CIE IGCSE ICT Theory Notes 3rd Edition
CIE IGCSE ICT Theory Notes 3rd Edition
CIE IGCSE ICT Theory Notes 3rd Edition
IGCSE
ICT Aung Myat Hphone
SUMMARIZED NOTES ON THE THEORY SYLLABUS
3. Device drivers: A software that enables the
device to work with another, externally
1. ## 1.1. THEORY connected device.
4. Utilities: A system software that provides the
necessary facilities, (Antivirus, Scan Disk, Disk
Types and Components of Defragmentation etc.)
Software
WWW.ZNOTES.ORG
also present in many household gadgets and equipment
where some control or monitoring is required. Input devices are complex as
It consists of a control unit (CU) that manages the input Output devices are simpler as
they need to ensure proper
and output devices, an arithmetic and logic unit (ALU) that they only need to display the
communication between
performs computations and makes logical judgments, and finale.
computer and user.
tiny memory regions known as registers.
It processes the input and produces the outcome of the
processing in the form of output.
Backing/Secondary Storage
WWW.ZNOTES.ORG
is used to click on an icon to launch the application, 6. as they usually have wired connections, they have
this is simpler than typing in commands. This type of more stable internet access.
interface uses up considerably more computer Disadvantages:
memory than a CLI interface. The user is limited to the 1. not particularly portable because they are made
icons provided on the screen. Needs a more complex up of separate components.
operating system. 2. More complicated because all the components
N.B: Mainly used by end-users who don’t have great need to be hooked up by wiring, which also clutters
knowledge of how the computer works. up the desk space.
3. -: : use the human voice 3. Because they aren’t portable, files need to be
to give commands to a computer system. no need for copied to another portable storage device to take
a driver to take their hands off the steering wheel. In a work elsewhere.
home, it is especially useful for people with disabilities,
because many tasks can be carried out by the spoken
word only. Possible to use it as a security feature Mobile Computers:
because voice recognition could be used to identify a
person. Still unreliable, with many commands not 1. Laptop computer:
being recognized or needing to be repeated several
times (especially if there is background noise). Can be (Or notebook) refers to a type of computer where the
quite complex to setup. User needs to know which monitor, keyboard, pointing device and processor are all
commands can be used. together in one single unit. This makes them extremely
4. Gesture-based user interface: rely on human portable. lightweight (to aid portability). Low power
interaction by the moving of hands, head or even the consumption (and also long battery life). Low heat output
feet. Replaces mechanical input devices. No physical (cooling is very important).
contact required. Very natural interface for a human Uses:
operator. No training needed to interface with the 1. office and business work
computer. Possible for unintentional movement to be 2. educational use
picked up. Only works near to the camera or sensor 3. used as a gaming device.
(maximum of 1.5 meters). May only accept a limited 4. general entertainment
number of movements (for example, it may take Advantages:
several attempts to find out exactly what finger 1. Portability, all components are in a single unit so
movements are recognized). that they can be taken anywhere.
2. because of one single unit, there are no trailing
wires, and desk cluttering.
1.4. Types of Computers 3. take up much less room on a desk, so they can be
easily used in public spaces.
Desktop Computers 4. portability allows them to take full advantage of
Wi-Fi features.
Desktop usually refers to a general-purpose computer
Disadvantages:
that is made up of a separate monitor, keyboard, mouse,
1. portability makes it easier for them to be stolen.
and processor unit. It is distinguished from, for example, a
2. limited battery life means user needs to carry
laptop computer by the fact that it is made up of several
charger at all times.
separate components, which makes it not very portable.
3. keyboards and pointing devices may be awkward
Uses:
to use.
1. office and business work
4. not easy to upgrade, like adding more RAM.
2. educational use
3. general entertainment
2. Smartphones:
4. gaming device
Advantages: Allow normal phone calls to be made, but also have an
1. they are easier and less costly to upgrade and operating system (such as iOS, Android, or Windows)
expand. allowing them to run a number of computer applications
2. spare parts are standardized, which makes them (known as apps or applets). Smartphones communicate
cheaper. with the internet either by using Wi-Fi hot spots or by
3. they tend to have better specifications for a given using 3G/4G/5G mobile phone networks.
price. Uses:
4. no critical power consumption because they plug 1. They allow users to send/receive emails.
into a wall socket. 2. They allow users to use a number of apps.
5. due to fixed position, they are less likely to be 3. They allow users to use a camera feature (to take
damaged or stolen. photos or videos).
WWW.ZNOTES.ORG
4. They allow users to use a MP3/4 player (for music 3. typing on a touch screen can be slow and error
and videos). prone compared to a standard keyboard.
: 4. laptops tend to support more file formats than
1. very small in size and lightweight, makes them tablets.
portable.
2. connecting to the internet while on the move. 4. Phablets:
3. because they use Wi-Fi and mobile phone
networks, they can be used almost anywhere. Some of the latest smartphones have been designed as a
4. they have apps which can tell instant location, hybrid between a tablet and a smartphone; these are
which is a feature that isn’t available in either referred to as a phablet. They have much larger screens
desktops or laptops. than a smartphone but are smaller than a tablet.
5. they have reasonable battery life.
WWW.ZNOTES.ORG
application which carries out a task that requires some An input device can send data to another device, but it
degree of intelligence. – the use of language, – cannot receive data from another device.
recognizing a person’s face, – the ability to operate Input devices are necessary for a computer to receive
machinery, such as a car, airplane, train, and so on, – commands from its users and data to process; the
analyzing data to predict the outcome of a future event, devices are under the control of the user or can be direct
for example weather forecasting. Impact: Whenever AI is data entry.
mentioned, people usually think of science fiction
fantasies and think of robots. The science fiction writer Input devices can be complicated because they must ensure
Isaac Asimov even went as far as producing his three laws that the user can interact with the computer correctly.
of robotics: » Robots may not injure a human through
action or inaction. » Robots must obey order given by 1. Keyboards:
humans without question. » A robot must protect itself
U:
unless it conflicts with the two laws above. Everyday uses:
1. An autonomous (driverless) vehicle – we already Input of data into applications software
have driverless trains and autopilots on airplanes, Typing in commands to the computer
but future developments include driverless cars.
2. Robotic research is leading to improvements in
technology to help amputees and people with
disabilities. Fast entry of new text into a document.
3. Robots are used to help people carry out Well-known method.
dangerous or unpleasant tasks – for example, Easy to use for most people.
bomb disposal, Negative impacts of AI: Easier to do verification checks as data is entered (can
4. Unemployment, robots are capable of doing immediately compare the source document with typed
tedious human tasks with much more efficiency data on the screen).
and excellence than humans.
:
5. Dependency on technology could lead to problems
in the future. Can be difficult to use if the user has limited arm/wrist
6. De-skilling: tasks that used to be considered a use.
talent are now part of general, tedious processes Slow method when compared to direct data entry.
that are done on a regular process by machines. Fairly large device that uses up valuable desk space.
Extended reality: refers to real and virtual combined
environments. The two most common examples at the
moment are: » Augmented reality (AR) is a merger
between the virtual and physical (real) world, it lays
objects onto the pre-existing objects. e.g., Pokémon GO!
Impact: safety and rescue operations’ training, shopping
and retail (getting a better look at a car before the
purchase), healthcare (better understanding of a patient’s
body) » Virtual reality (VR) enables an entirely new
world to be created, unlike AR, this has no link to the 2. Numeric keypads:
actual surroundings of the user. It requires the user to
be specially equipped with a VR headset, joystick, and Uses:
headphones. Impact: Military applications, educational
purposes (looking at ancient buildings), healthcare, media Automatic teller machines (ATMs), where the customer
(interactive special effects in a movie), scientific can key in their PIN, amount of money, etc.
visualization (part of molecular structures/cells). Mobile phones to allow phone numbers, etc. to be keyed
in.
Point of sale terminals (POS) in case the barcode reader
2. ## 2.1. THEORY fails to read the barcode – the number has to be keyed in
manually by the operator.
Input & Output Devices Chip and PIN devices when paying by credit/debit cards.
Fast entry of numeric data into a spreadsheet.
:
Input Devices & their Uses
Faster than standard keyboards when entering numeric
An input device is any hardware device that allows a user data.
to enter data or instructions into a computer directly.
WWW.ZNOTES.ORG
Because many are small devices, they are very easy to
carry around.
faster than a keyboard for choosing options.
: used to navigate applications and the internet.
Because the touchpad is integrated into the laptop
Sometimes have small keys which can make input more computer, there is no need for a separate mouse, this
difficult. aids the portability and is a big advantage if there are no
Sometimes the order of the numbers on the keypad is not flat surfaces available.
