Caie-Igcse-Ict-0417-Theory-V2 @
Caie-Igcse-Ict-0417-Theory-V2 @
ORG
CAIE IGCSE
ICT (0417)
SUMMARIZED NOTES ON THE SYLLABUS
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Backing store device = reader or recorder Screen divided into windows allows different things on
Example: Hard disk drive each
Backing store media = hardware containing data WIMP - Windows Icons Menus Pointers
Example: Hard disk Advantages
Easy to use because requires little IT knowledge
Easy to explore and find your way around the system
Basic Computer Model Do not have to learn complicated commands
Exchange data between different software
Good help facilities provided with GUIs
Disadvantages
Larger amount of hard disk space than other
interfaces
Significantly more memory (RAM) to run than other
interface type
GUI use more processing power than other types of
interfaces
GUI can be slow for experienced programmers to use,
1.3. Operating Systems they find CLI much faster
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Heat dissipation is difficult due to laptop structure Can be used to accurately predict hazardous weather
conditions
and signal warnings automatically
Take over menial tasks for humans; increasing our
Tablet Computer leisure time
Can be used for safer automated travel; cars that can
These are small hand-held devices that can perform drive and
park by themselves
many functions
that PCs & laptops do Increases home safety by being able to tell the
Often use touch screens to operate difference
between owner & intruder; call authorities
On-screen virtual keyboard replaces physical keyboard automatically
Often used by graphic designers to digitalize their content Improved medical care as decision making skills and
with a
stylus pen precision
can be enhanced
Can be used like a PC and/or a Smartphone
Advantages:
Small light & portable Biometrics
Built in cameras for photos & videos
Touchscreen can be used with a stylus pen A part of a person’s body is used to identify that individual
Long battery life Can be:
Disadvantages: Fingerprints
Less storage spaces Retina
Lacks power of laptop/PC Iris
Digital keyboard can be difficult to use Face
Touchscreen may be difficult to use for detailed work Voice
These are all unique to everyone thus can be used as an
authentication technique
Smartphone Must be added initially to a system to use as identification
Impacts on everyday life:
Modern phones that can perform similar tasks to all the Better security at the airport since most use at least
above one form
of biometric check if not more
Main use of smartphones is social media & day-to-day Increased security in certain places as only authorized
planning personnel can gain entry
Use varies from person to person Reduced vehicle theft since newer car doors come
Advantages: with a
fingerprint lock on the door handle
Smallest lightest most portable More secure mobile devices as most now have some
Integrated/virtual keyboard sort of
biometrics integrated into them
Often the least expensive device
More practical for day-to-day use
Disadvantages: Vision Enhancement
Small screen may be difficult to use
Not as powerful as other devices LVES: low vision enhancement systems: video projected
Often has the lowest battery life inside a
headset in front of the user’s eyes. Brings the
Small size makes it easy to steal/lose objects closer for
the viewer.
NVE: Night vision enhancement: amplifies visible and
1.5. Impact of Emerging Technologies infrared light.
Light passed through image intensifier tube
where light is converted
to electrons, then amplified
This is technology that is being newly developed (increase in no.) and then light up
screen with phosphor
These can have several impacts on our society dust.
Technology that focuses on creating a computer system Programmed machinery widely used to do physically
that can
closely mimic or simulate human intelligence demanding tasks
AI can be used to: Can be automated or manually operated
Enhance video games and computer tactics Used to perform several tasks:
Help decision making steps in expert systems Dangerous jobs such as bomb disposal
Make robots to imitate human behaviour Exploring extreme environments such as volcanoes
Understand different human languages Repetitive manufacturing jobs such as welding
Impact on everyday life: Moving heavy objects such as large engines
Impacts on everyday life:
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Increased personal time since robots can take over Better movie experiences since 3D viewing can
domestic
chores provide a more
immersive experience for the
Increased manufacturing efficiency since robots are audience
much faster
and less expensive than human labour Greater data storage since holographic layers can
Unemployment as robots replace humans in potentially
decrease the thickness of disc storage
autonomous jobs
Safer working environments since robots can perform
tasks that
are too dangerous for humans Virtual Reality (VR)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Touchpad
A numeric keypad is used to enter numbers only
Touchpads are used in many laptop computers as a
Although some have function key to allow input of
pointing device
alphabetical
characters
The pointer is controlled by the user moving their finger
Uses on the
touchpad
Used in Automatic teller machines (ATMs), where Uses
customers can
key in their personal identification
Used for opening, closing and minimising software
number (PIN), or an amount
of money
Used for grouping, moving and deleting files
Used to key in phone numbers into telephones Useful when editing images (e.g. controlling the size
Electronic point of sale (EPOS) terminals have numeric and
position of the image)
keypads
in case the barcode reader fails Used for controlling the position of a pointer on the
Used in Chip and PIN devices to key in PIN, or amount
screen to
allow:
of money
Selection from a menu
Used to enable fast entry of numeric data into a Selecting an icon
spread sheet Advantages
Advantages Faster to select an option by a touchpad than a
Numeric keypads are faster than standard keyboards
keyboard
for entry of
numeric data
Enables rapid navigation through applications and the
Since many are small devices (e.g. mobile phones),
internet
they are easy
to carry around Since the touchpad is integrated into laptop computer,
Disadvantages there is
no separate mouse, aiding portability
Can be difficult to use due to the very small keys
They can be used when no flat surfaces are available
Difficult to use for entering text
Disadvantages
Sometimes the order of numbers isn’t very intuitive People with limited hand/wrist movement can find
touchpads hard
to use
It can be more difficult to control the pointer when
Mouse
compared to
a mouse
An example of a pointing device They are more difficult when doing operations such as
The ball underneath the mouse is used to detect ‘drag and
drop’
movement
The left button is for selecting by double on it and the right
Tracker Ball
is to
bring drop-down menus
There is usually a scroll button which speeds up the
process of
moving through a document
Uses
Used for opening, closing and minimising software
Used for grouping, moving and deleting files Tracker ball is like a mouse except that it has a ball on the
Useful when editing images (e.g. controlling the size top of
the device
and
position of the image) Users control the pointer on the screen by rotating the
Used for controlling the position of a pointer on the ball
screen to
allow: Uses
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Digital Cameras
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
The reader reads the data held on the tag which is then A very fast way of inputting results of a survey
input into
the computer system for processing Since there is no typing, it is more accurate than
Radio waves are used to transmit data thus can be used keying in
data
through most
materials OMR is more accurate than OCR
Uses Disadvantages
Used in retail or supermarkets as barcode Forms need to be carefully designed to make sure that
alternatives the
marks/shadings are correctly positioned to gather
Used to identify pets accurate
information
Used in passports There can be problems if forms aren’t filled correctly,
Advantages sometimes they must be checked manually before
Can hold a lot of data being read by an
OMR, this is both time consuming
Can be read from long distances and expensive
Does not require direct line of sight
Information can be read faster than barcodes
Can alter information Optical Character Reader
Disadvantages
Thieves can steal information easily
RFID tags are expensive
Radio waves can experience interference
\
Optical Character recognition is a software that takes
scanned text
and converts it into a computer readable
Magnetic Ink Character Reader (MICR) form
Uses
Processing of passports and Identity cards
OCR is used when scanning documents to modify
them using a
suitable software
Advantages
Much faster data entry system than manually keying
