IGCSE Edexcel Guide
IGCSE Edexcel Guide
IGCSE Edexcel Guide
What is a computer?
A computer is an electronic machine that inputs data, processes it under the control of a stored program,
and outputs information. While the data is being processed, data can be retrieved from or saved on backing
storage.
Data is raw, unprocessed information. Information is data that people understand. In order to understand
data, you may have to interpret it:
Chapter 1: Hardware
A date 30/11/2012
A sum of money $301,120.12
The interpreted data, that is the date or the sum of money, is the information.
Data
input
Program instructions
and data
Process
Data is retrieved
or saved
Data output
Page 1 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 1
06/03/2013 07:38
Types of computer
Computers can be:
Desktop has these basic components: monitor, keyboard, system unit and mouse.
Laptop a portable computer slightly larger than A4 size.
Tablet (or pad) a very small portable computer with a touch-sensitive screen and no keyboard.
Notebook a small laptop computer.
Netbook very small laptop optimised for Internet and email access.
Hand-held computer, e.g. smart phone fits into one hand and has a touch-sensitive screen. Can be
Chapter 1: Hardware
Games console a PC designed for playing games, e.g. Xbox. Has these features:
Graphics displayed very quickly
Large hard disk
Game controller, e.g. joysticks, buttons
Internet connection for online games.
Embedded computer designed for and built into equipment to perform specialised functions, e.g. a
single microchip that controls a DVD player.
Processors
A processor or microprocessor is built into a microchip that also has memory and other components built
into it. The microchip itself is often referred to as the processor. If there is more than one processor built
into the microchip, then the microchip is referred to as the processor and processors built into it are
referred to as cores.
An important feature of a processor is the speed at which it processes
instructions. If you have more and faster cores, with a larger on-board
cache, applications will run more quickly.
Here is a microprocessor description: Intel Core 2 Duo E8600 Processor
(3.33GHz, 1333MHz FSB, 6MB cache). This has two cores and their speed
is 3.33GHz. The front side bus (FSB) transfers data between the processor
and memory at a speed of 1333MHz. A 6MB cache of RAM memory is
built into the microprocessor.
Figure 1.2 An Intel Core 2 Duo
microprocessor
Page 2 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 2
06/03/2013 07:38
The processor you need depends on what you are going to do. For occasional word processing and email, an
Intel Pentium Dual Core processor might be sufficient but for playing online multimedia games a faster Intel
Pentium Quad Core processor is needed.
The peripheral devices attached to a computer system are for input, output or storage.
An input device is for putting in data to the computer.
An output device displays information from the computer.
Input device
Output device
Keyboard
Monitor
Mouse
Printer
Scanner
Input devices
Pointing devices
Compared with a keyboard, pointing devices make it easier to point and
click but are harder to use to input text.
Chapter 1: Hardware
Keyboards
are built into game consoles, which are mainly used for input but may
have limited output, e.g. they vibrate.
Tracker ball
Trackpad a pad below the space bar on a laptop. Move your fingers
across its surface and the pointer moves on the screen.
Page 3 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 3
06/03/2013 07:38
Scanners
A scanner converts printed images on paper into electronic form:
Hand-held scanner reads the image while being dragged over it.
Flatbed scanner the image is laid flat on the scanners surface.
Sheet-fed scanner reads the image as the paper goes through the
sheet feeder.
Scanners may read only particular types of image, e.g. a bar code
scanner.
Figure 1.5 A bar code scanner
Chapter 1: Hardware
OCR is used to input printed or handwritten characters without typing in the data. The characters are
converted to text that can be word processed. This text needs to be checked carefully as character recognition
is not always accurate.
OCR vs MICR
OCR and MICR both read printed characters.
OCR uses reflected light while MICR uses magnetic field patterns.
OCR recognises handwriting and different types of printed text but
MICR only recognises specially shaped characters.
TOP TIP
When you describe the
difference between two
technologies, each point you
make should mention both
technologies.
Figure 1.6 MICR uses uniquely shaped characters printed in magnetic ink
Page 4 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 4
06/03/2013 07:38
Information is stored on a magnetic stripe on a plastic card. The data recorded on the magnetic stripe
can be input directly into a computer. Stripe cards can be used to control access. A disadvantage of stripe
cards is that the data may be affected by electromagnetic radiation and data can also be copied or edited.
Smart cards
Oyster
cards are smart cards in widespread use in London to pay for travel. They are preloaded with cash
credits online.
Smart cards can also be affected by electronic radiation and can be copied or edited but they are generally
more secure than data recorded on a magnetic stripe.
A digital camera stores pictures on a memory card. These can be transferred to a computer or TV. Digital
A digital video camera or camcorder records moving images with sound. Recordings can be saved on a
memory card or built-in hard disk, and input to a computer.
A webcam is a digital video camera used to view a remote location over the Internet. This may be for
security purposes, interest or communication. Recordings can be made. Simple webcams have a fixed
position but some webcams allow the user to turn them.
Digital photos and videos can be:
Saved on a computer, so backup is easier and more reliable.
Chapter 1: Hardware
cameras have a small LCD screen or traditional viewfinder. The camera forms pictures from a mass of very
small dots of different colours. Picture quality is related to the density of the dots.
Sent by email.
Displayed on a wide variety of devices, such as smartphones and TV screens.
