Caie Igcse Ict 0417 Theory v1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 47

ZNOTES.

ORG

UPDATED TO 2017 SYLLABUS

CAIE IGCSE
ICT (0417)
SUMMARIZED NOTES ON THE SYLLABUS
CAIE IGCSE ICT (0417)

Immediate access store (IAS) - holds data and


program
instruction in current use
1. Types and Components of Microprocessor:
Used instead of CPU
Computer Systems Single integrated circuit

1.1. Hardware & Software Internal/Main Memory

Hardware Stores all data: application software, operating system,


data files
Tangible physical components of a computer system Consists of ROM and RAM
You can feel it or touch it Both RAM and ROM are integrated chips
Internal Hardware Devices: RAM:
Processor Random access memory (RAM) is an internal chip
Motherboard where data is
stored temporarily
RAM & ROM Memory can be written to and read from
Video & Sound Cards RAM > ROM (usually; except washing machines)
Internal Hard Disk Drives Stores anything that needs to be changed
External Hardware Devices: All program and data being used are on RAM
Monitor Contents lost when computer is turned off
Keyboard Referred to as volatile memory
Mouse ROM:
Printer Read only memory (ROM) is memory used to store
External Storage Devices permanent
information
Used to contain configuration data for a computer
etc.
Software Chips cannot be altered, only read from
Data not lost when computer is turned off
Programs that control computer systems Referred to as non-volatile memory
Set of instructions that make computer do something BIOS:
You cannot physically touch software ROM contains boot file, referred to as BIOS (basic
Relates to ideas & instructions for using physical objects input/output
system)
Tells computers what to do when it first starts
Two types of software:
Does hardware check when computer is turned on
Application software: Then it loads operating system into RAM
Programs that allow the user to do specific task BIOS stores date, time and system configuration
Design to carry out tasks
Can be general purpose software or custom-made  
software
(specialist software)
E.g. Spread sheets, databases, word processing Input & Output Devices
System Software:
Programs that allow the hardware to run properly Input devices:
Control computer's hardware and application Purpose is to provide data for processing
program Data is raw facts which alone have no meaning
Communicate with user Examples: keyboard, mouse
E.g. Operating system, device drivers, compilers Output devices:
Displays result of processing
Information is processed data which has been given
1.2. The Main Components of Computer
meaning
Systems Examples: monitor, printer

CPU
Secondary/Backing Storage
Processing done by central processing unit
Three main components: Stores data/information & programs not being used at
Control unit - coordinates input and output devices current time
and carries
out program instructions Backing store device = reader or recorder
Arithmetic and Logical Unit (ALU) - performs Example: Hard disk drive
calculations and
logical comparison: A < B? Backing store media = hardware containing data

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Example: Hard disk Do not have to learn complicated commands


Exchange data between different software
Good help facilities provided with GUIs
Basic Computer Model Disadvantages
Larger amount of hard disk space than other
interfaces
Significantly more memory (RAM) to run than other
interface type
GUI use more processing power than other types of
interfaces
GUI can be slow for experienced programmers to use,
they find CLI much faster

1.4. Types of Computers


1.3. Operating Systems
Desktop/Personal Computers
Enables users to communicate with computer systems
Controls operation of input, output & backing storage Refers to general purpose computers
Supervises loading, running & storage of application PC refers to IBM compatible computers, distinguishing
program them from the
Macs
Deals with error in application programs Made up of separate monitor, keyboard, mouse and
Maintains security of whole computer system processing unit
Maintains a computer log Advantages
Two main types of interfaces: CLI & GUI Spare parts standardized results in low costs
Tend to have better specifications
Large casing allows good dissipation of heat build up
CLI - Command Line Interface Disadvantages
Not portable since they are made up of separate
Types commands to tell the computer what to do components
The user must know all the commands Wiring clutters up desk space
Must not make typing errors Necessary to copy files as they aren't portable
Used by technicians
Can access everything on the computer system
GUI users can only access places they have icons for Laptop/Notebook Computers
Advantages
Knowing the correct commands, this can be much Refers to computers where monitor, keyboard, pointing
faster than any other interface type device and
processor together in a single unit
Uses much less RAM than any other interface type Extremely portable systems
Low resolution, cheap monitors can be used Low weight
CLI does not require Windows to run Low power consumption
Disadvantages Processor doesn't generate too much heat
Can be confusing Advantages
Commands must be typed precisely, if there is a Portable because monitor, pointing device, keyboard,
spelling error the command will fail processor &
backing store units are together in one
If you mistype an instruction, it is often necessary to box
start all over again No trailing wires
Large number of commands need to be learned Full advantage of Wi-Fi
Can link into any multimedia system
Disadvantages
GUI - Graphical User Interface Easy to steal
Limited battery; need to carry charger
Uses graphics to stand for the complicated actions Keyboard and pointing device awkward to use
Uses icons Heat dissipation is difficult due to laptop structure
Uses a mouse to select the icons
Screen divided into windows allows different things on
each Tablet Computer
WIMP - Windows Icons Menus Pointers
Advantages These are small hand-held devices that can perform
Easy to use because requires little IT knowledge many functions
that PCs & laptops do
Easy to explore and find your way around the system Often use touch screens to operate
On-screen virtual keyboard replaces physical keyboard

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Often used by graphic designers to digitalize their content Biometrics


with a
stylus pen
Can be used like a PC and/or a Smartphone A part of a person’s body is used to identify that
Advantages: individual
Small light & portable Can be:
Built in cameras for photos & videos Fingerprints
Touchscreen can be used with a stylus pen Retina
Long battery life Iris
Disadvantages: Face
Less storage spaces Voice
Lacks power of laptop/PC These are all unique to everyone thus can be used as an
Digital keyboard can be difficult to use authentication technique
Touchscreen may be difficult to use for detailed work Must be added initially to a system to use as identification
Impacts on everyday life:
Better security at the airport since most use at least
Smartphone one form
of biometric check if not more
Increased security in certain places as only authorized
Modern phones that can perform similar tasks to all the personnel can gain entry
above Reduced vehicle theft since newer car doors come
Main use of smartphones is social media & day-to-day with a
fingerprint lock on the door handle
planning More secure mobile devices as most now have some
Use varies from person to person sort of
biometrics integrated into them
Advantages:
Smallest lightest most portable
Integrated/virtual keyboard Vision Enhancement
Often the least expensive device
More practical for day-to-day use LVES: low vision enhancement systems: video projected
Disadvantages: inside a
headset in front of the user’s eyes. Brings the
Small screen may be difficult to use objects closer for
the viewer.
Not as powerful as other devices NVE: Night vision enhancement: amplifies visible and
Often has the lowest battery life infrared light.
Light passed through image intensifier tube
Small size makes it easy to steal/lose where light is converted
to electrons, then amplified
(increase in no.) and then light up
screen with phosphor
1.5. Impact of Emerging Technologies dust.

This is technology that is being newly developed


Robotics
These can have several impacts on our society
Programmed machinery widely used to do physically
demanding tasks
Artificial Intelligence (AI)
Can be automated or manually operated
Technology that focuses on creating a computer system Used to perform several tasks:
that can
closely mimic or simulate human intelligence Dangerous jobs such as bomb disposal
Exploring extreme environments such as volcanoes
AI can be used to:
Enhance video games and computer tactics Repetitive manufacturing jobs such as welding
Help decision making steps in expert systems Moving heavy objects such as large engines
Make robots to imitate human behaviour Impacts on everyday life:
Understand different human languages Increased personal time since robots can take over
Impact on everyday life: domestic
chores
Can be used to accurately predict hazardous weather Increased manufacturing efficiency since robots are
conditions
and signal warnings automatically much faster
and less expensive than human labour
Take over menial tasks for humans; increasing our Unemployment as robots replace humans in
autonomous jobs
leisure time
Can be used for safer automated travel; cars that can Safer working environments since robots can perform
drive and
park by themselves tasks that
are too dangerous for humans
Increases home safety by being able to tell the
difference
between owner & intruder; call authorities
Quantum Cryptography
automatically
Improved medical care as decision making skills and
Technology that allows messages and data to be sent
precision
can be enhanced
with complete
privacy; basically, advanced encryption

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Older encryption is based on mathematics, but this new Training surgeons by allowing them to operate on
tech uses
physics virtual
patients
Makes it much more complex to decrypt Playing games and enhance the level of immersion
Impacts on everyday life: General VR equipment:
Completely secure voting ensuring that votes cannot Eye goggles that produce 3D images to develop the
be tampered
with or changed artificial
environment
Completely secure communication eliminating the Special gloves or controllers to perform precise
risk of being
read/heard by the wrong eyes/ears actions inside
the simulation
Completely secure bank transactions so money goes Headphones to control what is heard in the virtual
exactly where
it is intended world
Completely secure personal information preventing Powerful computer to run the entire VR system in real
hackers access
to intrusive details about a person time
Impacts on everyday life:
Improved medical surgeons/soldiers
Computer Assisted Translation (CAT) Stronger buildings
Treatment of phobias as certain situations can be
When human translators use computer software to help treated using
simulations
in the
translation process More realistic education as students can learn in a
Can reduce translation time more
interactive environment
May not be 100% accurate
Common CAT tools:
Spell checkers 2. Input & Output Devices
Translation memory software
Language search-engine software
Impacts on everyday life: 2.1. Input Devices & their Uses
More accurate documents since most software can
automatically
detect errors Keyboards
More multilingual society since anyone with an
internet
connection can now essentially learn multiple
languages using
translators
Quicker translations

3D & Holographic Imaging QWERTY- layout


Ergonomic- reduces health related problems
Technology that makes images appear to be 3- Uses
dimensional by adding a
layer of depth Keyboards are used to input data into application
Holograms use 2 regular 2D images and manipulate them software
to produce a
3-dimensional image Also used to for typing commands to the computer
Different laser beams are used to record the 2D images (CTRL + P)
onto a single
photographic plate Advantages
This creates an illusion of one 3D images Enables fast entry of new text into a document
Impact on everyday life: Well-tried technology & well-known method of entry
Improved security since majority of credit/ID cards & Most people find them easy to use
bank notes
use holograms to prevent forgery Easy to do verification check as data is entered, as it
Better movie experiences since 3D viewing can appears
on the screen simultaneously
provide a more
immersive experience for the Disadvantages
audience Users with limited arm/wrist use can find keyboards
Greater data storage since holographic layers can hard to use
potentially
decrease the thickness of disc storage Entering data is slow when compared to direct data
entry (e.g.
Optical mark recognition)
They use up desk space as they are quite large
Virtual Reality (VR)

When computers create an artificial environment that Numeric Keypads


users can
virtually interact with
Uses:
Allow architects to walk around a virtual version of
their
design
Training soldiers for combat by allowing them to fight
against
virtual enemies

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

A numeric keypad is used to enter numbers only The pointer is controlled by the user moving their finger
Although some have function key to allow input of on the
touchpad
alphabetical
characters Uses
Uses Used for opening, closing and minimising software
Used in Automatic teller machines (ATMs), where Used for grouping, moving and deleting files
customers can
key in their personal identification Useful when editing images (e.g. controlling the size
number (PIN), or an amount
of money and
position of the image)
Used to key in phone numbers into telephones Used for controlling the position of a pointer on the
Electronic point of sale (EPOS) terminals have numeric screen to
allow:
keypads
in case the barcode reader fails Selection from a menu
Used in Chip and PIN devices to key in PIN, or amount Selecting an icon
of money Advantages
Used to enable fast entry of numeric data into a Faster to select an option by a touchpad than a
spread sheet keyboard
Advantages Enables rapid navigation through applications and the
Numeric keypads are faster than standard keyboards internet
for entry of
numeric data Since the touchpad is integrated into laptop
Since many are small devices (e.g. mobile phones), computer, there is
no separate mouse, aiding
they are easy
to carry around portability
Disadvantages They can be used when no flat surfaces are available
Can be difficult to use due to the very small keys Disadvantages
Difficult to use for entering text People with limited hand/wrist movement can find
Sometimes the order of numbers isn’t very intuitive touchpads hard
to use
It can be more difficult to control the pointer when
compared to
a mouse
Mouse They are more difficult when doing operations such as
‘drag and
drop’
An example of a pointing device
The ball underneath the mouse is used to detect
movement Tracker Ball
The left button is for selecting by double on it and the
right is to
bring drop-down menus
There is usually a scroll button which speeds up the
process of
moving through a document
Uses
Used for opening, closing and minimising software Tracker ball is like a mouse except that it has a ball on the
Used for grouping, moving and deleting files top of
the device
Useful when editing images (e.g. controlling the size Users control the pointer on the screen by rotating the
and
position of the image) ball
Used for controlling the position of a pointer on the Uses
screen to
allow: Have the same pointing/cursor control capability as a
Selection from a menu mouse
Selecting an icon Used in applications where the user has a disability
Scrolling up/down and right/left (RSI)
Advantages Used in a control room environment, where it is faster
Faster to select an option by a mouse than a keyboard than a
mouse to navigate through process screens
Enables rapid navigation through applications and the and more robust than a
mouse
internet Advantages
Mice are small and don’t take much area Tracker balls don’t need the same fine control as a
Disadvantages mouse
People with restricted hand/wrist movement can find People with limited hand/wrist movement find easier
it hard to
operate a mouse to use than
a mouse
Easily damaged and can easily be clogged up with dirt The pointer can be positioned more accurately on the
They are hard to use if there is no flat surface screen than
with a mouse
available They take less desk space than mice since they are
stationary
Disadvantages
Touchpad Tracker balls are not supplied with the computer as
standard, so
they are more expensive
Touchpads are used in many laptop computers as a User may need training since they are not standard
pointing device equipment

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Enable faster entry of options than a keyboard/mouse


Remote Control Very easy to choose options
User friendly method for inputting data
A remote control is used to control the operation of other They are tamperproof, preventing people from
devices
remotely by using infra-red signals keying in
information (which could corrupt the
Uses system)
In home entertainment devices such as Televisions, Disadvantages
DVD
player/recorder and satellite system There is a limited number of options available
Used to control multimedia systems Using touchscreens often can lead to health problems
Used in industrial applications to remotely control e.g.
(straining of arm muscles and RSI)
processes,
stop and start machinery The screen can get very dirty with constant touching
Advantages
Enable devices to be operated from any distance,
which is useful
for people with disabilities Scanners
Some chemical processes are hazardous, so it is safer
to operate
equipment from a distance Used to input information on hardcopy e.g. text
Disadvantages document
People with limited hand/wrist movement can find Uses
them hard to
use Used to scan in documents and convert them into a
The signal between the control and the device can be format for use
in various software packages
easily
blocked Old and valuable documents and books can be
scanned, protecting
the original copies from damage
Non-digital photographs can be scanned for storing
Joystick on a computer
Advantages
Images can be stored for editing later
Scanners are much faster and more accurate than
typing in
documents again
It is possible to recover damaged documents and
photographs by
scanning them and then using
By gripping the stick, a pointer on the screen can be appropriate software to produce an
acceptable copy
controlled Disadvantages
Buttons are used to make selections The quality can be limited depending on how good
Uses the scanner
resolution is
Video/computer games are often controlled by
joysticks
They are used in simulators to mimic actual controls Digital Cameras
Advantages
Easier to navigate round a screen compared to a
keyboard
Control is in three dimensions
Disadvantages
More difficult to control the on-screen pointer with a
joystick
than with other devices such as mice Photographs are stored in memory
They can be easily transferred to a computer using a USB
Uses
Touch Screen Digital cameras can produce photographs for direct
transfer to a
computer or to print out
User can choose an option by simply touching a Digital cameras allow short video clips to be produced
button/icon on the
screen Photographs can be uploaded directly into application
The selection is automatically made without the need for software
such as word processor
any
pointing device Advantages
Use Easier to produce better quality photographs than
Used for service tills e.g. petrol stations with a
tradition camera
Used where selections are made on a screen e.g. Easier and faster to upload photographs to a
ATMs, public
information systems, airports and computer
railway stations There is no need to develop film and print out
Used in PDA’s photographs
(saves paper and no longer needs the
Used in Interactive white boards chemicals to produce
photographs from films)
Used in computer-based training (CBT) Easy to delete an image from the memory if it’s not
Advantages satisfactory