Magnetic ink character recognition is a system which can
in data
read
characters printed in a special ink
Since there is no manual data entry, the number of
Uses
errors is
reduced
Used to process cheques in banking operations –
Disadvantages
cheque is read
using a batch processing method
The system has difficulty reading handwriting
Advantages
It is still not a very accurate technique
MICR offers great security than OCR since the oriented
characters cannot be altered
There is no manual input, thus errors are reduced
If somebody writes over the magnetic ink characters,
it can
still be read
Barcode readers
Disadvantages
Only certain characters can be read, and the number
of different
characters is very limited
It is a more expensive method than other methods
used for direct
data entry
Used to read information in the form of a barcode
Optical Mark Reader Handheld scanners or wands are very common for
reading barcodes
Uses
Used in supermarkets and other shops where the
goods are marked
with a barcode
Optical mark recognition is a system which can read Used in libraries to scan user’s library card and
marks written in
pen or pencil barcodes on
books (to keep track of books on loan)
Uses Used as a safety function in many companies to
OMR devices are used to read questionnaires, ensure that
electrical equipment is checked on a
multiple choice
examinations papers and other types regular basis
of forms in the form of
lines or shaded areas Advantages
Advantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Faster than keying in information, and fewer mistakes Thin Film Transistor monitors
are made Taking over from CRT monitors as the main output device
Used as a way of recording data, can improve safety The progress in TFT technology is one of the reasons for
Barcodes enable automatic stock control the rapid
development of laptop computers
Barcode scanning is a tried and trusted technology The screen is made up of thousands of tiny pixels which
When an item price is changed, only the central are made up
of transistors controlled by a
database needs
to be updated, there is no need to microprocessor
change the prices
individually on each item Each pixel has three transistors-red, green or blue; the
Disadvantages intensity
of each determines the colour of the pixel seen.
Barcode scanning is an expensive system to Uses
administer since
every item in the shops needs a Primary output device for computers, user can
barcode and every barcode needs
to be entered on immediately see
what they are typing in
the system Integral part of laptop computers
Also, there is a need to invest in the computer Advantages
technology
together with staff training, which can all Lightweight, so no weight hazards like CRT monitors
be expensive Less glare produced than in CRT monitors; also emit
The system is not fool proof- barcode can be swapped less
radiation
around on
items Consume much less power and generate less heat
than CRT monitors
2.3. Output Devices & their Uses Disadvantages
Angle of viewing is critical; image appears unclear if
CRT Monitor viewed
slightly from the side
This is an issue if several people are looking at the
Cathode Ray Tube monitors screen at
the same time
Least expensive type of monitor, becoming rarer as TFT They cannot yet be used with light pens,
monitors take
over
Come in various sizes
IPS/LCD Monitor
Picture created is made up of tiny dots (red green or
blue), the
intensity of the colour of the dot determines the
Front layer made from liquid crystal diodes; grouped
colour perceived
by the eye together to
form pixels (RGB or RGBY-more vivid colours)
Uses Receive analogue and digital signals, although most
Primary output device for computers, user can
modern
projectors only work with digital inputs
immediately see
what they are typing in
IPS (In-plane switching) is the technology used in LCD
Used with light pens to allow designs to be created on
monitors.
screen Advantages
Advantages Colour can be seen accurately from different viewing
Produce higher quality images than TFT monitors
angles
Angle of viewing is better than a TFT monitor
No lightening on touching
They work with light pens in CAD and CAM
Disadvantages
applications (Computer
Aided Design/Manufacturing) Expensive
Disadvantages High power consumption
Tend to be heavy, weight hazard if not supported
Slow response time
properly
Note: Old LCD monitors used CCFL (cold cathode
Run very hot, can cause fires if left unattended –
fluorescent lamp)
technology to light up the screen.
especially if
they are old
Consume more power than TFT monitors
They can flicker, this leads to headaches and eyesight LED Monitor:
problems
with prolonged use
Front layer made from liquid crystal diodes; grouped
together to
form pixels (RGB or RGBY-more vivid colours)
TFT Monitor For the image to show up on-screen a light source of LED
backlight
is used.
Advantages (over LCD monitors):
Lighter and thinner
Longer life
Lower power consumption
Greater contrast and more vivid colour
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Relatively more robust e.g. when looking at a video clip on the internet,
Disadvantages everybody can
see the video on the large screen
Glare gives viewers headaches rather than logging on to
several computers
Images too sharp, so can cause eye strain Disadvantages
Images can sometimes be fuzzy
Expensive to buy
Touch Screen Setting up projectors can be a little difficult
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Disadvantages
Expensive to buy
Slow at producing their output
Product is sometimes a little rough, often further work
needs to
be done Turned on or off by the actuator
Uses
Used in many domestic appliances
Speakers Automatic washing machines (to make the drum
rotate)
Cookers (to switch on fans)
Water pumps in central heating systems
Automatic greenhouses to open windows and switch
on fans
Used to control robot arms in the industry
Operate fans, disk drives and DVD drives in computers
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Used to store operating systems and working data Holds more data than floppy disks
Used for storing application software Less expensive than hard disk drives
Real time systems and online systems used fixed hard Disadvantages
drives Data transfer rate and data access time are slower
Used in file servers for computer networks
Advantages
Very fast data transfer rate and fast access times to
data CD-R/DVD-R
Have very large memory capacities
Disadvantages The letter ‘R’ means the disc is recordable only once and
Can be easily damaged then it
becomes ROM
They lack portability Use a thin layer of an organic dye as the recording media
DVDs also use an additional silver alloy or gold reflector
Laser beam produces heated spots and unheated spots
Portable & Removable Hard Disks/Drives Uses
They are used for home recording of music (CD-Rs)
Like fixed hard disks but are usually connected via and films
(DVD-Rs)
universal serial
bus
They are used to store data for later use
Uses Used in applications where it is necessary to prevent
Can be used as backup systems to prevent loss of
the
deletion or over-writing of important data
data Advantages
Can be used to transfer data, files and software
Cheaper than RW disks
between
computers Once burned (and finalized) they are like ROM
Advantages
Disadvantages
Data access time and transfer rate is very fast Can only be reordered once
Large memory capacities
Not all CD/DVD players and can read CD-R
Can be used to transfer information between
computers
Disadvantages CD-RW/DVD-RW
Can be easily damaged
‘RW’ means that these disks are re-writable media can be
written
over several times
Magnetic Tapes & Drives Unlike CD-R/DVD-R they don’t become ROMs
The recording layer uses a special phase-changing metal
Thin strip of plastic which is coated in a magnetic layer alloy
Read and written by read/write head
The alloy can switch between crystalline and amorphous
Uses (non-crystalline) phases, thus changing its reflectivity to
Application where batch processing is used
light,
depending on the laser beam power
Used as a backup media Spots are produced which can be read by a laser
Advantages
System allows data to be written, erased and re-written
Generally, less expensive and very robust technology many times
Data transfer rate is fast
Uses
Disadvantages CD-RWs and DVD-RWs are used to record radio and
Access time is very slow television
programs
When updating another tape is needed
They are used in closed circuit television (CCTV)
systems
3.2. Optical Backing Storage Media Advantages
Can be re used many times
CD-ROM/DVD-ROM Different file formats can be used each time
Less wasteful than R format since files or data can be
Read only memory – cannot be overwritten added at
a later stage
Data is stored as a series of pits and lands formed by a Disadvantages
laser beam
etching the surface at manufacturing stage Relatively expensive media
Uses Possible to accidentally overwrite
Store music files and software.