Broadcast over the Internet, e.g. on-demand TV programmes.
Disadvantages:
Users store more photos and longer videos so more backing storage is
needed.
High-quality photos and videos can be very large files. Sent by email or
broadcast over the Internet they use more bandwidth and slow the network.
Biometric scanners
A biometric scanner reads a persons unique physical characteristics to
identify them, e.g. face recognition. Biometric scanners can be used to
control entry to buildings and used in place of car keys. Although
identification is not entirely accurate, the use of biometric scanners
minimises the risk of fraud and theft.
Page 5 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 5
06/03/2013 07:38
Sensors
Sensors are used extensively for data logging and control as data can be continuously and reliably recorded
in a form that can be processed by a computer, e.g. in weather stations and robotics. They can be placed in
dangerous locations where people would be hurt and can record data that people do not sense accurately,
e.g. humidity. Data can be collected frequently over networks from sensors in remote locations.
A touch-tone telephone makes a different beep depending on the button pressed. On the other end of
Chapter 1: Hardware
the line, a computer inputs the beep and determines which button has been pressed. You may then listen
to a voice response from the computer.
Natural language processing uses speech recognition to interpret natural language, e.g. spoken
English. You could use natural language processing to dictate a letter or give instructions to a computer.
Advantages of audio input:
People speak to the computer and do not need to learn to operate a keyboard.
Disadvantages:
Voice and speech recognition software has to be trained to recognise each persons speech. This can be a lengthy
process.
Voice and speech recognition is not accurate because people pronounce words differently.
Remote control
Remote controls are used to control TVs and garage doors and
inaccessible or hidden devices. However, if the handset is lost or damaged,
the device may not be useable.
A remote control handset will
often have two LEDs. One LED is
the infrared transmitter and the
light from this is invisible. The
other emits a visible light to
reassure the user that the remote
control is working.
6
Page 6 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 6
06/03/2013 07:38
Output devices
Monitors
Monitors or visual display units (VDUs) come in different styles with different screen resolutions, colour
quality and clarity.
LCD (liquid crystal display) monitors have flat screens and are more compact than CRT (cathode ray tube)
monitors. They consume less power than CRTs.
A monitor screen is made up of many dots (pixels or picture elements). The dots are so tiny you do not
usually see them. A screen has a resolution of 1280 by 1024 if there are 1280 dots across the screen,
and 1024 from top to bottom. Higher quality screens display more dots.
The graphics card (or video card) is housed in the system unit and controls the screen display. Higher
quality cards have more colours and produce clearer graphics more quickly.
Touch screen
A touch screen is used for output and input. You touch the screen to control the computer. Touch screens
are mainly used with tablets and smartphones. There is no need for a keyboard but inputting text is slower.
A multimedia projector projects the image displayed on a computer screen onto a larger, separate screen,
which can be seen more clearly by a large audience. Interactive whiteboards are large, touch-sensitive
panels used as screens for multimedia projectors. This technology is used in school classrooms and at home
to watch movies and play computer games.
Printers
Printed output is called printout or hard copy.
An impact printer strikes through an inked ribbon onto paper.
A non-impact printer uses a non-striking method to form the image on the paper.
Chapter 1: Hardware
Multimedia projector
Some dot-matrix printers are impact printers with a print head that is
a matrix of steel pins. The pins strike a carbon ribbon making patterns
of dots on the paper.
Inkjet printers spray tiny dots of ink onto the paper. Inkjet printers
are non-impact dot matrix printers and are quieter. They produce highquality output in monochrome or colour.
Laser printers are widely used but are more expensive to buy than
inkjet printers. Quality is excellent and they print quickly in
monochrome or colour.
Thermal printers use heated wires to mark dots on the surface of a heat-sensitive paper.
Printers use different types of paper, for example:
M01_ICT_REV_IGCSE_5791_M01.indd 7
Page 7 of 40
06/03/2013 07:38
Print quality
Printers use very small dots to produce text and pictures. A measure of print quality is the dpi (number
of dots per inch). The higher the dpi, the better the print quality.
Photo-printers
Photo-printers are used to print digital photographs. A digital camera is connected to the printer or the
cameras memory card is read in the printer. Pictures can be printed without using a computer.
Advantages of printers:
A printout is useful if no computer is available.
Disadvantages:
Printing is slow and expensive compared with electronic communications.
Paper is bulky and deteriorates in storage.
Printed materials are more difficult to access and distribute, e.g. digital photos can be emailed and viewed on a
multimedia projector.
Chapter 1: Hardware
Plotters
A plotter draws lines on paper using coloured pens. A flatbed plotter holds the paper still while the
pensmove. Other plotters move the pens from left to right while the paper moves forwards and
backwards.An upright plotter uses very long sheets of paper. Plotters are used in computer-aided
design. Plotters are usually more expensive to buy and slower than printers, but much larger sheets
canbe printed.
Page 8 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 8
06/03/2013 07:38
MFDs combine a printer, scanner and communications link to function as a printer, scanner, photocopier
or fax machine. MFDs are much less expensive to buy than all the individual devices and use less space on
the desktop. It is cost effective to replace them more frequently with modern technology. However, if part
of the device is faulty, all the functions may be unavailable. If one function is being used, then the other
functions are unavailable for other users.