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

The memory card can store several hundred Type of sensor Applications
photographs Automatic washing machines,
Disadvantages Temperature central heating systems, automatic
The camera user needs to be computer literate to use green houses, ovens
the camera
properly
Burglar alarm systems, robotics,
There is some artistry lost since clever software
Pressure environmental monitoring,
corrects
errors in the photographs
Automatic washing machines
The resolution is not yet as good as traditional
cameras Automatic doors, street lighting
Images often need to be compressed to reduce the Light control, Burglar alarm systems,
amount of
memory used automatic greenhouses
It is possible to fill up computer memory very quickly Burglar alarm systems, monitoring
Sound
with
several photos of the same subject (to find the liquid and powder flow in pipes
perfect snap
shot) Automatic greenhouses,
Humidity/moisture environmental monitoring, factories
where moisture levels are crucial
Video Camera Automatic greenhouse, chemical
pH processes, environmental
DV (digital video) camera store compressed photo frames
monitoring
at 25 MB/s – motion jpeg.
Light turned into electronic signal through light sensitive
Advantages
sensors and automatically converted to a digital file
Readings by sensors are more accurate than taken by
format.
humans
Advantages
Readings are continuous, there is no break in
Easy to edit footage in a video editing.
monitoring
High quality video captured, therefore
Because it is a continuous process any necessary
Disadvantages
action or
warning will be initiated immediately
Storage medium (Memory cards) more expensive to
The system can be automatic, removing the need for
buy than films.
human
intervention, this is particularly important if
the process is
hazardous
Microphone Disadvantages
Faulty sensors can give spurious results

Graphic Tablet

Can be connected directly to a computer


Sounds can be inputted and manipulated A graphic tablet is used with a stylus to produce freehand
Uses drawings
Microphones are used to input speech/sounds to be Uses
used in
various applications Graphics tablets are used to produce drawings,
They are used in voice recognition software- for computer graphics
conversion of
speech into text, and recognition of In countries where characters are complex e.g. japan,
commands they are
used as a form of input
AdvantagesFaster to read in text than to type it using a They are used in computer aided design (CAD) work
keyboard Advantages
Possible to manipulate sound in real time using It is possible to modify drawings before they are input
special software They offer an accurate method of drawing
If used in a voice activation system, this has the Disadvantages
advantage of
improving safety They are more expensive than other pointing devices
Disadvantages
Sound files can use up a lot of computer memory
Voice recognition software isn’t as accurate as typing Web Cam
in
manually

Sensors

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Connected directly to a computer via a USB port


Uses The device has a slot where the card is placed, and the
While chatting online webcams can be used to have chip is read
conversations A small screen is part of the reader which gives
Used to enable video conferencing to take place instructions to the
operator
Advantages Uses
Can be left on constantly and activated when required Chip and PIN readers are used where payments are
Allow people to keep in contact with each other made using
cards e.g. travel agents
without the need
to travel, particularly useful for Advantages
disabled or elderly people Provide a more secure payment system than
Disadvantages requiring a signature
or using magnetic stripe, since
Webcams have limited features and the picture is the PIN typed in must match up
with the PIN stored
often of poor
quality on the chip
They need to be connected to a computer Provide a more robust system than magnetic stripe
since the chip
does not need to be in contact with the
2.2. Direct Data Entry & Associated reader
Disadvantages
Devices Customer needs to be careful when typing in the PIN,
so nobody
reads it giving an opportunity for Fraud
Magnetic Stripe readers

Radio Frequency Identification (RFID) Readers

RFID readers work in similar ways to a bar code reader


An RFID tag is attached to/inside a surface
The reader reads the data held on the tag which is then
Used to read information on the magnetic stripe
input into
the computer system for processing
The stripe contains useful information such as start and
Radio waves are used to transmit data thus can be used
expiry date
through most
materials
Uses
Uses
Credit and debit cards have magnetic stripes that are
Used in retail or supermarkets as barcode alternatives
used by
ATMS or EFTPOS (electronic funds transfer
Used to identify pets
point of sale)
terminal
Used in passports
Security cards for entering building e.g. hotel rooms
Advantages
Travel systems e.g. train and underground tickets
Can hold a lot of data
Advantages
Can be read from long distances
Data entry is fast compared with keying in using a
Does not require direct line of sight
keyboard or
keypad
Information can be read faster than barcodes
System is error free, no typing involved
Can alter information
Information is secure since there is no typing and the
Disadvantages
information can’t be read directly by a person
Thieves can steal information easily
Can prevent access to restricted/secure areas
RFID tags are expensive
Magnetic stripes are unaffected by oil water and
Radio waves can experience interference
moisture
\
No moving parts therefore physically robust
Disadvantages
If the magnetic stripe is damaged the data is lost Magnetic Ink Character Reader (MICR)
Card needs to be in close contact with the reader
Since the information is not human readable, they
need to find a
way to show the information to the
customer (e.g. hotel room
number not printed on
cards)

Magnetic ink character recognition is a system which can


Chip & PIN readers
read
characters printed in a special ink
Uses

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Used to process cheques in banking operations – It is still not a very accurate technique
cheque is read
using a batch processing method
Advantages  
MICR offers great security than OCR since the
oriented
characters cannot be altered Barcode readers
There is no manual input, thus errors are reduced
If somebody writes over the magnetic ink characters,
it can
still be read
Disadvantages
Only certain characters can be read, and the number
of different
characters is very limited
It is a more expensive method than other methods Used to read information in the form of a barcode
used for direct
data entry Handheld scanners or wands are very common for
reading barcodes
Optical Mark Reader Uses
Used in supermarkets and other shops where the
goods are marked
with a barcode
Used in libraries to scan user’s library card and
barcodes on
books (to keep track of books on loan)
Used as a safety function in many companies to
Optical mark recognition is a system which can read
ensure that
electrical equipment is checked on a
marks written in
pen or pencil
regular basis
Uses
Advantages
OMR devices are used to read questionnaires,
Faster than keying in information, and fewer mistakes
multiple choice
examinations papers and other types
are made
of forms in the form of
lines or shaded areas
Used as a way of recording data, can improve safety
Advantages
Barcodes enable automatic stock control
A very fast way of inputting results of a survey
Barcode scanning is a tried and trusted technology
Since there is no typing, it is more accurate than
When an item price is changed, only the central
keying in
data
database needs
to be updated, there is no need to
OMR is more accurate than OCR
change the prices
individually on each item
Disadvantages
Disadvantages
Forms need to be carefully designed to make sure
Barcode scanning is an expensive system to
that the
marks/shadings are correctly positioned to
administer since
every item in the shops needs a
gather accurate
information
barcode and every barcode needs
to be entered on
There can be problems if forms aren’t filled correctly,
the system
sometimes they must be checked manually before
Also, there is a need to invest in the computer
being read by an
OMR, this is both time consuming
technology
together with staff training, which can all
and expensive
be expensive
The system is not fool proof- barcode can be swapped
around on
items
Optical Character Reader

2.3. Output Devices & their Uses


CRT Monitor

Optical Character recognition is a software that takes Cathode Ray Tube monitors
scanned text
and converts it into a computer readable Least expensive type of monitor, becoming rarer as TFT
form monitors take
over
Uses Come in various sizes
Processing of passports and Identity cards Picture created is made up of tiny dots (red green or
OCR is used when scanning documents to modify blue), the
intensity of the colour of the dot determines
them using a
suitable software the colour perceived
by the eye
Advantages Uses
Much faster data entry system than manually keying Primary output device for computers, user can
in data immediately see
what they are typing in
Since there is no manual data entry, the number of Used with light pens to allow designs to be created on
errors is
reduced screen
Disadvantages Advantages
The system has difficulty reading handwriting Produce higher quality images than TFT monitors

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Angle of viewing is better than a TFT monitor Disadvantages


They work with light pens in CAD and CAM Expensive
applications (Computer
Aided Design/Manufacturing) High power consumption
Disadvantages Slow response time
Tend to be heavy, weight hazard if not supported Note: Old LCD monitors used CCFL (cold cathode
properly fluorescent lamp)
technology to light up the screen.
Run very hot, can cause fires if left unattended –
especially if
they are old
Consume more power than TFT monitors LED Monitor:
They can flicker, this leads to headaches and eyesight
problems
with prolonged use Front layer made from liquid crystal diodes; grouped
together to
form pixels (RGB or RGBY-more vivid colours)
For the image to show up on-screen a light source of LED
TFT Monitor backlight
is used.
Advantages (over LCD monitors):
Lighter and thinner
Longer life
Lower power consumption
Greater contrast and more vivid colour
Relatively more robust
Disadvantages
Glare gives viewers headaches
Thin Film Transistor monitors Images too sharp, so can cause eye strain
Taking over from CRT monitors as the main output device
The progress in TFT technology is one of the reasons for
the rapid
development of laptop computers Touch Screen
The screen is made up of thousands of tiny pixels which
are made up
of transistors controlled by a Automatic selection without a pointing device
microprocessor Uses
Each pixel has three transistors-red, green or blue; the Automatic teller machines
intensity
of each determines the colour of the pixel seen. EFTPOS (electronic fund transfer point of sales)
Uses PDA
Smartphones
Primary output device for computers, user can
immediately see
what they are typing in Public information points
Integral part of laptop computers Advantages
Advantages Faster data entry
Lightweight, so no weight hazards like CRT monitors Easy to choose options
Less glare produced than in CRT monitors; also emit User-friendly and intuitive
less
radiation Disadvantages
Consume much less power and generate less heat Limited options
than CRT monitors Frequent usage can lead to RSI, etc.
Disadvantages Constant usage results in the screen getting dirty;
Angle of viewing is critical; image appears unclear if visibility
and sensitivity decreases
viewed
slightly from the side
This is an issue if several people are looking at the
Multimedia Projector
screen at
the same time
They cannot yet be used with light pens,

IPS/LCD Monitor

Front layer made from liquid crystal diodes; grouped


Receive analogue and digital signals, although most
together to
form pixels (RGB or RGBY-more vivid colours)
modern
projectors only work with digital inputs
Receive analogue and digital signals, although most
The signal source is usually from a computer, television,
modern
projectors only work with digital inputs
or DVD
player
IPS (In-plane switching) is the technology used in LCD
The image from the source is magnified and projected
monitors.
onto a large
screen
Advantages
The devices usually work with a remote control, but can
Colour can be seen accurately from different viewing
also use
virtual mouse technology – cordless PC mouse
angles
(has a laser pointer)
No lightening on touching

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

It is then possible to direct the presentation without Inkjet Printer


being
tied to the computer
Most multimedia projectors take input from various
types of
video format e.g. PAL, NTSC or SECAM
Uses
Used for training presentations (allows the whole
audience to
see the images from a computer)
Also used for advertising presentations (shown at
exhibitions,
shopping malls etc.) Used to produce good quality hard copies – the quality is
Home cinema systems (projecting the images from a not as
good as in laser printers but much better than that
DVD or
television) use multimedia projectors of dot matrix
printers
Advantages Do not have large buffers like laser printers, so printing is
Enables many people to see a presentation rather done a
bit at a time
than all of
them crowded around a small computer Therefore, printing is sometimes paused – the whole
screen page can’t be
stored in the buffer, it must wait for the
Avoids the need for several networked computers computer to send more
data
e.g. when looking at a video clip on the internet, Uses
everybody can
see the video on the large screen Used where low volume outputs are needed
rather than logging on to
several computers Ideal for high quality printing for small print jobs or
Disadvantages single
pages e.g. for photo quality printouts
Images can sometimes be fuzzy Advantages
Expensive to buy High quality output
Setting up projectors can be a little difficult Cheaper to buy than laser printers
Very lightweight and take up little space (small
footprint)
Laser Printer Do not produce ozone and volatile organic
compounds, unlike
laser printers
Disadvantages
Output is slow if several copies needed – there is little
buffer
capacity to store the pages
The ink cartridges run out too quickly to be used for
large
print jobs
Printing can smudge if the user is not careful
Produce very high-quality hard copy output Can be expensive to run if they are used a lot –
Print rate per page is fast if many pages are being printed original ink
cartridges are expensive
Rely on large buffer memories – the data for the whole
document is
stored before pages can be printed out
Uses Dot Matrix Printer
Used where noise levels need to be kept low e.g. in an
office
The best option for fast, high quality, high volume
printing
Advantages
Printing is fast for high volumes, slightly faster than
inkjet
if only a few pages are to be printed A type of impact printer
Can handle very large print jobs A print head made up of a matrix of pins presses against
Quality is consistently high an inked
ribbon
Toner cartridges last for a long time; laser printers can Uses
be a
cost-effective option if colour outputs are not Can be used in noisy environments e.g. garage
required workshops
Disadvantages Can be used in applications were the print quality is
Expensive to buy not very
important
Only fast if several copies are being made Advantages
Colour laser printers tend to be expensive to run Can be used in environments which would be a
since four
cartridges are needed as well as diffuser problem for laser
and inkjet printers – dusty, dirty or
kits, etc. moist atmospheres
Produce ozone and volatile organic compounds Carbon copies or multi-part outputs can be produced
because of their
printing method and type of Very cheap to run and maintain
toner/ink used Easy to use if continuous stationary is required e.g.
These have been linked to health hazards in the office long print
jobs such as wage slips

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Disadvantages Advantages
Very noisy – not good in an office environment Save a lot of money, other methods of making
Cost more than an inkjet printer to buy prototypes are very
time consuming and expensive
Very slow The powders used can often be ground up and
Printing is of poor quality reused
Physical scale models are produced with working
parts, which
gives a better idea of how the product
Wide Format Printer will look
Disadvantages
Expensive to buy
Slow at producing their output
Product is sometimes a little rough, often further
work needs to
be done

Devices that produce hard copies but operate in a Speakers


different way to
printers
Not limited to normal printer paper size and can produce
highly
accurate, very large drawings and posters
The most common types are pen plotters, electrostatic
(similar
method to laser printers) and inkjet plotters
With pen plotters, coloured pens are controlled by a
computer
and the paper can move backwards and
forwards to allow accurate
shapes to be drawn
Uses Can be connected directly to a computer or are built into
Used to produce large drawings e.g. blueprints of the
monitor or casing (as in laptop computers)
buildings; are
often used with CAD applications Uses a digital to analogue converter (DAC) to convert
Used to produce large pictures for use on billboards digital data
from the computer to analogue from so the
or giant
posters speakers can process it;
the signal is then amplified
They can also print on plastic coated paper through the speakers.
If the pens are replaced by cutting tools, it is possible to Uses
make
large signs Used to output sound from multimedia presentations
Advantages Used in home entertainment centres
Can produce huge printouts They can help blind people through audio output of
Print quality is extremely high text on the
screen (together with speech generation
Disadvantages software)
Slow in operation Used to play downloaded sound files
Expensive to buy and maintain Advantages
Usually long lasting and durable (if operated within
their
intended power levels)
3D Printer Often provided with the computer/laptop although
these may not
be the best quality
Disadvantages
Can take up a lot of desk space, compared to
headphones
Can distract people around you, everyone can hear
what you are
playing
A new type of printer that produces solid 3D models May not be able to hear the full sound spectrum, this
using modified
inkjet technology called tomography requires
multiple speakers
Very thin layers of fine powder (plaster, resin, starch) are
bonded
together as a 3D model is slowly built up
Items produced are known as prototypes
Actuators
Uses
A type of controlling device
Used to produce prototypes which work from CAD
Transducers that are used to take signals from a
packages,
photograph images, stored drawings etc.
computer and
convert them into some form of motion
Scale models are produced in colour before the real
e.g. operating motors, pumps,
switches and valves
thing is
manufactured
Digital signals are sent from the computer to an actuator
The ultimate objective is to produce organic objects
to operate
a device
using this
layering technology (such as replacement
Conversion of the digital signal to analogue is required
human organs)
first
(using a DAC)

