Cambridge IGCSE ICT Study and Revision Guide Study Guide - Graham Brown and David Watson
Cambridge IGCSE ICT Study and Revision Guide Study Guide - Graham Brown and David Watson
Photo credits
p.1 l © © Shaffandi/123RF, r © Mikekiev/123RF; p.6 © Ing. Richard
Hilber/https://commons.wikimedia.org/wiki/File:Inside_Z9_2094.jpg; p.7 l ©
Aimage/123RF, r © Nataliya Hora/123RF; p.11 l © Lucian Milasan/123RF, r ©
Sittinon Supawanit/123RF; p.18 l © Amnach kinchokawat/123RF, r © Vadim
Ermak/123RF; p.25 l © Aleksanderdn/123RF, r © Anatol Adutskevich/123RF;
p.29 © Ohmega1982/Shutterstock.com; p.41 © Maksym yemelyanov/123RF;
p.48 l © Marco Saracco/123RF, r © Yuriy Klochan/123RF; p.49 l © Mariusz
Blach/123RF, r © Yuri Maryunin/123RF; p.50 © Artpartner.de/Alamy Stock
Photo; p.55 © Rostislav Sedlá˘cek/123RF; p.57 © Piero Cruciatti/Alamy Stock
Photo; p.60 l © Tyler Olson /123RF, r © Wojciech kaczkowski/123RF; p.80 t ©
Pixelrobot/123RF, c © Bkilzer/123RF, b © Galina Peshkova/123RF; p.81 t ©
Franck Boston/123RF, b © Alexutemov/123RF; p.87 l © Ion Chiosea/123RF, r
© Dzianis Rakhuba/123RF; p.91 l © Supreeth Bhat/123RF, r ©
Aniwhite/123RF; p.101 © Mike Pellinni/Shutterstock.com; p.131 l ©
Regular/Shutterstock.com, r © Matej Kastelic/Shutterstock.com.
t = top, b = bottom, c = centre, l = left, r = right
Acknowledgements
Every effort has been made to trace all copyright holders, but if any have been
inadvertently overlooked, the Publishers will be pleased to make the necessary
arrangements at the first opportunity.
Although every effort has been made to ensure that website addresses are correct
at time of going to press, Hodder Education cannot be held responsible for the
content of any website mentioned in this book. It is sometimes possible to find a
relocated web page by typing in the address of the home page for a website in
the URL window of your browser.
® IGCSE is the registered trademark of Cambridge International Examinations.
The questions, example answers, marks awarded and/or comments that appear in
this book were written by the authors. In an examination, the way marks would
be awarded to answers like these may be different. This book has not been
through the Cambridge endorsement process.
Hachette UK’s policy is to use papers that are natural, renewable and recyclable
products and made from wood grown in sustainable forests. The logging and
manufacturing processes are expected to conform to the environmental
regulations of the country of origin.
Orders: please contact Bookpoint Ltd, 130 Milton Park, Abingdon, Oxon OX14
4SB. Telephone: (44) 01235 827720. Fax: (44) 01235 400454. Email
[email protected] Lines are open from 9 a.m. to 5 p.m., Monday to
Saturday, with a 24-hour message answering service. You can also order through
our website: www.hoddereducation.com
ISBN: 9781471890338
eISBN: 9781471890352
© Graham Brown and David Watson 2017
First published in 2017 by
Hodder Education,
An Hachette UK Company
Carmelite House
50 Victoria Embankment
London EC4Y 0DZ
www.hoddereducation.com
Impression number 10 9 8 7 6 5 4 3 2 1
Year 2021 2020 2019 2018 2017
All rights reserved. Apart from any use permitted under UK copyright law, no
part of this publication may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying and recording, or held
within any information storage and retrieval system, without permission in
writing from the publisher or under licence from the Copyright Licensing
Agency Limited. Further details of such licences (for reprographic reproduction)
may be obtained from the Copyright Licensing Agency Limited, Saffron House,
6–10 Kirby Street, London EC1N 8TS.
Cover photo © Oleksiy Mark – Fotolia
Illustrations by Aptara Inc.
Typeset in India by Aptara Inc.
Printed in Spain
A catalogue record for this title is available from the British Library.
Contents
Introduction
Section 2 Practical
11 File management
12 Images
13 Layout
14 Styles
15 Proofing
16 Graphs and charts
17 Document production
18 Data manipulation
19 Presentations
20 Data analysis
21 Website authoring
Welcome to the Cambridge IGCSE® ICT Study and Revision Guide. This book
has been written to help you prepare fully for your ICT Examination. Following
the ICT syllabus, it covers all the key content as well as sample questions and
answers and practice questions to help you check your understanding and to
learn the key points for gaining the best examination grade of which you are
capable.
How to use this book
Key objectives
A summary of the main information.
Examiner’s tip
Tips that give you advice to help you give the perfect answer.
Student’s answers
Examiner’s comments
Feedback from an examiner showing what was good and what could be
improved.
Exam-style questions
Exam questions for you to try to see what you have learned.
CHAPTER 1
Types and components of a
computer system
Key objectives
The objectives of this chapter are to revise:
• software
• hardware
• main components of a computer system
• operating systems
• different types of computer system
• emerging technologies.
Key terms
Term Definition
Application Programs that allow the user to do specific tasks on a
software computer.
System Programs that allow the hardware to run properly and
software allow the user to communicate with the computer.
CPU Central Processing Unit. The part of a computer that
interprets and executes commands from computer
hardware and software.
Microprocessor Single integrated circuit which is at the heart of most
computers; incorporates the functions of a CPU on a
single circuit board.
Operating Software running in the background of a computer; it
system manages many functions, such as user interface,
error handling, memory management and managing
user accounts.
Software and hardware
Hardware consists of all the physical components of a computer system, while
software refers to the programs used for controlling the operation of a computer
or for processing electronic data.
Word processor
This is used to manipulate text documents and text entered via a keyboard; the
software has such features as editing, saving and manipulating text; copy and
paste; spell checker and thesaurus; importing photos, text and spreadsheets;
translation of text into other languages.
Spreadsheet
Used to organise and manipulate numerical data; data is organised in cells in a
grid of lettered columns and numbered rows; common features include: formulae
to carry out calculations; ability to produce graphs; data replication; ability to do
modelling and ‘what if’ scenarios.
Database
Used to organise, manipulate and analyse data; uses one or two tables to organise
the data; tables are made up of records; common functions include ability to
carry out queries on data and produce reports, and add, delete and modify data in
tables.
Control/measuring
Designed to allow computer/microprocessor to interface with sensors to allow:
physical quantities in the real world to be measured; control of processes by
comparing sensor data with pre-stored data and sending out signals to alter
process parameters (for example, open/close a valve).
Apps
Type of software that usually runs on tablets or mobile phones; examples include
music streaming, GPS and camera facility (but there are thousands of Apps
available).
Photo editing
Allows user to manipulate digital photos, for example change the brightness,
contrast, colour saturation, remove ‘red eye’, and so on.
Video editing
Allows user to manipulate videos, for example, addition of titles, colour
correction, creating transitions between video clips, and so on.
Graphics manipulation
Allows bit map and vector images to be changed; allows the manipulation of
lines, curves and text depending on the format of the original image.
Systems software
Compiler
A program that translates high-level language code into machine code so that it
can be run on a computer (that is, it produces object code from original source
code).
Interpreter
This is software that directly executes a program without previously compiling it
into a machine language.
Linker
A program that takes one or more object files (modules) produced by a compiler
and combines them into a single program that can be run on a computer.
Device driver
Software that enables one or more hardware devices to communicate with a
computer’s operating system; as soon as a device is plugged in, the operating
system looks for the correct device driver.
Utilities
Software designed to carry out specific tasks on a computer, such as anti-virus,
anti-spyware, file management and disk defragmenter.
Internal computer hardware
Motherboard
A printed circuit board that allows the processor and other computer hardware to
function and communicate with each other; acts as a ‘hub’ that other computer
devices connect to.
RAM
Random Access Memory; an internal chip where data is temporarily stored (data
is lost on switching off the computer, which gives it the name volatile memory);
RAM can be read from or written to and stores the data or part of the operating
system currently in use.
ROM
Read Only Memory; memory used to store data that needs to be permanent (data
is kept even when the computer is switched off, which gives it the name non-
volatile memory); data on the ROM cannot be altered or deleted, which is why it
is used to store computer configuration or the BIOS.
Video card
Allows the computer to send graphical data to a video display device such as a
monitor, television or projector; it is made up of a processor, RAM, cooling
mechanism/heat sink and connections.
Sound card
An integrated circuit board that provides the computer with the ability to
produce sound via speakers or headphones; uses FM synthesis or wavetable
synthesis to translate digital data into analogue data (to drive the
speakers/headphones).
HDD/SSD
Hard disk drive and solid state drive; devices built into a computer to allow data
to be stored for later use or to store application software, photos, videos and
more; SSD is a more modern system with no moving parts, whereas HDD uses
rotating magnetised platters and read/write heads.
CPU
Central processing unit; part of the computer that interprets and executes
commands from computer hardware and software; usually part of the
motherboard.
Microprocessor
The CPU is often referred to as a microprocessor; it is a single integrated circuit
made up of the control unit, arithmetic-logic unit (ALU) and RAM.
Operating systems
One program manages the hardware and software of a computer, and makes it
possible for programs to function; it is known as the operating system.
Examiner’s tip
To determine the depth of answer required, always look at the mark
allocation and the space given to write the answer. Try not to exceed
the amount of space allocated. If you do make a mistake or need more
space, be very careful to indicate to the examiner where the rest of
your answer is written. Most papers are now marked online, so
examiners only see the page where your answer is written unless you
guide them to another page.
Types of computer
Examiner’s tip
Always read the question very carefully. In part a, it is important not to
give more than four features since only the first four will be marked and
marks could be lost if earlier examples were incorrect. In part b, the
question asked for different devices in each given application – it is,
therefore, important not to repeat your devices otherwise marks will be
lost.
Emerging technologies
Vision enhancement
LVES (low-vision enhancement systems) allow images to be projected inside a
headset placed in front of the user’s eyes. An example of its use includes helping
the visually impaired.
NVE (night vision enhancement) uses infrared light to enable an image to be
seen in apparent darkness; it makes use of an image intensifier tube which
converts light into electrons – these electrons collide with a phosphor-coated
screen resulting in an image. This technology is used by the military when
identifying objects at night.
Robotics
Robots are used in many industrial applications to carry out repetitive tasks (for
example, car body assembly line) – this enables consistency of production and
greater productivity.
Recent applications are the use of drones which can be used for military (for
example, reconnaissance) and commercial (for example, delivery of goods to a
customer) use.
Robots are also being used to carry out certain surgical procedures.
Quantum cryptography
This refers to a technology that ensures the security of data transmission over
fibre optic cables; it is based on the use of photons (light) and their physical
quantum properties to produce a virtually unbreakable cryptography system. It
relies on the fact that photons oscillate in various directions and can be used to
produce a random bit (0s and 1s) sequence. This technology can be used by
companies or government organisations where security of data is paramount.
Virtual reality
This is an artificial environment created by software. It makes use of data
goggles, sensor suits, data gloves or data helmets to get a feeling of ‘being
there’. This technology has many uses in training, plant design and complex
computer games.
Common errors
Virtual reality is frequently confused with Artificial Intelligence (AI).
AI gives the user a feeling of ‘being there’.
AI learns from changing circumstances, whereas virtual reality is an
artificially created environment used to give a feeling of ‘being there’.
Examiner’s tips
• Always read the question very carefully.
• In part b, it is not necessary to give more than three applications
since only the first three will probably be marked and marks could be
lost if earlier examples were incorrect.
Exam-style questions
1 In the table below there are seven computer terms. By ticking (✓) the
correct column, indicate whether each term is an example of
application software, system software or part of an operating system.
[7 marks]
2 a Explain the two terms: command line interface (CLI) and graphical
user interface (GUI).
[2 marks]
b Give one advantage and one disadvantage of using a CLI and of
using a GUI.
[4 marks]
3 John travels around the world to check out hotels for his travel
company.
Explain the use of the following devices to help John to give his
feedback and to keep in contact with his travel company back home:
laptop computer
tablet
smartwatch.
[6 marks]
4 There are seven descriptions given below, on the left. In the right-
hand column, write down the name of the computer term being
described.
[7 marks]
Keyboard
This is the most common input device, where a user simply enters data by
pressing keys; some keyboards are ergonomic in an effort to reduce the risk of
RSI (repetitive strain injury) when doing a lot of typing. It is a slow and error-
prone method of input but requires little or no training; keyboards can be
‘virtual’ when used on tablets or smartphones. Concept keyboards are often used,
where icons can replace letters thus reducing the number of possible inputs.
Numeric keypads are a type of keyboard where numbers and mathematical
symbols only are used.
Pointing devices
These are used to control the movement of a pointer or cursor on a screen and to
enable selection from a menu or to launch applications. The most common
pointing devices are the mouse (including optical and wireless), touchpad (found
on laptops) or trackerball (often found in control rooms or in some luxury cars to
select functions such as radio or sat nav).
They are generally easier to use than a keyboard in many applications but can
cause issues with people who have certain disabilities. Pointing devices tend to
be used in a WIMP environment.
Remote control
Used to control the operation of certain devices wirelessly (that is, remotely);
special buttons are used to operate televisions, video/CD players, air con
systems, multimedia, and so on.
Joysticks
These are similar in some ways to pointing devices; a control stick is used to
make movement in X-Y directions and they often have a button on the top of the
stick for gaming purposes (for example, to fire a rocket).
This is related to the driving wheel which is also used in games and
simulations; sensors are used to pick up the left and right movement of the
steering wheel.
Touch screens
These allow the selection from a menu or the launching of applications by
touching the screen in the correct place; this is done using the finger or a special
conductive stylus.
Touch screens are generally much easier to use than a keyboard or mouse, but
screens can get very dirty from people’s fingerprints. They are often used in
ATMs, mobile phones and public information systems (for example, at an airport
or railway station).
Scanners
These are used to enter data/information in hard-copy (paper) format into a
computer (for example, a page from a book or a photographic print). The hard-
copy data is converted into an electronic form that can be stored in a computer
memory.
Scanners allow old/valuable books to be stored for future use or allow
documents to be pasted into an electronic document; damaged photos and pages
can be restored/recovered using this method.
Digital cameras
These have largely replaced traditional film-based cameras; the image is stored
on a solid state memory card and can be transferred to a computer/printer using a
USB cable, Bluetooth or by inserting the memory card directly into the device.
The quality of the photos is now comparable to the best film-based cameras;
they have the distinct advantage that unwanted photos can easily be deleted
without the need to pay for any film developing.
Digital video cameras ‘stitch’ together a number of still photos; dedicated
video cameras exist or ordinary digital cameras can be used to take video
footage (although the quality is rarely as good as from a dedicated video
camera). When using an ordinary digital camera to make videos, another
drawback is the amount of memory used. Most smartphones also have a camera
facility but they rarely have many of the desirable features found on a dedicated
camera.
Webcams
These connect directly to the computer and don’t save the images; data is
transmitted directly to the computer for use in video conferencing or in video
calls; the quality varies a lot depending on the lens and electronics.
Microphones
These are used to convert sound into electrical signals which, once converted to
digital, can be stored on a computer. Used in voice/speech recognition systems,
for creating voiceovers in videos/presentations, and so on.
Graphics tablets
These are used with a stylus to produce freehand drawings which can be input
into a computer and stored for later use, for example, computer-aided design
(CAD) work. They are useful where artistic skills are needed, for example, in
creating cartoon characters, logos, and so on.
Light pens
This technology works with cathode ray tube (CRT) screens only; it allows menu
selection, moving items by dragging them across the screen with the pen and
drawing directly on the screen using the pen. Light pens only work at the
moment with CRT screens, but touch screens now work with a conductive stylus
and allow similar actions to be done.
Sensors
These are devices that input physical analogue quantities into a computer (for
example, pH values, temperatures, moisture levels, and so on). An ADC
(analogue to digital converter) is usually required so that data is produced which
can be understood by the computer.
Common errors
It is very common to see students make incorrect claims about webcams.
Webcams store images which are later transmitted.
Webcams capture images which are then sent to the computer directly; these
images are then transmitted directly during a video chat, for example.
It is also common to see students making incorrect claims about sensors.
Devices such as switches and valves are switched off and on by the sensors.
Sensors gather data which is constantly relayed back to a computer. After
analysing this data the computer will determine whether to open or close a
valve or switch.
Examiner’s tips
• The depth of answer required needs a review of the mark allocation;
if the question is worth 2 marks only, then don’t try and write several
lines of explanation as this will be a waste of time. But if the question
carries 6 marks, for example, then a much more in-depth answer
would be required. Basically, read the question and look at the
possible marks and the space provided before starting to compose
your answer.
• In discussion or comparison questions, it is normally necessary to
consider the pros and cons to make a balanced argument. It is
always worth trying to come to some conclusion – but it must be
based on your discussion points to have any validity.
Direct data entry
Direct data entry (DDE) usually refers to entering data into a computer with
minimal or no human intervention; thus eliminating errors, speeding up the data
entry process and, in many cases, automating the data entry process. The most
common examples of DDE include:
• magnetic stripe readers and chip and PIN readers
• contactless card readers
• RFID readers
• MICR
• OMR
• OCR
• barcode readers
• QR readers.
Barcode readers
Barcodes are a series of vertical light and dark lines of varying thickness that
represent data (either numerical or alphanumerical).