Very large storage capacity and are used to store
films. DVD-RAM
Advantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Recent addition to optical media group Used primarily as removable storage devices and are
Unlike other CD and DVD formats, DVD-RAMs have collectively
known as flash memory
several discrete
concentric tracks rather than a single
spiral track
Gives them advantage that writing, and reading can occur Solid State Drives
at the same
time
Makes it possible to watch an already recorded television Supports reading/writing data & maintains stored data in
a permanent
state even without power
program at
the same time as a different program is being
recorded Functions much like a hard drive but different tech
Recording layer is made from similar phase-changing Built with an array of semiconductors that form its
memory and
operated using an integrated circuit
material to that
used in RW technology
Shiny and dull marks represent data to a computer where Uses
Used to store operating systems and working data
they are
interpreted
Uses Used for storing application software
DVD-RAMs are used in recording devices such as Used in file servers for computer networks
satellite
receivers to allow simultaneous recording Advantages
Faster than hard disks because they do not need to
and playback
They are used in camcorders to store films ‘spin up’ the
disk
Advantages Robust because no mechanical parts
Have a long life (30 years) Read performance is fast even when data fragmented
Less susceptible to data loss
Can be re written on more than the DVD-RWs (100,000
times) Lighter, quieter and require less power than hard
disks
Very reliable as they have built in verification software
to
ensure accuracy of data Disadvantages
Access is very fast More expensive than hard disks
Have a smaller capacity than modern hard disks
No need to finalize the disk
Very large capacities Lower number of write cycles causing performance to
diminish
over time
Ability to read and write data at the same time
Disadvantage
DVD-RAMS are not as compatible as R or RW, many
Flash Drives/Memory Sticks
systems will not
recognize this format
More expensive than DVD-RW Otherwise called pen drive/memory stick/USB stick
Can store several GBs of data and use solid state
technology
Blu-Ray Discs
Connected to a computer through USB port and power to
Uses operate drawn
from host computer
Blu-ray disks are used in home video consoles Some expensive software increasingly uses these storage
methods as a
form of security
Used for storing and playing back films
PCs can use this technology for data storage or Uses
backing up hard
drives Used to transport files between computers
Camcorders can use this media to store film footage Used as a security device – a dongle – to prevent
Advantage software
piracy
Advantages
Very large storage capacity
Data transfer rate is very fast Very compact and portable media
Data access speed is faster than with other optical Very robust
media Disadvantages
Not possible to write protect the data and files
Disadvantage
Disks are relatively expensive Small physical size and are easy to lose.
Lower storage capacity than hard disk
Blu-ray disks still have encryption problems
Solid state systems control the movement of electrons A form of electrically erasable programmable read only
within a
microchip: if the transistor conducts a current, memory (EEPROM)
this is equivalent
to a 1, otherwise it is a 0 Uses
Have no moving parts, consume much less power and are Used to store photos on digital cameras
extremely
robust Mobile phones use them as memory cards
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Used in MP3 players to store music Occurs globally using multiple routers & re-routing until
Used as a backup in hand held devices the data
reaches its intended IP address
Advantages
Very compact
4.2. Common Network Devices
Very robust
Disadvantages
Network Interface Cards
Very expensive per Gb of memory when compared to
hard drive disks Used to connect individual computers/devices to a
Has a finite life in terms of the number of times they network
can be read from/written to. NICs come in two distinct types:
Wired: cards that have ports which allow network
4. Networks & the Effects of cables to be
plugged in directly
Wireless: cards that connect to networks using Wi-Fi
A device that enables data to be sent between different They are devices that can have multiple devices
types of
networks connected to them
Main task is to receive data from different ports and send
Commonly used to connect computers and other network
it to
each device
capable devices
to the internet
They can be connected to through cables or wirelessly The information will be received to the device whether its
relevant,
or not
Function
Bridges
Makes decisions on messages being passed between the
It connects 2 different types of networks together e.g. a
networks
Reads information about the message and decides where bus and
star network
It can only connect networks that use the same way for
the message
should go and the best route for it to get
there handling
messages
They do this by changing the form of message to suite the
Formats the messages making it suitable for the new
network different
type of network
To send data to a specific device, a router needs a More efficient than hubs in distributing data
something like
an address Each device has an access control media address MAC
which identifies
it uniquely
Internet Protocol Address: a unique number assigned to
all
computers and devices connected to the internet which MAC Address: a number unique to each device connected
to the
network (like fingerprints)
can determine
its exact physical location
A router can use this IP to send data from the internet to Data sent will have a mac address which tells the source
and
receiving device
the exact
device that requested it
Storing IP Addresses:
Routers store IP addresses in a routing table
Modems
Routing tables list all the different routes to other
networks It stands for modulator demodulator.
