Ict Sme CH1-12
Ict Sme CH1-12
Internal Components
Central Processing Unit (CPU): the computer's "brain" that performs calculations,
processes instructions, and controls other components
Processor: a chip inside the CPU that carries out instructions from a program
Motherboard: the main circuit board that connects all internal components
Internal Memory
Random Access Memory (RAM): temporary storage for running programs and data; it is
volatile, meaning data is lost when the computer is turned off
Read-Only Memory (ROM): permanent storage for essential data, like the
computer's BIOS; it is non-volatile, meaning data is retained even when the computer is
turned off
Hardware Components
Worked example
A computer contains internal hardware. Write down the most appropriate item of internal hardware
to match the descriptions.
b. A printed circuit board that contains the main components of the computer [1]
Motherboard [1]
d. A type of memory where data is lost when the computer is switched off [1]
Software refers to programs that control the operation of a computer or the processing of
electronic data
Application Software
Application software provides the services that users require to solve a task
E.g.:
o Word processing: creating and editing text documents
o Spreadsheet: organising and analysing data in a grid format
o Database management systems: storing, retrieving and managing data in
databases
o Control/measurement: uses sensors to measure and control a system
o Applets and apps: specialised software for specific tasks
o Video editing: creating and modifying video files
o Graphics editing: creating and modifying images
o Audio editing: creating and modifying sound files
o Computer Aided Design (CAD): designing and modelling objects in 2D or 3D
System Software
System software provides the services that the computer requires to operate e.g.
o Compilers: translating high-level programming languages into machine code
o Linkers: combining object files into a single executable program
o Device drivers: controlling hardware components and peripherals
o Operating systems: managing the computer's resources and providing a user
interface
o Utilities: tools for maintaining and optimising the computer's performance
Worked example
Tick whether the following are examples of applications software or system software
[2]
Control software
Compiler
Word processor
Device driver
Applications System
Software Software
(✓) (✓)
Control software ✓
Compiler ✓
Word processing ✓
Device drivers ✓
2 marks for 4 correct ticks
1 mark for 2 or 3 correct ticks
0 marks for 0 or 1 tick
software
Analogue data can have any value within a range, while digital data has a limited set of
values
Digital data is less prone to noise and distortion compared to analogue data
Digital data can be easily manipulated, stored, and transmitted by computers
Digital data must be converted to analogue data so it can be used to control devices
This process is called digital-to-analogue conversion (DAC) and is performed by a digital-
to-analogue converter
Worked example
A greenhouse is used to grow plants and is computer controlled. Give two reasons why data from
the sensors need to be converted for use by a computer.
[2]
Two of:
So that the data from the sensor can be understood by the computer [1]
The Central Processing Unit (CPU) is the computer's "brain" responsible for processing
instructions entered into the computer
The CPU processes instructions and performs calculations in order to produce an output
CPU Functions
CPU Components
Memory
Memory is used to store data and instructions temporarily for the computer to process
ROM RAM
Worked example
[2]
Two of:
Make sure you know the difference between RAM & ROM - it's easy to get them mixed up
Input Devices
Input devices: allow users to enter data or instructions into a computer system e.g.:
o Keyboard
o Mouse
o Scanner
o Microphone
o Touch screen
Input devices send data or instructions to the computer, while output devices receive data from the
computer
Input devices are used for user interaction and data entry, while output devices display or produce the
results of data processing
Keyboard & Fast and accurate input The steeper learning curve,
Entering text and numbers
Numeric Keypad for experienced users repetitive strain injury
Pointing Devices Navigate and interact with Intuitive and precise Requires flat surface, the
Cedric Chong IGCSE ICT 5|Page
computer interfaces control strain on the wrist
Convenient, no direct
Control devices from a distance, Limited range, may require
Remote Control physical contact is
e.g., TVs and media players line-of-sight
needed
Enhances gameplay
Joystick/Driving Expensive, limited use
Simulation and driving games experience, realistic
Wheel outside of gaming, bulky
control
Direct interaction with the screen Intuitive, no need for a The screen may get dirty,
Touch Screen
using fingers or a stylus separate pointing device less precise than a mouse
Quality depends on
Scanners and Capture images and convert them Accurate reproduction,
resolution, which can be
Cameras into digital format easy to share and store
expensive
Hands-free input can be
Capture a sound for recording or May pick up background
Microphone used for voice
communication purposes noise, the quality varies
recognition
Sensors detect changes in the Can automate tasks, May require calibration,
Sensors and Light
environment; light pen interacts provides real-time affected by the
Pen
with screens information environment
Exam Tip
Note that a mouse isn't built into a laptop - instead, it would be another pointing device e.g. trackpad
All the devices listed here are input devices. Some people think microphones and webcams are output
devices
Chip and PIN Processing debit and credit card Secure, quick transaction, Requires PIN input, potential
Reader transactions in stores reduced fraud risk for skimming
OMR (Optical Reading marked areas on forms, Fast processing, reduced Limited to specific forms,
Mark Recognition) e.g., multiple-choice exams human error cannot read handwriting
For each of the following uses of data capture, name one appropriate direct data entry device. The devices
must be different in each case
Output Devices
Output devices: display or produce the results of data processing from a computer system
e.g.:
o Monitor
o Printer
o Speakers
o Projector
Input devices send data or instructions to the computer, while output devices receive data
from the computer
Input devices are used for user interaction and data entry, while output devices display or
produce the results of data processing
Holographic imaging
o Ultrasound images
o 3D views of our internal organs
Worked example
Complete the following sentences using the most appropriate items from the list below.
An interpreter [1]
A 3D printer [1]
A speaker [1]
Exam Tip
Make sure you know which printer is which. Some people get mixed up between dot matrix
and laser
Detail is needed in the description in order to achieve full marks. Relating the answer back to
the scenario is important as some printers would not work in the given scenario
Storage
Backing storage: long-term storage used to store data, files, and programs when not in use
e.g.:
o hard disk drives (HDD)
o solid-state drives (SSD)
o USB flash drives
o optical discs (CDs, DVDs)
Backing storage is typically slower than internal memory but has a larger capacity
It is non-volatile, meaning it retains data when the computer is powered off
Backing Storage
Internal Memory
Long-term storage of files, Temporary storage of data and essential instructions while
Function
programs, and data the computer is running
Storage Media
Storage
Examples Use Advantages Disadvantages
Media
Hard disks,
Magnetic Long-term data storage, High capacity, low Slower access time, moving
Drives backup, and archiving cost per GB parts, susceptible to magnets
Magnetic tape
Optical Data storage, audio, video, Portable, durable, Limited capacity, susceptible to
CD, DVD, Blu-ray
Discs and software distribution low cost scratches
Worked example
Give two error messages that may appear when trying to save to a CFast solid-state memory card.
[2]
Two of:
Long-term data storage, backup, High capacity (10TB), Slower access time, moving parts,
Magnetic Drive Magnetic
and archiving low cost per GB susceptible to magnets
Fixed Magnetic General-purpose storage in Magnetic Large storage capacity Moving parts, vulnerable to physical
Hard Drive computers and servers Hard Disk (5TB), relatively fast damage
Portable
External storage for data transfer Magnetic Portable (5TB), large Slower than SSDs, vulnerable to
Magnetic Hard
and backup Hard Disk storage capacity physical damage
Drive
Audio and data storage, software Affordable, widely Low capacity (700MB), susceptible
CD CD
distribution compatible to scratches
Higher capacity storage for data, Higher capacity than CD Susceptible to scratches, lower
DVD DVD
video, and software distribution (8.5GB), affordable capacity than Blu-ray
Worked example
A program collects a large amount of data and this could be stored using either a fixed solid-state
drive (SSD) or cloud storage.
a. Describe four advantages to the school of using cloud storage rather than using the SSD [4]
The data could be sent directly to/from the cloud from any computer/device [1]
Storage capacity can be increased without adding additional physical devices [1]
The school would only pay for the storage used [1]
b. Describe three disadvantages to the school of using cloud storage rather than using the SSD
[3]
Three of:
More security issues as multiple copies of the data are stored [1]
The school loses control over the storage of the data [1]
Mobile Computers
Portable computing devices, such as laptops, smartphones, tablets, and phablets, that allow users
to access and use computer applications and resources on the go
Laptop Computers:
o Portable with integrated display, keyboard, and touchpad
o Battery powered
o Less powerful and less expandable than desktops
Smartphones:
o Portable and lightweight
o Touchscreen interface
o Multifunctional (phone, internet access, camera)
o Anti-glare screen
o Front and rear facing camera
o Battery powered
o Uses Bluetooth, WiFi, 3G, 4G, 5G
o Has an on screen keyboard
Tablet Computers:
o Larger touchscreen than smartphones
o Ideal for media consumption and web browsing
o Limited expandability
o Anti-glare screen
o Front and rear facing camera
o Battery powered
o Portable and lightweight
o Uses Bluetooth, WiFi, 3G, 4G, 5G
o Has an on screen keyboard
Phablet Computers:
o Combine features of smartphones and tablets
o Larger screen than smartphones
o Can be used for phone calls
Advantages Disadvantages
Easy to carry and use on the go (Portability) Limited expandability (Difficult to upgrade hardware)
Access to internet and resources from anywhere Less powerful (Lower performance compared to desktop
(Flexibility) computers)
Can be used for various tasks and activities (Multi-
Shorter battery life (Needs frequent charging)
functionality)
Worked example
Microphone [1]
Touch screen [1]
AI
This is the development of computer systems that can perform tasks usually requiring
human intelligence, such as visual perception, speech recognition, and decision-making
VR & AR
Virtual Reality (VR) immerses users in a simulated environment, while Augmented Reality
(AR) overlays digital information onto the real world
Used in gaming, education, and training for a more engaging experience
Can be applied in fields like architecture, medicine, and retail for improved visualisation and
interaction
Potential issues with addiction and excessive screen time
Worked example
Some smartphones connected to the internet can allow the user to point their phone’s camera at an
object or image to display information about it on the phone’s screen. The object acts like an item in
a search engine. This is called augmented reality.
One example of its use is in mobile games, where the user tries to catch characters from the game
as the characters appear to walk in the streets. Explain, using examples, other ways in which
augmented reality could be used in everyday life.
[4]
point it at a word to link to the thesaurus / get it's meaning / translation / modern landscape [1]
Used by the police to recognise suspects [1]
Exam Tip
2.Networks
2.1 Networks
Common Network Devices
Network Interface Cards (NICs)
The general format for a MAC address is that each pair of hexadecimal digits are
separated by a “-”
An example of a MAC address:
o Microsoft has an OUI of 00-15-5D,
o a new laptop straight out of a Microsoft production line could have a MAC address of
“00-15-5D-45-1B-3F”
Exam Tip
Two completely different products can contain the same Network Interface Identifier but
they must use their own Organisational Unique Identifier
o Microsoft can have the MAC Address 00-15-5D-45-1B-3F
o Amazon can have the Mac Address0C-5B-8F-45-1B-3F
Hubs
Hubs are devices that allow several other devices to be connected to them
Switches
Switches are also used to connect several devices together just like a hub; however, rather
than sending data packets to all devices on the network, the switch will only send the data
to its intended device
1 DF-42-B2-11-4D-E3
2 11-14-F2-1D-C3-C6
3 00-4B-17-7C-A2-C9
When a switch receives a data packet, it examines the destination MAC address of the
box and looks up that address in its lookup table
Once it has found the matching MAC address it will then forward the data packet to the
corresponding port
Worked example
A switch forwards data packets based on the destination MAC address and only sends data to the
intended device [1]
Bridges
Bridges are used to connect two networks or network segments to create a single larger
network
An important note is that a bridge cannot communicate with external networks such as the
internet like a router can
Bluetooth Wi-Fi
Maximum number of 30 (based on a standard consumer grade router with high end
7
connections options providing substantially more)
Transmission frequency 2.4Ghz 2.4Ghz, 5Ghz
Maximum range (meters) 30 meters 100 meters (depending on obstructions)
Maximum transfer speed
3 Mbytes /
75 Mbytes / Sec
(Depending on the standard Sec
being used)
Worked example
A school IT team is trying to determine what technology they should use to connect students' tablets
around the school for data transfer and are unsure whether to choose Wi-Fi or Bluetooth
technology. Consider the advantages and limitations of both and justify your answer [7]
WiFi coverage can be over a much larger area compared to Bluetooth [1]
so that students will be able to access resources wherever they are in the school [1]
students can transfer data without the school having to invest in expensive infrastructure [1]
Given the current situation, the school is in, the preferred choice for connecting student's tablets would be Wi-Fi [1]
Cloud Computing
Cloud computing is a method where data is stored on remote servers and accessed
through the internet
Scalability
o As the business requirements change the customer can scale services up or down to
meet their needs
Cost saving
o Cloud storage eliminates the need for a business to purchase expensive equipment
for infrastructure and maintenance which can result in significant cost savings
Accessibility
o Cloud services are available globally and allow both remote working and data sharing
Reliability
o Cloud computing providers offer high levels of uptime ensuring that services are
always available for its users
Storage Space
o Cloud services can offer an almost unlimited amount of storage
Backup and recovery
o If a customers machine or storage device fails, a backup of the data from the cloud
will allow for recovery
File Synchronisation
o Files can be synced across multiple devices
Convenience
o A user does not need to carry storage devices around with them as all data is stored
on the cloud
Internet Connection
o A stable internet connection is required to use cloud storage
Security
o Storing data in the cloud may be vulnerable to security breaches
Dependency
Cedric Chong IGCSE ICT 20 | P a g e
o The user is dependent on the storage provider for the availability and reliability of its
services
Ceases to trade/dissolve
o Should the company dissolve or cease to change, all cloud data may be lost
Cost
o As the amount of storage or bandwidth required increases, the service may become
expensive over time
Worked example
Explain the difference between cloud storage and local storage [2]
Cloud storage involves storing data on remote servers accessed via the internet [1]
While local storage refers to storing data on physical devices like hard drives or flash drives [1]
Internet
The Internet is a very large global network that consists of many other interconnected networks
The world wide web is the vast collection of web pages that can be accessed using a web browser
The world wide web allows you to access information by using the internet
Exam Tip
You must be very clear about the difference between the World Wide Web and the Internet
Open
o The Internet is an open network meaning anyone with access can access the same resources
and information as everybody else
Decentralisation
o The Internet is a decentralised network with no owner, controller or governing body. Instead,
it is made up of vast numbers of interconnecting networks that operate independently but
work together to provide communication
Global Reach
o The internet is a global network meaning that people from all over the world can
communicate with each other in real-time
Accessibility
The Internet has many uses and plays a critical role in our lives. This can include;
Intranet
Intranets operate in a similar way to the Internet and although they are still networks, they are
usually private and are used to send information securely and safely
Unlike the Internet which is a global network accessible by all, access to an
organisation’s Intranet is restricted and only accessible to authorised users such as employees
Characteristics of an Intranet
Private
o An intranet is a private network that is accessible to employees within a company or
organisation
Security
o An intranet is usually behind a firewall to ensure security and that only authorised users can
access it
Sharing and Communication
o An Intranet allows for document sharing and the use of collaboration tools between users. It
can also allow the use of email and video calling to enable efficient communication within the
organisation
Extranet
An extranet is a private Intranet that also allows access by selected parties that reside outside of the
organisation. These parties, for example, maybe customers, key stakeholders or clients
External users will have an authorisation level once they have successfully logged in which will
determine which resources they may access
Worked example
An Intranet is a private network that is accessible to employees of the organisation and not to members of the public [1]
It provides employees access to company information and to share resources internally [1]
LAN
Local Area Networks (LANs) are networks that are usually contained within a single building or
small geographical location
A LAN is made up using hubs and/or switches which will connect several devices together
It is common for one hub or switch to be connected to a router which will allow
the LAN connectivity to other outside networks such as the internet
WAN
Wireless LANs (WLANs) are Local Area Networks that allow devices to connect wirelessly rather
than using physical cables
Wireless Access Points (WAPs) are connected to an existing wired network which provides a means
to connect wirelessly
Wireless Access Points use spread spectrum technology that has a range of around 30 to 50 metres
compared to Infrared which has a range of around 3 metres
WLANs are often used when it is not practical to use cable or devices that will access the network do
not have Ethernet ports
WLANs support a vast range of devices such as smartphones and laptops and are very popular in
public areas such as shopping malls
Worked example
Give 2 reasons why a fitness centre may want to install a WLAN [4]
Cedric Chong IGCSE ICT 24 | P a g e
The fitness centre may wish to install a WLAN for several reasons such as :
Customers can connect to their Wi-Fi and search for information such as class times etc [1]
Staff at the fitness centre will be able to access resources wirelessly such as printers [1]
When moving electronic data from one place to another, there are different types of security
concerns to consider:
o Data interception can occur when an unauthorised user intercepts data being
transferred.
Two common methods are:
Packet sniffing
When dealing with personal or sensitive data it is essential that not only is it protected from
hackers but also that it is protected from accidental disclosures such as:
o Sending an email with sensitive information to the wrong person
o Losing a device that has sensitive data stored
o Shared access misconfigurations allow unauthorised users access to sensitive data
Passwords
Passwords are a common form of security and are often accompanied by a username or email address
This type of security is often seen when accessing online banking, virtual learning environments,
email accounts and many more
There are many ways to enhance the security of your password such as the following:
o Ensure that the password is changed regularly in case it has been obtained illegally or
accidentally
o Ensure that the password uses a combination of uppercase, lowercase, numbers and symbols
to make the password more difficult to guess
Cedric Chong IGCSE ICT 25 | P a g e
o iloveict is a weak password
o 1lov3ICT# is a strong password
Passwords should not contain personal information related to you such as your date of birth, your
name or the name of your pet
Anti spyware software can be run regularly to ensure that your information including your password
is not being passed to an unauthorised third party user
Authentication
There are also other forms of authentication aside from passwords that utilise what is known as
“zero login”
This aims at removing or reducing the need for the user to manually input their details and instead
rely on the system to verify the users credentials automatically
One such type is known as biometrics where the user's fingerprints or facial features are scanned to
provide unique biometric information to authenticate the user's details.
Newer methods of zero login types of authentication include the use of networks, location, device
data and human behavioural patterns to recognise users automatically.
Although these methods offer many advantages there are some concerns that need to be taken into
consideration. They include:
o What personal data is being collected?
o Is the collected data being kept securely?
o Will it log in and out at the correct times?
Magnetic stripe cards are a form of card that stores the user’s data on a magnetic strip usually on the
reverse side
The user scans the card through a reader where the details stored on the card are compared to the
details stored within the system. It the data from the card matches the data that is store on the system
the user is authenticated and granted access
The advantages to use magnetic stripe cards include:
o Widely used and accepted
o Cheap
o Simple to use
o A single card can serve multiple purposes within an organisation such as doors, purchasing
food from canteens and accessing IT equipment
Smart Cards
Smart Cards are cards that contain a chip and can be used as contactless
The card does not need to be inserted or swiped through a machine and can be detected from a short
distance away
Personal identification information can be stored on the card such as name, address, date of birth
and/or banking information
Cedric Chong IGCSE ICT 26 | P a g e
The information on the card is encrypted which means it can only be read by authorised devices
Often the card will require a personal identification number (PIN) which is needed to access the
information, providing an additional layer of security
Advantages of smart cards include:
o Durable
o Use for a wide range of applications (Payments, Access Control, Storing personal data
o Enhanced security (Compared to standard cards)
Disadvantages of smart cards include:
o Risk of loss
o Initial Infrastructure requirements
o More expensive compared to traditional cards
Physical Tokens
A Physical Token enables authentication with the use of a small physical device
To access a system that uses a physical token, a user will enter their username and password into the
system, and then enter the security code generated by the token
The physical token can be directly connected to the device that the user is trying to access or the
physical token will generate one time password (OTP) which is then entered into the system
manually
To obtain a one time password (OTP) the user will enter their personal identification number
(PIN) and any other authentication requirements into the physical token device. If all requirements are
satisfied then an internal clock will be used to generate the one time password (OTP) which is
displayed on its screen
To enhance security, the one time password (OTP) changes frequently and each code will only be
valid for a short period of time (usually within 1 minute)
Advantages of physical tokens include:
o Offline authentication
o Portable
o When using a disconnected physical token, a separate device is used to generate the one time
password (OTP) which the user will then enter into the system manually
o When using a connected physical token, the one time password (OTP) is generated and
passed to the system automatically though a physical connection and does not require to user
to enter the password manually
Electronic Tokens are a form ofapplication software that is installed on a user's device (usually
smartphone) to allow them to authenticate their details and allow them to access a secure website
A user must download and register the electronic token software app prior to accessing the secure
website
As the website prompts for authentication, the user will open the app that will provide a one time
passcode (OTP) which will be entered into an entry box on the website along with other forms of
authentication such as a username and personal identification number (PIN)
Both the web server and the smartphone application have synchronised clocks which will generate
identical numbers and should the authentication details match, the user will be granted access to the
website
The above explanation is just one method of authentication when using electronic tokens. Another
method is as follows:
o The website will prompt the user for their username and password
o Upon successful credentials the website will generate a code
o The code is then entered into the application software on the users phone which will generate
another code
o The generated code from the application software is then entered into an entry box on the
website
o Should all authentication methods pass successfully, the user is granted access to the website
Anti-malware
Anti-Malware (also known as Anti Virus software) is designed to protect devices against
viruses and malicious software
Anti-malware has 3 mains purposes, detect, prevent and remove malicious software
Anti-Malware is installed onto a computer system and will operate in the background
o Heuristic checking
This is the identification of potential threats within a file from behavioural
patterns and characteristics rather than just relying on a database of known
viruses
Worked example
[4]
Regular updates by the Anti-Malware software will keep an up to date list of threats [1]
If any of the threats are detected on the device, the Anti-Malware software will quarantine the files [1]
Anti-Malware software will scan external storage media when they are connected to the device [1]
Preventing viruses from being transferred from storage media onto the device [1]
A microprocessor is a small computer chip that can be used to control devices. It is made up of a
central processing unit (CPU), memory, and input/output (I/O) devices. The CPU is responsible for
carrying out instructions, the memory stores data, and the I/O devices allow the microprocessor to
communicate with the outside world.
Positive effects on lifestyle, leisure, physical fitness, and data security include:
o Convenience
Devices such as smart thermostats, lights, and appliances can be controlled
remotely, saving time and effort
People have more time to spend on the things they want
Smart fridges automatically order fresh food and therefore reduce food waste
o Fitness tracking
Devices like smart watches monitor physical activity and health data,
encouraging healthier lifestyles
o Security
Smart security systems provide real-time surveillance, adding an extra layer
of protection to homes
Negative effects include:
o Privacy risks
These devices can be vulnerable to hacking, risking the security of personal
data
o Social interaction
Over-reliance on these devices can decrease face-to-face interaction,
impacting social skills
o Physical fitness
Cedric Chong IGCSE ICT 29 | P a g e
Despite fitness tracking, sedentary behaviour may increase due to the
convenience of smart devices
Positive effects on data security, autonomous vehicles, and transport safety include:
o Efficiency
Autonomous vehicles optimise routes, reducing travel time and fuel
consumption
o Safety
Advanced safety features, like automatic braking and lane assist, can reduce
accidents
o Data security
Real-time tracking and encryption help protect against theft or loss
Negative effects include:
o Privacy issues
Data collected by these vehicles could be misused or hacked
o Job losses
Autonomous vehicles could replace jobs in transport industries, leading to
unemployment
o Safety risks
Malfunctions in autonomous vehicle systems could lead to accidents
Worked example
Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles. One
of the positive effects of using these devices is that we can now set a cooker to switch on whilst we
are out so that we arrive home to a cooked meal. Describe the positive effects of using other
microprocessor-controlled devices in the home.
[4]
Four of:
Microprocessor-controlled devices reduce the need for people to do manual tasks at home [1]
People can use microprocessor-controlled devices for physical fitness tracking in the home [1]
People have more time to spend on leisure activities/shopping/socialising [1]
Increased sense of security as homes are protected with burglar alarms/ smoke alarms/fire alarms [1]
Smart fridges can be used to improve healthy lifestyle//Smart fridges automatically order fresh food//Smart fridges reduce
food waste [1]
Microprocessor-controlled devices can be set remotely using a smartphone [1]
Saves fuel as the heating/air conditioning is not on all day [1]
Reduces injuries by using microprocessor-controlled lights outside [1]
Poor posture, particularly when using Correct posture, ergonomic furniture, and regular
Back problems
devices for long periods. movement.
Prolonged screen time leads to digital eye Regular breaks from the screen, appropriate
Eye problems strain, characterised by dryness, irritation, screen brightness, and maintaining an
and blurred vision. appropriate distance from the screen.
Factors such as poor posture, eye strain, or Regular breaks, maintaining good posture, and
Headaches
stress from overuse of devices. ensuring proper screen brightness.
Communication media is the various methods and channels used to convey information and
messages between people, organisations, and devices.
Mobile Communication
There are various ways mobile devices are used for communication:
SMS messaging: Short Message Service allows sending and receiving text messages up to
160 characters long
o Uses cellular networks
o Can be sent to multiple recipients at once
Electronic Conferencing
Video Conferencing
Hardware required
o Tv Screens/Monitors
o Speakers
o Microphone
o Webcam
o Video Conferencing System
Characteristics
o Video conferencing is an alternative for face to face meetings between two or more
people
o Allows both sound and video
o Participants of the video conference can be many miles apart or even in a different
country
o Audio and video are real-time allowing users to interact with each other
Uses
o Remote employee meetings
o Staff interviews
o Multi-person discussion
o Remote training
o Video conferencing has many uses that include:
Advantages
o Convenience
o Cost saving
o Better for the environment
o Attendees do not have to travel to the event
Disadvantages
o The initial purchase of equipment can be costly
o This can cause issues amongst employees when working across different time zones
o Those using the system may need to be trained to use it effectively which can:
Take time
Be costly
o Video conferencing systems require a strong and stable network connection
o There can often be a delay in response times
The time lag is caused by the image not being synchronised with the sound
Worked example
A motor car company has some designers based in London and some in Beijing. The cost of travel
between the two cities is very high, so when they wish to meet to discuss new products they use
video-conferencing.
The designers all have PCs with a keyboard and a mouse in order to take part in video-
conferencing.
a. Name three other devices used to input or output data which would be needed to take part in the
video-conference. [3]
Three of:
b. Describe three potential problems of the designers using video-conferencing systems rather than
meeting in either London or Beijing. [3]
Three from:
Time lag / lip sync caused by the image not being synchronised with the sound [1]
Poor picture quality caused by the speed of connection / quality of the hardware [1]
More likely to have poorer sound quality caused by the quality of the hardware / connection [1]
Confidential material about the new cars may have to be signed / viewed in person [1]
The new car may have to be viewed in person [1]
Hardware breakdown stops the conference taking place [1]
Communication breakdown stops the conference taking place [1]
Different time zones will mean the conference has to take place at inconvenient times [1]
Hardware required
o A landline phone
o Internet Phone
o Computer (requires a microphone and speakers)
Characteristics
o Voice communication only (no video)
o Audio is in real time
o Call management options (mute etc)
o Participants of the audio conference can be many miles apart or even in a different
country
Uses
o On the go business meetings
o Allows a hybrid collection of devices such as landline telephones, smartphones and
laptops (providing it is a VoIP call)
Advantages
o Attendees do not have to travel to the event
Convenience
Cost saving
Better for the environment
o Anyone within the company can attend regardless of location
o Events can be held at short notice as travel is not required
o Allows other members outside of the organisation to attend easily without having to
visit on premises
o Audio conferencing is more cost effective as it requires less bandwidth and less
expensive equipment
o Audio conferencing can integrate with many other devices and tools for
communication
o Audio conferencing provides a higher level of security as users are not sharing a
screen
Disadvantages
Hardware Required
o Computer (requires webcam, microphone and speakers)
Characteristics
o Allows both sound and video
o Participants of the web conference can be many miles apart or even in a different
country
o Audio and video are real time allowing users to interact with each other
o Allows virtual breakout rooms for teams of participants
o Screen and slide presentations
o Instant messaging
o Document sharing
Uses
o Distance learning and education
o Online presentations
o Online team collaboration
o Interviews
o Customer support
o Virtual events
Advantages
o Attendees do not have to travel to the event
Convenience
Cost saving
Better for the environment
o Anyone within the company can attend regardless of location
o Events can be held at short notice as travel is not required
o Allows other members outside of the organisation to attend easily without having to
visit on premises
o Web conferencing software often allows recording and playback features to allow
members to review the event
o Enhanced visual presentations compared to video conferencing
Disadvantages
o Requires a strong and stable network connection
o Security and privacy concerns
o Distractions from other activities on the device
o Those using the system may need to be trained to use it effectively which can:
Take time
Be costly
o Dependent on users being technically savvy and having suitable devices/network
connections
Exam Tip
Both web conferencing and video conferencing are very similar however, the key differences
are:
o Video conferencing has a focus on face to face communication
o Web conferencing has a focus on interaction and collaboration such as document
sharing, whiteboards etc
Computer Modelling
Computer modelling is the use of computer programs and algorithms to simulate and analyse
complex systems or processes. The accuracy and reliability of computer models depend on the
quality of input data and algorithms used.
Advantages Disadvantages
Faster calculations and processing Dependence on accurate input data and assumptions
Limited by the quality and complexity of the algorithms
Reduced human error and bias
used
Ability to simulate multiple scenarios and test May overlook unique or unpredictable situations not
different variables covered by the model
Can be expensive and time-consuming to develop,
Better visualisation of complex data and systems
maintain, and update models
Computer controlled systems use computers and software to control, monitor, and manage
processes, machines, or devices. The effectiveness of computer controlled systems depends on the
quality of software, hardware, and input data.
Advantages Disadvantages
Can work with large or delicate items Requires costly backup systems
Worked example
The European Space Agency (ESA) is building a new space telescope to orbit the Earth and search
for distant galaxies. The ESA is using computer controlled robots to build the lens of the telescope.
Discuss the advantages and disadvantages of using computer controlled robots rather than humans
to build the lens.[6]
Max 4 of:
Advantages
Robots can work in sterile areas where humans would need protective clothing [1]
Robots can easily be used for transferring large delicate items [1]
Robots can work 24/7 / continuously [1]
Cheaper in the long run/robots not paid [1]
More accurate as the lens needs to be precise / higher quality of lens [1]
More frequent checking of the equipment/lens [1]
They do boring/laborious work [1]
Issues can be found more quicker [1]
Task/job can be carried out far quicker [1]
Max 4 of:
Disadvantages
Exam Tip
Some of the advantages/disadvantages listed above don't always apply depending on the
scenario. Choose the ones appropriate for the scenario in the question
You can't get full marks by only focusing on advantages or disadvantages - make sure you
know both
Don't use short answers like 'it's expensive' - explain your answer
There are various ways school management systems are used in educational institutions:
o Learner registration and attendance: Recording and tracking student enrolment
and daily attendance
Simplifies the registration process and ensures accurate record-keeping
o Recording learner performance: Monitoring and analysing student grades, test
scores, and overall performance
Helps teachers identify areas for improvement and track progress
o Computer aided learning: Facilitating online learning resources and activities for
students
Enhances the learning experience and promotes self-paced learning
Worked example
A school is setting up a new computerised system to manage many aspects of the school
administration.
a. Describe how this system can be used to manage student registration and attendance.[3]
3 of:
Student scans a card // teacher records the student as present on the computer system [1]
The system records the time of arrival [1]
The system sends the data to the school administration database [1]
The data is searched in the database [1]
If a student arrives after a certain time the student’s attendance record is flagged as late/absent [1]
Attendance/lateness records are automatically printed/sent to parents [1]
Letters/texts are automatically sent to parents to show the absenteeism/lateness of students [1]
Parents can log in into the system to check student’s attendance/lateness records [1]
2 of:
Online booking systems are web-based platforms and applications that allow users to reserve and
purchase tickets or services for various events and industries.
Advantages Disadvantages
Promotions and personalised offers Impersonal and less tailored customer service
Worked example
[6]
6 of:
Banking Applications
Automatic Teller Machines (ATM)
Automatic Teller Machines (ATM) is an electronic banking terminal that provides customers with
access to financial transactions
Advantages Disadvantages
Advantages Disadvantages
Worked example
4 of:
The reader checks the amount to pay is less than the contactless limit [1]
The data is read from the chip using RFID / NFC [1]
The restaurant’s bank's computer contacts the customer’s bank's computer [1]
The card is checked if it is valid [1]
If valid the transaction continues [1]
If not valid the transaction is terminated [1]
An authorisation code is sent to the restaurant [1]
The price of the meal is deducted from the customer’s account [1]
Added to the restaurant’s account [1]
Exam Tip
Make sure you read the question to see if it's a contactless payment or involves Chip & PIN
and reference this in your answer
Don't forget that money isn't stored on the card, and that it provides a link to the bank
account it's linked to
Advantages
Disadvantages
Cheques
Amount is scanned
Advantages Disadvantages
Online Banking
Exam Tip
Sometimes the question will be about advantages and disadvantages of going to the bank
rather than using online banking. Read the question carefully (you can reverse the
statements in the table above)
Computers in Medicine
Information Systems in Medicine
Healthcare settings may also use online booking systems for appointments
Healthcare professionals may also utilise expert systems to assist with a diagnosis
3D Printers in Medicine
Printing of prosthetics:
o Custom-made prosthetic limbs or body parts
o Can be tailored to a patient's specific needs
o Faster and more affordable than traditional methods
Tissue engineering:
o 3D printing of living cells to create functional tissues
o Can be used to repair or replace damaged organs
Computers in Retail
Point Of Sale (POS)
Modern supermarkets have automated stock control systems, which use data from the checkouts.
Describe how food items can be ordered by an automated stock control system so they are
delivered before the stock in the supermarket runs out.[4]
4 of:
Internet shopping
Internet shopping is the act of purchasing goods or services online through websites or mobile
applications
Security concerns
o Risk of fraud or identity theft
o Need to provide personal and financial information
Cedric Chong IGCSE ICT 48 | P a g e
Limited physical interaction
o Can't touch or try products before purchasing
o This may lead to dissatisfaction or returns
Delivery delays and fees
o Wait for items to be shipped and delivered
o Additional costs for shipping and handling
Impersonal customer service
o Difficulty resolving issues or returning items
o Lack of face-to-face interaction with staff
Can target prices, products and services at specific groups based on buying data
Can update stock availability and prices more quickly than a physical store through their
website
Increased Competition
o Online shopping means businesses have to compete with a global market, which can
be more challenging than competing with local businesses
Digital Fraud and Security Concerns
o Online transactions expose businesses to potential cyber threats such as hacking
and fraud. Data breaches can result in financial loss and damage to brand reputation
Technical Issues and Downtime
o Website outages or technical glitches can prevent customers from making purchases
and negatively affect the user experience
Costs of Delivery and Returns
o Online businesses often shoulder the cost of shipping products to customers and
also have to manage returns and refunds, which can be costly
Customer Trust
o Customers can't physically touch, feel, or try products before buying, which can lead
to uncertainty and a lack of trust
Inventory Management
o Keeping accurate track of inventory can be complex, especially if a company sells
through multiple online channels
Depersonalisation
o It can be harder to build relationships with customers and provide personalised
service when all interactions happen online
Online Reviews
o Negative customer reviews can greatly impact the image of the business, as they are
visible to all potential customers
Cedric Chong IGCSE ICT 49 | P a g e
Dependency on Internet Infrastructure
o Businesses need a stable and reliable internet connection to manage their operations
smoothly
Logistical Challenges
o Managing and operating warehouses, packaging, and shipping can be difficult and
costly for smaller businesses
Legal and Regulatory Compliance
o Companies selling online may have to comply with a multitude of laws and
regulations, which can vary by country
Increased Customer Expectations
o The convenience of online shopping has led to increased customer expectations for
fast, free delivery, and excellent customer service
Expert Systems
An Expert system is a computer program that uses artificial intelligence to replicate the decision-making
abilities of a human expert in a specific field.
Mineral prospecting
o Analyse geological data
o Identify potential locations for mineral deposits
Car engine fault diagnosis
o Determine issues within engine components
o Suggest repair options and maintenance schedules
Medical diagnosis
o Analyse patient symptoms and medical history
o Suggest possible diagnoses and treatment plans
Chess games
o Evaluate possible moves based on the game state
o Plan strategic moves to increase chances of winning
Financial planning
o Evaluate investment options and risks
Worked example
5 of:
2 of:
Expert systems use the knowledge base and rules base to analyse input data
The inference engine applies rules and logic to the input data
The system generates potential solutions or recommendations based on the applied rules
The explanation system communicates the reasoning behind the suggested solutions
Exam Tip
This topic comes up frequently. Make sure you understand the operation of an expert system. You
need to be able to not only name the components but explain how they interact or operate
Recognition Systems
Recognition
Characteristics Uses Advantages Disadvantages
System
Limited to
School registers, Fast and efficient
Detects marks on predetermined
Optical Mark multiple-choice data collection,
paper, such as filled-in responses, sensitive to
Recognition (OMR) examination papers, reduces manual
circles or checkboxes poor marking or
barcodes, QR codes entry errors
smudging
Can struggle with
Converts printed or Automated Number Speeds up data different fonts or
Optical Character
handwritten text into Plate Recognition processing reduce handwriting styles,
Recognition (OCR)
machine-readable text (ANPR) systems human error sensitive to image
quality
Expensive technology,
Identifies individuals Face, iris, retina, Highly secure,
Biometric privacy concerns,
based on unique finger, thumb, hand, difficult to forge or
Recognition potential false positives
biological traits voice recognition replicate
or negatives
Worked example
As banks reduce the number of branches due to the increased use of online banking systems,
improved security of customer data is needed. Many banks are introducing biometric systems to
secure customer data.
Explain, using examples, why biometric systems are more effective than other methods of security.
[3]
Max 2 of:
RFID Tags
o RFID stands for Radio Frequency Identification. It refers to a technology that uses
radio waves to identify and track objects. This system includes RFID tags, which can
be attached to objects and contains information about them
Components of RFID Tags
o RFID tags consist of an integrated circuit (IC) and an antenna. The IC is responsible
for storing and processing information, while the antenna receives and transmits the
signal
Passive RFID Tags
o Passive RFID tags do not have a power supply. They get their power from the
electromagnetic energy transmitted by the RFID reader
o When the RFID reader emits radio waves, these waves are picked up by the passive
tag's antenna
o The energy from the waves is converted into electrical energy, which powers the IC
Worked example
A farmer has purchased a computerised feeding system for her goats. A goat has an RFID tag
attached to its ear, which is recognised by the computer. The system uses a passive RFID tag.
a. Describe how the RFID tag can be activated.[3]
3 of:
The RFID reader sends radio waves / signals to the RFID antenna in the tag [1]
The tag sends radio wave/signal back to the reader [1]
The radio waves move from the tag’s antenna to the microchip [1]
A signal is generated and sent back to the RF system [1]
The RF wave is detected by the reader which interprets the data [1]
The system recognises the goat and therefore gives the correct feed to the animal.
b. Describe how RFID technology will be used to give the correct feed to the animal.[3]
3 of:
It's a technology that allows two devices to communicate when they're very close together, typically
within a few centimetres. This is the same tech that allows you to make payments by tapping your
phone or card on a payment terminal.
Usage
o NFC enables payment for things at the shop by tapping a phone on the terminal,
share files by bringing two phones close together, and use a phone as a bus or train
ticket
Security
o Because NFC only works over a short range, it's generally secure. But it's always
good to be aware that any wireless communication could potentially be intercepted,
so it's important to only use NFC for secure transactions with trusted devices
Satellite Systems
Characteristics
o Orbiting objects that receive, amplify and transmit signals
o Use radio frequencies to communicate with ground stations
o Require line of sight between satellite and receiver
Uses
o Determine location, speed and time using satellite signals
o Provides turn-by-turn directions for travel
o Collect, analyse and display spatial data
o Satellite television
Broadcast TV signals via satellite
o Satellite phone
Provide communication in remote areas
o Global Positioning Systems (GPS)
o Satellite navigation
o Geographic Information Systems (GIS)
Cedric Chong IGCSE ICT 55 | P a g e
o Media communication systems
Advantages Disadvantages
Worked example
Modern-day drivers rely less on paper maps and more on satellite navigation systems (satnav).
Describe the inputs, outputs and processing of a satnav when used by a driver to reach a
destination.[4]
4 of:
Exam Tip
Some people think the satnav sends signals to the satellite and the satellite did the
calculations and sends the results back to the satnav - this is not how it works
A satnav will calculate your current position using GPS - the user doesn't need to input this
Observation
o Characteristics: watching users interact with the system
o Uses: understanding how users interact with the current system
o Advantages: provides first-hand, unbiased information
o Disadvantages: can be time-consuming, may not reveal all issues
Interviews
o Characteristics: structured or unstructured conversations with users
o Uses: gathering detailed information about user experiences
o Advantages: allows for in-depth exploration of issues
o Disadvantages: may be influenced by interviewee bias, time-consuming
Questionnaires
o Characteristics: structured surveys with predetermined questions
o Uses: collecting data from a large number of users
o Advantages: allows for quantitative analysis, efficient data collection
o Disadvantages: limited by predetermined questions, may suffer from low response
rates
Examination of existing documents
o Characteristics: reviewing system documentation, user guides, or reports
o Uses: understanding the current system's design and any known issues
Exam Tip
When justifying hardware and software choices, make sure to link your decisions to the user
and information requirements for the new system. This demonstrates your understanding of
the analysis stage of the Systems Life Cycle
Worked example
Office workers:
Reason:
1 of:
Delivery drivers:
Reason:
1 of:
They can complete them in their own time/at their leisure [1]
Questionnaires tend to be more accurate [1]
The data can be collated more quickly as everyone can complete at the [1]
same time rather than interviewing which is one after the other [1]
Individuals remain anonymous therefore they will be more truthful/reliable [1]
Easier to analyse [1]
Input Formats
Data capture forms: designed to collect data from users in a structured format
Consider a user-friendly layout, clear instructions, and appropriate data fields
Output Formats
Validation Routines
Exam Tip
In the design stage of the Systems Life Cycle, focus on creating clear, user-friendly input
formats and output formats. Additionally, make sure to implement appropriate validation
routines to ensure data accuracy and completeness.
Worked example
Carlos is designing a new computer system to replace an existing system. Tick four items which will
need to be designed.
[4]
Tick
Inputs to the current system.
Data capture forms.
Report layouts.
Limitations of the system.
Observation methods.
Improvements to the system.
User and information requirements.
Validation routines.
Problems with the current system.
File structure.
Tick
Report layouts. χ
Observation methods.
Validation routines. χ
File structure. χ
Test Designs
Test data structures, file structures, input formats, output formats, and validation routines
Ensure all components function correctly and interact seamlessly
Test Strategies
Test Plan
Normal data: valid and expected data values within the range of acceptability
Abnormal data: invalid or unexpected data values. This can either be:
o Data outside the range of acceptability or
o Data that is the wrong data type
Extreme data: values at the limits of acceptability
Worked example
The European Space Agency (ESA) is building a new space telescope to orbit the Earth and search
for distant galaxies. The ESA is using computer controlled robots to build the lens of the telescope.
A new computer system will operate the space telescope; the new computer system is made up of
several modules.
Describe how the new computer system is to be tested before it is fully operational.[4]
4 of:
Parallel running
Both old and new systems run simultaneously for a period before the old system is phased
out
Used when a smooth transition with minimal risk is required
Pilot running
Phased implementation
The new system is implemented in stages, with each stage replacing a part of the old
system
Used when a gradual transition is preferred to minimise disruption
IMPLEMENTATION
ADVANTAGES DISADVANTAGES
METHOD
High risk of failure, no fallback, users
Fast implementation, cost-effective as
Direct changeover can't be trained on the new system, and
only one system is in operation
no backup of the system
When discussing implementation methods in the Systems Life Cycle, make sure to consider
the specific context of the system being implemented. Choose the method that best fits the
organisation's needs, weighing up factors such as risk, time, and resources
Don't mix up pilot implementation with prototyping or direct implementation
These are different ways in which one new system could be implemented using two
different methods
You may get a question which asks you to compare 2 methods - only write about these 2 in
the question and compare them, don't just describe them
Worked example
Tick (✓) the most appropriate method of implementation to match the statements below.
If the new system fails the whole of the old system is still operational. χ
Worked example
3 of:
User Documentation
Characteristics: Instructions and guidance for end-users on how to operate the system
Uses & Purpose: To help users effectively use the system and overcome problems
Components:
o Purpose of the system: Explanation of the system's intended function and goals
o Limitations: Known constraints or issues with the system
o Hardware & software requirements: Necessary equipment and software to run the
system
o Loading/running/installing software: Instructions for setting up the system on user
devices
o Saving files: Procedures for storing data within the system
o Printing data: Steps to produce hard copies of system data
o Adding records: Instructions for creating new entries in the system
o Deleting/editing records: Guidelines for modifying or removing existing entries in the
system
o Input format: Structure and format for entering data into the system
o Output format: Structure and format for presenting data generated by the system
o Sample runs: Examples of system operation, including input and expected output
o Error messages: Explanations of system warnings and error notifications
o Error handling: Steps to resolve issues and errors within the system
o Troubleshooting guide/helpline: Assistance for diagnosing and addressing common
problems
o Frequently asked questions: Answers to common user inquiries
o Glossary of terms: Definitions of key terms and concepts related to the system
Remember that technical and user documentation serve different purposes and audiences
Technical documentation is meant for developers and IT staff who maintain and update the
system, while user documentation is for end-users who need guidance on using the system
effectively
Ensure you understand the different components of each type and their purposes
Evaluate the system's performance in terms of resource usage, time, and cost. Consider
whether the system is operating optimally or if improvements could be made to its efficiency
o Provide examples of specific aspects that contribute to the system's efficiency
o Identify areas that may be consuming excessive resources or time, and suggest
ways to optimise them
Questions to ask:
o Does it operate quicker than the previous system?
Examine how user-friendly and accessible the solution is for its intended audience. Assess
whether the system is easy to learn and use, and if users can accomplish their tasks without
difficulty
o Describe the user interface and how it facilitates interaction with the system
o Mention any feedback from users regarding their experience with the system, and
address any issues they encountered
Questions to ask:
o Are all the users able to use the system and make bookings easily?
o Are all the users able to change and cancel bookings easily?
o Can all staff understand how to use the system with minimal training?
Compare the implemented solution with the original task requirements and evaluate how
well it meets the intended purpose
o Outline the initial objectives of the system and discuss how the solution addresses
each one
o Highlight any requirements that may not have been fully met and discuss possible
reasons for this
Questions to ask:
o Is the system suitable for each of the departments?
Collect users' responses to the results of testing the system. Their feedback can provide
insights into potential issues and improvements, and help determine overall user satisfaction
o Summarise the testing process, including test data, expected outcomes, and actual
outcomes
o Discuss users' reactions to the system, addressing any concerns or suggestions they
may have
Based on the analysis of efficiency, ease of use, appropriateness, and user feedback,
identify any limitations in the system and suggest necessary improvements
o List the limitations and provide explanations for each one
o Recommend specific changes or enhancements that could address these limitations
and improve the system
Worked example
Tick three evaluation strategies that need to be carried out following the implementation of the new
system.
[3]
Tick
Observe users operating the old system.
Compare the final solution with the original requirements.
Design the report layout.
Check user documentation to see if it is correct.
Interview users to gather responses about how well the new
system works.
Test the system works correctly.
Identify any necessary improvements that need to be made.
Design error handling.
Tick
Interview users to gather responses about how well the new system works. χ
6. Safety
6.1 Safety Issues
Electrocution
Fire:
Devices can be plugged in using cables, cables that are protruding can cause an accident
You can trip over a cable left out in a location
Body damage can occur during a fall, for example, breaking bones, ligament damage,
bruising, sprains etc depending on the area fell on
Secure cables where you can, like under desks to stop protruding
into open areas
Devices have varying levels of weight and if a device falls on you it could cause injury
Any device should be placed in a secure location, like a PC on a strong desk and not near
the edge
Heavy equipment falling and injuring people causes and prevention strategies
Worked example
Electrocution, caused by touching bare wires / allowing food and drink to spill liquids onto computers [1]
Data Protection
The Data Protection Act (DPA) controls the collection, storage and processing of personal data.
Data must be processed lawfully, fairly, and transparently, with clear consent from the
individual
Data should only be collected for specific, explicit, and legitimate purposes
Organisations should only collect and retain the minimum amount of personal data
necessary for their stated purpose.
Data should be accurate and kept up-to-date, and reasonable steps must be taken
to rectify or erase inaccurate information
Personal data should not be kept for longer than necessary, and it should be securely
deleted when no longer needed
Organisations must protect personal data against unauthorised or unlawful
processing, accidental loss, destruction, or damage
Personal Data
Personal and sensitive data refers to information that can be used to identify an individual, such
as their personal name, address, date of birth, personal images, and medical history.
Personal data:
Personal name: Refers to the full name of an individual, including their first name and last
name.
Address: The physical location where an individual lives, including their house number,
street name, city, and postal code.
Date of birth: The specific day, month, and year when an individual was born.
Gender: the individual's identity relating to male, female, don’t know, prefer not to say
Personal images like a photograph in school uniform: An image of an individual wearing
their school uniform, which can be used to identify and locate them.
Payment details: bank card details used for purchasing items or bank details to access
online banking
Passwords: the combination of letters, numbers and symbols used to access accounts
that are held by the individual
Sensitive data:
Religion/philosophical beliefs
Membership of a trade union: made up of workers to protect and advance the interests
of all workers in the workplace
Sexual orientation: defining who you are attracted to, the opposite gender, the same
gender, or to both or more than one gender
Personal data must be kept confidential and protected through privacy settings on
websites such as social media or strong passwords on websites where personal data is
held or used
Access to personal data should be limited to authorised individuals
Think before you post - consider what information could be gathered from your image or
content
Check website details about the collection, storage, and use of personal data
Only access websites where personal data is used or viewed when on
a secure, encryptedconnection
Worked example
3 of:
E-safety
E-safety is about knowing about and using the internet safely and responsibly
It refers to when an individual is using the internet, email, social media, online gaming
E-safety refers to the individual knowing how to protect themselves from potential
dangers and threats
Prevents cyberbullying
o awareness of how to act online and how to avoid falling victim, creating a safe and
respectful online environment.
Advice
The Internet:
Email:
Social media:
Know how to block and report people who send content or messages that are unwanted
Know where the privacy settings are to reduce the number of people who can see your
posts or images
Be aware of the potential dangers associated with meeting online contacts face to face, do
not meet anyone you do not know, if you do, take an adult and meet publicly
Do not distribute of inappropriate images and inappropriate language
Respect the confidentiality of personal data belonging to other people
Only accept friend requests from people you know
Online gaming:
Worked example
Describe four strategies that the student could use to stay safe when using social media
to communicate with others.[4]
4 of:
Don’t give out other people’s personal information such as address or phone number [1]
Don’t become online ‘friends’ with people you do not know//don’t contact/chat with people you do not know [1]
Never arrange to meet someone in person who you only met online [1]
If anything you see or read online worries you, you should tell someone about it/block them [1]
Implement strong and unique passwords for accounts and regularly change them
Enable two-factor authenticationfor additional security
Regularly update software and operating systems to patch security vulnerabilities
Use firewalls and antivirus software to detect and prevent unauthorised access
Regularly backup data to ensure its availability and protection against potential data loss
Worked example
a. Explain what is meant by the term hacking. Include in your answer two examples of the effects
this can have on the computer system.[3]
b. Describe three measures that could be taken to protect the data from being hacked.[3]
3 of:
Protection of Data
Biometrics
ADVANTAGES DISADVANTAGES
A protocol that establishes an encrypted link between a server and a client computer
SSL ensures that data transmitted between the server and client remain
confidential and cannot be intercepted or adjusted by unauthorised individuals
Identified on a website by the S at the end of HTTP
Encryption
The process of converting data into a form that is unreadable without a decryption key
Encryption is used to protect data on hard disks,email communications, cloud storage,
and secure websites (HTTPS)
It ensures that even if data is accessed by unauthorised individuals, it cannot be
understood without a decryption key
Firewall
A network security device that monitors and controls incoming and outgoing network
traffic
The purpose of a firewall is to create a barrier between an internal network and external
networks, filtering traffic based on predefined rules
It helps prevent unauthorised access, malware, and other network threats
ADVANTAGES DISADVANTAGES
A common method of authentication that involves a unique identifier (user ID) and
a secret code (password)
User ID and password are used to increase the security of data by allowing access only
to authorised individuals
Strong passwords and regular password changes are important to maintain security
It is recommended to use a combination of uppercase and lowercase letters, numbers,
and special characters in passwords
ADVANTAGES DISADVANTAGES
Worked example
The data stored on the computer system needs to be protected from unauthorised access.
Discuss the effectiveness of different methods of increasing the security of this data.
[8]
8 of:
Using different passwords for parts of the computer system makes it more difficult to gain access to the full system [1]
May be difficult to choose a unique password if it is changed every few weeks [1]
The firewall can affect the operation of the computer and stop some uploads [1]
The firewall may need to be shut down at times to upload files therefore making the computer unsafe [1]
To build effective ICT solutions, the first step is to identify and understand the needs of the
intended audience. These needs can be functional, like processing information or aesthetic,
like a visually appealing interface
After identifying the needs, select the appropriate technology and tools to create a solution.
This choice depends on factors like the complexity of the task, the budget available, and the
technical expertise of the users
An essential aspect to remember while designing ICT solutions is to ensure that they are
user-friendly. This means that they should be intuitive to use, require minimal training, and
have easy-to-understand instructions
Additionally, ICT solutions should be accessible to all users, including those with disabilities.
This could involve adding features like voice commands, large text options, or compatibility
with assistive devices
Once the solution is created, it is crucial to test it to ensure it functions as expected and
fulfils the users' needs effectively
Understanding the audience is crucial in ICT solution design. The analysis should consider
factors such as the age, technical skills, and background of the audience, which can affect
their ability to use the solution
The solution designer should also understand the type of information that the audience
needs. This can guide the design of the information architecture and the data processing
features
Cedric Chong IGCSE ICT 80 | P a g e
How the audience accesses and uses the information also impacts the design. For example,
if the audience mostly accesses the solution via mobile devices, the solution should be
mobile-friendly
Lastly, the designer should consider any special needs of the audience, like visual or hearing
impairments. The solution should be designed to accommodate these needs, ensuring
inclusivity
Copyright
Software producers use various methods to protect their copyright, such as Digital Rights
Management (DRM)
DRM involves technologies or systems that control the use, modification, and distribution of
copyrighted works
Other methods include product activation, where software requires a unique code to be fully
operational
Automatic updates can also serve as a form of copyright protection, as pirated software
often can't receive these updates, making it less functional or secure over time
Carbon Copy (CC) is used when you want to include additional recipients to view the email
Blind Carbon Copy (BCC) is used when you want additional recipients to view the email
without other recipients knowing
Forward allows you to send an existing email to a new recipient
Attachments allow files to be sent along with the email message
Discuss the advantages and disadvantages of social networking rather than email as a means of
communication.[8]
Advantages:
Disadvantages:
Emails are private between the sender and recipient // more secure
Messages can be alerted as a high priority
Attachments can be used
Emails tend to be more formal
Auto reply / forward / reply can be used
Social networking makes a person more prone to cyber predators/trolls
Exam Tip
Spam
Worked example
2 of:
2 of:
4 of:
The Internet and the world wide web are often used interchangeably, but they are not the same
thing.
The Internet
The Internet refers to the global network of computers and other electronic devices
connected through a system of routers and servers
It is the infrastructure that allows us to send and receive information, including email, instant
messaging, and file transfers
It also provides access to other services such as online gaming, video streaming, and cloud
computing
The world wide web, or simply the Web, is a collection of websites and web pages that are
accessed using the internet
It was created in 1989 by Tim Berners-Lee, who envisioned it as a way to share and access
information on a global scale
The web consists of interconnected documents and multimedia files that are stored on web
servers around the world
Web pages are accessed using a web browser, which communicates with a web server to
retrieve and display the content
It is used for browsing web pages, sending emails, social networking, online shopping, and
much more
Advantages include ease of communication, access to information, and online services
Disadvantages include privacy concerns, cybercrime, and misinformation
Blogs
A blog (short for weblog) is a website or part of a website that is updated regularly with
content, often written in an informal or conversational style like a journal
They are usually presented in reverse chronological order
They are usually managed by individuals or small groups
They allow for reader comments, facilitating some level of discussion
Blogs often focus on specific topics, such as food, travel, fashion, technology, or personal
experiences
They can also serve as a platform for sharing opinions or insights
Forums
A forum is an online discussion site where people can hold conversations in the form of
posted messages
They are often organised around specific topics or interests, and divided into categories
known as threads
Unlike blogs, forums are primarily focused on peer-to-peer interaction
They may require users to create an account before posting
Forums can be moderated or unmoderated
Wikis
A wiki is a type of website that allows users to add, remove, or edit content
It is designed to facilitate collaboration and knowledge sharing from many people
It holds information on many topics which can be searched
Posts are not in chronological order
The structure is determined by the content or its users
The most famous wiki is Wikipedia, an online encyclopaedia
Changes can be tracked and reverted if necessary, and the content is usually written in a
neutral style
Social Networking
Social networking sites are platforms where users can connect with others and share
content
They include platforms like Facebook, Twitter, Instagram, and LinkedIn
Social networking platforms usually require users to create a profile and allow them to share
text, images, videos, and links
They facilitate interaction, collaboration, and information sharing on a large scale
Privacy settings allow users to control who can see their content
Worked example
[2]
Moderated Un-moderated
Moderated Un-moderated
Internet Service Providers (ISPs) provide services for accessing and using the Internet
A Uniform Resource Locator (URL) is the address of a web page on the WWW
What is a URL?
The URL is a text-based address that identifies the location of a resource on the internet
It is the address of a web page, image, video, or any other resource available on the internet
Inappropriate and criminal material: The internet can expose users to harmful or illegal
content
Data restriction: Parental, educational, and ISP controls can limit access to certain
information or websites
A web browser is a software application used to locate, retrieve, and display content on the
WWW, including web pages, images, video, and other files
Cedric Chong IGCSE ICT 86 | P a g e
A hyperlink is a word/phrase/image which references data that the reader can follow by
clicking or tapping, usually taking you to another web page
Worked example
HotHouse Design is a large design company. It has recently created a new web address for its
design portfolios. The web address is:
https://www.hothouse-design.co.uk/portfolios
a. Describe the following parts of the web address.[4]
https://
1 of:
hothouse-design
this shows the domain name that the company have purchased [1]
.uk
/portfolios
Word/phrase/image [1]
When clicking links to another document/page/website/top or bottom of the page [1]
Search Engines
Search engines are tools that locate and display web pages related to the search terms
entered by the user
They are essential for navigating the vast amount of information on the internet
They index millions of web pages and use algorithms to rank the relevance of each page to
the search terms
Speed of Searching
Search engines can scan through billions of web pages in a fraction of a second to find
matches to your search query
The speed is affected by your internet connection and the efficiency of the search engine’s
algorithms
Amount of Information
The internet offers a wealth of information, but not all of it is accurate or reliable
Assess the reliability of information by considering the reputation and credibility of the source
Determine the validity of information by checking it against other reputable sources
Consider whether the information is biased, looking for perspectives that may be promoting
a particular viewpoint
Check how up-to-date the information is, as outdated information can be misleading
Protocols
Worked example
You have been asked by the secretary of a soccer club to create a website to publicise its results,
fixtures and other events.
Explain how to upload and publish the content of a website using FTP.[4]
4 of:
9 File Management
9.1 File Management
Locating Stored Files
Exam Tip
If you are searching for a folder you can do the same thing but instead of clicking on
document, click on folder
The left hand window pane displays all drives and favourite folders
The right hand pane displays the folders/ subfolders and files of the selected drive or folder
Each folder can be accessed by selecting the folder and double clicking
As the users navigate through the folders the current path location is displayed at the top
It is a common method to simply double-click the file that you wish to open and it will load
into the most suitable application/program
Sometimes the application/program that the file opens in is not the preferred choice for the
user
There are 3 main ways to open or import files for use
o Option 1 - Open the file from the desired application
o Option 2 - Drag the file into the desired application
Saving Files
The below screenshot shows a project structure broken into 4 different sections, Initiation,
Planning, Executing and Closing
Within each folder, files are saved according to the which part of the project they are relevant
to
Meaningful file names should give a clue as to what the document contains
Doc1’ does not give any idea about the contents of the file and is not a meaningful file name
‘Plan’ is a partially meaningful name but could be any plan or any version of the plan
‘Initial_Plan_Version_1 is a meaningful name as it determines that it is an initial plan and is
the first version
There are different ways you can save or print your work
Save - Saves the current file or if the file has been saved, updates
Save as - Save the file with a new name and/or file type
Export - Exports a copy of the file usually as a pdf but can also be other file formats within
the program
Print - Prints the currently opened file
Saving
o To save a webpage, right click on the page and choose “Save as”
Printing
o To print a web page, right click on the web page and select “Print”
Print
o Right-click on the web page and select “view page source”
o Right click on the page source and select “Print”
o Save the folder to a suitable location and select “Save”
Using the search tool, search for and select the “snipping tool”
Save
o To save the screenshot, right click on the image and choose “Save as”
Database Reports
Save
o With the report open, select File and then “Save as”
o Choose a suitable location to save the report and save the file type as “PDF”
Print
o To print the report, select the file and then select “Print”
o To ensure the report s laid out correctly first preview the report
o To finally print the report, select “Print”
Save
o Select the chart by clicking on it
Print
o Select the chart by clicking on it
o Select File and then Print
Many applications have their own unique file types that are specific to their functionality and
features. These file types are designed to store and represent data in a format that is
specific to the application's purpose
Below is an example of a text document being saved as a Word application package type
The same method is used for both saving and exporting files to their required type
If a document has already been saved the user must select SAVE AS to create a second
copy of the document and choose its required file type
Worked example
.PDF and .RTF are two file formats used for storing documents. Describe the file formats and
explain the differences between them.[5]
PDF is a portable document format that is readable on a PDF viewer or a browser [1] whilst an RTF document is a rich
text format and is readable by all word processing software [1]
An RTF document is fully editable whereas some PDF documents cannot be edited [1]
A PDF can use digital signatures whereas an RTF document does not allow digital signatures [1]
A PDF document tends to be compressed whereas an RTF document is not compressed [1]
Text (.txt)
o Used for storing plain text data
o Contains only human-readable text without any additional formatting or styling
o Extensively supported across different platforms and applications
o Can be opened and edited using a word processor or basic text editor
Zip (.zip)
o A container used for compression
o Allows multiple files and folders to be compressed into a single, smaller-sized archive
o Uses lossless compression algorithms to reduce file sizes
o Compression preserves original content
o Convenient for bundling multiple files into a single package
There are many different technical ways that file sizes can be reduced however some simple
methods and techniques for multimedia files are below:
Worked example
An author is writing a new textbook about ICT. He has used a large number of images in the
document and wishes to send the document as an email attachment to his publisher, but the file is
currently too large.
Describe how he could reduce the size of the document without reducing the number of images.
[4]
The author could reduce the size of the document by either reducing the image resolution [1]
or compressing /zip the folder with all the photos to a smaller size [1]
How to Compress a File
Exam Tip
Remember that although you are compressing the file to a PDF file this means that the file
cannot be edited in the same way and so it is important to keep a copy of the original
uncompressed file in case any changes are required
Hold Ctrl and select all the images you would like to compress, right click and choose
‘Compress to Zip file’
Using the Zip file compression technique has reduced the file size considerably
o Total for all files before compression: 8477KB
o Total for all files after compression: 727KB
Cedric Chong IGCSE ICT 107 | P a g e
The same can be done using WinRar
Hold Ctrl and select all the images you would like to compress, right click and choose
‘WinRAR followed by Add to Archive’
Note* Sometimes when using WinZip or WinRar the file sizes will not compress further as some file
types are already compressed, such as JPEG images. Another reason may be that different
compression algorithms are used by different compression software, and their effectiveness can
vary depending on the file types being compressed
Placing an image with precision: This refers to positioning an image accurately within a
document or other media
o You can usually do this by selecting the image and dragging it to the desired location
o Some software allows for more precision through the use of coordinates or alignment
tools
Cropping an image: This involves cutting out and discarding parts of an image
o Cropping tools usually allow you to select a portion of the image to keep and discard
the rest
Rotating an image: This means turning the image around a central point
o Most software allows rotation to any angle, and common rotations such as 90
degrees or 180 degrees are often provided as options
Adjusting brightness and contrast: These tools change the light and dark values in an
image
o Brightness affects all pixels in the image equally, making the image lighter or darker
o Contrast adjusts the difference between light and dark values, which can make the
image appear more or less detailed
Exam Tip
Make sure you use specific technical terms when answering questions on this topic
Worked example
[4]
To create a style, you select your desired formatting options and then save them as a new
style
You can modify a style by editing its formatting options and then saving the changes
Applying a style is as easy as selecting text and then choosing the desired style
When you update a style, all the text using that style in your document will reflect the
changes
Font Attributes
Font Face
This is the design of the text; examples include Arial, Times New Roman, and Calibri
Serif fonts have little feet or lines attached to the ends of their letters, while Sans-serif fonts
do not
Serif fonts are generally considered more traditional, and Sans-serif fonts are seen as
modern
Serif Sans-serif
Font size is measured in points, with one point being 1/72 of an inch
Font colour can be any colour available in the software's colour palette
Text Enhancement
You can make your text bold, italic, or underline it to highlight important information
You can adjust paragraph spacing (before and after a paragraph) and line spacing within a
paragraph
Bullets
Bullets are used for listing items - they can either be numbered or not
You can change bullet shape, alignment, line spacing, and indent
[1]
[1]
[1]
[1]
A Corporate House Style refers to the consistent use of particular visual design elements
across a company's documents and communications
These design elements may include specific fonts, colours, logos, and layout styles
The primary purpose is to create a consistent and recognisable image for the company
It makes the company's documents and products instantly identifiable to clients or customers
This consistency also streamlines the creation of new documents within the company by:
o Reducing time and cost spent setting up and formatting documents
o Reducing the risk of errors
Worked example
The Medical Authority creates many different types of documents including letters and memos.
Each of them is produced using its corporate house style.
Explain why corporate house styles are required.
[3]
3 of:
Automated software tools like spell check and grammar check help to minimise errors in
your work
These tools scan the document for spelling and grammar errors, highlighting potential issues
Always review and make appropriate changes based on the suggestions these tools provide
Automated suggestions provided by spell check software may not always be accurate or
appropriate
The software may not recognise some words or phrases, particularly technical terms or
jargon
Always use your judgement when accepting or rejecting these suggestions
Validation
Why use validation?
Validation is essential to ensure data is accurate, complete, and meets specific criteria
before it's processed
Cedric Chong IGCSE ICT 122 | P a g e
It helps minimise data entry errors and maintains the integrity of the data
Range check: Confirms that the data entered falls within a specific range
Character check: Ensures that the data contains the correct type of characters, like letters
or numbers
Length check: Verifies the data entered is of the correct length
Type check: Validates that the data is of the correct type, like text or number
Format check: Confirms the data is in the correct format, such as a valid email address or
date
Presence check: Ensures that the data field is not left empty
Proofreading
Why Proofread?
It is the final check to identify and correct errors before a document is finalised
It ensures professionalism and prevents misunderstanding in communication
Transposed numbers:
o Numbers that have been swapped, like typing 21 instead of 12
Incorrect spelling:
o Words that are not spelt correctly
Inconsistent character spacing:
o Different spacing between characters in a document
Inconsistent case:
o Incorrect use of uppercase and lowercase letters
It is a process to ensure that data is accurate and has been inputted correctly
It helps to maintain data integrity and reduce data entry errors
Visual checking: Manual method of verifying data by comparing the source with the entered
data
Double data entry: A method where data is entered twice and then compared for
inconsistencies
While verification ensures data is entered correctly, validation makes sure the data is
sensible, reasonable and within acceptable boundaries
Both verification and validation are essential in maintaining data accuracy and quality
Worked example
A local railway company is considering introducing a new system for its passengers using e-tickets
on a smartphone. Details of each of the passengers have been entered into the database.
a. Give one reason why this data was verified on entry.
[1]
To ensure that the data entered has been copied correctly [1]
[2]
Highlight: Use the mouse to select the text or numbers you want to manipulate
Delete: Remove the selected text or numbers from the document
Move: Cut or copy the selected text or numbers, then paste it into a new location
Cut, Copy, and Paste: Cut removes the selection from its original location, copy makes a
duplicate, and paste inserts the cut or copied material
Drag and Drop: Click on the selected material, hold the mouse button down, move the cursor
to the desired location, and then release the mouse button
You can add objects such as text, images, screenshots, shapes, tables, graphs or charts,
spreadsheet extracts, and database extracts into your document
These objects can come from a variety of sources, and you can adjust their size and position
in your document
You can arrange your text to wrap around tables, charts, or images in a variety of ways,
including:
o Above: The text appears above the object
o Below: The text appears below the object
o Square: The text forms a square around the object
o Tight: The text closely wraps around the object, following its shape
An auction company sells toys. Before the auction begins, a hard copy brochure is produced
showing information about the
items, data from the spreadsheet and images of some of the items.
Describe how this brochure is created.
[5]
5 of:
Exam Tip
Don't forget to use names like word processor instead of Microsoft Word and spreadsheet
instead of Excel - you won't get the marks if you use brand names
Tables
Creating a Table
Tables are created by specifying the desired number of rows and columns
You can add text or objects such as images or graphs into the cells of a table
Just click on the cell and start typing or paste the object
o Merge cells: Combine two or more cells into one
Tables can be formatted to improve readability and visual appeal. Here are a few options:
o Set horizontal cell alignment: Choose whether the text is aligned to the left, right,
centre, or justified within a cell using the normal alignment options
o Set vertical cell alignment: Set text to align at the top, middle, or bottom of a cell
o Show or hide gridlines: Display or hide the lines that make up the table
o Wrap text within a cell: Make text automatically move to the next line when it
reaches the edge of a cell
o Shading/colouring cells: Apply a colour to the background of a cell
o Adjust row height and column width: Change the size of the cells in your table to
better fit your content
Headers and footers are areas at the top and bottom of a page in a document
You can add or edit content in these areas as required
The contents of headers and footers can be aligned consistently within a document
They can be aligned to the left margin, right margin, or centred within margins
You can insert text and automated objects into headers and footers
These objects can include file information, page numbering, total number of pages, date,
and time
Text Enhancement
Page layout can be customised, including the page size and orientation, page margins,
number of columns, and column width
Different types of breaks can be set or removed, such as page breaks, section breaks, and
column breaks
The Find and Replace function is a useful tool to quickly locate and change specific words or
phrases in a document
Case Matching
The function can be set to match the case of the word or phrase, making the search case-
sensitive
This means that 'Word' and 'word' would be considered different
The Find and Replace function can also be set to match whole words only
This prevents partial matches from being considered, such as 'cat' in 'catalogue'
Bookmarks
What is a Bookmark?
A Bookmark is a tool used in digital documents to mark a specific place for easy navigation
in the future
Adding Bookmarks
Adding bookmarks can be done by selecting the text you want to bookmark, and then
choosing the 'Add Bookmark' option from the menu
Page, section, and column breaks allow for better organisation and control over the layout of
your document
A page break starts a new page, a section break allows for different formatting in separate
parts of the document, and a column break starts a new column (if your document is
divided into columns)
Types of Database
normalisation
Reduced inconsistency of data
one place
Easier to edit records/record format
Easier to use
Easier to add/delete data/records
Sorting and filtering are
More complex queries can be
simpler
carried out
Can be used with a
Better security
spreadsheet
More ability to cater for future
requirements
Worked example
The owner of a gardening company is planning to create a database to store the details of all his
customers. He has the choice of using a flat file database or a relational database.
Discuss the advantages and disadvantages of using a relational database rather than a flat file
database.
[8]
More complex than a flat file database as more tables are required
Takes more time to set up
More of a reduction in performance if many tables are needed
Cedric Chong IGCSE ICT 139 | P a g e
Slower extraction of meaning from data
Less robust due to broken keys and records / each table requires a key field and relationships to other tables
More developer expertise/personnel to run the database:
More expensive to create a relational database
More processing power is needed for complex queries.
Data Types
You can import data from existing files, like .csv or .txt
You can use specified field names to create tables
Data Types
This data type allows letters, special characters like spaces and
Text/Alphanumeric NG321AE
punctuation and numbers to be entered into a field
This allows single characters to be entered into a field.
Character Characters can be any alphanumeric value and can be lowercase A
or uppercase
This data type can be used in fields where there are only two
Boolean possible options. Data is stored as a 1 or 0 in the database but can True/False
be used to represent True/False or Yes/No or checked/unchecked
Integer Only whole numbers can be entered 15
Currency Used for monetary values £4.75
Decimal / Real Numbers including decimal numbers can be stored 30.99
Only dates or times can be entered into a field with this type. A
Date/Time 180855
format for the date/time can also be assigned to the field
Exam Tip
Make sure you're specific which type of numeric data it should be - integer, decimal/real or
currency
Worked example
A farmer has purchased a computerised milking system for her cows. She has asked a systems
analyst to create a database to store details of the cows being milked.
Examples of the details of the cows which will be stored are:
Breed
Date_of_birth
Weight_of_cow
Average_milk_yield
Passport_number
[5]
Each table has a primary key field which acts as a unique identifier
o Each item of data in this field is unique
o Duplicate data items would be blocked if they were entered into the primary key
field
Because the items of data are unique within the primary key field they can be used
to identify individual records
In the example customer table, the primary key would be the CustomerID because each
customer’s ID is unique
If there was a customer with the same name they could be identified correctly using the
CustomerID
Relational databases allow you to create relationships between different tables using primary
and foreign keys
1 2 Annual
Exam Tip
If the answer to a question is the name of a field, ensure you copy it exactly from the
question. The examiner is looking for an exact answer with the correct capital letters and
underscores where they're included
Worked example
A systems analyst has created a new computer system to keep records in a medical centre. She
has created a relational database to store the medical records of patients.
The database uses primary and foreign keys. Explain the difference between a primary key and a
foreign key.
[4]
4 of:
Form Design
Appropriate Spacing
The spacing between individual characters in fields should be adjusted for readability
The use of white space is crucial - it improves readability and reduces cognitive load
Control Elements
Radio Buttons - Used when there is a list of two or more options that are mutually exclusive
Check Boxes - Used when the user can select multiple options from a list
Drop Down Menus - Used when you want to provide many options but conserve space
Exam Tip
Worked example
A school is setting up a new computerised system to manage many aspects of the school
administration. The data from the registration system is saved in the school administration
database. The headteacher will need to check the attendance records for any student for any
semester. She will type in the Student_ID and the Semester (Autumn, Spring or Summer). After she
has done this the following data will appear on the same screen.
Field name
Student_name
Days_present
[6]
4 of:
Perform Calculations
Use of Arithmetic Operations or Numeric Functions
Databases allow you to use formulae and functions to perform calculations at run time
This can include basic arithmetic operations: addition, subtraction, multiplication, and
division
Aggregate Functions
You can also use aggregate functions to calculate statistical information about a set of records.
Some examples include:
Remember that the actual syntax and function names might differ slightly depending on the specific
database system being used.
You can sort data based on a single criterion - such as by name, date, or numerical value
For example, you might sort a list of students in ascending order by their last names
To sort the customer's tables by LastName in either ascending or descending order:
Ascending Order - Data is sorted from smallest to largest (e.g., from A to Z, or from 1 to
100)
Descending Order - Data is sorted from largest to smallest (e.g., from Z to A, or from 100 to
1)
Exam Tip
Remember, when sorting by multiple criteria, the data is first sorted by the first criterion.
Within each group of the first criterion, it is sorted by the second criterion, and so on
You can use a single criterion to select specific data. For example, you might want to select
all customers from a specific city
E.g. to return all customers from London:
You can also use multiple criteria to select data. For instance, you might want to select all
customers from a specific city who have also purchased in the last month
E.g. to return all customers from London who purchased in the last 30 days:
1. Follow the steps above to start a new query and add the City field with 'London' as the
criteria
2. Drag another field you want to query to the QBE grid. For example, if you're looking for
customers who purchased in the last month, drag the LastPurchaseDate field
3. In the Criteria row under this field, type Date()-30
Wildcards are used with the LIKE operator to search for patterns. The most common
wildcard characters are:
o % - Represents zero, one, or multiple characters
o _ - Represents a single character
E.g. to return all customers whose names start with 'J':
1. Start a new query and drag the field you want to query to the QBE grid. For example, if
you're looking for customers whose names start with 'J', drag the Name field
2. In the Criteria row under this field, type J*
Exam Tip
Remember, the exact steps and symbols used for wildcards may vary depending on the
specific DBMS and its version. In Microsoft Access, the asterisk (*) is used as the wildcard
character to represent multiple characters, while the question mark (?) represents a single
character
When referring to field names from the exam question, make sure you copy it exactly the
way it appears in the question
Make sure you give the information asked for in the question and not a different field
Worked example
A student is setting up a database of information about volcanoes for a Geography project. The
following is part of the database.
Operators such as AND, OR, NOT, LIKE, >, >=, <, <=, =, <> can be used to search the volcano
database. The search criteria for all the dormant volcanoes with a height of less than 1000 metres
would look like this:
a. write down the search criteria that will produce a list of all the volcanoes that are not extinct in
China that also last erupted before the year 1900.[6]
State = NOT ‘Extinct’ AND Country = ‘China’ AND Last_eruption < 1900
b. write down the names of the volcanoes that match the requirements of part (a).[2]
Tengchong [1]
Wudalianchi [1]
c. The data is sorted into ascending order of height. Write down the name of the volcano which
would now be in the first record.[1]
Wudalianchi [1]
Present Data
Data presentation in databases is often done through reports. These reports can be formatted and
customised to display data in a user-friendly manner.
Reports should display all the required data and labels in full. For example, if you're creating
a sales report, it should include all relevant fields, like product name, quantity sold, and total
sales
Report Header: This appears at the beginning of the report. This is typically where you
would put the report title and other introductory information
Report Footer: This appears at the end of the report. This is where you might put summary
or conclusion information
Page Header: Appears at the top of each page. This might contain the page number and the
date
Page Footer: Appears at the bottom of each page. This might also contain the page number
and the date
The report title should be set in the report header. It should be clear, concise, and accurately
reflect the contents of the report
You can control the display of data and labels in your report. For example, you might choose
a tabular format, where data is arranged in rows and columns, or a columnar format, where
each data field is listed vertically
Data and labels should be aligned appropriately. For example, numeric data is often right-
aligned, and decimal points should be aligned for easy comparison
You can control the number of decimal places displayed, the use of a currency symbol, and
the display of percentages. For example, a total sales field might be displayed with two
decimal places and a currency symbol
Master Slide
Why Use Master Slide?
Master Slide is a template slide that you can apply to any number of slides in your
presentation
It allows for consistency in design and layout across your presentation
Headings and Subheadings: You can change the font, size, and colour of your headings
and subheadings
Bullets: You can choose the style and indentation of your bullet points
Background Colour: Change the colour of your slide background to suit your presentation
o Go to 'Design', then 'Format Background'
Outputting a Presentation
Displaying the Presentation
Presenter Controlled: This allows you to control the presentation during a live presentation
o Go to the 'Slide Show' tab, then 'From Beginning' or 'From Current Slide', depending
on where you want to start
Presenter Notes: This prints your slides along with any notes you've added for presenting
o Go to 'File', then 'Print'
o In the 'Print Layout' dropdown, select 'Notes Pages'
Handouts: This prints multiple slides on a page, making it ideal for giving to your audience
o Go to 'File', then 'Print'
o In the 'Print Layout' dropdown, select 'Handouts' and choose how many slides per
page you want
You can alter the structure of a spreadsheet by inserting or deleting cells, rows, and columns
This flexibility allows you to manage and organise your data effectively
Merging Cells
Absolute cell references ($A$1) stay constant, while relative cell references (A1) change
when you copy or drag a formula
Use absolute references when you want the same cell referenced and use relative
references when you want the reference to change
Named cells:
o Easily refer to a group of adjoining cells
o Shortens/simplifies formulae
Worked example
Tawara school has a shop that sells items needed by pupils in school. Part of a spreadsheet with
details of the items is shown.
a. Write down the number of rows that are shown in the spreadsheet that contain text.
[1]
6 rows [1]
b. Write down the number of columns that are shown in the spreadsheet that contain text.
[1]
Make sure you know which way round rows and columns are - rows go across and columns
go down
A formula can:
o Contain a function
o Be simple calculations/mathematical operation
o Be typed directly into the formula bar
It is a statement that performs calculations on values in your worksheet. For instance, "=A1+B1"
A function:
o Is a special type of formula/complex formula
Using Functions
A B C D
1 10 20 30 40
2 15 25 35 45
3 20 30 40 50
Spreadsheets offer a variety of functions. Some of the most commonly used are:
o E.g. "=SUM(A1:B2)" This would add all the numbers from cell A1 to B2, giving the
result 65.
o E.g. "=AVERAGE(A1:B2)" This would find the average of all numbers from cell A1 to
B2, giving the result 16.25.
o E.g. "=MAX(A1:B2)" This would return the maximum number in the range from A1 to
B2, which is 25.
o E.g. "=MIN(A1:B2)" This would return the minimum number in the range from A1 to
B2, which is 10.
o E.g. "=INT(A2)" This would round down the number in cell A2 to the nearest integer,
which is 15.
Cedric Chong IGCSE ICT 163 | P a g e
o E.g. "=ROUND(A2, 0)" This would round the number in cell A2 to the nearest whole
number, which is 15.
o E.g. "=COUNT(A1:B2)" This would count the number of cells in the range A1 to B2
that contain numbers, which is 4.
o E.g. "=LOOKUP(25, A1:B3)" This would look for the number 25 in the range A1 to B3
and return it.
o E.g. "=VLOOKUP(25, A1:B3, 2, FALSE)" This would look for the number 25 in the
first column of the range A1 to B3 and return the corresponding value in the second
column of the same row.
o E.g. "=HLOOKUP(25, A1:D2, 2, FALSE)" This would look for the number 25 in the
first row of the range A1 to D2 and return the corresponding value in the second row
of the same column.
o E.g. "=XLOOKUP(25, A1:B3, D1:D3)" This would look for the number 25 in the range
A1 to B3 and return the corresponding value from the range D1 to D3.
o E.g. "=IF(A1>B1, "Yes", "No")" This would check if the value in cell A1 is greater than
the value in cell B1. If true, it returns "Yes". If false, it returns "No".
o SUM: Adds all the numbers in a range of cells
o AVERAGE: Calculates the average of a range of cells
o MAX and MIN: Finds the largest and smallest numbers in a range respectively
o INT: Rounds a number down to the nearest integer
o ROUND: Rounds a number to a specified number of digits
o COUNT: Counts the number of cells in a range that contain numbers
o LOOKUP, VLOOKUP, HLOOKUP, XLOOKUP: Looks up values in a table based on a
given condition
o IF: Returns one value if a condition is true and another if it's false
You can use a function within another function. This is called nesting.
For instance, "=IF(A1>B1, MAX(A1:B1), MIN(A1:B1))".
o This checks if A1 is greater than B1, and if true, it returns the max value, else it
returns the min value
Worked example
Tawara school has a shop that sells items needed by pupils in school. Part of a spreadsheet with
details of the items is shown.
[5]
5 of:
If you're asked about a complex formula or function, plan out your answer and work from left
to right as you track through the formula. E.g. in the question above IF(F4="Y",
($I$1*D4*G4),"") would become If F4 is equal to "Y" then multiply I1 by D4 by G4. If F4<>"Y"
then display a blank
Order of Operations
Understanding the order of mathematical operations is critical when creating complex
formulae in spreadsheets
Brackets can be used to specify which operations to perform first, outside of this order.
For example, in the formula "=A1+2*3", the multiplication will be performed first, resulting in
"A1 + 6"
But if we write the formula as "=(A1+2)3", the operation inside the brackets will be performed
first, resulting in "3A1 + 6"
A B C
1 10 20
2 5 15
3 =20*2
It's always a good idea to use brackets to make sure that your formulae work as expected, even if
they might not be necessary
Cell Referencing
Cell referencing is a critical concept in spreadsheet software like Excel.
It allows you to refer to the contents of a cell in a formula rather than typing in a specific
value
This can make your spreadsheets more flexible and powerful
When you copy a formula that includes a relative cell reference, Excel adjusts the reference
relative to the new location
For example, if you copy the formula "=A1+B1" from cell C1 to C2, the formula will adjust to
"=A2+B2"
Absolute cell referencing is indicated with dollar signs before the column and/or row reference
(like $A$1).
When you copy a formula with an absolute cell reference, that reference does not change
For example, if you copy the formula "=$A$1+B1" from cell C1 to C2, the formula will stay as
"=$A$1+B2"
A B C
1 10 20
2 5 15
If you input the formula "=A1+B1" in cell C1 and drag the fill handle down to copy the formula
to cell C2, the formula in C2 will change to "=A2+B2"
But if you input the formula "=$A$1+B1" in cell C1 and drag the fill handle down, the formula
in C2 will still refer to cell A1: "=$A$1+B2"
Exam Tip
Be careful when copying formulas! Make sure you're using the right type of cell reference for
what you want to do
Cedric Chong IGCSE ICT 166 | P a g e
Remember the dollar signs ($) for absolute cell referencing. It can save you a lot of time and
hassle!
Use cell references rather than the value of the cell
Worked example
An auction company sells toys. It uses a spreadsheet to show each person’s items and the amount
of money the buyer and seller owe to the company.
Part of the spreadsheet is shown below.
a. The person selling the item pays a Seller’s commission on any item sold. This is calculated using
the Selling price and finding a match or the next value below in the table, in cells I6 to J11.
Write a formula to display in cell F6, the Seller’s commission on the Double Decker bus toy.
This formula will be replicated down to cell F13.
[5]
VLOOKUP(D6, I$6:J$11,2)
VLOOKUP() [1]
(D6, [1]
I6:J11, [1]
correct use of $ [1]
2) [1]
or
b. Describe how you could replicate the formula in cell F6 for each item.
[2]
or
or
or
For example, you could sort a list of students first by grade, and then alphabetically by name
within each grade
In Excel, select your data and then choose 'Sort'. Add levels for each of your criteria
A B
1 Name Age
2 Alex 15
3 Ben 17
4 Alex 16
If you sort by 'Name' only (A to Z), the spreadsheet might look like this:
A B
1 Name Age
2 Alex 16
3 Alex 15
4 Ben 17
If you sort by 'Name' (A to Z) and then 'Age' (Smallest to Largest), the spreadsheet would
look like this:
A B
1 Name Age
2 Alex 15
4 Ben 17
Exam Tip
Be sure to select all relevant columns before sorting, especially when dealing with multiple
criteria. Failure to do so may result in misalignment of your data!
Searching for specific data in spreadsheets can be done using various operators
These include AND, OR, NOT, >, <, =, >=, <=, <>
For example, you might search for all students who scored above 85 (>) AND are in Year 11
Wildcards can be used when you're not sure of the exact data you're looking for
The most common wildcards are the asterisk (*) and the question mark (?)
An asterisk represents any number of characters. For example, "A*" would find "Alex",
"Aaron", etc.
A question mark represents a single character. For example, "A?e" would find "Abe", but not
"Alex"
A B C
2 Alex 85 11
3 Ben 90 12
4 Chloe 80 11
5 Dave 88 12
6 Eve 82 11
To select all students in Year 11, you could use the criterion "Year = 11"
Cedric Chong IGCSE ICT 170 | P a g e
To search for students who are in Year 11 AND scored above 85, you could use the criteria
"Year = 11" AND "Grade > 85"
Exam Tip
Remember that you can use operators and wildcards in your searches to find data more
efficiently
Be sure to use the correct operator for your search. For example, if you want to find values
equal to or greater than a certain number, use >=, not just >
Wildcards are especially useful when you're not sure of the exact value you're looking for.
But be careful, as they can also return unexpected results if not used properly!
Display Features
Display formulae or values in your spreadsheet as needed.
Toggle between displaying cell values or the formulae used to calculate those values
Adjust row height, column width, and cell sizes to make data, labels, and formulae fully visible.
This improves the readability of your spreadsheet and helps prevent errors
Wrapped text will automatically move to the next line within the cell if it exceeds the cell's
width
Hide and display rows and columns as needed to focus on specific data or to improve readability.
This can be useful when working with large datasets or complex spreadsheets
Use conditional formatting to change the display format depending on the contents of a cell.
This helps to highlight important information or identify patterns and trends in the data
[2]
2 of:
Choose the best layout for your spreadsheet's data and design
Specify the number of pages, print area, display or hide gridlines, and display or hide row
and column headings
A B C
1 Name Mark Year
2 Alex 85 11
Exam Tip
Always preview your printout before printing to ensure it looks as expected and fits within the
designated page boundaries
Remember to set the print area, especially if you only want to print a specific part of the
spreadsheet
Highlight cells that are next to each other in a row or column by clicking and dragging your
mouse across the cells
For cells that are not next to each other in a row or column, hold the 'Ctrl' key (or 'Cmd' on
Mac) and click the individual cells or ranges
Specified data ranges can be selected by clicking the first cell in the range, holding 'Shift',
and clicking the last cell
Always include a chart title that summarises what the graph or chart is about
A legend identifies the different data series in your chart
Sector labels, sector values, and percentages help interpret pie charts
Category axis title, value axis title, category axis labels, value axis labels, and data
value labels are essential in making your graph or chart understandable
To add a second data series, select the new data and click on 'Add Data' in the chart menu
This is useful when comparing two sets of related data
Adding a second axis allows you to plot two different data sets with different scales
Click on 'Add Axis' in the chart menu and select the data series to plot on the new axis
Format numerical values to a specified number of decimal places by selecting the cells
and choosing 'Format Cells' from the right-click menu
To display currency symbols, choose 'Currency' in the 'Number' tab of the 'Format Cells'
dialog box
Adjust the maximum and minimum values of an axis scale by right-clicking on the axis
and selecting 'Format Axis'
Set incremental values to change the scale of your graph
Example
The above data can be used to create a Line Graph to illustrate the sales and expenses over
three months
Worked example
A farmer has purchased a computerised milking system for her cows. She has asked a systems
analyst to create a database to store details of the cows being milked. The amount of milk each cow
produces is currently recorded daily in a spreadsheet.
This is part of the spreadsheet.
Cedric Chong IGCSE ICT 179 | P a g e
You have been asked to produce a graph or chart to show the amounts of milk for the cow with
Animal Passport Number 971/2016.
Describe the steps you would use to produce a graph or chart of this data as a separate sheet.
Include in your answer the name of the new sheet.
[6]
5 of:
1 mark for the name of the new sheet – Allow any appropriate name
Presentation Layer
The presentation layer is used to display and format elements within a web page
It controls how the content looks, including layout, colours, fonts, and more
This layer is mainly handled by CSS (Cascading Style Sheets)
Behaviour Layer
The behaviour layer uses scripting languages to control elements within a web page
It enables interactive elements and complex functionality, such as form validation, image
sliders, and dynamic content updates
JavaScript is the primary language used for the behaviour layer
Worked example
Web development layers are used when designing web pages. An example of one of the layers is
the presentation layer.
Name the other two web development layers.
[2]
Content/Structure[1]
Behaviour/Scripting [1]
The content layer of a web page is made up of HTML elements such as headings (<h1>, <h2>,
etc.), paragraphs (<p>), links (<a>), images (<img>), and more
HTML elements are the building blocks of web pages and are used to structure and organise the
content
The head section contains information about the web page that's not displayed on the page itself
o It's enclosed by <head> and </head> tags
o The content inside the head tag is displayed in the browser tab
The body section contains the main content of the web page, such as text, images, videos, hyperlinks,
tables etc.
o It's enclosed by <body> and </body> tags
o The content inside the body tag is displayed in the browser window
Page Title
The <title> element is used to set the page title that displays in the browser tab
It is placed inside the <head> section of the HTML document
External Stylesheets
External stylesheets are linked in the <head> section using the <link> element
The rel the attribute is set to "stylesheet", and the href the attribute contains the relative file path to
the CSS file
Stylesheets are loaded in the order they are listed, so hierarchy is important
Metatags
The target attribute of the <base> the element can set a default target window for all links on a
page
For example, <base target="_blank"> will open all links in a new window or tab
e.g.
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<title>My Web Page</title>
<link rel="stylesheet" href="styles.css">
<meta name="description" content="This is my web page">
<meta name="author" content="Your Name">
<base target="_blank">
</head>
<body>
<h1>Welcome to My Web Page!</h1>
<p>This is a sample paragraph.</p>
</body>
</html>
Worked example
You are a student creating a website for your IGCSE ICT revision work. You have produced some HTML,
but have not yet added the logo or merged the cells. You are aiming to produce the following page.
Fig. 1
<table>
<tr>
<td><h1>IGCSE ICT</h1></td>
</tr>
<tr>
<td><h3>Theory</h3></td>
<td><h3>Practical 1</h3></td>
<td><h3>Practical 2</h3></td>
</tr>
<tr>
<td><h3>2 hour<br>Theory exam</h3></td>
<td><h3>2.5 hour<br>Practical exam</h3></td>
<td><h3>2.5 hour<br>Practical exam</h3></td>
</tr>
</table>
a. Write the HTML that would display the image called “Logo.jpg” as shown in Fig. 1. If the browser cannot
find the image, then the text “Tawara School Logo” will be displayed.
[5]
or
b. The third line of HTML currently shown in the code does not produce the title as shown in Fig. 1. Write the
HTML that would produce the title as shown in Fig. 1.
[2]
Tables in Webpages
In the early days of web development, tables were often used to create complex page layouts
They provide a way to arrange data into rows and columns
By utilising cell padding, cell spacing, and borders, developers could manipulate the appearance of
the page
Today, tables are primarily used for displaying tabular data - information that is logically displayed in
grid format
For example, financial data, timetables, comparison charts and statistical data are often presented in
tables
Tables make it easy for users to scan, analyse and comprehend the data
Tables also enhance accessibility. Screen readers for visually impaired users can read tables
effectively if they are correctly structured
Semantic HTML elements like <table>, <tr>, <th>, and <td> help in conveying the structure
and purpose of the data to these assistive technologies
Inserting a Table
Table Attributes
Set table and cell sizes with the width and height attributes, using pixel or percentage values
Apply styles to tables with inline CSS or by linking an external stylesheet
Inserting Objects
Insert text with elements like <p> for paragraphs and <h1> to <h6> for headings
Insert images with the <img> element, using the src attribute to specify the image source
Use the alt attribute to provide alternate text for images
Adjust image or video size with the width and height attributes
Insert sound clips and videos with the <audio> and <video> elements, adding controls for
playback controls, and autoplay to start automatically
<body>
<h1>Welcome to My Web Page!</h1>
<p>This is a sample paragraph.</p>
<table style="width:100%">
<tr>
<th>Header 1</th>
<th>Header 2</th>
</tr>
<tr>
Styling
Using the <div> Tag
The <div> a tag is a container unit which encapsulates other page elements and divides the HTML
document into sections
<div> elements are block level elements and are often used to group elements to format them with
styles
Use the <h1> to <h6> tags for headings, with <h1> being the largest and <h6> the smallest
Use the <p> tag for paragraphs
Use the <li> tag for list items within <ul> (unordered/bullet list) or <ol> (ordered/numbered list)
The <ul> tag creates an unordered list, and <ol> creates an ordered list
Styles can be applied directly to these lists using the style attribute or by using a class
<html>
<head>
<style>
.blue-text {
color: blue;
}
.large-font {
font-size: 20px;
}
</style>
</head>
<body>
Creating Hyperlinks
A hyperlink, often just called a 'link', is a reference to data that a reader can directly follow by
clicking or tapping
It is one of the core elements of the World Wide Web, as it enables navigation from one web page or
section to another
Hyperlinks are created using the <a> (anchor) tag in HTML
They can link to different sections of the same page, other locally stored web pages, or external
websites
o Text Hyperlinks: Usually, a portion of text that is highlighted in some way, like being
underlined or a different colour
o Image Hyperlinks: An image that you can click on to take you to another page or another
part of the same page
o Button Hyperlinks: A clickable button that redirects the user to another page or section
Hyperlinks utilise the 'href' attribute within the <a> tag in HTML
The 'href' attribute contains the URL of the page to which the link leads
The text between the opening <a> and closing </a> tags are the part that will appear as a link on
the page
Hyperlink Types
<html>
<body>
<div id="section1">
<h1>This is Section 1</h1>
<a href="#section2">Go to Section 2</a><br>
<a href="contact.html">Contact Us</a><br>
<a href="https://www.google.com" target="_blank">Google</a><br>
<a href="mailto:[email protected]">Email Us</a>
</div>
<div id="section2">
<h1>This is Section 2</h1>
<a href="#section1">Go back to Section 1</a>
</div>
</body>
</html>
A relative file path specifies the location of a file or directory about the current location, or the
location of the file that references it
For instance, if an HTML file and an image are in the same directory, you can reference the image in
the HTML file using just its name (e.g., image.jpg)
An absolute file path specifies the exact location of a file or directory, regardless of the current
location
It includes the entire path from the root directory to the file or directory in question
For instance, an absolute file path on a Windows system might look like C:\Users\Username\
Documents\image.jpg
Using absolute file paths for local web pages or objects can lead to broken links when the website is
moved to a different directory or server
The web page or object might not exist at the specified location on the server or the user's computer
Cedric Chong IGCSE ICT 188 | P a g e
If a website is moved or backed up, absolute links will still point to the original location, not the new
or backup location
Inline Styles
External CSS is written in a separate file with a .css extension, and linked to the HTML document. This
allows for the same styles to be reused across multiple pages. E.g.
<head>
<link rel="stylesheet" href="styles.css">
</head>
Inline CSS is written directly within the HTML tags using the style attribute. This applies the style only to
that specific element. E.g.
Background Properties
Background Colour: Set the background colour using the background-color property.
o e.g. background-color: blue;
Background Images: Set a background image using the background-image property.
o e.g. background-image: url('');
Font Properties
Control the appearance of text with font properties. This includes font-size, font-family, color, text-
align, and more. E.g.
p{
font-size: 14px;
font-family: Arial;
color: blue;
text-align: center;
}
Tables
CSS is used to style HTML tables, allowing us to define the appearance of the table, table rows, table
headers, and table data cells.
table {
width: 100%;
height: 200px;
background-color: yellow;
border: 2px solid black;
border-collapse: collapse;
border-spacing: 5px;
}
Size: Control the width and height of rows, headers, and data cells just like with tables.
o e.g. width: 50px; height: 50px;
Background Colour: Use background-color to set the background of rows, headers, and data
cells
Horizontal and Vertical Alignment: Control alignment with text-align (horizontal) and vertical-
align (vertical).
o e.g. text-align: center; vertical-align: middle;
Padding: Define the space between cell content and its border with padding
Borders: Apply a border using the border property
th, td {
width: 50px;
height: 50px;
background-color: white;
text-align: center;
vertical-align: middle;
padding: 10px;
border: 1px solid black;
}
Exam Tip
Be aware that inline CSS has the highest priority. If both external and inline styles are applied, the
inline style will override the external
Keep in mind that CSS properties are case-sensitive. Always use lower case
Classes
Classes in CSS are used to style multiple HTML elements at once
To define a class, use a period (.) followed by the class name. To apply a class to an HTML element,
use the class attribute
Cedric Chong IGCSE ICT 190 | P a g e
Background Colour: Use the background-color property. E.g.
.red-background {
background-color: red;
}
.image-background {
background-image: url('');
}
Font Properties: Control the font size, family, colour, and alignment. E.g.
.big-blue-text {
font-size: 20px;
font-family: Arial;
color: blue;
text-align: center;
}
Size: Control the width and height with width and height. E.g.
.small-cell {
width: 30px;
height: 30px;
}
.yellow-cell {
background-color: yellow;
}
Horizontal and Vertical Alignment: Use text-align (horizontal) and vertical-align (vertical).
E.g.
.center-align {
text-align: center;
vertical-align: middle;
}
Spacing, Padding, Borders: Use padding for space inside the cell, and border for cell borders.
E.g.
.padded-cell {
padding: 10px;
border: 2px solid black;
}
Collapsed Borders: Use border-collapse: collapse; the table class to remove spaces between
cell borders. E.g.
<table class="collapsed-table">
<tr class="small-cell yellow-cell center-align">
<td class="padded-cell">Content</td>
</tr>
</table>
Exam Tip
External CSS
External Styles are CSS styles that are defined in a separate .css file and linked to the HTML
document. This allows for reusing the same styles across different web pages
To create external styles for HTML elements like h1, h2, h3, p, and li, simply specify the element
and define the styles within curl('')
External and internal styles (in the head section)
Browser default
A Style is a set of CSS properties that define the appearance of an HTML element
A Class is a way of selecting multiple elements to apply the same style
The difference between them lies in their application: a style is used to define the CSS properties,
while a class is used to apply these properties to multiple elements
Relative file paths are used for linked stylesheets because they refer to the location of the CSS file
relative to the current HTML file. This makes the code more portable and easier to manage
E.g. if the CSS file is in the same folder as the HTML file, the path would be "styles.css". If the
CSS file is in a subfolder named css, the path would be "css/styles.css"
Worked example
h1 {color: #ff0000;
font-family: Times, serif;
font-size: 30pt;
text-align: center;}
h2 {color: #0000ff;
[3]
b. add a markup to the table style to set a 3-pixel wide, dashed external border.
[4]
border-style: [1]
dashed;[1]
border-width:[1]
3px[1]
[1]
h3 {color: #000000;
#000000; [1]
[2]
h2 { font-weight: bold;
font-weight:[1]
bold;[1]
Exam Tip
You are being asked to write code in a specific language so you must be exact:
Cedric Chong IGCSE ICT 193 | P a g e
o Don't forget quotes around items like Comic sans
o Check spellings including color not colour
o Make sure you include delimiters where necessary
o Make sure you include ;
o Don't forget to write font-weight rather than font-type