Caie Igcse Ict 0417 Theory v5
Caie Igcse Ict 0417 Theory v5
ORG
CAIE IGCSE
ICT (0417)
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
LVES: low vision enhancement systems: video projected Computer Assisted Translation (CAT)
inside a headset in front of the user’s eyes. Brings the
objects closer for the viewer. When human translators use computer software to help
NVE: Night vision enhancement: dim light is captured and in the translation process
passed through a light intensifier tube, which converts Can reduce translation time
light to electrons. Electrons pass through another tube May not be 100% accurate
where they are amplified to produce more electrons. Common CAT tools:
Amplified electrons pass through to the end of the tube Spell checkers
where they hit a screen coated in phosphor dots that glow Translation memory software
when collided with. this creates an image several times Language search-engine software
brighter and clearer than the original Impacts on everyday life:
More accurate documents since most software can
automatically detect errors
Robotics More multilingual society since anyone with an
internet connection can now essentially learn multiple
Programmed machinery widely used to do physically languages using translators
demanding tasks Quicker translations
Can be automated or manually operated
Used to perform several tasks:
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Keyboards
Mouse
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
An example of a pointing device They are more difficult when doing operations such as
The ball underneath the mouse is used to detect ‘drag and drop’
movement
The left button is for selecting by double on it and the right
is to bring drop-down menus Tracker Ball
There is usually a scroll button which speeds up the
process of moving through a document
Uses
Used for opening, closing and minimising software
Used for grouping, moving and deleting files Tracker ball is like a mouse except that it has a ball on the
Useful when editing images (e.g. controlling the size top of the device
and position of the image) Users control the pointer on the screen by rotating the
Used for controlling the position of a pointer on the ball
screen to allow: Uses
Selection from a menu Have the same pointing/cursor control capability as a
Selecting an icon mouse
Scrolling up/down and right/left Used in applications where the user has a disability
Advantages (RSI)
Faster to select an option by a mouse than a keyboard Used in a control room environment, where it is faster
Enables rapid navigation through applications and the than a mouse to navigate through process screens
internet and more robust than a mouse
Mice are small and don’t take much area Advantages
Disadvantages Tracker balls don’t need the same fine control as a
People with restricted hand/wrist movement can find it mouse
hard to operate a mouse People with limited hand/wrist movement find easier
Easily damaged and can easily be clogged up with dirt to use than a mouse
They are hard to use if there is no flat surface The pointer can be positioned more accurately on the
available screen than with a mouse
They take less desk space than mice since they are
stationary
Touchpad
Disadvantages
Touchpads are used in many laptop computers as a Tracker balls are not supplied with the computer as
pointing device standard, so they are more expensive
The pointer is controlled by the user moving their finger User may need training since they are not standard
equipment
on the touchpad
Uses
Used for opening, closing and minimising software
Remote Control
Used for grouping, moving and deleting files
Useful when editing images (e.g. controlling the size A remote control is used to control the operation of other
and position of the image) devices remotely by using infra-red signals
Used for controlling the position of a pointer on the Uses
screen to allow: In home entertainment devices such as Televisions,
Selection from a menu DVD player/recorder and satellite system
Selecting an icon Used to control multimedia systems
Advantages Used in industrial applications to remotely control
Faster to select an option by a touchpad than a processes, stop and start machinery
keyboard Advantages
Enables rapid navigation through applications and the Enable devices to be operated from any distance,
internet which is useful for people with disabilities
Since the touchpad is integrated into laptop computer, Some chemical processes are hazardous, so it is safer
there is no separate mouse, aiding portability to operate equipment from a distance
They can be used when no flat surfaces are available Disadvantages
Disadvantages People with limited hand/wrist movement can find
People with limited hand/wrist movement can find them hard to use
touchpads hard to use
The signal between the control and the device can be
It can be more difficult to control the pointer when easily blocked
compared to a mouse
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Light turned into electronic signal through light sensitive Type of sensor Applications
sensors and automatically converted to a digital file Automatic greenhouse, chemical
format. pH
processes, environmental monitoring
Advantages
Easy to edit footage in a video editing.
Advantages
High quality video captured, therefore
Readings by sensors are more accurate than taken by
Disadvantages
humans
Storage medium (Memory cards) more expensive to Readings are continuous, there is no break in
buy than films.
monitoring
Because it is a continuous process any necessary
Microphone action or warning will be initiated immediately
The system can be automatic, removing the need for
human intervention, this is particularly important if the
process is hazardous
Disadvantages
Faulty sensors can give spurious results
Graphic Tablet
Can be connected directly to a computer
Sounds can be inputted and manipulated
Uses
Microphones are used to input speech/sounds to be
used in various applications
They are used in voice recognition software- for A graphic tablet is used with a stylus to produce freehand
conversion of speech into text, and recognition of drawings
commands Uses
AdvantagesFaster to read in text than to type it using a Graphics tablets are used to produce drawings,
keyboard computer graphics
Possible to manipulate sound in real time using In countries where characters are complex e.g. japan,
special software they are used as a form of input
If used in a voice activation system, this has the They are used in computer aided design (CAD) work
advantage of improving safety Advantages
Disadvantages It is possible to modify drawings before they are input
Sound files can use up a lot of computer memory They offer an accurate method of drawing
Voice recognition software isn’t as accurate as typing Disadvantages
in manually They are more expensive than other pointing devices
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Webcams have limited features and the picture is Provide a more secure payment system than requiring
often of poor quality a signature or using magnetic stripe, since the PIN
They need to be connected to a computer typed in must match up with the PIN stored on the chip
Provide a more robust system than magnetic stripe
2.2. Direct Data Entry & Associated since the chip does not need to be in contact with the
reader
Devices Disadvantages
Customer needs to be careful when typing in the PIN,
Magnetic Stripe readers so nobody reads it giving an opportunity for Fraud
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
IPS/LCD Monitor
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
It is then possible to direct the presentation without These have been linked to health hazards in the office
being tied to the computer
Most multimedia projectors take input from various
types of video format e.g. PAL, NTSC or SECAM Inkjet Printer
Uses
Used for training presentations (allows the whole
audience to see the images from a computer)
Also used for advertising presentations (shown at
exhibitions, shopping malls etc.)
