Networks and effects of using them
Networks and effects of using them
ORG
CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Al-jannat for personal use only.
CAIE IGCSE ICT
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Al-jannat at Permanent Sunrise International Schools on
12/01/25.
CAIE IGCSE ICT
Differences and similarities: Disadvantages:
Bluetooth uses a transmission frequency of 2.4 GHz, A stable internet connection is always required.
whereas Wi-Fi uses a 2.4 – 5.0 GHz range. Data storage in clouds may be vulnerable to security
Wi-Fi has a much faster data transfer rate. breaches.
Wi-Fi has a higher geographical range in which it is The user depends on the storage provider for reliability
effective. and availability of services.
Bluetooth only allows up to 7 devices to be connected The services may become expensive as the amount of
simultaneously, whereas the number of devices storage or bandwidth required increases.
connected to a Wi-Fi network depends on the
router/routers used. Common Network Environments
Bluetooth uses key-matching encryption. However, Wi-Fi
uses WPA (Wi-Fi protected access) and WEP (wireless 1. Internet:
equivalent privacy).
The Internet is a very large global network that consists
Cloud Computing of many other interconnected networks
The World Wide Web is a vast collection of web pages
This method is where data is stored on remote servers that can be accessed using a web browser.
accessed online. The World Wide Web allows you to access information
The three types of cloud storage are: by using the internet
Characteristics:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Al-jannat at Permanent Sunrise International Schools on
12/01/25.
CAIE IGCSE ICT
A private network that is accessible to employees within 1. Local Area Network (LAN): networks usually
a company or organization. contained within a single building or small
Usually behind a firewall to ensure security. geographical location. It is made up of hubs and/or
Allows for document sharing and the use of switches, which will connect several devices together.
collaboration tools between users. One hub or switch commonly connects to a router,
It can be customized to meet the specific requirements allowing LAN connectivity to other outside networks
of the business. such as the Internet.
Users will require a username and password to access
the Intranet. Advantages:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Al-jannat at Permanent Sunrise International Schools on
12/01/25.
CAIE IGCSE ICT
The strength of their signals can be affected by obstacles Connection to a network exposes a user to:
such as walls. Hacking: Unauthorized access given to the
Speeds can be affected by high-traffic areas. computer. This can lead to identity theft or the
It can sustain interference from other devices which can misuse of personal information.
affect performance and connectivity. Phishing: Phishing involves getting sensitive
Can be vulnerable to security threats due to signal information, such as usernames, passwords, and
interception. credit card details, for malicious reasons by
mimicking a reliable webpage on the network
3. Wide Area Networks (WAN): is formed by several Pharming: This is malicious code installed on a user’s
LANs connected through a router. It is expensive. computer or a web server; the code will redirect the
However, it comes with a more enhanced security. user to a fake website without their knowledge (the
Additional hardware is needed for a WAN: Routers, user doesn’t have to take any action, unlike phishing).
modems, and proxy servers. Viruses: Program code that replicates (copies itself)
Advantages: to delete or corrupt files and cause the computer to
malfunction
Provide the ability to connect geographically dispersed
locations, such as offices in different cities or countries. Passwords
Offer the flexibility to scale up or down based on the
organisation's needs. It is a common form of security often accompanied by a
Administrators can monitor and manage the network username or email address.
infrastructure from a single location. There are many ways to enhance the security of your
Disadvantages: password, such as the following:
Ensure that the password is changed regularly in case
Setting up and maintaining a WAN can be expensive, it has been obtained illegally or accidentally
especially compared to LANs. Ensure that the password uses a combination of
Cover larger distances and rely on public networks or uppercase, lowercase, numbers and special
leased lines, which can introduce latency and affect characters to make the password more difficult to
performance. guess.
WANs are subject to the reliability and availability of iloveict is a weak password
external service providers. 1lov3ICT# is a strong password
Anti-spyware software can be run regularly to ensure
1.2. Network Issues and that your information, including your password, is not
passed to an unauthorized third-party user.
Communication
Other Authentication Methods
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Al-jannat at Permanent Sunrise International Schools on
12/01/25.
CAIE IGCSE ICT
1. Zero login: A security concept that eliminates Comparing the scanned files against an extensive
traditional login methods, such as usernames and database of known threats
passwords, using biometrics or other authentication Real-time scanning
factors for seamless and password-less access. Regular updates to gather an up-to-date list of known
2. Biometric Recognition: These authentication threats
methods use unique physical or behavioural Quarantine of infected files
characteristics, such as fingerprints, iris scans, or Quarantining files allows threats to be automatically
voice recognition, to verify a person's identity. deleted.
3. Magnetic Stripes: These are authentication features Allows the user to determine if the file is a legitimate
on cards storing data magnetically. They enable threat and not a false positive.
secure identification and authorization by containing
encoded information that magnetic stripe readers Heuristic Checking: Instead of relying solely on a database
can read. of known viruses, this method looks for behavioural patterns
4. Smart Cards: Smart cards are portable devices with and other features in a file to identify possible risks.
integrated circuits to store and process data. They
are used for authentication, identification, and secure Electronic Conferencing
transactions in various applications such as banking,
telecommunications, and access control. 1. Video Conferencing: It is a form of audio and video
communication. It serves as a stand-in for face-to-
5. Physical Tokens: It is a type of authentication that
face meetings between several persons who may
takes the shape of a solid object. The user
reside abroad or in another region of the country. It
demonstrates ownership of the token through
interaction with a login system. Physical tokens have utilizes a network in some way and is done in real-
embedded clocks that create one-time passwords time.
(OTPs) when a PIN and other authentication The basic hardware includes:
information are entered.
6. Electronic Tokens are applications that users install webcams,
on their hardware, such as smartphones. Say a large monitors/television screens,
person wants to access a website on a tablet microphones,
computer. To access this website, users must first speakers.
authenticate themselves using electronic tokens. The
user has already set up the electronic token app with The software used are:
their smartphone. The user launches the app on their Webcam and microphone software drivers
smartphone when the website asks them to verify CODEC (coder and de-coder)
their identity. The program creates an OTP that is Echo cancellation software
only good for a short period of time.
Advantages:
Anti-malware Software
It is much easier to access important documents or bring
Anti-malware software is designed to protect devices in ‘experts’ at key parts of the conference.
against viruses and malicious software. It has 3 primary It is possible to hold conferences at short notice.
purposes: detect, prevent and remove malicious Reduced travelling costs.
software. It is installed onto a computer system and will There is no need to pay for hotel accommodation or
operate in the background. venue hire.
Reduces the cost of taking people away from work for
Standard features of Anti-Malware software include the two or three days to travel.
following: Using video conferencing is better than having delegates
travel to potentially unsafe places worldwide.
Disadvantages:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Al-jannat at Permanent Sunrise International Schools on
12/01/25.
CAIE IGCSE ICT
Advantages:
Potential time lag in responses/delays when talking.
Images can jerk. Allows participants to see each other through video,
It is very expensive to set up in the first place. providing a more immersive and engaging experience
Problems if the delegates live in different countries with than audio conferencing.
large time zone differences. Often offer screen sharing capabilities, enabling
Requires IT knowledge to some extent. participants to share presentations, documents, or other
It's not the best for people who consider travelling a job visual content in real-time.
perk. Often provide features like chat, polling, hand raising,
Completely reliant on stable internet connections. and Q&A sessions, fostering interactivity and
engagement among participants.
2. Audio Conferencing: Meetings held using audio
(sound) technology are called audio conferencing. Disadvantages:
The normal telephone network can be used for audio
conferencing, frequently called a phone conference. Heavily relies on internet connectivity and technical
infrastructure.
The hardware required is: They can be susceptible to distractions and multitasking.
It often has various features and settings that
a computer (with built-in microphones and speakers) participants need to familiarize themselves with,
external microphone and/or speakers especially if they are new to the platform.
an internet phone
a standard phone.
Advantages:
2. The Effects of Using IT
Allows participants to join meetings from any location. 2.1. Microprocessor-Controlled Devices
Eliminates the need for travel expenses, such as
transportation, accommodation, and meals. A microprocessor-driven labour-saving machine enables
Saves time by eliminating travel time and allowing users to focus on other activities while the machine
meetings to be scheduled and conducted quickly. completes its work. The second generation of devices
containing microprocessors is more user-friendly and
Disadvantages: has more functionality, such as "intelligent tuning" in
Lacks the visual aspect of face-to-face meetings, which television sets.
can hinder communication.
Advantages of microprocessor-controlled labor-saving
It can limit interaction and engagement compared to in-
devices:
person or video conferencing.
Heavily relies on technology, and technical issues such as no need to do manual tasks at home
poor audio quality, background noise, or connectivity more time for leisure activities
problems are common. no need to stay home while chores are being done
web-enabled devices allow devices to be switched on or
3. Web Conferencing:
off while the owner is out
Web conferencing, often known as webinars or automated burglar alarms give a higher sense of security
webcasts, makes use of the Internet to enable and well-being
conference calls. This system makes use of numerous
smart fridges and freezers prevent food waste by
computers that are interconnected over the internet.
keeping track of products’ expiry, availability, etc.
It operates in real-time, just like video conferencing,
and enables the following meeting types: Disadvantages of microprocessor-controlled labor-
» business meetings to discuss new ideas saving devices:
» presentations
» online education or training.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Al-jannat at Permanent Sunrise International Schools on
12/01/25.
CAIE IGCSE ICT
Uses:
unhealthy lifestyle due to inactivity caused by devices
doing all tasks monitoring traffic on motorways
tend to make people lazy congestion zone monitoring
potential deskilling automatic number plate recognition (ANPR)
any device containing a microprocessor and can automatic traffic light control
communicate using the internet displays a threat of air traffic control systems
cybersecurity breaches railway signalling systems
save energy due to being efficient, as well as turning off smart motorways keep updating according to changing
after inactivity traffic conditions
can be easier 'programming' these devices to perform more efficient
tasks rather than turning knobs and pressing buttons traffic offences can be remotely penalized using ANPR
manually car thefts can be spotted using ANPR
minimizes human errors, reducing the rate of accidents
General disadvantages of microprocessor-controlled
devices: Disadvantages:
lead to more wasteful devices If a hacker breaches security, the vehicle could be
can be more complex to operate for technophobes controlled by them.
leaving devices on standby is wasteful The system might come to a halt if it malfunctions.
Systems with a poor design could compromise safety.
Data Security Issues The easy tracking of harmless people's movements is
made possible by ANPR equipment. Who can access such
Any home appliance managed remotely could provide data?
hackers access to your personal information. These devices
frequently have default (or no) password settings, which Autonomous vehicles in transport
makes it simple for attackers to get sensitive information. To properly execute their activities, autonomous cars
For instance, it is easy to discover holiday dates by hacking require sensors, cameras, actuators, microprocessors (along
into a central heating controller (or the software used to with very complex algorithms). Automobile control systems
interface with it), making a home an obvious target for can accomplish essential tasks by sensing information from
break-ins. It is likely for a hacker to obtain important cameras and ultrasonics.
information, such as credit card numbers, if the refrigerator Consider an autonomous vehicle approaching a set of
or freezer automatically orders goods from a retailer. red-lighting traffic signals.
Social Interactions The vehicle's control system must first recognize the
road sign before consulting the database to determine
The positive aspects include: the appropriate action.
The CPU must instruct the actuators to apply the brakes
easier to make new friends using chat rooms and put the gear in "park" since the traffic light is red.
easier to find people who share similar interests/hobbies The light must be continuously watched until it turns
less expensive to keep in touch using VoIP technology. green.
After that, the CPU will again tell the actuators to engage
The negative aspects include: first gear, let go of the brakes, and open the throttle
people do not meet face-to-face as much (social (accelerator).
isolation) Advantages of an autonomous car, bus, or van:
a lack of social interaction may make people more
anxious about meeting people in real life
When communicating online, people can act less politely
or more harshly, and cybercrime is a serious issue,
especially for teenagers.
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Al-jannat at Permanent Sunrise International Schools on
12/01/25.
CAIE IGCSE ICT
safer due to the removal of human error security aspects due to the absence of pilots
due to the more efficient operation of vehicles, it is emergencies may be challenging to deal with
better for the environment hacking into the system
reduced traffic congestion passenger reluctance
increased lane capacity software glitches can be catastrophic
reduced travel times
stress-free parking for motorists 2.2. Potential Health Problems related
Disadvantages: to the Prolonged use of IT Equipment
very high installation prices Long-term exposure to computing devices may affect user
driver and passenger reluctance of the new technology well-being.
reduction in taxi requirements could lead to Mentioned below are some of the health issues,
unemployment accompanied by their causes and prevention tactics:
maintenance of the sensors and cameras is crucial 1. Repetitive strain injury (RSI): A condition affecting the
the ever-present fear of hacking into the vehicle’s control muscles and nerves
system Cause: repetitive movements and overuse of muscles, such
Advantages of an autonomous train: as wrists
Minimizing health risks: regular breaks, ergonomic
improved punctuality equipment, correct typing techniques.
reduced running costs due to fewer staff 2. Back and neck strain: Back pain and other related
no human error issues.
minimized energy consumption Cause: due to prolonged use of monitors
possible to increase the frequency of trains as the Minimizing health risks: use adjustable chairs, footrests, and
possibility of delays is removed tiltable screens.
more straightforward to update changes in train 3. Eyestrain: strain and fatigue, unwanted harm to vision.
schedules Cause: due to bad lighting and prolonged screen usage.
Minimizing health risks: use LCDs instead of CRTs, take
Disadvantages: regular breaks, use anti-glare screens, and do regular eye
testing.
fear of the system being hacked into
4. Headaches: pain or discomfort in the head or face area.
initial instalment costs are very high
Cause: incorrect lighting, screen reflections, flickering
ensuring passenger behaviour is vital, especially during
screens, etc.
rush hours.
Minimizing health risks: use anti-glare screens, take regular
human reluctance to new technology
breaks, regular eye-testing.
without drivers, CCTV monitoring will be continuously
5. Ozone irritation: inflammation and irritation of the
required
tissues lining human airways
Advantages of autonomous aeroplanes: Cause: inhalation of ozone released by laser printers in an
office.
improvement in passenger comfort Minimizing health risks: proper ventilation, laser printers
reduced running costs, fewer staff should be housed in a separate room, replace laser printers
as most accidents are due to pilot-induced errors, safety with inkjet printers, if possible.
is improved
improved aerodynamics as an outcome of the removal of
the cockpit
Disadvantages:
Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
WWW.ZNOTES.ORG authorised for personal use only by Al-jannat at Permanent Sunrise International Schools on
12/01/25.
CAIE IGCSE
ICT
© ZNotes Education Ltd. & ZNotes Foundation 2024. All rights reserved.
This version was created by Al-jannat on Sun Jan 12 2025 for strictly personal use only.
These notes have been created by Bisma Hammad for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).