0% found this document useful (0 votes)
14 views56 pages

Caie Igcse Ict Theory

Uploaded by

kaashvikapoor311
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views56 pages

Caie Igcse Ict Theory

Uploaded by

kaashvikapoor311
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

ZNOTES.

ORG

ALIGNED WITH THE 2023-2025 SYLLABUS

CAIE IGCSE
ICT (0417)
THEORY
Authorised for personal use only by Kaashvi Kapoor at Modern English School generated on 25/08/2025
CAIE IGCSE ICT

<b>Application software:</b>
1. Types and Components of Provides services that allow the user to do specific
tasks.
Computer Systems It can be general-purpose software or custom-made
software. (Specialist software)
E.g., Spreadsheets, databases, and word processors.
1.1. Hardware & Software <b>System Software:</b>
The software is designed to provide a platform all other
<b>Hardware</b> applications to run on. For example:
1. Compilers: The software translates the High-level
the electronic, physical components that make up a typical language into Machine code (Language
computer system. These may include input and output Processor).
devices as well. 2. Linkers: A Software that creates the links
<b>Internal Hardware Devices:</b> between Language processors into workable
Central processing unit solutions (Data definition language).
Processor 3. Device drivers: A software that enables the
Motherboard device to work with another, externally
Internal memory consisting of RAM & ROM connected device.
Graphics & Sound Cards 4. Utilities: A system software that provides the
Internal Storage devices like Hard disk drives (HDD) and necessary facilities (Antivirus, Scan Disk, Disk
solid-state drives (SSD) Defragmentation, etc.)
Network interface card (NIC) 5. Operating systems: To enable computer systems
<b>External Hardware Devices:</b> to function and allow users to communicate with
Monitor computer systems, special software, known as
Keyboard operating systems (OS), have been developed.
Mouse
Printer <b>Analogue and Digital Data</b>
External Storage Devices
Computers can only understand data in the form of binary
<b>Software</b> digits (0,1); this is commonly known as digital data. However,
data in the real world is analogue, not limited to two specific
The techniques, methods, commands, and instructions tell values.
the device what to do and how to do it.
They are the programs which control the computer system
and process data.
Relates to ideas & instructions for using physical objects.

<b>Two types of software:</b>

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

The figures show how data changes in analogue and digital 1. RAM is a temporary memory device, whereas ROM is a
forms; analogue data forms smooth curves, whereas digital permanent one.
data changes in discrete steps. 2. RAM is volatile, ROM is non-volatile.
So, for a computer to process real-world data, it first needs 3. RAM can be written to and from, but ROM can only be
to convert the received data into digital form. This is done read from.
by hardware known as ADC (analogue to digital converter), 4. RAM is used to store data, files, programs, and parts of
and its output is given back in analogue form using DAC OS that are currently in use. However, ROM is used in
(digital to analogue converter). storing start-up data,

1.2. The Main Components of Computer <b>Input & Output Devices</b>


Systems | Input devices | Output devices | | ---------------------------------------
--------------------------------------------------------------------- | -------------------
<b>Central Processing Unit (CPU)</b> ------------------------------------------------------------------------------------- | |
An input device is any hardware that enables data entry. | An
The component of the computer that understands and output shows the result or solution of the input <i>after</i> it
executes hardware and software operations. Nowadays, it’s has been processed. | | An input device can only send data. |
also known as a microprocessor. It is a single integrated An output device can only receive data. | | Input devices are
circuit at the core of most PCs and is also present in many necessary for a computer to receive commands from the user
household gadgets and equipment where some control or for processing to be permitted. | Output devices are needed in
monitoring is required. order to display the outcome of the processing that took place
It consists of a control unit (CU) that manages the input and to the user. | | Input devices are complex as they must ensure
output devices, an arithmetic and logic unit (ALU) that proper communication between the computer and the user. |
performs computations and makes logical judgments, and Output devices are simpler as they only need to display the
tiny memory regions known as registers. finale. |
It processes the input and produces the outcome of the
processing in the form of output. Input devices are pieces of hardware that allow users to
enter data into computers.
<b>Internal Memory</b> An output device displays the computer's output in a
human-readable format. For example, words on a printer
1. Random access memory (RAM): temporary memory or moving graphics on a monitor.
storage, lost after power is shut down, performs read
and write functions, is used to store data that are <b>Backing and Secondary Storage</b>
currently in use, and can be increased in size to improve
operational speed. Required to store significant amounts of data permanently.
2. Read-only memory (ROM): permanent memory storage, Most commonly in the form of Hard disk drives and Solid-
non-volatile, can only be read from, used to store state drives.
computer’s configuration data, such as BIOS.
<b>Differentiating between internal memory and backing
<i>N.B: The BIOS (basic input/output system) stores the storage:</b>
date, time and system configuration on a non-volatile chip
called a CMOS (complementary metal oxide semiconductor) –
this is usually battery powered.</i>
Differentiating between Internal memories:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

1. RAM contents are lost when power is lost, ROM is read-


only, and backing storage is permanent even without 1.4. Types of Computers
power.
2. RAM and ROM are much smaller than backing storage. Desktop Computers
3. RAM and ROM are significantly faster in accessing data
than backing storage. Desktop usually refers to a general-purpose computer that
4. Backing storage is much cheaper than internal memory. is made up of a separate monitor, keyboard, mouse, and
processor unit. It is distinguished from, for example, a
5. Internal memories are fixed, and backing storage can be
fixed or portable. laptop computer by the fact that it is made up of several
6. Internal memories can be directly read by the CPU, separate components, which makes it not very portable.
while backing storage needs to be moved into the RAM Uses:
before being read by the CPU. 1. office and business work
2. educational use
3. general entertainment
1.3. Operating Systems 4. gaming device
Advantages:
Controls operation of input, output & backing storage 1. They are easier and less costly to upgrade and
Supervises loading, running & storage of application expand.
programs. 2. Spare parts are standardized, which makes them
Deals with errors in application programs. cheaper.
Maintains security of the whole computer system 3. They tend to have better specifications for a given
Maintains a computer log. price.
Operating systems offer various types of user interfaces, for 4. No critical power consumption because they plug
example: into a wall socket.
5. Due to fixed positions, they are less likely to be
damaged or stolen.
6. As they usually have wired connections, they have
more stable internet access.
Disadvantages:
1. They are not particularly portable because they are
made up of separate components.
2. More complicated because all the components need
to be hooked up by wiring, which also clutters up the
desk space.
3. Because they aren’t portable, files must be copied to
another portable storage device to take work
elsewhere.

Mobile Computers
1. Laptop computer:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

(Or notebook) refers to a type of computer where the Allow normal phone calls to be made, but also have an
monitor, keyboard, pointing device and processor are all operating system (such as iOS, Android, or Windows),
together in one unit. This makes them extremely portable. allowing them to run a number of computer applications
lightweight (to aid portability). Low power consumption (known as apps or applets). Smartphones communicate
(and also long battery life). Low heat output (cooling is very with the internet either by using Wi-Fi hot spots or by using
important). 3G/4G/5G mobile phone networks.
Uses: Uses:
1. office and business work 1. They allow users to send/receive emails.
2. educational use 2. They allow users to use a number of apps.
3. used as a gaming device. 3. They allow users to use a camera feature (to take
4. general entertainment photos or videos).
Advantages: 4. They allow users to use an MP3/4 player (for music
1. Portability: all components are in a single unit, so and videos).
they can be taken anywhere. Advantages:
2. Because of one single unit, there are no trailing 1. very small in size and lightweight, makes them
wires and desk clutter. portable.
3. take up much less room on a desk, so they can be 2. connecting to the internet while on the move.
easily used in public spaces. 3. because they use Wi-Fi and mobile phone networks,
4. portability allows them to take full advantage of Wi- they can be used almost anywhere.
Fi features. 4. they have apps which can tell instant location, which
Disadvantages: is a feature that isn’t available in either desktops or
1. portability makes it easier for them to be stolen. laptops.
2. limited battery life means the user needs to carry a 5. they have reasonable battery life.
charger at all times. Disadvantages:
3. keyboards and pointing devices may be awkward to 1. small screens and keyboards make pages difficult to
use. read.
4. not easy to upgrade, like adding more RAM. 2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
2. Smartphones: the battery.
4. Memory size in most phones is not very large when
compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to lose a
smartphone or for it to be stolen compared to
laptops or desktops.
7. The data transfer rate using mobile phone networks
can be slower than with Wi-Fi.

3. Tablets:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

They work similarly to a smartphone. The only main


difference is that they are somewhat bigger in size as
compared to a smartphone.
Uses:
1. They allow users to send/receive emails.
2. They allow users to use a number of apps.
3. They allow users to use a camera feature (to take
photos or videos).
4. They allow users to use an MP3/4 player (for music
and videos).
Advantages of tablets compared to laptops:
1. very fast to switch on (no time delay waiting for the
operating system to load up).
Uses:
2. fully portable – they are so lightweight that they can
Entertainment (streaming of music, videos, and
be carried anywhere.
television programs).
3. touch screen technology means they are simple to
Gaming (including group games).
use and don’t need any other input devices.
As a camera or video camera.
4. not much heat, they use solid-state technology.
Internet use (online sales, social networks, using QR
5. The battery life of a tablet is a lot longer.
codes, and so on).
6. when the power button is pressed, it goes into
Sending/receiving emails.
standby but remains connected to the internet so
Global positioning system (use of maps to navigate to a
the user still hears alerts when emails or other
location).
‘events’ are received.
Calendar functions.
Disadvantages of tablets compared to laptops:
Telephone banking (sending and receiving money using
1. tend to be rather expensive when compared to
banking apps).
laptops.
Voice over Internet Protocol: telephone network using
2. they often have limited memory/storage when
the internet, which also allows video calling.
compared to a laptop.
Instant access to social networks (social contact with
3. typing on a touch screen can be slow and error-
friends no matter where you are in the world).
prone compared to a standard keyboard.
Instant messaging.
4. laptops tend to support more file formats than
Office and business management (allows rapid voice
tablets.
and video communication).
Education use (using interactive software to teach or
4. Phablets:
learn from).
Some of the latest smartphones have been designed as a Remotely control devices.
hybrid between a tablet and a smartphone, referred to as a Laptops are the most expandable of these devices, while
phablet. They have much larger screens than a smartphone smartphones are the most portable. Tablets and phablets
but are smaller than a tablet. fall somewhere in between, offering a balance of
portability and expandability. The choice of device will
depend on your specific needs and use case.

1.5. Impact of Emerging Technologies

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Artificial Intelligence (AI): There are many definitions of Unemployment, robots are capable of doing tedious human
artificial intelligence (AI). Essentially, AI is a machine or tasks with much more efficiency and excellence than
application which carries out a task that requires some humans.
degree of intelligence. Dependency on technology could lead to problems in the
The use of language future.
recognizing a person’s face, the ability to operate De-skilling: Tasks that used to be considered a talent are
machinery, such as a car, aeroplane, train, and so on, now part of general, tedious processes that are done on a
and analyzing data to predict the outcome of a future regular basis by machines.
event, such as weather forecasting. Impact: Extended Reality (XR) refers to combined real and virtual
Whenever AI is mentioned, people usually think of environments. The two most common examples at the
science fiction fantasies and think of robots. The science moment are:
fiction writer Isaac Asimov even went as far as Augmented reality (AR) is a merger between the
producing his three laws of robotics: » Robots may not virtual and physical (real) world; it lays objects onto pre-
injure a human through action or inaction. » Robots existing objects. e.g., Pokémon GO! Impact: safety and
must obey orders given by humans without question. » rescue operations’ training, shopping and retail (getting
A robot must protect itself unless it conflicts with the a better look at a car before the purchase), healthcare
two laws above. Everyday uses: (better understanding of a patient’s body)
An autonomous (driverless) vehicle – we already have Virtual reality (VR) enables an entirely new world to be
driverless trains and autopilots on aeroplanes, but created, unlike AR, which has no link to the actual
future developments include driverless cars. surroundings of the user. It requires the user to be
Robotic research is leading to improvements in specially equipped with a VR headset, joystick, and
technology to help amputees and people with headphones.
disabilities. Impact: Military applications, educational purposes
Robots are used to help people carry out dangerous or (looking at ancient buildings), healthcare, media
unpleasant tasks – for example, bomb disposal. (interactive special effects in a movie), scientific
visualization (part of molecular structures/cells).
Negative impacts of AI

2. Input & Output Devices


2.1. Input Devices and Their Uses
An input device is any hardware device that allows a user to
enter data or instructions into a computer directly.
An input device can send data to another device, but it
cannot receive data from another device.
Input devices are necessary for a computer to receive
commands from its users and data to process; they are
under the user's control or can be direct data entry.

Input devices can be complicated because they must ensure


the user can interact with the computer correctly.

1. Keyboards:
Uses:

Input of data into applications software


Typing in commands to the computer

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
Advantages:
Sometimes, they have small keys, which can make input
Fast entry of new text into a document. more difficult.
Well-known method. Sometimes, the order of the numbers on the keypad is not
Easy to use for most people. intuitive.
Easier to do verification checks as data is entered (can
immediately compare the source document with typed data
on the screen).