Home cinema systems (projecting the images from a
DVD or television) use multimedia projectors
Used to produce good quality hard copies – the quality is
Advantages
not as good as in laser printers but much better than that
Enables many people to see a presentation rather
of dot matrix printers
than all of them crowded around a small computer
Do not have large buffers like laser printers, so printing is
screen
done a bit at a time
Avoids the need for several networked computers
Therefore, printing is sometimes paused – the whole page
e.g. when looking at a video clip on the internet,
can’t be stored in the buffer, it must wait for the computer
everybody can see the video on the large screen
to send more data
rather than logging on to several computers
Uses
Disadvantages
Used where low volume outputs are needed
Images can sometimes be fuzzy
Ideal for high quality printing for small print jobs or
Expensive to buy
single pages e.g. for photo quality printouts
Setting up projectors can be a little difficult
Advantages
High quality output
Laser Printer Cheaper to buy than laser printers
Very lightweight and take up little space (small
footprint)
Do not produce ozone and volatile organic
compounds, unlike laser printers
Disadvantages
Output is slow if several copies needed – there is little
buffer capacity to store the pages
Produce very high-quality hard copy output The ink cartridges run out too quickly to be used for
Print rate per page is fast if many pages are being printed large print jobs
Rely on large buffer memories – the data for the whole Printing can smudge if the user is not careful
document is stored before pages can be printed out Can be expensive to run if they are used a lot –
Uses original ink cartridges are expensive
Used where noise levels need to be kept low e.g. in an
office
The best option for fast, high quality, high volume Dot Matrix Printer
printing
Advantages
Printing is fast for high volumes, slightly faster than
inkjet if only a few pages are to be printed
Can handle very large print jobs
Quality is consistently high
A type of impact printer
Toner cartridges last for a long time; laser printers
can be a cost-effective option if colour outputs are not A print head made up of a matrix of pins presses against
an inked ribbon
required
Disadvantages Uses
Expensive to buy Can be used in noisy environments e.g. garage
workshops
Only fast if several copies are being made
Can be used in applications were the print quality is
Colour laser printers tend to be expensive to run since
not very important
four cartridges are needed as well as diffuser kits, etc.
Advantages
Produce ozone and volatile organic compounds
Can be used in environments which would be a
because of their printing method and type of toner/ink
problem for laser and inkjet printers – dusty, dirty or
used
moist atmospheres
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Carbon copies or multi-part outputs can be produced Used to produce prototypes which work from CAD
Very cheap to run and maintain packages, photograph images, stored drawings etc.
Easy to use if continuous stationary is required e.g. Scale models are produced in colour before the real
long print jobs such as wage slips thing is manufactured
Disadvantages The ultimate objective is to produce organic objects
Very noisy – not good in an office environment using this layering technology (such as replacement
Cost more than an inkjet printer to buy human organs)
Very slow Advantages
Printing is of poor quality Save a lot of money, other methods of making
prototypes are very time consuming and expensive
The powders used can often be ground up and reused
Wide Format Printer Physical scale models are produced with working
parts, which gives a better idea of how the product will
look
Disadvantages
Expensive to buy
Slow at producing their output
Product is sometimes a little rough, often further work
Devices that produce hard copies but operate in a needs to be done
different way to printers
Not limited to normal printer paper size and can produce
Speakers
highly accurate, very large drawings and posters
The most common types are pen plotters, electrostatic
(similar method to laser printers) and inkjet plotters
With pen plotters, coloured pens are controlled by a
computer and the paper can move backwards and
forwards to allow accurate shapes to be drawn
Uses
Used to produce large drawings e.g. blueprints of
buildings; are often used with CAD applications Can be connected directly to a computer or are built into
Used to produce large pictures for use on billboards the monitor or casing (as in laptop computers)
or giant posters Uses a digital to analogue converter (DAC) to convert
They can also print on plastic coated paper digital data from the computer to analogue from so the
If the pens are replaced by cutting tools, it is possible to speakers can process it; the signal is then amplified
make large signs through the speakers.
Advantages Uses
Can produce huge printouts Used to output sound from multimedia presentations
Print quality is extremely high Used in home entertainment centres
Disadvantages They can help blind people through audio output of
Slow in operation text on the screen (together with speech generation
Expensive to buy and maintain software)
Used to play downloaded sound files
Advantages
3D Printer
Usually long lasting and durable (if operated within
their intended power levels)
Often provided with the computer/laptop although
these may not be the best quality
Disadvantages
Can take up a lot of desk space, compared to
headphones
A new type of printer that produces solid 3D models using Can distract people around you, everyone can hear
modified inkjet technology called tomography what you are playing
Very thin layers of fine powder (plaster, resin, starch) are May not be able to hear the full sound spectrum, this
bonded together as a 3D model is slowly built up requires multiple speakers
Items produced are known as prototypes
Uses
Actuators
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
CD-RW/DVD-RW Disadvantage
DVD-RAMS are not as compatible as R or RW, many
‘RW’ means that these disks are re-writable media can be systems will not recognize this format
written over several times More expensive than DVD-RW
Unlike CD-R/DVD-R they don’t become ROMs
The recording layer uses a special phase-changing metal
alloy Blu-Ray Discs
The alloy can switch between crystalline and amorphous
(non-crystalline) phases, thus changing its reflectivity to Uses
light, depending on the laser beam power Blu-ray disks are used in home video consoles
Used for storing and playing back films
Spots are produced which can be read by a laser
System allows data to be written, erased and re-written PCs can use this technology for data storage or
many times backing up hard drives
Uses Camcorders can use this media to store film footage
CD-RWs and DVD-RWs are used to record radio and Advantage
television programs Very large storage capacity
They are used in closed circuit television (CCTV) Data transfer rate is very fast
Data access speed is faster than with other optical
systems
Advantages media
Can be re used many times Disadvantage
Different file formats can be used each time Disks are relatively expensive
Blu-ray disks still have encryption problems
Less wasteful than R format since files or data can be
added at a later stage
Disadvantages 3.5. Solid State Backing Storage
Relatively expensive media
Possible to accidentally overwrite Solid state systems control the movement of electrons
within a microchip: if the transistor conducts a current,
this is equivalent to a 1, otherwise it is a 0
DVD-RAM Have no moving parts, consume much less power and are
extremely robust
Recent addition to optical media group Used primarily as removable storage devices and are
Unlike other CD and DVD formats, DVD-RAMs have collectively known as flash memory
several discrete concentric tracks rather than a single Flash memory makes use of NAND chips whereas
spiral track EEPROM (Electronically Erasable Programmable Read-
Gives them advantage that writing, and reading can occur Only Memory) uses NOR chips
at the same time Devices using EEPROM are more expensive compared to
Makes it possible to watch an already recorded television flash memory
program at the same time as a different program is being
recorded
Recording layer is made from similar phase-changing Solid State Drives
material to that used in RW technology
Shiny and dull marks represent data to a computer where Supports reading/writing data & maintains stored data in
they are interpreted a permanent state even without power
Uses Functions much like a hard drive but different tech
DVD-RAMs are used in recording devices such as Built with an array of semiconductors that form its
satellite receivers to allow simultaneous recording memory and operated using an integrated circuit
and playback Uses
They are used in camcorders to store films Used to store operating systems and working data
Advantages Used for storing application software
Have a long life (30 years) Used in file servers for computer networks
Can be re written on more than the DVD-RWs (100,000 Advantages
times) Faster than hard disks because they do not need to
Very reliable as they have built in verification software ‘spin up’ the disk
to ensure accuracy of data Robust because no mechanical parts
Access is very fast Read performance is fast even when data fragmented
No need to finalize the disk Less susceptible to data loss
Very large capacities No moving parts so it is more reliable
Ability to read and write data at the same time
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Function
Flash Drives/Memory Sticks
Makes decisions on messages being passed between the
Otherwise called pen drive/memory stick/USB stick
networks
Can store several GBs of data and use solid state
Reads information about the message and decides where
technology
the message should go and the best route for it to get
Connected to a computer through USB port and power to
there
operate drawn from host computer
Formats the messages making it suitable for the new
Some expensive software increasingly uses these storage
network
methods as a form of security
Uses
Used to transport files between computers How it Works
Used as a security device – a dongle – to prevent
software piracy To send data to a specific device, a router needs a
Advantages something like an address
Very compact and portable media Internet Protocol Address: a unique number assigned to
Very robust all computers and devices connected to the internet which
Not affected by magnetic fields can determine its exact physical location
Disadvantages A router can use this IP to send data from the internet to
Not possible to write protect the data and files the exact device that requested it
Small physical size and are easy to lose. Storing IP Addresses:
Lower storage capacity than hard disk Routers store IP addresses in a routing table
Routing tables list all the different routes to other
networks
Flash Memory Cards Routing table determines best route for data
Using them
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Bluetooth
Switches
Bluetooth is an example of wireless personal area
More efficient than hubs in distributing data networking (WPAN) technology
Each device has an access control media address MAC Spread spectrum transmission (radio waves) is used to
which identifies it uniquely provide wireless links between to devices such as mobile
MAC Address: a number unique to each device connected phones and allow connection to the internet
to the network (like fingerprints) A small home network can be created with this system
Data sent will have a mac address which tells the source Uses
and receiving device Transfer photos from camera to mobile phone
Wirelessly connect different external devices
Modems
4.4. Accessing the Internet
It stands for modulator demodulator.