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Disk surface coated in magnetic film, storage is done by


Motors altering
binary codes to 1s or 0s
Uses
Used to store operating systems and working data
Used for storing application software
Real time systems and online systems used fixed hard
drives
Turned on or off by the actuator Used in file servers for computer networks
Uses Advantages
Used in many domestic appliances Very fast data transfer rate and fast access times to
Automatic washing machines (to make the drum data
rotate) Have very large memory capacities
Cookers (to switch on fans) Disadvantages
Water pumps in central heating systems Can be easily damaged
Automatic greenhouses to open windows and switch They lack portability
on fans
Used to control robot arms in the industry
Operate fans, disk drives and DVD drives in Portable & Removable Hard Disks/Drives
computers
Like fixed hard disks but are usually connected via
universal serial
bus
Buzzers Uses
Can be used as backup systems to prevent loss of
Switched on or off by the actuator data
Uses Can be used to transfer data, files and software
Used in cookers and microwave ovens to tell the between
computers
operator when
the cooking process is complete Advantages
Used in burglar alarm systems to warn if intruders are Data access time and transfer rate is very fast
present Large memory capacities
Can be used to transfer information between
computers
Heaters Disadvantages
Can be easily damaged
Actuators are connected to switches which turn the
heater on or off
Uses Magnetic Tapes & Drives
Used in automatic washing machines, cookers and
central heating
systems Thin strip of plastic which is coated in a magnetic layer
Used in automatic greenhouses to control the Read and written by read/write head
temperature Uses
Application where batch processing is used
Used as a backup media
Lights Advantages
Generally, less expensive and very robust technology
The actuator is connected to the switch that turns the Data transfer rate is fast
lights on or
off Disadvantages
Uses Access time is very slow
Security lights When updating another tape is needed
Used in greenhouses to control the lighting conditions

3.2. Optical Backing Storage Media


3. Storage Devices & Media
CD-ROM/DVD-ROM
3.1. Magnetic Backing Storage Media Read only memory – cannot be overwritten
Data is stored as a series of pits and lands formed by a
Fixed Hard Disks/Drives laser beam
etching the surface at manufacturing stage
Uses
Available on all computers and is the main method used Store music files and software.
for data
storage Very large storage capacity and are used to store
Uses a read/write head to write and read data from it films.
Advantages

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Holds more data than floppy disks spiral track


Less expensive than hard disk drives Gives them advantage that writing, and reading can occur
Disadvantages at the same
time
Data transfer rate and data access time are slower Makes it possible to watch an already recorded television
program at
the same time as a different program is being
  recorded
Recording layer is made from similar phase-changing
CD-R/DVD-R material to that
used in RW technology
Shiny and dull marks represent data to a computer where
The letter ‘R’ means the disc is recordable only once and they are
interpreted
then it
becomes ROM Uses
Use a thin layer of an organic dye as the recording media DVD-RAMs are used in recording devices such as
DVDs also use an additional silver alloy or gold reflector satellite
receivers to allow simultaneous recording
Laser beam produces heated spots and unheated spots and playback
Uses They are used in camcorders to store films
They are used for home recording of music (CD-Rs) Advantages
and films
(DVD-Rs) Have a long life (30 years)
They are used to store data for later use Can be re written on more than the DVD-RWs
Used in applications where it is necessary to prevent (100,000 times)
the
deletion or over-writing of important data Very reliable as they have built in verification software
Advantages to
ensure accuracy of data
Cheaper than RW disks Access is very fast
Once burned (and finalized) they are like ROM No need to finalize the disk
Disadvantages Very large capacities
Can only be reordered once Ability to read and write data at the same time
Not all CD/DVD players and can read CD-R Disadvantage
DVD-RAMS are not as compatible as R or RW, many
systems will not
recognize this format
CD-RW/DVD-RW More expensive than DVD-RW

‘RW’ means that these disks are re-writable media can be


written
over several times Blu-Ray Discs
Unlike CD-R/DVD-R they don’t become ROMs
The recording layer uses a special phase-changing metal Uses
alloy Blu-ray disks are used in home video consoles
The alloy can switch between crystalline and amorphous Used for storing and playing back films
(non-crystalline) phases, thus changing its reflectivity to PCs can use this technology for data storage or
light,
depending on the laser beam power backing up hard
drives
Spots are produced which can be read by a laser Camcorders can use this media to store film footage
System allows data to be written, erased and re-written Advantage
many times Very large storage capacity
Uses Data transfer rate is very fast
CD-RWs and DVD-RWs are used to record radio and Data access speed is faster than with other optical
television
programs media
They are used in closed circuit television (CCTV) Disadvantage
systems Disks are relatively expensive
Advantages Blu-ray disks still have encryption problems
Can be re used many times
Different file formats can be used each time 3.3. Solid State Backing Storage
Less wasteful than R format since files or data can be
added at
a later stage Solid state systems control the movement of electrons
Disadvantages within a
microchip: if the transistor conducts a current,
Relatively expensive media this is equivalent
to a 1, otherwise it is a 0
Possible to accidentally overwrite Have no moving parts, consume much less power and are
extremely
robust
Used primarily as removable storage devices and are
DVD-RAM collectively
known as flash memory

Recent addition to optical media group


Unlike other CD and DVD formats, DVD-RAMs have Solid State Drives
several discrete
concentric tracks rather than a single

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Supports reading/writing data & maintains stored data in Has a finite life in terms of the number of times they
a permanent
state even without power can be read from/written to.
Functions much like a hard drive but different tech
Built with an array of semiconductors that form its
memory and
operated using an integrated circuit 4. Networks & the Effects of
Uses
Used to store operating systems and working data Using them
Used for storing application software
Used in file servers for computer networks
Advantages
4.1. Routers
Faster than hard disks because they do not need to
A device that enables data to be sent between different
‘spin up’ the
disk
Robust because no mechanical parts types of
networks
Read performance is fast even when data fragmented Commonly used to connect computers and other
network capable devices
to the internet
Less susceptible to data loss
Lighter, quieter and require less power than hard They can be connected to through cables or wirelessly
disks
Disadvantages
Function
More expensive than hard disks
Have a smaller capacity than modern hard disks
Makes decisions on messages being passed between the
Lower number of write cycles causing performance to
networks
diminish
over time
Reads information about the message and decides where
the message
should go and the best route for it to get
there
Flash Drives/Memory Sticks
Formats the messages making it suitable for the new
Otherwise called pen drive/memory stick/USB stick network
Can store several GBs of data and use solid state
technology
How it Works
Connected to a computer through USB port and power to
operate drawn
from host computer
To send data to a specific device, a router needs a
Some expensive software increasingly uses these storage
something like
an address
methods as a
form of security
Internet Protocol Address: a unique number assigned to
Uses
all
computers and devices connected to the internet
Used to transport files between computers
which can determine
its exact physical location
Used as a security device – a dongle – to prevent
A router can use this IP to send data from the internet to
software
piracy
the exact
device that requested it
Advantages
Storing IP Addresses:
Very compact and portable media
Routers store IP addresses in a routing table
Very robust
Routing tables list all the different routes to other
Disadvantages
networks
Not possible to write protect the data and files
Routing table determines best route for data
Small physical size and are easy to lose.
Lower storage capacity than hard disk
Sending Data between Devices
Flash Memory Cards Routers can also send ‘packets’ of data between devices
on different
networks
A form of electrically erasable programmable read only
Each packet contains the data itself and the IP address of
memory (EEPROM)
the
device being sent to
Uses
Occurs globally using multiple routers & re-routing until
Used to store photos on digital cameras
the data
reaches its intended IP address
Mobile phones use them as memory cards
Used in MP3 players to store music
Used as a backup in hand held devices 4.2. Common Network Devices
Advantages
Very compact Network Interface Cards
Very robust
Disadvantages Used to connect individual computers/devices to a
Very expensive per Gb of memory when compared to network
hard drive disks NICs come in two distinct types:

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Wired: cards that have ports which allow network Wi-Fi


cables to be
plugged in directly
Wireless: cards that connect to networks using Wi-Fi Any system which allows you to connect to a network or
signals computer
through wireless communication
Examples:
WLANs
Hubs PDAs
Laptop computers
They are devices that can have multiple devices Peripheral devices such as printers
connected to them Wi-Fi Hotspots
Main task is to receive data from different ports and send Wi-Fi systems rely on AP (radio frequency technology)
it to
each device to enable
the device to receive and send signals
The information will be received to the device whether its Wi-Fi hotspots are places where you can access Wi-Fi
relevant,
or not (free or
paid)
Hotspots are found in public places like Airports,
hotels, and
cafés
Bridges War driving: The act of driving and searching for
unsecured
Wi-Fi hotspots
It connects 2 different types of networks together e.g. a
This gives a risk to the Wi-Fi system
bus and
star network
It can only connect networks that use the same way for
handling
messages Bluetooth
They do this by changing the form of message to suite the
different
type of network Bluetooth is an example of wireless personal area
networking (WPAN)
technology
Spread spectrum transmission (radio waves) is used to
Switches provide
wireless links between to devices such as mobile
phones and allow
connection to the internet
More efficient than hubs in distributing data
A small home network can be created with this system
Each device has an access control media address MAC
Uses
which identifies
it uniquely
Transfer photos from camera to mobile phone
MAC Address: a number unique to each device connected
Wirelessly connect different external devices
to the
network (like fingerprints)
Data sent will have a mac address which tells the source
and
receiving device 4.4. Accessing the Internet
User can access by web browser
Modems
Type of access Description
It stands for modulator demodulator. Slowest type (60kbps), Telephone
Converts computer’s digital signals (modulates it) into Dial up internet access line gets tied up while a dial up
analogue for
transmission through telephone lines modem is in operation
Reverse this process- analogue signal from a telephone Local cable television operators
line into
digital for a computer to process the data Cable internet access give user access through cable
(demodulates it) networks
The main use it to connect to computer networks over
Fastest download speed
long distances
using existing telephone lines Internet access via DSL
connections (at least 11000kbps)
Types of Modems:

Dial-up modems: operate at 60 kilobits/sec


4.5. Web Browser
slow compared to modern standards
Software used to retrieve, present & traverse the World
Asymmetric: faster at downloading than uploading
(ADSL) asymmetric digital subscriber line modems Wide Web
operate at
11,000 kilobits/sec World Wide Web: system of interlinked hypertext
documents
accessed via the Internet
Don’t tie up line while accessing internet, which allows
simultaneous internet access and usage of telephone
Cable modems: allow cable TV users to receive TV signals
HTTP Proxy Server
as well as
internet access
Type of server that acts as a buffer between a WAN and a
4.3. Wi-Fi & Bluetooth LAN

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Retrieves web pages and passes them onto the computer File Sharing
that made a
request Entertainment
Stores any page retrieved on the server, which means Video Conferencing
that when a
different computer requests the same page it Online Banking
would be available Advertising & Blogging
Speeds up the browsing process Social Media

Websites Intranet

Web is made up of millions of websites and web pages Like the internet but only accessible to specific users
Web pages are documents on a computer screen Basically, a private internet where outsiders cannot
containing various
multimedia and text, pictures connect to it
A website consists of many of these pages linked together Uses of an Intranet:
Web Browsing
Email
Uniform Resource Locator (URL) File Sharing
Schools: share information and learning resources
Web browsers use URLs to retrieve files with students
They are multiple ways of locating on the internet Businesses: share private information within a large
Standard form: 4 numbers e.g. 194.106.220.19 company
securely
Alphanumeric form:
protcol://web address/path/filename
Where; Protocol is usually http Comparing Internet & Intranet
Site address consists of: computer name, domain
name, domain
type, and country code Internet Intranet
Path is the web page Phrase Internal Restricted
Filename is the item on the page International Network
Origin Access Network
Purpose Globally share data Privately share data
4.6. Email Specific company or
Audience Wide range of people
organisation
A method for sending text and attachments from one
Anywhere if you are Only from within the
computer to
another over a network Access
connected company
Advantages
Speed of sending and receiving replies is quick
Low cost (no stamps, paper etc.)
Not needing to leave home to send the mail Local Area Networks (LAN)
Disadvantages
Possibility of virus threats and hacking Not over a large geographical area (e.g. in one building)
Typical LAN will consist of several computers and devices
Need for the email address to be correct
Inability to send bulky objects via emails Devices and computers will be connected to hubs or
switches
One of the hubs or switches will usually be connected to
4.7. Internet Service Provider (ISP) a
router/modem to allow LAN to connect to the internet
In doing so it then becomes part of a wide area network
These are companies that provide users with access to Advantages
the internet The sharing of resources
Provider in return for these services is charged a monthly Communication between users
or annual
fee Network administrator can control and monitor all
After paying this fee, a username and password are aspects of the
network
issued which can
be used to connect to the internet Disadvantages
Easier spread of viruses throughout the whole
4.8. Common Network Environments network
Development of printer queues
Slower access to external networks e.g. internet
Internet
Increased security risk
A worldwide collection of networks and computers that If main server breaks down, usually the networks will
have joined
together no longer
function
Uses of the Internet:
Web Browsing
Email
Wireless LANs (WLANs)

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Do not involve any wiring or cabling Advantages Disadvantages


Provide wireless network connection overs a short
Have larger keyboards Require keyboard and mouse
distance
making it easier to type on as extra peripheral devices
They use radio or infrared signal's instead of cables
Screens are larger so giving
Devices known as Access Points (APs) are used for a Screen and Monitor consume
an easier and better viewing
larger range separate power.
experience
APs usually use spread spectrum technology (larger
range) Cannot usually connect to
Usually use wired internet
Advantages devices like Bluetooth
connections which is more
All computers can access the same services and speakers without external
stable/reliable than Wi-Fi
resources adapter
No cabling is involved Robust Take up large desk space
The system is more flexible Good heat dissipation- large
Adding new computers and devices is very easy
Bulky to carry around
body.
Cost is reduced, and safety is improved
Disadvantages TABLET COMPUTERS
Security is an issue
Problems and interference can affect the signal
Advantages Disadvantages
The data transfer is slow than in the wired LAN
Smaller & lighter than
Larger & less portable than
desktops & laptops making it
smartphones
Wide Area Networks (WAN) easier to carry
Uses Wi-Fi to connect to the
Larger screen than
WAN is formed by several LANs being connected through internet which is less reliable
smartphones
a router or a
modem than wired
Some companies set up Private WANs, it is expensive On-screen keyboards larger Screens are smaller than
however it comes
with a more enhanced security than those on smartphones those on laptops & desktops
It is common to use an Internet service provider (ISP) for
On-screen keyboard is not
connections to the internet and communicate via this
easy to type on
network system
Additional hardware is needed for a WAN: Routers,
modems and proxy
servers
MOBILE PHONES

Advantages Disadvantages
4.9. Using Different Types of Computers Smallest most portable of all Websites are often not fully
to Access the Internet devices displayed
People more likely to carry Small screen size makes
LAPTOP COMPUTERS this wherever they go viewing websites difficult
Much easier to connect to Small keyboards make it
Advantages Disadvantages internet on-the-go difficult to type
More portable than desktops Allow children access to
Less portable than
can access internet in more internet anywhere; can be
tablets/smartphones
locations dangerous
Larger screen than tablets & Screens not as large as
smartphones which allows desktop PCs may not appear
4.10. Network Security Issues
easier reading as clearly
Keyboards are bigger than Connection to a network exposes a user to:
CPUs are not as powerful as
those on Hacking: Unauthorised access
given to computer.
those in desktops
tablets/smartphones Phishing: Phishing involves
getting sensitive
Touchpads allows easy information such as usernames, passwords, and
navigation even on slanted credit card detail, for malicious reasons, by mimicking
surfaces a
reliable webpage on the network
Pharming: Explained in chapter 8 card 2 (E-Safety)
DESKTOP COMPUTERS Viruses: Explained in chapter 8 card 2 (E-Safety)

Advantages Disadvantages
Policing the Internet
Most websites are designed Not portable so are limited to
to be viewed on a desktop use in one room
Currently, the internet has no boundaries
Anything and everything can be put online

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

For Policing: or barcode that authenticates the user.


