0% found this document useful (0 votes)
32 views58 pages

CAIE-IGCSE-ICT - Theory

The document provides summarized notes on the CAIE IGCSE ICT syllabus, covering key concepts such as application software, system software, hardware components, and types of computers. It discusses the differences between internal memory (RAM and ROM) and backing storage, as well as the roles of operating systems. Additionally, it highlights the impact of emerging technologies like Artificial Intelligence and Extended Reality on society and the workforce.

Uploaded by

Maryam Mahdi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views58 pages

CAIE-IGCSE-ICT - Theory

The document provides summarized notes on the CAIE IGCSE ICT syllabus, covering key concepts such as application software, system software, hardware components, and types of computers. It discusses the differences between internal memory (RAM and ROM) and backing storage, as well as the roles of operating systems. Additionally, it highlights the impact of emerging technologies like Artificial Intelligence and Extended Reality on society and the workforce.

Uploaded by

Maryam Mahdi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 58

ZNOTES.

ORG

UPDATED TO 2023-2025 SYLLABUS

CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Maryam for personal use only.
CAIE IGCSE ICT

<b>Application software:</b>
1. Types and Components of Provides services that allow the user to do specific
tasks.
Computer Systems It can be general-purpose software or custom-made
software. (Specialist software)
E.g., Spreadsheets, databases, and word processors.
1.1. Hardware & Software <b>System Software:</b>
The software is designed to provide a platform all
<b>Hardware</b> other applications to run on. For example:
1. Compilers: The software translates the High-
the electronic, physical components that make up a level language into Machine code (Language
typical computer system. These may include input and Processor).
output devices as well. 2. Linkers: A Software that creates the links
<b>Internal Hardware Devices:</b> between Language processors into workable
Central processing unit solutions (Data definition language).
Processor 3. Device drivers: A software that enables the
Motherboard device to work with another, externally
Internal memory consisting of RAM & ROM connected device.
Graphics & Sound Cards 4. Utilities: A system software that provides the
Internal Storage devices like Hard disk drives (HDD) necessary facilities (Antivirus, Scan Disk, Disk
and solid-state drives (SSD) Defragmentation, etc.)
Network interface card (NIC) 5. Operating systems: To enable computer
<b>External Hardware Devices:</b> systems to function and allow users to
Monitor communicate with computer systems, special
Keyboard software, known as operating systems (OS),
Mouse have been developed.
Printer
External Storage Devices <b>Analogue and Digital Data</b>
<b>Software</b> Computers can only understand data in the form of binary
digits (0,1); this is commonly known as digital data. However,
The techniques, methods, commands, and instructions data in the real world is analogue, not limited to two specific
tell the device what to do and how to do it. values.
They are the programs which control the computer
system and process data.
Relates to ideas & instructions for using physical objects.

<b>Two types of software:</b>

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

1. Random access memory (RAM): temporary memory


storage, lost after power is shut down, performs read
and write functions, is used to store data that are
currently in use, and can be increased in size to
improve operational speed.
2. Read-only memory (ROM): permanent memory
storage, non-volatile, can only be read from, used to
store computer’s configuration data, such as BIOS.

<i>N.B: The BIOS (basic input/output system) stores the


date, time and system configuration on a non-volatile chip
called a CMOS (complementary metal oxide semiconductor)
– this is usually battery powered.</i>
The figures show how data changes in analogue and Differentiating between Internal memories:
digital forms; analogue data forms smooth curves,
whereas digital data changes in discrete steps. 1. RAM is a temporary memory device, whereas ROM is
So, for a computer to process real-world data, it first a permanent one.
needs to convert the received data into digital form. This 2. RAM is volatile, ROM is non-volatile.
is done by hardware known as ADC (analogue to digital 3. RAM can be written to and from, but ROM can only
converter), and its output is given back in analogue form be read from.
using DAC (digital to analogue converter). 4. RAM is used to store data, files, programs, and parts
of OS that are currently in use. However, ROM is used
1.2. The Main Components of Computer in storing start-up data,

Systems <b>Input & Output Devices</b>


<b>Central Processing Unit (CPU)</b> | Input devices | Output devices | | -----------------------------------
------------------------------------------------------------------------- | -----------
The component of the computer that understands and ----------------------------------------------------------------------------------------
executes hardware and software operations. Nowadays, ----- | | An input device is any hardware that enables data
it’s also known as a microprocessor. It is a single entry. | An output shows the result or solution of the input
integrated circuit at the core of most PCs and is also <i>after</i> it has been processed. | | An input device can
present in many household gadgets and equipment only send data. | An output device can only receive data. | |
where some control or monitoring is required. Input devices are necessary for a computer to receive
It consists of a control unit (CU) that manages the input commands from the user for processing to be permitted. |
and output devices, an arithmetic and logic unit (ALU) Output devices are needed in order to display the outcome
that performs computations and makes logical of the processing that took place to the user. | | Input
judgments, and tiny memory regions known as registers. devices are complex as they must ensure proper
It processes the input and produces the outcome of the communication between the computer and the user. |
processing in the form of output. Output devices are simpler as they only need to display the
finale. |
<b>Internal Memory</b>
Input devices are pieces of hardware that allow users to
enter data into computers.
An output device displays the computer's output in a
human-readable format. For example, words on a printer
or moving graphics on a monitor.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

<b>Backing and Secondary Storage</b> 1.4. Types of Computers


Required to store significant amounts of data
permanently. Desktop Computers
Most commonly in the form of Hard disk drives and Desktop usually refers to a general-purpose computer
Solid-state drives. that is made up of a separate monitor, keyboard, mouse,
<b>Differentiating between internal memory and backing and processor unit. It is distinguished from, for example,
storage:</b> a laptop computer by the fact that it is made up of
several separate components, which makes it not very
1. RAM contents are lost when power is lost, ROM is portable.
read-only, and backing storage is permanent even Uses:
without power. 1. office and business work
2. RAM and ROM are much smaller than backing 2. educational use
storage. 3. general entertainment
3. RAM and ROM are significantly faster in accessing 4. gaming device
data than backing storage. Advantages:
4. Backing storage is much cheaper than internal 1. They are easier and less costly to upgrade and
memory. expand.
5. Internal memories are fixed, and backing storage can 2. Spare parts are standardized, which makes them
be fixed or portable. cheaper.
6. Internal memories can be directly read by the CPU, 3. They tend to have better specifications for a given
while backing storage needs to be moved into the price.
RAM before being read by the CPU. 4. No critical power consumption because they plug
into a wall socket.
1.3. Operating Systems 5. Due to fixed positions, they are less likely to be
damaged or stolen.
Controls operation of input, output & backing storage 6. As they usually have wired connections, they have
Supervises loading, running & storage of application more stable internet access.
programs. Disadvantages:
Deals with errors in application programs. 1. They are not particularly portable because they
Maintains security of the whole computer system are made up of separate components.
Maintains a computer log. 2. More complicated because all the components
need to be hooked up by wiring, which also
Operating systems offer various types of user interfaces, for clutters up the desk space.
example: 3. Because they aren’t portable, files must be copied
to another portable storage device to take work
elsewhere.

Mobile Computers
1. Laptop computer:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

(Or notebook) refers to a type of computer where the Allow normal phone calls to be made, but also have an
monitor, keyboard, pointing device and processor are all operating system (such as iOS, Android, or Windows),
together in one unit. This makes them extremely allowing them to run a number of computer applications
portable. lightweight (to aid portability). Low power (known as apps or applets). Smartphones communicate
consumption (and also long battery life). Low heat output with the internet either by using Wi-Fi hot spots or by
(cooling is very important). using 3G/4G/5G mobile phone networks.
Uses: Uses:
1. office and business work 1. They allow users to send/receive emails.
2. educational use 2. They allow users to use a number of apps.
3. used as a gaming device. 3. They allow users to use a camera feature (to take
4. general entertainment photos or videos).
Advantages: 4. They allow users to use an MP3/4 player (for
1. Portability: all components are in a single unit, so music and videos).
they can be taken anywhere. Advantages:
2. Because of one single unit, there are no trailing 1. very small in size and lightweight, makes them
wires and desk clutter. portable.
3. take up much less room on a desk, so they can be 2. connecting to the internet while on the move.
easily used in public spaces. 3. because they use Wi-Fi and mobile phone
4. portability allows them to take full advantage of networks, they can be used almost anywhere.
Wi-Fi features. 4. they have apps which can tell instant location,
Disadvantages: which is a feature that isn’t available in either
1. portability makes it easier for them to be stolen. desktops or laptops.
2. limited battery life means the user needs to carry 5. they have reasonable battery life.
a charger at all times. Disadvantages:
3. keyboards and pointing devices may be awkward 1. small screens and keyboards make pages difficult
to use. to read.
4. not easy to upgrade, like adding more RAM. 2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
2. Smartphones: the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops.
7. The data transfer rate using mobile phone
networks can be slower than with Wi-Fi.

3. Tablets:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

They work similarly to a smartphone. The only main


difference is that they are somewhat bigger in size as
compared to a smartphone.
Uses:
1. They allow users to send/receive emails.
2. They allow users to use a number of apps.
3. They allow users to use a camera feature (to take
photos or videos).
4. They allow users to use an MP3/4 player (for
music and videos).
Advantages of tablets compared to laptops:
1. very fast to switch on (no time delay waiting for
the operating system to load up). Uses:
2. fully portable – they are so lightweight that they Entertainment (streaming of music, videos, and
can be carried anywhere. television programs).
3. touch screen technology means they are simple Gaming (including group games).
to use and don’t need any other input devices. As a camera or video camera.
4. not much heat, they use solid-state technology. Internet use (online sales, social networks, using QR
5. The battery life of a tablet is a lot longer. codes, and so on).
6. when the power button is pressed, it goes into Sending/receiving emails.
standby but remains connected to the internet so Global positioning system (use of maps to navigate to
the user still hears alerts when emails or other a location).
‘events’ are received. Calendar functions.
Disadvantages of tablets compared to laptops: Telephone banking (sending and receiving money
1. tend to be rather expensive when compared to using banking apps).
laptops. Voice over Internet Protocol: telephone network
2. they often have limited memory/storage when using the internet, which also allows video calling.
compared to a laptop. Instant access to social networks (social contact with
3. typing on a touch screen can be slow and error- friends no matter where you are in the world).
prone compared to a standard keyboard. Instant messaging.
4. laptops tend to support more file formats than Office and business management (allows rapid voice
tablets. and video communication).
Education use (using interactive software to teach or
4. Phablets: learn from).
Remotely control devices.
Some of the latest smartphones have been designed as a
hybrid between a tablet and a smartphone, referred to Laptops are the most expandable of these devices, while
as a phablet. They have much larger screens than a smartphones are the most portable. Tablets and
smartphone but are smaller than a tablet. phablets fall somewhere in between, offering a balance
of portability and expandability. The choice of device
will depend on your specific needs and use case.

1.5. Impact of Emerging Technologies

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Artificial Intelligence (AI): There are many definitions of Unemployment, robots are capable of doing tedious
artificial intelligence (AI). Essentially, AI is a machine or human tasks with much more efficiency and excellence
application which carries out a task that requires some than humans.
degree of intelligence. Dependency on technology could lead to problems in the
The use of language future.
recognizing a person’s face, the ability to operate De-skilling: Tasks that used to be considered a talent are
machinery, such as a car, aeroplane, train, and so on, now part of general, tedious processes that are done on
and analyzing data to predict the outcome of a future a regular basis by machines.
event, such as weather forecasting. Impact: Extended Reality (XR) refers to combined real and
Whenever AI is mentioned, people usually think of virtual environments. The two most common examples
science fiction fantasies and think of robots. The at the moment are:
science fiction writer Isaac Asimov even went as far Augmented reality (AR) is a merger between the
as producing his three laws of robotics: » Robots may virtual and physical (real) world; it lays objects onto
not injure a human through action or inaction. » pre-existing objects. e.g., Pokémon GO! Impact: safety
Robots must obey orders given by humans without and rescue operations’ training, shopping and retail
question. » A robot must protect itself unless it (getting a better look at a car before the purchase),
conflicts with the two laws above. Everyday uses: healthcare (better understanding of a patient’s body)
An autonomous (driverless) vehicle – we already have Virtual reality (VR) enables an entirely new world to
driverless trains and autopilots on aeroplanes, but be created, unlike AR, which has no link to the actual
future developments include driverless cars. surroundings of the user. It requires the user to be
Robotic research is leading to improvements in specially equipped with a VR headset, joystick, and
technology to help amputees and people with headphones.
disabilities. Impact: Military applications, educational
Robots are used to help people carry out dangerous purposes (looking at ancient buildings),
or unpleasant tasks – for example, bomb disposal. healthcare, media (interactive special effects in a
movie), scientific visualization (part of molecular
Negative impacts of AI structures/cells).

2. Input & Output Devices


2.1. Input Devices and Their Uses
An input device is any hardware device that allows a user
to enter data or instructions into a computer directly.
An input device can send data to another device, but it
cannot receive data from another device.
Input devices are necessary for a computer to receive
commands from its users and data to process; they are
under the user's control or can be direct data entry.

Input devices can be complicated because they must ensure


the user can interact with the computer correctly.

