Caie Igcse Ict 0417 Theory v1
Caie Igcse Ict 0417 Theory v1
Caie Igcse Ict 0417 Theory v1
ORG
CAIE IGCSE
ICT (0417)
SUMMARIZED NOTES ON THE SYLLABUS
CAIE IGCSE ICT (0417)
CPU
Secondary/Backing Storage
Processing done by central processing unit
Three main components: Stores data/information & programs not being used at
Control unit - coordinates input and output devices current time
and carries
out program instructions Backing store device = reader or recorder
Arithmetic and Logical Unit (ALU) - performs Example: Hard disk drive
calculations and
logical comparison: A < B? Backing store media = hardware containing data
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Older encryption is based on mathematics, but this new Training surgeons by allowing them to operate on
tech uses
physics virtual
patients
Makes it much more complex to decrypt Playing games and enhance the level of immersion
Impacts on everyday life: General VR equipment:
Completely secure voting ensuring that votes cannot Eye goggles that produce 3D images to develop the
be tampered
with or changed artificial
environment
Completely secure communication eliminating the Special gloves or controllers to perform precise
risk of being
read/heard by the wrong eyes/ears actions inside
the simulation
Completely secure bank transactions so money goes Headphones to control what is heard in the virtual
exactly where
it is intended world
Completely secure personal information preventing Powerful computer to run the entire VR system in real
hackers access
to intrusive details about a person time
Impacts on everyday life:
Improved medical surgeons/soldiers
Computer Assisted Translation (CAT) Stronger buildings
Treatment of phobias as certain situations can be
When human translators use computer software to help treated using
simulations
in the
translation process More realistic education as students can learn in a
Can reduce translation time more
interactive environment
May not be 100% accurate
Common CAT tools:
Spell checkers 2. Input & Output Devices
Translation memory software
Language search-engine software
Impacts on everyday life: 2.1. Input Devices & their Uses
More accurate documents since most software can
automatically
detect errors Keyboards
More multilingual society since anyone with an
internet
connection can now essentially learn multiple
languages using
translators
Quicker translations
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
A numeric keypad is used to enter numbers only The pointer is controlled by the user moving their finger
Although some have function key to allow input of on the
touchpad
alphabetical
characters Uses
Uses Used for opening, closing and minimising software
Used in Automatic teller machines (ATMs), where Used for grouping, moving and deleting files
customers can
key in their personal identification Useful when editing images (e.g. controlling the size
number (PIN), or an amount
of money and
position of the image)
Used to key in phone numbers into telephones Used for controlling the position of a pointer on the
Electronic point of sale (EPOS) terminals have numeric screen to
allow:
keypads
in case the barcode reader fails Selection from a menu
Used in Chip and PIN devices to key in PIN, or amount Selecting an icon
of money Advantages
Used to enable fast entry of numeric data into a Faster to select an option by a touchpad than a
spread sheet keyboard
Advantages Enables rapid navigation through applications and the
Numeric keypads are faster than standard keyboards internet
for entry of
numeric data Since the touchpad is integrated into laptop
Since many are small devices (e.g. mobile phones), computer, there is
no separate mouse, aiding
they are easy
to carry around portability
Disadvantages They can be used when no flat surfaces are available
Can be difficult to use due to the very small keys Disadvantages
Difficult to use for entering text People with limited hand/wrist movement can find
Sometimes the order of numbers isn’t very intuitive touchpads hard
to use
It can be more difficult to control the pointer when
compared to
a mouse
Mouse They are more difficult when doing operations such as
‘drag and
drop’
An example of a pointing device
The ball underneath the mouse is used to detect
movement Tracker Ball
The left button is for selecting by double on it and the
right is to
bring drop-down menus
There is usually a scroll button which speeds up the
process of
moving through a document
Uses
Used for opening, closing and minimising software Tracker ball is like a mouse except that it has a ball on the
Used for grouping, moving and deleting files top of
the device
Useful when editing images (e.g. controlling the size Users control the pointer on the screen by rotating the
and
position of the image) ball
Used for controlling the position of a pointer on the Uses
screen to
allow: Have the same pointing/cursor control capability as a
Selection from a menu mouse
Selecting an icon Used in applications where the user has a disability
Scrolling up/down and right/left (RSI)
Advantages Used in a control room environment, where it is faster
Faster to select an option by a mouse than a keyboard than a
mouse to navigate through process screens
Enables rapid navigation through applications and the and more robust than a
mouse
internet Advantages
Mice are small and don’t take much area Tracker balls don’t need the same fine control as a
Disadvantages mouse
People with restricted hand/wrist movement can find People with limited hand/wrist movement find easier
it hard to
operate a mouse to use than
a mouse
Easily damaged and can easily be clogged up with dirt The pointer can be positioned more accurately on the
They are hard to use if there is no flat surface screen than
with a mouse
available They take less desk space than mice since they are
stationary
Disadvantages
Touchpad Tracker balls are not supplied with the computer as
standard, so
they are more expensive
Touchpads are used in many laptop computers as a User may need training since they are not standard
pointing device equipment
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The memory card can store several hundred Type of sensor Applications
photographs Automatic washing machines,
Disadvantages Temperature central heating systems, automatic
The camera user needs to be computer literate to use green houses, ovens
the camera
properly
Burglar alarm systems, robotics,
There is some artistry lost since clever software
Pressure environmental monitoring,
corrects
errors in the photographs
Automatic washing machines
The resolution is not yet as good as traditional
cameras Automatic doors, street lighting
Images often need to be compressed to reduce the Light control, Burglar alarm systems,
amount of
memory used automatic greenhouses
It is possible to fill up computer memory very quickly Burglar alarm systems, monitoring
Sound
with
several photos of the same subject (to find the liquid and powder flow in pipes
perfect snap
shot) Automatic greenhouses,
Humidity/moisture environmental monitoring, factories
where moisture levels are crucial
Video Camera Automatic greenhouse, chemical
pH processes, environmental
DV (digital video) camera store compressed photo frames
monitoring
at 25 MB/s – motion jpeg.
Light turned into electronic signal through light sensitive
Advantages
sensors and automatically converted to a digital file
Readings by sensors are more accurate than taken by
format.
humans
Advantages
Readings are continuous, there is no break in
Easy to edit footage in a video editing.
monitoring
High quality video captured, therefore
Because it is a continuous process any necessary
Disadvantages
action or
warning will be initiated immediately
Storage medium (Memory cards) more expensive to
The system can be automatic, removing the need for
buy than films.
