FORM 5 Notes
FORM 5 Notes
File Compression
Hardware
Internal Components
Central Processing Unit (CPU): the computer's "brain" that performs calculations, processes
instructions, and controls other components
Processor: a chip inside the CPU that carries out instructions from a program
Motherboard: the main circuit board that connects all internal components
Internal Memory
Random Access Memory (RAM): temporary storage for running programs and data; it is
volatile, meaning data is lost when the computer is turned off
Read-Only Memory (ROM): permanent storage for essential data, like the computer's BIOS;
it is non-volatile, meaning data is retained even when the computer is turned off
Hardware Components
Worked example
A computer contains internal hardware. Write down the most appropriate item of internal
hardware to match the descriptions.
[1]
b. A printed circuit board that contains the main components of the computer
[1]
Motherboard [1]
1
c. This generates output for the speaker
[1]
d. A type of memory where data is lost when the computer is switched off
The Central Processing Unit (CPU) is the computer's "brain" responsible for
processing instructions entered into the computer
The CPU processes instructions and performs calculations in order to produce an
output
CPU Functions
CPU Components
Software
Download PDF
Software
Software refers to programs that control the operation of a computer or the processing
of electronic data
Application Software
Application software provides the services that users require to solve a task
E.g.:
o Word processing: creating and editing text documents
o Spreadsheet: organising and analysing data in a grid format
2
o Database management systems: storing, retrieving and managing data in
databases
o Control/measurement: uses sensors to measure and control a system
o Applets and apps: specialised software for specific tasks
o Video editing: creating and modifying video files
o Graphics editing: creating and modifying images
o Audio editing: creating and modifying sound files
o Computer Aided Design (CAD): designing and modelling objects in 2D or
3D
System Software
System software provides the services that the computer requires to operate e.g.
o Compilers: translating high-level programming languages into machine code
o Linkers: combining object files into a single executable program
o Device drivers: controlling hardware components and peripherals
o Operating systems: managing the computer's resources and providing a user
interface
o Utilities: tools for maintaining and optimising the computer's performance
Worked example
Tick whether the following are examples of applications software or system software
[2]
Control software
Compiler
Word processor
Device driver
Applications System
Software Software
(✓) (✓)
Control software ✓
Compiler ✓
Word processing ✓
Device drivers ✓
2 marks for 4 correct ticks
1 mark for 2 or 3 correct ticks
0 marks for 0 or 1 tick
Exam Tip
3
A common misconception is that control software is system software - it's actually
application software
Operating Systems
An Operating System has a user interface to allow the user to interact with the computer.
There are different types of user interfaces:
Type of Operating
Advantages Disadvantages
System
4
compared to CLI
learn Consumes more system
Visually appealing resources (RAM / HDD)
Better help facilities Slower to run as graphics
Interface
Can exchange data between have to be loaded
different applications Restrictive as can only use
pre-defined functions
Exam Tip
Make sure you explain your answer in full - GUI requires more power is not enough
on its own and needs expansion
Make sure you know a range of both benefits and drawbacks
Analogue data can have any value within a range, while digital data has a
limited set of values
Digital data is less prone to noise and distortion compared to analogue data
Digital data can be easily manipulated, stored, and transmitted by computers
5
Digital data must be converted to analogue data so it can be used to control
devices
This process is called digital-to-analogue conversion (DAC) and is
performed by a digital-to-analogue converter
Worked example
[2]
Two of:
So that the data from the sensor can be understood by the computer [1]
CPU Functions
CPU Components
6
Memory
Memory
Memory is used to store data and instructions temporarily for the computer to
process
ROM RAM
Q. Worked example
State two characteristics of RAM
[2]
Two of:
RAM can be read from and written to [1]
RAM is volatile memory [1]
RAM is temporary storage [1]
Exam Tip
Make sure you know the difference between RAM & ROM - it's easy to get them mixed up
Input devices send data or instructions to the computer, while output devices
receive data from the computer
Input devices are used for user interaction and data entry, while output
devices display or produce the results of data processing
8
Sensors detect changes in Can automate tasks, May require
Sensors and Light
the environment; light pen provides real-time calibration, affected by
Pen
interacts with screens information the environment
Exam Tip
Note that a mouse isn't built into a laptop - instead, it would be another
pointing device e.g. trackpad
All the devices listed here are input devices. Some people think microphones
and webcams are output devices
Direct Data
Use Advantages Disadvantages
Entry Device
Chip and PIN Processing debit and credit Secure, quick transaction, Requires PIN input,
Reader card transactions in stores reduced fraud risk potential for skimming
9
Q. For each of the following uses of data capture, name one appropriate direct
data entry device. The devices must be different in each case
[1]
[1]
[1]
Output Devices
Download PDF
Output Devices
Characteristics of Output Devices
Input devices send data or instructions to the computer, while output devices
receive data from the computer
Input devices are used for user interaction and data entry, while output
devices display or produce the results of data processing
10
Displaying computer-generated Real-time display, Power consumption,
Monitor
visual information on a screen adjustable settings potential glare
Touch Displaying visual information and Susceptible to smudges,
Screen allowing user interaction with the Intuitive, space-saving potential calibration
(Output) screen issues
Projecting computer-generated
Multimedia Large display, good for Requires darkened room,
images and videos onto a larger
Projector presentations expensive bulbs
surface
Printing high-quality text and Fast, high-quality prints, Expensive initial cost,
Laser Printer
graphics quickly lower cost per page limited to flat surfaces
Inkjet Printing text and graphics using Lower initial cost, high- Slower, higher cost per
Printer liquid ink quality prints page, ink may smudge
Printing text and simple graphics
Dot Matrix Low cost, can print
using a print head that strikes an ink- Noisy, low print quality
Printer multi-part forms
soaked ribbon
Creating large-format graphics, such
High accuracy, can print Slow, expensive, large
Plotter as architectural plans and
on various materials size
engineering designs
Creating three-dimensional objects Customisable designs, Limited materials, slow
3D Printer
by adding material layer by layer rapid prototyping process
Range of sizes and
Converting digital audio signals into Can be power-hungry,
Speaker power outputs,
sound the sound quality varies
immersive audio
Converting electrical signals into
Precise movement, Requires power, potential
Actuator physical movement, e.g., motors and
programmable mechanical wear
valves in robotics
Holographic imaging
o Ultrasound images
o 3D views of our internal organs
Worked example
Complete the following sentences using the most appropriate items from the list
below.
11
A 3D printer An ADC A compiler An interpreter A microphone
A monitor A numeric keypad A speaker A switch A USB
a. ________ is a device used to input a pin
[1]
[1]
An interpreter [1]
[1]
A 3D printer [1]
[1]
A speaker [1]
Exam Tip
Make sure you know which printer is which. Some people get mixed up
between dot matrix and laser
Detail is needed in the description in order to achieve full marks. Relating the
answer back to the scenario is important as some printers would not work in
the given scenario.
Storage
Storage
Characteristics of Backing Storage
Backing storage: long-term storage used to store data, files, and programs when not
in use e.g.:
o hard disk drives (HDD)
o solid-state drives (SSD)
o USB flash drives
o optical discs (CDs, DVDs)
12
Backing storage is typically slower than internal memory but has a larger capacity
It is non-volatile, meaning it retains data when the computer is powered off
Access
Slower Faster
Speed
Storage Media
Storage
Examples Use Advantages Disadvantages
Media
13
Worked example
Q. Give two error messages that may appear when trying to save to a CFast solid-state
memory card.
[2]
Two of:
Storage Devices
Storage
Use Media Advantages Disadvantages
Devices
14
Backup and archiving, High storage
Magnetic Magnetic Slow access time,
especially for large capacity (10TB),
Tape Drives Tape sequential access
volumes of data low cost
Audio and data storage, Affordable, widely Low capacity (700MB),
CD CD
software distribution compatible susceptible to scratches
Higher capacity storage for Higher capacity Susceptible to scratches,
DVD data, video, and software DVD than CD (8.5GB), lower capacity than Blu-
distribution affordable ray
High capacity
High-definition video and (50GB), high- More expensive, and
Blu-ray Blu-ray
high capacity data storage resolution video requires specific hardware
storage
Fixed Solid- Fast access time, no
Fast internal storage for More expensive, limited
State Drive Solid-State moving parts, high
modern computers write cycles
(SSD) capacity (30TB)
Fast access time,
External storage for fast portable, no moving More expensive, limited
Portable SSD Solid-State
data transfer and backup parts, high capacity write cycles
(2TB)
Small size, fast Limited capacity
Portable data storage and
Pen Drive Solid-State read/write speeds, compared to other storage
transfer for various devices
high capacity (1TB) devices
Worked example
Q. A program collects a large amount of data and this could be stored using either a
fixed solid-state drive (SSD) or cloud storage.
