ICT, GEOGRAPHY, MATH Notes
ICT, GEOGRAPHY, MATH Notes
ORG
CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE ICT
Software
WWW.ZNOTES.ORG
CAIE IGCSE ICT
It consists of a control unit (CU) that manages the input Backing and Secondary Storage
and output devices, an arithmetic and logic unit (ALU) that
performs computations and makes logical judgments, and Required to store significant amounts of data
tiny memory regions known as registers. permanently.
It processes the input and produces the outcome of the Most commonly in the form of Hard disk drives and Solid-
processing in the form of output. state drives.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
N.B: Mainly used by end-users who don’t have great up the desk space.
knowledge of how the computer works. 3. Because they aren’t portable, files must be copied
3. Dialogue-based user interface: use the human voice to another portable storage device to take work
to give commands to a computer system. no need for elsewhere.
a driver to take their hands off the steering wheel. In a
home, it is especially useful for people with disabilities Mobile Computers
because many tasks can be carried out by the spoken
word only. Possible to use it as a security feature 1. Laptop computer:
because voice recognition could be used to identify a
person. Still unreliable, with many commands not (Or notebook) refers to a type of computer where the
being recognized or needing to be repeated several monitor, keyboard, pointing device and processor are all
times (especially if there is background noise). Can be together in one unit. This makes them extremely portable.
quite complex to setup. User needs to know which lightweight (to aid portability). Low power consumption
commands can be used. (and also long battery life). Low heat output (cooling is
4. Gesture-based user interface: relies on human very important).
interaction by the moving of hands, head or even feet. Uses:
Replaces mechanical input devices. No physical 1. office and business work
contact is required. Very natural interface for a human 2. educational use
operator. No training is needed to interface with the 3. used as a gaming device.
computer. It is possible for unintentional movement to 4. general entertainment
be picked up. Only works near the camera or sensor Advantages:
(maximum of 1.5 meters). May only accept a limited 1. Portability: all components are in a single unit, so
number of movements (for example, it may take they can be taken anywhere.
several attempts to determine exactly what finger 2. Because of one single unit, there are no trailing
movements are recognized). wires and desk clutter.
3. take up much less room on a desk, so they can be
easily used in public spaces.
1.4. Types of Computers 4. portability allows them to take full advantage of
Wi-Fi features.
Desktop Computers
Disadvantages:
1. portability makes it easier for them to be stolen.
Desktop usually refers to a general-purpose computer
2. limited battery life means the user needs to carry
that is made up of a separate monitor, keyboard, mouse,
a charger at all times.
and processor unit. It is distinguished from, for example, a
3. keyboards and pointing devices may be awkward
laptop computer by the fact that it is made up of several
to use.
separate components, which makes it not very portable.
4. not easy to upgrade, like adding more RAM.
Uses:
1. office and business work
2. Smartphones:
2. educational use
3. general entertainment
Allow normal phone calls to be made, but also have an
4. gaming device
operating system (such as iOS, Android, or Windows),
Advantages: allowing them to run a number of computer applications
1. They are easier and less costly to upgrade and
(known as apps or applets). Smartphones communicate
expand.
with the internet either by using Wi-Fi hot spots or by
2. Spare parts are standardized, which makes them
using 3G/4G/5G mobile phone networks.
cheaper.
Uses:
3. They tend to have better specifications for a given
1. They allow users to send/receive emails.
price.
2. They allow users to use a number of apps.
4. No critical power consumption because they plug
3. They allow users to use a camera feature (to take
into a wall socket.
photos or videos).
5. Due to fixed positions, they are less likely to be
4. They allow users to use an MP3/4 player (for music
damaged or stolen. and videos).
6. As they usually have wired connections, they have
Advantages:
more stable internet access.
1. very small in size and lightweight, makes them
Disadvantages:
portable.
1. They are not particularly portable because they
2. connecting to the internet while on the move.
are made up of separate components. 3. because they use Wi-Fi and mobile phone
2. More complicated because all the components
networks, they can be used almost anywhere.
need to be hooked up by wiring, which also clutters
WWW.ZNOTES.ORG
CAIE IGCSE ICT
4. they have apps which can tell instant location, Some of the latest smartphones have been designed as a
which is a feature that isn’t available in either hybrid between a tablet and a smartphone, referred to as
desktops or laptops. a phablet. They have much larger screens than a
5. they have reasonable battery life. smartphone but are smaller than a tablet.
Disadvantages:
1. small screens and keyboards make pages difficult
to read.
2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops.
7. The data transfer rate using mobile phone Uses:
networks can be slower than with Wi-Fi. Entertainment (streaming of music, videos, and
television programs).
3. Tablets: Gaming (including group games).
As a camera or video camera.
They work similarly to a smartphone. The only main Internet use (online sales, social networks, using QR
difference is that they are somewhat bigger in size as codes, and so on).
compared to a smartphone. Sending/receiving emails.
Uses: Global positioning system (use of maps to navigate to
1. They allow users to send/receive emails. a location).
2. They allow users to use a number of apps. Calendar functions.
3. They allow users to use a camera feature (to take Telephone banking (sending and receiving money
photos or videos). using banking apps).
4. They allow users to use an MP3/4 player (for music Voice over Internet Protocol: telephone network using
and videos). the internet, which also allows video calling.
Advantages of tablets compared to laptops: Instant access to social networks (social contact with
1. very fast to switch on (no time delay waiting for the friends no matter where you are in the world).
operating system to load up). Instant messaging.
2. fully portable – they are so lightweight that they Office and business management (allows rapid voice
can be carried anywhere. and video communication).
3. touch screen technology means they are simple to Education use (using interactive software to teach or
use and don’t need any other input devices. learn from).
4. not much heat, they use solid-state technology. Remotely control devices.
5. The battery life of a tablet is a lot longer.
6. when the power button is pressed, it goes into Laptops are the most expandable of these devices, while
standby but remains connected to the internet so smartphones are the most portable. Tablets and phablets fall
the user still hears alerts when emails or other somewhere in between, offering a balance of portability and
‘events’ are received. expandability. The choice of device will depend on your
Disadvantages of tablets compared to laptops: specific needs and use case.
1. tend to be rather expensive when compared to
laptops. 1.5. Impact of Emerging Technologies
2. they often have limited memory/storage when
compared to a laptop. Artificial Intelligence (AI): There are many definitions of
3. typing on a touch screen can be slow and error- artificial intelligence (AI). Essentially, AI is a machine or
prone compared to a standard keyboard. application which carries out a task that requires some
4. laptops tend to support more file formats than degree of intelligence. –
tablets. the use of language
recognizing a person’s face
4. Phablets: the ability to operate machinery, such as a car,
aeroplane, train, and so on,
WWW.ZNOTES.ORG
CAIE IGCSE ICT
analyzing data to predict the outcome of a future Input devices can be complicated because they must ensure
event, for example, weather forecasting. Impact: the user can interact with the computer correctly.
Whenever AI is mentioned, people usually think of
science fiction fantasies and think of robots. The 1. Keyboards:
science fiction writer Isaac Asimov even went as far as
producing his three laws of robotics: » Robots may not Uses:
injure a human through action or inaction. » Robots
Input of data into applications software
must obey orders given by humans without question. »
Typing in commands to the computer
A robot must protect itself unless it conflicts with the
two laws above. Everyday uses: Advantages:
1. An autonomous (driverless) vehicle – we already
have driverless trains and autopilots on airplanes, Fast entry of new text into a document.
but future developments include driverless cars. Well-known method.
2. Robotic research is leading to improvements in Easy to use for most people.
technology to help amputees and people with Easier to do verification checks as data is entered (can
disabilities. immediately compare the source document with typed
3. Robots are used to help people carry out data on the screen).
dangerous or unpleasant tasks – for example,
bomb disposal, Negative impacts of AI: Disadvantages:
4. Unemployment, robots are capable of doing
It can be difficult to use if the user has limited arm/wrist
tedious human tasks with much more efficiency
use.
and excellence than humans.
Slow method when compared to direct data entry.
5. Dependency on technology could lead to problems It is a fairly large device that uses up valuable desk space.
in the future.
6. De-skilling: Tasks that used to be considered a
talent are now part of general, tedious processes
that are done on a regular basis by machines.
Extended reality refers to real and virtual combined
environments. The two most common examples at the
moment are:
Augmented reality (AR) is a merger between the
virtual and physical (real) world; it lays objects onto
pre-existing objects. e.g., Pokémon GO! Impact: safety 2. Numeric keypads:
and rescue operations’ training, shopping and retail
(getting a better look at a car before the purchase),
Uses:
healthcare (better understanding of a patient’s body)
Virtual reality (VR) enables an entirely new world to be Automatic teller machines (ATMs), where the customer
created, unlike AR, which has no link to the actual can key in their PIN, amount of money, etc.
surroundings of the user. It requires the user to be Mobile phones allow phone numbers, etc., to be keyed in.
specially equipped with a VR headset, joystick, and Point of sale terminals (POS) in case the barcode reader
headphones. Impact: Military applications, educational fails to read the barcode – the number has to be keyed in
purposes (looking at ancient buildings), healthcare, manually by the operator.
media (interactive special effects in a movie), scientific Chip and PIN devices when paying by credit/debit cards.
visualization (part of molecular structures/cells). Fast entry of numeric data into a spreadsheet.
Advantages:
2. Input & Output Devices
Faster than standard keyboards when entering numeric
data.
2.1. Input Devices and Their Uses Because many are small devices, they are very easy to
carry around.
An input device is any hardware device that allows a user
to enter data or instructions into a computer directly. Disadvantages:
An input device can send data to another device, but it
cannot receive data from another device. Sometimes, they have small keys, which can make input
Input devices are necessary for a computer to receive more difficult.
commands from its users and data to process; they are
under the user's control or can be direct data entry.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Sometimes, the order of the numbers on the keypad is not Because the touchpad is integrated into the laptop
computer, there is no need for a separate mouse; this
aids the portability and is a big advantage if no flat
surfaces are available.
Disadvantages:
intuitive. People with limited hand/wrist movement find the device
difficult to use.
3. Mouse: It can be more difficult to control the pointer when
compared to a normal mouse.
Uses:
Drag and drop operations are more complicated using a
Opening, closing and minimizing software
grouping, moving and deleting files.
Image editing, for example, controls the size and position
of a drawing pasted into a document.
Controlling the position of a pointer on the screen to allow
selection.
Advantages:
Disadvantages:
Advantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Uses:
Advantages:
Disadvantages:
Uses:
Advantages:
Advantages:
Disadvantages:
7. Joysticks:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
9. Touch screen (as an input device): Limited quality, depending on how good the scanner’s
resolution is.
Uses: Fairly slow input method, especially if color mode is
Advantages:
selected.
Faster entry of options than using a keyboard or mouse.
Very easy method for choosing options. 11. Digital Cameras:
User-friendly method – no training necessary in its use.
Uses:
Option to expand the size of the display if necessary.
Taking photographs is still better than using smartphones
Disadvantages:
and tablets.
A limited number of input options are available. Data-capture device, e.g., as a reversing aid in cars.
This can lead to problems if an operator uses the system Dentistry, to help capture pictures for better diagnosis.
frequently (straining of arm muscles, RSI, etc., are all The creation of virtual reality tours around houses,
possible). buildings, etc.
The screen can get very dirty with constant touching.
Advantages:
Disadvantages:
Advantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
13. Sensors:
Advantages: Disadvantages:
Readings are more accurate as compared to human If the card is damaged, the data is lost.
operators. Doesn’t work at a distance.
Readers are continuous, with no breaks in the monitoring. As the information isn’t human-readable, this can be a
Because it is a continuous process, any action or warnings disadvantage in some cases.
needed will be initiated immediately.
Automatic systems don’t need human intervention.
Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Uses: Advantages:
Where payments are made using cards Very fast way of inputting survey results.
It is more accurate because there is no human
Advantages: intervention.
More accurate than OCR methods.
It is more secure than contactless cards as the PIN acts as
a second security layer. Disadvantages:
More robust system than Magnetic Stripe Cards
Designing the forms can be complicated to ensure the
Disadvantages: marks are correctly positioned.
If there are problems, they need to be manually checked,
Be very careful so the PIN isn’t seen by anyone while
which can be time-consuming.
being typed in.
Uses:
Disadvantages:
Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal.
RFID is more expensive than a comparable barcode 6. Barcode readers:
system.
Uses:
4. Optical Mark Reader/Recognition (OMR):
Used in supermarkets for stock control.
Uses: In libraries, to keep track of books.
As a safety function to ensure checking of electrical
Used in MCQs checking. equipment on a daily basis.
Used in reading voting papers.
Advantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Much faster than manually keying in data. QR codes can be used to transmit malicious data.
Allow automatic stock control.
They are a tried and trusted technology.
Disadvantages:
stripes.
Uses:
Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Uses:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Uses:
ATMs
POS terminals
Information kiosks.
Advantages:
Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
They are only considerably fast if several copies are being Advantages:
made.
Color laser printers are expensive to run. Can be used in varying environments unlike laser/inkjet
They produce ozone and volatile organic compounds printers.
because of their printing method and toner. Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
Good for continuous printing.
Disadvantages:
Very noisy
Initial cost is more than an inkjet printer.
Very slow, poor-quality printing.
6. Inkjet printers:
Uses:
Advantages:
8. (Graph) Plotters:
Disadvantages:
Uses:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Advantages:
Disadvantages:
Advantages:
Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Disadvantages:
CD-R/DVD-R
Advantages: CD-ROM/DVD-ROM
Data access time and data transfer rate are very fast. Uses:
It has a very large memory capacity.
It can be used as a method of transferring information These are read-only memory (ROM), which means they
between computers. can’t be written over and can only be read. Permanent
WWW.ZNOTES.ORG
CAIE IGCSE ICT
storage method.
3.4. Solid State Backing Storage
CD-ROM is used to store music files and to store software,
computer games and reference software. Holds data on devices that don’t have any moving devices.
DVD-ROM has much larger storage and is used to store
films. Solid-state drives (SSD)
Used in applications where there is a real need to prevent
deletion or overwriting of important data. Uses:
They are less expensive than hard disk drive systems. Advantages:
They are very portable as they are small and light.
Data stored on them is read-only, so it cannot be They are more reliable as they have no moving parts.
accidentally overwritten. They are considerably lighter, and suitable for laptops.
They do not have to ‘get up to speed’ before they work
Disadvantages: correctly.
They have lower power consumption.
Hold far less data than hard disk drives or memory sticks.
They run much cooler than HDDs.
Very slow data transfer rate and data access times, as
Because of no moving parts, they are very thin.
compared to hard disk drives.
SSD data access time is only 0.1 milliseconds compared
You cannot add your own files to the disks because they
to 10 milliseconds for HDD.
are both read-only.
Data transfer speed for SSDs is also much faster than for
HDDs.
Blu-Ray Discs
Disadvantages:
The main differences between DVD and Blu-ray are:
SSD endurance - SSDs are conservatively rated at only
1. Blu-ray uses a blue laser rather than a red laser. (The
20GB write operations per day over a three-year period.
wavelength of blue light is 405nm, much smaller than More expensive than magnetic hard disks.
the 650nm red laser) This makes pits and lands much
Smaller storage capacity than magnetic hard disks.
smaller, so they store five times more data than DVDs.
2. Blu-ray disks automatically come with a secure Pen drives (Memory sticks)
encryption system, which helps to prevent piracy and
copyright infringement. Uses:
3. The data transfer rate for a DVD is 10 Mbps, and for a
Blu-ray disc, it is 36 Mbps. Transporting files between computers or using as a
backing store.