:
touchpad.
Faster method for choosing an option rather than using a 5. Tracker ball:
keyboard.
Very quick way of navigating through applications and the :
internet.
Does not need a large desk area when compared to a good alternative to a mouse for people with conditions
such as RSI.
keyboard.
Used in an industrial control room environment.
: Used in some luxury cars to select functions such as
radio.
Can be more difficult for people with restricted hand/wrist
movement than using a keyboard for data entry. :
Easy to damage, and the older type of mouse quickly
Does not need the same fine control as a mouse.
becomes clogged up with dirt.
Easier to use than a mouse if the operator has problems
Difficult to use if no flat surface readily available.
with their wrist.
More accurate positioning of the pointer on screen.
They are more robust than a mouse.
Needs less desk space than a mouse or keyboard.
WWW.ZNOTES.ORG
:
Uses:
7. Joysticks:
9. Touch screen (as an input device):
WWW.ZNOTES.ORG
Fairly slow input method, especially if color mode is
:
selected.
Faster entry of options than using keyboard or mouse.
Very easy method for choosing options. 11. Digital Cameras:
User-friendly method – no training necessary in its use.
Option to expand the size of the display if necessary.
Taking photographs, still better than smartphones and
tablets.
Limited number of input options available. Data-capture device, e.g., as a reversing aid in cars.
Can lead to problems if an operator has to use the system Dentistry, to help capturing pictures for better diagnosis.
frequently (straining of arm muscles, RSI, etc. are all The creation of virtual reality tours around houses,
possible). buildings etc.
The screen can get very dirty with constant touching.
WWW.ZNOTES.ORG
: Drawing on screens
13. Sensors:
Uses:
2.2. Direct Data Entry & Associated
Temperature sensors are used in automatic Devices
washing machines, central heating systems, ovens,
automatic glasshouses.
1. Magnetic Stripe Readers:
Pressure sensors are used in intruder alarm
systems, washing machines. Uses:
Light sensors are used in automatic glasshouses,
automatic doors, street lighting control. On credit/debit card for use at ATMs
Sound/acoustic sensors are used in intruder alarm Security device to allow entry to buildings, hotels, etc.
systems, monitoring liquid and powder flow in pipes.
Humidity/moisture sensors are used in automatic :
glasshouses, environmental monitoring, in factories
Faster than keying in data manually.
where moisture levels are crucial.
Error-free, no human intervention needed.
pH sensors are used in automatic glasshouses, chemical
Secure, information isn’t in human-readable form.
processes and environmental monitoring.
Robust, there are no moving parts.
:
:
Readings are more accurate as compared to human
If the card is damaged, the data is lost.
operators.
Doesn’t work at a distance.
Readers are continuous, no breaks in the monitoring.
As the information isn’t human readable, this can be a
Because it is a continuous process, any action or warnings
disadvantage in some cases.
needed will be initiated immediately.
Automatic systems don’t need human intervention.
WWW.ZNOTES.ORG
Where payments are made using cards Very fast way of inputting survey results.
More accurate because there is no human intervention.
: More accurate than OCR methods.
Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal. 6. Barcode readers:
RFID is more expensive than a comparable barcode
system.
WWW.ZNOTES.ORG
They are a tried and trusted technology. QR codes can be used to transmit malicious data.
stripes.
Uses:
WWW.ZNOTES.ORG
2. Liquid Crystal Display (LCD) screens:
Uses:
: 4. Multimedia projectors:
Color and contrast from different angles are inconsistent. Uses:
Motion blur is a common issue.
Lower contrast than CRT monitors. Training presentations to allow whole audience to see
images.
Advertising presentations.
Home cinema systems.
Uses:
ATMs
POS terminals
Information kiosks.
:
5. Laser printers:
Don’t need additional input devices.
:
They are very interactive, many functions such as swiping
can be done. In uses where low noise is required.
They add a high-tech feel to devices and interfaces. If fast, high quality, high-volume printing is required.
: :
They tend to get dirty with frequent use. Printing is fast.
Frequent use results in straining of arm muscles, RSI, etc. They can handle very large print jobs.
If large amounts of data are being input/output, they Quality is consistently high.
aren’t very accurate, and the interface isn’t very fast. Toner cartridges last for a long time.
WWW.ZNOTES.ORG
They are only considerably fast if several copies are being :
made.
Color laser printers are expensive to run. Can be used in varying environments unlike laser/inkjet
They produce ozone and volatile organic compounds printers.
because of their printing method and toner. Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
Good for continuous printing.
Very noisy
Initial cost is more than an inkjet printer.
Very slow, poor-quality printing.
6. Inkjet printers:
WWW.ZNOTES.ORG
: They take up a lot of desk space.
Ad :
Di:
WWW.ZNOTES.ORG
This involves starting from the beginning of the file and Used in file servers for computer networks.
accessing each record to get to the file required.
It is a very slow form of data access. :
Used where speed isn’t vital.
They have a very fast data transfer rate and fast access
Examples where serial access is used:
times to data.
utility billing
They have a very large memory capacities.
clearing of bank cheques
producing pay slips
Uses:
Magnetic Backing Storage
Can be used as backup systems to prevent data loss.
Media Can be used to transfer data/files/software between
computers.
Holds data magnetically.
:
Surface area of the media are magnetized so that they
can hold bits of data. Data access time and data transfer rate are very fast.
The device that reads media can also read the bits held Have a very large memory capacity.
on the surface area Can be used as a method of transferring information
between computers.
3.3. Magnetic tape drives
:
Uses:
They can be easily damaged if user accidently drops it or
used in application where batch processing is used. doesn’t correctly shut down the drive after use.
used as a backup media where vast amounts of data Data transfer rate is not as fast as for fixed hard disk
needs to be stored. drives.
used in long-term archiving of data, they have huge data
storage capacities and are known to be very stable.
Optical Backing Storage
:
Media
They are generally less expensive than hard disk drives.
It is a very robust technology.
Holds data by burning ‘dots’ onto the surface with a high
They have a huge data storage capacity.
powered laser.
The data transfer rate is fast.
The data that reads the media can read the data by
: shining a lower powered laser over the dots.
Very slow data access times (uses serial access). 3.4. CD-R/DVD-R
When updating, another tape is needed to store the final
updated version. Uses:
They are affected by magnetic fields, a strong field can
Home recordings of music and (CD-R) and films (CD-R).
corrupt data stored on the tape.
Used to store data to be kept for later use to be
transferred to another computer.
Fixed Hard Disks/Drives
:
Uses:
Cheaper medium than RW disks.
To store the OS, systems software and working data/files.
Once burned (and finalized) they behave like a ROM.
Storing applications files.
Used in real-time systems and in online systems. :
WWW.ZNOTES.ORG
Can only be recorded once; if an error occurs then the much smaller so they store five times more data than
disk has to be thrown away. DVDs.
Not all CD/DVD players can read CD-R/DVD-R. 2. Blu-ray disks automatically come with a secure
encryption system which helps to prevent piracy and
CD-RW/DVD-RW copyright infringement.
3. The data transfer rate for a DVD is 10 Mbps and for a
: Blu-ray disc it is 36 Mbps.
CD-ROM/DVD-ROM :
WWW.ZNOTES.ORG
More expensive than magnetic hard disks. Users will often be required to purchase a card reader or
Smaller storage capacity than magnetic hard disks. USB converter to view the data.
: Routers
Very compact and portable media. A device that enables data to be sent between different types
Very robust. of networks. Used to connect a LAN to the internet, can be
Does not need additional software to work on most connected through cables or wirelessly.
computers. It can be used for:
They are not affected by magnetic fields.
connecting networks and devices to the internet,
: storing computer addresses,
routing data packets.
Cannot write protect the data/files by making it ‘read-only’.
Easy to lose (due to the small physical size). When a data packet is received, the router checks if the
The user needs to be very careful when removing a packet is intended for it or another network. If it’s meant for
memory stick from a computer - incorrect removal will its own network, then the data packet is routed to the local
corrupt the data on the memory stick and make it useless. switch/hub. If not, the data packet is sent to the relevant
router, which send it to the relevant device.
Flash Memory cards
They consult routing tables to know where to send the
Different types of memory cards: data.
» SD cards (secure digital card)
» XD cards (extreme digital card)
» CFast card (compactfast card). Common Network Devices
Uses:
1. Network Interface Cards (NIC): needed to allow a
Storing photos on digital cameras.
device to connect to a network. Turns binary data into
Used as mobile phone memory cards.
electrical signal that allows network access. Usually
Used in MP3 players to store music files.
integrated into the motherboard.