Speakers
Many computers have speakers. Headphones are two small speakers built into a headset. Sound is needed,
for example, to play music and for speech synthesis.
Sound cards
A sound card controls all input and output of audio. Audio input through a microphone and output
through speakers are usually analogue and the sound card handles their conversion into digital signals
processed by the computer. It also handles digital audio input, e.g. from multimedia applications.
Sound cards have features such as:
Polyphony plays more than one sound or voice independently at the same time.
Output through one or more sound channels, e.g. mono, stereo (2 channels), or quadraphonic
Surround sound or 3D audio.
Improves the clarity of compressed audio files, e.g. mp3.
Built-in memory for faster sound processing.
USB, optical and other ports to connect to DVD recorders and other
devices.
Chapter 1: Hardware
(4channels).
instruments.
Actuators
In control applications, computers make events happen using actuators, e.g. heaters and motors. A buzzer
is an actuator that, for example, warns when the microwave has cooked our dinner. Actuators can perform
physical tasks such as controlling a robot or operating a digger. This can be dangerous for people if their
presence is not detected by the computer.
Page 9 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 9
06/03/2013 07:38
Worked Example
A desktop PC is used for office work at an Estate Agent.
a)
b)
c)
TOP TIP
Relate your answers to the
context, i.e. the Estate Agent.
There are several correct answers, e.g. a digital camera is used to take digital pictures of houses for sale to
upload to the Estate Agents website.
b)
There are several correct answers, e.g. a colour printer is used to print details of houses for sale to be
given to customers.
c)
Chapter 1: Hardware
ii. There are several correct answers. For example: Advantage: MFDs are more compact than the
individual devices replaced. Disadvantage: If the MFD breaks down this has more impact on office
work than if an individual device is not working.
Exam-Style Questions
5. Other than the keyboard, name an input device you
would use to:
C software
D output device
(1 mark)
a) Printer
(2 marks)
b) Game console
(2 marks)
C mainframe
D tablet
C a webcam
D a joystick
(1 mark)
(1 mark)
(1 mark)
Page 10 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 10
06/03/2013 07:38
Memory
RAM is main memory (random-access memory). Data and programs in main memory are lost when the
computer is turned off.
ROM
11
Page 11 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 11
06/03/2013 07:38
Flash memory
Memory sticks store up to 32 GB of data and plug into the USB port on a computer. Memory sticks are
sometimes called USB sticks, pen drives and USB pens. They are:
Inexpensive
Small
Lightweight
A convenient way of moving data from one computer to another.
Memory cards store up to 256 GB of data. There are many types,
including SD (Secure Digital) and mini and micro SD. They are used in, e.g.
digital cameras and mobile phones.
Read/write
head
Hard disks
A magnetic hard disk stores 500 GB of data or more. On each surface,
the data is stored in concentric tracks and there is a read/write head that
moves in/out to the track where the data is saved.
Figure 2.1 The inside of fixed hard
disk with moveable heads
TOP TIP
Do not confuse the hard disk
and RAM memory. The hard
disk stores your work when
the computer is switched off
whereas RAM is cleared.
Optical disks
CDs, DVDs, HD DVD and Blu-ray are optical disks and are read and
written by a laser.
Compatibility problems
A CD stores around 700 MB. Data read/write is slower than a hard disk.
CDs are easily damaged but inexpensive.
A single-sided, single-layer DVD stores around 4.7 GB. A dual-layer, twosided DVD stores 18 GB. Data read/write is slower than a hard disk.
There are many different types of CD and DVD, for example:
12
Data can be read from but not written to CD-ROM and DVD-ROM. Often used for movies.
CD-RW and DVD-RW can be rewritten repeatedly up to 1000 times.
Page 12 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 12
06/03/2013 07:38
Magnetic tapes
Backup
A backup is a copy of a file. Backup a file each time you edit it (e.g. save it
on the internal hard disk in your PC and save a backup on an external
hard disk), and backup all your files every month (e.g. to DVDs).
version.
Worked Example
1.
2.
3.
TOP TIP
You need to make backups
of your own work and do
this systematically. Apply the
theory to your practice.
Answers
1.
2.
3.
In an accessible location near to the computer, in a fireproof safe in the same building, in another city.
13
Page 13 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 13
06/03/2013 07:38
Exam-Style Questions
6. Describe two differences between
RAM and ROM.
B 128 MB
C 1 TB
D 20Kb
(2 marks)
(1 mark)
TOP TIP
When you are asked to describe the differences
between two technologies, each point you make
should mention both technologies.
B 3
C 6
D 2
(1 mark)
A a hard disk
B RAM
(1 mark)
TOP TIP
Many people wrongly use the term memory
when referring to both the hard disk and main
memory. Try to avoid such misconceptions and
demonstrate you understand why they arise.
(1 mark)
C an optical disk
D flash memory
4. Which of the following is storage media?
A CD
B DVD drive
C a kilobyte
D printer
(1 mark)
14
Page 14 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 14
06/03/2013 07:38
Chapter 3: Software
You need to know:
Software is the computer programs that control the computer.
Applications software includes:
Control software.
Educational software.
Operating System (OS) software controls the computer so that applications software can run. The OS provides a
user interface, handles files and provides system software tools.
Software is copyrighted. It is illegal to use it without a software licence.
documents that include text and pictures. You can edit the text, change
the font and size, check your spelling and grammar, print, and save and
retrieve documents.