Routing table determines best route for data
Converts computer’s digital signals (modulates it) into
analogue for
transmission through telephone lines
Reverse this process- analogue signal from a telephone
Sending Data between Devices
line into
digital for a computer to process the data
(demodulates it)
Routers can also send ‘packets’ of data between devices
on different
networks The main use it to connect to computer networks over
long distances
using existing telephone lines
Each packet contains the data itself and the IP address of
the
device being sent to
Types of Modems:
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Any system which allows you to connect to a network or Type of server that acts as a buffer between a WAN and a
computer
through wireless communication LAN
Examples: Retrieves web pages and passes them onto the computer
WLANs that made a
request
PDAs Stores any page retrieved on the server, which means
Laptop computers that when a
different computer requests the same page it
Peripheral devices such as printers would be available
Wi-Fi Hotspots Speeds up the browsing process
Wi-Fi systems rely on AP (radio frequency technology)
to enable
the device to receive and send signals
Wi-Fi hotspots are places where you can access Wi-Fi Websites
(free or
paid)
Hotspots are found in public places like Airports, Web is made up of millions of websites and web pages
hotels, and
cafés Web pages are documents on a computer screen
War driving: The act of driving and searching for containing various
multimedia and text, pictures
unsecured
Wi-Fi hotspots A website consists of many of these pages linked together
This gives a risk to the Wi-Fi system
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Advantages Disadvantages
Smaller & lighter than Inappropriate Websites
Larger & less portable than
desktops & laptops making it
smartphones Risk of finding undesirable websites
easier to carry
Risk of doubtful websites which are not genuine
Uses Wi-Fi to connect to the They could lead to problems such as undesirable web
Larger screen than
internet which is less reliable links, security
risks
smartphones
than wired
On-screen keyboards larger Screens are smaller than
4.11. Password Interception
than those on smartphones those on laptops & desktops
On-screen keyboard is not Spyware
easy to type on
Spyware is software that gathers user information
MOBILE PHONES through their
network connections without them being
aware that this is happening
Advantages Disadvantages Once spyware is installed, it monitors all key presses and
Smallest most portable of all Websites are often not fully transmits
the information back to the person who sent out
devices displayed the spyware
People more likely to carry Small screen size makes This software can install other spyware software, read
cookies and
personal information, and change the default
this wherever they go viewing websites difficult
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Strong passwords: A random mix of alphabets (uppercase on fingers and verifies it against a stored database of
and
lowercase), numbers, and keyboard symbols (@, %, ^ authenticated
fingerprints using pattern-matching software
etc.) to allow access to a
user.
Weak passwords: Easy to guess, e.g. users name or date
of birth or
1234556, etc. 4.13. Data Protection Act
Frequent password changes can help reduce the chances
of password
interception too Failure to abide to rules can lead to fines or imprisonment
Passwords must not be shared; their strength is then of
little use.
Rules (SAREF DES SAS)
4.12. Authentication Techniques 1. Data must be Fairly and lawfully processed
2. Data can only be processed for the Stated purpose
Magnetic Stripes: Card swiped through a
3. Data must be A**dequate, Relevant and not Excessive
magnetic stripe reader that authenticates the user after 4. Data must be Accurate
reading
iron-based magnetic particles on a band of magnetic 5. Data must not be kept longer than necessary (Short
material on
the card which is also called a magstripe. time)
6. Data must be processed in accordance with the data
ID Cards: Usually a photo ID with a QR Subject’s right
7. Data must be kept Secure
or barcode that authenticates the user. 8. Data must not be transferred to another country
unless
(Domestic) they have adequate protection
Guidelines
Passports: Have an RFID chip on it that Do not leave personal information lying around
Lock all filing cabinets when leaving an office
responds to a signal sent by a RFID reader that sends
Do not leave computer without locking or logging off
information about
the passport holder to the computer
Protect passwords
system
Change passwords regularly
Physical Tokens: A security token Do not fax or email anything of sensitive nature.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Physical Faxing: dedicated fax machine connected via However, there are several problems with these as
telephone
line that copies and electronically sends files to the conference
call often lags and quality not always
the dialled
recipient high.
Electronic Faxing/Online Faxing: uses the internet to send Also, as travelling tickets increase in price, terrorists
documents through computers. can
use this way of communicating with each other,
increasing risk
Physical Faxing Electronic Faxing
Associated with a phone no. Associated with an email
Only address and phone no. Audio-Conferencing
Need actual fax machine, Cheaper- no fax machine,
Same as video-conferencing but without webcam
paper, etc. paper and ink
VOIP is often used
No encryption Better safety- encryption VOIP (Voice over internet protocol) is a method used to
The signal can get busy No busy signal issues talk to
people over internet
VOIP converts sound (picked up by a microphone) into
discrete
digital packets that can be sent to a destination
Email via internet
Advantage: free and can be used all over the world
A method for sending text and attachments from one Disadvantage: sound quality is usually bad
computer to
another over a network Security Issues:
Identity and service theft
Viruses and malware
Comparing Faxing & Email Spamming (sending junk mail)
Phishing attacks (illegitimate scams)
Fax Email
More secure (user id and
Singed faxes are legally
acceptable
password needed to access 5. The Effects of Using ICT
files)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Hit counters to see who has visited the websites Flyers & Posters
Disadvantages
Can be hacked and modified or viruses introduced A Word processor/Desktop publisher is used to create it
Need for a computer and internet connection Need to hold minimum amount of information and be
Lack of portability compared with paper-based system accessible very
quickly
Need to maintain website once it is set up Need to make an immediate impact when people look at
them
Anyone can produce them but there are highly skilled
professionals
who can produce expert posters
Multimedia Presentations Some posters require larger printers than A4
Sequence in which a flier or poster is produced on a
Uses a mixture of media to present information:
computer system
animations, video,
sound, transitions, hyperlinks
A word processor or DTP application is opened
Produced using software packages
The user creates frames, boxes and text boxes
Used with a projector so large audience can view
If necessary, photos are taken, using a camera
Advantages
The images are uploaded from the camera, loaded
Use of sound and animation/video effects
from a CD/DVD,
scanned from hard-copy photos or
Interactive/hyperlinks built into presentations
downloaded from the internet
More likely to hold audience’s attention
The photos are saved to a file
Disadvantages
The photos are imported or copied and pasted into the
Need for special equipment – expensive
document
May require internet access
The photos are edited and typed in or imported from a
file and
then put into required style
Music Scores
Mobile Phones
Music samplers and mixers allow original tracks that were
recorded
in a studio to be modified
Wireless devices that allow users to make phone calls
Electronic instruments can play back through electronic
from anywhere
with cell reception
effects
machines
They connect to the telephone system using radio signals
Synthesizers combine simple wave forms to produce
This requires them to be in range of a mobile tower
complex music
creations
Used for communication via
Electronic organs can mimic any other instrument
Phone calls
Music scores can be generated from music itself using
Text messaging
software
Social Media
Software can automatically correct music notes in a score
There is no need to understand music notation to write a
music score
Music notes are automatically printed out in the correct Internet Telephony/VOIP
format
VOIP (Voice over internet protocol) is a method used to
talk to
people over internet
VOIP converts sound (picked up by a microphone) into
Cartoons discrete
digital packets that can be sent to a destination
via the internet
Animations can be produced using computer hardware
and software
With 3D animations objects are designed on a computer
and a 3D
skeleton is produced Publicity & Corporate Image
Parts of the skeleton are moved by the animator using key
frames Publications
The difference in appearance of the skeleton in these key
frames is
automatically calculated by the software and is Business Cards:
known as tweening or
morphing Miniature printed documents that provide information
The final stage is to make a realistic image by a technique about the
business/organisation
known as
rendering Usually printed on thick cards
Easily distributable to potential clients
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Surveys
School Reports
All data handling starts with data collection
Data capture forms can be used for many applications
Database applications such as SIMS store large amounts
Decide what needs to be collected and then what
of data which
can be used to create annual and termly
questions should
be used to collect it
school reports
Paper or electronically
Things able to be gathered from here are:
Rules for creating forms
Data individual to student – tests/exam results
Make them look official
Student progress – target grades being met or not
Spaces should be thought about giving enough space
Number of absences – create a percentage of amount
for answers
of days
attended school
Restrict the amount of possible answers, do not use
Teacher comments – adds comments on to report
open
questions
If open questions are used limit the amount of space
available
for answers 6.3. Measurement Applications
Asking for ‘Name’ needs to be carefully thought about
Are you asking for sensitive information? Sensors are used to send data to a computer where the
People may not feel comfortable being truthful data is
processed
What names do you want? The computer simply reviews the data from the sensors
First name, family name etc. (by comparing
it to data stored in memory) and updates
Date of Birth its files and/or gives a
warning signal if the values are
What format do you want it in? outside given parameters
Give instructions about how to answer questions No changes to the process are made
How will the data be collected? Examples:
Paper surveys are scanned using OMR or OCR Scientific experiments
Advantages Weather stations
Faster to get results
Fewer errors
It is easier to do statistical analysis
Analogue & Digital Data
Less expensive to carry out; requires fewer people
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Digital data: discrete, fixed value (used by computers) Intensive Care Units in Hospitals
Analogue data/signals: continuous value that varies
smoothly Sensors read key vital signs (such as pulse/heart rate,
Analogue device = measure length, weight, temperature,
blood pressure, respiration, etc.)