Used as a backing store in hand-held computer devices.
Each NIC is given a unique hardwired media access
:
control (MAC) address.
Very compact. Media access control (MAC) address: a number which
Because of no moving parts, they are very durable. uniquely identifies a device when connected to a network.
They can hold large amounts of data. First 6 hex digits identify the manufacturer’s code and the
Compact cameras and smartphones are able to read and next 6 identify the device’s serial number.
write memory cards allow the user to transport large
2. Hubs: they are hardware devices that can have a
collections of photographs, songs etc.
number of other devices connected to them. They are
: used to connect devices together to form a local area
network (LAN). It takes a data packet received by one
Expensive per gigabyte of memory when compared to of its ports and sends it all relevant or irrelevant
HDDs. device connected to it.
Have a lower storage capacity than hard disks.
Have a finite life regarding number of times they can be Not very secure, broadcast data to all devices.
read from or written to. Unnecessary network traffic.
Memory cards, specifically the micro SD card, are the
3. Switches: intelligent hubs. Used to connect devices to
smallest storage devices available; this means they are
form a LAN. Unlike hubs, the switches store MAC
more likely to be lost, stolen or damaged.
WWW.ZNOTES.ORG
addresses of all devices on a lookup table. So, it only Bluetooth uses key matching encryption however, Wi-Fi
sends data to relevant device. uses WPA (Wi-Fi protected access), and WEP (wireless
In summary: equivalent privacy).
WWW.ZNOTES.ORG
The world wide web is the vast collection of web pages They all use client server architecture
that can be accessed using a web browser They all use security measures such as
The world wide web allows you to access information by authentication and encryption
using the internet They all promote and facilitate information and
resource sharing
: Differences between the internet, intranet and extranet
are as follows:
It is an open network meaning everyone has access to the
The internet is a global network whereas an
same resources and information as everybody else.
intranet/extranet is a private network contained within
People from all over the world can communicate with
an organization
each other in real-time.
The use of the internet covers a wide range of
Available to anyone who has a suitable device and access
purposes whereas an intranet/extranet is designed for
to any one of the interconnected networks.
specific users and purposes
: Much of the information is publicly available whereas
an intranet/extranet is not
Education and training The internet is not owned solely by one person or
Social Networking organization whereas intranets/extranets are owned
Online shopping usually by the organization.
Entertainment
WWW.ZNOTES.ORG
Advantages: (the user doesn’t have to take any action, unlike
phishing).
Allows users to connect anywhere that is in the range of a Viruses: Program code that replicates (copies itself)
Wireless Access Point (WAP). with the intention of deleting or corrupting files and
Can be used in a variety of environments both indoors causing the computer to malfunction
and out making them highly flexible.
As the requirements change, additional WAPs can be
added relatively easily.
Passwords
Printer’s access can be given to wireless devices.
WWW.ZNOTES.ORG
computer. To access this website, users must first Much easier to access important documents or bring in
authenticate themselves using electronic tokens. With ‘experts’ at key parts of the conference.
their smartphone, the user has already set up the Possible to hold conferences at short notice.
electronic token app. The user launches the app on Reduced travelling costs.
their smartphone when the website asks them to No need to pay for hotel accommodation or venue hire.
verify their identity. The program creates an OTP that Reduces the cost of taking people away from their work
is only good for a short period of time. for two or three days to travel.
Better to use video conferencing than have delegates
travel to potentially unsafe places around the world.
Anti-malware software :
An anti-malware software is designed to protect devices Potential time lag in responses/delays when talking.
against viruses and malicious software. It has 3 mains Images can jerk.
purposes, detect, prevent and remove malicious software. It Very expensive to set up in the first place.
is installed onto a computer system and will operate in the Problems if the delegates live in different countries where
background. the time zone differences are large.
Common features of Anti-Malware software include the Requires IT knowledge to some extent.
following: Not the best for people who consider travelling a job-perk.
Comparing the scanned files against a large database Completely reliant on stable internet connections.
of knowing
Real-time scanning 2. Audio Conferencing: Meetings held using audio
Regular updates to gather an up to date list of known (sound) technology are referred to as audio
threats conferencing. The normal telephone network can be
Quarantine of infected files used for audio conferencing, which is frequently
Quarantining files allows threats to be automatically referred to as a phone conference.
deleted.
Allows the user to determine if the file is a legitimate The hardware required is:
threat and not a false positive.
a computer (with built-in microphones and speakers)
Heuristic Checking: Instead of relying solely on a database of external microphone and/or speakers
known viruses, this method looks for behavioral patterns and an internet phone
other features in a file to identify possible risks there. a standard phone.
:
Electronic Conferencing Allows participants to join meetings from any location.
Eliminates the need for travel expenses, such as
1. Video Conferencing: It is a form of audio and video
transportation, accommodation, and meals.
communication. It serves as a stand-in for face-to-face
saves time by eliminating travel time and allowing
meetings between a number of persons who may
meetings to be scheduled and conducted quickly.
reside abroad or in another region of the country. It
utilizes a network in some way and is done in real :
time.
Lacks the visual aspect of face-to-face meetings, which
The basic hardware includes: can hinder communication.
Can limit interaction and engagement compared to in-
webcams,
person or video conferencing.
large monitors/television screens,
Heavily relies on technology, and technical issues such as
microphones,
poor audio quality, background noise, or connectivity
speakers.
problems are common.
The software used are:
3. Web Conferencing:
webcam and microphone software drivers Web conferencing, often known as webinars or
CODEC (coder and de-coder) webcasts, makes use of the internet to enable
Echo cancellation software conference calls. This system makes use of numerous
computers that are interconnected over the internet. It
: operates in real time, just like video conferencing, and
enables the following meeting types:
» business meetings to discuss new ideas
» presentations
WWW.ZNOTES.ORG
» online education or training.
:
save energy due to being efficient, as well as turning off
Allows participants to see each other through video, after inactivity
providing a more immersive and engaging experience can be easier 'programming' these devices to perform
compared to audio conferencing. tasks rather than turning knobs and pressing buttons
Often offer screen sharing capabilities, enabling manually
participants to share presentations, documents, or other
visual content in real-time.
Often provide features like chat, polling, hand raising, and
Q&A sessions, fostering interactivity and engagement lead to more wasteful devices
among participants. can be more complex to operate for technophobes
leaving devices on standby is wasteful
:
no need to do manual tasks at home people do not meet face-to-face as much (social isolation)
more time for leisure activities a lack of social interaction may make people more
no need to stay home while chores are being done anxious of meeting people in real life
when communicating online, people can act less polite or
web-enabled devices allow devices to be switched on or
off while the owner is out more harshly, and cybercrime is a serious issue,
automated burglar alarms give a higher sense of security especially for teenagers.
and well-being
smart fridges and freezers prevent food waste by keeping Monitoring and controlling transport
track of products’ expiry, availability, etc.
:
WWW.ZNOTES.ORG
more efficient possible to increase the frequency of trains as the
traffic offences can be remotely penalized using ANPR possibility of delays is removed
car thefts can be spotted using ANPR easier to update changes in train schedules
minimizes human errors, reducing the rate of accidents
:
:
fear of the system being hacked into
If a hacker breaches security, the vehicle could be initial instalment costs are very high
controlled by them. ensuring passenger behaviour is vital, especially during
The system might come to a halt if it malfunctions. rush hours.
Systems with a poor design could compromise safety. human reluctance to new technology
The easy tracking of harmless people's movements is without drivers, CCTV monitoring will be continuously
made possible by ANPR equipment. Who can access such required
data?
WWW.ZNOTES.ORG
Cause: inhalation of ozone released by laser printers in an Advantages
office. Use of sound and animation/video effects
Minimizing health risk: proper ventilation, laser printers Interactive/hyperlinks built into presentations
should be housed in a separate room, replace laser printers More likely to hold the audience’s attention
with inkjet printers, if possible. Disadvantages
Need for special equipment – expensive
May require internet access
6. ## 6.1. THEORY Distracts the audience from the sole content of the
presentation
Very easy to make a presentation with too many
ICT Applications features
WWW.ZNOTES.ORG
or software individuals in making informed decisions and optimizing their
financial goals.
