IGCSE - ICT (0417)
IGCSE - ICT (0417)
ORG
CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Arya for personal use only.
CAIE IGCSE ICT
<b>Application software:</b>
1. Types and Components of Provides services that allow the user to do specific
tasks.
Computer Systems It can be general-purpose software or custom-made
software. (Specialist software)
E.g., Spreadsheets, databases, and word processors.
1.1. Hardware & Software <b>System Software:</b>
The software is designed to provide a platform all
<b>Hardware</b> other software to run on. For example:
1. Compilers: The software translates the High-
the electronic, physical components that make up a level language into Machine code (Language
typical computer system. These may include input and Processor).
output devices as well. 2. Linkers: A Software that creates the links
<b>Internal Hardware Devices:</b> between Language processors into workable
Central processing unit solutions (Data definition language).
Processor 3. Device drivers: A software that enables the
Motherboard device to work with another, externally
Internal memory consisting of RAM & ROM connected device.
Graphics & Sound Cards 4. Utilities: A system software that provides the
Internal Storage devices like Hard disk drives (HDD) necessary facilities (Antivirus, Scan Disk, Disk
and solid-state drives (SSD) Defragmentation, etc.)
Network interface card (NIC) 5. Operating systems: To enable computer
<b>External Hardware Devices:</b> systems to function and allow users to
Monitor communicate with computer systems, special
Keyboard software, known as operating systems (OS),
Mouse have been developed.
Printer
External Storage Devices <b>Analogue and Digital Data</b>
<b>Software</b> Computers can only understand data in the form of binary
digits (0,1); this is commonly known as digital data. However,
The techniques, methods, commands, and instructions data in the real world is analogue, not limited to two specific
tell the device what to do and how to do it. values.
They are the programs which control the computer
system and process data.
Relates to ideas & instructions for using physical objects.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
The figures show how data changes in analogue and 1. RAM is a temporary memory device, whereas ROM is
digital forms; analogue data forms smooth curves, a permanent one.
whereas digital data changes in discrete steps. 2. RAM is volatile, ROM is non-volatile.
So, for a computer to process real-world data, it first 3. RAM can be written to and from, but ROM can only
needs to convert the received data into digital form. This be read from.
is done by hardware known as ADC (analogue to digital 4. RAM is used to store data, files, programs, and parts
converter), and its output is given back in analogue form of OS that are currently in use. However, ROM is used
using DAC (digital to analogue converter). in storing start-up data,
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Mobile Computers
1. Laptop computer:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
(Or notebook) refers to a type of computer where the Allow normal phone calls to be made, but also have an
monitor, keyboard, pointing device and processor are all operating system (such as iOS, Android, or Windows),
together in one unit. This makes them extremely allowing them to run a number of computer applications
portable. lightweight (to aid portability). Low power (known as apps or applets). Smartphones communicate
consumption (and also long battery life). Low heat output with the internet either by using Wi-Fi hot spots or by
(cooling is very important). using 3G/4G/5G mobile phone networks.
Uses: Uses:
1. office and business work 1. They allow users to send/receive emails.
2. educational use 2. They allow users to use a number of apps.
3. used as a gaming device. 3. They allow users to use a camera feature (to take
4. general entertainment photos or videos).
Advantages: 4. They allow users to use an MP3/4 player (for
1. Portability: all components are in a single unit, so music and videos).
they can be taken anywhere. Advantages:
2. Because of one single unit, there are no trailing 1. very small in size and lightweight, makes them
wires and desk clutter. portable.
3. take up much less room on a desk, so they can be 2. connecting to the internet while on the move.
easily used in public spaces. 3. because they use Wi-Fi and mobile phone
4. portability allows them to take full advantage of networks, they can be used almost anywhere.
Wi-Fi features. 4. they have apps which can tell instant location,
Disadvantages: which is a feature that isn’t available in either
1. portability makes it easier for them to be stolen. desktops or laptops.
2. limited battery life means the user needs to carry 5. they have reasonable battery life.
a charger at all times. Disadvantages:
3. keyboards and pointing devices may be awkward 1. small screens and keyboards make pages difficult
to use. to read.
4. not easy to upgrade, like adding more RAM. 2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
2. Smartphones: the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops.
7. The data transfer rate using mobile phone
networks can be slower than with Wi-Fi.
3. Tablets:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Artificial Intelligence (AI): There are many definitions of Unemployment, robots are capable of doing tedious
artificial intelligence (AI). Essentially, AI is a machine or human tasks with much more efficiency and excellence
application which carries out a task that requires some than humans.
degree of intelligence. Dependency on technology could lead to problems in the
The use of language future.
recognizing a person’s face, the ability to operate De-skilling: Tasks that used to be considered a talent are
machinery, such as a car, aeroplane, train, and so on, now part of general, tedious processes that are done on
and analyzing data to predict the outcome of a future a regular basis by machines.
event, such as weather forecasting. Impact: Extended Reality refers to combined real and virtual
Whenever AI is mentioned, people usually think of environments. The two most common examples at the
science fiction fantasies and think of robots. The moment are:
science fiction writer Isaac Asimov even went as far Augmented reality (AR) is a merger between the
as producing his three laws of robotics: » Robots may virtual and physical (real) world; it lays objects onto
not injure a human through action or inaction. » pre-existing objects. e.g., Pokémon GO! Impact: safety
Robots must obey orders given by humans without and rescue operations’ training, shopping and retail
question. » A robot must protect itself unless it (getting a better look at a car before the purchase),
conflicts with the two laws above. Everyday uses: healthcare (better understanding of a patient’s body)
An autonomous (driverless) vehicle – we already have Virtual reality (VR) enables an entirely new world to
driverless trains and autopilots on aeroplanes, but be created, unlike AR, which has no link to the actual
future developments include driverless cars. surroundings of the user. It requires the user to be
Robotic research is leading to improvements in specially equipped with a VR headset, joystick, and
technology to help amputees and people with headphones.
disabilities. Impact: Military applications, educational
Robots are used to help people carry out dangerous purposes (looking at ancient buildings),
or unpleasant tasks – for example, bomb disposal. healthcare, media (interactive special effects in a
movie), scientific visualization (part of molecular
Negative impacts of AI structures/cells).
1. Keyboards:
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Advantages:
Sometimes, they have small keys, which can make input
Fast entry of new text into a document. more difficult.
Well-known method. Sometimes, the order of the numbers on the keypad is
Easy to use for most people. not intuitive.
Easier to do verification checks as data is entered (can
immediately compare the source document with typed
data on the screen).
Disadvantages:
Advantages:
2. Numeric keypads:
It is a faster method for choosing an option than a
Uses: keyboard.
It's a very quick way of navigating through applications
Automatic teller machines (ATMs), where the customer and the internet.
can key in their PIN, amount of money, etc. Does not need a large desk area when compared to a
Mobile phones allow phone numbers, etc., to be keyed keyboard.
in.
Point of sale terminals (POS) in case the barcode reader Disadvantages:
fails to read the barcode – the number has to be keyed in It can be more difficult for people with restricted
manually by the operator. hand/wrist movement than using a keyboard for data
Chip and PIN devices when paying by credit/debit cards. entry.
Fast entry of numeric data into a spreadsheet. Easy to damage, the older type of mouse quickly
Advantages: becomes clogged up with dirt.
Difficult to use if no flat surface is readily available.
Faster than standard keyboards when entering numeric
data.
Because many are small devices, they are very easy to
carry around.
Disadvantages:
4. Touchpad:
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Opening, closing and minimizing software Does not need the same fine control as a mouse.
Grouping, moving and deleting files. It is easier to use than a mouse if the operator has
Image editing, for example, controls the size and position problems with their wrist.
of a drawing pasted into a document. More accurately position the pointer on the screen.
Controlling the position of a pointer on the screen to They are more robust than a mouse.
allow selection. Needs less desk space than a mouse or keyboard.
Advantages: Disadvantages:
Faster than a keyboard for choosing options. It is not supplied with the computer as a standard;
Used to navigate applications and the internet. therefore, it is more costly.
Because the touchpad is integrated into the laptop Users may need training because it is not standard
computer, there is no need for a separate mouse; this equipment.
aids the portability and is a big advantage if no flat
surfaces are available.
Disadvantages:
6. Remote Control:
Uses:
Advantages:
Uses:
It can be operated from any reasonable distance.
A good alternative to a mouse for people with conditions In some conditions, e.g., in chemically hazardous
such as RSI. environments, we can control and measure from safe
Used in an industrial control room environment. distances.
Used in some luxury cars to select functions such as
radio. Disadvantages:
Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Advantages:
Difficult to use for people with limited hand/wrist
movements. It's a more realistic experience than both mouse and
Physical obstacles can easily block the signal. joystick.
Easier than a keyboard or joystick to control steering
movements.
Disadvantages:
It is a rather expensive input device as compared to a
mouse or joystick.
Steering movements tend to be over-sensitive, which
gives an unrealistic feel.
Unless it is an expensive simulator, feedback to the
steering wheel is non-existent.
7. Joysticks:
Uses:
Advantages:
9. Touch screen (as an input device):
It is easier than keyboards for screen navigation.
In some applications, the control is more realistic than Uses:
using a mouse.
Automatic teller machines (ATMs) to choose from on-
Disadvantages: screen options.
Point of sale terminals such as in restaurants.
The on-screen pointer is more difficult to use. Interactive whiteboards in education.
Computer-based training (CBT) where answers are
selected during on-screen testing.
Advantages:
Faster entry of options than using a keyboard or mouse.
Very easy method for choosing options.
User-friendly method – no training necessary in its use.
Option to expand the size of the display if necessary.
Disadvantages:
8. Driving wheel:
Uses:
Used in video games, especially car racing games.
Used in simulators to mimic actual vehicle controls.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
A limited number of input options are available. Limited quality, depending on how good the scanner’s
This can lead to problems if an operator uses the system resolution is.
frequently (straining of arm muscles, RSI, etc., are all Fairly slow input method, especially if color mode is
possible). selected.
The screen can get very dirty with constant touching.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Need to be computer literate to know proper use. Temperature sensors are used in automatic washing
Loss of artistry due to clever software doing all the work. machines, central heating systems, ovens, and
Images need to be compressed to reduce the amount of glasshouses.
memory used. Pressure sensors are used in intruder alarm systems and
washing machines.
Light sensors are used in automatic glasshouses, doors,
and street lighting control.
Sound/acoustic sensors are used in intruder alarm
systems, monitoring liquid and powder flow in pipes.
Humidity/moisture sensors are used in automatic
glasshouses, environmental monitoring, and in factories
where moisture levels are crucial.
pH sensors are used in automatic glasshouses, chemical
processes and environmental monitoring.
Advantages: Disadvantages:
It is faster to read text than it is to type it in. Faulty sensors can give spurious results.
It is possible to manipulate sound in real time rather Most sensors are analogue; therefore, they require
than working on a completed recording. conversion using Analogue to Digital Convertors.
It improves security if used as an authentication system.
14. Light pens:
Disadvantages:
Uses:
Sound files use up a lot of computer memory.
Reading data is more error-prone than typing in. Selecting objects on CRT screens
Drawing on screens
Advantages:
13. Sensors:
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Lagging problems while drawing on the screen. It is more secure than contactless cards as the PIN acts
It only works with CRT monitors. as a second security layer.
Rather outdated technology. More robust system than Magnetic Stripe Cards
Disadvantages:
On credit/debit card for use at ATMs 3. Radio Frequency Identification (RFID) reader:
Security device to allow entry to buildings, hotels, etc.
Uses:
Advantages:
Livestock tracking
Faster than keying in data manually. Retail, instead of barcodes, as they don’t need to be
Error-free, no human intervention needed. scanned in.
Secure information isn’t in human-readable form. Admission passes.
Robust, there are no moving parts. Library books, to acknowledge the books which have
been borrowed.
Disadvantages:
Advantages:
If the card is damaged, the data is lost.
Doesn’t work at a distance. No line-of-sight contact is needed.
As the information isn’t human-readable, this can be a Very robust and reliable technology.
disadvantage in some cases. Very fast read rate.
Bidirectional data transfer.
Bulk detection is possible.
Disadvantages:
Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal.
RFID is more expensive than a comparable barcode
system.
2. Chip and PIN reader:
4. Optical Mark Reader/Recognition (OMR):
Uses:
Uses:
Where payments are made using cards
Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Advantages:
Disadvantages:
Advantages:
Advantages:
It is a much faster data entry system than manual typing.
No human intervention, its error free.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
used in advertising to contain information about the They are very heavy and bulky.
advertising company. They run very hot and can cause fires if left unattended.
Wi-Fi authentication They use a lot more power than LCDs.
Used in restaurants, you can see the menu by scanning. Their flickering can lead to headaches.
Image burn-in is a common issue.
Advantages:
Disadvantages:
More than one QR format is available.
QR codes can be used to transmit malicious data.
Advantages:
Very efficient, low power consumption.
Lightweight devices.
Screens can be made in various sizes.
No flickering images.
Very sharp image resolution.
2.3. Output Devices and Their Uses
Disadvantages:
1. Cathode ray tube (CRT) monitors:
Uses:
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Colour and contrast from different angles are They tend to get dirty with frequent use.
inconsistent. Frequent use results in straining of arm muscles, RSI, etc.
Motion blur is a common issue. If large amounts of data are input/output, they aren’t
Lower contrast than CRT monitors. very accurate, and the interface isn’t very fast.
Disadvantages: Disadvantages:
Images can be fuzzy.
Expensive to buy.
Set-up can be complicated.
5. Laser printers:
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
In uses where low noise is required. Slow output if many copies are needed.
If fast, high quality, high-volume printing is required. Can’t do large print jobs.
Printing can smudge if user isn’t careful.
Advantages: Can be expensive if used a lot.
Printing is fast.
They can handle very large print jobs.
Quality is consistently high.
Toner cartridges last for a long time.
Disadvantages:
Advantages:
Can be used in varying environments unlike laser/inkjet
printers.
Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
6. Inkjet printers: Good for continuous printing.
Uses: Disadvantages:
Advantages:
High-quality output
Cheaper than laser printers.
Very lightweight
Don’t produce ozone and volatile organic compounds.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Uses:
Very noisy
Initial cost is more than an inkjet printer. Custom-made prosthetic limbs.
Very slow, poor-quality printing. In aerospace, if parts of the aircraft are made using 3d
printers they can be very lightweight.
Making spare parts for items that aren’t now
manufactured, e.g., parts of a vintage car.
Advantages:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Speaker output can disturb irrelevant people in the same Holds data magnetically.
area, e.g., an office. The surface area of the media is magnetised so that it
Sound quality is high only expensive speakers. can hold bits of data.
They take up a lot of desk space. The device that reads media can also read the bits held
on the surface area
Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Can be used as a backup system to prevent data loss. It can be written over many times.
It can be used to transfer data/files/software between You can use different file formats each time it is used.
computers. It is not as wasteful as the R format because the
files/data can be added later.
Advantages:
Disadvantages:
Data access time and data transfer rate are very fast.
It has a very large memory capacity. It can be relatively expensive media.
It can be used as a method of transferring information Possible to accidentally overwrite data.
between computers.
CD-ROM/DVD-ROM ~ Read Only Memory
Disadvantages:
Uses:
They can be easily damaged if user accidentally drops it
or doesn’t correctly shut down the drive after use. These are read-only memory (ROM), which means they
The data transfer rate is not as fast as for fixed hard disk can’t be written over and can only be read. Permanent
drives. storage method.
CD-ROM is used to store music files and to store
3.3. Optical Media and Optical Storage software, computer games and reference software.
DVD-ROM has much larger storage and is used to store
Devices films.
Used in applications where there is a real need to
Holds data by burning ‘dots’ onto the surface with a high- prevent deletion or overwriting of important data.
powered laser.
The data that reads the media can read the data by Advantages:
shining a lower-powered laser over the dots.
They are less expensive than hard disk drive systems.
CD-R/DVD-R ~ Write Once Only They are very portable as they are small and light.
Data stored on them is read-only, so it cannot be
Uses: accidentally overwritten.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Uses: Uses:
Home video consoles. Transporting files between computers or using them as a
Storing and playing back movies. backing store.
Computers can use this technology for data storage or Used as a security device to prevent software piracy
backing hard drives. (known as a dongle).
Camcorders can use this media to store movies.
Advantages:
Advantages:
Very compact and portable media.
Very large storage capacity. Very robust.
Very fast data transfer rate. Does not need additional software to work on most
The data access speed is also greater than with other computers.
optical media. They are not affected by magnetic fields.
Blu-ray discs automatically come with a secure
encryption system. Disadvantages:
Holds data on devices that don’t have any moving parts. Different types of memory cards:
» SD cards (secure digital card)
Solid-state drives (SSD) » XD cards (extreme digital card)
» CFast card (compact, fast card).
Uses: Uses:
Storage device to store files, applications, OSs, and so on. Storing photos on digital cameras.
Used as mobile phone memory cards.
Advantages: Used in MP3 players to store music files.
Used as a backing store in hand-held computer devices.
They are more reliable as they have no moving parts.
They are considerably lighter and suitable for laptops. Advantages:
They do not have to ‘get up to speed’ before they work
correctly. Very compact.
They have lower power consumption. Because they have no moving parts, they are very
They run much cooler than HDDs. durable.
Because they have no moving parts, they are very thin. They can hold large amounts of data.
SSD data access time is only 0.1 milliseconds compared Compact cameras and smartphones can read and write
to 10 milliseconds for HDD. memory cards, allowing users to transport extensive
Data transfer speed for SSDs is also much faster than for collections of photographs, songs, etc.
HDDs. Disadvantages:
Disadvantages:
SSD endurance - SSDs are conservatively rated at only
20GB write operations per day over three years.
More expensive than magnetic hard disks.
Smaller storage capacity than magnetic hard disks.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Expensive per gigabyte of memory when compared to Each NIC is given a unique hardwired media access
HDDs. control (MAC) address.
Have a lower storage capacity than hard disks. Media access control (MAC) address: a number that
Have a finite life regarding the number of times they can uniquely identifies a device when connected to a
be read from or written to. network.
Memory cards, specifically the micro SD card, are the The first six hex digits identify the manufacturer’s code,
smallest sized devices available, making them more likely and the next 6 identify the device’s serial number.
to be lost, stolen or damaged. The storage should be
sized cause the amount of storage does not prevent the 2. Hubs: they are hardware devices that can have
drive from being stolen several other devices connected to them. They are
Users must often purchase a card reader or USB used to connect devices together to form a local area
converter to view the data. network (LAN). It takes a data packet received by one
of its ports and sends it to all relevant or irrelevant
devices that are connected to it.
4. Networks & the Effects of It is not very secure to broadcast data to all devices.
Using Them Unnecessary network traffic.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Bridges connect LANs together; routers connect various 1. Public Cloud - The customer and the cloud storage
types of networks together. provider are different companies.
Bridges scan MAC addresses while routers scan the IP 2. Private Cloud - The customer and the cloud storage
addresses. provider are a single organization.
Both send out data in the form of data packets. 3. Hybrid Cloud - Combines public and private cloud
Bridges connect networks with the same protocol; options and allows sensitive data to remain private
routers can connect networks with different protocols. while providing public cloud services for less sensitive
The router uses routing tables to direct data packets, but information.
bridges don’t.
Bridges have only two ports; routers have multiple ports. Cloud data is duplicated and stored on other servers to
ensure availability during system failures, upgrades, and
Wi-Fi & Bluetooth maintenance.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Characteristics:
Private Intranet that also allows access by selected
It is an open network, meaning everyone can access the parties that reside outside of the organization. These
same resources and information as everybody else. parties, for example, maybe customers, key stakeholders
People from all over the world can communicate with or clients.
each other in real-time. Users will have an authorization level once they have
Available to anyone who has a suitable device and access successfully logged in, which will determine which
to any one of the interconnected networks. resources they may access.
Similarities between the Internet, Intranet and extranet
Uses: are as follows:
Education and training They are all web-based technologies
Social Networking They allow users to access information remotely
They all use client-server architecture
Online shopping
Entertainment They all use security measures such as
authentication and encryption
2. Intranet: They all promote and facilitate information and
resource sharing
Usually private and are used to send information Differences between the internet, intranet and extranet
securely and safely. are as follows:
Access to an organization’s Intranet is restricted and only The internet is a global network, whereas an
accessible to authorized users such as employees. intranet/extranet is a private network contained
Intranets have many advantages over the internet, such within an organization
as: The use of the internet covers a wide range of
better bandwidth than the internet, purposes, whereas an intranet/extranet is designed
data is kept within the organization, for specific users and purposes.
less chance of hacking and attacks, Much information is publicly available, whereas an
administrators can manage access to external sites intranet/extranet is not.
and links. The Internet is not owned solely by one person or
organization, whereas the organization usually owns
Characteristics: intranets/extranets.
A private network that is accessible to employees within Network Types
a company or organization.
Usually behind a firewall to ensure security. 1. Local Area Network (LAN): networks usually
Allows for document sharing and the use of contained within a single building or small
collaboration tools between users. geographical location. It is made up of hubs and/or
It can be customized to meet the specific requirements switches, which will connect several devices together.
of the business. One hub or switch commonly connects to a router,
Users will require a username and password to access allowing LAN connectivity to other outside networks
the Intranet. such as the Internet.
3. Extranet: Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Allows centralized management of updates, backups and 3. Wide Area Networks (WAN): is formed by several
software installations. LANs connected through a router. It is expensive.
Can secure its devices with the use of firewalls, antivirus However, it comes with a more enhanced security.
software and other security features to prevent Additional hardware is needed for a WAN: Routers,
unauthorized access. modems, and proxy servers.
A LAN allows users on the network to share resources
such as printers and other peripherals. Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
There are many ways to enhance the security of your 1. Zero login: A security concept that eliminates
password, such as the following: traditional login methods, such as usernames and
Ensure that the password is changed regularly in case passwords, using biometrics or other authentication
it has been obtained illegally or accidentally factors for seamless and password-less access.
Ensure that the password uses a combination of 2. Biometric Recognition: These authentication
uppercase, lowercase, numbers and special methods use unique physical or behavioural
characters to make the password more difficult to characteristics, such as fingerprints, iris scans, or
guess. voice recognition, to verify a person's identity.
iloveict is a weak password 3. Magnetic Stripes: These are authentication features
1lov3ICT# is a strong password on cards storing data magnetically. They enable
Anti-spyware software can be run regularly to ensure secure identification and authorization by containing
that your information, including your password, is not encoded information that magnetic stripe readers
passed to an unauthorized third-party user. can read.
4. Smart Cards: Smart cards are portable devices with
Other Authentication Methods integrated circuits to store and process data. They
are used for authentication, identification, and secure
transactions in various applications such as banking,
telecommunications, and access control.
5. Physical Tokens: It is a type of authentication that
takes the shape of a solid object. The user
demonstrates ownership of the token through
interaction with a login system. Physical tokens have
embedded clocks that create one-time passwords
(OTPs) when a PIN and other authentication
information are entered.
6. Electronic Tokens are applications that users install
on their hardware, such as smartphones. Say a
person wants to access a website on a tablet
computer. To access this website, users must first
authenticate themselves using electronic tokens. The
user has already set up the electronic token app with
their smartphone. The user launches the app on their
smartphone when the website asks them to verify
their identity. The program creates an OTP that is
only good for a short period of time.
Anti-malware Software
Anti-malware software is designed to protect devices
against viruses and malicious software. It has 3 primary
purposes: detect, prevent and remove malicious
software. It is installed onto a computer system and will
operate in the background.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Standard features of Anti-Malware software include the Disadvantages:
following:
Potential time lag in responses/delays when talking.
Comparing the scanned files against an extensive Images can jerk.
database of known threats It is very expensive to set up in the first place.
Real-time scanning Problems if the delegates live in different countries with
Regular updates to gather an up-to-date list of known large time zone differences.
threats Requires IT knowledge to some extent.
Quarantine of infected files It's not the best for people who consider travelling a job
Quarantining files allows threats to be automatically perk.
deleted. Completely reliant on stable internet connections.
Allows the user to determine if the file is a legitimate
threat and not a false positive. 2. Audio Conferencing: Meetings held using audio
(sound) technology are called audio conferencing.
Heuristic Checking: Instead of relying solely on a database The normal telephone network can be used for audio
of known viruses, this method looks for behavioural patterns conferencing, frequently called a phone conference.
and other features in a file to identify possible risks.
The hardware required is:
Electronic Conferencing a computer (with built-in microphones and speakers)
1. Video Conferencing: It is a form of audio and video external microphone and/or speakers
communication. It serves as a stand-in for face-to- an internet phone
face meetings between several persons who may a standard phone.
reside abroad or in another region of the country. It Advantages:
utilizes a network in some way and is done in real-
time. Allows participants to join meetings from any location.
Eliminates the need for travel expenses, such as
The basic hardware includes: transportation, accommodation, and meals.
webcams, Saves time by eliminating travel time and allowing
large monitors/television screens, meetings to be scheduled and conducted quickly.
microphones, Disadvantages:
speakers.
Lacks the visual aspect of face-to-face meetings, which
The software used are: can hinder communication.
Webcam and microphone software drivers It can limit interaction and engagement compared to in-
CODEC (coder and de-coder) person or video conferencing.
Echo cancellation software Heavily relies on technology, and technical issues such as
poor audio quality, background noise, or connectivity
Advantages: problems are common.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Social Interactions
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
The positive aspects include: Consider an autonomous vehicle approaching a set of
red-lighting traffic signals.
easier to make new friends using chat rooms
easier to find people who share similar interests/hobbies The vehicle's control system must first recognize the
less expensive to keep in touch using VoIP technology. road sign before consulting the database to determine
the appropriate action.
The negative aspects include: The CPU must instruct the actuators to apply the brakes
and put the gear in "park" since the traffic light is red.
people do not meet face-to-face as much (social
isolation) The light must be continuously watched until it turns
a lack of social interaction may make people more green.
anxious about meeting people in real life After that, the CPU will again tell the actuators to engage
When communicating online, people can act less politely first gear, let go of the brakes, and open the throttle
(accelerator).
or more harshly, and cybercrime is a serious issue,
especially for teenagers. Advantages of an autonomous car, bus, or van:
Monitoring and Controlling Transport safer due to the removal of human error
due to the more efficient operation of vehicles, it is
Uses: better for the environment
reduced traffic congestion
monitoring traffic on motorways increased lane capacity
congestion zone monitoring
reduced travel times
automatic number plate recognition (ANPR)
stress-free parking for motorists
automatic traffic light control
air traffic control systems Disadvantages:
railway signalling systems
very high installation prices
Advantages of transport monitoring and control driver and passenger reluctance of the new technology
systems: reduction in taxi requirements could lead to
unemployment
smart motorways keep updating according to changing
maintenance of the sensors and cameras is crucial
traffic conditions the ever-present fear of hacking into the vehicle’s control
more efficient system
traffic offences can be remotely penalized using ANPR
car thefts can be spotted using ANPR Advantages of an autonomous train:
minimizes human errors, reducing the rate of accidents
improved punctuality
Disadvantages: reduced running costs due to fewer staff
no human error
If a hacker breaches security, the vehicle could be minimized energy consumption
controlled by them.
possible to increase the frequency of trains as the
The system might come to a halt if it malfunctions.
possibility of delays is removed
Systems with a poor design could compromise safety. more straightforward to update changes in train
The easy tracking of harmless people's movements is schedules
made possible by ANPR equipment. Who can access such
data? Disadvantages:
Autonomous vehicles in transport
To properly execute their activities, autonomous cars
require sensors, cameras, actuators, microprocessors (along
with very complex algorithms). Automobile control systems
can accomplish essential tasks by sensing information from
cameras and ultrasonics.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Minimizing health risks: use LCDs instead of CRTs, take
fear of the system being hacked into regular breaks, use anti-glare screens, and do regular eye
initial instalment costs are very high testing.
ensuring passenger behaviour is vital, especially during 4. Headaches: pain or discomfort in the head or face area.
rush hours. Cause: incorrect lighting, screen reflections, flickering
human reluctance to new technology screens, etc.
without drivers, CCTV monitoring will be continuously Minimizing health risks: use anti-glare screens, take regular
required breaks, regular eye-testing.
Advantages of autonomous aeroplanes: 5. Ozone irritation: inflammation and irritation of the
tissues lining human airways
improvement in passenger comfort Cause: inhalation of ozone released by laser printers in an
reduced running costs, fewer staff office.
as most accidents are due to pilot-induced errors, safety Minimizing health risks: proper ventilation, laser printers
is improved should be housed in a separate room, replace laser printers
improved aerodynamics as an outcome of the removal of with inkjet printers, if possible.
the cockpit
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Collection of webpages, text, graphics, video, and sound Real-time transition of audio and video files over the
Hosted on a web server on the internet internet
Need to write code or use a web authoring application allows users to access content without downloading it to
Hyperlinks to other pages can be added their devices
Interactive websites require programming knowledge popular services include Spotify, YouTube, and social
Can use a camera, scanner, and microphone to input media websites
data uses buffering, which makes sure the video plays back
Usually, hire space from the web hosting company smoothly without freezing. While the buffer receives data
Advantages packets, it sends previously received ones to the
Ability to add sound/video/animation playback device so that there are no gaps in the played
Links to other websites/hyperlinks data
The use of hot spots Advantages
Buttons to navigate/move around the website Users can access any information at any time and
Hit counters to see who has visited the websites from any location
worldwide advertising capability Offers an extensive library of content
Disadvantages Compared to traditional cable or satellite TV
Can be hacked and modified, or viruses introduced subscriptions, media streaming can be more cost-
Need for a computer and internet connection effective
Lack of portability compared with the paper-based Disadvantages
system Heavily relies on a stable and high-speed internet
Need to maintain the website once it is set up connection.
Not all content is available on every streaming
Multimedia Presentations platform due to licensing agreements and exclusivity
deals.
Uses a mixture of media to present information: You don’t own the media when streaming media, so if
animations, video, sound, transitions, hyperlinks the streaming service removes a movie or a TV show
Produced using software packages from its library, it may no longer be accessible to you.
Used with a projector so a large audience can view
Advantages ePublications
Use of sound and animation/video effects
Interactive/hyperlinks built into presentations
More likely to hold the audience’s attention
Disadvantages
Need for special equipment – expensive
It may require internet access
Distracts the audience from the sole content of the
presentation
It is very easy to make a presentation with too many
features
Media streaming
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
5. Accessing the Internet: Another helpful feature is
digital versions of printed materials, such as eBooks, accessing the net from a mobile device. Any mobile device
eMagazines, and eNewspapers. with a wireless broadband connection or a mobile phone
It can be read on electronic devices. network can link to the internet.
Advantages
aid portability
they are often more affordable than paperback 6.2. Modelling Applications
books.
Offer interactive elements that enhance the reading Advantages of using models:
experience. using models is less expensive than having to build the
Disadvantages real thing
reading from an electronic device for a prolonged safer to use a computer model
time can cause eyestrain allows you to try out various different scenarios in
ePublications lack the tactile experience and physical advance
presence that some readers enjoy nearly impossible to try out some tasks in advance in real
compatibility issues can arise if the ePublications is in life due to high risk
a format that is not supported by the reader's device faster to use a computer model than to do the real thing
or software
Disadvantages of using models:
Mobile Communication
a model can’t be completely reliant as the output is
Mobile devices support many forms of communication, such entirely based on the input
as: frequently, computer modelling can be a very costly
1. Short message service (SMS) messaging: permits option
extremely quick communication with another person via human reluctance is a common problem in this
typing on a keyboard (a mobile phone or tablet's keyboard is technology
frequently virtual). Its benefit is that the recipient can get the
text whenever they choose without being available. Some of the applications of computer modelling include:
2. Phone calls: Making calls while on the go is among the 1. Personal finance: Computer modelling involves using
most fundamental applications of a mobile phone. Mobile mathematical algorithms and data analysis to simulate
phones are the perfect method to stay in correspondence various financial scenarios, such as investment strategies,
anywhere there is a network signal because they are retirement planning, and risk assessment, aiding individuals
compact and have an independent battery. in making informed decisions and optimizing their financial
3. Voice over Internet Protocol (VoIP): a communication goals.
technique for Internet users. VoIP transforms sound 2. Bridge and building design: Computer modelling is
captured by the built-in mic of the cell phone into individual crucial in bridge and building design. It allows engineers to
data packets that may be transmitted via the internet to simulate and analyze structural behaviour, assess load
their intended recipient. capacities, and predict the response to external forces. It
4. Video calls: enables real-time video conversing between aids in optimizing designs, ensuring structural integrity, and
multiple participants with a camera-enabled device. Uses an minimizing potential risks before construction begins.
internet connection or cellular data. Software that may be 3. Flood water management: Computer modelling plays a
used for video calling includes FaceTime, Skype, and Zoom. vital role in flood water management by simulating water
flow behaviour, predicting flood extents, and assessing
potential flood risks. It helps design and optimise flood
mitigation measures, such as levees and floodplain zoning,
allowing authorities to make informed decisions, develop
effective emergency response plans, and minimize the
impact of flooding on communities.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
4. Traffic management: Computer modelling simulates and
analyses traffic flow, predicts congestion patterns, and 6.4. School Management Systems
optimises traffic control strategies. It aids in designing
efficient road networks, optimizing signal timings, and Computer-controlled School Management Systems:
evaluating the impact of transportation infrastructure Comprehensive software applications that automate
projects. This enables authorities to make informed administrative tasks, such as attendance tracking, grading,
decisions, alleviate congestion, and improve overall traffic scheduling, and student information management,
efficiency for better urban mobility. improving educational institutions' efficiency, accuracy, and
5. Weather forecasting: Computer modelling plays a pivotal organization.
role in weather forecasting by simulating the Earth's
atmosphere, oceanic conditions, and other environmental
factors. These models use complex algorithms to predict
weather patterns, including temperature, precipitation, wind
speed, and storm systems. By assimilating real-time data,
computer models provide forecasts that aid meteorologists
in predicting weather conditions, issuing warnings, and
helping society prepare for potential hazards.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Several credit/debit cards come with a magnetic stripe and a
chip; the chip houses essential data like the PIN. This Advantages:
technique is intended to increase security because it is more convenient and safer than cash
superior to a signature. A chip and PIN card to make can be post-dated
purchases is an example of an electronic funds transfer can be traced if they are lost
(EFT). Disadvantages:
aren’t legal tender and can be refused
Advantages of credit cards: slow method of payment
customer protection if ordered goods don’t arrive easier for fraudsters than other methods
internationally accepted payment method relatively expensive payment method
interest-free loan if money is paid back within the
agreed time period Internet Banking
can make purchases online
Disadvantages of credit cards: Enable online access to banking services via a secure
can be charged high interest rates website or app, allowing for transfers, bill payments, account
annual fees often apply management, and more.
easy to end up with credit damage
security risks in online transactions Advantages:
Advantages of debit cards: convenience and availability
easy account management
money comes from the user’s current account, there
branch visiting won’t be a requirement
is no interest
interest rates may be better
safer than carrying cash
can make online purchases more accessible to shop around for the best account
Disadvantages of debit cards: Disadvantages:
security of transactions
less customer protection if goods don’t arrive
requires a reliable internet connection
no credit allowed; funds are needed at the time of
More risk of fraud
purchase
security risks in online transactions Easier to make errors
Physical cash can't be deposited/withdrawn
Cheques
6.7. Computers in Medicine
Individuals and organizations use cheques as a form of
payment. When issuing a cheque, the payer writes the Information Systems in Medicine
recipient's name, the payment amount, and the date on the
cheque. The recipient then deposits or presents the cheque Patient records: Healthcare professionals maintain
to their bank for processing. The payer's bank verifies the databases to communicate information between them
fund’s availability, and upon clearance, the specified amount and pharmacists (for instance, to guarantee no
is transferred from the payer's account to the recipient's medications are administered that interact dangerously
account, completing the transaction. with one another).
Pharmacy records: Pharmacy records maintain a
comprehensive record of patient prescriptions. This
includes details like the prescribed medication, dosage,
quantity dispensed, prescribing physician's information,
and the date of dispensing. These records help track
medication usage and can be used to verify prescription
accuracy and detect potential drug interactions or
allergies.
3D Printers
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
5. Rules base
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Below is an example of how an expert system works to
diagnose a medical issue: Use of chip and PIN cards:
Enhance security with two-factor authentication
The interactive screen asks questions for the doctor to Require customers to enter a personal identification
answer using a keyboard or a touch screen. number (PIN)
The inference engine compares the symptoms with the Use of contactless cards:
knowledge base, using the rule base to find matches. Allow for faster transactions
The system suggests the possible illness with a Enable customers to tap their card on the terminal
probability of each, cures, and recommendations on the Use of Near Field Communication (NFC):
next step. Facilitate payments through smartphones and other
The explanation system will explain how that particular devices
diagnosis was suggested. Increase convenience for customers
Communication between supermarket computers and
6.9. Computers in the Retail Industry bank computers:
Share transaction details securely
Point of sale (POS) terminals: Computerized systems used Enable instant payment processing and verification
at checkout counters to handle purchases and oversee
stock. It is extensively used in retail stores to process sales Internet Shopping
transactions. They enable quick and secure payment
Characteristics of Internet Shopping:
processing through various methods, including cash,
credit/debit cards, mobile payments, and digital wallets. POS Online stores accessible through web browsers
terminals calculate totals, generate itemized receipts, A wide variety of products and services are available
update inventory, and provide real-time sales data for Convenient and often open 24/7
effective business management.
Advantages (To customer):
Some features include:
update stock files immediately access to the global market
track inventory levels in real-time comparison between different products effortlessly
prevent stock discrepancies and ensure accurate can shop from anywhere in the world
records able to avoid queues and busy stores
monitor inventory levels and reorder when stock is
lower than a predefined value Advantages (To business):
streamline supply chain management and minimize can target prices and services based on buying data
stockouts can update stock availability and prices more quickly
Electronic funds transfer at Point of sale (EFTPOS) than a physical store
terminals: Devices for processing electronic payments; they cheaper to publicize special offers
allow customers to make payments using debit or credit international customer base
cards by securely transferring funds from their bank increased profits due to lower staff
accounts. EFTPOS terminals authenticate and authorize Disadvantages (To customer):
transactions in real-time, providing convenience and security
for customers and businesses during retail purchases. security concerns
The process of checking credit and debit cards at a can’t correctly examine products before purchase
supermarket EFTPOS is much the same as was described for occasionally, products may take weeks before being
paying a restaurant bill in Section 6.6. delivered
Some functions of EFTPOS include: additional shipping and handling costs
lack of face-to-face interaction with staff
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
3. RFID in tracking stock:
increased competition
digital fraud and security concerns
technical issues and downtime
costs of delivery and return
fake negative reviews can lead to a lousy company
reputation
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
4. Near Field Communication (NFC):
Used to determine the exact location of several modes of
Enables short-range wireless communication between transport
devices. Cars usually refer to GPS as satellite navigation systems
Allows payment using a smartphone. Satellites surrounding the Earth transmit signals to the
Advantages: surface
Convenient and secure method of payment Computers installed in the mode of transport receive
allows for contactless transactions and interpret these signals
Disadvantages: Knowing their position on the Earth depends on very
Limited range accurate timing – atomic clocks are used in the satellites,
compatibility issues with some devices which are accurate to within a fraction of a second per
day
5. Biometric recognition: Each satellite transmits data indicating its position & time
Usually refers to automated technologies for The computer on board the mode of transport calculates
authenticating and verifying human body characteristics its exact position based on the information from at least
such as face, iris, retina, finger, thumb, hand and voice. three satellites
Advantages: Satellite Navigation (satnav):
very high accuracy
very easy to use Used to determine the exact location of a car.
very fast verification time The computers onboard can be used to show directions
non-intrusive method to a destination.
relatively inexpensive technology
Disadvantages: Advantages:
it can make mistakes if the skin is dirty or damaged
Better focus as there isn’t a need to constantly check
very expensive to install and set up paper maps.
uses a lot of memory for the data to be stored Reduces fines by warning drivers about upcoming speed
a person’s voice can be quickly recorded and used for changes.
unauthorized access The system shows an Estimated Time of Arrival (ETA).
an illness, such as a cold, can change a person’s
It is possible to program in the fastest route to avoid
voice, making absolute identification difficult or towns.
impossible The system can also give helpful information such as the
location of petrol stations.
6.11. Satellite Systems
Disadvantages:
Global Positioning Systems (GPS) If the maps are not updated, they can give incorrect
instructions.
Road closures due to accidents or roadworks can cause
problems.
The loss of satellite signals can cause problems.
The system will give incorrect information if an incorrect
start-point or end-point is keyed in.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Used to capture, manage, analyze, and display There is a time delay in receipt of the signals.
geographically referenced information. The signals received can be affected by bad weather.
Use to determine the distance between two places. Sunspot activity can affect the performance of a satellite.
Used to find the nearest petrol station or restaurant, etc. They must be monitored and controlled regularly to
To protect animal and plant life in certain vulnerable remain in the correct orbit.
places.
It can be used in geography, science, or engineering
lessons. 7. System’s Life Cycle
Advantages:
7.1. Stages of Sytem's Life Cycle:
Allows geographical and thematic data of any kind to be
combined to show how they are connected to each 1. Analysis
other. 2. Design
It allows the handling and exploration of vast amounts of 3. Development & Testing
data. 4. Implementation
It allows data to be integrated from a wide range of very 5. Documentation
different sources. 6. Evaluation
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
It is vital to identify the suitable hardware needed for the Data capture forms: These are designed to collect data
new system from users in a structured format. They come in two
contemplating system requirements, compatibility, types: paper-based and electronic-based. Paper-based
costs data-capturing forms must be carefully designed with
justifying choices based on user needs and system headings, concise instructions, character and
performance information fields, checkboxes, and enough writing
Hardware that needs to be considered: space. Text boxes, on-screen help, drop-down menus,
barcode readers, radio buttons, automatic validation, and control buttons
scanners, for data entry are all features of computer-based forms.
touch screens, Consider a user-friendly layout, clear instructions, and
3D printers, appropriate data fields.
monitors,
speakers. Output Formats
Identifying suitable software needed for the new system
considering functionality, compatibility, and ease of Screen layouts: how information is presented to users
use on a screen
justifying choices based on user requirements and Report layouts: how information is organized in a
system efficiency printed or digital report
Software that needs to be considered: Consider readability, visual appeal, and efficient use of
operating system, space
applications software,
size of storage, Validation Routines
type of storage.
It is a method of examining data submitted to a computer to
determine if it meets specific requirements. It is a routine
7.2. Design check that the computer does as part of its programming.
1. Range check: ensures data is within a specified range of
Once the analysis has taken place and the systems analyst values
has some idea of the scale of the problem and what needs 2. Character check: ensures data contains only allowed
to be done, the next stage is to design the critical parts of characters
the recommended system. 3. Length check: ensures data is of a specified length
4. Type check: ensures data is of the correct data type
File/Data Structures 5. Format check: ensures data conforms to a specific
Field length: number of characters allowed in a field format
6. Presence check: ensures data is present and not left
Field name: an identifier for the field in the data
structure blank
Data type: specifies the kind of data that can be stored in 7. Check digit: a digit added to a number to verify its
a field, e.g., text, numbers, dates accuracy
Coding of data: using codes to represent data, e.g. M for
male, F for female 7.3. Development and Testing
Input Formats Guarantees the system's functionality before it is put into
use.
Identification and removal of errors, thus improving
system reliability and performance.
Test Designs
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Before selecting the approach best suited for a given
Test data structures, file structures, input formats, application, the pros and cons of each must be carefully
output formats, and validation routines considered.
Ensure all components function correctly and interact
seamlessly 4 Methods of Implementation
Test Strategies 1. Direct changeover:
Test each module: verify individual components function The old system is replaced by the new system
as intended immediately
Test each function: ensure all features work correctly Used when quick implementation is necessary
Test the whole system: confirm overall system Advantages
performance and integration fast implementation
cost-effective as only one system is in operation
Test Plan Disadvantages
High risk of failure
Test data: specific data used for testing purposes no fallback
Expected outcomes: predicted results based on test data users can’t be trained on the new system
Actual outcomes: results obtained from testing
Remedial action: steps taken to fix identified issues 2. Parallel Running
Test Data Types Both current and new systems run simultaneously for a
period before the old system is phased out
The following data types will be explained using the example Used when a smooth transition with minimal risk is
of months in a year. required
Advantages
Normal data: valid and expected data values within the Lower risk
range of acceptability have an expected outcome. E.g., easy system comparison
any whole number between 1 and 12. Disadvantages
Abnormal data: invalid or unexpected data values. This Time-consuming
can either be: resource-intensive
Data outside the range of acceptability or
Data that is the wrong data type 3. Pilot Running
In this case, examples could be…
The new system is implemented in a small, controlled
any value less than 1 (i.e. 0, -6, etc.)
environment before full-scale implementation
any value greater than 12 (i.e. 13, 15, etc.)
Used when testing the new system in a real-world setting
letters or nun-numeric data (i.e. July, etc.) Advantages
non-integral values (i.e. 3.5, 4.2, etc.)
Low risk as only trialled in one
Extreme data: values at the limits of acceptability (E.g. 1
department/centre/branch
or 12)
allows for fine-tuning
staff have time to train with the new system
What is live data? few errors as it's fully tested
Data that has been used with the current system Disadvantages
Hence, the results are already known Slower implementation
potential inconsistencies
confusion as there are two systems in use
7.4. Implementation There is no backup for the
department/center/branch using the new system
The system must then be fully implemented after it has been
thoroughly tested.
We will now think more carefully about switching to the new
system. Four popular techniques are utilized to transition
from the old system to the new one.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
4. Phased Implementation
Purpose of the system/program: Explanation of the
The new system is implemented in stages, with each system's intended function and goals
stage replacing a part of the old system Limitations: Known constraints or issues with the
Used when a gradual transition is preferred to minimize system
disruption Program listing: The code or scripts used in the system
Advantages Program language: The programming language used to
reduced risk develop the system
easier to manage Program flowcharts/algorithms: Visual
Disadvantages representations or descriptions of the system's logic and
Takes longer processes
potential compatibility issues System flowcharts: Visual representations of the
interactions between system components
7.5. Documentation Hardware & software requirements: Necessary
equipment and software to run the system
In the life cycle of a system, documentation enables the File structures: Organization and layout of the system's
correct recording of design, implementation, testing, and files and data
maintenance data, facilitating effective communication, List of variables: Collection of variables used within the
troubleshooting, and potential future improvements. system, including their names and purposes
Technical documentation: detailed information on the Input format: Structure and format for entering data
system's inner workings and programming for into the system
developers and IT staff Output format: Structure and format for presenting
data generated by the system
Used to maintain, repair, and update the system with Sample runs/test runs: Examples of system operation,
improvements including input and expected output
Validation routines: Techniques used to check and
confirm the accuracy of data entered into the system
User Documentation
Instruction and guidance for end-users on how to operate
the system. Used to help users effectively use the system
and overcome problems
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Purpose of the system: Explanation of the system's Analyse the system's efficiency in time, money, and
intended function and goals resource use. Examine whether the system is performing
Limitations: Known constraints or issues with the at its best or if its efficiency could be increased.
system Provide examples of specific aspects that contribute
Hardware & software requirements: Necessary to the system's efficiency
equipment and software to run the system Identify areas that may be consuming excessive
Loading/running/installing software: Instructions for resources or time and suggest ways to optimize them
setting up the system on user devices Questions to ask:
Saving files: Procedures for storing data within the Does it operate quicker than the previous system?
system Does it operate by reducing staff time in making
Printing data: Steps to produce hard copies of system bookings?
data Does it operate by reducing staff costs?
Adding records: Instructions for creating new entries in
the system Evaluate the Ease of Use
Deleting/editing records: Guidelines for modifying or
removing existing entries in the system Look at the solution's usability and accessibility for the
Input format: Structure and format for entering data target market. Check to see if the system is simple to
into the system understand and use and if users have no trouble
Output format: Structure and format for presenting completing their jobs.
data generated by the system Describe the user interface and how it facilitates
Sample runs: Examples of system operation, including interaction with the system
input and expected output Mention any feedback from users regarding their
Error messages: Explanations of system warnings and experience with the system and address any issues
error notifications they encountered
Error handling: Steps to resolve issues and errors within Questions to ask:
the system Are all the users able to use the system and make
Troubleshooting guide/helpline: Assistance for bookings easily?
diagnosing and addressing common problems Are all the users able to change and cancel bookings
Frequently Asked Questions: Answers to common user easily?
inquiries Can all staff understand how to use the system with
Glossary of Terms: Definitions of key terms and minimal training?
concepts related to the system
Determine the Suitability of the Solution
7.6. Evaluation Examine how well the implemented solution satisfies the
desired outcome by contrasting it with the original task
It measures a system's productivity, efficiency, and criteria.
compliance with its goals to identify its strengths, Outline the initial objectives of the system and
shortcomings, and potential development areas. This discuss how the solution addresses each one
assessment informs decision-making and improves overall Highlight any requirements that may not have been
performance over the course of a system's life cycle. fully met and discuss possible reasons for this
Questions to ask:
Assess the Efficiency of the Solution Is the system suitable for each of the departments?
Does it meet the needs of the customers?
Does it meet the needs of the staff?
Does the solution match the original requirements?
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Collect and Examine User’s Feedback Socket overload: Ensure enough plug sockets in the
room, don’t plug too many devices into the same
Collect users' responses to the results of testing the socket, and don’t leave devices plugged in and
system. Their feedback can provide insights into unattended.
potential issues and improvements and help determine Overheated equipment: Ensure that equipment is
overall user satisfaction. properly ventilated and not obstructed, keep flammable
Summarise the testing process, including test data materials away from heat sources, regularly check
expected and actual outcomes. equipment for signs of wear or damage, use fire
Discuss users' reactions to the system, addressing extinguishers in case of emergencies, turn off or unplug
any concerns or suggestions they may have devices when away from the location, do not cover any
air vents on devices.
Identify Limitations and Suggest Necessary
3. Trailing cables: Devices can be plugged in using cables.
Improvements Cables that are protruding can cause an accident; you can
Based on the analysis of efficiency, ease of use, trip over a cable left out in a location, and body damage can
appropriateness, and user feedback, identify any occur during a fall, for example, breaking bones, ligament
limitations in the system and suggest necessary damage, bruising, sprains, etc. depending on the area fell on
improvements Trailing cables causes and prevention strategies:
List the limitations and provide explanations for each Unorganized/insecure cables: use cable ties to secure
one cables, keep cables packed correctly in, let’s say, a table,
Recommend specific changes or enhancements for therefore not coming in the way of walking paths, use
these issues wireless devices where possible, and regularly inspect
cables for signs of wear or damage.
8. Safety & Security 4. Heavy falling equipment: Devices have varying levels of
weight, and if a device falls on you, it could cause injury; any
8.1. Physical Safety device should be placed in a secure location, like a PC on a
solid desk and not near the edge.
1. Electrocution: ICT devices require electrical power to Causes and reduction tactics for falling equipment:
charge or run; the electrical device can cause electrocution, Improperly secured equipment: Ensure that
caused by the electric current moving through a body, equipment is properly secured and stable. Regularly
causing fatal injuries and/or death. check the stability of locations containing devices.
There are multiple causes for electrocution, including: Equipment on unstable surfaces: Keep equipment
Contact between liquid substances and electronic away from edges and other potential hazards, and
devices: Keep liquids away from electrical equipment. regularly inspect equipment and locations containing
Open cables: Ensure that cables are entirely insulated devices for signs of wear or damage.
and packed, and use circuit breakers or fuses to prevent
electrical overload. 8.2. eSafety
2. Fire: ICT devices require electricity to charge or run; too Data Protection
many devices using a single socket can cause the plug socket
to overload, and heat is generated by too much electricity, The Data Protection Act (DPA) controls personal data
causing the wiring to degrade and ignite a fire. collection, storage and processing.
The causes and reduction tactics for fire include:
In the UK, the European Union’s General Data Protection
Regulation (GDPR)
Protects personal data, whether stored on paper or a
computer system
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Principles of the Data Protection Act Refers to information that can be used to identify an
individual
Data must be processed lawfully, fairly, and Examples
transparently, with clear consent from the individual. Personal Name
Data should only be collected for specific, explicit, and Address
legitimate purposes. Date of birth
Organizations should only collect and retain the A photograph in school uniform
minimum personal data necessary for their stated Medical history
purpose. Threats that can be avoided by protecting personal
Data should be accurate and up-to-date, and reasonable data:
steps must be taken to rectify or erase inaccurate Identity theft
information. Privacy breaches
Personal data should not be kept longer than necessary Misuse of the information
and should be securely deleted when no longer needed. Data be sold to third-party companies
Organizations must protect personal data against Individuals could be held to ransom over personal
unauthorized or unlawful processing, accidental loss, data gathered
destruction, or damage. could be used to commit a physical crime
How to avoid inappropriate data disclosure:
Why is data protection legislation required? Personal data must be kept confidential and
protected through privacy settings on websites such
Protecting Individual Rights: Data protection legislation as social media or strong passwords on websites
safeguards individuals' right to privacy and control over where personal data is held or used
their personal information. Access to personal data should be limited to
Preventing Misuse of Personal Data: It helps prevent authorized individuals
unauthorized access, identity theft, fraud, and other Think before you post - consider what information
forms of data misuse. could be gathered from your image or content
Promoting Trust: Data protection laws build trust Check website details about the collection, storage,
between individuals and organizations by ensuring their and use of personal data
personal information is handled responsibly. Only access websites where personal data is used or
Encouraging Responsible Data Handling: Legislation viewed when on a secure, encrypted connection
promotes responsible data collection, storage, and
processing practices among organizations. eSafety
Enabling Data Subject Rights: Legislation grants
individuals rights such as access to their data, right to E-safety is knowing about and using the internet safely
rectification, erasure, and objection to processing. and responsibly.
It refers to when an individual is using the internet,
Personal Data email, social media, or online gaming.
E-safety refers to the individual knowing how to protect
themselves from potential dangers and threats.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Protection of Data
Multiple techniques are implied for the protection of data,
inclusive:
1. Biometrics:
Individuals' distinctive physical or behavioural traits, such
as fingerprints, faces, or irises, can be used for access
control and verification. Since biometric data is hard to
fake or duplicate, it offers a more secure form of
identification.
2. Digital certificate:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
A digital record that attests to a website's reliability and A typical authentication technique uses a password plus
integrity. A digital certificate is used to provide safe a secret code (user ID) to identify. To strengthen data
communication and to build confidence between parties. security, user IDs and passwords restrict access to only
Identifier data, the entity's public key, and a third party's authorized users. Using secure passwords and changing
digital signature are frequently found in digital them frequently is critical to ensure security. When
certificates. creating passwords, it is advised to utilize a mix of
uppercase, lowercase, digits, and special characters.
3. Secure Socket Layer (SSL):
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Designing an ICT solution requires an understanding of Software developers employ various copyright protection
the target audience. The study should consider elements strategies, such as Digital Rights Management (DRM).
affecting the audience's capacity to use the solution, like Due to DRM methods and systems, copyrighted works
age, technical proficiency, and expertise. are subject to usage, modification, and distribution
The solution creator should know the audience's restrictions.
requirements for information. This could serve as a Other techniques include software product activation,
design cue for the data processing elements and the which needs a unique code to be fully functional.
information architecture. Given that pirated software frequently cannot receive
How the audience utilizes and consumes the content automatic upgrades, which renders it less effective and
also influences the design. For instance, the answer secure over time, automatic updates may also serve as a
should be mobile-friendly if the audience accesses it kind of copyright protection.
mostly through mobile devices.
Finally, the designer should consider any unique
requirements of the audience, such as visual or auditory 10. Communication
impairments. These requirements should be taken into
account when designing the solution ensuring inclusivity. 10.1. Communication with Other ICT
9.2. Copyright users Using E-mail
What makes Copyright Necessary? E-Mail
Uses:
Copyright regulation is crucial to safeguard the rights of
developers and innovators.
It stops software piracy, which is unauthorised use,
replication, or distribution.
It guarantees developers receive compensation for their
efforts, fostering additional innovation and development.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Email is a technique of sending and receiving messages It is up to companies to decide if personal emails should
and files via the Internet. be permitted on their systems
It is employed in personal communication, business Companies may specify which company devices are
communications, and marketing. allowed to be used
Acceptable language must be used based on the email's There needs to be a company standard style when
recipient, for example, professional when composing a sending emails
work-related email. It must be made clear what email content is not
Employers frequently establish requirements for permitted
professional language, substance, and email frequency. Employees should be told only to use their accounts
Email security is critical to preventing sensitive data from when sending emails
being accessed or manipulated. There must be clear rules regarding the confidentiality of
Netiquette is the proper conduct and politeness when information
using email. Staff need to be aware of the method and duration of
Don’t be abusive storing emails
Don’t send spam Incoming emails should only be read by the recipient
Be clear and concise with your message Company policy on how to deal with and prevent viruses
Remember that posts are usually public and can be must be laid out
read by anyone. Monitoring of emails may be carried out, and staff must
Always check your spelling and grammar. be aware that the company has the right to read all
Respect people's privacy and do not discuss or emails
publish information that might embarrass somebody. Suitable ongoing training will take place to ensure staff
Forgive people’s mistakes follow company policy at all times
Do not use CAPITAL LETTERS to highlight comments
Do not plagiarize Carbon Copies (Cc) and Blind Carbon Copies (Bcc)
Do not use too many emoticons, as they might annoy
your readers. Carbon copies are used to send the email to multiple
Email groups enable mass communication to a specific recipients.
group of subscribers. Blind carbon copies are made to send the email to
multiple recipients without them acknowledging that it
Guidelines set by employers: has been sent to other recipients.
Forward enables users to send an already existing email
to a new recipient.
To attach files to be sent with an email, we make use of
Attachments.
Spam
It is defined as any unwanted email delivered via the
Internet. These can range from annoying to genuinely
harmful, as they may contain viruses.
The main disadvantages are:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Advantages of using the Internet to find information Although the internet provides much information, not all
information tends to be up to date because it is are genuine or dependable.
quicker and easier to amend Consider the source's reputation and trustworthiness
The Internet has vast amounts of information when determining the information's dependability.
searching for information using a search engine is Check the accuracy of information by comparing it to
fast and easy other reliable sources.
people can look for information in the comfort of Assess whether the information is skewed, keeping an
their own home eye out for views pushing a particular point of view.
information on the internet is essentially free of Check if the material is current, as obsolete information
charge might be deceptive.
webpages may have multimedia elements, making
learning more interesting Internet Protocols
Disadvantages of using the Internet to find
information Protocols are rules on which the sender and recipient agree
it isn’t regulated; anything can be posted when data is exchanged between devices.
always the risk of accessing inappropriate websites 1. Hypertext transfer protocol (HTTP): when a web page is
too easy to be distracted by the many distractions being accessed, entering http:// at the front of an address
available on the internet tells the web browser that ‘HTTP rules’ for communication
Some research skills are lost when using the internet, are to be obeyed.
as search engines do all the work for you. 2. Hypertext transfer protocol secure (HTTPS): A secure
version of HTTP that encrypts data for security.
Speed of Searching 3. File transfer protocol (FTP): network protocol used when
transferring files from one computer to another over the
Search engines may scan billions of online pages to internet. It is similar to HTTP, but the protocol specifically
locate matches to your search query in a fraction of a transfers files.
second. 4. Secure sockets layer (SSL): a protocol that allows data to
Your internet connection and the effectiveness of the be sent and received securely over the internet.
search engine's algorithms influence the speed.
Risks of Using the Internet
Amount of Information
Inappropriate and unlawful content: The internet may
Because search engines can deliver a deluge of attract people to potentially dangerous or illegal
information, utilising particular and relevant search materials.
phrases is critical. Data restriction: Parental, educational, and ISP
Adding quotation marks for specific phrases, "+" signs for restrictions can all be used to restrict access to specific
required terms, and "-" signs for omitting terms can help information or websites.
narrow the search.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE
ICT
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Arya on Fri Feb 14 2025 for strictly personal use only.
These notes have been created by Bisma Hammad for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).
ZNOTES.ORG
CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Arya for personal use only.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Create a master document, which is mainly given as a While importing files, make sure you select text file and
source file not excel file, as .csv files are plain text.
In the master document, click on the Mailings tab When they ask for a set number of decimal places in a
In the start mail merge section, click on select recipients field, choose Fixed in Format.
→ select use an existing list → choose the source file
Select records to be used, filter if necessary
4. Data Manipulation
4.1. Data Manipulation (MS Access)
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
6. Data Analysis
6.1. Data Analysis (MS Excel)
afterbefore
5. Presentations
5.1. Presentation Authoring (MS
PowerPoint)
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
DESCRIPTION FORMULA
Add, Subtract, Multiply, Divide
SUM = Adding a range of numbers
=A1+B1
=SUM(A1:A4)
Anchors: help navigate throughout a webpage
AVERAGE - Find the average =AVERAGE(A1:A4) Highlight the destination of the anchor, and set a
MIN - Find the low value =MIN(A1:A4) bookmark
MAX - Find the highest value =MAX(A1:A4)
COUNT - Finding how many numbers are in a
=COUNT(A1:A4)
You can use
range
COUNTA - Counting the number of items in a
tags in your code around this text
range =COUNTA(A1:A4)
<div id="top"> Destination text </div>
INT - Converts to the lowest whole number =INT(A1)
ROUND - Rounding numbers =ROUND(A1,2) The 2 is the number of decimal Highlight the word or image that will be the hyperlink,
places
=ROUNDUP(A1,2) The 2 is the number of
click insert a hyperlink, and type the address of the
ROUNDUP - Rounding numbers up decimal places website, the bookmark, or the email address
=ROUNDDOWN(A1,2) The 2 is the number of
ROUNDDOWN - Rounding numbers down
decimal places provided in the respective places.
=VLOOKUP(A1,$B$1:$C$8,2)A1 is the cell to
VLOOKUP - Looking up what particular values check$B$1:$C$8 is the array to look in2 is If the link needs to open in a new window, select New
mean from a table arranged vertically column 2 from $B$1:$C$8 meaning return the
value in column 2 in that section.
Window from the target frame. This will give you a
=HLOOKUP(A1,$B$1:$G$2,2)A1 is the cell to target setting of "_blank."
HLOOKUP - Looking up what particular values check$B$1:$G$2 is the array to look in2 is row 2
mean from a table arranged horizontally from $B$1:$G$2 meaning return the value in
row 2 in that section.
=SUMIF($B$1:$C$8,A1, $D$1:$D$8)Checks if any
SUMIF – adding up specific values in a range cells in $B$1:$C$8 = A1 and if they do then it
adds them together
=COUNTIF(A2:A4,">4") Checks that cells have a
COUNTIF - Counts the number of cells in a value greater than 4=COUNTIF(A2:A4, A1)
range that satisfy the given criteria Checks that the cells are equal to the value in
cell A1
IF – Deciding what will go into a cell =IF($B$1:$B$8=A1,”A”)IF the value in A1 appears
in the range of cells then write A
=IF($B$1:$B$8=A1,”A”, IF($B$1:$B$8=A2,”B”,
Nested IF IF($B$1:$B$8=A3,”C”,D)))IF the value in the range
equals A1 then write A, if it equals A2 write B, A3
write C and none of them D
Average IF – it searches for criteria and makes =AVERAGEIF($D$4:$D$64,G3,$E$4:$E$64)$D$4:$
an average of the range according to the D$64 is the range, G3 is the criteria, $E$4:$E$64
criteria is the average range
SQRT – Square root of a number =SQRT(B3)B3 is the number
7. Website Authoring If there are specified dimensions for a table, use the
table properties to set these values.
Check the code to ensure that the table is not set to
7.1. HTML 100% width, if there are other values given.
To hide bullets from your webpage, add hidden after
your tag selector.
Font type h2 {font-family: “Times New Roman”}
Text size h2 {font-size: 16pt}
Aligning text h2 {text-align: center}
‘Bold’ text h2 {text-weight: bold}
‘Underline’ text h2 {text-decoration: underline}
Second choice of font h2 {font-family: “Times New Roman, Verdana”}
Adding generic fonts (either serif or sans-serif) h2 {font-family: “Times New Roman, serif”}h2
{font-family: “Calibri, sans-serif”}
Changing colour h2 {color: #000000}
Using classes to set styles. It can be used by right {text-align: right}
many selectors
Comment in HTML - text that is not read by the
computer, only for users
Comment in CSS - text that is not read by the /* Enter comment here */
computer, only for users
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Amount of Light (colour) Hex code
Fully on
¾ on
FF
C0
External CSS sheets are separate sheets that style the
½ on 80 webpage.
¼ on 40 To use, they are required to be attached to the main
Off 00
HTML file using the tag:
Examples: <link rel=“stylesheet” type=”text/css”
Pure red is (FF0000) href=”sourcefile.css”>
Pure green is (00FF00) The tag is placed in the head tag of the html file.
Pure blue is (0000FF) Several html sheets can be attached.
Pure yellow is (FFFF00) Preference is given to the sheet placed last in the
Pure black is (000000) head tag
Pure white is (FFFFFF) Format for external CSS
h1 { property: value ;}
HTML tag for e.g. h1 { color:#000000;}
Opening/closing head tag
Page title ↑ Element source is taken from HTML script linked
Attaching a CSS file <link rel=“stylesheet”
type=“text/css”href=“mystyle.css”>
Defining anchor tag CSS Tags
Setting default target window
Opening of the body/content
Table tag | border width as 1 | alignment Colours
centre
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
Table tags format
cell padding
cell spacing
Table { padding :40px;}
Table { spacing : 30px;}
Enter data twice and compare them either after data has
Table { border-width:3px;} been entered or during the entry process.
borders Table { border-color: #000098;}
Table { border-style: solid;}
Table { background-color: #009499;} 15.2 Explain the need for validation as well as
td { font-size: 3;}
Td/th tags td { font-family: Calibri;} verification:
td { color: #000000;}
table { width:50px;} Validation only ensures that the data entered is in the
Dimensions table { height:60px;}
accepted format. Verification is needed to ensure
that the data entered is correct. Data entered may be
body { background-repeat: no-repeat;}
in the right format but of the wrong value. Or it may
body {background-position: top/left/right/bottom;}
be copied correctly but does not match the criteria.
h1 {text-align: left/right/top/bottom;}
17.1 Explain why it is necessary to use page, section and
column breaks, to adjust pagination and to avoid widows
8. Editing Images and orphans?
Page breaks and column breaks help remove widows
and orphans by forcing text onto the next page/
8.1. Editing Images column so it is all together.
It does not disrupt the reader by breaking the flow.
To save a picture with 8 bits - of colour depth, save it as a 17.3 Explain why mail-merged documents are created
gif Mail merged documents save time typing out
Open it in Paint and save it as individual letters, as the computer can personalize
To compress the size of a picture, open it in the picture them. Typing errors are also reduced since the
manager master document is only typed once. They can also
Edit picture be emailed using the address in the source file.
Compress pictures 18.1 Define the terms flat-file database and relational
Choose the most suitable option database.
To change the colour options of a picture, use picture Flat-files databases are tables that have data sorted
manager in rows and columns.
Edit picture Relational databases are several tables linked
Colour together, preventing unnecessary repetition of data.
18.1 Explain that other field types, such as placeholders
9. Answers to Theory for media, including images, sound bites and video clips
are used in commercial databases
Questions They are not studied in depth in this syllabus. They
are used in web applications where a back-end
database holds the media to be displayed in another
9.1. Answers to Theory Questions application, such as a webpage.
18.1 Discuss the advantages and disadvantages of using
relational tables rather than a flat-file database
Relational Database Flat file Database
Better security Poor at complex queries
Cater for future requirements Poor at limiting access
Data is only stored once Harder to update, so it is inherently inefficient
Requires more planning Potential duplication
Easy to design
Non-unique records
It is harder to change the data format.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
18.1 Define and understand the terms primary and foreign
keys and their role in a relational database. Tables make the basic structure of a webpage and
organise page layout.
Primary key: The key field of a table which is unique and
identifies each record 21.2 Define and understand the terms relative file path
Foreign key: The field linked to the primary field of the and absolute file path
table linked to a relationship Relative file path: A path referring to a file in the
same directory relative to the page the reference is
made in.
Absolute file path: The full path of a file which is not
relative to anything.
21.2 Explain why absolute file paths must not be used for
hyperlinks to locally saved web pages/ objects
Absolute paths always include the domain name of
the website
These should not be used to refer to locally saved
web pages as the computer the webpage is stored on
(the server) is not the same as where the webpage
was developed, and an absolute file path would point
to the wrong address.
21.3 Explain what is meant by the term cascading
stylesheets
CSS (cascading stylesheet) is a text-based language
which is attached to web pages to set their format.
CSS files have a “.css” extension
21.3 Explain the hierarchy of multiple attached
stylesheets and in-line styles within a web page
Internal CSS have more preference over Inline CSS.
Inline CSS overrides externally attached stylesheets.
If several external stylesheets are attached to one
web page, the stylesheet attached last (at the bottom
of that part of the code) is given preference (over the
other ones). Priority increases as you go down a list.
21.3 Explain why relative file paths must be used for
the attached stylesheets
They should be attached using relative file paths, as
they are stored along with the webpage since they
are stored in the same folder.
21.4 Explain how to upload and publish the content of a
website using FTP
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Arya at Trivandrum International School on 14/02/25.
CAIE IGCSE
ICT
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Arya on Fri Feb 14 2025 for strictly personal use only.
These notes have been created by Disha Garg, Aishwarya Girish Kumar, Abdul Majeed, Sarah Bassiouny and Aliza Mirza for the 2023-2025
syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).