CAIE-IGCSE-ICT - Theory
CAIE-IGCSE-ICT - Theory
ORG
CAIE IGCSE
ICT
SUMMARIZED NOTES ON THE THEORY SYLLABUS
Prepared for Maryam for personal use only.
CAIE IGCSE ICT
<b>Application software:</b>
1. Types and Components of Provides services that allow the user to do specific
tasks.
Computer Systems It can be general-purpose software or custom-made
software. (Specialist software)
E.g., Spreadsheets, databases, and word processors.
1.1. Hardware & Software <b>System Software:</b>
The software is designed to provide a platform all
<b>Hardware</b> other applications to run on. For example:
1. Compilers: The software translates the High-
the electronic, physical components that make up a level language into Machine code (Language
typical computer system. These may include input and Processor).
output devices as well. 2. Linkers: A Software that creates the links
<b>Internal Hardware Devices:</b> between Language processors into workable
Central processing unit solutions (Data definition language).
Processor 3. Device drivers: A software that enables the
Motherboard device to work with another, externally
Internal memory consisting of RAM & ROM connected device.
Graphics & Sound Cards 4. Utilities: A system software that provides the
Internal Storage devices like Hard disk drives (HDD) necessary facilities (Antivirus, Scan Disk, Disk
and solid-state drives (SSD) Defragmentation, etc.)
Network interface card (NIC) 5. Operating systems: To enable computer
<b>External Hardware Devices:</b> systems to function and allow users to
Monitor communicate with computer systems, special
Keyboard software, known as operating systems (OS),
Mouse have been developed.
Printer
External Storage Devices <b>Analogue and Digital Data</b>
<b>Software</b> Computers can only understand data in the form of binary
digits (0,1); this is commonly known as digital data. However,
The techniques, methods, commands, and instructions data in the real world is analogue, not limited to two specific
tell the device what to do and how to do it. values.
They are the programs which control the computer
system and process data.
Relates to ideas & instructions for using physical objects.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Mobile Computers
1. Laptop computer:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
(Or notebook) refers to a type of computer where the Allow normal phone calls to be made, but also have an
monitor, keyboard, pointing device and processor are all operating system (such as iOS, Android, or Windows),
together in one unit. This makes them extremely allowing them to run a number of computer applications
portable. lightweight (to aid portability). Low power (known as apps or applets). Smartphones communicate
consumption (and also long battery life). Low heat output with the internet either by using Wi-Fi hot spots or by
(cooling is very important). using 3G/4G/5G mobile phone networks.
Uses: Uses:
1. office and business work 1. They allow users to send/receive emails.
2. educational use 2. They allow users to use a number of apps.
3. used as a gaming device. 3. They allow users to use a camera feature (to take
4. general entertainment photos or videos).
Advantages: 4. They allow users to use an MP3/4 player (for
1. Portability: all components are in a single unit, so music and videos).
they can be taken anywhere. Advantages:
2. Because of one single unit, there are no trailing 1. very small in size and lightweight, makes them
wires and desk clutter. portable.
3. take up much less room on a desk, so they can be 2. connecting to the internet while on the move.
easily used in public spaces. 3. because they use Wi-Fi and mobile phone
4. portability allows them to take full advantage of networks, they can be used almost anywhere.
Wi-Fi features. 4. they have apps which can tell instant location,
Disadvantages: which is a feature that isn’t available in either
1. portability makes it easier for them to be stolen. desktops or laptops.
2. limited battery life means the user needs to carry 5. they have reasonable battery life.
a charger at all times. Disadvantages:
3. keyboards and pointing devices may be awkward 1. small screens and keyboards make pages difficult
to use. to read.
4. not easy to upgrade, like adding more RAM. 2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
2. Smartphones: the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops.
7. The data transfer rate using mobile phone
networks can be slower than with Wi-Fi.
3. Tablets:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Artificial Intelligence (AI): There are many definitions of Unemployment, robots are capable of doing tedious
artificial intelligence (AI). Essentially, AI is a machine or human tasks with much more efficiency and excellence
application which carries out a task that requires some than humans.
degree of intelligence. Dependency on technology could lead to problems in the
The use of language future.
recognizing a person’s face, the ability to operate De-skilling: Tasks that used to be considered a talent are
machinery, such as a car, aeroplane, train, and so on, now part of general, tedious processes that are done on
and analyzing data to predict the outcome of a future a regular basis by machines.
event, such as weather forecasting. Impact: Extended Reality (XR) refers to combined real and
Whenever AI is mentioned, people usually think of virtual environments. The two most common examples
science fiction fantasies and think of robots. The at the moment are:
science fiction writer Isaac Asimov even went as far Augmented reality (AR) is a merger between the
as producing his three laws of robotics: » Robots may virtual and physical (real) world; it lays objects onto
not injure a human through action or inaction. » pre-existing objects. e.g., Pokémon GO! Impact: safety
Robots must obey orders given by humans without and rescue operations’ training, shopping and retail
question. » A robot must protect itself unless it (getting a better look at a car before the purchase),
conflicts with the two laws above. Everyday uses: healthcare (better understanding of a patient’s body)
An autonomous (driverless) vehicle – we already have Virtual reality (VR) enables an entirely new world to
driverless trains and autopilots on aeroplanes, but be created, unlike AR, which has no link to the actual
future developments include driverless cars. surroundings of the user. It requires the user to be
Robotic research is leading to improvements in specially equipped with a VR headset, joystick, and
technology to help amputees and people with headphones.
disabilities. Impact: Military applications, educational
Robots are used to help people carry out dangerous purposes (looking at ancient buildings),
or unpleasant tasks – for example, bomb disposal. healthcare, media (interactive special effects in a
movie), scientific visualization (part of molecular
Negative impacts of AI structures/cells).
1. Keyboards:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Uses:
Sometimes, they have small keys, which can make input
Input of data into applications software more difficult.
Typing in commands to the computer Sometimes, the order of the numbers on the keypad is
not intuitive.
Advantages:
Advantages:
Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Opening, closing and minimizing software Does not need the same fine control as a mouse.
Grouping, moving and deleting files. It is easier to use than a mouse if the operator has
Image editing, for example, controls the size and position problems with their wrist.
of a drawing pasted into a document. More accurately position the pointer on the screen.
Controlling the position of a pointer on the screen to They are more robust than a mouse.
allow selection. Needs less desk space than a mouse or keyboard.
Advantages: Disadvantages:
Faster than a keyboard for choosing options. It is not supplied with the computer as a standard;
Used to navigate applications and the internet. therefore, it is more costly.
Because the touchpad is integrated into the laptop Users may need training because it is not standard
computer, there is no need for a separate mouse; this equipment.
aids the portability and is a big advantage if no flat
surfaces are available.
Disadvantages:
6. Remote Control:
Uses:
Advantages:
Uses:
It can be operated from any reasonable distance.
A good alternative to a mouse for people with conditions In some conditions, e.g., in chemically hazardous
such as RSI. environments, we can control and measure from safe
Used in an industrial control room environment. distances.
