of the day less customer protection if goods don’t arrive
o er many banking services without having to go to
no credit allowed; funds are needed at the time of
the bank
purchase
possible to access an account from anywhere in the
security risks in online transactions
world
usually provides quicker service than waiting in a Cheques
queue at a bank
Disadvantages: Individuals and organizations use cheques as a form of
often in places where theft can take place at night payment. When issuing a cheque, the payer writes the
potential for shoulder sur ng recipient's name, the payment amount, and the date on the
some banks charge customers for using ATMs cheque. The recipient then deposits or presents the cheque
cash withdrawal limits are often imposed on people to their bank for processing. The payer's bank veri es the
fund’s availability, and upon clearance, the speci ed amount
Electronic Funds Transfer (EFT): is transferred from the payer's account to the recipient's
account, completing the transaction.
It is possible to send money transfer instructions directly to a
bank's computer system via electronic funds transfer (EFT) Advantages:
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
more convenient and safer than cash Arti cial blood vessels are synthetic structures
can be post-dated designed to mimic the function of natural blood
can be traced if they are lost vessels, facilitating the ow of blood and nutrients
Disadvantages: throughout the body to support tissue repair and
aren’t legal tender and can be refused regeneration.
slow method of payment Customized medicines are personalized drug
easier for fraudsters than other methods formulations tailored to individual patients' speci c
relatively expensive payment method needs. They utilize advanced technology and precise
measurements to create medications with accurate
Internet Banking dosages and unique compositions, optimizing
treatment outcomes.
Enable online access to banking services via a secure website
or app, allowing for transfers, bill payments, account
6.8. Expert Systems
management, and more.
2. Explanation system
3D Printers
Informs the user of the reasoning behind the expert
Using 3D printers in medicine:
system’s conclusions
Prosthetics: 3D printers print out arti cial body parts
It will supply a conclusion and any suggested actions to
such as false teeth, arti cial limbs, hearing aids, etc.
take
This is a less expensive method of replacing body
It will also give the percentage probability of the accuracy
parts.
of its conclusions
Tissue engineering: it is the eld of combining cells,
biomaterials, and engineering principles to create 3. Inference engine
functional tissues or organs, aiming to repair or
replace damaged or diseased tissue in the human The main processing element of the system
body. It acts like a search engine examining the knowledge base
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Responsible for gathering information time, providing convenience and security for customers and
This is the problem-solving part of the system businesses during retail purchases.
Attempts to use information gathered from the user to The process of checking credit and debit cards at a
nd a matching object supermarket EFTPOS is much the same as was described for
paying a restaurant bill in Section 6.6.
4. Knowledge base Some functions of EFTPOS include:
It is a repository of facts Use of chip and PIN cards:
stores all the knowledge about an area of expertise Enhance security with two-factor authentication
a collection of objects and their attributes Require customers to enter a personal identi cation
number (PIN)
5. Rules base
Use of contactless cards:
The rules base is a set of inference rules. Allow for faster transactions
Used by the inference engine to draw conclusions Enable customers to tap their card on the terminal
They follow logical thinking Use of Near Field Communication (NFC):
Facilitate payments through smartphones and other
How an expert system is used to produce possible devices
solutions Increase convenience for customers
Communication between supermarket computers and
Below is an example of how an expert system works to bank computers:
diagnose a medical issue: Share transaction details securely
Enable instant payment processing and veri cation
The interactive screen asks questions for the doctor to
answer using a keyboard or a touch screen. Internet Shopping
The inference engine compares the symptoms with the
knowledge base, using the rule base to nd matches. Characteristics of Internet Shopping:
The system suggests the possible illness with a probability
of each, cures, and recommendations on the next step. Online stores accessible through web browsers
The explanation system will explain how that particular A wide variety of products and services are available
diagnosis was suggested. Convenient and often open 24/7
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
costs of delivery and return It can be used as a security system to prevent illegal
fake negative reviews can lead to a lousy company parking.
reputation It can be used to analyze driver behaviour.