Uses: Used as a security device to prevent software piracy
(known as a dongle).
Home video consoles.
Storing and playing back movies. Advantages:
Computers can use this technology for data storage or
backing hard drives. Very compact and portable media.
Camcorders can use this media to store movies. Very robust.
Does not need additional software to work on most
Advantages: computers.
They are not affected by magnetic fields.
Very large storage capacity.
Very fast data transfer rate. Disadvantages:
The data access speed is also greater than with other
optical media. Cannot write protect the data/files by making it ‘read-only’.
Blu-ray discs automatically come with a secure encryption Easy to lose (due to the small physical size).
system. The user needs to be very careful when removing a
memory stick from a computer - incorrect removal will
Disadvantages: corrupt the data on the memory stick and make it useless.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
» CFast card (compact, fast card). data into an electrical signal that allows network
Uses: access. Usually integrated into the motherboard.
Storing photos on digital cameras. Each NIC is given a unique hardwired media access
Used as mobile phone memory cards. control (MAC) address.
Used in MP3 players to store music files. Media access control (MAC) address: a number that
Used as a backing store in hand-held computer devices. uniquely identifies a device when connected to a network.
The first six hex digits identify the manufacturer’s code,
Advantages: and the next 6 identify the device’s serial number.
Very compact. 2. Hubs: they are hardware devices that can have
Because of no moving parts, they are very durable. several other devices connected to them. They are
They can hold large amounts of data. used to connect devices together to form a local area
Compact cameras and smartphones can read and write network (LAN). It takes a data packet received by one
memory cards, allowing the user to transport extensive of its ports and sends it to all relevant or irrelevant
collections of photographs, songs etc. devices that are connected to it.
Disadvantages: It is not very secure to broadcast data to all devices.
Unnecessary network traffic.
Expensive per gigabyte of memory when compared to
HDDs. 3. Switches: intelligent hubs. Used to connect devices to
Have a lower storage capacity than hard disks. form a LAN. Unlike hubs, the switches store the MAC
Have a finite life regarding the number of times they can addresses of all devices on a lookup table. So, it only
be read from or written to. sends data to the relevant device.
Memory cards, specifically the micro SD card, are the In summary:
smallest storage devices available, making them more
likely to be lost, stolen or damaged. Both are used to connect devices in LAN.
Users must often purchase a card reader or USB Both use data packets.
converter to view the data. Hubs send data to every device on the network.
Switches send data to a relevant device only.
Switches have better security.
4. Networks & the Effects of Switches use lookup tables to determine the destination
for a data packet.
Using Them Switches use MAC addresses for relevant device
locations.
4.1. Networks 4. Bridges: Devices that connect one LAN to another LAN
that use the same protocol. Unlike routers, they can’t
Routers
communicate with external networks, such as the
A device that enables data to be sent between different types
Internet.
of networks. It can be connected through cables or wirelessly
Comparison:
to connect a LAN to the internet.
It can be used for: Bridges connect LANs together; routers connect various
types of networks together.
connecting networks and devices to the internet,
Bridges scan MAC addresses while routers scan the IP
storing computer addresses,
addresses.
routing data packets.
Both send out data in the form of data packets.
When a data packet is received, the router checks if the Bridges connect networks with the same protocol; routers
packet is intended for it or another network. The data packet can connect networks with different protocols.
The router uses routing tables to direct data packets, but
is routed to the local switch/hub if it's meant for its network. If
not, the data packet is sent to the relevant router, which bridges don’t.
sends it to the relevant device. Bridges have only two ports; routers have multiple ports.
They consult routing tables to know where to send the Wi-Fi & Bluetooth
data.
Both are used for wireless communication between devices.
Common Network Devices They both use electromagnetic radiation as the carrier of
data transmission.
1. Network Interface Cards (NIC): These are needed to Bluetooth uses:
allow a device to connect to a network. Turns binary
WWW.ZNOTES.ORG
CAIE IGCSE ICT
When transferring data between 2 or more devices that Files can be synced across multiple devices.
are very close together. There is no need to carry storage devices around.
When the speed of data transmission isn’t crucial.
For low-bandwidth applications. Disadvantages:
Cloud data is duplicated and stored on other servers to Usually private and are used to send information securely
ensure availability during system failures, upgrades, and and safely.
maintenance. Access to an organization’s Intranet is restricted and only
accessible to authorized users such as employees.
Advantages: Intranets have many advantages over the internet, such
as:
Services can be scaled up or down according to changing
better bandwidth than the internet,
requirements.
data is kept within the organization,
Cloud storage eliminates the need for a business to
less chance of hacking and attacks,
purchase expensive equipment for infrastructure and
administrators can manage access to external sites
maintenance.
and links.
Readily available globally, allowing both remote working
and data sharing. Characteristics:
Providers offer high levels of ensuring that services are
always available. A private network that is accessible to employees within a
It can offer an almost unlimited amount of storage. company or organization.
A backup of the data from the cloud will allow full data Usually behind a firewall to ensure security.
recovery in case of incidents.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
1. Zero login: A security concept that eliminates Heuristic Checking: Instead of relying solely on a database of
traditional login methods, such as usernames and known viruses, this method looks for behavioural patterns
passwords, using biometrics or other authentication and other features in a file to identify possible risks.
factors for seamless and password-less access.
2. Biometric Recognition: These authentication methods Electronic Conferencing
use unique physical or behavioural characteristics,
such as fingerprints, iris scans, or voice recognition, to 1. Video Conferencing: It is a form of audio and video
communication. It serves as a stand-in for face-to-face
verify a person's identity.
meetings between several persons who may reside
3. Magnetic Stripes: These are authentication features
on cards storing data magnetically. They enable abroad or in another region of the country. It utilizes a
network in some way and is done in real-time.
secure identification and authorization by containing
encoded information that magnetic stripe readers can
The basic hardware includes:
read.
webcams,
WWW.ZNOTES.ORG
CAIE IGCSE ICT
large monitors/television screens, Heavily relies on technology, and technical issues such as
microphones, poor audio quality, background noise, or connectivity
speakers. problems are common.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
The negative aspects include: safer due to the removal of human error
due to the more efficient operation of vehicles, it is better
people do not meet face-to-face as much (social isolation) for the environment
a lack of social interaction may make people more reduced traffic congestion
anxious about meeting people in real life
increased lane capacity
When communicating online, people can act less politely reduced travel times
or more harshly, and cybercrime is a serious issue, stress-free parking for motorists
especially for teenagers.
Disadvantages:
Monitoring and Controlling Transport
very high installation prices
WWW.ZNOTES.ORG
CAIE IGCSE ICT
driver and passenger reluctance of the new technology Cause: due to prolonged use of monitors
reduction in taxi requirements could lead to Minimizing health risks: use adjustable chairs, footrests, and
unemployment tiltable screens.
maintenance of the sensors and cameras is crucial 3. Eyestrain: strain and fatigue, unwanted harm to vision.
the ever-present fear of hacking into the vehicle’s control Cause: due to bad lighting and prolonged screen usage.
system Minimizing health risks: use LCDs instead of CRTs, take
regular breaks, use anti-glare screens, and do regular eye
Advantages of an autonomous train: testing.
4. Headaches: pain or discomfort in the head or face area.
improved punctuality
Cause: incorrect lighting, screen reflections, flickering
reduced running costs due to fewer staff
screens, etc.
no human error
Minimizing health risks: use anti-glare screens, take regular
minimized energy consumption
breaks, regular eye-testing.
possible to increase the frequency of trains as the
5. Ozone irritation: inflammation and irritation of the tissues
possibility of delays is removed
lining human airways
more straightforward to update changes in train
Cause: inhalation of ozone released by laser printers in an
schedules
office.
Disadvantages: Minimizing health risks: proper ventilation, laser printers
should be housed in a separate room, replace laser printers
fear of the system being hacked into with inkjet printers, if possible.
initial instalment costs are very high
ensuring passenger behaviour is vital, especially during
rush hours. 6. ICT Applications
human reluctance to new technology
without drivers, CCTV monitoring will be continuously
6.1. Communication
required
5.2. Potential Health Problems related Collection of webpages, text, graphics, video, and sound
to the Prolonged use of IT Equipment Hosted on a web server on the internet
Need to write code or use a web authoring application
Long-term exposure to computing devices may affect user Hyperlinks to other pages can be added
well-being. Interactive websites require programming knowledge
Can use a camera, scanner, and microphone to input data
Mentioned below are some of the health issues,
accompanied by their causes and prevention tactics: Usually, hire space from the web hosting company
1. Repetitive strain injury (RSI): A condition affecting the Advantages
Ability to add sound/video/animation
muscles and nerves
Cause: repetitive movements and overuse of muscles, such Links to other websites/hyperlinks
as wrists The use of hot spots
Minimizing health risks: regular breaks, ergonomic Buttons to navigate/move around the website
equipment, correct typing techniques. Hit counters to see who has visited the websites
2. Back and neck strain: Back pain and other related issues. worldwide advertising capability
Disadvantages
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
frequently, computer modelling can be a very costly potential gaps or inaccuracies in the analysis.
option Based on assumptions and simplifications, introducing
human reluctance is a common problem in this a level of uncertainty.
technology Their programmed algorithms and data inputs bind
models. They may struggle to adapt to unforeseen
Some of the applications of computer modelling include: circumstances or rapidly changing conditions that
1. Personal finance: Computer modelling involves using humans can more readily navigate and respond to.
mathematical algorithms and data analysis to simulate
various financial scenarios, such as investment strategies,
retirement planning, and risk assessment, aiding individuals 6.3. Computer-controlled Systems
in making informed decisions and optimizing their financial
Robotics in manufacturing: involves using automated
goals.
machines to perform tasks such as assembly, welding,
2. Bridge and building design: Computer modelling is crucial
and packaging. These robots are designed to mimic
in bridge and building design. It allows engineers to simulate
human actions with precision and speed, increasing
and analyze structural behaviour, assess load capacities, and
productivity and quality control. They offer benefits like
predict the response to external forces. It aids in optimizing
enhanced worker safety, improved efficiency, and the
designs, ensuring structural integrity, and minimizing
ability to handle repetitive tasks, revolutionizing the
potential risks before construction begins.
manufacturing industry.
3. Flood water management: Computer modelling plays a
Advantages:
vital role in flood water management by simulating water flow
can work in environments that may be harmful to
behaviour, predicting flood extents, and assessing potential
humans
flood risks. It helps design and optimise flood mitigation
can work non-stop
measures, such as levees and floodplain zoning, allowing
low running costs, majorly due to reduced employees;
authorities to make informed decisions, develop effective
thus less wages need to be given
emergency response plans, and minimize the impact of
have higher productivity
flooding on communities.
provide greater consistency
4. Traffic management: Computer modelling simulates and
can do long, boring, tedious tasks
analyses traffic flow, predicts congestion patterns, and
can carry out different tasks by fitting them with
optimises traffic control strategies. It aids in designing
different-end effectors
efficient road networks, optimizing signal timings, and
Disadvantages:
evaluating the impact of transportation infrastructure
robots find it difficult to do unusual tasks
projects. This enables authorities to make informed
can cause higher unemployment
decisions, alleviate congestion, and improve overall traffic
robots do many of the tasks once done by humans,
efficiency for better urban mobility.
leading to deskilling
5. Weather forecasting: Computer modelling plays a pivotal
robots are independent of the skills base; factory
role in weather forecasting by simulating the Earth's
headquarters can be moved internationally
atmosphere, oceanic conditions, and other environmental
initial set-up and maintenance of robots can be
factors. These models use complex algorithms to predict
expensive
weather patterns, including temperature, precipitation, wind
Production line control: Computer-controlled systems in
speed, and storm systems. By assimilating real-time data,
production line control involve using computers and
computer models provide forecasts that aid meteorologists in
software to monitor, coordinate, and optimize
predicting weather conditions, issuing warnings, and helping
manufacturing processes. These systems ensure efficient
society prepare for potential hazards.
coordination of machinery, manage inventory, track
Advantages of using computer modelling rather than production metrics, and automate tasks. They enable
humans: real-time data analysis, error detection, and adjustment,
It can provide more precise and accurate results than improving productivity, reducing downtime, and
human-based methods, minimizing errors and enhancing overall operational efficiency in the production
increasing reliability. line.
Can analyze large amounts of data and perform Autonomous vehicles: Self-driving cars and drones guided
complex calculations faster than humans by computer algorithms.
It can be reused and updated easily, reducing the enhance safety
need for repetitive manual analysis and potentially reduce traffic congestion
lowering costs in the long run. increase fuel efficiency
Disadvantages of using computer modelling rather than Advantages of using computer-controlled systems rather
humans: than humans:
It may overlook nuanced factors or intangible increased efficiency and productivity
elements that humans can consider, leading to greater consistency
ability to work in any environment
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Automated teller machines (ATMs) are places where technology. The system depends on electronic money
customers can get cash (or carry out certain other banking transfers between accounts; no cash is moved. The computer
activities, such as ordering a statement) using their credit or system automatically moves the requested amount from one
debit card. account to another when it receives an EFT command.
What goes on behind the
Sequence at ATM Advantages:
scenes
very secure payment method
Customer puts card into Contact is made with bank’s
very quick payment method
ATM computer
less expensive than cheques
PIN is checked to see if it is the customer has the right to dispute an EFT payment
correct for up to 60 days
Card is checked to see if it is Disadvantages:
PIN is entered using the valid the bank transaction can’t be reversed without full
keypad The transaction is closed if the dispute investigations
card is stolen or the number of customer needs to have funds available immediately
PIN attempts allowed is cannot guarantee the recipient’s identity
exceeded.
Several options are given: Credit/debit card transactions
change PIN, pay in cheques,
pay a bill, see balance, get Several credit/debit cards come with a magnetic stripe and a
money chip; the chip houses important data like the PIN. This
technique is intended to increase security because it is
The customer selects the
superior to depending solely on a signature. A chip and PIN
cash option & several cash
card to make purchases is an example of an electronic funds
options are shown
transfer (EFT).
The customer’s account is
accessed to see if they have Advantages of credit cards:
sufficient funds, it is checked to customer protection if ordered goods don’t arrive
see if they are withdrawing internationally accepted payment method
The customer accepts one of
more than their daily limit. interest-free loan if money is paid back within the
the options or types in a
If the limit is not exceeded and agreed time period
different amount
all other checks are OK, then can make purchases online
the transaction is authorized, Disadvantages of credit cards:
and the machine then counts can be charged high interest rates
out the cash annual fees often apply
The customer is asked if they easy to end up with credit damage
want a receipt security risks in online transactions
Advantages of debit cards:
The card is returned
money comes from the user’s current account, there
Money is dispensed Customer’s account is updated
is no interest
safer than carrying cash
Advantages: can make online purchases
possible to withdraw at any time of the day Disadvantages of debit cards:
offer many banking services without having to go to less customer protection if goods don’t arrive
the bank
no credit allowed; funds are needed at the time of
possible to access an account from anywhere in the
purchase
world
security risks in online transactions
usually provides quicker service than waiting in a
queue at a bank Cheques
Disadvantages:
often in places where theft can take place at night Individuals and organizations use cheques as a form of
potential for shoulder surfing payment. When issuing a cheque, the payer writes the
some banks charge customers for using ATMs recipient's name, the payment amount, and the date on the
cash withdrawal limits are often imposed on people cheque. The recipient then deposits or presents the cheque
to their bank for processing. The payer's bank verifies the
Electronic Funds Transfer (EFT): fund’s availability, and upon clearance, the specified amount
is transferred from the payer's account to the recipient's
It is possible to send money transfer instructions directly to a account, completing the transaction.
bank's computer system via electronic funds transfer (EFT)
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
The main processing element of the system securely transferring funds from their bank accounts. EFTPOS
It acts like a search engine examining the knowledge base terminals authenticate and authorize transactions in real-
Responsible for gathering information time, providing convenience and security for customers and
This is the problem-solving part of the system businesses during retail purchases.
