0% found this document useful (0 votes)
13 views14 pages

Caie Igcse Ict 0417 Theory 65dd94e8aae5b16069ff8539 191

Uploaded by

Aaditya Punatar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views14 pages

Caie Igcse Ict 0417 Theory 65dd94e8aae5b16069ff8539 191

Uploaded by

Aaditya Punatar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

ZNOTES.

ORG

UPDATED TO 2023-2025 SYLLABUS

CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for AADITYA PUNATAR for personal use only.
CAIE IGCSE ICT

Distracts the audience from the sole content of the


presentation
1. ICT Applications It is very easy to make a presentation with too many
features
1.1. Communication
Media streaming
Newsletters and posters Real-time transition of audio and video files over the
internet
Paper-based communication is used to inform people
allows users to access content without downloading it to
about their interests
their devices
Schools use these to inform parents about events/dates
popular services include Spotify, YouTube, and social
Advantages
media websites
Released regularly
uses buffering, which makes sure the video plays back
The recipients have a permanent copy
smoothly without freezing. While the buffer receives data
Disadvantages
packets, it sends previously received ones to the playback
Requires distribution
device so that there are no gaps in the played data
There are no special effects, sound/video/animation
Advantages
There are printing costs, paper/ink
Users can access any information at any time and
The targeted audience may or may not receive the
from any location
information
Offers an extensive library of content
Compared to traditional cable or satellite TV
Websites
subscriptions, media streaming can be more cost-
Collection of webpages, text, graphics, video, and sound effective
Disadvantages
Hosted on a web server on the internet
Need to write code or use a web authoring application Heavily relies on a stable and high-speed internet
Hyperlinks to other pages can be added connection.
Interactive websites require programming knowledge Not all content is available on every streaming
Can use a camera, scanner, and microphone to input data platform due to licensing agreements and exclusivity
Usually, hire space from the web hosting company deals.
Advantages You don’t own the media when streaming media, so if
Ability to add sound/video/animation the streaming service removes a movie or a TV show
Links to other websites/hyperlinks from its library, it may no longer be accessible to you.
The use of hot spots
Buttons to navigate/move around the website
ePublications
Hit counters to see who has visited the websites
digital versions of printed materials, such as eBooks,
worldwide advertising capability
eMagazines, and eNewspapers.
Disadvantages
It can be read on electronic devices.
Can be hacked and modified, or viruses introduced
Advantages
Need for a computer and internet connection
aid portability
Lack of portability compared with the paper-based
they are often more affordable than paperback books.
system
Offer interactive elements that enhance the reading
Need to maintain the website once it is set up
experience.
Disadvantages
Multimedia Presentations
reading from an electronic device for a prolonged
Uses a mixture of media to present information: time can cause eyestrain
animations, video, sound, transitions, hyperlinks ePublications lack the tactile experience and physical
Produced using software packages presence that some readers enjoy
Used with a projector so a large audience can view compatibility issues can arise if the ePublications is in
Advantages a format that is not supported by the reader's device
Use of sound and animation/video effects or software
Interactive/hyperlinks built into presentations
More likely to hold the audience’s attention
Mobile Communication
Disadvantages
Mobile devices support many forms of communication, such
Need for special equipment – expensive
as:
It may require internet access

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

1. Short message service (SMS) messaging: permits 3. Flood water management: Computer modelling plays a
extremely quick communication with another person via vital role in flood water management by simulating water flow
typing on a keyboard (a mobile phone or tablet's keyboard is behaviour, predicting flood extents, and assessing potential
frequently virtual). Its benefit is that the recipient can get the flood risks. It helps design and optimise flood mitigation
text whenever they choose without being available. measures, such as levees and floodplain zoning, allowing
2. Phone calls: Making calls while on the go is among the authorities to make informed decisions, develop effective
most fundamental applications of a mobile phone. Mobile emergency response plans, and minimize the impact of
phones are the perfect method to stay in correspondence flooding on communities.
anywhere there is a network signal because they are 4. Traffic management: Computer modelling simulates and
compact and have an independent battery. analyses traffic flow, predicts congestion patterns, and
3. Voice over Internet Protocol (VoIP): a communication optimises traffic control strategies. It aids in designing
technique for Internet users. VoIP transforms sound captured efficient road networks, optimizing signal timings, and
by the built-in mic of the cell phone into individual data evaluating the impact of transportation infrastructure
packets that may be transmitted via the internet to their projects. This enables authorities to make informed
intended recipient. decisions, alleviate congestion, and improve overall traffic
4. Video calls: enables real-time video conversing between efficiency for better urban mobility.
multiple participants with a camera-enabled device. Uses an 5. Weather forecasting: Computer modelling plays a pivotal
internet connection or cellular data. Software that may be role in weather forecasting by simulating the Earth's
used for video calling includes FaceTime, Skype, and Zoom. atmosphere, oceanic conditions, and other environmental
5. Accessing the Internet: Another helpful feature is accessing factors. These models use complex algorithms to predict
the net from a mobile device. Any mobile device with a weather patterns, including temperature, precipitation, wind
wireless broadband connection or a mobile phone network speed, and storm systems. By assimilating real-time data,
can link to the internet. computer models provide forecasts that aid meteorologists in
predicting weather conditions, issuing warnings, and helping
1.2. Modelling Applications society prepare for potential hazards.