Converts computer’s digital signals (modulates it) into User can access by web browser
analogue for transmission through telephone lines
Reverse this process- analogue signal from a telephone Type of access Description
line into digital for a computer to process the data Slowest type (60kbps), Telephone
(demodulates it) Dial up internet access line gets tied up while a dial up
The main use it to connect to computer networks over modem is in operation
long distances using existing telephone lines Local cable television operators
Cable internet access give user access through cable
Types of Modems:
networks
Dial-up modems: operate at 60 kilobits/sec Fastest download speed
Internet access via DSL
slow compared to modern standards connections (at least 11000kbps)
Asymmetric: faster at downloading than uploading
(ADSL) asymmetric digital subscriber line modems
operate at 11,000 kilobits/sec
4.5. Web Browser
Don’t tie up line while accessing internet, which allows
Software used to retrieve, present & traverse the World
simultaneous internet access and usage of telephone
Wide Web
Cable modems: allow cable TV users to receive TV signals
World Wide Web: system of interlinked hypertext
as well as internet access
documents accessed via the Internet
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Retrieves web pages and passes them onto the computer Web Browsing
that made a request Email
Stores any page retrieved on the server, which means File Sharing
that when a different computer requests the same page it Entertainment
would be available Video Conferencing
Speeds up the browsing process Online Banking
Advertising & Blogging
Social Media
Websites
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
If main server breaks down, usually the networks will DESKTOP COMPUTERS
no longer function
Advantages Disadvantages
Most websites are designed Not portable so are limited to
Wireless LANs (WLANs)
to be viewed on a desktop use in one room
Do not involve any wiring or cabling Have larger keyboards Require keyboard and mouse
Provide wireless network connection overs a short making it easier to type on as extra peripheral devices
distance Screens are larger so giving
Screen and Monitor consume
They use radio or infrared signal's instead of cables an easier and better viewing
separate power.
Devices known as Access Points (APs) are used for a experience
larger range Cannot usually connect to
APs usually use spread spectrum technology (larger Usually use wired internet
devices like Bluetooth
range) connections which is more
speakers without external
Advantages stable/reliable than Wi-Fi
adapter
All computers can access the same services and
Robust Take up large desk space
resources
No cabling is involved Good heat dissipation- large
Bulky to carry around
The system is more flexible body.
Adding new computers and devices is very easy
Cost is reduced, and safety is improved TABLET COMPUTERS
Disadvantages
Security is an issue Advantages Disadvantages
Problems and interference can affect the signal Smaller & lighter than
Larger & less portable than
The data transfer is slow than in the wired LAN desktops & laptops making it
smartphones
easier to carry
Uses Wi-Fi to connect to the
Wide Area Networks (WAN) Larger screen than
internet which is less reliable
smartphones
WAN is formed by several LANs being connected through
than wired
a router or a modem On-screen keyboards larger Screens are smaller than
Some companies set up Private WANs, it is expensive than those on smartphones those on laptops & desktops
however it comes with a more enhanced security On-screen keyboard is not
It is common to use an Internet service provider (ISP) for easy to type on
connections to the internet and communicate via this
network system MOBILE PHONES
Additional hardware is needed for a WAN: Routers,
modems and proxy servers Advantages Disadvantages
Smallest most portable of all Websites are often not fully
4.9. Using Different Types of Computers devices displayed
to Access the Internet People more likely to carry Small screen size makes
this wherever they go viewing websites difficult
LAPTOP COMPUTERS Much easier to connect to Small keyboards make it
internet on-the-go difficult to type
Advantages Disadvantages Allow children access to
More portable than desktops internet anywhere; can be
Less portable than
can access internet in more dangerous
tablets/smartphones
locations
Larger screen than tablets & Screens not as large as 4.10. Network Security Issues
smartphones which allows desktop PCs may not appear
easier reading as clearly Connection to a network exposes a user to:
Keyboards are bigger than CPUs are not as powerful as Hacking: Unauthorised access given to computer.
those on tablets/smartphones those in desktops Phishing: Phishing involves getting sensitive
Touchpads allows easy information such as usernames, passwords, and
navigation even on slanted credit card detail, for malicious reasons, by mimicking
surfaces a reliable webpage on the network
Pharming: Explained in chapter 8 card 2 (E-Safety)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
1. Data must be Fairly and lawfully processed A method for sending text and attachments from one
2. Data can only be processed for the Stated purpose computer to another over a network
3. Data must be A**dequate, Relevant and not Excessive
4. Data must be Accurate
5. Data must not be kept longer than necessary (Short Comparing Faxing & Email
time)
6. Data must be processed in accordance with the data Fax Email
Subject’s right More secure (user id and
Singed faxes are legally
7. Data must be kept Secure password needed to access
acceptable
8. Data must not be transferred to another country files)
unless (Domestic) they have adequate protection Digital files (no need to print –
Poor quality prints at times
eco-friendly)
Delay is telephone line busy Better quality
Guidelines
Files can be transferred
Slow if several documents
Do not leave personal information lying around between any device
need to be sent
Lock all filing cabinets when leaving an office connected to the internet
Do not leave computer without locking or logging off Faster sending of documents
Every recipient must be
Protect passwords per document and even if
dialled up one by one
Change passwords regularly multiple recipients
Do not fax or email anything of sensitive nature. Expensive to buy No dedicated device needed
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Disadvantage: sound quality is usually bad No longer a need for large office space to store
Security Issues: documents
Identity and service theft Documents are only printed out when required
Viruses and malware Reduced chances for loss of documents as all of them
Spamming (sending junk mail) are stored on one computer
Phishing attacks (illegitimate scams) This leads to need for fewer staff and increase in
efficiency
Spreadsheets:
5. ## 5.1. THEORY can be used to calculate wage/salary slips
Calculations are easily done on this software
Spreadsheets are used to produce graphs for the
The Effects of Using ICT analysis of situations
Usage of this software has led to reduction in staff
Effects of IT on Employment Staff no longer needed to calculate wages and
salaries manually
IT led to unemployment in many areas Databases
Manufacturing - robots have taken over many tasks Updating personnel data (eg salary, home address,
and are much faster. Example in welding car bodies, phone number etc) can be done on databases
spray painting items and manufacturing circuit regularly
boards. Staff records can be centralised in one database and
Computer controlled warehouses – automatic, does data can be transferred between sites
not need people very quick and easy to use
Labour intensive work - printing industry and filing This leads to reduced need for Human Resources staff
New jobs have been created in ICT however, Databases lead to the need for remaining
Writing software staff to be retrained to use the new technology
Maintenance of robots
Internet related jobs 5.2. Effects of IT on Working Patterns
Effects on People: Part-time working: A contract where someone works
fewer hours per week than a full-time employee, in shifts.