Attempts to use information gathered from the user to The process of checking credit and debit cards at a
find a matching object supermarket EFTPOS is much the same as was described for
paying a restaurant bill in Section 6.6.
4. Knowledge base Some functions of EFTPOS include:
It is a repository of facts Use of chip and PIN cards:
stores all the knowledge about an area of expertise Enhance security with two-factor authentication
a collection of objects and their attributes Require customers to enter a personal identification
number (PIN)
5. Rules base
Use of contactless cards:
The rules base is a set of inference rules. Allow for faster transactions
Used by the inference engine to draw conclusions Enable customers to tap their card on the terminal
They follow logical thinking Use of Near Field Communication (NFC):
Facilitate payments through smartphones and other
How an expert system is used to produce possible devices
solutions Increase convenience for customers
Communication between supermarket computers and
Below is an example of how an expert system works to bank computers:
diagnose a medical issue: Share transaction details securely
Enable instant payment processing and verification
The interactive screen asks questions for the doctor to
answer using a keyboard or a touch screen. Internet Shopping
The inference engine compares the symptoms with the
knowledge base, using the rule base to find matches. Characteristics of Internet Shopping:
The system suggests the possible illness with a probability
of each, cures, and recommendations on the next step. Online stores accessible through web browsers
The explanation system will explain how that particular A wide variety of products and services are available
diagnosis was suggested. Convenient and often open 24/7
WWW.ZNOTES.ORG
CAIE IGCSE ICT
digital fraud and security concerns It can automatically control the entry and exit to a car
technical issues and downtime park or private roads.
costs of delivery and return It can be used as a security system to prevent illegal
fake negative reviews can lead to a lousy company parking.
reputation It can be used to analyze driver behaviour.
It can be used in inner-city congestion charging
6.10. Recognition Systems systems.
Disadvantages:
1. Optical Mark recognition (OMR) media in schools: A lack of manned security car park surveillance could
lead to vandalism.
School registers: Paper-based registers are fed into OMR There could be an invasion of privacy due to recording
to be scanned and stored in a database. drivers’ number plates.
Multiple-choice examination papers: The position of a Damaged or very dirty number plates will not be
mark is stored in a computer’s memory after being read recognized.
by the OMR, a device using a template that maps out the The ANPR system only recognizes the number plate
X-Y coordinates of each tablet (pen/pencil mark). and not the car so that a car can be fitted with a
Used at POS terminals for scanning and reading the cloned number plate, thus bypassing car park security,
information stored in barcodes. for example.
Many digital devices have OMR scanners, which may be
used to scan QR codes. 3. RFID in tracking stock:
Advantages:
Tracking of stock using RFID involves either tracking
very fast way of inputting the results of a survey
livestock (on a farm) or goods in a shop, supermarket, or
more accurate than keying in data
distribution centre.
more accurate than OCR methods
RFID in passports:
Disadvantages:
The data on the RFID chip is read when the passport is
designing the forms is a very complex job
scanned.
there can be problems if they haven’t been filled
Your photo is clicked and compared to the RFID chip
correctly
image.
often only work with black pens or pencils
If face recognition passes, some checks are made to
2. Optical Character Recognition (OCR) ensure you are eligible to enter the country, and if you
are, the gate opens automatically.
Automatic Number Plate Recognition (ANPR) systems: RFID in automobiles:
The sensor sends a signal to instruct a camera to Tags allow or deny access to parking in a secure,
capture an image of the front of the vehicle private car park.
An algorithm is used to locate and isolate the number RFID tags in lorries and delivery vans can be used at
plate from the image taken by the camera. weigh stations to ensure the vehicle is not carrying too
The brightness and contrast of the number plate are much weight.
first adjusted. Each character on the number plate is RFID tags can be used on a car production line to track
then segmented. its progress through assembly.
Each character is then recognized using OCR RFID in contactless payments:
software. The characters are converted into a string of The embedded chip on credit/debit cards and the
editable text by the software. antenna enable customers to wave their card over a
This text string is then stored in a database. reader at the point of sale terminals to make
A barrier is raised, and the motorist is issued with a payments
ticket. The ticket shows the date and time of entering Smartphone apps can also be used to make
the car park. contactless payments.
When the car returns to the car park, they insert their Advantages:
ticket into a machine that calculates their charges and No line-of-sight contact is necessary.
registers the payment into the database. It is a very robust and reliable technology.
Advantages: Tags are much more difficult to forge than barcodes.
Used to automatically monitor the average speed of RFID tags can reduce the number of staff needed in,
vehicles over a stretch of road. for example, a warehouse because tracking items is
There is no need to employ a car park or security automatic (thus reducing costs).
guards. It provides a very fast read rate.
It's a much faster system than checking a ticket at the It allows bi-directional data transfer.
exit. Bulk detection is possible.
Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Tag collision is when the signals from two or more three satellites
tags overlap, interfering with each other.
Because RFID uses radio waves, they are relatively Satellite Navigation (satnav):
easy to jam or interrupt.
Used to determine the exact location of a car.
It is relatively easy to hack into the data/signal
The computers onboard can be used to show directions to
transmitted by the tag.
a destination.
The initial cost of an RFID system is more expensive
than a comparable barcode system. Advantages:
4. Near Field Communication (NFC): Better focus as there isn’t a need to constantly check
paper maps.
Enables short-range wireless communication between
Reduces fines by warning drivers about upcoming speed
devices.
changes.
Allows payment using a smartphone.
The system shows an Estimated Time of Arrival (ETA).
Advantages:
It is possible to program in the fastest route to avoid
Convenient and secure method of payment
towns.
allows for contactless transactions
The system can also give helpful information such as the
Disadvantages:
location of petrol stations.
Limited range
compatibility issues with some devices Disadvantages:
5. Biometric recognition: If the maps are not updated, they can give incorrect
instructions.
Usually refers to automated technologies for
Road closures due to accidents or roadworks can cause
authenticating and verifying human body characteristics
problems.
such as face, iris, retina, finger, thumb, hand and voice.
The loss of satellite signals can cause problems.
Advantages:
The system will give incorrect information if an incorrect
very high accuracy
start-point or end-point is keyed in.
very easy to use
very fast verification time Geographic Information Systems (GIS)
non-intrusive method
relatively inexpensive technology Used to capture, manage, analyze, and display
Disadvantages: geographically referenced information.
it can make mistakes if the skin is dirty or damaged Use to determine the distance between two places.
very expensive to install and set up Used to find the nearest petrol station or restaurant, etc.
uses a lot of memory for the data to be stored To protect animal and plant life in certain vulnerable
a person’s voice can be quickly recorded and used for places.
unauthorized access It can be used in geography, science, or engineering
an illness, such as a cold, can change a person’s voice, lessons.
making absolute identification difficult or impossible
Advantages:
6.11. Satellite Systems Allows geographical and thematic data of any kind to be
combined to show how they are connected to each other.
Global Positioning Systems (GPS) It allows the handling and exploration of vast amounts of
data.
Used to determine the exact location of several modes of
It allows data to be integrated from a wide range of very
transport
different sources.
Cars usually refer to GPS as satellite navigation systems
Satellites surrounding the Earth transmit signals to the Disadvantages:
surface
Computers installed in the mode of transport receive and The learning curve on GIS software can be very long.
interpret these signals GIS software is very expensive.
Knowing their position on the Earth depends on very GIS requires enormous amounts of data to be input.
accurate timing – atomic clocks are used in the satellites, It isn't easy to make GIS programs that are both fast and
which are accurate to within a fraction of a second per user-friendly.
day
Each satellite transmits data indicating its position & time Media Communication Systems
The computer on board the mode of transport calculates
its exact position based on the information from at least Using satellite signals for communication.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Once the analysis has taken place and the systems analyst Test Designs
has some idea of the scale of the problem and what needs to
be done, the next stage is to design the critical parts of the Test data structures, file structures, input formats, output
recommended system. formats, and validation routines
Ensure all components function correctly and interact
File/Data Structures seamlessly
WWW.ZNOTES.ORG
CAIE IGCSE ICT
any value greater than 12 (i.e. 13, 15, etc.) staff have time to train with the new system
letters or nun-numeric data (i.e. July, etc.) few errors as it's fully tested
non-integral values (i.e. 3.5, 4.2, etc.) Disadvantages
Extreme data: values at the limits of acceptability (E.g. 1 Slower implementation
or 12) potential inconsistencies
confusion as there are two systems in use
What is live data? There is no backup for the department/center/branch
using the new system
Data that has been used with the current system
Hence, the results are already known 4. Phased Implementation
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Instruction and guidance for end-users on how to operate the Evaluate the Ease of Use
system. Used to help users effectively use the system and
overcome problems Look at the solution's usability and accessibility for the
target market. Check to see if the system is simple to
Purpose of the system: Explanation of the system's understand and use and if users have no trouble
intended function and goals completing their jobs.
Limitations: Known constraints or issues with the system Describe the user interface and how it facilitates
Hardware & software requirements: Necessary interaction with the system
equipment and software to run the system Mention any feedback from users regarding their
Loading/running/installing software: Instructions for experience with the system and address any issues
setting up the system on user devices they encountered
Saving files: Procedures for storing data within the system Questions to ask:
Printing data: Steps to produce hard copies of system Are all the users able to use the system and make
data bookings easily?
Adding records: Instructions for creating new entries in Are all the users able to change and cancel bookings
the system easily?
Deleting/editing records: Guidelines for modifying or Can all staff understand how to use the system with
removing existing entries in the system minimal training?
Input format: Structure and format for entering data into
the system Determine the Suitability of the Solution
Output format: Structure and format for presenting data
generated by the system Examine how well the implemented solution satisfies the
Sample runs: Examples of system operation, including desired outcome by contrasting it with the original task
input and expected output criteria.
Error messages: Explanations of system warnings and Outline the initial objectives of the system and discuss
error notifications how the solution addresses each one
Error handling: Steps to resolve issues and errors within Highlight any requirements that may not have been
the system fully met and discuss possible reasons for this
Troubleshooting guide/helpline: Assistance for diagnosing Questions to ask:
and addressing common problems Is the system suitable for each of the departments?
Frequently Asked Questions: Answers to common user Does it meet the needs of the customers?
inquiries Does it meet the needs of the staff?
Glossary of Terms: Definitions of key terms and concepts Does the solution match the original requirements?
related to the system
Collect and Examine User’s Feedback
7.6. Evaluation Collect users' responses to the results of testing the
system. Their feedback can provide insights into potential
It measures a system's productivity, efficiency, and
issues and improvements and help determine overall
compliance with its goals to identify its strengths,
user satisfaction.
shortcomings, and potential development areas. This
Summarise the testing process, including test data
assessment informs decision-making and improves overall
expected and actual outcomes.
performance over the course of a system's life cycle.
Discuss users' reactions to the system, addressing
any concerns or suggestions they may have
Assess the Efficiency of the Solution
Analyse the system's efficiency in time, money, and Identify Limitations and Suggest Necessary
resource use. Examine whether the system is performing Improvements
at its best or if its efficiency could be increased.
Provide examples of specific aspects that contribute to Based on the analysis of efficiency, ease of use,
the system's efficiency appropriateness, and user feedback, identify any
Identify areas that may be consuming excessive limitations in the system and suggest necessary
resources or time and suggest ways to optimize them improvements
Questions to ask: List the limitations and provide explanations for each
Does it operate quicker than the previous system? one
Does it operate by reducing staff time in making Recommend specific changes or enhancements for
bookings? these issues
WWW.ZNOTES.ORG
CAIE IGCSE ICT
2. Fire: ICT devices require electricity to charge or run; too Data must be processed lawfully, fairly, and transparently,
many devices using a single socket can cause the plug socket with clear consent from the individual.
to overload, and heat is generated by too much electricity, Data should only be collected for specific, explicit, and
causing the wiring to degrade and ignite a fire. legitimate purposes.
The causes and reduction tactics for fire include: Organizations should only collect and retain the minimum
personal data necessary for their stated purpose.
Socket overload: Ensure enough plug sockets in the room, Data should be accurate and up-to-date, and reasonable
don’t plug too many devices into the same socket, and steps must be taken to rectify or erase inaccurate
don’t leave devices plugged in and unattended. information.
Overheated equipment: Ensure that equipment is Personal data should not be kept longer than necessary
properly ventilated and not obstructed, keep flammable
and should be securely deleted when no longer needed.
materials away from heat sources, regularly check Organizations must protect personal data against
equipment for signs of wear or damage, use fire unauthorized or unlawful processing, accidental loss,
extinguishers in case of emergencies, turn off or unplug
destruction, or damage.
devices when away from the location, do not cover any air
vents on devices. Why is data protection legislation required?
3. Trailing cables: Devices can be plugged in using cables.
Protecting Individual Rights: Data protection legislation
Cables that are protruding can cause an accident; you can
safeguards individuals' right to privacy and control over
trip over a cable left out in a location, and body damage can
their personal information.
occur during a fall, for example, breaking bones, ligament
Preventing Misuse of Personal Data: It helps prevent
damage, bruising, sprains, etc. depending on the area fell on
unauthorized access, identity theft, fraud, and other forms
Trailing cables causes and prevention strategies:
of data misuse.
Unorganized/insecure cables: use cable ties to secure Promoting Trust: Data protection laws build trust between
cables, keep cables packed correctly in, let’s say, a table, individuals and organizations by ensuring their personal
therefore not coming in the way of walking paths, use information is handled responsibly.
wireless devices where possible, and regularly inspect Encouraging Responsible Data Handling: Legislation
cables for signs of wear or damage. promotes responsible data collection, storage, and
processing practices among organizations.
4. Heavy falling equipment: Devices have varying levels of Enabling Data Subject Rights: Legislation grants
weight, and if a device falls on you, it could cause injury; any individuals rights such as access to their data, right to
device should be placed in a secure location, like a PC on a rectification, erasure, and objection to processing.
solid desk and not near the edge.
Causes and reduction tactics for falling equipment: Personal Data
Improperly secured equipment: Ensure that equipment is Refers to information that can be used to identify an
properly secured and stable. Regularly check the stability individual
of locations containing devices. Examples
Equipment on unstable surfaces: Keep equipment away Personal Name
from edges and other potential hazards, and regularly Address
Date of birth
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
There are multiple methods by which data can be threatened, Creating data in a format that cannot be read without a
including: decryption key Data on hard drives, emails, cloud storage,
and secure websites (HTTPS) are all protected by
Hacking: Unauthorized access to computer systems or encryption. Without a decryption key, it assures that even
networks to gain control, steal information, or cause if unauthorized people obtain data, it cannot be decoded.
damage, thus leading to identity theft, privacy breaches,
and misuse of data 5. Firewall:
Phishing: Deceptive emails or messages that are received
from trusted sources to trick individuals into revealing A firewall is a network security device that monitors and
personal data manages incoming and outgoing network traffic. Its goal
Pharming: Manipulation of DNS (Domain Name System) is to separate an internal network from other networks by
to redirect users to fraudulent websites, often to steal filtering data according to established criteria. It assists in
personal data preventing malware, unauthorized access, and other
Smishing: Phishing attacks carried out through SMS or network risks.
text messages
6. Two-factor authentication:
Vishing: (aka voicemail phishing) Phishing attacks carried
out through voice messages to trick users into calling the A security mechanism that requests two different kinds of
telephone number contained in the message identification from users to confirm their identity. To
Viruses and malware: Viruses are program codes that can provide additional protection outside of just a username
replicate/copy themselves to cause data loss or and password, 2FA was created. Typically, it combines
corruption. Malicious software designed to disrupt, something that uniquely identifies a user, like biometric
damage, or gain unauthorized access to computer data, with something the user has, like a smartphone and
systems or networks a token or something they know, like a password.