a. Describe four advantages to the school of using cloud storage rather than using the
SSD
[4]
Four of:
The data could be sent directly to/from the cloud from any computer/device [1]
Storage capacity can be increased without adding additional physical devices [1]
The school would only pay for the storage used [1]
15
There is an automatic backup of data [1]
b. Describe three disadvantages to the school of using cloud storage rather than using the
SSD
[3]
Three of:
More security issues as multiple copies of the data are stored [1]
The school loses control over the storage of the data [1]
TYPES OF COMPUTERS
Desktop Compuers
a)Desktop Computers
Characteristics of a Desktop Computer
16
Education:
o Access to educational resources
o Creating and editing multimedia content
o Conducting research
o Distance learning and virtual classrooms
Gaming and entertainment:
o High-performance gaming
o Streaming movies and TV shows
o Social media browsing
o Creating and editing video and audio content
b)Mobile Computers
Portable computing devices, such as laptops, smartphones, tablets, and phablets, that allow
users to access and use computer applications and resources on the go
Laptop Computers:
o Portable with integrated display, keyboard, and touchpad
o Battery powered
o Less powerful and less expandable than desktops
Smartphones:
o Portable and lightweight
o Touchscreen interface
o Multifunctional (phone, internet access, camera)
o Anti-glare screen
o Front and rear facing camera
o Battery powered
o Uses Bluetooth, WiFi, 3G, 4G, 5G
o Has an on screen keyboard
Tablet Computers:
o Larger touchscreen than smartphones
o Ideal for media consumption and web browsing
o Limited expandability
o Anti-glare screen
o Front and rear facing camera
o Battery powered
o Portable and lightweight
o Uses Bluetooth, WiFi, 3G, 4G, 5G
o Has an on screen keyboard
Phablet Computers:
o Combine features of smartphones and tablets
o Larger screen than smartphones
o Can be used for phone calls
17
Uses of Mobile Computers
Advantages Disadvantages
18
Download PDF
AI
This is the development of computer systems that can perform tasks usually
requiring human intelligence, such as visual perception, speech recognition,
and decision-making
VR & AR
Virtual Reality (VR):
o A computer-generated simulation of a three-dimensional replicated
environment
o It can be interacted with in a seemingly real or physical way
o Can manipulate objects or perform a series of actions
o Makes use of the sensory experience
o Uses a virtual reality headset with built in speakers
o Can be used with gloves / controllers / driving wheel
Augmented Reality (AR): A technology that superimposes a computer-
generated image or information onto a user's view of the real world, providing
a composite view
Worked example
Q.Some smartphones connected to the internet can allow the user to point
their phone’s camera at an object or image to display information about it on
the phone’s screen. The object acts like an item in a search engine. This is
called augmented reality.
One example of its use is in mobile games, where the user tries to catch
19
characters from the game as the characters appear to walk in the streets.
Explain, using examples, other ways in which augmented reality could be used
in everyday life.
[4]
point it at a word to link to the thesaurus / get it's meaning / translation / modern
landscape [1]
Used by the police to recognise suspects [1]
Exam Tip
Don't get mixed up between augmented reality and virtual reality - augmented
reality changes the real world in front of you (e.g. Pokemon Go) whereas
virtual reality puts you in a new world entirely and you can't see the real world
around you
20
E.g. if 10 images were to be displayed on a website and their original size was 18MB
each, with an internet connection of 32 megabits per second the webpage would take
around 45 seconds to load and require 180 Mb of storage space online to host the
images
Using lossy compression it is possible to compress the files down to around 10% of their
original size meaning that the same internet connection would require just 4 seconds to
load the images and the storage requirement for the files would be 18MB
There are many different technical ways that file sizes can be reduced however some simple
methods and techniques for multimedia files are below:
Carbon Copy (CC) is used when you want to include additional recipients to view the
email
Blind Carbon Copy (BCC) is used when you want additional recipients to view the email
without other recipients knowing
Forward allows you to send an existing email to a new recipient
Attachments allow files to be sent along with the email message
21
Worked example
Discuss the advantages and disadvantages of social networking rather than email as a means of
communication.
File Formats
Generic File Formats
Generic file formats are files types that are compatible and allow sharing between
different devices and software programs
Non generic files are types that require special software or hardware to be accessed
Generic file types are needed for the following reasons:
o Generic files allow the exchange of data across many different types of software
and applications
o Generic files are widely adopted and therefore can be accessed by many users or
devices
o A single generic file can be created, edited and accessed across many different
devices
22
o Maintain high image quality while keeping file sizes small
o Used in online platforms, including social media, messaging apps, and websites
Text (.txt)
o Used for storing plain text data
o Contains only human-readable text without any additional formatting or styling
o Extensively supported across different platforms and applications
o Can be opened and edited using a word processor or basic text editor
23
o They can be opened and edited using a wide range of text editors and word
processors, making them suitable for creating documents that require basic
formattings, such as letters, reports, and academic papers
Zip (.zip)
o A container used for compression
o Allows multiple files and folders to be compressed into a single, smaller-sized
archive
o Uses lossless compression algorithms to reduce file sizes
o Compression preserves original content
o Convenient for bundling multiple files into a single package
24
What is a Firewall?
Firewall is a device or a piece of software that is placed between your computer and the external
network (where the hacker is, e.g., the internet).
If you wish to protect your whole LAN from the hacker on the internet, you would place a
firewall between the LAN and internet connection.
3. If the data fails the criteria, the firewall will block the traffic and give the user (or
network manager) a warning that there may be a security issue.
4. The firewall logs all incoming and outgoing traffic to allow subsequent investigation by
the user (or network manager).
5. Criteria can be set so that the firewall prevents access to certain undesirable sites; the
firewall can keep a list of all undesirable IP addresses.
6. It is possible for firewalls to help prevent viruses or hackers entering the user's
computer network.
7. It is also possible for firewalls to help prevent hackers gaining access to the user's
computer or network. This can be done by blocking IP addresses, but it should be
pointed out that hackers can still have access to a computer or network if they are using
an allowed computer.
8. The user is warned if some software on their system is trying to access an external data
source (for example, an automatic software upgrade); the user is given the option of
allowing it to go ahead or request that such access is denied.
The firewall can be a hardware interface that is located somewhere between the computer and
the internet connection, in which case it is often called as a gateway. Alternatively, the firewall
can be software installed on a computer; in some cases this is part of the operating system.
25
All of these issues require management control (or personal control on a single computer) to
ensure that the firewall is allowed to do its job effectively.
What are the circumstances or situations when a firewall cannot prevent potential harmful
traffic?
In the following circumstances the firewall cannot prevent potential harmful traffic:
1. Individuals on internal networks using their own modems cannot be prevented from
bypassing the firewall.
3. Stand-alone computer users disabling the firewall on the machines, leaving their
computer open to harmful traffic from the internet.
Security Protocols are sets of rules used by computers to communicate with each other across a
network — when using the internet.
Secure Sockets Layer (SSL) is a type of protocol that allows data to be sent and received securely
over the internet.
SSL encrypts the data when a user logs on to a website. Only the user's computer and the web
server understand what is being transmitted. A user can find out whether SSL is being applied if
they see https as part of the website address or the small padlock in the status bar at the top of
the screen.
Explain how the communication between browser and web server takes place using SSL
connection.
26
The user's web browser sends a message so that it can connect with the required website, which
is secured by SSL.
The web browser requests that the web server identify itself. The web server responds by
sending a copy of its SSL certificate to the user's web browser.
If the web server can authenticate this certificate, it sends a message back to web server to allow
communication to begin. Once this message is received, the web server acknowledges the web
browser and the SSI-encrypted two-way data transfer begins.
SSL certificates are small data files that digitally bind an encryption key to an organisation's
details. When installed on a web server, it shows as the green padlock and the https protocol and
ensures secure connections from a web server to a web browser.
Transport Layer Security (TLS) is similar to SSL but is a more recent security system. TLS is a
form of protocol that ensures the security and privacy of data between devices and users when
communicating over the internet. It is essentially designed to provide encryption, authentication
and data integrity (data integrity is maintaining the accuracy and the consistency of data) in a
more effective way than its predecessor, SSL.
When a website and a user communicate over the internet, TLS is designed to prevent a third
party hacking into this communication and causing problems with data security.
2. Handshake Protocol: This permits the website and the user to authenticate each other
and to make use of encryption algorithms to establish a secure session between user and
website.
27
Only the most recent web browsers support both SSL and TLS, which is why the older SSL is still
used in many cases. But then the question arises as to what are the main differences between
SSL and TLS, as both effectively do the same thing?
2. TLS can make use of session caching, which improves the overall performance compared
to SSL.
3. TLS separates the handshaking process from the record protocol or layer, which holds
all the data.
Session caching
When opening a TLS session, it requires a lot of computer time mainly due to the complex
encryption keys being used. The use of session caching can avoid the need to utilise so much
computer time for each connection. TLS can either establish a new session or attempt to resume
an existing session; using the latter can boost system performance considerably.
Note: A cache is a collection of processed data that is kept on hand and reused in order to avoid
costly repeated database queries.
What is Encryption?
Encryption is a process which converts information into a form that is meaningless to anyone
except holders of the key. E.g., Email message sent by using encryption is meaningless to others
without the decription key. Here, even if the message is hacked or accessed illegally, it is useless
to them without the decryption key, though encryption cannot prevent hacking.
Encryption uses a secret key that has the capability of altering the characters in a message. If
this key is applied to a message, its content is changed, which then makes it unreadable unless
the recipient also has the same secret key. When this secret key is applied to the encrypted
message, it can be read.
28
The key used to encrypt or encode the message is known as the encryption key; the key used to
decrypt or decipher the message is known as the decryption key. When a message undergoes
encryption it becomes cypher script; the original message is known as plain text.