1. Keyboards:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Uses:
Sometimes, they have small keys, which can make input
Input of data into applications software more difficult.
Typing in commands to the computer Sometimes, the order of the numbers on the keypad is
not intuitive.
Advantages:

Fast entry of new text into a document.


Well-known method.
Easy to use for most people.
Easier to do verification checks as data is entered (can
immediately compare the source document with typed
data on the screen).
3. Mouse:
Disadvantages:
Uses:
It can be difficult to use if the user has limited arm/wrist
use. Opening, closing and minimizing software
Slow method when compared to direct data entry. Grouping, moving and deleting files.
It is a fairly large device that uses up valuable desk space. Image editing, for example, controls the size and position
of a drawing pasted into a document.
Controlling the position of a pointer on the screen to
allow selection.

Advantages:

It is a faster method for choosing an option than a


keyboard.
It's a very quick way of navigating through applications
and the internet.
2. Numeric keypads: Does not need a large desk area when compared to a
keyboard.
Uses:
Disadvantages:
Automatic teller machines (ATMs), where the customer
can key in their PIN, amount of money, etc. It can be more difficult for people with restricted
Mobile phones allow phone numbers, etc., to be keyed hand/wrist movement than using a keyboard for data
in. entry.
Point of sale terminals (POS) in case the barcode reader Easy to damage, the older type of mouse quickly
fails to read the barcode – the number has to be keyed in becomes clogged up with dirt.
manually by the operator. Difficult to use if no flat surface is readily available.
Chip and PIN devices when paying by credit/debit cards.
Fast entry of numeric data into a spreadsheet.

Advantages:

Faster than standard keyboards when entering numeric


data.
Because many are small devices, they are very easy to
carry around.
4. Touchpad:
Disadvantages:
Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Opening, closing and minimizing software Does not need the same fine control as a mouse.
Grouping, moving and deleting files. It is easier to use than a mouse if the operator has
Image editing, for example, controls the size and position problems with their wrist.
of a drawing pasted into a document. More accurately position the pointer on the screen.
Controlling the position of a pointer on the screen to They are more robust than a mouse.
allow selection. Needs less desk space than a mouse or keyboard.
Advantages: Disadvantages:

Faster than a keyboard for choosing options. It is not supplied with the computer as a standard;
Used to navigate applications and the internet. therefore, it is more costly.
Because the touchpad is integrated into the laptop Users may need training because it is not standard
computer, there is no need for a separate mouse; this equipment.
aids the portability and is a big advantage if no flat
surfaces are available.

Disadvantages:

People with limited hand/wrist movement find the device


difficult to use.
It can be more difficult to control the pointer when
compared to a normal mouse.
Drag and drop operations are more complicated using a
touchpad.

6. Remote Control:
Uses:

Televisions, satellite systems, DVD/Blu-ray players and


Hi-Fi systems, to alter controls such as volume, on/off,
etc.
Used to control multimedia systems.
Used in industrial applications to remotely control
5. Tracker ball: processes.

Advantages:
Uses:
It can be operated from any reasonable distance.
A good alternative to a mouse for people with conditions In some conditions, e.g., in chemically hazardous
such as RSI. environments, we can control and measure from safe
Used in an industrial control room environment. distances.
Used in some luxury cars to select functions such as
radio. Disadvantages:
Advantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Advantages:
Difficult to use for people with limited hand/wrist
movements. It's a more realistic experience than both mouse and
Physical obstacles can easily block the signal. joystick.
Easier than a keyboard or joystick to control steering
movements.

Disadvantages:
It is a rather expensive input device as compared to a
mouse or joystick.
Steering movements tend to be over-sensitive, which
gives an unrealistic feel.
Unless it is an expensive simulator, feedback to the
steering wheel is non-existent.

7. Joysticks:
Uses:

Used in video games.


Used in simulators to mimic the actual controls.

Advantages:
9. Touch screen (as an input device):
It is easier than keyboards for screen navigation.
In some applications, the control is more realistic than Uses:
using a mouse.
Automatic teller machines (ATMs) to choose from on-
Disadvantages: screen options.
Point of sale terminals such as in restaurants.
The on-screen pointer is more difficult to use. Interactive whiteboards in education.
Computer-based training (CBT) where answers are
selected during on-screen testing.

Advantages:
Faster entry of options than using a keyboard or mouse.
Very easy method for choosing options.
User-friendly method – no training necessary in its use.
Option to expand the size of the display if necessary.

Disadvantages:

8. Driving wheel:
Uses:
Used in video games, especially car racing games.
Used in simulators to mimic actual vehicle controls.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

A limited number of input options are available. Limited quality, depending on how good the scanner’s
This can lead to problems if an operator uses the system resolution is.
frequently (straining of arm muscles, RSI, etc., are all Fairly slow input method, especially if color mode is
possible). selected.
The screen can get very dirty with constant touching.

11. Digital Cameras:


Uses:
Taking photographs is still better than using
10. Scanners: smartphones and tablets.
Data-capture device, e.g., as a reversing aid in cars.
Uses: Dentistry, to help capture pictures for better diagnosis.
Scanning documents and converting them into different The creation of virtual reality tours around houses,
formats buildings, etc.
Scanning in old documents to protect them in case the Advantages:
original is lost/damaged.
Scanning in photographs for storage Easier to produce better-quality photographs than with a
Scanning in barcodes at POS terminals. traditional camera.
Uploading photographs to a computer is faster than
Advantages: scanning hard copies.
Images can be stored for editing at a later date. Memory cards can store many thousands of
When used with OCR, they are much faster and more photographs.
accurate than typing the documents in. There is no need to develop film and printouts; it saves
It is possible to recover damaged documents by scanning money and is more environmentally friendly.
and producing an acceptable copy. Unwanted images can quickly be deleted from a memory
card.
Disadvantages: Higher quantity of pictures can be taken in a shorter
time.
Resolution of images is clearer compared to traditional
ones.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Need to be computer literate to know proper use. Temperature sensors are used in automatic washing
Loss of artistry due to clever software doing all the work. machines, central heating systems, ovens, and
Images need to be compressed to reduce the amount of glasshouses.
memory used. Pressure sensors are used in intruder alarm systems and
washing machines.
Light sensors are used in automatic glasshouses, doors,
and street lighting control.
Sound/acoustic sensors are used in intruder alarm
systems, monitoring liquid and powder flow in pipes.
Humidity/moisture sensors are used in automatic
glasshouses, environmental monitoring, and in factories
where moisture levels are crucial.
pH sensors are used in automatic glasshouses, chemical
processes and environmental monitoring.

12. Microphones: Advantages:

Readings are more accurate as compared to human


Uses: operators.
To input speech to be used in various applications. Readers are continuous, with no breaks in the
Input in voice recognition software for authentication. monitoring.
As a sensor to pick up sound in an intruder alarm Because it is a continuous process, any action or
system. warnings needed will be initiated immediately.
Used in audio conferencing or VoIP applications. Automatic systems don’t need human intervention.

Advantages: Disadvantages:

It is faster to read text than it is to type it in. Faulty sensors can give spurious results.
It is possible to manipulate sound in real time rather Most sensors are analogue; therefore, they require
than working on a completed recording. conversion using Analogue to Digital Convertors.
It improves security if used as an authentication system.
14. Light pens:
Disadvantages:
Uses:
Sound files use up a lot of computer memory.
Reading data is more error-prone than typing in. Selecting objects on CRT screens
Drawing on screens
Advantages:

Greater accuracy than touch screens


Small makes them portable and capable of being used in
small spaces.
Easy-to-use technology.
Disadvantages:

13. Sensors:
Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Lagging problems while drawing on the screen. It is more secure than contactless cards as the PIN acts
It only works with CRT monitors. as a second security layer.
Rather outdated technology. More robust system than Magnetic Stripe Cards

Disadvantages:

Be very careful so the PIN isn’t seen by anyone while


being typed in.

2.2. Direct Data Entry & Associated


Devices
1. Magnetic Stripe Readers:
Uses:

On credit/debit card for use at ATMs 3. Radio Frequency Identification (RFID) reader:
Security device to allow entry to buildings, hotels, etc.
Uses:
Advantages:
Livestock tracking
Faster than keying in data manually. Retail, instead of barcodes, as they don’t need to be
Error-free, no human intervention needed. scanned in.
Secure information isn’t in human-readable form. Admission passes.
Robust, there are no moving parts. Library books, to acknowledge the books which have
been borrowed.
Disadvantages:
Advantages:
If the card is damaged, the data is lost.
Doesn’t work at a distance. No line-of-sight contact is needed.
As the information isn’t human-readable, this can be a Very robust and reliable technology.
disadvantage in some cases. Very fast read rate.
Bidirectional data transfer.
Bulk detection is possible.
Disadvantages:

Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal.
RFID is more expensive than a comparable barcode
system.
2. Chip and PIN reader:
4. Optical Mark Reader/Recognition (OMR):
Uses:
Uses:
Where payments are made using cards

Advantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Used in MCQs checking. System has difficulty in reading different handwritings.


Used in reading voting papers. Still not a very accurate technique.

Advantages:

Very fast way of inputting survey results.


It is more accurate because there is no human
intervention.
More accurate than OCR methods.

Disadvantages:

Designing the forms can be complicated to ensure the


marks are correctly positioned. 6. Barcode readers:
If there are problems, they need to be manually checked,
which can be time-consuming. Uses:

Used in supermarkets for stock control.


In libraries, to keep track of books.
As a safety function to ensure checking of electrical
equipment on a daily basis.

Advantages:

Much faster than manually keying in data.


Allow automatic stock control.
They are a tried and trusted technology.
5. Optical Character Recognition/Reader (OCR):
Disadvantages:
Uses:
Relatively expensive system to administer.
Processing passports and identity cards. Not fool-proof, barcodes can be swapped between
Converting hard copy documents into electronic form. items.
Used in automatic number plate recognition (ANPR) Can be more easily damaged than RFID tags or magnetic
systems. stripes.
Digitizing historic hard copies for archiving.

Advantages:
It is a much faster data entry system than manual typing.
No human intervention, its error free.

Disadvantages:

7. Quick response (QR) code scanner:


Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

used in advertising to contain information about the They are very heavy and bulky.
advertising company. They run very hot and can cause fires if left unattended.
Wi-Fi authentication They use a lot more power than LCDs.
Used in restaurants, you can see the menu by scanning. Their flickering can lead to headaches.
Image burn-in is a common issue.
Advantages:

hold much more information than normal barcode.


fewer errors than with barcodes.
QR codes are easier to read because the cameras can
even read them on a smartphone.
It is possible to encrypt QR codes.

Disadvantages:
More than one QR format is available.
QR codes can be used to transmit malicious data.

2. Liquid Crystal Display (LCD) screens:


Uses:

Main output device for modern computers.


Mobile phones, laptops, video games use LCD screens.

Advantages:
Very efficient, low power consumption.
Lightweight devices.
Screens can be made in various sizes.
No flickering images.
Very sharp image resolution.
2.3. Output Devices and Their Uses
Disadvantages:
1. Cathode ray tube (CRT) monitors:
Uses:

Their large screens allow complex diagrams to be


created in Computer-aided design.
Used with light pens to allow designs to be created.

Advantages:

Can be seen at a wider range of angles, unlike LCDs.


Allow the use of light pens.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Colour and contrast from different angles are They tend to get dirty with frequent use.
inconsistent. Frequent use results in straining of arm muscles, RSI, etc.
Motion blur is a common issue. If large amounts of data are input/output, they aren’t
Lower contrast than CRT monitors. very accurate, and the interface isn’t very fast.

3. Touch screen (as an output devices): 4. Multimedia projectors:


Uses: Uses:
ATMs Training presentations to allow the whole audience to
POS terminals see images.
Information kiosks. Advertising presentations.
Home cinema systems.
Advantages:
Advantages:
Don’t need additional input devices.
They are very interactive, and many functions, such as More people can watch as they don’t have to crowd
swiping, can be done. around a laptop.
They add a high-tech feel to devices and interfaces. Avoids the need for several networked computers.

Disadvantages: Disadvantages:
Images can be fuzzy.
Expensive to buy.
Set-up can be complicated.

5. Laser printers:
Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

In uses where low noise is required. Slow output if many copies are needed.
If fast, high quality, high-volume printing is required. Can’t do large print jobs.
Printing can smudge if user isn’t careful.
Advantages: Can be expensive if used a lot.
Printing is fast.
They can handle very large print jobs.
Quality is consistently high.
Toner cartridges last for a long time.

Disadvantages:

They are only considerably fast if several copies are


being made.
Color laser printers are expensive to run.
They produce ozone and volatile organic compounds
because of their printing method and toner.
7. Dot matrix printers:
Uses:
Used in environments where noise isn’t a major issue.
Carbon copies or multi-part outputs can be produced.
Widely used in till receipts.

Advantages:
Can be used in varying environments unlike laser/inkjet
printers.
Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
6. Inkjet printers: Good for continuous printing.

Uses: Disadvantages:

Where low-output volumes are required.


Where high-quality printing is required for single pages.

Advantages:

High-quality output
Cheaper than laser printers.
Very lightweight
Don’t produce ozone and volatile organic compounds.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Uses:
Very noisy
Initial cost is more than an inkjet printer. Custom-made prosthetic limbs.
Very slow, poor-quality printing. In aerospace, if parts of the aircraft are made using 3d
printers they can be very lightweight.
Making spare parts for items that aren’t now
manufactured, e.g., parts of a vintage car.
Advantages:

Manufacturing objects has become much easier.