Card fraud: Unauthorized use of credit or debit card
information for fraudulent purposes caused by shoulder 7. User ID and password:
surfing, card cloning, or keylogging.
A typical authentication technique uses a password plus a
Protection of Data secret code (user ID) to identify. To strengthen data
security, user IDs and passwords restrict access to only
Multiple techniques are implied for the protection of data, authorized users. Using secure passwords and changing
inclusive: them frequently is critical to ensure security. When
1. Biometrics: creating passwords, it is advised to utilize a mix of
uppercase, lowercase, digits, and special characters.
Individuals' distinctive physical or behavioural traits, such
as fingerprints, faces, or irises, can be used for access
control and verification. Since biometric data is hard to 9. Audience
fake or duplicate, it offers a more secure form of
identification. 9.1. Audience Appreciation
2. Digital certificate:
To express gratitude and value for the users by providing
A digital record that attests to a website's reliability and helpful and relevant information, fostering positive
integrity. A digital certificate is used to provide safe experiences, and contributing to their understanding and
communication and to build confidence between parties. learning.
Identifier data, the entity's public key, and a third party's
digital signature are frequently found in digital Planning ICT Solutions
certificates.
The first step to building effective ICT solutions is
3. Secure Socket Layer (SSL): identifying and understanding the intended audience's
needs. These needs can be functional, like processing
a protocol that creates a secure connection between a information, or aesthetic, like a visually appealing
client computer and a server. SSL ensures that interface.
information communicated between a server and client After identifying the needs, select the appropriate
stays private and cannot be intercepted or changed by technology and tools to create a solution. This choice
unauthorized parties. A website's identification for it is the depends on factors like the complexity of the task, the
S at the end of HTTP. budget available, and the technical expertise of the users.
An essential aspect to remember while designing ICT
4. Encryption:
solutions is to ensure they are user-friendly. This means
WWW.ZNOTES.ORG
CAIE IGCSE ICT
they should be intuitive to use, require minimal training, Other techniques include software product activation,
and have easy-to-understand instructions. which needs a unique code to be fully functional.
Additionally, ICT solutions should be accessible to all Given that pirated software frequently cannot receive
users, including those with disabilities. This could involve automatic upgrades, which renders it less effective and
adding features like voice commands, larger text options, secure over time, automatic updates may also serve as a
or compatibility with assistive devices. kind of copyright protection.
Once the solution is created, it is crucial to test it to
ensure it functions as expected and fulfils the users'
needs effectively. 10. Communication
Analysing Audience Requirements 10.1. Communication with Other ICT
Designing an ICT solution requires an understanding of users Using E-mail
the target audience. The study should consider elements
affecting the audience's capacity to use the solution, like E-Mail
age, technical proficiency, and expertise.
The solution creator should know the audience's Uses:
requirements for information. This could serve as a
design cue for the data processing elements and the Email is a technique of sending and receiving messages
information architecture. and files via the Internet.
How the audience utilizes and consumes the content also It is employed in personal communication, business
influences the design. For instance, the answer should be communications, and marketing.
mobile-friendly if the audience accesses it mostly through Acceptable language must be used based on the email's
mobile devices. recipient, for example, professional when composing a
Finally, the designer should consider any unique work-related email.
requirements of the audience, such as visual or auditory Employers frequently establish requirements for
impairments. These requirements should be taken into professional language, substance, and email frequency.
account when designing the solution ensuring inclusivity. Email security is critical to preventing sensitive data from
being accessed or manipulated.
Netiquette is the proper conduct and politeness when
9.2. Copyright using email.
Don’t be abusive
What makes Copyright Necessary? Don’t send spam
Be clear and concise with your message
Copyright regulation is crucial to safeguard the rights of
Remember that posts are usually public and can be
developers and innovators.
read by anyone.
It stops software piracy, which is unauthorised use,
Always check your spelling and grammar.
replication, or distribution. Respect people's privacy and do not discuss or publish
It guarantees developers receive compensation for their
information that might embarrass somebody.
efforts, fostering additional innovation and development.
Forgive people’s mistakes
Do not use CAPITAL LETTERS to highlight comments
Principles of Copyright in a Computer Software
Do not plagiarize
Do not use too many emoticons, as they might annoy
Copyright law prohibits the unauthorized copying,
your readers.
distribution, or modification of software.
Email groups enable mass communication to a specific
It also includes the End-User License Agreement (EULA),
group of subscribers.
which outlines what the software can and cannot be used
for Guidelines set by employers:
Violations of these principles, such as software piracy, can
lead to legal consequences. It is up to companies to decide if personal emails should
be permitted on their systems
Preventing Software Copyright Violation Companies may specify which company devices are
allowed to be used
Software developers employ various copyright protection There needs to be a company standard style when
strategies, such as Digital Rights Management (DRM). sending emails
Due to DRM methods and systems, copyrighted works are It must be made clear what email content is not permitted
subject to usage, modification, and distribution Employees should be told only to use their accounts when
restrictions. sending emails
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
An intranet's main goal is to make it easier for platforms where users can connect with others and
employees to communicate, work together, and share share content
information. include platforms like Facebook, Twitter, Instagram,
Extranets make it easier for external stakeholders to and LinkedIn
collaborate and communicate with a company. It require users to create a profile and allow them to
enables the organization and its reliable clients or share text, images, videos, and links
partners to share information, documents, and facilitate interaction, collaboration, and information
resources securely. sharing on a large scale
privacy settings allow users to control who can see
Many use the terms “Internet” and “World Wide Web” their content
interchangeably. However, they can’t be used in the same
context: The Functionality of the Internet
- The internet refers to the global network of computers and
other devices connected through routers and servers. Internet service providers (ISP): A company that provides
However, the World Wide Web is a collection of websites and internet access. Typically, a monthly fee is charged for
webpages accessed via the Internet. this service. Users' accounts are created when registering
with an ISP and acquiring login information such as user
Blog:
ID and password.
It is a website or section of a website that continually
Uniform Resource Locator (URL): The address of a web
shares new information, frequently written informally page on the WWW. It is a text-based address that uniquely
or conversationally, similar to a journal.
identifies the location of any resource available on the
usually presented in a reverse chronological manner
internet. The three main components are:
usually managed by individuals or small groups
Protocol:
allow for reader comments, facilitating some level of
It is the communication protocol used to transfer data
discussion between the client and the server
often focus on specific topics, such as food, travel,
E.g. HTTP, HTTPS, FTP, and others
fashion, technology, or personal experiences
Domain:
also serve as a platform for sharing opinions or
it is the name of the server where the resource is
insights
located
Forum:
it can be a name or an IP address
an online discussion site where people can hold
Webpage/file name:
conversations in the form of posted messages
it is the location of the file or resource on the server
often organized around specific topics or interests and
it can contain the name of the file or directory where
divided into categories known as threads
the resource is located
primarily focused on peer-to-peer interaction A URL looks like this:
may require users to create an account before posting
protocol://domain/path/filename
can be moderated or unmoderated
E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is a
A moderated forum is an online discussion forum
URL that consists of the HTTPS protocol, the domain
in which an administrator checks posts before they
name "www.hoddereducation.co.uk", the path is
are allowed to be posted.
“IGCSE” and the filename is “ICT”
The internet is essentially a huge unmoderated
A hyperlink is a word/phrase/image which references
forum. No one ‘owns’ the internet, and it is
data that the reader can follow by clicking or tapping,
essentially not policed.
usually taking you to another web page
Wiki:
A web browser is a software application used to locate,
a type of website that allows users to add, remove, or
retrieve, and display content on the WWW, including web
edit content
pages, images, video, and other files
designed to facilitate collaboration and knowledge
sharing from many people Use of Search Engines
holds information on many topics which can be
searched There are two fundamental methods for obtaining
posts are not in chronological order information via the Internet. The first method is to enter the
structure is determined by the content or its users URL if you know the website's address. If you don't know
The most famous wiki is Wikipedia, an online where to look, the second option is to employ a search engine
encyclopedia to locate the information you seek.
changes can be tracked and reverted if necessary,
and the content is usually written in a neutral style Advantages of using the Internet to find information
Social networking: information tends to be up to date because it is
quicker and easier to amend
WWW.ZNOTES.ORG
CAIE IGCSE ICT
The Internet has vast amounts of information Evaluating Information Found on the Internet
searching for information using a search engine is fast
and easy Although the internet provides much information, not all
people can look for information in the comfort of their are genuine or dependable.
own home Consider the source's reputation and trustworthiness
information on the internet is essentially free of when determining the information's dependability.
charge Check the accuracy of information by comparing it to
webpages may have multimedia elements, making other reliable sources.
learning more interesting Assess whether the information is skewed, keeping an
Disadvantages of using the Internet to find information eye out for views pushing a particular point of view.
it isn’t regulated; anything can be posted Check if the material is current, as obsolete information
always the risk of accessing inappropriate websites might be deceptive.
too easy to be distracted by the many distractions
available on the internet Internet Protocols
Some research skills are lost when using the internet,
as search engines do all the work for you. Protocols are rules on which the sender and recipient agree
when data is exchanged between devices.
Speed of Searching 1. Hypertext transfer protocol (HTTP): when a web page is
being accessed, entering http:// at the front of an address
Search engines may scan billions of online pages to locate tells the web browser that ‘HTTP rules’ for communication are
matches to your search query in a fraction of a second. to be obeyed.
Your internet connection and the effectiveness of the 2. Hypertext transfer protocol secure (HTTPS): A secure
search engine's algorithms influence the speed. version of HTTP that encrypts data for security.
3. File transfer protocol (FTP): network protocol used when
Amount of Information transferring files from one computer to another over the
internet. It is similar to HTTP, but the protocol specifically
Because search engines can deliver a deluge of transfers files.
information, utilising particular and relevant search 4. Secure sockets layer (SSL): a protocol that allows data to be
phrases is critical. sent and received securely over the internet.
Adding quotation marks for specific phrases, "+" signs for
required terms, and "-" signs for omitting terms can help Risks of Using the Internet
narrow the search.
Inappropriate and unlawful content: The internet may
Finding Relevant and Reliable Information attract people to potentially dangerous or illegal
materials.
The search engine algorithm determines the relevancy of Data restriction: Parental, educational, and ISP
information by considering parameters such as keyword restrictions can all be used to restrict access to specific
frequency & page quality. information or websites.
Reliable information is often obtained from recognized
sources such as educational, government, or well-known
industry websites.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
1. Document Production
1.1. Word Processing (MS Word)
Serif – with flicks, e.g. Cambria
Sans-serif – without flicks, e.g. Calibri
One part of the document is 1 column, and the rest is in
two columns. a → section break.
the option All Caps
When you want to move text to the next column, a →
To set certain bullets to a list style → click on format →
column break.
click on Numbering → Bullets tab → choose the required
To force all further text onto the next page → page break
option
A widow= single line that appears on the next page or
To indent text for a style → click on format → Paragraph
column, separated from the rest of the paragraph
and input required indents under the Indentation section.
An orphan = a single line that appears on the previous
Choose hanging indents to indent the whole paragraph
page or column, separated from the rest of the
and the first line indents to indent only the first line of a
paragraph.
paragraph.
To add page numbers in the header/footer ------→ Place
your cursor where you want to put the number → Go to
insert tab → Quick parts → Select Numbering category 3. Mail Merge
→ Select Page in field names → Click Ok
Add the file size/name (including file path) → click on
Quick Parts in the Insert tab → click on Field → select File 3.1. Mail Merge
Size or File name. For file path →, check the box to include
file path. For file size →, choose whether Kilobytes or Create a master document, which is mainly given as a
Megabytes. source file
Include date → click on Date & Time in Insert tab → choose In the master document, click on the Mailings tab
an appropriate format as specified. (If the date/month In the start mail merge section, click on select recipients
format is flipped →, change your region/ language → select use an existing list → choose the source file
settings on your computer to the United Kingdom.) Select records to be used, filter if necessary
Update fields if required (select auto-update while
inserting fields.)
2. House Styles
2.1. House Styles
Insert merge fields where indicated with chevrons, i.e.
Remember to follow all the instructions given to avoid Place automated current date and/or time, as well as your
losing easy marks name, centre number and candidate number where
Type in the name of the style exactly as it is in the paper specified. Ensure the date is in the correct format
Click on the drop-down arrow in the Styles section → specified.
select Create a new style
Always base your styles on the Normal font
S etting the line spacing → click on format → then
paragraph → select required options
From the same tab, you can change the spacing before
and after the paragraph
Spell-check and proofread the document.
Setting all capital letters → click on format → font → tick Save the master document, and click finish and merge.
Preview results and ensure that they look as required.
While printing:
Check all merge fields are placed
Field codes are visible if necessary. (Go to Advanced
settings so they are displayed when printing. Proof of
WWW.ZNOTES.ORG
CAIE IGCSE ICT
date inserted may be asked, right-click and toggle field Average of fields in a report =AVG(\[Field_name\])
codes, or just use the shortcut Alt+F9.) Minimum of fields in a report =MIN(\[Field_name\])
Maximum of fields in a report =MAX(\[Field_name\])
WWW.ZNOTES.ORG
CAIE IGCSE ICT
When you are using another file as a source file (ego for a
LOOKUP function), make sure it is open until the end, or
WWW.ZNOTES.ORG
CAIE IGCSE ICT
else the spreadsheet will no longer be able to access that DESCRIPTION FORMULA
data. =IF($B$1:$B$8=A1,”A”,
To make a cell reference absolute, press F4 while IF($B$1:$B$8=A2,”B”,
highlighting it IF($B$1:$B$8=A3,”C”,D)))IF
Nested IF the value in the range equals
DESCRIPTION FORMULA
A1 then write A, if it equals A2
Add, Subtract, Multiply, Divide =A1+B1 write B, A3 write C and none
SUM = Adding a range of of them D
=SUM(A1:A4)
numbers =AVERAGEIF($D$4:$D$64,G3,
Average IF – it searches for
AVERAGE - Find the average =AVERAGE(A1:A4) $E$4:$E$64)$D$4:$D$64 is
criteria and makes an
MIN - Find the low value =MIN(A1:A4) the range, G3 is the
average of the range
MAX - Find the highest value =MAX(A1:A4) criteria, $E$4:$E$64 is the
according to the criteria
average range
COUNT - Finding how many
=COUNT(A1:A4) SQRT – Square root of a
numbers are in a range =SQRT(B3)B3 is the number
number
COUNTA - Counting the
=COUNTA(A1:A4)
number of items in a range
INT - Converts to the lowest
=INT(A1) 7. Website Authoring
whole number
=ROUND(A1,2) The 2 is the
ROUND - Rounding numbers
number of decimal places 7.1. HTML
ROUNDUP - Rounding =ROUNDUP(A1,2) The 2 is the
Anchors: help navigate throughout a webpage
numbers up number of decimal places
Highlight the destination of the anchor, and set a
ROUNDDOWN - Rounding =ROUNDDOWN(A1,2) The 2 is bookmark
numbers down the number of decimal places You can use
=VLOOKUP(A1,$B$1:$C$8,2)A tags in your code around this text
1 is the cell to <div id="top"> Destination text </div>
VLOOKUP - Looking up what check$B$1:$C$8 is the array Highlight the word or image that will be the hyperlink,
particular values mean from to look in2 is column 2 click insert a hyperlink, and type the address of the
a table arranged vertically from $B$1:$C$8 meaning website, the bookmark, or the email address provided
return the value in column 2 in in the respective places.
that section. If the link needs to open in a new window, select New
=HLOOKUP(A1,$B$1:$G$2,2) Window from the target frame. This will give you a
A1 is the cell to target setting of "_blank."