human
intervention, this is particularly important if
the process is
hazardous
Microphone Disadvantages
Faulty sensors can give spurious results
Graphic Tablet
Sensors
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Used to process cheques in banking operations – It is still not a very accurate technique
cheque is read
using a batch processing method
Advantages
MICR offers great security than OCR since the
oriented
characters cannot be altered Barcode readers
There is no manual input, thus errors are reduced
If somebody writes over the magnetic ink characters,
it can
still be read
Disadvantages
Only certain characters can be read, and the number
of different
characters is very limited
It is a more expensive method than other methods Used to read information in the form of a barcode
used for direct
data entry Handheld scanners or wands are very common for
reading barcodes
Optical Mark Reader Uses
Used in supermarkets and other shops where the
goods are marked
with a barcode
Used in libraries to scan user’s library card and
barcodes on
books (to keep track of books on loan)
Used as a safety function in many companies to
Optical mark recognition is a system which can read
ensure that
electrical equipment is checked on a
marks written in
pen or pencil
regular basis
Uses
Advantages
OMR devices are used to read questionnaires,
Faster than keying in information, and fewer mistakes
multiple choice
examinations papers and other types
are made
of forms in the form of
lines or shaded areas
Used as a way of recording data, can improve safety
Advantages
Barcodes enable automatic stock control
A very fast way of inputting results of a survey
Barcode scanning is a tried and trusted technology
Since there is no typing, it is more accurate than
When an item price is changed, only the central
keying in
data
database needs
to be updated, there is no need to
OMR is more accurate than OCR
change the prices
individually on each item
Disadvantages
Disadvantages
Forms need to be carefully designed to make sure
Barcode scanning is an expensive system to
that the
marks/shadings are correctly positioned to
administer since
every item in the shops needs a
gather accurate
information
barcode and every barcode needs
to be entered on
There can be problems if forms aren’t filled correctly,
the system
sometimes they must be checked manually before
Also, there is a need to invest in the computer
being read by an
OMR, this is both time consuming
technology
together with staff training, which can all
and expensive
be expensive
The system is not fool proof- barcode can be swapped
around on
items
Optical Character Reader
Optical Character recognition is a software that takes Cathode Ray Tube monitors
scanned text
and converts it into a computer readable Least expensive type of monitor, becoming rarer as TFT
form monitors take
over
Uses Come in various sizes
Processing of passports and Identity cards Picture created is made up of tiny dots (red green or
OCR is used when scanning documents to modify blue), the
intensity of the colour of the dot determines
them using a
suitable software the colour perceived
by the eye
Advantages Uses
Much faster data entry system than manually keying Primary output device for computers, user can
in data immediately see
what they are typing in
Since there is no manual data entry, the number of Used with light pens to allow designs to be created on
errors is
reduced screen
Disadvantages Advantages
The system has difficulty reading handwriting Produce higher quality images than TFT monitors
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
IPS/LCD Monitor
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Disadvantages Advantages
Very noisy – not good in an office environment Save a lot of money, other methods of making
Cost more than an inkjet printer to buy prototypes are very
time consuming and expensive
Very slow The powders used can often be ground up and
Printing is of poor quality reused
Physical scale models are produced with working
parts, which
gives a better idea of how the product
Wide Format Printer will look
Disadvantages
Expensive to buy
Slow at producing their output
Product is sometimes a little rough, often further
work needs to
be done
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Supports reading/writing data & maintains stored data in Has a finite life in terms of the number of times they
a permanent
state even without power can be read from/written to.
Functions much like a hard drive but different tech
Built with an array of semiconductors that form its
memory and
operated using an integrated circuit 4. Networks & the Effects of
Uses
Used to store operating systems and working data Using them
Used for storing application software
Used in file servers for computer networks
Advantages
4.1. Routers
Faster than hard disks because they do not need to
A device that enables data to be sent between different
‘spin up’ the
disk
Robust because no mechanical parts types of
networks
Read performance is fast even when data fragmented Commonly used to connect computers and other
network capable devices
to the internet
Less susceptible to data loss
Lighter, quieter and require less power than hard They can be connected to through cables or wirelessly
disks
Disadvantages
Function
More expensive than hard disks
Have a smaller capacity than modern hard disks
Makes decisions on messages being passed between the
Lower number of write cycles causing performance to
networks
diminish
over time
Reads information about the message and decides where
the message
should go and the best route for it to get
there
Flash Drives/Memory Sticks
Formats the messages making it suitable for the new
Otherwise called pen drive/memory stick/USB stick network
Can store several GBs of data and use solid state
technology
How it Works
Connected to a computer through USB port and power to
operate drawn
from host computer
To send data to a specific device, a router needs a
Some expensive software increasingly uses these storage
something like
an address
methods as a
form of security
Internet Protocol Address: a unique number assigned to
Uses
all
computers and devices connected to the internet
Used to transport files between computers
which can determine
its exact physical location
Used as a security device – a dongle – to prevent
A router can use this IP to send data from the internet to
software
piracy
the exact
device that requested it
Advantages
Storing IP Addresses:
Very compact and portable media
Routers store IP addresses in a routing table
Very robust
Routing tables list all the different routes to other
Disadvantages
networks
Not possible to write protect the data and files
Routing table determines best route for data
Small physical size and are easy to lose.
Lower storage capacity than hard disk
Sending Data between Devices
Flash Memory Cards Routers can also send ‘packets’ of data between devices
on different
networks
A form of electrically erasable programmable read only
Each packet contains the data itself and the IP address of
memory (EEPROM)
the
device being sent to
Uses
Occurs globally using multiple routers & re-routing until
Used to store photos on digital cameras
the data
reaches its intended IP address
Mobile phones use them as memory cards
Used in MP3 players to store music
Used as a backup in hand held devices 4.2. Common Network Devices
Advantages
Very compact Network Interface Cards
Very robust
Disadvantages Used to connect individual computers/devices to a
Very expensive per Gb of memory when compared to network
hard drive disks NICs come in two distinct types:
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Retrieves web pages and passes them onto the computer File Sharing
that made a
request Entertainment
Stores any page retrieved on the server, which means Video Conferencing
that when a
different computer requests the same page it Online Banking
would be available Advertising & Blogging
Speeds up the browsing process Social Media
Websites Intranet
Web is made up of millions of websites and web pages Like the internet but only accessible to specific users
Web pages are documents on a computer screen Basically, a private internet where outsiders cannot
containing various
multimedia and text, pictures connect to it
A website consists of many of these pages linked together Uses of an Intranet:
Web Browsing
Email
Uniform Resource Locator (URL) File Sharing
Schools: share information and learning resources
Web browsers use URLs to retrieve files with students
They are multiple ways of locating on the internet Businesses: share private information within a large
Standard form: 4 numbers e.g. 194.106.220.19 company
securely
Alphanumeric form:
protcol://web address/path/filename
Where; Protocol is usually http Comparing Internet & Intranet
Site address consists of: computer name, domain
name, domain
type, and country code Internet Intranet
Path is the web page Phrase Internal Restricted
Filename is the item on the page International Network
Origin Access Network
Purpose Globally share data Privately share data
4.6. Email Specific company or
Audience Wide range of people
organisation
A method for sending text and attachments from one
Anywhere if you are Only from within the
computer to
another over a network Access
connected company
Advantages
Speed of sending and receiving replies is quick
Low cost (no stamps, paper etc.)