Used in some luxury cars to select functions such as
radio. Disadvantages:
Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Advantages:
Difficult to use for people with limited hand/wrist
movements. It's a more realistic experience than both mouse and
Physical obstacles can easily block the signal. joystick.
Easier than a keyboard or joystick to control steering
movements.
Disadvantages:
It is a rather expensive input device as compared to a
mouse or joystick.
Steering movements tend to be over-sensitive, which
gives an unrealistic feel.
Unless it is an expensive simulator, feedback to the
steering wheel is non-existent.
7. Joysticks:
Uses:
Advantages:
9. Touch screen (as an input device):
It is easier than keyboards for screen navigation.
In some applications, the control is more realistic than Uses:
using a mouse.
Automatic teller machines (ATMs) to choose from on-
Disadvantages: screen options.
Point of sale terminals such as in restaurants.
The on-screen pointer is more difficult to use. Interactive whiteboards in education.
Computer-based training (CBT) where answers are
selected during on-screen testing.
Advantages:
Faster entry of options than using a keyboard or mouse.
Very easy method for choosing options.
User-friendly method – no training necessary in its use.
Option to expand the size of the display if necessary.
Disadvantages:
8. Driving wheel:
Uses:
Used in video games, especially car racing games.
Used in simulators to mimic actual vehicle controls.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
A limited number of input options are available. Limited quality, depending on how good the scanner’s
This can lead to problems if an operator uses the system resolution is.
frequently (straining of arm muscles, RSI, etc., are all Fairly slow input method, especially if color mode is
possible). selected.
The screen can get very dirty with constant touching.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Need to be computer literate to know proper use. Temperature sensors are used in automatic washing
Loss of artistry due to clever software doing all the work. machines, central heating systems, ovens, and
Images need to be compressed to reduce the amount of glasshouses.
memory used. Pressure sensors are used in intruder alarm systems and
washing machines.
Light sensors are used in automatic glasshouses, doors,
and street lighting control.
Sound/acoustic sensors are used in intruder alarm
systems, monitoring liquid and powder flow in pipes.
Humidity/moisture sensors are used in automatic
glasshouses, environmental monitoring, and in factories
where moisture levels are crucial.
pH sensors are used in automatic glasshouses, chemical
processes and environmental monitoring.
Advantages: Disadvantages:
It is faster to read text than it is to type it in. Faulty sensors can give spurious results.
It is possible to manipulate sound in real time rather Most sensors are analogue; therefore, they require
than working on a completed recording. conversion using Analogue to Digital Convertors.
It improves security if used as an authentication system.
14. Light pens:
Disadvantages:
Uses:
Sound files use up a lot of computer memory.
Reading data is more error-prone than typing in. Selecting objects on CRT screens
Drawing on screens
Advantages:
13. Sensors:
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Lagging problems while drawing on the screen. It is more secure than contactless cards as the PIN acts
It only works with CRT monitors. as a second security layer.
Rather outdated technology. More robust system than Magnetic Stripe Cards
Disadvantages:
On credit/debit card for use at ATMs 3. Radio Frequency Identification (RFID) reader:
Security device to allow entry to buildings, hotels, etc.
Uses:
Advantages:
Livestock tracking
Faster than keying in data manually. Retail, instead of barcodes, as they don’t need to be
Error-free, no human intervention needed. scanned in.
Secure information isn’t in human-readable form. Admission passes.
Robust, there are no moving parts. Library books, to acknowledge the books which have
been borrowed.
Disadvantages:
Advantages:
If the card is damaged, the data is lost.
Doesn’t work at a distance. No line-of-sight contact is needed.
As the information isn’t human-readable, this can be a Very robust and reliable technology.
disadvantage in some cases. Very fast read rate.
Bidirectional data transfer.
Bulk detection is possible.
Disadvantages:
Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal.
RFID is more expensive than a comparable barcode
system.
2. Chip and PIN reader:
4. Optical Mark Reader/Recognition (OMR):
Uses:
Uses:
Where payments are made using cards
Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Advantages:
Disadvantages:
Advantages:
Advantages:
It is a much faster data entry system than manual typing.
No human intervention, its error free.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
used in advertising to contain information about the They are very heavy and bulky.
advertising company. They run very hot and can cause fires if left unattended.
Wi-Fi authentication They use a lot more power than LCDs.
Used in restaurants, you can see the menu by scanning. Their flickering can lead to headaches.
Image burn-in is a common issue.
Advantages:
Disadvantages:
More than one QR format is available.
QR codes can be used to transmit malicious data.
Advantages:
Very efficient, low power consumption.
Lightweight devices.
Screens can be made in various sizes.
No flickering images.
Very sharp image resolution.
2.3. Output Devices and Their Uses
Disadvantages:
1. Cathode ray tube (CRT) monitors:
Uses:
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Colour and contrast from different angles are They tend to get dirty with frequent use.
inconsistent. Frequent use results in straining of arm muscles, RSI, etc.
Motion blur is a common issue. If large amounts of data are input/output, they aren’t
Lower contrast than CRT monitors. very accurate, and the interface isn’t very fast.
Disadvantages: Disadvantages:
Images can be fuzzy.
Expensive to buy.
Set-up can be complicated.
5. Laser printers:
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
In uses where low noise is required. Slow output if many copies are needed.
If fast, high quality, high-volume printing is required. Can’t do large print jobs.
Printing can smudge if user isn’t careful.
Advantages: Can be expensive if used a lot.
Printing is fast.
They can handle very large print jobs.
Quality is consistently high.
Toner cartridges last for a long time.
Disadvantages:
Advantages:
Can be used in varying environments unlike laser/inkjet
printers.
Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
6. Inkjet printers: Good for continuous printing.
Uses: Disadvantages:
Advantages:
High-quality output
Cheaper than laser printers.
Very lightweight
Don’t produce ozone and volatile organic compounds.
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Uses:
Very noisy
Initial cost is more than an inkjet printer. Custom-made prosthetic limbs.
Very slow, poor-quality printing. In aerospace, if parts of the aircraft are made using 3d
printers they can be very lightweight.
Making spare parts for items that aren’t now
manufactured, e.g., parts of a vintage car.
Advantages:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Speaker output can disturb irrelevant people in the same Holds data magnetically.
area, e.g., an office. The surface area of the media is magnetised so that it
Sound quality is high only expensive speakers. can hold bits of data.
They take up a lot of desk space. The device that reads media can also read the bits held
on the surface area
Advantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Can be used as a backup system to prevent data loss. It can be written over many times.
It can be used to transfer data/files/software between You can use different file formats each time it is used.
computers. It is not as wasteful as the R format because the
files/data can be added later.
Advantages:
Disadvantages:
Data access time and data transfer rate are very fast.
It has a very large memory capacity. It can be relatively expensive media.
It can be used as a method of transferring information Possible to accidentally overwrite data.
between computers.