2. Bridge and building design: Computer modelling is
Mobile communication crucial in bridge and building design as it allows engineers
to simulate and analyze structural behavior
Mobile devices support many forms of communication, such assess load capacities, and predict the response to external
as: forces. It aids in optimizing designs, ensuring structural
1. Short message service (SMS) messaging: permits integrity, and minimizing potential risks before construction
extremely quick communication with another person via begins.
typing on a keyboard (a mobile phone or tablet's keyboard is 3. Flood water management: Computer modelling plays a
frequently virtual). Its benefit is that the recipient can get the vital role in flood water management by simulating water flow
text whenever they choose without having to be available. behaviour, predicting flood extents, and assessing potential
2. Phone calls: Making calls while on the go is among the flood risks. It helps design and optimise flood mitigation
most fundamental applications of a mobile phone. Mobile measures, such as levees and floodplain zoning, allowing
phones are the perfect method to stay in correspondence authorities to make informed decisions, develop effective
anywhere there is a network signal because they are so emergency response plans, and minimize the impact of
compact and have an independent battery. flooding on communities.
3. Voice over Internet Protocol (VoIP): a technique for 4. Traffic management: Computer modelling is employed in
communicating with Internet users. VoIP transforms sound traffic management to simulate and analyze traffic flow,
captured by the built-in mic of the cell phone into individual predict congestion patterns, and optimize traffic control
data packets that may be transmitted via the internet to their strategies. It aids in designing efficient road networks,
intended recipient. optimizing signal timings, and evaluating the impact of
4. Video calls: enables real-time video conversing between transportation infrastructure projects. This enables
multiple participants with a camera-enabled device. Uses an authorities to make informed decisions, alleviate congestion,
internet connection or cellular data. Software that may be and improve overall traffic efficiency for better urban
used for video calling includes; FaceTime, Skype, and Zoom. mobility.
5. Accessing the Internet: Another useful feature is the 5. Weather forecasting: Computer modelling plays a
ability to access the net from a mobile device. Any mobile pivotal role in weather forecasting by simulating the Earth's
device that has a wireless broadband connection or a mobile atmosphere, oceanic conditions, and other environmental
phone network can link to the internet. factors. These models use complex algorithms to predict
weather patterns, including temperature, precipitation, wind
speed, and storm systems. By assimilating real-time data,
6.2. Computer Modelling
computer models provide forecasts that aid meteorologists in
predicting weather conditions, issuing warnings, and helping
society prepare for potential hazards.
using models is less expensive than having to build the
Advantages of using computer modelling rather than
real thing
humans:
safer to use a computer model
can provide more precise and accurate results than
allows you to try out various different scenarios in
human-based methods, minimizing errors and
advance
increasing reliability.
nearly impossible to try out some tasks in advance in real
can analyze large amounts of data and perform
life due to high risk
complex calculations faster than humans
faster to use a computer model than to do the real thing
can be reused and updated easily, reducing the need
for repetitive manual analysis and potentially lowering
costs in the long run.
a model can’t be completely reliant as the output is Disadvantages of using computer modelling rather than
entirely based on the input humans:
frequently, computer modelling can be a very costly may overlook nuanced factors or intangible elements
option that humans can consider, leading to potential gaps or
human reluctance is a common problem in this inaccuracies in the analysis.
technology based on assumptions and simplifications, introducing
a level of uncertainty.
Some of the applications of computer modelling include:
their programmed algorithms and data inputs bind
1. Personal finance: Computer modelling in personal
models. They may struggle to adapt to unforeseen
finance involves using mathematical algorithms and data
circumstances or rapidly changing conditions that
analysis to simulate various financial scenarios, such as
humans can more readily navigate and respond to.
investment strategies, retirement planning, and risk
assessment, aiding
WWW.ZNOTES.ORG
Robotics in manufacture: involves the use of automated
6.4. School Management Systems
machines to perform tasks such as assembly, welding,
and packaging. These robots are designed to mimic
Computer-controlled school management systems are
human actions with precision and speed, increasing
comprehensive software applications that automate
productivity and quality control. They offer benefits like
administrative tasks, such as attendance tracking, grading,
enhanced worker safety, improved efficiency, and the
scheduling, and student information management, improving
ability to handle repetitive tasks, revolutionizing the
efficiency, accuracy, and organization in educational
manufacturing industry.
institutions.
Advantages:
can work in environments that may be harmful to Advantages:
humans Absenteeism can be addressed more easily.
can work non-stop Parents are kept updated.
low running costs, majorly due to reduced employees Reduced workload for teachers.
thus less wages need to be given Disadvantages:
have higher productivity Operating the software will need training.
provide greater consistency The initial cost of the software is very high.
can do long, boring, tedious tasks Unauthorized access will have to be prevented as
can carry out different task by fitting them with there is lots of personal information
different-end effectors Learner registration and attendance
Disadvantages: ID cards with magnetic tapes: The students will have
robots find it difficult to do unusual tasks to swipe their ID cards, which contain the student’s
can cause higher unemployment name, school’s name, date of birth and the
robots do many of the tasks once done by humans, registration ID, when they enter and leave the school,
leading to deskilling this way time is saved and the attendance is more
robots are independent of the skills base, factory accurate.
headquarters can be moved internationally Biometrics: Every student’s fingerprint is stored on a
initial set-up and maintenance of robots can be database along with their personal information, the
expensive students must put their finger on a fingerprint scanner
Production line control: Computer-controlled systems in to enter or leave the school premises.
production line control involve the use of computers and Advantages of biometric over magnetic ID cards
software to monitor, coordinate, and optimize Unique fingerprints disable attendance forgery
manufacturing processes. These systems ensure efficient Portability makes them easy to lose
coordination of machinery, manage inventory, track Easy to be stolen due to small size
production metrics, and automate tasks. They enable ID cards can be easily cloned
real-time data analysis, error detection, and adjustment, Disadvantages of biometric over magnetic ID cards
leading to improved productivity, reduced downtime, and Time-consuming for all fingerprints to be individually
enhanced overall operational efficiency in the production collected
line. Expensive equipment is required to read fingerprints
Autonomous vehicles: Self-driving cars and drones If finger is cut/damaged, fingerprint won’t be readable
guided by computer algorithms. and access would be denied.
enhance safety There is an invasion of privacy in storing fingerprints
reduce traffic congestion on a school database.
increase fuel efficiency Learner’s performance
Advantages of using computer-controlled systems Spreadsheets can be used to record students’
rather than humans: performances. It is easier to compare each other’s
increased efficiency and productivity performances and an individual student’s
greater consistency performance over the academic year.
ability to work in any environment Computer-aided learning
reduced human error The use of computer-based technologies to help
can work with large or delicate items students acquire academic material is known as
Disadvantages of using computer controlled computer-aided learning (CAL). They are meant to
systems rather than humans: supplement classroom instruction, not serve its
very high installment costs purpose. Students will take online assessments to
very high maintenance costs track their progress while learning on computers.
dependency on reliable Although, CAL is not consistently able to assist a
lack of flexibility student with an issue; in certain circumstances,
requires costly backup systems students would need to get other aid.
WWW.ZNOTES.ORG
6.5. Online Booking Systems
These are web-based platforms and applications that allow PIN is checked to see if it is
users to reserve and purchase tickets or services for various correct
events and industries. Some of the applications of online Card is checked to see if it is
bookings include: PIN is entered using the valid
1. Travel industry: Booking flights, hotels, and holiday keypad If card is stolen or number of
packages, provides a convenient platform for travelers to PIN attempts allowed is
plan and book their trip. exceeded, transaction is
2. Concerts: Reserving tickets for live music events, allows closed.
music fans to secure their spot at popular concerts. A number of options are
3. Cinemas: Booking movie tickets in advance, enables given: change PIN, pay in
cinema-goers to reserve seats and avoid queues. cheques, pay a bill, see
4. Sporting events: Purchasing tickets for sports matches and balance, get money
competitions, offers sports enthusiasts an easy way to attend
The customer selects the
their favorite events.
cash option & several cash
Advantages: options are shown
convenience and accessibility The customer’s account is
instant confirmation and ticketing accessed to see if they have
ability to compare prices and options sufficient funds, it is checked to
promotions and personalized offers see if they are withdrawing
The customer accepts one of
faster to change/update more than their daily limit.
the options or types in a
automated reminders via email/text If limit not exceeded and all
different amount
repeated bookings can be easily made other checks are OK, then the
cost-saving as there are fewer wages due to reduced transaction is authorized, the
staff requirements cash is then counted out by the
Disadvantages: machine
potential for technical issues The customer is asked if they
possible security and privacy concerns want a receipt
transaction and booking fees The card is returned
impersonal customer service
Money is dispensed Customer’s account is updated
dependent on a stable internet connection
can lead to unemployment
possible to withdraw any time of the day
offer many banking services without having to go to
6.6. Banking Applications the bank
possible to access an account from anywhere in the
In order to avoid double scheduling, which might occur if
world
the system reaction time was slow, online banking
usually provides quicker service than waiting in a
systems depend on the capacity to update files instantly.
queue in a bank
The use of computer technology has revolutionized how
Disadvantages:
we do our banking transactions, for example:
often in places where theft can take place at night
Internet banking
potential for shoulder surfing
The use of automated teller machines (ATMs)
some banks charge customers for using ATMs
Chip and PIN technology
cash withdrawal limits are often imposed on people
Automated teller machines (ATMs)
Electronic Funds Transfer (EFT):
Automated teller machines (ATMs) are places where
It is possible to send money transfer instructions directly to a
customers can get cash (or carry out certain other banking
bank's computer system via the electronic funds transfer
activities such as order a statement) using their credit or
(EFT) technology. The entire system depends upon electronic
debit card.
transfers of money between accounts; no actual cash is
moved. The computer system automatically moves the
requested amount from an account to another when it
Customer puts card into Contact is made with bank’s receives an EFT command.