Chapter 3: Software
Applications software
the timelines of all the tasks that have to be done to complete a project,
e.g. when constructing a building. Timelines are displayed in a Gantt
chart.
15
Page 15 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 15
06/03/2013 07:38
Using web browser software, e.g. Mozilla Firefox, you can access websites by entering their web address
or URL (uniform resource locator) or clicking on hyperlinks.
Using a search engine, e.g. Google, you can search the Web by entering keywords.
Email is accessed using:
an email client running on your own computer, e.g. Microsoft Outlook.
webmail, that is, email accessed using a web browser.
Web authoring software, e.g. Adobe Dreamweaver, is used to create and update websites. A website is a
structured collection of web pages written in HTML (Hypertext Markup Language).
Graphics software, e.g. Adobe Photoshop, is used to create and retouch, crop and resize images.
Video editing software, e.g. Microsoft Movie Maker, is used to edit videos imported from digital cameras
and camcorders. You can insert titles, transitions, voiceovers and sound effects, and save the video in
different formats, e.g. mp4.
Audio editing software, e.g. Audacity, is used to create and edit music and sounds. You can record live
music and input digital sound files, insert voiceovers, and change pitch and tempo.
Chapter 3: Software
Control software
Control software is used to monitor and control external devices, e.g. robots, and ICT systems, for purposes
such as air conditioning in large buildings. Computers do this using sensors and actuators. Sensors are
devices that can measure variables such as pressure, temperature and humidity. Actuators make changes
under the control of the computer some examples are motors, pumps and heaters.
Educational software
A wide range of educational software supports teaching and learning, e.g. StarFrench helps you learn
French, and SpexClassic helps with teaching design and technology.
Providing a user interface so that you can interact with the computer.
File handling. File-handling software, e.g. Windows Explorer, enables you to format disks, create new files
and folders, and rename, save, open, delete and copy them.
16
Page 16 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 16
06/03/2013 07:38
An OS also includes system software tools (or utility programs) to help you maintain your computer, e.g.
a disk defragmenter. A file saved on a hard disk can become fragmented with different parts saved in
different places. A disk defragmenter will reassemble all the different parts to speed up access.
User interfaces
An OS can have a:
Chapter 3: Software
Open (activate) a process, e.g. by pointing at an icon and double-clicking the left-hand mouse button.
Move an icon, e.g.by pointing at an icon, holding down the left button, dragging it to the required
location and releasing the button.
Window size and position can be adjusted, e.g. drag the bottom right-hand corner of a window to
change its size and drag the title bar to move it around the screen. The minimize button removes the
window from the screen but does not close it; the maximize button makes the window occupy the whole
screen.
Page 17 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 17
06/03/2013 07:38
File handling
A filename has two parts: the name identifies the file and the extension identifies the type of file, e.g.
study.xls has the name study and the extension xls which means it is an Excel spreadsheet.
Files are grouped into folders. The route to a file is called its path, e.g. C:\Users\Documents\chapter3.
doc. This means that on the hard disk C: in the folder Users, in the sub-folder Documents there is a
file named chapter3 which is a word processor file.
TOP TIP
Do not format the hard disk
in your computer as this will
delete all the files on it.
In Windows Explorer, to move or copy a file, select the file, drag it over
another folder and drop it. To delete a file, right-click on the filename
and select Delete.
You can set the properties of a file, e.g. read-only. A read-only file can
only be opened but cannot be altered.
Software licensing
Software is copyrighted. It is illegal to use it without a software licence. Types of license are:
Chapter 3: Software
code.
Open source. Licences are free and you have access to the source code and are allowed to modify it.
Shareware is licensed software that is initially free to try out. However, you must pay for a licence if you
decide to make regular use of it.
Creative Commons licences help software producers communicate the rights they keep for themselves
and the rights they give to others.
Worked Example
Steven has application software installed on his computer.
a)
b)
Name one type of software that must be installed to run the applications.
c)
Steven buys a computer game that includes a software licence. Explain why Steven needs a software licence.
d)
Access to the software on Stevens hard disk becomes very slow. What could Steven do to speed up access?
Answers
a)
b)
Operating system.
c)
It would be illegal to play the game without a license that allows this. The license will tell Steven what use
he can make of the software, e.g. he can only install it on one computer and make one back up.
d)
18
Page 18 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 18
06/03/2013 07:38
Exam-Style Questions
1. What type of software is used to prepare a talk to
be given to a large audience?
C Email
A Spreadsheet
(1 mark)
C forwarding
(1 mark)
B word processing
C video editing
D web authoring
(1 mark)
B attaching
D replying.
C licensed software
(1 mark)
TOP TIP
When you are asked to describe a process, make
sure each step in the process is in the right order
and clearly described.
(1 mark)
Chapter 3: Software
D Presentation
19
Page 19 of 40
M01_ICT_REV_IGCSE_5791_M01.indd 19
06/03/2013 07:38
Networks
A network is two or more connected computers that can share resources and communicate.
Connects computers across a small to medium-sized geographical area, e.g. an office, school or campus.
Shares resources, e.g. hardware and data.
Enables communication between computers connected to it, e.g. using instant messaging.
Is administered centrally.