CD-ROM/DVD-ROM ~ Read Only Memory
Disadvantages:
Uses:
They can be easily damaged if user accidentally drops it
or doesn’t correctly shut down the drive after use. These are read-only memory (ROM), which means they
The data transfer rate is not as fast as for fixed hard disk can’t be written over and can only be read. Permanent
drives. storage method.
CD-ROM is used to store music files and to store
3.3. Optical Media and Optical Storage software, computer games and reference software.
DVD-ROM has much larger storage and is used to store
Devices films.
Used in applications where there is a real need to
Holds data by burning ‘dots’ onto the surface with a high- prevent deletion or overwriting of important data.
powered laser.
The data that reads the media can read the data by Advantages:
shining a lower-powered laser over the dots.
They are less expensive than hard disk drive systems.
CD-R/DVD-R ~ Write Once Only They are very portable as they are small and light.
Data stored on them is read-only, so it cannot be
Uses: accidentally overwritten.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Uses: Uses:
Home video consoles. Storage device to store files, applications, operating
Storing and playing back movies. systems, and backups.
Computers can use this technology for data storage or
backing hard drives. Advantages
Camcorders can use this media to store movies. Generally offers larger stroage capacities than SSDs.
Advantages: More affordable compared to SSDs.
Well-suited for long-term storage needs.
Very large storage capacity. Reliable for non-intensive read/write operations.
Very fast data transfer rate.
The data access speed is also greater than with other Disadvantages
optical media. Have moving parts, making them more prone to
Blu-ray discs automatically come with a secure
damage.
encryption system. Heavier and bulkier compared to SSDs.
Disadvantages: Higher power consumption.
Slower data transfer and access speeds compared to
Relatively expensive discs. SSDs.
Encryption problems when used to store videos. Generates more heat and noise.
The introduction of HD (high definition) DVD players has
reduced the advantages of using Blu-ray technology. Pen drives (Memory sticks)
Uses:
3.4. Solid State Backing Storage
Transporting files between computers or using them as a
Holds data on devices that don’t have any moving parts. backing store.
Used as a security device to prevent software piracy
Solid-state drives (SSD) (known as a dongle).
Uses: Advantages:
Storage device to store files, applications, OSs, and so on. Very compact and portable media.
Very robust.
Advantages: Does not need additional software to work on most
They are more reliable as they have no moving parts. computers.
They are considerably lighter and suitable for laptops. They are not affected by magnetic fields.
They do not have to ‘get up to speed’ before they work Disadvantages:
correctly.
They have lower power consumption. Cannot protect the data/files by making it ‘read-only’.
They run much cooler than HDDs. Easy to lose (due to the small physical size).
Because they have no moving parts, they are very thin. The user needs to be very careful when removing a
SSD data access time is only 0.1 milliseconds compared memory stick from a computer - incorrect removal will
to 10 milliseconds for HDD. corrupt the data on the memory stick and make it
Data transfer speed for SSDs is also much faster than for useless.
HDDs.
Flash Memory cards
Disadvantages:
SSD endurance - SSDs are conservatively rated at only Different types of memory cards:
20GB write operations per day over three years. » SD cards (secure digital card; widely used in portable
More expensive than magnetic hard disks. devices).
Smaller storage capacity than magnetic hard disks. » XD cards (extreme digital card; mainly found in older digital
cameras).
Hard Disk Drives (HDD)
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
» CFast card (compact, fast card; designed for high-speed A MAC address (Media Access Control address) is a unique
data transfer in professional cameras). identifier assigned to a network interface card (NIC). It is a
Uses: hardware address and doesn’t change, unlike an IP address.
Routers
Storing photos on digital cameras. A device that enables data to be sent between different
Used as mobile phone memory cards. types of networks. It can be connected through cables or
Used in MP3 players to store music files. wirelessly to connect a LAN to the internet.
Used as a backing store in hand-held computer devices. It can be used for:
Advantages: connecting networks and devices to the internet,
Very compact. storing computer addresses,
Because they have no moving parts, they are very routing data packets.
durable. When a data packet is received, the router checks if the
They can hold large amounts of data. packet is intended for it or another network. The data packet
Compact cameras and smartphones can read and write is routed to the local switch/hub if it's meant for its network.
memory cards, allowing users to transport extensive If not, the data packet is sent to the relevant router, which
collections of photographs, songs, etc. sends it to the relevant device.
Disadvantages: They consult routing cables to know where to send the
Expensive per gigabyte of memory when compared to data.
HDDs. A WAN (Wide Area Network) covers a large geographical
Have a lower storage capacity than hard disks. area, like the internet.
Have a finite life regarding the number of times they can A WLAN (Wireless Local Area Network) connects devices
be read from or written to. wirelessly within a small area like a building.
Memory cards, specifically the micro SD card, are the Data Packets
smallest sized devices available, making them more likely A data packet is a small chunk of data sent over a network. It
to be lost, stolen or damaged. The storage should be contains both the actual data and control information, such
sized cause the amount of storage does not prevent the as the destination address, source address, and error
drive from being stolen checking bits.
Users must often purchase a card reader or USB
converter to view the data. Common Network Devices
4. Networks & the Effects of 1. Network Interface Cards (NIC): These are needed
to allow a device to connect to a network. Turns
Using Them binary data into an electrical signal that allows
network access. Usually integrated into the
motherboard.
4.1. Networks Each NIC is given a unique hardwired media access
IP and MAC address control (MAC) address.
Media access control (MAC) address: a number that
An IP address (Internet Protocol address) is a unique
uniquely identifies a device when connected to a
number assigned to a device on a network.
network.
IPv4 is a 32-bit address (e.g., 192.168.1.1) The first six hex digits identify the manufacturer’s code,
IPv6 is a newer 128-bit address that allows many more and the next 6 identify the device’s serial number.
unique addresses (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334)
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
2. Hubs: they are hardware devices that can have When transferring data between 2 or more devices that
several other devices connected to them. They are are very close together.
used to connect devices together to form a local area When the speed of data transmission isn’t crucial.
network (LAN). It takes a data packet received by one For low-bandwidth applications.
of its ports and sends it to all relevant or irrelevant
devices that are connected to it. Wi-Fi uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Private Intranet that also allows access by selected Allows centralized management of updates, backups and
parties that reside outside of the organization. These software installations.
parties, for example, maybe customers, key stakeholders Can secure its devices with the use of firewalls, antivirus
or clients. software and other security features to prevent
Users will have an authorization level once they have unauthorized access.
successfully logged in, which will determine which A LAN allows users on the network to share resources
resources they may access. such as printers and other peripherals.
Similarities between the Internet, Intranet and extranet
are as follows: Disadvantages:
They are all web-based technologies The network may not function correctly in case of
They allow users to access information remotely hardware failure.