Examiner’s tip
Where a scenario/application is given, it is essential to try and adapt
your knowledge to the scenario. This will give a more relevant answer
and, in many cases, increase your marks. For example, if you were
asked to give the benefits of using OLED technology to make
television/monitor screens and you wrote ‘OLED makes uses of plastic
technology’, you would probably gain 1 mark. But if you wrote ‘OLED
uses plastic which makes the screens much lighter and also allows
them to be formed into any shape, for example, curved for improved
viewing or for making smartwatch screens which can wrap around the
wrist’, then you might gain 3 marks since you have tailored your answer
to the application of TVs/monitors.
Output devices
Monitors
Monitors (or screens) can be either CRT (cathode ray tube) or LCD/LED (liquid
crystal display/light emitting diode) – the latter types are often referred to as TFT
(thin film transistors). LCD/LED has almost entirely replaced CRT in both the
computing and commercial (television) fields. LCD screens need some form of
back-lighting; this used to be CCFL (cold cathode fluorescent lamp) but now
uses LED instead. The use of LEDs allowed for even thinner screens with better
contrast and colour definition; they also use less electricity and don’t produce as
much heat. However, even this technology is now looking dated as new OLED
(organic light emitting diode) screens are being developed. This allows the use
of very thin plastic screens, with no need for any back-lighting, larger viewing
angles and even more energy efficiency (the full list of advantages and features
can be found in the Cambridge IGCSE ICT Coursebook).
Multimedia projectors
These projectors are used to project the output from a computer on to large
screens or white walls. This makes them invaluable for presentations or
advertising. They are referred to as multimedia since they allow for sound,
animation and video as well as static displays.
Printers
The four most common printers are:
• laser
• inkjet
• dot matrix
• 3-D.
Both laser and inkjet produce high-quality outputs, but laser is better if a large
number of copies needs to be printed (they have larger ink cartridges, larger
buffers and much bigger paper trays – although new inkjet printers are being
developed with large ink reservoirs on the side of the printer). Inkjet printers
work by ejecting droplets of ink from a reservoir and build up the text/images
line by line as the paper advances.
Laser printers use the properties of static electricity and use dry toner rather
than liquid ink; the ink is fixed to the paper by passing it over a heated drum.
This type of printer produces the whole page at once as it revolves around a
printing drum. Laser printers produce ozone gas and tiny toner particulates in the
air.
Dot matrix printers use older technology where a character is built up by an
array of dots, for example:
Dot matrix printers are noisy, poor quality and slow. However, they allow the
use of continuous multi-part stationery and they are less affected by hostile
atmospheres (for example, damp or dirty air).
3-D printers are the new exciting technology ready to create the next industrial
revolution. These create solid objects by building them up layer by layer (using
powdered resin, plastic or metal, for example) – the solid object is usually a
working model. They are showing great promise in medical applications and for
producing items no longer in production (for example, parts for vintage cars or
invaluable museum exhibits).
Speakers
These devices convert output from a computer into sound; digital data is
converted to electrical signals (using a digital to analogue converter – DAC)
which drive the speakers.
Actuators
Actuators are used in control applications involving microprocessors/computers,
sensors, analogue to digital convertors (ADC) and DAC. They are transducers
which take signals from computers and convert them into some form of motion
(for example, motor, pump, switch or valve). See Chapter 6 for more on this
topic.
Common errors
It is very common to see students confuse the operation of laser and inkjet
printers.
Unlike dot matrix and inkjet printers, laser printers don’t use ink when
producing documents.
Laser printers use dry ink (called toner) unlike inkjet (which use liquid ink)
and dot matrix (which use an inked ribbon).
Many candidates also make incorrect statements about dot matrix printers.
Dot matrix printers are suitable for certain applications because they are
noisy.
Dot matrix printers are very noisy in operation; this makes them suitable for
applications where noise isn’t an issue, for example, on a factory floor.
Examiner’s tips
• When answering questions such as part a, it is often useful to find
some blank paper to jot down all your advantages/differences before
putting together your final answer; this could, in the long run, save
you time and help produce a more coherent response.
• Open-ended questions, such as part b, need care when considering
your answer. Make sure you can justify your choice of device and you
should be okay to gain the marks; but if your justification doesn’t
match the device, then marks will inevitably be lost.
• Take care when making comparisons. Instead of the vague, ‘Laser
printers are faster than inkjet printers’, write a clear statement: ‘Laser
printers are faster at printing many pages’, followed by a valid reason:
‘because they have larger printer buffers and so can produce many
pages faster than an inkjet printer; but for a single page the printing
speed of both printers is almost the same’.
Exam-style questions
1 Give the most suitable input device for each of the following
applications. A different device needs to be given in each case.
a Entry of data into a spreadsheet or word processor
b Selection of a menu item on a monitor by the use of a conductive
stylus or finger
c Converting the written page from a textbook into an electronic
format which can be stored on a computer
d Used in voice-recognition systems as part of security to enter a
building
e Measurement of temperature in a glasshouse and sending the
value to a computer as part of a monitoring system
f Design of a freehand logo for input into a computer
[6 marks]
2 a A customer pays for some items in a shop using a contactless card
payment method.
Describe the steps taken when making payment.
[3 marks]
b Some of the goods in the shop are tracked using an RFID system.
i What is meant by RFID?
[1 mark]
ii Name two of the components that make up an RFID system.
[2 marks]
iii Give two other uses of RFID technology.
[2 marks]
3 a Compare the use of OCR and OMR as a method for obtaining and
analysing data from questionnaires given out to the general public.
[4 marks]
b Copy the table. Tick (✓) the correct column to indicate the best
method of direct data entry for each of the three applications.
[3 marks]
4 The following is a list of stages when text, written in magnetisable ink,
is passed over a magnetic ink character reader (MICR). The stages
below are not written in the correct order.
Copy and complete the table that follows, showing the five stages in
their correct order.
[5 marks]
A As each character passes over the head it produces a unique
waveform
B Characters are then passed over the MICR read head
C Ink on the paper is first magnetised
D MICR text is passed over an MICR reader
E The waveform is recognised by the computer system
Key terms
Term Definition
Back-up The copying of files to a different media in case of
data problems with main storage; back-ups are often stored at
a different location.
Serial How data/records are located by starting at the beginning
access of the file and reading through all records in order until the
required one is found, for example, used on magnetic
tapes.
Key field This is a field in a record which will uniquely identify each
record, for example, an account number.
Field This is one of the pieces of data which makes up a
record, for example, the date of birth in a customer’s
record.
Record A group of fields which are all related to each other, for
example, date of birth, address, name and account
number are all fields which together make up a
customer’s record.
File A group of records make up a file; these can be data files,
text files, directory files, and so on.
Master file A collection of records which contain the main data such
as name, address, reference number, and so on.
Transaction A collection of records which are used to update a master
file file; these files will contain changes from a period of time,
for example, new orders, new address, and so on.
Direct The ability to locate the required record without the need
access to read or scan any of the previous records, for example,
used on magnetic disk.
Magnetic A system that uses magnetic properties of a coating of
storage iron or nickel alloys to store/read data in the form of 0s
media and 1s.
Optical A system that uses the optical properties of laser light
storage (blue or red) to store and read data, for example used on
media CDs and DVDs.
Solid state A system that works by controlling the movement of
electrons within a NAND or NOR chip; data is stored as
0s and 1s in millions of tiny transistors within the chip;
most systems use NAND and are often referred to as
flash memories.
Backing up of data
Data is backed up to safeguard against loss of data (for example, due to
equipment failure or a malicious act). If data is lost or corrupted it can be
restored using the backed-up data. Back-up files are often stored in a different
location to the main storage in case of fire, for example.
Backing up of data, however, would not necessarily allow recovery following
a virus infection since the virus may also have been copied during the backing-
up procedure. This means when the recovered files are loaded back on to main
storage, infected files may also be loaded from the back-up media.
Data stored on storage media is accessed either using serial access or direct
access. Magnetic tapes use serial access, but most other back-up systems use
direct access. Direct access is a considerably faster way of locating data and
must be used, for example, in a real-time application (for example, booking seats
on a flight).
It is important to consider the size of files when backing up data. For example,
a photograph may occupy 10 MB of storage; this means a memory stick with 4
GB capacity, for example, could store a maximum of approximately 400
photographs.
Common errors
It is very common to see students make incorrect claims about why back-up files
are made.
Backing up computer files gives protection against a virus attack.
Following a virus attack, backed-up files can be used to restore or recover
any infected files; however, care needs to be taken to ensure that the backed-
up files are not also infected with the virus – this can be done by running a
virus scan on the backed-up files before they are recovered.
Examiner’s tips
• When asked to carry out a calculation always show all the steps in
case you make an error; credit will always be given for the method
used even if the final answer is incorrect. Not showing all your steps
(and just giving a final answer) could result in losing all your marks if
the final answer is incorrect.
• When asked to give more than one reason for something happening,
make sure each example is significantly different to avoid repeating
yourself and losing marks.
Secondary storage media
Examiner’s tips
• Don’t try and remember things like wavelength of laser light, or other
such specifications – such technical knowledge would never be
tested at IGCSE level.
• Part b is a good example where reading the question is so important;
giving advantages relevant to laptops is key to gaining the maximum
marks for this question. Answers not specific to the named
application would probably lose marks since, by naming an actual
application, the question is giving a strong hint about how it should be
answered.
Exam-style questions
1 a Explain the difference between data transfer rate and data access
time when using a secondary storage device.
[2 marks]
b Explain the differences between DVD-R and DVD-RW.
[3 marks]
2 Which computer terms are being described below:
a The copying of data to another media in case the original data is
lost or corrupted.
b Data/records on the media are located by starting at the beginning
of the file and reading all of the records until the required one is
found.
c An item in a computer record which is used to uniquely identify
each record.
d The ability to locate a required record on a file without the need to
read/scan any of the preceding records.
e Collection of records used to update a master file, for example,
change of address, new working hours for the week, and so on.
[5 marks]
3 Describe the main differences between the technology used in optical
media and solid state media. You should give at least two examples
of the technology used for both types of media.
[5 marks]
CHAPTER 4
Networks and the effects of using
them
Key objectives
The objectives of this chapter are to revise:
• networks and network devices
• IP and MAC addresses
• Wi-Fi and Bluetooth
• setting up small networks
• LAN, WAN and WLAN
• accessing networks (including security aspects)
• Data Protection Acts
• use of faxes and emails
• video, audio and web conferencing.
Key terms
Term Definition
Modem modulator-demodulator; this is a device that converts
digital signals into analogue signals and vice versa.
ADSL Asymmetric Digital Subscriber Line; asymmetric
means that the download speed and upload speed
using the internet will be different.
IP address Internet Protocol address; this is a unique number
assigned when a device connects to the internet; it can
change each time a device connects.
MAC address Media Access Control address is a number that
identifies a device uniquely; it is usually set at
manufacturing stage and is part of the network
interface card (NIC).
Wi-Fi Wireless communication.
Bluetooth A short-range wireless communication.
WAP Wireless Access Point; a network transmitter and
receiver which allows wireless connection to a network
within range of the access points; most networks will
have a number of WAPs.
Spread- Used in wireless systems, for example, in a Bluetooth
spectrum system; if a selected communication channel is
frequency already being used, another channel is chosen at
hopping random.
LAN Local Area Network
WAN Wide Area Network
WLAN Wireless Local Area Network
Social/digital Those people who have the necessary IT skills and/or
divide money to purchase computer equipment have a big
advantage over those who do not.
Data packet Group of data being transmitted (packet contains IP
address, ID number, for example).
Authentication System used to verify that data comes from a secure
and trusted source.
Data Legislation set up to protect the rights of the individual
Protection Act about whom data is obtained, stored and processed.
VoIP Voice over Internet Protocol; allows communication
(both verbal and video) using the internet.
Webinar Web conferencing.
Figure 4.1 Diagram of a computer network, illustrating some of the network devices
Networks
When a set of computers have been connected together for the purpose of
sharing resources or data, this is known as a computer network.
Network devices
Modems
A modulator-demodulator is used to convert digital data into analogue data (to
allow the data to be transmitted along existing telephone lines); it also converts
analogue data into digital data so that incoming data can be understood by the
computer. Broadband modems use ADSL; the asymmetric part in this name
refers to the fact that the rate at which data can be downloaded is different to the
rate at which data can be uploaded. ADSL allows telephone lines to be shared by
telephones and computers at the same time.
Hub
This is a device used to connect devices together to form a LAN; it takes the data
packet received at one of its ports and sends it to every computer on that LAN.
Switch
This is similar to a hub; but this device checks the incoming data packet and
works out the destination address and sends the data packet to the computer with
that address only.
Router
These are devices that enable data packets to be routed between the different
networks, for example, to join a LAN to a WAN. Many routers are wireless in
operation.
Routers inspect data packets received over the internet; since all devices on
the same network have the same part of an IP address (for example,
109.108.158.1, 109.108.158.2, and so on) the router can send data to the
appropriate switch. The switch will then deliver the data packet using the
destination address.
Each data packet contains: header, sender and receiver IP addresses, number
of data packets in the message and identification number of the packet.
Gateway
This is a network point (node) which acts as an entrance to another network; if a
network node needs to communicate outside its own network, it must use a
gateway.
Network Interface Card
A Network Interface Card (NIC) is needed to allow a device to connect to a
network.
Network cables
Network cables are still used because they allow faster data transfer rates and are
usually more secure than wireless connectivity.
IP address
Every time a device connects to a network (for example, the internet) it is given
an IP (Internet Protocol) address, for example, 109.108.158.34. If the device logs
off, the next time it connects to the network it is supplied with a new IP address.
Devices which never disconnect (for example, web servers) retain the same IP
address.
An IP address identifies where on the network a device is located.
MAC address
Media Access Control (MAC) addresses are unique to each device; this address
is fixed at the manufacturing stage (although it is possible to change the value –
this is outside the scope of the syllabus). The MAC address identifies which
device is connected at a given IP address.
Wi-Fi
This is wireless connectivity. Networks use WAP (wireless access points) to
allow users to gain access to the network from anywhere within range. A WAP is
a transmitter/receiver which allows a device to communicate with the network.
Most networks will have several WAPs, for example, an airport may have
hundreds of WAPs to allow passengers to connect to the airport’s network from
anywhere within the terminal buildings.
Bluetooth
This is also a form of wireless connectivity but it has a very limited range.
Bluetooth is often used by tablets, mobile phones and cameras. With this system,
the communicating pair of devices will randomly choose 1 of 79 possible
channels; if the channel is already in use, a different one is again chosen at
random – this is known as spread-spectrum frequency hopping.
Examiner’s tip
You will sometimes be asked questions which go beyond your
experiences. But if you apply your knowledge of similar situations to the
new situation, this shouldn’t pose any real problems. In part b, the
candidate wouldn’t be expected to have covered airport security, but
common sense and applying security issues from other applications
should allow a good attempt at new, searching questions such as this.
Network issues and
communication
Security
Policing the internet
The Cambridge IGCSE ICT Coursebook covers most of the arguments about
whether or not the internet should be policed. The arguments for include:
• To prevent undesirable/dangerous material being accessible to anyone.
• To prevent search engines finding potentially dangerous/undesirable websites.
• Protection of children and the vulnerable.
The main arguments against include:
• It would be expensive to implement.
• It would be difficult to enforce globally.
• Material can already be found elsewhere … the internet just makes it easier to
find.
• Freedom of information.
• Laws already exist to protect people against many illegal internet activities.
Authentication
Authentication is used to verify that data comes from a secure and trusted
source. Items of authentication include:
• digital certification (see Chapter 8)
• biometrics (see Chapter 8)
• magnetic stripe cards and identity cards.
Identity cards can be contactless (see Chapter 2) and also contain holographic
images – a holographic image can appear to move or change colour when
viewed from different angles. This makes the illegal replication of the image, for
example, by photocopying, much harder.
Passports now usually include an RFID tag, photographs and a holographic
image. This helps in airport security to check the validity of the passport and that
the passenger is who they claim to be.
Viruses
To help mitigate the risk of viruses, antivirus software should be installed on a
computer and constantly run in the background to allow the detection of old and
new viruses. Most antivirus software has the following features:
• Checking of all files/programs before being loaded or run.
• Use of a database of known viruses to identify potential risks; for this reason,
antivirus software needs to be updated on a regular basis.
• Use of heuristic checking (checks software for behaviour that could indicate a
new virus).
• Problem files/programs are quarantined and can be automatically removed or
the user can be asked what action they want to take.
• Full scans need to be done at least once a week in case any viruses are time-
dependent (for example, only become active on July 4th, and so on).
Other protection against viruses includes using only safe websites, not
opening emails that appear suspicious or come from unknown sources; checking
for security risks such as phishing and pharming (for more information on this,
and on viruses more generally, see Chapter 8).
Communication
Faxes and emails
Electronic faxing and traditional paper-based faxing both still exist. With paper-
based systems, the document is first scanned and then the electronic version is
sent over the telephone network to another fax machine where it is printed out.
Electronic faxing allows a fax to be sent from a computer and is sent to an email
account rather than being printed out. This second method is more secure since
the document doesn’t ‘sit’ on a fax machine where it can be read by anybody
passing by.
Emails are probably one of the most common form of communication. They
have the advantage that it is much easier (and quicker) to send the same message
to multiple recipients compared to traditional postal systems. Although emails
are certainly not instantaneous, they are much faster than conventional post and
are also a lot cheaper (no need to buy stamps, paper and envelopes). However,
the syntax and spelling of an email address must be exact. If not a non-delivery
message will be received since the address is incorrect or it could be sent to the
wrong person – with potential security issues. However, if normal post is used,
this is less of a problem; for example, if an address is: ‘25 North Street’ and it is
written on the envelope as ‘25 Nort Street’ the letter would probably still arrive
at the correct destination.