Not needing to leave home to send the mail Local Area Networks (LAN)
Disadvantages
Possibility of virus threats and hacking Not over a large geographical area (e.g. in one building)
Typical LAN will consist of several computers and devices
Need for the email address to be correct
Inability to send bulky objects via emails Devices and computers will be connected to hubs or
switches
One of the hubs or switches will usually be connected to
4.7. Internet Service Provider (ISP) a
router/modem to allow LAN to connect to the internet
In doing so it then becomes part of a wide area network
These are companies that provide users with access to Advantages
the internet The sharing of resources
Provider in return for these services is charged a monthly Communication between users
or annual
fee Network administrator can control and monitor all
After paying this fee, a username and password are aspects of the
network
issued which can
be used to connect to the internet Disadvantages
Easier spread of viruses throughout the whole
4.8. Common Network Environments network
Development of printer queues
Slower access to external networks e.g. internet
Internet
Increased security risk
A worldwide collection of networks and computers that If main server breaks down, usually the networks will
have joined
together no longer
function
Uses of the Internet:
Web Browsing
Email
Wireless LANs (WLANs)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Advantages Disadvantages
4.9. Using Different Types of Computers Smallest most portable of all Websites are often not fully
to Access the Internet devices displayed
People more likely to carry Small screen size makes
LAPTOP COMPUTERS this wherever they go viewing websites difficult
Much easier to connect to Small keyboards make it
Advantages Disadvantages internet on-the-go difficult to type
More portable than desktops Allow children access to
Less portable than
can access internet in more internet anywhere; can be
tablets/smartphones
locations dangerous
Larger screen than tablets & Screens not as large as
smartphones which allows desktop PCs may not appear
4.10. Network Security Issues
easier reading as clearly
Keyboards are bigger than Connection to a network exposes a user to:
CPUs are not as powerful as
those on Hacking: Unauthorised access
given to computer.
those in desktops
tablets/smartphones Phishing: Phishing involves
getting sensitive
Touchpads allows easy information such as usernames, passwords, and
navigation even on slanted credit card detail, for malicious reasons, by mimicking
surfaces a
reliable webpage on the network
Pharming: Explained in chapter 8 card 2 (E-Safety)
DESKTOP COMPUTERS Viruses: Explained in chapter 8 card 2 (E-Safety)
Advantages Disadvantages
Policing the Internet
Most websites are designed Not portable so are limited to
to be viewed on a desktop use in one room
Currently, the internet has no boundaries
Anything and everything can be put online
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Spyware is software that gathers user information compares the pattern in the iris of a user to a database of
through their
network connections without them being stored iris
patterns, if it finds a match, the user is
aware that this is happening authenticated. Iris scans are
generally more accurate than
Once spyware is installed, it monitors all key presses and retinal scans.
transmits
the information back to the person who sent
out the spyware Face Recognition: Verifies the face of
This software can install other spyware software, read
the person attempting to access the data using a face
cookies and
personal information, and change the default
recognition
algorithm and identifies facial features by
home page or web
browser
extracting landmarks, or
features, from an image of the
Anti-spyware can be used to search out this software and
subject's face.
correct the
corruption
Fingerprint Scanning: Scans the pattern
Weak & Strong Passwords on fingers and verifies it against a stored database of
authenticated
fingerprints using pattern-matching software
Strong passwords: A random mix of alphabets (uppercase to allow access to a
user.
and
lowercase), numbers, and keyboard symbols (@, %, ^
etc.)
Weak passwords: Easy to guess, e.g. users name or date
4.13. Data Protection Act
of birth or
1234556, etc.
Failure to abide to rules can lead to fines or
Frequent password changes can help reduce the chances
imprisonment
of password
interception too
Passwords must not be shared; their strength is then of
little use.
Rules (SAREF DES SAS)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Fax Email
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Manufacturing - robots have taken over many tasks Repetitive Strain Injury (RSI)
and are much
faster
Computer controlled warehouses – automatic, does This is when joints such as the shoulder, wrist or fingers
not need people swell,
causing pain
Labour intensive work - printing industry and filing Damage gets worse if left untreated
New jobs have been created in ICT Can lead to hand/arm immobility
Writing software
Maintenance of robots Causes Prevention
Internet related jobs Typing for extended periods
Take periodic breaks
of time
Effects on People:
Use ergonomic keyboard &
Typing with incorrect posture
People need to be retrained due to new technology mouse
Cleaner working environment Clicking on mouse
Use a wrist rest
De-skilling of workforce rapidly/extendedly
Computers can now do tasks that required high skill level Ensure sufficient space for
Safer working environment Holding mouse incorrectly
comfortable work
Fewer manual tasks such as heavy lifting
Working in a cramped space
Effect on Companies:
Back Problems
Can employ less people
Robots do not take holiday, get sick or need breaks Headaches are a potential consequence
Greater consistency in products made
Causes Prevention
5.2. Effects of IT on Working Patterns Not sitting upright while
Take periodic breaks
working
Part-time working: A contract where someone works Use adjustable chairs with
Sitting with poor posture
fewer hours
per week than a full-time employee, in shifts. good back support
Flexible working (flexi-time): Workers can choose their Working in a cramped space Sit upright with good posture
working
time but will have to complete the day’s work. Incorrect computer screen
Job sharing: Two or more part-time workers divide their Keep feet flat on floor
positioning
job,
replacing one full-time worker.
Compressed hours: Employees can work longer hours per
Eye Problems
day but
over fewer days, completing the workload
sooner.
Headaches are a potential consequence
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The recipients have a permanent copy Music notes are automatically printed out in the correct
Disadvantages format
Requires distribution
There are no special effects; sound/video/animation
There are printing costs; paper/ink
Cartoons
Animations can be produced using computer hardware
Websites and software
With 3D animations objects are designed on a computer
Collection of webpages, text, graphics, video and sound and a 3D
skeleton is produced
Hosted on a web server on the internet Parts of the skeleton are moved by the animator using
Need to write code or use a web authoring application key frames
Hyperlinks to other pages can be added The difference in appearance of the skeleton in these key
Interactive websites require programming knowledge frames is
automatically calculated by the software and is
Can use a camera, scanner, microphone to input data known as tweening or
morphing
Usually hire space from web hosting company The final stage is to make a realistic image by a technique
Advantages known as
rendering
Ability to add sound/video/animation
Links to other websites/hyperlinks
The use of hot spots
Buttons to navigate/move around the website Flyers & Posters
Hit counters to see who has visited the websites
Disadvantages A Word processor/Desktop publisher is used to create it
Can be hacked and modified or viruses introduced Need to hold minimum amount of information and be
Need for a computer and internet connection accessible very
quickly
Lack of portability compared with paper-based system Need to make an immediate impact when people look at
Need to maintain website once it is set up them
Anyone can produce them but there are highly skilled
professionals
who can produce expert posters
Some posters require larger printers than A4
Multimedia Presentations Sequence in which a flier or poster is produced on a
computer system
Uses a mixture of media to present information: A word processor or DTP application is opened
animations, video,
sound, transitions, hyperlinks The user creates frames, boxes and text boxes
Produced using software packages If necessary, photos are taken, using a camera
Used with a projector so large audience can view The images are uploaded from the camera, loaded
Advantages from a CD/DVD,
scanned from hard-copy photos or
Use of sound and animation/video effects downloaded from the internet
Interactive/hyperlinks built into presentations The photos are saved to a file
More likely to hold audience’s attention The photos are imported or copied and pasted into
Disadvantages the document
Need for special equipment – expensive The photos are edited and typed in or imported from
May require internet access a file and
then put into required style
Music samplers and mixers allow original tracks that were Wireless devices that allow users to make phone calls
recorded
in a studio to be modified from anywhere
with cell reception
Electronic instruments can play back through electronic They connect to the telephone system using radio signals
effects
machines This requires them to be in range of a mobile tower
Synthesizers combine simple wave forms to produce Used for communication via
complex music
creations Phone calls
Electronic organs can mimic any other instrument Text messaging
Music scores can be generated from music itself using Social Media
software
Software can automatically correct music notes in a score
There is no need to understand music notation to write a
music score Internet Telephony/VOIP
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
VOIP (Voice over internet protocol) is a method used to Are you asking for sensitive information?
talk to
people over internet People may not feel comfortable being truthful
VOIP converts sound (picked up by a microphone) into What names do you want?
discrete
digital packets that can be sent to a destination First name, family name etc.
via the internet Date of Birth
What format do you want it in?