They all use client-server architecture
They are more prone to attacks than standalone
They all use security measures such as computers.
authentication and encryption Data and peripheral accessing can be slow, based on
They all promote and facilitate information and network traffic.
resource sharing LAN networks require maintenance to ensure the
Differences between the internet, intranet and extranet
software is up-to-date.
are as follows:
The internet is a global network, whereas an 2. Wireless Local Area Network (WLAN): Local Area
intranet/extranet is a private network contained Networks allow devices to connect wirelessly rather
within an organization than using physical cables. Wireless Access Points
The use of the internet covers a wide range of (WAPs) are connected to an existing wired network,
purposes, whereas an intranet/extranet is designed which provides wireless connectivity. Support a vast
for specific users and purposes. range of devices, such as smartphones and laptops,
Much information is publicly available, whereas an are very popular in public areas such as shopping
intranet/extranet is not. malls.
The Internet is not owned solely by one person or
organization, whereas the organization usually owns Advantages:
intranets/extranets.
Allows users to connect anywhere in the range of a
Network Types Wireless Access Point (WAP).
They can be used in various indoor and outdoor
1. Local Area Network (LAN): networks usually environments, making them highly flexible.
contained within a single building or small As the requirements change, additional WAPs can be
geographical location. It is made up of hubs and/or added relatively easily.
switches, which will connect several devices together. Printer access can be given to wireless devices.
One hub or switch commonly connects to a router, Disadvantages:
allowing LAN connectivity to other outside networks
such as the Internet. The strength of their signals can be affected by obstacles
such as walls.
Advantages: Speeds can be affected by high-traffic areas.
It can sustain interference from other devices which can
affect performance and connectivity.
Can be vulnerable to security threats due to signal
interception.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
3. Wide Area Networks (WAN): is formed by several There are many ways to enhance the security of your
LANs connected through a router. It is expensive. password, such as the following:
However, it comes with a more enhanced security. Ensure that the password is changed regularly in case
Additional hardware is needed for a WAN: Routers, it has been obtained illegally or accidentally
modems, and proxy servers. Ensure that the password uses a combination of
uppercase, lowercase, numbers and special
Advantages: characters to make the password more difficult to
Provide the ability to connect geographically dispersed guess.
locations, such as offices in different cities or countries. iloveict is a weak password
Offer the flexibility to scale up or down based on the 1lov3ICT# is a strong password
organisation's needs. Anti-spyware software can be run regularly to ensure
that your information, including your password, is not
Administrators can monitor and manage the network
infrastructure from a single location. passed to an unauthorized third-party user.
Passwords
It is a common form of security often accompanied by a
username or email address.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Standard features of Anti-Malware software include the
1. Zero login: A security concept that eliminates following:
traditional login methods, such as usernames and
passwords, using biometrics or other authentication Comparing the scanned files against an extensive
factors for seamless and password-less access. database of known threats
2. Biometric Recognition: These authentication Real-time scanning
methods use unique physical or behavioural Regular updates to gather an up-to-date list of known
characteristics, such as fingerprints, iris scans, or threats
voice recognition, to verify a person's identity. Quarantine of infected files
3. Magnetic Stripes: These are authentication features Quarantining files allows threats to be automatically
on cards storing data magnetically. They enable deleted.
secure identification and authorization by containing Allows the user to determine if the file is a legitimate
encoded information that magnetic stripe readers threat and not a false positive.
can read.
4. Smart Cards: Smart cards are portable devices with Heuristic Checking: Instead of relying solely on a database
integrated circuits to store and process data. They of known viruses, this method looks for behavioural patterns
are used for authentication, identification, and secure and other features in a file to identify possible risks.
transactions in various applications such as banking,
telecommunications, and access control. Electronic Conferencing
5. Physical Tokens: It is a type of authentication that
1. Video Conferencing: It is a form of audio and video
takes the shape of a solid object. The user
communication. It serves as a stand-in for face-to-
demonstrates ownership of the token through
interaction with a login system. Physical tokens have face meetings between several persons who may
embedded clocks that create one-time passwords reside abroad or in another region of the country. It
utilizes a network in some way and is done in real-
(OTPs) when a PIN and other authentication
time.
information are entered.
6. Electronic Tokens are applications that users install The basic hardware includes:
on their hardware, such as smartphones. Say a
person wants to access a website on a tablet webcams,
computer. To access this website, users must first large monitors/television screens,
authenticate themselves using electronic tokens. The microphones,
user has already set up the electronic token app with speakers.
their smartphone. The user launches the app on their
smartphone when the website asks them to verify The software used are:
their identity. The program creates an OTP that is Webcam and microphone software drivers
only good for a short period of time. CODEC (coder and de-coder)
Echo cancellation software
Anti-malware Software
Advantages:
Anti-malware software is designed to protect devices
against viruses and malicious software. It has 3 primary It is much easier to access important documents or bring
purposes: detect, prevent and remove malicious in ‘experts’ at key parts of the conference.
software. It is installed onto a computer system and will It is possible to hold conferences at short notice.
operate in the background. Reduced travelling costs.
There is no need to pay for hotel accommodation or
venue hire.
Reduces the cost of taking people away from work for
two or three days to travel.
Using video conferencing is better than having delegates
travel to potentially unsafe places worldwide.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Disadvantages:
3. Web Conferencing:
Potential time lag in responses/delays when talking. Web conferencing, often known as webinars or
Images can jerk. webcasts, makes use of the Internet to enable
It is very expensive to set up in the first place. conference calls. This system makes use of numerous
Problems if the delegates live in different countries with computers that are interconnected over the internet.
large time zone differences. It operates in real-time, just like video conferencing,
Requires IT knowledge to some extent. and enables the following meeting types:
It's not the best for people who consider travelling a job » business meetings to discuss new ideas
perk. » presentations
Completely reliant on stable internet connections. » online education or training.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
The positive aspects include:
no need to do manual tasks at home
more time for leisure activities easier to make new friends using chat rooms
no need to stay home while chores are being done easier to find people who share similar interests/hobbies
web-enabled devices allow devices to be switched on or less expensive to keep in touch using VoIP technology.
off while the owner is out
automated burglar alarms give a higher sense of security The negative aspects include:
and well-being
people do not meet face-to-face as much (social
smart fridges and freezers prevent food waste by isolation)
keeping track of products’ expiry, availability, etc. a lack of social interaction may make people more
Disadvantages of microprocessor-controlled labor- anxious about meeting people in real life
saving devices: When communicating online, people can act less politely
or more harshly, and cybercrime is a serious issue,
unhealthy lifestyle due to inactivity caused by devices especially for teenagers.
doing all tasks
tend to make people lazy Monitoring and Controlling Transport
potential deskilling
any device containing a microprocessor and can Uses:
communicate using the internet displays a threat of
cybersecurity breaches monitoring traffic on motorways
congestion zone monitoring
General advantages of using a microprocessor- automatic number plate recognition (ANPR)
controlled device: automatic traffic light control
air traffic control systems
save energy due to being efficient, as well as turning off railway signalling systems
after inactivity
can be easier 'programming' these devices to perform Advantages of transport monitoring and control
tasks rather than turning knobs and pressing buttons systems:
manually
smart motorways keep updating according to changing
General disadvantages of microprocessor-controlled traffic conditions
devices: more efficient
traffic offences can be remotely penalized using ANPR
lead to more wasteful devices car thefts can be spotted using ANPR
can be more complex to operate for technophobes minimizes human errors, reducing the rate of accidents
leaving devices on standby is wasteful
Disadvantages:
Data Security Issues
If a hacker breaches security, the vehicle could be
Any home appliance managed remotely could provide controlled by them.