Disadvantages:
It can be difficult to use if the user has limited arm/wrist
use.
Slow method when compared to direct data entry. 3. Mouse:
It is a fairly large device that uses up valuable desk space.
Uses:

Opening, closing and minimizing software


Grouping, moving and deleting files.
Image editing, for example, controls the size and position of
a drawing pasted into a document.
Controlling the position of a pointer on the screen to allow
selection.
Advantages:
2. Numeric keypads:
It is a faster method for choosing an option than a
Uses: keyboard.
It's a very quick way of navigating through applications and
Automatic teller machines (ATMs), where the customer can the internet.
key in their PIN, amount of money, etc. Does not need a large desk area when compared to a
Mobile phones allow phone numbers, etc., to be keyed in. keyboard.
Point of sale terminals (POS) in case the barcode reader Disadvantages:
fails to read the barcode – the number has to be keyed in
manually by the operator. It can be more difficult for people with restricted hand/wrist
Chip and PIN devices when paying by credit/debit cards. movement than using a keyboard for data entry.
Fast entry of numeric data into a spreadsheet. Easy to damage, the older type of mouse quickly becomes
clogged up with dirt.
Advantages: Difficult to use if no flat surface is readily available.
Faster than standard keyboards when entering numeric
data.
Because many are small devices, they are very easy to carry
around.
Disadvantages:

4. Touchpad:
Uses:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Opening, closing and minimizing software Does not need the same fine control as a mouse.
Grouping, moving and deleting files. It is easier to use than a mouse if the operator has
Image editing, for example, controls the size and position of problems with their wrist.
a drawing pasted into a document. More accurately position the pointer on the screen.
Controlling the position of a pointer on the screen to allow They are more robust than a mouse.
selection. Needs less desk space than a mouse or keyboard.

Advantages: Disadvantages:

Faster than a keyboard for choosing options. It is not supplied with the computer as a standard;
Used to navigate applications and the internet. therefore, it is more costly.
Because the touchpad is integrated into the laptop Users may need training because it is not standard
computer, there is no need for a separate mouse; this aids equipment.
the portability and is a big advantage if no flat surfaces are
available.
Disadvantages:

People with limited hand/wrist movement find the device


difficult to use.
It can be more difficult to control the pointer when
compared to a normal mouse.
Drag and drop operations are more complicated using a
touchpad.

6. Remote Control:
Uses:

Televisions, satellite systems, DVD/Blu-ray players and Hi-Fi


systems, to alter controls such as volume, on/off, etc.
Used to control multimedia systems.
Used in industrial applications to remotely control
processes.
5. Tracker ball: Advantages:
Uses: It can be operated from any reasonable distance.
In some conditions, e.g., in chemically hazardous
A good alternative to a mouse for people with conditions
environments, we can control and measure from safe
such as RSI. distances.
Used in an industrial control room environment.
Used in some luxury cars to select functions such as radio. Disadvantages:
Advantages:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
Advantages:
Difficult to use for people with limited hand/wrist
movements. It's a more realistic experience than both mouse and
Physical obstacles can easily block the signal. joystick.
Easier than a keyboard or joystick to control steering
movements.

Disadvantages:

It is a rather expensive input device as compared to a


mouse or joystick.
Steering movements tend to be over-sensitive, which gives
an unrealistic feel.
Unless it is an expensive simulator, feedback to the steering
wheel is non-existent.

7. Joysticks:
Uses:

Used in video games.


Used in simulators to mimic the actual controls.

Advantages:
9. Touch screen (as an input device):
It is easier than keyboards for screen navigation.
In some applications, the control is more realistic than Uses:
using a mouse.
Automatic teller machines (ATMs) to choose from on-screen
Disadvantages: options.
Point of sale terminals such as in restaurants.
The on-screen pointer is more difficult to use.
Interactive whiteboards in education.
Computer-based training (CBT) where answers are selected
during on-screen testing.

Advantages:

Faster entry of options than using a keyboard or mouse.


Very easy method for choosing options.
User-friendly method – no training necessary in its use.
Option to expand the size of the display if necessary.

Disadvantages:

8. Driving wheel:
Uses:

Used in video games, especially car racing games.


Used in simulators to mimic actual vehicle controls.

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

A limited number of input options are available. Limited quality, depending on how good the scanner’s
This can lead to problems if an operator uses the system resolution is.
frequently (straining of arm muscles, RSI, etc., are all Fairly slow input method, especially if color mode is
possible). selected.
The screen can get very dirty with constant touching.

11. Digital Cameras:


Uses:

Taking photographs is still better than using smartphones


10. Scanners: and tablets.
Data-capture device, e.g., as a reversing aid in cars.
Uses: Dentistry, to help capture pictures for better diagnosis.
Scanning documents and converting them into different The creation of virtual reality tours around houses,
formats buildings, etc.
Scanning in old documents to protect them in case the Advantages:
original is lost/damaged.
Scanning in photographs for storage Easier to produce better-quality photographs than with a
Scanning in barcodes at POS terminals. traditional camera.
Uploading photographs to a computer is faster than
Advantages: scanning hard copies.
Images can be stored for editing at a later date. Memory cards can store many thousands of photographs.
When used with OCR, they are much faster and more There is no need to develop film and printouts; it saves
accurate than typing the documents in. money and is more environmentally friendly.
It is possible to recover damaged documents by scanning Unwanted images can quickly be deleted from a memory
and producing an acceptable copy. card.
Higher quantity of pictures can be taken in a shorter time.
Disadvantages: Resolution of images is clearer compared to traditional
ones.

Disadvantages:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Need to be computer literate to know proper use. Temperature sensors are used in automatic washing
Loss of artistry due to clever software doing all the work. machines, central heating systems, ovens, and glasshouses.
Images need to be compressed to reduce the amount of Pressure sensors are used in intruder alarm systems and
memory used. washing machines.
Light sensors are used in automatic glasshouses, doors,
and street lighting control.
Sound/acoustic sensors are used in intruder alarm systems,
monitoring liquid and powder flow in pipes.
Humidity/moisture sensors are used in automatic
glasshouses, environmental monitoring, and in factories
where moisture levels are crucial.
pH sensors are used in automatic glasshouses, chemical
processes and environmental monitoring.
Advantages:
12. Microphones: Readings are more accurate as compared to human
operators.
Uses:
Readers are continuous, with no breaks in the monitoring.
To input speech to be used in various applications. Because it is a continuous process, any action or warnings
Input in voice recognition software for authentication. needed will be initiated immediately.
As a sensor to pick up sound in an intruder alarm system. Automatic systems don’t need human intervention.
Used in audio conferencing or VoIP applications.
Disadvantages:
Advantages:
Faulty sensors can give spurious results.
It is faster to read text than it is to type it in. Most sensors are analogue; therefore, they require
It is possible to manipulate sound in real time rather than conversion using Analogue to Digital Convertors.
working on a completed recording.
It improves security if used as an authentication system. 14. Light pens:
Disadvantages: Uses:

Sound files use up a lot of computer memory. Selecting objects on CRT screens
Reading data is more error-prone than typing in. Drawing on screens

Advantages:

Greater accuracy than touch screens


Small makes them portable and capable of being used in
small spaces.
Easy-to-use technology.

Disadvantages:

13. Sensors:
Uses:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Lagging problems while drawing on the screen. It is more secure than contactless cards as the PIN acts as a
It only works with CRT monitors. second security layer.
Rather outdated technology. More robust system than Magnetic Stripe Cards
Disadvantages:

Be very careful so the PIN isn’t seen by anyone while being


typed in.

2.2. Direct Data Entry & Associated


Devices
1. Magnetic Stripe Readers:
Uses:

On credit/debit card for use at ATMs 3. Radio Frequency Identification (RFID) reader:
Security device to allow entry to buildings, hotels, etc.
Uses:
Advantages:
Livestock tracking
Faster than keying in data manually. Retail, instead of barcodes, as they don’t need to be
Error-free, no human intervention needed. scanned in.
Secure information isn’t in human-readable form. Admission passes.
Robust, there are no moving parts. Library books, to acknowledge the books which have been
borrowed.
Disadvantages:
Advantages:
If the card is damaged, the data is lost.
Doesn’t work at a distance. No line-of-sight contact is needed.
As the information isn’t human-readable, this can be a Very robust and reliable technology.
disadvantage in some cases. Very fast read rate.
Bidirectional data transfer.
Bulk detection is possible.

Disadvantages:

Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal.
RFID is more expensive than a comparable barcode system.

2. Chip and PIN reader: 4. Optical Mark Reader/Recognition (OMR):

Uses: Uses:
Used in MCQs checking.
Where payments are made using cards
Used in reading voting papers.
Advantages:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
Advantages:
Used in supermarkets for stock control.
Very fast way of inputting survey results. In libraries, to keep track of books.
It is more accurate because there is no human intervention. As a safety function to ensure checking of electrical
More accurate than OCR methods. equipment on a daily basis.

Disadvantages: Advantages:

Designing the forms can be complicated to ensure the Much faster than manually keying in data.
marks are correctly positioned. Allow automatic stock control.
If there are problems, they need to be manually checked, They are a tried and trusted technology.
which can be time-consuming.
Disadvantages:

Relatively expensive system to administer.


Not fool-proof, barcodes can be swapped between items.
Can be more easily damaged than RFID tags or magnetic
stripes.

5. Optical Character Recognition/Reader (OCR):


Uses:

Processing passports and identity cards.


Converting hard copy documents into electronic form.
Used in automatic number plate recognition (ANPR)
systems. 7. Quick response (QR) code scanner:
Digitizing historic hard copies for archiving.
Uses:
Advantages:
used in advertising to contain information about the
It is a much faster data entry system than manual typing. advertising company.
No human intervention, its error free. Wi-Fi authentication
Used in restaurants, you can see the menu by scanning.
Disadvantages:
Advantages:
System has difficulty in reading different handwritings.
Still not a very accurate technique. hold much more information than normal barcode.
fewer errors than with barcodes.
QR codes are easier to read because the cameras can even
read them on a smartphone.
It is possible to encrypt QR codes.

Disadvantages:

6. Barcode readers:
Uses:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
Uses:
More than one QR format is available.
QR codes can be used to transmit malicious data. Main output device for modern computers.
Mobile phones, laptops, video games use LCD screens.
Advantages:

Very efficient, low power consumption.


Lightweight devices.
Screens can be made in various sizes.
No flickering images.
Very sharp image resolution.

Disadvantages:

Colour and contrast from different angles are inconsistent.


Motion blur is a common issue.
Lower contrast than CRT monitors.
2.3. Output Devices and Their Uses
1. Cathode ray tube (CRT) monitors:
Uses:

Their large screens allow complex diagrams to be created in


Computer-aided design.
Used with light pens to allow designs to be created.

Advantages:
Can be seen at a wider range of angles, unlike LCDs.
Allow the use of light pens.

Disadvantages: 3. Touch screen (as an output devices):

They are very heavy and bulky. Uses:


They run very hot and can cause fires if left unattended.
They use a lot more power than LCDs. ATMs
Their flickering can lead to headaches. POS terminals
Information kiosks.
Image burn-in is a common issue.
Advantages:

Don’t need additional input devices.


They are very interactive, and many functions, such as
swiping, can be done.
They add a high-tech feel to devices and interfaces.

Disadvantages:

2. Liquid Crystal Display (LCD) screens:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

They tend to get dirty with frequent use. In uses where low noise is required.
Frequent use results in straining of arm muscles, RSI, etc. If fast, high quality, high-volume printing is required.
If large amounts of data are input/output, they aren’t very
accurate, and the interface isn’t very fast. Advantages:
Printing is fast.
They can handle very large print jobs.
Quality is consistently high.
Toner cartridges last for a long time.

Disadvantages:
They are only considerably fast if several copies are being
made.
Color laser printers are expensive to run.
They produce ozone and volatile organic compounds
because of their printing method and toner.

4. Multimedia projectors:
Uses:

Training presentations to allow the whole audience to see


images.
Advertising presentations.
Home cinema systems.

Advantages:

More people can watch as they don’t have to crowd around


a laptop.
Avoids the need for several networked computers. 6. Inkjet printers:
Disadvantages: Uses:

Images can be fuzzy. Where low-output volumes are required.


Expensive to buy. Where high-quality printing is required for single pages.
Set-up can be complicated.
Advantages:

High-quality output
Cheaper than laser printers.
Very lightweight
Don’t produce ozone and volatile organic compounds.
Disadvantages:

5. Laser printers:
Uses:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Slow output if many copies are needed. Very noisy


Can’t do large print jobs. Initial cost is more than an inkjet printer.
Printing can smudge if user isn’t careful. Very slow, poor-quality printing.
Can be expensive if used a lot.

7. Dot matrix printers: 8. (Graph) Plotters:


Uses: Uses:
Used in environments where noise isn’t a major issue. Producing architectural drawings
Carbon copies or multi-part outputs can be produced. Producing engineering drawings
Widely used in till receipts. Drawing animation characters.
Advantages: Advantages:
Can be used in varying environments unlike laser/inkjet Very high-quality output.
printers. can produce large, monochrome and color drawings very
Carbon copies or multi-part outputs can be produced. accurately.
Very cheap to run and maintain. Can print on a variety on materials.
Good for continuous printing.
Disadvantages:
Disadvantages:
Very slow printing.
Expensive equipment to purchase initially.
Have a very large physical footprint compared to a printer.

9. 3D printers:
Uses:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Custom-made prosthetic limbs. Speaker output can disturb irrelevant people in the same
In aerospace, if parts of the aircraft are made using 3d area, e.g., an office.
printers they can be very lightweight. Sound quality is high only expensive speakers.
Making spare parts for items that aren’t now manufactured, They take up a lot of desk space.
e.g., parts of a vintage car.