ATM computer
WWW.ZNOTES.ORG
very secure payment method slow method of payment
very quick payment method easier for fraudsters than other methods
less expensive than cheques relatively expensive payment method
customer has right to dispute an EFT payment for up
to 60 days Internet Banking
Disadvantages:
the bank transaction can’t be reversed without full Enable online access to banking services via a secure website
dispute investigations or app, allows for transfers, bill payments, account
customer needs to have funds available immediately management and more.
cannot guarantee the recipient’s identity
:
convenience and availability
Credit/debit card transactions
easy account management
Several credit/debit cards come with both a magnetic stripe branch visiting won’t be a requirement
plus a chip; the chip houses important data like the PIN. interest rates may be better
Because it is superior to depending solely on a signature, this easier to shop around for the best account
technique is intended to increase security. Having a chip and Disadvantages:
PIN card to make purchases is an example of an electronic security of transactions
funds transfer (EFT). requires a reliable internet connection
More risk of fraud
Advantages of credit cards: Easier to make errors
customer protection if ordered goods don’t arrive Physical cash can't be deposited/withdrawn
internationally accepted payment method
interest-free loan if money paid back within the 6.7. Computers in Medicine
agreed time period
can make purchases online
Information systems in medicine
Disadvantages of credit cards:
can be charged high-interest rates Patient records: Healthcare professionals maintain
annual fees often apply databases so that information can be communicated
easy to end up with credit damage between them and pharmacists (for instance, to
security risks in online transactions guarantee no medications are administered that interact
Advantages of debit cards: dangerously with one another).
money comes from the user’s current account, there Pharmacy records: Pharmacy records maintain a
is no interest comprehensive record of prescriptions filled for patients.
safer than carrying cash This includes details like the prescribed medication,
can make online purchases dosage, quantity dispensed, prescribing physician's
Disadvantages of debit cards: information, and the date of dispensing. These records
less customer protection if goods don’t arrive help track medication usage and can be used to verify
no credit allowed; funds are needed on the time of prescription accuracy and detect potential drug
purchase interactions or allergies.
security risks in online transactions
Cheques 3D Printers
WWW.ZNOTES.ORG
throughout the body to support tissue repair and
regeneration.
Customized medicines: these are personalized drug It is a repository of facts
formulations tailored to individual patients' specific stores all the knowledge about an area of expertise
a collection of objects and their attributes
needs. They utilize advanced technology and precise
measurements to create medications with accurate 5
dosages and unique compositions, optimizing
treatment outcomes. The rules base is a set of inference rules.
Used by the inference engine to draw conclusions
6.8. Expert Systems They follow logical thinking
It is an AI-based computer program that emulates the How an expert system is used to produce possible
decision-making capabilities of human experts. It uses solutions
knowledge and rules to provide accurate advice or solutions
in a specific domain. Given below is an example of how an expert system works to
Examples include: diagnose a medical issue:
This is the only thing that the end user sees Some features include:
Allows the user to interact with the system update stock files immediately
Often requires training to operate effectively track inventory levels in real-time
prevent stock discrepancies and ensure accurate
records
Informs the user of the reasoning behind the expert monitor inventory levels and reorder when stock is
system’s conclusions lower than a predefined value
Will supply a conclusion and any suggested actions to take streamline supply chain management and minimize
It will also give the percentage probability of the accuracy stockouts
of its conclusions
Electronic funds transfer at Point of sale (EFTPOS)
terminals: Devices used for processing electronic payments,
they allow customers to make payments using debit or credit
The main processing element of the system cards by securely transferring funds from their bank accounts.
Acts like a search engine examining the knowledge base EFTPOS terminals authenticate and authorize transactions in
Responsible for gathering information real time, providing convenience and security for both
This is the problem solving part of the system customers and businesses during retail purchases.
Attempts to use information gathered from the user to The process of checking credit and debit cards at a
find a matching object supermarket EFTPOS is much the same as was described for
WWW.ZNOTES.ORG
paying a restaurant bill in Section 6.6.
6.10. Recognition Systems
Some functions of EFTPOS include:
WWW.ZNOTES.ORG
A lack of manned security car park surveillance could
lead to vandalism.
There could be an invasion of privacy issues due to the Enables short-range wireless communication between
recording of drivers’ number plates. devices.
Damaged or very dirty number plates will not be Allows payment using a smartphone.
recognized. Advantages:
ANPR system only recognizes the number plate and Convenient and secure method of payment
not the car, so it is possible for a car to be fitted with a allows for contactless transactions
cloned number plate thus bypassing car park security, Disadvantages:
for example. Limited range
compatibility issues with some devices
WWW.ZNOTES.ORG
Better focus as there isn’t a need to constantly check They have very high bandwidth.
paper maps. It is relatively easy to expand the network.
Reduces fines by warning drivers about upcoming speed Security in satellite transmission is very good due to the
changes. fact that data is coded and the receiver requires decoding
The system shows an Estimated Time of Arrival (ETA). equipment.
Possible to program in the fastest route, a route to avoid During emergency situations, it is relatively easy to move
towns. stations on the ground from one place to another.
The system can also give useful information such as the They are well-suited for broadcasting.
location of petrol stations. Enable mobile communication in very remote locations.
If the maps are not kept up to date, they can give incorrect There is a time delay in receipt of the signals.
instructions. The signals received can be affected by bad weather.
Road closures due to accidents or roadworks can cause Sunspot activity can affect the performance of a satellite.
problems. they need to be monitored and controlled on a regular
The loss of satellite signals can cause problems. basis to ensure they remain in the correct orbit.
If an incorrect start-point or end-point is keyed in the
system will give incorrect information.
7. The systems life cycle
Geographic Information Systems (GIS)
Stages of Analysis:
Used to capture, manage, analyze, and display
geographically referenced information. 1. Analysis
Use to determine the distance between two places. 2. Design
Used to find the nearest petrol station or restaurant, etc. 3. Development & Testing
To protect animal and plant life in certain vulnerable 4. Implementation
places. 5. Documentation
Can be used in geography, science, or engineering 6. Evaluation
lessons.
7.1. Analysis of the current system
Allows geographical and thematic data of any kind to be The current system is studied using four different
methodologies. These are the four techniques:
combined in a way that shows how they are connected to
each other. Observation:
It allows the handling and exploration of huge amounts of involves watching users interact with the system to
data. figure out its workings
It allows data to be integrated from a wide range of very it is used for understanding how users interact with
different sources.
the current system
Advantages: provides first-hand, unbiased information
Disadvantages: can be time-consuming, may not
The learning curve on GIS software can be very long. reveal all issues
GIS software is very expensive. Interviews:
GIS requires enormous amounts of data to be input. direct one-to-one conversations with users on their
It is difficult to make GIS programs that are both fast and experience with the current system
user-friendly. used to gather comprehensive information about
individual users
Media Communication Systems Advantages: allows for in-depth exploration of issues
Disadvantages: relatively expensive, time-consuming,
Using satellite signals for communication. no user-anonymity which may affect the response
Used by media companies when sending Questionnaires:
stories/videos/pictures from remote locations. set of predetermined questions is given to the users to
complete and give their opinion on the current system
: it is majorly used in collecting data from a larger
They have good global coverage. group of people
They are cheaper, faster, and safer than laying cables in Advantages: allows for quantitative analysis, efficient
difficult or treacherous terrain. data collection, questions can be answered quickly
WWW.ZNOTES.ORG
Disadvantages: limited by predetermined questions, 3D printers,
may suffer from low response rates, users may monitors,
exaggerate answers due to anonymity speakers.