Even though the initial cost is high, it is still cheaper than
the more conventional way.
Parts for machinery that aren’t available can be made.
Disadvantages:

Potential to make counterfeit items.


Could lead to manufacture of dangerous items by almost
8. (Graph) Plotters: anyone.
Job loss potential.
Uses:

Producing architectural drawings


Producing engineering drawings
Drawing animation characters.

Advantages:

Very high-quality output.


can produce large, monochrome and color drawings very
accurately.
Can print on a variety on materials.

Disadvantages:

Very slow printing. 10. Speaker:


Expensive equipment to purchase initially.
Have a very large physical footprint compared to a Uses:
printer.
Used in all phones and most computers.
Helps visually impaired people.
Plays downloaded sound files.

Advantages:

Amplified sounds can be much louder than the original


sound.
Amplified sounds can be enough to be heard by a huge
crowd.
Very simple technology.
They are especially useful for blind people, for instance,
9. 3D printers: reading e-books.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Speaker output can disturb irrelevant people in the same Holds data magnetically.
area, e.g., an office. The surface area of the media is magnetised so that it
Sound quality is high only expensive speakers. can hold bits of data.
They take up a lot of desk space. The device that reads media can also read the bits held
on the surface area

Magnetic tape drives


Uses:

used in applications where batch processing is used.


used as a backup media where vast amounts of data
need to be stored.
used in long-term archiving of data, they have huge data
storage capacities and are known to be very stable.

Advantages:

They are generally less expensive than hard disk drives.


11. Actuators:
It is a very robust technology.
Uses: They have a huge data storage capacity.
The data transfer rate is fast.
Used to turn on motors, buzzers, and switches.
Allow a computer to control physical devices, Disadvantages:

Advantages: Prolonged data access times (uses serial access).


When updating, another tape is needed to store the final
Allow remote operation of many devices. updated version.
Relatively inexpensive devices. They are affected by magnetic fields, a strong field can
corrupt data stored on the tape.
Disadvantages:
Fixed Hard Disks/Drives
They are an additional device in the system that could go
wrong. Uses:
As analogue devices, signals need to be converted using
a DAC. To store the OS, systems software and working
data/files.
3. Storage Devices and Media Storing applications files.
Used in real-time systems and in online systems.
Used in file servers for computer networks.
3.1. Backing-Up Data Advantages:
Backing up refers to copying files or data into a different They have a very fast data transfer rate and fast access
medium in case of damage or loss of original copy. times to data.
They have a very large memory capacity.
Why do we back up data?
Disadvantages:
To safeguard against loss of data.
To safeguard against damages caused by hackers. It can be fairly easily damaged.
In case files need to be sent elsewhere, to protect the They have many moving parts which affect overall
original format of files. reliability.
Backups can be stored online for easy access. Their read/write operation can be quite noisy when
compared to solid-state drives.
3.2. Magnetic Backing Storage Media Portable Hard Disk Drives
Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Can be used as a backup system to prevent data loss. It can be written over many times.
It can be used to transfer data/files/software between You can use different file formats each time it is used.
computers. It is not as wasteful as the R format because the
files/data can be added later.
Advantages:
Disadvantages:
Data access time and data transfer rate are very fast.
It has a very large memory capacity. It can be relatively expensive media.
It can be used as a method of transferring information Possible to accidentally overwrite data.
between computers.
CD-ROM/DVD-ROM ~ Read Only Memory
Disadvantages:
Uses:
They can be easily damaged if user accidentally drops it
or doesn’t correctly shut down the drive after use. These are read-only memory (ROM), which means they
The data transfer rate is not as fast as for fixed hard disk can’t be written over and can only be read. Permanent
drives. storage method.
CD-ROM is used to store music files and to store
3.3. Optical Media and Optical Storage software, computer games and reference software.
DVD-ROM has much larger storage and is used to store
Devices films.
Used in applications where there is a real need to
Holds data by burning ‘dots’ onto the surface with a high- prevent deletion or overwriting of important data.
powered laser.
The data that reads the media can read the data by Advantages:
shining a lower-powered laser over the dots.
They are less expensive than hard disk drive systems.
CD-R/DVD-R ~ Write Once Only They are very portable as they are small and light.
Data stored on them is read-only, so it cannot be
Uses: accidentally overwritten.

Home recordings of music and (CD-R) and films (DVD-R). Disadvantages:


Used to store data to be kept for later use or transferred
to another computer. Hold far less data than hard disk drives or memory
sticks.
Advantages: Very slow data transfer rate and data access times, as
compared to hard disk drives.
Cheaper medium than RW disks. You cannot add your files to the disks because they are
Once burned (and finalised), they behave like a ROM. both read-only.
Disadvantages: Blu-Ray Discs
It can only be recorded once; if an error occurs, then the
disk has to be thrown away. The main differences between DVD and Blu-ray are:
Not all CD/DVD players can read CD-R/DVD-R. 1. Blu-ray uses a blue laser rather than a red laser. (The
wavelength of blue light is 405nm, much smaller than
CD-RW/DVD-RW ~ Read and Write the 650nm red laser) This makes pits and lands much
smaller, so they store five times more data than
Uses:
DVDs.
Used to record television programs which can be 2. Blu-ray disks automatically come with a secure
recorded over, time and time again. encryption system, which helps to prevent piracy and
Used in CCTV systems. copyright infringement.
It can be used as a backup device for files and data. 3. The data transfer rate for a DVD is 10 Mbps, and for a
Blu-ray disc, it is 36 Mbps.
Advantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Uses: Uses:
Home video consoles. Storage device to store files, applications, operating
Storing and playing back movies. systems, and backups.
Computers can use this technology for data storage or
backing hard drives. Advantages
Camcorders can use this media to store movies. Generally offers larger stroage capacities than SSDs.
Advantages: More affordable compared to SSDs.
Well-suited for long-term storage needs.
Very large storage capacity. Reliable for non-intensive read/write operations.
Very fast data transfer rate.
The data access speed is also greater than with other Disadvantages
optical media. Have moving parts, making them more prone to
Blu-ray discs automatically come with a secure
damage.
encryption system. Heavier and bulkier compared to SSDs.
Disadvantages: Higher power consumption.
Slower data transfer and access speeds compared to
Relatively expensive discs. SSDs.
Encryption problems when used to store videos. Generates more heat and noise.
The introduction of HD (high definition) DVD players has
reduced the advantages of using Blu-ray technology. Pen drives (Memory sticks)
Uses:
3.4. Solid State Backing Storage
Transporting files between computers or using them as a
Holds data on devices that don’t have any moving parts. backing store.
Used as a security device to prevent software piracy
Solid-state drives (SSD) (known as a dongle).
Uses: Advantages:
Storage device to store files, applications, OSs, and so on. Very compact and portable media.
Very robust.
Advantages: Does not need additional software to work on most
They are more reliable as they have no moving parts. computers.
They are considerably lighter and suitable for laptops. They are not affected by magnetic fields.
They do not have to ‘get up to speed’ before they work Disadvantages:
correctly.
They have lower power consumption. Cannot protect the data/files by making it ‘read-only’.
They run much cooler than HDDs. Easy to lose (due to the small physical size).
Because they have no moving parts, they are very thin. The user needs to be very careful when removing a
SSD data access time is only 0.1 milliseconds compared memory stick from a computer - incorrect removal will
to 10 milliseconds for HDD. corrupt the data on the memory stick and make it
Data transfer speed for SSDs is also much faster than for useless.
HDDs.
Flash Memory cards
Disadvantages:
SSD endurance - SSDs are conservatively rated at only Different types of memory cards:
20GB write operations per day over three years. » SD cards (secure digital card; widely used in portable
More expensive than magnetic hard disks. devices).
Smaller storage capacity than magnetic hard disks. » XD cards (extreme digital card; mainly found in older digital
cameras).
Hard Disk Drives (HDD)

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
» CFast card (compact, fast card; designed for high-speed A MAC address (Media Access Control address) is a unique
data transfer in professional cameras). identifier assigned to a network interface card (NIC). It is a
Uses: hardware address and doesn’t change, unlike an IP address.
Routers
Storing photos on digital cameras. A device that enables data to be sent between different
Used as mobile phone memory cards. types of networks. It can be connected through cables or
Used in MP3 players to store music files. wirelessly to connect a LAN to the internet.
Used as a backing store in hand-held computer devices. It can be used for:
Advantages: connecting networks and devices to the internet,
Very compact. storing computer addresses,
Because they have no moving parts, they are very routing data packets.
durable. When a data packet is received, the router checks if the
They can hold large amounts of data. packet is intended for it or another network. The data packet
Compact cameras and smartphones can read and write is routed to the local switch/hub if it's meant for its network.
memory cards, allowing users to transport extensive If not, the data packet is sent to the relevant router, which
collections of photographs, songs, etc. sends it to the relevant device.
Disadvantages: They consult routing cables to know where to send the
Expensive per gigabyte of memory when compared to data.
HDDs. A WAN (Wide Area Network) covers a large geographical
Have a lower storage capacity than hard disks. area, like the internet.
Have a finite life regarding the number of times they can A WLAN (Wireless Local Area Network) connects devices
be read from or written to. wirelessly within a small area like a building.
Memory cards, specifically the micro SD card, are the Data Packets
smallest sized devices available, making them more likely A data packet is a small chunk of data sent over a network. It
to be lost, stolen or damaged. The storage should be contains both the actual data and control information, such
sized cause the amount of storage does not prevent the as the destination address, source address, and error
drive from being stolen checking bits.
Users must often purchase a card reader or USB
converter to view the data. Common Network Devices

4. Networks & the Effects of 1. Network Interface Cards (NIC): These are needed
to allow a device to connect to a network. Turns
Using Them binary data into an electrical signal that allows
network access. Usually integrated into the
motherboard.
4.1. Networks Each NIC is given a unique hardwired media access
IP and MAC address control (MAC) address.
Media access control (MAC) address: a number that
An IP address (Internet Protocol address) is a unique
uniquely identifies a device when connected to a
number assigned to a device on a network.
network.
IPv4 is a 32-bit address (e.g., 192.168.1.1) The first six hex digits identify the manufacturer’s code,
IPv6 is a newer 128-bit address that allows many more and the next 6 identify the device’s serial number.
unique addresses (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334)

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

2. Hubs: they are hardware devices that can have When transferring data between 2 or more devices that
several other devices connected to them. They are are very close together.
used to connect devices together to form a local area When the speed of data transmission isn’t crucial.
network (LAN). It takes a data packet received by one For low-bandwidth applications.
of its ports and sends it to all relevant or irrelevant
devices that are connected to it. Wi-Fi uses:

It is not very secure to broadcast data to all devices. Full-scale networks.


Unnecessary network traffic. When the data transfer rate is crucial.
For uses where a higher range and better security are
3. Switches: intelligent hubs. Used to connect devices required.
to form a LAN. Unlike hubs, the switches store the
MAC addresses of all devices on a lookup table. So, it Differences and similarities:
only sends data to the relevant device.
Bluetooth uses a transmission frequency of 2.4 GHz,
In summary: whereas Wi-Fi uses a 2.4 – 5.0 GHz range.
Both are used to connect devices in LAN. Wi-Fi has a much faster data transfer rate.
Both use data packets. Wi-Fi has a higher geographical range in which it is
Hubs send data to every device on the network. effective.
Switches send data to a relevant device only. Bluetooth only allows up to 7 devices to be connected
Switches have better security. simultaneously, whereas the number of devices
Switches use lookup tables to determine the destination connected to a Wi-Fi network depends on the
for a data packet. router/routers used.
Switches use MAC addresses for relevant device Bluetooth uses key-matching encryption. However, Wi-Fi
locations. uses WPA (Wi-Fi protected access) and WEP (wireless
equivalent privacy).
4. Bridges: Devices that connect one LAN to another
LAN that use the same protocol. Unlike routers, they Cloud Computing
can’t communicate with external networks, such as
the Internet. This method is where data is stored on remote servers
Comparison: accessed online.
The three types of cloud storage are:
Bridges connect LANs together; routers connect various
types of networks together. 1. Public Cloud - The customer and the cloud storage
Bridges scan MAC addresses while routers scan the IP provider are different companies.
addresses. 2. Private Cloud - The customer and the cloud storage
Both send out data in the form of data packets. provider are a single organization.
Bridges connect networks with the same protocol; 3. Hybrid Cloud - Combines public and private cloud
routers can connect networks with different protocols. options and allows sensitive data to remain private
The router uses routing tables to direct data packets, but while providing public cloud services for less sensitive
bridges don’t. information.
Bridges have only two ports; routers have multiple ports.
Cloud data is duplicated and stored on other servers to
Wi-Fi & Bluetooth ensure availability during system failures, upgrades, and
maintenance.
Both are used for wireless communication between devices. Advantages:
They both use electromagnetic radiation as the carrier of
data transmission.
Bluetooth uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Services can be scaled up or down according to changing 2. Intranet:


requirements.
Cloud storage eliminates the need for a business to Usually private and are used to send information
purchase expensive equipment for infrastructure and securely and safely.
maintenance. Access to an organization’s Intranet is restricted and only
Readily available globally, allowing both remote working accessible to authorized users such as employees.
and data sharing. Intranets have many advantages over the internet, such
Providers offer high levels of ensuring that services are as:
always available. better bandwidth than the internet,
It can offer an almost unlimited amount of storage. data is kept within the organization,
A backup of the data from the cloud will allow full data less chance of hacking and attacks,
recovery in case of incidents. administrators can manage access to external sites
Files can be synced across multiple devices. and links.
There is no need to carry storage devices around.
Characteristics:
Disadvantages:
A private network that is accessible to employees within
A stable internet connection is always required. a company or organization.
Data storage in clouds may be vulnerable to security Usually behind a firewall to ensure security.
breaches. Allows for document sharing and the use of
The user depends on the storage provider for reliability collaboration tools between users.
and availability of services. It can be customized to meet the specific requirements
The services may become expensive as the amount of of the business.
storage or bandwidth required increases. Users will require a username and password to access
the Intranet.
Common Network Environments
3. Extranet:
1. Internet:
The Internet is a very large global network that consists
of many other interconnected networks
The World Wide Web is a vast collection of web pages
that can be accessed using a web browser.
The World Wide Web allows you to access information
by using the internet
Characteristics:

It is an open network, meaning everyone can access the


same resources and information as everybody else.
People from all over the world can communicate with
each other in real-time.
Available to anyone who has a suitable device and access
to any one of the interconnected networks.

Uses:

Education and training


Social Networking
Online shopping
Entertainment

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Private Intranet that also allows access by selected Allows centralized management of updates, backups and
parties that reside outside of the organization. These software installations.
parties, for example, maybe customers, key stakeholders Can secure its devices with the use of firewalls, antivirus
or clients. software and other security features to prevent
Users will have an authorization level once they have unauthorized access.
successfully logged in, which will determine which A LAN allows users on the network to share resources
resources they may access. such as printers and other peripherals.
Similarities between the Internet, Intranet and extranet
are as follows: Disadvantages:
They are all web-based technologies The network may not function correctly in case of
They allow users to access information remotely hardware failure.
They all use client-server architecture
They are more prone to attacks than standalone
They all use security measures such as computers.
authentication and encryption Data and peripheral accessing can be slow, based on
They all promote and facilitate information and network traffic.
resource sharing LAN networks require maintenance to ensure the
Differences between the internet, intranet and extranet
software is up-to-date.
are as follows:
The internet is a global network, whereas an 2. Wireless Local Area Network (WLAN): Local Area
intranet/extranet is a private network contained Networks allow devices to connect wirelessly rather
within an organization than using physical cables. Wireless Access Points
The use of the internet covers a wide range of (WAPs) are connected to an existing wired network,
purposes, whereas an intranet/extranet is designed which provides wireless connectivity. Support a vast
for specific users and purposes. range of devices, such as smartphones and laptops,
Much information is publicly available, whereas an are very popular in public areas such as shopping
intranet/extranet is not. malls.
The Internet is not owned solely by one person or
organization, whereas the organization usually owns Advantages:
intranets/extranets.
Allows users to connect anywhere in the range of a
Network Types Wireless Access Point (WAP).
They can be used in various indoor and outdoor
1. Local Area Network (LAN): networks usually environments, making them highly flexible.
contained within a single building or small As the requirements change, additional WAPs can be
geographical location. It is made up of hubs and/or added relatively easily.
switches, which will connect several devices together. Printer access can be given to wireless devices.
One hub or switch commonly connects to a router, Disadvantages:
allowing LAN connectivity to other outside networks
such as the Internet. The strength of their signals can be affected by obstacles
such as walls.
Advantages: Speeds can be affected by high-traffic areas.
It can sustain interference from other devices which can
affect performance and connectivity.
Can be vulnerable to security threats due to signal
interception.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

3. Wide Area Networks (WAN): is formed by several There are many ways to enhance the security of your
LANs connected through a router. It is expensive. password, such as the following:
However, it comes with a more enhanced security. Ensure that the password is changed regularly in case
Additional hardware is needed for a WAN: Routers, it has been obtained illegally or accidentally
modems, and proxy servers. Ensure that the password uses a combination of
uppercase, lowercase, numbers and special
Advantages: characters to make the password more difficult to
Provide the ability to connect geographically dispersed guess.
locations, such as offices in different cities or countries. iloveict is a weak password
Offer the flexibility to scale up or down based on the 1lov3ICT# is a strong password
organisation's needs. Anti-spyware software can be run regularly to ensure
that your information, including your password, is not
Administrators can monitor and manage the network
infrastructure from a single location. passed to an unauthorized third-party user.

Disadvantages: Other Authentication Methods


Setting up and maintaining a WAN can be expensive,
especially compared to LANs.
Cover larger distances and rely on public networks or
leased lines, which can introduce latency and affect
performance.
WANs are subject to the reliability and availability of
external service providers.

4.2. Network Issues and


Communication
Connection to a network exposes a user to:
Hacking: Unauthorized access given to the
computer. This can lead to identity theft or the
misuse of personal information.
Phishing: Phishing involves getting sensitive
information, such as usernames, passwords, and
credit card details, for malicious reasons by
mimicking a reliable webpage on the network
Pharming: This is malicious code installed on a user’s
computer or a web server; the code will redirect the
user to a fake website without their knowledge (the
user doesn’t have to take any action, unlike phishing).
Viruses: Program code that replicates (copies itself)
to delete or corrupt files and cause the computer to
malfunction

Passwords
It is a common form of security often accompanied by a
username or email address.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Standard features of Anti-Malware software include the
1. Zero login: A security concept that eliminates following:
traditional login methods, such as usernames and
passwords, using biometrics or other authentication Comparing the scanned files against an extensive
factors for seamless and password-less access. database of known threats
2. Biometric Recognition: These authentication Real-time scanning
methods use unique physical or behavioural Regular updates to gather an up-to-date list of known
characteristics, such as fingerprints, iris scans, or threats
voice recognition, to verify a person's identity. Quarantine of infected files
3. Magnetic Stripes: These are authentication features Quarantining files allows threats to be automatically
on cards storing data magnetically. They enable deleted.
secure identification and authorization by containing Allows the user to determine if the file is a legitimate
encoded information that magnetic stripe readers threat and not a false positive.
can read.
4. Smart Cards: Smart cards are portable devices with Heuristic Checking: Instead of relying solely on a database
integrated circuits to store and process data. They of known viruses, this method looks for behavioural patterns
are used for authentication, identification, and secure and other features in a file to identify possible risks.
transactions in various applications such as banking,
telecommunications, and access control. Electronic Conferencing
5. Physical Tokens: It is a type of authentication that
1. Video Conferencing: It is a form of audio and video
takes the shape of a solid object. The user
communication. It serves as a stand-in for face-to-
demonstrates ownership of the token through
interaction with a login system. Physical tokens have face meetings between several persons who may
embedded clocks that create one-time passwords reside abroad or in another region of the country. It
utilizes a network in some way and is done in real-
(OTPs) when a PIN and other authentication
time.
information are entered.
6. Electronic Tokens are applications that users install The basic hardware includes:
on their hardware, such as smartphones. Say a
person wants to access a website on a tablet webcams,
computer. To access this website, users must first large monitors/television screens,
authenticate themselves using electronic tokens. The microphones,
user has already set up the electronic token app with speakers.
their smartphone. The user launches the app on their
smartphone when the website asks them to verify The software used are:
their identity. The program creates an OTP that is Webcam and microphone software drivers
only good for a short period of time. CODEC (coder and de-coder)
Echo cancellation software
Anti-malware Software
Advantages:
Anti-malware software is designed to protect devices
against viruses and malicious software. It has 3 primary It is much easier to access important documents or bring
purposes: detect, prevent and remove malicious in ‘experts’ at key parts of the conference.
software. It is installed onto a computer system and will It is possible to hold conferences at short notice.
operate in the background. Reduced travelling costs.
There is no need to pay for hotel accommodation or
venue hire.
Reduces the cost of taking people away from work for
two or three days to travel.
Using video conferencing is better than having delegates
travel to potentially unsafe places worldwide.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Disadvantages:
3. Web Conferencing:
Potential time lag in responses/delays when talking. Web conferencing, often known as webinars or
Images can jerk. webcasts, makes use of the Internet to enable
It is very expensive to set up in the first place. conference calls. This system makes use of numerous
Problems if the delegates live in different countries with computers that are interconnected over the internet.
large time zone differences. It operates in real-time, just like video conferencing,
Requires IT knowledge to some extent. and enables the following meeting types:
It's not the best for people who consider travelling a job » business meetings to discuss new ideas
perk. » presentations
Completely reliant on stable internet connections. » online education or training.

2. Audio Conferencing: Meetings held using audio Advantages:


(sound) technology are called audio conferencing.
The normal telephone network can be used for audio Allows participants to see each other through video,
conferencing, frequently called a phone conference. providing a more immersive and engaging experience
than audio conferencing.
The hardware required is: Often offer screen sharing capabilities, enabling
participants to share presentations, documents, or other
a computer (with built-in microphones and speakers) visual content in real-time.
external microphone and/or speakers Often provide features like chat, polling, hand raising,
an internet phone and Q&A sessions, fostering interactivity and
a standard phone. engagement among participants.
Advantages: Disadvantages:
Allows participants to join meetings from any location. Heavily relies on internet connectivity and technical
Eliminates the need for travel expenses, such as infrastructure.
transportation, accommodation, and meals. They can be susceptible to distractions and multitasking.
Saves time by eliminating travel time and allowing It often has various features and settings that
meetings to be scheduled and conducted quickly. participants need to familiarize themselves with,
especially if they are new to the platform.
Disadvantages:
Lacks the visual aspect of face-to-face meetings, which
can hinder communication. 5. The Effects of Using IT
It can limit interaction and engagement compared to in-
person or video conferencing. 5.1. Microprocessor-Controlled Devices
Heavily relies on technology, and technical issues such as
poor audio quality, background noise, or connectivity A microprocessor-driven labour-saving machine enables
problems are common. users to focus on other activities while the machine
completes its work. The second generation of devices
containing microprocessors is more user-friendly and
has more functionality, such as "intelligent tuning" in
television sets.

Advantages of microprocessor-controlled labor-saving


devices:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
The positive aspects include:
no need to do manual tasks at home
more time for leisure activities easier to make new friends using chat rooms
no need to stay home while chores are being done easier to find people who share similar interests/hobbies
web-enabled devices allow devices to be switched on or less expensive to keep in touch using VoIP technology.
off while the owner is out
automated burglar alarms give a higher sense of security The negative aspects include:
and well-being
people do not meet face-to-face as much (social
smart fridges and freezers prevent food waste by isolation)
keeping track of products’ expiry, availability, etc. a lack of social interaction may make people more
Disadvantages of microprocessor-controlled labor- anxious about meeting people in real life
saving devices: When communicating online, people can act less politely
or more harshly, and cybercrime is a serious issue,
unhealthy lifestyle due to inactivity caused by devices especially for teenagers.
doing all tasks
tend to make people lazy Monitoring and Controlling Transport
potential deskilling
any device containing a microprocessor and can Uses:
communicate using the internet displays a threat of
cybersecurity breaches monitoring traffic on motorways
congestion zone monitoring
General advantages of using a microprocessor- automatic number plate recognition (ANPR)
controlled device: automatic traffic light control
air traffic control systems
save energy due to being efficient, as well as turning off railway signalling systems
after inactivity
can be easier 'programming' these devices to perform Advantages of transport monitoring and control
tasks rather than turning knobs and pressing buttons systems:
manually
smart motorways keep updating according to changing
General disadvantages of microprocessor-controlled traffic conditions
devices: more efficient
traffic offences can be remotely penalized using ANPR
lead to more wasteful devices car thefts can be spotted using ANPR
can be more complex to operate for technophobes minimizes human errors, reducing the rate of accidents
leaving devices on standby is wasteful
Disadvantages:
Data Security Issues
If a hacker breaches security, the vehicle could be
Any home appliance managed remotely could provide controlled by them.
hackers access to your personal information. These devices The system might come to a halt if it malfunctions.
frequently have default (or no) password settings, which Systems with a poor design could compromise safety.
makes it simple for attackers to get sensitive information. The easy tracking of harmless people's movements is
For instance, it is easy to discover holiday dates by hacking made possible by ANPR equipment. Who can access such
into a central heating controller (or the software used to data?
interface with it), making a home an obvious target for Autonomous vehicles in transport
break-ins. It is likely for a hacker to obtain important To properly execute their activities, autonomous cars
information, such as credit card numbers, if the refrigerator require sensors, cameras, actuators, microprocessors (along
or freezer automatically orders goods from a retailer.
with very complex algorithms). Automobile control systems
can accomplish essential tasks by sensing information from
Social Interactions cameras and ultrasonics.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Consider an autonomous vehicle approaching a set of
red-lighting traffic signals. fear of the system being hacked into
initial instalment costs are very high
The vehicle's control system must first recognize the ensuring passenger behaviour is vital, especially during
road sign before consulting the database to determine rush hours.
the appropriate action. human reluctance to new technology
The CPU must instruct the actuators to apply the brakes without drivers, CCTV monitoring will be continuously
and put the gear in "park" since the traffic light is red. required
The light must be continuously watched until it turns
green. Advantages of autonomous aeroplanes:
After that, the CPU will again tell the actuators to engage improvement in passenger comfort
first gear, let go of the brakes, and open the throttle reduced running costs, fewer staff
(accelerator).
as most accidents are due to pilot-induced errors, safety
Advantages of an autonomous car, bus, or van: is improved
improved aerodynamics as an outcome of the removal of
safer due to the removal of human error the cockpit
due to the more efficient operation of vehicles, it is
better for the environment Disadvantages:
reduced traffic congestion
security aspects due to the absence of pilots
increased lane capacity emergencies may be challenging to deal with
reduced travel times hacking into the system
stress-free parking for motorists passenger reluctance
Disadvantages: software glitches can be catastrophic