Advantages:

Manufacturing objects has become much easier.


Even though the initial cost is high, it is still cheaper than
the more conventional way.
Parts for machinery that aren’t available can be made.

Disadvantages:

Potential to make counterfeit items.


Could lead to manufacture of dangerous items by almost
anyone.
Job loss potential.
11. Actuators:
Uses:

Used to turn on motors, buzzers, and switches.


Allow a computer to control physical devices,
Advantages:

Allow remote operation of many devices.


Relatively inexpensive devices.

Disadvantages:
They are an additional device in the system that could go
10. Speaker: wrong.
As analogue devices, signals need to be converted using a
Uses: DAC.

Used in all phones and most computers.


Helps visually impaired people. 3. Storage Devices and Media
Plays downloaded sound files.

Advantages: 3.1. Backing-Up Data


Amplified sounds can be much louder than the original Backing up refers to copying files or data into a different
sound. medium in case of damage or loss of original copy.
Amplified sounds can be enough to be heard by a huge
crowd. Why do we back up data?
Very simple technology.
They are especially useful for blind people, for instance, To safeguard against loss of data.
reading e-books. To safeguard against damages caused by hackers.
In case files need to be sent elsewhere, to protect the
Disadvantages: original format of files.
Backups can be stored online for easy access.

3.2. Magnetic Backing Storage Media

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Holds data magnetically. Can be used as a backup system to prevent data loss.
The surface area of the media is magnetised so that it can It can be used to transfer data/files/software between
hold bits of data. computers.
The device that reads media can also read the bits held on
the surface area Advantages:

Data access time and data transfer rate are very fast.
Magnetic tape drives It has a very large memory capacity.
Uses: It can be used as a method of transferring information
between computers.
used in applications where batch processing is used.
used as a backup media where vast amounts of data need Disadvantages:
to be stored. They can be easily damaged if user accidentally drops it or
used in long-term archiving of data, they have huge data doesn’t correctly shut down the drive after use.
storage capacities and are known to be very stable. The data transfer rate is not as fast as for fixed hard disk
Advantages: drives.

They are generally less expensive than hard disk drives. 3.3. Optical Media and Optical Storage
It is a very robust technology.
They have a huge data storage capacity. Devices
The data transfer rate is fast.
Holds data by burning ‘dots’ onto the surface with a high-
Disadvantages: powered laser.
The data that reads the media can read the data by shining
Prolonged data access times (uses serial access). a lower-powered laser over the dots.
When updating, another tape is needed to store the final
updated version. CD-R/DVD-R ~ Write Once Only
They are affected by magnetic fields, a strong field can
corrupt data stored on the tape. Uses:

Fixed Hard Disks/Drives Home recordings of music and (CD-R) and films (DVD-R).
Used to store data to be kept for later use or transferred to
Uses: another computer.

To store the OS, systems software and working data/files. Advantages:


Storing applications files.
Used in real-time systems and in online systems. Cheaper medium than RW disks.
Used in file servers for computer networks. Once burned (and finalised), they behave like a ROM.

Advantages: Disadvantages:

They have a very fast data transfer rate and fast access It can only be recorded once; if an error occurs, then the
times to data. disk has to be thrown away.
They have a very large memory capacity. Not all CD/DVD players can read CD-R/DVD-R.

Disadvantages: CD-RW/DVD-RW ~ Read and Write


It can be fairly easily damaged. Uses:
They have many moving parts which affect overall
reliability. Used to record television programs which can be recorded
Their read/write operation can be quite noisy when over, time and time again.
compared to solid-state drives. Used in CCTV systems.
It can be used as a backup device for files and data.
Portable Hard Disk Drives
Advantages:
Uses:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

It can be written over many times. Home video consoles.


You can use different file formats each time it is used. Storing and playing back movies.
It is not as wasteful as the R format because the files/data Computers can use this technology for data storage or
can be added later. backing hard drives.
Camcorders can use this media to store movies.
Disadvantages:
Advantages:
It can be relatively expensive media.
Possible to accidentally overwrite data. Very large storage capacity.
Very fast data transfer rate.
CD-ROM/DVD-ROM ~ Read Only Memory The data access speed is also greater than with other
optical media.
Uses: Blu-ray discs automatically come with a secure encryption
system.
These are read-only memory (ROM), which means they
can’t be written over and can only be read. Permanent Disadvantages:
storage method.
CD-ROM is used to store music files and to store software, Relatively expensive discs.
computer games and reference software. Encryption problems when used to store videos.
DVD-ROM has much larger storage and is used to store The introduction of HD (high definition) DVD players has
films. reduced the advantages of using Blu-ray technology.
Used in applications where there is a real need to prevent
deletion or overwriting of important data. 3.4. Solid State Backing Storage
Advantages:
Holds data on devices that don’t have any moving parts.
They are less expensive than hard disk drive systems.
They are very portable as they are small and light. Solid-state drives (SSD)
Data stored on them is read-only, so it cannot be
accidentally overwritten. Uses:

Disadvantages: Storage device to store files, applications, OSs, and so on.

Hold far less data than hard disk drives or memory sticks. Advantages:
Very slow data transfer rate and data access times, as They are more reliable as they have no moving parts.
compared to hard disk drives. They are considerably lighter and suitable for laptops.
You cannot add your files to the disks because they are They do not have to ‘get up to speed’ before they work
both read-only. correctly.
They have lower power consumption.
Blu-Ray Discs They run much cooler than HDDs.
Because they have no moving parts, they are very thin.
The main differences between DVD and Blu-ray are: SSD data access time is only 0.1 milliseconds compared to
1. Blu-ray uses a blue laser rather than a red laser. (The 10 milliseconds for HDD.
wavelength of blue light is 405nm, much smaller than Data transfer speed for SSDs is also much faster than for
the 650nm red laser) This makes pits and lands much HDDs.
smaller, so they store five times more data than DVDs. Disadvantages:
2. Blu-ray disks automatically come with a secure
encryption system, which helps to prevent piracy and SSD endurance - SSDs are conservatively rated at only 20GB
copyright infringement. write operations per day over three years.
3. The data transfer rate for a DVD is 10 Mbps, and for a More expensive than magnetic hard disks.
Blu-ray disc, it is 36 Mbps. Smaller storage capacity than magnetic hard disks.
Uses: Hard Disk Drives (HDD)
Uses:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Storage device to store files, applications, operating Storing photos on digital cameras.
systems, and backups. Used as mobile phone memory cards.
Used in MP3 players to store music files.
Advantages Used as a backing store in hand-held computer devices.
Generally offers larger stroage capacities than SSDs. Advantages:
More affordable compared to SSDs.
Well-suited for long-term storage needs. Very compact.
Reliable for non-intensive read/write operations. Because they have no moving parts, they are very durable.
They can hold large amounts of data.
Disadvantages Compact cameras and smartphones can read and write
Have moving parts, making them more prone to damage. memory cards, allowing users to transport extensive
Heavier and bulkier compared to SSDs. collections of photographs, songs, etc.
Higher power consumption. Disadvantages:
Slower data transfer and access speeds compared to SSDs.
Generates more heat and noise. Expensive per gigabyte of memory when compared to
HDDs.
Pen drives (Memory sticks) Have a lower storage capacity than hard disks.
Have a finite life regarding the number of times they can be
Uses: read from or written to.
Memory cards, specifically the micro SD card, are the
Transporting files between computers or using them as a smallest sized devices available, making them more likely to
backing store. be lost, stolen or damaged. The storage should be sized
Used as a security device to prevent software piracy (known
cause the amount of storage does not prevent the drive
as a dongle).
from being stolen
Advantages: Users must often purchase a card reader or USB converter
to view the data.
Very compact and portable media.
Very robust.
Does not need additional software to work on most 4. Networks & the Effects of
computers.
They are not affected by magnetic fields. Using Them
Disadvantages:
4.1. Networks
Cannot protect the data/files by making it ‘read-only’.
Easy to lose (due to the small physical size). IP and MAC address
The user needs to be very careful when removing a An IP address (Internet Protocol address) is a unique number
memory stick from a computer - incorrect removal will assigned to a device on a network.
corrupt the data on the memory stick and make it useless.
IPv4 is a 32-bit address (e.g., 192.168.1.1)
Flash Memory cards IPv6 is a newer 128-bit address that allows many more
unique addresses (e.g.,
Different types of memory cards: 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
» SD cards (secure digital card; widely used in portable devices).
A MAC address (Media Access Control address) is a unique
» XD cards (extreme digital card; mainly found in older digital
identifier assigned to a network interface card (NIC). It is a
cameras).
hardware address and doesn’t change, unlike an IP address.
» CFast card (compact, fast card; designed for high-speed data
Routers
transfer in professional cameras).
Uses:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
A device that enables data to be sent between different types
of networks. It can be connected through cables or wirelessly 3. Switches: intelligent hubs. Used to connect devices to
to connect a LAN to the internet. form a LAN. Unlike hubs, the switches store the MAC
It can be used for: addresses of all devices on a lookup table. So, it only
sends data to the relevant device.
connecting networks and devices to the internet, In summary:
storing computer addresses,
routing data packets. Both are used to connect devices in LAN.
Both use data packets.
When a data packet is received, the router checks if the packet Hubs send data to every device on the network.
is intended for it or another network. The data packet is routed Switches send data to a relevant device only.
to the local switch/hub if it's meant for its network. If not, the Switches have better security.
data packet is sent to the relevant router, which sends it to the Switches use lookup tables to determine the destination for
relevant device. a data packet.
Switches use MAC addresses for relevant device locations.
They consult routing cables to know where to send the
data. 4. Bridges: Devices that connect one LAN to another LAN
that use the same protocol. Unlike routers, they can’t
A WAN (Wide Area Network) covers a large geographical area, communicate with external networks, such as the
like the internet. Internet.
A WLAN (Wireless Local Area Network) connects devices Comparison:
wirelessly within a small area like a building.
Data Packets Bridges connect LANs together; routers connect various
A data packet is a small chunk of data sent over a network. It types of networks together.
contains both the actual data and control information, such as Bridges scan MAC addresses while routers scan the IP
the destination address, source address, and error checking addresses.
bits. Both send out data in the form of data packets.
Bridges connect networks with the same protocol; routers
Common Network Devices can connect networks with different protocols.
The router uses routing tables to direct data packets, but
1. Network Interface Cards (NIC): These are needed to bridges don’t.
allow a device to connect to a network. Turns binary Bridges have only two ports; routers have multiple ports.
data into an electrical signal that allows network access.
Usually integrated into the motherboard. Wi-Fi & Bluetooth
Each NIC is given a unique hardwired media access control Both are used for wireless communication between devices.
(MAC) address. They both use electromagnetic radiation as the carrier of data
Media access control (MAC) address: a number that transmission.
uniquely identifies a device when connected to a network. Bluetooth uses:
The first six hex digits identify the manufacturer’s code, and
the next 6 identify the device’s serial number. When transferring data between 2 or more devices that are
very close together.
2. Hubs: they are hardware devices that can have several When the speed of data transmission isn’t crucial.
other devices connected to them. They are used to For low-bandwidth applications.
connect devices together to form a local area network
(LAN). It takes a data packet received by one of its ports Wi-Fi uses:
and sends it to all relevant or irrelevant devices that are
connected to it. Full-scale networks.
When the data transfer rate is crucial.
It is not very secure to broadcast data to all devices. For uses where a higher range and better security are
Unnecessary network traffic. required.

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
Differences and similarities:
A stable internet connection is always required.
Bluetooth uses a transmission frequency of 2.4 GHz, Data storage in clouds may be vulnerable to security
whereas Wi-Fi uses a 2.4 – 5.0 GHz range. breaches.
Wi-Fi has a much faster data transfer rate. The user depends on the storage provider for reliability and
Wi-Fi has a higher geographical range in which it is effective. availability of services.
Bluetooth only allows up to 7 devices to be connected The services may become expensive as the amount of
simultaneously, whereas the number of devices connected storage or bandwidth required increases.
to a Wi-Fi network depends on the router/routers used.
Bluetooth uses key-matching encryption. However, Wi-Fi Common Network Environments
uses WPA (Wi-Fi protected access) and WEP (wireless
equivalent privacy). 1. Internet:
Cloud Computing The Internet is a very large global network that consists of
many other interconnected networks
This method is where data is stored on remote servers The World Wide Web is a vast collection of web pages that
accessed online. can be accessed using a web browser.
The three types of cloud storage are: The World Wide Web allows you to access information by
using the internet
1. Public Cloud - The customer and the cloud storage
provider are different companies. Characteristics:
2. Private Cloud - The customer and the cloud storage
provider are a single organization. It is an open network, meaning everyone can access the
3. Hybrid Cloud - Combines public and private cloud same resources and information as everybody else.
options and allows sensitive data to remain private People from all over the world can communicate with each
while providing public cloud services for less sensitive other in real-time.
information. Available to anyone who has a suitable device and access to
any one of the interconnected networks.
Cloud data is duplicated and stored on other servers to
ensure availability during system failures, upgrades, and Uses:
maintenance. Education and training
Advantages: Social Networking
Online shopping
Services can be scaled up or down according to changing Entertainment
requirements.
Cloud storage eliminates the need for a business to 2. Intranet:
purchase expensive equipment for infrastructure and
maintenance. Usually private and are used to send information securely
Readily available globally, allowing both remote working and safely.
and data sharing. Access to an organization’s Intranet is restricted and only
Providers offer high levels of ensuring that services are accessible to authorized users such as employees.
always available. Intranets have many advantages over the internet, such as:
It can offer an almost unlimited amount of storage. better bandwidth than the internet,
A backup of the data from the cloud will allow full data data is kept within the organization,
recovery in case of incidents. less chance of hacking and attacks,
Files can be synced across multiple devices. administrators can manage access to external sites and
There is no need to carry storage devices around. links.