Examination of existing documents: Identifying suitable software needed for the new system
reviewing system documentation, user guides, or considering functionality, compatibility, and ease of
reports use
understanding the current system's design and any justifying choices based on user requirements and
known issues system efficiency
Advantages: provides insights into the system's Software that needs to be considered:
history, can reveal previously unknown issues operating system,
Disadvantages: may be an outdated or incomplete, applications software,
time-consuming, rather expensive method. size of storage,
type of storage.
New System Requirements Specification: Data capture forms: designed to collect data from users
• Once the systems analysts have completed the analysis in a structured format, they come in two types: paper-
stage of the systems life cycle they should be fully aware of based and electronic-based. Paper-based data-capturing
the limitations of the current system. forms need to be carefully designed with headings,
• The next step will be to design a new system (normally concise instructions, character and information fields,
computer-based) to resolve the problems identified by the checkboxes, and enough writing space. Text boxes, on-
users and the systems analyst. screen help, drop-down menus, radio buttons, automatic
• The Requirements Specification will be created which will validation, and control buttons for data entry are all
outline the required improvements and expectations for the features of computer-based forms.
new system. Consider a user-friendly layout, clear instructions, and
appropriate data fields
WWW.ZNOTES.ORG
a routine check that the computer does as part of its Extreme data: values at the limits of acceptability (E.g. 1
programming. or 12)
1. Range check: ensures data is within a specified range of
values What is live data?
2. Character check: ensures data contains only allowed
characters Data that has been used with the current system
3. Length check: ensures data is of a specified length Hence, the results are already known
4. Type check: ensures data is of the correct data type
5. Format check: ensures data conforms to a specific format 7.4. System Implementation
6. Presence check: ensures data is present and not left blank
7. Check digit: a digit added to a number to verify its accuracy The system must then be fully implemented after it has been
thoroughly tested.
7.3. Testing We will now think more carefully about switching to the new
system. Four popular techniques are utilized to transition
Guarantees the system's functionality before it is put into from the old system to the new one.
use. Before selecting the approach best suited for a given
Identification and removal of errors, thus improving application, the pros and cons of each must be carefully
system reliability and performance. considered.
Test plan
Both current and new systems run simultaneously for a
Test data: specific data used for testing purposes period before the old system is phased out
Expected outcomes: predicted results based on test data Used when a smooth transition with minimal risk is
Actual outcomes: results obtained from testing required
Remedial action: steps taken to fix identified issues Advantages
Lower risk
Test data types easy system comparison
Disadvantages
The following data types will be explained using the example
Time-consuming
of months in a year.
resource-intensive
Normal data: valid and expected data values within the
range of acceptability, have an expected outcome. E.g.
any whole number between 1-12. The new system is implemented in a small, controlled
Abnormal data: invalid or unexpected data values. This environment before full-scale implementation
can either be: Used when testing the new system in a real-world setting
Data outside the range of acceptability or Advantages
Data that is the wrong data type Low risk as only trialed in one
In this case, examples could be… department/center/branch
any value less than 1 (i.e. 0, -6, etc.) allows for fine-tuning
any value greater than 12 (i.e. 13, 15, etc.) staff have time to train with the new system
letters or nun-numeric data (i.e. July, etc.) few errors as it's fully tested
non-integral values (i.e. 3.5, 4.2, etc.)
WWW.ZNOTES.ORG
Slower implementation overcome problems
potential inconsistencies
confusion as there are 2 systems in use Purpose of the system: Explanation of the system's
no backup for the department/center/branch using the intended function and goals
new system Limitations: Known constraints or issues with the system
Hardware & software requirements: Necessary
equipment and software to run the system
Loading/running/installing software: Instructions for
The new system is implemented in stages, with each setting up the system on user devices
stage replacing a part of the old system Saving files: Procedures for storing data within the system
Used when a gradual transition is preferred to minimize Printing data: Steps to produce hard copies of system
disruption data
Advantages Adding records: Instructions for creating new entries in
reduced risk the system
easier to manage Deleting/editing records: Guidelines for modifying or
Disadvantages removing existing entries in the system
Takes longer Input format: Structure and format for entering data into
potential compatibility issues the system
Output format: Structure and format for presenting data
7.5. Documentation generated by the system
Sample runs: Examples of system operation, including
In the life cycle of a system, documentation enables the input and expected output
correct recording of design, implementation, testing, and Error messages: Explanations of system warnings and
maintenance data, facilitating effective communication, error notifications
troubleshooting, and potential future improvements. Error handling: Steps to resolve issues and errors within
Technical documentation: detailed information on the the system
system's inner workings and programming for developers Troubleshooting guide/helpline: Assistance for diagnosing
and IT staff and addressing common problems
Used to maintain, repair, and update the system with Frequently asked questions: Answers to common user
improvements inquiries
Glossary of terms: Definitions of key terms and concepts
Purpose of the system/program: Explanation of the related to the system
system's intended function and goals
Limitations: Known constraints or issues with the system
Program listing: The code or scripts used in the system
7.6. Evaluate a solution
Program language: The programming language used to
It measures the productivity, efficiency, and compliance of a
develop the system
system with its goals in order to identify its strengths,
Program flowcharts/algorithms: Visual representations or
shortcomings, and potential development areas. This
descriptions of the system's logic and processes
assessment informs decision-making and improves overall
System flowcharts: Visual representations of the
performance over the course of a system's life cycle.
interactions between system components
Hardware & software requirements: Necessary
Assess the ef f i ciency of the solution:
equipment and software to run the system
File structures: Organization and layout of the system's Analyze the system's efficiency in terms of time, money,
files and data
and resource use. Examine whether the system is
List of variables: Collection of variables used within the
performing at its best or if its efficiency could be
system, including their names and purposes
increased.
Input format: Structure and format for entering data into
Provide examples of specific aspects that contribute to
the system the system's efficiency
Output format: Structure and format for presenting data
Identify areas that may be consuming excessive
generated by the system
resources or time, and suggest ways to optimize them
Sample runs/test runs: Examples of system operation,
Questions to ask:
including input and expected output
Does it operate quicker than the previous system?
Validation routines: Techniques used to check and confirm
Does it operate by reducing staff time in making
the accuracy of data entered into the system
bookings?
User documentation Does it operate by reducing staff costs?
Instruction and guidance for end-users on how to operate the
system. Used to help users effectively use the system and
Evaluate the ease of use:
WWW.ZNOTES.ORG
Look at the solution's usability and accessibility for the
target market. Check to see if the system is simple to Safety & Security
understand and use, and if users have no trouble
completing their jobs.
Safety issues
Describe the user interface and how it facilitates
interaction with the system
1. Electrocution: ICT devices require electrical power to
Mention any feedback from users regarding their charge or run, the electrical device can cause electrocution,
experience with the system, and address any issues
which is caused by the electric current moving through a
they encountered
body, causing fatal injuries and/or death.
Questions to ask:
There are multiple causes for electrocution, including:
Are all the users able to use the system and make
bookings easily? Contact between liquid substances and electronic devices:
Are all the users able to change and cancel bookings Keep liquids away from electrical equipment.
easily? Open cables: make sure that cables are entirely insulated
Can all staff understand how to use the system with and packed, and use circuit breakers or fuses to prevent
minimal training? electrical overload.
Determine the suitability of the solution: 2. Fire: ICT devices require electricity to charge or run, too
many devices using a single socket can cause the plug socket
Examine how well the implemented solution satisfies the to overload, and heat is generated by too much electricity,
desired outcome by contrasting it with the original task causing the wiring to degrade and ignite a fire.
criteria. The causes and reduction tactics for fire include:
Outline the initial objectives of the system and discuss
how the solution addresses each one Socket overload: Ensure enough plug sockets in the room,
Highlight any requirements that may not have been don’t plug too many devices into the same plug
fully met and discuss possible reasons for this socket, and don’t leave devices plugged in and
Questions to ask: unattended.
Is the system suitable for each of the departments? Overheated equipment: Ensure that equipment is
Does it meet the needs of the customers? properly ventilated and not obstructed, keep flammable
Does it meet the needs of the staff? materials away from heat sources, regularly check
Does the solution match the original requirements? equipment for signs of wear or damage, use fire
extinguishers in case of emergencies, turn off or unplug
Collect and examine user feedback: devices when away from the location, do not cover any air
vents on devices.
Collect users' responses to the results of testing the
3. Trailing cables: Devices can be plugged in using cables,
system. Their feedback can provide insights into potential
cables that are protruding can cause an accident, you can trip
issues and improvements, and help determine overall
over a cable left out in a location, and body damage can occur
user satisfaction
during a fall, for example, breaking bones, ligament damage,
Summarise the testing process, including test data,
bruising, sprains, etc. depending on the area fell on
expected outcomes, and actual outcomes
Trailing cables causes and prevention strategies:
Discuss users' reactions to the system, addressing
any concerns or suggestions they may have Unorganized/insecure cables: use cable ties to secure
cables, keep cables properly packed under, let’s say, a
Identify limitations and suggest necessary table, therefore not coming in the way of walking paths,
improvements: use wireless devices where possible, and regularly
inspect cables for signs of wear or damage.