Most LANs are client/server networks. Client computers (or network stations) are the computers
connected to the network. Clients communicate with each other through the server. The server has a faster
processor, more RAM and more backing storage than client computers. A large LAN may have several
servers. For instance, a file server may look after the organisation of the files on the network; a database
server hosts a database management system and a database on the network.
A peer-to-peer LAN does not use a server. Every computer communicates directly with the other
computers on the network. Because of performance limitations, it is limited to small networks of fewer than
10 computers.
55
Page 20 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 55
05/03/2013 13:15
Advantages
The cost of software licences could be less as they may only be needed for the average number of concurrent
users, not for every computer.
Shared hardware can be better quality at a lower cost per user, e.g. a network printer.
Shared data allows more effective collaborative working, e.g. users can work on a single shared document.
Users access rights can be administered centrally, e.g. the marketing staff can access their own files, but not the
files of the human resources staff.
The network can be maintained from any network station, e.g. if a password has been forgotten, it can be reset.
Security can be administered centrally, e.g. automatic backups and virus protection.
Disadvantages
The initial set-up costs can be higher because a server and network cabling are needed.
Viruses are more easily spread across networks.
Routers which enable several computers to communicate at the same time through a wireless access
point.
WLANs are slower than cabled LANs and are used where it is impractical to
use a cabled LAN, e.g. in the home. The range of a WLAN can be limited,
e.g. because of impenetrable walls. The range can be extended using a more
up-to-date wireless router or a wireless signal booster.
TOP TIP
Encryption is encoding data so
that it cannot be understood
by someone who does not
have the encryption key.
Bluetooth
Bluetooth is a form of wireless
communication designed to
enable devices that are within 10
meters of each other, e.g. a laptop
and a smartphone, to
communicate. Data is transferred
at a rate of 720 Kbps.
Page 21 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 56
05/03/2013 13:15
Communication links
LAN
LAN
LAN
LAN
Caribbean
United States
LAN
LAN
LAN
LAN
United Kingdom
Figure 9.2 A wide area network (WAN)
The Internet
The Internet consists of many linked but independently maintained and administered networks. Each
network on the Internet is responsible for formulating its own policies, procedures and rules.
To connect to the Internet using a PC, you need an Internet Service Provider (ISP). You also need a web
browser, email and other software that allows you to use the services and facilities available on the
Internet; and a modem (modulator/demodulator) which converts the digital signals from a computer into
analogue signals that can be transmitted over a telephone line.
Bandwidth is the volume of data that can be transmitted over a network connection.
Narrowband users dial up their ISP using a telephone. Data is transmitted at speeds up to 56 Kbps. This
is slow but inexpensive.
LAN
cable technology;
mobile telephone networks, e.g. 3G.
TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of
rules used on the Internet to define how computers communicate with each
other. It is a universal standard that enables hardware and different operating
systems to communicate.
TOP TIP
The Internet and the Web are
not the same. The Internet is
the network and the Web is
the multimedia services that
run on it.
57
Page 22 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 57
05/03/2013 13:15
Browser
A web browser, e.g. Google Chrome, is software that lets you access web pages stored on web servers and
download files, e.g. programs and video.
Figure 9.3 A web page accessed using the Microsoft Internet Explorer browser
www.edexcel.com
/quals/Pages/
On the web server, the file that will be displayed is in the directory called quals in a
subdirectory called Pages.
default.aspx
The file is called default. The extension indicates the type of file. Here, .aspx indicates that it is
a .NET Web form.
58
Page 23 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 58
05/03/2013 13:15
hyperlinks.
Access information and join discussions, e.g. using newsgroups and forums.
Watch TV and listen to the radio.
Access customer support, e.g. FAQs or download a service guide for a printer.
Build your own website.
Finding information on the Web
You can search for and access information by:
Surfing: navigate by clicking on hyperlinks, enter a web address or use a search engine.
Using a directory, e.g. Yahoo! Directory shows a list of broad categories available, e.g. Arts and
Humanities, broken down into subcategories. When you select a category, a list of subcategories is
displayed. You select deeper and deeper until you find the information you want.
You can:
Using a search engine, e.g. www.google.co.uk. Type in the address or use the search facilities built into
the browser, then enter keywords.
Using a web bot. Bot is short for robot, and a web bot is software that can run automatically on the Web
for searching and alerting you to items of interest.
Intranet
An intranet is a local version of the Internet used within an organisation. Intranets provide many of the
services available over the Internet, e.g. email, chat, websites and search, but only for authorised users
within the organisation.
If an organisation has an intranet and allows secure access by people working off site, e.g. at home, it is
referred to as an extranet.
A VPN (Virtual Private Network) is a private, secure connection that runs across the Internet. Its purpose is similar
to an extranet but network traffic will be encrypted and Internet protocols such as TCP/IP may not be used. It can be
thought of as a separate pipe inside the Internet.
59
Page 24 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 59
05/03/2013 13:15
Sending email is free (provided you already have the hardware and software and Internet access), is much
faster than mail delivered by post, and you can send as many emails as you like at any time.
To access your email, you can use:
Webmail, e.g Hotmail. This runs within a browser and you log on to a website to retrieve your email.
Access to email is slower than using an email client and there is a more restricted range of features,
An email client, e.g. Microsoft Outlook, is software that runs on your computer and enables you to send
and receive email. An email client tends to run more quickly than webmail and it will have a wider range
of customisable options, but it has to be installed and can be more complex to use.