People need to be retrained due to new technology
Flexible working (flexi-time): Workers can choose their
Cleaner working environment
working time but will have to complete the day’s work.
De-skilling of workforce
Job sharing: Two or more part-time workers divide their
Computers can now do tasks that required high skill level
job, replacing one full-time worker.
Safer working environment
Compressed hours: Employees can work longer hours per
Fewer manual tasks such as heavy lifting
day but over fewer days, completing the workload sooner.
Effect on Companies:
Word processors:
More wasteful society since
Save energy - switch off
Possible to modify and update word documents
devices thrown away if they
automatically
fail, not economic to repair
There’s no longer a requirement to store physical files
on shelves and offices which would take up space and Easier to program device
Leaving on standby wastes
make the office look messy and full rather than set timings &
resources
dates manually
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Eye Problems
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Electronic instruments can play back through electronic Wireless devices that allow users to make phone calls
effects machines from anywhere with cell reception
Synthesizers combine simple wave forms to produce They connect to the telephone system using radio signals
complex music creations This requires them to be in range of a mobile tower
Electronic organs can mimic any other instrument Used for communication via
Music scores can be generated from music itself using Phone calls
software Text messaging
Software can automatically correct music notes in a score Social Media
There is no need to understand music notation to write a
music score
Music notes are automatically printed out in the correct
format
Internet Telephony/VOIP
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Digital to Analogue Converter (DAC) Readings can be taken more frequently if they are done
by a computer and sensors
Used when you want to attach an analogue output device It could also be safer if whatever is being monitored may
to a digital device such as a computer have potential hazards (e.g. children falling into the river
E.g. If the computer is being used to control a device whilst attempting to take readings)
(motor/valve) the device will be controlled by variable
voltages; the DAC will be used to send out analogue
signals
Disadvantages of Using Computers in
Measurement
Pollution Monitoring
Expensive to purchase and set up
Example: monitoring oxygen levels in a river If performed for educational purposes, reduced practical
Sensors read data from the river (oxygen levels and hands-on experience and learning.
acidity levels using a pH sensor) Will not function in a power cut if no backup power
The data from the sensors is converted into digital using present (expensive to have reliable backup power)
an ADC
The computer stores the received data 6.4. Microprocessors in Control
The oxygen levels and acidity levels are compared to the
historical data stored in memory and they are also
Applications
compared to alarm levels stored in memory
Sensors are used to send data to a computer where the
One of two things will now happen: either the data is
data is processed
transferred to a CD/DVD or to a memory stick and taken
The computer reviews the data from the sensors (by
away for analysis later or the computer is connected into
comparing it to data stored in memory)
a mobile phone network and transmits the data back
If the values are outside the given parameters/pre-set
automatically to the monitoring station
value it acts to try and get the values within acceptable
ranges
It does this by sending signals to devices controlling the
Intensive Care Units in Hospitals process
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Have a microprocessor in them which contains the If too low, it will heat up by turning the boiler on
software which controls the washing machine and if it’s too high it will turn the air conditioner
Appling the factors on
Inputs These will stay on until desired temperature is
Pressure sensor on the door to detect if open or reached
closed
Sensor to detect if the required level of water is in
Temperature sensor to check temperature
Outcome Automatic Cookers
Clothes have been washed
Have temperature sensors and timers with manual
Outputs
controls to set start and end times, and temperature for
Heater
cooking.
Motor to spin drum
Working similar to Central Heating System.
Lights on machine to show user stage the cycle is
at
Actuators to turn the inlet valves on to allow hot
and cold water into the machine Burglar Alarms
Actuator to turn the outlet valve on to let the water
out of the machine when the wash is complete Burglar alarms detect any intrusion.
An actuator to control the pump Sensors such as motion sensors, door and window
Processing sensors, magnetic sensors, multi-functional sensors
Software to make decisions which will allow the (vibration, shutter, and temperature) measure the
clothes to be washed physical quantity and inputs the value to a
Time taken before next inputs microprocessor.
Timer as part of the software The microprocessor compares the input values with
Time different cycles (when to add the preset values, if changes are detected, the
soap/conditioner/etc.) microprocessor sends signals to the actuator
Time delay in measuring temperature The actuator activates the sirens or gives a phone call
Needs to be time for changes to have effect or messages the input mobile number.
Unmanageable situations
Door may not be shut
Needs to draw user’s attention
Usually a buzzer and light Glasshouse
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Easier to experiment with various scenarios stopping the spraying operation if the supply of paint has
Quicker as no need to build system run out etc.
Near-impossible tests involving space and volcanic Robots are very good at repetitive tasks
scenarios can be modelled risk-free However, if there are many different tasks (e.g. making
What if analysis can be conducted that allow a certain specialist glassware for some scientific work) then it is
figure to be computed by letting the computer change often better to still use human operators
other variables that affect the value needed to be set.
E.g. Advantages
Disadvantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Automated teller machines (ATMs) are places where The interactive screen asks a series of question for
customers can get cash (or carry out certain other the doctor to answers, using a keyboard or a touch
banking activities such as order a statement) using their screen.
credit or debit card The inference engine compares the symptoms with
the knowledge base, using the rule base to find
What goes on behind the matches
Sequence at ATM
scenes The system suggests the possible illness with a
Customer puts card into Contact is made with bank’s probability of each, cures and recommendations on
ATM computer the next step to be taken.
PIN is checked to see if it is The explanation system will explain how that
PIN is entered using the correct particular diagnosis was suggested.
keypad Card is checked to see if it is Using 3D printers in medicine:
valid Surgical and diagnostic aids: A CT or MRI is used to
produce images of the internal parts of the body. A 3D
A number of options are
printer can then be used to reproduce the internal
given: change PIN, top up
organs as a solid object.
mobile, see balance, get
Prosthetics: 3D printers are used to print out artificial
money
body parts such as false tooth, artificial limbs, hearing
The customer selects the aids, etc. This is a less expensive method of replacing
cash option & several cash body parts.
options are shown Tissue engineering: Used to produce layers of cells to
The customer’s account is replace damaged tissues.
The customer accepts one of accessed to see if they have Design of medical tools and equipment: Tools can be
the options or types in a sufficient funds, it is checked to made faster and with reduced costs. They can also be
different amount see if they are withdrawing made changes to easily, whereas it wasn’t the same
more than their daily limit with traditional methods.