hackers access to your personal information. These devices The system might come to a halt if it malfunctions.
frequently have default (or no) password settings, which Systems with a poor design could compromise safety.
makes it simple for attackers to get sensitive information. The easy tracking of harmless people's movements is
For instance, it is easy to discover holiday dates by hacking made possible by ANPR equipment. Who can access such
into a central heating controller (or the software used to data?
interface with it), making a home an obvious target for Autonomous vehicles in transport
break-ins. It is likely for a hacker to obtain important To properly execute their activities, autonomous cars
information, such as credit card numbers, if the refrigerator require sensors, cameras, actuators, microprocessors (along
or freezer automatically orders goods from a retailer.
with very complex algorithms). Automobile control systems
can accomplish essential tasks by sensing information from
Social Interactions cameras and ultrasonics.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Consider an autonomous vehicle approaching a set of
red-lighting traffic signals. fear of the system being hacked into
initial instalment costs are very high
The vehicle's control system must first recognize the ensuring passenger behaviour is vital, especially during
road sign before consulting the database to determine rush hours.
the appropriate action. human reluctance to new technology
The CPU must instruct the actuators to apply the brakes without drivers, CCTV monitoring will be continuously
and put the gear in "park" since the traffic light is red. required
The light must be continuously watched until it turns
green. Advantages of autonomous aeroplanes:
After that, the CPU will again tell the actuators to engage improvement in passenger comfort
first gear, let go of the brakes, and open the throttle reduced running costs, fewer staff
(accelerator).
as most accidents are due to pilot-induced errors, safety
Advantages of an autonomous car, bus, or van: is improved
improved aerodynamics as an outcome of the removal of
safer due to the removal of human error the cockpit
due to the more efficient operation of vehicles, it is
better for the environment Disadvantages:
reduced traffic congestion
security aspects due to the absence of pilots
increased lane capacity emergencies may be challenging to deal with
reduced travel times hacking into the system
stress-free parking for motorists passenger reluctance
Disadvantages: software glitches can be catastrophic
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Minimizing health risks: use LCDs instead of CRTs, take
regular breaks, use anti-glare screens, and do regular eye Collection of webpages, text, graphics, video, and sound
testing. Hosted on a web server on the internet
4. Headaches: pain or discomfort in the head or face area. Need to write code or use a web authoring application
Cause: incorrect lighting, screen reflections, flickering Hyperlinks to other pages can be added
screens, etc. Interactive websites require programming knowledge
Minimizing health risks: use anti-glare screens, take regular Can use a camera, scanner, and microphone to input
breaks, regular eye-testing. data
5. Ozone irritation: inflammation and irritation of the Usually, hire space from the web hosting company
tissues lining human airways Advantages
Cause: inhalation of ozone released by laser printers in an Ability to add sound/video/animation
office. Links to other websites/hyperlinks
Minimizing health risks: proper ventilation, laser printers The use of hot spots
should be housed in a separate room, replace laser printers Buttons to navigate/move around the website
with inkjet printers, if possible. Hit counters to see who has visited the websites
worldwide advertising capability
Disadvantages
6. ICT Applications Can be hacked and modified, or viruses introduced
Need for a computer and internet connection
Lack of portability compared with the paper-based
6.1. Communication system
Need to maintain the website once it is set up
Newsletters and posters
Multimedia Presentations
Paper-based communication is used to inform people
about their interests Uses a mixture of media to present information:
Schools use these to inform parents about events/dates animations, video, sound, transitions, hyperlinks
Advantages Produced using software packages
Released regularly Used with a projector so a large audience can view
The recipients have a permanent copy Advantages
Disadvantages Use of sound and animation/video effects
Requires distribution Interactive/hyperlinks built into presentations
There are no special effects, sound/video/animation More likely to hold the audience’s attention
There are printing costs, paper/ink Disadvantages
The targeted audience may or may not receive the Need for special equipment – expensive
information It may require internet access
Distracts the audience from the sole content of the
Websites presentation
It is very easy to make a presentation with too many
features
Media streaming
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Real-time transition of audio and video files over the digital versions of printed materials, such as eBooks,
internet eMagazines, and eNewspapers.
allows users to access content without downloading it to It can be read on electronic devices.
their devices Advantages
popular services include Spotify, YouTube, and social aid portability
media websites they are often more affordable than paperback
uses buffering, which makes sure the video plays back books.
smoothly without freezing. While the buffer receives data Offer interactive elements that enhance the reading
packets, it sends previously received ones to the experience.
playback device so that there are no gaps in the played Disadvantages
data reading from an electronic device for a prolonged
Advantages time can cause eyestrain.
Users can access any information at any time and ePublications lack the tactile experience and physical
from any location presence that some readers enjoy.
Offers an extensive library of content compatibility issues can arise if the ePublications is in
Compared to traditional cable or satellite TV a format that is not supported by the reader's device
subscriptions, media streaming can be more cost- or software.
effective
Disadvantages Comparison of Posters and E-publications
Heavily relies on a stable and high-speed internet
connection. Posters
Not all content is available on every streaming
platform due to licensing agreements and exclusivity Printed and displayed in physical locations
Static and cannot be updated once printed
deals.
Limited in design features (no animation/sound)
You don’t own the media when streaming media, so if
Audience must be physically present to see them
the streaming service removes a movie or a TV show
from its library, it may no longer be accessible to you. E-publications
ePublications Digital format, often accessed via websites or email
Can be updated quickly and easily
Supports multimedia (videos, sound, interactive links)
Wider reach as they can be viewed anywhere online
Mobile Communication
Mobile devices support many forms of communication, such
as:
1. Short message service (SMS) messaging: permits
extremely quick communication with another person via
typing on a keyboard (a mobile phone or tablet's keyboard is
frequently virtual). Its benefit is that the recipient can get the
text whenever they choose without being available.
2. Phone calls: Making calls while on the go is among the
most fundamental applications of a mobile phone. Mobile
phones are the perfect method to stay in correspondence
anywhere there is a network signal because they are
compact and have an independent battery.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
3. Voice over Internet Protocol (VoIP): a communication 2. Bridge and building design: Computer modelling is
technique for Internet users. VoIP transforms sound crucial in bridge and building design. It allows engineers to
captured by the built-in mic of the cell phone into individual simulate and analyze structural behaviour, assess load
data packets that may be transmitted via the internet to capacities, and predict the response to external forces. It
their intended recipient. aids in optimizing designs, ensuring structural integrity, and
4. Video calls: enables real-time video conversing between minimizing potential risks before construction begins.
multiple participants with a camera-enabled device. Uses an 3. Flood water management: Computer modelling plays a
internet connection or cellular data. Software that may be vital role in flood water management by simulating water
used for video calling includes FaceTime, Skype, and Zoom. flow behaviour, predicting flood extents, and assessing
5. Accessing the Internet: Another helpful feature is potential flood risks. It helps design and optimise flood
accessing the net from a mobile device. Any mobile device mitigation measures, such as levees and floodplain zoning,
with a wireless broadband connection or a mobile phone allowing authorities to make informed decisions, develop
network can link to the internet. effective emergency response plans, and minimize the
impact of flooding on communities.
6.2. Modelling Applications 4. Traffic management: Computer modelling simulates and
analyses traffic flow, predicts congestion patterns, and
Advantages of using models: optimises traffic control strategies. It aids in designing
efficient road networks, optimizing signal timings, and
using models is less expensive than having to build the evaluating the impact of transportation infrastructure
real thing projects. This enables authorities to make informed
safer to use a computer model decisions, alleviate congestion, and improve overall traffic
allows you to try out various different scenarios in efficiency for better urban mobility.
advance 5. Weather forecasting: Computer modelling plays a pivotal
nearly impossible to try out some tasks in advance in real role in weather forecasting by simulating the Earth's
life due to high risk atmosphere, oceanic conditions, and other environmental
faster to use a computer model than to do the real thing factors. These models use complex algorithms to predict
weather patterns, including temperature, precipitation, wind
Disadvantages of using models: speed, and storm systems. By assimilating real-time data,
a model can’t be completely reliant as the output is computer models provide forecasts that aid meteorologists
entirely based on the input in predicting weather conditions, issuing warnings, and
frequently, computer modelling can be a very costly helping society prepare for potential hazards.
option
human reluctance is a common problem in this
technology
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Several credit/debit cards come with a magnetic stripe and a
chip; the chip houses essential data like the PIN. This Advantages:
technique is intended to increase security because it is more convenient and safer than cash
superior to a signature. A chip and PIN card to make can be post-dated
purchases is an example of an electronic funds transfer can be traced if they are lost
(EFT). Disadvantages:
aren’t legal tender and can be refused
Advantages of credit cards: slow method of payment
customer protection if ordered goods don’t arrive easier for fraudsters than other methods
internationally accepted payment method relatively expensive payment method
interest-free loan if money is paid back within the
agreed time period Internet Banking
can make purchases online
Disadvantages of credit cards: Enable online access to banking services via a secure
can be charged high interest rates website or app, allowing for transfers, bill payments, account
annual fees often apply management, and more.
easy to end up with credit damage
security risks in online transactions Advantages:
Advantages of debit cards: convenience and availability
easy account management
money comes from the user’s current account, there
branch visiting won’t be a requirement
is no interest
interest rates may be better
safer than carrying cash
can make online purchases more accessible to shop around for the best account
Disadvantages of debit cards: Disadvantages:
security of transactions
less customer protection if goods don’t arrive
requires a reliable internet connection
no credit allowed; funds are needed at the time of
More risk of fraud
purchase
security risks in online transactions Easier to make errors
Physical cash can't be deposited/withdrawn
Cheques
6.7. Computers in Medicine
Individuals and organizations use cheques as a form of
payment. When issuing a cheque, the payer writes the Information Systems in Medicine
recipient's name, the payment amount, and the date on the
cheque. The recipient then deposits or presents the cheque Patient records: Healthcare professionals maintain
to their bank for processing. The payer's bank verifies the databases to communicate information between them
fund’s availability, and upon clearance, the specified amount and pharmacists (for instance, to guarantee no
is transferred from the payer's account to the recipient's medications are administered that interact dangerously
account, completing the transaction. with one another).
Pharmacy records: Pharmacy records maintain a
comprehensive record of patient prescriptions. This
includes details like the prescribed medication, dosage,
quantity dispensed, prescribing physician's information,
and the date of dispensing. These records help track
medication usage and can be used to verify prescription
accuracy and detect potential drug interactions or
allergies.
3D Printers
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
5. Rules base
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Below is an example of how an expert system works to
diagnose a medical issue: Use of chip and PIN cards:
Enhance security with two-factor authentication
The interactive screen asks questions for the doctor to Require customers to enter a personal identification
answer using a keyboard or a touch screen. number (PIN)
The inference engine compares the symptoms with the Use of contactless cards:
knowledge base, using the rule base to find matches. Allow for faster transactions
The system suggests the possible illness with a Enable customers to tap their card on the terminal
probability of each, cures, and recommendations on the Use of Near Field Communication (NFC):
next step. Facilitate payments through smartphones and other
The explanation system will explain how that particular devices
diagnosis was suggested. Increase convenience for customers
Communication between supermarket computers and
6.9. Computers in the Retail Industry bank computers:
Share transaction details securely
Point of sale (POS) terminals: Computerized systems used Enable instant payment processing and verification
at checkout counters to handle purchases and oversee
stock. It is extensively used in retail stores to process sales Internet Shopping
transactions. They enable quick and secure payment
Characteristics of Internet Shopping:
processing through various methods, including cash,
credit/debit cards, mobile payments, and digital wallets. POS Online stores accessible through web browsers
terminals calculate totals, generate itemized receipts, A wide variety of products and services are available
update inventory, and provide real-time sales data for Convenient and often open 24/7
effective business management.
Advantages (To customer):
Some features include:
update stock files immediately access to the global market
track inventory levels in real-time comparison between different products effortlessly
prevent stock discrepancies and ensure accurate can shop from anywhere in the world
records able to avoid queues and busy stores
monitor inventory levels and reorder when stock is
lower than a predefined value Advantages (To business):
streamline supply chain management and minimize can target prices and services based on buying data
stockouts can update stock availability and prices more quickly
Electronic funds transfer at Point of sale (EFTPOS) than a physical store
terminals: Devices for processing electronic payments; they cheaper to publicize special offers
allow customers to make payments using debit or credit international customer base
cards by securely transferring funds from their bank increased profits due to lower staff
accounts. EFTPOS terminals authenticate and authorize Disadvantages (To customer):
transactions in real-time, providing convenience and security
for customers and businesses during retail purchases. security concerns
The process of checking credit and debit cards at a can’t correctly examine products before purchase
supermarket EFTPOS is much the same as was described for occasionally, products may take weeks before being
paying a restaurant bill in Section 6.6. delivered
Some functions of EFTPOS include: additional shipping and handling costs
lack of face-to-face interaction with staff
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
3. RFID in tracking stock:
increased competition
digital fraud and security concerns
technical issues and downtime
costs of delivery and return
fake negative reviews can lead to a lousy company
reputation
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
4. Near Field Communication (NFC):
Used to determine the exact location of several modes of
Enables short-range wireless communication between transport
devices. Cars usually refer to GPS as satellite navigation systems
Allows payment using a smartphone. Satellites surrounding the Earth transmit signals to the
Advantages: surface
Convenient and secure method of payment Computers installed in the mode of transport receive
allows for contactless transactions and interpret these signals
Disadvantages: Knowing their position on the Earth depends on very
Limited range accurate timing – atomic clocks are used in the satellites,
compatibility issues with some devices which are accurate to within a fraction of a second per
day
5. Biometric recognition: Each satellite transmits data indicating its position & time
Usually refers to automated technologies for The computer on board the mode of transport calculates
authenticating and verifying human body characteristics its exact position based on the information from at least
such as face, iris, retina, finger, thumb, hand and voice. three satellites
Advantages: Satellite Navigation (satnav):
very high accuracy
very easy to use Used to determine the exact location of a car.
very fast verification time The computers onboard can be used to show directions
non-intrusive method to a destination.
relatively inexpensive technology
Disadvantages: Advantages:
it can make mistakes if the skin is dirty or damaged
Better focus as there isn’t a need to constantly check
very expensive to install and set up paper maps.
uses a lot of memory for the data to be stored Reduces fines by warning drivers about upcoming speed
a person’s voice can be quickly recorded and used for changes.
unauthorized access The system shows an Estimated Time of Arrival (ETA).
an illness, such as a cold, can change a person’s
It is possible to program in the fastest route to avoid
voice, making absolute identification difficult or towns.
impossible The system can also give helpful information such as the
location of petrol stations.
6.11. Satellite Systems
Disadvantages:
Global Positioning Systems (GPS) If the maps are not updated, they can give incorrect
instructions.
Road closures due to accidents or roadworks can cause
problems.
The loss of satellite signals can cause problems.
The system will give incorrect information if an incorrect
start-point or end-point is keyed in.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Used to capture, manage, analyze, and display There is a time delay in receipt of the signals.
geographically referenced information. The signals received can be affected by bad weather.
Use to determine the distance between two places. Sunspot activity can affect the performance of a satellite.
Used to find the nearest petrol station or restaurant, etc. They must be monitored and controlled regularly to
To protect animal and plant life in certain vulnerable remain in the correct orbit.
places.
It can be used in geography, science, or engineering
lessons. 7. System’s Life Cycle
Advantages:
7.1. Stages of System's Life Cycle:
Allows geographical and thematic data of any kind to be
combined to show how they are connected to each 1. Analysis
other. 2. Design
It allows the handling and exploration of vast amounts of 3. Development & Testing
data. 4. Implementation
It allows data to be integrated from a wide range of very 5. Documentation
different sources. 6. Evaluation
Advantages:
Disadvantages:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
It is vital to identify the suitable hardware needed for the Data capture forms: These are designed to collect data
new system from users in a structured format. They come in two
contemplating system requirements, compatibility, types: paper-based and electronic-based. Paper-based
costs data-capturing forms must be carefully designed with
justifying choices based on user needs and system headings, concise instructions, character and
performance information fields, checkboxes, and enough writing
Hardware that needs to be considered: space. Text boxes, on-screen help, drop-down menus,
barcode readers, radio buttons, automatic validation, and control buttons
scanners, for data entry are all features of computer-based forms.
touch screens, Consider a user-friendly layout, clear instructions, and
3D printers, appropriate data fields.
monitors,
speakers. Output Formats
Identifying suitable software needed for the new system
considering functionality, compatibility, and ease of Screen layouts: how information is presented to users
use on a screen
justifying choices based on user requirements and Report layouts: how information is organized in a
system efficiency printed or digital report
Software that needs to be considered: Consider readability, visual appeal, and efficient use of
operating system, space
applications software,
size of storage, Validation Routines
type of storage.
It is a method of examining data submitted to a computer to
determine if it meets specific requirements. It is a routine
7.2. Design check that the computer does as part of its programming.
1. Range check: ensures data is within a specified range of
Once the analysis has taken place and the systems analyst values
has some idea of the scale of the problem and what needs 2. Character check: ensures data contains only allowed
to be done, the next stage is to design the critical parts of characters
the recommended system. 3. Length check: ensures data is of a specified length
4. Type check: ensures data is of the correct data type
File/Data Structures 5. Format check: ensures data conforms to a specific
Field length: number of characters allowed in a field format
6. Presence check: ensures data is present and not left
Field name: an identifier for the field in the data
structure blank
Data type: specifies the kind of data that can be stored in 7. Check digit: a digit added to a number to verify its
a field, e.g., text, numbers, dates accuracy
Coding of data: using codes to represent data, e.g. M for
male, F for female 7.3. Development and Testing
Input Formats Guarantees the system's functionality before it is put into
use.
Identification and removal of errors, thus improving
system reliability and performance.
Test Designs
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Before selecting the approach best suited for a given
Test data structures, file structures, input formats, application, the pros and cons of each must be carefully
output formats, and validation routines considered.
Ensure all components function correctly and interact
seamlessly 4 Methods of Implementation
Test Strategies 1. Direct changeover:
Test each module: verify that the individual components The old system is replaced by the new system
function as intended immediately
Test each function: ensure all features work correctly Used when quick implementation is necessary
Test the whole system: confirm overall system Advantages
performance and integration fast implementation
cost-effective as only one system is in operation
Test Plan Disadvantages
High risk of failure
Test data: specific data used for testing purposes no fallback
Expected outcomes: predicted results based on test data users can’t be trained on the new system
Actual outcomes: results obtained from testing
Remedial action: steps taken to fix identified issues 2. Parallel Running
Test Data Types Both current and new systems run simultaneously for a
period before the old system is phased out
The following data types will be explained using the example Used when a smooth transition with minimal risk is
of months in a year. required
Advantages
Normal data: valid and expected data values within the Lower risk
range of acceptability have an expected outcome. E.g., easy system comparison
any whole number between 1 and 12. Disadvantages
Abnormal data: invalid or unexpected data values. This Time-consuming
can either be: resource-intensive
Data outside the range of acceptability or
Data that is the wrong data type 3. Pilot Running
In this case, examples could be…
The new system is implemented in a small, controlled
any value less than 1 (i.e. 0, -6, etc.)
environment before full-scale implementation
any value greater than 12 (i.e. 13, 15, etc.)
Used when testing the new system in a real-world setting
letters or nun-numeric data (i.e. July, etc.) Advantages
non-integral values (i.e. 3.5, 4.2, etc.)
Low risk as only trialled in one
Extreme data: values at the limits of acceptability (E.g. 1
department/centre/branch
or 12)
allows for fine-tuning
staff have time to train with the new system
What is live data? few errors as it's fully tested
Data that has been used with the current system Disadvantages
Hence, the results are already known Slower implementation
potential inconsistencies
confusion as there are two systems in use
7.4. Implementation There is no backup for the
department/center/branch using the new system
The system must then be fully implemented after it has been
thoroughly tested.