Advantages of using computer modelling rather than


Advantages of using models:
humans:
using models is less expensive than having to build the It can provide more precise and accurate results than
real thing human-based methods, minimizing errors and
safer to use a computer model increasing reliability.
allows you to try out various different scenarios in Can analyze large amounts of data and perform
advance complex calculations faster than humans
nearly impossible to try out some tasks in advance in real It can be reused and updated easily, reducing the
life due to high risk need for repetitive manual analysis and potentially
faster to use a computer model than to do the real thing lowering costs in the long run.
Disadvantages of using computer modelling rather than
Disadvantages of using models: humans:
It may overlook nuanced factors or intangible
a model can’t be completely reliant as the output is elements that humans can consider, leading to
entirely based on the input potential gaps or inaccuracies in the analysis.
frequently, computer modelling can be a very costly Based on assumptions and simplifications, introducing
option a level of uncertainty.
human reluctance is a common problem in this Their programmed algorithms and data inputs bind
technology models. They may struggle to adapt to unforeseen
circumstances or rapidly changing conditions that
Some of the applications of computer modelling include:
humans can more readily navigate and respond to.
1. Personal finance: Computer modelling involves using
mathematical algorithms and data analysis to simulate
various financial scenarios, such as investment strategies, 1.3. Computer-controlled Systems
retirement planning, and risk assessment, aiding individuals
in making informed decisions and optimizing their financial Robotics in manufacturing: involves using automated
goals. machines to perform tasks such as assembly, welding,
2. Bridge and building design: Computer modelling is crucial and packaging. These robots are designed to mimic
in bridge and building design. It allows engineers to simulate human actions with precision and speed, increasing
and analyze structural behaviour, assess load capacities, and productivity and quality control. They offer benefits like
predict the response to external forces. It aids in optimizing enhanced worker safety, improved efficiency, and the
designs, ensuring structural integrity, and minimizing ability to handle repetitive tasks, revolutionizing the
potential risks before construction begins. manufacturing industry.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

Advantages: Advantages:
can work in environments that may be harmful to Absenteeism can be addressed more quickly.
humans Parents are kept updated.
can work non-stop Reduced workload for teachers.
low running costs, majorly due to reduced employees; Disadvantages:
thus less wages need to be given Operating the software will require training.
have higher productivity The initial cost of the software is very high.
provide greater consistency Unauthorized access will have to be prevented as
can do long, boring, tedious tasks there is lot of personal information
can carry out different tasks by fitting them with Learner registration and attendance
different-end effectors ID cards with magnetic tapes: The students will have
Disadvantages: to swipe their ID cards, which contain the student’s
robots find it difficult to do unusual tasks name, school’s name, date of birth and the
can cause higher unemployment registration ID when they enter and leave the school;
robots do many of the tasks once done by humans, this way, time is saved, and the attendance is more
leading to deskilling accurate.
robots are independent of the skills base; factory Biometrics: Every student’s fingerprint is stored on a
headquarters can be moved internationally database along with their personal information, the
initial set-up and maintenance of robots can be students must put their finger on a fingerprint scanner
expensive to enter or leave the school premises.
Production line control: Computer-controlled systems in Advantages of biometrics over magnetic ID cards
production line control involve using computers and Unique fingerprints disable attendance forgery
software to monitor, coordinate, and optimize Portability makes them easy to lose
manufacturing processes. These systems ensure efficient Easy to be stolen due to small size
coordination of machinery, manage inventory, track ID cards can be easily cloned
production metrics, and automate tasks. They enable Disadvantages of biometrics over magnetic ID cards
real-time data analysis, error detection, and adjustment, It is time-consuming for all fingerprints to be
improving productivity, reducing downtime, and individually collected
enhancing overall operational efficiency in the production Expensive equipment is required to read fingerprints
line. If the finger is cut/damaged, the fingerprint won’t be
Autonomous vehicles: Self-driving cars and drones guided readable, and access will be denied.
by computer algorithms. There is an invasion of privacy in storing fingerprints
enhance safety on a school database.
reduce traffic congestion Learner’s performance
increase fuel efficiency Spreadsheets can be used to record students’
Advantages of using computer-controlled systems rather performances. It is easier to compare each other’s
than humans: performances and an individual student’s
increased efficiency and productivity performance over the academic year.
greater consistency Computer-aided learning
ability to work in any environment The use of computer-based technologies to help
reduced human error students acquire academic material is known as
can work with large or delicate items computer-aided learning (CAL). They are meant to
Disadvantages of using computer-controlled systems supplement classroom instruction, not serve its
rather than humans: purpose. Students will take online assessments to
very high instalment costs track their progress while learning on computers.
very high maintenance costs Although CAL cannot consistently assist a student with
dependency on reliable an issue, in certain circumstances, students would
lack of flexibility need to get other aid.
requires costly backup systems
1.5. Booking Systems
1.4. School Management Systems
These web-based platforms and applications allow users to
Computer-controlled School Management Systems: reserve and purchase tickets or services for various events
Comprehensive software applications that automate and industries. Some of the applications for online bookings
administrative tasks, such as attendance tracking, grading, include:
scheduling, and student information management, improving 1. Travel industry: Booking flights, hotels, and holiday
educational institutions' efficiency, accuracy, and packages provides a convenient platform for travellers to
organization. plan and book their trips.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