Sending email
To create a new email message in Microsoft Outlook, with the Inbox open on screen, click on the New
button in the toolbar.
In the To... field, enter the email address of the person you are sending it to, or click on the To... field and
select an address from the Contacts.
In the Cc... field, enter the addresses of people the email will be copied to.
If you want to send a copy of the email to someone and want to hide this from the other recipients, enter
their email address in the Bcc... field.
In the Subject field, enter a phrase that describes what your email is about.
Enter your message.
Attach any files to be sent with the email, e.g. a spreadsheet file.
Press Send and your email is placed in the Outbox.
If you have a permanent connection to the Internet, the message will automatically be sent. Otherwise
click on the Send/Receive button in the toolbar.
Page 25 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 60
05/03/2013 13:15
Online shopping
You can order goods online and pay for them using a credit or debit card. The goods are delivered by post to
the address you specify.
Online shopping can be convenient:
Internet banking
Many bank accounts can be accessed over the Internet. You do not need to visit a branch and some banks
have no branches, e.g. First Direct. Internet banking can have lower charges because the cost to the bank of
providing the service is much less.
A mailing list uses email. Members send and receive messages from the list. Not all groups are open to
everyone.
61
Page 26 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 61
05/03/2013 13:15
A subscriber to a newsgroup logs on and posts a message. When other subscribers log on, they can read
the message and reply. A subscriber can look at a thread of related messages.
A chatroom is a group of people communicating with one another interactively in real time. Some
chatrooms discuss specific topics, but many chatrooms cover a range of subjects.
Instant messaging enables you to chat privately with another person. Messages are sent immediately.
Video conferencing
Video conferencing enables users to see and speak to each other at a distance, e.g. using Skype. It can be
one to one or involve several people communicating at the same time. Video camera systems can be simple
webcams or may be able to zoom in and out. The display could be on one or more monitors or a large screen.
Web 2.0
Web 2.0 describes a trend towards collaboration and sharing between web users. These web services are
associated with Web 2.0:
Social networking where you can interact with a circle of friends, those with similar interests or a
wider community, e.g. Facebook.
YouTube enables members to upload videos and allows anyone to view and comment on them.
Worldisround encourages world travellers to upload and share pictures and add commentary to make a
record of their experiences for friends and family at home.
iTunes and Spotify sell digital music which can be downloaded. Users can organise and browse their
music collections.
Blogs are online diaries with narrative, pictures and hyperlinks. Anyone can set up a blog on almost any
topic, e.g. hollywoodlife.com is a celebrity news blog.
Wikis enable you to describe and comment on topics in collaboration with other web users, e.g.
Wikipedia is an online encyclopedia. Anyone can contribute but this is moderated so that what is
available is often written by experts.
Internet security
There are many threats from the Internet.
Threat
Protection
62
Page 27 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 62
05/03/2013 13:15
Threat
Protection
63
Page 28 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 63
05/03/2013 13:15
27 March 2013
Brintons Bank plc and Brintons Bank Scotland plc are authorised and
regulated by the Financial Services Authority and signatories to the
Banking Codes. FSA authorization can be checked on the FSAs Register at
www.fsa.gov.uk/register. Brintons Bank plc and Brintons Bank Scotland
plc are members of the Financial Services Compensation Scheme and the
Financial Ombudsman Service. Brintons Bank plc.
What you see on the Web is not always what it seems. To be safe and sure that information is reliable, you should
always ask yourself:
Can I trust the source of the information?
Is the evidence from a primary source or are they reporting someone elses account?
Is the source sufficiently knowledgeable?
Is the information likely to be biased or unreliable in some way? Why?
Why am I being asked for personal information?
Will providing this information put me at risk?
Worked Example
Julie has a dog called Fido. At work she logs on to the
company network. Her password is Fido.
Answers
a)
a)
64
Page 29 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 64
05/03/2013 13:15
Exam-Style Questions
A client/server
B extranet
C WAN
D wireless LAN
(1 mark)
b)
B cookies
C filter software
D antivirus software
(1 mark)
TOP TIP
Describe two very different benefits.
b)
c)
(1 mark)
TOP TIP
Give examples to illustrate each point you make.
A sharing data
B viruses are spread more easily
C software licensing can be less expensive
D instant messaging
(1 mark)
65
Page 30 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 65
05/03/2013 13:15
ICT systems
Payroll
Every company or business has to pay its employees. An example of a payroll system is shown in Figure
12.1.
Employees each have their own swipe card and their unique employee number is recorded on it. The
Validation checks are made on all the data input and the validated data
is written to the unsorted transaction file. Data
that does not change every week is saved on the old
master file.
TOP TIP
Validation checks help ensure
that data is reasonable.
Employee
swipe cards
Validation
Errors
Unsorted
transaction file
Sort
Sorted
transaction file
Sorted old
master file
Payroll
program
Wage
slips
To employees
bank accounts
Sorted new
master file
77
Page 31 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 77
05/03/2013 13:15
Ticket
printer
Communication controller
Mainframe computer
Hot standby
Flight information
and booking program
Flight information
and booking file
Fingerprint of
flight information
and booking file
Data backup is provided by having two hard disks with the flight information and booking file saved on
both of them. Any changes made to one file are made to the other at the same time. This ensures the file is
available if one disk becomes faulty. This technique is known as disk mirroring.