Give instructions about how to answer questions
How will the data be collected?
Publicity & Corporate Image Paper surveys are scanned using OMR or OCR
Advantages
Publications Faster to get results
Fewer errors
Business Cards:
It is easier to do statistical analysis
Miniature printed documents that provide
Less expensive to carry out; requires fewer people
information about the
business/organisation
Online questionnaires
Usually printed on thick cards
Usually use radio buttons
Easily distributable to potential clients
No data preparation needed
Information includes company logo, services, address,
Results sent directly to database for analysis
contact
numbers, email, website
Gives a professional impression
Letterheads:
Found at the top of official printed documents to be Address Lists
mailed to
clients or for internal use
Makes it clear to reader who the sender is An address book on a computer or mobile phone might have
Information includes company logo, name, address, a contact’s
home address, phone number, email address,
contact
numbers personal information like the
date of birth etc.
Gives a professional impression
Easy to reply to
Flyers:
Generally printed on single sheets of A4 paper
Handed out directly to people for promotions
Cheap to produce and easily distributable (locally)
Information includes company logo, promoted
product or service,
contact details Clubs & Society Records
Makes it easier to target a specific audience
Brochures: Need to keep a record on members usually in a database
Also called leaflets & are like flyers Usually payment details, contact details and interests
Difference is that they are often folded into sections It makes it easy to match people with interests and send
Left on counters for pick up rather than handed out information
about what they are interested in
Information includes company logo, promoted This can be done my using mail merging
product or service,
contact details Easy to check memberships and send out reminders
Makes it easier to target a specific audience It is important to follow the data protection act
6.2. Data Handling Applications
School Reports
Surveys
Database applications such as SIMS store large amounts
All data handling starts with data collection of data which
can be used to create annual and termly
Data capture forms can be used for many applications
school reports
Decide what needs to be collected and then what Things able to be gathered from here are:
questions should
be used to collect it Data individual to student – tests/exam results
Paper or electronically Student progress – target grades being met or not
Rules for creating forms Number of absences – create a percentage of amount
Make them look official of days
attended school
Spaces should be thought about giving enough space Teacher comments – adds comments on to report
for answers
Restrict the amount of possible answers, do not use
open
questions 6.3. Measurement Applications
If open questions are used limit the amount of space
available
for answers Sensors are used to send data to a computer where the
Asking for ‘Name’ needs to be carefully thought about data is
processed
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The computer simply reviews the data from the sensors The oxygen levels and acidity levels are compared to the
(by comparing
it to data stored in memory) and updates historical
data stored in memory and they are also
its files and/or gives a
warning signal if the values are compared to alarm levels
stored in memory
outside given parameters One of two things will now happen: either the data is
No changes to the process are made transferred to
a CD/DVD or to a memory stick and taken
Examples: away for analysis later or
the computer is connected into
Scientific experiments a mobile phone network and transmits
the data back
Weather stations automatically to the monitoring station
Digital data: discrete, fixed value (used by computers) Sensors read key vital signs (such as pulse/heart rate,
Analogue data/signals: continuous value that varies temperature,
blood pressure, respiration, etc.)
smoothly The data from the sensors is converted into digital using
Analogue device = measure length, weight, an ADC
temperature etc. The data is stored in the computer memory
E.g. Thermometer – represents temp. by the height of The computer compares the data from the sensor with
the liquid
column the values
stored in its memory
Sensors: measure physical and analogue qualities The results are output on a screen in the form of graphs
Analogue data from sensors needs to be converted into and/or
digital read-outs
digital data
using an analogue to digital data converter An alarm is activated if any of the data is outside
(ADC) so that the
computer can understand and process acceptable
parameters
the data from the sensors The system continues to monitor the patient until the
If the computer sends signals to motors, valves, etc. then computer is
turned off
this data
also needs to be converted to analogue using a
digital to analogue
converter (DAC) so that the computer
can effectively control these
devices
Advantages of Using Computers in
Measurement
Analogue to Digital Converter (ADC)
The computer will not forget to take readings
Used when you want to attach an analogue input device The computer’s response time is much faster, which is
to a digital
device such as a computer. particularly
important in the patient monitoring example
This is so the analogue data can be Doctors, nurses, scientists, etc. can all get on with other
understood/processed by the
computer since computers tasks
while the monitoring is done automatically
only work w/digital data Computer give 24 hours cover every day (i.e. 24/7)
E.g. When processing data sent from a sensor The readings will tend to be more accurate
Readings can be taken more frequently if they are done
by a computer
and sensors
It could also be safer if whatever is being monitored may
Digital to Analogue Converter (DAC) have
potential hazards (e.g. children falling into the river
whilst
attempting to take readings)
Used when you want to attach an analogue output device
to a digital
device such as a computer
E.g. If the computer is being used to control a device
(motor/valve)
the device will be controlled by variable Disadvantages of Using Computers in
voltages; the DAC will be
used to send out analogue
signals Measurement
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Sensors are used to send data to a computer where the Software to make decisions which will allow the
data is
processed clothes to
be washed
The computer reviews the data from the sensors (by Time taken before next inputs
comparing it to
data stored in memory) Timer as part of the software
If the values are outside the given parameters/pre-set Time different cycles (when to add
value it acts
to try and get the values within acceptable soap/conditioner/etc.)
ranges Time delay in measuring temperature
It does this by sending signals to devices controlling the Needs to be time for changes to have effect
process Unmanageable situations
Door may not be shut
Needs to draw user’s attention
Usually a buzzer and light
Turtle Graphics
Based on computer language called LOGO and is now
usually known as
turtle graphics Central Heating System
It is the control of the movement of a ‘turtle’ on a
computer screen
by several key instructions which can be Applying factors
typed in Inputs
The use of ‘repeat’ instructions makes a piece of code Inputs from the user
more
efficient Room temperature required
Time systems turns on/off
Command Meaning Inputs from the system
FORWARD x Move x cm forward Actual room temperature
BACKWARD x Move x cm backward Clock giving the time
Outcome
LEFT d Turn left through d degrees
Heating or cooling room during the required times
RIGHT d Turn right through d degrees Outputs
REPEAT n Repeat next set of instructions n times Boiler
ENDREPEAT Finish the repeat loop Air conditioner
Processing
PENUP Lift the pen up
Check time against the one input and switches on
PENDOWN Lower the pen when that
time is reached
Same done to check when to turn off
When on, microprocessor reads temperature from
sensor and
compares it with desired temperature
Automatic Washing Machines If too low, it will heat up by turning the boiler
on and
if it’s too high it will turn the air
Have a microprocessor in them which contains the conditioner on
software which
controls the washing machine These will stay on until desired temperature is
Appling the factors reached
Inputs
Pressure sensor on the door to detect if open or
closed
Sensor to detect if the required level of water is in Automatic Cookers
Temperature sensor to check temperature
Outcome Have temperature sensors and timers with manual
Clothes have been washed controls to set
start and end times, and temperature for
Outputs cooking.