2. Concerts: Reserving tickets for live music events allows What goes on behind the
Sequence at ATM
music fans to secure their spot at popular concerts. scenes
3. Cinemas: Booking movie tickets in advance enables Several options are given:
cinema-goers to reserve seats and avoid queues. change PIN, pay in cheques,
4. Sporting events: Purchasing tickets for sports matches and pay a bill, see balance, get
competitions offers sports enthusiasts an easy way to attend money
their favourite events.
The customer selects the
Advantages: cash option & several cash
convenience and accessibility options are shown
instant confirmation and ticketing The customer’s account is
ability to compare prices and options accessed to see if they have
promotions and personalized offers sufficient funds, it is checked to
faster to change/update see if they are withdrawing
The customer accepts one of
automated reminders via email/text more than their daily limit.
the options or types in a
repeated bookings can be easily made If the limit is not exceeded and
different amount
cost-saving as there are fewer wages due to reduced all other checks are OK, then
staff requirements the transaction is authorized,
Disadvantages: and the machine then counts
potential for technical issues out the cash
possible security and privacy concerns The customer is asked if they
transaction and booking fees want a receipt
impersonal customer service
The card is returned
dependent on a stable internet connection
can lead to unemployment Money is dispensed Customer’s account is updated

Advantages:
1.6. Banking Applications possible to withdraw at any time of the day
offer many banking services without having to go to
Online banking systems depend on the ability to update
the bank
files instantly to avoid double scheduling, which might
possible to access an account from anywhere in the
occur if the system reaction time is slow.
world
The use of computer technology has revolutionized how
usually provides quicker service than waiting in a
we do our banking transactions, for example:
queue at a bank
Internet banking
Disadvantages:
The use of automated teller machines (ATMs)
often in places where theft can take place at night
Chip and PIN technology
potential for shoulder surfing
some banks charge customers for using ATMs
Automated Teller Machines (ATMs)
cash withdrawal limits are often imposed on people
Automated teller machines (ATMs) are places where
customers can get cash (or carry out certain other banking Electronic Funds Transfer (EFT):
activities, such as ordering a statement) using their credit or
It is possible to send money transfer instructions directly to a
debit card.
bank's computer system via electronic funds transfer (EFT)
What goes on behind the
Sequence at ATM technology. The system depends on electronic money
scenes
transfers between accounts; no cash is moved. The computer
Customer puts card into Contact is made with bank’s system automatically moves the requested amount from one
ATM computer account to another when it receives an EFT command.
PIN is checked to see if it is
correct Advantages:
Card is checked to see if it is very secure payment method
PIN is entered using the valid very quick payment method
keypad The transaction is closed if the less expensive than cheques
card is stolen or the number of the customer has the right to dispute an EFT payment
PIN attempts allowed is for up to 60 days
exceeded. Disadvantages:
the bank transaction can’t be reversed without full
dispute investigations
customer needs to have funds available immediately