Prevent illegal material being posted
People can easily find info on how to become hackers
or make
bombs
Prevent children from accessing undesirable websites
Could reduce the amount of incorrect information
Against Policing: Passports: Have an RFID chip on it that
Material already available in other sources i.e. books
Very expensive responds to a signal sent by a RFID reader that sends
Users would have to fund information about
the passport holder to the computer
Difficult to enforce rules system
Against freedom of information
Physical Tokens: A security token
Laws already exist to deal with perpetrators
(sometimes called an authentication token) is a small
hardware
device that the owner carries to authorize access
Inappropriate Websites to a network service.
The device may be in the form of a
smart card or may be embedded in a
commonly used object
Risk of finding undesirable websites
such as a key fob.
Risk of doubtful websites which are not genuine
They could lead to problems such as undesirable web Retina Scans: Scans the
links, security
risks
unique pattern of blood vessels in the
eye of a user using an
unperceived beam of low-energy infrared
light into a
4.11. Password Interception
person's eye as they look through the scanner's
eyepiece.

Spyware Iris Scans: A scanner scans and

Spyware is software that gathers user information compares the pattern in the iris of a user to a database of
through their
network connections without them being stored iris
patterns, if it finds a match, the user is
aware that this is happening authenticated. Iris scans are
generally more accurate than
Once spyware is installed, it monitors all key presses and retinal scans.
transmits
the information back to the person who sent
out the spyware Face Recognition: Verifies the face of
This software can install other spyware software, read
the person attempting to access the data using a face
cookies and
personal information, and change the default
recognition
algorithm and identifies facial features by
home page or web
browser
extracting landmarks, or
features, from an image of the
Anti-spyware can be used to search out this software and
subject's face.
correct the
corruption
Fingerprint Scanning: Scans the pattern

Weak & Strong Passwords on fingers and verifies it against a stored database of
authenticated
fingerprints using pattern-matching software
Strong passwords: A random mix of alphabets (uppercase to allow access to a
user.
and
lowercase), numbers, and keyboard symbols (@, %, ^
etc.)
Weak passwords: Easy to guess, e.g. users name or date
4.13. Data Protection Act
of birth or
1234556, etc.
Failure to abide to rules can lead to fines or
Frequent password changes can help reduce the chances
imprisonment
of password
interception too
Passwords must not be shared; their strength is then of
little use.
Rules (SAREF DES SAS)

4.12. Authentication Techniques 1. Data must be Fairly and lawfully processed


2. Data can only be processed for the Stated purpose
Magnetic Stripes: Card swiped through a 3. Data must be A**dequate, Relevant and not Excessive
4. Data must be Accurate
magnetic stripe reader that authenticates the user after 5. Data must not be kept longer than necessary (Short
reading
iron-based magnetic particles on a band of magnetic time)
material on
the card which is also called a magstripe. 6. Data must be processed in accordance with the data
Subject’s right
ID Cards: Usually a photo ID with a QR
7. Data must be kept Secure

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

8. Data must not be transferred to another country Fax Email


unless
(Domestic) they have adequate protection Delay is telephone line busy Better quality
Files can be transferred
Slow if several documents
Guidelines between any device
need to be sent
connected to the internet
Do not leave personal information lying around Faster sending of documents
Every recipient must be
Lock all filing cabinets when leaving an office per document and even if
dialled up one by one
Do not leave computer without locking or logging off multiple recipients
Protect passwords Expensive to buy No dedicated device needed
Change passwords regularly
Do not fax or email anything of sensitive nature.
4.15. Web-Conferencing
4.14. Network Communication Video-Conferencing
Facsimile (Fax) This is a method of communication between people at 2
or more
separate locations
A system that scans documents electronically and It is done in real time and makes use of LAN, if internal, or
converts them into
a bit map image (a bit is a binary digit WAN if
through the internet
and is a 1 or a 0) Uses hardware like; webcam, microphones, speakers and
Then transmitted as a series of electrical signals through monitors
the
telephone network It also uses special software like CODEC converts and
Receiving fax machine converts the electronic image and compresses
analogue data into digital data to send down
prints it
out on paper digital lines
It is also possible to generate fax signals from a computer How it works:
to allow
documents to be sent to a fax machine Delegates at one end speak into a microphone and
Saves printing out the document first and then passing it consider the
webcam
through
the fax machine The other delegates can see them and hear them
Fax/modem software in the computer converts the image using speakers
and monitors
into a form
fax machines can be recognized However, there are several problems with these as
Physical Faxing: dedicated fax machine connected via the conference
call often lags and quality not always
telephone
line that copies and electronically sends files to high.
the dialled
recipient Also, as travelling tickets increase in price, terrorists
Electronic Faxing/Online Faxing: uses the internet to send can
use this way of communicating with each other,
documents through computers. increasing risk

Physical Faxing Electronic Faxing


Associated with a phone no. Associated with an email Audio-Conferencing
Only address and phone no.
Need actual fax machine, Cheaper- no fax machine, Same as video-conferencing but without webcam
paper, etc. paper and ink VOIP is often used
No encryption Better safety- encryption VOIP (Voice over internet protocol) is a method used to
talk to
people over internet
The signal can get busy No busy signal issues
VOIP converts sound (picked up by a microphone) into
discrete
digital packets that can be sent to a destination
via internet
Email Advantage: free and can be used all over the world
Disadvantage: sound quality is usually bad
A method for sending text and attachments from one Security Issues:
computer to
another over a network Identity and service theft
Viruses and malware
Spamming (sending junk mail)
Comparing Faxing & Email Phishing attacks (illegitimate scams)

Fax Email

Singed faxes are legally


More secure (user id and 5. The Effects of Using ICT
password needed to access
acceptable
files)
Digital files (no need to print
5.1. Effects of IT on Employment
Poor quality prints at times
– eco-friendly)
IT led to unemployment in many areas

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Manufacturing - robots have taken over many tasks Repetitive Strain Injury (RSI)
and are much
faster
Computer controlled warehouses – automatic, does This is when joints such as the shoulder, wrist or fingers
not need people swell,
causing pain
Labour intensive work - printing industry and filing Damage gets worse if left untreated
New jobs have been created in ICT Can lead to hand/arm immobility
Writing software
Maintenance of robots Causes Prevention
Internet related jobs Typing for extended periods
Take periodic breaks
of time
Effects on People:
Use ergonomic keyboard &
Typing with incorrect posture
People need to be retrained due to new technology mouse
Cleaner working environment Clicking on mouse
Use a wrist rest
De-skilling of workforce rapidly/extendedly
Computers can now do tasks that required high skill level Ensure sufficient space for
Safer working environment Holding mouse incorrectly
comfortable work
Fewer manual tasks such as heavy lifting
Working in a cramped space
Effect on Companies:
Back Problems
Can employ less people
Robots do not take holiday, get sick or need breaks Headaches are a potential consequence
Greater consistency in products made
Causes Prevention
5.2. Effects of IT on Working Patterns Not sitting upright while
Take periodic breaks
working
Part-time working: A contract where someone works Use adjustable chairs with
Sitting with poor posture
fewer hours
per week than a full-time employee, in shifts. good back support
Flexible working (flexi-time): Workers can choose their Working in a cramped space Sit upright with good posture
working
time but will have to complete the day’s work. Incorrect computer screen
Job sharing: Two or more part-time workers divide their Keep feet flat on floor
positioning
job,
replacing one full-time worker.
Compressed hours: Employees can work longer hours per
Eye Problems
day but
over fewer days, completing the workload
sooner.
Headaches are a potential consequence

5.3. Microprocessor-Controlled Devices Causes Prevention


Staring at a computer for
in the Home extended periods of time
Take periodic breaks

Working with poor room


Positive effects Negative effects Use TFT rather than CRT
lighting
Lead to more leisure time
Computer screen glare/flicker Use anti-glare screens
since devices can be Unhealthy diets
programmed to do tasks Dirt can cause eye strain Ensure good room lighting
People become lazy and rely No direct light on screen
More time to socialize
on devices Clean dirt
Becoming very sophisticated
Dependency on technology
and can make use of
embedded web technology
increases 6. ICT Applications
More wasteful society since
Save energy - switch off
automatically
devices thrown away if they 6.1. Communication Applications
fail, not economic to repair
Easier to program device Newsletters
Leaving on standby wastes
rather than set timings &
resources
dates manually Paper-based communication used to inform people
about their
interests
Schools use these to inform parents about events/dates
5.4. Potential Health Problems
Advantages
Released regularly

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

The recipients have a permanent copy Music notes are automatically printed out in the correct
Disadvantages format
Requires distribution
There are no special effects; sound/video/animation  
There are printing costs; paper/ink
Cartoons
 
Animations can be produced using computer hardware
Websites and software
With 3D animations objects are designed on a computer
Collection of webpages, text, graphics, video and sound and a 3D
skeleton is produced
Hosted on a web server on the internet Parts of the skeleton are moved by the animator using
Need to write code or use a web authoring application key frames
Hyperlinks to other pages can be added The difference in appearance of the skeleton in these key
Interactive websites require programming knowledge frames is
automatically calculated by the software and is
Can use a camera, scanner, microphone to input data known as tweening or
morphing
Usually hire space from web hosting company The final stage is to make a realistic image by a technique
Advantages known as
rendering
Ability to add sound/video/animation
Links to other websites/hyperlinks  
The use of hot spots
Buttons to navigate/move around the website Flyers & Posters
Hit counters to see who has visited the websites
Disadvantages A Word processor/Desktop publisher is used to create it
Can be hacked and modified or viruses introduced Need to hold minimum amount of information and be
Need for a computer and internet connection accessible very
quickly
Lack of portability compared with paper-based system Need to make an immediate impact when people look at
Need to maintain website once it is set up them
Anyone can produce them but there are highly skilled
  professionals
who can produce expert posters
Some posters require larger printers than A4
Multimedia Presentations Sequence in which a flier or poster is produced on a
computer system
Uses a mixture of media to present information: A word processor or DTP application is opened
animations, video,
sound, transitions, hyperlinks The user creates frames, boxes and text boxes
Produced using software packages If necessary, photos are taken, using a camera
Used with a projector so large audience can view The images are uploaded from the camera, loaded
Advantages from a CD/DVD,
scanned from hard-copy photos or
Use of sound and animation/video effects downloaded from the internet
Interactive/hyperlinks built into presentations The photos are saved to a file
More likely to hold audience’s attention The photos are imported or copied and pasted into
Disadvantages the document
Need for special equipment – expensive The photos are edited and typed in or imported from
May require internet access a file and
then put into required style

   

Music Scores Mobile Phones

Music samplers and mixers allow original tracks that were Wireless devices that allow users to make phone calls
recorded
in a studio to be modified from anywhere
with cell reception
Electronic instruments can play back through electronic They connect to the telephone system using radio signals
effects
machines This requires them to be in range of a mobile tower
Synthesizers combine simple wave forms to produce Used for communication via
complex music
creations Phone calls
Electronic organs can mimic any other instrument Text messaging
Music scores can be generated from music itself using Social Media
software
Software can automatically correct music notes in a score  
There is no need to understand music notation to write a
music score Internet Telephony/VOIP

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

VOIP (Voice over internet protocol) is a method used to Are you asking for sensitive information?
talk to
people over internet People may not feel comfortable being truthful
VOIP converts sound (picked up by a microphone) into What names do you want?
discrete
digital packets that can be sent to a destination First name, family name etc.
via the internet Date of Birth
What format do you want it in?
  Give instructions about how to answer questions
How will the data be collected?
Publicity & Corporate Image Paper surveys are scanned using OMR or OCR
Advantages
Publications Faster to get results
Fewer errors
Business Cards:
It is easier to do statistical analysis
Miniature printed documents that provide
Less expensive to carry out; requires fewer people
information about the
business/organisation
Online questionnaires
Usually printed on thick cards
Usually use radio buttons
Easily distributable to potential clients
No data preparation needed
Information includes company logo, services, address,
Results sent directly to database for analysis
contact
numbers, email, website
Gives a professional impression  
Letterheads:
Found at the top of official printed documents to be Address Lists
mailed to
clients or for internal use
Makes it clear to reader who the sender is An address book on a computer or mobile phone might have
Information includes company logo, name, address, a contact’s
home address, phone number, email address,
contact
numbers personal information like the
date of birth etc.
Gives a professional impression
Easy to reply to
Flyers:
Generally printed on single sheets of A4 paper
Handed out directly to people for promotions
Cheap to produce and easily distributable (locally)  
Information includes company logo, promoted
product or service,
contact details Clubs & Society Records
Makes it easier to target a specific audience
Brochures: Need to keep a record on members usually in a database
Also called leaflets & are like flyers Usually payment details, contact details and interests
Difference is that they are often folded into sections It makes it easy to match people with interests and send
Left on counters for pick up rather than handed out information
about what they are interested in
Information includes company logo, promoted This can be done my using mail merging
product or service,
contact details Easy to check memberships and send out reminders
Makes it easier to target a specific audience It is important to follow the data protection act

 
6.2. Data Handling Applications
School Reports
Surveys
Database applications such as SIMS store large amounts
All data handling starts with data collection of data which
can be used to create annual and termly
Data capture forms can be used for many applications
school reports
Decide what needs to be collected and then what Things able to be gathered from here are:
questions should
be used to collect it Data individual to student – tests/exam results
Paper or electronically Student progress – target grades being met or not
Rules for creating forms Number of absences – create a percentage of amount
Make them look official of days
attended school
Spaces should be thought about giving enough space Teacher comments – adds comments on to report
for answers
Restrict the amount of possible answers, do not use
open
questions 6.3. Measurement Applications
If open questions are used limit the amount of space
available
for answers Sensors are used to send data to a computer where the
Asking for ‘Name’ needs to be carefully thought about data is
processed

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

The computer simply reviews the data from the sensors The oxygen levels and acidity levels are compared to the
(by comparing
it to data stored in memory) and updates historical
data stored in memory and they are also
its files and/or gives a
warning signal if the values are compared to alarm levels
stored in memory
outside given parameters One of two things will now happen: either the data is
No changes to the process are made transferred to
a CD/DVD or to a memory stick and taken
Examples: away for analysis later or
the computer is connected into
Scientific experiments a mobile phone network and transmits
the data back
Weather stations automatically to the monitoring station

   

Analogue & Digital Data Intensive Care Units in Hospitals

Digital data: discrete, fixed value (used by computers) Sensors read key vital signs (such as pulse/heart rate,
Analogue data/signals: continuous value that varies temperature,
blood pressure, respiration, etc.)
smoothly The data from the sensors is converted into digital using
Analogue device = measure length, weight, an ADC
temperature etc. The data is stored in the computer memory
E.g. Thermometer – represents temp. by the height of The computer compares the data from the sensor with
the liquid
column the values
stored in its memory
Sensors: measure physical and analogue qualities The results are output on a screen in the form of graphs
Analogue data from sensors needs to be converted into and/or
digital read-outs
digital data
using an analogue to digital data converter An alarm is activated if any of the data is outside
(ADC) so that the
computer can understand and process acceptable
parameters
the data from the sensors The system continues to monitor the patient until the
If the computer sends signals to motors, valves, etc. then computer is
turned off
this data
also needs to be converted to analogue using a
digital to analogue
converter (DAC) so that the computer  
can effectively control these
devices
Advantages of Using Computers in
 