It can be used in inner-city congestion charging
6.10. Recognition Systems systems.
Disadvantages:
1. Optical Mark recognition (OMR) media in schools: A lack of manned security car park surveillance could
lead to vandalism.
School registers: Paper-based registers are fed into OMR There could be an invasion of privacy due to recording
to be scanned and stored in a database. drivers’ number plates.
Multiple-choice examination papers: The position of a Damaged or very dirty number plates will not be
mark is stored in a computer’s memory after being read recognized.
by the OMR, a device using a template that maps out the The ANPR system only recognizes the number plate
X-Y coordinates of each tablet (pen/pencil mark). and not the car so that a car can be tted with a
Used at POS terminals for scanning and reading the cloned number plate, thus bypassing car park security,
information stored in barcodes. for example.
Many digital devices have OMR scanners, which may be
used to scan QR codes. 3. RFID in tracking stock:
Advantages:
Tracking of stock using RFID involves either tracking
very fast way of inputting the results of a survey
livestock (on a farm) or goods in a shop, supermarket, or
more accurate than keying in data
distribution centre.
more accurate than OCR methods
RFID in passports:
Disadvantages:
The data on the RFID chip is read when the passport is
designing the forms is a very complex job
scanned.
there can be problems if they haven’t been lled
Your photo is clicked and compared to the RFID chip
correctly
image.
often only work with black pens or pencils
If face recognition passes, some checks are made to
2. Optical Character Recognition (OCR) ensure you are eligible to enter the country, and if you
are, the gate opens automatically.
Automatic Number Plate Recognition (ANPR) systems: RFID in automobiles:
The sensor sends a signal to instruct a camera to Tags allow or deny access to parking in a secure,
capture an image of the front of the vehicle private car park.
An algorithm is used to locate and isolate the number RFID tags in lorries and delivery vans can be used at
plate from the image taken by the camera. weigh stations to ensure the vehicle is not carrying too
The brightness and contrast of the number plate are much weight.
rst adjusted. Each character on the number plate is RFID tags can be used on a car production line to track
then segmented. its progress through assembly.
Each character is then recognized using OCR RFID in contactless payments:
software. The characters are converted into a string of The embedded chip on credit/debit cards and the
editable text by the software. antenna enable customers to wave their card over a
This text string is then stored in a database. reader at the point of sale terminals to make
A barrier is raised, and the motorist is issued with a payments
ticket. The ticket shows the date and time of entering Smartphone apps can also be used to make
the car park. contactless payments.
When the car returns to the car park, they insert their Advantages:
ticket into a machine that calculates their charges and No line-of-sight contact is necessary.
registers the payment into the database. It is a very robust and reliable technology.
Advantages: Tags are much more di cult to forge than barcodes.
Used to automatically monitor the average speed of RFID tags can reduce the number of sta needed in,
vehicles over a stretch of road. for example, a warehouse because tracking items is
There is no need to employ a car park or security automatic (thus reducing costs).
guards. It provides a very fast read rate.
It's a much faster system than checking a ticket at the It allows bi-directional data transfer.
exit. Bulk detection is possible.
It can automatically control the entry and exit to a car Disadvantages:
park or private roads. Tag collision is when the signals from two or more
tags overlap, interfering with each other.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Because RFID uses radio waves, they are relatively Satellite Navigation (satnav):
easy to jam or interrupt.
It is relatively easy to hack into the data/signal Used to determine the exact location of a car.
transmitted by the tag. The computers onboard can be used to show directions to
The initial cost of an RFID system is more expensive a destination.
than a comparable barcode system.
Advantages:
4. Near Field Communication (NFC):
Better focus as there isn’t a need to constantly check
Enables short-range wireless communication between paper maps.
devices. Reduces nes by warning drivers about upcoming speed
Allows payment using a smartphone. changes.
Advantages: The system shows an Estimated Time of Arrival (ETA).
Convenient and secure method of payment It is possible to program in the fastest route to avoid
allows for contactless transactions towns.