Heater Working similar to Central Heating System.
Motor to spin drum
Lights on machine to show user stage the cycle is
at
Actuators to turn the inlet valves on to allow hot Burglar Alarms
and cold
water into the machine
Actuator to turn the outlet valve on to let the Burglar alarms detect any intrusion.
water out of
the machine when the wash is Sensors such as motion sensors, door and window
complete sensors,
magnetic sensors, multi-functional sensors
An actuator to control the pump (vibration, shutter,
and temperature) measure the
Processing physical quantity and inputs the
value to a
microprocessor.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The microprocessor compares the input values with When making a computer model, consider:
the preset
values, if changes are detected, the What and how data should be collected
microprocessor sends
signals to the actuator Working of the system in real life.
The actuator activates the sirens or gives a phone call
or
messages the input mobile number. 6.6. Applications in Manufacturing
Industries
Glasshouse Robotics
Temperature controlled the same as central heating
Robots are used in many areas of manufacturing, from
system heavy work
right through to delicate operations e.g. car
Humidity must also be controlled bodies, welding
bodywork, manufacturing of microchips
Humidity sensor tells computer how humid it is
etc.
Computer then decides to turn the water supply to Control of robots is either through embedded
sprayers microprocessors or
linked to a computer system
Windows also operated by the computer Programming of the robot to do a task is generally done
Need to find the balance of how often to have
in two ways:
windows open The robot is programmed with a sequence of
Blinds that can be computer controlled instructions which
allow it to carry out a series of
Light sensor measures light intensity
tasks
When sun is strong the computer actuates electric Alternatively, a human operator manually carries out
motors which
close blinds a series of
tasks and how each task is done is relayed
Control in glasshouse is more likely to be used in
back to the robot
(embedded processor) or
commercial areas
or large glasshouses not in gardens controlling computer. The sequence of
instructions is
remembered so that the robot can automatically
6.5. Modelling Applications carry out each task identically each time (e.g.
assembling parts
in a television)
A mathematical computer model is created to manipulate Robots are often equipped with sensors so they can
variables
and see real time changes in terms of figures. gather important
information about their surroundings
Used to find how mechanisms control a system. Sensors also prevent them from doing ‘stupid things’,
Advantages: such as
stopping a robot spraying a car if no car is
Cheaper than building physical system to test present, or stopping
the spraying operation if the supply
Safer than building system and experimenting of paint has run out etc.
Easier to experiment with various scenarios Robots are very good at repetitive tasks
Quicker as no need to build system However, if there are many different tasks (e.g. making
Near-impossible tests involving space and volcanic specialist
glassware for some scientific work) then it is
scenarios
can be modelled risk-free often better to still
use human operators
What if analysis can be conducted that allow a certain
figure to
be computed by letting the computer change Advantages
other variables that
affect the value needed to be set.
E.g.
Robots can work in environments harmful to human
operators
The can work non-stop (24/7)
They are less expensive in the long term (they don’t need
wages)
however they are expensive to buy initially
Productivity is higher, since they do not need holidays,
are not ill
etc.
There is greater consistency – every car coming off a
production
line is identical
They can do boring, repetitive tasks, leaving humans free
to do more
skilled work
Disadvantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
User Interface
These systems have been developed to mimic the
expertise and
knowledge of an expert in a particular field This is the only thing that the end user sees
Examples include: Allows the user to interact with the system
Diagnosing a person’s illness Often requires training to operate effectively
Diagnostics (finding faults in a car engine, finding
faults on a
circuit board, etc.) Knowledge base
Prospecting for oil and minerals
Tax and financial calculations This is a database designed to allow the complex storage
Chess games and
retrieval requirements of a computerized knowledge-
Identification of plants, animals and chemical based management
system (in support of an expert
compounds system)
Road scheduling for delivery vehicles
Inference engine
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The inference engine compares the symptoms with the Receipt is produced as proof of purchase
knowledge base,
using the rule base to find matches.
The system suggests the possible illness with a
probability of each,
cures and recommendations on the
next step to be taken. Internet Shopping
The explanation system will explain how that particular
diagnoses
was suggested. Online shopping: Shopping over the internet.
To customer:
Advantages
6.13. Computers in the Retail Industry Cheaper goods (the company doesn’t have to pay
rent for
stores and doesn’t need more employees)
Automatic Stock Control Wide range of products
Delivery at your doorstep
Automatic stock control systems rely on the use of You can shop 24/7
barcodes Shop from any part of the world
Barcodes now appear on most products sold in shops You save the travelling costs of going for shopping
They allow quick identification of product details once the Disadvantages
barcode
has been scanned by a barcode reader Quality isn’t assured
Supermarkets use electronic point of sale (EPOS) People are worried about giving their card details
terminals, which
incorporate a barcode reader that scans online.
the barcode, retrieve the
price of the article and relay Packing and postal charges are added
information back to the computer
system allowing it to Personal services that you get from stores are
update its files missed.
Barcodes are made up of alternating dark and light lines Returning the products is harder
of varying
thickness No relaxation that you get from actual shopping
A number underneath the barcode usually consists of Bogus sites are present where you pay and never
four parts:
country code, manufacturer’s code, product receive the
product
code, and a check digit To seller:
The check digit is a form of validation which is used to Advantages
make sure
no errors occurred during the reading of the No need to pay rents
barcode No fixed working hours
Every time the barcode is read, this calculation is Less/no shoplifting
performed to
ensure that it has been scanned correctly Sell goods to customers anywhere in the world
Cheaper to contact customers (via e-mail)
Site warehouse where rental is cheap
Sell goods 24/7
Electronic Funds Transfer at Point of Sale (EFTPOS) Disadvantages
ICT knowledge needed to set up website
Many credit cards are equipped with a chip as well as a
Unemployment
magnetic
stripe – containing the PIN
Business abroad is lost if the prices are cheaper
This system is designed to enhance security since it is
there
better than
relying only on a signature
At times of network failures, there will be no
When paying for items using a chip and PIN card, a form
access
of
electronic funds transfer (EFT) takes place
Not everybody can access the internet, so a few
Paying for a meal example customers
are lost
Customer’s personal data can be hacked
Waiter inserts card into chip and PIN reader Postal charges discourage people at times
Restaurant’s bank contact customer’s bank
Card is checked to if valid 6.14. Recognition Systems
If card is stolen or expired, then transaction is terminated
Customer enters PIN using keypad
Automatic Number Plate Recognition (ANPR) systems:
PIN is read from chip on card and is compared to one just
A sensor sends signals to a microprocessor, which
keyed in
instructs a
camera to capture the front of a vehicle.