The customer is asked if they
want a receipt 6.11. Computers in Libraries
The card is returned Transaction is okay
Money is dispensed Customer’s account is updated Many library systems are computer controlled
They usually involve the use of barcodes on the books
being borrowed and on the borrower’s library card
6.10. Computers in Medicine The following describes a computerized library system
based on barcodes
Patient records: Database that holds patient details and There are two files:
can be accessed from any computer within the hospital Book file, containing fields for example: barcode, book
intranet. title, name of author etc.
Patient identification: Barcodes on wristbands of the Borrower’s file, containing fields for example:
patients can be used to access their patient record. borrower’s number, borrower’s name etc.
Pharmacy records: When a borrower takes out a book, the book’s code is
Generates labels for drugs scanned
Checks if the patient is allergic to a particular drug. The book details are then found on book file
Patient monitoring: The borrower’s library card barcode is then scanned for
Sensors measure changes in temperature, heart rate, the borrower’s unique number
breathing rate, brain activity, blood pressure, blood The book file is linked to the borrower’s file and both files
sugar levels and oxygen levels in the patient’s body. are updated to indicate which book has been borrowed
The analogue signals from the sensors are converted and when it is due back
into digital signals using an analogue to digital The borrower’s file is interrogated daily by the computer
converter. to see which books are overdue for return:
Graphs are produced to show trends over time. The computer reads a record from the book file
The readings are constantly compared with the pre- It compares the date due back with the current date
set values, if the values aren’t in the prescribed range, If the date due back is less than (or equal to) the
the medical staffs are notified. current date (i.e. earlier date) …
Hospital management system: All the above-mentioned …using the barcode number of the book…
points come under the hospital management system …the book file is linked to the borrower’s file…
which holds all of them, and can be used to access data …and the corresponding record is read from the
from all the departments. borrower’s file
Expert systems:
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The customer details are then found and a letter or Errors in the knowledge base can lead to incorrect
email is automatically sent out decisions being made
The next record in the book file is then read… It can be expensive to set up in the first place
…until the whole file has been checked Considerable training is necessary to ensure the system
is used correctly by the operators
6.12. Expert Systems
These systems have been developed to mimic the
Components of an Expert System
expertise and knowledge of an expert in a particular field
Examples include: User Interface
Diagnosing a person’s illness
Diagnostics (finding faults in a car engine, finding This is the only thing that the end user sees
faults on a circuit board, etc.) Allows the user to interact with the system
Prospecting for oil and minerals Often requires training to operate effectively
Tax and financial calculations
Chess games Knowledge base
Identification of plants, animals and chemical
This is a database designed to allow the complex storage
compounds
and retrieval requirements of a computerized knowledge-
Road scheduling for delivery vehicles
based management system (in support of an expert
system)
Inference engine
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Automatic stock control systems rely on the use of Cheaper goods (the company doesn’t have to pay
barcodes rent for stores and doesn’t need more employees)
Barcodes now appear on most products sold in shops Wide range of products
They allow quick identification of product details once the Delivery at your doorstep
barcode has been scanned by a barcode reader You can shop 24/7
Supermarkets use electronic point of sale (EPOS) Shop from any part of the world
terminals, which incorporate a barcode reader that scans You save the travelling costs of going for shopping
the barcode, retrieve the price of the article and relay Disadvantages
information back to the computer system allowing it to Quality isn’t assured
update its files People are worried about giving their card details
Barcodes are made up of alternating dark and light lines online.
of varying thickness Packing and postal charges are added
A number underneath the barcode usually consists of four Personal services that you get from stores are
parts: country code, manufacturer’s code, product code, missed.
and a check digit Returning the products is harder
The check digit is a form of validation which is used to No relaxation that you get from actual shopping
make sure no errors occurred during the reading of the Bogus sites are present where you pay and never
barcode receive the product
Every time the barcode is read, this calculation is To seller:
performed to ensure that it has been scanned correctly Advantages
No need to pay rents
No fixed working hours
Less/no shoplifting
Electronic Funds Transfer at Point of Sale (EFTPOS) Sell goods to customers anywhere in the world
Cheaper to contact customers (via e-mail)
Many credit cards are equipped with a chip as well as a
Site warehouse where rental is cheap
magnetic stripe – containing the PIN
Sell goods 24/7
This system is designed to enhance security since it is
Disadvantages
better than relying only on a signature
ICT knowledge needed to set up website
When paying for items using a chip and PIN card, a form
Unemployment
of electronic funds transfer (EFT) takes place
Business abroad is lost if the prices are cheaper
Paying for a meal example there
At times of network failures, there will be no
Waiter inserts card into chip and PIN reader access
Restaurant’s bank contact customer’s bank Not everybody can access the internet, so a few
Card is checked to if valid customers are lost
If card is stolen or expired, then transaction is terminated Customer’s personal data can be hacked
Customer enters PIN using keypad Postal charges discourage people at times
PIN is read from chip on card and is compared to one just
keyed in 6.14. Recognition Systems
If they are the same, the transaction can proceed
Check is then made on whether they have enough funds Automatic Number Plate Recognition (ANPR) systems:
If there are not enough funds available, transaction is A sensor sends signals to a microprocessor, which
terminated. Otherwise, transaction is authorized instructs a camera to capture the front of a vehicle.
Authorization code is sent to restaurant OCR software is used to read the number plate from
Price of meal is deducted from customer’s account the image. The characters are then converted to text
Same amount of money is credited to restaurant’s bank format in order to store it in a database
account Processing of cheques:
Receipt is produced as proof of purchase The value of a cheque is printed in special ink
containing iron particles when a cheque is presented.
MICR is used to read the characters at the bottom of
the cheque.
Internet Shopping
A batch processing method is then used to process all
Online shopping: Shopping over the internet. the cheques at the end of a specific time period.
To customer: OMR media in schools:
Advantages School registers: Paper-based registers are fed into
OMR to be scanned and are then stored on a
database.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Multiple-choice examination papers: The position of a to allow the manager/supervisor to join a call where
mark is stored in a computer’s memory after being necessary
read by the OMR device using a template that maps as a training tool
out the X-Y coordinates of each lozenge (pen/pencil Uses of Automatic Number Plate Recognition (ANPR)
mark). systems:
RFID in passports: Traffic enforcement: the system can check if a vehicle
The data on the RFID chip is read when the passport is is taxed, recognize cars parked illegally, cars speeding
scanned. or going through red lights so a fine can be imposed.
A photo of you is clicked which is then compared with Car park management: the system reads the
the image stored in the RFID chip. registration number and if allowed into the car park,
If the face-recognition passes, some checks are made the barrier is raised.
in turn to make sure you are eligible to enter the Electronic toll collection: the system recognizes the
country, and if you are, the gate opens automatically. vehicle and deducts the fare accordingly.
RFID in contactless payments:
The embedded chip on credit/debit cards and the
antenna enable customers to wave their card over a
reader at the point of sale terminals to make Cookies
payments
Cookies are small files sent to a user’s computer via their
Smartphone apps can also be used to make
web browser when they visit certain websites
contactless payments.