Encryption is used by countries to protect secrets. Military use encryption to protect important
messages sent to the armies. These messages are secret messages and confidentiality is needed
to protect it or guard it from enemies.
Authentication is used to verify that data comes from a secure and trusted source. It works with
encryption to strengthen internet security.
A digital certificate is a pair of files stored on a user's computer. These are used in the security of
data sent over the internet. Each pair of files is divided into:
1. A public key which is known to anyone and
For example, when sending an email, the message is made more secure by attaching a digital
certificate. When the message is received, the recipient can verify that it comes from a known or
trusted source by viewing the public key information which is usually part of the email
attachment. This is an added level of security to protect the recipient from harmful emails. The
digital certificate is made up of six parts:
3. A serial number
4. Expiry date or the date range during which the certificate is valid
5. Public key which is used for encrypting messages and for digital signatures
29
Operating systems and web browsers maintain lists of trusted CAS.
When logging on to a system (for example, a bank website), a user will be asked to type in their
password - this should be a combination of letters, numbers and special characters that would
be difficult for somebody else to guess. Strong passwords should contain upper case and lower
case characters, as well as numbers and other keyboard symbols, for example: Ek6@n~9=vmz
When the password is typed in, it often shows on the screen as ********* so nobody overlooking
can see what the user has typed in. If the user's password doesn't match up with the user ID
then access will be denied. Many systems ask for the password to be typed in twice as a
verification check. To help protect the system, users are only allowed to type in their password a
certain number of times - usually three times is the maximum number of tries allowed — before
the system locks the user out. After that, the user will be unable to log on until the system
administrator has reset their password.
For example, if a user forgets their password when using the internet, they can request that the
password is sent to their email address. The password is never shown on the computer screen
for reasons of security.
Passwords should be changed on a regular basis in case they become known to another user or
even a hacker. In particular, it is important to prevent other people gaining access to your
password by way of spyware or viruses.
It is often necessary to use a user ID or log in ID as well as a password. This gives an additional
security level since the user ID and password must match up to allow a user to gain access to, for
example, a bank website.
Biometrics is where parts of a person’s body are used for identification purposes. Biometric
examples include:
1. fingerprint scans
30
2. signature recognition
3. retina scans
4. iris recognition
5. face recognition
6. voice recognition.
All of these parts of the human body are unique from person to person and can be used to
authenticate identity. Before biometric methods be used, people have to perform a process
known as ‘Biometric Enrollment’.
Biometrics are beginning to be used in place of passwords and physical locks as a means of
security.
Biometrics have advantages over these older methods as body parts cannot be lost, forgotten or
stolen as can be the case with passwords and keys. However, biometrics is still a very new
technology and is not yet 100% accurate.
Biometrics is used in a number of applications as a security device. For example, some of the
latest mobile phones use fingerprint matching before they can be operated; some
pharmaceutical companies use face recognition or retina scans to allow entry to secure areas.
Fingerprint scans
1. As every person's fingerprints are unique, this technique would improve security as it is
difficult to replicate a person's fingerprints.
31
2. Other security devices like magnetic cards can be lost or even stolen, which makes them
less effective.
3. It would be impossible to 'sign in' for somebody else since the fingerprints would match
up to one person only on the database.
2. If a person's fingers are damaged through an injury, this can have an effect on the
scanning accuracy.
Retina scans
Retina scans use infrared light to scan the unique pattern of blood vessels in the retina (at the
back of the eye). It is a rather unpleasant technique, requiring a person to sit totally still for 10
to 15 seconds while the scan takes place. It is very secure as nobody has yet found a way to
duplicate blood vessels patterns (the accuracy is about one in ten million).
32
4. More secure mobile phones: Mobile phones contain our lives. We use our phones for
everything from social media to shopping online. They need to be as secure as possible
in order to protect the valuable data that they contain.
Given below is the comparison of their strengths and weaknesses of the six biometric
techniques:
What are the advantages and disadvantages of the six common biometric techniques?
The following are the advantages and disadvantages of the six common biometric techniques:
BIOMETRIC
TECHNIQUE ADVANTAGES DISADVANTAGES
33
BIOMETRIC
TECHNIQUE ADVANTAGES DISADVANTAGES
3. Relatively low-cost
technology.
2. Verification time is
generally less than five 2. Uses a lot of memory for the data to be
seconds. stored.
2. Relatively inexpensive
technology.
In spite of various security systems that are in place in organisations, online credit card frauds
happen and are very common. The mainly happen because of the following reasons:
1. Hackers gaining access of a user's computer through the use of spyware, phishing or
pharming; any of these methods can trick a user, who is not particularly IT literate, to be
tricked into giving personal and financial details, which in turn, enables the hacker to
34
gain full access to a user's account; this can lead to unauthorised purchases or even
removal of money from an account, if it remains undetected for a few days.
2. If the passwords are weak and no encryption is in place, then it is very easy to break
these passwords and gain illegal access to bank and credit card accounts.
3. Always type in a web address or URL instead of 'copying and pasting' from an email or
other websites as many a times these web addresses/URLs are altered very slightly in
the email and the user ends up visiting a fake website. Once they visit the fake website it
is possible that they will give personal and financial details to a fraudster without the
user's knowledge.
4. If internet access is through wireless technology, it is very important that the wireless
network is password protected as it is very easy to tap into the network without the
password.
5. When using public Wi-Fi hotspots like restaurants or airports, it is important to be very
vigilant as there is always the risk of somebody monitoring internet usage in the area
and trying to tap in to the data that is going to and from any computer using this wireless
link.
6. Even large organisations can be subject to cybercrimes; in recent years, the cloud and
some large retail companies have been the targets for hackers, which leaves customers
very vulnerable. E.g. The recent hacking of servers (May 2020) of UK's low cost airline
Easyjet, where 9 million travellers data was stolen by the hackers.
What are precautions that users can take to avoid online credit card frauds?
There are a number of simple precautions users can take to avoid online credit card frauds:
1. Always use varied and complex passwords for all your accounts.
2. Always check the accuracy of bank accounts on regular basis and resolve any
discrepancies immediately.
3. When providing any personal information on sites ensure that they have 'https' in the
web address or have the 'padlock' icon in the web browser.
35
4. Remember never to provide any personal information to any unsolicited requests for
information as these are often signs of phishing attacks.
7. Report any suspicious phishing activity to the company that is used by the perpetrator.
8. When downloading any software from websites, ensure that they can be trusted.
Several computer, especially tablets and laptops and mobile phone manufacturers, encourage
customers to store or backup their files on a medium known as the cloud. Once users purchase
cloud storage, they can access all their files including photos, videos, music and e-books from
any device anywhere in the world.
1. The need to carry memory sticks or USB drives is done away with, if you wish to access
your files away from home.
2. There is no need to pay for large storage capacity on your computer/tablet or mobile
phones.
4. The backed up files are synchronised automatically across all devices resulting in the
latest version of a file saved on say, a desktop PC at home, being available on your laptop
or even your smartphone.
36
5. Cloud storage is also ideal for collaboration purposes; it allows several users to edit and
collaborate on a single file or document — there is no need to worry about tracking the
latest version or which user made the changes.
However, in spite of all these advantages, security concerns still exist about using cloud storage.
The main fears are data security and data loss.
Data security
When companies transfer vast amounts of confidential data from their own systems to a cloud
service provider, they are effectively relinquishing control of their own data security. This raises
number of questions:
1. The buildings where the data centres are housed what is the physical security that is
available there?
2. Are the cloud service provider's data centres adequately protected against natural
disasters or power cuts?
3. Has the cloud server provider taken adequate safeguards regarding their personnel? Can
they access the confidential data and use it for monetary gains?
Data loss
There is a risk that important and irreplaceable data could be lost from cloud storage facilities.
Actions from hackers (gaining access to accounts or pharming attacks, for example) could lead
to loss or corruption of data. Users need to be certain sufficient safeguards exist to overcome
these potentially very harmful risks.
In late September 2014, three breaches of security involving two of the largest cloud service
providers showed why many of the above fears make people a little nervous of using this facility
to store their important files:
1. The XEN security threat, which forced several cloud operators to reboot all their cloud
servers; this was caused by a problem in the XEN hypervisor (a hypervisor is a piece of
computer software, firmware or hardware that creates and runs virtual machines).
37
2. A recent case where a large cloud service provider permanently lost data during a
routine backup procedure.
3. The celebrity photos cloud hacking scandal, where over 100 'interesting' photos of
celebrities were leaked; hackers had gained access to a number of cloud accounts, which
enabled them to publish the photos on social networks and to sell them to publishing
companies.
All of the reasons above have made individuals and companies nervous about using cloud
service providers. A 'game' between hackers and owners of online service companies continues
to simmer. If users are vigilant when using devices connected to the internet, the possibility of
being a victim of cybercrime is considerably reduced.