If they are the same, the transaction can proceed
OCR software is used to read the number plate from
Check is then made on whether they have enough funds
the image.
The characters are then converted to text
If there are not enough funds available, transaction is
format in order to
store it in a database
terminated.
Otherwise, transaction is authorized
Processing of cheques:
Authorization code is sent to restaurant
The value of a cheque is printed in special ink
Price of meal is deducted from customer’s account
containing iron
particles when a cheque is presented.
Same amount of money is credited to restaurant’s bank
MICR is used to read the characters at the bottom of
account
the cheque.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
A batch processing method is then used to process all Barge: Both the employee and the customer can hear
the
cheques at the end of a specific time period. the
manager
OMR media in schools: Employee call monitors: Allows the employer to listen to
School registers: Paper-based registers are fed into employee’s telephone calls. Call monitors can be used:
OMR to
be scanned and are then stored on a to improve the employee’s performance
database. to allow the manager/supervisor to join a call where
Multiple-choice examination papers: The position of a necessary
mark
is stored in a computer’s memory after being as a training tool
read by the OMR
device using a template that maps Uses of Automatic Number Plate Recognition (ANPR)
out the X-Y coordinates of
each lozenge (pen/pencil systems:
mark). Traffic enforcement: the system can check if a vehicle
RFID in passports: is
taxed, recognize cars parked illegally, cars speeding
The data on the RFID chip is read when the passport or going
through red lights so a fine can be imposed.
is scanned. Car park management: the system reads the
A photo of you is clicked which is then compared with registration
number and if allowed into the car park,
the image
stored in the RFID chip. the barrier is raised.
If the face-recognition passes, some checks are made Electronic toll collection: the system recognizes the
in turn to
make sure you are eligible to enter the vehicle and deducts the fare accordingly.
country, and if you are,
the gate opens automatically.
RFID in contactless payments:
The embedded chip on credit/debit cards and the
antenna enable
customers to wave their card over a Cookies
reader at the point of sale
terminals to make
payments Cookies are small files sent to a user’s computer via their
Smartphone apps can also be used to make web
browser when they visit certain websites
contactless payments. They store information about the users and this data is
accessed
each time they visit the website
For example:
6.15. Monitoring & Tracking Systems They remember who the user is and send messages
such as “Welcome
Sarah” each time they log onto the
Public monitoring/tracking: website
Ankle monitor: uses RFID chip to give out the person’s They recognize the user’s buying preferences e.g. if a
location and other details. It is tamper proof and will user buys
CDs, pop ups related to their buying habits
alert
authorities if tried to remove. will appear on the
user’s screen each time they visit
Phone call tracking: the service provider tracks the the website
calls
and the exact position from which they were Without cookies, web server would have no way of
made knowing that the
user had visited website before
Worker monitoring/tracking: Workers are For this reason, cookies could be used to monitor one’s
monitored/tracked in the
following ways: internet
activity
Supermarket workers: have the number of items
passing
through the tills over a period of time
monitored. 6.16. Satellite Systems
Internet use is monitored by network managers: they
can
check sites visited and time spent on that site Global Positioning Systems (GPS)
during working
hours.
Emails can be read: Employers can check that no Used to determine the exact location of several modes of
personal
mails are sent during office hours. transport
Delivery drivers: Their location can be tracked using Cars usually refer to GPS as satellite navigation systems
GPS
systems. It can also be checked if they are Satellites surrounding the Earth transmit signals to the
following the
shortest route and aren’t speeding. surface
Key logging: Software that records the keys pressed by a Computers installed in the mode of transport receive and
user on
the keyboard. They are used to find username interpret
these signals
and passwords of a
user. Knowing their position on the Earth depends on very
Employee call monitors: Allows the employer to listen to accurate timing
– atomic clocks are used in the satellites
employee’s telephone calls. There are three ways it can which are accurate to
within a fraction of a second per
be used: day
Monitor: The manager/supervisor can listen to calls Each satellite transmits data indicating its position & time
without
the employee or the customer’s awareness. The computer on board the mode of transport calculates
Whisper: The manager can help the employee with its exact
position based on the information from at least
the call,
but the customer can’t hear the manager three satellites
speak.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Questionnaires
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Since it is important that correct data is stored in files, Letters or other non-numeric data (e.g. July)
there
are certain techniques that need to be adopted to Non-integer values (e.g. 3.5, 10.75)
make sure the data
populating the file and database is at
least of the right type &
that it conforms to certain rules 7.5. Implementation
Validation routines and verification methods are used to
ensure this
happens
Once the system is fully tested, the next stage is to fully
Again, routines have to be fully tested to ensure they trap
implement it
unwanted
data but also to make sure any data
We will now consider changeover to the new system in
transferred from a paper-based
system to an electronic
more depth
system has been done accurately
There are four common methods used for changing over
Any system being developed will have some form of user
from the old
system to the new system
interface
Each one has advantages and disadvantages which need
The types of hardware were chosen in the design stage
to be weighed
up before the most appropriate method is
How these are used to interface with the final system
chosen for a particular
application
now needs to
be identified, for example how the screens
will be used to collect
the data and the way the output
will be presented
If specialist hardware is needed (e.g. for people with
disabilities), then it will be necessary to finalize how these
devices are used with the system when it is implemented
This will be followed by thorough testing to ensure the
user screens
are user friendly and that the correct output
is associated with the
inputs to the system
4 Common Methods of Changing Systems
Testing strategies Direct
Testing of each module needs to be done to ensure each The old system is stopped overnight and the new system
one functions
correctly on its own introduced
immediately
Once the development of each module is completed, the Advantages
whole system
needs to be tested (i.e. all modules The benefits are immediate
functioning together) Costs are reduced - since only one system is used
Even though each individual module may work there is no
need to pay for two sets of staff
satisfactorily, when
they are all put together there may be There is less likelihood of a malfunction since the new
data clashes, incompatibility
and memory issues system
will have been fully tested
All of this may lead to a need to improve the input and Disadvantage
output
methods, file and database structures, validation This method can be disastrous if the new system fails
and verification
methods
Then the system will need to be fully tested again Parallel Running
It is a very time-consuming process but the system must
be as
perfect as possible before it goes live The old and new systems are run side by side for a time
Testing will use many different types of data, which will before the
new system takes over altogether
fall into
one of three categories: normal, extreme or Advantages
abnormal If the new system fails, the old system is still available
Let us suppose one of the fields in a database is the date as a
back-up
and this
must be in the form dd/mm/yyyy, where each It is possible to train staff gradually
element of the date must
be numeric: Staff have time to get used to the new system
Normal: this is data which is acceptable/valid and has Disadvantage
an
expected (known) outcome, e.g. the month can be It is more expensive than direct changeover, since
any whole number
in the range 1 to 12 extra staff
are needed to run both systems together
Extreme: this is data at the limits of
Pilot Implementation
acceptability/validity, e.g. the month can be either of
the two
end values i.e. 1 or 12 The new system is introduced into one part of the
Abnormal: this is data outside the limits of company (e.g. into
a warehouse of a supermarket) and its
acceptability/validity and should be rejected or cause performance assessed
an error
message Advantages
For example, all the following values are not allowed If the new system fails, only one part of the company
as inputs
for the month: is
affected
Negative numbers (e.g. -1, -15) It is possible to train staff in one area only, which is
Any value greater than 12 (e.g. 32, 45) much
faster and less costly than parallel running
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The costs are also less than parallel running, since minimum memory requirements
only one
part of the system is being used in the pilot known bugs in the system
Disadvantage list of variables used (and their meaning/description)
It is more expensive than direct changeover, since file structures
each pilot
scheme needs to be evaluated before the sample runs (with test data and results)
next stage is introduced output formats
validation rules
Phased Implementation meaning of error messages
Initially, only part of the new system is introduced
Only when it proves to work satisfactorily is the next part
introduced, and so on, until old system is fully replaced User Documentation
Advantages
If the latest part fails, it is only necessary to go back in User documentation is designed to help users to learn
the
system to the point of failure, hence failure is not how to use the
software or system
disastrous This can consist of any of the following:
It is possible to ensure the system works properly the purpose of the system/program/software package
before
expanding how to log in/log out
Disadvantages how to load/run the software
This is more expensive than direct changeover, since how to save files
it is
necessary to evaluate each phase before moving how to do a search
to the next stage how to sort data
how to do printouts
how to add, delete or amend records
screen layouts (input)
Comparing Changeover Methods print layouts (output)
hardware requirements
Changeover method Direct Parallel Pilot Phased software requirements
Relative costs Low High Medium Medium sample runs (with test data and results)
Input needed by the user Medium High Low Medium error handling/meaning of errors
Input needed by systems troubleshooting guide/help lines/FAQs
Low* Low Medium Medium tutorials
team
Impact of failure High Low Low Medium
7.7. Evaluation
7.6. Documentation Once a system is up and running it is necessary to do
some
evaluation and carry out any maintenance, if
Once the new system is fully developed, a considerable
necessary.