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

cannot guarantee the recipient’s identity Advantages:


convenience and availability
Credit/debit card transactions easy account management
branch visiting won’t be a requirement
Several credit/debit cards come with a magnetic stripe and a interest rates may be better
chip; the chip houses essential data like the PIN. This more accessible to shop around for the best account
technique is intended to increase security because it is Disadvantages:
superior to a signature. A chip and PIN card to make security of transactions
purchases is an example of an electronic funds transfer (EFT). requires a reliable internet connection
More risk of fraud
Advantages of credit cards:
Easier to make errors
customer protection if ordered goods don’t arrive
Physical cash can't be deposited/withdrawn
internationally accepted payment method
interest-free loan if money is paid back within the
agreed time period 1.7. Computers in Medicine
can make purchases online
Disadvantages of credit cards: Information Systems in Medicine
can be charged high interest rates
annual fees often apply Patient records: Healthcare professionals maintain
easy to end up with credit damage databases to communicate information between them
security risks in online transactions and pharmacists (for instance, to guarantee no
Advantages of debit cards: medications are administered that interact dangerously
money comes from the user’s current account, there with one another).
is no interest Pharmacy records: Pharmacy records maintain a
safer than carrying cash comprehensive record of patient prescriptions. This
can make online purchases includes details like the prescribed medication, dosage,
Disadvantages of debit cards: quantity dispensed, prescribing physician's information,
less customer protection if goods don’t arrive and the date of dispensing. These records help track
no credit allowed; funds are needed at the time of medication usage and can be used to verify prescription
purchase accuracy and detect potential drug interactions or
security risks in online transactions allergies.

Cheques 3D Printers

Individuals and organizations use cheques as a form of Using 3D printers in medicine:


payment. When issuing a cheque, the payer writes the Prosthetics: 3D printers print out artificial body parts
recipient's name, the payment amount, and the date on the such as false teeth, artificial limbs, hearing aids, etc.
cheque. The recipient then deposits or presents the cheque This is a less expensive method of replacing body
to their bank for processing. The payer's bank verifies the parts.
fund’s availability, and upon clearance, the specified amount Tissue engineering: it is the field of combining cells,
is transferred from the payer's account to the recipient's biomaterials, and engineering principles to create
account, completing the transaction. functional tissues or organs, aiming to repair or
replace damaged or diseased tissue in the human
Advantages: body.
more convenient and safer than cash Artificial blood vessels are synthetic structures
can be post-dated designed to mimic the function of natural blood
can be traced if they are lost vessels, facilitating the flow of blood and nutrients
Disadvantages: throughout the body to support tissue repair and
aren’t legal tender and can be refused regeneration.
slow method of payment Customized medicines are personalized drug
easier for fraudsters than other methods formulations tailored to individual patients' specific
relatively expensive payment method needs. They utilize advanced technology and precise
measurements to create medications with accurate
Internet Banking dosages and unique compositions, optimizing
treatment outcomes.
Enable online access to banking services via a secure website
or app, allowing for transfers, bill payments, account
1.8. Expert Systems
management, and more.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

It is an AI-based computer program that emulates the How an expert system is used to produce possible
decision-making capabilities of human experts. It uses solutions
knowledge and rules to provide accurate advice or solutions
in a specific domain. Below is an example of how an expert system works to
Examples include: diagnose a medical issue:

Diagnostics The interactive screen asks questions for the doctor to


Mineral prospecting answer using a keyboard or a touch screen.
Tax and financial calculations The inference engine compares the symptoms with the
Strategy games knowledge base, using the rule base to find matches.
Identification of plants, animals and chemical compounds The system suggests the possible illness with a probability
Route scheduling for delivery vehicles of each, cures, and recommendations on the next step.
The explanation system will explain how that particular
diagnosis was suggested.

1.9. Computers in the Retail Industry


Point of sale (POS) terminals: Computerized systems used at
checkout counters to handle purchases and oversee stock. It
is extensively used in retail stores to process sales
transactions. They enable quick and secure payment
processing through various methods, including cash,
credit/debit cards, mobile payments, and digital wallets. POS
terminals calculate totals, generate itemized receipts, update
inventory, and provide real-time sales data for effective
Components of an Expert System
business management.
1. User Interface
Some features include:
This is the only thing that the end user sees
update stock files immediately
Allows the user to interact with the system
track inventory levels in real-time
Often requires training to operate effectively
prevent stock discrepancies and ensure accurate
2. Explanation system records
monitor inventory levels and reorder when stock is
Informs the user of the reasoning behind the expert lower than a predefined value
system’s conclusions streamline supply chain management and minimize
It will supply a conclusion and any suggested actions to stockouts
take
It will also give the percentage probability of the accuracy Electronic funds transfer at Point of sale (EFTPOS) terminals:
of its conclusions Devices for processing electronic payments; they allow
customers to make payments using debit or credit cards by
3. Inference engine securely transferring funds from their bank accounts. EFTPOS
terminals authenticate and authorize transactions in real-
The main processing element of the system
time, providing convenience and security for customers and
It acts like a search engine examining the knowledge base businesses during retail purchases.
Responsible for gathering information The process of checking credit and debit cards at a
This is the problem-solving part of the system supermarket EFTPOS is much the same as was described for
Attempts to use information gathered from the user to
paying a restaurant bill in Section 6.6.
find a matching object
Some functions of EFTPOS include:
4. Knowledge base Use of chip and PIN cards:
It is a repository of facts Enhance security with two-factor authentication
stores all the knowledge about an area of expertise Require customers to enter a personal identification
a collection of objects and their attributes number (PIN)
Use of contactless cards:
5. Rules base Allow for faster transactions
Enable customers to tap their card on the terminal
The rules base is a set of inference rules. Use of Near Field Communication (NFC):
Used by the inference engine to draw conclusions
They follow logical thinking