HLOOKUP - Looking up what check$B$1:$G$2 is the array
particular values mean from to look in2 is row 2
a table arranged horizontally from $B$1:$G$2 meaning
return the value in row 2 in
that section.
=SUMIF($B$1:$C$8,A1, $D$1
SUMIF – adding up specific :$D$8)Checks if any cells
values in a range in $B$1:$C$8 = A1 and if they
do then it adds them together
=COUNTIF(A2:A4,">4") Checks
COUNTIF - Counts the that cells have a value greater
number of cells in a range than 4=COUNTIF(A2:A4, A1)
that satisfy the given criteria Checks that the cells are
equal to the value in cell A1
=IF($B$1:$B$8=A1,”A”)IF the
IF – Deciding what will go into
value in A1 appears in the
a cell
range of cells then write A
If there are specified dimensions for a table, use the table
properties to set these values.
Check the code to ensure that the table is not set to 100%
width, if there are other values given.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
Tables 11.2 Explain the need to reduce file sizes for storage or
transmission:
Tables have many attributes to help style them Smaller files upload and download faster than larger
Cell padding: creates space between text and cell ones and thus are better for transferring data on the
border internet and between computers and other devices
Cell spacing: creates space between individual cells like printers.
Borders 13 Explain why headers and footers are needed:
Background colour: background tags in the tables only Headers and footers ensure each page has all the
apply to the tables. required information like the page numbers, company
Individual td or th headings can also be specified in CSS logo and name etc. It makes the document more
reliable, professional, and consistent, as the
Table tags format information appears on every page. This saves time
cell padding Table { padding :40px;} and reduces errors as they are only typed once.
cell spacing Table { spacing : 30px;} 14 Explain what is meant by corporate branding/house
Table { border-width:3px;} style:
Table { border-color: #000098;} It refers to a specific style of fonts and formats used in
borders the making of ICT solutions by organisations.
Table { border-style: solid;}
Table { background-color: #009499;} 14 Explain why consistent styles are required:
Consistent styles enable users to associate a
td { font-size: 3;}
particular organisation with a style. They look
Td/th tags td { font-family: Calibri;}
professional.
td { color: #000000;}
15.1 Explain why the automated suggestions given by
table { width:50px;} spell check software do not always give the correct
Dimensions
table { height:60px;} response:
Some words, e.g. proper nouns, are not found in the
body { background-repeat: no-repeat;} dictionary. This makes spell checkers less efficient.
body {background-position: top/left/right/bottom;} Spell checkers do not identify names and places
h1 {text-align: left/right/top/bottom;} 15.1 Explain why validation checks must be appropriate to
the data that is being checked:
An inappropriate check can lead to error messages
8. Editing Images and altered data, as it may accept or reject wrong
data.
8.1. Editing Images 15.2 Describe the importance of accuracy and the
potential consequences of data entry errors:
To save a picture with 8 bits - of colour depth, save it as a Accurate data ensures the results obtained by the
gif processing of data is relevant, which is essential to the
Open it in Paint and save it as usability of the model
To compress the size of a picture, open it in the picture 15.2 Define the term verification:
manager A way of preventing errors when data is copied from
Edit picture one medium to another
Compress pictures 15.2 Describe visual verification:
Choose the most suitable option Visual comparison of data entered with a data source
To change the colour options of a picture, use picture Checking for errors by comparing entered data on the
manager screen with the data in the original document (not the
Edit picture same as proof reading)
Colour 15.2 Describe double data entry:
Enter data twice and compare them either after data has
9. Answers to Theory been entered or during the entry process.
WWW.ZNOTES.ORG
CAIE IGCSE ICT
WWW.ZNOTES.ORG
CAIE IGCSE ICT
What if: changing values in cells to see how the CSS files have a “.css” extension
outcome of formulas change 21.3 Explain the hierarchy of multiple attached
20.2 Explain the need to test a model before it is used stylesheets and in-line styles within a web page
Reduces the number of possible errors when using Internal CSS have more preference over Inline CSS.
real data Inline CSS overrides externally attached stylesheets.
21.1 Identify and describe the three web development If several external stylesheets are attached to one
layers web page, the stylesheet attached last (at the bottom
Content layer: Holds the content of the webpage of that part of the code) is given preference (over the
structure. other ones). Priority increases as you go down a list.
Behaviour layer: scripting language of a web page or 21.3 Explain why relative file paths must be used for
an individual element the attached stylesheets
Presentation layer: responsible for the formatting of a They should be attached using relative file paths, as
webpage(s) or elements (using a stylesheet). they are stored along with the webpage since they are
21.1 Understand the function of: stored in the same folder.
Content layer: enter the content of a web page 21.4 Explain how to upload and publish the content of a
structure website using FTP
Behaviour layer: enter scripting language to a web
page or an individual element Used to upload website files to the web hosting space. To
Presentation layer: format whole web page(s) or upload these files successfully, the user needs:
individual elements FTP client software
21.2 Explain why tables are used to structure elements All files in one folder
within a web page Host Name/URL/IP address for FTP
Host port to be used for upload
Tables make the basic structure of a webpage and Username and password
organise page layout.
21.4 Create a test plan to test a website including web
21.2 Define and understand the terms relative file path page elements are visible, navigation within/from a web
and absolute file path page
Relative file path: A path referring to a file in the same Open the webpage in different browsers to check that
directory relative to the page the reference is made in. all elements appear as they should.
Absolute file path: The full path of a file which is not Click all hyperlinks to ensure that they direct users to
relative to anything. the correct pages, using functional testing. Check that
21.2 Explain why absolute file paths must not be used for both internal and external links are functional. Check
hyperlinks to locally saved web pages/ objects that fonts and background colours are appropriate to
Absolute paths always include the domain name of the the purpose of the website and its users (audience)
website Perform user testing on a group from the target
These should not be used to refer to locally saved web audience, gain feedback from their usage, and use it
pages as the computer the webpage is stored on (the to improve the website before publishing it
server) is not the same as where the webpage was 21.4 Justify the choice of test plan
developed, and an absolute file path would point to the The test plan used to test a webpage must be justified
wrong address. based on the tested elements. e.g. If hyperlinks are
21.3 Explain what is meant by the term cascading being tested, it checks if all the hyperlinks are
stylesheets redirecting the user to the correct webpage/ section of
CSS (cascading stylesheet) is a text-based language the webpage.
which is attached to web pages to set their format.
WWW.ZNOTES.ORG
ZNOTES.ORG
CAIE IGCSE
MATHEMATICS
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE MATHEMATICS
1. Number
Natural numbers:
used for counting purposes
A∩B is shaded A∪B is shaded
all possible rational &irrational numbers
Integer: a whole number ⊂‘is a subset of’
Prime numbers:
divisible only by itself and one
1 is not a prime number
Rational numbers: can be written as a fraction
Irrational numbers: cannot be written as a fraction e.g. π
Cube numbers: made from multiplying a rational number
ξ = {a, b, c, d, e} A’ is shaded
to itself thrice.
b∈X
Reciprocals: A number made by raising a rational number
to -1, or 1 over that number
of elements in A
1.4. Indices
Standard form:
10 4 = 10000
10 3 = 1000
10 2 = 100
Prime Factorization: finding which prime numbers 10 1 = 10
multiply together to make the original number 10 0 = 1
10 −1 = 0.1
1.3. Sets 10 −2 = 0.01
10 −3 = 0.001
Definition of sets e.g. 10 −4 = 0.0001
A = { x : x is a natural number} 10 −5 = 0.00001
B = {( x , y): y = mx + c } Limits of accuracy:
C = { x : a ≤ x ≤ b}
D = { a, b, c , … } The degree of rounding of a number
E.g. 2.1 to 1 d.p 2.05 ≤ x < 2.15
Set representations: Finding limits when adding/multiplying: add/multiply
respective limits of values
Finding maximum value possible when
dividing/subtracting: max value divided by/minus min
value
Finding minimum value possible when
A∩B is shaded A∪B is shaded dividing/subtracting: min value divided by/minus max
value
⊂‘is a subset of’
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
$22.50 : 6.75KD
Map scales: using proportion to work out map scales
1km = 1000m
2. Algebra & Graphs
1m = 100cm
1cm = 10mm 2.1. Factorisation
Direct variation: y is proportional to x
Common factors:
y∝x
3x 2 + 6x
y = kx
3x(x + 2)
Inverse variation: y is inversely proportional to x
Difference of two squares:
1
y∝
x 25 − x 2
k
y=
(5 + x)(5 − x)
x
Group factorization:
1.6. Percentages
4d + ac + ad + 4c
Percentage:
Convenient way of expressing fractions 4 (d + c ) + a(c + d)
Percent means per 100
(4 + a)(c + d)
Percentage increase or decrease:
Trinomial:
Actual Change
P ercentage increase = × 100
Original Amount x 2 + 14x + 24
Simple interest:
x 2 + 12x + 2x + 24
PRT
I= x (x + 12 ) + 2 (x + 12 )
100
2a
Distance
Speed =
Time When question says, “give your answer to two decimal
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
ax 2 + bx + c = 0 - Quadratic Formula
e.g. x 2 − x − 6 = 0
Factorize a out
Where a = 1 , b = −1 , c = −6
Plug the numbers in the Quadratic Formula:
a (x 2 + x) + c = 0
b
a −b ± b2 − 4ac
x=
2a
2 Therefore:
a ((x + ) − 2) + c = 0
b b2
2a 4a (−1 )2 − 4 (1 ) (−6 )
− (−1 ) ±
x=
2 (1 )
b 2 b2
a (x + ) − +c=0
2a 4a
x1 = 3
2
b2 − 4ac
a (x + ) =
b x 2 = −2
2a 4a
b b2 − 4ac x 2 + 10x + 5 = 0
x+ =±
2a 4a2
(x + 5 )2 − 5 2 + 5 = 0
b ± b2 − 4ac 2
x+ =
2a
4a2
(x + 5 ) − 20 = 0
b ± b2 − 4ac x + 5 = ± 20
x+ =
2a 2a
x = −5 ± 20
−b ± b2 − 4ac
x=
2a
Answer is:
Standardized form: x 1 = −5 +
20 , x 2 = −5 −
20
y = ax2 +bx + c
Complete Square form: 2.3. Reciprocal Graphs (Hyperbola)
y = (x + a)2 +b (Where axis of symmetry is x =
−a) Standardized Form:
To find turning point of quadratic equation, complete y = ax
down
x 2 = −2
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
Using differentiation
dy
dx gives you the gradient of the curve at any point in
terms of x
dy
When y = xn , dx
= nx n−1
Stationary/ turning point: dy
dx =0
st ′
1 Derivative = dy
dx = f ( x )
d2 y ′′
2nd Derivative = dx2 = f (x )
2.8. Inequalities
Standardized form:
y = a (b )x Solve like equations
Properties: Multiplying or dividing by negative ⇒ switch sign
a is the y-intercept y
Asymptotes are lines that a curve approaches, but −3 ≥ −7
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
3.2. Congruence
Gradient = speed
SSS (Side – Side – Side) rule: All the three sides of the
triangles must be equal
2.12. Speed-Time Graphs
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
Rectangle:
Trapezium:
Kite:
3.5. Construction
Constructing triangles:
3.4. Quadrilaterals
Rectangle:
Opposite sides parallel/equal
all angles 90°
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
3.6. Symmetry
Line of symmetry: Divides a two-dimensional shape into
two congruent (identical) shapes
Plane of symmetry: Divides a three-dimensional shape
into two congruent solid shapes
Properties of circles:
Equal chords are equidistant from the centre
The perpendicular bisector of a chord passes through
the centre
Tangents from an external point are equal in length
∘
Internal angles = 180 ∘ − 360
n
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
1
Trapezium= 2 (a + b) h
Circle= πr 2
Sector= πr 2 × θ
360
Sphere
Surface Area = 4πr 2
Volume = 43 πr 3
Hemisphere
Surface area = 3πr 2
Volume = 23 πr 3
Kite
pq
Surface area = 2
4.3. Units
3.8. Circle Theorem
Volume:
4. Mensuration
4.1. Area
Parallelogram = b × h or AB sin θ
Triangle= 12 b × h
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
Capacity:
f(x) = 1 𝑓(𝑥) = 𝑥 𝑓( 𝑥) = 𝑥2
Connecting volume and capacity: f(x) = x3 f(x) = 1/x f(x) = 1/x2
1ml = 1cm3
1kl = 1m3
Mass
Density = Volume
6. Trigonometry
x2 − x1
Equation of Line:
y = mx + c
Find the gradient, m 6.2. Pythagoras Theorem
Find the y -intercept, c
To find hypotenuse
a2 + b2 = c 2
Midpoint of Graph:
x 1 + x 2 y1 + y2
( , )
2 2
2 2
(x 2 − x 1 ) + (y2 − y1 )
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
Angle of depression:
Angle below the horizontal line.
∘
cos (x ) = cos (360 − x)
1
Area of a triangle: 2 ab sin c
6.3. Ratios
Right angled triangles:
opposite
sin x = hypotenuse → SOH
adjacent
cos x = hypotenuse → CAH
tan x = opposite
adjacent → TOA
A B C
= =
sin a sin b sin c
Cosine rule
To find the angle given 3 sides
b2 + c 2 − a2
cos a =
2bc
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
a2 = b2 + c 2 − 2bc cos a
length of image
Scale factor =
length of object
time
7.2. Transformation
Reflection (M):
When describing a reflection, the position of the
mirror line is essential
Rotation (R):
The centre, angle and direction of rotation are needed
to describe a rotation
A clockwise rotation is negative, and an anticlockwise
rotation is positive
The OR Rule:
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
For exclusive events A and B Take the required number from the table and divide
P(A or B) = P(A) + P(B) by the sum of all values in the row/column of the
condition provided.
Independent events: Remember: P(A|B) and P(B|A) are not the same
Two events are independent if occurrence of one is
unaffected by occurrence of other
The AND Rule:
9. Statistics
P(A and B) = P(A) × P(B)
9.1. Histograms
8.3. Conditional Probability
Probability of an event (A), given that another (B) has
already occurred
Symbol : P (A∣B)
9.2. Averages
Calculate using Venn diagram:
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
Interpretation:
Median, quartiles and extreme values can be found by
reading on the scale of y-axis
Short boxes mean low IQR and vice versa (2), (3)
Long whiskers mean a lot of extreme values and vice
versa (1) 9.7. Pictograms
Difference in position of boxes represents if data in
one set is overall higher or lower than another data Data is represented in pictures
set. (3) and (4) A key is given to represent the value of a picture.
Variation in lengths of different sections and position
of median show how evenly the data is spread,
compared to other data sets (1) E.g. = 5 people
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
WWW.ZNOTES.ORG
ZNOTES.ORG
CAIE IGCSE
MATHEMATICS
SUMMARIZED NOTES ON THE MODEL ANSWERS SYLLABUS
CAIE IGCSE MATHEMATICS
Part (2)
1. Numbers
1.1. Integers, HCF/LCM, Prime numbers,
Sig Figs, Dec Places
Question 1:
Find the lowest common multiple (LCM) of 36 and 48. (2
marks)
Solution:
We can do this by writing out all of the multiples of the two
numbers. The multiples of 36 are:
1.3. Square and Cube Numbers
36, 72, 108, 144, 180, …
Question 2:
The multiples of 48 are 3
Simplify (32x 10 ) 5 (2 marks)
144 3
32 5 × x (10× 5 )
3
1
1.2. Sets and Venn Diagram Note that 32 = 2 5 hence 32 5 = 2
3
= (32 5 ) × x 6
1
Question 2:
29
0.3 2̇ =
90
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
Question 5: 3 16
22 ×
Write the following in order of size, smallest first: π, 3.14, 7 , 2 3
3.142, 3 (2 marks)
We now can multiply the numerators and denominators.