amount of
documentation needs to be produced
This is done to ensure the efficiency of the system, the
For the end user
ease of use
of the system, and the appropriateness of the
For people who may need to modify or develop the
system.
system further
at some later stage
The following is a list of some of the things considered
There is some overlap between the two types of
when
evaluating how well the new system has worked.
documentation, but
the basic requirements are shown
This can ultimately
lead back to a re-design of part of the
below
system if there is strong
evidence to suggest that changes
need be made.
To evaluate the system, the analyst will:
Technical Documentation compare the final solution with the original
requirement
Technical documentation is designed to help identify any limitations in the system
programmers & analysts
who need to make identify any necessary improvements that need to be
improvements or repair/maintain to the system made
This can consist of any of the following: evaluate the user’s responses to using the new
purpose of the system/program/software system
program listing/coding compare test results from the new system with
programming language used results from the
old system
flowchart/algorithm compare the performance of the new system with the
input formats performance
of the old system
hardware requirements observe users performing set tasks, comparing old
software requirements with new
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Email Safety
Open emails from known sources, and do not click on an User IDs
emails wit
hyperlinks without confirming with the sender
of the email. Think
before opening an email from an To log on to a network, a user must type in a user ID
unknown person, never send any other
sensitive User ID assigns user privilege once user logs in
information (picture in school uniform, credit card PIN, The top-level privilege for a network is an administrator:
etc.) Able to set passwords and delete files from server etc.
Ask their ISP to eanble email filtering to classfy spam User privilege may only allow to access their own work
mails as
spam. area
Blcok and report users who seem suspicous or use After typing in user ID, the user will be requested to type
inappropriate
language in their
password
Never use you real name, only use a nickname Generally, it is a combination of letters and numbers
Use appropraite language Passwords are shown as stars (***) so nobody
Do not enter private chat rooms, as users can lure you overlooking can see
it
into giving
personal inforamtion by seeming too nice. Many systems ask for password to be typed in twice as a
Do not meet anyone off the internet for the first time on verification
check, in case of input errors
your own,
or atleast speak to a trusted adult first. To help protect the system, user has a finite number of
Do not missue images (of someone to blackmail them, for attempts
e.g.) If password is forgotten, administrator must reset it
Respect the confidentiality of other users If password is forgotten on a website, it will be sent to
your
e-mail
Online Games
Biometric Data
Similar measures apply to that taken when using social
media. Uses features of the human body unique to every
Additionally, players should be careful about: individual, such as
fingerprints, retina, iris, face and voice
In-game violence recognitions. It is used
in authentication techniques as it
Cyber bullying is very difficult / impossible to
replicate.
Keeping their webcams off (other potentially Advantages
dangerous players
have direct access to your image) Usernames and passwords don’t have to be
Predators may use voice masking technology to lure a remembered
user to
reveal their age, sex etc. Almost impossible to replicate body parts.
Cyber-attacks involving viruses, ransomware, etc. Somebody else can’t gain access, like with a stolen
card
They can’t be forgotten, like a card
8.3. Security of Data Disadvantages
The readers are expensive
Hacking Damages in fingerprints can deny access
Some people worry about their personal
information being
stored
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Pharming
Banks and organisations will never ask for a PIN to be
entered on
website like this.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The company providing the storage will have to put in all Knowing Your Audience
its
efforts and safety measures in order to keep your data
safe. When designing ICT solutions, you must consider
If the company providing the storage doesn’t backup your audience
data, you
may lose it in case of power cuts or fires, etc. There are 4 main characteristics of an audience
Age:
Can affect audience’s interests in your product
Large fonts and colours attract children
Firewalls More stylish and trendy layout attracts young adults
Gender
A firewall sits between the user’s computer and an Design product for a specific gender
external
network (internet) and filter information in and Younger girls are often attracted to pink
out of the computer Males generally prefer blue spectrum
Tasks carried out by firewall: Income
Examining ‘traffic’
Knowing this will help in attractive pricing strategies
Checking weather incoming or outgoing data meets Promoting certain products are targeted for people
criteria within a
specific range of incomes
If data fails the criteria, the firewall blocks ‘traffic’
Interests
Firewall can keep a list of all undesirable IP addresses Can help with advertising content
Helping to prevent viruses or hackers entering the Content that meets the exact description of
user’s
computer
audience’s interest
is more likely to attract them to
your product
Methods of Internet Security
Audience Needs
Authentication
Advantages Disadvantages
Method After finding out about your targeted audience you need
Inexpensive, as to aim to
meet those demands
Can be easily hacked,
Passwords nothing other than a Developers of the ICT product must ensure that they
can be forgotten
computer is required meet as many of
these needs as possible
Highly recognized Common Needs for Common Audiences:
everywhere, very
Fingerprint Intrusive, Damages Audience Needs
high accuracy, Easy
scans will prevent access
to use, Relatively low Bright/cheerful colours
storage requirement Animations/sounds/pictures
Non-intrusive, very Problems occur if Less text
Signature little time to identify, sign is not consistent, Young children Simple wording
recognition Relatively low High error rate (one
Large text
expensive in 50)
Games/activities
Very intrusive,
Very high accuracy, Easy to use
relatively slow to
no known way to Attractive/stylish colours
Retina scans verify retina scans,
replicate a person’s
very expensive to Interesting content
retina
install and set up Teens & adults Balance of pictures and text
Very intrusive, Lot of Clear fonts
Very high accuracy,
memory needed for
Verification time is Bullet points
Iris recognition storage, very
usually less than 5 Contrasting/easy-to-read colours
expensive to install
seconds Include clear instructions
and set up
Affected by changes Use slightly larger font sizes
Non-intrusive, Seniors
Face in lighting, person’s Fewer technical terms
Relatively
recognition hairstyle, age and Consistent design
inexpensive
spectacles Easy to use
9. Audience
Potential Problems
9.1. Audience Appreciation
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
If products are not built towards a specific audience well Creating ICT Solutions
then
problems may arise
An older audience may not be able to understand or read ICT solutions, for e.g. a website should be made in
text due to
poor font design accordance to
the legal, moral, ethical and cultural beliefs
A younger audience may not be able to understand of the target
audience.