Video conferencing
This is a method of communication that uses sound and video. In many cases it
removes the need for people to travel to meetings. This is, therefore, safer and
less expensive (no travel and accommodation costs), and time isn’t lost while
important staff are out of the office travelling to meetings. The disadvantages
include: possible time lag in communications, expensive hardware to set up and
maintain, potential time zone issues and ‘loss of perks’ due to removal of travel
to parts of the world. Required equipment and software includes:
• webcams
• large television screens (the larger the better)
• microphones (not headphones)
• speakers (not headphones)
• CODEC (this encodes/decodes data and also compresses data for
transmission)
• echo cancellation software (to prevent unwanted feedback and to synchronise
sound and vision).
Audio conferences
This type of communication uses telephones (it is possible to use internet
telephones or computers equipped with microphone and speakers). The organiser
of the meeting is issued with two PINs by the telephone company. One of the
PINs is for their personal use; the second one is sent to all the other delegates
along with the time/date of the audio conference. A few minutes before the
conference, the organiser calls the meeting number and keys in their PIN, the
delegates do the same thing using the PIN sent to them by the organiser, and all
are connected on the same telephone call.
Web conferences
These are sometimes referred to as ‘webinars’. This method uses computers
connected to the internet to allow delegates to communicate by speaking or
instant messaging. A ‘whiteboard’ is used where all delegates can see what is
happening during the meeting. The whiteboard allows messages, videos and
presentations to be seen by everybody. When one of the delegates wants to talk,
send a message or show a video/presentation, they send their request and a ‘flag’
appears on the organiser’s computer; this allows them to control who can talk or
write, since it is necessary for the organiser to ‘click on’ the delegate next to the
flag to allow them to actively participate.
Common errors
It is very common to see candidates making incorrect claims about emails.
Once an email has been sent, it instantly appears with the intended recipient.
Emails are much quicker to send then physical letters, but there can be delays
before an email is delivered, and the email may stay in somebody’s inbox for
several days before they read it.
It is common to see:
‘Video conferences can be called at any time.’
Video conferences can be called at short notice but that is not the same thing
as ‘called at any time’. Short notice means sending an invitation such as:
‘Sorry for the short notice, but can we call a video conference tomorrow at
15:00 please?’ Calling a video conference at any time means just going into
the video room and starting a conference without checking peoples’
availability or diary. These are not the same thing.
Several candidates make incorrect claims about video conferencing:
Video conferencing can be done from the comfort of your own home.
Video conferencing requires a dedicated room with specialist hardware and
software. A room also needs to be set up for video conferencing with, for
example, proper acoustic panelling in order to work properly. A video call
from a smartphone or using VoIP does not require this, and can be done from
home. This is not the same as video conferencing.
Examiner’s tips
• Marks are frequently lost in questions involving comparisons. For
example, in part a, if the candidate had written ‘It is easy to send the
same message to a number of recipients’ they wouldn’t get any
marks. The key word here is easier, that is, ‘It is easier to send the
same message …’
• Marks are frequently lost for not making the comparison. It is actually
easy sending the same message to a number of people using
standard post but it just takes longer and needs more effort, that is, it
is not as easy. Be careful with English here!
Exam-style questions
1 a Which devices are being described below? Copy and complete the
table.
[7 marks]
Sender’s IP address
Time and date the data packet was sent
Identity number of the data packet
Header to identify the data packet
3 a Copy and complete the following sentences using one of the words
or phrases given below (note: four of them will not be used):
(Note: shift work is different; this is where a company works 24/7 and they
have, for example, three shifts of eight hours over each 24-hour period – each
member of staff does a full-time job but their hours vary depending on which
shift they are doing.)
If full-time working is defined as eight hours per day (40 hours per week)
from 8 a.m. to 4 p.m., then:
• part-time working could be five hours per day (for example, 10 a.m. to 3 p.m.)
• flexi-time could be eight hours from 11 a.m. to 7 p.m. each day
• job sharing could be:
worker 1: 8 a.m. to 4 p.m. Monday and Tuesday and 8 a.m. to 12 noon on
Wednesday
worker 2: 12 noon to 4 p.m. on Wednesday and 8 a.m. to 4 p.m. Thursday and
Friday.
Microprocessor-controlled
devices in the home
Labour-saving devices are now operated using embedded chips
(microprocessors), for example, automatic ovens, washing machines and
dishwashers. These are all regarded as labour-saving devices and have the
advantages that:
• people don’t need to stay at home while food is cooking or clothes/dishes are
being washed
• people have more leisure time
• it leads to a healthier lifestyle (smart fridges and freezers, for example)
• it is possible to operate appliances remotely using smartphone/tablet Apps
when away from home.
The main drawbacks are that they:
• tend to make people lazy
• can lead to an unhealthy lifestyle (ready-made microwave meals)
• can mean people become less fit due to less exercise
• result in loss of certain skills.
Other devices, not termed labour-saving, also have inbuilt microchips which
make them work more efficiently and also give them features which would be
impossible without the technology. These include: televisions, cameras, air
conditioning units and CD/DVD players, for example.
Figure 5.1 Examples of labour-saving devices
Common errors
• It is very common to see confusion between the terms ‘part-time’, ‘flexi-time’
and ‘compressed hours’; the best way to avoid confusion is to look at the
examples given above.
• Many candidates regard televisions and cameras as labour-saving devices. To
decide if an appliance falls into this category, just ask the question: ‘Is there
any advantage in having embedded chips so that the appliance can be operated
when nobody is at home?’
Examiner’s tip
When giving examples as part of your answer, always make sure that
the examples don’t conflict with any descriptions, otherwise marks
could be lost even if your descriptions are correct.
Exam-style questions
1 a Describe two advantages and two disadvantages of using robots
in manufacturing.
[4 marks]
b Give three advantages of using microprocessors in labour-saving
devices used in the home.
[3 marks]
2 a Explain the following terms:
part-time working
flexi-time working
job sharing
compressed hours.
[4 marks]
b Describe the advantages to a company and its staff of adopting
flexible working patterns.
[3 marks]
c Describe three disadvantages to the general public of having
electronic devices fitted with embedded microprocessors which can
be controlled using an App from, for example, a smartphone.
[3 marks]
CHAPTER 6
IC T applications
Key objectives
The objectives of this chapter are to revise:
• communication applications
• data handling applications
• school management systems
• measurement applications
• microprocessors in control applications
• modelling applications
• manufacturing
• booking systems
• banking applications
• expert systems
• computers in medicine
• computers in libraries
• automatic stock control
• recognition systems
• monitoring and tracking systems
• use of satellites in GPS, GIS and media communications.
Key terms
Term Definition
Tweening The generation of intermediate frames between images –
this gives the impression that the first image evolves
slowly into the second image.
Morphing The procedure where one image is changed into another
image in a smooth way (morphing uses tweening to give
the transition effect).
Rendering The generation of an image from a model using software.
SIM card Subscriber Identity Module chip – allows a device to
connect to the mobile cellular network.
Radio This is an ‘icon’ (for example, a circle) which is used to
buttons represent an option on an online form; (for example:
female male) – only one of the options may be
chosen.
ADC Analogue to Digital Converter
DAC Digital to Analogue Converter
Sensor Device that inputs data to a computer/microprocessor,
usually in analogue format; the data is a measurement of
some physical quantity.
(Computer) Creation of a model of a real system in order to study the
modelling behaviour of the system; the model is based on
mathematical representations and algorithms.
e-ticket An electronic ticket, for example, in the form of an email
or QR code sent to a mobile phone/tablet – it acts in the
same way as a paper ticket.
ATM Automatic Teller Machine
EFT Electronic Funds Transfer
IBDE Inter-Bank Data Exchange – an encrypted filing system
used by banks.
EFTPOS Electronic Funds Transfer (at the) Point-Of-Sale
Knowledge A type of database used in an expert system which allows
base for the collection, organisation and retrieval of knowledge
from human experts.
Rules base Knowledge is represented as a set of rules; each rule
shows a connection between the data stored in the
knowledge base; makes use of IF … THEN structure to
determine the next step to take.
Inference This interprets input data by checking the data against the
engine rules and logic stored in the knowledge base.
Explanation This explains to the user the reasoning process carried
system out by the expert system when arriving at its conclusions.
CT scan Computed Tomography scanning system.
MRI scan Magnetic Resonance Imaging scanning system.
Prosthetics Imitation limbs to replace damaged or lost limbs in
humans.
ANPR Automatic Number Plate Recognition system.
GPS Global Positioning Satellite
GIS Geographic Information System
Communication, data handling
and school management
applications
Communication applications
Paper-based systems
Flyers, posters and newsletters can easily be produced using word processors,
desktop publishing and a standard printer. They can then be distributed in a
number of ways to target the required audience.
Brochures can be a single folded sheet or a stapled booklet – these may
require professional printing since they often need to use glossy paper. Posters
can be a very large size so that they can be placed on advertising hoardings on
the side of the road, for example.
Websites
Rather than printing advertising material, websites can be used instead. This
requires the company to develop its own website or pay to have its adverts on
another company’s website. Although producing paper-based advertising
material is expensive, hiring a website developer is also an expensive
consideration. However, advertising material that is presented in an electronic
format is much easier and quicker to update, and won’t need to be reprinted.
Websites can also have a global audience, for example, advertising on social
networking sites, and can make use of multimedia elements.
Multimedia presentations
Presentations on a multimedia projector have many advantages; they can include
a number of multimedia elements such as animation, video and sound, and they
can also be interactive. Such elements mean that presentations and adverts can
be tailored for selected audiences. Large screens
are used so they can also be very eye catching, but such equipment can be
expensive. Multimedia presentations like this can be found in shopping malls,
offices and classrooms.
Music scores
Music can communicate a lot to an audience. A catchy or well-known song can
increase the impact of an advert significantly, while the score of a film can, for
example, tell the audience if the on-screen character is happy, sad or in danger.
Music scores make considerable use of ICT:
• Use of sampling, mixers and synthesisers
• Generating music scores by use of software
• There is no real need to understand music notation to produce music.
Mobile phones
Mobile phones have become one of the major ways for people to communicate.
It is now difficult to imagine a world without them. Due to their small size they
can be carried around anywhere and they allow communication from almost any
part of the world. They allow phone conversations, video calls, text messaging,
sending/receiving emails and many other features. They either use the 4G/5G
cellular network or wireless ‘hot spots’.
Internet telephony
Phoning somebody using a computer has also become increasingly popular. This
uses Voice over Internet Protocol (VoIP) technology and can allow conversations
using an internet phone connected to a computer or using the built-in
microphone and speakers. Data is sent over the internet in the form of data
packets. It is possible to connect to somebody on a landline phone, mobile phone
or another computer using this technology. One of the big advantages is the very
low cost of the calls; but sometimes the quality is poor (echoing, drop out and
loud interference noises are the main issues).
Address lists
Computers, tablets and smartphones are used to store personal data such as
telephone numbers, birthdays, email addresses, and so on. By storing such data
electronically, it is much easier to group people together based on one parameter
(for example, grouping family members together for data of a personal nature).
School reports
Computers can be used in schools to store personal details, academic
performance or attendance records. This makes it much quicker to produce end-
of-term reports, and can also make them look more professional.
School management systems
As mentioned earlier, computers can be used in schools in a variety of ways.
These include:
Common errors
Candidates generally have difficulty deciding the best way to advertise products
and services: leaflets, websites, telephone advertising, shopping mall
presentations or on television/cinema. A greater awareness of advertising in your
own area could help eliminate such errors in exams.
Examiner’s tip
It’s hard to decide the best way to advertise products and services.
Think about the adverts and advertising you see in your local area to
get some ideas!
Examiner’s tip
Questions involving ‘discuss’ should usually have some form of
conclusion. But for this conclusion to be valid, the candidate should
have clearly covered all the pros and cons and not made a one-sided
argument.
Measurement, control and
modelling applications
Measurement applications
Turtle graphics
This is based on LOGO, where a ‘turtle’ is used to draw geometric shapes on
screen or on paper. A number of commands such as FORWARD x, RIGHT t,
PENUP and REPEAT n are used to control the turtle. You will usually be given
these commands on the exam paper unless the question requires you to actually
name and describe LOGO commands.
The following example draws a square with sides of 30 units:
Modelling applications
A computer model is the creation of a model of a real system in order to study
the behaviour of the system under varying conditions. The model is computer-
generated and is based on mathematical representations and algorithms. They
can be quite simple (for example, using a spreadsheet) or complex (requiring
very complex software).
The whole idea is to try to find out what mechanisms control how a system
behaves. They tend to save money and can help find solutions more quickly,
often in a safer manner.
Sometimes modelling is done on a spreadsheet if it involves simple
mathematical modelling (for example, a school tuck shop takings, population
growth, check out queues in a supermarket, and so on). Complex modelling is
often called a ‘simulation’, where a computer model is used to simulate how a
real-life process works under varying conditions. For example:
• Simulating traffic light timings at a busy junction.
• Simulating the flight of a spacecraft to Mars.
• Simulating a nuclear or chemical process.
• Simulating car crashes.
They all have the benefit of being safer than doing the real thing (even if it
were possible in some cases) and allow various scenarios to be tried first without
causing any risks to people or equipment. This often has cost benefits since
building the real thing can be expensive and the possibility of finding solutions
to problems faster can also have potential cost savings.
Common errors
Many candidates don’t fully understand the role of sensors in control
applications.
Sensors in control applications only send data to the microprocessor/computer
when something happens.
Sensors constantly send data to microprocessors/computers and it is these
devices that make the control decisions about, for example, opening/closing
valves in a control application.
Examiner’s tip
It is often a good idea to use ‘bullet points’ when answering questions
of the type in part a. This also helps examiners and is easier to make
sure you include all the steps necessary in the control application.
Manufacturing, booking systems
and banking systems
Manufacturing
Manufacturing is an area where ICT has had a very large impact over the years
… from marketing all the way through to manufacturing itself. Some of the
impacts of ICT have been covered earlier on; this section will look at the effect
of introducing robotics.
Robots can do many of the tasks hitherto done by skilled humans, for
example, welding metals, spray painting items, assembly of electronic
components, and so on. Once a robot has been ‘trained’ to do a specific task, it
will go on doing the same task 24/7 with identical accuracy and consistency each
time. They only need breaks if a fault develops or their maintenance schedule
demands it. Although expensive to buy and to maintain, robots are still cheaper
than paying humans and, due to their greater speed in carrying out tasks, they
increase productivity.
Booking systems
Online booking systems include:
• theatre
• cinema
• hotels/holidays
• transport (flights, trains and coaches).
Anywhere where it is important that ‘double booking’ can’t take place is best
done using ICT. With the old manual systems, it was almost impossible to
prevent double booking until checks were done at the end of the day, which often
meant rescheduling.
When booking seats or hotel rooms, customers will be asked to initially give
key data such as dates, times, names of people, method of payment, and so on.
The system will then check the availability of seats or hotel rooms which match
the customer’s requirements. If everything checks out all right, the customer can
accept the booking and then make payment. Once the customer accepts the
booking, the seats (or hotel room) are ‘flagged’ on a database as now being
unavailable, thus preventing any possibility of double booking.
An email will then be sent back to the customer as a form of confirmation;
this also acts as their e-ticket. Sometimes a QR code is sent through to a mobile
phone or tablet instead. The QR code will contain all of the necessary data
regarding the booking. For example:
Figure 6.4 QR code mobile confirmation
ATMs
ATMs allow customers to carry out a number of tasks without having to visit
their actual bank. They can withdraw cash, change their PIN, get a balance,
request a statement, top up a mobile phone, transfer money/make a payment, and
so on. Once a customer inserts their card into the ATM slot, the following stages
are carried out:
• The bank details are read from the chip.
• Card validity (is it stolen, has expiry date been exceeded, has the card been
blocked, and so on) is checked.
• Some accounts give the customer a choice of language.
• The customer will be asked to key in their four-digit PIN.
• The keyed-in PIN is compared to the one stored on the chip on the card.
• If the PINs match, the customer is allowed to proceed and the next screen
appears.
• If the PIN is incorrect, the customer gets two more attempts before the
transaction is terminated (some ATMs retain the card at this point as well).
• When the next screen appears, the customer will be asked to select what
service they require.
• If they want cash, it will give a list of available amounts or ask the customer to
give a different amount in multiples of 10.
• The machine will count out the cash and at the same time return the card.
• Once the customer takes their card, the cash will be ejected.
• Other options can of course be chosen; whatever option is selected requires the
ATM to contact the customer’s bank to check for sufficient funds, and so on.
• Once the customer is finished they take their card.
Internet banking
Internet banking requires high levels of security to protect both the customer and
the bank. Customers can carry out most tasks online (apart from get cash!) which
means that banking can be done 24/7 without the need to travel to their bank.
Provided they can find internet access, customers can do their banking from
anywhere in the world.
Coupled to internet banking is online shopping where customers pay for
goods or services online. This widens customer choice and allows 24/7
shopping.
Disadvantages of online banking and shopping include: closing down of shops
and banks in high streets, increased internet fraud, health risks (lack of exercise),
greater possibility of mismanaging accounts and the usual security risks of
hacking and pharming.
Banks and shops save money (as they need fewer branches or shops which
require expensive rent) and they can now have access to global markets. The
setting up of websites (including security issues) is a costly exercise and it has
potentially reduced loyalty from customers since they no longer get a personal
service.
Clearing of cheques
Bank cheques use MICR technology (see Chapter 2). The clearing of cheques
requires the use of special characters at the bottom of the cheques; for example:
These characters are printed in a type of ink that contains magnetisable
particles of an iron alloy. When the cheque is passed over an MICR the
following happens:
Examiner’s tip
It is very rare that all the steps in a process would need to be made to
gain full marks. Part b would probably have about 5 marks allocated, so
only five of the points in the above answer would have been needed in
that case. However, it is always best to give as a full an answer as
possible within the space provided on the exam paper.