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

Facilitate payments through smartphones and other Used at POS terminals for scanning and reading the
devices information stored in barcodes.
Increase convenience for customers Many digital devices have OMR scanners, which may be
Communication between supermarket computers and used to scan QR codes.
bank computers: Advantages:
Share transaction details securely very fast way of inputting the results of a survey
Enable instant payment processing and verification more accurate than keying in data
more accurate than OCR methods
Internet Shopping Disadvantages:
designing the forms is a very complex job
Characteristics of Internet Shopping: there can be problems if they haven’t been filled
correctly
Online stores accessible through web browsers
often only work with black pens or pencils
A wide variety of products and services are available
Convenient and often open 24/7 2. Optical Character Recognition (OCR)

Advantages (To customer) : Automatic Number Plate Recognition (ANPR) systems:


The sensor sends a signal to instruct a camera to
access to the global market
capture an image of the front of the vehicle
comparison between different products effortlessly
An algorithm is used to locate and isolate the number
can shop from anywhere in the world
plate from the image taken by the camera.
able to avoid queues and busy stores
The brightness and contrast of the number plate are
Advantages (To business) : first adjusted. Each character on the number plate is
then segmented.
can target prices and services based on buying data Each character is then recognized using OCR
can update stock availability and prices more quickly than software. The characters are converted into a string of
a physical store editable text by the software.
cheaper to publicize special offers This text string is then stored in a database.
international customer base A barrier is raised, and the motorist is issued with a
increased profits due to lower staff ticket. The ticket shows the date and time of entering
the car park.
Disadvantages ( To customer): When the car returns to the car park, they insert their
ticket into a machine that calculates their charges and
security concerns
registers the payment into the database.
can’t correctly examine products before purchase
occasionally, products may take weeks before being Advantages:
Used to automatically monitor the average speed of
delivered
vehicles over a stretch of road.
additional shipping and handling costs
There is no need to employ a car park or security
lack of face-to-face interaction with staff
guards.
Disadvantages ( To business): It's a much faster system than checking a ticket at the
exit.
increased competition It can automatically control the entry and exit to a car
digital fraud and security concerns park or private roads.
technical issues and downtime It can be used as a security system to prevent illegal
costs of delivery and return parking.
fake negative reviews can lead to a lousy company It can be used to analyze driver behaviour.
reputation It can be used in inner-city congestion charging
systems.
1.10. Recognition Systems Disadvantages:
A lack of manned security car park surveillance could
1. Optical Mark recognition (OMR) media in schools: lead to vandalism.
There could be an invasion of privacy due to recording
School registers: Paper-based registers are fed into OMR drivers’ number plates.
to be scanned and stored in a database. Damaged or very dirty number plates will not be
Multiple-choice examination papers: The position of a recognized.
mark is stored in a computer’s memory after being read The ANPR system only recognizes the number plate
by the OMR, a device using a template that maps out the and not the car so that a car can be fitted with a
X-Y coordinates of each tablet (pen/pencil mark).

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

cloned number plate, thus bypassing car park security, Disadvantages:


for example. Limited range
compatibility issues with some devices
3. RFID in tracking stock:
5. Biometric recognition:
Tracking of stock using RFID involves either tracking
livestock (on a farm) or goods in a shop, supermarket, or Usually refers to automated technologies for
distribution centre. authenticating and verifying human body characteristics
RFID in passports: such as face, iris, retina, finger, thumb, hand and voice.
The data on the RFID chip is read when the passport is Advantages:
scanned. very high accuracy
Your photo is clicked and compared to the RFID chip very easy to use
image. very fast verification time
If face recognition passes, some checks are made to non-intrusive method
ensure you are eligible to enter the country, and if you relatively inexpensive technology
are, the gate opens automatically. Disadvantages:
RFID in automobiles: it can make mistakes if the skin is dirty or damaged
Tags allow or deny access to parking in a secure, very expensive to install and set up
private car park. uses a lot of memory for the data to be stored
RFID tags in lorries and delivery vans can be used at a person’s voice can be quickly recorded and used for
weigh stations to ensure the vehicle is not carrying too unauthorized access
much weight. an illness, such as a cold, can change a person’s voice,
RFID tags can be used on a car production line to track making absolute identification difficult or impossible
its progress through assembly.
RFID in contactless payments: 1.11. Satellite Systems
The embedded chip on credit/debit cards and the
antenna enable customers to wave their card over a
Global Positioning Systems (GPS)
reader at the point of sale terminals to make
payments Used to determine the exact location of several modes of
Smartphone apps can also be used to make transport
contactless payments. Cars usually refer to GPS as satellite navigation systems
Advantages: Satellites surrounding the Earth transmit signals to the
No line-of-sight contact is necessary. surface
It is a very robust and reliable technology. Computers installed in the mode of transport receive and
Tags are much more difficult to forge than barcodes. interpret these signals
RFID tags can reduce the number of staff needed in, Knowing their position on the Earth depends on very
for example, a warehouse because tracking items is accurate timing – atomic clocks are used in the satellites,
automatic (thus reducing costs). which are accurate to within a fraction of a second per
It provides a very fast read rate. day
It allows bi-directional data transfer. Each satellite transmits data indicating its position & time
Bulk detection is possible. The computer on board the mode of transport calculates
Disadvantages: its exact position based on the information from at least
Tag collision is when the signals from two or more three satellites
tags overlap, interfering with each other.
Because RFID uses radio waves, they are relatively Satellite Navigation (satnav):
easy to jam or interrupt.
It is relatively easy to hack into the data/signal Used to determine the exact location of a car.
transmitted by the tag. The computers onboard can be used to show directions to
The initial cost of an RFID system is more expensive a destination.
than a comparable barcode system.
Advantages:
4. Near Field Communication (NFC):
Better focus as there isn’t a need to constantly check
Enables short-range wireless communication between paper maps.
devices. Reduces fines by warning drivers about upcoming speed
Allows payment using a smartphone. changes.
Advantages: The system shows an Estimated Time of Arrival (ETA).
Convenient and secure method of payment It is possible to program in the fastest route to avoid
allows for contactless transactions towns.

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

The system can also give helpful information such as the Enable mobile communication in very remote locations.
location of petrol stations.
Disadvantages:
Disadvantages:
There is a time delay in receipt of the signals.
If the maps are not updated, they can give incorrect The signals received can be affected by bad weather.
instructions. Sunspot activity can affect the performance of a satellite.
Road closures due to accidents or roadworks can cause They must be monitored and controlled regularly to
problems. remain in the correct orbit.
The loss of satellite signals can cause problems.
The system will give incorrect information if an incorrect
start-point or end-point is keyed in. 2. Communication
Geographic Information Systems (GIS) 2.1. Communication with Other ICT
Used to capture, manage, analyze, and display users Using E-mail
geographically referenced information.
Use to determine the distance between two places. E-Mail
Used to find the nearest petrol station or restaurant, etc.
To protect animal and plant life in certain vulnerable Uses:
places.
It can be used in geography, science, or engineering Email is a technique of sending and receiving messages
lessons. and files via the Internet.
It is employed in personal communication, business
Advantages: communications, and marketing.
Acceptable language must be used based on the email's
Allows geographical and thematic data of any kind to be recipient, for example, professional when composing a
combined to show how they are connected to each other. work-related email.
It allows the handling and exploration of vast amounts of Employers frequently establish requirements for
data. professional language, substance, and email frequency.
It allows data to be integrated from a wide range of very Email security is critical to preventing sensitive data from
different sources. being accessed or manipulated.
Netiquette is the proper conduct and politeness when
Disadvantages:
using email.
The learning curve on GIS software can be very long. Don’t be abusive
GIS software is very expensive. Don’t send spam
GIS requires enormous amounts of data to be input. Be clear and concise with your message
It isn't easy to make GIS programs that are both fast and Remember that posts are usually public and can be
user-friendly. read by anyone.
Always check your spelling and grammar.
Media Communication Systems Respect people's privacy and do not discuss or publish
information that might embarrass somebody.
Using satellite signals for communication. Forgive people’s mistakes
Used by media companies when sending Do not use CAPITAL LETTERS to highlight comments
stories/videos/pictures from remote locations. Do not plagiarize
Do not use too many emoticons, as they might annoy
Advantages: your readers.
Email groups enable mass communication to a specific
They have good global coverage.
group of subscribers.
They are cheaper, faster, and safer than laying cables in
difficult or treacherous terrain. Guidelines set by employers:
They have very high bandwidth.
It is relatively easy to expand the network. It is up to companies to decide if personal emails should
Security in satellite transmission is very good because be permitted on their systems
data is coded, and the receiver requires decoding Companies may specify which company devices are
equipment. allowed to be used
During emergency situations, it is relatively easy to move There needs to be a company standard style when
stations on the ground from one place to another. sending emails
They are well-suited for broadcasting. It must be made clear what email content is not permitted