temperature etc. The data from the sensors is converted into digital using
E.g. Thermometer – represents temp. by the height of an ADC
the liquid
column The data is stored in the computer memory
Sensors: measure physical and analogue qualities The computer compares the data from the sensor with
Analogue data from sensors needs to be converted into the values
stored in its memory
digital data
using an analogue to digital data converter The results are output on a screen in the form of graphs
(ADC) so that the
computer can understand and process and/or
digital read-outs
the data from the sensors An alarm is activated if any of the data is outside
If the computer sends signals to motors, valves, etc. then acceptable
parameters
this data
also needs to be converted to analogue using a The system continues to monitor the patient until the
digital to analogue
converter (DAC) so that the computer computer is
turned off
can effectively control these
devices
Advantages of Using Computers in
Analogue to Digital Converter (ADC)
Measurement
Used when you want to attach an analogue input device to
a digital
device such as a computer. The computer will not forget to take readings
This is so the analogue data can be The computer’s response time is much faster, which is
understood/processed by the
computer since computers particularly
important in the patient monitoring example
only work w/digital data Doctors, nurses, scientists, etc. can all get on with other
E.g. When processing data sent from a sensor tasks
while the monitoring is done automatically
Computer give 24 hours cover every day (i.e. 24/7)
The readings will tend to be more accurate
Readings can be taken more frequently if they are done
Digital to Analogue Converter (DAC) by a computer
and sensors
It could also be safer if whatever is being monitored may
Used when you want to attach an analogue output device have
potential hazards (e.g. children falling into the river
to a digital
device such as a computer whilst
attempting to take readings)
E.g. If the computer is being used to control a device
(motor/valve)
the device will be controlled by variable
voltages; the DAC will be
used to send out analogue
signals Disadvantages of Using Computers in
Measurement
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
It does this by sending signals to devices controlling the Needs to be time for changes to have effect
process Unmanageable situations
Door may not be shut
Needs to draw user’s attention
Usually a buzzer and light
Turtle Graphics
Based on computer language called LOGO and is now
usually known as
turtle graphics Central Heating System
It is the control of the movement of a ‘turtle’ on a
computer screen
by several key instructions which can be Applying factors
typed in Inputs
The use of ‘repeat’ instructions makes a piece of code Inputs from the user
more
efficient Room temperature required
Time systems turns on/off
Command Meaning Inputs from the system
FORWARD x Move x cm forward Actual room temperature
BACKWARD x Move x cm backward Clock giving the time
Outcome
LEFT d Turn left through d degrees
Heating or cooling room during the required times
RIGHT d Turn right through d degrees Outputs
REPEAT n Repeat next set of instructions n times Boiler
ENDREPEAT Finish the repeat loop Air conditioner
Processing
PENUP Lift the pen up
Check time against the one input and switches on
PENDOWN Lower the pen when that
time is reached
Same done to check when to turn off
When on, microprocessor reads temperature from
sensor and
compares it with desired temperature
Automatic Washing Machines If too low, it will heat up by turning the boiler on
and
if it’s too high it will turn the air conditioner
Have a microprocessor in them which contains the
on
software which
controls the washing machine
These will stay on until desired temperature is
Appling the factors
reached
Inputs
Pressure sensor on the door to detect if open or
closed
Sensor to detect if the required level of water is in Automatic Cookers
Temperature sensor to check temperature
Outcome Have temperature sensors and timers with manual
Clothes have been washed controls to set
start and end times, and temperature for
Outputs cooking.
Heater Working similar to Central Heating System.
Motor to spin drum
Lights on machine to show user stage the cycle is
at
Actuators to turn the inlet valves on to allow hot Burglar Alarms
and cold
water into the machine
Burglar alarms detect any intrusion.
Actuator to turn the outlet valve on to let the water
Sensors such as motion sensors, door and window
out of
the machine when the wash is complete
sensors,
magnetic sensors, multi-functional sensors
An actuator to control the pump
(vibration, shutter,
and temperature) measure the
Processing
physical quantity and inputs the
value to a
Software to make decisions which will allow the
microprocessor.
clothes to
be washed
The microprocessor compares the input values with
Time taken before next inputs
the preset
values, if changes are detected, the
Timer as part of the software
microprocessor sends
signals to the actuator
Time different cycles (when to add
The actuator activates the sirens or gives a phone call
soap/conditioner/etc.)
or
messages the input mobile number.
Time delay in measuring temperature
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
6.6. Applications in Manufacturing
Glasshouse Industries
Temperature controlled the same as central heating Robotics
system
Humidity must also be controlled Robots are used in many areas of manufacturing, from
Humidity sensor tells computer how humid it is heavy work
right through to delicate operations e.g. car
Computer then decides to turn the water supply to bodies, welding
bodywork, manufacturing of microchips
sprayers etc.