Disadvantages: The system can also give helpful information such as the
Limited range location of petrol stations.
compatibility issues with some devices
Disadvantages:
5. Biometric recognition:
If the maps are not updated, they can give incorrect
Usually refers to automated technologies for instructions.
authenticating and verifying human body characteristics Road closures due to accidents or roadworks can cause
such as face, iris, retina, nger, thumb, hand and voice. problems.
Advantages: The loss of satellite signals can cause problems.
very high accuracy The system will give incorrect information if an incorrect
very easy to use start-point or end-point is keyed in.
very fast veri cation time
non-intrusive method Geographic Information Systems (GIS)
relatively inexpensive technology
Used to capture, manage, analyze, and display
Disadvantages:
geographically referenced information.
it can make mistakes if the skin is dirty or damaged
Use to determine the distance between two places.
very expensive to install and set up
Used to nd the nearest petrol station or restaurant, etc.
uses a lot of memory for the data to be stored
To protect animal and plant life in certain vulnerable
a person’s voice can be quickly recorded and used for
places.
unauthorized access
It can be used in geography, science, or engineering
an illness, such as a cold, can change a person’s voice,
lessons.
making absolute identi cation di cult or impossible
Advantages:
6.11. Satellite Systems
Allows geographical and thematic data of any kind to be
combined to show how they are connected to each other.
Global Positioning Systems (GPS)
It allows the handling and exploration of vast amounts of
Used to determine the exact location of several modes of data.
transport It allows data to be integrated from a wide range of very
Cars usually refer to GPS as satellite navigation systems di erent sources.
Satellites surrounding the Earth transmit signals to the
Disadvantages:
surface
Computers installed in the mode of transport receive and The learning curve on GIS software can be very long.
interpret these signals GIS software is very expensive.
Knowing their position on the Earth depends on very GIS requires enormous amounts of data to be input.
accurate timing – atomic clocks are used in the satellites, It isn't easy to make GIS programs that are both fast and
which are accurate to within a fraction of a second per user-friendly.
day
Each satellite transmits data indicating its position & time Media Communication Systems
The computer on board the mode of transport calculates
its exact position based on the information from at least Using satellite signals for communication.
three satellites Used by media companies when sending
stories/videos/pictures from remote locations.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
Instruction and guidance for end-users on how to operate the Evaluate the Ease of Use
system. Used to help users e ectively use the system and
overcome problems Look at the solution's usability and accessibility for the
target market. Check to see if the system is simple to
Purpose of the system: Explanation of the system's understand and use and if users have no trouble
intended function and goals completing their jobs.
Limitations: Known constraints or issues with the system Describe the user interface and how it facilitates
Hardware & software requirements: Necessary interaction with the system
equipment and software to run the system Mention any feedback from users regarding their
Loading/running/installing software: Instructions for experience with the system and address any issues
setting up the system on user devices they encountered
Saving les: Procedures for storing data within the system Questions to ask:
Printing data: Steps to produce hard copies of system Are all the users able to use the system and make
data bookings easily?
Adding records: Instructions for creating new entries in Are all the users able to change and cancel bookings
the system easily?
Deleting/editing records: Guidelines for modifying or Can all sta understand how to use the system with
removing existing entries in the system minimal training?
Input format: Structure and format for entering data into
the system Determine the Suitability of the Solution
Output format: Structure and format for presenting data
generated by the system Examine how well the implemented solution satis es the
Sample runs: Examples of system operation, including desired outcome by contrasting it with the original task
input and expected output criteria.
Error messages: Explanations of system warnings and Outline the initial objectives of the system and discuss
error noti cations how the solution addresses each one
Error handling: Steps to resolve issues and errors within Highlight any requirements that may not have been
the system fully met and discuss possible reasons for this
Troubleshooting guide/helpline: Assistance for diagnosing Questions to ask:
and addressing common problems Is the system suitable for each of the departments?
Frequently Asked Questions: Answers to common user Does it meet the needs of the customers?
inquiries Does it meet the needs of the sta ?