Based on the analysis of efficiency, ease of use,
appropriateness, and user feedback, identify any 4. Heavy falling equipment: Devices have varying levels
limitations in the system and suggest necessary of weight and if a device falls on you it could cause injury,
improvements any device should be placed in a secure location, like a PC
List the limitations and provide explanations for each on a strong desk and not near the edge.
one Causes and reduction tactics for falling equipment:
Recommend specific changes or enhancements for
these issues Improperly secured equipment: Ensure that equipment
is properly secured and stable, regularly check the
stability of locations containing devices.
8. ## 8.1. THEORY Equipment on unstable surfaces: Keep equipment
away from edges and other potential hazards, and
regularly
WWW.ZNOTES.ORG
inspect equipment and locations containing devices for Medical history
signs of wear or damage. Threats that can be avoided by protecting personal data:
Identity theft
8.2. Data protection Privacy breaches
Misuse of the information
The Data Protection Act (DPA) controls personal data Data be sold to third-party companies
collection, storage and processing. Individuals could be held to ransom over personal
data gathered
In the UK, the European Union’s General Data Protection could be used to commit a physical crime
Regulation (GDPR) How to avoid inappropriate data disclosure:
Protects personal data, whether stored on paper or a Personal data must be kept confidential and protected
computer system through privacy settings on websites such as social
media or strong passwords on websites where
Principles of the Data Protection Act personal data is held or used
Access to personal data should be limited to
Data must be processed lawfully, fairly, and transparently, authorized individuals
with clear consent from the individual. Think before you post - consider what information
Data should only be collected for specific, explicit, and could be gathered from your image or content
legitimate purposes. Check website details about the collection, storage,
Organizations should only collect and retain the minimum and use of personal data
personal data necessary for their stated purpose. Only access websites where personal data is used or
Data should be accurate and up-to-date, and reasonable viewed when on a secure, encrypted connection
steps must be taken to rectify or erase inaccurate
information.
Personal data should not be kept longer than necessary eSafety
and should be securely deleted when no longer needed.
Organizations must protect personal data against E-safety is about knowing about and using the internet safely
unauthorized or unlawful processing, accidental loss, and responsibly
destruction, or damage. It refers to when an individual is using the internet, email,
social media, online gaming
Why is data protection legislation required? E-safety refers to the individual knowing how to protect
themselves from potential dangers and threats
Protecting Individual Rights: Data protection legislation
safeguards individuals' right to privacy and control over
The need for eSafety:
their personal information.
Preventing Misuse of Personal Data: It helps prevent awareness that personal information should not be
unauthorized access, identity theft, fraud, and other forms shared freely
of data misuse. awareness of how to act online and how to avoid falling
Promoting Trust: Data protection laws build trust between victim, creating a safe and respectful online environment.
individuals and organizations by ensuring their personal identify and avoid online scams, phishing attempts, and
information is handled responsibly. fraudulent websites that may try to trick them into sharing
Encouraging Responsible Data Handling: Legislation personal or financial information.
promotes responsible data collection, storage, and mindful of online behavior and interactions, protecting
processing practices among organizations. your digital reputation, which can have long-term
Enabling Data Subject Rights: Legislation grants consequences in your personal and professional life.
individuals rights such as access to their data, right to have control over privacy settings on social media
rectification, erasure, and objection to processing. platforms, limiting who can access/view personal
information and posts.
avoid encountering explicit or harmful content online,
Personal Data reducing the risk of exposure to inappropriate material or
online predators.
Refers to information that can be used to identify an engage in online gaming responsibly, avoid sharing
individual personal details, and behave respectfully towards other
Examples players.
Personal Name protecting devices from malware, viruses, and other
Address online threats, preventing data loss, privacy breaches, or
Date of birth device damage.
A photograph in school uniform
WWW.ZNOTES.ORG
develop responsible online behaviors, promoting Hacking: Unauthorized access to computer systems or
respectful conduct while interacting with others online. networks to gain control, steal information, or cause
maintain a healthy balance between online and o ine damage, thus leading to identity theft, privacy breaches,
lives, reducing the risk of addiction, mental health issues, and misuse of data
or negative impacts on relationships and self-esteem. Phishing: Deceptive emails or messages that are
received from trusted sources to trick individuals into
Safety Suggestions: revealing personal data
Pharming: Manipulation of DNS (Domain Name System)
The internet: to redirect users to fraudulent websites, often to steal
Use trusted websites recommended by teachers or personal data
reputable sources Smishing: Phishing attacks carried out through SMS or
Utilize search engines that only allow access to age- text messages
appropriate websites and use filters to ensure Vishing: (aka voicemail phishing) Phishing attacks
inappropriate content is not seen carried out through voice messages to trick users into
Never reveal personal information calling the telephone number contained in the
Email: message
Be aware of the potential dangers of opening or Viruses and malware: Viruses are program codes that
replying to emails from unknown people, including can replicate/copy themselves to cause data loss or
attachments, potential dangers include phishing, corruption. Malicious software designed to disrupt,
spam damage, or gain unauthorized access to computer
Ensure you know who the email is for when systems or networks
considering sending personal data or images via Card fraud: Unauthorized use of credit or debit card
email, only with people you know and not with information for fraudulent purposes which can be caused
identifiable content like school photos by shoulder surfing, card cloning, or keylogging.
Social media:
Know how to block and report people who send
content or messages that are unwanted Protection of data
Know where the privacy settings are to reduce the
number of people who can see your posts or images Multiple techniques are implied for the protection of data,
Be aware of the potential dangers associated with inclusive:
meeting online contacts face to face, do not meet 1. Biometrics:
anyone you do not know, if you do, take an adult and
meet publicly. Individuals' distinctive physical or behavioral traits, such
Do not distribute inappropriate images and as fingerprints, faces, or irises, can be used for access
inappropriate language control and verification. Since biometric data is hard to
Respect the confidentiality of personal data belonging fake or duplicate, it offers a more secure form of
to other people identification.
Only accept friend requests from people you know
Parents should be aware of what you are doing online,
discuss what you are doing online
A digital record that attests to a website's reliability and
Do not post images or details that can be used to
veracity A digital certificate is used to provide safe
locate you
communication and to build confidence between parties.
Online gaming:
Identifier data, the entity's public key, and a third party's
Do not use real names as usernames
digital signature are frequently found in digital
Never share personal or financial details with other
certificates.
players
Know how to block and report players for
inappropriate messages or comments
Sensitive Data is data that might result in loss of an a protocol that creates a secure connection between a
advantage or level of security if disclosed to others. ie, client computer and a server. SSL ensures that
ethnicity, religion, criminal record, etc. At the same time, information communicated between a server and client
personal data can be used to identify the user, i.e., stays private and cannot be intercepted or changed by
passport number, name, age, etc. unauthorized parties. a website's identification for it is the
S at the end of HTTP.
WWW.ZNOTES.ORG
encryption. Without a decryption key, it assures that even An essential aspect to remember while designing ICT
if unauthorized people obtain data, it cannot be decoded. solutions is to ensure that they are user-friendly. This
means that they should be intuitive to use, require
minimal training, and have easy-to-understand
instructions
A firewall is a network security device used to monitor and
Additionally, ICT solutions should be accessible to all
manage incoming and outgoing network traffic. Its goal is
users, including those with disabilities. This could involve
to separate an internal network from other networks by
adding features like voice commands, large text options,
filtering data according to established criteria. It assists in
or compatibility with assistive devices
preventing malware, unauthorized access, and other
Once the solution is created, it is crucial to test it to
network risks.
ensure it functions as expected and fulfills the users'
needs effectively
A security mechanism that requests two different kinds of Analyzing audience requirements:
identification from users to confirm their identity To
provide an additional degree of protection outside of just Designing an ICT solution requires an understanding of
a username and password, 2FA was created. Typically, it the target audience. The study should take into account
combines something that uniquely identifies a user, like elements that may affect the audience's capacity to use
biometric data with something the user has, like a the solution, like their age, technical proficiency, and
smartphone and a token, or something they know, like a expertise.
password. The audience's requirements for information should be
known by the solution creator. This could serve as a
design cue for the data processing elements and the
information architecture.