Expert systems and medical
applications
Expert systems
These have been developed to mimic the expertise and knowledge of experts
in a particular field. For example:
• medical diagnosis
• engine diagnostics
• oil and mineral prospecting
• tax and financial calculations
• strategy games (for example, chess)
• identification of plants, animals
• identification of chemical structures
• road scheduling for delivery
• vehicles (logistics).
Expert systems consist of a knowledge base, rules base, inference engine,
explanation system and an interactive user interface (refer to definitions in Key
Terms at the beginning of this chapter).
Expert systems are used since they can speed up the time it takes to solve a
problem and they never forget to ask a pertinent question as part of the analysis.
There is less need for specialists in many cases, which saves money and also
means expert systems can be used in developing countries. However, they do
tend to lack the common sense approach and also lack emotional reasoning –
often a crucial element in medical diagnosis. To use an expert system effectively
requires considerable training and it is essential to ensure they are properly set
up to avoid errors in the decisions made.
Computers in medicine
Record keeping databases are used in hospitals to store accurate records about
patients. These records are shared by other medical practitioners and
pharmacists. Such centralisation is crucial in the case of emergencies and
stopping the prescription of drugs which can interact in an unsafe manner.
Monitoring patients
The monitoring of patients was covered earlier in this chapter. The benefits of
using sensors and computers to monitor patients in hospital include:
• It reduces the risk of errors.
• The system can operate 24/7 without getting tired.
• They never ‘forget’ to take a reading.
• Readings can be taken more frequently.
• Computer systems can react much more quickly to a change in patient
circumstances.
• The system can automatically analyse the data and produce graphs.
• A single computer can monitor several patients simultaneously.
• It reduces the risk of nurses being exposed to contagious diseases.
Examiner’s tip
Where a list of four items is needed, don’t exceed this; if there are any
errors in the first four answers then marks would be lost since later
answers would be ignored. For example, if you gave:
• respiration
• height of patient
• weight of patient
• heart rate
• blood glucose level
• body temperature
then only 2 marks would be awarded out of the possible four since
answers 2 and 3 were incorrect and answers 5 and 6 would be ignored
(even though correct!). Be careful!
Library, stock control and
recognition systems; tracking,
GPS and GIS systems
Library systems
Most library systems are now computer-controlled. They involve the use of
barcodes on the books being borrowed and on the borrower’s library card. The
system allows books borrowed to be linked to a borrower automatically. Thus, it
is now possible to send out reminders of overdue books automatically and to
record other information such as the borrower’s preferences, how many times a
book has been taken out, and so on. Some systems now use RFID technology
instead of barcodes.
This system is used in car parks and as a security device to read the
registration/number plate on a vehicle:
• The number plate is captured by a digital camera.
• The brightness and contrast of the number plate is adjusted so that all the
characters can be read clearly.
• Afterwards, each character is segmented using software; OCR software is used
to convert the characters into a string of editable text.
• This text string is then stored on a database.
Once the number plate is stored, it can be used to allow entry and exit to a car
park or secure site as part of a car park charging system or security system.
Tracking system
RFID can be used for tracking (see Chapter 2). In conjunction with GPS, it can
be used to track people:
• who are known criminal offenders
• who are elderly and need to be carefully monitored
• who are in a race, for example a marathon.
Internet cookies (small files of information created by websites and stored on
your computer) can be used to monitor a person’s internet activity, while key-
logging is a technique used to track all entries made on a computer through its
keyboard. These methods of tracking will be looked at in more detail in Chapter
8 Safety and Security.
Examiner’s tip
Be careful not to make your answers too general. If a question gives a
specific scenario, make sure your answer is modified to cover the
scenario given.
Exam-style questions
1 a The perimeter around an airport is being monitored for sound
levels and air pollution by the Environment Agency.
Describe how sensors, data loggers/storage devices and
computers could be used to monitor the perimeter environment. In
your description, mention how the Environment Agency may use
the collected data from the sensors.
[4 marks]
b A car is fitted with sensors on the front bumper/fender. If the car
gets too close to the vehicle in front of it, a warning is given and
then the brakes are applied automatically. Sensor data is sent to an
on-board microprocessor. This microprocessor can also pick up
other data such as the speed of the car and whether the road is
wet or dry.
i Name a suitable sensor to measure the distance.
ii Explain how the microprocessor would work out if the car was
too close to the vehicle in front of it.
iii Describe how the sensors and microprocessor would be used to
control the distance of the car from the vehicle in front of it.
[7 marks]
2 Copy the table and give suitable sensors for each of the following
applications. A different sensor needs to be given in each case.
[6 marks]
Application Suitable sensor
control water content in the soil in a greenhouse
measure the quality of air in a building
switch on the headlights of a car automatically
when it gets dark
automatically turn on the wiper blades of a car
when it starts to rain
pick up footsteps of an intruder in a building
control the acidity levels in a chemical process
Part of the analysis process involves the use of DFDs. These cover the input,
output and processing done; identify problems with the current system; identify
user and information requirements and identify system specifications. DFDs put
the process into a logical diagrammatic form.
Design stage
The design stage is carried out after the analysis stage and includes:
• design of any data capture forms
• design screen layouts and output
• production of systems flowcharts
• design/choose the validation rules to be used
• design of the file structures
• production of algorithms and program flowcharts
• design of the testing strategy for the new system.
Systems flowcharts
These flowcharts use the standard symbols as shown on the right.
They show how data flows through the system and how decisions are made.
They are used to give an overall view of the proposed system. They don’t form
the basis of a program flowchart from which the programming code can be
written, but they show the processes carried out and where various hardware
devices are used in the system.
Verification
This is a way to check whether data entered or transmitted matches the original
data. There are two common ways to carry out verification:
• Double entry: data is entered twice and it is then compared either after data
entry or during data entry; this can be done by another human or, more
commonly, by the computer (this method is often used when entering
passwords or email addresses).
• Visual check: the person entering data compares it with the original document
(for example, compares what is on the screen with the original printed
document); this is not the same as proof reading!
Validation
This is the process where data is checked to see if it satisfies certain criteria
when being input. Examples of validation include:
• Range check: this checks whether or not data lies between two end values.
• Look up check: this checks whether entered data exists in a stored table of
data.
• Length check: this checks whether the entered data has the correct number of
characters.
• Character/type check: this checks data is of the correct type, for example, text,
numeric, and so on.
• Format/picture check: this checks data is in correct format, for example, date
as dd/mm/yyyy.
• Presence check: this checks data is present in the field; it can’t be left empty.
• Consistency check: this checks to see if data entered corresponds with another
field, for example, if somebody types in ‘Mr’ in the Title field, they must also
type in ‘M’ in the Sex field or an error will be flagged.
• Check digit: an extra digit added to a number which is generated by an
algorithm; after transmission the same extra digit is recalculated to see if it
matches the one sent.
File structures
When designing files it is important to consider field length, field name and data
type. A data dictionary is used to show file structures, including any validation
checks that may be carried out on the field data.
Testing strategy
A key part of the analysis and design stage; we will look at testing strategies in
detail in the next section.
Common errors
It is common to confuse verification and validation; it is important to remember
that verification doesn’t check whether the data makes any sense (for example,
somebody’s height could be input as 1055 metres if that is the value on the
original document – however, validation should trap this as a nonsensical value).
Proof reading is an example of the use of verification.
Proof reading doesn’t check the data against the original document, so cannot
be considered a form of verification.
Examiner’s tip
Field names can be anything really provided they tie up with the kind of
data, for example, field name of ‘example’ to represent type of weather
would be regarded as too vague to be of any use.
Development, testing,
implementation, documentation
and evaluation
Development
Once analysis and design is completed it is necessary to develop the new system.
For example, a database requires finalisation of file structures,
validation/verification routines need to be finalised and the user interface needs
to be fully developed.
Testing strategies
Modular programming is often adopted (here the entire program is broken up
into parts). Each module needs to be fully tested. Once this is done, the whole
program needs to be fully tested again to make sure none of the modules
conflict. Data used in testing falls into four categories:
• Normal: data which is acceptable or reasonable, which will give a known
outcome.
• Abnormal: data which is outside the limits of acceptability and should be
rejected by the software.
• Extreme: this is data at the limits of acceptability.
• Live data: data which has actually been used in real life, which will produce
known outcomes; the actual outcomes from the new system will be compared
to outcomes from the existing system using the same data.
For example, an online form asks somebody to type in their age. The
acceptable range will be 5 to 140. The following examples show each type of
validation check:
• Normal: 22, 58, 74
• Abnormal: –2, 221, fifty-six
• Extreme: 5 or 140 (end values).
Implementation
Once a new system is fully tested it needs to be implemented. Four common
methods of implementation exist:
Documentation
Two main types of documentation will be supplied with the new system once it
is implemented – user documentation and technical documentation. User
documentation is developed to help the end user understand how to use the new
system. It will include examples of input and output, the meaning of possible
error messages and how to carry out certain tasks such as printing or updating
files. Technical documentation is designed to help a systems analyst and/or
programmer update the system sometime in the future or help in troubleshooting
if any problems occur. The following shows typical examples of the contents of
both types of documentation:
Examiner’s tip
This question stated ‘Give examples …’. It is unclear whether the plural
refers to the fact that there are three types of data or whether more
than one example for each data type is needed. When confronted with
a question which is not entirely clear to you, always err on the side of
caution and consider the possible meanings of the question when
answering it.
Exam-style questions
1 A car manufacturing company has decided to bring in a systems
analyst to upgrade the current system.
a Describe three ways that could be used to do fact finding so that
the current system can be assessed. Give a disadvantage of each
named method.
[6 marks]
b Copy the table. Tick (✓) the appropriate column to indicate whether
each item is part of the analysis stage or the design stage.
[6 marks]
Once the user clicks on the link, they will be asked for passwords, credit card
numbers and so on – there are many clues this is a fraud (for example, the
beginning ‘Dear User’ would never be used, reputable companies will already
have your card details, and so on).
Common errors
It is very common to see confusion between phishing and pharming (and also
incorrect spellings – most notably fishing and farming!).
Examiner’s tip
When asked to describe the differences between two (or more) terms,
don’t give opposites as one of your answers, for example, ‘Phishing
requires emails to be sent but pharming doesn’t require any emails to
be sent out’.
This counts as one point only. Distinct differences must be given to gain
the marks.
Firewalls, protocols, encryption,
authentication and cloud security
Firewalls
These are either hardware or software that sit between a user’s computer and an
external network. They filter data coming in and data going out of a user’s
computer. The tasks of a firewall can be summarised as:
• Examine traffic between computer and a network.
• Check incoming/outgoing data meets certain criteria; if it doesn’t, user is
warned and data flow blocked.
• Keep a log of daily traffic.
• Keep a list of IP addresses thus preventing access to certain websites.
• Help prevent viruses and hacking.
Protocols
There are two common protocols which are used when a computer wishes to
communicate across a network: SSL (secure socket layer) and TLS (transport
layer security).
SSL – when a user logs on to a website, SSL encrypts the data; the user will
know if SSL is being applied due to https or the green padlock appearing; it
involves a communication between the web browser on the user’s computer and
the website.
TLS – this is similar to SSL but is more modern and more effective; it uses
two layers known as the ‘record protocol’ (which contains the data being
transferred) and the ‘handshake protocol’ (which permits website and user to
authenticate each other).
The basic differences between SSL and TLS are that TLS can be extended by
adding new authentication methods, TLS can make use of ‘session caching’ and
TLS separates the two protocol layers.
Encryption
This makes data unreadable unless the user has the correct decryption key. The
original message (called ‘plain text’) is put through an encryption algorithm
(using the encryption key) and it produces the encrypted message (known as
‘cypher script/text’). If a hacker breaks into a computer system, they can
certainly delete, copy or corrupt the data but they won’t be able to understand it.
Authentication
This is used to verify that data comes from a secure and trusted source. It uses
digital certificates, passwords and biometrics as part of the authentication
process.
Digital certificate
This is a pair of files which consist of a public key (known to everyone) and a
private key (known to a selected group only). For example, when an email is
sent, it is more secure if digital certification is added. The recipient can check it
comes from a trusted source by viewing the public key information – this
consists of: the sender’s email address, name of the digital certificate owner, a
serial number, expiry date, public key and digital signature of the certificate
authority (CA).
Examiner’s tip
In questions where an explanation is asked for, it is often a good idea to
expand your points slightly within the bounds of the space provided on
the answer paper. A good explanation or examples could cover a weak
description and allow you to recover lost marks.
Exam-style questions
1 Which items are being described below:
a Process in which data appears meaningless without the
appropriate ‘unlocking’ key
b Code stored on a user’s computer which is effectively a small look-
up table containing linking pairs of key data
c Original message before it goes through an encryption process
d Unsolicited emails sent over the internet to a recipient on a mailing
list which ‘clog up’ their inbox
e Hardware and software that sit between a user’s computer and an
external network which filters data coming in and out of the
computer
f Keeping personal data safe when using any device connected to
the internet.
[6 marks]
2 Three computer security risks include:
• spyware
• phishing
• hacking.
Explain the meaning of each security risk and why it is a security risk.
In each case, give one way of mitigating or removing the risk.
[9 marks]
CHAPTER 9
Audiences
Key objectives
The objectives of this chapter are to revise:
• how to tailor ICT solutions according to the audience
• copyright legislation
• legal, moral, ethical and cultural implications of ICT solutions
• policing of the internet.
Key terms
Term Definition
Software Making and distributing illegal copies of software.
piracy
Product Unique string of characters which is supplied with software to
key indicate it comes from a genuine source.
Dongle Device which connects to a computer through the USB port –
it allows wireless communication with devices or stores key
files to allow software to run on that computer only.
FAST Federation Against Software Theft
Audiences, software copyright,
impact of ICT solutions and
policing the internet
Audiences
When using ICT to present information, it is important to consider the audience
as not all solutions will be appropriate, or relevant, depending on the audience
that you are addressing. The following factors should be taken into
consideration:
• Age, experience and knowledge of the audience
• Audience expectations
• Language used
• Whether multimedia and interactive interface should be used
• Length of the presentation
• Which examples would be helpful and/or appropriate.
Software copyright and piracy
Software is protected by the usual copyright laws. However, to further reduce the
risk of piracy, the following measures are taken:
• Use of a product key supplied with original software
• Sign a licence agreement
• Use of holograms on original packaging
• Use of dongles to prevent illegal use.
Impact of ICT solutions
Legal: this covers the law; whether an action is punishable by law, for example,
illegal copying and distribution of software.
Morality: this governs private and personal interactions between people; the
human desire to distinguish between right and wrong.
Ethics: this governs professional interaction, that is, codes of behaviour; it is
often illegal, or it may just be an act carried out which is regarded as breaking a
code of conduct.
Cultural: this refers to the attitudes, values and practices shared by a society;
this will change from culture to culture.
Policing the internet
Policing of the internet was covered in detail in Chapter 4, please refer to that
section.
Common errors
It is very common to see the terms copyright and software piracy confused:
Copyright protection makes it much harder for software to be pirated.
Copyright laws make the pirating of software illegal; however, they do not
actively prevent the piracy from taking place.
Examiner’s tip
When asked to give different examples to illustrate an answer, always
make sure your examples are as different as possible.
Exam-style questions
1 Use the following terms to complete the five statements that follow
(four of the terms will not be used).
It is important that emails follow all copyright regulations and that users are
advised to use passwords to secure email addresses and inboxes.
‘Netiquette’ is an important aspect of any material posted or transmitted on the
internet. There are numerous resources regarding what constitutes netiquette but
the following summarises many of the common rules:
• No abusive language, and messages should be clear.
• Posts can be read by general public; therefore, spelling, grammar and privacy
must be considered.
• Don’t use capital letters except where necessary and keep emoticons to a
minimum.
Email groups
Email groups are used for a number of purposes:
• It is easier for a user to send out multiple emails if the addresses are all
grouped together under a single name; the user then just has to use that single
name in the ‘To’ box.
• Companies and organisations can group people together for marketing
purposes, for example, according to age, ethnicity, hobbies, favourite music,
and so on. This means that each email can target specific groups.
• ‘Spammers’ can create email groups by buying addresses of people from
certain companies or from software that ‘raids’ address books on computers or
email companies – this means that several thousand people can be sent spam
by simply pressing the <Enter> key.
• Companies use email groups to set up meetings (for example, for a video
conference) to ensure everybody is always invited to attend – it would be easy
to omit a person if the email addresses were all typed in individually; this way
you can be sure all the correct recipients are sent messages.
Spam
This topic was covered in Chapter 8. Please refer back to that section to refresh
your memory.
The internet
The internet is the world’s largest WAN. The world wide web (www or web) is
only part of the internet which can be accessed using a web browser. It consists
of a massive collection of web pages and is based on http. The world wide web
is a way of accessing information over the medium known as the internet (which
consists of software and hardware) – the two terms ‘www’ and ‘internet’,
therefore, should not be confused.
Intranets
An intranet is a network which meets the needs of a company or organisation to
enable the sharing of information/data. Intranets are not available for access by
the general public. Since many intranets are internal, they are generally more
secure than the internet. Information available can also be specific to the
company only and it is possible to control external links (for example, the
internet).
‘Extranets’ allow intranets to be accessed/extended outside the organisation,
for example, to gain access over a mobile phone or via a VPN (using the
internet). There are many safeguards to protect the network and allow only
certain users to have access to the secure servers. This will include passwords
and encryption which makes it more secure than the internet.