They store information about the users and this data is
accessed each time they visit the website
6.15. Monitoring & Tracking Systems For example:
They remember who the user is and send messages
Public monitoring/tracking: such as “Welcome Sarah” each time they log onto the
Ankle monitor: uses RFID chip to give out the person’s website
location and other details. It is tamper proof and will They recognize the user’s buying preferences e.g. if a
alert authorities if tried to remove. user buys CDs, pop ups related to their buying habits
Phone call tracking: the service provider tracks the will appear on the user’s screen each time they visit
calls and the exact position from which they were the website
made Without cookies, web server would have no way of
Worker monitoring/tracking: Workers are knowing that the user had visited website before
monitored/tracked in the following ways: For this reason, cookies could be used to monitor one’s
Supermarket workers: have the number of items internet activity
passing through the tills over a period of time
monitored.
Internet use is monitored by network managers: they
6.16. Satellite Systems
can check sites visited and time spent on that site
during working hours. Global Positioning Systems (GPS)
Emails can be read: Employers can check that no
Used to determine the exact location of several modes of
personal mails are sent during office hours.
transport
Delivery drivers: Their location can be tracked using
Cars usually refer to GPS as satellite navigation systems
GPS systems. It can also be checked if they are
Satellites surrounding the Earth transmit signals to the
following the shortest route and aren’t speeding.
surface
Key logging: Software that records the keys pressed by a
Computers installed in the mode of transport receive and
user on the keyboard. They are used to find username
interpret these signals
and passwords of a user.
Knowing their position on the Earth depends on very
Employee call monitors: Allows the employer to listen to
accurate timing – atomic clocks are used in the satellites
employee’s telephone calls. There are three ways it can
which are accurate to within a fraction of a second per
be used:
day
Monitor: The manager/supervisor can listen to calls
Each satellite transmits data indicating its position & time
without the employee or the customer’s awareness.
The computer on board the mode of transport calculates
Whisper: The manager can help the employee with the
its exact position based on the information from at least
call, but the customer can’t hear the manager speak.
three satellites
Barge: Both the employee and the customer can hear
the manager
Employee call monitors: Allows the employer to listen to
employee’s telephone calls. Call monitors can be used: Satellite Navigation
to improve the employee’s performance
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
7. ## 7.1. THEORY
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
It is possible to modify questions as the interview Selecting the most appropriate data verification
proceeds and ask questions specific to the interviewee methods
It is a good method if the analyst wants to probe Designing and agreeing the file structures and tables
deeply into one specific aspect of the existing system Selecting and designing the hardware requirements
Disadvantages Selecting and designing the software requirements
It can be rather time consuming Producing algorithms or program flowcharts
It is relatively expensive, due to the use of the analyst’s Designing a testing strategy/plan
time
The interviewee cannot remain anonymous What to include in data input forms
Questionnaires Heading
to make clear the purpose of the form
Involves sending out questionnaires to the work force
Text boxes
and/or to customers to find out views of the existing
clarity on where to enter information
system and find out how some key tasks are carried out
limits the information entered
Advantages
Tick boxes
The questions can be answered quite quickly
to give choices which customers can choose from (eg.
It is a relatively inexpensive method
Male or Female)
Individuals can remain anonymous if they want
Large fonts and visible text colours
It allows quick analysis of the data increases visibility in form so there are fewer chances
Disadvantages
of mistakes
Often the number of returned questionnaire is low
Drop-down menus
The questions are rather inflexible since they have to
On-screen help
be generic
reduces chances of error in case customers are
There is no immediate way to clarify a vague or confused
incomplete answer to a question
Automatic validation
Looking at Existing Paperwork checks if entered information meets the criteria and is
Allows the analyst to see how the paper files are kept, look at acceptable
operating instructions and training manuals, check the Control buttons
accounts, etc. when reviewing the output screen display, it is vital to
check that instructions are clear, font sizes and text colour
Advantages is visible, the full screen is utilized and the size of output
It allows information to be obtained which was not fields are correct.
possible by any of the other methods
The analyst can see for themselves how the paper Verification
system operates
It allows the analyst to get some idea of the scale of A way of preventing errors when data is copied from one
the problem, memory size requirements, type of medium to another
input/output devices needed
Double entry: data is entered twice, by two different
Disadvantages
people
It can be very time consuming
The computer compares the two entries, either after
Because of the analyst’s time, it is a relatively
data entry or during the data entry process, and
expensive method
identifies any differences
Visual check: person entering the data compares the data
7.4. Design with the original document (not the same as proof-
reading)
Once the analysis has taken place and the systems
analyst has some idea of the scale of the problem and Validation
what needs to be done, the next stage is to design the key
parts of the recommended system. Process where data is checked to see if it satisfies certain
A list of tasks is summarized here criteria when input into a computer, for example, to see if the
Designing data capture forms/input forms data falls within accepted boundaries.
Designing screen layouts Validation
Designing output forms and reports How it works Example
rule
Producing systems flowcharts and/or pseudo code
checks if the entered
Selecting and designing validation rules that need to a person’s age should
Range check data is within an
be used be 0< but >150
acceptable range
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Validation least of the right type & that it conforms to certain rules.
How it works Example
rule Validation routines and verification methods are used to
crosscheck entered if ‘Senior Manager’ is ensure this happens
Lookup check data with data stored an existing option in a Again, routines have to be fully tested to ensure they trap
in an existing table query unwanted data but also to make sure any data
transferred from a paper-based system to an electronic
if a field needs 6
checks that the system has been done accurately
characters, then
entered data has a Any system being developed will have some form of user
Length check entering 7 characters
required number of interface
should give rise to an
characters The types of hardware were chosen in the design stage
error message
How these are used to interface with the final system now
a person’s name needs to be identified, for example how the screens will
Character No invalid characters
should not contain any be used to collect the data and the way the output will be
check can be entered
numbers presented
checks that entered If specialist hardware is needed (e.g. for people with
date should be in the
Format check data is in a specific disabilities), then it will be necessary to finalize how these
format dd/mm/yyyy
format devices are used with the system when it is implemented
in a data entry form, if This will be followed by thorough testing to ensure the
a person’s name is a user screens are user-friendly and that the correct output
to check if data is is associated with the inputs to the system
Presence required field and no
actually entered and
check data is entered, this
not missed out Testing strategies
should give an error
message
Testing strategies are done in modular form
an extra digit that is the system is broken up into parts (modules) and each
added at the end of a a digit is missed out or part is developed and tested separately
Check digit number. it is an incorrect digit is any problems in the testing mean that only the module
calculated from the entered will need to be modified and tested again
digits in the number Once the development of each module is completed, the
if ‘Mr’ is typed out into whole system needs to be tested (i.e. all modules
checks if fields
Consistency a field then the functioning together)
correspond (tie up)
check GENDER field must be Even though each individual module may work
with each other
M or Male satisfactorily, when they are all put together there may be
data clashes, incompatibility and memory issues
All of this may lead to a need to improve the input and
7.5. Development & Testing
output methods, file and database structures, validation
and verification methods
Once the design stage is completed, it is then necessary
Then the system will need to be fully tested again
to create the system and fully test it
It is a very time-consuming process but the system must
The testing strategy has to make sure that the new
be as perfect as possible before it goes live
system meets client requirements, has solved the
Testing will use many different types of data, which will
identified problem from the old system, removes any
bugs or potential errors in the system and produces the fall into one of three categories: normal, extreme or
correct output abnormal
this is done in the following stages
Test data used
Development stages
Normal: this is data which is acceptable and has an
expected (known) outcome. This data should be
If the system contains files (e.g. a database) then the file
accepted by the system
structure needs to be finalized at this stage (e.g. what
e.g. the month can be any whole number in the
type of data is being stored in each field, length of each
range 1 to 12
field, which field will be the key field, how the data files will
Extreme: data entered is at the limits of acceptability
be linked, etc.)
Once the file structure has been determined, it is then and should be accepted by the system.
created and fully tested to make sure it is robust when the extreme data would be the months 1 or 12
system actually goes live Abnormal: unacceptable data is entered and should
be rejected or cause an error message
Since it is important that correct data is stored in files,
e.g. all the following values are not allowed as
there are certain techniques that need to be adopted to
inputs for the month:
make sure the data populating the file and database is at
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
purpose of the system compare test results from the new system with results
screen layouts from the old system
print layouts compare the performance of the new system with the
hardware and software requirements performance of the old system
error handling observe users performing set tasks, comparing old
troubleshooting guide with new
tutorials measure the time taken to complete tasks, comparing
how to log in/log out old with new
glossary of terms interview users to gather responses about how well
the new system works
give out questionnaires to gather responses about the
For programmers
ease of use of the new system
Technical documentation
for programmers or system analysts to get an overall view of Some results from the evaluation may require changes to
the system either hardware or software.
includes: Hardware may need to be updated because of:
feedback from end users
program listing/coding new technology in the market
programming language changes within the company
hardware and software requirements Software may need to be updated because of:
system flowcharts feedback from the end users
program flowcharts changes in legislation and rules
memory requirements changes within the company
file structures
sample runs
validation rules 8. ## 8.1. THEORY
Information common to user documentation and technical
documentation Safety & Security
purpose of the system
limitations of the system Physical Safety
hardware and software requirements
sample runs Ways of eliminating or minimizing
Safety hazard
meaning of error messages hazard
Use a residual circuit breaker
7.8. Evaluation Electrocution from
(RCB), Check insulation on wires
regularly, Do not allow drinks near
spilling drinks
Once a system is up and running it is necessary to do computers, Check equipment
some evaluation and carry out any maintenance, if regularly
necessary. Cable ducts- make wires safe,
this is done to compare the new system with the old
Tripping over trailing
Cover wires/tuck them away, Use
system and make sure there are no limitations or
wires
wireless connections
improvements to be made and that the new system works Strong desk/tables to support
better than the old system. heavy hardware, Use large desks
The following is a list of some of the things considered Heavy equipment falling
and tables so that hardware
when evaluating how well the new system has worked.
doesn’t fall off edge
This can ultimately lead back to a re-design of part of the
Have a CO2 fire extinguisher
system if there is strong evidence to suggest that changes
nearby, Don’t cover equipment
need be made. Fire risk from
vents- can cause equipment to
To evaluate the system, the analyst will: overloading sockets or
compare the final solution with the original
overheat, Make sure hardware is
equipment overheating
requirement
fully maintained, Do not overload
sockets with too many items
identify any limitations in the system
identify any necessary improvements that need to be
made Health Safety
evaluate the user’s responses to using the new system
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Ways of eliminating or minimizing If personal data is leaked (data breach), the following can
Health hazard
hazard occur:
Identity theft
Back and neck
-use adjustable chairs for sitting Bank fraud
problemsfrom \n sitting
with correct posture \n -use Damages to personal property
in front of the computer
footrests \n -use screens that can Kidnapping (if kidnappers get access to the victim’s
screen for \n long
be tilted according to user’s choice address.
periods of time
Etc.
-ensure correct posture is
Repetitive Strain Injury
maintained \n -take regular breaks To prevent the above, it is essential that personal data is
(RSI) is damage \n to
\n -use ergonomic keyboards \n - protected.
fingers and wrist
use voice-activated software if Personal data can be leaked intentionally and
because of \n repetitive
user is unable to use the keyboard unintentionally. Electronic data is at risk due to: hacking,
clicking of keyboard
\n -use a wrist rest viruses, spyware, phishing, pharming, Smishing, vishing,
-use anti-glare screens \n -use ransomware (A malicious program that encrypts data on
Eyestrainbecause of LCD screens as they are better a computer system and demands for a ransom to provide
staring at a \n computer than CRT screens \n -ensure there and decrypt the data), spam, moderated and un-
screen for extended \n is no screen flicker \n -have eyes moderated forums, cookies, etc.
periods of time tested regularly \n -take regular If a student shares a photograph of themselves in their
breaks school uniform on social media, then paedophiles, child
Headachescaused by predators, kidnappers, etc. can physically reach the
-use anti-glare screens \n -use
incorrect \n lighting, student. This should not be done
window blinds to remove any
screen reflections and \n
reflections of sun’s rays \n -take
staring at the computer
regular breaks \n -have eyes
for long \n periods of
tested regularly Internet Safety
time
-proper ventilation in the room To keep personal data safe, one must:
Ozone irritationcaused where laser printer is present \n - Not give unknown people (on the internet) personal
by laser \n printers in the laser printers should be in a information or send pictures of oneself to them.
office separate room \n -change to other Maintain privacy settings to control which cookies are
types of printer if possible on their computer
Use learner friendly search engines and websites
8.2. E-Safety recommended by your educational institution, e.g.
znotes.org
The website being accessed is from a trusted source,
E-safety refers to the safety of data and personal
or has a padlock symbol/ https protocol (s for secure):
information while using the internet.
E-safety is required to make sure a user’s personal
information is not made vulnerable and even leaked to
hacker’s for e.g., which can lead to identity fraud, bank A/C
issues, etc.
Personal Data
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Personal info. from the user’s computer can be picked Preventing Phishing, Pharming & Smishing
up by the pharmer/hacker
Anti-spyware, anti-virus software or anti-pharming User education
software can be used to identify this code and correct Set up anti-malware and anti-spyware software
the corruption Enabling protocols such as SPF and DKIM
Do not download random .exe (executable file formats),
Prevention .php, .bat, .com etc.
Users should be alert when being redirected to other
Use anti-spyware software that can remove any malicious websites.
code If a person on the internet is asking for personal
User should be alert for any signs that their computer has information, or to meet in real life or acting suspicious,
been hacked into or they’re being redirected to a they should be reported to cyber security agencies, or
fraudulent website one’s parents/guardians.
Websites/pop-ups can be made to mimic legitimate ones,
Spyware and key-logging software or seem too good to be true, for e.g.lotrei.net instead of
lottery.com
This is software which gathers data based on the key
presses or clicks made on the keyboard; the gathered
data is sent back to the person who put the software on a
computer system
It can give the hacker access to data entered by the user
which can include passwords or bank account details
The software is able to install other spyware, read cookie
data and also change the user’s default browser
Prevention
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Since data is encoded, it appears meaningless to a hacker User privilege allows access to their own work area only
This technique prevents illegal access
Necessary to use decryption software to decode the data Passwords
Used to protect sensitive data e.g. banking details
Encryption keys are complex algorithms which makes After typing in User ID, the user will be requested to type
codes almost unbreakable in their password.