Measurement
Analogue to Digital Converter (ADC)
The computer will not forget to take readings
Used when you want to attach an analogue input device The computer’s response time is much faster, which is
to a digital
device such as a computer. particularly
important in the patient monitoring example
This is so the analogue data can be Doctors, nurses, scientists, etc. can all get on with other
understood/processed by the
computer since computers tasks
while the monitoring is done automatically
only work w/digital data Computer give 24 hours cover every day (i.e. 24/7)
E.g. When processing data sent from a sensor The readings will tend to be more accurate
Readings can be taken more frequently if they are done
  by a computer
and sensors
It could also be safer if whatever is being monitored may
Digital to Analogue Converter (DAC) have
potential hazards (e.g. children falling into the river
whilst
attempting to take readings)
Used when you want to attach an analogue output device
to a digital
device such as a computer  
E.g. If the computer is being used to control a device
(motor/valve)
the device will be controlled by variable Disadvantages of Using Computers in
voltages; the DAC will be
used to send out analogue
signals Measurement

  Expensive to purchase and set up


If performed for educational purposes, reduced practical
Pollution Monitoring hands-on
experience and learning.
Will not function in a power cut if no backup power
Example: monitoring oxygen levels in a river present
(expensive to have reliable backup power)
Sensors read data from the river (oxygen levels and
acidity levels
using a pH sensor) 6.4. Microprocessors in Control
The data from the sensors is converted into digital using
an ADC Applications
The computer stores the received data

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Sensors are used to send data to a computer where the Software to make decisions which will allow the
data is
processed clothes to
be washed
The computer reviews the data from the sensors (by Time taken before next inputs
comparing it to
data stored in memory) Timer as part of the software
If the values are outside the given parameters/pre-set Time different cycles (when to add
value it acts
to try and get the values within acceptable soap/conditioner/etc.)
ranges Time delay in measuring temperature
It does this by sending signals to devices controlling the Needs to be time for changes to have effect
process Unmanageable situations
Door may not be shut
  Needs to draw user’s attention
Usually a buzzer and light
Turtle Graphics
 
Based on computer language called LOGO and is now
usually known as
turtle graphics Central Heating System
It is the control of the movement of a ‘turtle’ on a
computer screen
by several key instructions which can be Applying factors
typed in Inputs
The use of ‘repeat’ instructions makes a piece of code Inputs from the user
more
efficient Room temperature required
Time systems turns on/off
Command Meaning Inputs from the system
FORWARD x Move x cm forward Actual room temperature
BACKWARD x Move x cm backward Clock giving the time
Outcome
LEFT d Turn left through d degrees
Heating or cooling room during the required times
RIGHT d Turn right through d degrees Outputs
REPEAT n Repeat next set of instructions n times Boiler
ENDREPEAT Finish the repeat loop Air conditioner
Processing
PENUP Lift the pen up
Check time against the one input and switches on
PENDOWN Lower the pen when that
time is reached
Same done to check when to turn off
  When on, microprocessor reads temperature from
sensor and
compares it with desired temperature
Automatic Washing Machines If too low, it will heat up by turning the boiler
on and
if it’s too high it will turn the air
Have a microprocessor in them which contains the conditioner on
software which
controls the washing machine These will stay on until desired temperature is
Appling the factors reached
Inputs
Pressure sensor on the door to detect if open or  
closed
Sensor to detect if the required level of water is in Automatic Cookers
Temperature sensor to check temperature
Outcome Have temperature sensors and timers with manual
Clothes have been washed controls to set
start and end times, and temperature for
Outputs cooking.
Heater Working similar to Central Heating System.
Motor to spin drum
Lights on machine to show user stage the cycle is  
at
Actuators to turn the inlet valves on to allow hot Burglar Alarms
and cold
water into the machine
Actuator to turn the outlet valve on to let the Burglar alarms detect any intrusion.
water out of
the machine when the wash is Sensors such as motion sensors, door and window
complete sensors,
magnetic sensors, multi-functional sensors
An actuator to control the pump (vibration, shutter,
and temperature) measure the
Processing physical quantity and inputs the
value to a
microprocessor.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

The microprocessor compares the input values with When making a computer model, consider:
the preset
values, if changes are detected, the What and how data should be collected
microprocessor sends
signals to the actuator Working of the system in real life.
The actuator activates the sirens or gives a phone call
or
messages the input mobile number. 6.6. Applications in Manufacturing
  Industries
Glasshouse Robotics
Temperature controlled the same as central heating
Robots are used in many areas of manufacturing, from
system heavy work
right through to delicate operations e.g. car
Humidity must also be controlled bodies, welding
bodywork, manufacturing of microchips
Humidity sensor tells computer how humid it is
etc.
Computer then decides to turn the water supply to Control of robots is either through embedded
sprayers microprocessors or
linked to a computer system
Windows also operated by the computer Programming of the robot to do a task is generally done
Need to find the balance of how often to have
in two ways:
windows open The robot is programmed with a sequence of
Blinds that can be computer controlled instructions which
allow it to carry out a series of
Light sensor measures light intensity
tasks
When sun is strong the computer actuates electric Alternatively, a human operator manually carries out
motors which
close blinds a series of
tasks and how each task is done is relayed
Control in glasshouse is more likely to be used in
back to the robot
(embedded processor) or
commercial areas
or large glasshouses not in gardens controlling computer. The sequence of
instructions is
remembered so that the robot can automatically
6.5. Modelling Applications carry out each task identically each time (e.g.
assembling parts
in a television)
A mathematical computer model is created to manipulate Robots are often equipped with sensors so they can
variables
and see real time changes in terms of figures. gather important
information about their surroundings
Used to find how mechanisms control a system. Sensors also prevent them from doing ‘stupid things’,
Advantages: such as
stopping a robot spraying a car if no car is
Cheaper than building physical system to test present, or stopping
the spraying operation if the supply
Safer than building system and experimenting of paint has run out etc.
Easier to experiment with various scenarios Robots are very good at repetitive tasks
Quicker as no need to build system However, if there are many different tasks (e.g. making
Near-impossible tests involving space and volcanic specialist
glassware for some scientific work) then it is
scenarios
can be modelled risk-free often better to still
use human operators
What if analysis can be conducted that allow a certain
figure to
be computed by letting the computer change Advantages
other variables that
affect the value needed to be set.
E.g.
Robots can work in environments harmful to human
operators
The can work non-stop (24/7)
They are less expensive in the long term (they don’t need
wages)
however they are expensive to buy initially
Productivity is higher, since they do not need holidays,
are not ill
etc.
There is greater consistency – every car coming off a
production
line is identical
They can do boring, repetitive tasks, leaving humans free
to do more
skilled work

Disadvantages

Robots find it difficult to do ‘unusual’ tasks (e.g. one-off


glassware for a chemical company)
They replace skilled labour, leading to unemployment
Since robots do many of the tasks once done by humans,
there is a
risk of de-skilling

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Because robots are independent of the skills base, Advantages Disadvantages


factories can be
moved anywhere in the world, again Unauthorised access will
causing unemployment Reduced workload for have to be prevented as
teachers. there is lots of personal
6.7. School Management Systems information.
They are helpful for the
Learner registration and attendance decision making of the
ID cards with magnetic tapes: The students will have administration department
to
swipe their ID cards, which contain the student’s
name, school’s
name, date of birth and the
registration ID, when they enter and
leave the school, 6.8. Booking Systems
this way time is saved and the attendance is
more
accurate. Booking systems are used for transport (flights, trains
Biometrics: Every student’s fingerprint is stored on a and buses),
cinemas and theatres
database along with their personal information, the
Theatre booking system example:
students
must put their finger on a fingerprint
scanner to enter or leave
the school premises. Customer clicks on performance they wish to see
They enter date and time of performance and required
Advantages Disadvantages number of seats
Fingerprints are unique, so A seating display at theatre is then shown on screen and
another student can’t give Collecting every student’s user clicks
where they want to sit
their attendance for fingerprint initially is time- Database searched to check availability of selected seats.
somebody else, like with an consuming. If
seating plan shown on screen, this isn’t required
ID card. If seats available, seat numbers are shown together with
Fingerprint scanners are total price
ID cards can be lost, whereas
more expensive than If customer is happy with this, they select ‘confirm’
fingerprints can’t be.
magnetic stripe readers. The seats are now temporarily set at ‘no longer available’
Magnetic fields can affect an Damages on the finger will The customer then enters their personal details or
ID card. deny access. indicates that
they are a returning customer
There is an invasion of They select a payment method and make the payment
Copies of ID cards can be The theatre seats are then booked in the customer’s
privacy in storing fingerprints
made easily. name
on a school database.
The final details are shown on the screen, together with a
reference
number
Learner performance
An email is sent to the customer which they print out as
Spreadsheets can be used to record students’
their proof
of purchase. In some cases, this also acts as
performances. It is
easier to compare each other’s
their printed ticket
when they go to the theatre – an e
performances and an individual
student’s
ticket
performance over the academic year.
The database is updated with the transaction
Organising examinations
Makes sure that the students are enrolled for the

right exams. Disadvantages


Advantages
Prints the exam timetables.
No double booking as very Set-up and Maintenance
Allots examination rooms and the invigilator.
minimal delay. expensive
Gathers the results and puts them into the student
database. Immediate booking and Computer and reliable
Creating timetables and managing teaching selection of seats internet access required
cover/substitution Sever crashes can result in
Bookings can be made any
Considers the student’s choices, availability of the bookings completely
time
teachers and
rooms, subject clashes and the number stopping
of hours needed for each
subject to produce accurate Digital ticket; printing and Need for website to be well
timetables that can easily be made
changes to and postage costs designed to ensure ease of
cover with teacher to be substituted. reduced/eliminated use
School management systems: QR codes for authentication; No special relation built with
no need for human, can use booking agent who can give
Advantages Disadvantages
scanner; reduced costs special promotions etc.
Absenteeism can be Operating the software will
addressed more easily. need some training. in
booking seats if the response is not immediate then can
The initial cost of the cause
problems like double booking)
Parents are kept updated.
software is expensive.  

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Real-time Process Control Patient identification: Barcodes on wristbands of the


patients
can be used to access their patient record.
An example of online processing Pharmacy records:
Very different to real-time (transaction) processing Generates labels for drugs
System usually involves sensors and feedback loops Checks if the patient is allergic to a particular drug.
In real-time process control, physical quantities are Patient monitoring:
continually
monitored and input is processed sufficiently Sensors measure changes in temperature, heart rate,
quickly to influence
the input source breathing
rate, brain activity, blood pressure, blood
sugar levels and
oxygen levels in the patient’s body.
The analogue signals from the sensors are converted
6.9. Banking Applications
into digital
signals using an analogue to digital
converter.
Online banking systems rely on the ability to update files
Graphs are produced to show trends over time.
immediately, thus preventing double booking, which
The readings are constantly compared with the pre-
could happen if
the system response time was slow
set values, if
the values aren’t in the prescribed range,
The use of computer technology has revolutionized how
the medical staffs
are notified.
we do our
banking transactions, for example:
Hospital management system: All the above-mentioned
Internet banking
points come
under the hospital management system
The use of automated teller machines (ATMs)
which holds all of them, and
can be used to access data
Chip and PIN technology
from all the departments.
  Expert systems:
The interactive screen asks a series of question for
Automated teller machines (ATMs) the doctor
to answers, using a keyboard or a touch
screen.
Automated teller machines (ATMs) are places where The inference engine compares the symptoms with
customers can get
cash (or carry out certain other the knowledge
base, using the rule base to find
banking activities such as order a
statement) using their matches
credit or debit card The system suggests the possible illness with a
probability of
each, cures and recommendations on
What goes on behind the the next step to be taken.
Sequence at ATM
scenes The explanation system will explain how that
Customer puts card into Contact is made with bank’s particular
diagnosis was suggested.
ATM computer Using 3D printers in medicine:
Surgical and diagnostic aids: A CT or MRI is used to
PIN is checked to see if it is
produce
images of the internal parts of the body. A 3D
PIN is entered using the correct
printer can then
be used to reproduce the internal
keypad Card is checked to see if it is
organs as a solid object.
valid
Prosthetics: 3D printers are used to print out artificial
A number of options are body parts such as false tooth, artificial limbs, hearing
given: change PIN, top up aids,
etc. This is a less expensive method of replacing
mobile, see balance, get body parts.
money Tissue engineering: Used to produce layers of cells to
The customer selects the replace damaged tissues.
cash option & several cash Design of medical tools and equipment: Tools can be
options are shown made
faster and with reduced costs. They can also be
The customer’s account is made changes to
easily, whereas it wasn’t the same
The customer accepts one accessed to see if they have with traditional methods.
of the options or types in a sufficient funds, it is checked
different amount to see if they are withdrawing 6.11. Computers in Libraries
more than their daily limit
The customer is asked if Many library systems are computer controlled
they want a receipt They usually involve the use of barcodes on the books
The card is returned Transaction is okay being borrowed
and on the borrower’s library card
Money is dispensed Customer’s account is updated The following describes a computerized library system
based on
barcodes
There are two files:
6.10. Computers in Medicine Book file, containing fields for example: barcode, book
title,
name of author etc.
Patient records: Database that holds patient details and Borrower’s file, containing fields for example:
can be
accessed from any computer within the hospital borrower’s
number, borrower’s name etc.
intranet.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

When a borrower takes out a book, the book’s code is Advantages


scanned
The book details are then found on book file Expert systems provide consistent answers
The borrower’s library card barcode is then scanned for They never ‘forget’ to answer a question when
the
borrower’s unique number determining the logic
The book file is linked to the borrower’s file and both files Using expert systems reduces the time taken to solve a
are
updated to indicate which book has been borrowed problem
and when it is due
back A less skilled worker force is needed, which gives the
The borrower’s file is interrogated daily by the computer potential of
saving money, but also allows areas of the
to see
which books are overdue for return: world access to expertise
which they could not normally
The computer reads a record from the book file afford
It compares the date due back with the current date
Disadvantages
If the date due back is less than (or equal to) the
current date
(i.e. earlier date) … They tend to lack common sense in some of the decision-
…using the barcode number of the book… making
processes
…the book file is linked to the borrower’s file… Errors in the knowledge base can lead to incorrect
…and the corresponding record is read from the decisions being
made
borrower’s file It can be expensive to set up in the first place
The customer details are then found and a letter or Considerable training is necessary to ensure the system is
email is
automatically sent out sued
correctly by the operators
The next record in the book file is then read…
…until the whole file has been checked  

6.12. Expert Systems Components of an Expert System

User Interface
These systems have been developed to mimic the
expertise and
knowledge of an expert in a particular field This is the only thing that the end user sees
Examples include: Allows the user to interact with the system
Diagnosing a person’s illness Often requires training to operate effectively
Diagnostics (finding faults in a car engine, finding
faults on a
circuit board, etc.) Knowledge base
Prospecting for oil and minerals
Tax and financial calculations This is a database designed to allow the complex storage
Chess games and
retrieval requirements of a computerized knowledge-
Identification of plants, animals and chemical based management
system (in support of an expert
compounds system)
Road scheduling for delivery vehicles
Inference engine