There are key differences between the internet and intranets:
• The internet contains global and public data/information whereas intranets
have data/information specific to the company.
• To access an intranet requires a user id and password and it can only be
accessed from agreed computers within the organisation (or from valid
extranet users).
• The internet can be accessed by anyone from anywhere in the world.
• The internet has public access; the intranet is private access only.
Cloud storage
Cloud storage is a method of data storage where the data is stored on offsite
servers and users pay a subscription each month to have their data stored on
these servers. Usually data is stored on more than one server (to allow
maintenance, repair and back-up) – this is known as ‘data redundancy’.
There are three common types of cloud storage:
Public cloud – the customer/client and cloud storage provider are different
companies.
Private cloud – the storage is provided by a dedicated environment where the
client/customer and cloud storage provider are integrated and operate as a single
entity accessible by that company only.
Hybrid cloud – this is a combination of the two types of cloud storage
described above; some data resides on the public cloud (for example, data which
is less sensitive) and some on the private cloud (for example, data which needs
to be kept out of the public access).
Having data stored on cloud storage facilities allows the following positive
features:
But of course there are also negative features:
Common errors
It is very common to see confusion between the terms ‘www’ and ‘the internet’;
the two need to be regarded as separate entities.
Examiner’s tip
If bullet points are used when answering a question which asks for an
explanation or description of differences, it is often a good idea to also
give a short paragraph summarising the differences highlighted in the
bullet points.
General internet terms and search
engines
Hypertext transfer protocol
Hypertext transfer protocol (http) is a set of rules that must be obeyed when
transferring data across the internet. Protocols are sets of rules agreed by the
‘sender’ and ‘recipient’ when data is being transferred between devices. When a
web page is being accessed, entering http:// at the front of an address tells the
web browser that http rules for communication are to be obeyed.
If http is omitted from the address, most web browsers now default to http.
When some form of security (for example, SSL or TLS) certification or
encryption is used (see Chapter 8) then the protocol is changed to https (this is
often seen as the padlock symbol ). The letter ‘s’ after http refers to secure.
Because of encryption, it is slower to use https than http, so it is usually only
adopted when sensitive or private data is being transferred across the internet.
Web browsers
A web browser is software which allows a user to display a web page on their
computer screen. It interprets or translates the HTML (hypertext mark-up
language – see later chapters) from websites and shows the result of the
translation. This can often be in the form of videos, images or sound. Most web
browsers share the following features:
• They have a home page.
• They have the ability to store a user’s favourite websites/pages.
• They keep a history of the websites visited by the user.
• They give the ability to go backward and forward to websites opened.
• They have hyperlinks to allow users to navigate between web pages; these
hyperlinks are shown as blue_underlined_text or use a small picture, such as a
pointed finger , under a phrase or image. By clicking on a hyperlink the
user is sent to another website or web page.
Web browsers use uniform resource locators (URLs) to access websites,
retrieve files, and so on. They are represented by a set of four numbers, for
example, 109.108.158.1 (http://109.108.158.1).
Blogs
These are personal internet journals where the author (blogger) will type in their
observations on a given topic for others to read; this may involve links to other
websites. Anyone can read blogs, but only the blogger can change the contents.
Entries are organised from most recent to least recent. Associated with blogs are
‘microblogs’ and ‘b-blogs’.
Wikis
These are web applications or websites that allow users to create and edit web
pages using any web browser. Anyone can edit or delete entries on a wiki using a
web browser, which often makes them biased or inaccurate. A document history
is maintained. One advantage of wikis is they allow large files to be shared with
others – this is much easier than emailing several people with the files.
Examiner’s tip
Questions where comparisons are to be made are best answered by
giving a whole list of differences and either doing the comparison as
part of the differences or by making some end statement as shown
above in the examiner’s comments.
Exam-style questions
1 Use the following terms to complete the five statements that follow
(four of the terms will not be used).
a This term refers to the need to respect another person’s views and
to display a common courtesy to each other.
b A type of offline storage environment where the customer/client
and provider are different companies is known as …
c Data which is stored on more than one device (for example, a
server) in case of repair, maintenance or potential data loss is
referred to as …
d Number of occasions where key words in a search engine match
up with websites/web pages.
e Type of attack leading to a modification to a user’s messages or
emails or denial of services is known as …
[5 marks]
2 a Explain the differences between:
public cloud
private cloud
hybrid cloud.
[3 marks]
b i What is meant by the term ‘netiquette’?
ii Describe three common rules of netiquette.
c Describe the main differences between blogs and wikis.
[4 marks]
CHAPTER 11
File management
Key objectives
The objectives of this chapter are to revise:
• generic file types
• the use of appropriate file names
• reduction of file sizes for storage or transmission
• resizing an image
• resampling
• file compression.
Key terms
Term Definition
Generic file File types that can be opened in appropriate software on
type most platforms.
Back-up Copy of a file made in case the original data is corrupted
or lost.
Archive The storage of information for a long period of time.
Data is likely to be compressed.
File A technique for reducing the storage space occupied by
compression a large file.
Generic file types
Common generic text file formats:
Examiner’s tip
The only way to gauge the depth required in questions like this is to
look at the allocated marks and space given to write the answer; in this
case it is a question worth 6 marks so students should be aiming to
write between six and eight different mark points. Sometimes a number
of mark points can be written into a single sentence.
Reduce file sizes for storage and
transmission
File sizes need to be as small as possible as all computer systems have a limited
storage capacity and it is important to minimise any delays when data is
transmitted (sent) between one device and another. Often the largest files stored,
or transmitted, are image files, especially video files which are a large number of
still images. Still images can be reduced in size by:
• resizing, which is reducing the width and height of an image
• resampling, which is reducing the quality of an image
Resizing an image
There are two recommended methods of resizing an image. The first is to resize
the image in a graphics package, for example, reducing an image 800 pixels by
600 pixels to 400 by 300 pixels. The second method of resizing is to use the
cropping tool in a graphics package.
Resampling an image
Downsampling reduces the image quality and file size by reducing the number
of pixels used for an image. Upsampling increases the resolution of an image by
adding extra pixels.
Examiner’s tip
Be specific with your answers, do not use phrases like ‘It takes too long
to do anything’. This should be phrased as, for example: ‘It takes too
long to open the web page using images with large file sizes’, or ‘It
takes too long to transfer the data with such large file sizes’.
Exam-style questions
1 Some file types contain moving images. Identify two file extensions
used with files containing moving images.
[2 marks]
2 Identify three file extensions used for generic text files.
[3 marks]
3 .rar and .zip are generic file extensions. Compare and contrast these
file types.
[4 marks]
CHAPTER 12
Images
Key objectives
The objectives of this chapter are to revise:
• resizing
• aspect ratio
• text wrapping
• cropping
• rotation
• reflection
• colour depth
• resolution
• brightness
• contrast.
Key terms
Term Definition
Resize Change the physical size of an image.
Text wrap Change the properties of an image to force text to flow
around, over or behind it.
Cropping Remove part of an image by cutting one or more edges
from it to create an image with a different size.
Rotation Turn an image (usually either clockwise or anticlockwise
(counter-clockwise) through a specified number of
degrees).
Reflection Flip an image (usually either horizontally or vertically).
Colour The number of bits used to represent each colour within a
depth single pixel.
Aspect The ratio of the width to the height of an image.
ratio
Editing an image
Images can be edited in many ways; they often have to be edited to fit into a pre-
defined space or placeholder. How they are edited depends upon the task, but it
is usual to make sure that the proportions of the image are not changed. Take
care when considering the use of the image and its audience, for example, if an
image is to be included on a web page then a low-resolution image may be
required. However, if an image is to be included in an enlarged publication then
a high-resolution image would be better to help reduce pixilation.
Top and Text flows above and below the image but not
bottom alongside it.
Tight Text flows all around the image, but not inside if it
contains white space.
Examiner’s tip
This single-line answer would also be too short for a 6-mark discuss-
style question where the examiner will be looking for at least six
different marking points. If you make a point and add detail to it then
sometimes a single sentence can be worth 2 or more marks.
Exam-style questions
1 Image A has been transformed to create images B, C and D. Identify
the transformation that has been applied to image A to create each
new image.
[3 marks]
2 Define the term ‘aspect ratio’.
[1 mark]
CHAPTER 13
Layout
Key objectives
The objectives of this chapter are to revise:
• planning your document
• editing methods
• headers and footers
• automated fields.
Key terms
Term Definition
Header The area at the top of a document between the top of the page
and the top margin.
Footer The area at the bottom of a document between the bottom of
the page and the bottom margin.
Planning your document
A document can be a piece of printed or electronic matter that provides
information or evidence or that serves as an official record. Before starting a
task, you must consider:
• What is the purpose of the document?
• Who is the target audience?
• How will I make it suitable for this audience?
• What is the appropriate medium?
• What is the appropriate package?
Editing methods
Make sure that you know how to perform these operations on text and images:
• highlight text
• select an image
• cut and paste
• copy, paste and delete
• move, drag and drop.
Automated fields
Automated fields can be placed in many types of document and are most
commonly used to place items in the header or footer. This includes items like
page numbering, an automated filename and file path, today’s date, and so on.
Other automated fields can be placed elsewhere in documents.
Study the headers and footers used in this book and the Cambridge IGCSE
ICT Coursebook. Do you think these contain automated fields?
Common errors
Contents are placed in a header or footer but not aligned to the page margins.
Make sure you align all headers and footers to the page margins, especially
when working within a word processor.
Examiner’s tip
Try to write/type your answer, then extend it a little showing the
examiner that you understand a little more about this than the single
statement. In the answer above there are two points – the element on
every page and the example of page numbering – but to get 4 marks
you need to give more depth and more than one example.
Examiner’s tip
If a question asks you to list, state, name or identify X (a number of)
items, credit will only be given for the first X answers given. This is to
stop students listing lots of items in the hope that the examiner will find
a correct answer among them.
Exam-style questions
1 Identify four items of information that it would be appropriate to place
in the header or footer of a textbook. Do not include objects that
would be placed using automated fields.
[4 marks]
2 Identify four items of information that it would be appropriate to place
in the header or footer of a textbook using automated fields.
[4 marks]
CHAPTER 14
Styles
Key objectives
The objectives of this chapter are to revise:
• corporate house styles
• font styles and sizes
• create and edit styles in a word-processed document
• using format painter
• using lists.
Key terms
Term Definition
Body text The basic style of text within a document, usually used for
all of the paragraphs.
Ascender The part of a lowercase letter (b, d, f, h, k, l
or t) that extends above the body of the
letters.
Descender The part of a lowercase letter (g, j, p, q or y)
that falls below the baseline of the letters.
Serif A font style where the ends of characters contain small
strokes called serifs, for example, Times New Roman.
Sans serif A font style where the ends of characters do not contain
small strokes called serifs, for example, Arial.
Corporate house style
This is branding that makes a company recognisable. This can be used on
something belonging to or sent from that company. House style often includes a
logo, colour schemes, font styles and other features, and will be consistently
applied to anything produced by the company. House style can be used on letter
heads, websites, vehicles, posters, presentations, television advertising and other
media. As well as ensuring a uniform and professional look across a company’s
documents and media, a house style also helps give a company an identity, and
can help with brand recognition. If styles are specified in the examination you
must apply them using the pre-defined styles, especially in the document
production, presentation authoring and website authoring questions.
Font sizes are measured in points; there are 72 points to an inch (just over 2.5
centimetres). If the question does not specify a point size, make the text readable
for the audience specified, for example: a minimum of 10 points high for body
text, 12 points high for older readers and at least 20 points for young children
learning to read.
The size of a font is measured from the top of the letter with the tallest
ascender (often the letter ‘h’), to the bottom of the one with the longest
descender (often the letter ‘f’, though note that the typeface chosen for this book
does not have a descender on the ‘f’! Many do, however: ).
Create and edit styles in a word-
processed document
When using Microsoft Word, styles are saved in a document’s template file.
Open the document and format one area of text within the document to match
the required styles. Highlight this formatted area of text and use it to create a
new style (see page 222 in the Cambridge IGCSE ICT Coursebook for details)
with its own style name. Make sure that the style name matches that shown in
the question paper, including the case (capitals and lower case letters) and any
special characters (like the hyphen - or underscore _). Now highlight any other
area/s where this text should be applied and click on the style you have defined,
in the Styles section of the Home tab. Use this tab to edit the styles defined for
this document. Please note, Microsoft Word calls this Modify Styles rather than
edit, as in the syllabus.
Common errors
When asked to show how styles have been defined, students screen shot only
the first part of this process, that is, applying the individual style elements to
the text.
When asked to show how styles have been defined, show the examiner the
whole of the Modify Style window for the specified style. Check that all of
the style elements from the question paper can be seen in this window,
including the spacing before and after the paragraph. These can often be seen
in the text listing at the bottom of the modify window.
Using lists
There are two types of list: numbered lists (which can include lettering and
roman numerals, and so on) and bulleted lists. Make sure that you can change
between the two types in both Microsoft Word and Microsoft Excel. In the word
processor make sure that you are confident using tab stops on the ruler (see page
215 in the Cambridge IGCSE ICT Coursebook) so that you can indent the bullet
points (or numbers) by a particular distance from the page or column margin.
Lists can have many levels, like this (note that when one list is placed inside
another, this is known as a nested list):
Examiner’s tip
The question asks the student to describe the lists so it is acceptable
and even desirable to extend the answer from the list styles set for
each level to include the final statement of elements common to both
lists. ‘Describe’ questions often lend themselves to answers that include
similarities (which students often omit) as well as differences, especially
where there is more than one element being described.
Exam-style questions
1 Describe the differences between a serif and a sans serif font.
[2 marks]
2 Define the term ‘corporate house style’.
[1 mark]
3 Give four advantages of using a corporate house style.
[4 marks]
CHAPTER 15
Proofing
Key objectives
The objectives of this chapter are to revise:
• spell check
• grammar check
• proofing techniques
• ensuring the accuracy of data entry.
Key terms
Term Definition
Spell A process where the software identifies words which are not
check held within its dictionary.
Grammar A process where the software identifies language which
check does not follow the accepted or expected rules.
Widow A last line of a paragraph that appears at the top of a
page/column, with the rest of the paragraph on the previous
page/column.
Orphan The first line of a paragraph that appears at the bottom of
the page/column, with the rest of the paragraph on the next
page/column.
Spell check
This is usually found in word-processing software. Spell check compares each
word in a document against those words held in its dictionary. If a word in the
document does not match the dictionary it is flagged as a possible error using a
red wavy underline like this:
Be aware that words that are spelled correctly but which are not included in
the dictionary your spell check is using will still be flagged as possible errors.
Examples of this are names, or words from a different language.
Word-processing software will often give you a list of alternative spellings to
unknown words. These can be found by clicking the right mouse button on the
word itself.
Grammar check
This is usually found in word-processing software. A grammar check reviews the
entered text to see if it follows the accepted or expected rules for the grammar of
the language used. A simple example is that each sentence starts with a capital
letter. Possible errors in grammar are shown using a blue wavy underline like
this: to make sure.
During practical examinations, do not attempt to correct any grammar errors
unless they are in text that you have typed, for example; the answer to a theory
question.
Proofing techniques
The term ‘proofing’ in printing means to make sure that the work is accurate.
Carefully check all spelling, punctuation, grammar and page layout. Page layout
should include:
• Applying styles
• Margin settings
• Images placed with correct dimensions and no distortion
• Text wrap around images and other objects
• Objects fitting within the boundaries of a page/column/slide and not
overlapping
• No lists or tables split over two columns/pages/slides
• No blank pages or slides
• No widows or orphans.
Checking each of these carefully and correcting where necessary (often using
page or column breaks) should help you score higher marks on the practical
papers. Consistent layout and consistent styles are very important.
Ensuring the accuracy of data entry
It is important to be accurate when entering data. Inaccurate data entry is one of
the most significant reasons that students lose marks in their practical
examinations. Check all data entry carefully!
Common errors
Placing upper or lower case letters in the wrong place.
Check that all sentences start with a capital letter and do not have capitals in
the middle of a sentence. It is fine to have the word I, or names starting with
capitals, in the middle of a sentence.
Numbers are transposed (they change places) as they are entered, for
example: the year two thousand and two entered as 2020 rather than 2002.
Use visual verification to check that every character has been entered as it is
in the original. Check the data entry, then check it again.
Errorsin spacing in the sentence, either by missing spaces or adding too many.
Use visual verification to check that every character has been entered as it is
in the original. Check that spacing is consistent throughout the document.
Examiner’s tips
• If a question asks you to spell check and proof read your document,
apply all of the techniques listed in this chapter to make sure that all
spelling, spacing and style errors have been removed.
• Always check the accuracy of all data entry.
• Remember: Check all data entry for errors, correct them, then
check it again.
Exam-style questions
1 This text was entered into a word processor:
‘The new airport will be constructed on marshhland on the outskirts of
Tawara.’
The spell check suggests there are two errors. Identify each
suggested error and explain why it may or may not be an error.
[4 marks]
2 This text was entered into a word processor:
‘Mrs jones works as an examiner. He marks your examination
papers.’
Identify any errors in this text
[2 marks]
CHAPTER 16
Graphs and charts
Key objectives
The objectives of this chapter are to revise:
• chart types
• creating a chart
• labelling a chart
• secondary axes.
Key terms
Term Definition
Contiguous Data that is placed together and can be selected in a
data single range.
Non- Data that is not placed together (often in a spreadsheet)
contiguous and cannot be selected using a single range.
data
X-axis The horizontal axis (for a system of co-ordinates).
Y-axis The vertical axis (for a system of co-ordinates).
Category A name given to the chart axis in Microsoft Office that
axis represents the category for each data point. It displays
text values.