The general format for a MAC address is that each pair of hexadecimal digits are
separated by a “-”
An example of a MAC address:
o Microsoft has an OUI of 00-15-5D,
o a new laptop straight out of a Microsoft production line could have a MAC
address of “00-15-5D-45-1B-3F”
Exam Tip
38
Two completely different products can contain the same Network Interface
Identifier but they must use their own Organisational Unique Identifier
o Microsoft can have the MAC Address 00-15-5D-45-1B-3F
o Amazon can have the Mac Address 0C-5B-8F-45-1B-3F
Hubs
Hubs are devices that allow several other devices to be connected to them
Switches
Switches are also used to connect several devices together just like a hub; however,
rather than sending data packets to all devices on the network, the switch will only
send the data to its intended device
When a switch receives a data packet, it examines the destination MAC address of
the box and looks up that address in its lookup table
Once it has found the matching MAC address it will then forward the data packet to
the corresponding port
.Worked example
Q .Explain the difference between a switch and a hub regarding data forwarding
capabilities.
[2]
39
A switch forwards data packets based on the destination MAC address and only sends
data to the intended device [1]
A hub broadcasts incoming data packets to all connected devices [1]
Bridges
Bridges are used to connect two networks or network segments to create a
single larger network
An important note is that a bridge cannot communicate with external networks
such as the internet like a router can
40
o High speed data transfer is required
o Long range communication is required
o Many devices are needed to be connected at the same time
Bluetooth Wi-Fi
Q. Worked example
[7]
WiFi coverage can be over a much larger area compared to Bluetooth [1]
41
so that students will be able to access resources wherever they are in the school [1]
students can transfer data without the school having to invest in expensive
infrastructure [1]
Given the current situation, the school is in, the preferred choice for connecting
student's tablets would be Wi-Fi [1]
CLOUD Computing
Cloud computing is a method where data is stored on remote servers and accessed through the
internet
Local storage refers to a storage device that is connected to the computer
Public Cloud - The customer and the cloud storage provider are different companies
Private Cloud - The customer and the cloud storage provider are a single organisation
Hybrid Cloud - Combines both public and private cloud options and allows for sensitive data to
remain private whilst providing public cloud services for less sensitive information
Cloud data is duplicated and stored on other servers to ensure data availability during system
failures, upgrades and maintenance periods
Advantages of Cloud storage
Scalability
As the business requirements change the customer can scale services up or down to meet their
needs
Cost saving
Cloud storage eliminates the need for a business to purchase expensive equipment
for infrastructure and maintenance which can result in significant cost savings
Accessibility
Cloud services are available globally and allow both remote working and data sharing
Reliability
Cloud computing providers offer high levels of uptime ensuring that services are always available for
its users
Storage Space
Cloud services can offer an almost unlimited amount of storage
Backup and recovery
If a customers machine or storage device fails, a backup of the data from the cloud will allow for
recovery
File Synchronisation
Files can be synced across multiple devices
Convenience
A user does not need to carry storage devices around with them as all data is stored on the cloud
42
Internet Connection
A stable internet connection is required to use cloud storage
Security
Storing data in the cloud may be vulnerable to security breaches
Dependency
The user is dependent on the storage provider for the availability and reliability of its services
Ceases to trade/dissolve
Should the company dissolve or cease to change, all cloud data may be lost
Cost
As the amount of storage or bandwidth required increases, the service may become expensive over
time
Worked example
Explain the difference between cloud storage and local storage
[2]
Cloud storage involves storing data on remote servers accessed via the internet [1]
While local storage refers to storing data on physical devices like hard drives or flash
drives [1]
Open
o The Internet is an open network meaning anyone with access can
access the same resources and information as everybody else
Decentralisation
o The Internet is a decentralised network with no owner, controller or
governing body. Instead, it is made up of vast numbers
of interconnecting networks that operate independently but work
together to provide communication
Global Reach
43
o The internet is a global network meaning that people from all over the
world can communicate with each other in real-time
Accessibility
o The Internet is available to anyone who has a suitable device and
access to any one of the interconnected networks
The Internet has many uses and plays a critical role in our lives. This can include;
INTERNET,EXTRANET, INTRANET
Intranets operate in a similar way to the Internet and although they are
still networks, they are usually private and are used to send information
securely and safely
Unlike the Internet which is a global network accessible by all, access to an
organisation’s Intranet is restricted and only accessible to authorised users
such as employees
Charact
eristics of an Intranet
Private
o An intranet is a private network that is accessible to employees within
a company or organisation
Security
o An intranet is usually behind a firewall to ensure security and that only
authorised users can access it
Sharing and Communication
o An Intranet allows for document sharing and the use of collaboration
tools between users. It can also allow the use of email and video calling
to enable efficient communication within the organisation
Customisation
44
o An intranet can be customised to meet the specific requirements of the
business such as navigation and subject content as well as the service
being able to be scaled up as the business grows
Users will require a username and password to access the Intranet
Extranet
An extranet is a private Intranet that also allows access by selected parties
that reside outside of the organisation. These parties, for example, maybe
customers, key stakeholders or clients
External users will have an authorisation level once they have successfully
logged in which will determine which resources they may access
Worked exam
ple
[2]
45
LAN & WAN
Download PDF
LAN
Local Area Networks (LANs) are networks that are usually contained within
a single building or small geographical location
A LAN is made up using hubs and/or switches which will connect several
devices together
It is common for one hub or switch to be connected to a router which will
allow the LAN connectivity to other outside networks such as the internet
WAN
Wireless LANs (WLANs) are Local Area Networks that allow devices to
connect wirelessly rather than using physical cables
Wireless Access Points (WAPs) are connected to an existing wired network
which provides a means to connect wirelessly
Wireless Access Points use spread spectrum technology that has a range
of around 30 to 50 metres compared to Infrared which has a range of around
3 metres
WLANs are often used when it is not practical to use cable or devices that
will access the network do not have Ethernet ports
WLANs support a vast range of devices such as smartphones and laptops
and are very popular in public areas such as shopping malls
46
Advantages of a WLAN include:
o Mobility - WLAN allows users to connect anywhere that is in the range
of a Wireless Access Point (WAP) without the need for additional
hardware or wiring.
o Flexibility - WLANS can be used in a variety of environments both
indoors and out making them highly flexible
o Scalability - As the requirements change, additional Wireless Access
Points can be added relatively easily resulting in additional users being
able to use the network or increased network coverage
o Wireless devices have access to peripherals such as printers
Worked example
[4]
The fitness centre may wish to install a WLAN for several reasons such as :
Customers can connect to their Wi-Fi and search for information such as class times
etc [1]
Staff at the fitness centre will be able to access resources wirelessly such as
printers [1]
Security Issues
When moving electronic data from one place to another, there are different
types of security concerns to consider:
47
o Data interception can occur when an unauthorised user intercepts
data being transferred.
Two common methods are:
Packet sniffing
When dealing with personal or sensitive data it is essential that not only is it
protected from hackers but also that it is protected from accidental disclosures
such as:
o Sending an email with sensitive information to the wrong person
o Losing a device that has sensitive data stored
o Shared access misconfigurations allow unauthorised users access to
sensitive data
48
Anti spyware software can be run regularly to ensure that your information
including your password is not being passed to an unauthorised third party
user
Authentication
There are also other forms of authentication aside from passwords that
utilise what is known as “zero login”
This aims at removing or reducing the need for the user to manually input their
details and instead rely on the system to verify the users credentials
automatically
One such type is known as biometrics where the user's fingerprints or facial
features are scanned to provide unique biometric information
to authenticate the user's details.
Newer methods of zero login types of authentication include the use of
networks, location, device data and human behavioural patterns to recognise
users automatically.
Although these methods offer many advantages there are some concerns that
need to be taken into consideration. They include:
o What personal data is being collected?
o Is the collected data being kept securely?
o Will it log in and out at the correct times?
Magnetic stripe cards are a form of card that stores the user’s data on a
magnetic strip usually on the reverse side
The user scans the card through a reader where the details stored on the card
are compared to the details stored within the system. It the data from the card
matches the data that is store on the system the user is authenticated and
granted access
The advantages to use magnetic stripe cards include:
o Widely used and accepted
o Cheap
o Simple to use
o A single card can serve multiple purposes within an organisation such
as doors, purchasing food from canteens and accessing IT equipment
49
Smart Cards
Smart Cards are cards that contain a chip and can be used as contactless
The card does not need to be inserted or swiped through a machine and can be
detected from a short distance away
Personal identification information can be stored on the card such as name,
address, date of birth and/or banking information
The information on the card is encrypted which means it can only be read by
authorised devices
Often the card will require a personal identification number (PIN) which is
needed to access the information, providing an additional layer of security
Advantages of smart cards include:
o Durable
o Use for a wide range of applications (Payments, Access Control,
Storing personal data
o Enhanced security (Compared to standard cards)
Disadvantages of smart cards include:
o Risk of loss
o Initial Infrastructure requirements
o More expensive compared to traditional cards
Physical Tokens
50
There are two typical of physical token:
o When using a disconnected physical token, a separate device is used
to generate the one time password (OTP) which the user will then
enter into the system manually
o When using a connected physical token, the one time password
(OTP) is generated and passed to the system automatically though a
physical connection and does not require to user to enter the password
manually
Electronic tokens
Anti-malware
51
Anti-malware
Anti-Malware (also known as Anti Virus software) is designed to protect
devices against viruses and malicious software
o Heuristic checking
This is the identification of potential threats within a file from
behavioural patterns and characteristics rather than just relying
on a database of known viruses
Worked example
[4]
If any of the threats are detected on the device, the Anti-Malware software will
quarantine the files [1]
52
Anti-Malware software will scan external storage media when they are connected to
the device [1]
Preventing viruses from being transferred from storage media onto the device [1]
Microprocessor Controlled
Devices
Download PDF
Microprocessor Controlled Devices
A microprocessor is a small computer chip that can be used to control devices. It is
made up of a central processing unit (CPU), memory, and input/output (I/O) devices.