Glossary of Terms: De nitions of key terms and concepts Does the solution match the original requirements?
related to the system
Collect and Examine User’s Feedback
7.6. Evaluation
Collect users' responses to the results of testing the
It measures a system's productivity, e ciency, and system. Their feedback can provide insights into potential
compliance with its goals to identify its strengths, issues and improvements and help determine overall
shortcomings, and potential development areas. This user satisfaction.
assessment informs decision-making and improves overall Summarise the testing process, including test data
expected and actual outcomes.
performance over the course of a system's life cycle.
Discuss users' reactions to the system, addressing
Assess the E ciency of the Solution any concerns or suggestions they may have
Analyse the system's e ciency in time, money, and Identify Limitations and Suggest Necessary
resource use. Examine whether the system is performing Improvements
at its best or if its e ciency could be increased.
Provide examples of speci c aspects that contribute to Based on the analysis of e ciency, ease of use,
the system's e ciency appropriateness, and user feedback, identify any
Identify areas that may be consuming excessive limitations in the system and suggest necessary
resources or time and suggest ways to optimize them improvements
Questions to ask: List the limitations and provide explanations for each
Does it operate quicker than the previous system? one
Does it operate by reducing sta time in making Recommend speci c changes or enhancements for
bookings? these issues
Does it operate by reducing sta costs?
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
2. Fire: ICT devices require electricity to charge or run; too Data must be processed lawfully, fairly, and transparently,
many devices using a single socket can cause the plug socket with clear consent from the individual.
to overload, and heat is generated by too much electricity, Data should only be collected for speci c, explicit, and
causing the wiring to degrade and ignite a re. legitimate purposes.
The causes and reduction tactics for re include: Organizations should only collect and retain the minimum
personal data necessary for their stated purpose.
Socket overload: Ensure enough plug sockets in the room, Data should be accurate and up-to-date, and reasonable
don’t plug too many devices into the same socket, and steps must be taken to rectify or erase inaccurate
don’t leave devices plugged in and unattended.
information.
Overheated equipment: Ensure that equipment is
Personal data should not be kept longer than necessary
properly ventilated and not obstructed, keep ammable and should be securely deleted when no longer needed.
materials away from heat sources, regularly check
Organizations must protect personal data against
equipment for signs of wear or damage, use re unauthorized or unlawful processing, accidental loss,
extinguishers in case of emergencies, turn o or unplug
destruction, or damage.
devices when away from the location, do not cover any air
vents on devices. Why is data protection legislation required?
3. Trailing cables: Devices can be plugged in using cables.
Protecting Individual Rights: Data protection legislation
Cables that are protruding can cause an accident; you can
safeguards individuals' right to privacy and control over
trip over a cable left out in a location, and body damage can
their personal information.
occur during a fall, for example, breaking bones, ligament
Preventing Misuse of Personal Data: It helps prevent
damage, bruising, sprains, etc. depending on the area fell on
unauthorized access, identity theft, fraud, and other forms
Trailing cables causes and prevention strategies:
of data misuse.
Unorganized/insecure cables: use cable ties to secure Promoting Trust: Data protection laws build trust between
cables, keep cables packed correctly in, let’s say, a table, individuals and organizations by ensuring their personal
therefore not coming in the way of walking paths, use information is handled responsibly.
wireless devices where possible, and regularly inspect Encouraging Responsible Data Handling: Legislation
cables for signs of wear or damage. promotes responsible data collection, storage, and
processing practices among organizations.
4. Heavy falling equipment: Devices have varying levels of Enabling Data Subject Rights: Legislation grants
weight, and if a device falls on you, it could cause injury; any individuals rights such as access to their data, right to
device should be placed in a secure location, like a PC on a recti cation, erasure, and objection to processing.
solid desk and not near the edge.