very high installation prices 5.2. Potential Health Problems related


driver and passenger reluctance of the new technology
reduction in taxi requirements could lead to to the Prolonged use of IT Equipment
unemployment
maintenance of the sensors and cameras is crucial Long-term exposure to computing devices may affect user
the ever-present fear of hacking into the vehicle’s control well-being.
system Mentioned below are some of the health issues,
accompanied by their causes and prevention tactics:
Advantages of an autonomous train: 1. Repetitive strain injury (RSI): A condition affecting the
muscles and nerves
improved punctuality Cause: repetitive movements and overuse of muscles, such
reduced running costs due to fewer staff as wrists
no human error Minimizing health risks: regular breaks, ergonomic
minimized energy consumption equipment, correct typing techniques.
possible to increase the frequency of trains as the 2. Back and neck strain: Back pain and other related
possibility of delays is removed issues.
more straightforward to update changes in train Cause: due to prolonged use of monitors
schedules Minimizing health risks: use adjustable chairs, footrests, and
Disadvantages: tiltable screens.
3. Eyestrain: strain and fatigue, unwanted harm to vision.
Cause: due to bad lighting and prolonged screen usage.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Minimizing health risks: use LCDs instead of CRTs, take
regular breaks, use anti-glare screens, and do regular eye Collection of webpages, text, graphics, video, and sound
testing. Hosted on a web server on the internet
4. Headaches: pain or discomfort in the head or face area. Need to write code or use a web authoring application
Cause: incorrect lighting, screen reflections, flickering Hyperlinks to other pages can be added
screens, etc. Interactive websites require programming knowledge
Minimizing health risks: use anti-glare screens, take regular Can use a camera, scanner, and microphone to input
breaks, regular eye-testing. data
5. Ozone irritation: inflammation and irritation of the Usually, hire space from the web hosting company
tissues lining human airways Advantages
Cause: inhalation of ozone released by laser printers in an Ability to add sound/video/animation
office. Links to other websites/hyperlinks
Minimizing health risks: proper ventilation, laser printers The use of hot spots
should be housed in a separate room, replace laser printers Buttons to navigate/move around the website
with inkjet printers, if possible. Hit counters to see who has visited the websites
worldwide advertising capability
Disadvantages
6. ICT Applications Can be hacked and modified, or viruses introduced
Need for a computer and internet connection
Lack of portability compared with the paper-based
6.1. Communication system
Need to maintain the website once it is set up
Newsletters and posters
Multimedia Presentations
Paper-based communication is used to inform people
about their interests Uses a mixture of media to present information:
Schools use these to inform parents about events/dates animations, video, sound, transitions, hyperlinks
Advantages Produced using software packages
Released regularly Used with a projector so a large audience can view
The recipients have a permanent copy Advantages
Disadvantages Use of sound and animation/video effects
Requires distribution Interactive/hyperlinks built into presentations
There are no special effects, sound/video/animation More likely to hold the audience’s attention
There are printing costs, paper/ink Disadvantages
The targeted audience may or may not receive the Need for special equipment – expensive
information It may require internet access
Distracts the audience from the sole content of the
Websites presentation
It is very easy to make a presentation with too many
features

Media streaming

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Real-time transition of audio and video files over the digital versions of printed materials, such as eBooks,
internet eMagazines, and eNewspapers.
allows users to access content without downloading it to It can be read on electronic devices.
their devices Advantages
popular services include Spotify, YouTube, and social aid portability
media websites they are often more affordable than paperback
uses buffering, which makes sure the video plays back books.
smoothly without freezing. While the buffer receives data Offer interactive elements that enhance the reading
packets, it sends previously received ones to the experience.
playback device so that there are no gaps in the played Disadvantages
data reading from an electronic device for a prolonged
Advantages time can cause eyestrain.
Users can access any information at any time and ePublications lack the tactile experience and physical
from any location presence that some readers enjoy.
Offers an extensive library of content compatibility issues can arise if the ePublications is in
Compared to traditional cable or satellite TV a format that is not supported by the reader's device
subscriptions, media streaming can be more cost- or software.
effective
Disadvantages Comparison of Posters and E-publications
Heavily relies on a stable and high-speed internet
connection. Posters
Not all content is available on every streaming
platform due to licensing agreements and exclusivity Printed and displayed in physical locations
Static and cannot be updated once printed
deals.
Limited in design features (no animation/sound)
You don’t own the media when streaming media, so if
Audience must be physically present to see them
the streaming service removes a movie or a TV show
from its library, it may no longer be accessible to you. E-publications
ePublications Digital format, often accessed via websites or email
Can be updated quickly and easily
Supports multimedia (videos, sound, interactive links)
Wider reach as they can be viewed anywhere online

Mobile Communication
Mobile devices support many forms of communication, such
as:
1. Short message service (SMS) messaging: permits
extremely quick communication with another person via
typing on a keyboard (a mobile phone or tablet's keyboard is
frequently virtual). Its benefit is that the recipient can get the
text whenever they choose without being available.
2. Phone calls: Making calls while on the go is among the
most fundamental applications of a mobile phone. Mobile
phones are the perfect method to stay in correspondence
anywhere there is a network signal because they are
compact and have an independent battery.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
3. Voice over Internet Protocol (VoIP): a communication 2. Bridge and building design: Computer modelling is
technique for Internet users. VoIP transforms sound crucial in bridge and building design. It allows engineers to
captured by the built-in mic of the cell phone into individual simulate and analyze structural behaviour, assess load
data packets that may be transmitted via the internet to capacities, and predict the response to external forces. It
their intended recipient. aids in optimizing designs, ensuring structural integrity, and
4. Video calls: enables real-time video conversing between minimizing potential risks before construction begins.
multiple participants with a camera-enabled device. Uses an 3. Flood water management: Computer modelling plays a
internet connection or cellular data. Software that may be vital role in flood water management by simulating water
used for video calling includes FaceTime, Skype, and Zoom. flow behaviour, predicting flood extents, and assessing
5. Accessing the Internet: Another helpful feature is potential flood risks. It helps design and optimise flood
accessing the net from a mobile device. Any mobile device mitigation measures, such as levees and floodplain zoning,
with a wireless broadband connection or a mobile phone allowing authorities to make informed decisions, develop
network can link to the internet. effective emergency response plans, and minimize the
impact of flooding on communities.
6.2. Modelling Applications 4. Traffic management: Computer modelling simulates and
analyses traffic flow, predicts congestion patterns, and
Advantages of using models: optimises traffic control strategies. It aids in designing
efficient road networks, optimizing signal timings, and
using models is less expensive than having to build the evaluating the impact of transportation infrastructure
real thing projects. This enables authorities to make informed
safer to use a computer model decisions, alleviate congestion, and improve overall traffic
allows you to try out various different scenarios in efficiency for better urban mobility.
advance 5. Weather forecasting: Computer modelling plays a pivotal
nearly impossible to try out some tasks in advance in real role in weather forecasting by simulating the Earth's
life due to high risk atmosphere, oceanic conditions, and other environmental
faster to use a computer model than to do the real thing factors. These models use complex algorithms to predict
weather patterns, including temperature, precipitation, wind
Disadvantages of using models: speed, and storm systems. By assimilating real-time data,
a model can’t be completely reliant as the output is computer models provide forecasts that aid meteorologists
entirely based on the input in predicting weather conditions, issuing warnings, and
frequently, computer modelling can be a very costly helping society prepare for potential hazards.
option
human reluctance is a common problem in this
technology

Some of the applications of computer modelling include:


1. Personal finance: Computer modelling involves using
mathematical algorithms and data analysis to simulate
various financial scenarios, such as investment strategies,
retirement planning, and risk assessment, aiding individuals
in making informed decisions and optimizing their financial
goals.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Advantages of using computer modelling rather than


humans: 6.4. School Management Systems
It can provide more precise and accurate results than
human-based methods, minimizing errors and Computer-controlled School Management Systems:
Comprehensive software applications that automate
increasing reliability.
administrative tasks, such as attendance tracking, grading,
Can analyze large amounts of data and perform
complex calculations faster than humans scheduling, and student information management,
It can be reused and updated easily, reducing the improving educational institutions' efficiency, accuracy, and
need for repetitive manual analysis and potentially organization.
lowering costs in the long run.
Disadvantages of using computer modelling rather
than humans:
It may overlook nuanced factors or intangible
elements that humans can consider, leading to
potential gaps or inaccuracies in the analysis.
Based on assumptions and simplifications,
introducing a level of uncertainty.
Their programmed algorithms and data inputs bind
models. They may struggle to adapt to unforeseen
circumstances or rapidly changing conditions that
humans can more readily navigate and respond to.

6.3. Computer-controlled Systems

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

6.5. Booking Systems Automated Teller Machines (ATMs)


Automated teller machines (ATMs) are places where
These web-based platforms and applications allow users to
reserve and purchase tickets or services for various events customers can get cash (or carry out certain other banking
and industries. Some of the applications for online bookings activities, such as ordering a statement) using their credit or
include: debit card.
1. Travel industry: Booking flights, hotels, and holiday If the limit is not exceeded and all other checks are OK, then
the transaction is authorized, and the machine then counts
packages provides a convenient platform for travellers to
plan and book their trips. out the cash
2. Concerts: Reserving tickets for live music events allows Advantages:
music fans to secure their spot at popular concerts. possible to withdraw at any time of the day
3. Cinemas: Booking movie tickets in advance enables offer many banking services without having to go to
cinema-goers to reserve seats and avoid queues. the bank
4. Sporting events: Purchasing tickets for sports matches possible to access an account from anywhere in the
and competitions offers sports enthusiasts an easy way to world
attend their favourite events. usually provides quicker service than waiting in a
queue at a bank
Advantages:
Disadvantages:
convenience and accessibility
instant confirmation and ticketing often in places where theft can take place at night
ability to compare prices and options potential for shoulder surfing
promotions and personalized offers some banks charge customers for using ATMs
cash withdrawal limits are often imposed on people
faster to change/update
automated reminders via email/text
repeated bookings can be easily made
Electronic Funds Transfer (EFT):
cost-saving as there are fewer wages due to reduced It is possible to send money transfer instructions directly to
staff requirements a bank's computer system via electronic funds transfer (EFT)
Disadvantages: technology. The system depends on electronic money
potential for technical issues transfers between accounts; no cash is moved. The
possible security and privacy concerns computer system automatically moves the requested
transaction and booking fees amount from one account to another when it receives an
impersonal customer service EFT command.
dependent on a stable internet connection
can lead to unemployment Advantages:
very secure payment method
6.6. Banking Applications very quick payment method
less expensive than cheques
Online banking systems depend on the ability to update the customer has the right to dispute an EFT
files instantly to avoid double scheduling, which might payment for up to 60 days
occur if the system reaction time is slow. Disadvantages:
The use of computer technology has revolutionized how the bank transaction can’t be reversed without full
we do our banking transactions, for example: dispute investigations
Internet banking customer needs to have funds available immediately
The use of automated teller machines (ATMs) cannot guarantee the recipient’s identity
Chip and PIN technology
Credit/debit card transactions

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Several credit/debit cards come with a magnetic stripe and a
chip; the chip houses essential data like the PIN. This Advantages:
technique is intended to increase security because it is more convenient and safer than cash
superior to a signature. A chip and PIN card to make can be post-dated
purchases is an example of an electronic funds transfer can be traced if they are lost
(EFT). Disadvantages:
aren’t legal tender and can be refused
Advantages of credit cards: slow method of payment
customer protection if ordered goods don’t arrive easier for fraudsters than other methods
internationally accepted payment method relatively expensive payment method
interest-free loan if money is paid back within the
agreed time period Internet Banking
can make purchases online
Disadvantages of credit cards: Enable online access to banking services via a secure
can be charged high interest rates website or app, allowing for transfers, bill payments, account
annual fees often apply management, and more.
easy to end up with credit damage
security risks in online transactions Advantages:
Advantages of debit cards: convenience and availability
easy account management
money comes from the user’s current account, there
branch visiting won’t be a requirement
is no interest
interest rates may be better
safer than carrying cash
can make online purchases more accessible to shop around for the best account
Disadvantages of debit cards: Disadvantages:
security of transactions
less customer protection if goods don’t arrive
requires a reliable internet connection
no credit allowed; funds are needed at the time of
More risk of fraud
purchase
security risks in online transactions Easier to make errors
Physical cash can't be deposited/withdrawn
Cheques
6.7. Computers in Medicine
Individuals and organizations use cheques as a form of
payment. When issuing a cheque, the payer writes the Information Systems in Medicine
recipient's name, the payment amount, and the date on the
cheque. The recipient then deposits or presents the cheque Patient records: Healthcare professionals maintain
to their bank for processing. The payer's bank verifies the databases to communicate information between them
fund’s availability, and upon clearance, the specified amount and pharmacists (for instance, to guarantee no
is transferred from the payer's account to the recipient's medications are administered that interact dangerously
account, completing the transaction. with one another).
Pharmacy records: Pharmacy records maintain a
comprehensive record of patient prescriptions. This
includes details like the prescribed medication, dosage,
quantity dispensed, prescribing physician's information,
and the date of dispensing. These records help track
medication usage and can be used to verify prescription
accuracy and detect potential drug interactions or
allergies.

3D Printers

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Using 3D printers in medicine:


Prosthetics: 3D printers print out artificial body parts
such as false teeth, artificial limbs, hearing aids, etc.
This is a less expensive method of replacing body
parts.
Tissue engineering: it is the field of combining cells,
biomaterials, and engineering principles to create
functional tissues or organs, aiming to repair or
replace damaged or diseased tissue in the human
body.
Artificial blood vessels are synthetic structures
designed to mimic the function of natural blood
vessels, facilitating the flow of blood and nutrients Components of an Expert System
throughout the body to support tissue repair and 1. User Interface
regeneration.
Customized medicines are personalized drug This is the only thing that the end user sees
formulations tailored to individual patients' specific Allows the user to interact with the system
needs. They utilize advanced technology and precise Often requires training to operate effectively
measurements to create medications with accurate
dosages and unique compositions, optimizing 2. Explanation system
treatment outcomes.
Informs the user of the reasoning behind the expert
system’s conclusions
6.8. Expert Systems It will supply a conclusion and any suggested actions to
take
It is an AI-based computer program that emulates the It will also give the percentage probability of the accuracy
decision-making capabilities of human experts. It uses of its conclusions
knowledge and rules to provide accurate advice or solutions
in a specific domain. 3. Inference engine
Examples include:
The main processing element of the system
Diagnostics It acts like a search engine examining the knowledge
Mineral prospecting base
Tax and financial calculations Responsible for gathering information
Strategy games This is the problem-solving part of the system
Identification of plants, animals and chemical Attempts to use information gathered from the user to
compounds find a matching object
Route scheduling for delivery vehicles
4. Knowledge base
It is a repository of facts
stores all the knowledge about an area of expertise
a collection of objects and their attributes

5. Rules base

The rules base is a set of inference rules.


Used by the inference engine to draw conclusions
They follow logical thinking

How an expert system is used to produce possible


solutions

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Below is an example of how an expert system works to
diagnose a medical issue: Use of chip and PIN cards:
Enhance security with two-factor authentication
The interactive screen asks questions for the doctor to Require customers to enter a personal identification
answer using a keyboard or a touch screen. number (PIN)
The inference engine compares the symptoms with the Use of contactless cards:
knowledge base, using the rule base to find matches. Allow for faster transactions
The system suggests the possible illness with a Enable customers to tap their card on the terminal
probability of each, cures, and recommendations on the Use of Near Field Communication (NFC):
next step. Facilitate payments through smartphones and other
The explanation system will explain how that particular devices
diagnosis was suggested. Increase convenience for customers
Communication between supermarket computers and
6.9. Computers in the Retail Industry bank computers:
Share transaction details securely
Point of sale (POS) terminals: Computerized systems used Enable instant payment processing and verification
at checkout counters to handle purchases and oversee
stock. It is extensively used in retail stores to process sales Internet Shopping
transactions. They enable quick and secure payment
Characteristics of Internet Shopping:
processing through various methods, including cash,
credit/debit cards, mobile payments, and digital wallets. POS Online stores accessible through web browsers
terminals calculate totals, generate itemized receipts, A wide variety of products and services are available
update inventory, and provide real-time sales data for Convenient and often open 24/7
effective business management.
Advantages (To customer):
Some features include:
update stock files immediately access to the global market
track inventory levels in real-time comparison between different products effortlessly
prevent stock discrepancies and ensure accurate can shop from anywhere in the world
records able to avoid queues and busy stores
monitor inventory levels and reorder when stock is
lower than a predefined value Advantages (To business):
streamline supply chain management and minimize can target prices and services based on buying data
stockouts can update stock availability and prices more quickly
Electronic funds transfer at Point of sale (EFTPOS) than a physical store
terminals: Devices for processing electronic payments; they cheaper to publicize special offers
allow customers to make payments using debit or credit international customer base
cards by securely transferring funds from their bank increased profits due to lower staff
accounts. EFTPOS terminals authenticate and authorize Disadvantages (To customer):
transactions in real-time, providing convenience and security
for customers and businesses during retail purchases. security concerns
The process of checking credit and debit cards at a can’t correctly examine products before purchase
supermarket EFTPOS is much the same as was described for occasionally, products may take weeks before being
paying a restaurant bill in Section 6.6. delivered
Some functions of EFTPOS include: additional shipping and handling costs
lack of face-to-face interaction with staff

Disadvantages (To business):

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
3. RFID in tracking stock:
increased competition
digital fraud and security concerns
technical issues and downtime
costs of delivery and return
fake negative reviews can lead to a lousy company
reputation

6.10. Recognition Systems


1. Optical Mark recognition (OMR) media in schools:

School registers: Paper-based registers are fed into


OMR to be scanned and stored in a database.
Multiple-choice examination papers: The position of a
mark is stored in a computer’s memory after being read
by the OMR, a device using a template that maps out the
X-Y coordinates of each tablet (pen/pencil mark).
Used at POS terminals for scanning and reading the
information stored in barcodes.
Many digital devices have OMR scanners, which may be
used to scan QR codes.
Advantages:
very fast way of inputting the results of a survey
more accurate than keying in data
more accurate than OCR methods
Disadvantages:
designing the forms is a very complex job
there can be problems if they haven’t been filled
correctly
often only work with black pens or pencils
2. Optical Character Recognition (OCR)

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
4. Near Field Communication (NFC):
Used to determine the exact location of several modes of
Enables short-range wireless communication between transport
devices. Cars usually refer to GPS as satellite navigation systems
Allows payment using a smartphone. Satellites surrounding the Earth transmit signals to the
Advantages: surface
Convenient and secure method of payment Computers installed in the mode of transport receive
allows for contactless transactions and interpret these signals
Disadvantages: Knowing their position on the Earth depends on very
Limited range accurate timing – atomic clocks are used in the satellites,
compatibility issues with some devices which are accurate to within a fraction of a second per
day
5. Biometric recognition: Each satellite transmits data indicating its position & time
Usually refers to automated technologies for The computer on board the mode of transport calculates
authenticating and verifying human body characteristics its exact position based on the information from at least
such as face, iris, retina, finger, thumb, hand and voice. three satellites
Advantages: Satellite Navigation (satnav):
very high accuracy
very easy to use Used to determine the exact location of a car.
very fast verification time The computers onboard can be used to show directions
non-intrusive method to a destination.
relatively inexpensive technology
Disadvantages: Advantages:
it can make mistakes if the skin is dirty or damaged
Better focus as there isn’t a need to constantly check
very expensive to install and set up paper maps.
uses a lot of memory for the data to be stored Reduces fines by warning drivers about upcoming speed
a person’s voice can be quickly recorded and used for changes.
unauthorized access The system shows an Estimated Time of Arrival (ETA).
an illness, such as a cold, can change a person’s
It is possible to program in the fastest route to avoid
voice, making absolute identification difficult or towns.
impossible The system can also give helpful information such as the
location of petrol stations.
6.11. Satellite Systems
Disadvantages:
Global Positioning Systems (GPS) If the maps are not updated, they can give incorrect
instructions.
Road closures due to accidents or roadworks can cause
problems.
The loss of satellite signals can cause problems.
The system will give incorrect information if an incorrect
start-point or end-point is keyed in.

Geographic Information Systems (GIS)

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Used to capture, manage, analyze, and display There is a time delay in receipt of the signals.
geographically referenced information. The signals received can be affected by bad weather.
Use to determine the distance between two places. Sunspot activity can affect the performance of a satellite.
Used to find the nearest petrol station or restaurant, etc. They must be monitored and controlled regularly to
To protect animal and plant life in certain vulnerable remain in the correct orbit.
places.
It can be used in geography, science, or engineering
lessons. 7. System’s Life Cycle
Advantages:
7.1. Stages of System's Life Cycle:
Allows geographical and thematic data of any kind to be
combined to show how they are connected to each 1. Analysis
other. 2. Design
It allows the handling and exploration of vast amounts of 3. Development & Testing
data. 4. Implementation
It allows data to be integrated from a wide range of very 5. Documentation
different sources. 6. Evaluation

Disadvantages: Analysis of the Current System


The learning curve on GIS software can be very long. The current system is studied using four different
GIS software is very expensive. methodologies. These are the four techniques:
GIS requires enormous amounts of data to be input.
It isn't easy to make GIS programs that are both fast and
user-friendly.

Media Communication Systems


Using satellite signals for communication.
Used by media companies when sending
stories/videos/pictures from remote locations.

Advantages:

They have good global coverage.


They are cheaper, faster, and safer than laying cables in
difficult or treacherous terrain.
They have very high bandwidth.
It is relatively easy to expand the network.
Security in satellite transmission is very good because
data is coded, and the receiver requires decoding
equipment.
During emergency situations, it is relatively easy to move
stations on the ground from one place to another.
They are well-suited for broadcasting.
Enable mobile communication in very remote locations.

Disadvantages:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Observation: Data inputted, processed, and outputted into the system


involves watching users interact with the system to are identified.
figure out its workings Problems with the current system are identified. What
it is used for understanding how users interact with could be improved?
the current system The requirements of the user and the potential new
Advantages: provides first-hand, unbiased system are identified. What is the new system meant to
information do?
Disadvantages: can be time-consuming, may not Problems: issues that users face with the current system
reveal all issues User requirements: what needs to be added to the new
Interviews: system
direct one-to-one conversations with users on their Information requirements: data or information the new
experience with the current system system must process
used to gather comprehensive information about
individual users New System Requirements Specification:
Advantages: allows for in-depth exploration of issues • Once the systems analysts have completed the systems life
Disadvantages: relatively expensive, time-consuming, cycle analysis stage, they should be fully aware of the
no user-anonymity, which may affect the response current system's limitations.
Questionnaires: • The next step will be to design a new system (normally
set of predetermined questions is given to the users computer-based) to resolve the problems identified by the
to complete and give their opinion on the current users and the systems analyst.
system • The Requirements Specification will be created, outlining
it is majorly used in collecting data from a larger the required improvements and expectations for the new
group of people system.
Advantages: allows for quantitative analysis, efficient
data collection, questions can be answered quickly System Specification
Disadvantages: limited by predetermined questions,
may suffer from low response rates, users may Hardware and Software Selection
exaggerate answers due to anonymity
Examination of existing documents:
reviewing system documentation, user guides, or
reports
understanding the current system's design and any
known issues
Advantages: provides insights into the system's
history, can reveal previously unknown issues
Disadvantages: it may be outdated, incomplete, time-
consuming, and rather expensive.

Record and Analyse Information about the Current


System
Identifying key aspects of the current system

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

It is vital to identify the suitable hardware needed for the Data capture forms: These are designed to collect data
new system from users in a structured format. They come in two
contemplating system requirements, compatibility, types: paper-based and electronic-based. Paper-based
costs data-capturing forms must be carefully designed with
justifying choices based on user needs and system headings, concise instructions, character and
performance information fields, checkboxes, and enough writing
Hardware that needs to be considered: space. Text boxes, on-screen help, drop-down menus,
barcode readers, radio buttons, automatic validation, and control buttons
scanners, for data entry are all features of computer-based forms.
touch screens, Consider a user-friendly layout, clear instructions, and
3D printers, appropriate data fields.
monitors,
speakers. Output Formats
Identifying suitable software needed for the new system
considering functionality, compatibility, and ease of Screen layouts: how information is presented to users
use on a screen
justifying choices based on user requirements and Report layouts: how information is organized in a
system efficiency printed or digital report
Software that needs to be considered: Consider readability, visual appeal, and efficient use of
operating system, space
applications software,
size of storage, Validation Routines
type of storage.
It is a method of examining data submitted to a computer to
determine if it meets specific requirements. It is a routine
7.2. Design check that the computer does as part of its programming.
1. Range check: ensures data is within a specified range of
Once the analysis has taken place and the systems analyst values
has some idea of the scale of the problem and what needs 2. Character check: ensures data contains only allowed
to be done, the next stage is to design the critical parts of characters
the recommended system. 3. Length check: ensures data is of a specified length
4. Type check: ensures data is of the correct data type
File/Data Structures 5. Format check: ensures data conforms to a specific
Field length: number of characters allowed in a field format
6. Presence check: ensures data is present and not left
Field name: an identifier for the field in the data
structure blank
Data type: specifies the kind of data that can be stored in 7. Check digit: a digit added to a number to verify its
a field, e.g., text, numbers, dates accuracy
Coding of data: using codes to represent data, e.g. M for
male, F for female 7.3. Development and Testing
Input Formats Guarantees the system's functionality before it is put into
use.
Identification and removal of errors, thus improving
system reliability and performance.

Test Designs

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Before selecting the approach best suited for a given
Test data structures, file structures, input formats, application, the pros and cons of each must be carefully
output formats, and validation routines considered.
Ensure all components function correctly and interact
seamlessly 4 Methods of Implementation
Test Strategies 1. Direct changeover:

Test each module: verify that the individual components The old system is replaced by the new system
function as intended immediately
Test each function: ensure all features work correctly Used when quick implementation is necessary
Test the whole system: confirm overall system Advantages
performance and integration fast implementation
cost-effective as only one system is in operation
Test Plan Disadvantages
High risk of failure
Test data: specific data used for testing purposes no fallback
Expected outcomes: predicted results based on test data users can’t be trained on the new system
Actual outcomes: results obtained from testing
Remedial action: steps taken to fix identified issues 2. Parallel Running

Test Data Types Both current and new systems run simultaneously for a
period before the old system is phased out
The following data types will be explained using the example Used when a smooth transition with minimal risk is
of months in a year. required
Advantages
Normal data: valid and expected data values within the Lower risk
range of acceptability have an expected outcome. E.g., easy system comparison
any whole number between 1 and 12. Disadvantages
Abnormal data: invalid or unexpected data values. This Time-consuming
can either be: resource-intensive
Data outside the range of acceptability or
Data that is the wrong data type 3. Pilot Running
In this case, examples could be…
The new system is implemented in a small, controlled
any value less than 1 (i.e. 0, -6, etc.)
environment before full-scale implementation
any value greater than 12 (i.e. 13, 15, etc.)
Used when testing the new system in a real-world setting
letters or nun-numeric data (i.e. July, etc.) Advantages
non-integral values (i.e. 3.5, 4.2, etc.)
Low risk as only trialled in one
Extreme data: values at the limits of acceptability (E.g. 1
department/centre/branch
or 12)
allows for fine-tuning
staff have time to train with the new system
What is live data? few errors as it's fully tested
Data that has been used with the current system Disadvantages
Hence, the results are already known Slower implementation
potential inconsistencies
confusion as there are two systems in use
7.4. Implementation There is no backup for the
department/center/branch using the new system
The system must then be fully implemented after it has been
thoroughly tested.
We will now think more carefully about switching to the new
system. Four popular techniques are utilized to transition
from the old system to the new one.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
4. Phased Implementation
Purpose of the system/program: Explanation of the
The new system is implemented in stages, with each system's intended function and goals
stage replacing a part of the old system Limitations: Known constraints or issues with the
Used when a gradual transition is preferred to minimize system
disruption Program listing: The code or scripts used in the system
Advantages Program language: The programming language used to
reduced risk develop the system
easier to manage Program flowcharts/algorithms: Visual
Disadvantages representations or descriptions of the system's logic and
Takes longer processes
potential compatibility issues System flowcharts: Visual representations of the
interactions between system components
7.5. Documentation Hardware & software requirements: Necessary
equipment and software to run the system
In the life cycle of a system, documentation enables the File structures: Organization and layout of the system's
correct recording of design, implementation, testing, and files and data
maintenance data, facilitating effective communication, List of variables: Collection of variables used within the
troubleshooting, and potential future improvements. system, including their names and purposes
Technical documentation: detailed information on the Input format: Structure and format for entering data
system's inner workings and programming for into the system
developers and IT staff Output format: Structure and format for presenting
data generated by the system
Used to maintain, repair, and update the system with Sample runs/test runs: Examples of system operation,
improvements including input and expected output
Validation routines: Techniques used to check and
confirm the accuracy of data entered into the system

User Documentation
Instruction and guidance for end-users on how to operate
the system. Used to help users effectively use the system
and overcome problems

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Purpose of the system: Explanation of the system's Helps identify areas of improvement in the system
intended function and goals Ensures the system meets user and business needs
Limitations: Known constraints or issues with the Improves overall performance and user satisfaction
system Reduces future costs and issues by spotting problems
Hardware & software requirements: Necessary early
equipment and software to run the system Supports informed decision-making for upgrades or
Loading/running/installing software: Instructions for changes
setting up the system on user devices
Saving files: Procedures for storing data within the Assess the Efficiency of the Solution
system
Printing data: Steps to produce hard copies of system Analyse the system's efficiency in time, money, and
data resource use. Examine whether the system is performing
Adding records: Instructions for creating new entries in at its best or if its efficiency could be increased.
the system Provide examples of specific aspects that contribute
Deleting/editing records: Guidelines for modifying or to the system's efficiency
removing existing entries in the system Identify areas that may be consuming excessive
Input format: Structure and format for entering data resources or time and suggest ways to optimize them
into the system Questions to ask:
Output format: Structure and format for presenting Does it operate quicker than the previous system?
data generated by the system Does it operate by reducing staff time in making
Sample runs: Examples of system operation, including bookings?
input and expected output Does it operate by reducing staff costs?
Error messages: Explanations of system warnings and
error notifications Evaluate the Ease of Use
Error handling: Steps to resolve issues and errors within
the system Look at the solution's usability and accessibility for the
Troubleshooting guide/helpline: Assistance for target market. Check to see if the system is simple to
diagnosing and addressing common problems understand and use and if users have no trouble
Frequently Asked Questions: Answers to common user completing their jobs.
inquiries Describe the user interface and how it facilitates
Glossary of Terms: Definitions of key terms and interaction with the system
concepts related to the system Mention any feedback from users regarding their
experience with the system and address any issues
they encountered
7.6. Evaluation Questions to ask:
Are all the users able to use the system and make
It measures a system's productivity, efficiency, and bookings easily?
compliance with its goals to identify its strengths, Are all the users able to change and cancel bookings
shortcomings, and potential development areas. This easily?
assessment informs decision-making and improves overall Can all staff understand how to use the system with
performance over the course of a system's life cycle. minimal training?
Advantages of Evaluation: Determine the Suitability of the Solution

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Examine how well the implemented solution satisfies the Contact between liquid substances and electronic
desired outcome by contrasting it with the original task devices: Keep liquids away from electrical equipment.
criteria. Open cables: Ensure that cables are entirely insulated
Outline the initial objectives of the system and and packed, and use circuit breakers or fuses to prevent
discuss how the solution addresses each one electrical overload.
Highlight any requirements that may not have been
fully met and discuss possible reasons for this 2. Fire: ICT devices require electricity to charge or run; too
Questions to ask: many devices using a single socket can cause the plug socket
Is the system suitable for each of the departments? to overload, and heat is generated by too much electricity,
Does it meet the needs of the customers? causing the wiring to degrade and ignite a fire.
Does it meet the needs of the staff? The causes and reduction tactics for fire include:
Does the solution match the original requirements?
Socket overload: Ensure enough plug sockets in the
room, don’t plug too many devices into the same
Collect and Examine User’s Feedback socket, and don’t leave devices plugged in and
Collect users' responses to the results of testing the unattended.
system. Their feedback can provide insights into Overheated equipment: Ensure that equipment is
potential issues and improvements and help determine properly ventilated and not obstructed, keep flammable
overall user satisfaction. materials away from heat sources, regularly check
Summarise the testing process, including test data equipment for signs of wear or damage, use fire
expected and actual outcomes. extinguishers in case of emergencies, turn off or unplug
Discuss users' reactions to the system, addressing devices when away from the location, do not cover any
any concerns or suggestions they may have air vents on devices.
3. Trailing cables: Devices can be plugged in using cables.
Identify Limitations and Suggest Necessary Cables that are protruding can cause an accident; you can
Improvements trip over a cable left out in a location, and body damage can
occur during a fall, for example, breaking bones, ligament
Based on the analysis of efficiency, ease of use, damage, bruising, sprains, etc. depending on the area fell on
appropriateness, and user feedback, identify any Trailing cables causes and prevention strategies:
limitations in the system and suggest necessary
improvements Unorganized/insecure cables: use cable ties to secure
List the limitations and provide explanations for each cables, keep cables packed correctly in, let’s say, a table,
one therefore not coming in the way of walking paths, use
Recommend specific changes or enhancements for wireless devices where possible, and regularly inspect
these issues cables for signs of wear or damage.

4. Heavy falling equipment: Devices have varying levels of


8. Safety & Security weight, and if a device falls on you, it could cause injury; any
device should be placed in a secure location, like a PC on a
solid desk and not near the edge.
8.1. Physical Safety Causes and reduction tactics for falling equipment:
1. Electrocution: ICT devices require electrical power to
charge or run; the electrical device can cause electrocution,
caused by the electric current moving through a body,
causing fatal injuries and/or death.
There are multiple causes for electrocution, including:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Improperly secured equipment: Ensure that Protecting Individual Rights: Data protection legislation
equipment is properly secured and stable. Regularly safeguards individuals' right to privacy and control over
check the stability of locations containing devices. their personal information.
Equipment on unstable surfaces: Keep equipment Preventing Misuse of Personal Data: It helps prevent
away from edges and other potential hazards, and unauthorized access, identity theft, fraud, and other
regularly inspect equipment and locations containing forms of data misuse.
devices for signs of wear or damage. Promoting Trust: Data protection laws build trust
between individuals and organizations by ensuring their
8.2. eSafety personal information is handled responsibly.
Encouraging Responsible Data Handling: Legislation
Data Protection promotes responsible data collection, storage, and
processing practices among organizations.
The Data Protection Act (DPA) controls personal data Enabling Data Subject Rights: Legislation grants
collection, storage and processing. individuals rights such as access to their data, right to
rectification, erasure, and objection to processing.
In the UK, the European Union’s General Data Protection
Regulation (GDPR) Personal Data
Protects personal data, whether stored on paper or a
computer system

The Data Protection ACT (DPA)


Personal data must be processed lawfully and
transparently.
Data should only be used for the purpose it was
collected.
Data must be accurate and kept up to date.
Data should not be stored longer than necessary.
Data must be protected from unauthorized access or
breaches.

Principles of the Data Protection Act


Data must be processed lawfully, fairly, and
transparently, with clear consent from the individual.
Data should only be collected for specific, explicit, and
legitimate purposes.
Organizations should only collect and retain the
minimum personal data necessary for their stated
purpose.
Data should be accurate and up-to-date, and reasonable
steps must be taken to rectify or erase inaccurate
information.
Personal data should not be kept longer than necessary
and should be securely deleted when no longer needed.
Organizations must protect personal data against
unauthorized or unlawful processing, accidental loss,
destruction, or damage.

Why is data protection legislation required?

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Refers to information that can be used to identify an Awareness that personal information should not be
individual shared freely
Examples Awareness of how to act online and avoid falling victim
Personal Name creates a safe and respectful environment.
Address Identify and avoid online scams, phishing attempts, and
Date of birth fraudulent websites that may try to trick them into
A photograph in school uniform sharing personal or financial information.
Medical history Mindful of online behaviour and interactions, protecting
Threats that can be avoided by protecting personal your digital reputation, which can have long-term
data: consequences in your personal and professional life.
Identity theft Control privacy settings on social media platforms,
Privacy breaches limiting who can access/view personal information and
Misuse of the information posts.
Data be sold to third-party companies Avoid encountering explicit or harmful content online,
Individuals could be held to ransom over personal reducing the risk of exposure to inappropriate material
data gathered or online predators.
could be used to commit a physical crime Engage in online gaming responsibly, avoid sharing
How to avoid inappropriate data disclosure: personal details, and behave respectfully towards other
Personal data must be kept confidential and players.
protected through privacy settings on websites such Protecting devices from malware, viruses, and other
as social media or strong passwords on websites online threats, preventing data loss, privacy breaches, or
where personal data is held or used device damage.
Access to personal data should be limited to Develop responsible online behaviours, promoting
authorized individuals respectful conduct while interacting with others online.
Think before you post - consider what information Maintain a healthy balance between online and offline
could be gathered from your image or content lives, reducing the risk of addiction, mental health issues,
Check website details about the collection, storage, or negative impacts on relationships and self-esteem.
and use of personal data
Only access websites where personal data is used or Safety Suggestions
viewed when on a secure, encrypted connection

eSafety
E-safety is knowing about and using the internet safely
and responsibly.
It refers to when an individual is using the internet,
email, social media, or online gaming.
E-safety refers to the individual knowing how to protect
themselves from potential dangers and threats.

The Need for eSafety

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Individuals' distinctive physical or behavioural traits, such


8.3. Security of Data as fingerprints, faces, or irises, can be used for access
control and verification. Since biometric data is hard to
Threats fake or duplicate, it offers a more secure form of
identification.
There are multiple methods by which data can be
How it works: Scans traits → compares to stored data →
threatened, including: grants access if matched.
Hacking: Unauthorized access to computer systems or It’s used in phone unlocking (e.g., Face ID), airport
networks to gain control, steal information, or cause security, banking authentication.
damage, thus leading to identity theft, privacy breaches, More secure than passwords.
and misuse of data Biometric data cannot be reset if stolen.
Phishing: Deceptive emails or messages that are 2. Digital certificate:
received from trusted sources to trick individuals into
revealing personal data A digital record that attests to a website's reliability and
Pharming: Manipulation of DNS (Domain Name System) integrity. A digital certificate is used to provide safe
to redirect users to fraudulent websites, often to steal communication and to build confidence between parties.
personal data Identifier data, the entity's public key, and a third party's
Smishing: Phishing attacks carried out through SMS or digital signature are frequently found in digital
text messages certificates.
Vishing: (aka voicemail phishing) Phishing attacks carried
out through voice messages to trick users into calling the 3. Secure Socket Layer (SSL):
telephone number contained in the message
Viruses and malware: Viruses are program codes that A protocol that creates a secure connection between a
can replicate/copy themselves to cause data loss or client computer and a server. SSL ensures that
corruption. Malicious software designed to disrupt, information communicated between a server and client
damage, or gain unauthorised access to computer stays private and cannot be intercepted or changed by
systems or networks unauthorized parties. A website's identification for it is
Card fraud: Unauthorized use of credit or debit card the S at the end of HTTP.
information for fraudulent purposes caused by shoulder 4. Encryption:
surfing, card cloning, or keylogging.
Keylogging: Malware that records keystrokes to steal It is creating data in a format that cannot be read without
passwords. a decryption key. Data on hard drives, emails, cloud
Trojan Horse: Malicious software disguised as legitimate storage, and secure websites (HTTPS) are all protected by
software. encryption. Without a decryption key, it assures that
Virus: Self-replicating malware that attaches to clean even if unauthorized people obtain data, it cannot be
files. decoded.
Worm: Standalone malware that spreads through
networks. 5. Firewall:
Shoulder Surfing: Illegally observing someone’s A firewall is a network security device that monitors and
screen/keyboard to steal data.
manages incoming and outgoing network traffic. Its goal
is to separate an internal network from other networks
Protection of Data by filtering data according to established criteria. It
Multiple techniques are implied for the protection of data, assists in preventing malware, unauthorized access, and
inclusive: other network risks.
1. Biometrics: 6. Two-factor authentication:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

A security mechanism that requests two different kinds The first step to building effective ICT solutions is
of identification from users to confirm their identity. To identifying and understanding the intended audience's
provide additional protection outside of just a username needs. These needs can be functional, like processing
and password, 2FA was created. Typically, it combines information, or aesthetic, like a visually appealing
something that uniquely identifies a user, like biometric interface.
data, with something the user has, like a smartphone After identifying the needs, select the appropriate
and a token or something they know, like a password. technology and tools to create a solution. This choice
depends on factors like the complexity of the task, the
7. User ID and password: budget available, and the technical expertise of the
A typical authentication technique uses a password plus users.
a secret code (user ID) to identify. To strengthen data An essential aspect to remember while designing ICT
solutions is to ensure they are user-friendly. This means
security, user IDs and passwords restrict access to only
authorized users. Using secure passwords and changing they should be intuitive to use, require minimal training,
them frequently is critical to ensure security. When and have easy-to-understand instructions.
creating passwords, it is advised to utilize a mix of Additionally, ICT solutions should be accessible to all
uppercase, lowercase, digits, and special characters. users, including those with disabilities. This could involve
adding features like voice commands, larger text options,
or compatibility with assistive devices.
9. Audience Once the solution is created, it is crucial to test it to
ensure it functions as expected and fulfils the users'
needs effectively.
9.1. Audience Appreciation
Analysing Audience Requirements
To express gratitude and value for the users by providing
helpful and relevant information, fostering positive Designing an ICT solution requires an understanding of
experiences, and contributing to their understanding and the target audience. The study should consider elements
learning. affecting the audience's capacity to use the solution, like
age, technical proficiency, and expertise.
Planning ICT Solutions The solution creator should know the audience's
requirements for information. This could serve as a
design cue for the data processing elements and the
information architecture.
How the audience utilizes and consumes the content
also influences the design. For instance, the answer
should be mobile-friendly if the audience accesses it
mostly through mobile devices.
Finally, the designer should consider any unique
requirements of the audience, such as visual or auditory
impairments. These requirements should be taken into
account when designing the solution ensuring inclusivity.

9.2. Copyright
What makes Copyright Necessary?

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Copyright regulation is crucial to safeguard the rights of Email is a technique of sending and receiving messages
developers and innovators. and files via the Internet.
It stops software piracy, which is unauthorised use, It is employed in personal communication, business
replication, or distribution. communications, and marketing.
It guarantees developers receive compensation for their Acceptable language must be used based on the email's
efforts, fostering additional innovation and development. recipient, for example, professional when composing a
work-related email.
Principles of Copyright in a Computer Software Employers frequently establish requirements for
professional language, substance, and email frequency.
Copyright law prohibits the unauthorized copying, Email security is critical to preventing sensitive data from
distribution, or modification of software. being accessed or manipulated.
It also includes the End-User License Agreement (EULA), Netiquette is the proper conduct and politeness when
which outlines what the software can and cannot be using email.
used for Don’t be abusive
Violations of these principles, such as software piracy, Don’t send spam
can lead to legal consequences. Be clear and concise with your message
Remember that posts are usually public and can be
Preventing Software Copyright Violation read by anyone.
Always check your spelling and grammar.
Software developers employ various copyright protection Respect people's privacy and do not discuss or
strategies, such as Digital Rights Management (DRM). publish information that might embarrass somebody.
Due to DRM methods and systems, copyrighted works Forgive people’s mistakes
are subject to usage, modification, and distribution Do not use CAPITAL LETTERS to highlight comments
restrictions. Do not plagiarize
Other techniques include software product activation, Do not use too many emoticons, as they might annoy
which needs a unique code to be fully functional. your readers.
Given that pirated software frequently cannot receive Email groups enable mass communication to a specific
automatic upgrades, which renders it less effective and group of subscribers.
secure over time, automatic updates may also serve as a
kind of copyright protection. Guidelines set by employers:

10. Communication
10.1. Communication with Other ICT
users Using E-mail
E-Mail
Uses:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

It is up to companies to decide if personal emails should wasting time


be permitted on their systems annoying people
Companies may specify which company devices are using up valuable bandwidth on the internet, thus
allowed to be used slowing it down
There needs to be a company standard style when may have viruses or be a part of a phishing scam
sending emails can take up significant space in user inboxes
It must be made clear what email content is not
permitted To minimize the spam you receive:
Employees should be told only to use their accounts use spam filters
when sending emails avoid disclosing your email address publicly
There must be clear rules regarding the confidentiality of don’t click on links in spam emails or reply to them
information
Staff need to be aware of the method and duration of
storing emails 10.2. Effective Use of the Internet
Incoming emails should only be read by the recipient
Company policy on how to deal with and prevent viruses Characteristics of the Internet:
must be laid out Allows individuals from all around the world to connect
Monitoring of emails may be carried out, and staff must and chat with one another instantaneously
be aware that the company has the right to read all It runs on a distributed network design, which means a
emails single central authority does not control it.
Suitable ongoing training will take place to ensure staff It is mainly used for transmitting data in a variety of
follow company policy at all times formats, such as text, photos, audio, and video.
Carbon Copies (Cc) and Blind Carbon Copies (Bcc) Uses of the Internet:

Carbon copies are used to send the email to multiple A vital communication tool that allows people to
recipients. communicate via emails, instant messaging, and other
Blind carbon copies are made to send the email to means.
multiple recipients without them acknowledging that it It acts as a massive database of information on almost
has been sent to other recipients. any subject
Forward enables users to send an already existing email The Internet has transformed business by offering a
to a new recipient. platform for online purchasing, electronic payments, and
To attach files to be sent with an email, we make use of digital transactions, allowing enterprises to reach global
Attachments. consumers.

Spam Advantages of the Internet:

It is defined as any unwanted email delivered via the users have access to an incredible amount of
Internet. These can range from annoying to genuinely information, empowering them to learn
harmful, as they may contain viruses. enables individuals and businesses to connect and
The main disadvantages are: communicate with people from different parts of the
world in real-time
the Internet has made many things easier to complete,
thus providing simplicity and effectiveness

Disadvantages of the Internet:

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Raises data security and personal privacy hazards Definition:


through the possibility of identity theft, data breaches, The Internet is a vast network of linked computer
and online monitoring. networks and gadgets that communicate with one
The spread of propaganda, fake news, and another using the Internet Protocol Suite (TCP/IP).
misinformation due to the simplicity with which content The intranet is a secure network that operates within
can be created and distributed online. an organization using internet technologies and
The digital divide resulting from unequal Internet access protocols, such as TCP/IP.
threatens to widen existing disparities. Extranets are managed private networks that can
give access to third-party users and give users, such
The differences between the internet, intranet, and as partners, suppliers, or clients, safe access to a
extranet: portion of the intranet.
Accessibility:
The Internet is open and accessible to the public,
allowing users to access a wide range of information,
services, and resources worldwide.
Intranets are restricted to internal users and typically
secured by firewalls and other security measures to
maintain the security of critical corporate data.
Extranet provides authorized external users only
limited access, in contrast to the internet, which is
public, or the intranet, which is entirely restricted. To
access the extranet, these users need a secure login.
Purpose:
The Internet acts as a hub for intercultural dialogue,
the sharing of knowledge, and access to a range of
Internet resources, including websites, email, social
media, online shopping, and more.
An intranet's main goal is to make it easier for
employees to communicate, work together, and
share information.
Extranets make it easier for external stakeholders to
collaborate and communicate with a company. It
enables the organization and its reliable clients or
partners to share information, documents, and
resources securely.
Many use the terms “Internet” and “World Wide Web”
interchangeably. However, they can’t be used in the same
context:
- The internet refers to the global network of computers
and other devices connected through routers and servers.
However, the World Wide Web is a collection of websites
and webpages accessed via the Internet.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

The Functionality of the Internet Advantages of using the Internet to find information
information tends to be up to date because it is
Internet service providers (ISP): A company that quicker and easier to amend
provides internet access. Typically, a monthly fee is The Internet has vast amounts of information
charged for this service. Users' accounts are created searching for information using a search engine is
when registering with an ISP and acquiring login fast and easy
information such as user ID and password. people can look for information in the comfort of
Uniform Resource Locator (URL): The address of a web their own home
page on the WWW. It is a text-based address that information on the internet is essentially free of
uniquely identifies the location of any resource available charge
on the internet. The three main components are: webpages may have multimedia elements, making
Protocol: learning more interesting
It is the communication protocol used to transfer Disadvantages of using the Internet to find
data between the client and the server information
E.g. HTTP, HTTPS, FTP, and others it isn’t regulated; anything can be posted
Domain: always the risk of accessing inappropriate websites
it is the name of the server where the resource is too easy to be distracted by the many distractions
located available on the internet
it can be a name or an IP address Some research skills are lost when using the internet,
Webpage/file name: as search engines do all the work for you.
it is the location of the file or resource on the server
it can contain the name of the file or directory where Speed of Searching
the resource is located
A URL looks like this: Search engines may scan billions of online pages to
protocol://domain/path/filename locate matches to your search query in a fraction of a
E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is second.
a URL that consists of the HTTPS protocol, the Your internet connection and the effectiveness of the
domain name "www.hoddereducation.co.uk", the search engine's algorithms influence the speed.
path is “IGCSE” and the filename is “ICT”
A hyperlink is a word/phrase/image which references Amount of Information
data that the reader can follow by clicking or tapping,
usually taking you to another web page Because search engines can deliver a deluge of
A web browser is a software application used to locate, information, utilising particular and relevant search
retrieve, and display content on the WWW, including web phrases is critical.
Adding quotation marks for specific phrases, "+" signs for
pages, images, video, and other files
required terms, and "-" signs for omitting terms can help
Use of Search Engines narrow the search.

There are two fundamental methods for obtaining Finding Relevant and Reliable Information
information via the Internet. The first method is to enter the
The search engine algorithm determines the relevancy of
URL if you know the website's address. If you don't know
information by considering parameters such as keyword
where to look, the second option is to employ a search
frequency & page quality.
engine to locate the information you seek.
Reliable information is often obtained from recognized
sources such as educational, government, or well-known
industry websites.

Evaluating Information Found on the Internet

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT

Although the internet provides much information, not all


are genuine or dependable.
Consider the source's reputation and trustworthiness
when determining the information's dependability.
Check the accuracy of information by comparing it to
other reliable sources.
Assess whether the information is skewed, keeping an
eye out for views pushing a particular point of view.
Check if the material is current, as obsolete information
might be deceptive.

Internet Protocols
Protocols are rules on which the sender and recipient agree
when data is exchanged between devices.
1. Hypertext transfer protocol (HTTP): when a web page is
being accessed, entering http:// at the front of an address
tells the web browser that ‘HTTP rules’ for communication
are to be obeyed.
2. Hypertext transfer protocol secure (HTTPS): A secure
version of HTTP that encrypts data for security.
3. File transfer protocol (FTP): network protocol used when
transferring files from one computer to another over the
internet. It is similar to HTTP, but the protocol specifically
transfers files.
4. Secure sockets layer (SSL): a protocol that allows data to
be sent and received securely over the internet.

Risks of Using the Internet


Inappropriate and unlawful content: The internet may
attract people to potentially dangerous or illegal
materials.
Data restriction: Parental, educational, and ISP
restrictions can all be used to restrict access to specific
information or websites.

WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE
ICT

© ZNotes Education Ltd. & ZNotes Foundation 2025. All rights reserved.
This version was created by Maryam on Mon May 05 2025 for strictly personal use only.
These notes have been created by Farhan Shahid for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).

You might also like