The CPU is responsible for carrying out instructions, the memory stores data, and
the I/O devices allow the microprocessor to communicate with the outside world.
53
o Social interaction
Over-reliance on these devices can decrease face-to-face
interaction, impacting social skills
o Physical fitness
Despite fitness tracking, sedentary behaviour may increase due
to the convenience of smart devices
Worked example
[4]
Four of:
54
People have more time to spend on leisure activities/shopping/socialising [1]
Increased sense of security as homes are protected with burglar alarms/ smoke
alarms/fire alarms [1]
Smart fridges can be used to improve healthy lifestyle//Smart fridges automatically
order fresh food//Smart fridges reduce food waste [1]
Microprocessor-controlled devices can be set remotely using a smartphone [1]
Saves fuel as the heating/air conditioning is not on all day [1]
Reduces injuries by using microprocessor-controlled lights outside [1]
Health Issues
Health Issues When Using Computers
Common health issues related to extensive ICT use include:
55
Health Issue Causes Prevention Strategies
Communication Media
Communication Media
Communication media is the various methods and channels used to convey
information and messages between people, organisations, and devices.
56
o Popular services include Spotify, Netflix, and YouTube
ePublications: Digital versions of printed materials, such as eBooks,
eMagazines, and eNewspapers
o It can be read on electronic devices, such as eReaders, tablets, and
smartphones
o Offer benefits like portability, searchability, and adjustable text size
Mobile Communication
Mobile Communication
There are various ways mobile devices are used for communication:
SMS messaging: Short Message Service allows sending and receiving text messages
up to 160 characters long
o Uses cellular networks
o Can be sent to multiple recipients at once
Phone calls: Traditional voice calls made and received through mobile devices
o Uses cellular networks or Voice over Internet Protocol (VoIP) services
o Provides real-time communication
VoIP: Voice over Internet Protocol enables voice calls over the Internet instead of
traditional phone lines
o E.g. Skype, WhatsApp
o Can provide better call quality and lower costs compared to traditional calls
Video calls: Real-time video conversations between two or more users with a camera-
enabled device
o Uses internet connection or cellular data
o E.g. FaceTime, Skype, and Zoom
Accessing the Internet: Mobile devices can connect to the Internet using Wi-Fi or
cellular data
o Allows users to browse websites, send and receive emails, and use social
media
Electronic Conferencing
Video Conferencing
Hardware required
57
o Tv Screens/Monitors
o Speakers
o Microphone
o Webcam
o Video Conferencing System
Characteristics
o Video conferencing is an alternative for face to face meetings between
two or more people
o Allows both sound and video
o Participants of the video conference can be many miles apart or even
in a different country
o Audio and video are real-time allowing users to interact with each other
Uses
o Remote employee meetings
o Staff interviews
o Multi-person discussion
o Remote training
o Video conferencing has many uses that include:
Advantages
o Convenience
o Cost saving
o Better for the environment
o Attendees do not have to travel to the event
o Anyone within the company can attend regardless of location
o Events can be held at short notice as travel is not required
o Allows other members outside of the organisation to attend easily
without having to visit on premises
o Some video conferencing software allows record and playback to allow
members to review the meeting
Disadvantages
o The initial purchase of equipment can be costly
o This can cause issues amongst employees when working across
different time zones
o Those using the system may need to be trained to use it effectively
which can:
Take time
Be costly
o Video conferencing systems require a strong and stable network
connection
o There can often be a delay in response times
The time lag is caused by the image not being synchronised with
the sound
Q. A motor car company has some designers based in London and some in
Beijing. The cost of travel between the two cities is very high, so when they
wish to meet to discuss new products they use video-conferencing.
The designers all have PCs with a keyboard and a mouse in order to take part
in video-conferencing.
a. Name three other devices used to input or output data which would be
needed to take part in the video-conference.
[3]
Three of:
[3]
Three from:
Time lag / lip sync caused by the image not being synchronised with the sound [1]
Poor picture quality caused by the speed of connection / quality of the hardware [1]
More likely to have poorer sound quality caused by the quality of the hardware /
connection [1]
Confidential material about the new cars may have to be signed / viewed in
person [1]
The new car may have to be viewed in person [1]
Hardware breakdown stops the conference taking place [1]
Communication breakdown stops the conference taking place [1]
Different time zones will mean the conference has to take place at inconvenient
times [1]
Audio Conferencing
Hardware required
o A landline phone
o Internet Phone
o Computer (requires a microphone and speakers)
Characteristics
59
o Voice communication only (no video)
o Audio is in real time
o Call management options (mute etc)
o Participants of the audio conference can be many miles apart or even
in a different country
Uses
o On the go business meetings
o Allows a hybrid collection of devices such as landline telephones,
smartphones and laptops (providing it is a VoIP call)
Advantages
o Attendees do not have to travel to the event
Convenience
Cost saving
Better for the environment
o Anyone within the company can attend regardless of location
o Events can be held at short notice as travel is not required
o Allows other members outside of the organisation to attend easily
without having to visit on premises
o Audio conferencing is more cost effective as it requires less bandwidth
and less expensive equipment
o Audio conferencing can integrate with many other devices and tools for
communication
o Audio conferencing provides a higher level of security as users are not
sharing a screen
Disadvantages
Hardware Required
o Computer (requires webcam, microphone and speakers)
Characteristics
o Allows both sound and video
60
o Participants of the web conference can be many miles apart or even in
a different country
o Audio and video are real time allowing users to interact with each other
o Allows virtual breakout rooms for teams of participants
o Screen and slide presentations
o Instant messaging
o Document sharing
Uses
o Distance learning and education
o Online presentations
o Online team collaboration
o Interviews
o Customer support
o Virtual events
Advantages
o Attendees do not have to travel to the event
Convenience
Cost saving
Better for the environment
o Anyone within the company can attend regardless of location
o Events can be held at short notice as travel is not required
o Allows other members outside of the organisation to attend easily
without having to visit on premises
o Web conferencing software often allows recording and playback
features to allow members to review the event
o Enhanced visual presentations compared to video conferencing
o Real time collaboration
Disadvantages
o Requires a strong and stable network connection
o Security and privacy concerns
o Distractions from other activities on the device
o Those using the system may need to be trained to use it effectively
which can:
Take time
Be costly
o Dependent on users being technically savvy and having suitable
devices/network connections
61
Requires less bandwidth Requires more bandwidth
Less Social More Social
No Visual Engagement Visual Engagement
No option of non verbal cues Use of nonverbal cues
Fewer resources needed More Resources needed
Exam Tip
NB: Both web conferencing and video conferencing are very similar
however, the key differences are:
Computer Modelling
Computer Modelling
Computer modelling is the use of computer programs and algorithms to simulate
and analyse complex systems or processes. The accuracy and reliability of computer
models depend on the quality of input data and algorithms used.
Advantages Disadvantages
62
Dependence on accurate input data and
Faster calculations and processing
assumptions
Limited by the quality and complexity of the
Reduced human error and bias
algorithms used
Ability to simulate multiple scenarios and May overlook unique or unpredictable situations
test different variables not covered by the model
Better visualisation of complex data and Can be expensive and time-consuming to develop,
systems maintain, and update models
Advantages Disadvantages
63
Greater precision and accuracy Job displacement for human workers
[6]
Max 4 of:
Advantages
Robots can work in sterile areas where humans would need protective clothing [1]
Robots can easily be used for transferring large delicate items [1]
Robots can work 24/7 / continuously [1]
Cheaper in the long run/robots not paid [1]
More accurate as the lens needs to be precise / higher quality of lens [1]
More frequent checking of the equipment/lens [1]
They do boring/laborious work [1]
Issues can be found more quicker [1]
Task/job can be carried out far quicker [1]
Max 4 of:
Disadvantages
Exam Tip
64
Some of the advantages/disadvantages listed above don't always apply
depending on the scenario. Choose the ones appropriate for the scenario in
the question
You can't get full marks by only focusing on advantages or disadvantages -
make sure you know both
Don't use short answers like 'it's expensive' - explain your answer
There are various ways school management systems are used in educational
institutions:
o Learner registration and attendance: Recording and tracking student
enrolment and daily attendance
Simplifies the registration process and ensures accurate record-
keeping
o Recording learner performance: Monitoring and analysing student
grades, test scores, and overall performance
Helps teachers identify areas for improvement and track
progress
o Computer aided learning: Facilitating online learning resources and
activities for students
Enhances the learning experience and promotes self-paced
learning
Worked example
65
Q. A school is setting up a new computerised system to manage many
aspects of the school administration.
a. Describe how this system can be used to manage student registration and
attendance.