An online booking system is a real-time processing system because the data input must be processed
before any further input and the output will influence further input.
TOP TIP
78
M02_ICT_REV_IGCSE_5791_M02.indd 78
Page 32 of 40
05/03/2013 13:15
Checkouts
Warehouse
Bar codes
Bar codes
Scanner
Scanner
POS terminal
Printed
receipt
Screen
Beeper
Product
information
file
Mainframe
computer
Daily sales
files
Modem
Sales
reports
Modem
Automatic
reordering
supermarkets warehouse,
thequantity delivered is entered at a terminal and added to the product
information file. If a maximum stock level is set for each product then the
quantity reordered can be adjusted so that this level is not exceeded when
new supplies arrive at the warehouse.
Other uses of a stock control system
Performance of staff can be monitored by checking the number of items
sold at each checkout.
Rate of sales can be used to increase stock of popular goods.
Pattern of sales can show what needs to be stocked at certain times of the
year.
Extent of theft from the supermarket can be calculated.
Figure 12.5 An ATM
Banking
ICT systems are used in banking in:
funds from one bank account to another. For example, it is used when
customers pay for goods with their debit or credit card. This process is
known as electronic funds transfer at point of sale (EFTPOS).
79
Page 33 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 79
05/03/2013 13:15
Computer-aided design (CAD) software is used to design products, buildings and parts. It provides sets
of standard components and basic design elements. Designs can be produced faster and changes to the
original design are easier because the full drawing doesnt need to be redone.
Computer-aided manufacture (CAM) is the use of a computer to control manufacture. CAM software
generates instructions for the control of CNC (Computerised Numerical Control) machines, e.g.
computerised lathes for turning and drilling.
CAD/CAM systems combine computer-aided design (CAD) and computer-aided manufacturing (CAM).
Engineers use CAD/CAM to create product designs, and then to control the manufacturing process so
products are more consistent.
Computer-aided engineering (CAE) systems analyse engineering designs produced by CAD systems,
and simulate a variety of conditions to see if the design actually works. CAE features are found in many
CAD packages.
Process control is the use of computers to monitor manufacturing processes and to take corrective
action to prevent malfunction; for example, ensuring the temperature is at the right level using sensors.
Robots can be used for assembling cars and welding and can perform physical tasks that could be
dangerous for humans. Robots can be programmed to do tasks using programming languages or using
teach and learn methods,
where the robot is
Projection screen
physically moved through
Projectors
the actions you want it to
do, and the computer
Cockpit
converts these into a
program, which enables
Trainee pilots seat
the task to be repeated.
Weather forecasting
Weather forecasts are based on data collected using weather stations, weather balloons and satellites:
Weather stations are groups of sensors that collect information about the current weather. They may
have sensors for wind speed and direction, air pressure, temperature and rainfall. The data that is logged
is collected on a computer over a network. As well as being used for forecasting, they can also help
councils and motorists plan for bad weather conditions.
80
Weather balloons have a more complex and varied set of instruments than weather stations.
Page 34 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 80
05/03/2013 13:15
Logistics
storage of goods and services between the point of origin and the point
of consumption in order to meet customer requirements.
Virtual learning environments (VLEs) help teachers teach and support students studies by providing
learning resources at all times where there is web access. VLEs enable resources to be organised and
shared easily, with digital drop boxes to store and submit students work, access to wikis, blogs and
podcasts, and information about grades so progress can be assessed.
Computer-assisted learning (CAL) software helps students learn. CAL provides immediate feedback;
enables students to recognise their weaknesses and improve; displays encouraging messages; and can be
accessed using a VLE. Drill and practice programs help students consolidate learning. Tutorial
software introduces and teaches new material to students. Simulations model real-life situations so the
software can be used in the classroom without risk or wastage.
School information and management systems (SIMS) are widely used to help with the day-to-day
running of schools. They can produce class lists, create timetables, provide automatic reporting, improve
communications quality, provide fast access to information and produce statistics and accounting
information automatically.
Logistics software is used to plan and control the effective delivery and
Libraries use ICT systems to: keep records of books that have been borrowed; provide online searchable
catalogues; provide access to electronic books; keep records of borrowers; and send reminders to
borrowers who have not returned books.
Law enforcement
The police use ICT systems to help fight crime. National databases help the police identify offenders.
Other uses of ICT by the police include: managing cases and preparing reports; analysing statistics;
tracking criminals who have been tagged; developing contacts with police worldwide; profiling of
potential criminals; and accessing information remotely through wireless network links on police cars.
Law firms use ICT to create legal document templates, find information about past judgements, and
obtain information about legislation in other countries.
81
Page 35 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 81
05/03/2013 13:15
Magnetic resonance imaging (MRI) and computer axial tomography (CAT) scanners produce
images that can be viewed in 3-D.
Medical expert systems analyse questions input by a practitioner and provide decision-making support
Chapter 12: Applications and effects of ICT
Using telemedicine, patients can visit a doctor online and doctors can treat their patients at a distance.
Entertainment and leisure
The Internet can be used to communicate with friends and family with webcams and video calls.
Computer games of all genres provide entertainment and can be used on a PC or on a games console.
Using media streaming, you can listen to music, watch TV and watch videos on desktop PCs and mobile
devices.