Disadvantages: Characteristics:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

A private network that is accessible to employees within a 1. Local Area Network (LAN): networks usually contained
company or organization. within a single building or small geographical location. It
Usually behind a firewall to ensure security. is made up of hubs and/or switches, which will connect
Allows for document sharing and the use of collaboration several devices together. One hub or switch commonly
tools between users. connects to a router, allowing LAN connectivity to other
It can be customized to meet the specific requirements of outside networks such as the Internet.
the business.
Users will require a username and password to access the Advantages:
Intranet.
Allows centralized management of updates, backups and
software installations.
3. Extranet: Can secure its devices with the use of firewalls, antivirus
Private Intranet that also allows access by selected parties software and other security features to prevent
that reside outside of the organization. These parties, for unauthorized access.
example, maybe customers, key stakeholders or clients. A LAN allows users on the network to share resources such
Users will have an authorization level once they have as printers and other peripherals.
successfully logged in, which will determine which Disadvantages:
resources they may access.
Similarities between the Internet, Intranet and extranet are The network may not function correctly in case of hardware
as follows: failure.
They are all web-based technologies They are more prone to attacks than standalone
They allow users to access information remotely computers.
They all use client-server architecture Data and peripheral accessing can be slow, based on
They all use security measures such as network traffic.
authentication and encryption LAN networks require maintenance to ensure the software
They all promote and facilitate information and is up-to-date.
resource sharing
Differences between the internet, intranet and extranet are 2. Wireless Local Area Network (WLAN): Local Area
as follows: Networks allow devices to connect wirelessly rather
The internet is a global network, whereas an than using physical cables. Wireless Access Points
intranet/extranet is a private network contained within (WAPs) are connected to an existing wired network,
an organization which provides wireless connectivity. Support a vast
The use of the internet covers a wide range of purposes, range of devices, such as smartphones and laptops, are
whereas an intranet/extranet is designed for specific very popular in public areas such as shopping malls.
users and purposes.
Advantages:
Much information is publicly available, whereas an
intranet/extranet is not. Allows users to connect anywhere in the range of a Wireless
The Internet is not owned solely by one person or Access Point (WAP).
organization, whereas the organization usually owns They can be used in various indoor and outdoor
intranets/extranets. environments, making them highly flexible.
As the requirements change, additional WAPs can be added
Network Types relatively easily.
Printer access can be given to wireless devices.

Disadvantages:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

The strength of their signals can be affected by obstacles Connection to a network exposes a user to:
such as walls. Hacking: Unauthorized access given to the computer.
Speeds can be affected by high-traffic areas. This can lead to identity theft or the misuse of personal
It can sustain interference from other devices which can information.
affect performance and connectivity. Phishing: Phishing involves getting sensitive
Can be vulnerable to security threats due to signal information, such as usernames, passwords, and credit
interception. card details, for malicious reasons by mimicking a
reliable webpage on the network
3. Wide Area Networks (WAN): is formed by several LANs Pharming: This is malicious code installed on a user’s
connected through a router. It is expensive. However, it computer or a web server; the code will redirect the
comes with a more enhanced security. Additional user to a fake website without their knowledge (the user
hardware is needed for a WAN: Routers, modems, and doesn’t have to take any action, unlike phishing).
proxy servers. Viruses: Program code that replicates (copies itself) to
delete or corrupt files and cause the computer to
Advantages:
malfunction
Provide the ability to connect geographically dispersed
locations, such as offices in different cities or countries. Passwords
Offer the flexibility to scale up or down based on the
organisation's needs. It is a common form of security often accompanied by a
Administrators can monitor and manage the network username or email address.
infrastructure from a single location. There are many ways to enhance the security of your
Disadvantages: password, such as the following:
Ensure that the password is changed regularly in case it
Setting up and maintaining a WAN can be expensive, has been obtained illegally or accidentally
especially compared to LANs. Ensure that the password uses a combination of
Cover larger distances and rely on public networks or uppercase, lowercase, numbers and special characters
leased lines, which can introduce latency and affect to make the password more difficult to guess.
performance. iloveict is a weak password
WANs are subject to the reliability and availability of 1lov3ICT# is a strong password
external service providers. Anti-spyware software can be run regularly to ensure that
your information, including your password, is not passed to
4.2. Network Issues and Communication an unauthorized third-party user.

Other Authentication Methods

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

1. Zero login: A security concept that eliminates Comparing the scanned files against an extensive database
traditional login methods, such as usernames and of known threats
passwords, using biometrics or other authentication Real-time scanning
factors for seamless and password-less access. Regular updates to gather an up-to-date list of known
2. Biometric Recognition: These authentication methods threats
use unique physical or behavioural characteristics, such Quarantine of infected files
as fingerprints, iris scans, or voice recognition, to verify Quarantining files allows threats to be automatically
a person's identity. deleted.
3. Magnetic Stripes: These are authentication features on Allows the user to determine if the file is a legitimate
cards storing data magnetically. They enable secure threat and not a false positive.
identification and authorization by containing encoded
information that magnetic stripe readers can read. Heuristic Checking: Instead of relying solely on a database of
4. Smart Cards: Smart cards are portable devices with known viruses, this method looks for behavioural patterns and
integrated circuits to store and process data. They are other features in a file to identify possible risks.
used for authentication, identification, and secure
transactions in various applications such as banking, Electronic Conferencing
telecommunications, and access control.
1. Video Conferencing: It is a form of audio and video
5. Physical Tokens: It is a type of authentication that
takes the shape of a solid object. The user communication. It serves as a stand-in for face-to-face
demonstrates ownership of the token through meetings between several persons who may reside
abroad or in another region of the country. It utilizes a
interaction with a login system. Physical tokens have
network in some way and is done in real-time.
embedded clocks that create one-time passwords
(OTPs) when a PIN and other authentication information The basic hardware includes:
are entered.
6. Electronic Tokens are applications that users install on webcams,
their hardware, such as smartphones. Say a person large monitors/television screens,
wants to access a website on a tablet computer. To microphones,
access this website, users must first authenticate speakers.
themselves using electronic tokens. The user has
already set up the electronic token app with their The software used are:
smartphone. The user launches the app on their Webcam and microphone software drivers
smartphone when the website asks them to verify their CODEC (coder and de-coder)
identity. The program creates an OTP that is only good Echo cancellation software
for a short period of time.
Advantages:
Anti-malware Software
It is much easier to access important documents or bring in
Anti-malware software is designed to protect devices ‘experts’ at key parts of the conference.
against viruses and malicious software. It has 3 primary It is possible to hold conferences at short notice.
purposes: detect, prevent and remove malicious software. Reduced travelling costs.
It is installed onto a computer system and will operate in There is no need to pay for hotel accommodation or venue
the background. hire.
Reduces the cost of taking people away from work for two
Standard features of Anti-Malware software include the or three days to travel.
following: Using video conferencing is better than having delegates
travel to potentially unsafe places worldwide.

Disadvantages:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
Advantages:
Potential time lag in responses/delays when talking.
Images can jerk. Allows participants to see each other through video,
It is very expensive to set up in the first place. providing a more immersive and engaging experience than
Problems if the delegates live in different countries with audio conferencing.
large time zone differences. Often offer screen sharing capabilities, enabling
Requires IT knowledge to some extent. participants to share presentations, documents, or other
It's not the best for people who consider travelling a job visual content in real-time.
perk. Often provide features like chat, polling, hand raising, and
Completely reliant on stable internet connections. Q&A sessions, fostering interactivity and engagement
among participants.
2. Audio Conferencing: Meetings held using audio
(sound) technology are called audio conferencing. The Disadvantages:
normal telephone network can be used for audio
conferencing, frequently called a phone conference. Heavily relies on internet connectivity and technical
infrastructure.
The hardware required is: They can be susceptible to distractions and multitasking.
It often has various features and settings that participants
a computer (with built-in microphones and speakers) need to familiarize themselves with, especially if they are
external microphone and/or speakers new to the platform.
an internet phone
a standard phone.
Advantages:
5. The Effects of Using IT
Allows participants to join meetings from any location. 5.1. Microprocessor-Controlled Devices
Eliminates the need for travel expenses, such as
transportation, accommodation, and meals. A microprocessor-driven labour-saving machine enables
Saves time by eliminating travel time and allowing meetings users to focus on other activities while the machine
to be scheduled and conducted quickly. completes its work. The second generation of devices
containing microprocessors is more user-friendly and has
Disadvantages:
more functionality, such as "intelligent tuning" in television
Lacks the visual aspect of face-to-face meetings, which can sets.
hinder communication. Advantages of microprocessor-controlled labor-saving
It can limit interaction and engagement compared to in- devices:
person or video conferencing.
Heavily relies on technology, and technical issues such as no need to do manual tasks at home
poor audio quality, background noise, or connectivity more time for leisure activities
problems are common. no need to stay home while chores are being done
web-enabled devices allow devices to be switched on or off
3. Web Conferencing: while the owner is out
Web conferencing, often known as webinars or
automated burglar alarms give a higher sense of security
webcasts, makes use of the Internet to enable
and well-being
conference calls. This system makes use of numerous smart fridges and freezers prevent food waste by keeping
computers that are interconnected over the internet. It track of products’ expiry, availability, etc.
operates in real-time, just like video conferencing, and
enables the following meeting types: Disadvantages of microprocessor-controlled labor-saving
» business meetings to discuss new ideas devices:
» presentations
» online education or training.

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
Uses:
unhealthy lifestyle due to inactivity caused by devices doing
all tasks monitoring traffic on motorways
tend to make people lazy congestion zone monitoring
potential deskilling automatic number plate recognition (ANPR)
any device containing a microprocessor and can automatic traffic light control
communicate using the internet displays a threat of air traffic control systems
cybersecurity breaches railway signalling systems

General advantages of using a microprocessor-controlled Advantages of transport monitoring and control systems:
device:
smart motorways keep updating according to changing
save energy due to being efficient, as well as turning off traffic conditions
after inactivity more efficient
can be easier 'programming' these devices to perform tasks traffic offences can be remotely penalized using ANPR
rather than turning knobs and pressing buttons manually car thefts can be spotted using ANPR
minimizes human errors, reducing the rate of accidents
General disadvantages of microprocessor-controlled
devices: Disadvantages:

lead to more wasteful devices If a hacker breaches security, the vehicle could be
can be more complex to operate for technophobes controlled by them.
leaving devices on standby is wasteful The system might come to a halt if it malfunctions.
Systems with a poor design could compromise safety.
Data Security Issues The easy tracking of harmless people's movements is made
possible by ANPR equipment. Who can access such data?
Any home appliance managed remotely could provide hackers
access to your personal information. These devices frequently Autonomous vehicles in transport
have default (or no) password settings, which makes it simple To properly execute their activities, autonomous cars require
for attackers to get sensitive information. For instance, it is sensors, cameras, actuators, microprocessors (along with very
easy to discover holiday dates by hacking into a central heating complex algorithms). Automobile control systems can
controller (or the software used to interface with it), making a accomplish essential tasks by sensing information from
home an obvious target for break-ins. It is likely for a hacker to cameras and ultrasonics.
obtain important information, such as credit card numbers, if Consider an autonomous vehicle approaching a set of red-
the refrigerator or freezer automatically orders goods from a lighting traffic signals.
retailer.
The vehicle's control system must first recognize the road
Social Interactions sign before consulting the database to determine the
appropriate action.
The positive aspects include: The CPU must instruct the actuators to apply the brakes
and put the gear in "park" since the traffic light is red.
easier to make new friends using chat rooms The light must be continuously watched until it turns green.
easier to find people who share similar interests/hobbies After that, the CPU will again tell the actuators to engage
less expensive to keep in touch using VoIP technology. first gear, let go of the brakes, and open the throttle
(accelerator).
The negative aspects include:
Advantages of an autonomous car, bus, or van:
people do not meet face-to-face as much (social isolation)
a lack of social interaction may make people more anxious
about meeting people in real life
When communicating online, people can act less politely or
more harshly, and cybercrime is a serious issue, especially
for teenagers.