This is software that attempts to derive answers from the


knowledge
base using a form of reasoning
It is how expert systems appear to use human-like
reasoning when
accessing information from the
knowledge base in an effort to find a
conclusion to a
given problem
Expert System Setup
The inference engine is a type of reasoning engine
Experts in the field are interviewed to find out what is
Rules base
needed in
the expert system
Data is then collected from these experts This is made up of a series of ‘inference rules’ (e.g. IF the
A knowledge base is designed and then created country is in South America AND the language used is
The rules base is designed and created Portuguese THEN
the country must be Brazil)
The inference engine is designed and created These inference rules are used by the inference engine to
The input screen and output format are also designed draw
conclusions
and created –
this is known as the user interface They closely follow human-like reasoning
The expert system is tested against known conditions and
scenarios  
It is also checked to see if it meets the original
specification Suggesting Diagnoses
Experts are interviewed about how effective it is before
the expert
system goes out on general release The interactive screen asks a series of question for the
doctor to
answers, using a keyboard or a touch screen.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

The inference engine compares the symptoms with the Receipt is produced as proof of purchase
knowledge base,
using the rule base to find matches.
The system suggests the possible illness with a  
probability of each,
cures and recommendations on the
next step to be taken. Internet Shopping
The explanation system will explain how that particular
diagnoses
was suggested. Online shopping: Shopping over the internet.
To customer:
Advantages
6.13. Computers in the Retail Industry Cheaper goods (the company doesn’t have to pay
rent for
stores and doesn’t need more employees)
Automatic Stock Control Wide range of products
Delivery at your doorstep
Automatic stock control systems rely on the use of You can shop 24/7
barcodes Shop from any part of the world
Barcodes now appear on most products sold in shops You save the travelling costs of going for shopping
They allow quick identification of product details once the Disadvantages
barcode
has been scanned by a barcode reader Quality isn’t assured
Supermarkets use electronic point of sale (EPOS) People are worried about giving their card details
terminals, which
incorporate a barcode reader that scans online.
the barcode, retrieve the
price of the article and relay Packing and postal charges are added
information back to the computer
system allowing it to Personal services that you get from stores are
update its files missed.
Barcodes are made up of alternating dark and light lines Returning the products is harder
of varying
thickness No relaxation that you get from actual shopping
A number underneath the barcode usually consists of Bogus sites are present where you pay and never
four parts:
country code, manufacturer’s code, product receive the
product
code, and a check digit To seller:
The check digit is a form of validation which is used to Advantages
make sure
no errors occurred during the reading of the No need to pay rents
barcode No fixed working hours
Every time the barcode is read, this calculation is Less/no shoplifting
performed to
ensure that it has been scanned correctly Sell goods to customers anywhere in the world
Cheaper to contact customers (via e-mail)
 
Site warehouse where rental is cheap
Sell goods 24/7
Electronic Funds Transfer at Point of Sale (EFTPOS) Disadvantages
ICT knowledge needed to set up website
Many credit cards are equipped with a chip as well as a
Unemployment
magnetic
stripe – containing the PIN
Business abroad is lost if the prices are cheaper
This system is designed to enhance security since it is
there
better than
relying only on a signature
At times of network failures, there will be no
When paying for items using a chip and PIN card, a form
access
of
electronic funds transfer (EFT) takes place
Not everybody can access the internet, so a few
Paying for a meal example customers
are lost
Customer’s personal data can be hacked
Waiter inserts card into chip and PIN reader Postal charges discourage people at times
Restaurant’s bank contact customer’s bank
Card is checked to if valid 6.14. Recognition Systems
If card is stolen or expired, then transaction is terminated
Customer enters PIN using keypad
Automatic Number Plate Recognition (ANPR) systems:
PIN is read from chip on card and is compared to one just
A sensor sends signals to a microprocessor, which
keyed in
instructs a
camera to capture the front of a vehicle.
If they are the same, the transaction can proceed
OCR software is used to read the number plate from
Check is then made on whether they have enough funds
the image.
The characters are then converted to text
If there are not enough funds available, transaction is
format in order to
store it in a database
terminated.
Otherwise, transaction is authorized
Processing of cheques:
Authorization code is sent to restaurant
The value of a cheque is printed in special ink
Price of meal is deducted from customer’s account
containing iron
particles when a cheque is presented.
Same amount of money is credited to restaurant’s bank
MICR is used to read the characters at the bottom of
account
the cheque.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

A batch processing method is then used to process all Barge: Both the employee and the customer can hear
the
cheques at the end of a specific time period. the
manager
OMR media in schools: Employee call monitors: Allows the employer to listen to
School registers: Paper-based registers are fed into employee’s telephone calls. Call monitors can be used:
OMR to
be scanned and are then stored on a to improve the employee’s performance
database. to allow the manager/supervisor to join a call where
Multiple-choice examination papers: The position of a necessary
mark
is stored in a computer’s memory after being as a training tool
read by the OMR
device using a template that maps Uses of Automatic Number Plate Recognition (ANPR)
out the X-Y coordinates of
each lozenge (pen/pencil systems:
mark). Traffic enforcement: the system can check if a vehicle
RFID in passports: is
taxed, recognize cars parked illegally, cars speeding
The data on the RFID chip is read when the passport or going
through red lights so a fine can be imposed.
is scanned. Car park management: the system reads the
A photo of you is clicked which is then compared with registration
number and if allowed into the car park,
the image
stored in the RFID chip. the barrier is raised.
If the face-recognition passes, some checks are made Electronic toll collection: the system recognizes the
in turn to
make sure you are eligible to enter the vehicle and deducts the fare accordingly.
country, and if you are,
the gate opens automatically.
RFID in contactless payments:  
The embedded chip on credit/debit cards and the
antenna enable
customers to wave their card over a Cookies
reader at the point of sale
terminals to make
payments Cookies are small files sent to a user’s computer via their
Smartphone apps can also be used to make web
browser when they visit certain websites
contactless payments. They store information about the users and this data is
accessed
each time they visit the website
For example:
6.15. Monitoring & Tracking Systems They remember who the user is and send messages
such as “Welcome
Sarah” each time they log onto the
Public monitoring/tracking: website
Ankle monitor: uses RFID chip to give out the person’s They recognize the user’s buying preferences e.g. if a
location and other details. It is tamper proof and will user buys
CDs, pop ups related to their buying habits
alert
authorities if tried to remove. will appear on the
user’s screen each time they visit
Phone call tracking: the service provider tracks the the website
calls
and the exact position from which they were Without cookies, web server would have no way of
made knowing that the
user had visited website before
Worker monitoring/tracking: Workers are For this reason, cookies could be used to monitor one’s
monitored/tracked in the
following ways: internet
activity
Supermarket workers: have the number of items
passing
through the tills over a period of time
monitored. 6.16. Satellite Systems
Internet use is monitored by network managers: they
can
check sites visited and time spent on that site Global Positioning Systems (GPS)
during working
hours.
Emails can be read: Employers can check that no Used to determine the exact location of several modes of
personal
mails are sent during office hours. transport
Delivery drivers: Their location can be tracked using Cars usually refer to GPS as satellite navigation systems
GPS
systems. It can also be checked if they are Satellites surrounding the Earth transmit signals to the
following the
shortest route and aren’t speeding. surface
Key logging: Software that records the keys pressed by a Computers installed in the mode of transport receive and
user on
the keyboard. They are used to find username interpret
these signals
and passwords of a
user. Knowing their position on the Earth depends on very
Employee call monitors: Allows the employer to listen to accurate timing
– atomic clocks are used in the satellites
employee’s telephone calls. There are three ways it can which are accurate to
within a fraction of a second per
be used: day
Monitor: The manager/supervisor can listen to calls Each satellite transmits data indicating its position & time
without
the employee or the customer’s awareness. The computer on board the mode of transport calculates
Whisper: The manager can help the employee with its exact
position based on the information from at least
the call,
but the customer can’t hear the manager three satellites
speak.
 

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Satellite Navigation 5. Identifying and agreeing the customer’s requirements


6. Interpreting the customer’s requirements
Used to determine the exact location of a car. 7. Producing a cost-benefit analysis
The computers onboard can be used to show 8. Producing a data flow diagram
directions to a
destination.

Geographic Information Systems (GIS)

Used to capture, manage, analyse and display


geographically
referenced information.  
Use to determine distance between two places.
Used to find the nearest petrol station or restaurant,
4 Common Methods of Fact Finding
etc.
To protect animal and plant life in certain vulnerable Observation
places.
Can be used in geography, science or engineering Involves watching personnel using the existing system to
lessons. find out
exactly how it works
Advantages
  The analyst obtains reliable data
It is possible to see exactly what us being done
Media Communication Systems It is a relatively inexpensive method
Disadvantages
Using satellite signals for communication.
People are generally uncomfortable being watched
Used by media companies when sending and may work in
a different way
stories/videos/pictures
from remote locations. If workers perform tasks that violate standard
procedures, they
may not do this while being watched
7. System Life Cycle Interviews

Involves a one-to-one question-and-answer session


7.1. Introduction between the
analyst and the employee/customer
Advantages
A systems analysis team is often brought in to review an It gives the opportunity to motivate the interviewee
existing
system and suggest several improvements into giving
open and honest answers to the analyst’s
The existing method used may be either a manual paper- questions
based system
or a computer-based operation that is no It allows the analyst to probe for more feedback from
longer regarded as adequate
for the task the
interviewee, as it is easier to extend a question
It is possible to modify questions as the interview
7.2. Analysis proceeds and
ask questions specific to the
interviewee
The basic steps in the analysis stage can be summarized It is a good method if the analyst wants to probe
as follows: deeply into
one specific aspect of the existing system
Disadvantages
It can be rather time consuming
It is relatively expensive, due to the use of the
analyst’s time
The interviewee cannot remain anonymous

Questionnaires

Involves sending out questionnaires to the work force


and/or to
customers to find out views of the existing
system and find out how
some key tasks are carried out
Advantages
The questions can be answered quite quickly
1. Fact finding/collecting data from the current system It is a relatively inexpensive method
2. Description of the current system – establishing the Individuals can remain anonymous if they want
inputs, outputs
and processing being done It allows quick analysis of the data
3. Identification of the problems with the current system Disadvantages
4. Agreeing the objectives with the customer Often the number of returned questionnaire is low

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

The questions are rather inflexible since they have to Validation


be
generic
There is no immediate way to clarify a vague or Process where data is checked to see if it satisfies certain
incomplete
answer to a question criteria when input into a computer, for example to see if
the data
falls within accepted boundaries
Looking at Existing Paperwork Range Check: Checks whether data is within
Allows the analyst to see how the paper files are kept, look at given/acceptable
values.
operating instructions and training manuals, check the E.g. A person’s age should be in range > 0 but < 150
accounts, etc. Length Check: Checks if the input data contains the
required
number of characters
Advantages
E.g. If a field needs six digits then inputting a five- or
It allows information to be obtained which was not
seven-digit number, for example should cause an
possible by
any of the other methods
error message
The analyst can see for themselves how the paper
Character/type Check: Checks that the input data does
system operates
not
contain invalid characters
It allows the analyst to get some idea of the scale of
E.g. A person’s name should not contain any numbers,
the
problem, memory size requirements, type of
but a
person’s height should only contain digits
input/output devices
needed
Format/picture Check: Checks that data is in a specific
Disadvantages
format
It can be very time consuming
E.g. Date should be in the form dd/mm/yyyy
Because of the analyst’s time, it is a relatively
Limit Check: Similar to range check except that only one
expensive
method
of the
limits (boundaries) is checked
E.g. Input data must be > 10
7.3. Design Presence Check: Checks if data is actually present and has
not
been missed out
Once the analysis has taken place and the systems E.g. In an electronic form, a person’s telephone
analyst has some
idea of the scale of the problem and number may be a
required field and if no data is
what needs to be done, the next
stage is to design the present this should give rise
to an error message
key parts of the recommended system Consistency Check: Checks if fields correspond (tie up)
A list of tasks is summarized here with
each other
Designing data capture forms/input forms E.g. If ‘Mr’ has been typed into a field called title then
Designing screen layouts the
gender field must contain either ‘M’ or ‘Male
Designing output forms and reports Check Digit: Look at an extra digit which is calculated
Producing systems flowcharts and/or pseudo code from the
digits of a number and then put on the end of
Selecting and designing validation rules that need to the number
be used E.g. Check digits can identify three types of error:
Selecting the most appropriate data verification If two digits have been inverted during input
methods An incorrect digit entered twice
Designing and agreeing the file structures and tables A digit missed out altogether
Selecting and designing the hardware requirements
Selecting and designing the software requirements
Producing algorithms or program flowcharts
7.4. Development & Testing
Designing a testing strategy/plan
Once the design stage is completed, it is then necessary
  to create
the system and fully test it
This section considers some of the development stages
Verification and testing
strategies which are often adopted by system
analysts
A way of preventing errors when data is copied from one
 
medium to
another
Double entry: data is entered twice, sometimes by two
different people Development stages
The computer compares the two entries, either after
If the system contains files (e.g. a database) then the file
data entry
or during the data entry process, and
structure needs to be finalized at this stage (e.g. what
identifies any differences
type of
data is being stored in each field, length of each
Visual check: checking for errors by comparing entered
field, which
field will be the key field, how the data files
data on
the screen with the data in the original document
will be linked,
etc.)
(not the same as
proof reading)
Once the file structure has been determined, it is then
  created and
fully tested to make sure it is robust when
the system actually goes
live

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Since it is important that correct data is stored in files, Letters or other non-numeric data (e.g. July)
there
are certain techniques that need to be adopted to Non-integer values (e.g. 3.5, 10.75)
make sure the data
populating the file and database is at
least of the right type &
that it conforms to certain rules 7.5. Implementation
Validation routines and verification methods are used to
ensure this
happens
Once the system is fully tested, the next stage is to fully
Again, routines have to be fully tested to ensure they trap
implement it
unwanted
data but also to make sure any data
We will now consider changeover to the new system in
transferred from a paper-based
system to an electronic
more depth
system has been done accurately
There are four common methods used for changing over
Any system being developed will have some form of user
from the old
system to the new system
interface
Each one has advantages and disadvantages which need
The types of hardware were chosen in the design stage
to be weighed
up before the most appropriate method is
How these are used to interface with the final system
chosen for a particular
application
now needs to
be identified, for example how the screens
will be used to collect
the data and the way the output
will be presented
If specialist hardware is needed (e.g. for people with
disabilities), then it will be necessary to finalize how these
devices are used with the system when it is implemented
This will be followed by thorough testing to ensure the
user screens
are user friendly and that the correct output
is associated with the
inputs to the system

 
4 Common Methods of Changing Systems
Testing strategies Direct

Testing of each module needs to be done to ensure each The old system is stopped overnight and the new system
one functions
correctly on its own introduced
immediately
Once the development of each module is completed, the Advantages
whole system
needs to be tested (i.e. all modules The benefits are immediate
functioning together) Costs are reduced - since only one system is used
Even though each individual module may work there is no
need to pay for two sets of staff
satisfactorily, when
they are all put together there may be There is less likelihood of a malfunction since the new
data clashes, incompatibility
and memory issues system
will have been fully tested
All of this may lead to a need to improve the input and Disadvantage
output
methods, file and database structures, validation This method can be disastrous if the new system fails
and verification
methods
Then the system will need to be fully tested again Parallel Running
It is a very time-consuming process but the system must
be as
perfect as possible before it goes live The old and new systems are run side by side for a time
Testing will use many different types of data, which will before the
new system takes over altogether
fall into
one of three categories: normal, extreme or Advantages
abnormal If the new system fails, the old system is still available
Let us suppose one of the fields in a database is the date as a
back-up
and this
must be in the form dd/mm/yyyy, where each It is possible to train staff gradually
element of the date must
be numeric: Staff have time to get used to the new system
Normal: this is data which is acceptable/valid and has Disadvantage
an
expected (known) outcome, e.g. the month can be It is more expensive than direct changeover, since
any whole number
in the range 1 to 12 extra staff
are needed to run both systems together
Extreme: this is data at the limits of
Pilot Implementation
acceptability/validity, e.g. the month can be either of
the two
end values i.e. 1 or 12 The new system is introduced into one part of the
Abnormal: this is data outside the limits of company (e.g. into
a warehouse of a supermarket) and its
acceptability/validity and should be rejected or cause performance assessed
an error
message Advantages
For example, all the following values are not allowed If the new system fails, only one part of the company
as inputs
for the month: is
affected
Negative numbers (e.g. -1, -15) It is possible to train staff in one area only, which is
Any value greater than 12 (e.g. 32, 45) much
faster and less costly than parallel running