Personal performance during sport can be monitored by mobile devices using satellite navigation, and
recorded for later analysis.
Social impact
The widespread use of ICT has a significant impact on society, e.g. there is a digital divide because some
people have easy access to ICT while others do not.
Employment
Employment opportunities have changed:
There are fewer unskilled jobs, e.g. assembly lines with robots now assemble cars.
The skills needed for some jobs have changed, e.g. administrators previously used typewriters but
now use word processors. Workers in almost every industry at almost every level have experienced
changes in skill requirements.
Jobs have been created in the ICT industry, e.g. in programming, website design and manufacturing,
and jobs have been created indirectly, e.g. in video production.
How people do their jobs has changed, e.g. a teacher can have an entire class work through resources
on a VLE and provide much less input during the lesson, although considerably more planning and
preparation may be needed beforehand.
Teleworking is more common. Instead of going to the office, teleworkers can work from home and
82
communicate with the office online. They avoid the expense and time of commuting. However,
teleworkers can miss social interaction with colleagues, and being at home can be distracting. There is a
lack of access to the specialist facilities and advice available at work. Companies can employ teleworkers
who live a long way away, even in another country. Less floor space is needed at the office, and there is
Page 36 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 82
05/03/2013 13:15
reduced absence because telecommuters can work when the weather prevents travel. However, managers
may feel they do not have sufficient control over what workers are doing during working hours and
workers may not be available when the company tries to contact them.
Companies have improved global communications, both within their own organisations and with other
companies, to facilitate international trade. The use of online communication tools has minimised the
need for employees to travel overseas.
Privacy
Employees health can be affected by intense and prolonged computer use. Possible problems are:
Privacy refers to the right of individuals to determine what information is stored about them and how that
information is used. Problems arise because businesses, organisations and governments hold personal
information which is easily copied and transmitted across international networks.
Different countries have different regulations. In the UK, the Data Protection Acts (1984 and 1998) set
out principles for handling personal information. Data must be:
83
Page 37 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 83
05/03/2013 13:15
Computer crime
Computer crime is possible because of the widespread use of ICT. Such crime would not exist if ICT systems
were not used and could not be exploited for financial gain. It includes:
Software piracy which is the copying, downloading, use or sale of software without an appropriate
license.
Copyright violation which occurs when, e.g. music or pictures, are copied or downloaded without an
appropriate licence.
Criminal hackers who gain unauthorised access to an ICT system in order to steal, alter or destroy data,
e.g. they might steal money by transferring it from one bank account to another. Ethical hackers are
employed by an organisation to attempt to gain access to an organisations ICT systems in order to alert
them to vulnerabilities that can be exploited by criminal hackers.
Identity theft where someone pretends to be you in order to commit fraud, e.g. buy goods in your name.
Phishing attacks involve sending unsolicited emails inviting you to a response which involves entering
your username, password and other personal details, e.g. you receive an email which seems to be from
your bank asking you to use a hyperlink in the email to access your bank account. You click on the link
and are directed to a fake website and are asked to enter your bank account details. Criminals use these
details to steal money from your bank account. To avoid this type of scam, do not use the link in the
email.
Security
Security is important in ensuring privacy, data integrity and preventing computer crime.
Physical safeguards include:
are reduced, e.g. servers housed in a concrete underground bunker on top of a hill that is accessible only
through a well-guarded and narrow passage. Individual computers
should be clamped to desks; have burglar alarms in addition to those for
the building; and CCTV surveillance.
File access rights which allow access to particular files to those people
who need it and block others.
See Chapter 9 for software safeguards that prevent threats from the
Internet.
Page 38 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 84
05/03/2013 13:15
Individual responsibility
Be polite and reasonable. If you feel you are the victim of cyber bullying seek help. Dont bully others.
Use secure wireless networks wherever possible.
Worked Example
Virtual learning environments (VLEs) are widely used in education.
a)
b)
c)
Give two reasons why a teacher may prefer not to use a VLE in the
classroom.
TOP TIP
Make sure you discuss both
advantages AND disadvantages
if the question asks you to do
so.
How individuals use the Internet has considerable social impact. Behave sensibly to protect yourself and
others, as the openness and freedom of the Internet can be abused. You should:
Answers
a)
For students, there are many advantages of using a VLE. Two of these are:
Students can access learning resources on the VLE at any time, at home or at school.
Students can view their grade profile so they can see the progress they are making.
b)
For teachers, there are many advantages of using a VLE. Two of these are:
Learning resources are more organised and are more easily shared.
Students work submitted online can be marked and feedback given online.
c)
Teachers may prefer not to use a VLE in the classroom because e.g.:
There is not always adequate network access.
Some activities do not require electronic resources, e.g. sport.
85
Page 39 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 85
05/03/2013 13:15
Exam-Style Questions
1. Which security precaution would help protect you
from a virus attached to an email?
A The price
C The description
C virus scanner
D transaction log
(1 mark)
B CAD/CAM
(1 mark)
TOP TIP
Describe what ICT has made possible that
was not previously possible.
B mainframe
8. Lesley works on a checkout at a large supermarket.
C tablet
D laptop
(1 mark)
A Deposit cash
(1 mark)
86
Page 40 of 40
M02_ICT_REV_IGCSE_5791_M02.indd 86
05/03/2013 13:15