Causes and reduction tactics for falling equipment: Personal Data
Improperly secured equipment: Ensure that equipment is Refers to information that can be used to identify an
properly secured and stable. Regularly check the stability individual
of locations containing devices. Examples
Equipment on unstable surfaces: Keep equipment away Personal Name
from edges and other potential hazards, and regularly Address
Date of birth
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
There are multiple methods by which data can be threatened, It is creating data in a format that cannot be read without
including: a decryption key. Data on hard drives, emails, cloud
storage, and secure websites (HTTPS) are all protected by
Hacking: Unauthorized access to computer systems or encryption. Without a decryption key, it assures that even
networks to gain control, steal information, or cause if unauthorized people obtain data, it cannot be decoded.
damage, thus leading to identity theft, privacy breaches,
and misuse of data 5. Firewall:
Phishing: Deceptive emails or messages that are received
from trusted sources to trick individuals into revealing A rewall is a network security device that monitors and
personal data manages incoming and outgoing network tra c. Its goal
Pharming: Manipulation of DNS (Domain Name System) is to separate an internal network from other networks by
to redirect users to fraudulent websites, often to steal ltering data according to established criteria. It assists in
personal data preventing malware, unauthorized access, and other
Smishing: Phishing attacks carried out through SMS or network risks.
text messages
6. Two-factor authentication:
Vishing: (aka voicemail phishing) Phishing attacks carried
out through voice messages to trick users into calling the A security mechanism that requests two di erent kinds of
telephone number contained in the message identi cation from users to con rm their identity. To
Viruses and malware: Viruses are program codes that can provide additional protection outside of just a username
replicate/copy themselves to cause data loss or and password, 2FA was created. Typically, it combines
corruption. Malicious software designed to disrupt, something that uniquely identi es a user, like biometric
damage, or gain unauthorised access to computer data, with something the user has, like a smartphone and
systems or networks a token or something they know, like a password.
Card fraud: Unauthorized use of credit or debit card
information for fraudulent purposes caused by shoulder 7. User ID and password:
sur ng, card cloning, or keylogging.
A typical authentication technique uses a password plus a
secret code (user ID) to identify. To strengthen data
Protection of Data
security, user IDs and passwords restrict access to only
Multiple techniques are implied for the protection of data, authorized users. Using secure passwords and changing
inclusive: them frequently is critical to ensure security. When
1. Biometrics: creating passwords, it is advised to utilize a mix of
uppercase, lowercase, digits, and special characters.
Individuals' distinctive physical or behavioural traits, such
as ngerprints, faces, or irises, can be used for access
control and veri cation. Since biometric data is hard to 9. Audience
fake or duplicate, it o ers a more secure form of
identi cation.
9.1. Audience Appreciation
2. Digital certi cate:
To express gratitude and value for the users by providing
A digital record that attests to a website's reliability and helpful and relevant information, fostering positive
integrity. A digital certi cate is used to provide safe experiences, and contributing to their understanding and
communication and to build con dence between parties. learning.
Identi er data, the entity's public key, and a third party's
digital signature are frequently found in digital Planning ICT Solutions
certi cates.
The rst step to building e ective ICT solutions is
3. Secure Socket Layer (SSL): identifying and understanding the intended audience's
needs. These needs can be functional, like processing
A protocol that creates a secure connection between a information, or aesthetic, like a visually appealing
client computer and a server. SSL ensures that interface.
information communicated between a server and client After identifying the needs, select the appropriate
stays private and cannot be intercepted or changed by technology and tools to create a solution. This choice
unauthorized parties. A website's identi cation for it is the depends on factors like the complexity of the task, the
S at the end of HTTP. budget available, and the technical expertise of the users.
An essential aspect to remember while designing ICT
4. Encryption:
solutions is to ensure they are user-friendly. This means
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
they should be intuitive to use, require minimal training, Other techniques include software product activation,
and have easy-to-understand instructions. which needs a unique code to be fully functional.
Additionally, ICT solutions should be accessible to all Given that pirated software frequently cannot receive
users, including those with disabilities. This could involve automatic upgrades, which renders it less e ective and
adding features like voice commands, larger text options, secure over time, automatic updates may also serve as a
or compatibility with assistive devices. kind of copyright protection.
Once the solution is created, it is crucial to test it to
ensure it functions as expected and ful ls the users'
needs e ectively. 10. Communication
Analysing Audience Requirements 10.1. Communication with Other ICT
Designing an ICT solution requires an understanding of users Using E-mail
the target audience. The study should consider elements
a ecting the audience's capacity to use the solution, like E-Mail
age, technical pro ciency, and expertise.