Solution:
The order of size can be found by writing all of these numbers 3 × 16 48
out to the same number of decimal places, and then
= =8
2×3 6
3 ⋅ 9 × 29 ⋅ 3
4 × 30
Do the calculations.
Question 6:
Write 2.8 × 10 2 as an ordinary number. (1 mark) 2 × 30 60
=
Solution: 6 6
We can write 2.8 x 102 as an ordinary number like this: 2.8 x We get the final answer:
102 simply means 2.8 x 100
10
2.8 × 100 = 280
1.9. Bounds
1.7. Operations of Fractions & Decimals
Question 9:
Question 7: An equilateral triangle has sides of length 16.1 cm, correct to
Show that the nearest millimetre. Find the lower and upper bounds of
the perimeter of the triangle. (2 marks)
1 3 Solution:
1 ÷ =8
2 16
Question 10:
3 16
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
= 100cm)
3 1
− 0.5 − 3
distance = 540 m = 4 4
= =
3 −1 − 3 3
2 × 2
× 2
2
distance = 0.54 km − 3
=
3
Part (b):
Multiply the area by 10 000 to get the area in square
1.13. Time
centimeters.
(1m2 = 100cm x 100cm= 10 000 cm2) Question 13:
A train leaves Zurich at 22 40 and arrives in Vienna at 07 32
area = 644 000 000 cm 2 the next day. Work out the time taken. (1 mark)
Solution:
Divide by the scale factor 20 0002to get the area on the map. We can count the time it takes to get us to the Vienna. Add 20
(Note: Area scale factor is the square of the length scale minutes to take it to the next hour:
factor)
22 : 40 + 20m = 23 : 00
644 000 000 cm 2
area on map = 2 Add 1 hour to take it to the next day (24:00 is equivalent to
(20 000)
midnight, or 00:00)
area on map = 1.61 cm 2
23 : 00 + 1hr = 24 : 00 (= 00 : 00 )
1.11. Percentages Now add 7 hours and 32 minutes to get to the desired time
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
15.9128 − 15.2978
15.9128
× 100 = 3.8648
= 16 − 36x 2 + 48x − 16
x + i = x (1 + t)
R
100
= −36x 2 + 48x
Where:
= 12x(4 − 3x)
x = Principal investment value
So, the answer is:
i = Interest gained
R = Interest rate (%) 12x(4 − 3x)
t = Investment time
Question 18:
20.1 Factorise completely.
1+ = 1 + 0.06
a) 2a + 4 + ap + 2p (2 marks)
x
20.1 b) 162 – 8t2 (2 marks)
x= Solution:
0.06
Part (a):
x = 134
(a + 2 ) (p + 2 )
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
We can check this by expanding it back out: Solve the simultaneous equations. (3 marks)
ap + 2p + 2a + 4 0.4x – 5y = 27
Part (b): 2x + 0.2y = 9
We can start off by factorising out the common factor of 2
Solution:
2 (81 − 4t2 ) Rearrange one of the equations to get just x or just y on one
side:
Then we can see that this is the difference of two squares
0.4x = 27 + 5y
= 2 (9 2 − (2t) )
2
÷ 2x (2 marks)
Solve:
Solution:
To simplify the equation, we use the fact that 25.2y = −126y = −5
x a ÷ x b = x a−b Substitute your answer into one of the equations:
Hence: 2x − 1 = 9
5 32 1 −5 5 1 5
x ÷ x 2 = ( ÷ ) x 2 − 2 = x4 Solve for x:
3 −5
8 2 8 2 4
2x = 10x = 5
So, the answer is:
1.25 x4 = 1 14 x4
So the answer is:
x = 5, y = −5
2.4. Linear equations
Question 21: 2.6. Linear inequalities
Solve the equation. (2 marks)
Question 23:
5 – 2x = 3x – 19 Solve the inequality. (2 marks)
Solution: 3x − 1 ≤ 11x + 2
5 − 2x = 3x − 19 Solution:
To solve the inequality 3x − 1 ≤ 11x + 2 we must
Add 2x to both sides of the equality: rearrange for x .
5 = 5x − 19 3x − 1 ≤ 11x + 2
Add 19 to both sides: Hence we get
5x = 24 3
x≥−
8
Question 24:
x = 4.8 y = x 2 + 7x – 5 can be written in the form
y = (x + a)2 + b.
2.5. Simultaneous Linear Equations Find the value of a and the value of b. (3 marks)
Solution:
Question 22: 2
If we expand (x + a) and collect terms we get
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
→ a = 72 or 3.5
3 + a = 16
CFx 0 (units) : a2 + b = −5 → a = 13
49 Hence
→ + b = −5
4
nth term = 3n + 13
20 49
→b=− −
4 4 Part (b):
3 f (n)
2.8. Graphical inequalities
If we substitute in some values, we can see that
1 = 3 f (1)
→ f (1 ) = 0
3 = 3 f (2)
Question 25: → f (2 ) = 1
Find four inequalities that define the region, R, on the grid. (4
marks) Hence
Solution:
The lines on the grid that border R are f (n) = n − 1
y≥3 1
t∝
u
x≥2
By adding a constant of multiplication, we can make this a
y>x proper equation:
k
2.9. Sequences and nth term t=
u
Question 26: We are given values for t and u, so we can rearrange and
Find the nth term of each of these sequences. solve for k.
a) 16, 19, 22, 25, 28, ... (2 marks)
b) 1, 3, 9, 27, 81, ... (2 marks) k
t=
Solution:
u
Part (a):
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
3 4 = k = 3 (2 ) = 6k = 6 1
f(x) = x − , x=
0
2x 2
u
We are asked to find t when u = 49. b) On the grid, draw the graph of y = f (x ) for –3 ≤ x ≤ –
0.3 and 0.3 ≤ x ≤ 2. (1 mark)
6 6
t= = c) Use your graph to solve the equation f (x ) = 1 (1 mark)
49 7
Speed = 105000mh −1
Part (c):
Next, we have to turn it into m/s We plot the line y=1 and find the x-coordinate of the point of
intersection.
Speed = 105000mh −1 ÷ (60 2 )
105000
Speed = ms−1
3600
From the graph, we can see that the x-coordinate of the point
175 is
Speed = ms−1
6
x = 1.3
Using the speed distance time relation
Part (d):
distance From the graph, we can clearly see that k = −1 , since for -2
speed =
time
k = −1
Rearrange for time
Part (e)(i):
6 Subtract (x-2) from both sides of the equation.
time = 40.3 ×
175
1
= 1.38 s (2dp) x− =2−x
2x 2
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
We can see that the right side of the equation is our original f (x ) = 5x + 7 g (x ) = 4
x−3
function.
Therefore, the left-hand side must be the straight line we are a) Find
looking for.
i. fg(1) (2 Marks)
ii. gf(1) (2 Marks)
y=2−x
iii. g -1(x) (2 Marks)
Part (e)(ii): iv. ff-1(2) (2 Marks)
We plot a line y = 2 − x and find the x-coordinate of the b) f(x) = g(x)
point of intersection with the original graph to solve 2x − 2
i. Show that 5x − 8x − 25 = 0 (3 Marks)
1
2x2 − 2 = 0
fg (x ) = 5g (x ) + 7
From the graph, we can see that the x-coordinate of the point,
20
and hence the solution to the equation = +7
x−3
2x − 2x12 − 2 = 0 is
20
x = 1.15 fg (1 ) = +7
1−3
Question 30: 4
gf (x ) =
a) Work out the gradient of the line L (2 marks) f (x ) − 3
Solution:
Part (a): 4
Gradient found by using =
5x + 4
y2 − y1 Part (a)(iii):
m=
1−0
y
c is the y-intercept which is given as 6 Add 3 to both sides
y = 2x + 6 4
x= + 3 = g −1 (y)
y
2.14. Functions 4
→ g −1 (x) = +3
x
Question 31:
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
Part (a)(iv): has a line of symmetry down its centre. This works for E, B
Inverse function applied to the function reverses its effect, so and A, so these 3 letters are the answer
Part (b):
f −1 f (2 ) = 2 Rotational symmetry is found by rotating the letter (from the
word ‘ZEBRA’) around an imaginary point, which we place on
Part (b)(i):
one of the corners ‘Order 2’ means that you could rotate the
We have
letter around the imaginary point and it would look the same
4 in 2 different positions (see diagram below)
5x + 7 =
x−3
(5x + 7) (x − 3 ) = 4
Expand
5x 2 + 7x − 15x − 21 = 4 The only letter in ‘ZEBRA’ for which we can do this is Z – so the
answer is Z
Rearrange and simplify forming a quadratic equation that
equals zero:
3.2. Construction
2
5x −8x − 25 = 0
Question 33:
Part (b)(ii): This diagram shows triangle ABC
We use the quadratic formula, given as
−b± b2 −4ac
x= 2a
(where ax 2 + bx + c = 0 )
Substitute for
a = 5, b = −8, c = −25
hence:
a) Using a straight edge and compasses only, construct the
8± 64 + 20 × 25 bisector of angle ABC. (2 marks)
x=
10
10
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
a) Work out the value of k. (2 marks) This diagram shows triangle ABC
5
DE = × AB
9
5
→k=9×
9 The order of rotational symmetry = 6
Part (b):
=5
A line of symmetry is an imaginary line where you can fold
Part (b): the image and have both halves match exactly. Hence by
The volume scale factor is inspection we can see that there are no lines of symmetry as
the image will differ if folded over any imaginary line. 6 such
2592
= 1.728
1500
hB =
6
× hA 3.5. Angles (Circles, Quadrilaterals,
5
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
Therefore
u ∘ = 38 ∘
Part (b)(ii):
As the length of BC and CD are equal, so the angles BAC and
b) A, B, C, D and E lie on the circle.
CAD are also equal.
Angle AED = 102° and angle BAC = 38°. BC = CD. Find the
Hence:
value of
i. u, (1 mark) v∘ = 38 ∘
ii. v, (1 mark)
iii. w, (1 mark) Part (b)(iii):
iv. x, (1 mark) Opposite angles of a cyclic quadrilateral add up to 180°.
In this case, the opposite angles are AED and ABD.
180 ∘ = 102 ∘ + w ∘
Subtract 102° from both sides of the equation.
c) In the diagram, P, Q and R
w = 78 ∘
lie on the circle, centre O. PQ is parallel to OR. Angle QPO =
m° and angle QRO = 2m°. Find the value of m. (5 marks) Part (b)(iv):
Solution: The interior angles of any triangle ABC sum to 180°.
Part (a)(i): The triangle BCD is an isosceles triangle, therefore angles
The sum of the interior angles of the two triangles (ABD and DBC and BDC have the same size 38°.
ACB) must equal each other (and 180°).
180 ∘ = ABC + BC A + C AB
ABD + ADB + DAB = ABC + ACB + C AB
180 ∘ = (w ∘ + u ∘ ) + x ∘ + 38 ∘
The angles CAB and DAB are actually one and the same as D
line on AC. 180 ∘ = (38 ∘ + ∘ 78 ∘ ) + x ∘ + 38 ∘
ABD + ADB = ABC + ACB Subtract 154° from both sides of the equation gives:
BD BC
=
AB AC
All length OP, OQ and OR must be equal as they are all radii of
Multiply both sides by 12cm. the circle. This means that angles POQ and QOR are
11 equilateral triangles.
BD = × 12cm Therefore, we know that the angle OPQ and OQP are the
16
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
As the lines PQ and OR are parallel, the sum of angles at P For the upper bound on height, we need the area to be as
and O must be the same as the sum of angles at Q and R. large as possible and the base to be as short as possible, i.e.,
ROP = 4m∘ 1
42.5 = × 8.5 × h
2
m = 36 ∘
3.6. Loci
Question 39:
The diagram shows a sector of a circle of radius 12 cm with
an angle of 135°. Calculate the perimeter of the sector. (3
marks)
Solution:
Question 37:
Here we can use fractions to calculate the perimeter of the
The diagram shows a rectangular garden divided into sector.
different areas. FG is the perpendicular bisector of BC. The
We know that a circle has a total angle of 360 ∘ , and here we
arc HJ has centre D and radius 20 m. CE is the bisector of
are looking at a sector of angle 135 ∘ . Hence the fraction of
angle DCB. Write down two more statements using loci to
the circle we are looking at is
describe the shaded region inside the garden. (2 marks)
Solution: 135 3
The shaded region is =
360 8
nearer to C than to B Now we want the perimeter of the total circle – this is an
more than 20m from D equation you should have memorised.
closer to CD than CB
perimeter = circumference = 2πr
4. Mensuration Now we only want the fraction we found of this total result, so
we can multiply the two.
1 3
A= × base × height total perimeter = π (12 ) +2 (12 ) = 52.3cm
4
2
Question 39:
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
(y2 − y1 )2 + (x 2 − x 1 )2
Here, that is
The diagram shows a solid hemisphere.
The total surface area of this hemisphere is 243 π. The
volume of the hemisphere is k π. Find the value of k. (13 + 5 )2 + (4 + 2 )2
2
[The surface area, A, of a sphere with radius r is A = 4πr .]
= 324 + 36
[The volume, V, of a sphere with radius r is V = 43 πr 3 .] (4
marks) = 18.97
Solution:
The surface area of a hemisphere (blue) is half that of a Part (b):
sphere plus the area of the circle (red): The gradient of the line can be found as
1 y2 − y1
× 4πr 2 + πr 2 = 3πr 2 m=
x2 − x1
2
13 + 5
=
4+2
=3
Equate this to the surface area of this hemisphere to find the
radius, r: Using the straight-line equation
r=9 y − 13 = 3 (x − 4 )
1 4 2 → y = 3x + 1
V hemisphere = × πr 3 = πr 3
2 3 3
Part (c):
Equate this to the volume of this hemisphere: Parallel means it has the same gradient. This new line, using
the same straight-line equation as before, is
2 3
πr = kπ
3 y + 5 = 3 (x − 0 )
parallel lines) A line joins the points A (–2, –5) and B (4, 13).
The midpoint is
a) Calculate the length AB (3 marks)
b) Find the equation of the line through A and B. Give your 4 − 2 13 − 5
answer in the form y = mx + c. (3 marks) M =( , )
2 2
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
→ x + 3y − 13 = 0 6
sin D =
( sin830 )
5. Trigonometry
D = sin−1 ( ) D = 22.0 ∘
6
( sin830 )
5.1. Bearings
All angles within a triangle add up to 180°, so
Question 38:
BC D = 180 − 30 − 22BC D = 128 ∘
A helicopter flies from its base B to deliver supplies to two oil
rigs at C and D. C is 6 km due east of B and the distance from Bearing from C to D = 360 − 90 − 128 = 142 ∘
C to D is 8 km. D is on a bearing of 120° from B.