A typical authentication technique uses a password plus a
The design is also influenced by how the audience utilizes
secret code (user ID) as a means of identification To
and consumes the content. For instance, the answer
strengthen the security of data, user IDs and passwords
should be mobile-friendly if the audience accesses it
are used to restrict access to only authorized users. Using
mostly through mobile devices.
secure passwords and changing them frequently is critical
Finally, the designer should take into account any unique
to ensure security. When creating passwords, it is advised
requirements of the audience, such as visual or auditory
to utilize a mix of uppercase, lowercase, digits, and
impairments. These requirements should be taken into
special characters.
account when designing the solution, ensuring inclusivity.
WWW.ZNOTES.ORG
(DRM). Must be made clear what email content is not permitted
Copyrighted works are subject to usage, modification, and Employees should be told to only use their accounts when
distribution restrictions thanks to DRM methods and sending emails
systems. Must be clear rules regarding the confidentiality of
Other techniques include software product activation, information
which needs a special code to be fully functional. Staff need to be aware of the method and duration of
Given that pirated software frequently is unable to receive storing emails
automatic upgrades, which over time render it less Incoming emails should only be read by the recipient
effective and secure, automatic updates may also serve Company policy on how to deal with and prevent viruses
as a kind of copyright protection. must be laid out
Monitoring of emails may be carried out and staff must be
aware that the company has the right to read all emails
10. ## 10.1. THEORY Suitable ongoing training will take place to ensure staff
follow company policy at all times
WWW.ZNOTES.ORG
a vital communication tool that allows people to Internet resources including websites, email, social
communicate via emails, instant messaging, and other media, online shopping, and more.
means. An intranet's main goal is to make it easier for
acts as a massive database of information on almost any employees to communicate, work together, and share
subject information.
internet has transformed business by offering a platform Extranets are made to make it easier for a company's
for online purchasing, electronic payments, and digital external stakeholders to collaborate and
transactions, allowing enterprises to reach global communicate with it. It enables the organization and
consumers. its reliable clients or partners to securely share
information, documents, and resources.
Many people use the terms “Internet” and “World wide web”
users have access to an incredible amount of information, interchangeably, however, they can’t be used under the same
empowering them to learn context:
enables individuals and businesses to connect and - The internet refers to the global network of computers and
communicate with people from different parts of the other devices connected through routers and servers,
world in real-time however, the world wide web is a collection of websites and
the Internet has made many things easier to complete, webpages that are accessed via the internet.
thus providing simplicity and effectiveness
Blog:
it is a website or section of a website that continually
shares new information, frequently written informally
raises hazards to data security and personal privacy
or conversationally similar to a journal.
through the possibility of identity theft, data breaches, and
usually presented in a reverse chronological manner
online monitoring.
usually managed by individuals or small groups
the spread of propaganda, fake news, and misinformation
allow for reader comments, facilitating some level of
due to the simplicity with which content can be created
discussion
and distributed online.
often focus on specific topics, such as food, travel,
the digital divide that results from unequal Internet access
fashion, technology, or personal experiences
threatens to widen already existing disparities.
also, serve as a platform for sharing opinions or
insights
Forum:
Definition: an online discussion site where people can hold
The Internet is a vast network of linked computer conversations in the form of posted messages
networks and gadgets that communicate with one often organized around specific topics or interests,
another using the Internet Protocol Suite (TCP/IP). and divided into categories known as threads
The intranet is a secure network that operates within primarily focused on peer-to-peer interaction
an organization using internet technologies and may require users to create an account before posting
protocols, such as TCP/IP. can be moderated or unmoderated
Extranets are managed private networks that can give moderated forum refers to an online discussion
access to third-party users and give users, such forum in which all the posts are checked by an
as partners, suppliers, or clients, safe access to a administrator before they are allowed to be
portion of the intranet. posted.
Accessibility: The internet is essentially a huge unmoderated
Internet is open and accessible to the public, allowing forum. No one ‘owns’ the internet, and it is
users to access a wide range of information, services, essentially not policed.
and resources from all around the world. Wiki:
Intranets are restricted to internal users and typically a type of website that allows users to add, remove, or
secured by firewalls and other security measures to edit content
maintain the security of critical corporate data. designed to facilitate collaboration and knowledge
Extranet provides authorized external users only sharing from many people
limited access, in contrast to the internet, which is holds information on many topics which can be
public, or the intranet, which is entirely restricted. To searched
access the extranet, these users need a secure login. posts are not in chronological order
Purpose: structure is determined by the content or its users
Internet acts as a hub for intercultural dialogue, the most famous wiki is Wikipedia, an online encyclopedia
sharing of knowledge, and access to a range of changes can be tracked and reverted if necessary,
and the content is usually written in a neutral style
WWW.ZNOTES.ORG
Social networking: information tends to be up to date because it is
platforms where users can connect with others and quicker and easier to amend
share content internet has vast amounts of information
include platforms like Facebook, Twitter, Instagram, searching for information using a search engine is fast
and LinkedIn and easy
require users to create a profile and allow them to people can look for information in the comfort of their
share text, images, videos, and links own home
facilitate interaction, collaboration, and information information on the internet is essentially free of
sharing on a large scale charge
privacy settings allow users to control who can see webpages may have multimedia elements, making
their content learning more interesting
Disadvantages of using the Internet to find information
The functionality of the Internet it isn’t regulated, anything can be posted
always the risk of accessing inappropriate websites
Internet service providers (ISP): A company that provides too easy to be distracted by the many distractions
internet access. Typically, a monthly fee is charged for this available on the internet
service. A user's account is created when they register with Some research skills are lost when using the internet
an ISP, and they acquired login information such as user ID as search engines do all the work for you.
and password.
Uniform Resource Locator (URL): It is the address of a web Speed of searching:
page on the WWW. It is a text-based address that uniquely
identifies the location of any resource available on the To locate matches to your search query, search engines
internet. The three main components are: may scan billions of online pages in a fraction of a second.
Your internet connection and the effectiveness of the
Protocol: search engine's algorithms both influence the speed.
it is the communication protocol used to transfer data
between the client and the server Amount of information:
E.g. HTTP, HTTPS, FTP, and others
Domain: Because search engines can deliver a deluge of
it is the name of the server where the resource is information, it is critical to utilize particular and relevant
located search phrases.
it can be a name or an IP address Adding quotation marks for specific phrases, "+" signs for
Webpage/file name: required terms, and "-" signs for omitting terms can all
it is the location of the file or resource on the server help to narrow down the search.
it can contain the name of the file or directory where
the resource is located Finding relevant and reliable information:
A URL looks like this:
protocol://domain/path/filename The algorithm of the search engine determines the
E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is a relevancy of information by taking into account
URL that consists of the HTTPS protocol, the domain parameters such as keyword frequency & page quality.
name "www.hoddereducation.co.uk", the path is Reliable information is often obtained from recognized
“IGCSE” and the filename is “ICT” sources such as educational, government, or well-known
A hyperlink is a word/phrase/image which references industry websites.
data that the reader can follow by clicking or tapping,
usually taking you to another web page Evaluating information found on the internet:
A web browser is a software application used to locate,
retrieve, and display content on the WWW, including web Although the internet provides a plethora of information,
pages, images, video, and other files not all of it is genuine or dependable.
Consider the reputation and trustworthiness of the source
Use of search engines: when determining the dependability of the information.
Check the accuracy of information by comparing it to
There are two fundamental methods for obtaining other reliable sources.
information via the Internet. The first method is to enter the Assess whether the information is skewed, keeping an
URL if you're familiar with the address of the website. If you eye out for views that may be pushing a particular point of
don't know where to look, the second option is to employ a view.
search engine to locate the information you seek. Check to see if the material is up to date, as obsolete
information might be deceptive.
WWW.ZNOTES.ORG
Internet protocols: 4. Secure sockets layer (SSL): a protocol that allows data to be
sent and received securely over the internet.
Protocols are sets of rules that the 'sender' and 'recipient'
agree on when data is exchanged between devices. Risks of using the Internet:
1. Hypertext transfer protocol (HTTP): when a web page is
being accessed, entering http:// at the front of an address Inappropriate and unlawful content: The internet may
tells the web browser that ‘http rules’ for communication are attract people to potentially dangerous or illegal
to be obeyed. materials.
2. Hypertext transfer protocol secure (HTTPS): A secure Data restriction: Parental, educational, and ISP
version of HTTP that encrypts data for security. restrictions can all be used to restrict access to specific
3. File transfer protocol (FTP): network protocol used when information or websites.
transferring files from one computer to another computer
over the internet. It is similar to HTTP, but the protocol is
specifically for the transfer of files.
WWW.ZNOTES.ORG
CAIE IGCSE
ICT