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

The costs are also less than parallel running, since minimum memory requirements
only one
part of the system is being used in the pilot known bugs in the system
Disadvantage list of variables used (and their meaning/description)
It is more expensive than direct changeover, since file structures
each pilot
scheme needs to be evaluated before the sample runs (with test data and results)
next stage is introduced output formats
validation rules
Phased Implementation meaning of error messages
Initially, only part of the new system is introduced  
Only when it proves to work satisfactorily is the next part
introduced, and so on, until old system is fully replaced User Documentation
Advantages
If the latest part fails, it is only necessary to go back in User documentation is designed to help users to learn
the
system to the point of failure, hence failure is not how to use the
software or system
disastrous This can consist of any of the following:
It is possible to ensure the system works properly the purpose of the system/program/software package
before
expanding how to log in/log out
Disadvantages how to load/run the software
This is more expensive than direct changeover, since how to save files
it is
necessary to evaluate each phase before moving how to do a search
to the next stage how to sort data
how to do printouts
 
how to add, delete or amend records
screen layouts (input)
Comparing Changeover Methods print layouts (output)
hardware requirements
Changeover method Direct Parallel Pilot Phased software requirements
Relative costs Low High Medium Medium sample runs (with test data and results)
Input needed by the user Medium High Low Medium error handling/meaning of errors
Input needed by systems troubleshooting guide/help lines/FAQs
Low* Low Medium Medium tutorials
team
Impact of failure High Low Low Medium
7.7. Evaluation
7.6. Documentation Once a system is up and running it is necessary to do
some
evaluation and carry out any maintenance, if
Once the new system is fully developed, a considerable
necessary.
amount of
documentation needs to be produced
This is done to ensure the efficiency of the system, the
For the end user
ease of use
of the system, and the appropriateness of the
For people who may need to modify or develop the
system.
system further
at some later stage
The following is a list of some of the things considered
There is some overlap between the two types of
when
evaluating how well the new system has worked.
documentation, but
the basic requirements are shown
This can ultimately
lead back to a re-design of part of the
below
system if there is strong
evidence to suggest that changes
  need be made.
To evaluate the system, the analyst will:
Technical Documentation compare the final solution with the original
requirement
Technical documentation is designed to help identify any limitations in the system
programmers & analysts
who need to make identify any necessary improvements that need to be
improvements or repair/maintain to the system made
This can consist of any of the following: evaluate the user’s responses to using the new
purpose of the system/program/software system
program listing/coding compare test results from the new system with
programming language used results from the
old system
flowchart/algorithm compare the performance of the new system with the
input formats performance
of the old system
hardware requirements observe users performing set tasks, comparing old
software requirements with new

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

measure the time taken to complete tasks, comparing Personal Data


old with new
interview users to gather responses about how well Any data regarding a living person who can be identified
the new
system works against the
data or the data along with any other
give out questionnaires to gather responses about the information.
ease of
use of the new system Examples of personal data:
Some results from the evaluation may require changes to Full Name
either
hardware or software. Hardware may need to be Home Address
updated because: Banking details (A/C no, pin, etc.)
of feedback from end users Medical history (suffered from depression, etc.)
new hardware comes on the market, making change Personal data like ethnic origin, political views,
necessary criminal
activity, mental health history,
there are changes within the company which require Sexual orientation and religion can be used to
new devices
to be added or updated blackmail victims
of data breaches
Software may need to be updated because: If personal data is leaked (data breach), the following can
of feedback from end users occur:
changes to the company structure or how the Identity theft
company works may
need modifications to the Bank fraud
software Damages to personal property
changes in legislation may need modifications to the Kidnapping (if kidnappers get access to the victim’s
software address.
Etc.
To prevent the above, it is essential that personal data is
8. Safety & Security protected.
Personal data can be leaked intentionally and
unintentionally.
Electronic data is at risk due to: hacking,
8.1. Physical Safety
viruses, spyware,
phishing, pharming, Smishing, vishing,
ransomware (A malicious
program that encrypts data on
Ways of eliminating or minimizing a computer system and demands for a
ransom to provide
Safety hazard
hazard and decrypt the data), spam, moderated and
un-
Use a residual circuit breaker moderated forums, cookies, etc.
(RCB), Check insulation on wires If a student shares a photograph of themselves in their
Electrocution from
regularly, Do not allow drinks near school
uniform on social media, then paedophiles, child
spilling drinks
computers, Check equipment predators,
kidnappers, etc. can physically reach the
regularly student. This should not
be done
Cable ducts- make wires safe,
Tripping over trailing  
Cover wires/tuck them away, Use
wires
wireless connections
Strong desk/tables to support
Internet Safety
heavy hardware, Use large desks
Heavy equipment falling To keep personal data safe, one must:
and tables so that hardware
Not give unknown people (on the internet) personal
doesn’t fall off edge
information
or send pictures of oneself to them.
Have a CO2 fire extinguisher Maintain privacy settings to control which cookies are
nearby, Don’t cover equipment on their
computer
Fire risk from
vents- can cause equipment to Use learner friendly search engines and websites
overloading sockets or
overheat, Make sure hardware is recommended by
your educational institution, e.g.
equipment overheating
fully maintained, Do not overload znotes.org
sockets with too many items The website being accessed is from a trusted source,
or has a
padlock symbol/ https protocol (s for secure):
8.2. E-Safety
E-safety refers to the safety of data and personal
information while
using the internet.
E-safety is required to make sure a user’s personal
information is
not made vulnerable and even leaked to
hacker’s for e.g., which can
lead to identity fraud, bank
A/C issues, etc.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Hackers are people who get into your computer system


without having
the rights. It can lead to corruption or loss
of data or a data
breach
Some prove that a system is vulnerable - maybe
employed to test
(ethical hacking)
Some want to steal data
Alter or destroy data
For fun or a challenge
Prevention:
Protect with authentication techniques (user ID and
password,
etc.)
Have a backup of data in case of damage
  Firewalls

Email Safety  

Open emails from known sources, and do not click on an User IDs
emails wit
hyperlinks without confirming with the sender
of the email. Think
before opening an email from an To log on to a network, a user must type in a user ID
unknown person, never send any other
sensitive User ID assigns user privilege once user logs in
information (picture in school uniform, credit card PIN, The top-level privilege for a network is an administrator:
etc.) Able to set passwords and delete files from server etc.
Ask their ISP to eanble email filtering to classfy spam User privilege may only allow to access their own work
mails as
spam. area

   

Social Media Safety Passwords

Blcok and report users who seem suspicous or use After typing in user ID, the user will be requested to type
inappropriate
language in their
password
Never use you real name, only use a nickname Generally, it is a combination of letters and numbers
Use appropraite language Passwords are shown as stars (***) so nobody
Do not enter private chat rooms, as users can lure you overlooking can see
it
into giving
personal inforamtion by seeming too nice. Many systems ask for password to be typed in twice as a
Do not meet anyone off the internet for the first time on verification
check, in case of input errors
your own,
or atleast speak to a trusted adult first. To help protect the system, user has a finite number of
Do not missue images (of someone to blackmail them, for attempts
e.g.) If password is forgotten, administrator must reset it
Respect the confidentiality of other users If password is forgotten on a website, it will be sent to
your
e-mail
 
 
Online Games
Biometric Data
Similar measures apply to that taken when using social
media. Uses features of the human body unique to every
Additionally, players should be careful about: individual, such as
fingerprints, retina, iris, face and voice
In-game violence recognitions. It is used
in authentication techniques as it
Cyber bullying is very difficult / impossible to
replicate.
Keeping their webcams off (other potentially Advantages
dangerous players
have direct access to your image) Usernames and passwords don’t have to be
Predators may use voice masking technology to lure a remembered
user to
reveal their age, sex etc. Almost impossible to replicate body parts.
Cyber-attacks involving viruses, ransomware, etc. Somebody else can’t gain access, like with a stolen
card
They can’t be forgotten, like a card
8.3. Security of Data Disadvantages
The readers are expensive
Hacking Damages in fingerprints can deny access
Some people worry about their personal
information being
stored

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

  Pharming is a scam in which malicious code is installed


on a
computer hard disk or a server
Digital Certificate This code can misdirect users to fraudulent websites
without their
knowledge
A digital certificate is an electronic passport used in the Phishing requires an email to be sent to every person
security
of data sent over the internet. who has been
targeted, while pharming does not require
They can be attached with mails so that the receiver can emails to be sent out to
anyone
know that
the mail is sent from a trusted source. Pharming can target a larger group of people more easily
How pharming works:
  A hacker will infect the computer with a virus, either
by
sending an email or installing software on their
Secure Socket Layer (SSL) computer when
they first visit their website
Once infected, the virus sends user to a fake website
Type of protocol that allows data to be sent and received that looks
identical to the one they wanted to visit
securely
over the internet
Personal info. from the user’s computer can be picked
When a user logs onto a website, SSL encrypts the data up by the
pharmer/hacker
https or padlock in the status bar Anti-spyware, anti-virus software or anti-pharming
When user wants to access a secure website:
software can
be used to identify this code and correct
User’s web browser sends a message, so it can the corruption
connect with
required website which is secured by
SSL  
Web browser requests that the web server identifies
itself Smishing
Web server responds by sending a copy of its SSL
certificate An attempt to extract a user’s confidential information via
Web browser checks if certificate is authentic SMS
(short message service) by tricking the user into
Sends signal back to web browser downloading a
Trojan horse (a virus that masks itself).
Starts to transmit data once connection is established It is phishing via SMS.
If not secure, browser will display an open padlock
 
 
Preventing Phishing, Pharming & Smishing
Features of a Secure Web Page
User education
Webpage URL: If the webpage is secure, it will start with Set up anti-malware and anti-spyware software
‘https’ instead of ‘http’. Enabling protocols such as SPF and DKIM
Do not download random .exe (executable file formats),
Padlock sign
.php, .bat,
.com etc.
Users should when being redirected to other websites.
  Therefore, technology enables unauthorised users to gain
access to
otherwise inaccessible information.
Phishing If a person on the internet is asking for personal
information, or
to meet in real life or acting suspicious,
Phishing is a fraudulent operation involving the use of they should be reported
to cyber security agencies, or
emails one’s parents/guardians.
The creator sends out a legitimate looking email hoping Websites/pop-ups can be made to mimic legitimate ones,
to gather
personal and financial information from the or seem too
good to be true, for e.g.lotrei.net instead of
recipient of the email lottery.com
The message appears to be from a legitimate source (e.g.
a famous
bank)
When the user clicks on the link, they are sent to a spoof
website
They will be asked for personal info e.g. credit card
details, PINs
This could lead to identity theft
ISPs attempt to filter out phishing emails

Pharming
Banks and organisations will never ask for a PIN to be
entered on
website like this.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

  It is a malicious program that replicates itself and is


designed to
cause harm to a computer system. They
Effects of phishing, pharming and Smishing on a spread through downloadable
files, external store media
user (e.g. pen drives, etc.)
May cause the computer to crash
Personal and sensitive information is lost, which can be Loss of files, corruption of the data
used for
previously stated purposes. Viruses infect computers through email attachments,
illegal software
or downloaded files
  Prevention of Viruses
Anti-virus software - Detects and then removes or
Moderated & Unmoderated Forums isolates and
use firewalls
Do not use illegal software
Online forums are places on the internet where people can Only download from reputable sites
join
discussions on almost any topic and also add their views.
 
There are two types of forums:
The threats of using credit cards online and
Moderated Forums Unmoderated Forums
prevention:
Has a moderator who checks
No moderator who checks
comments before they are Key logging/spywares: records the keys pressed on a
the comments
posted keyboard.
There will be no spams or Can be used to obtain credit card details, passwords
Spams, rude and offensive
rude and offensive and
personal information.
comments present
comments Use virtual keyboards to type in password.
Diversions from topic are Install anti-spyware software.
No diversions from the topic Bogus sites: sites that look exactly like the original sites,
possible
Highly secure due to Personal information can be but aren’t.
moderation obtained from you They can steal your card details and personal
information when
you make purchases.
Not secure due to lack of
Always type in URLs, sometimes links in the mails can
moderation
be of
bogus sites.
Phishing, pharming and Smishing:
  They trick you to reveal card and personal details as
responses
to messages or mails.
Spam Open attachments only from trusted sources.
Install anti-spyware software.
Spam is electronic junk mail and is a type of advertising
Hacking into secure sites to obtain the details:
from a
company sent out to a target mailing list
Encrypting the details will make it of no use to the
Harmless but can clog up networks and slow them down
hacker.
It is more of a nuisance than a security risk
Use strong passwords.
Many ISPs are good at filtering out spam, and prevent the
Use firewalls.
user from
getting these spam emails.
Tapping into wireless networks:
It is often necessary to put a legitimate email address into
Always use a password-controlled Wi-Fi since it is
a
contact list to ensure wanted emails are not filtered out
relatively
hard to tap into a secured Wi-Fi.
by mistake
*ALL PREVENTION TECHNIQUES WRITTEN HERE
ALSO APPLY
 
FOR THE THREATS IN GENERAL (NOT SPECIFIC TO CREDIT
CARDS)
*
Encryption  
The conversion of data to code by encoding it
Cloud Storage
Done by using encryption software
Since data is encoded, it appears meaningless to a hacker
Your data is stored remotely and not on your computer,
This technique prevents illegal access
so you don’t
have control over the physical security of
Necessary to use decryption software to decode the data
your data.
Used to protect sensitive data e.g. banking details
Some of the data stored may be personal data which are
Encryption keys are complex algorithms which makes
open to
hackers, and have to be encrypted in order to
codes almost
unbreakable
prevent hackers from
obtaining them.
  The company providing the storage may go out of
business. In this
case what has to be done to the data will
Computer Viruses have to be considered.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

The company providing the storage will have to put in all Knowing Your Audience
its
efforts and safety measures in order to keep your data
safe. When designing ICT solutions, you must consider
If the company providing the storage doesn’t backup your audience
data, you
may lose it in case of power cuts or fires, etc. There are 4 main characteristics of an audience
Age:
  Can affect audience’s interests in your product
Large fonts and colours attract children
Firewalls More stylish and trendy layout attracts young adults
Gender
A firewall sits between the user’s computer and an Design product for a specific gender
external
network (internet) and filter information in and Younger girls are often attracted to pink
out of the computer Males generally prefer blue spectrum
Tasks carried out by firewall: Income
Examining ‘traffic’
Knowing this will help in attractive pricing strategies
Checking weather incoming or outgoing data meets Promoting certain products are targeted for people
criteria within a
specific range of incomes
If data fails the criteria, the firewall blocks ‘traffic’
Interests
Firewall can keep a list of all undesirable IP addresses Can help with advertising content
Helping to prevent viruses or hackers entering the Content that meets the exact description of
user’s
computer
audience’s interest
is more likely to attract them to
your product
 