Windows also operated by the computer Control of robots is either through embedded
Need to find the balance of how often to have windows microprocessors or
linked to a computer system
open Programming of the robot to do a task is generally done in
Blinds that can be computer controlled two ways:
Light sensor measures light intensity The robot is programmed with a sequence of
When sun is strong the computer actuates electric instructions which
allow it to carry out a series of tasks
motors which
close blinds Alternatively, a human operator manually carries out
Control in glasshouse is more likely to be used in a series of
tasks and how each task is done is relayed
commercial areas
or large glasshouses not in gardens back to the robot
(embedded processor) or controlling
computer. The sequence of
instructions is
6.5. Modelling Applications remembered so that the robot can automatically
carry
out each task identically each time (e.g. assembling
A mathematical computer model is created to manipulate parts
in a television)
variables
and see real time changes in terms of figures. Robots are often equipped with sensors so they can
Used to find how mechanisms control a system. gather important
information about their surroundings
Advantages: Sensors also prevent them from doing ‘stupid things’, such
Cheaper than building physical system to test as
stopping a robot spraying a car if no car is present, or
Safer than building system and experimenting stopping
the spraying operation if the supply of paint has
Easier to experiment with various scenarios run out etc.
Quicker as no need to build system Robots are very good at repetitive tasks
Near-impossible tests involving space and volcanic However, if there are many different tasks (e.g. making
scenarios
can be modelled risk-free specialist
glassware for some scientific work) then it is
What if analysis can be conducted that allow a certain often better to still
use human operators
figure to
be computed by letting the computer change
other variables that
affect the value needed to be set. Advantages
E.g.
Disadvantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Disadvantages
Gathers the results and puts them into the student Advantages
database. No double booking as very Set-up and Maintenance
Creating timetables and managing teaching
minimal delay. expensive
cover/substitution
Immediate booking and Computer and reliable
Considers the student’s choices, availability of
selection of seats internet access required
teachers and
rooms, subject clashes and the number
of hours needed for each
subject to produce accurate Sever crashes can result in
Bookings can be made any
timetables that can easily be made
changes to and the bookings completely
time
cover with teacher to be substituted. stopping
School management systems: Digital ticket; printing and Need for website to be well
postage costs designed to ensure ease of
Advantages Disadvantages reduced/eliminated use
Absenteeism can be Operating the software will QR codes for authentication; No special relation built with
addressed more easily. need some training. no need for human, can use booking agent who can give
The initial cost of the software scanner; reduced costs special promotions etc.
Parents are kept updated.
is expensive.
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
in
booking seats if the response is not immediate then can
cause
problems like double booking)
6.10. Computers in Medicine
Patient records: Database that holds patient details and
Real-time Process Control
can be
accessed from any computer within the hospital
intranet.
An example of online processing
Patient identification: Barcodes on wristbands of the
Very different to real-time (transaction) processing
patients
can be used to access their patient record.
System usually involves sensors and feedback loops
Pharmacy records:
In real-time process control, physical quantities are
Generates labels for drugs
continually
monitored and input is processed sufficiently
Checks if the patient is allergic to a particular drug.
quickly to influence
the input source
Patient monitoring:
Sensors measure changes in temperature, heart rate,
6.9. Banking Applications breathing
rate, brain activity, blood pressure, blood
sugar levels and
oxygen levels in the patient’s body.
Online banking systems rely on the ability to update files The analogue signals from the sensors are converted
immediately, thus preventing double booking, which could into digital
signals using an analogue to digital
happen if
the system response time was slow converter.
The use of computer technology has revolutionized how Graphs are produced to show trends over time.
we do our
banking transactions, for example: The readings are constantly compared with the pre-
Internet banking set values, if
the values aren’t in the prescribed range,
The use of automated teller machines (ATMs) the medical staffs
are notified.
Chip and PIN technology Hospital management system: All the above-mentioned
points come
under the hospital management system
which holds all of them, and
can be used to access data
Automated teller machines (ATMs) from all the departments.
Expert systems:
Automated teller machines (ATMs) are places where The interactive screen asks a series of question for
customers can get
cash (or carry out certain other the doctor
to answers, using a keyboard or a touch
banking activities such as order a
statement) using their screen.
credit or debit card The inference engine compares the symptoms with
the knowledge
base, using the rule base to find
What goes on behind the matches
Sequence at ATM
scenes The system suggests the possible illness with a
Customer puts card into Contact is made with bank’s probability of
each, cures and recommendations on
ATM computer the next step to be taken.
The explanation system will explain how that
PIN is checked to see if it is
particular
diagnosis was suggested.
PIN is entered using the correct
Using 3D printers in medicine:
keypad Card is checked to see if it is
Surgical and diagnostic aids: A CT or MRI is used to
valid
produce
images of the internal parts of the body. A 3D
A number of options are printer can then
be used to reproduce the internal
given: change PIN, top up organs as a solid object.
mobile, see balance, get Prosthetics: 3D printers are used to print out artificial
money body parts such as false tooth, artificial limbs, hearing
The customer selects the aids,
etc. This is a less expensive method of replacing
cash option & several cash body parts.
options are shown Tissue engineering: Used to produce layers of cells to
The customer’s account is replace damaged tissues.
The customer accepts one of accessed to see if they have Design of medical tools and equipment: Tools can be
the options or types in a sufficient funds, it is checked to made
faster and with reduced costs. They can also be
different amount see if they are withdrawing made changes to
easily, whereas it wasn’t the same
more than their daily limit with traditional methods.
The customer is asked if they
want a receipt 6.11. Computers in Libraries
The card is returned Transaction is okay
Many library systems are computer controlled
Money is dispensed Customer’s account is updated
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
They usually involve the use of barcodes on the books A knowledge base is designed and then created
being borrowed
and on the borrower’s library card The rules base is designed and created
The following describes a computerized library system The inference engine is designed and created
based on
barcodes The input screen and output format are also designed and
There are two files: created –
this is known as the user interface
Book file, containing fields for example: barcode, book The expert system is tested against known conditions and
title,
name of author etc. scenarios
Borrower’s file, containing fields for example: It is also checked to see if it meets the original
borrower’s
number, borrower’s name etc. specification
When a borrower takes out a book, the book’s code is Experts are interviewed about how effective it is before
scanned the expert
system goes out on general release
The book details are then found on book file
The borrower’s library card barcode is then scanned for Advantages
the
borrower’s unique number
Expert systems provide consistent answers
The book file is linked to the borrower’s file and both files
They never ‘forget’ to answer a question when
are
updated to indicate which book has been borrowed
determining the logic
and when it is due
back
Using expert systems reduces the time taken to solve a
The borrower’s file is interrogated daily by the computer
problem
to see
which books are overdue for return:
A less skilled worker force is needed, which gives the
The computer reads a record from the book file
potential of
saving money, but also allows areas of the
It compares the date due back with the current date
world access to expertise
which they could not normally
If the date due back is less than (or equal to) the
afford
current date
(i.e. earlier date) …
…using the barcode number of the book… Disadvantages
…the book file is linked to the borrower’s file…
…and the corresponding record is read from the They tend to lack common sense in some of the decision-
borrower’s file making
processes
The customer details are then found and a letter or Errors in the knowledge base can lead to incorrect
email is
automatically sent out decisions being
made
The next record in the book file is then read… It can be expensive to set up in the first place
…until the whole file has been checked Considerable training is necessary to ensure the system
is sued
correctly by the operators
These systems have been developed to mimic the Components of an Expert System
expertise and
knowledge of an expert in a particular field
Examples include: User Interface
Diagnosing a person’s illness
Diagnostics (finding faults in a car engine, finding This is the only thing that the end user sees
faults on a
circuit board, etc.) Allows the user to interact with the system
Prospecting for oil and minerals Often requires training to operate effectively
Tax and financial calculations
Knowledge base
Chess games
Identification of plants, animals and chemical This is a database designed to allow the complex storage
compounds and
retrieval requirements of a computerized knowledge-
Road scheduling for delivery vehicles based management
system (in support of an expert
system)
Inference engine
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
This is made up of a series of ‘inference rules’ (e.g. IF the Waiter inserts card into chip and PIN reader
country is in South America AND the language used is Restaurant’s bank contact customer’s bank
Portuguese THEN
the country must be Brazil) Card is checked to if valid
These inference rules are used by the inference engine to If card is stolen or expired, then transaction is terminated
draw
conclusions Customer enters PIN using keypad
They closely follow human-like reasoning PIN is read from chip on card and is compared to one just
keyed in
If they are the same, the transaction can proceed
Check is then made on whether they have enough funds
Suggesting Diagnoses If there are not enough funds available, transaction is
terminated.