The solution creator should know the audience's Uses:
requirements for information. This could serve as a
Email is a technique of sending and receiving messages
design cue for the data processing elements and the
information architecture. and les via the Internet.
How the audience utilizes and consumes the content also It is employed in personal communication, business
in uences the design. For instance, the answer should be communications, and marketing.
mobile-friendly if the audience accesses it mostly through Acceptable language must be used based on the email's
mobile devices. recipient, for example, professional when composing a
Finally, the designer should consider any unique work-related email.
requirements of the audience, such as visual or auditory Employers frequently establish requirements for
impairments. These requirements should be taken into professional language, substance, and email frequency.
account when designing the solution ensuring inclusivity. Email security is critical to preventing sensitive data from
being accessed or manipulated.
Netiquette is the proper conduct and politeness when
9.2. Copyright using email.
Don’t be abusive
What makes Copyright Necessary? Don’t send spam
Be clear and concise with your message
Copyright regulation is crucial to safeguard the rights of
Remember that posts are usually public and can be
developers and innovators.
read by anyone.
It stops software piracy, which is unauthorised use,
Always check your spelling and grammar.
replication, or distribution.
Respect people's privacy and do not discuss or publish
It guarantees developers receive compensation for their
information that might embarrass somebody.
e orts, fostering additional innovation and development.
Forgive people’s mistakes
Do not use CAPITAL LETTERS to highlight comments
Principles of Copyright in a Computer Software
Do not plagiarize
Do not use too many emoticons, as they might annoy
Copyright law prohibits the unauthorized copying,
your readers.
distribution, or modi cation of software.
Email groups enable mass communication to a speci c
It also includes the End-User License Agreement (EULA),
group of subscribers.
which outlines what the software can and cannot be used
for Guidelines set by employers:
Violations of these principles, such as software piracy, can
lead to legal consequences. It is up to companies to decide if personal emails should
be permitted on their systems
Preventing Software Copyright Violation Companies may specify which company devices are
allowed to be used
Software developers employ various copyright protection There needs to be a company standard style when
strategies, such as Digital Rights Management (DRM). sending emails
Due to DRM methods and systems, copyrighted works are It must be made clear what email content is not permitted
subject to usage, modi cation, and distribution Employees should be told only to use their accounts when
restrictions. sending emails
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
An intranet's main goal is to make it easier for platforms where users can connect with others and
employees to communicate, work together, and share share content
information. include platforms like Facebook, Twitter, Instagram,
Extranets make it easier for external stakeholders to and LinkedIn
collaborate and communicate with a company. It require users to create a pro le and allow them to
enables the organization and its reliable clients or share text, images, videos, and links
partners to share information, documents, and facilitate interaction, collaboration, and information
resources securely. sharing on a large scale
privacy settings allow users to control who can see
Many use the terms “Internet” and “World Wide Web” their content
interchangeably. However, they can’t be used in the same
context: The Functionality of the Internet
- The internet refers to the global network of computers and
other devices connected through routers and servers. Internet service providers (ISP): A company that provides
However, the World Wide Web is a collection of websites and internet access. Typically, a monthly fee is charged for
webpages accessed via the Internet. this service. Users' accounts are created when registering
with an ISP and acquiring login information such as user
Blog:
ID and password.
It is a website or section of a website that continually
Uniform Resource Locator (URL): The address of a web
shares new information, frequently written informally
page on the WWW. It is a text-based address that uniquely
or conversationally, similar to a journal.
identi es the location of any resource available on the
usually presented in a reverse chronological manner
internet. The three main components are:
usually managed by individuals or small groups
Protocol:
allow for reader comments, facilitating some level of
It is the communication protocol used to transfer data
discussion
between the client and the server
often focus on speci c topics, such as food, travel,
E.g. HTTP, HTTPS, FTP, and others
fashion, technology, or personal experiences
Domain:
also serve as a platform for sharing opinions or
it is the name of the server where the resource is
insights
located
Forum:
it can be a name or an IP address
an online discussion site where people can hold
Webpage/ le name:
conversations in the form of posted messages
it is the location of the le or resource on the server
often organized around speci c topics or interests and
it can contain the name of the le or directory where
divided into categories known as threads
the resource is located
primarily focused on peer-to-peer interaction A URL looks like this:
may require users to create an account before posting
protocol://domain/path/ lename
can be moderated or unmoderated
E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is a
A moderated forum is an online discussion forum
URL that consists of the HTTPS protocol, the domain
in which an administrator checks posts before they
name "www.hoddereducation.co.uk", the path is
are allowed to be posted.