Value axis A name given to the chart axis in Microsoft Office that
displays numerical values.
Legend A box that identifies the patterns or colours that show
different data series in a chart.
Chart types
You may be asked to select an appropriate chart type to answer a question. For
the IGCSE exam there are three types to choose from: a pie chart, a bar chart or
a line graph. When considering what chart to use, you must first consider what
the graph is supposed to show.
Use a:
• pie chart to compare parts of a whole, for example, the percentage of boys
and girls in a class
• bar chart to show the difference between things, for example, the number of
times Ahmed, Ben, Carla and Dee went shopping in a week
• line graph to plot trends between two variables, for example, plotting the
distance a person travelled in 10 minutes recorded in 1-minute intervals.
Creating a chart
Create a graph or chart by highlighting the data to be used for the graph or chart.
If the data is non-contiguous then hold down the <Ctrl> key as you select the
two (or more) ranges of data. Select the chart type, using the notes above on
appropriate chart types to help you. Make sure that you fully label the chart.
Labelling a chart
All charts must be fully labelled. Make sure that all of the text in all titles, labels
and in the legend, is fully visible. It is usual to label a pie chart with segment
labels or a legend, but not both.
Secondary axes
Secondary axes are added to a line graph (or combined line and bar chart) when
two data sets are plotted on the same graph with very different sets of values.
The chart shown here (created in Task 16f on pages 246–48 of the Cambridge
IGCSE ICT Coursebook) is an ideal example of this:
The two sets of data show rainfall data between 0 and almost 250 millimetres
and temperatures between –1 and 23 degrees Celsius. As these are very different
sets of data, two axes are required, one for the rainfall and one for the
temperature. In this example, the axes have also been edited to make them easier
to read and compare.
If you are required to create a comparative line graph, check to see if the two
data sets are the same type of data; if not, add a secondary axis to the graph.
Exam-style question
1 Bar chart Pie chart Line graph None of these
From the choices listed above, select the most appropriate way of
graphically representing the following:
a The percentage of a class of students who are boys and the
percentage who are girls.
b The distance travelled by a car over periods of time.
c The height plotted against the weight for each student in a school.
d The height of a student when the readings are taken every week
for a year.
[4 marks]
CHAPTER 17
Document production
Key objectives
The objectives of this chapter are to revise:
• page size
• page orientation
• page and gutter margins
• widows and orphans
• page, section and column breaks
• text alignment
• line spacing
• tabulation settings
• tables and bulleted lists
• mail-merged documents.
Key terms
Term Definition
Gutter The part of a document, usually white space outside the
page margin, where the document will be bound together.
Widow The last line of text of a paragraph that appears at the top
of a page, with the rest of the paragraph on the previous
page.
Orphan The first line of text of a paragraph that appears at the
bottom of the page, with the rest of the paragraph
appearing on the next page.
Indented The first line of a paragraph is indented from a margin and
paragraph all other lines are aligned to the margin.
Hanging The first line of a paragraph is aligned to a margin and all
paragraph other lines are indented (left hanging from the first line).
Page size
Source files for document production questions are likely to be set to a different
page size to that required for the final document, especially if they are in rich
text format (.rtf). Use the Layout tab, and find the Page Setup section to change
the paper size. The most commonly used page size is A4.
Page orientation
There are two types of page orientation, portrait and landscape. These are also
selected from the Page Setup section in the Layout tab.
Page and gutter margins
The Page Setup section in the Layout tab also contains an area where settings for
the margin (the border surrounding a page) can be changed. In any examination
with document production questions this skill will be required. Take great care to
set the margins as specified. The gutter size and position can also be changed
here. If a gutter is required, you will need to work out where the gutter will need
to be on the page. For a traditional book (or booklet) it is often on the left of the
first page, but if the document is to be bound at the top of the page (for example,
like some calendars) then select the top.
Common errors
Setting the margin and/or gutter settings in the wrong units, for example, in
inches when centimetres are required.
Check the units carefully, the computer that you are using may have its
software set to work in inches rather than centimetres. You will need to set
the margin/gutter settings in centimetres by typing the units in the dropdown
box as well as the size.
Setting the page margins correctly but not adjusting the margins in the header
and footer to match.
Edit the margin settings in the header and footer to match the page margins.
Text alignment
Text can be aligned in four basic ways:
• Left aligned – it is aligned with a straight left margin and a ragged right
margin.
• Centre aligned – it is aligned to the centre of the page and has ragged left and
right margins.
• Right aligned – it is aligned with a straight right margin and a ragged left
margin.
• Fully justified – it is aligned with straight left and right margins.
Use these icons in the Paragraph section of the Home tab after highlighting
the text:
Line spacing
Line spacing is usually set as part of a pre-defined style. The most commonly
used layouts in the practical examinations are single line spacing, 1.5 line
spacing and double line spacing. Use the icon in the Paragraph section of
the Home tab.
Common errors
Not setting consistent line spacing throughout the document.
Set the line spacing in your defined styles and apply these styles to all the text
(of that type). There may be different settings for body style, headings, lists
and tables.
Tabulation settings
Tabulation, margins and column widths can all be set using the ruler. These
settings affect how each paragraph appears on the page.
For each image, name and describe the type of paragraph that these
tabulation settings produce.
[9]
Student’s answers
a Image A is a hanging paragraph.
b Image B is a normal paragraph.
c Image C is an indented paragraph.
Examiner’s comments
All three answers have the correct names, each of these would gain this student a
mark and would score three of the 9 marks. The question asks the student to
name and describe; therefore, 2 marks have been lost on each part as there is no
attempt to describe each type of paragraph. Adding descriptions such as these
would have helped this student gain full marks:
a A hanging paragraph has the first line of each paragraph aligned to the left of
the rest of the paragraph. The rest of the paragraph would sit to the right of
the left margin. Only the first line of each paragraph will touch the left
margin.
b Each paragraph has the first line aligned with the rest of the paragraph; in
this case both are indented 1.25 units from the left margin.
c The first line of each paragraph is indented 2 units to the right of the other
lines in each paragraph.
Examiner’s tip
Note how in parts b and c of the examiner’s comments the sizes have
been taken from the images. As the images give no units of
measurement, like centimetres or inches, it is acceptable to refer to
them as units.
Examiner’s tips
• If you have checked and corrected all the possible causes listed
above and the table or bulleted list still does not fit within a single
column or page, remembering to make sure the text is still legible,
change the font face used in your style definition to a narrower font.
This will allow more characters on each line, which may help.
• In a table, do not allow the text within the table to sit outside the
column or page margins.
Mail-merged documents
A mail-merged document is produced by merging data from a source file with a
master document to produce personalised documents, often letters. It is usually a
fully automated process. Using mail merge can reduce the number of input
errors, as well as significantly decreasing the time it takes to produce a large
number of personalised documents.
The process for creating a mail-merged letter is to:
• open or create a master document
• add any special fields (like automated date fields) into the master document.
• create a data source file
• attach the source file to the master document
• check the source file is attached (using the Mail Merge Recipients window)
• add merge fields to the master document
• run the mail merge (selecting some or all of the data from the source file)
• check that the merged documents are those required
• check that the pagination of the merged documents is correct (correcting using
page breaks if not)
• print the merged documents.
Examiner’s tip
Toggle the merge codes by clicking the right mouse button on the fields
and selecting from the menu before showing this in your evidence
document.
Examiner’s tip
When you add a new mark point to your answer, try to add more detail
to (expand upon) this to gain a second mark.
Exam-style questions
1 Explain what is meant by the term ‘margin’ within a document.
[2 marks]
2 Explain what is meant by the term ‘fully justified text’ within a
document.
[2 marks]
3 Describe what is meant by a ‘hanging paragraph’.
[2 marks]
4 Tuition fees will be increasing at the University of Tawara. The
amount that they will increase depends upon the course being
studied. Personalised letters will be sent to all 5450 students telling
them of the increase.
Explain why a mail-merged letter would be used for this task.
[4 marks]
CHAPTER 18
Data manipulation
Key objectives
The objectives of this chapter are to revise:
• database structures
• flat-file and relational databases
• data types
• form design
• searching for subsets of data
• extracting summary data
• producing reports
• sorting data.
Key terms
Term Definition
Field A place used to hold a single data item in a database.
Record A collection of fields containing information about one data
subject (usually a person) in a database.
File A logically organised collection of records, usually where all
the records are organised so that they can be stored
together in a database.
Table A two-dimensional grid of data organised by rows and
columns within a database. Each row of the table contains
a record. Each column in the table represents a field and
each cell in that column has the same (pre-defined) data
type.
Flat-file A database structure using a simple two-dimensional table.
database
Relational A database structure where data items are linked together
database using relational tables. It maintains a set of separate,
related files (tables), but combines data elements from the
files for queries and reports when required.
Primary A single field within a relational database table that contains
key field unique data (no two records within this field can contain the
same data). A primary key field cannot contain a blank
record.
Foreign A field in one database table that provides a link/creates a
key field relationship to a primary key field in another database table.
Query A request for information from a database.
Report A document that provides information.
(generic)
Report The formatted and organised presentation of data from a
(Microsoft database.
Access)
Data A form used for collecting data for input to a system, which
capture can be hard copy or screen-based.
form
Data A screen-based form used to input data into a system.
entry
form
Database structures
A database is a program used to store data in a structured way. A database
includes both the data itself, and the links between the data items.
All databases store data using fields, records and files.
Fields Each is a single item of data and has a fieldname, which is used to
identify it within the database. Each field contains one type of data, for example,
numbers, text, or a date. All field names should be short, meaningful and contain
no spaces.
Records Each record is a collection of fields, for example, all the information
about one person or one item. These may contain different data types.
Files Each file is an organised collection of records stored together. A file can
have one or more tables within it.
Flat-file database
A flat-file database has a simple structure where data is held in a two-
dimensional table and is organised by rows and columns. This is stored in a
single file.
A flat-file database is suitable for use with one type of data (for example, data
about customers, cars or CDs) that does not contain large quantities of duplicated
data.
Relational database
A relational database stores the data in more than one linked table, stored in a
single file. It is designed to reduce duplicated data. Each table has a key field.
Most tables have a primary key field, which holds unique data (no two records
are the same in this field) and is the field used to identify that record. Some
tables will have one or more foreign key fields. A foreign key in one table will
link to a primary key in another table. This makes relational databases more
efficient when storing data, as an item of data is stored only once rather than
many times. Storing the data only once reduces the time taken to add or edit data
(and, therefore, the cost of employing workers) and reduces the chance of errors.
It also means less storage capacity will be required, so it can reduce the initial
hardware costs, especially for very large databases.
A relational database is suitable for use with more than one type of data that
are related (for example, cars sold and customers), or with data that contains
large quantities of duplicated data.
Common errors
Relational databases can give search results more quickly than flat-file
databases.
The relative speed of the same search on the same data using a flat-file
database and a relational database is dependent on the structures of the data
tables in the relational database and the quantity of data being searched.
Data types
There are three main data types. These are:
Alphanumeric This is used to store text and numbers not used for
calculations. In Microsoft Access this is called a ‘text’ field, or in later versions
either ‘short text’ or ‘long text’.
Numeric This is used to store numbers. In Microsoft Access this is usually
called a ‘number’ field and has several sub-types, such as:
• Integer – which stores whole numbers. In Microsoft Access it is better to use
the ‘long integer’ sub-type.
• Decimal – which stores decimal numbers.
• Currency – which displays local currency formatting. In Microsoft Access this
is called a currency data type, although it is technically a sub-type.
• Date and Time – in Microsoft Access this displays the date in a recognised date
format but stores the date and/or time as a number.
Copy and complete the following data dictionary by entering the field
names and most appropriate data type for each field. For any numeric
field, specify the sub-type.
[5]
Examiner’s tips
• Take great care to follow the naming conventions for field names
used in the question; if underscores are used instead of spaces,
continue this convention in your field names.
• Remember to keep all field names short, meaningful and containing
no spaces. Examine the question carefully before attempting to
answer it.
Form design
Forms can include data-capture forms, which are often created on paper to
collect the data to add to a database, or online data-entry forms. All these forms
should have the following features:
• A title
• Instructions on completing the form
• Appropriate font styles and sizes for the target audience
• Clear easy-to-read questions (closed questions where possible)
• Boxes (or other indication of space) for the answers
• Appropriate sizes for the answer boxes (not all the same size)
• Similar fields grouped into blocks/categories (for example, all address fields
together)
• No crowding of fields (all should have white space between)
• The form fills the page
• No large areas of white space
• Only relevant data collected.
List the results which would be output when the following search
criteria are used on the Town field:
a *FORD
b FORD*
c *FORD*
[3]
Student’s answers
a ASHFORD, BRADFORD
b FORDHAM
c ASHFORD, ASHFORDLY, BRADFORD, BRENTFORD, FORDHAM
Examiner’s comments
a The student has found the first two towns ending with the word FORD but has
omitted the town of BRENTFORD.
b This is correct, the student has found the only town starting with FORD.
c This is correct, the student has found all the towns containing the word FORD.
Examiner’s tip
This is a good example of a typical IGCSE answer where the student
understands the question yet has, in part a missed out one of the
answers. A good examination technique is to read the question, answer
it, read the same question again, then check that the answer is correct.
This technique can make a significant difference to your performance in
the final examinations.
Common errors
The default setting in the query wizard (in some versions of Access) is to the
last query or table that you used. Where two questions require independent
queries, the results of the first query are selected as the source data for the
second query, rather than selecting the original table.
Make sure that you select the source data appropriate to the task you are
completing. This often means that you need to change the source data back
to being the original table. Don’t leave the result of the previous query as
your source data.
You will need to remember the syntax for formulae used in your queries. If a
calculated field is required (this is usually worded as ‘calculated at run-time’) it
must have the following syntax:
NameOfTheNewCalculatedField: [ExistingFieldname] Operator
[ExistingFieldname]
or
NameOfTheNewCalculatedField: [ExistingFieldname] Operator Variable
Producing reports
When an examination question asks you to produce a report it does not always
mean a report generated from Microsoft Access. This is often the easiest method
but reports can be produced in a word processor, cutting and pasting the data
from other places.
When creating reports in Access, make sure that you show all the data in the
report; often students include all the fields and correct records but do not enlarge
the control (often for the data but sometimes for the label) so that all of the data
for every record is fully visible. Use the drag handle on the control to enlarge it
when you are in Design view.
Examiner’s tips
• Look at the query (or table) used to create the report and identify the
longest data item for each field. Use these data items to check in the
report that each control is wide enough.
• If the question does not specify the page orientation, set this to
landscape to allow more data to fit across each page.
Sorting data
Data can be sorted in either the query or the report. At IGCSE level it is easier to
sort the data in the report. At this level you do not need to use grouping within
your reports. Here are two examples of data being sorted in ascending order:
apple
ball
cake
dog
or
1
2
3
4
dog
cake
ball
apple
or
4
3
2
1
Exam-style questions
1 Describe the following database features:
a A record
b A field
c A file
d A table
e A report
f A query
g A calculated control
[7 marks]
2 Explain the differences between a flat-file database and a relational
database.
[4 marks]
3 My-Music-Inc sells many music DVDs. Below is a small selection of
the DVDs stored on its database.
The data has been sorted on two fields.
a Write down the field which was used as the primary sort in the
database and the order in which it was sorted.
[2 marks]
b Write down the field which was used as the secondary sort in the
database and the order in which it was sorted.
[2 marks]
c Tracy is the owner of My-Music-Inc and receives requests from
customers about the music DVDs that are in stock. She converts
these requests into search criteria.
For example: a customer might ask for a list of DVDs that were
released before 2016 and DVDs with more than 12 tracks. Tracy
would write this as:
Released < 2016 OR Tracks > 12
Write down the search criteria for a customer who wants a list of all
the DVDs that were released after 2015 that cost less than £10.00.
[3 marks]
d Write down the names of the artists whose DVDs match the
requirements of part c.
[1 mark]
CHAPTER 19
Presentations
Key objectives
The objectives of this chapter are to revise:
• presentations, media and audience
• master slides
• presentation slides
• audience notes
• presenter notes
• transitions
• animations.
Key terms
Term Definition
Aspect The relationship between the width and height of an object. In
ratio the case of a presentation the width and height of the display,
often either 4:3 or 16:9.
Master slides
A master slide allows you to design/change the layout of all slides with one
action. It holds information on colours, fonts, effects and the positioning of
objects on the slides. Adding or changing master slide elements means that you
do not have to change every slide individually.
To change all slides in Microsoft PowerPoint always change the settings in the
primary (top) master slide. This one overrides the slide masters for the other
slide types which are found below the primary master slide.
Presentation slides
Check carefully as you place objects on each slide that no object touches or
overlaps the objects placed on the master slide (unless instructed to do so by the
question paper). Make sure that the objects are clearly visible and that the text
has good contrast with the colours in the background/theme you have selected.
Different types of slide layout will allow you to place text, images, lines,
shapes, graphs and charts, video and audio clips on the slide. Select carefully the
type of slide that you require each time you insert a new slide.
Audience notes
If a presentation is being used to teach or lecture to an audience, it is common
for audience notes to be used. These are paper copies of the slides of a
presentation that are given to the audience, so they can add their own notes and
take them away from the presentation. If you are required to print audience notes
in PowerPoint, select the appropriate option from the ‘Handout’ section.
Presenter notes
Presenter notes are also used when teaching or lecturing to an audience.
Presenter notes are a copy of the presentation’s slides with prompts and/or key
facts that need to be told to the audience by the person delivering the
presentation. Presenter notes are added in the Notes area of the presentation, just
below the slides. If you are required to print presenter notes in PowerPoint,
selecting ‘Notes Pages’ is often the most appropriate.