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

Employees should be told only to use their accounts when A vital communication tool that allows people to
sending emails communicate via emails, instant messaging, and other
There must be clear rules regarding the confidentiality of means.
information It acts as a massive database of information on almost
Staff need to be aware of the method and duration of any subject
storing emails The Internet has transformed business by offering a
Incoming emails should only be read by the recipient platform for online purchasing, electronic payments, and
Company policy on how to deal with and prevent viruses digital transactions, allowing enterprises to reach global
must be laid out consumers.
Monitoring of emails may be carried out, and staff must
be aware that the company has the right to read all Advantages of the Internet:
emails
users have access to an incredible amount of information,
Suitable ongoing training will take place to ensure staff
empowering them to learn
follow company policy at all times
enables individuals and businesses to connect and
communicate with people from different parts of the
Carbon Copies (Cc) and Blind Carbon Copies (Bcc)
world in real-time
the Internet has made many things easier to complete,
Carbon copies are used to send the email to multiple
thus providing simplicity and effectiveness
recipients.
Blind carbon copies are made to send the email to Disadvantages of the Internet:
multiple recipients without them acknowledging that it has
been sent to other recipients. Raises data security and personal privacy hazards
Forward enables users to send an already existing email through the possibility of identity theft, data breaches, and
to a new recipient. online monitoring.
To attach files to be sent with an email, we make use of The spread of propaganda, fake news, and
Attachments. misinformation due to the simplicity with which content
can be created and distributed online.
Spam The digital divide resulting from unequal Internet access
threatens to widen existing disparities.
It is defined as any unwanted email delivered via the Internet.
These can range from annoying to genuinely harmful, as they The differences between the internet, intranet, and extranet:
may contain viruses.
The main disadvantages are: Definition:
The Internet is a vast network of linked computer
wasting time networks and gadgets that communicate with one
annoying people another using the Internet Protocol Suite (TCP/IP).
using up valuable bandwidth on the internet, thus slowing The intranet is a secure network that operates within
it down an organization using internet technologies and
may have viruses or be a part of a phishing scam protocols, such as TCP/IP.
can take up significant space in user inboxes Extranets are managed private networks that can give
access to third-party users and give users, such
To minimize the spam you receive: as partners, suppliers, or clients, safe access to a
portion of the intranet.
use spam filters
Accessibility:
avoid disclosing your email address publicly
The Internet is open and accessible to the public,
don’t click on links in spam emails or reply to them
allowing users to access a wide range of information,
services, and resources worldwide.
2.2. Effective Use of the Internet Intranets are restricted to internal users and typically
secured by firewalls and other security measures to
Characteristics of the Internet: maintain the security of critical corporate data.
Extranet provides authorized external users only
Allows individuals from all around the world to connect
limited access, in contrast to the internet, which is
and chat with one another instantaneously
public, or the intranet, which is entirely restricted. To
It runs on a distributed network design, which means a
access the extranet, these users need a secure login.
single central authority does not control it.
Purpose:
It is mainly used for transmitting data in a variety of
The Internet acts as a hub for intercultural dialogue,
formats, such as text, photos, audio, and video.
the sharing of knowledge, and access to a range of
Uses of the Internet:

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

Internet resources, including websites, email, social Social networking:


media, online shopping, and more. platforms where users can connect with others and
An intranet's main goal is to make it easier for share content
employees to communicate, work together, and share include platforms like Facebook, Twitter, Instagram,
information. and LinkedIn
Extranets make it easier for external stakeholders to require users to create a profile and allow them to
collaborate and communicate with a company. It share text, images, videos, and links
enables the organization and its reliable clients or facilitate interaction, collaboration, and information
partners to share information, documents, and sharing on a large scale
resources securely. privacy settings allow users to control who can see
their content
Many use the terms “Internet” and “World Wide Web”
interchangeably. However, they can’t be used in the same The Functionality of the Internet
context:
- The internet refers to the global network of computers and Internet service providers (ISP): A company that provides
other devices connected through routers and servers. internet access. Typically, a monthly fee is charged for
However, the World Wide Web is a collection of websites and this service. Users' accounts are created when registering
webpages accessed via the Internet. with an ISP and acquiring login information such as user
ID and password.
Blog: Uniform Resource Locator (URL): The address of a web
It is a website or section of a website that continually
page on the WWW. It is a text-based address that uniquely
shares new information, frequently written informally
identifies the location of any resource available on the
or conversationally, similar to a journal.
internet. The three main components are:
usually presented in a reverse chronological manner
Protocol:
usually managed by individuals or small groups It is the communication protocol used to transfer data
allow for reader comments, facilitating some level of
between the client and the server
discussion
E.g. HTTP, HTTPS, FTP, and others
often focus on specific topics, such as food, travel,
Domain:
fashion, technology, or personal experiences
it is the name of the server where the resource is
also serve as a platform for sharing opinions or
located
insights
it can be a name or an IP address
Forum:
Webpage/file name:
an online discussion site where people can hold
it is the location of the file or resource on the server
conversations in the form of posted messages
it can contain the name of the file or directory where
often organized around specific topics or interests and the resource is located
divided into categories known as threads
A URL looks like this:
primarily focused on peer-to-peer interaction
protocol://domain/path/filename
may require users to create an account before posting
E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is a
can be moderated or unmoderated
URL that consists of the HTTPS protocol, the domain
A moderated forum is an online discussion forum
name "www.hoddereducation.co.uk", the path is
in which an administrator checks posts before they
“IGCSE” and the filename is “ICT”
are allowed to be posted.
A hyperlink is a word/phrase/image which references
The internet is essentially a huge unmoderated
data that the reader can follow by clicking or tapping,
forum. No one ‘owns’ the internet, and it is
usually taking you to another web page
essentially not policed.
A web browser is a software application used to locate,
Wiki:
retrieve, and display content on the WWW, including web
a type of website that allows users to add, remove, or
pages, images, video, and other files
edit content
designed to facilitate collaboration and knowledge Use of Search Engines
sharing from many people
holds information on many topics which can be There are two fundamental methods for obtaining
searched information via the Internet. The first method is to enter the
posts are not in chronological order URL if you know the website's address. If you don't know
structure is determined by the content or its users where to look, the second option is to employ a search engine
The most famous wiki is Wikipedia, an online to locate the information you seek.
encyclopedia
changes can be tracked and reverted if necessary, Advantages of using the Internet to find information
and the content is usually written in a neutral style

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE ICT

information tends to be up to date because it is industry websites.


quicker and easier to amend
The Internet has vast amounts of information Evaluating Information Found on the Internet
searching for information using a search engine is fast
and easy Although the internet provides much information, not all
people can look for information in the comfort of their are genuine or dependable.
own home Consider the source's reputation and trustworthiness
information on the internet is essentially free of when determining the information's dependability.
charge Check the accuracy of information by comparing it to
webpages may have multimedia elements, making other reliable sources.
learning more interesting Assess whether the information is skewed, keeping an
Disadvantages of using the Internet to find information eye out for views pushing a particular point of view.
it isn’t regulated; anything can be posted Check if the material is current, as obsolete information
always the risk of accessing inappropriate websites might be deceptive.
too easy to be distracted by the many distractions
available on the internet Internet Protocols
Some research skills are lost when using the internet,
Protocols are rules on which the sender and recipient agree
as search engines do all the work for you.
when data is exchanged between devices.
Speed of Searching 1. Hypertext transfer protocol (HTTP): when a web page is
being accessed, entering http:// at the front of an address
Search engines may scan billions of online pages to locate tells the web browser that ‘HTTP rules’ for communication are
matches to your search query in a fraction of a second. to be obeyed.
Your internet connection and the effectiveness of the 2. Hypertext transfer protocol secure (HTTPS): A secure
search engine's algorithms influence the speed. version of HTTP that encrypts data for security.
3. File transfer protocol (FTP): network protocol used when
Amount of Information transferring files from one computer to another over the
internet. It is similar to HTTP, but the protocol specifically
Because search engines can deliver a deluge of transfers files.
information, utilising particular and relevant search 4. Secure sockets layer (SSL): a protocol that allows data to be
phrases is critical. sent and received securely over the internet.
Adding quotation marks for specific phrases, "+" signs for
required terms, and "-" signs for omitting terms can help Risks of Using the Internet
narrow the search.
Inappropriate and unlawful content: The internet may
Finding Relevant and Reliable Information attract people to potentially dangerous or illegal
materials.
The search engine algorithm determines the relevancy of Data restriction: Parental, educational, and ISP
information by considering parameters such as keyword restrictions can all be used to restrict access to specific
frequency & page quality. information or websites.
Reliable information is often obtained from recognized
sources such as educational, government, or well-known

WWW.ZNOTES.ORG Copyright © 2024 ZNotes Education & Foundation. All Rights Reserved. This document is authorised
for personal use only by AADITYA PUNATAR at Euroschool Airoli on 19/09/24.
CAIE IGCSE
ICT

© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by AADITYA PUNATAR on 19/09/24 for strictly personal use only.
These notes have been created by Bisma Hammad for the 2023-2025 syllabus
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website. Under no conditions may this
document be distributed under the name of false author(s) or sold for financial gain.
“ZNotes” and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy