0% found this document useful (0 votes)
20 views65 pages

IGCSE - ICT (0417)

This document provides summarized notes on the CAIE IGCSE ICT syllabus, covering key concepts such as application software, system software, hardware components, and types of computers. It details the functions of internal memory, input/output devices, and operating systems, as well as the impact of emerging technologies like artificial intelligence. The notes are intended for personal use by a student named Arya and are updated for the 2023-2025 syllabus.

Uploaded by

Arya Binu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views65 pages

IGCSE - ICT (0417)

This document provides summarized notes on the CAIE IGCSE ICT syllabus, covering key concepts such as application software, system software, hardware components, and types of computers. It details the functions of internal memory, input/output devices, and operating systems, as well as the impact of emerging technologies like artificial intelligence. The notes are intended for personal use by a student named Arya and are updated for the 2023-2025 syllabus.

Uploaded by

Arya Binu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

ZNOTES.

ORG

UPDATED TO 2023-2025 SYLLABUS

CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Arya for personal use only.
CAIE IGCSE ICT

<b>Application software:</b>
1. Types and Components of Provides services that allow the user to do specific
tasks.
Computer Systems It can be general-purpose software or custom-made
software. (Specialist software)
E.g., Spreadsheets, databases, and word processors.
1.1. Hardware & Software <b>System Software:</b>
The software is designed to provide a platform all
<b>Hardware</b> other software to run on. For example:
1. Compilers: The software translates the High-
the electronic, physical components that make up a level language into Machine code (Language
typical computer system. These may include input and Processor).
output devices as well. 2. Linkers: A Software that creates the links
<b>Internal Hardware Devices:</b> between Language processors into workable
Central processing unit solutions (Data definition language).
Processor 3. Device drivers: A software that enables the
Motherboard device to work with another, externally
Internal memory consisting of RAM & ROM connected device.
Graphics & Sound Cards 4. Utilities: A system software that provides the
Internal Storage devices like Hard disk drives (HDD) necessary facilities (Antivirus, Scan Disk, Disk
and solid-state drives (SSD) Defragmentation, etc.)
Network interface card (NIC) 5. Operating systems: To enable computer
<b>External Hardware Devices:</b> systems to function and allow users to
Monitor communicate with computer systems, special
Keyboard software, known as operating systems (OS),
Mouse have been developed.
Printer
External Storage Devices <b>Analogue and Digital Data</b>
<b>Software</b> Computers can only understand data in the form of binary
digits (0,1); this is commonly known as digital data. However,
The techniques, methods, commands, and instructions data in the real world is analogue, not limited to two specific
tell the device what to do and how to do it. values.
They are the programs which control the computer
system and process data.
Relates to ideas & instructions for using physical objects.

<b>Two types of software:</b>

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

The figures show how data changes in analogue and 1. RAM is a temporary memory device, whereas ROM is
digital forms; analogue data forms smooth curves, a permanent one.
whereas digital data changes in discrete steps. 2. RAM is volatile, ROM is non-volatile.
So, for a computer to process real-world data, it first 3. RAM can be written to and from, but ROM can only
needs to convert the received data into digital form. This be read from.
is done by hardware known as ADC (analogue to digital 4. RAM is used to store data, files, programs, and parts
converter), and its output is given back in analogue form of OS that are currently in use. However, ROM is used
using DAC (digital to analogue converter). in storing start-up data,

1.2. The Main Components of Computer <b>Input & Output Devices</b>


Systems | Input devices | Output devices | | -----------------------------------
------------------------------------------------------------------------- | -----------
<b>Central Processing Unit (CPU)</b> ----------------------------------------------------------------------------------------
----- | | An input device is any hardware that enables data
The component of the computer that understands and entry. | An output shows the result or solution of the input
executes hardware and software operations. Nowadays, <i>after</i> it has been processed. | | An input device can
it’s also known as a microprocessor. It is a single only send data. | An output device can only receive data. | |
integrated circuit at the core of most PCs and is also Input devices are necessary for a computer to receive
present in many household gadgets and equipment commands from the user for processing to be permitted. |
where some control or monitoring is required. Output devices are needed in order to display the outcome
It consists of a control unit (CU) that manages the input of the processing that took place to the user. | | Input
and output devices, an arithmetic and logic unit (ALU) devices are complex as they must ensure proper
that performs computations and makes logical communication between the computer and the user. |
judgments, and tiny memory regions known as registers. Output devices are simpler as they only need to display the
It processes the input and produces the outcome of the finale. |
processing in the form of output.
Input devices are pieces of hardware that allow users to
<b>Internal Memory</b> enter data into computers.
An output device displays the computer's output in a
1. Random access memory (RAM): temporary memory human-readable format. For example, words on a printer
storage, lost after power is shut down, performs read or moving graphics on a monitor.
and write functions, is used to store data that are
currently in use, and can be increased in size to <b>Backing and Secondary Storage</b>
improve operational speed.
2. Read-only memory (ROM): permanent memory Required to store significant amounts of data
storage, non-volatile, can only be read from, used to permanently.
store computer’s configuration data, such as BIOS. Most commonly in the form of Hard disk drives and
Solid-state drives.
<i>N.B: The BIOS (basic input/output system) stores the
date, time and system configuration on a non-volatile chip <b>Differentiating between internal memory and backing
called a CMOS (complementary metal oxide semiconductor) storage:</b>
– this is usually battery powered.</i>
Differentiating between Internal memories:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

1. RAM contents are lost when power is lost, ROM is


read-only, and backing storage is permanent even 1.4. Types of Computers
without power.
2. RAM and ROM are much smaller than backing Desktop Computers
storage.
Desktop usually refers to a general-purpose computer
3. RAM and ROM are significantly faster in accessing
data than backing storage. that is made up of a separate monitor, keyboard, mouse,
4. Backing storage is much cheaper than internal and processor unit. It is distinguished from, for example,
memory. a laptop computer by the fact that it is made up of
5. Internal memories are fixed, and backing storage can several separate components, which makes it not very
portable.
be fixed or portable.
6. Internal memories can be directly read by the CPU, Uses:
while backing storage needs to be moved into the 1. office and business work
RAM before being read by the CPU. 2. educational use
3. general entertainment
4. gaming device
1.3. Operating Systems Advantages:
1. They are easier and less costly to upgrade and
Controls operation of input, output & backing storage expand.
Supervises loading, running & storage of application 2. Spare parts are standardized, which makes them
programs. cheaper.
Deals with errors in application programs. 3. They tend to have better specifications for a given
Maintains security of the whole computer system price.
Maintains a computer log. 4. No critical power consumption because they plug
into a wall socket.
Operating systems offer various types of user interfaces, for
example: 5. Due to fixed positions, they are less likely to be
damaged or stolen.
6. As they usually have wired connections, they have
more stable internet access.
Disadvantages:
1. They are not particularly portable because they
are made up of separate components.
2. More complicated because all the components
need to be hooked up by wiring, which also
clutters up the desk space.
3. Because they aren’t portable, files must be copied
to another portable storage device to take work
elsewhere.

Mobile Computers
1. Laptop computer:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

(Or notebook) refers to a type of computer where the Allow normal phone calls to be made, but also have an
monitor, keyboard, pointing device and processor are all operating system (such as iOS, Android, or Windows),
together in one unit. This makes them extremely allowing them to run a number of computer applications
portable. lightweight (to aid portability). Low power (known as apps or applets). Smartphones communicate
consumption (and also long battery life). Low heat output with the internet either by using Wi-Fi hot spots or by
(cooling is very important). using 3G/4G/5G mobile phone networks.
Uses: Uses:
1. office and business work 1. They allow users to send/receive emails.
2. educational use 2. They allow users to use a number of apps.
3. used as a gaming device. 3. They allow users to use a camera feature (to take
4. general entertainment photos or videos).
Advantages: 4. They allow users to use an MP3/4 player (for
1. Portability: all components are in a single unit, so music and videos).
they can be taken anywhere. Advantages:
2. Because of one single unit, there are no trailing 1. very small in size and lightweight, makes them
wires and desk clutter. portable.
3. take up much less room on a desk, so they can be 2. connecting to the internet while on the move.
easily used in public spaces. 3. because they use Wi-Fi and mobile phone
4. portability allows them to take full advantage of networks, they can be used almost anywhere.
Wi-Fi features. 4. they have apps which can tell instant location,
Disadvantages: which is a feature that isn’t available in either
1. portability makes it easier for them to be stolen. desktops or laptops.
2. limited battery life means the user needs to carry 5. they have reasonable battery life.
a charger at all times. Disadvantages:
3. keyboards and pointing devices may be awkward 1. small screens and keyboards make pages difficult
to use. to read.
4. not easy to upgrade, like adding more RAM. 2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
2. Smartphones: the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops.
7. The data transfer rate using mobile phone
networks can be slower than with Wi-Fi.

3. Tablets:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

They work similarly to a smartphone. The only main


difference is that they are somewhat bigger in size as
compared to a smartphone.
Uses:
1. They allow users to send/receive emails.
2. They allow users to use a number of apps.
3. They allow users to use a camera feature (to take
photos or videos).
4. They allow users to use an MP3/4 player (for
music and videos).
Advantages of tablets compared to laptops:
1. very fast to switch on (no time delay waiting for
the operating system to load up). Uses:
2. fully portable – they are so lightweight that they Entertainment (streaming of music, videos, and
can be carried anywhere. television programs).
3. touch screen technology means they are simple Gaming (including group games).
to use and don’t need any other input devices. As a camera or video camera.
4. not much heat, they use solid-state technology. Internet use (online sales, social networks, using QR
5. The battery life of a tablet is a lot longer. codes, and so on).
6. when the power button is pressed, it goes into Sending/receiving emails.
standby but remains connected to the internet so Global positioning system (use of maps to navigate to
the user still hears alerts when emails or other a location).
‘events’ are received. Calendar functions.
Disadvantages of tablets compared to laptops: Telephone banking (sending and receiving money
1. tend to be rather expensive when compared to using banking apps).
laptops. Voice over Internet Protocol: telephone network
2. they often have limited memory/storage when using the internet, which also allows video calling.
compared to a laptop. Instant access to social networks (social contact with
3. typing on a touch screen can be slow and error- friends no matter where you are in the world).
prone compared to a standard keyboard. Instant messaging.
4. laptops tend to support more file formats than Office and business management (allows rapid voice
tablets. and video communication).
Education use (using interactive software to teach or
4. Phablets: learn from).
Remotely control devices.
Some of the latest smartphones have been designed as a
hybrid between a tablet and a smartphone, referred to Laptops are the most expandable of these devices, while
as a phablet. They have much larger screens than a smartphones are the most portable. Tablets and
smartphone but are smaller than a tablet. phablets fall somewhere in between, offering a balance
of portability and expandability. The choice of device
will depend on your specific needs and use case.

1.5. Impact of Emerging Technologies

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Artificial Intelligence (AI): There are many definitions of Unemployment, robots are capable of doing tedious
artificial intelligence (AI). Essentially, AI is a machine or human tasks with much more efficiency and excellence
application which carries out a task that requires some than humans.
degree of intelligence. Dependency on technology could lead to problems in the
The use of language future.
recognizing a person’s face, the ability to operate De-skilling: Tasks that used to be considered a talent are
machinery, such as a car, aeroplane, train, and so on, now part of general, tedious processes that are done on
and analyzing data to predict the outcome of a future a regular basis by machines.
event, such as weather forecasting. Impact: Extended Reality refers to combined real and virtual
Whenever AI is mentioned, people usually think of environments. The two most common examples at the
science fiction fantasies and think of robots. The moment are:
science fiction writer Isaac Asimov even went as far Augmented reality (AR) is a merger between the
as producing his three laws of robotics: » Robots may virtual and physical (real) world; it lays objects onto
not injure a human through action or inaction. » pre-existing objects. e.g., Pokémon GO! Impact: safety
Robots must obey orders given by humans without and rescue operations’ training, shopping and retail
question. » A robot must protect itself unless it (getting a better look at a car before the purchase),
conflicts with the two laws above. Everyday uses: healthcare (better understanding of a patient’s body)
An autonomous (driverless) vehicle – we already have Virtual reality (VR) enables an entirely new world to
driverless trains and autopilots on aeroplanes, but be created, unlike AR, which has no link to the actual
future developments include driverless cars. surroundings of the user. It requires the user to be
Robotic research is leading to improvements in specially equipped with a VR headset, joystick, and
technology to help amputees and people with headphones.
disabilities. Impact: Military applications, educational
Robots are used to help people carry out dangerous purposes (looking at ancient buildings),
or unpleasant tasks – for example, bomb disposal. healthcare, media (interactive special effects in a
movie), scientific visualization (part of molecular
Negative impacts of AI structures/cells).

2. Input & Output Devices


2.1. Input Devices and Their Uses
An input device is any hardware device that allows a user
to enter data or instructions into a computer directly.
An input device can send data to another device, but it
cannot receive data from another device.
Input devices are necessary for a computer to receive
commands from its users and data to process; they are
under the user's control or can be direct data entry.

Input devices can be complicated because they must ensure


the user can interact with the computer correctly.

1. Keyboards:
Uses:

Input of data into applications software


Typing in commands to the computer

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Advantages:
Sometimes, they have small keys, which can make input
Fast entry of new text into a document. more difficult.
Well-known method. Sometimes, the order of the numbers on the keypad is
Easy to use for most people. not intuitive.
Easier to do verification checks as data is entered (can
immediately compare the source document with typed
data on the screen).

Disadvantages:

It can be difficult to use if the user has limited arm/wrist


use.
Slow method when compared to direct data entry. 3. Mouse:
It is a fairly large device that uses up valuable desk space.
Uses:
Opening, closing and minimizing software
Grouping, moving and deleting files.
Image editing, for example, controls the size and position
of a drawing pasted into a document.
Controlling the position of a pointer on the screen to
allow selection.

Advantages:
2. Numeric keypads:
It is a faster method for choosing an option than a
Uses: keyboard.
It's a very quick way of navigating through applications
Automatic teller machines (ATMs), where the customer and the internet.
can key in their PIN, amount of money, etc. Does not need a large desk area when compared to a
Mobile phones allow phone numbers, etc., to be keyed keyboard.
in.
Point of sale terminals (POS) in case the barcode reader Disadvantages:
fails to read the barcode – the number has to be keyed in It can be more difficult for people with restricted
manually by the operator. hand/wrist movement than using a keyboard for data
Chip and PIN devices when paying by credit/debit cards. entry.
Fast entry of numeric data into a spreadsheet. Easy to damage, the older type of mouse quickly
Advantages: becomes clogged up with dirt.
Difficult to use if no flat surface is readily available.
Faster than standard keyboards when entering numeric
data.
Because many are small devices, they are very easy to
carry around.
Disadvantages:

4. Touchpad:
Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Opening, closing and minimizing software Does not need the same fine control as a mouse.
Grouping, moving and deleting files. It is easier to use than a mouse if the operator has
Image editing, for example, controls the size and position problems with their wrist.
of a drawing pasted into a document. More accurately position the pointer on the screen.
Controlling the position of a pointer on the screen to They are more robust than a mouse.
allow selection. Needs less desk space than a mouse or keyboard.
Advantages: Disadvantages:

Faster than a keyboard for choosing options. It is not supplied with the computer as a standard;
Used to navigate applications and the internet. therefore, it is more costly.
Because the touchpad is integrated into the laptop Users may need training because it is not standard
computer, there is no need for a separate mouse; this equipment.
aids the portability and is a big advantage if no flat
surfaces are available.

Disadvantages:

People with limited hand/wrist movement find the device


difficult to use.
It can be more difficult to control the pointer when
compared to a normal mouse.
Drag and drop operations are more complicated using a
touchpad.

6. Remote Control:
Uses:

Televisions, satellite systems, DVD/Blu-ray players and


Hi-Fi systems, to alter controls such as volume, on/off,
etc.
Used to control multimedia systems.
Used in industrial applications to remotely control
5. Tracker ball: processes.

Advantages:
Uses:
It can be operated from any reasonable distance.
A good alternative to a mouse for people with conditions In some conditions, e.g., in chemically hazardous
such as RSI. environments, we can control and measure from safe
Used in an industrial control room environment. distances.
Used in some luxury cars to select functions such as
radio. Disadvantages:
Advantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Advantages:
Difficult to use for people with limited hand/wrist
movements. It's a more realistic experience than both mouse and
Physical obstacles can easily block the signal. joystick.
Easier than a keyboard or joystick to control steering
movements.

Disadvantages:
It is a rather expensive input device as compared to a
mouse or joystick.
Steering movements tend to be over-sensitive, which
gives an unrealistic feel.
Unless it is an expensive simulator, feedback to the
steering wheel is non-existent.

7. Joysticks:
Uses:

Used in video games.


Used in simulators to mimic the actual controls.

Advantages:
9. Touch screen (as an input device):
It is easier than keyboards for screen navigation.
In some applications, the control is more realistic than Uses:
using a mouse.
Automatic teller machines (ATMs) to choose from on-
Disadvantages: screen options.
Point of sale terminals such as in restaurants.
The on-screen pointer is more difficult to use. Interactive whiteboards in education.
Computer-based training (CBT) where answers are
selected during on-screen testing.

Advantages:
Faster entry of options than using a keyboard or mouse.
Very easy method for choosing options.
User-friendly method – no training necessary in its use.
Option to expand the size of the display if necessary.

Disadvantages:

8. Driving wheel:
Uses:
Used in video games, especially car racing games.
Used in simulators to mimic actual vehicle controls.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

A limited number of input options are available. Limited quality, depending on how good the scanner’s
This can lead to problems if an operator uses the system resolution is.
frequently (straining of arm muscles, RSI, etc., are all Fairly slow input method, especially if color mode is
possible). selected.
The screen can get very dirty with constant touching.

11. Digital Cameras:


Uses:
Taking photographs is still better than using
10. Scanners: smartphones and tablets.
Data-capture device, e.g., as a reversing aid in cars.
Uses: Dentistry, to help capture pictures for better diagnosis.
Scanning documents and converting them into different The creation of virtual reality tours around houses,
formats buildings, etc.
Scanning in old documents to protect them in case the Advantages:
original is lost/damaged.
Scanning in photographs for storage Easier to produce better-quality photographs than with a
Scanning in barcodes at POS terminals. traditional camera.
Uploading photographs to a computer is faster than
Advantages: scanning hard copies.
Images can be stored for editing at a later date. Memory cards can store many thousands of
When used with OCR, they are much faster and more photographs.
accurate than typing the documents in. There is no need to develop film and printouts; it saves
It is possible to recover damaged documents by scanning money and is more environmentally friendly.
and producing an acceptable copy. Unwanted images can quickly be deleted from a memory
card.
Disadvantages:
Disadvantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Need to be computer literate to know proper use. Temperature sensors are used in automatic washing
Loss of artistry due to clever software doing all the work. machines, central heating systems, ovens, and
Images need to be compressed to reduce the amount of glasshouses.
memory used. Pressure sensors are used in intruder alarm systems and
washing machines.
Light sensors are used in automatic glasshouses, doors,
and street lighting control.
Sound/acoustic sensors are used in intruder alarm
systems, monitoring liquid and powder flow in pipes.
Humidity/moisture sensors are used in automatic
glasshouses, environmental monitoring, and in factories
where moisture levels are crucial.
pH sensors are used in automatic glasshouses, chemical
processes and environmental monitoring.

12. Microphones: Advantages:

Readings are more accurate as compared to human


Uses: operators.
To input speech to be used in various applications. Readers are continuous, with no breaks in the
Input in voice recognition software for authentication. monitoring.
As a sensor to pick up sound in an intruder alarm Because it is a continuous process, any action or
system. warnings needed will be initiated immediately.
Used in audio conferencing or VoIP applications. Automatic systems don’t need human intervention.

Advantages: Disadvantages:

It is faster to read text than it is to type it in. Faulty sensors can give spurious results.
It is possible to manipulate sound in real time rather Most sensors are analogue; therefore, they require
than working on a completed recording. conversion using Analogue to Digital Convertors.
It improves security if used as an authentication system.
14. Light pens:
Disadvantages:
Uses:
Sound files use up a lot of computer memory.
Reading data is more error-prone than typing in. Selecting objects on CRT screens
Drawing on screens
Advantages:

Greater accuracy than touch screens


Small makes them portable and capable of being used in
small spaces.
Easy-to-use technology.
Disadvantages:

13. Sensors:
Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Lagging problems while drawing on the screen. It is more secure than contactless cards as the PIN acts
It only works with CRT monitors. as a second security layer.
Rather outdated technology. More robust system than Magnetic Stripe Cards

Disadvantages:

Be very careful so the PIN isn’t seen by anyone while


being typed in.

2.2. Direct Data Entry & Associated


Devices
1. Magnetic Stripe Readers:
Uses:

On credit/debit card for use at ATMs 3. Radio Frequency Identification (RFID) reader:
Security device to allow entry to buildings, hotels, etc.
Uses:
Advantages:
Livestock tracking
Faster than keying in data manually. Retail, instead of barcodes, as they don’t need to be
Error-free, no human intervention needed. scanned in.
Secure information isn’t in human-readable form. Admission passes.
Robust, there are no moving parts. Library books, to acknowledge the books which have
been borrowed.
Disadvantages:
Advantages:
If the card is damaged, the data is lost.
Doesn’t work at a distance. No line-of-sight contact is needed.
As the information isn’t human-readable, this can be a Very robust and reliable technology.
disadvantage in some cases. Very fast read rate.
Bidirectional data transfer.
Bulk detection is possible.
Disadvantages:

Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal.
RFID is more expensive than a comparable barcode
system.
2. Chip and PIN reader:
4. Optical Mark Reader/Recognition (OMR):
Uses:
Uses:
Where payments are made using cards

Advantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Used in MCQs checking. System has difficulty in reading different handwritings.


Used in reading voting papers. Still not a very accurate technique.

Advantages:

Very fast way of inputting survey results.


It is more accurate because there is no human
intervention.
More accurate than OCR methods.

Disadvantages:

Designing the forms can be complicated to ensure the


marks are correctly positioned. 6. Barcode readers:
If there are problems, they need to be manually checked,
which can be time-consuming. Uses:

Used in supermarkets for stock control.


In libraries, to keep track of books.
As a safety function to ensure checking of electrical
equipment on a daily basis.

Advantages:

Much faster than manually keying in data.


Allow automatic stock control.
They are a tried and trusted technology.
5. Optical Character Recognition/Reader (OCR):
Disadvantages:
Uses:
Relatively expensive system to administer.
Processing passports and identity cards. Not fool-proof, barcodes can be swapped between
Converting hard copy documents into electronic form. items.
Used in automatic number plate recognition (ANPR) Can be more easily damaged than RFID tags or magnetic
systems. stripes.
Digitizing historic hard copies for archiving.

Advantages:
It is a much faster data entry system than manual typing.
No human intervention, its error free.

Disadvantages:

7. Quick response (QR) code scanner:


Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

used in advertising to contain information about the They are very heavy and bulky.
advertising company. They run very hot and can cause fires if left unattended.
Wi-Fi authentication They use a lot more power than LCDs.
Used in restaurants, you can see the menu by scanning. Their flickering can lead to headaches.
Image burn-in is a common issue.
Advantages:

hold much more information than normal barcode.


fewer errors than with barcodes.
QR codes are easier to read because the cameras can
even read them on a smartphone.
It is possible to encrypt QR codes.

Disadvantages:
More than one QR format is available.
QR codes can be used to transmit malicious data.

2. Liquid Crystal Display (LCD) screens:


Uses:

Main output device for modern computers.


Mobile phones, laptops, video games use LCD screens.

Advantages:
Very efficient, low power consumption.
Lightweight devices.
Screens can be made in various sizes.
No flickering images.
Very sharp image resolution.
2.3. Output Devices and Their Uses
Disadvantages:
1. Cathode ray tube (CRT) monitors:
Uses:

Their large screens allow complex diagrams to be


created in Computer-aided design.
Used with light pens to allow designs to be created.

Advantages:

Can be seen at a wider range of angles, unlike LCDs.


Allow the use of light pens.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Colour and contrast from different angles are They tend to get dirty with frequent use.
inconsistent. Frequent use results in straining of arm muscles, RSI, etc.
Motion blur is a common issue. If large amounts of data are input/output, they aren’t
Lower contrast than CRT monitors. very accurate, and the interface isn’t very fast.

3. Touch screen (as an output devices): 4. Multimedia projectors:


Uses: Uses:
ATMs Training presentations to allow the whole audience to
POS terminals see images.
Information kiosks. Advertising presentations.
Home cinema systems.
Advantages:
Advantages:
Don’t need additional input devices.
They are very interactive, and many functions, such as More people can watch as they don’t have to crowd
swiping, can be done. around a laptop.
They add a high-tech feel to devices and interfaces. Avoids the need for several networked computers.

Disadvantages: Disadvantages:
Images can be fuzzy.
Expensive to buy.
Set-up can be complicated.

5. Laser printers:
Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

In uses where low noise is required. Slow output if many copies are needed.
If fast, high quality, high-volume printing is required. Can’t do large print jobs.
Printing can smudge if user isn’t careful.
Advantages: Can be expensive if used a lot.
Printing is fast.
They can handle very large print jobs.
Quality is consistently high.
Toner cartridges last for a long time.

Disadvantages:

They are only considerably fast if several copies are


being made.
Color laser printers are expensive to run.
They produce ozone and volatile organic compounds
because of their printing method and toner.
7. Dot matrix printers:
Uses:
Used in environments where noise isn’t a major issue.
Carbon copies or multi-part outputs can be produced.
Widely used in till receipts.

Advantages:
Can be used in varying environments unlike laser/inkjet
printers.
Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
6. Inkjet printers: Good for continuous printing.

Uses: Disadvantages:

Where low-output volumes are required.


Where high-quality printing is required for single pages.

Advantages:

High-quality output
Cheaper than laser printers.
Very lightweight
Don’t produce ozone and volatile organic compounds.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Uses:
Very noisy
Initial cost is more than an inkjet printer. Custom-made prosthetic limbs.
Very slow, poor-quality printing. In aerospace, if parts of the aircraft are made using 3d
printers they can be very lightweight.
Making spare parts for items that aren’t now
manufactured, e.g., parts of a vintage car.
Advantages:

Manufacturing objects has become much easier.


Even though the initial cost is high, it is still cheaper than
the more conventional way.
Parts for machinery that aren’t available can be made.
Disadvantages:

Potential to make counterfeit items.


Could lead to manufacture of dangerous items by almost
8. (Graph) Plotters: anyone.
Job loss potential.
Uses:

Producing architectural drawings


Producing engineering drawings
Drawing animation characters.

Advantages:

Very high-quality output.


can produce large, monochrome and color drawings very
accurately.
Can print on a variety on materials.

Disadvantages:

Very slow printing. 10. Speaker:


Expensive equipment to purchase initially.
Have a very large physical footprint compared to a Uses:
printer.
Used in all phones and most computers.
Helps visually impaired people.
Plays downloaded sound files.

Advantages:

Amplified sounds can be much louder than the original


sound.
Amplified sounds can be enough to be heard by a huge
crowd.
Very simple technology.
They are especially useful for blind people, for instance,
9. 3D printers: reading e-books.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Speaker output can disturb irrelevant people in the same Holds data magnetically.
area, e.g., an office. The surface area of the media is magnetised so that it
Sound quality is high only expensive speakers. can hold bits of data.
They take up a lot of desk space. The device that reads media can also read the bits held
on the surface area

Magnetic tape drives


Uses:

used in applications where batch processing is used.


used as a backup media where vast amounts of data
need to be stored.
used in long-term archiving of data, they have huge data
storage capacities and are known to be very stable.

Advantages:

They are generally less expensive than hard disk drives.


11. Actuators:
It is a very robust technology.
Uses: They have a huge data storage capacity.
The data transfer rate is fast.
Used to turn on motors, buzzers, and switches.
Allow a computer to control physical devices, Disadvantages:

Advantages: Prolonged data access times (uses serial access).


When updating, another tape is needed to store the final
Allow remote operation of many devices. updated version.
Relatively inexpensive devices. They are affected by magnetic fields, a strong field can
corrupt data stored on the tape.
Disadvantages:
Fixed Hard Disks/Drives
They are an additional device in the system that could go
wrong. Uses:
As analogue devices, signals need to be converted using
a DAC. To store the OS, systems software and working
data/files.
3. Storage Devices and Media Storing applications files.
Used in real-time systems and in online systems.
Used in file servers for computer networks.
3.1. Backing-Up Data Advantages:
Backing up refers to copying files or data into a different They have a very fast data transfer rate and fast access
medium in case of damage or loss of original copy. times to data.
They have a very large memory capacity.
Why do we back up data?
Disadvantages:
To safeguard against loss of data.
To safeguard against damages caused by hackers. It can be fairly easily damaged.
In case files need to be sent elsewhere, to protect the They have many moving parts which affect overall
original format of files. reliability.
Their read/write operation can be quite noisy when
compared to solid-state drives.
3.2. Magnetic Backing Storage Media
Portable Hard Disk Drives
Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Can be used as a backup system to prevent data loss. It can be written over many times.
It can be used to transfer data/files/software between You can use different file formats each time it is used.
computers. It is not as wasteful as the R format because the
files/data can be added later.
Advantages:
Disadvantages:
Data access time and data transfer rate are very fast.
It has a very large memory capacity. It can be relatively expensive media.
It can be used as a method of transferring information Possible to accidentally overwrite data.
between computers.
CD-ROM/DVD-ROM ~ Read Only Memory
Disadvantages:
Uses:
They can be easily damaged if user accidentally drops it
or doesn’t correctly shut down the drive after use. These are read-only memory (ROM), which means they
The data transfer rate is not as fast as for fixed hard disk can’t be written over and can only be read. Permanent
drives. storage method.
CD-ROM is used to store music files and to store
3.3. Optical Media and Optical Storage software, computer games and reference software.
DVD-ROM has much larger storage and is used to store
Devices films.
Used in applications where there is a real need to
Holds data by burning ‘dots’ onto the surface with a high- prevent deletion or overwriting of important data.
powered laser.
The data that reads the media can read the data by Advantages:
shining a lower-powered laser over the dots.
They are less expensive than hard disk drive systems.
CD-R/DVD-R ~ Write Once Only They are very portable as they are small and light.
Data stored on them is read-only, so it cannot be
Uses: accidentally overwritten.

Home recordings of music and (CD-R) and films (DVD-R). Disadvantages:


Used to store data to be kept for later use to be
transferred to another computer. Hold far less data than hard disk drives or memory
sticks.
Advantages: Very slow data transfer rate and data access times, as
compared to hard disk drives.
Cheaper medium than RW disks. You cannot add your files to the disks because they are
Once burned (and finalised), they behave like a ROM. both read-only.
Disadvantages: Blu-Ray Discs
It can only be recorded once; if an error occurs, then the
disk has to be thrown away. The main differences between DVD and Blu-ray are:
Not all CD/DVD players can read CD-R/DVD-R. 1. Blu-ray uses a blue laser rather than a red laser. (The
wavelength of blue light is 405nm, much smaller than
CD-RW/DVD-RW ~ Read and Write the 650nm red laser) This makes pits and lands much
smaller, so they store five times more data than
Uses:
DVDs.
Used to record television programs which can be 2. Blu-ray disks automatically come with a secure
recorded over, time and time again. encryption system, which helps to prevent piracy and
Used in CCTV systems. copyright infringement.
It can be used as a backup device for files and data. 3. The data transfer rate for a DVD is 10 Mbps, and for a
Blu-ray disc, it is 36 Mbps.
Advantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Uses: Uses:
Home video consoles. Transporting files between computers or using them as a
Storing and playing back movies. backing store.
Computers can use this technology for data storage or Used as a security device to prevent software piracy
backing hard drives. (known as a dongle).
Camcorders can use this media to store movies.
Advantages:
Advantages:
Very compact and portable media.
Very large storage capacity. Very robust.
Very fast data transfer rate. Does not need additional software to work on most
The data access speed is also greater than with other computers.
optical media. They are not affected by magnetic fields.
Blu-ray discs automatically come with a secure
encryption system. Disadvantages:

Disadvantages: Cannot protect the data/files by making it ‘read-only’.


Easy to lose (due to the small physical size).
Relatively expensive discs. The user needs to be very careful when removing a
Encryption problems when used to store videos. memory stick from a computer - incorrect removal will
The introduction of HD (high definition) DVD players has corrupt the data on the memory stick and make it
reduced the advantages of using Blu-ray technology. useless.

3.4. Solid State Backing Storage Flash Memory cards

Holds data on devices that don’t have any moving parts. Different types of memory cards:
» SD cards (secure digital card)
Solid-state drives (SSD) » XD cards (extreme digital card)
» CFast card (compact, fast card).
Uses: Uses:

Storage device to store files, applications, OSs, and so on. Storing photos on digital cameras.
Used as mobile phone memory cards.
Advantages: Used in MP3 players to store music files.
Used as a backing store in hand-held computer devices.
They are more reliable as they have no moving parts.
They are considerably lighter and suitable for laptops. Advantages:
They do not have to ‘get up to speed’ before they work
correctly. Very compact.
They have lower power consumption. Because they have no moving parts, they are very
They run much cooler than HDDs. durable.
Because they have no moving parts, they are very thin. They can hold large amounts of data.
SSD data access time is only 0.1 milliseconds compared Compact cameras and smartphones can read and write
to 10 milliseconds for HDD. memory cards, allowing users to transport extensive
Data transfer speed for SSDs is also much faster than for collections of photographs, songs, etc.
HDDs. Disadvantages:
Disadvantages:
SSD endurance - SSDs are conservatively rated at only
20GB write operations per day over three years.
More expensive than magnetic hard disks.
Smaller storage capacity than magnetic hard disks.

Pen drives (Memory sticks)

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Expensive per gigabyte of memory when compared to Each NIC is given a unique hardwired media access
HDDs. control (MAC) address.
Have a lower storage capacity than hard disks. Media access control (MAC) address: a number that
Have a finite life regarding the number of times they can uniquely identifies a device when connected to a
be read from or written to. network.
Memory cards, specifically the micro SD card, are the The first six hex digits identify the manufacturer’s code,
smallest sized devices available, making them more likely and the next 6 identify the device’s serial number.
to be lost, stolen or damaged. The storage should be
sized cause the amount of storage does not prevent the 2. Hubs: they are hardware devices that can have
drive from being stolen several other devices connected to them. They are
Users must often purchase a card reader or USB used to connect devices together to form a local area
converter to view the data. network (LAN). It takes a data packet received by one
of its ports and sends it to all relevant or irrelevant
devices that are connected to it.
4. Networks & the Effects of It is not very secure to broadcast data to all devices.
Using Them Unnecessary network traffic.

3. Switches: intelligent hubs. Used to connect devices


4.1. Networks to form a LAN. Unlike hubs, the switches store the
MAC addresses of all devices on a lookup table. So, it
Routers only sends data to the relevant device.
A device that enables data to be sent between different In summary:
types of networks. It can be connected through cables or
wirelessly to connect a LAN to the internet. Both are used to connect devices in LAN.
Both use data packets.
It can be used for:
Hubs send data to every device on the network.
connecting networks and devices to the internet, Switches send data to a relevant device only.
storing computer addresses, Switches have better security.
routing data packets. Switches use lookup tables to determine the destination
for a data packet.
When a data packet is received, the router checks if the Switches use MAC addresses for relevant device
packet is intended for it or another network. The data packet locations.
is routed to the local switch/hub if it's meant for its network.
If not, the data packet is sent to the relevant router, which 4. Bridges: Devices that connect one LAN to another
sends it to the relevant device. LAN that use the same protocol. Unlike routers, they
can’t communicate with external networks, such as
They consult routing cables to know where to send the the Internet.
data. Comparison:

Common Network Devices


1. Network Interface Cards (NIC): These are needed
to allow a device to connect to a network. Turns
binary data into an electrical signal that allows
network access. Usually integrated into the
motherboard.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Bridges connect LANs together; routers connect various 1. Public Cloud - The customer and the cloud storage
types of networks together. provider are different companies.
Bridges scan MAC addresses while routers scan the IP 2. Private Cloud - The customer and the cloud storage
addresses. provider are a single organization.
Both send out data in the form of data packets. 3. Hybrid Cloud - Combines public and private cloud
Bridges connect networks with the same protocol; options and allows sensitive data to remain private
routers can connect networks with different protocols. while providing public cloud services for less sensitive
The router uses routing tables to direct data packets, but information.
bridges don’t.
Bridges have only two ports; routers have multiple ports. Cloud data is duplicated and stored on other servers to
ensure availability during system failures, upgrades, and
Wi-Fi & Bluetooth maintenance.

Both are used for wireless communication between devices. Advantages:


They both use electromagnetic radiation as the carrier of Services can be scaled up or down according to changing
data transmission. requirements.
Bluetooth uses: Cloud storage eliminates the need for a business to
When transferring data between 2 or more devices that purchase expensive equipment for infrastructure and
are very close together. maintenance.
When the speed of data transmission isn’t crucial. Readily available globally, allowing both remote working
For low-bandwidth applications. and data sharing.
Providers offer high levels of ensuring that services are
Wi-Fi uses: always available.
It can offer an almost unlimited amount of storage.
Full-scale networks. A backup of the data from the cloud will allow full data
When the data transfer rate is crucial. recovery in case of incidents.
For uses where a higher range and better security are Files can be synced across multiple devices.
required. There is no need to carry storage devices around.
Differences and similarities: Disadvantages:
Bluetooth uses a transmission frequency of 2.4 GHz, A stable internet connection is always required.
whereas Wi-Fi uses a 2.4 – 5.0 GHz range. Data storage in clouds may be vulnerable to security
Wi-Fi has a much faster data transfer rate. breaches.
Wi-Fi has a higher geographical range in which it is The user depends on the storage provider for reliability
effective. and availability of services.
Bluetooth only allows up to 7 devices to be connected The services may become expensive as the amount of
simultaneously, whereas the number of devices storage or bandwidth required increases.
connected to a Wi-Fi network depends on the
router/routers used. Common Network Environments
Bluetooth uses key-matching encryption. However, Wi-Fi
uses WPA (Wi-Fi protected access) and WEP (wireless 1. Internet:
equivalent privacy).
The Internet is a very large global network that consists
Cloud Computing of many other interconnected networks
The World Wide Web is a vast collection of web pages
This method is where data is stored on remote servers that can be accessed using a web browser.
accessed online. The World Wide Web allows you to access information
The three types of cloud storage are: by using the internet

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Characteristics:
Private Intranet that also allows access by selected
It is an open network, meaning everyone can access the parties that reside outside of the organization. These
same resources and information as everybody else. parties, for example, maybe customers, key stakeholders
People from all over the world can communicate with or clients.
each other in real-time. Users will have an authorization level once they have
Available to anyone who has a suitable device and access successfully logged in, which will determine which
to any one of the interconnected networks. resources they may access.
Similarities between the Internet, Intranet and extranet
Uses: are as follows:
Education and training They are all web-based technologies
Social Networking They allow users to access information remotely
They all use client-server architecture
Online shopping
Entertainment They all use security measures such as
authentication and encryption
2. Intranet: They all promote and facilitate information and
resource sharing
Usually private and are used to send information Differences between the internet, intranet and extranet
securely and safely. are as follows:
Access to an organization’s Intranet is restricted and only The internet is a global network, whereas an
accessible to authorized users such as employees. intranet/extranet is a private network contained
Intranets have many advantages over the internet, such within an organization
as: The use of the internet covers a wide range of
better bandwidth than the internet, purposes, whereas an intranet/extranet is designed
data is kept within the organization, for specific users and purposes.
less chance of hacking and attacks, Much information is publicly available, whereas an
administrators can manage access to external sites intranet/extranet is not.
and links. The Internet is not owned solely by one person or
organization, whereas the organization usually owns
Characteristics: intranets/extranets.
A private network that is accessible to employees within Network Types
a company or organization.
Usually behind a firewall to ensure security. 1. Local Area Network (LAN): networks usually
Allows for document sharing and the use of contained within a single building or small
collaboration tools between users. geographical location. It is made up of hubs and/or
It can be customized to meet the specific requirements switches, which will connect several devices together.
of the business. One hub or switch commonly connects to a router,
Users will require a username and password to access allowing LAN connectivity to other outside networks
the Intranet. such as the Internet.

3. Extranet: Advantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Allows centralized management of updates, backups and 3. Wide Area Networks (WAN): is formed by several
software installations. LANs connected through a router. It is expensive.
Can secure its devices with the use of firewalls, antivirus However, it comes with a more enhanced security.
software and other security features to prevent Additional hardware is needed for a WAN: Routers,
unauthorized access. modems, and proxy servers.
A LAN allows users on the network to share resources
such as printers and other peripherals. Advantages:

Disadvantages: Provide the ability to connect geographically dispersed


locations, such as offices in different cities or countries.
The network may not function correctly in case of Offer the flexibility to scale up or down based on the
hardware failure. organisation's needs.
They are more prone to attacks than standalone Administrators can monitor and manage the network
computers. infrastructure from a single location.
Data and peripheral accessing can be slow, based on
network traffic. Disadvantages:
LAN networks require maintenance to ensure the Setting up and maintaining a WAN can be expensive,
software is up-to-date. especially compared to LANs.
2. Wireless Local Area Network (WLAN): Local Area Cover larger distances and rely on public networks or
Networks allow devices to connect wirelessly rather leased lines, which can introduce latency and affect
than using physical cables. Wireless Access Points performance.
(WAPs) are connected to an existing wired network, WANs are subject to the reliability and availability of
which provides wireless connectivity. Support a vast external service providers.
range of devices, such as smartphones and laptops,
are very popular in public areas such as shopping 4.2. Network Issues and
malls.
Communication
Advantages:
Connection to a network exposes a user to:
Allows users to connect anywhere in the range of a Hacking: Unauthorized access given to the
Wireless Access Point (WAP). computer. This can lead to identity theft or the
They can be used in various indoor and outdoor misuse of personal information.
environments, making them highly flexible. Phishing: Phishing involves getting sensitive
As the requirements change, additional WAPs can be information, such as usernames, passwords, and
added relatively easily. credit card details, for malicious reasons by
Printer access can be given to wireless devices. mimicking a reliable webpage on the network
Pharming: This is malicious code installed on a user’s
Disadvantages: computer or a web server; the code will redirect the
The strength of their signals can be affected by obstacles user to a fake website without their knowledge (the
such as walls. user doesn’t have to take any action, unlike phishing).
Speeds can be affected by high-traffic areas. Viruses: Program code that replicates (copies itself)
It can sustain interference from other devices which can to delete or corrupt files and cause the computer to
affect performance and connectivity. malfunction
Can be vulnerable to security threats due to signal
interception. Passwords
It is a common form of security often accompanied by a
username or email address.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

There are many ways to enhance the security of your 1. Zero login: A security concept that eliminates
password, such as the following: traditional login methods, such as usernames and
Ensure that the password is changed regularly in case passwords, using biometrics or other authentication
it has been obtained illegally or accidentally factors for seamless and password-less access.
Ensure that the password uses a combination of 2. Biometric Recognition: These authentication
uppercase, lowercase, numbers and special methods use unique physical or behavioural
characters to make the password more difficult to characteristics, such as fingerprints, iris scans, or
guess. voice recognition, to verify a person's identity.
iloveict is a weak password 3. Magnetic Stripes: These are authentication features
1lov3ICT# is a strong password on cards storing data magnetically. They enable
Anti-spyware software can be run regularly to ensure secure identification and authorization by containing
that your information, including your password, is not encoded information that magnetic stripe readers
passed to an unauthorized third-party user. can read.
4. Smart Cards: Smart cards are portable devices with
Other Authentication Methods integrated circuits to store and process data. They
are used for authentication, identification, and secure
transactions in various applications such as banking,
telecommunications, and access control.
5. Physical Tokens: It is a type of authentication that
takes the shape of a solid object. The user
demonstrates ownership of the token through
interaction with a login system. Physical tokens have
embedded clocks that create one-time passwords
(OTPs) when a PIN and other authentication
information are entered.
6. Electronic Tokens are applications that users install
on their hardware, such as smartphones. Say a
person wants to access a website on a tablet
computer. To access this website, users must first
authenticate themselves using electronic tokens. The
user has already set up the electronic token app with
their smartphone. The user launches the app on their
smartphone when the website asks them to verify
their identity. The program creates an OTP that is
only good for a short period of time.

Anti-malware Software
Anti-malware software is designed to protect devices
against viruses and malicious software. It has 3 primary
purposes: detect, prevent and remove malicious
software. It is installed onto a computer system and will
operate in the background.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Standard features of Anti-Malware software include the Disadvantages:
following:
Potential time lag in responses/delays when talking.
Comparing the scanned files against an extensive Images can jerk.
database of known threats It is very expensive to set up in the first place.
Real-time scanning Problems if the delegates live in different countries with
Regular updates to gather an up-to-date list of known large time zone differences.
threats Requires IT knowledge to some extent.
Quarantine of infected files It's not the best for people who consider travelling a job
Quarantining files allows threats to be automatically perk.
deleted. Completely reliant on stable internet connections.
Allows the user to determine if the file is a legitimate
threat and not a false positive. 2. Audio Conferencing: Meetings held using audio
(sound) technology are called audio conferencing.
Heuristic Checking: Instead of relying solely on a database The normal telephone network can be used for audio
of known viruses, this method looks for behavioural patterns conferencing, frequently called a phone conference.
and other features in a file to identify possible risks.
The hardware required is:
Electronic Conferencing a computer (with built-in microphones and speakers)
1. Video Conferencing: It is a form of audio and video external microphone and/or speakers
communication. It serves as a stand-in for face-to- an internet phone
face meetings between several persons who may a standard phone.
reside abroad or in another region of the country. It Advantages:
utilizes a network in some way and is done in real-
time. Allows participants to join meetings from any location.
Eliminates the need for travel expenses, such as
The basic hardware includes: transportation, accommodation, and meals.
webcams, Saves time by eliminating travel time and allowing
large monitors/television screens, meetings to be scheduled and conducted quickly.
microphones, Disadvantages:
speakers.
Lacks the visual aspect of face-to-face meetings, which
The software used are: can hinder communication.
Webcam and microphone software drivers It can limit interaction and engagement compared to in-
CODEC (coder and de-coder) person or video conferencing.
Echo cancellation software Heavily relies on technology, and technical issues such as
poor audio quality, background noise, or connectivity
Advantages: problems are common.

It is much easier to access important documents or bring


in ‘experts’ at key parts of the conference.
It is possible to hold conferences at short notice.
Reduced travelling costs.
There is no need to pay for hotel accommodation or
venue hire.
Reduces the cost of taking people away from work for
two or three days to travel.
Using video conferencing is better than having delegates
travel to potentially unsafe places worldwide.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

3. Web Conferencing: no need to do manual tasks at home


Web conferencing, often known as webinars or more time for leisure activities
webcasts, makes use of the Internet to enable no need to stay home while chores are being done
conference calls. This system makes use of numerous web-enabled devices allow devices to be switched on or
computers that are interconnected over the internet. off while the owner is out
It operates in real-time, just like video conferencing, automated burglar alarms give a higher sense of security
and enables the following meeting types: and well-being
» business meetings to discuss new ideas smart fridges and freezers prevent food waste by
» presentations keeping track of products’ expiry, availability, etc.
» online education or training.
Disadvantages of microprocessor-controlled labor-
Advantages: saving devices:
Allows participants to see each other through video, unhealthy lifestyle due to inactivity caused by devices
providing a more immersive and engaging experience doing all tasks
than audio conferencing. tend to make people lazy
Often offer screen sharing capabilities, enabling potential deskilling
participants to share presentations, documents, or other any device containing a microprocessor and can
visual content in real-time. communicate using the internet displays a threat of
Often provide features like chat, polling, hand raising, cybersecurity breaches
and Q&A sessions, fostering interactivity and
engagement among participants. General advantages of using a microprocessor-
controlled device:
Disadvantages:
save energy due to being efficient, as well as turning off
Heavily relies on internet connectivity and technical after inactivity
infrastructure. can be easier 'programming' these devices to perform
They can be susceptible to distractions and multitasking. tasks rather than turning knobs and pressing buttons
It often has various features and settings that manually
participants need to familiarize themselves with,
especially if they are new to the platform. General disadvantages of microprocessor-controlled
devices:

5. The Effects of Using IT lead to more wasteful devices


can be more complex to operate for technophobes
leaving devices on standby is wasteful
5.1. Microprocessor-Controlled Devices
Data Security Issues
A microprocessor-driven labour-saving machine enables
users to focus on other activities while the machine Any home appliance managed remotely could provide
completes its work. The second generation of devices hackers access to your personal information. These devices
containing microprocessors is more user-friendly and frequently have default (or no) password settings, which
has more functionality, such as "intelligent tuning" in makes it simple for attackers to get sensitive information.
television sets. For instance, it is easy to discover holiday dates by hacking
into a central heating controller (or the software used to
Advantages of microprocessor-controlled labor-saving interface with it), making a home an obvious target for
devices: break-ins. It is likely for a hacker to obtain important
information, such as credit card numbers, if the refrigerator
or freezer automatically orders goods from a retailer.

Social Interactions

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
The positive aspects include: Consider an autonomous vehicle approaching a set of
red-lighting traffic signals.
easier to make new friends using chat rooms
easier to find people who share similar interests/hobbies The vehicle's control system must first recognize the
less expensive to keep in touch using VoIP technology. road sign before consulting the database to determine
the appropriate action.
The negative aspects include: The CPU must instruct the actuators to apply the brakes
and put the gear in "park" since the traffic light is red.
people do not meet face-to-face as much (social
isolation) The light must be continuously watched until it turns
a lack of social interaction may make people more green.
anxious about meeting people in real life After that, the CPU will again tell the actuators to engage
When communicating online, people can act less politely first gear, let go of the brakes, and open the throttle
(accelerator).
or more harshly, and cybercrime is a serious issue,
especially for teenagers. Advantages of an autonomous car, bus, or van:
Monitoring and Controlling Transport safer due to the removal of human error
due to the more efficient operation of vehicles, it is
Uses: better for the environment
reduced traffic congestion
monitoring traffic on motorways increased lane capacity
congestion zone monitoring
reduced travel times
automatic number plate recognition (ANPR)
stress-free parking for motorists
automatic traffic light control
air traffic control systems Disadvantages:
railway signalling systems
very high installation prices
Advantages of transport monitoring and control driver and passenger reluctance of the new technology
systems: reduction in taxi requirements could lead to
unemployment
smart motorways keep updating according to changing
maintenance of the sensors and cameras is crucial
traffic conditions the ever-present fear of hacking into the vehicle’s control
more efficient system
traffic offences can be remotely penalized using ANPR
car thefts can be spotted using ANPR Advantages of an autonomous train:
minimizes human errors, reducing the rate of accidents
improved punctuality
Disadvantages: reduced running costs due to fewer staff
no human error
If a hacker breaches security, the vehicle could be minimized energy consumption
controlled by them.
possible to increase the frequency of trains as the
The system might come to a halt if it malfunctions.
possibility of delays is removed
Systems with a poor design could compromise safety. more straightforward to update changes in train
The easy tracking of harmless people's movements is schedules
made possible by ANPR equipment. Who can access such
data? Disadvantages:
Autonomous vehicles in transport
To properly execute their activities, autonomous cars
require sensors, cameras, actuators, microprocessors (along
with very complex algorithms). Automobile control systems
can accomplish essential tasks by sensing information from
cameras and ultrasonics.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Minimizing health risks: use LCDs instead of CRTs, take
fear of the system being hacked into regular breaks, use anti-glare screens, and do regular eye
initial instalment costs are very high testing.
ensuring passenger behaviour is vital, especially during 4. Headaches: pain or discomfort in the head or face area.
rush hours. Cause: incorrect lighting, screen reflections, flickering
human reluctance to new technology screens, etc.
without drivers, CCTV monitoring will be continuously Minimizing health risks: use anti-glare screens, take regular
required breaks, regular eye-testing.
Advantages of autonomous aeroplanes: 5. Ozone irritation: inflammation and irritation of the
tissues lining human airways
improvement in passenger comfort Cause: inhalation of ozone released by laser printers in an
reduced running costs, fewer staff office.
as most accidents are due to pilot-induced errors, safety Minimizing health risks: proper ventilation, laser printers
is improved should be housed in a separate room, replace laser printers
improved aerodynamics as an outcome of the removal of with inkjet printers, if possible.
the cockpit

Disadvantages: 6. ICT Applications


security aspects due to the absence of pilots
emergencies may be challenging to deal with 6.1. Communication
hacking into the system
passenger reluctance Newsletters and posters
software glitches can be catastrophic
Paper-based communication is used to inform people
about their interests
5.2. Potential Health Problems related Schools use these to inform parents about events/dates
to the Prolonged use of IT Equipment Advantages
Released regularly
Long-term exposure to computing devices may affect user The recipients have a permanent copy
well-being. Disadvantages
Mentioned below are some of the health issues, Requires distribution
accompanied by their causes and prevention tactics: There are no special effects, sound/video/animation
1. Repetitive strain injury (RSI): A condition affecting the There are printing costs, paper/ink
muscles and nerves The targeted audience may or may not receive the
Cause: repetitive movements and overuse of muscles, such information
as wrists
Minimizing health risks: regular breaks, ergonomic Websites
equipment, correct typing techniques.
2. Back and neck strain: Back pain and other related
issues.
Cause: due to prolonged use of monitors
Minimizing health risks: use adjustable chairs, footrests, and
tiltable screens.
3. Eyestrain: strain and fatigue, unwanted harm to vision.
Cause: due to bad lighting and prolonged screen usage.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Collection of webpages, text, graphics, video, and sound Real-time transition of audio and video files over the
Hosted on a web server on the internet internet
Need to write code or use a web authoring application allows users to access content without downloading it to
Hyperlinks to other pages can be added their devices
Interactive websites require programming knowledge popular services include Spotify, YouTube, and social
Can use a camera, scanner, and microphone to input media websites
data uses buffering, which makes sure the video plays back
Usually, hire space from the web hosting company smoothly without freezing. While the buffer receives data
Advantages packets, it sends previously received ones to the
Ability to add sound/video/animation playback device so that there are no gaps in the played
Links to other websites/hyperlinks data
The use of hot spots Advantages
Buttons to navigate/move around the website Users can access any information at any time and
Hit counters to see who has visited the websites from any location
worldwide advertising capability Offers an extensive library of content
Disadvantages Compared to traditional cable or satellite TV
Can be hacked and modified, or viruses introduced subscriptions, media streaming can be more cost-
Need for a computer and internet connection effective
Lack of portability compared with the paper-based Disadvantages
system Heavily relies on a stable and high-speed internet
Need to maintain the website once it is set up connection.
Not all content is available on every streaming
Multimedia Presentations platform due to licensing agreements and exclusivity
deals.
Uses a mixture of media to present information: You don’t own the media when streaming media, so if
animations, video, sound, transitions, hyperlinks the streaming service removes a movie or a TV show
Produced using software packages from its library, it may no longer be accessible to you.
Used with a projector so a large audience can view
Advantages ePublications
Use of sound and animation/video effects
Interactive/hyperlinks built into presentations
More likely to hold the audience’s attention
Disadvantages
Need for special equipment – expensive
It may require internet access
Distracts the audience from the sole content of the
presentation
It is very easy to make a presentation with too many
features

Media streaming

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
5. Accessing the Internet: Another helpful feature is
digital versions of printed materials, such as eBooks, accessing the net from a mobile device. Any mobile device
eMagazines, and eNewspapers. with a wireless broadband connection or a mobile phone
It can be read on electronic devices. network can link to the internet.
Advantages
aid portability
they are often more affordable than paperback 6.2. Modelling Applications
books.
Offer interactive elements that enhance the reading Advantages of using models:
experience. using models is less expensive than having to build the
Disadvantages real thing
reading from an electronic device for a prolonged safer to use a computer model
time can cause eyestrain allows you to try out various different scenarios in
ePublications lack the tactile experience and physical advance
presence that some readers enjoy nearly impossible to try out some tasks in advance in real
compatibility issues can arise if the ePublications is in life due to high risk
a format that is not supported by the reader's device faster to use a computer model than to do the real thing
or software
Disadvantages of using models:
Mobile Communication
a model can’t be completely reliant as the output is
Mobile devices support many forms of communication, such entirely based on the input
as: frequently, computer modelling can be a very costly
1. Short message service (SMS) messaging: permits option
extremely quick communication with another person via human reluctance is a common problem in this
typing on a keyboard (a mobile phone or tablet's keyboard is technology
frequently virtual). Its benefit is that the recipient can get the
text whenever they choose without being available. Some of the applications of computer modelling include:
2. Phone calls: Making calls while on the go is among the 1. Personal finance: Computer modelling involves using
most fundamental applications of a mobile phone. Mobile mathematical algorithms and data analysis to simulate
phones are the perfect method to stay in correspondence various financial scenarios, such as investment strategies,
anywhere there is a network signal because they are retirement planning, and risk assessment, aiding individuals
compact and have an independent battery. in making informed decisions and optimizing their financial
3. Voice over Internet Protocol (VoIP): a communication goals.
technique for Internet users. VoIP transforms sound 2. Bridge and building design: Computer modelling is
captured by the built-in mic of the cell phone into individual crucial in bridge and building design. It allows engineers to
data packets that may be transmitted via the internet to simulate and analyze structural behaviour, assess load
their intended recipient. capacities, and predict the response to external forces. It
4. Video calls: enables real-time video conversing between aids in optimizing designs, ensuring structural integrity, and
multiple participants with a camera-enabled device. Uses an minimizing potential risks before construction begins.
internet connection or cellular data. Software that may be 3. Flood water management: Computer modelling plays a
used for video calling includes FaceTime, Skype, and Zoom. vital role in flood water management by simulating water
flow behaviour, predicting flood extents, and assessing
potential flood risks. It helps design and optimise flood
mitigation measures, such as levees and floodplain zoning,
allowing authorities to make informed decisions, develop
effective emergency response plans, and minimize the
impact of flooding on communities.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
4. Traffic management: Computer modelling simulates and
analyses traffic flow, predicts congestion patterns, and 6.4. School Management Systems
optimises traffic control strategies. It aids in designing
efficient road networks, optimizing signal timings, and Computer-controlled School Management Systems:
evaluating the impact of transportation infrastructure Comprehensive software applications that automate
projects. This enables authorities to make informed administrative tasks, such as attendance tracking, grading,
decisions, alleviate congestion, and improve overall traffic scheduling, and student information management,
efficiency for better urban mobility. improving educational institutions' efficiency, accuracy, and
5. Weather forecasting: Computer modelling plays a pivotal organization.
role in weather forecasting by simulating the Earth's
atmosphere, oceanic conditions, and other environmental
factors. These models use complex algorithms to predict
weather patterns, including temperature, precipitation, wind
speed, and storm systems. By assimilating real-time data,
computer models provide forecasts that aid meteorologists
in predicting weather conditions, issuing warnings, and
helping society prepare for potential hazards.

Advantages of using computer modelling rather than


humans:
It can provide more precise and accurate results than
human-based methods, minimizing errors and
increasing reliability.
Can analyze large amounts of data and perform
complex calculations faster than humans
It can be reused and updated easily, reducing the
need for repetitive manual analysis and potentially
lowering costs in the long run.
Disadvantages of using computer modelling rather
than humans:
It may overlook nuanced factors or intangible
elements that humans can consider, leading to
potential gaps or inaccuracies in the analysis.
Based on assumptions and simplifications,
introducing a level of uncertainty.
Their programmed algorithms and data inputs bind
models. They may struggle to adapt to unforeseen
circumstances or rapidly changing conditions that
humans can more readily navigate and respond to.

6.3. Computer-controlled Systems

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

6.5. Booking Systems Automated Teller Machines (ATMs)


Automated teller machines (ATMs) are places where
These web-based platforms and applications allow users to
reserve and purchase tickets or services for various events customers can get cash (or carry out certain other banking
and industries. Some of the applications for online bookings activities, such as ordering a statement) using their credit or
include: debit card.
1. Travel industry: Booking flights, hotels, and holiday If the limit is not exceeded and all other checks are OK, then
the transaction is authorized, and the machine then counts
packages provides a convenient platform for travellers to
plan and book their trips. out the cash
2. Concerts: Reserving tickets for live music events allows Advantages:
music fans to secure their spot at popular concerts. possible to withdraw at any time of the day
3. Cinemas: Booking movie tickets in advance enables offer many banking services without having to go to
cinema-goers to reserve seats and avoid queues. the bank
4. Sporting events: Purchasing tickets for sports matches possible to access an account from anywhere in the
and competitions offers sports enthusiasts an easy way to world
attend their favourite events. usually provides quicker service than waiting in a
queue at a bank
Advantages:
Disadvantages:
convenience and accessibility
instant confirmation and ticketing often in places where theft can take place at night
ability to compare prices and options potential for shoulder surfing
promotions and personalized offers some banks charge customers for using ATMs
cash withdrawal limits are often imposed on people
faster to change/update
automated reminders via email/text
repeated bookings can be easily made
Electronic Funds Transfer (EFT):
cost-saving as there are fewer wages due to reduced It is possible to send money transfer instructions directly to
staff requirements a bank's computer system via electronic funds transfer (EFT)
Disadvantages: technology. The system depends on electronic money
potential for technical issues transfers between accounts; no cash is moved. The
possible security and privacy concerns computer system automatically moves the requested
transaction and booking fees amount from one account to another when it receives an
impersonal customer service EFT command.
dependent on a stable internet connection
can lead to unemployment Advantages:
very secure payment method
6.6. Banking Applications very quick payment method
less expensive than cheques
Online banking systems depend on the ability to update the customer has the right to dispute an EFT
files instantly to avoid double scheduling, which might payment for up to 60 days
occur if the system reaction time is slow. Disadvantages:
The use of computer technology has revolutionized how the bank transaction can’t be reversed without full
we do our banking transactions, for example: dispute investigations
Internet banking customer needs to have funds available immediately
The use of automated teller machines (ATMs) cannot guarantee the recipient’s identity
Chip and PIN technology
Credit/debit card transactions

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Several credit/debit cards come with a magnetic stripe and a
chip; the chip houses essential data like the PIN. This Advantages:
technique is intended to increase security because it is more convenient and safer than cash
superior to a signature. A chip and PIN card to make can be post-dated
purchases is an example of an electronic funds transfer can be traced if they are lost
(EFT). Disadvantages:
aren’t legal tender and can be refused
Advantages of credit cards: slow method of payment
customer protection if ordered goods don’t arrive easier for fraudsters than other methods
internationally accepted payment method relatively expensive payment method
interest-free loan if money is paid back within the
agreed time period Internet Banking
can make purchases online
Disadvantages of credit cards: Enable online access to banking services via a secure
can be charged high interest rates website or app, allowing for transfers, bill payments, account
annual fees often apply management, and more.
easy to end up with credit damage
security risks in online transactions Advantages:
Advantages of debit cards: convenience and availability
easy account management
money comes from the user’s current account, there
branch visiting won’t be a requirement
is no interest
interest rates may be better
safer than carrying cash
can make online purchases more accessible to shop around for the best account
Disadvantages of debit cards: Disadvantages:
security of transactions
less customer protection if goods don’t arrive
requires a reliable internet connection
no credit allowed; funds are needed at the time of
More risk of fraud
purchase
security risks in online transactions Easier to make errors
Physical cash can't be deposited/withdrawn
Cheques
6.7. Computers in Medicine
Individuals and organizations use cheques as a form of
payment. When issuing a cheque, the payer writes the Information Systems in Medicine
recipient's name, the payment amount, and the date on the
cheque. The recipient then deposits or presents the cheque Patient records: Healthcare professionals maintain
to their bank for processing. The payer's bank verifies the databases to communicate information between them
fund’s availability, and upon clearance, the specified amount and pharmacists (for instance, to guarantee no
is transferred from the payer's account to the recipient's medications are administered that interact dangerously
account, completing the transaction. with one another).
Pharmacy records: Pharmacy records maintain a
comprehensive record of patient prescriptions. This
includes details like the prescribed medication, dosage,
quantity dispensed, prescribing physician's information,
and the date of dispensing. These records help track
medication usage and can be used to verify prescription
accuracy and detect potential drug interactions or
allergies.

3D Printers

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Using 3D printers in medicine:


Prosthetics: 3D printers print out artificial body parts
such as false teeth, artificial limbs, hearing aids, etc.
This is a less expensive method of replacing body
parts.
Tissue engineering: it is the field of combining cells,
biomaterials, and engineering principles to create
functional tissues or organs, aiming to repair or
replace damaged or diseased tissue in the human
body.
Artificial blood vessels are synthetic structures
designed to mimic the function of natural blood
vessels, facilitating the flow of blood and nutrients Components of an Expert System
throughout the body to support tissue repair and 1. User Interface
regeneration.
Customized medicines are personalized drug This is the only thing that the end user sees
formulations tailored to individual patients' specific Allows the user to interact with the system
needs. They utilize advanced technology and precise Often requires training to operate effectively
measurements to create medications with accurate
dosages and unique compositions, optimizing 2. Explanation system
treatment outcomes.
Informs the user of the reasoning behind the expert
system’s conclusions
6.8. Expert Systems It will supply a conclusion and any suggested actions to
take
It is an AI-based computer program that emulates the It will also give the percentage probability of the accuracy
decision-making capabilities of human experts. It uses of its conclusions
knowledge and rules to provide accurate advice or solutions
in a specific domain. 3. Inference engine
Examples include:
The main processing element of the system
Diagnostics It acts like a search engine examining the knowledge
Mineral prospecting base
Tax and financial calculations Responsible for gathering information
Strategy games This is the problem-solving part of the system
Identification of plants, animals and chemical Attempts to use information gathered from the user to
compounds find a matching object
Route scheduling for delivery vehicles
4. Knowledge base
It is a repository of facts
stores all the knowledge about an area of expertise
a collection of objects and their attributes

5. Rules base

The rules base is a set of inference rules.


Used by the inference engine to draw conclusions
They follow logical thinking

How an expert system is used to produce possible


solutions

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Below is an example of how an expert system works to
diagnose a medical issue: Use of chip and PIN cards:
Enhance security with two-factor authentication
The interactive screen asks questions for the doctor to Require customers to enter a personal identification
answer using a keyboard or a touch screen. number (PIN)
The inference engine compares the symptoms with the Use of contactless cards:
knowledge base, using the rule base to find matches. Allow for faster transactions
The system suggests the possible illness with a Enable customers to tap their card on the terminal
probability of each, cures, and recommendations on the Use of Near Field Communication (NFC):
next step. Facilitate payments through smartphones and other
The explanation system will explain how that particular devices
diagnosis was suggested. Increase convenience for customers
Communication between supermarket computers and
6.9. Computers in the Retail Industry bank computers:
Share transaction details securely
Point of sale (POS) terminals: Computerized systems used Enable instant payment processing and verification
at checkout counters to handle purchases and oversee
stock. It is extensively used in retail stores to process sales Internet Shopping
transactions. They enable quick and secure payment
Characteristics of Internet Shopping:
processing through various methods, including cash,
credit/debit cards, mobile payments, and digital wallets. POS Online stores accessible through web browsers
terminals calculate totals, generate itemized receipts, A wide variety of products and services are available
update inventory, and provide real-time sales data for Convenient and often open 24/7
effective business management.
Advantages (To customer):
Some features include:
update stock files immediately access to the global market
track inventory levels in real-time comparison between different products effortlessly
prevent stock discrepancies and ensure accurate can shop from anywhere in the world
records able to avoid queues and busy stores
monitor inventory levels and reorder when stock is
lower than a predefined value Advantages (To business):
streamline supply chain management and minimize can target prices and services based on buying data
stockouts can update stock availability and prices more quickly
Electronic funds transfer at Point of sale (EFTPOS) than a physical store
terminals: Devices for processing electronic payments; they cheaper to publicize special offers
allow customers to make payments using debit or credit international customer base
cards by securely transferring funds from their bank increased profits due to lower staff
accounts. EFTPOS terminals authenticate and authorize Disadvantages (To customer):
transactions in real-time, providing convenience and security
for customers and businesses during retail purchases. security concerns
The process of checking credit and debit cards at a can’t correctly examine products before purchase
supermarket EFTPOS is much the same as was described for occasionally, products may take weeks before being
paying a restaurant bill in Section 6.6. delivered
Some functions of EFTPOS include: additional shipping and handling costs
lack of face-to-face interaction with staff

Disadvantages (To business):

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
3. RFID in tracking stock:
increased competition
digital fraud and security concerns
technical issues and downtime
costs of delivery and return
fake negative reviews can lead to a lousy company
reputation

6.10. Recognition Systems


1. Optical Mark recognition (OMR) media in schools:

School registers: Paper-based registers are fed into


OMR to be scanned and stored in a database.
Multiple-choice examination papers: The position of a
mark is stored in a computer’s memory after being read
by the OMR, a device using a template that maps out the
X-Y coordinates of each tablet (pen/pencil mark).
Used at POS terminals for scanning and reading the
information stored in barcodes.
Many digital devices have OMR scanners, which may be
used to scan QR codes.
Advantages:
very fast way of inputting the results of a survey
more accurate than keying in data
more accurate than OCR methods
Disadvantages:
designing the forms is a very complex job
there can be problems if they haven’t been filled
correctly
often only work with black pens or pencils
2. Optical Character Recognition (OCR)

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
4. Near Field Communication (NFC):
Used to determine the exact location of several modes of
Enables short-range wireless communication between transport
devices. Cars usually refer to GPS as satellite navigation systems
Allows payment using a smartphone. Satellites surrounding the Earth transmit signals to the
Advantages: surface
Convenient and secure method of payment Computers installed in the mode of transport receive
allows for contactless transactions and interpret these signals
Disadvantages: Knowing their position on the Earth depends on very
Limited range accurate timing – atomic clocks are used in the satellites,
compatibility issues with some devices which are accurate to within a fraction of a second per
day
5. Biometric recognition: Each satellite transmits data indicating its position & time
Usually refers to automated technologies for The computer on board the mode of transport calculates
authenticating and verifying human body characteristics its exact position based on the information from at least
such as face, iris, retina, finger, thumb, hand and voice. three satellites
Advantages: Satellite Navigation (satnav):
very high accuracy
very easy to use Used to determine the exact location of a car.
very fast verification time The computers onboard can be used to show directions
non-intrusive method to a destination.
relatively inexpensive technology
Disadvantages: Advantages:
it can make mistakes if the skin is dirty or damaged
Better focus as there isn’t a need to constantly check
very expensive to install and set up paper maps.
uses a lot of memory for the data to be stored Reduces fines by warning drivers about upcoming speed
a person’s voice can be quickly recorded and used for changes.
unauthorized access The system shows an Estimated Time of Arrival (ETA).
an illness, such as a cold, can change a person’s
It is possible to program in the fastest route to avoid
voice, making absolute identification difficult or towns.
impossible The system can also give helpful information such as the
location of petrol stations.
6.11. Satellite Systems
Disadvantages:
Global Positioning Systems (GPS) If the maps are not updated, they can give incorrect
instructions.
Road closures due to accidents or roadworks can cause
problems.
The loss of satellite signals can cause problems.
The system will give incorrect information if an incorrect
start-point or end-point is keyed in.

Geographic Information Systems (GIS)

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Used to capture, manage, analyze, and display There is a time delay in receipt of the signals.
geographically referenced information. The signals received can be affected by bad weather.
Use to determine the distance between two places. Sunspot activity can affect the performance of a satellite.
Used to find the nearest petrol station or restaurant, etc. They must be monitored and controlled regularly to
To protect animal and plant life in certain vulnerable remain in the correct orbit.
places.
It can be used in geography, science, or engineering
lessons. 7. System’s Life Cycle
Advantages:
7.1. Stages of Sytem's Life Cycle:
Allows geographical and thematic data of any kind to be
combined to show how they are connected to each 1. Analysis
other. 2. Design
It allows the handling and exploration of vast amounts of 3. Development & Testing
data. 4. Implementation
It allows data to be integrated from a wide range of very 5. Documentation
different sources. 6. Evaluation

Disadvantages: Analysis of the Current System


The learning curve on GIS software can be very long. The current system is studied using four different
GIS software is very expensive. methodologies. These are the four techniques:
GIS requires enormous amounts of data to be input.
It isn't easy to make GIS programs that are both fast and
user-friendly.

Media Communication Systems


Using satellite signals for communication.
Used by media companies when sending
stories/videos/pictures from remote locations.

Advantages:

They have good global coverage.


They are cheaper, faster, and safer than laying cables in
difficult or treacherous terrain.
They have very high bandwidth.
It is relatively easy to expand the network.
Security in satellite transmission is very good because
data is coded, and the receiver requires decoding
equipment.
During emergency situations, it is relatively easy to move
stations on the ground from one place to another.
They are well-suited for broadcasting.
Enable mobile communication in very remote locations.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Observation: Data inputted, processed, and outputted into the system


involves watching users interact with the system to are identified.
figure out its workings Problems with the current system are identified. What
it is used for understanding how users interact with could be improved?
the current system The requirements of the user and the potential new
Advantages: provides first-hand, unbiased system are identified. What is the new system meant to
information do?
Disadvantages: can be time-consuming, may not Problems: issues that users face with the current system
reveal all issues User requirements: what needs to be added to the new
Interviews: system
direct one-to-one conversations with users on their Information requirements: data or information the new
experience with the current system system must process
used to gather comprehensive information about
individual users New System Requirements Specification:
Advantages: allows for in-depth exploration of issues • Once the systems analysts have completed the systems life
Disadvantages: relatively expensive, time-consuming, cycle analysis stage, they should be fully aware of the
no user-anonymity, which may affect the response current system's limitations.
Questionnaires: • The next step will be to design a new system (normally
set of predetermined questions is given to the users computer-based) to resolve the problems identified by the
to complete and give their opinion on the current users and the systems analyst.
system • The Requirements Specification will be created, outlining
it is majorly used in collecting data from a larger the required improvements and expectations for the new
group of people system.
Advantages: allows for quantitative analysis, efficient
data collection, questions can be answered quickly System Specification
Disadvantages: limited by predetermined questions,
may suffer from low response rates, users may Hardware and Software Selection
exaggerate answers due to anonymity
Examination of existing documents:
reviewing system documentation, user guides, or
reports
understanding the current system's design and any
known issues
Advantages: provides insights into the system's
history, can reveal previously unknown issues
Disadvantages: it may be outdated, incomplete, time-
consuming, and rather expensive.

Record and Analyse Information about the Current


System
Identifying key aspects of the current system

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

It is vital to identify the suitable hardware needed for the Data capture forms: These are designed to collect data
new system from users in a structured format. They come in two
contemplating system requirements, compatibility, types: paper-based and electronic-based. Paper-based
costs data-capturing forms must be carefully designed with
justifying choices based on user needs and system headings, concise instructions, character and
performance information fields, checkboxes, and enough writing
Hardware that needs to be considered: space. Text boxes, on-screen help, drop-down menus,
barcode readers, radio buttons, automatic validation, and control buttons
scanners, for data entry are all features of computer-based forms.
touch screens, Consider a user-friendly layout, clear instructions, and
3D printers, appropriate data fields.
monitors,
speakers. Output Formats
Identifying suitable software needed for the new system
considering functionality, compatibility, and ease of Screen layouts: how information is presented to users
use on a screen
justifying choices based on user requirements and Report layouts: how information is organized in a
system efficiency printed or digital report
Software that needs to be considered: Consider readability, visual appeal, and efficient use of
operating system, space
applications software,
size of storage, Validation Routines
type of storage.
It is a method of examining data submitted to a computer to
determine if it meets specific requirements. It is a routine
7.2. Design check that the computer does as part of its programming.
1. Range check: ensures data is within a specified range of
Once the analysis has taken place and the systems analyst values
has some idea of the scale of the problem and what needs 2. Character check: ensures data contains only allowed
to be done, the next stage is to design the critical parts of characters
the recommended system. 3. Length check: ensures data is of a specified length
4. Type check: ensures data is of the correct data type
File/Data Structures 5. Format check: ensures data conforms to a specific
Field length: number of characters allowed in a field format
6. Presence check: ensures data is present and not left
Field name: an identifier for the field in the data
structure blank
Data type: specifies the kind of data that can be stored in 7. Check digit: a digit added to a number to verify its
a field, e.g., text, numbers, dates accuracy
Coding of data: using codes to represent data, e.g. M for
male, F for female 7.3. Development and Testing
Input Formats Guarantees the system's functionality before it is put into
use.
Identification and removal of errors, thus improving
system reliability and performance.

Test Designs

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Before selecting the approach best suited for a given
Test data structures, file structures, input formats, application, the pros and cons of each must be carefully
output formats, and validation routines considered.
Ensure all components function correctly and interact
seamlessly 4 Methods of Implementation
Test Strategies 1. Direct changeover:

Test each module: verify individual components function The old system is replaced by the new system
as intended immediately
Test each function: ensure all features work correctly Used when quick implementation is necessary
Test the whole system: confirm overall system Advantages
performance and integration fast implementation
cost-effective as only one system is in operation
Test Plan Disadvantages
High risk of failure
Test data: specific data used for testing purposes no fallback
Expected outcomes: predicted results based on test data users can’t be trained on the new system
Actual outcomes: results obtained from testing
Remedial action: steps taken to fix identified issues 2. Parallel Running

Test Data Types Both current and new systems run simultaneously for a
period before the old system is phased out
The following data types will be explained using the example Used when a smooth transition with minimal risk is
of months in a year. required
Advantages
Normal data: valid and expected data values within the Lower risk
range of acceptability have an expected outcome. E.g., easy system comparison
any whole number between 1 and 12. Disadvantages
Abnormal data: invalid or unexpected data values. This Time-consuming
can either be: resource-intensive
Data outside the range of acceptability or
Data that is the wrong data type 3. Pilot Running
In this case, examples could be…
The new system is implemented in a small, controlled
any value less than 1 (i.e. 0, -6, etc.)
environment before full-scale implementation
any value greater than 12 (i.e. 13, 15, etc.)
Used when testing the new system in a real-world setting
letters or nun-numeric data (i.e. July, etc.) Advantages
non-integral values (i.e. 3.5, 4.2, etc.)
Low risk as only trialled in one
Extreme data: values at the limits of acceptability (E.g. 1
department/centre/branch
or 12)
allows for fine-tuning
staff have time to train with the new system
What is live data? few errors as it's fully tested
Data that has been used with the current system Disadvantages
Hence, the results are already known Slower implementation
potential inconsistencies
confusion as there are two systems in use
7.4. Implementation There is no backup for the
department/center/branch using the new system
The system must then be fully implemented after it has been
thoroughly tested.
We will now think more carefully about switching to the new
system. Four popular techniques are utilized to transition
from the old system to the new one.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
4. Phased Implementation
Purpose of the system/program: Explanation of the
The new system is implemented in stages, with each system's intended function and goals
stage replacing a part of the old system Limitations: Known constraints or issues with the
Used when a gradual transition is preferred to minimize system
disruption Program listing: The code or scripts used in the system
Advantages Program language: The programming language used to
reduced risk develop the system
easier to manage Program flowcharts/algorithms: Visual
Disadvantages representations or descriptions of the system's logic and
Takes longer processes
potential compatibility issues System flowcharts: Visual representations of the
interactions between system components
7.5. Documentation Hardware & software requirements: Necessary
equipment and software to run the system
In the life cycle of a system, documentation enables the File structures: Organization and layout of the system's
correct recording of design, implementation, testing, and files and data
maintenance data, facilitating effective communication, List of variables: Collection of variables used within the
troubleshooting, and potential future improvements. system, including their names and purposes
Technical documentation: detailed information on the Input format: Structure and format for entering data
system's inner workings and programming for into the system
developers and IT staff Output format: Structure and format for presenting
data generated by the system
Used to maintain, repair, and update the system with Sample runs/test runs: Examples of system operation,
improvements including input and expected output
Validation routines: Techniques used to check and
confirm the accuracy of data entered into the system

User Documentation
Instruction and guidance for end-users on how to operate
the system. Used to help users effectively use the system
and overcome problems

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Purpose of the system: Explanation of the system's Analyse the system's efficiency in time, money, and
intended function and goals resource use. Examine whether the system is performing
Limitations: Known constraints or issues with the at its best or if its efficiency could be increased.
system Provide examples of specific aspects that contribute
Hardware & software requirements: Necessary to the system's efficiency
equipment and software to run the system Identify areas that may be consuming excessive
Loading/running/installing software: Instructions for resources or time and suggest ways to optimize them
setting up the system on user devices Questions to ask:
Saving files: Procedures for storing data within the Does it operate quicker than the previous system?
system Does it operate by reducing staff time in making
Printing data: Steps to produce hard copies of system bookings?
data Does it operate by reducing staff costs?
Adding records: Instructions for creating new entries in
the system Evaluate the Ease of Use
Deleting/editing records: Guidelines for modifying or
removing existing entries in the system Look at the solution's usability and accessibility for the
Input format: Structure and format for entering data target market. Check to see if the system is simple to
into the system understand and use and if users have no trouble
Output format: Structure and format for presenting completing their jobs.
data generated by the system Describe the user interface and how it facilitates
Sample runs: Examples of system operation, including interaction with the system
input and expected output Mention any feedback from users regarding their
Error messages: Explanations of system warnings and experience with the system and address any issues
error notifications they encountered
Error handling: Steps to resolve issues and errors within Questions to ask:
the system Are all the users able to use the system and make
Troubleshooting guide/helpline: Assistance for bookings easily?
diagnosing and addressing common problems Are all the users able to change and cancel bookings
Frequently Asked Questions: Answers to common user easily?
inquiries Can all staff understand how to use the system with
Glossary of Terms: Definitions of key terms and minimal training?
concepts related to the system
Determine the Suitability of the Solution
7.6. Evaluation Examine how well the implemented solution satisfies the
desired outcome by contrasting it with the original task
It measures a system's productivity, efficiency, and criteria.
compliance with its goals to identify its strengths, Outline the initial objectives of the system and
shortcomings, and potential development areas. This discuss how the solution addresses each one
assessment informs decision-making and improves overall Highlight any requirements that may not have been
performance over the course of a system's life cycle. fully met and discuss possible reasons for this
Questions to ask:
Assess the Efficiency of the Solution Is the system suitable for each of the departments?
Does it meet the needs of the customers?
Does it meet the needs of the staff?
Does the solution match the original requirements?

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Collect and Examine User’s Feedback Socket overload: Ensure enough plug sockets in the
room, don’t plug too many devices into the same
Collect users' responses to the results of testing the socket, and don’t leave devices plugged in and
system. Their feedback can provide insights into unattended.
potential issues and improvements and help determine Overheated equipment: Ensure that equipment is
overall user satisfaction. properly ventilated and not obstructed, keep flammable
Summarise the testing process, including test data materials away from heat sources, regularly check
expected and actual outcomes. equipment for signs of wear or damage, use fire
Discuss users' reactions to the system, addressing extinguishers in case of emergencies, turn off or unplug
any concerns or suggestions they may have devices when away from the location, do not cover any
air vents on devices.
Identify Limitations and Suggest Necessary
3. Trailing cables: Devices can be plugged in using cables.
Improvements Cables that are protruding can cause an accident; you can
Based on the analysis of efficiency, ease of use, trip over a cable left out in a location, and body damage can
appropriateness, and user feedback, identify any occur during a fall, for example, breaking bones, ligament
limitations in the system and suggest necessary damage, bruising, sprains, etc. depending on the area fell on
improvements Trailing cables causes and prevention strategies:
List the limitations and provide explanations for each Unorganized/insecure cables: use cable ties to secure
one cables, keep cables packed correctly in, let’s say, a table,
Recommend specific changes or enhancements for therefore not coming in the way of walking paths, use
these issues wireless devices where possible, and regularly inspect
cables for signs of wear or damage.
8. Safety & Security 4. Heavy falling equipment: Devices have varying levels of
weight, and if a device falls on you, it could cause injury; any
8.1. Physical Safety device should be placed in a secure location, like a PC on a
solid desk and not near the edge.
1. Electrocution: ICT devices require electrical power to Causes and reduction tactics for falling equipment:
charge or run; the electrical device can cause electrocution, Improperly secured equipment: Ensure that
caused by the electric current moving through a body, equipment is properly secured and stable. Regularly
causing fatal injuries and/or death. check the stability of locations containing devices.
There are multiple causes for electrocution, including: Equipment on unstable surfaces: Keep equipment
Contact between liquid substances and electronic away from edges and other potential hazards, and
devices: Keep liquids away from electrical equipment. regularly inspect equipment and locations containing
Open cables: Ensure that cables are entirely insulated devices for signs of wear or damage.
and packed, and use circuit breakers or fuses to prevent
electrical overload. 8.2. eSafety
2. Fire: ICT devices require electricity to charge or run; too Data Protection
many devices using a single socket can cause the plug socket
to overload, and heat is generated by too much electricity, The Data Protection Act (DPA) controls personal data
causing the wiring to degrade and ignite a fire. collection, storage and processing.
The causes and reduction tactics for fire include:
In the UK, the European Union’s General Data Protection
Regulation (GDPR)
Protects personal data, whether stored on paper or a
computer system

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Principles of the Data Protection Act Refers to information that can be used to identify an
individual
Data must be processed lawfully, fairly, and Examples
transparently, with clear consent from the individual. Personal Name
Data should only be collected for specific, explicit, and Address
legitimate purposes. Date of birth
Organizations should only collect and retain the A photograph in school uniform
minimum personal data necessary for their stated Medical history
purpose. Threats that can be avoided by protecting personal
Data should be accurate and up-to-date, and reasonable data:
steps must be taken to rectify or erase inaccurate Identity theft
information. Privacy breaches
Personal data should not be kept longer than necessary Misuse of the information
and should be securely deleted when no longer needed. Data be sold to third-party companies
Organizations must protect personal data against Individuals could be held to ransom over personal
unauthorized or unlawful processing, accidental loss, data gathered
destruction, or damage. could be used to commit a physical crime
How to avoid inappropriate data disclosure:
Why is data protection legislation required? Personal data must be kept confidential and
protected through privacy settings on websites such
Protecting Individual Rights: Data protection legislation as social media or strong passwords on websites
safeguards individuals' right to privacy and control over where personal data is held or used
their personal information. Access to personal data should be limited to
Preventing Misuse of Personal Data: It helps prevent authorized individuals
unauthorized access, identity theft, fraud, and other Think before you post - consider what information
forms of data misuse. could be gathered from your image or content
Promoting Trust: Data protection laws build trust Check website details about the collection, storage,
between individuals and organizations by ensuring their and use of personal data
personal information is handled responsibly. Only access websites where personal data is used or
Encouraging Responsible Data Handling: Legislation viewed when on a secure, encrypted connection
promotes responsible data collection, storage, and
processing practices among organizations. eSafety
Enabling Data Subject Rights: Legislation grants
individuals rights such as access to their data, right to E-safety is knowing about and using the internet safely
rectification, erasure, and objection to processing. and responsibly.
It refers to when an individual is using the internet,
Personal Data email, social media, or online gaming.
E-safety refers to the individual knowing how to protect
themselves from potential dangers and threats.

The Need for eSafety

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Awareness that personal information should not be


shared freely 8.3. Security of Data
Awareness of how to act online and avoid falling victim
creates a safe and respectful environment. Threats
Identify and avoid online scams, phishing attempts, and
There are multiple methods by which data can be
fraudulent websites that may try to trick them into
sharing personal or financial information. threatened, including:
Mindful of online behaviour and interactions, protecting Hacking: Unauthorized access to computer systems or
your digital reputation, which can have long-term networks to gain control, steal information, or cause
consequences in your personal and professional life. damage, thus leading to identity theft, privacy breaches,
Control privacy settings on social media platforms, and misuse of data
limiting who can access/view personal information and Phishing: Deceptive emails or messages that are
posts. received from trusted sources to trick individuals into
Avoid encountering explicit or harmful content online, revealing personal data
reducing the risk of exposure to inappropriate material Pharming: Manipulation of DNS (Domain Name System)
or online predators. to redirect users to fraudulent websites, often to steal
Engage in online gaming responsibly, avoid sharing personal data
personal details, and behave respectfully towards other Smishing: Phishing attacks carried out through SMS or
players. text messages
Protecting devices from malware, viruses, and other Vishing: (aka voicemail phishing) Phishing attacks carried
online threats, preventing data loss, privacy breaches, or out through voice messages to trick users into calling the
device damage. telephone number contained in the message
Develop responsible online behaviours, promoting Viruses and malware: Viruses are program codes that
respectful conduct while interacting with others online. can replicate/copy themselves to cause data loss or
Maintain a healthy balance between online and offline corruption. Malicious software designed to disrupt,
lives, reducing the risk of addiction, mental health issues, damage, or gain unauthorised access to computer
or negative impacts on relationships and self-esteem. systems or networks
Card fraud: Unauthorized use of credit or debit card
Safety Suggestions information for fraudulent purposes caused by shoulder
surfing, card cloning, or keylogging.

Protection of Data
Multiple techniques are implied for the protection of data,
inclusive:
1. Biometrics:
Individuals' distinctive physical or behavioural traits, such
as fingerprints, faces, or irises, can be used for access
control and verification. Since biometric data is hard to
fake or duplicate, it offers a more secure form of
identification.
2. Digital certificate:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

A digital record that attests to a website's reliability and A typical authentication technique uses a password plus
integrity. A digital certificate is used to provide safe a secret code (user ID) to identify. To strengthen data
communication and to build confidence between parties. security, user IDs and passwords restrict access to only
Identifier data, the entity's public key, and a third party's authorized users. Using secure passwords and changing
digital signature are frequently found in digital them frequently is critical to ensure security. When
certificates. creating passwords, it is advised to utilize a mix of
uppercase, lowercase, digits, and special characters.
3. Secure Socket Layer (SSL):

A protocol that creates a secure connection between a


client computer and a server. SSL ensures that
9. Audience
information communicated between a server and client
stays private and cannot be intercepted or changed by 9.1. Audience Appreciation
unauthorized parties. A website's identification for it is
the S at the end of HTTP. To express gratitude and value for the users by providing
helpful and relevant information, fostering positive
4. Encryption: experiences, and contributing to their understanding and
learning.
It is creating data in a format that cannot be read without
a decryption key. Data on hard drives, emails, cloud Planning ICT Solutions
storage, and secure websites (HTTPS) are all protected by
encryption. Without a decryption key, it assures that The first step to building effective ICT solutions is
even if unauthorized people obtain data, it cannot be identifying and understanding the intended audience's
decoded. needs. These needs can be functional, like processing
information, or aesthetic, like a visually appealing
5. Firewall:
interface.
A firewall is a network security device that monitors and After identifying the needs, select the appropriate
manages incoming and outgoing network traffic. Its goal technology and tools to create a solution. This choice
is to separate an internal network from other networks depends on factors like the complexity of the task, the
by filtering data according to established criteria. It budget available, and the technical expertise of the
assists in preventing malware, unauthorized access, and users.
other network risks. An essential aspect to remember while designing ICT
solutions is to ensure they are user-friendly. This means
6. Two-factor authentication: they should be intuitive to use, require minimal training,
and have easy-to-understand instructions.
A security mechanism that requests two different kinds Additionally, ICT solutions should be accessible to all
of identification from users to confirm their identity. To users, including those with disabilities. This could involve
provide additional protection outside of just a username adding features like voice commands, larger text options,
and password, 2FA was created. Typically, it combines
or compatibility with assistive devices.
something that uniquely identifies a user, like biometric Once the solution is created, it is crucial to test it to
data, with something the user has, like a smartphone ensure it functions as expected and fulfils the users'
and a token or something they know, like a password. needs effectively.
7. User ID and password:
Analysing Audience Requirements

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Designing an ICT solution requires an understanding of Software developers employ various copyright protection
the target audience. The study should consider elements strategies, such as Digital Rights Management (DRM).
affecting the audience's capacity to use the solution, like Due to DRM methods and systems, copyrighted works
age, technical proficiency, and expertise. are subject to usage, modification, and distribution
The solution creator should know the audience's restrictions.
requirements for information. This could serve as a Other techniques include software product activation,
design cue for the data processing elements and the which needs a unique code to be fully functional.
information architecture. Given that pirated software frequently cannot receive
How the audience utilizes and consumes the content automatic upgrades, which renders it less effective and
also influences the design. For instance, the answer secure over time, automatic updates may also serve as a
should be mobile-friendly if the audience accesses it kind of copyright protection.
mostly through mobile devices.
Finally, the designer should consider any unique
requirements of the audience, such as visual or auditory 10. Communication
impairments. These requirements should be taken into
account when designing the solution ensuring inclusivity. 10.1. Communication with Other ICT
9.2. Copyright users Using E-mail
What makes Copyright Necessary? E-Mail
Uses:
Copyright regulation is crucial to safeguard the rights of
developers and innovators.
It stops software piracy, which is unauthorised use,
replication, or distribution.
It guarantees developers receive compensation for their
efforts, fostering additional innovation and development.

Principles of Copyright in a Computer Software


Copyright law prohibits the unauthorized copying,
distribution, or modification of software.
It also includes the End-User License Agreement (EULA),
which outlines what the software can and cannot be
used for
Violations of these principles, such as software piracy,
can lead to legal consequences.

Preventing Software Copyright Violation

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Email is a technique of sending and receiving messages It is up to companies to decide if personal emails should
and files via the Internet. be permitted on their systems
It is employed in personal communication, business Companies may specify which company devices are
communications, and marketing. allowed to be used
Acceptable language must be used based on the email's There needs to be a company standard style when
recipient, for example, professional when composing a sending emails
work-related email. It must be made clear what email content is not
Employers frequently establish requirements for permitted
professional language, substance, and email frequency. Employees should be told only to use their accounts
Email security is critical to preventing sensitive data from when sending emails
being accessed or manipulated. There must be clear rules regarding the confidentiality of
Netiquette is the proper conduct and politeness when information
using email. Staff need to be aware of the method and duration of
Don’t be abusive storing emails
Don’t send spam Incoming emails should only be read by the recipient
Be clear and concise with your message Company policy on how to deal with and prevent viruses
Remember that posts are usually public and can be must be laid out
read by anyone. Monitoring of emails may be carried out, and staff must
Always check your spelling and grammar. be aware that the company has the right to read all
Respect people's privacy and do not discuss or emails
publish information that might embarrass somebody. Suitable ongoing training will take place to ensure staff
Forgive people’s mistakes follow company policy at all times
Do not use CAPITAL LETTERS to highlight comments
Do not plagiarize Carbon Copies (Cc) and Blind Carbon Copies (Bcc)
Do not use too many emoticons, as they might annoy
your readers. Carbon copies are used to send the email to multiple
Email groups enable mass communication to a specific recipients.
group of subscribers. Blind carbon copies are made to send the email to
multiple recipients without them acknowledging that it
Guidelines set by employers: has been sent to other recipients.
Forward enables users to send an already existing email
to a new recipient.
To attach files to be sent with an email, we make use of
Attachments.

Spam
It is defined as any unwanted email delivered via the
Internet. These can range from annoying to genuinely
harmful, as they may contain viruses.
The main disadvantages are:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

wasting time Raises data security and personal privacy hazards


annoying people through the possibility of identity theft, data breaches,
using up valuable bandwidth on the internet, thus and online monitoring.
slowing it down The spread of propaganda, fake news, and
may have viruses or be a part of a phishing scam misinformation due to the simplicity with which content
can take up significant space in user inboxes can be created and distributed online.
The digital divide resulting from unequal Internet access
To minimize the spam you receive: threatens to widen existing disparities.
use spam filters The differences between the internet, intranet, and
avoid disclosing your email address publicly extranet:
don’t click on links in spam emails or reply to them

10.2. Effective Use of the Internet


Characteristics of the Internet:
Allows individuals from all around the world to connect
and chat with one another instantaneously
It runs on a distributed network design, which means a
single central authority does not control it.
It is mainly used for transmitting data in a variety of
formats, such as text, photos, audio, and video.

Uses of the Internet:

A vital communication tool that allows people to


communicate via emails, instant messaging, and other
means.
It acts as a massive database of information on almost
any subject
The Internet has transformed business by offering a
platform for online purchasing, electronic payments, and
digital transactions, allowing enterprises to reach global
consumers.

Advantages of the Internet:

users have access to an incredible amount of


information, empowering them to learn
enables individuals and businesses to connect and
communicate with people from different parts of the
world in real-time
the Internet has made many things easier to complete,
thus providing simplicity and effectiveness

Disadvantages of the Internet:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Definition: The Functionality of the Internet


The Internet is a vast network of linked computer
networks and gadgets that communicate with one Internet service providers (ISP): A company that
another using the Internet Protocol Suite (TCP/IP). provides internet access. Typically, a monthly fee is
The intranet is a secure network that operates within charged for this service. Users' accounts are created
an organization using internet technologies and when registering with an ISP and acquiring login
protocols, such as TCP/IP. information such as user ID and password.
Extranets are managed private networks that can Uniform Resource Locator (URL): The address of a web
give access to third-party users and give users, such page on the WWW. It is a text-based address that
as partners, suppliers, or clients, safe access to a uniquely identifies the location of any resource available
portion of the intranet. on the internet. The three main components are:
Accessibility: Protocol:
The Internet is open and accessible to the public, It is the communication protocol used to transfer
allowing users to access a wide range of information, data between the client and the server
services, and resources worldwide. E.g. HTTP, HTTPS, FTP, and others
Intranets are restricted to internal users and typically Domain:
secured by firewalls and other security measures to it is the name of the server where the resource is
maintain the security of critical corporate data. located
Extranet provides authorized external users only it can be a name or an IP address
limited access, in contrast to the internet, which is Webpage/file name:
public, or the intranet, which is entirely restricted. To it is the location of the file or resource on the server
access the extranet, these users need a secure login. it can contain the name of the file or directory where
Purpose: the resource is located
The Internet acts as a hub for intercultural dialogue, A URL looks like this:
the sharing of knowledge, and access to a range of protocol://domain/path/filename
Internet resources, including websites, email, social E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is
media, online shopping, and more. a URL that consists of the HTTPS protocol, the
An intranet's main goal is to make it easier for domain name "www.hoddereducation.co.uk", the
employees to communicate, work together, and path is “IGCSE” and the filename is “ICT”
share information. A hyperlink is a word/phrase/image which references
Extranets make it easier for external stakeholders to data that the reader can follow by clicking or tapping,
collaborate and communicate with a company. It usually taking you to another web page
enables the organization and its reliable clients or A web browser is a software application used to locate,
partners to share information, documents, and retrieve, and display content on the WWW, including web
resources securely. pages, images, video, and other files
Many use the terms “Internet” and “World Wide Web” Use of Search Engines
interchangeably. However, they can’t be used in the same
context: There are two fundamental methods for obtaining
- The internet refers to the global network of computers information via the Internet. The first method is to enter the
and other devices connected through routers and servers. URL if you know the website's address. If you don't know
However, the World Wide Web is a collection of websites where to look, the second option is to employ a search
and webpages accessed via the Internet. engine to locate the information you seek.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Advantages of using the Internet to find information Although the internet provides much information, not all
information tends to be up to date because it is are genuine or dependable.
quicker and easier to amend Consider the source's reputation and trustworthiness
The Internet has vast amounts of information when determining the information's dependability.
searching for information using a search engine is Check the accuracy of information by comparing it to
fast and easy other reliable sources.
people can look for information in the comfort of Assess whether the information is skewed, keeping an
their own home eye out for views pushing a particular point of view.
information on the internet is essentially free of Check if the material is current, as obsolete information
charge might be deceptive.
webpages may have multimedia elements, making
learning more interesting Internet Protocols
Disadvantages of using the Internet to find
information Protocols are rules on which the sender and recipient agree
it isn’t regulated; anything can be posted when data is exchanged between devices.
always the risk of accessing inappropriate websites 1. Hypertext transfer protocol (HTTP): when a web page is
too easy to be distracted by the many distractions being accessed, entering http:// at the front of an address
available on the internet tells the web browser that ‘HTTP rules’ for communication
Some research skills are lost when using the internet, are to be obeyed.
as search engines do all the work for you. 2. Hypertext transfer protocol secure (HTTPS): A secure
version of HTTP that encrypts data for security.
Speed of Searching 3. File transfer protocol (FTP): network protocol used when
transferring files from one computer to another over the
Search engines may scan billions of online pages to internet. It is similar to HTTP, but the protocol specifically
locate matches to your search query in a fraction of a transfers files.
second. 4. Secure sockets layer (SSL): a protocol that allows data to
Your internet connection and the effectiveness of the be sent and received securely over the internet.
search engine's algorithms influence the speed.
Risks of Using the Internet
Amount of Information
Inappropriate and unlawful content: The internet may
Because search engines can deliver a deluge of attract people to potentially dangerous or illegal
information, utilising particular and relevant search materials.
phrases is critical. Data restriction: Parental, educational, and ISP
Adding quotation marks for specific phrases, "+" signs for restrictions can all be used to restrict access to specific
required terms, and "-" signs for omitting terms can help information or websites.
narrow the search.

Finding Relevant and Reliable Information


The search engine algorithm determines the relevancy of
information by considering parameters such as keyword
frequency & page quality.
Reliable information is often obtained from recognized
sources such as educational, government, or well-known
industry websites.