Monitoring and Controlling Transport

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

safer due to the removal of human error security aspects due to the absence of pilots
due to the more efficient operation of vehicles, it is better emergencies may be challenging to deal with
for the environment hacking into the system
reduced traffic congestion passenger reluctance
increased lane capacity software glitches can be catastrophic
reduced travel times
stress-free parking for motorists 5.2. Potential Health Problems related to
Disadvantages: the Prolonged use of IT Equipment
very high installation prices Long-term exposure to computing devices may affect user well-
driver and passenger reluctance of the new technology being.
reduction in taxi requirements could lead to unemployment Mentioned below are some of the health issues, accompanied
maintenance of the sensors and cameras is crucial by their causes and prevention tactics:
the ever-present fear of hacking into the vehicle’s control 1. Repetitive strain injury (RSI): A condition affecting the
system muscles and nerves
Advantages of an autonomous train: Cause: repetitive movements and overuse of muscles, such as
wrists
improved punctuality Minimizing health risks: regular breaks, ergonomic equipment,
reduced running costs due to fewer staff correct typing techniques.
no human error 2. Back and neck strain: Back pain and other related issues.
minimized energy consumption Cause: due to prolonged use of monitors
possible to increase the frequency of trains as the Minimizing health risks: use adjustable chairs, footrests, and
possibility of delays is removed tiltable screens.
more straightforward to update changes in train schedules 3. Eyestrain: strain and fatigue, unwanted harm to vision.
Cause: due to bad lighting and prolonged screen usage.
Disadvantages: Minimizing health risks: use LCDs instead of CRTs, take regular
breaks, use anti-glare screens, and do regular eye testing.
fear of the system being hacked into
4. Headaches: pain or discomfort in the head or face area.
initial instalment costs are very high
Cause: incorrect lighting, screen reflections, flickering screens,
ensuring passenger behaviour is vital, especially during
etc.
rush hours.
Minimizing health risks: use anti-glare screens, take regular
human reluctance to new technology
breaks, regular eye-testing.
without drivers, CCTV monitoring will be continuously
5. Ozone irritation: inflammation and irritation of the tissues
required
lining human airways
Advantages of autonomous aeroplanes: Cause: inhalation of ozone released by laser printers in an
office.
improvement in passenger comfort Minimizing health risks: proper ventilation, laser printers
reduced running costs, fewer staff should be housed in a separate room, replace laser printers
as most accidents are due to pilot-induced errors, safety is with inkjet printers, if possible.
improved
improved aerodynamics as an outcome of the removal of
the cockpit 6. ICT Applications
Disadvantages:
6.1. Communication

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Newsletters and posters Uses a mixture of media to present information:


animations, video, sound, transitions, hyperlinks
Paper-based communication is used to inform people Produced using software packages
about their interests Used with a projector so a large audience can view
Schools use these to inform parents about events/dates Advantages
Advantages Use of sound and animation/video effects
Released regularly Interactive/hyperlinks built into presentations
The recipients have a permanent copy More likely to hold the audience’s attention
Disadvantages Disadvantages
Requires distribution Need for special equipment – expensive
There are no special effects, sound/video/animation It may require internet access
There are printing costs, paper/ink Distracts the audience from the sole content of the
The targeted audience may or may not receive the presentation
information It is very easy to make a presentation with too many
features
Websites
Media streaming
Collection of webpages, text, graphics, video, and sound
Hosted on a web server on the internet Real-time transition of audio and video files over the
Need to write code or use a web authoring application internet
Hyperlinks to other pages can be added allows users to access content without downloading it to
Interactive websites require programming knowledge their devices
Can use a camera, scanner, and microphone to input data popular services include Spotify, YouTube, and social media
Usually, hire space from the web hosting company websites
Advantages uses buffering, which makes sure the video plays back
Ability to add sound/video/animation smoothly without freezing. While the buffer receives data
Links to other websites/hyperlinks packets, it sends previously received ones to the playback
The use of hot spots device so that there are no gaps in the played data
Buttons to navigate/move around the website Advantages
Hit counters to see who has visited the websites Users can access any information at any time and from
worldwide advertising capability any location
Disadvantages Offers an extensive library of content
Can be hacked and modified, or viruses introduced Compared to traditional cable or satellite TV
Need for a computer and internet connection subscriptions, media streaming can be more cost-
Lack of portability compared with the paper-based effective
system Disadvantages
Need to maintain the website once it is set up Heavily relies on a stable and high-speed internet
connection.
Multimedia Presentations Not all content is available on every streaming platform
due to licensing agreements and exclusivity deals.
You don’t own the media when streaming media, so if
the streaming service removes a movie or a TV show
from its library, it may no longer be accessible to you.

ePublications

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
3. Voice over Internet Protocol (VoIP): a communication
digital versions of printed materials, such as eBooks, technique for Internet users. VoIP transforms sound captured
eMagazines, and eNewspapers. by the built-in mic of the cell phone into individual data packets
It can be read on electronic devices. that may be transmitted via the internet to their intended
Advantages recipient.
aid portability 4. Video calls: enables real-time video conversing between
they are often more affordable than paperback books. multiple participants with a camera-enabled device. Uses an
Offer interactive elements that enhance the reading internet connection or cellular data. Software that may be used
experience. for video calling includes FaceTime, Skype, and Zoom.
Disadvantages 5. Accessing the Internet: Another helpful feature is accessing
reading from an electronic device for a prolonged time the net from a mobile device. Any mobile device with a wireless
can cause eyestrain. broadband connection or a mobile phone network can link to
ePublications lack the tactile experience and physical the internet.
presence that some readers enjoy.
compatibility issues can arise if the ePublications is in a
format that is not supported by the reader's device or 6.2. Modelling Applications
software.
Advantages of using models:
Comparison of Posters and E-publications using models is less expensive than having to build the real
thing
Posters
safer to use a computer model
Printed and displayed in physical locations allows you to try out various different scenarios in advance
Static and cannot be updated once printed nearly impossible to try out some tasks in advance in real
Limited in design features (no animation/sound) life due to high risk
Audience must be physically present to see them faster to use a computer model than to do the real thing

E-publications Disadvantages of using models:

Digital format, often accessed via websites or email a model can’t be completely reliant as the output is entirely
Can be updated quickly and easily based on the input
Supports multimedia (videos, sound, interactive links) frequently, computer modelling can be a very costly option
Wider reach as they can be viewed anywhere online human reluctance is a common problem in this technology

Some of the applications of computer modelling include:


Mobile Communication
1. Personal finance: Computer modelling involves using
Mobile devices support many forms of communication, such mathematical algorithms and data analysis to simulate various
as: financial scenarios, such as investment strategies, retirement
1. Short message service (SMS) messaging: permits planning, and risk assessment, aiding individuals in making
extremely quick communication with another person via typing informed decisions and optimizing their financial goals.
on a keyboard (a mobile phone or tablet's keyboard is 2. Bridge and building design: Computer modelling is crucial
frequently virtual). Its benefit is that the recipient can get the in bridge and building design. It allows engineers to simulate
text whenever they choose without being available. and analyze structural behaviour, assess load capacities, and
2. Phone calls: Making calls while on the go is among the most predict the response to external forces. It aids in optimizing
fundamental applications of a mobile phone. Mobile phones designs, ensuring structural integrity, and minimizing potential
are the perfect method to stay in correspondence anywhere risks before construction begins.
there is a network signal because they are compact and have
an independent battery.

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
3. Flood water management: Computer modelling plays a
vital role in flood water management by simulating water flow Advantages of using computer modelling rather than
behaviour, predicting flood extents, and assessing potential humans:
flood risks. It helps design and optimise flood mitigation It can provide more precise and accurate results than
measures, such as levees and floodplain zoning, allowing human-based methods, minimizing errors and
authorities to make informed decisions, develop effective increasing reliability.
emergency response plans, and minimize the impact of Can analyze large amounts of data and perform
flooding on communities. complex calculations faster than humans
4. Traffic management: Computer modelling simulates and It can be reused and updated easily, reducing the need
analyses traffic flow, predicts congestion patterns, and for repetitive manual analysis and potentially lowering
optimises traffic control strategies. It aids in designing efficient costs in the long run.
road networks, optimizing signal timings, and evaluating the Disadvantages of using computer modelling rather
impact of transportation infrastructure projects. This enables than humans:
authorities to make informed decisions, alleviate congestion, It may overlook nuanced factors or intangible elements
and improve overall traffic efficiency for better urban mobility. that humans can consider, leading to potential gaps or
5. Weather forecasting: Computer modelling plays a pivotal inaccuracies in the analysis.
role in weather forecasting by simulating the Earth's Based on assumptions and simplifications, introducing a
atmosphere, oceanic conditions, and other environmental level of uncertainty.
factors. These models use complex algorithms to predict Their programmed algorithms and data inputs bind
weather patterns, including temperature, precipitation, wind models. They may struggle to adapt to unforeseen
speed, and storm systems. By assimilating real-time data, circumstances or rapidly changing conditions that
computer models provide forecasts that aid meteorologists in humans can more readily navigate and respond to.
predicting weather conditions, issuing warnings, and helping
society prepare for potential hazards. 6.3. Computer-controlled Systems

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

6.4. School Management Systems 6.5. Booking Systems


Computer-controlled School Management Systems: These web-based platforms and applications allow users to
Comprehensive software applications that automate reserve and purchase tickets or services for various events and
administrative tasks, such as attendance tracking, grading, industries. Some of the applications for online bookings
scheduling, and student information management, improving include:
educational institutions' efficiency, accuracy, and organization. 1. Travel industry: Booking flights, hotels, and holiday
packages provides a convenient platform for travellers to plan
and book their trips.
2. Concerts: Reserving tickets for live music events allows
music fans to secure their spot at popular concerts.
3. Cinemas: Booking movie tickets in advance enables cinema-
goers to reserve seats and avoid queues.
4. Sporting events: Purchasing tickets for sports matches and
competitions offers sports enthusiasts an easy way to attend
their favourite events.

Advantages:
convenience and accessibility
instant confirmation and ticketing
ability to compare prices and options
promotions and personalized offers
faster to change/update
automated reminders via email/text
repeated bookings can be easily made
cost-saving as there are fewer wages due to reduced
staff requirements
Disadvantages:
potential for technical issues
possible security and privacy concerns
transaction and booking fees
impersonal customer service
dependent on a stable internet connection
can lead to unemployment

6.6. Banking Applications


Online banking systems depend on the ability to update
files instantly to avoid double scheduling, which might
occur if the system reaction time is slow.
The use of computer technology has revolutionized how we
do our banking transactions, for example:
Internet banking
The use of automated teller machines (ATMs)
Chip and PIN technology

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
Several credit/debit cards come with a magnetic stripe and a
Automated Teller Machines (ATMs) chip; the chip houses essential data like the PIN. This technique
is intended to increase security because it is superior to a
Automated teller machines (ATMs) are places where customers signature. A chip and PIN card to make purchases is an
can get cash (or carry out certain other banking activities, such example of an electronic funds transfer (EFT).
as ordering a statement) using their credit or debit card.
If the limit is not exceeded and all other checks are OK, then Advantages of credit cards:
the transaction is authorized, and the machine then counts out customer protection if ordered goods don’t arrive
the cash internationally accepted payment method
interest-free loan if money is paid back within the
Advantages: agreed time period
possible to withdraw at any time of the day can make purchases online
offer many banking services without having to go to the Disadvantages of credit cards:
bank can be charged high interest rates
possible to access an account from anywhere in the annual fees often apply
world easy to end up with credit damage
usually provides quicker service than waiting in a queue security risks in online transactions
at a bank Advantages of debit cards:
Disadvantages: money comes from the user’s current account, there is
often in places where theft can take place at night no interest
potential for shoulder surfing safer than carrying cash
some banks charge customers for using ATMs can make online purchases
cash withdrawal limits are often imposed on people Disadvantages of debit cards:
less customer protection if goods don’t arrive
Electronic Funds Transfer (EFT): no credit allowed; funds are needed at the time of
purchase
It is possible to send money transfer instructions directly to a security risks in online transactions
bank's computer system via electronic funds transfer (EFT)
technology. The system depends on electronic money transfers Cheques
between accounts; no cash is moved. The computer system
automatically moves the requested amount from one account Individuals and organizations use cheques as a form of
to another when it receives an EFT command. payment. When issuing a cheque, the payer writes the
recipient's name, the payment amount, and the date on the
Advantages:
cheque. The recipient then deposits or presents the cheque to
very secure payment method
their bank for processing. The payer's bank verifies the fund’s
very quick payment method availability, and upon clearance, the specified amount is
less expensive than cheques transferred from the payer's account to the recipient's account,
the customer has the right to dispute an EFT payment completing the transaction.
for up to 60 days
Disadvantages:
the bank transaction can’t be reversed without full
dispute investigations
customer needs to have funds available immediately
cannot guarantee the recipient’s identity

Credit/debit card transactions

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Advantages: Using 3D printers in medicine:


more convenient and safer than cash Prosthetics: 3D printers print out artificial body parts
can be post-dated such as false teeth, artificial limbs, hearing aids, etc. This
can be traced if they are lost is a less expensive method of replacing body parts.
Disadvantages: Tissue engineering: it is the field of combining cells,
aren’t legal tender and can be refused biomaterials, and engineering principles to create
slow method of payment functional tissues or organs, aiming to repair or replace
easier for fraudsters than other methods damaged or diseased tissue in the human body.
relatively expensive payment method Artificial blood vessels are synthetic structures
designed to mimic the function of natural blood vessels,
Internet Banking facilitating the flow of blood and nutrients throughout
the body to support tissue repair and regeneration.
Enable online access to banking services via a secure website Customized medicines are personalized drug
or app, allowing for transfers, bill payments, account formulations tailored to individual patients' specific
management, and more. needs. They utilize advanced technology and precise
measurements to create medications with accurate
Advantages:
dosages and unique compositions, optimizing
convenience and availability
treatment outcomes.
easy account management
branch visiting won’t be a requirement
interest rates may be better 6.8. Expert Systems
more accessible to shop around for the best account
Disadvantages: It is an AI-based computer program that emulates the decision-
security of transactions making capabilities of human experts. It uses knowledge and
requires a reliable internet connection rules to provide accurate advice or solutions in a specific
More risk of fraud domain.
Easier to make errors Examples include:
Physical cash can't be deposited/withdrawn Diagnostics
Mineral prospecting
6.7. Computers in Medicine Tax and financial calculations
Strategy games
Information Systems in Medicine Identification of plants, animals and chemical compounds
Route scheduling for delivery vehicles
Patient records: Healthcare professionals maintain
databases to communicate information between them and
pharmacists (for instance, to guarantee no medications are
administered that interact dangerously with one another).
Pharmacy records: Pharmacy records maintain a
comprehensive record of patient prescriptions. This
includes details like the prescribed medication, dosage,
quantity dispensed, prescribing physician's information,
and the date of dispensing. These records help track
medication usage and can be used to verify prescription
accuracy and detect potential drug interactions or allergies.

3D Printers

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

The interactive screen asks questions for the doctor to


answer using a keyboard or a touch screen.
The inference engine compares the symptoms with the
knowledge base, using the rule base to find matches.
The system suggests the possible illness with a probability
of each, cures, and recommendations on the next step.
The explanation system will explain how that particular
diagnosis was suggested.

6.9. Computers in the Retail Industry


Point of sale (POS) terminals: Computerized systems used at
Components of an Expert System checkout counters to handle purchases and oversee stock. It is
1. User Interface extensively used in retail stores to process sales transactions.
They enable quick and secure payment processing through
This is the only thing that the end user sees various methods, including cash, credit/debit cards, mobile
Allows the user to interact with the system payments, and digital wallets. POS terminals calculate totals,
Often requires training to operate effectively generate itemized receipts, update inventory, and provide real-
time sales data for effective business management.
2. Explanation system
Some features include:
Informs the user of the reasoning behind the expert
update stock files immediately
system’s conclusions track inventory levels in real-time
It will supply a conclusion and any suggested actions to take
prevent stock discrepancies and ensure accurate
It will also give the percentage probability of the accuracy of
records
its conclusions
monitor inventory levels and reorder when stock is
3. Inference engine lower than a predefined value
streamline supply chain management and minimize
The main processing element of the system stockouts
It acts like a search engine examining the knowledge base
Responsible for gathering information Electronic funds transfer at Point of sale (EFTPOS)
This is the problem-solving part of the system terminals: Devices for processing electronic payments; they
Attempts to use information gathered from the user to find allow customers to make payments using debit or credit cards
a matching object by securely transferring funds from their bank accounts.
EFTPOS terminals authenticate and authorize transactions in
4. Knowledge base real-time, providing convenience and security for customers
and businesses during retail purchases.
It is a repository of facts The process of checking credit and debit cards at a
stores all the knowledge about an area of expertise supermarket EFTPOS is much the same as was described for
a collection of objects and their attributes paying a restaurant bill in Section 6.6.
5. Rules base Some functions of EFTPOS include:

The rules base is a set of inference rules.


Used by the inference engine to draw conclusions
They follow logical thinking

How an expert system is used to produce possible


solutions
Below is an example of how an expert system works to
diagnose a medical issue:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Use of chip and PIN cards: increased competition


Enhance security with two-factor authentication digital fraud and security concerns
Require customers to enter a personal identification technical issues and downtime
number (PIN) costs of delivery and return
Use of contactless cards: fake negative reviews can lead to a lousy company
Allow for faster transactions reputation
Enable customers to tap their card on the terminal
Use of Near Field Communication (NFC): 6.10. Recognition Systems
Facilitate payments through smartphones and other
devices 1. Optical Mark recognition (OMR) media in schools:
Increase convenience for customers
Communication between supermarket computers and bank School registers: Paper-based registers are fed into OMR
computers: to be scanned and stored in a database.
Share transaction details securely Multiple-choice examination papers: The position of a
Enable instant payment processing and verification mark is stored in a computer’s memory after being read by
the OMR, a device using a template that maps out the X-Y
Internet Shopping coordinates of each tablet (pen/pencil mark).
Used at POS terminals for scanning and reading the
Characteristics of Internet Shopping: information stored in barcodes.
Many digital devices have OMR scanners, which may be
Online stores accessible through web browsers
used to scan QR codes.
A wide variety of products and services are available
Advantages:
Convenient and often open 24/7 very fast way of inputting the results of a survey
Advantages (To customer): more accurate than keying in data
more accurate than OCR methods
access to the global market Disadvantages:
comparison between different products effortlessly designing the forms is a very complex job
can shop from anywhere in the world there can be problems if they haven’t been filled
able to avoid queues and busy stores correctly
often only work with black pens or pencils
Advantages (To business):
2. Optical Character Recognition (OCR)
can target prices and services based on buying data
can update stock availability and prices more quickly than a
physical store
cheaper to publicize special offers
international customer base
increased profits due to lower staff
Disadvantages (To customer):

security concerns
can’t correctly examine products before purchase
occasionally, products may take weeks before being
delivered
additional shipping and handling costs
lack of face-to-face interaction with staff

Disadvantages (To business):

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
3. RFID in tracking stock:
Automatic Number Plate Recognition (ANPR) systems:
The sensor sends a signal to instruct a camera to
capture an image of the front of the vehicle
An algorithm is used to locate and isolate the number
plate from the image taken by the camera.
The brightness and contrast of the number plate are
first adjusted. Each character on the number plate is
then segmented.
Each character is then recognized using OCR software.
The characters are converted into a string of editable
text by the software.
This text string is then stored in a database.
A barrier is raised, and the motorist is issued with a
ticket. The ticket shows the date and time of entering
the car park.
When the car returns to the car park, they insert their
ticket into a machine that calculates their charges and
registers the payment into the database.
Advantages:
Used to automatically monitor the average speed of
vehicles over a stretch of road.
There is no need to employ a car park or security
guards.
It's a much faster system than checking a ticket at the
exit.
It can automatically control the entry and exit to a car
park or private roads.
It can be used as a security system to prevent illegal
parking.
It can be used to analyze driver behaviour.
It can be used in inner-city congestion charging systems.
Disadvantages:
A lack of manned security car park surveillance could
lead to vandalism.
There could be an invasion of privacy due to recording
drivers’ number plates.
Damaged or very dirty number plates will not be
recognized.
The ANPR system only recognizes the number plate and
not the car so that a car can be fitted with a cloned
number plate, thus bypassing car park security, for
example.

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
4. Near Field Communication (NFC):
Used to determine the exact location of several modes of
Enables short-range wireless communication between transport
devices. Cars usually refer to GPS as satellite navigation systems
Allows payment using a smartphone. Satellites surrounding the Earth transmit signals to the
Advantages: surface
Convenient and secure method of payment Computers installed in the mode of transport receive and
allows for contactless transactions interpret these signals
Disadvantages: Knowing their position on the Earth depends on very
Limited range accurate timing – atomic clocks are used in the satellites,
compatibility issues with some devices which are accurate to within a fraction of a second per day
Each satellite transmits data indicating its position & time
5. Biometric recognition: The computer on board the mode of transport calculates its
Usually refers to automated technologies for authenticating exact position based on the information from at least three
satellites
and verifying human body characteristics such as face, iris,
retina, finger, thumb, hand and voice. Satellite Navigation (satnav):
Advantages:
very high accuracy Used to determine the exact location of a car.
very easy to use The computers onboard can be used to show directions to
very fast verification time a destination.
non-intrusive method
relatively inexpensive technology Advantages:
Disadvantages: Better focus as there isn’t a need to constantly check paper
it can make mistakes if the skin is dirty or damaged maps.
very expensive to install and set up Reduces fines by warning drivers about upcoming speed
uses a lot of memory for the data to be stored
changes.
a person’s voice can be quickly recorded and used for The system shows an Estimated Time of Arrival (ETA).
unauthorized access It is possible to program in the fastest route to avoid towns.
an illness, such as a cold, can change a person’s voice, The system can also give helpful information such as the
making absolute identification difficult or impossible location of petrol stations.

6.11. Satellite Systems Disadvantages:


If the maps are not updated, they can give incorrect
Global Positioning Systems (GPS) instructions.
Road closures due to accidents or roadworks can cause
problems.
The loss of satellite signals can cause problems.
The system will give incorrect information if an incorrect
start-point or end-point is keyed in.

Geographic Information Systems (GIS)

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Used to capture, manage, analyze, and display


geographically referenced information. 7. System’s Life Cycle
Use to determine the distance between two places.
Used to find the nearest petrol station or restaurant, etc.
To protect animal and plant life in certain vulnerable places. 7.1. Stages of System's Life Cycle:
It can be used in geography, science, or engineering
lessons. 1. Analysis
2. Design
Advantages: 3. Development & Testing
4. Implementation
Allows geographical and thematic data of any kind to be 5. Documentation
combined to show how they are connected to each other. 6. Evaluation
It allows the handling and exploration of vast amounts of
data. Analysis of the Current System
It allows data to be integrated from a wide range of very
different sources. The current system is studied using four different
methodologies. These are the four techniques:
Disadvantages:

The learning curve on GIS software can be very long.


GIS software is very expensive.
GIS requires enormous amounts of data to be input.
It isn't easy to make GIS programs that are both fast and
user-friendly.

Media Communication Systems


Using satellite signals for communication.
Used by media companies when sending
stories/videos/pictures from remote locations.

Advantages:

They have good global coverage.


They are cheaper, faster, and safer than laying cables in
difficult or treacherous terrain.
They have very high bandwidth.
It is relatively easy to expand the network.
Security in satellite transmission is very good because data
is coded, and the receiver requires decoding equipment.
During emergency situations, it is relatively easy to move
stations on the ground from one place to another.
They are well-suited for broadcasting.
Enable mobile communication in very remote locations.

Disadvantages:
There is a time delay in receipt of the signals.
The signals received can be affected by bad weather.
Sunspot activity can affect the performance of a satellite.
They must be monitored and controlled regularly to remain
in the correct orbit.

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Observation: Data inputted, processed, and outputted into the system


involves watching users interact with the system to are identified.
figure out its workings Problems with the current system are identified. What
it is used for understanding how users interact with the could be improved?
current system The requirements of the user and the potential new system
Advantages: provides first-hand, unbiased information are identified. What is the new system meant to do?
Disadvantages: can be time-consuming, may not reveal Problems: issues that users face with the current system
all issues User requirements: what needs to be added to the new
Interviews: system
direct one-to-one conversations with users on their Information requirements: data or information the new
experience with the current system system must process
used to gather comprehensive information about
individual users New System Requirements Specification:
Advantages: allows for in-depth exploration of issues • Once the systems analysts have completed the systems life
Disadvantages: relatively expensive, time-consuming, no cycle analysis stage, they should be fully aware of the current
user-anonymity, which may affect the response system's limitations.
Questionnaires: • The next step will be to design a new system (normally
set of predetermined questions is given to the users to computer-based) to resolve the problems identified by the
complete and give their opinion on the current system users and the systems analyst.
it is majorly used in collecting data from a larger group • The Requirements Specification will be created, outlining the
of people required improvements and expectations for the new system.
Advantages: allows for quantitative analysis, efficient
data collection, questions can be answered quickly System Specification
Disadvantages: limited by predetermined questions,
may suffer from low response rates, users may Hardware and Software Selection
exaggerate answers due to anonymity
Examination of existing documents:
reviewing system documentation, user guides, or
reports
understanding the current system's design and any
known issues
Advantages: provides insights into the system's history,
can reveal previously unknown issues
Disadvantages: it may be outdated, incomplete, time-
consuming, and rather expensive.

Record and Analyse Information about the Current


System
Identifying key aspects of the current system

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

It is vital to identify the suitable hardware needed for the Data capture forms: These are designed to collect data
new system from users in a structured format. They come in two types:
contemplating system requirements, compatibility, paper-based and electronic-based. Paper-based data-
costs capturing forms must be carefully designed with headings,
justifying choices based on user needs and system concise instructions, character and information fields,
performance checkboxes, and enough writing space. Text boxes, on-
Hardware that needs to be considered: screen help, drop-down menus, radio buttons, automatic
barcode readers, validation, and control buttons for data entry are all
scanners, features of computer-based forms.
touch screens, Consider a user-friendly layout, clear instructions, and
3D printers, appropriate data fields.
monitors,
speakers. Output Formats
Identifying suitable software needed for the new system
considering functionality, compatibility, and ease of use Screen layouts: how information is presented to users on
justifying choices based on user requirements and a screen
system efficiency Report layouts: how information is organized in a printed
Software that needs to be considered: or digital report
operating system, Consider readability, visual appeal, and efficient use of
applications software, space
size of storage,
type of storage. Validation Routines
It is a method of examining data submitted to a computer to
7.2. Design determine if it meets specific requirements. It is a routine check
that the computer does as part of its programming.
Once the analysis has taken place and the systems analyst has 1. Range check: ensures data is within a specified range of
some idea of the scale of the problem and what needs to be values
done, the next stage is to design the critical parts of the 2. Character check: ensures data contains only allowed
recommended system. characters
3. Length check: ensures data is of a specified length
File/Data Structures 4. Type check: ensures data is of the correct data type
5. Format check: ensures data conforms to a specific format
Field length: number of characters allowed in a field
Field name: an identifier for the field in the data structure 6. Presence check: ensures data is present and not left blank
Data type: specifies the kind of data that can be stored in a 7. Check digit: a digit added to a number to verify its accuracy
field, e.g., text, numbers, dates
Coding of data: using codes to represent data, e.g. M for 7.3. Development and Testing
male, F for female
Guarantees the system's functionality before it is put into
Input Formats use.
Identification and removal of errors, thus improving system
reliability and performance.

Test Designs
Test data structures, file structures, input formats, output
formats, and validation routines
Ensure all components function correctly and interact
seamlessly

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT
1. Direct changeover:
Test Strategies
The old system is replaced by the new system immediately
Test each module: verify that the individual components Used when quick implementation is necessary
function as intended Advantages
Test each function: ensure all features work correctly fast implementation
Test the whole system: confirm overall system performance cost-effective as only one system is in operation
and integration Disadvantages
High risk of failure
Test Plan no fallback
users can’t be trained on the new system
Test data: specific data used for testing purposes
Expected outcomes: predicted results based on test data 2. Parallel Running
Actual outcomes: results obtained from testing
Both current and new systems run simultaneously for a
Remedial action: steps taken to fix identified issues
period before the old system is phased out
Used when a smooth transition with minimal risk is
Test Data Types required
The following data types will be explained using the example of Advantages
months in a year. Lower risk
easy system comparison
Normal data: valid and expected data values within the Disadvantages
range of acceptability have an expected outcome. E.g., any Time-consuming
whole number between 1 and 12. resource-intensive
Abnormal data: invalid or unexpected data values. This
can either be: 3. Pilot Running
Data outside the range of acceptability or The new system is implemented in a small, controlled
Data that is the wrong data type environment before full-scale implementation
In this case, examples could be… Used when testing the new system in a real-world setting
any value less than 1 (i.e. 0, -6, etc.) Advantages
any value greater than 12 (i.e. 13, 15, etc.) Low risk as only trialled in one
letters or nun-numeric data (i.e. July, etc.) department/centre/branch
non-integral values (i.e. 3.5, 4.2, etc.) allows for fine-tuning
Extreme data: values at the limits of acceptability (E.g. 1 or staff have time to train with the new system
12) few errors as it's fully tested
Disadvantages
What is live data? Slower implementation
potential inconsistencies
Data that has been used with the current system
confusion as there are two systems in use
Hence, the results are already known
There is no backup for the department/center/branch
using the new system
7.4. Implementation
4. Phased Implementation
The system must then be fully implemented after it has been
thoroughly tested.
We will now think more carefully about switching to the new
system. Four popular techniques are utilized to transition from
the old system to the new one.
Before selecting the approach best suited for a given
application, the pros and cons of each must be carefully
considered.

4 Methods of Implementation

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

The new system is implemented in stages, with each stage Purpose of the system/program: Explanation of the
replacing a part of the old system system's intended function and goals
Used when a gradual transition is preferred to minimize Limitations: Known constraints or issues with the system
disruption Program listing: The code or scripts used in the system
Advantages Program language: The programming language used to
reduced risk develop the system
easier to manage Program flowcharts/algorithms: Visual representations
Disadvantages or descriptions of the system's logic and processes
Takes longer System flowcharts: Visual representations of the
potential compatibility issues interactions between system components
Hardware & software requirements: Necessary
7.5. Documentation equipment and software to run the system
File structures: Organization and layout of the system's
In the life cycle of a system, documentation enables the files and data
correct recording of design, implementation, testing, and List of variables: Collection of variables used within the
maintenance data, facilitating effective communication, system, including their names and purposes
troubleshooting, and potential future improvements. Input format: Structure and format for entering data into
Technical documentation: detailed information on the the system
system's inner workings and programming for developers Output format: Structure and format for presenting data
and IT staff generated by the system
Sample runs/test runs: Examples of system operation,
Used to maintain, repair, and update the system with including input and expected output
improvements Validation routines: Techniques used to check and
confirm the accuracy of data entered into the system

User Documentation
Instruction and guidance for end-users on how to operate the
system. Used to help users effectively use the system and
overcome problems

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Purpose of the system: Explanation of the system's Assess the Efficiency of the Solution
intended function and goals
Limitations: Known constraints or issues with the system Analyse the system's efficiency in time, money, and
Hardware & software requirements: Necessary resource use. Examine whether the system is performing at
equipment and software to run the system its best or if its efficiency could be increased.
Loading/running/installing software: Instructions for Provide examples of specific aspects that contribute to
setting up the system on user devices the system's efficiency
Saving files: Procedures for storing data within the system Identify areas that may be consuming excessive
Printing data: Steps to produce hard copies of system data resources or time and suggest ways to optimize them
Adding records: Instructions for creating new entries in the Questions to ask:
system Does it operate quicker than the previous system?
Deleting/editing records: Guidelines for modifying or Does it operate by reducing staff time in making
removing existing entries in the system bookings?
Input format: Structure and format for entering data into Does it operate by reducing staff costs?
the system
Output format: Structure and format for presenting data Evaluate the Ease of Use
generated by the system
Sample runs: Examples of system operation, including Look at the solution's usability and accessibility for the
input and expected output target market. Check to see if the system is simple to
Error messages: Explanations of system warnings and understand and use and if users have no trouble
error notifications completing their jobs.
Error handling: Steps to resolve issues and errors within Describe the user interface and how it facilitates
the system interaction with the system
Troubleshooting guide/helpline: Assistance for Mention any feedback from users regarding their
diagnosing and addressing common problems experience with the system and address any issues they
Frequently Asked Questions: Answers to common user encountered
inquiries Questions to ask:
Glossary of Terms: Definitions of key terms and concepts Are all the users able to use the system and make
related to the system bookings easily?
Are all the users able to change and cancel bookings
7.6. Evaluation easily?
Can all staff understand how to use the system with
It measures a system's productivity, efficiency, and compliance minimal training?
with its goals to identify its strengths, shortcomings, and
potential development areas. This assessment informs Determine the Suitability of the Solution
decision-making and improves overall performance over the
course of a system's life cycle.

Advantages of Evaluation:
Helps identify areas of improvement in the system
Ensures the system meets user and business needs
Improves overall performance and user satisfaction
Reduces future costs and issues by spotting problems early
Supports informed decision-making for upgrades or
changes

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Examine how well the implemented solution satisfies the Contact between liquid substances and electronic
desired outcome by contrasting it with the original task devices: Keep liquids away from electrical equipment.
criteria. Open cables: Ensure that cables are entirely insulated and
Outline the initial objectives of the system and discuss packed, and use circuit breakers or fuses to prevent
how the solution addresses each one electrical overload.
Highlight any requirements that may not have been fully
met and discuss possible reasons for this 2. Fire: ICT devices require electricity to charge or run; too
Questions to ask: many devices using a single socket can cause the plug socket to
Is the system suitable for each of the departments? overload, and heat is generated by too much electricity,
Does it meet the needs of the customers? causing the wiring to degrade and ignite a fire.
Does it meet the needs of the staff? The causes and reduction tactics for fire include:
Does the solution match the original requirements? Socket overload: Ensure enough plug sockets in the room,
don’t plug too many devices into the same socket, and don’t
Collect and Examine User’s Feedback leave devices plugged in and unattended.
Collect users' responses to the results of testing the system. Overheated equipment: Ensure that equipment is
Their feedback can provide insights into potential issues properly ventilated and not obstructed, keep flammable
and improvements and help determine overall user materials away from heat sources, regularly check
satisfaction. equipment for signs of wear or damage, use fire
Summarise the testing process, including test data extinguishers in case of emergencies, turn off or unplug
expected and actual outcomes. devices when away from the location, do not cover any air
Discuss users' reactions to the system, addressing any vents on devices.
concerns or suggestions they may have 3. Trailing cables: Devices can be plugged in using cables.
Cables that are protruding can cause an accident; you can trip
Identify Limitations and Suggest Necessary over a cable left out in a location, and body damage can occur
Improvements during a fall, for example, breaking bones, ligament damage,
bruising, sprains, etc. depending on the area fell on
Based on the analysis of efficiency, ease of use, Trailing cables causes and prevention strategies:
appropriateness, and user feedback, identify any limitations
in the system and suggest necessary improvements Unorganized/insecure cables: use cable ties to secure
List the limitations and provide explanations for each cables, keep cables packed correctly in, let’s say, a table,
one therefore not coming in the way of walking paths, use
Recommend specific changes or enhancements for wireless devices where possible, and regularly inspect
these issues cables for signs of wear or damage.

4. Heavy falling equipment: Devices have varying levels of


8. Safety & Security weight, and if a device falls on you, it could cause injury; any
device should be placed in a secure location, like a PC on a
solid desk and not near the edge.
8.1. Physical Safety Causes and reduction tactics for falling equipment:
1. Electrocution: ICT devices require electrical power to
charge or run; the electrical device can cause electrocution,
caused by the electric current moving through a body, causing
fatal injuries and/or death.
There are multiple causes for electrocution, including:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Improperly secured equipment: Ensure that equipment is Protecting Individual Rights: Data protection legislation
properly secured and stable. Regularly check the stability of safeguards individuals' right to privacy and control over
locations containing devices. their personal information.
Equipment on unstable surfaces: Keep equipment away Preventing Misuse of Personal Data: It helps prevent
from edges and other potential hazards, and regularly unauthorized access, identity theft, fraud, and other forms
inspect equipment and locations containing devices for of data misuse.
signs of wear or damage. Promoting Trust: Data protection laws build trust between
individuals and organizations by ensuring their personal
8.2. eSafety information is handled responsibly.
Encouraging Responsible Data Handling: Legislation
Data Protection promotes responsible data collection, storage, and
processing practices among organizations.
The Data Protection Act (DPA) controls personal data collection, Enabling Data Subject Rights: Legislation grants
storage and processing. individuals rights such as access to their data, right to
rectification, erasure, and objection to processing.
In the UK, the European Union’s General Data Protection
Regulation (GDPR) Personal Data
Protects personal data, whether stored on paper or a
computer system

The Data Protection ACT (DPA)


Personal data must be processed lawfully and
transparently.
Data should only be used for the purpose it was collected.
Data must be accurate and kept up to date.
Data should not be stored longer than necessary.
Data must be protected from unauthorized access or
breaches.

Principles of the Data Protection Act


Data must be processed lawfully, fairly, and transparently,
with clear consent from the individual.
Data should only be collected for specific, explicit, and
legitimate purposes.
Organizations should only collect and retain the minimum
personal data necessary for their stated purpose.
Data should be accurate and up-to-date, and reasonable
steps must be taken to rectify or erase inaccurate
information.
Personal data should not be kept longer than necessary
and should be securely deleted when no longer needed.
Organizations must protect personal data against
unauthorized or unlawful processing, accidental loss,
destruction, or damage.

Why is data protection legislation required?

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Refers to information that can be used to identify an Awareness that personal information should not be shared
individual freely
Examples Awareness of how to act online and avoid falling victim
Personal Name creates a safe and respectful environment.
Address Identify and avoid online scams, phishing attempts, and
Date of birth fraudulent websites that may try to trick them into sharing
A photograph in school uniform personal or financial information.
Medical history Mindful of online behaviour and interactions, protecting
Threats that can be avoided by protecting personal your digital reputation, which can have long-term
data: consequences in your personal and professional life.
Identity theft Control privacy settings on social media platforms, limiting
Privacy breaches who can access/view personal information and posts.
Misuse of the information Avoid encountering explicit or harmful content online,
Data be sold to third-party companies reducing the risk of exposure to inappropriate material or
Individuals could be held to ransom over personal data online predators.
gathered Engage in online gaming responsibly, avoid sharing
could be used to commit a physical crime personal details, and behave respectfully towards other
How to avoid inappropriate data disclosure: players.
Personal data must be kept confidential and protected Protecting devices from malware, viruses, and other online
through privacy settings on websites such as social threats, preventing data loss, privacy breaches, or device
media or strong passwords on websites where personal damage.
data is held or used Develop responsible online behaviours, promoting
Access to personal data should be limited to authorized respectful conduct while interacting with others online.
individuals Maintain a healthy balance between online and offline lives,
Think before you post - consider what information could reducing the risk of addiction, mental health issues, or
be gathered from your image or content negative impacts on relationships and self-esteem.
Check website details about the collection, storage, and
use of personal data Safety Suggestions
Only access websites where personal data is used or
viewed when on a secure, encrypted connection

eSafety
E-safety is knowing about and using the internet safely and
responsibly.
It refers to when an individual is using the internet, email,
social media, or online gaming.
E-safety refers to the individual knowing how to protect
themselves from potential dangers and threats.

The Need for eSafety

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Individuals' distinctive physical or behavioural traits, such


8.3. Security of Data as fingerprints, faces, or irises, can be used for access
control and verification. Since biometric data is hard to fake
Threats or duplicate, it offers a more secure form of identification.
How it works: Scans traits → compares to stored data →
There are multiple methods by which data can be threatened, grants access if matched.
including: It’s used in phone unlocking (e.g., Face ID), airport security,
Hacking: Unauthorized access to computer systems or banking authentication.
networks to gain control, steal information, or cause More secure than passwords.
damage, thus leading to identity theft, privacy breaches, Biometric data cannot be reset if stolen.
and misuse of data 2. Digital certificate:
Phishing: Deceptive emails or messages that are received
from trusted sources to trick individuals into revealing A digital record that attests to a website's reliability and
personal data integrity. A digital certificate is used to provide safe
Pharming: Manipulation of DNS (Domain Name System) to communication and to build confidence between parties.
redirect users to fraudulent websites, often to steal Identifier data, the entity's public key, and a third party's
personal data digital signature are frequently found in digital certificates.
Smishing: Phishing attacks carried out through SMS or text
messages 3. Secure Socket Layer (SSL):
Vishing: (aka voicemail phishing) Phishing attacks carried
out through voice messages to trick users into calling the A protocol that creates a secure connection between a
client computer and a server. SSL ensures that information
telephone number contained in the message
Viruses and malware: Viruses are program codes that can communicated between a server and client stays private
replicate/copy themselves to cause data loss or corruption. and cannot be intercepted or changed by unauthorized
Malicious software designed to disrupt, damage, or gain parties. A website's identification for it is the S at the end of
unauthorised access to computer systems or networks HTTP.
Card fraud: Unauthorized use of credit or debit card 4. Encryption:
information for fraudulent purposes caused by shoulder
surfing, card cloning, or keylogging. It is creating data in a format that cannot be read without a
Keylogging: Malware that records keystrokes to steal decryption key. Data on hard drives, emails, cloud storage,
passwords. and secure websites (HTTPS) are all protected by
Trojan Horse: Malicious software disguised as legitimate encryption. Without a decryption key, it assures that even if
software. unauthorized people obtain data, it cannot be decoded.
Virus: Self-replicating malware that attaches to clean files.
Worm: Standalone malware that spreads through 5. Firewall:
networks. A firewall is a network security device that monitors and
Shoulder Surfing: Illegally observing someone’s
manages incoming and outgoing network traffic. Its goal is
screen/keyboard to steal data.
to separate an internal network from other networks by
filtering data according to established criteria. It assists in
Protection of Data preventing malware, unauthorized access, and other
Multiple techniques are implied for the protection of data, network risks.
inclusive: 6. Two-factor authentication:
1. Biometrics:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

A security mechanism that requests two different kinds of Analysing Audience Requirements
identification from users to confirm their identity. To
provide additional protection outside of just a username Designing an ICT solution requires an understanding of the
and password, 2FA was created. Typically, it combines target audience. The study should consider elements
something that uniquely identifies a user, like biometric affecting the audience's capacity to use the solution, like
data, with something the user has, like a smartphone and a age, technical proficiency, and expertise.
token or something they know, like a password. The solution creator should know the audience's
requirements for information. This could serve as a design
7. User ID and password: cue for the data processing elements and the information
A typical authentication technique uses a password plus a architecture.
secret code (user ID) to identify. To strengthen data How the audience utilizes and consumes the content also
security, user IDs and passwords restrict access to only influences the design. For instance, the answer should be
authorized users. Using secure passwords and changing mobile-friendly if the audience accesses it mostly through
them frequently is critical to ensure security. When creating mobile devices.
passwords, it is advised to utilize a mix of uppercase, Finally, the designer should consider any unique
lowercase, digits, and special characters. requirements of the audience, such as visual or auditory
impairments. These requirements should be taken into
account when designing the solution ensuring inclusivity.
9. Audience
9.2. Copyright
9.1. Audience Appreciation
What makes Copyright Necessary?
To express gratitude and value for the users by providing
helpful and relevant information, fostering positive Copyright regulation is crucial to safeguard the rights of
experiences, and contributing to their understanding and developers and innovators.
learning. It stops software piracy, which is unauthorised use,
replication, or distribution.
Planning ICT Solutions It guarantees developers receive compensation for their
efforts, fostering additional innovation and development.
The first step to building effective ICT solutions is identifying
and understanding the intended audience's needs. These Principles of Copyright in a Computer Software
needs can be functional, like processing information, or
aesthetic, like a visually appealing interface. Copyright law prohibits the unauthorized copying,
After identifying the needs, select the appropriate distribution, or modification of software.
technology and tools to create a solution. This choice It also includes the End-User License Agreement (EULA),
depends on factors like the complexity of the task, the which outlines what the software can and cannot be used
budget available, and the technical expertise of the users. for
An essential aspect to remember while designing ICT Violations of these principles, such as software piracy, can
solutions is to ensure they are user-friendly. This means lead to legal consequences.
they should be intuitive to use, require minimal training,
and have easy-to-understand instructions. Preventing Software Copyright Violation
Additionally, ICT solutions should be accessible to all users,
including those with disabilities. This could involve adding
features like voice commands, larger text options, or
compatibility with assistive devices.
Once the solution is created, it is crucial to test it to ensure
it functions as expected and fulfils the users' needs
effectively.

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Software developers employ various copyright protection Email is a technique of sending and receiving messages and
strategies, such as Digital Rights Management (DRM). files via the Internet.
Due to DRM methods and systems, copyrighted works are It is employed in personal communication, business
subject to usage, modification, and distribution restrictions. communications, and marketing.
Other techniques include software product activation, Acceptable language must be used based on the email's
which needs a unique code to be fully functional. recipient, for example, professional when composing a
Given that pirated software frequently cannot receive work-related email.
automatic upgrades, which renders it less effective and Employers frequently establish requirements for
secure over time, automatic updates may also serve as a professional language, substance, and email frequency.
kind of copyright protection. Email security is critical to preventing sensitive data from
being accessed or manipulated.

10. Communication Netiquette is the proper conduct and politeness when


using email.
Don’t be abusive
10.1. Communication with Other ICT Don’t send spam
Be clear and concise with your message
users Using E-mail Remember that posts are usually public and can be
read by anyone.
E-Mail Always check your spelling and grammar.
Respect people's privacy and do not discuss or publish
Uses: information that might embarrass somebody.
Forgive people’s mistakes
Do not use CAPITAL LETTERS to highlight comments
Do not plagiarize
Do not use too many emoticons, as they might annoy
your readers.
Email groups enable mass communication to a specific
group of subscribers.
Guidelines set by employers:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

It is up to companies to decide if personal emails should be use spam filters


permitted on their systems avoid disclosing your email address publicly
Companies may specify which company devices are allowed don’t click on links in spam emails or reply to them
to be used
There needs to be a company standard style when sending 10.2. Effective Use of the Internet
emails
It must be made clear what email content is not permitted Characteristics of the Internet:
Employees should be told only to use their accounts when
sending emails Allows individuals from all around the world to connect and
There must be clear rules regarding the confidentiality of chat with one another instantaneously
information It runs on a distributed network design, which means a
Staff need to be aware of the method and duration of single central authority does not control it.
storing emails It is mainly used for transmitting data in a variety of
Incoming emails should only be read by the recipient formats, such as text, photos, audio, and video.
Company policy on how to deal with and prevent viruses
must be laid out Uses of the Internet:
Monitoring of emails may be carried out, and staff must be A vital communication tool that allows people to
aware that the company has the right to read all emails communicate via emails, instant messaging, and other
Suitable ongoing training will take place to ensure staff means.
follow company policy at all times It acts as a massive database of information on almost any
subject
Carbon Copies (Cc) and Blind Carbon Copies (Bcc) The Internet has transformed business by offering a
Carbon copies are used to send the email to multiple platform for online purchasing, electronic payments, and
recipients. digital transactions, allowing enterprises to reach global
Blind carbon copies are made to send the email to multiple consumers.
recipients without them acknowledging that it has been Advantages of the Internet:
sent to other recipients.
Forward enables users to send an already existing email to users have access to an incredible amount of information,
a new recipient. empowering them to learn
To attach files to be sent with an email, we make use of enables individuals and businesses to connect and
Attachments. communicate with people from different parts of the world
in real-time
Spam the Internet has made many things easier to complete, thus
providing simplicity and effectiveness
It is defined as any unwanted email delivered via the Internet.
These can range from annoying to genuinely harmful, as they Disadvantages of the Internet:
may contain viruses.
The main disadvantages are: Raises data security and personal privacy hazards through
the possibility of identity theft, data breaches, and online
wasting time monitoring.
annoying people The spread of propaganda, fake news, and misinformation
using up valuable bandwidth on the internet, thus slowing it due to the simplicity with which content can be created and
down distributed online.
may have viruses or be a part of a phishing scam The digital divide resulting from unequal Internet access
can take up significant space in user inboxes threatens to widen existing disparities.

To minimize the spam you receive: The differences between the internet, intranet, and
extranet:

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Definition: The Functionality of the Internet


The Internet is a vast network of linked computer
networks and gadgets that communicate with one Internet service providers (ISP): A company that provides
another using the Internet Protocol Suite (TCP/IP). internet access. Typically, a monthly fee is charged for this
The intranet is a secure network that operates within an service. Users' accounts are created when registering with
organization using internet technologies and protocols, an ISP and acquiring login information such as user ID and
such as TCP/IP. password.
Extranets are managed private networks that can give Uniform Resource Locator (URL): The address of a web
access to third-party users and give users, such page on the WWW. It is a text-based address that uniquely
as partners, suppliers, or clients, safe access to a identifies the location of any resource available on the
portion of the intranet. internet. The three main components are:
Accessibility: Protocol:
The Internet is open and accessible to the public, It is the communication protocol used to transfer data
allowing users to access a wide range of information, between the client and the server
services, and resources worldwide. E.g. HTTP, HTTPS, FTP, and others
Intranets are restricted to internal users and typically Domain:
secured by firewalls and other security measures to it is the name of the server where the resource is
maintain the security of critical corporate data. located
Extranet provides authorized external users only limited it can be a name or an IP address
access, in contrast to the internet, which is public, or the Webpage/file name:
intranet, which is entirely restricted. To access the it is the location of the file or resource on the server
extranet, these users need a secure login. it can contain the name of the file or directory where
Purpose: the resource is located
The Internet acts as a hub for intercultural dialogue, the A URL looks like this:
sharing of knowledge, and access to a range of Internet protocol://domain/path/filename
resources, including websites, email, social media, E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is a
online shopping, and more. URL that consists of the HTTPS protocol, the domain
An intranet's main goal is to make it easier for name "www.hoddereducation.co.uk", the path is “IGCSE”
employees to communicate, work together, and share and the filename is “ICT”
information. A hyperlink is a word/phrase/image which references data
Extranets make it easier for external stakeholders to that the reader can follow by clicking or tapping, usually
collaborate and communicate with a company. It taking you to another web page
enables the organization and its reliable clients or A web browser is a software application used to locate,
partners to share information, documents, and retrieve, and display content on the WWW, including web
resources securely. pages, images, video, and other files
Many use the terms “Internet” and “World Wide Web” Use of Search Engines
interchangeably. However, they can’t be used in the same
context: There are two fundamental methods for obtaining information
- The internet refers to the global network of computers and via the Internet. The first method is to enter the URL if you
other devices connected through routers and servers. know the website's address. If you don't know where to look,
However, the World Wide Web is a collection of websites and the second option is to employ a search engine to locate the
webpages accessed via the Internet. information you seek.

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
CAIE IGCSE ICT

Advantages of using the Internet to find information Although the internet provides much information, not all
information tends to be up to date because it is quicker are genuine or dependable.
and easier to amend Consider the source's reputation and trustworthiness when
The Internet has vast amounts of information determining the information's dependability.
searching for information using a search engine is fast Check the accuracy of information by comparing it to other
and easy reliable sources.
people can look for information in the comfort of their Assess whether the information is skewed, keeping an eye
own home out for views pushing a particular point of view.
information on the internet is essentially free of charge Check if the material is current, as obsolete information
webpages may have multimedia elements, making might be deceptive.
learning more interesting
Disadvantages of using the Internet to find information Internet Protocols
it isn’t regulated; anything can be posted
always the risk of accessing inappropriate websites Protocols are rules on which the sender and recipient agree
too easy to be distracted by the many distractions when data is exchanged between devices.
available on the internet 1. Hypertext transfer protocol (HTTP): when a web page is
Some research skills are lost when using the internet, as being accessed, entering http:// at the front of an address tells
search engines do all the work for you. the web browser that ‘HTTP rules’ for communication are to be
obeyed.
Speed of Searching 2. Hypertext transfer protocol secure (HTTPS): A secure
version of HTTP that encrypts data for security.
Search engines may scan billions of online pages to locate 3. File transfer protocol (FTP): network protocol used when
matches to your search query in a fraction of a second. transferring files from one computer to another over the
Your internet connection and the effectiveness of the internet. It is similar to HTTP, but the protocol specifically
search engine's algorithms influence the speed. transfers files.
4. Secure sockets layer (SSL): a protocol that allows data to be
Amount of Information sent and received securely over the internet.

Because search engines can deliver a deluge of information, Risks of Using the Internet
utilising particular and relevant search phrases is critical.
Adding quotation marks for specific phrases, "+" signs for Inappropriate and unlawful content: The internet may
required terms, and "-" signs for omitting terms can help attract people to potentially dangerous or illegal materials.
narrow the search. Data restriction: Parental, educational, and ISP restrictions
can all be used to restrict access to specific information or
Finding Relevant and Reliable Information websites.

The search engine algorithm determines the relevancy of


information by considering parameters such as keyword
frequency & page quality.
Reliable information is often obtained from recognized
sources such as educational, government, or well-known
industry websites.

Evaluating Information Found on the Internet

ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved.
This document is authorised for personal use only by Kaashvi at Modern English School on 25/08/25.
ZNOTES.ORG

CAIE IGCSE
ICT (0417)
THEORY

© ZNotes Education Ltd. & ZNotes Foundation 2025. All rights reserved.
This version was created by Kaashvi on Mon Aug 25 2025 for strictly personal use only.
These notes have been created by Farhan Shahid & Bisma Hammad for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to
contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).

You might also like