55
tan (angle ) =
294
55
angle = arctan( )
294
angle = 10.6 ∘
So, applying the Sine rule:
Part (a)(ii):
8 6 We use the same formula as before, but now we subtract x
=
sin 30 sinD
294 − x
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
1 294 − x
∘
=
tan (24.8 ) 55
55m
= 294 − x
tan (24.8 ∘ )
Question 40:
a) Calculate the area of triangle ABC . (2 marks)
b) Calculate the length of AC . (4 marks)
Solution:
Part (a):
Area of a triangle is Calculate CH using Pythagoras’
1 C H 2 = 33 + 72
A= ab sin C
2
1 = 58
A= × 7 × 10 × sin 35
2
CH = 58
A = (3sf )
Now consider triangle CHE
Part (b):
Using the cosine rule
c 2 = a2 + b2 − 2ab cos C
c 2 = 34.3
c= 34.3
c = (3sf )
Find CE using Pythagoras’
5.4. 3D Pythagoras & Trigonometry C E 2 = 58 + 5 2
= 83
CE = 83
= 9.11
Part (b):
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
1
= c + (− c + a + b )
2
1
= (a + b + c)
2
Part (c):
PQ = − p + q
2
p = a +
b
We now need to calculate angle θ . To do this we can use the 3
tan relation 2 1
→ PQ = − a − b + ( a + b + c )
opp 3 2
tan θ =
adj 1 1 1
=− a− b+ c
2 6 2
tan θ =
5 6.2. Transformations (Reflection,
58
= 33.3 ∘
6. Matrices and
Question 43:
Transformations a) Draw the image of
i. shape A after a translation by (−1 3 ), (2 marks)
ii. shape A after a rotation through 180° about the point (0, 0),
6.1. Vectors
(2 marks)
iii. shape A after the transformation represented by the
matrix (1 0 0 −1 ) (3 Marks)
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
(1 00 −1 ) ( x y ) = (x − y )
team are circled below:
1 3 1
× =
3 4 4
The vertices of the new shape are: We need to add these probabilities together like so
(2,-1), (5,-1), (2,-2) and (3,-2). 1 3 1 1 2 3
Part (b): × + × + ×
3 4 3 4 3 4
5
=
6
Distributions
anticlockwise rotation.
This matrix becomes (0 −1 1 0 ) for x = 90
Question 46:
Deborah records the number of minutes late, t, for trains
7.1. Probability
Question 45:
The probability of a cricket team winning or losing in their first
two matches is shown in the tree diagram. Find the (a) Find the number of trains that Deborah recorded (2
marks)
(b) Calculate the percentage of the trains recorded that
arrived more than 10 minutes late. (2 marks)
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
12 × 2.5 + 26 × 2.5 + 15 × 5 + 10 × 5 + 2 × 10
4
80/5**=16**. (green)
The width of the forth group is 15 and the frequency is 60,
Where we have and even number of items, the median is the
so the height of the bar is
mean of the middle 2 numbers when put in rank order. Let
60/15**=4.0**. (orange)
the middle two scores be s2 and s3 . Thus, we have
s2 + 78
= 77
2
→ s2 = 76
s1 + 76 + 78 + 78 = 4 × 75
→ s1 = 68
8.4. Cumulative Frequency & Frequency
Density Diagrams
Final answer is
Question 49:
68, 76, 78, 78
The cumulative frequency diagram shows information about
the trunk diameter, in metres, of 120 trees. Find:
8.3. Grouped Data – Mean/Modal Class a) the inter-quartile range, (2 marks)
b) the 95th percentile, (2 marks)
& Drawing Histograms
c) the number of trees with a trunk diameter greater than 3
metres. (2 marks)
WWW.ZNOTES.ORG
CAIE IGCSE MATHEMATICS
8.5. Correlation
Question 50:
A company sends out ten different questionnaires to its
customers. The table shows the number sent and replies
received for each questionnaire.
on graph below)
a) Complete the scatter diagram for these results. The first
2.5 − 1
two points have been plotted for you. (2 marks)
= 1.5 b) Describe the correlation between the two sets of data. (1
mark)
Part (b): c) Draw the line of best fit. (1 mark)
95% of 120 is Solution:
0.95 × 120
= 114
Read this across and read off corresponding x value
Part (a):
Part (b):
It is positive correlation.
This is because as the number of questionnaires sent out
increases, the number of replies also increases.
Part (c):
The line of best fit is drawn in blue
Part (c):
Read off y-value for 3 metres and subtract this from total
WWW.ZNOTES.ORG
ZNOTES.ORG
CAIE IGCSE
GEOGRAPHY
SUMMARIZED NOTES ON THE THEORY SYLLABUS
CAIE IGCSE GEOGRAPHY
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Country of Destination
Advantages Disadvantages
Overcomes labour shortage. Competition for jobs
More pressure on healthcare, Implication of Dependents:
Dirty unskilled jobs done.
education and public services Too few Too Many
Brings expertise to the Taxes for public
Traffic congestion
country. Closure of child- schools from the
Young
Skilled migrants bring Less religious amenities for related services; fewer government and more
dependents:
innovations. immigrants jobs. child-related services
Cultural diversity and Discrimination and racial are needed.
enrichment problems Fewer consumers and
More people in the
Will work long hours for a low taxpayers in the future
Increased pollution working population in
salary. and fewer people to
future hence
take over the working
Boosts local economy. unemployment.
population.
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
\n \n
1.4. Population Density & Distribution
Keywords:
Population density: number of people per unit of area
(typically per kilometre square)
Sparsely populated: an area with low population
density An isolated, Buildings are
Densely populated: an area with high population building or a group strung along a line Buildings are
density of two or three of communication, grouped, initially for
Factors influencing: buildings, for example, a main defence or a
separated from the road, a river valley, common resource.
Sparse Population Dense Population next by 2 or 3 km. or a canal
Harsh areas;
Physical Site: describes the physical nature of where a settlement
mountainous or Flat relief
Factors is located – the actual piece of land
uneven relief
Extreme/harsh Situation: describes settlement about other settlements
Favourable climates and physical features around it – this determines whether
climates and bad
and good weather the situation will grow into a large city or remain a small
weather
town or village
Availability of natural
Factors influencing settlements:
High risk of flooding resources for industry
Wet point site: this has a good water supply
and manufacturing.
Drypoint site: this has less risk of flooding
Infertile soil Fertile land for crops
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Building material: availability of stone, wood, clay, etc. areas usually is agriculture & low-order services.
Defensive site: in a river meander or on a hill with This is because rural areas have fewer people,
steep-sided and commanding views poorer transport, poorer communication, less
Fuel supply: for heating and cooking technology, & the land is better used for other
Food supplies: land suitable for farming purposes.
Nodal points: where routes converge Urban Areas: tend to have many more functions
Bridging point: river shallow enough to build a bridge ranging from shopping to educational, transport,
Aspect: settlements often on the sunny side of a valley administrative, and residential functions; and more
Shelter: from cold prevailing winds and rain middle and high-order services.
Climate: A good climate attracts more people. Urban Sprawl: The spread or growth of an urban
Fertile land: brings in more farmers. area into the rural-urban fringe; provides mainly
Location: access to trades and raw materials. middle–order services
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Factories were built: Push factors from a rural area Pull factors from urban areas
As close as possible to the CBD but with enough space Poor transport/comms.
Next to canals and railways to transport materials
Next to rivers for cooling, power source or waste
Urban Wedges: urban growth is allowed to take place in
disposal
wedges, ensuring some green areas are protected
Next to land where lots of workers could live
throughout the city
Urban Growth in Urban Areas Housing density: increasing housing density means less
land will be destroyed
Urban Growth/Sprawl: rapid urbanisation due to building
in the rural-urban fringe and land reclamation Squatter Settlement
Problems of urban growth in urban areas: A squatter settlement is a rural residential area which has
For People For Environment developed without legal claims or permission to build on
Overcrowded Loss of vegetation the land.
Unable to obtain jobs/low pay Loss of habitats It has:
Pressure on schools/hospitals Impacts on food chains
Increased crime rates Pollution of rivers Extremely high home density
Extremely high population density
Difficulties of waste/litter Death of fish/other species
Houses built from mud for walls, iron for roofs
Traffic congestion Pollution of groundwater No electricity
Noise pollution Air/atmospheric pollution No running water or sewage
Lack of sanitation Rivers dry up Diseases spread easily
Poor quality of life The pungent smell of human waste
No infrastructure or privacy
Food shortage
Rural-Urban Migration
Push factors from a rural area Pull factors from urban areas
No/poorly paid jobs More jobs
Mechanisation of farming Good schools/healthcare
Agricultural products have
Good transport/comms
low prices
Poor schools/healthcare Reliable supply of resources
Lack of entertainment Better entertainment Feature Characteristics
Better quality & quantity of Lava Magma that reaches the surface
Poor housing quality Clouds of mixed poisonous gases and
houses Pyroclastic flow
Drought/famine pace and excitement ash
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Feature Characteristics
Snow and ice melt and combine with
Lahars
the ash, creating lahars.
Main vent Central tube through the volcano
Eruptions from other vents lead to the
Secondary cones formation of secondary cones on the
sides.
Bowl bowl-shaped basin at the top of
Crater
the volcano Low viscosity (runny lava) -
Viscous (thick) - andesitic lava
Magma chamber A large underground pool of magma basaltic lava
Low in height, gently sloping High in height, steep-sided
How do volcanoes form? sides with a broad base volcanic cones
Magma rises through cracks in the Earth’s crust
Low silica content (covers High silica content (covers
Pressure builds up (inside Earth)
long distances) short distance)
Pressure and tension are released → Plate movement
Frequent eruptions but low in Rare eruptions but in high
Magma explodes to the surface, causing an eruption
magnitude magnitude
Lava cools and forms a new crust
Over time, rock builds up, and new crusts form on top, High temperature Low temperature
forming a volcano. Low gas content High gas content
There is little build-up
Impacts of Volcanic Eruption: Enormous build-up pressure
pressure.
Environmental Human
Pyroclastic flow Loss of life and injury Causes of eruptions:
lava flow collapse and destruction of buildings At constructive margin, plates move away from each
volcanic bombs transport network damaged other; magma rises to fill the gap;
At the destructive margin, oceanic crust melts from
Laharas Loss of jobs and businesses
friction and heat from the mantle; newly formed
earthquakes Loss of crops
magma is lighter, so it rises to the surface
ashfall Power and water supply damaged
landslides Distribution of Volcanoes:
Tsunami
acid rain
ash fallout
Opportunities of Volcanos:
The cooled lava contains minerals,
Fertile soils
leading to a high yield of crops.
Many people want to visit the area and
Tourism
study it.
Minerals and They can be sold, providing more work
precious stones and income.
Geothermal the magma gives out heat, which can be
energy used to generate geothermal energy.
Creating new land once the lava and ash cool forms new
areas fertile land.
Earthquakes
Stages of Volcanoes:
Active: has erupted recently and is likely to erupt Earthquakes
again. An earthquake is a sudden violent shaking of ground followed
Dormant: has not erupted recently but may in future by a series of vibrations or movements in the earth's crust.
Extinct: no evidence to erupt again.
How earthquakes happen:
Types of Volcanoes:
Tectonic plates move; they strike.
Pressure and tension build up as the plates try to
move.
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Eventually, they jolt free and pressure and tension are Earthquake-proof buildings:
released inside the crust as energy.
The energy passes through the earth’s crust as waves,
an earthquake.
Features of earthquake:
Tectonic Plates
Features of earthquakes
Focus: point of earthquake
Epicentre: point directly above the focus, on the ground
Seismic waves
Shaking ground
Subduction zone: occurs at a destructive margin; one plate
goes under the other
Magnitude: the amount of energy released.
Effects of earthquakes
A large number of deaths Types of Plate Boundaries:
Fires breaking out Diagram Description
Water pipes burst
Water contamination, diseases
Collision: occurs when two
Corpses: human & animal
continental plates move
Accessibility difficult
towards each other.
Building damaged/destroyed
Tsunami can follow
Reconstruction costs Example: Indo-Australian and
the Eurasian Plate
Reduce impacts of earthquakes:
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Conservative/transform:
occurs when two plates slide
past each other.
The hydraulic cycle is where water is constantly recycled
Example: North American through the system.
Plate and the Pacific Plate Drainage basin - the area of land drained by a river.
Destructive/subduction/conve
rgent: occurs when a
continental plate subducts an
oceanic plate.
Inputs: precipitation
Transfers: infiltration, percolation, surface runoff,
throughflow & groundwater flow
Stores: interception, surface storage, soil moisture
storage & groundwater storage
Crust
2.2. Rivers
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Types of Erosion
Transportation
River Profiles
Long profile:
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Interlocking Spurs
Cross Profile
Meanders
River Landforms and their Formation
V-shaped valley:
Oxbow Lake
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
2.3. Coasts
The sea forms coasts and winds working together in 3
Floods essential tasks: erosion, transportation and deposition
Components of a wave:
Causes of flooding: Swash: when a wave breaks & washes up the beach
No vegetation Backwash: when the water drains back into the sea
Deforestation
Urbanization Types of Waves
Poor drainage
Steep slopes Constructive Destructive
Rock type (impermeable rocks do not absorb water) Low wave height High wave height
Wet soil (over saturation) The beach gradient is gentle The beach gradient is steep
Impacts Opportunities Spill forward gently Plunge forward
Water supply (drinking, Creates a strong swash Swash is weak
People can be killed.
washing) Water drains through beach Rotation of water causes a
Homes destroyed. Fishing industry material strong backwash
Spread of waterborne Backwash is weak Erodes beaches
Transportation for trading
diseases Deposits material
Shortage of clean water and Builds up beaches
Tourism
food
Infrastructure damaged Fertile soil Erosion:
Businesses destroyed. Powerplants (dams) Abrasion: larger rocks and sediments like boulders grind
Sports/recreation against the riverbed
Corrosion: salts and acids slowly dissolve a cliff
Flood Management Techniques Attrition: smaller sediments collide with each other while
moving in the flow, making them rounder and smaller
Hydraulic action: the force of waves compresses air in
cliffs
Transportation:
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Coastal Opportunities Coastal Threats Rocks and Absorbs wave Visual pollution,
stones put energy, susceptible to
Sports/recreation Hurricanes Rip-raps
against the protects cliffs being moved
Groundwater recharge Coastal storms base of the cliff behind by the sea
Habitat for fish Tsunamis Effective, Visual pollution
Transport (shipping goods) Landslides Breakwaters Near coasts breaks easily
Tourism Flooding incoming water destroyed
Job opportunities Coastal erosion Prevents storm
Tidal
Side of coasts surges, very Expensive
barriers
Coastal Management effective
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Spits:
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Coral Reefs:
Mangrove Swamps:
2.4. Weather
Weather:
The mix of events that occur in our atmosphere,
including changes in temp., rainfall and humidity
It can vary from day to day and from place to place
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Burns a timeline
Trace sunshine not the hours of daylight
The glass ball focuses the light
This burns a line onto the card
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Wet & dry bulb thermometer (hygrometer): Used to calculate Wind Vane: Records wind direction
the humidity of the air
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Distribution: They are close to the equator, so they have very similar
climates all year around
Temp. is constant between 25-30°C
Rainfall all year around, monthly amounts vary slightly
Days start warm & then temp. and humidity build-up
Hot air rises, causing low pressure.
Adaptations:
Plants Animals
Drip tips - plants have leaves
The sloth uses camouflage
with pointy tips. This allows
and moves very slowly,
water to run off the leaves
making it difficult for
quickly without damaging or
predators to spot.
Structure: breaking them.
Drip tips - plants have leaves
with pointy tips. This allows The spider monkey has long,
water to run off the leaves strong limbs to help it to climb
quickly without damaging or through the rainforest trees.
breaking them.
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Majority tertiary.
Few in the secondary sector primary.
Primary is larger than secondary.