[3]
3 of:
Student scans a card // teacher records the student as present on the computer
system [1]
The system records the time of arrival [1]
The system sends the data to the school administration database [1]
The data is searched in the database [1]
If a student arrives after a certain time the student’s attendance record is flagged as
late/absent [1]
Attendance/lateness records are automatically printed/sent to parents [1]
Letters/texts are automatically sent to parents to show the absenteeism/lateness of
students [1]
Parents can log in into the system to check student’s attendance/lateness records [1]
[2]
2 of:
66
o Provides a convenient platform for travellers to plan and book their trips
Concerts: Reserving tickets for live music events
o Allows music fans to secure their spot at popular concerts
Cinemas: Booking movie tickets in advance
o Enables cinema-goers to reserve seats and avoid queues
Sporting events: Purchasing tickets for sports matches and competitions
o Offers sports enthusiasts an easy way to attend their favourite events
Advantages Disadvantages
[6]
6 of:
67
Display flights available [1]
The booking database is searched for the customer reference number [1]
A matching record is retrieved [1]
Details of the customer are displayed on the screen [1]
The booking database is searched for matching departure airports [1]
The booking database is searched for matching destination airports [1]
If the flight correct, the date/time found [1]
Search if seats/tickets/flights available [1]
If unavailable error message output [1]
Outputs the price [1]
If seats are available, flags seat as booked [1]
If not booked then the flag removed [1]
Reduces the number of seats/tickets available by the number booked [1]
E-ticket/ticket details are output [1]
E-ticket/ticket details sent to customer [1]
A receipt is printed//Verification email sent [1]
Banking Applications
Download PDF
Automatic Teller Machines (ATM)
Automatic Teller Machines (ATM) is an electronic banking terminal that provides
customers with access to financial transactions
Advantages Disadvantages
68
Limited services compared to bank
Available 24/7
branches
Technical issues and machine
Reduced waiting time
downtime
Fees for transactions at non-
Global access to funds
network ATMs
Electronic Funds Transfer (EFT)
Characteristics and uses of EFT:
o Transfer of funds between bank accounts electronically
o Utilised for bill payments, salary deposits, and online purchases
o Utilises NFC in contactless payments
The process of EFT:
o The data is read from the chip (using RFID / NFC if it's a contactless
payment)
Advantages Disadvantages
69
.Q.Adam is paying his bill in a restaurant using a contactless debit card.
Describe the computer processing involved in Electronic Funds Transfer (EFT)
using contactless cards.
[4]
4 of:
The reader checks the amount to pay is less than the contactless limit [1]
The data is read from the chip using RFID / NFC [1]
The restaurant’s bank's computer contacts the customer’s bank's computer [1]
The card is checked if it is valid [1]
If valid the transaction continues [1]
If not valid the transaction is terminated [1]
An authorisation code is sent to the restaurant [1]
The price of the meal is deducted from the customer’s account [1]
Added to the restaurant’s account [1]
Exam Tip
Make sure you read the question to see if it's a contactless payment or
involves Chip & PIN and reference this in your answer
Don't forget that money isn't stored on the card, and that it provides a
link to the bank account it's linked to
Advantages
Disadvantages
70
protection
Cheques
Characteristics and uses of cheques:
o A written order to a bank to pay a specified amount to a designated
person or entity
o Can be used for various payments, including bills, services, and
personal transactions
Amount is scanned
71
Advantages Disadvantages
Slow processing
Secure and traceable
time
No need for physical Not widely
cash accepted
Useful for large Risk of cheque
transactions bouncing
Online Banking
Characteristics and uses of Internet banking:
o Online access to banking services via a secure website or app
o Allows for transfers, bill payments, account management, and more
Advantages Disadvantages
Computers in Medicine
Information Systems in Medicine
Characteristics and uses of patient records:
o Digital records of a patient's medical history
72
o Contains personal information, diagnoses, treatments, and test results
o Used by healthcare professionals for making informed decisions about
patient care
Characteristics and uses of pharmacy records:
o Records of medication dispensed by a pharmacy
o Contains patient information, medication details, dosages, and the
prescribing doctor
o Used by pharmacists to track medication history and ensure safe
dispensing
Healthcare settings may also use online booking systems for appointments
Healthcare professionals may also utilise expert systems to assist with a diagnosis
3D Printers in Medicine
There are various ways 3D printers can be used:
Printing of prosthetics:
o Custom-made prosthetic limbs or body parts
o Can be tailored to a patient's specific needs
o Faster and more affordable than traditional methods
Tissue engineering:
o 3D printing of living cells to create functional tissues
o Can be used to repair or replace damaged organs
o Potential to reduce the need for organ donations
Artificial blood vessels:
o 3D printed blood vessels made of biodegradable materials
o Can be used in surgeries to replace damaged vessels
o Allows for improved blood flow and faster healing
Customised medicines:
o 3D printed pills with precise doses and drug combinations
o Tailored to a patient's specific needs and conditions
o Potential to improve medication adherence and effectiveness
Computers in Retail
Point Of Sale (POS)
Point of Sale (POS) terminals are a computerised system used at checkout
counters to process transactions and manage inventory
o Essential part of retail checkout counters
o Process transactions and calculate total amounts due
o Utilise barcode scanners, touch screens, and receipt printers
73
Functions of POS terminals:
o Update stock files automatically
Track inventory levels in real-time
Prevent stock discrepancies and ensure accurate records
o Order new stock automatically
Monitor inventory levels and reorder when stock is low
Streamline supply chain management and minimise stockouts
Worked example
Modern supermarkets have automated stock control systems, which use data from
the checkouts.
Describe how food items can be ordered by an automated stock control system so
they are delivered before the stock in the supermarket runs out.
[4]
4 of:
74
Goods flagged as ordered [1]
The automated stock system sends a signal to the warehouse computer to order new
items [1]
The warehouse sends the items to the supermarket [1]
Re-order quantity is found in the database [1]
Flags removed [1]
The stock control system updates the stock levels in the stock control database with
the new stock [1]
Internet shopping
Internet shopping is the act of purchasing goods or services online through websites
or mobile applications
Security concerns
o Risk of fraud or identity theft
o Need to provide personal and financial information
Limited physical interaction
o Can't touch or try products before purchasing
o This may lead to dissatisfaction or returns
Delivery delays and fees
o Wait for items to be shipped and delivered
o Additional costs for shipping and handling
75
Impersonal customer service
o Difficulty resolving issues or returning items
o Lack of face-to-face interaction with staff
Can target prices, products and services at specific groups based on buying
data
Can update stock availability and prices more quickly than a physical store
through their website
Increased Competition
o Online shopping means businesses have to compete with a global
market, which can be more challenging than competing with local
businesses
Digital Fraud and Security Concerns
o Online transactions expose businesses to potential cyber threats such
as hacking and fraud. Data breaches can result in financial loss and
damage to brand reputation
Technical Issues and Downtime
o Website outages or technical glitches can prevent customers from
making purchases and negatively affect the user experience
Costs of Delivery and Returns
o Online businesses often shoulder the cost of shipping products to
customers and also have to manage returns and refunds, which can be
costly
Customer Trust
o Customers can't physically touch, feel, or try products before buying,
which can lead to uncertainty and a lack of trust
Inventory Management
o Keeping accurate track of inventory can be complex, especially if a
company sells through multiple online channels
Depersonalisation
o It can be harder to build relationships with customers and provide
personalised service when all interactions happen online
Online Reviews
76
o Negative customer reviews can greatly impact the image of the
business, as they are visible to all potential customers
Dependency on Internet Infrastructure
o Businesses need a stable and reliable internet connection to manage
their operations smoothly
Logistical Challenges
o Managing and operating warehouses, packaging, and shipping can be
difficult and costly for smaller businesses
Legal and Regulatory Compliance
o Companies selling online may have to comply with a multitude of laws
and regulations, which can vary by country
Increased Customer Expectations
o The convenience of online shopping has led to increased customer
expectations for fast, free delivery, and excellent customer service
Expert Systems
Download PDF
Expert Systems
An Expert system is a computer program that uses artificial intelligence to replicate
the decision-making abilities of a human expert in a specific field.