Transitions
Transitions between slides are the methods used to introduce/move to a new
slide. This can be simply replacing the existing slide with a new slide or using a
number of different features to change from one to another. Transitions can be
timed to run automatically (for example, in a looped on-screen carousel) or set to
be manually selected by clicking the mouse (a controlled presentation). For the
practical examinations, always use the same transition throughout the
presentation (unless told otherwise in the question paper). Use screen shots to
show the examiner that you have used transitions, by selecting the Slide Sorter
view, then the Transitions tab.
Animations
An animation effect is the effect used to introduce an object within the slide.
Animations can be timed or manually selected by clicking the mouse. For the
practical examinations, always use the same animation throughout the
presentation (unless told otherwise in the question paper). Use screen shots of
the Animation Pane to show the examiner your animations.
Examiner’s tip
Do not give a short one-line answer to answer any ‘discuss’ question.
Always look for two sides to the discussion, offering different points and
detail to support these points for both sides before trying to use the
points to come up with a reasoned conclusion.
Exam-style questions
1 A presentation will be delivered as a lecture and use both presenter
notes and audience notes. Explain why audience notes and
presenter notes often contain different content.
[2 marks]
2 A presentation will be used in a shopping mall to advertise different
shops and their products. Identify the feature added to the
presentation to make sure that it never ends.
[1 mark]
CHAPTER 20
Data analysis
Key objectives
The objectives of this chapter are to revise:
• data models
• spreadsheet structures
• formulae
• absolute and relative cell referencing
• functions
• nested functions
• test the data model
• select subsets of data
• sort data
• format cells.
Key terms
Term Definition
Cell A single square/box within a spreadsheet, into which only
a single entry can be placed.
Row All the cells in one horizontal line in a spreadsheet.
Column All the cells in one vertical line in a spreadsheet.
Sheet All the cells in one two-dimensional grid within a
spreadsheet workbook.
Label Text placed in a spreadsheet cell, often denoting a
heading or name associated with a value.
Value A number placed in a spreadsheet cell.
Formula A set of instructions/calculation placed in a spreadsheet
cell. The result of the calculation is usually displayed in
the cell. A formula can include cell references, numbers,
mathematical symbols and, in some cases, pre-defined
functions.
Function Is a pre-set formula with a name (which is a reserved
word) placed in a spreadsheet cell.
Absolute Is a cell reference within a formula that will not change
reference when a cell is replicated. To set this, a $ symbol is placed
before the part of the cell reference that must not
change.
Relative A cell reference within a formula that will change when a
reference cell is replicated.
Range A group or block of cells in a spreadsheet that have been
selected or highlighted.
Named cell A cell that is given a more meaningful name by the user
than its usual cell reference.
Named A group or block of cells in a spreadsheet that have been
range given a single name by the user. This allows the user to
enter this name in their formulae rather than
remembering the cell references for the cells in this
range.
Nested One spreadsheet function is used within another function
functions in a cell.
Spreadsheet A spreadsheet that is used to investigate different
model outcomes by changing one or more variables within it.
Normal data Data used to test a system. Data that is within an
acceptable range and is usual for the situation.
Abnormal Data used to test a system. Data that is of the wrong
data type (for example, text where it should be numeric) or is
outside the accepted range.
Extreme Data used to test a system. Where data must be within a
data certain range, extreme data is the data on either
boundary of the range.
Data models
A spreadsheet is often used to create a data model. By changing the contents of
one or more cells in a spreadsheet, different outcomes can be calculated and
predicted. Sometimes data modelling is called making a ‘what if scenario’.
These models are often:
• financial
• mathematical
• scientific.
Spreadsheet structures
A spreadsheet is a two-dimensional table or grid consisting of rows, columns and
cells and is used to perform calculations.
All spreadsheets store data using:
Rows Each row is all the cells in one horizontal line in a spreadsheet. The row
heading contains the number displayed to the left of the first cell.
Columns Each column is all the cells in one vertical line in a spreadsheet. The
column heading contains the letter displayed above the top cell.
Cells Each is a single square/box within a spreadsheet into which only a
single entry can be placed. A cell can hold a:
• label (some text)
• number
• formula (that starts with an = sign).
Cells can be formatted to display data in different ways, so what a user sees in
the cell is not always the actual content of the cell.
Each cell has a reference like C5 which is the cell’s address in the spreadsheet.
You can give an individual cell or a block of cells a name, so a cell’s reference
may not be seen if the cell has been given a name. These cells or blocks of cells
are called named cells and named ranges.
Sometimes more than one spreadsheet (which is sometimes called a
worksheet) are stored together in a workbook.
Examiner’s tip
Practise using named cells and named ranges. These are often
required in the practical examinations. Make sure that you name the
range exactly as it appears in the question paper (including case).
Formulae
Formulae start with an = sign. Simple formulae can be used to:
• Refer to the contents of another cell. For example: cell A2 contains the
formula =B4 The formula copies the contents of B4 and displays it in A2. If
the contents of B4 were changed, then the contents of A2 would also change.
• Perform calculations. For example: cell A7 contains the formula =A5+A6
The formula adds together the contents of cells A5 and A6 and displays the
result in cell A7. If the values held in either A5 or A6 were changed, then the
contents of A7 would change.
Mathematical operators
Symbol Operation
+ Addition
– Subtraction
* Multiplication
/ Division
^ Indices (to the power of)
Examiner’s tip
When asked to model data, design your spreadsheet so that you do not
have to change your formulae. Referencing to other cells (like the
formula in A6 in the question above) is the best method.
Nested functions
Sometimes examination questions will ask for formulae that are more complex.
These types of question will often need one function inside another function. If
three different conditions are needed then nested IF functions are ideal. If there
are lots of different conditions, using either VLOOKUP or HLOOKUP is a better
option than lots of different nested IF statements.
Examiner’s tip
When given a question that requires nested IF functions, always work
from lowest to highest (in order) or from highest to lowest. Do not
assume that the order of the question will give you the correct results.
Sort data
Make sure that you select all the data for each item to be sorted. Make sure that
you do not include the column headings in the data that is sorted.
Common errors
When a block of data needs to be sorted into a particular order, for example,
by name only, the single column of data that you are sorting by (the name
column) has been selected.
Highlight the whole block of data before performing the sort. Otherwise,
when the data is sorted (by name column) the other data in the block would
not be sorted with it and the integrity of the data would be lost.
When all the data has been selected the column headings are also selected so
that these are sorted within the data.
Highlight all the data apart from the column headings or select the tick box
for ‘My data has headers’.
Examiner’s tip
If more than one level of sorting is required on your data, always use
‘Custom Sort…’ to open the sort window. This allows you to add the
different levels of sorting and also allows you to screen shot this
window to place evidence of your method in your Evidence Document.
Format cells
Cells can be formatted to enhance the contents and create, for example, titles and
subtitles. Make sure to practise merging cells, applying bold, italic and
underlining, changing the background and foreground (text) colours, selecting
different font sizes and styles, including serif and sans serif fonts.
Formatting cells containing numbers changes the way each cell is displayed
but does not change the value held within it.
Common errors
Where a question states ‘Calculate… to 0 decimal places’; you format the
cell(s) as integers (to 0 decimal places) rather than using the INT or ROUND
functions.
If the question states ‘Calculate… to 0 decimal places’ use the INT or
ROUND function.
Examiner’s tips
• If a question asks for ‘… rounded to one decimal place’ this means
the answer is both rounded and displayed to one decimal place. If a
question asks ‘… displayed to one decimal place’ the number in the
cell is not changed but the cell is formatted to show only one decimal
place.
• If a question asks you to ‘apply appropriate formatting to the
spreadsheet’, check the initial rubric as this usually indicates the type
of currency or other formatting and the number of decimal places.
You will need to identify which cells should be, for example,
currency/percentage and format these as appropriate.
Common errors
Currency format is applied to all numeric cells in the spreadsheet.
Check what each cell represents. Only format it as currency or percentage,
and so on, if it contains that type of data.
The currency symbol can’t be found in my regional settings so I will not
format the cells.
Scroll down the list of currencies available until the three-letter ISO codes
appear. If the currency symbol for the country is not available use the ISO
(international standard) code, for example: for US dollars ($) it is USD, for
pounds (£) sterling it is GBP (Great Britain pounds).
Examiner’s tip
Set the page orientation to landscape unless the question instructs you
to use portrait.
Exam-style questions
1 The following spreadsheet shows the value of sales in a number of
countries.
a Cell E5 contains the formula:
=SUMIF($H$2:$H$21,B5,$I$2:$I$21)
Explain what this formula does.
[4 marks]
b Write down the formula you would expect to see in cell E6.
[3 marks]
c The formula in cell I22 refers to all the values in column I. Write
down the formula you would expect to see in cell I22 to produce
the value 20.
[2 marks]
2 Two students use different formulae to calculate the whole number of
dollars for products that they have sold.
Student A uses the formula:
=INT(A42*A43)
Student B uses the formula:
=ROUND(A42*A43,0)
Explain (using examples) why sometimes the two formulae give the
same answer, other times they do not.
[4 marks]
3 a A cell contains the function =COUNTIF(ObjectTable,$A$3)
Explain what this function does.
[3 marks]
b Explain why $A$3 has been used rather than A3.
[3 marks]
CHAPTER 21
Website authoring
Key objectives
The objectives of this chapter are to revise:
• web page creation layers
• web page structure
• styles in HTML
• tables
• images in a web page
• animated images, video and audio files
• bulleted and numbered lists
• hyperlinks
• stylesheet structure
• working with colour
• text in the stylesheet
• background colours and images
• classes
• tables in the stylesheet
• publish a website
• test a website.
Key terms
Term Definition
Website A collection of interrelated web pages that relate to one
topic or organisation and are usually accessible via the
internet.
Content One of the three layers in web page development. The
layer content layer is used to define the structure of the web
page, often using tables or frames, and the content of
the pages including text or images and hyperlinks to
other pages. The content layer is often written in HTML
or XHTML.
Presentation One of the three layers in web page development. The
layer presentation layer is used to define how a web page will
look to the viewer. It provides the colour schemes,
themes and styles seen when a web page is displayed
and is usually written in CSS.
Behaviour One of the three layers in web page development. The
layer behaviour layer is used to do ‘an action’ (rather than just
display or link to other pages) and often uses script
languages embedded into the HTML. There are many
different script languages but the most common for web
development are JavaScript PHP, Perl and CGI.
HTML HyperText Markup Language: a text-based language
used to create markup, so that web browser software will
be able to display information in different ways.
CSS Cascading StyleSheet: a language used for the
presentation layer in web development. This language is
used to define how elements of a web page appear in
the web browser. CSS elements can be embedded
within HTML or attached to a web page as a cascading
stylesheet.
Text editor Software that allows you to type and edit plain text. It
contains few or no features that allow formatting of
documents.
WYSIWYG What You See Is What You Get: in terms of website
authoring, relates to packages that create or edit HTML
markup using a graphics interface. For example, you
may enlarge or reduce the size of an image on a web
page by using the drag handles. The WYSIWYG
package will edit the HTML markup so that this change
will appear whenever the page is opened.
Tag A command used in HTML to instruct a web browser
how to display text, images or other objects. The tags
are not displayed on the web page. Some tags are used
with attributes.
Head The section of HTML in a web page that contains page
titles (visible in the browser tab but not on the page),
styles (for example, the links to external stylesheets),
and the meta data (for example, the tags used by search
engines).
Body The section of HTML in a web page that contains the
contents (for example, text, images) and the tags
describing the content, hyperlinks and structure (for
example, tables used to lay out the page) of a web page.
Ordered list A list within a web page that is ordered and has numbers
or letters for each list item.
Unordered A list within a web page that is in no specific order and
list has bullet points for each list item.
Hyperlink A reference within an electronic document (like a web
page) to another place in the same document or to a
different document. Hyperlinks are the foundation of any
hypertext system, including the world wide web.
Embedded Styles (created in CSS) that are inserted and saved
styles within the body section of the HTML of a web page.
Attached A document containing style definitions that is attached
stylesheet to a web page using the link tag in the head section. The
styles from this stylesheet are used to display the web
page.
RGB Defines the different amounts of red, green and blue
(which are the primary colours of light) that are sent to
the display to change the colour of each pixel.
Bandwidth This is a reference to the range of frequencies a
communication channel can handle. The bigger the
bandwidth the more data can be sent and received at
the same time. The amount of data that can be
communicated also relies upon the transfer rate. This is
often used to describe internet connection, with the term
‘broadband´ meaning it has more than 3KHz (although in
real terms at least 300MHz is needed in current
systems).
Domain This is the name given to the place we can find a
name particular website on the internet.
FTP File Transfer Protocol allows a copy of data to be sent
from one computer to another. It controls the data and
sends it in blocks, checking each block as it arrives for
errors.
Make sure your HTML5 starts with <!DOCTYPE html> followed by <html>
and ends with </html>.
Between the <html> and </html> tags, each web page is split into two
sections:
• the head section
• the body section.
The head section is always above the body section and contains elements used
in the page but not displayed on the page, for example, the page title and
attached stylesheets. The body section contains the structure of the page, the
contents placed within this structure and any hyperlinks. The structure of the
web page you will create for the examinations will use tables.
Examiner’s tip
Each time you make a small change to your HTML (or your CSS), save
it, load the web page back into your browser (or press F5 to refresh it),
then test the changes you have made. If you save and test after each
change, it is easy to correct any errors that you may make.
Styles in HTML
HTML contains a number of pre-defined styles, including:
• p paragraph style
• li list style (for bulleted or numbered lists)
• h1 heading style 1 (usually has the largest font size)
• h2 heading style 2
• h3 heading style 3
• h4 heading style 4
• h5 heading style 5
• h6 heading style 6 (usually has the smallest font size)
Your browser has default settings defined for each of these styles but you can
change how each one looks later in the presentation layer. Each of these styles is
applied with an opening tag such as <p> and closed with </p>. The / tells the
browser that this style has now finished. When you define any text in your web
page always use one of the style definitions above.
Tables
Tables are used to structure the web page. They are used to organise page layout
and often to define the structure with no borders visible, so that a page keeps a
similar look even when a browser is resized. Each table can have a header with
header data, footer with footer data, and body section with table rows and table
data in each cell. These areas are defined by the tags <table>, <thead>, <th>,
<tfoot>, <tbody>, <tr>, <td>, respectively. Again a / is placed after the < to
close each section, for example </table>.
Table borders can be set as on using the attribute <table border=“1”> or off
with <table border=“”>. They can also be made invisible in the presentation
layer (CSS) attached to the web page. All other changes to table borders are
made in the CSS, although this is sometimes placed in the HTML as an
embedded style using the style attribute. An example of this is to merge all
borders within a table where the CSS border-collapse element has been
embedded in the HTML: <table border=“1” style=“border-
collapse:collapse”>.
See page 373 of the Cambridge IGCSE ICT Coursebook for more detail on
table structures.
Examiner’s tip
Practise creating and editing tables including the use of the rowspan
and colspan attributes <td rowspan=…> and <td colspan=…> to make
table data appear over more than one row and/or column.
Sample exam question
Identify the HTML used to create a table structure, with no formatting,
to look like this:
Cost table
Item Cost
Apple $0.40
Banana $0.80
List only the HTML for the table and one line of markup as a comment
with your name.
[6]
Student’s answer
Examiner’s comments
This markup contains a number of errors that would not allow the table to be
displayed as shown in the question. The table data in the first row contains an
error. This should show a colspan set to 2 rather than a rowspan set to 2. The
final row of the table does not have a <tr> tag. The table has not been closed
with a </table> tag. The markup for the table tag contains embedded CSS using
the style attribute. The indented markup helps both the student and the examiner
check each pair of tags is present, notice how all <tr> and </tr> tags start at
the same point on each line and within each table row all the <td> tags also start
from the same point but are indented from the <tr> tags.
Examiner’s tip
Some of the errors identified here are typical of those found in students’
answers. For example, not carefully reading the question, which
specified no formatting, yet embedded CSS has been created by the
student. Not closing each tag with its corresponding / tag. As almost all
HTML tags work in pairs (there are a few exceptions like <BRK><IMG>),
check carefully that each tag is closed in the correct place.
You will notice that the image source does not have any file path. For this
hyperlink to work, the image must be stored in the same folder as the saved web
page (they will be uploaded from this folder to the host web server) or the image
will not be displayed.
Bitmap graphics formats have always been used for websites, in particular
JPEG (.jpg), GIF (.gif) and more recently PNG (.png). Scalable vector graphics
(.svg) are now also being used in some web pages but these are not suitable for
all types of image.
For the purposes of the IGCSE, concentrate your answers on bitmap format
graphics (not .bmp format) such as JPEGs, GIFs and PNGs. Each of these can be
resized in a graphics package (often to reduce the image and file sizes) or you
can use embedded CSS in a style attribute of the image tag. So to resize the
image img0047 to 200 pixels wide (and maintain its aspect ratio) the example
shown above will change to:
Audio files are placed in the HTML in a very similar way to video files, but do
not need width and height attributes. For example:
Holiday destinations
• Maldives
1. relaxing beach holidays
2. scuba diving
3. wind surfing
• Austria
1. skiing
2. climbing
3. mountain biking
• Iceland
Examiner’s tip
While a diagram can help answer a question, the description is what
will gain the marks although sometimes a sketched diagram can help to
make it clear to the examiner what you are describing.
Hyperlinks
A hyperlink is a method of accessing another document or resource from your
current application. Hyperlinks can:
• move your position within a page
• open another page, either locally or on the internet
• open your email editor so that you can compose an email.
Each hyperlink is created using an <a> (anchor tag) and closed with </a>.
These tags must surround the text or image that will be used for the hyperlink.