certain text due to
complex wording & structure
Several audiences may just not find content interesting
since it is
not relevant enough to them
Several audiences may not find content attractive enough Implications of ICT Solutions
and thus
not purchase or use it at all
Younger & older audience may not understand how to When creating an ICT solution, all the following have to be
use the product
due to lack of simple instruction considered and the solution must be made in response
and respect to
these factors:
Legal: Ensure copyright laws are abided by including
9.2. Legal, Moral, Ethical & Cultural not using
any coding or branding from existing
Appreciation copyrighted software.
Morality: To distinguish from right or wrong.
Copyright Legislation Sometimes it
may not be illegal to carry out an act
however it could be
against your morals. For example,
A law that protects books, music art and other media that setting up a fake website to
deceive is not illegal but
are
written is copyright law questions your level of morality.
It is an automatic right and does not need applying for Ethics: Is to break a code of conduct. For example,
The person who owns the rights must be asked disclosure of information about the new software to a
before it can be
used again rival
software publisher or to the press.
Software is a specific thing created and written on a Culture: When software is released in different
computer cultures
then care must be taken so that people are
Needs to be protected as it is so easy for people to not offended. If
certain computer games mock
copy religion or cultural beliefs, then
again this could cause
This is a way of protecting software from being used offence.
without
permission
Users create a license which determines the terms
and conditions
10. Communication
10.1. Email
Copyright Laws
National Laws
It is not legal to make a copy of software, then sell it or
give it
away to other people In some countries, emails are monitored or read, thus
limiting the
topics on which you can speak.
Software cannot be used on a network unless a network
license has
been acquired
Not legal to use coding from software in your own
software without
permission Acceptable Language
Renting out software without permission is illegal
It is illegal to use the name of copyrighted software Language used in emails must lie within an acceptable
without
permission code of
practice. The following is a list of unacceptable
content that are
beyond the code of practice:
Obscene images
Abusive language
Software Protection
Racist, exploitative and violent messages
Installed software will require a unique reference number Use of illegal materials in messages
User will have to accept license agreement
Holograms are used to indicate software is original
Software may only run if CD-ROM or DVD-ROM is actually
Copyright
in the drive
Some software will only run if a memory stick is plugged Copyright laws apply to text in emails. Forwarding a block
in USB
ports of text
or an image without the copyright owner’s
permission, it would be
illegal.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Blog
User ID and Password Protection Personal internet journals where the writer posts their
observations
on a topic
Email services require a user ID to authenticate users No training is needed to do this
Passwords should contain alphabets, numbers and Blogs range from minor projects (e.g. people gossiping
special characters
(#, *). about a
topic) to important subjects such as politics or
Email Groups advertising
products
Easier to send out multiple mails by grouping them under Comments are not immune from the law
one name. Bloggers can be prosecuted for offensive comments
Companies and organization can group people according
to their
target group for marketing purposes.
Spammers can create email groups by buying addresses
of people from
a certain company and send in easier Wiki
ways.
Companies use email groups to set up meetings. Typing Software allowing users to easily create and edit web
out individual
addresses may leave out a few mail IDs. pages without
using any web browser
A wiki will support hyperlinks and has a very simple
syntax
(language rules) for creating pages
10.2. Internet Fundamentals Wikis are described as ‘web pages with an edit button’
Anyone can use wikis- content should be treated with
*INTERNET AND INTRANET EXPLAINED IN CHAPTER 4* caution
Example of a wiki: Wikipedia
The world wide web (WWW) is a system of interlinked
hypertext
documents accessed via the Internet
Protocols are a set of rules that are followed between the
sender
and recipient of data which is being transferred Social Networking
between devices.
HyperText Transfer Protocol (HTTP):
A protocol that is These sites focus on building online communities of users
followed between the sending and receiving
devices who share
the same interests
when data is being transferred using the internet. Enable people to share photos of themselves, their
HyperText Transfer Protocol secure variant
(HTTPS): HTTP favourite music
and videos, what they like to do, what
that is followed when data being transferred is they like to eat etc.
encrypted.** Example: Facebook
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
gif
Graphics Interchange
Moving images 15.1. Software Tools
Format
Hypertext Mark-up When a person’s/organisation’s name is entered or
htm Webpages
(Language) sometimes newly
coined terms are used, spell checkers
Joint Photographic might pick these up as errors,
because they are not found
jpg Standard for images in the dictionary. This makes spell
checkers less efficient.
Experts Group
Documents to be Validation ensures that the data being entered into an ICT
Portable Document solution
is reasonable and makes sense. Entered data is
pdf circulated over the
Format checked against set
criteria to be validated.
internet/email
Portable Network
png Compressed images 15.2. Proofing Techniques
Graphic
Word processed
rtf Rich Text Format Verification: checking of data when copied from one
documents
medium to
another to prevent errors.
txt Text (File) Simple Text files
Verification is also important and is a way of preventing a
Zone Improvement Sending many files difference in data when it’s being transferred from one
zip
Plan over the internet/email system to
another. This tries to make sure data entered is
correct, relative
to the source.
Generic file formats can be opened by any software to
access the
data held in them.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
A model prepared needs to be tested before being used Absolute file path: The full path of a file, which is not
to ensure that
all results computed are accurate. The test relative to anything, whereas relative links only point
plan must be justified
to be apt for the model. E.g. all the to a
file or a file path, the browser then redirects the
mathematical operations must
be tested in a model that user to
that location on the current site.
relies on calculations. Absolute paths always include the domain name
Definitions: of the
website
Testing: Checking if the designed model delivers the These should not be used to refer to locally saved
expected
outcome when tested with data. webpages as the computer the webpage is stored
Test data: The input data used for testing model. on (the
server) is not the same as where the
Expected outcome: The output a model is supposed webpage was developed
and thus an absolute file
to give with
the test data. path would point to the wrong
address.
Actual outcome: The output a model actually gives the
user when
the test data is input. 19.3. Use stylesheets
WWW.ZNOTES.ORG
CAIE IGCSE
ICT (0417)