Mineral prospecting
o Analyse geological data
77
o Identify potential locations for mineral deposits
Car engine fault diagnosis
o Determine issues within engine components
o Suggest repair options and maintenance schedules
Medical diagnosis
o Analyse patient symptoms and medical history
o Suggest possible diagnoses and treatment plans
Chess games
o Evaluate possible moves based on the game state
o Plan strategic moves to increase chances of winning
Financial planning
o Evaluate investment options and risks
o Provide personalised financial advice
Route scheduling for delivery vehicles
o Calculate optimal routes based on factors like distance, traffic, and time
constraints
o Reduce fuel consumption and improve efficiency
Plant and animal identification
o Analyse physical characteristics and habitat data
o Identify species and provide relevant information
Career recommendations
o Ask the user a series of questions / analyse existing qualifications
o Make recommendations on career choices
Worked example
[5]
5 of:
[2]
78
2 of:
User Interface:
o Allows users to interact with the expert system
o Provides a platform for inputting data and receiving recommendations
or solutions
o Designed for ease of use and accessibility
Inference Engine:
o A core component of the expert system that performs logical reasoning
o Applies rules from the rules base to the data from the knowledge base
o Mimics human decision-making processes to generate conclusions
Knowledge Base:
o Repository for domain-specific information, facts, and data
o Contains expertise gathered from human experts or other reliable
sources
o Essential for the inference engine to make accurate recommendations
Rules Base:
o Stores logical rules and relationships governing the domain
o Guides the inference engine in applying reasoning to the data
o Rules can be modified or updated as new information becomes
available
Explanation System:
o Provides transparency in the decision-making process
o Offers detailed explanations of the expert system's reasoning and
conclusions
o Enhances user trust and understanding of the system's
recommendations
Expert systems use the knowledge base and rules base to analyse input data
The inference engine applies rules and logic to the input data
The system generates potential solutions or recommendations based on the
applied rules
The explanation system communicates the reasoning behind the suggested
solutions
79
Exam Tip
This topic comes up frequently. Make sure you understand the operation of an
expert system. You need to be able to not only name the components but
explain how they interact or operate
Observation
o Characteristics: watching users interact with the system
o Uses: understanding how users interact with the current system
o Advantages: provides first-hand, unbiased information
o Disadvantages: can be time-consuming, may not reveal all issues
Interviews
o Characteristics: structured or unstructured conversations with users
o Uses: gathering detailed information about user experiences
o Advantages: allows for in-depth exploration of issues
o Disadvantages: may be influenced by interviewee bias, time-consuming
Questionnaires
o Characteristics: structured surveys with predetermined questions
o Uses: collecting data from a large number of users
o Advantages: allows for quantitative analysis, efficient data collection
o Disadvantages: limited by predetermined questions, may suffer from
low response rates
Examination of existing documents
o Characteristics: reviewing system documentation, user guides, or
reports
o Uses: understanding the current system's design and any known
issues
o Advantages: provides insights into the system's history, can reveal
previously unknown issues
o Disadvantages: may be outdated or incomplete, time-consuming
80
Problems: issues that users face with the current system
User requirements: what users need from the new system
Information requirements: data or information the new system must process
Exam Tip
When justifying hardware and software choices, make sure to link your
decisions to the user and information requirements for the new system. This
demonstrates your understanding of the analysis stage of the Systems Life
Cycle
Worked example
Q.A small company makes toys and then delivers them to shops.
Throughout the day orders are received by the company from its customers.
The office workers in the finance department create and store an invoice for
each order. They are too busy to be disturbed by their work.
Delivery drivers receive copies of the invoices which they will pass on to their
customers. The drivers make a large number of deliveries per day and do not
return to the office.
A systems analyst will research the current system and suggest improvements
to be made.
For each type of employee identified above, describe the most suitable method
of collecting information from them, giving a reason for your choice.
[4]
Office workers:
Reason:
81
1 of:
Delivery drivers:
Reason:
1 of:
They can complete them in their own time/at their leisure [1]
Questionnaires tend to be more accurate [1]
The data can be collated more quickly as everyone can complete at the [1]
same time rather than interviewing which is one after the other [1]
Individuals remain anonymous therefore they will be more truthful/reliable [1]
Easier to analyse [1]
Input Formats
Data capture forms: designed to collect data from users in a structured format
82
Consider a user-friendly layout, clear instructions, and appropriate data fields
Output Formats
Validation Routines
Exam Tip
In the design stage of the Systems Life Cycle, focus on creating clear, user-
friendly input formats and output formats. Additionally, make sure to
implement appropriate validation routines to ensure data accuracy and
completeness.
Worked example
Carlos is designing a new computer system to replace an existing system. Tick four
items which will need to be designed.
[4]
Tick
Inputs to the current system.
Data capture forms.
Report layouts.
Limitations of the system.
Observation methods.
Improvements to the system.
User and information requirements.
Validation routines.
Problems with the current system.
83
File structure.
Tick
Inputs to the current system.
Data capture forms. χ
Report layouts. χ
Limitations of the system.
Observation methods.
Improvements to the system.
User and information requirements.
Validation routines. χ
Problems with the current system.
File structure. χ
Test Designs
Test data structures, file structures, input formats, output formats, and
validation routines
Ensure all components function correctly and interact seamlessly
Test Strategies
Test Plan
84
Test Data Types
Normal data: valid and expected data values within the range of acceptability
Abnormal data: invalid or unexpected data values. This can either be:
o Data outside the range of acceptability or
o Data that is the wrong data type
Extreme data: values at the limits of acceptability
Worked example
[4]
4 of:
85
Parallel running
Both old and new systems run simultaneously for a period before the old
system is phased out
Used when a smooth transition with minimal risk is required
Pilot running
Phased implementation
The new system is implemented in stages, with each stage replacing a part of
the old system
Used when a gradual transition is preferred to minimise disruption
IMPLEMENTATION
ADVANTAGES DISADVANTAGES
METHOD
Exam Tip
86
Choose the method that best fits the organisation's needs, weighing up factors
such as risk, time, and resources
Don't mix up pilot implementation with prototyping or direct implementation
These are different ways in which one new system could be implemented
using two different methods
You may get a question which asks you to compare 2 methods - only write
about these 2 in the question and compare them, don't just describe them
Worked example
Tick (✓) the most appropriate method of implementation to match the statements
below.
87
o Program language: The programming language used to develop the
system
o Program flowcharts/algorithms: Visual representations or descriptions
of the system's logic and processes
o System flowcharts: Visual representations of the interactions between
system components
o Hardware & software requirements: Necessary equipment and software
to run the system
o File structures: Organisation and layout of the system's files and data
o List of variables: Collection of variables used within the system,
including their names and purposes
o Input format: Structure and format for entering data into the system
o Output format: Structure and format for presenting data generated by
the system
o Sample runs/test runs: Examples of system operation, including input
and expected output
o Validation routines: Techniques used to check and confirm the
accuracy of data entered into the system
Worked example
[3]
3 of:
88
o Purpose of the system: Explanation of the system's intended function
and goals
o Limitations: Known constraints or issues with the system
o Hardware & software requirements: Necessary equipment and software
to run the system
o Loading/running/installing software: Instructions for setting up the
system on user devices
o Saving files: Procedures for storing data within the system
o Printing data: Steps to produce hard copies of system data
o Adding records: Instructions for creating new entries in the system
o Deleting/editing records: Guidelines for modifying or removing existing
entries in the system
o Input format: Structure and format for entering data into the system
o Output format: Structure and format for presenting data generated by
the system
o Sample runs: Examples of system operation, including input and
expected output
o Error messages: Explanations of system warnings and error
notifications
o Error handling: Steps to resolve issues and errors within the system
o Troubleshooting guide/helpline: Assistance for diagnosing and
addressing common problems
o Frequently asked questions: Answers to common user inquiries
o Glossary of terms: Definitions of key terms and concepts related to the
system
Exam Tip
89
Evaluate the system's performance in terms of resource usage, time, and
cost. Consider whether the system is operating optimally or if improvements
could be made to its efficiency
o Provide examples of specific aspects that contribute to the system's
efficiency
o Identify areas that may be consuming excessive resources or time, and
suggest ways to optimise them
Questions to ask:
o Does it operate quicker than the previous system?
Examine how user-friendly and accessible the solution is for its intended
audience. Assess whether the system is easy to learn and use, and if users
can accomplish their tasks without difficulty
o Describe the user interface and how it facilitates interaction with the
system
o Mention any feedback from users regarding their experience with the
system, and address any issues they encountered
Questions to ask:
o Are all the users able to use the system and make bookings easily?
o Are all the users able to change and cancel bookings easily?
o Can all staff understand how to use the system with minimal training?
Compare the implemented solution with the original task requirements and
evaluate how well it meets the intended purpose
o Outline the initial objectives of the system and discuss how the solution
addresses each one
o Highlight any requirements that may not have been fully met and
discuss possible reasons for this
Questions to ask:
o Is the system suitable for each of the departments?
90
Gather and analyse user feedback:
Collect users' responses to the results of testing the system. Their feedback
can provide insights into potential issues and improvements, and help
determine overall user satisfaction
o Summarise the testing process, including test data, expected
outcomes, and actual outcomes
o Discuss users' reactions to the system, addressing any concerns or
suggestions they may have
Worked example
Tick three evaluation strategies that need to be carried out following the
implementation of the new system.
[3]
Tick
Observe users operating the old system.
Compare the final solution with the original requirements.
Design the report layout.
Check user documentation to see if it is correct.
Interview users to gather responses about how well the new
system works.
Test the system works correctly.
Identify any necessary improvements that need to be made.
Design error handling.
Tick
Observe users operating the old system.
Compare the final solution with the original requirements. χ
Design the report layout.
Check user documentation to see if it is correct.
91
Interview users to gather responses about how well the new
χ
system works.
Test the system works correctly.
Identify any necessary improvements that need to be made. χ
Design error handling.
Safety Issues
Download PDF
Safety Issues
Electrocution
Fire:
92
Fire causes and prevention strategies
Devices can be plugged in using cables, cables that are protruding can
cause an accident
You can trip over a cable left out in a location
Body damage can occur during a fall, for example, breaking bones, ligament
damage, bruising, sprains etc depending on the area fell on
93
Secure cables where you can, like under desks to stop
protruding into open areas
Devices have varying levels of weight and if a device falls on you it could
cause injury
Any device should be placed in a secure location, like a PC on a strong desk
and not near the edge
Heavy equipment falling and injuring people causes and prevention strategies
[4]
Electrocution, caused by touching bare wires / allowing food and drink to spill liquids
onto computers [1]
94
The fire is caused by overloading power sockets / overheating computers [1]
Data Protection
Data Protection
The Data Protection Act (DPA) controls the collection, storage and processing of
personal data.