The hyperlink is created by adding an href (hyperlink reference) attribute to the
anchor, which shows the place to move to (or action to perform). If the href is
set to a file path, for example: <a href=“page33.htm”> this must be a relative
file path (containing no references to any folder structure or local drives).
The use of an absolute file path, for example: <a
href=“D:/myfiles/page33.htm”> may work on the machine you are using but
is unlikely to work when uploaded to your web server.
Hyperlinks can be used to open web pages in the same browser window or a
new browser window by setting the target attribute. The target attribute can be
attached to an individual hyperlink like this: <a href=“page33.htm”
target=“_blank”>
There are a small number of acceptable target extensions but for IGCSE
_blank opens the new web page or document in a new window or tab and _self
opens it in the current window or tab.
If all hyperlinks to linked web pages or documents are to appear the same,
then this attribute can be set in the attached stylesheet as a default target window
using: <base target=“_blank”>
This must be placed in the <head> section of the web page. If the target
attribute is not used, the browser will decide where to open a web page.
Examiner’s tip
Think carefully about the answers you give, for ‘describe’ questions
give the examiner as much detail as possible. Do not assume the
examiner knows what you are thinking … put it down in your answer.
Stylesheet structure
This is completed in the presentation layer and is created in CSS. Whether you
use a text editor like Notepad or a WYSIWYG package to develop a web page, it
is always wise to add comments to your stylesheet. For the practical
examination, these should include your name, centre number and candidate
number. Comments are added using the following HTML syntax:
Styles can be applied by using:
• embedded styles, where styles are placed using a style attribute within the
HTML, but these have to be defined for each element
• attached stylesheets, where styles are placed in a document that is loaded by
the browser. The style definitions from the document are applied to all
elements on the web page.
Embedded styles over-rule attached styles and are placed in the HTML like
this:
In this example this table would have a blue background colour and yellow
text, which may be different from the styles set in the attached stylesheet.
Attached stylesheets contain all the styles that may be needed for a web page.
Using these saves a lot of work as the styles only need defining once, then the
stylesheet can be attached to a number of pages. These web pages will then all
have the same presentation features. This is very useful for showing corporate
house styles. A number of different stylesheets can be attached in the <head>
section of each web page. The bottom stylesheet has the highest priority, then the
one above it, and so on, hence the name ‘cascading’ stylesheets as each one
flows towards the bottom (like a series of cascading waterfalls, the last one being
the largest and most powerful). The stylesheet is attached like this:
Examiner’s tip
Practise creating styles in a stylesheet attached to a web page. Edit
each style to see what difference it makes. Remember to save the
stylesheet in CSS format after each change and to refresh the web
page for the changes to take effect.
The # tells the browser that the number is in hexadecimal and the American
spelling of color must be used. The ff for the red component turns on full red
light for each pixel on the screen or projector and each 00 for green and blue
turns off these colours. If all colours are 00 (so it becomes #000000) then the
screen would be black as no colour is projected, and if they were all fully on
(#ffffff) then the screen would be white as mixing red, blue and green light
gives white light.
The browser looks at the font list and tries to find the first named font family
in its stored font list, if it is present it displays this. If not it looks at the next
named font, with the same results. If none of the named fonts is available it
displays its default serif or sans serif font.
Having dealt with setting font families, let us move on to consider font size.
Font size can also be set when text styles are defined, for example:
The font-family has been reduced to a single generic font so that it all fits on
one line, and the font-size property value has been set to 60 points high.
Examiner’s tip
Read the question carefully, especially where font size is concerned.
Font sizes are likely to be specified in either points or pixels (although
other types of measurement are possible). Marks are unlikely to be
awarded if the correct type of measurement is not present. There must
also be no space between the 60 and the pt.
Text alignment is set with the text-align property. The possible values that
can be added to this are shown here:
Text can be bold, italic or underlined. Each uses a different property for the
declaration. These are:
Text can be coloured using the color property followed by a hexadecimal RGB
value, such as:
The background repeat declaration is set to repeat if you wish to have ‘tiled’
images. If there is no background repeat you can define the position of the
background image in the window.
Classes
Classes have been rarely used at IGCSE level, but they define different subtypes
within an element. A class is defined using a dot (full stop) before the style
name. Some WYSIWYG packages automatically use classes rather than defining
styles. In these examples:
the top line defines the style h1 and the second line defines the class h1.
Common errors
When asked to ‘Create the following styles …’ in a question, students
generate all the correct declaration properties and values for a series of
classes rather than defining the styles.
When a question asks for styles, check your WYSIWYG package has not
defined classes.
This defines different background colours for the table and body of the page and
sets the table to have a 6-pixel-wide border around it and 3-pixel-wide gridlines
within the table.
Publish a website
Websites can be hosted on your own computer or uploaded to a hosting
company. Most people do not host their own websites because their internet
service does not provide them with enough bandwidth. All websites have a
domain name, such as www.hoddereducation.co.uk, which is used to find the
site. To upload a website, file transfer protocol (FTP) is used.
Test a website
Before testing a web page you should identify its purpose and its target audience.
When creating a test plan, make sure it includes both functional testing and user
testing.
Functional testing checks all page elements perform as expected, including
table structure, images, visibility of objects, and internal hyperlinks. This also
checks if the URL works and whether all external hyperlinks work as expected.
User testing checks the website meets the purpose and is appropriate for the
target audience. Users must not be IT professionals or people related to the
development project (they must have no knowledge or preconceived ideas about
the website). Observe, listen, but do not respond to the users.
Exam-style questions
1 Explain the three terms:
a http
b web browser
c ftp
[3 marks]
2 Explain the difference between ftp and http when dealing with files
and data.
[4 marks]
3 The following shows a cascading stylesheet created by a student. It
contains a number of errors. Identify each of these errors and
suggest a way to correct them.
[8 marks]
4 Describe the use of the content and presentation layers in a web
page.
[4 marks]
Answers to exam-style questions
Chapter 1
1
Description Computer
term
Uses infrared light and visible light so that an object night-vision
can still be seen even when it is apparently dark enhancement
(NVE)
5 a Uses plastic organic layers which are thinner and lighter than glass; can be
made into any required shape; brighter light than normal LEDs; don’t
require any back-lighting unlike LCD screens; uses less power than LCDs;
very large field of view (nearly 180°).
b Heavy and bulky; runs very hot and can be a fire risk; uses a lot of
electricity; screens can often flicker.
6 Laser printers: can handle large print runs (large buffers); very high quality of
output; toner cartridges last a long time; relatively cheap to buy; can be
expensive to run (especially colour laser printers); produce ozone and toner
particulates which are a potential health hazard.
Inkjet printers: high-quality output; relatively cheap to buy; small footprint;
small ink cartridges; small buffers; printing can ‘smudge’; ink tends to be
very expensive; rather noisy in operation.
Dot matrix printers: can withstand harsh environments better than laser or
inkjet; cheap to run and maintain; can use continuous, multi-part stationery;
very noisy in operation; poor print quality; relatively expensive to buy;
cartridges don’t last very long.
Chapter 3
1 a Data transfer rate is the rate/speed at which data is sent from a storage
device to a computer. Data access time is the time it takes to locate the data
on the storage device.
b DVD-R allows data to be recorded once on the optical media; once data is
finalised it acts like a DVD-ROM and can only be read. DVD-RW allows
several read/write operations to take place; it requires more expensive
equipment than DVD-R.
2 a back-up
b serial access
c key field
d direct access
e transaction file
3 Optical: uses plastic disks coated in light-sensitive material or coatings which
can be converted to pits; surface of disk is read by a blue or red laser; disk
spins and read/write head reads/writes the data as 0s and 1s; uses a single
spiral track to store data working from the centre outwards; devices can be R,
R/W or ROM.
Solid state: no moving parts; data retrieved at same rate no matter where it is
stored; relies on the control of the movement of electrons with NAND or
NOR chips; data stored as 0s and 1s in millions of tiny transistors within the
chip.
Chapter 4
1 a
Description Network
device
A device that takes a data packet received at one of its
input ports and sends the data packet to every computer hub
connected to the LAN.
A device that converts digital data to analogue data (and
vice versa) to allow the transmission of data across modem
existing telephone lines.
A device that connects a LAN to another LAN that uses
bridge
the same communication protocols.
A device that takes a data packet received at one of its
input ports and works out its destination address; the
switch
data packet is then sent to the correct computer on the
LAN only.
A device that enables data to be directed between
different networks, for example, join a LAN to a WAN;
router
the main function is to transmit internet and transmission
protocols between two networks.
A network point (node) that acts as an entrance to
gateway
another network.
Hardware which forms part of any device that needs to
connect to a network; it often contains the MAC address NIC
generated at the manufacturing stage.
ii
iii
sender’s IP address
time and date the data packet was sent ✓
identity number of the data packet
header to identify the data packet
3 a i heuristic checking
ii false positive
iii hologram
iv digital divide
v authentication
vi Data Protection Act
vii asymmetric
b Prevent illegal/undesirable material being posted on websites as people find
it too easy to find information that can have serious consequences; would
help prevent children being subjected to undesirable and dangerous
websites; stop incorrect/biased information being posted on
websites/wikis/blogs; material on the internet is already available
elsewhere; expensive to police internet – users would pick up the bill;
difficult to enforce rules and regulations globally; freedom of information
infringement at risk; laws already exist to deal with illegal material and
comments on blogs, and so on.
Chapter 5
1 a Advantages: higher productivity; more consistency; don’t take/need breaks;
don’t go on strike.
Disadvantages: expensive to set up/buy and maintain; can’t deal with
‘unusual’ circumstances; need re-programming for each new task.
b No need to stay at home to cook food or wash clothes/dishes; gives people
time for more leisure activities; can use smartphones to control devices
away from home; smart fridges and freezers can lead to a healthier
lifestyle; no need to do manual tasks at home.
2 a Part-time: staff work fewer than normal hours per week; either fewer hours
per day or per month.
Flexi-time: employee can start/finish work at different times to normal
workers; however, they must work the full hours per week.
Job sharing: full-time job is divided between two workers who work half of
the weekly hours per week; total time worked is the same as a normal
worker.
Compressed: employee works full hours for the week but works longer
hours than normal per day so completing their hours for the week in fewer
days.
b Happier workforce; more likely to remain with the company. Saves money
since less training and recruitment required. Possible to extend the hours
the company can operate for. Staff avoid rush hour traffic/commute,
meaning less stress. Possible for staff to have more time with family/time
to do hobbies.
c Built-in obsolescence; expensive to repair/need specialist staff to repair
devices; more complicated operation of device/often have too many
features not wanted; hacking issues can lead to problems with the devices.
Chapter 6
1 a Sound sensor and oxygen sensor send data to a data logger. Data is
converted to digital and stored. Data collected by personnel on a regular
basis or data automatically transmitted back to EA laboratories. Computer
in EA laboratory compares new data with old/stored data. Produces new
data, graphs, and so on, showing changes in environment over a given time
period and indicates any trends, out-of-range values, and so on. EA
scientists would use the data to suggest changes, and so on.
b i infrared sensor
ii Infrared sensor data allows microprocessor to calculate distance between
car and vehicle in front; also obtains speed of vehicle and automatically
calculates the safe distance between the two vehicles.
iii Sensors send data to microprocessor. Microprocessor uses data to
determine if car is at a safe distance. If distance < safe distance it sends a
signal to sound a warning buzzer and sends signals to actuators to operate
brakes automatically.
2
Application Suitable
sensor
control water content in the soil in a greenhouse moisture
3
LEFT 90 FORWARD 40
PENDOWN RIGHT 45
REPEAT 3 PENDOWN
FORWARD 40 FORWARD 30
RIGHT 90 RIGHT 90
ENDREPEAT FORWARD 30
LEFT 90 (PENUP)
PENUP
4 a Robot is programmed with the sequence of instructions. Each instruction
copies the action of a human being. Each instruction is tested on a
simulation program to ensure correct action. Program then tested on real
vehicle and undergoes further modifications if required.
Human operator manually carries out a sequence of instructions. The robot
arm is guided by the human operator. Each arm movement is stored as a
series of instructions. Once all instructions stored robot arm can do tasks in
correct sequence.
Human operator straps sensors to his arm. Actions are then carried out by
human operator. Each movement is stored as a set of instructions in
computer memory. Sensor sends back data about the arm movements,
which are stored in the computer memory.
b Engineers are consulted and key data is collected from them. A knowledge
base is designed and the engineer’s knowledge collected is used to populate
the knowledge base. Rules base is designed and created together with the
inference engine. An explanation system is also developed alongside this.
The input/output interface is designed. The system is fully tested using data
with known outcomes. The system is further modified if test results
unsatisfactory.
5 Barcodes on items are scanned by barcode readers at the checkout. If the
barcode on the item can’t be read by the scanner, the number under the
barcode is keyed in manually. The barcode is searched for on the stock
database until a match is found. If no match found, an error message is sent
back to the checkout desk. If a match is found, the item price and description
is sent back to the checkout. The stock level of the item is read, reduced by 1
and then rewritten back to the item’s record on the database. If the stock level
of the item <= pre-order level, a check is made to see if a flag has been set to
indicate an order has already been made. If no flag has been set, an order for
new items is made automatically. When new stock arrives, the stock level
database is updated accordingly.
6 a Advantages: driver doesn’t need to consult any maps; system can warn of
speeding; system can give an estimated time of arrival; it is possible to
program in the fastest route or a route avoiding road tolls, and so on;
system can give key information such nearest petrol station, and so on.
Disadvantages: if the map is out of date, the GPS can give incorrect
instructions; loss of satellite signal can give many problems; incorrect start
and end points can give problems.
b
B
back-ups 23–24, 95, 96
banking 39, 53–56
behaviour layers 142, 143
Bluetooth 28, 30
booking systems 52–53
C
calculations 128
cells 134, 135, 139, 140
charts and graphs 113–17
cloud security 81
cloud storage 88–89
colour depth 99, 101
columns 134, 135
communication 34–37, 44–45, 86–94
computer modelling 43, 50–51
computer systems 1–10
content layers 142, 143
control applications 11, 49–50
cookies 75, 77
copyright, software 83
corporate house style 106
CPU 1, 3
cropping 99, 100, 101
CSS 142, 143, 144, 149, 150
D
data
analysis 134–41
capture forms 67, 124, 127
entry forms 124, 127
handling applications 45
manipulation 124–30
models 134–35, 138–39
security 76–78
types 125
DDE 11, 14–17
design stage 67–68
development 70
DFD 66, 67
digital certificates 75, 79
document production 118–23
documentation 71
E
editing methods 103
EFT 43, 55, 56
EFTPOS 43, 60
emails 34–35, 87
embedded styles 143, 149, 150
emerging technologies 7–9
employment 39–40
encryption 75, 79
evaluation 72
expert systems 57, 58
extranet 86, 88
extreme data 66, 134, 138
F
fields 23, 124
files 23, 68, 124
management 95–98
firewalls 75, 78–79, 81
flat-file databases 124, 125
footers 103–4
foreign key fields 124, 125
formulae 134, 135–36, 140
ftp 91, 143
functions 134, 137
G
GIS 43, 62
GPS 43, 60, 61, 62
grammar check 110, 111
H
hardware, internal computer 3, 4
headers 103–4
HTML 142, 143, 144
http 86, 90
hyperlinks 143, 148–52
I
ICT
applications 43–65
effects of using 39–42
impact of solutions 83–84
images 97, 99–102, 146
implementation 70–71, 72
input devices 11–14
internet 31, 33–34, 88
terms 90–92, 93
intranets 86, 88
IP addresses 28, 30, 32
ISP 86, 91, 93
L
LAN 28, 29, 30
layout 103–5
library systems 60
live data 66, 70, 139
M
MAC addresses 28, 30, 32
magnetic storage media 23, 25
manufacturing 39, 52
measurement 11, 48–49
medicine, computers in 57–60
microprocessors 1, 3, 40–41
Microsoft Access 124, 125, 129
Microsoft Office 107, 108
Microsoft Word 104, 107, 108, 119
modems 28, 29
N
named cells 134, 135, 137
named ranges 134, 135, 137
nested functions 134, 137
netiquette 86, 87
networks 28–38
normal data 66, 70, 134, 138
O
operating systems 1, 3–4
optical storage media 23, 25–26
ordered lists 142, 147
orphans 118, 119
output devices 11, 18–20
P
page breaks 120
piracy, software 83, 84
pointing devices 11, 12
presentation layers 142, 143, 149, 150
presentations 131–33
primary key fields 124, 125
proofing 110–12
protocols 79, 90, 91
Q
queries 124, 127, 128
R
records 23, 124
reflection 99, 100, 101
relational databases 124, 125
relative references 134, 137
reports 124, 125, 129
rotation 99, 100, 101
rows 134, 135
S
safety and security 75–82
saving work 96
school management 45, 46
search engines 86, 92
security 33–34, 76–78
sensors 11, 13, 43, 48, 50, 51
software and hardware 1–5
solid state media 23, 26
spam 75, 76–77, 88
spell check 110
SSL 75, 79
stock control systems 60
storage devices and media 23–27
styles 106–9
systems life cycle 66–74
systems software 1, 2–3, 4
T
tables 121–22, 124, 152
tags 142, 144, 146, 147, 148
testing strategies 70
text wrap 99, 100
TLS 75, 79
tracking systems 61
types of computer 5–7
U
unordered lists 143, 147
URL 86, 91, 92
V
validation 66, 68
verification 66, 68
VoIP 28, 45
W
WAN 28, 29, 31
WAP 28, 30, 31
web browsers 90–91, 93
websites 44, 142–54
wi-fi 28, 30
widows 118, 119
WLAN 28, 31
working patterns 40