Otherwise, transaction is authorized
The interactive screen asks a series of question for the
Authorization code is sent to restaurant
doctor to
answers, using a keyboard or a touch screen.
Price of meal is deducted from customer’s account
The inference engine compares the symptoms with the
Same amount of money is credited to restaurant’s bank
knowledge base,
using the rule base to find matches.
account
The system suggests the possible illness with a probability
Receipt is produced as proof of purchase
of each,
cures and recommendations on the next step to
be taken.
The explanation system will explain how that particular
diagnoses
was suggested. Internet Shopping
6.13. Computers in the Retail Industry Online shopping: Shopping over the internet.
To customer:
Automatic Stock Control Advantages
Cheaper goods (the company doesn’t have to pay
Automatic stock control systems rely on the use of rent for
stores and doesn’t need more employees)
barcodes Wide range of products
Barcodes now appear on most products sold in shops Delivery at your doorstep
They allow quick identification of product details once the You can shop 24/7
barcode
has been scanned by a barcode reader Shop from any part of the world
Supermarkets use electronic point of sale (EPOS) You save the travelling costs of going for shopping
terminals, which
incorporate a barcode reader that scans Disadvantages
the barcode, retrieve the
price of the article and relay Quality isn’t assured
information back to the computer
system allowing it to People are worried about giving their card details
update its files online.
Barcodes are made up of alternating dark and light lines Packing and postal charges are added
of varying
thickness Personal services that you get from stores are
A number underneath the barcode usually consists of four missed.
parts:
country code, manufacturer’s code, product code, Returning the products is harder
and a check digit No relaxation that you get from actual shopping
The check digit is a form of validation which is used to Bogus sites are present where you pay and never
make sure
no errors occurred during the reading of the receive the
product
barcode To seller:
Every time the barcode is read, this calculation is Advantages
performed to
ensure that it has been scanned correctly No need to pay rents
No fixed working hours
Less/no shoplifting
Sell goods to customers anywhere in the world
Electronic Funds Transfer at Point of Sale (EFTPOS) Cheaper to contact customers (via e-mail)
Site warehouse where rental is cheap
Many credit cards are equipped with a chip as well as a Sell goods 24/7
magnetic
stripe – containing the PIN Disadvantages
This system is designed to enhance security since it is ICT knowledge needed to set up website
better than
relying only on a signature Unemployment
When paying for items using a chip and PIN card, a form Business abroad is lost if the prices are cheaper
of
electronic funds transfer (EFT) takes place there
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Home Address Open emails from known sources, and do not click on an
Banking details (A/C no, pin, etc.) emails wit
hyperlinks without confirming with the sender
Medical history (suffered from depression, etc.) of the email. Think
before opening an email from an
Personal data like ethnic origin, political views, unknown person, never send any other
sensitive
criminal
activity, mental health history, information (picture in school uniform, credit card PIN,
Sexual orientation and religion can be used to etc.)
blackmail victims
of data breaches Ask their ISP to enable email filtering to classify spam
If personal data is leaked (data breach), the following can mails as spam.
occur:
Identity theft
Bank fraud
Damages to personal property Social Media Safety
Kidnapping (if kidnappers get access to the victim’s
Block and report users who seem suspicious or use
address.
inappropriate language
Etc.
Never use you real name, only use a nickname
To prevent the above, it is essential that personal data is
Use appropriate language
protected.
Do not enter private chat rooms, as users can lure you
Personal data can be leaked intentionally and
into giving personal information by seeming too nice.
unintentionally.
Electronic data is at risk due to: hacking,
Do not meet anyone off the internet for the first time on
viruses, spyware,
phishing, pharming, Smishing, vishing,
your own, or at least speak to a trusted adult first.
ransomware (A malicious
program that encrypts data on
Do not misuse images (of someone to blackmail them, for
a computer system and demands for a
ransom to provide
e.g.)
and decrypt the data), spam, moderated and
un-
Respect the confidentiality of other users
moderated forums, cookies, etc.
If a student shares a photograph of themselves in their
school
uniform on social media, then paedophiles, child
predators,
kidnappers, etc. can physically reach the Online Games
student. This should not
be done
Similar measures apply to that taken when using social
media.
Additionally, players should be careful about:
Internet Safety
In-game violence
Cyber bullying
To keep personal data safe, one must:
Keeping their webcams off (other potentially
Not give unknown people (on the internet) personal
dangerous players
have direct access to your image)
information
or send pictures of oneself to them.
Predators may use voice masking technology to lure a
Maintain privacy settings to control which cookies are
user to
reveal their age, sex etc.
on their
computer
Cyber-attacks involving viruses, ransomware, etc.
Use learner friendly search engines and websites
recommended by
your educational institution, e.g.
znotes.org 8.3. Security of Data
The website being accessed is from a trusted source,
or has a
padlock symbol/ https protocol (s for secure): Hacking
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
After typing in user ID, the user will be requested to type Features of a Secure Web Page
in their
password
Generally, it is a combination of letters and numbers Webpage URL: If the webpage is secure, it will start with
Passwords are shown as stars (***) so nobody ‘https’ instead of ‘http’.
overlooking can see
it
Many systems ask for password to be typed in twice as a Padlock sign
verification
check, in case of input errors
To help protect the system, user has a finite number of Phishing
attempts
If password is forgotten, administrator must reset it Phishing is a fraudulent operation involving the use of
If password is forgotten on a website, it will be sent to emails
your
e-mail The creator sends out a legitimate looking email hoping to
gather
personal and financial information from the
Biometric Data recipient of the email
The message appears to be from a legitimate source (e.g.