Personal Data
Download PDF
Personal Data
95
Personal and sensitive data refers to information that can be used to identify an
individual, such as their personal name, address, date of birth, personal images,
and medical history.
Personal data:
Personal name: Refers to the full name of an individual, including their first
name and last name.
Address: The physical location where an individual lives, including their
house number, street name, city, and postal code.
Date of birth: The specific day, month, and year when an individual was
born.
Gender: the individual's identity relating to male, female, don’t know, prefer
not to say
Personal images like a photograph in school uniform: An image of an
individual wearing their school uniform, which can be used to identify and
locate them.
Payment details: bank card details used for purchasing items or bank
details to access online banking
Passwords: the combination of letters, numbers and symbols used to
access accounts that are held by the individual
Sensitive data:
Religion/philosophical beliefs
Sexual orientation: defining who you are attracted to, the opposite gender,
the same gender, or to both or more than one gender
96
Why should personal data be protected?
Worked example
[3]
3 of:
97
Health/medical record [1]
E-safety
Download PDF
E-safety
E-safety is about knowing about and using the internet
safely and responsibly
It refers to when an individual is using the internet, email, social
media, online gaming
E-safety refers to the individual knowing how to protect themselves
from potential dangers and threats
Prevents cyberbullying
o awareness of how to act online and how to avoid falling victim, creating
a safe and respectful online environment.
98
Secures online gaming experiences
o engage in online gaming responsibly, avoiding sharing personal details
and maintaining respectful behaviour towards other players.
Advice
The Internet:
Email:
Social media:
Know how to block and report people who send content or messages that
are unwanted
Know where the privacy settings are to reduce the number of people who
can see your posts or images
Be aware of the potential dangers associated with meeting online contacts
face to face, do not meet anyone you do not know, if you do, take an adult
and meet publicly
Do not distribute of inappropriate images and inappropriate language
99
Respect the confidentiality of personal data belonging to other people
Only accept friend requests from people you know
Parents should be aware of what you are doing online, discuss what you
are doing online
Do not post images or details that can be used to locate you
Online gaming:
Worked example
Describe four strategies that the student could use to stay safe when using
social media to communicate with others.
[4]
4 of:
Don’t give out other people’s personal information such as address or phone
number [1]
Don’t become online ‘friends’ with people you do not know//don’t contact/chat with
people you do not know [1]
Never arrange to meet someone in person who you only met online [1]
If anything you see or read online worries you, you should tell someone about it/block
them [1]
100
Threats to Data
Download PDF
Threats to Data
Threats
101
Protection from viruses and malware
Worked example
a. Explain what is meant by the term hacking. Include in your answer two
examples of the effects this can have on the computer system.
[3]
2 of:
Examples
102
Place malicious files/software [1]
b. Describe three measures that could be taken to protect the data from being
hacked.
[3]
3 of:
Protection of Data
Download PDF
Protection of Data
Biometrics
ADVANTAGES DISADVANTAGES
103
Digital certificate
Encryption
Firewall
ADVANTAGES DISADVANTAGES
Stops attacks from Can affect the operation of the computer and some
device uploads
Stops fraudulent sites To upload some files, the firewall may need to be
attacking the device switched off, leaving the computer open to attacks
104
Can stop legitimate software from running
ADVANTAGES DISADVANTAGES
Worked example
The data stored on the computer system needs to be protected from unauthorised
access.
Discuss the effectiveness of different methods of increasing the security of this data.
105
[8]
8 of:
Using different passwords for parts of the computer system makes it more difficult to
gain access to the full system [1]
May be difficult to choose a unique password if it is changed every few weeks [1]
The firewall can affect the operation of the computer and stop some uploads [1]
The firewall may need to be shut down at times to upload files therefore making the
computer unsafe [1]
106
To gain full marks both sides of the discussion are needed
Target Audience
Target Audience
Developing ICT Solutions
To build effective ICT solutions, the first step is to identify and understand the
needs of the intended audience. These needs can be functional, like
processing information or aesthetic, like a visually appealing interface
After identifying the needs, select the appropriate technology and tools to
create a solution. This choice depends on factors like the complexity of the
task, the budget available, and the technical expertise of the users
An essential aspect to remember while designing ICT solutions is to ensure
that they are user-friendly. This means that they should be intuitive to use,
require minimal training, and have easy-to-understand instructions
Additionally, ICT solutions should be accessible to all users, including those
with disabilities. This could involve adding features like voice commands, large
text options, or compatibility with assistive devices
Once the solution is created, it is crucial to test it to ensure it functions as
expected and fulfils the users' needs effectively
Copyright
107
Copyright
Why do we need Copyright?
The Internet
108
The Internet refers to the global network of computers and other electronic
devices connected through a system of routers and servers
It is the infrastructure that allows us to send and receive information, including
email, instant messaging, and file transfers
It also provides access to other services such as online gaming, video
streaming, and cloud computing
The world wide web, or simply the Web, is a collection of websites and web
pages that are accessed using the internet
It was created in 1989 by Tim Berners-Lee, who envisioned it as a way to
share and access information on a global scale
The web consists of interconnected documents and multimedia files that are
stored on web servers around the world
Web pages are accessed using a web browser, which communicates with a
web server to retrieve and display the content
It is used for browsing web pages, sending emails, social networking, online
shopping, and much more
Advantages include ease of communication, access to information, and online
services
Disadvantages include privacy concerns, cybercrime, and misinformation
Blogs
Forums
109
A forum is an online discussion site where people can hold conversations in
the form of posted messages
They are often organised around specific topics or interests, and divided into
categories known as threads
Unlike blogs, forums are primarily focused on peer-to-peer interaction
They may require users to create an account before posting
Forums can be moderated or unmoderated
Wikis
A wiki is a type of website that allows users to add, remove, or edit content
It is designed to facilitate collaboration and knowledge sharing from many
people
It holds information on many topics which can be searched
Posts are not in chronological order
The structure is determined by the content or its users
The most famous wiki is Wikipedia, an online encyclopaedia
Changes can be tracked and reverted if necessary, and the content is usually
written in a neutral style
Social Networking
Social networking sites are platforms where users can connect with others
and share content
They include platforms like Facebook, Twitter, Instagram, and LinkedIn
Social networking platforms usually require users to create a profile and allow
them to share text, images, videos, and links
They facilitate interaction, collaboration, and information sharing on a
large scale
Privacy settings allow users to control who can see their content
Worked example
[2]
Moderated Un-moderated
All posts are held in a queue.
Posts are not policed.
This forum reduces the chance of offensive messages.
This forum stops several postings on the same topic.
110
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
1 correct – 0 marks
Moderated Un-moderated
All posts are held in a queue. χ
Posts are not policed. χ
This forum reduces the chance of offensive messages. χ
This forum stops several postings on the same topic. χ
Internet Service Providers (ISPs) provide services for accessing and using the
Internet
A Uniform Resource Locator (URL) is the address of a web page on the
WWW
What is a URL?
111
Inappropriate and criminal material: The internet can expose users to harmful
or illegal content
Data restriction: Parental, educational, and ISP controls can limit access to
certain information or websites
Worked example
[4]
https://
1 of:
hothouse-design
this shows the domain name that the company have purchased [1]
.uk
/portfolios
[2]
Word/phrase/image [1]
When clicking links to another document/page/website/top or bottom of the page [1]
112
Search Engines
Search Engines
What are Search Engines?
Search engines are tools that locate and display web pages related to the
search terms entered by the user
They are essential for navigating the vast amount of information on the
internet
They index millions of web pages and use algorithms to rank the relevance of
each page to the search terms
Speed of Searching
Amount of Information
113
Check how up-to-date the information is, as outdated information can be
misleading
Protocols
Download PDF
Protocols
Worked example
Q. You have been asked by the secretary of a soccer club to create a website
to publicise its results, fixtures and other events.
When the website has been created it has to be published on the internet. You
plan to upload it onto the internet using FTP.
Explain how to upload and publish the content of a website using FTP.
[4]
4 of:
Download the FTP client program [1]
Connect to the FTP server [1]
Using the FTP client program [1]
Login to the server [1]
Using FTP username and password [1]
114
Locate the files on your computer [1]
Click the upload button on the FTP client program [1]
Upload the files to the folder/web hosting space [1]
Ch Image Editing
Image Editing
Placing an image with precision: This refers to positioning an image
accurately within a document or other media
o You can usually do this by selecting the image and dragging it to the
desired location
o Some software allows for more precision through the use of
coordinates or alignment tools
Rotating an image: This means turning the image around a central point
o Most software allows rotation to any angle, and common rotations such
as 90 degrees or 180 degrees are often provided as options
115
Adjusting brightness and contrast: These tools change the light and dark
values in an image
o Brightness affects all pixels in the image equally, making the image
lighter or darker
o Contrast adjusts the difference between light and dark values, which
can make the image appear more or less detailed
Exam Tip
Make sure you use specific technical terms when answering questions on this
topic
Worked example
For each of the following images describe the software editing technique used to
produce
the edited images are shown from the original image.
Edited images
116
[4]
https://www.savemyexams.com/igcse/computer-science/cie/23/revision-notes/
117