Sectors of the Industry:
An MEDC, e.g.
Comparing Nations:
UK
Globalisation
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Improvements in transportation
Freedom of trade
Improvements of communications
Labour availability and skills
Impacts of globalisation:
Positive Negative
Economic growth Economic Inequality
Job Displacement and Labor
Job Creation and Employment
Exploitation
Access to Goods and Services Environmental Degradation
Cultural Exchange and
Cultural Homogenization
Diversity
Exploitation of Developing
Technological Advancements
Countries
Access to Information and Social Disruption and
Communication Inequality
Environmental Awareness
Public Health Risks
and Sustainability
Advantages Disadvantages
Job opportunities Labour drain.
Improvement in skills and Damage to the environment -
communication. factories create air pollution.
Good education, healthcare Cultural dilution or loss of
and good quality of life. cultural identity.
Social mobility is limited to
Invest in infrastructure.
urban areas.
Cheaper products Profits going overseas.
Natural resources are being
Greater choice of goods
over-exploited.
Movement of people,
High level of income from transport ownership and loss Food Shortages & Famine
tourism, exports, imports of biodiversity increases
globally. When demand for food exceeds the supply of food,
leading to undernourishment
Access to vast levels of skills
Daily living costs increased. Prolonged undernourishment can damage people's
and resources.
health and eventually lead to starvation
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Effects:
Hunger and rising food prices.
Susceptible to infectious diseases.
Impair physical and mental development.
Reduce labour productivity,
Undernutrition and malnutrition.
Wasting.
Soil erosion and desertification.
Migration.
Solutions:
3.3. Industry
Industrial systems have inputs, processes and outputs.
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Managing Tourism
Factors that Change Tourist Patterns The demand for energy across the globe is rising.
Population growth and development are the two leading
Transport & accessibility. causes of the increase in energy demand.
Scenery: landscape & visual appearance of places
Weather: Climate is important, e.g. cold place for a ski trip
Accommodation: quality/price of hotels, camps, resorts
Amenities: various recreational, historical, and leisure
facilities & sites offered.
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Energy
Advantages Disadvantages
source
- Not reliable only
works when the wind is
strong enough but not
too strong. \n - Visual
- No greenhouse gas pollution. \n - Noise
emissions. \n - No air pollution \n - Many
pollution. \n - Can be turbines are needed to
Wind
small or large scale. \n produce the same
- Cheap to run. \n - Can energy as an average
be on land or offshore. coal-fired power
station. \n - May affect
bird migration patterns
Renewable Energy is energy which comes from natural
or kill birds who fly into
resources:
the moving blades.
Solar energy: energy derived from the sun through
solar radiation. - No greenhouse gas
Wind energy: conversion of wind energy into a useful emissions \n - No air
form of energy. pollution \n - Can be - Expensive to install \n
Hydro energy: the power derived from the force or small or large-scale \n - Not reliable; only
energy of moving water. - Can be used in most works when it is sunny
Geothermal energy: energy obtained by tapping the Solar locations \n - Can be \n - Large numbers
heat of the earth itself. incorporated into needed to produce
Biomass: is a renewable energy source, biological building design \n - energy \n - Uses large
material from living. Technology is areas of land
improving and
Energy reducing cost
Advantages Disadvantages
source - No CO gases. \n - Lots - Expensive. \n - Emits
- Large areas of land of potential sites. \n - sulfuric gases. \n -
are flooded behind the Geothermal Reliable. \n - Can High temperatures
dam. \n - Dam traps produce large cause maintenance
sediment, which can amounts of energy. issues.
- No greenhouse gas affect ecosystems - Uses waste or
emissions. \n - Control - Air pollution. \n -
downstream. \n - biofuels which regrow.
flooding downstream. Visual pollution. \n - Biomass Produces greenhouse
Hydroelectric \n - Available in most
\n - Provide water Can prevent fish gases. \n - Expensive.
locations.
storage for irrigation movement upstream.
and domestic use \n - People and
Non-Renewable energy: Fossil fuels are formed from
settlements may have
living organisms' remains (plants/animals). These are
to be relocated. \n - non-renewable as they cannot be replaced at a speed
Expensive to build and which keeps up with consumption.
maintain. Coal
- No greenhouse gas Oil
- Expensive to build
emissions. \n - No air Gas
and maintain. \n - Can
pollution. \n - Has the
Wave/ Tidal affect marine
potential to produce Advantages Disadvantages
ecosystems. \n - Few
large amounts of The cost of production
suitable sites.
energy. \n - Reliable. is high, produces a lot of
It lasts 300yrs, now
GH gases, is dangerous,
Coal become more efficient,
open cast = visual
needed to make coke
pollution, costly to
transport, acid rain
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Water does not oxygenate properly/receive light When infrared radiation passes through the
Causes plants & animals to suffocate & die atmosphere, & some is absorbed and re-emitted in all
directions by greenhouse gas molecules
Solutions to Water Shortages This warms the surface & lower atmosphere
Effects:
Desalination: governments should invest more in
Melting poles = rising sea levels = increase in storms
desalination plants
Change in the distribution of precipitation
Sewage Treatment: governments should enforce better
Plants and wildlife might not have time to adjust
policies regarding disposal and reuse of wastewater
Lower crop yields in Africa, Asia & Latin America
Conservation:
More people at risk from insect/water-borne diseases
Half-flush toilets & showering instead of bathing
Greenhouse gases are:
Watering the garden at dusk to prevent evaporation
CO2 from burning fossil fuels or wood
Collecting rainwater to use in the garden
Methane from decomposing organic matter & waste
Using appropriate plants for the climate
CFCs from aerosols, air conditioners, & refrigerators
Using drip irrigation rather than sprinklers
Nitrogen Oxides from car exhausts & power stations
Water Charities:
Air pollution:
Building wells to access groundwater
Carbon monoxide: incomplete combustion of carbon-
Building toilets to reduce sewage & pollution
containing substances causes oxygen starvation
Teaching appropriate farming techniques
Sulphur dioxide: combustion of fossil fuels causes
Low-cost schemes to filter and clean water
respiratory problems and acid rain
Irrigation Projects: use irrigation systems to redistribute
Nitrogen oxides: N2 & O2 from air combine due to
water & water the land
heat (furnace/engine); same effect as sulphur dioxide
Lead oxide: burning leaded petrol damages nervous
3.7. Environmental Risks of Economic system
Development Water Pollution:
Chemicals in fertilizers cause eutrophication
Oil spilling into the sea
Acid rain destroys lakes and kills animals/plants
Health hazards for humans
Damages limestone buildings and sculptures
Fewer crops can be grown on an acidic field
Noise Pollution:
Vehicles
Machinery in industries and farms
Noisy humans
Visual Pollution:
All man-made things are ugly compared to unspoiled
nature
Desertification:
Overgrazing
Soil erosion
Global climate getting warmer - gets drier due to less
rain
Deforestation - fewer roots of trees to hold the soil
together
Sustainable Development: Economic development without
destroying natural resources
Management:
Population policies
Soil Erosion: Sustainable tourism
Occurs in farms, where rainforest is cleared – soil is Use of renewable energy
washed away by rain because there are no tree roots Afforestation
to retain it Resource Conservation: Meeting needs of the present
In the Amazon rainforest, eroded soil goes into rivers without affecting needs for the future
& pollutes drinking water Ways of Conservation:
Global Warming: 3 Rs: reduce, reuse, recycle
Occurs due to too much greenhouse gases Renewable energy
Greenhouse Effect: Use energy-efficient products
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Restrict the use of resource The government can raise tax on petrol prices
Use more public transport
WWW.ZNOTES.ORG
ZNOTES.ORG
CAIE IGCSE
GEOGRAPHY
SUMMARIZED NOTES ON THE PRACTICAL SYLLABUS
CAIE IGCSE GEOGRAPHY
Advantages: Disadvantages:
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
4. Photographs
Advantage of Photographs Disadvantage of Photographs
They are more accurate than People often include
field sketches irrelevant photos
People forget to label,
Can be good for showing data
annotate or refer to photos,
collection techniques e.g.
which then makes them
measuring a river's load
irrelevant
People often only photograph Flowmeter: used for measuring velocity of rivers. Have a
Can support data collection the nice things (pretty view) small propeller which you place just under surface of the
findings e.g. show an example and forget more ugly areas water. Depending on the speed of propeller, a small
of a poor environment that are important (area of digital read out then gives speed of river.
pollution)
They can show temporal They can often contain too
changes, especially if you can much information e.g. people
find historical photos. and vehicles
Because they are two-
You can annotate and label
dimensional, depth can be
them.
deceptive
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
6.2. Evaluation
What went well (keep this brief)
Any problems with data collection e.g. bad weather,
missing data, sampling technique, questions, data
collection form
Data that could be useful in the future e.g. secondary data
from government, more questionnaires ( bigger sample)
Additional hypothesis you could have used
Time/money problems changed
7. Data Presentation
Strengths Weaknesses
Can disguise intra-region or
Shows spatial distribution e.g.
intra-country variations e.g.
dot map
choropleth map
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Strengths Weaknesses Good coverage of the study area can be more easily
Shows variations between achieved - better representation of the total population.
Hard to see trends and
regions and countries e.g.
anomalies → Disadvantages:
choropleth map
Visually interesting More biased as not all members have an equal chance of
Very complicated to read
(interesting colors, symbols) being selected.
Symbols take up too much May lead to over or under representation of a particular
Very bold and clear pattern/subpopulation.
room
Easy to understand
Clearly shows trends and 9.4. Stratified sampling:
anomalies
→ Advantages:
10. # COASTS:
10.1. Beach profile:
1. Person A stands at a safe distance from the edge of
9.2. Random sampling: the sea holding a ranging pole
2. Person B stands holding a second ranging pole further
Action of randomly selecting . up the beach where there is a break of slope
→ Advantages: 3. The distance between the two ranging poles is
Can be used with large sample populations. measured using a tape measure
Avoids bias. 4. The angle between matching markers on each
ranging pole is measured using a clinometer
→ Disadvantages: 5. Repeat this process at each break of slope until the
top of the beach is reached.
Can lead to poor representation of the overall population
(certain subpopulations might be over or
underrepresented, eg. there might be more teenagers
than elderly people sampled).
Made worse if the study area is very large.
Practical constraints in terms of time available and access
to certain parts of the study area
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
1. Lay the measuring tape parallel to the coast, next to 1. Rest ruler / rod on the riverbed vertically upright /
the water perpendicular
2. Mark out a 10m section 2. Make a mark of the water level
3. Place a float or an orange in the swash zone at the 5 3. Repeat this at intervals along a river
metre middle mark
4. Record the direction in which the object travels (left or Wetted perimeter:
right) and how long it takes to travel 5 metres
5. Repeat the experiment and take an average. 1. Lay a chain across the river bed from one bank to the
\ other
2. Mark the distance on the chain and remove it from the
Wave counts: river
3. Measure the distance of the chain
1. Place a pole in the water
2. Using a stopwatch, count the number of times the Hydraulic radius:
waves hit the pole per minute
3. Repeat this 5 times and take the average Cross Sectional Area ÷ wetted perimeter
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
OTHER METHODS:
· Electronic caliper (Reduces risk of human error, more
accurate)
· Pebblometer
Safety:
A class of students were studying how a river changes
downstream. Suggest 3 things they should consider in
choosing their fieldwork sites.
· Safe to access: Sharp rocks and Strength of current
· Accessibility from road / school
· Depth of water
· Away from waterfalls / rapids
· Away from human impacts eg. dams and hydroelectric
stations
· Equal distance from other investigation sites
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
WWW.ZNOTES.ORG
ZNOTES.ORG
CAIE IGCSE
GEOGRAPHY
SUMMARIZED NOTES ON THE SKILLS SYLLABUS
CAIE IGCSE GEOGRAPHY
small paragraphs
etc.
1. Overview of Paper 2
They may ask you to:
pencil, rubber, ruler, protractor, calculator and string or map-based questions that ask you to describe, explain
piece of paper. and predict,
a sheet of plain paper will be provided to you in the exam photo-based resource that ask you to identify and explain,
room for measuring distances or assisting with cross- long answer compare and contrast questions,
sections on the large-scale maps. diagram and graph based questions that ask you to
describe changes, distributions and patterns
1.2. Question 1: Mapwork Question These questions are less common:
In this question, you will be assessed: describing field sketches, or drawing field sketches,
plotting data on a diagram (usually examined in Paper 4).
four- and six-figure grid reference
16-point cardinal directions
measure distances and cross sections 2. Topographical Map Skills
understand, interpret and use contour lines
using the key to identify human and landscape features
on the map 2.1. Map
identify, describe explain, analyse and draw inferences on
physical and human landscapes (including patterns), Walk before you run!
using map evidence Four figure grid reference of the tourist information
give brief descriptions of basic landscape features using center is 4733.
suitable geographical terms Six figure grid reference of the tourist information
draw sketch maps illustrating patterns of both human and center is 476334.
physical nature
maps
graphs and diagrams Compass points for direction
photos and sketches
Contours:
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
5. Graphs
Line Graph: Used for showing continuous data. Non-
variable data goes on the x axis and the variable data on y
axis.
Bar Graph: Used for showing data that is related but not
the same i.e. it is not constant. Normally the frequency
goes on the y axis and types of data on the x axis.
Pie Chart: Good for showing related data that is calculated
out of 100%. Usually the largest piece of data comes first.
Divided Bar Graph: Good for showing related data that
adds up to 100%.
Histogram: like a bar graph, but only show one type of
data
Scatter graphs: good for showing the relationship
between two pieces of variable data
Isoline maps: often used for showing weather data like
temperature
Triangular graphs: used for showing information where
three related pieces of data equal 100% e.g. primary,
secondary and tertiary data
Radial (kite) graphs: good for showing related data that
can all be scored out of the same score. e.g.
environmental index of different areas
Wind rose graphs: good for showing wind speed and wind
direction
Kite diagrams: good for showing transects e.g. velocity
change across a river’s cross section
River landscapes Flow (system) diagram: Can be used to show things like
the positive or negative multiplier effect i.e. on factor that
causes another factor. They can be also used to show
more complicated relationships like the hydrological
cycle.
When describing graphs:
Look for trends e.g. positive/negative correlation,
staying constant, or data fluctuating
Look for anomalies: pieces of information that do not
fit the general trend
Mention the start and finish figure
Mention the highest and lowest figure
4. Field Sketches and Photos Always use figures (evidence) to support your
description
WWW.ZNOTES.ORG
CAIE IGCSE GEOGRAPHY
Settlement patterns: dispersed, nucleated, linear. Describing landscape: ridge, plateau (elevated land with
Natural advantages of a settlement: flat land, near water flat top and steep sides), scarp, floodplain
source, on the coast, near farmland, near natural broad, flat, steep-sided, deeply cut, gently sloping
resources, defensive location. Drainage:
Human locational factors: good road links, schools, density of drainage: the greater the number of
hospitals, jobs, leisure facilities streams, the higher the density
tourism can be promoted by: beaches, sea, mountain, stream patterns: dendritic, trellis or radial
waterfalls, historical buildings, water parks, golf courses, area drained – many tributaries joining the main river
hotels and restaurants. etc.
Describing photos: structure, type of vegetation, direction of flow
geographical features. course of river: straight or meandering, braiding,
Describing relief: average height of relief and height of width
highest point presence of river features e.g rapids, waterfall
mountainous or hilly or part of a plateau Choropleth map: maps which are shaded according to a
state locations (grid reference) of any relief features pre-arranged key.
that stands out
slope: concave, convex, uniform, steep
WWW.ZNOTES.ORG