 
Methods of Internet Security
Audience Needs
Authentication
Advantages Disadvantages
Method After finding out about your targeted audience you need
Inexpensive, as to aim to
meet those demands
Can be easily hacked,
Passwords nothing other than a Developers of the ICT product must ensure that they
can be forgotten
computer is required meet as many of
these needs as possible
Highly recognized Common Needs for Common Audiences:
everywhere, very
Fingerprint Intrusive, Damages Audience Needs
high accuracy, Easy
scans will prevent access
to use, Relatively low Bright/cheerful colours
storage requirement Animations/sounds/pictures
Non-intrusive, very Problems occur if Less text
Signature little time to identify, sign is not consistent, Young children Simple wording
recognition Relatively low High error rate (one
Large text
expensive in 50)
Games/activities
Very intrusive,
Very high accuracy, Easy to use
relatively slow to
no known way to Attractive/stylish colours
Retina scans verify retina scans,
replicate a person’s
very expensive to Interesting content
retina
install and set up Teens & adults Balance of pictures and text
Very intrusive, Lot of Clear fonts
Very high accuracy,
memory needed for
Verification time is Bullet points
Iris recognition storage, very
usually less than 5 Contrasting/easy-to-read colours
expensive to install
seconds Include clear instructions
and set up
Affected by changes Use slightly larger font sizes
Non-intrusive, Seniors
Face in lighting, person’s Fewer technical terms
Relatively
recognition hairstyle, age and Consistent design
inexpensive
spectacles Easy to use

9. Audience  

Potential Problems
9.1. Audience Appreciation

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

If products are not built towards a specific audience well Creating ICT Solutions
then
problems may arise
An older audience may not be able to understand or read ICT solutions, for e.g. a website should be made in
text due to
poor font design accordance to
the legal, moral, ethical and cultural beliefs
A younger audience may not be able to understand of the target
audience.
certain text due to
complex wording & structure
Several audiences may just not find content interesting  
since it is
not relevant enough to them
Several audiences may not find content attractive enough Implications of ICT Solutions
and thus
not purchase or use it at all
Younger & older audience may not understand how to When creating an ICT solution, all the following have to be
use the product
due to lack of simple instruction considered and the solution must be made in response
and respect to
these factors:
Legal: Ensure copyright laws are abided by including
9.2. Legal, Moral, Ethical & Cultural not using
any coding or branding from existing
Appreciation copyrighted software.
Morality: To distinguish from right or wrong.
Copyright Legislation Sometimes it
may not be illegal to carry out an act
however it could be
against your morals. For example,
A law that protects books, music art and other media that setting up a fake website to
deceive is not illegal but
are
written is copyright law questions your level of morality.
It is an automatic right and does not need applying for Ethics: Is to break a code of conduct. For example,
The person who owns the rights must be asked disclosure of information about the new software to a
before it can be
used again rival
software publisher or to the press.
Software is a specific thing created and written on a Culture: When software is released in different
computer cultures
then care must be taken so that people are
Needs to be protected as it is so easy for people to not offended. If
certain computer games mock
copy religion or cultural beliefs, then
again this could cause
This is a way of protecting software from being used offence.
without
permission
Users create a license which determines the terms
and conditions
10. Communication
 
10.1. Email
Copyright Laws
National Laws
It is not legal to make a copy of software, then sell it or
give it
away to other people In some countries, emails are monitored or read, thus
limiting the
topics on which you can speak.
Software cannot be used on a network unless a network
license has
been acquired  
Not legal to use coding from software in your own
software without
permission Acceptable Language
Renting out software without permission is illegal
It is illegal to use the name of copyrighted software Language used in emails must lie within an acceptable
without
permission code of
practice. The following is a list of unacceptable
content that are
beyond the code of practice:
 
Obscene images
Abusive language
Software Protection
Racist, exploitative and violent messages
Installed software will require a unique reference number Use of illegal materials in messages
User will have to accept license agreement  
Holograms are used to indicate software is original
Software may only run if CD-ROM or DVD-ROM is actually
Copyright
in the drive
Some software will only run if a memory stick is plugged Copyright laws apply to text in emails. Forwarding a block
in USB
ports of text
or an image without the copyright owner’s
permission, it would be
illegal.
 
 

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Employer Guidelines Hyperlink: Data that redirects


the user to another
webpage/section of same webpage/file when
clicked.
If the rules in the ‘contract of employment’ set out by the File Transfer Protocol(FTP): Used
to upload website files
employer
is not obeyed, you would be in breach of your to the web hosting space. To upload these
files
contract and could be
dismissed. successfully, the user needs:
An FTP client
  Login details to the web hosting server (host and port
used,
username and password for FTP.
Security
 
Emails containing personal information should be
encrypted to
prevent hackers from understanding the Cloud storage:
information if they manage to
hack into the email.
The storage of data (remotely) on the internet.
  This data is accessible by the user with the requirement
of an
appropriate authentication technique (e.g. user ID
Netiquette and password).

Some of the rules that the netiquette contains is:  


Don’t be abusive
Don’t send spam Search Engine:
Be precise
Check spelling and grammatical errors A search Engine is used to find information on the
Ensure attachments are not too large internet without
knowing the (Uniform Resource Locator)
Don’t use CAPITAL LETTERS to highlight comments of the webpage holding the
information.
Don’t plagiarize
Don’t use too many emoticons  

  Blog

User ID and Password Protection Personal internet journals where the writer posts their
observations
on a topic
Email services require a user ID to authenticate users No training is needed to do this
Passwords should contain alphabets, numbers and Blogs range from minor projects (e.g. people gossiping
special characters
(#, *). about a
topic) to important subjects such as politics or
Email Groups advertising
products
Easier to send out multiple mails by grouping them under Comments are not immune from the law
one name. Bloggers can be prosecuted for offensive comments
Companies and organization can group people according
to their
target group for marketing purposes.  
Spammers can create email groups by buying addresses
of people from
a certain company and send in easier Wiki
ways.
Companies use email groups to set up meetings. Typing Software allowing users to easily create and edit web
out individual
addresses may leave out a few mail IDs. pages without
using any web browser
A wiki will support hyperlinks and has a very simple
syntax
(language rules) for creating pages
10.2. Internet Fundamentals Wikis are described as ‘web pages with an edit button’
Anyone can use wikis- content should be treated with
*INTERNET AND INTRANET EXPLAINED IN CHAPTER 4* caution
Example of a wiki: Wikipedia
The world wide web (WWW) is a system of interlinked
hypertext
documents accessed via the Internet  
Protocols are a set of rules that are followed between the
sender
and recipient of data which is being transferred Social Networking
between devices.
HyperText Transfer Protocol (HTTP):
A protocol that is These sites focus on building online communities of users
followed between the sending and receiving
devices who share
the same interests
when data is being transferred using the internet. Enable people to share photos of themselves, their
HyperText Transfer Protocol secure variant
(HTTPS): HTTP favourite music
and videos, what they like to do, what
that is followed when data being transferred is they like to eat etc.
encrypted.** Example: Facebook

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

These are becoming the modern way of interacting


11.2. Reduce File Sizes for Storage or
socially
They allow people to communicate across the world and Transmission
share their
interests and views with many people.
Files that are smaller in size upload and download faster
10.3. Information on the Internet than
larger ones and thus are better for transferring data.

Information is more likely to be up to date than in books,


since
websites can be updated very quickly
12. Images
Much easier to get information from websites- search
engines link
key words together and find information that An image should be edited when doing so will enhance its
matches the criteria-
cause for popularity usefulness.
Vast amount of information on the internet- easier to
locate than
using indices in books
Information on the internet however may be relevant or
13. Layout
correct, not
reliable, inaccurate or even biased- it does
not go through any
checking process Headers and footers ensure each page has all the
Information overload can make it difficult for the user to required
information like the page numbers, logos, titles,
find
relevant information etc.
Ensure use of reliable websites that properly cite all their A common mnemonic is "An orphan has no past; a widow
sources has no
future"
Always look for primary sources of information & form
own
conclusions
Do not quote/use secondary often biased opinions or
14. Styles
gossip
Do your research Several organisations use a ‘corporate house style or
corporate
branding, which is used to print on websites,
visiting cards,
letters, etc. It refers to a specific style of
11. File Management fonts and formats
used in the making of ICT solutions by
organisations.
A corporate house style when used effectively identifies
11.1. Manage Files Effectively the users
of the style.
Consistent styles enable users to associate a particular
Extension organisation with a style and also show consistency in the
Full form Used for/in:
name ICT
solutions created by the organisation
Stylesheets in
css Cascading Stylesheet
webpages
Comma Separated
15. Proofing
csv Store tabular data
Value

gif
Graphics Interchange
Moving images 15.1. Software Tools
Format
Hypertext Mark-up When a person’s/organisation’s name is entered or
htm Webpages
(Language) sometimes newly
coined terms are used, spell checkers
Joint Photographic might pick these up as errors,
because they are not found
jpg Standard for images in the dictionary. This makes spell
checkers less efficient.
Experts Group
Documents to be Validation ensures that the data being entered into an ICT
Portable Document solution
is reasonable and makes sense. Entered data is
pdf circulated over the
Format checked against set
criteria to be validated.
internet/email
Portable Network
png Compressed images 15.2. Proofing Techniques
Graphic
Word processed
rtf Rich Text Format Verification: checking of data when copied from one
documents
medium to
another to prevent errors.
txt Text (File) Simple Text files
Verification is also important and is a way of preventing a
Zone Improvement Sending many files difference in data when it’s being transferred from one
zip
Plan over the internet/email system to
another. This tries to make sure data entered is
correct, relative
to the source.
Generic file formats can be opened by any software to
access the
data held in them.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

Expected outcome: The output a model is supposed


16. Document Production to give with
the test data.
Actual outcome: The output a model actually gives the
Widow: A paragraph-ending line that falls at the user when
the test data is input.
beginning of the
following page or column, thus
separated from the rest of the
text.
Orphan: A paragraph-opening line that appears by itself 18. Data Analysis
at the
bottom of a page or column, thus separated from
the rest of the
text.
18.1. Create a Data Model
Page, section and column breaks are used to ensure that
widows and
orphans are not present in a document
Charts: A graphical representation of (usually tabulated)
(these show poor typography).
data
A mail merge document is created in order to create a
Accurate data ensures the results obtained by the
standard
template and then use it to send documents
processing of data
is relevant, which is essential to the
personalised (by the
computer system) for the respective
usability of the model
recipient of the document
Formulae are mathematical operators defined by the
user to perform a
function, whereas functions are
17. Data Manipulation predefined logical and mathematical
operations a user
can use in a spreadsheet
Mathematical operations are performed in the order
17.1. Create a Database Structure PEMDAS
(Parenthesis [Brackets] Exponents Multiplication
Division Addition
Subtraction). Brackets are used to
Flat file databases are tables that have data sorted in notate data used by a function,
e.g. =SUM (A2:A10).
rows and
columns, whereas relational databases are Relative cell referencing is made when the cell reference
several tables grouped
together to from a link, thus is
supposed to change when the cell it is referred to in is
preventing unnecessary repetition of
data. changing.
It aids more efficient designing of models.
Primary key: The key field of a table which is unique and Absolute cell
referencing is made when the cell
identifies
each record referenced stays constant when the
cell it is referred to in
Foreign key: The field linked to the primary field of the is changing. This aids the preparation of
a model when a
table
linked to through a relationship set of data is constantly being referred to
throughout the
model. Cell reference or relative cell reference
describes
Relational database Flat-file database how far away a cell or group of cells is from some other
Complex queries can be cell in the same spreadsheet. Basically, the cell’s address
Poor at complex queries
carried out A model prepared needs to be tested before being used
Better security Poor at limiting access to ensure that
all results computed are accurate.
Definitions:
Harder to update, so
Cater for future requirements Cells: A space for data to be entered a table; a box
inherently inefficient
formed by
the intersection of columns and rows
Data is only stored once Potential duplication Rows: Horizontal boxes that divide the table in
Require more planning Easy to design segments
Non-unique records Columns: Vertical boxes that divide the table in
Harder to change data segments
format. Sheets: A table of data
Tabs: A module of a database program that holds the
At times placeholders for media such as images, sound tables on
the computer,
bites and
video clips are used to enhance the usability of Pages: Full pieces of papers that contain information
a database held on
one sheet of paper.
Ranges: A group of cells in a table
Named cell: A cell in a table that is given a name (like
17.2. Test the Data Model ‘profit
margin’) and can be referred to using that
name.
A model prepared needs to be tested before being used Named range A group of cells in a table that are given
to ensure that
all results computed are accurate. The test a name
(like ‘Pricing’) and can be referred to using that
plan must be justified
to be apt for the model. E.g. all the name.
mathematical operations must
be tested in a model that Nested formulae/function: A formula/function used
relies on calculations. inside a
formula/function as an argument
Definitions:
Testing: Checking if the designed model delivers the
expected
outcome when tested with data. 18.2. Test the Data Model
Test data: The input data used for testing model.

WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)

A model prepared needs to be tested before being used Absolute file path: The full path of a file, which is not
to ensure that
all results computed are accurate. The test relative to anything, whereas relative links only point
plan must be justified
to be apt for the model. E.g. all the to a
file or a file path, the browser then redirects the
mathematical operations must
be tested in a model that user to
that location on the current site.
relies on calculations. Absolute paths always include the domain name
Definitions: of the
website
Testing: Checking if the designed model delivers the These should not be used to refer to locally saved
expected
outcome when tested with data. webpages as the computer the webpage is stored
Test data: The input data used for testing model. on (the
server) is not the same as where the
Expected outcome: The output a model is supposed webpage was developed
and thus an absolute file
to give with
the test data. path would point to the wrong
address.
Actual outcome: The output a model actually gives the
user when
the test data is input. 19.3. Use stylesheets

19. Website Authoring CSS (cascading stylesheet) is a text-based language which


is
attached to webpages to set their format. CSS files have
a “.css”
extension
19.1. Web Development Layers These should be attached using relative file paths as they
are
stored along with the webpage and thus can be linked
Content/Structure layer: Holds the content of the relative to
them.
webpage structure. Internal CSS have more preference over Inline CSS
Presentation layer: The layer responsible for the If several external stylesheets are attached to one web
formatting of a
webpage(s) or elements (using a page,
the stylesheet attached last (at the bottom of that
stylesheet). part of the
code) is given preference over the other
Behaviour layer: scripting language of a web page or an attached ones).
individual
element
19.4. Test and Publish a Website
19.2. Create a Webpage
To upload and publish content on a website using FTP, a
Tables make the basic structure of a webpage and user must
have:
organise page
layout. FTP client software
Anchor: An element in a webpage that creates a hyperlink All files in one folder
between a
source anchor and a destination anchor. Host Name/URL/IP address for ftp
These can be used to link 2
resources together. Host port to be used for upload
Relative file paths are used for attached stylesheets as Username and password
the
stylesheet is going to be stored on a server in the The test plan used to test a webpage must be justified
same directory
as the webpage, and not where it an based on the
elements being tested. E.g. If hyperlinks are
absolute file path says. being tested, it makes
to check if all the hyperlinks are
Definitions: redirecting the user to the
correct webpage/ section of
Relative file path: A path referring to a file in the same webpage.
directory relative to the page the reference is made in.

WWW.ZNOTES.ORG
CAIE IGCSE
ICT (0417)

Copyright 2021 by ZNotes


These notes have been created by Krish Theobald, Akshya SP and Anand Sankar for the 2017 syllabus
This website and its content is copyright of ZNotes Foundation - © ZNotes Foundation 2021. All rights reserved.
The document contains images and excerpts of text from educational resources available on the internet and
printed books. If you are the owner of such media, test or visual, utilized in this document and do not accept its
usage then we urge you to contact us and we would immediately replace said media.
No part of this document may be copied or re-uploaded to another website without the express, written
permission of the copyright owner. Under no conditions may this document be distributed under the name of
false author(s) or sold for financial gain; the document is solely meant for educational purposes and it is to
remain a property available to all at no cost. It is current freely available from the website www.znotes.org
This work is licensed under a Creative Commons Attribution-NonCommerical-ShareAlike 4.0 International
License.

You might also like