Passwords are shown as starts (***) so nobody
Secure Socket Layer (SSL) overlooking can see it
To help protect the system, the user has a certain number
Type of protocol that allows data to be sent and received of attempts allowed before they will be locked out of the
securely over the internet system
When a user logs into a website, SSL encrypts the data If password is forgotten, the administrator must reset it
https or padlock symbol in the status bar If password is forgotten on a website, it will be sent on
When a user wants to access a secure website: your e-mail
User’s web browser sends a message so it can
connect with the required website which is secured
with SSL Cloud Storage
Web browser requests that the web server identifies
Your data is stored remotely and not on your computer,
itself
Web server responds by sending a copy of its SSL so you don’t have control over the physical security of
certificate your data.
Web browser checks if the certificate is authentic Some of the data stored may be personal data which are
Sends signal back to the web browser open to hackers, and have to be encrypted in order to
Starts to transmit data once connection is established prevent hackers from obtaining them.
If not secure, browser will display an open padlock The company providing the storage may go out of
business. In this case what has to be done to the data will
Firewalls have to be considered.
The company providing the storage will have to put in all
A firewall sits between the user’s computer and an its efforts and safety measures in order to keep your data
external network (internet) and filter information in and safe.
out of the computer If the company providing the storage doesn’t backup your
Tasks carried out by firewall: data, you may lose it in case of power cuts or fires, etc.
Examining ‘traffic’
Checking weather incoming or outgoing data meets Biometric data
criteria
If data fails the criteria, the firewall blocks ‘traffic’ Uses features of the human body unique to every
Firewall can keep a list of all undesirable IP addresses individual, such as fingerprints, retina, iris, face and voice
Helping to prevent viruses or hackers entering the recognition. It is used in authentication techniques as it is
very difficult to replicate
user’s computer
Advantages:
Features of a secure webpage: Usernames or passwords don’t have to be
remembered
Webpage URL: if the webpage is secure, it will start with Almost impossible to replicate body parts
‘https’ instead of ‘http’ No one else can gain access, like with a stolen card
padlock symbol They cant be forgotten anywhere as it is part of the
body
Disadvantages:
Authentication The readers are expensive
Damages in fingerprints can deny access
-Used to verify that data comes from a trusted source
Some people worry about the privacy issues with their
-Works with encryption to strengthen internet security
personal information being stored
User IDs
Digital certificate
To log on to a network, a user must type in a user iD
User ID assigns user privilege once user logs in A digital certificate is an electronic passport used in the
The top-level privilege for a network is an administrator: security of data sent over the internet
able to set passwords and delete files from the server
They can be attached with mails so that the receiver can
etc.
know that the mail is sent from a trust source
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Communication
Copyright Laws
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Blog
User ID and Password Protection
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
10.3. Information on the Internet 11.2. Reduce File Sizes for Storage or
Information is more likely to be up to date than in books, Transmission
since websites can be updated very quickly
Much easier to get information from websites- search Files that are smaller in size upload and download faster
engines link key words together and find information that than larger ones and thus are better for transferring data.
matches the criteria- cause for popularity
Vast amount of information on the internet- easier to
locate than using indices in books 12. ## 12.1. PRACTICALS
Information on the internet however may be relevant or
correct, not reliable, inaccurate or even biased- it does
not go through any checking process
Images
Information overload can make it difficult for the user to
find relevant information An image should be edited when doing so will enhance its
Ensure use of reliable websites that properly cite all their usefulness.
sources test
Always look for primary sources of information & form
own conclusions
Do not quote/use secondary often biased opinions or
13. ## 13.1. PRACTICALS
gossip
Do your research
Layout
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Headers and footers ensure each page has all the Orphan: A paragraph-opening line that appears by itself
required information like the page numbers, logos, titles, at the bottom of a page or column, thus separated from
etc. the rest of the text.
A common mnemonic is "An orphan has no past; a widow Page, section and column breaks are used to ensure that
has no future" widows and orphans are not present in a document (these
show poor typography).
A mail merge document is created in order to create a
14. ## 14.1. PRACTICALS standard template and then use it to send documents
personalised (by the computer system) for the respective
recipient of the document
Styles
Several organisations use a ‘corporate house style or 17. ## 17.1. PRACTICALS
corporate branding, which is used to print on websites,
visiting cards, letters, etc. It refers to a specific style of
fonts and formats used in the making of ICT solutions by Data Manipulation
organisations.
A corporate house style when used effectively identifies
Create a Database Structure
the users of the style.
Consistent styles enable users to associate a particular
Flat file databases are tables that have data sorted in
organisation with a style and also show consistency in the
rows and columns, whereas relational databases are
ICT solutions created by the organisation
several tables grouped together to from a link, thus
preventing unnecessary repetition of data.
15. ## 15.1. PRACTICALS Primary key: The key field of a table which is unique and
identifies each record
Foreign key: The field linked to the primary field of the
Proofing table linked to through a relationship
Verification: checking of data when copied from one At times placeholders for media such as images, sound
medium to another to prevent errors. bites and video clips are used to enhance the usability of a
Verification is also important and is a way of preventing a database
difference in data when it’s being transferred from one
system to another. This tries to make sure data entered is
17.2. Test the Data Model
correct, relative to the source.
A model prepared needs to be tested before being used
16. ## 16.1. PRACTICALS to ensure that all results computed are accurate. The test
plan must be justified to be apt for the model. E.g. all the
mathematical operations must be tested in a model that
Document Production relies on calculations.
Definitions:
Testing: Checking if the designed model delivers the
Widow: A paragraph-ending line that falls at the beginning
expected outcome when tested with data.
of the following page or column, thus separated from the
Test data: The input data used for testing model.
rest of the text.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Expected outcome: The output a model is supposed to Nested formulae/function: A formula/function used
give with the test data. inside a formula/function as an argument
Actual outcome: The output a model actually gives the
user when the test data is input.
18.2. Test the Data Model
18. ## 18.1. PRACTICALS A model prepared needs to be tested before being used
to ensure that all results computed are accurate. The test
plan must be justified to be apt for the model. E.g. all the
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
on (the server) is not the same as where the To upload and publish content on a website using FTP, a
webpage was developed and thus an absolute file user must have:
path would point to the wrong address. FTP client software
All files in one folder
19.3. Use stylesheets Host Name/URL/IP address for FTP
Host port to be used for upload
CSS (cascading stylesheet) is a text-based language which Username and password
is attached to webpages to set their format. CSS files have The test plan used to test a webpage must be justified
a “.css” extension based on the elements being tested. E.g. If hyperlinks are
These should be attached using relative file paths as they being tested, it makes to check if all the hyperlinks are
are stored along with the webpage and thus can be linked redirecting the user to the correct webpage/ section of
relative to them. the webpage.
Internal CSS have more preference over Inline CSS
If several external stylesheets are attached to one web
page, the stylesheet attached last (at the bottom of that
20.
part of the code) is given preference over the other
attached ones).
WWW.ZNOTES.ORG
CAIE IGCSE
ICT (0417)