Evaluating Information Found on the Internet

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE
ICT

© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Arya on Fri Feb 14 2025 for strictly personal use only.
These notes have been created by Bisma Hammad for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).
ZNOTES.ORG

UPDATED TO 2023-2025 SYLLABUS

CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Arya for personal use only.
CAIE IGCSE ICT

Remember to follow all the instructions given to avoid


1. Document Production losing easy marks
Type in the name of the style exactly as it is in the paper
Click on the drop-down arrow in the Styles section →
1.1. Word Processing (MS Word) select Create a new style
Always base your styles on the Normal font
Serif – with flicks, e.g. Cambria ­Setting the line spacing → click on format → then
Sans-serif – without flicks, e.g. Calibri paragraph → select required options
One part of the document is 1 column, and the rest is in From the same tab, you can change the spacing before
two columns. a → section break. and after the paragraph
When you want to move text to the next column, a →
column break. Setting all capital letters → click on format → font → tick
To force all further text onto the next page → page break the option All Caps
A widow= single line that appears on the next page or
column, separated from the rest of the paragraph
An orphan = a single line that appears on the previous
page or column, separated from the rest of the
paragraph.
To add page numbers in the header/footer ------→ Place
your cursor where you want to put the number → Go to
insert tab → Quick parts → Select Numbering category
→ Select Page in field names → Click Ok
Add the file size/name (including file path) → click on
Quick Parts in the Insert tab → click on Field → select File
Size or File name. For file path →, check the box to
include file path. For file size →, choose whether
Kilobytes or Megabytes.
To set certain bullets to a list style → click on format →
Include date → click on Date & Time in Insert tab →
click on Numbering → Bullets tab → choose the required
choose an appropriate format as specified. (If the
option
date/month format is flipped →, change your region/
To indent text for a style → click on format → Paragraph
language settings on your computer to the United
and input required indents under the Indentation
Kingdom.)
section. Choose hanging indents to indent the whole
Update fields if required (select auto-update while
paragraph and the first line indents to indent only the
inserting fields.)
first line of a paragraph.

2. House Styles 3. Mail Merge


2.1. House Styles 3.1. Mail Merge

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Create a master document, which is mainly given as a While importing files, make sure you select text file and
source file not excel file, as .csv files are plain text.
In the master document, click on the Mailings tab When they ask for a set number of decimal places in a
In the start mail merge section, click on select recipients field, choose Fixed in Format.
→ select use an existing list → choose the source file
Select records to be used, filter if necessary

Ensure that the dates displayed in the table are in the


correct format under Table Design view.

Insert merge fields where indicated with chevrons, i.e.


Place automated current date and/or time, as well as
your name, centre number and candidate number where
specified. Ensure the date is in the correct format To form a relationship between two tables, go to the
specified. Relationships section of the Database Tools tab and
choose the required tables.

Spell-check and proofread the document.


Save the master document, and click finish and merge.
Preview results and ensure that they look as required. The calculations will ONLY work if placed in the report
While printing: footer. If Σ Total is used, then it appears automatically in
Check all merge fields are placed the report footer.
Field codes are visible if necessary. (Go to Advanced
settings so they are displayed when printing. Proof of
date inserted may be asked, right-click and toggle
field codes, or just use the shortcut Alt+F9.)

4. Data Manipulation
4.1. Data Manipulation (MS Access)

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

6. Data Analysis
6.1. Data Analysis (MS Excel)

Count the number of fields in a report =COUNT(\[Primary_field\])


Always use the primary field as it is the unique field
Sum of fields in a report =SUM(\[Field_name\])
Average of fields in a report =AVG(\[Field_name\])
Minimum of fields in a report =MIN(\[Field_name\])
Maximum of fields in a report =MAX(\[Field_name\])

afterbefore

5. Presentations
5.1. Presentation Authoring (MS
PowerPoint)

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
DESCRIPTION FORMULA
Add, Subtract, Multiply, Divide
SUM = Adding a range of numbers
=A1+B1
=SUM(A1:A4)
Anchors: help navigate throughout a webpage
AVERAGE - Find the average =AVERAGE(A1:A4) Highlight the destination of the anchor, and set a
MIN - Find the low value =MIN(A1:A4) bookmark
MAX - Find the highest value =MAX(A1:A4)
COUNT - Finding how many numbers are in a
=COUNT(A1:A4)
You can use
range
COUNTA - Counting the number of items in a
tags in your code around this text
range =COUNTA(A1:A4)
<div id="top"> Destination text </div>
INT - Converts to the lowest whole number =INT(A1)
ROUND - Rounding numbers =ROUND(A1,2) The 2 is the number of decimal Highlight the word or image that will be the hyperlink,
places
=ROUNDUP(A1,2) The 2 is the number of
click insert a hyperlink, and type the address of the
ROUNDUP - Rounding numbers up decimal places website, the bookmark, or the email address
=ROUNDDOWN(A1,2) The 2 is the number of
ROUNDDOWN - Rounding numbers down
decimal places provided in the respective places.
=VLOOKUP(A1,$B$1:$C$8,2)A1 is the cell to
VLOOKUP - Looking up what particular values check$B$1:$C$8 is the array to look in2 is If the link needs to open in a new window, select New
mean from a table arranged vertically column 2 from $B$1:$C$8 meaning return the
value in column 2 in that section.
Window from the target frame. This will give you a
=HLOOKUP(A1,$B$1:$G$2,2)A1 is the cell to target setting of "_blank."
HLOOKUP - Looking up what particular values check$B$1:$G$2 is the array to look in2 is row 2
mean from a table arranged horizontally from $B$1:$G$2 meaning return the value in
row 2 in that section.
=SUMIF($B$1:$C$8,A1, $D$1:$D$8)Checks if any
SUMIF – adding up specific values in a range cells in $B$1:$C$8 = A1 and if they do then it
adds them together
=COUNTIF(A2:A4,">4") Checks that cells have a
COUNTIF - Counts the number of cells in a value greater than 4=COUNTIF(A2:A4, A1)
range that satisfy the given criteria Checks that the cells are equal to the value in
cell A1
IF – Deciding what will go into a cell =IF($B$1:$B$8=A1,”A”)IF the value in A1 appears
in the range of cells then write A
=IF($B$1:$B$8=A1,”A”, IF($B$1:$B$8=A2,”B”,
Nested IF IF($B$1:$B$8=A3,”C”,D)))IF the value in the range
equals A1 then write A, if it equals A2 write B, A3
write C and none of them D
Average IF – it searches for criteria and makes =AVERAGEIF($D$4:$D$64,G3,$E$4:$E$64)$D$4:$
an average of the range according to the D$64 is the range, G3 is the criteria, $E$4:$E$64
criteria is the average range
SQRT – Square root of a number =SQRT(B3)B3 is the number

7. Website Authoring If there are specified dimensions for a table, use the
table properties to set these values.
Check the code to ensure that the table is not set to
7.1. HTML 100% width, if there are other values given.
To hide bullets from your webpage, add hidden after
your tag selector.
Font type h2 {font-family: “Times New Roman”}
Text size h2 {font-size: 16pt}
Aligning text h2 {text-align: center}
‘Bold’ text h2 {text-weight: bold}
‘Underline’ text h2 {text-decoration: underline}
Second choice of font h2 {font-family: “Times New Roman, Verdana”}
Adding generic fonts (either serif or sans-serif) h2 {font-family: “Times New Roman, serif”}h2
{font-family: “Calibri, sans-serif”}
Changing colour h2 {color: #000000}
Using classes to set styles. It can be used by right {text-align: right}
many selectors
Comment in HTML - text that is not read by the
computer, only for users
Comment in CSS - text that is not read by the /* Enter comment here */
computer, only for users

Colour codes have three parts:


(RED, GREEN, BLUE)

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Amount of Light (colour) Hex code
Fully on
¾ on
FF
C0
External CSS sheets are separate sheets that style the
½ on 80 webpage.
¼ on 40 To use, they are required to be attached to the main
Off 00
HTML file using the tag:
Examples: <link rel=“stylesheet” type=”text/css”
Pure red is (FF0000) href=”sourcefile.css”>
Pure green is (00FF00) The tag is placed in the head tag of the html file.
Pure blue is (0000FF) Several html sheets can be attached.
Pure yellow is (FFFF00) Preference is given to the sheet placed last in the
Pure black is (000000) head tag
Pure white is (FFFFFF) Format for external CSS
h1 { property: value ;}
HTML tag for e.g. h1 { color:#000000;}
Opening/closing head tag
Page title ↑ Element source is taken from HTML script linked
Attaching a CSS file <link rel=“stylesheet”
type=“text/css”href=“mystyle.css”>
Defining anchor tag CSS Tags
Setting default target window
Opening of the body/content
Table tag | border width as 1 | alignment Colours
centre

Colours can be in hexadecimal


7.2. CSS hashtag before the hexadecimal is mandatory
e.g. #000000
What is CSS? F full capacity
0 is the least capacity
Cascading style sheet Some colours can be written in words. Such as black or
Used to style webpages white.
Two types
Embedded/inline Fonts
External
Fonts are given priority from first to last in order
Embedded To add multiple fonts, add commas.
Eg. h1 { font-family: Arial, Calibri, sans-serif;}
Used to apply style properties within HTML sheet
Format: Tables
…style = “attribute: specification”>
Inline CSS for e.g. <table border=”1” style= Tables have many attributes to help style them
“width:200px”> Cell padding: creates space between text and cell
To add several attributes, add a semicolon to separate border
them and then use the same format Cell spacing: creates space between individual cells
For e.g. < table style= “width:29%; margin-left: Borders
auto**;**”> Background colour: background tags in the tables
For inline CSS, adding -style= “….”- is mandatory. only apply to the tables.
Individual td or th headings can also be specified in CSS
External

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Table tags format
cell padding
cell spacing
Table { padding :40px;}
Table { spacing : 30px;}
Enter data twice and compare them either after data has
Table { border-width:3px;} been entered or during the entry process.
borders Table { border-color: #000098;}
Table { border-style: solid;}
Table { background-color: #009499;} 15.2 Explain the need for validation as well as
td { font-size: 3;}
Td/th tags td { font-family: Calibri;} verification:
td { color: #000000;}
table { width:50px;} Validation only ensures that the data entered is in the
Dimensions table { height:60px;}
accepted format. Verification is needed to ensure
that the data entered is correct. Data entered may be
body { background-repeat: no-repeat;}
in the right format but of the wrong value. Or it may
body {background-position: top/left/right/bottom;}
be copied correctly but does not match the criteria.
h1 {text-align: left/right/top/bottom;}
17.1 Explain why it is necessary to use page, section and
column breaks, to adjust pagination and to avoid widows
8. Editing Images and orphans?
Page breaks and column breaks help remove widows
and orphans by forcing text onto the next page/
8.1. Editing Images column so it is all together.
It does not disrupt the reader by breaking the flow.
To save a picture with 8 bits - of colour depth, save it as a 17.3 Explain why mail-merged documents are created
gif Mail merged documents save time typing out
Open it in Paint and save it as individual letters, as the computer can personalize
To compress the size of a picture, open it in the picture them. Typing errors are also reduced since the
manager master document is only typed once. They can also
Edit picture be emailed using the address in the source file.
Compress pictures 18.1 Define the terms flat-file database and relational
Choose the most suitable option database.
To change the colour options of a picture, use picture Flat-files databases are tables that have data sorted
manager in rows and columns.
Edit picture Relational databases are several tables linked
Colour together, preventing unnecessary repetition of data.
18.1 Explain that other field types, such as placeholders
9. Answers to Theory for media, including images, sound bites and video clips
are used in commercial databases
Questions They are not studied in depth in this syllabus. They
are used in web applications where a back-end
database holds the media to be displayed in another
9.1. Answers to Theory Questions application, such as a webpage.
18.1 Discuss the advantages and disadvantages of using
relational tables rather than a flat-file database
Relational Database Flat file Database
Better security Poor at complex queries
Cater for future requirements Poor at limiting access
Data is only stored once Harder to update, so it is inherently inefficient
Requires more planning Potential duplication
Easy to design
Non-unique records
It is harder to change the data format.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
18.1 Define and understand the terms primary and foreign
keys and their role in a relational database. Tables make the basic structure of a webpage and
organise page layout.
Primary key: The key field of a table which is unique and
identifies each record 21.2 Define and understand the terms relative file path
Foreign key: The field linked to the primary field of the and absolute file path
table linked to a relationship Relative file path: A path referring to a file in the
same directory relative to the page the reference is
made in.
Absolute file path: The full path of a file which is not
relative to anything.
21.2 Explain why absolute file paths must not be used for
hyperlinks to locally saved web pages/ objects
Absolute paths always include the domain name of
the website
These should not be used to refer to locally saved
web pages as the computer the webpage is stored on
(the server) is not the same as where the webpage
was developed, and an absolute file path would point
to the wrong address.
21.3 Explain what is meant by the term cascading
stylesheets
CSS (cascading stylesheet) is a text-based language
which is attached to web pages to set their format.
CSS files have a “.css” extension
21.3 Explain the hierarchy of multiple attached
stylesheets and in-line styles within a web page
Internal CSS have more preference over Inline CSS.
Inline CSS overrides externally attached stylesheets.
If several external stylesheets are attached to one
web page, the stylesheet attached last (at the bottom
of that part of the code) is given preference (over the
other ones). Priority increases as you go down a list.
21.3 Explain why relative file paths must be used for
the attached stylesheets
They should be attached using relative file paths, as
they are stored along with the webpage since they
are stored in the same folder.
21.4 Explain how to upload and publish the content of a
website using FTP

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT

Used to upload website files to the web hosting space. To


upload these files successfully, the user needs:
FTP client software
All files in one folder
Host Name/URL/IP address for FTP
Host port to be used for upload
Username and password

21.4 Create a test plan to test a website including web


page elements are visible, navigation within/from a web
page
Open the webpage in different browsers to check
that all elements appear as they should.
Click all hyperlinks to ensure that they direct users to
the correct pages, using functional testing. Check that
both internal and external links are functional. Check
that fonts and background colours are appropriate to
the purpose of the website and its users (audience)
Perform user testing on a group from the target
audience, gain feedback from their usage, and use it
to improve the website before publishing it
21.4 Justify the choice of test plan
The test plan used to test a webpage must be
justified based on the tested elements. e.g. If
hyperlinks are being tested, it checks if all the
hyperlinks are redirecting the user to the correct
webpage/ section of the webpage.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE
ICT

© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Arya on Fri Feb 14 2025 for strictly personal use only.
These notes have been created by Disha Garg, Aishwarya Girish Kumar, Abdul Majeed, Sarah Bassiouny and Aliza Mirza for the 2023-2025
syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).

You might also like