Uses features of the human body unique to every
a famous
bank)
individual, such as
fingerprints, retina, iris, face and voice When the user clicks on the link, they are sent to a spoof
recognitions. It is used
in authentication techniques as it is website
very difficult / impossible to
replicate. They will be asked for personal info e.g. credit card
Advantages details, PINs
Usernames and passwords don’t have to be This could lead to identity theft
remembered ISPs attempt to filter out phishing emails
Almost impossible to replicate body parts.
Somebody else can’t gain access, like with a stolen Pharming
card
They can’t be forgotten, like a card Pharming is a scam in which malicious code is installed on
Disadvantages a
computer hard disk or a server
The readers are expensive This code can misdirect users to fraudulent websites
Damages in fingerprints can deny access without their
knowledge
Some people worry about their personal Phishing requires an email to be sent to every person who
information being
stored has been
targeted, while pharming does not require
emails to be sent out to
anyone
Digital Certificate Pharming can target a larger group of people more easily
How pharming works:
A digital certificate is an electronic passport used in the A hacker will infect the computer with a virus, either by
security
of data sent over the internet. sending an email or installing software on their
They can be attached with mails so that the receiver can computer when
they first visit their website
know that
the mail is sent from a trusted source. Once infected, the virus sends user to a fake website
that looks
identical to the one they wanted to visit
Secure Socket Layer (SSL) Personal info. from the user’s computer can be picked
up by the
pharmer/hacker
Type of protocol that allows data to be sent and received
Anti-spyware, anti-virus software or anti-pharming
securely
over the internet
software can
be used to identify this code and correct
When a user logs onto a website, SSL encrypts the data
the corruption
https or padlock in the status bar
When user wants to access a secure website:
Smishing
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
An attempt to extract a user’s confidential information via Moderated Forums Unmoderated Forums
SMS
(short message service) by tricking the user into Highly secure due to Personal information can be
downloading a
Trojan horse (a virus that masks itself). moderation obtained from you
It is phishing via SMS.
Not secure due to lack of
moderation
Preventing Phishing, Pharming & Smishing
Computer Viruses
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
Less text
Copyright Laws
Young children Simple wording
Large text It is not legal to make a copy of software, then sell it or
Games/activities give it
away to other people
Software cannot be used on a network unless a network
Easy to use
license has
been acquired
Attractive/stylish colours Not legal to use coding from software in your own
Interesting content software without
permission
Teens & adults Balance of pictures and text Renting out software without permission is illegal
Clear fonts It is illegal to use the name of copyrighted software
Bullet points without
permission
Contrasting/easy-to-read colours
Include clear instructions
Use slightly larger font sizes Software Protection
Seniors
Fewer technical terms
Installed software will require a unique reference number
Consistent design User will have to accept license agreement
Easy to use Holograms are used to indicate software is original
Software may only run if CD-ROM or DVD-ROM is actually
in the drive
Some software will only run if a memory stick is plugged
Potential Problems in USB
ports
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
10. Communication
User ID and Password Protection
10.1. Email Email services require a user ID to authenticate users
Passwords should contain alphabets, numbers and
National Laws special characters
(#, *).
Email Groups
In some countries, emails are monitored or read, thus Easier to send out multiple mails by grouping them under
limiting the
topics on which you can speak. one name.
Companies and organization can group people according
to their
target group for marketing purposes.
Spammers can create email groups by buying addresses
Acceptable Language
of people from
a certain company and send in easier
Language used in emails must lie within an acceptable ways.
code of
practice. The following is a list of unacceptable Companies use email groups to set up meetings. Typing
content that are
beyond the code of practice: out individual
addresses may leave out a few mail IDs.
Obscene images
Abusive language 10.2. Internet Fundamentals
Racist, exploitative and violent messages
Use of illegal materials in messages *INTERNET AND INTRANET EXPLAINED IN CHAPTER 4*
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
10.3. Information on the Internet 11.2. Reduce File Sizes for Storage or
Information is more likely to be up to date than in books, Transmission
since
websites can be updated very quickly
Much easier to get information from websites- search Files that are smaller in size upload and download faster
engines link
key words together and find information that than
larger ones and thus are better for transferring data.
matches the criteria-
cause for popularity
12. Images
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
An image should be edited when doing so will enhance its Page, section and column breaks are used to ensure that
usefulness. widows and
orphans are not present in a document (these
show poor typography).
A mail merge document is created in order to create a
13. Layout standard
template and then use it to send documents
personalised (by the
computer system) for the respective
Headers and footers ensure each page has all the recipient of the document
required
information like the page numbers, logos, titles,
etc.
A common mnemonic is "An orphan has no past; a widow 17. Data Manipulation
has no
future"
17.1. Create a Database Structure
14. Styles Flat file databases are tables that have data sorted in
rows and
columns, whereas relational databases are
Several organisations use a ‘corporate house style or
several tables grouped
together to from a link, thus
corporate
branding, which is used to print on websites,
preventing unnecessary repetition of
data.
visiting cards,
letters, etc. It refers to a specific style of
Primary key: The key field of a table which is unique and
fonts and formats
used in the making of ICT solutions by
identifies
each record
organisations.
Foreign key: The field linked to the primary field of the
A corporate house style when used effectively identifies
table
linked to through a relationship
the users
of the style.
Consistent styles enable users to associate a particular Relational database Flat-file database
organisation with a style and also show consistency in the
Complex queries can be
ICT
solutions created by the organisation Poor at complex queries
carried out
Better security Poor at limiting access
15. Proofing Cater for future requirements
Harder to update, so
inherently inefficient
15.1. Software Tools Data is only stored once Potential duplication
Require more planning Easy to design
When a person’s/organisation’s name is entered or Non-unique records
sometimes newly
coined terms are used, spell checkers Harder to change data
might pick these up as errors,
because they are not found format.
in the dictionary. This makes spell
checkers less efficient.
Validation ensures that the data being entered into an ICT
At times placeholders for media such as images, sound
solution
is reasonable and makes sense. Entered data is
bites and
video clips are used to enhance the usability of a
checked against set
criteria to be validated.
database
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
WWW.ZNOTES.ORG
CAIE IGCSE ICT (0417)
If several external stylesheets are attached to one web All files in one folder
page,
the stylesheet attached last (at the bottom of that Host Name/URL/IP address for ftp
part of the
code) is given preference over the other Host port to be used for upload
attached ones). Username and password
The test plan used to test a webpage must be justified
19.4. Test and Publish a Website based on the
elements being tested. E.g. If hyperlinks are
being tested, it makes
to check if all the hyperlinks are
To upload and publish content on a website using FTP, a redirecting the user to the
correct webpage/ section of
user must
have: webpage.
FTP client software
WWW.ZNOTES.ORG
CAIE IGCSE
ICT (0417)