“IGCSE” and the lename is “ICT”
The internet is essentially a huge unmoderated
A hyperlink is a word/phrase/image which references
forum. No one ‘owns’ the internet, and it is
data that the reader can follow by clicking or tapping,
essentially not policed.
usually taking you to another web page
Wiki:
A web browser is a software application used to locate,
a type of website that allows users to add, remove, or
retrieve, and display content on the WWW, including web
edit content
pages, images, video, and other les
designed to facilitate collaboration and knowledge
sharing from many people
Use of Search Engines
holds information on many topics which can be
searched There are two fundamental methods for obtaining
posts are not in chronological order information via the Internet. The rst method is to enter the
structure is determined by the content or its users URL if you know the website's address. If you don't know
The most famous wiki is Wikipedia, an online where to look, the second option is to employ a search engine
encyclopedia to locate the information you seek.
changes can be tracked and reverted if necessary,
and the content is usually written in a neutral style Advantages of using the Internet to nd information
Social networking: information tends to be up to date because it is
quicker and easier to amend
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.
CAIE IGCSE ICT
The Internet has vast amounts of information Evaluating Information Found on the Internet
searching for information using a search engine is fast
and easy Although the internet provides much information, not all
people can look for information in the comfort of their are genuine or dependable.
own home Consider the source's reputation and trustworthiness
information on the internet is essentially free of when determining the information's dependability.
charge Check the accuracy of information by comparing it to
webpages may have multimedia elements, making other reliable sources.
learning more interesting Assess whether the information is skewed, keeping an
Disadvantages of using the Internet to nd information eye out for views pushing a particular point of view.
it isn’t regulated; anything can be posted Check if the material is current, as obsolete information
always the risk of accessing inappropriate websites might be deceptive.
too easy to be distracted by the many distractions
available on the internet Internet Protocols
Some research skills are lost when using the internet,
as search engines do all the work for you. Protocols are rules on which the sender and recipient agree
when data is exchanged between devices.
Speed of Searching 1. Hypertext transfer protocol (HTTP): when a web page is
being accessed, entering http:// at the front of an address
Search engines may scan billions of online pages to locate tells the web browser that ‘HTTP rules’ for communication are
matches to your search query in a fraction of a second. to be obeyed.
Your internet connection and the e ectiveness of the 2. Hypertext transfer protocol secure (HTTPS): A secure
search engine's algorithms in uence the speed. version of HTTP that encrypts data for security.
3. File transfer protocol (FTP): network protocol used when
Amount of Information transferring les from one computer to another over the
internet. It is similar to HTTP, but the protocol speci cally
Because search engines can deliver a deluge of transfers les.
information, utilising particular and relevant search 4. Secure sockets layer (SSL): a protocol that allows data to be
phrases is critical. sent and received securely over the internet.
Adding quotation marks for speci c phrases, "+" signs for
required terms, and "-" signs for omitting terms can help Risks of Using the Internet
narrow the search.
Inappropriate and unlawful content: The internet may
Finding Relevant and Reliable Information attract people to potentially dangerous or illegal
materials.
The search engine algorithm determines the relevancy of Data restriction: Parental, educational, and ISP
information by considering parameters such as keyword restrictions can all be used to restrict access to speci c
frequency & page quality. information or websites.
Reliable information is often obtained from recognized
sources such as educational, government, or well-known
industry websites.
WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by Saksham Yadav at PODAR INTERNATIONAL SCHOOL CAMBRIDGE on 28/07/24.