We will now think more carefully about switching to the new
system. Four popular techniques are utilized to transition
from the old system to the new one.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
4. Phased Implementation
Purpose of the system/program: Explanation of the
The new system is implemented in stages, with each system's intended function and goals
stage replacing a part of the old system Limitations: Known constraints or issues with the
Used when a gradual transition is preferred to minimize system
disruption Program listing: The code or scripts used in the system
Advantages Program language: The programming language used to
reduced risk develop the system
easier to manage Program flowcharts/algorithms: Visual
Disadvantages representations or descriptions of the system's logic and
Takes longer processes
potential compatibility issues System flowcharts: Visual representations of the
interactions between system components
7.5. Documentation Hardware & software requirements: Necessary
equipment and software to run the system
In the life cycle of a system, documentation enables the File structures: Organization and layout of the system's
correct recording of design, implementation, testing, and files and data
maintenance data, facilitating effective communication, List of variables: Collection of variables used within the
troubleshooting, and potential future improvements. system, including their names and purposes
Technical documentation: detailed information on the Input format: Structure and format for entering data
system's inner workings and programming for into the system
developers and IT staff Output format: Structure and format for presenting
data generated by the system
Used to maintain, repair, and update the system with Sample runs/test runs: Examples of system operation,
improvements including input and expected output
Validation routines: Techniques used to check and
confirm the accuracy of data entered into the system
User Documentation
Instruction and guidance for end-users on how to operate
the system. Used to help users effectively use the system
and overcome problems
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Purpose of the system: Explanation of the system's Helps identify areas of improvement in the system
intended function and goals Ensures the system meets user and business needs
Limitations: Known constraints or issues with the Improves overall performance and user satisfaction
system Reduces future costs and issues by spotting problems
Hardware & software requirements: Necessary early
equipment and software to run the system Supports informed decision-making for upgrades or
Loading/running/installing software: Instructions for changes
setting up the system on user devices
Saving files: Procedures for storing data within the Assess the Efficiency of the Solution
system
Printing data: Steps to produce hard copies of system Analyse the system's efficiency in time, money, and
data resource use. Examine whether the system is performing
Adding records: Instructions for creating new entries in at its best or if its efficiency could be increased.
the system Provide examples of specific aspects that contribute
Deleting/editing records: Guidelines for modifying or to the system's efficiency
removing existing entries in the system Identify areas that may be consuming excessive
Input format: Structure and format for entering data resources or time and suggest ways to optimize them
into the system Questions to ask:
Output format: Structure and format for presenting Does it operate quicker than the previous system?
data generated by the system Does it operate by reducing staff time in making
Sample runs: Examples of system operation, including bookings?
input and expected output Does it operate by reducing staff costs?
Error messages: Explanations of system warnings and
error notifications Evaluate the Ease of Use
Error handling: Steps to resolve issues and errors within
the system Look at the solution's usability and accessibility for the
Troubleshooting guide/helpline: Assistance for target market. Check to see if the system is simple to
diagnosing and addressing common problems understand and use and if users have no trouble
Frequently Asked Questions: Answers to common user completing their jobs.
inquiries Describe the user interface and how it facilitates
Glossary of Terms: Definitions of key terms and interaction with the system
concepts related to the system Mention any feedback from users regarding their
experience with the system and address any issues
they encountered
7.6. Evaluation Questions to ask:
Are all the users able to use the system and make
It measures a system's productivity, efficiency, and bookings easily?
compliance with its goals to identify its strengths, Are all the users able to change and cancel bookings
shortcomings, and potential development areas. This easily?
assessment informs decision-making and improves overall Can all staff understand how to use the system with
performance over the course of a system's life cycle. minimal training?
Advantages of Evaluation: Determine the Suitability of the Solution
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Examine how well the implemented solution satisfies the Contact between liquid substances and electronic
desired outcome by contrasting it with the original task devices: Keep liquids away from electrical equipment.
criteria. Open cables: Ensure that cables are entirely insulated
Outline the initial objectives of the system and and packed, and use circuit breakers or fuses to prevent
discuss how the solution addresses each one electrical overload.
Highlight any requirements that may not have been
fully met and discuss possible reasons for this 2. Fire: ICT devices require electricity to charge or run; too
Questions to ask: many devices using a single socket can cause the plug socket
Is the system suitable for each of the departments? to overload, and heat is generated by too much electricity,
Does it meet the needs of the customers? causing the wiring to degrade and ignite a fire.
Does it meet the needs of the staff? The causes and reduction tactics for fire include:
Does the solution match the original requirements?
Socket overload: Ensure enough plug sockets in the
room, don’t plug too many devices into the same
Collect and Examine User’s Feedback socket, and don’t leave devices plugged in and
Collect users' responses to the results of testing the unattended.
system. Their feedback can provide insights into Overheated equipment: Ensure that equipment is
potential issues and improvements and help determine properly ventilated and not obstructed, keep flammable
overall user satisfaction. materials away from heat sources, regularly check
Summarise the testing process, including test data equipment for signs of wear or damage, use fire
expected and actual outcomes. extinguishers in case of emergencies, turn off or unplug
Discuss users' reactions to the system, addressing devices when away from the location, do not cover any
any concerns or suggestions they may have air vents on devices.
3. Trailing cables: Devices can be plugged in using cables.
Identify Limitations and Suggest Necessary Cables that are protruding can cause an accident; you can
Improvements trip over a cable left out in a location, and body damage can
occur during a fall, for example, breaking bones, ligament
Based on the analysis of efficiency, ease of use, damage, bruising, sprains, etc. depending on the area fell on
appropriateness, and user feedback, identify any Trailing cables causes and prevention strategies:
limitations in the system and suggest necessary
improvements Unorganized/insecure cables: use cable ties to secure
List the limitations and provide explanations for each cables, keep cables packed correctly in, let’s say, a table,
one therefore not coming in the way of walking paths, use
Recommend specific changes or enhancements for wireless devices where possible, and regularly inspect
these issues cables for signs of wear or damage.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Improperly secured equipment: Ensure that Protecting Individual Rights: Data protection legislation
equipment is properly secured and stable. Regularly safeguards individuals' right to privacy and control over
check the stability of locations containing devices. their personal information.
Equipment on unstable surfaces: Keep equipment Preventing Misuse of Personal Data: It helps prevent
away from edges and other potential hazards, and unauthorized access, identity theft, fraud, and other
regularly inspect equipment and locations containing forms of data misuse.
devices for signs of wear or damage. Promoting Trust: Data protection laws build trust
between individuals and organizations by ensuring their
8.2. eSafety personal information is handled responsibly.
Encouraging Responsible Data Handling: Legislation
Data Protection promotes responsible data collection, storage, and
processing practices among organizations.
The Data Protection Act (DPA) controls personal data Enabling Data Subject Rights: Legislation grants
collection, storage and processing. individuals rights such as access to their data, right to
rectification, erasure, and objection to processing.
In the UK, the European Union’s General Data Protection
Regulation (GDPR) Personal Data
Protects personal data, whether stored on paper or a
computer system
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Refers to information that can be used to identify an Awareness that personal information should not be
individual shared freely
Examples Awareness of how to act online and avoid falling victim
Personal Name creates a safe and respectful environment.
Address Identify and avoid online scams, phishing attempts, and
Date of birth fraudulent websites that may try to trick them into
A photograph in school uniform sharing personal or financial information.
Medical history Mindful of online behaviour and interactions, protecting
Threats that can be avoided by protecting personal your digital reputation, which can have long-term
data: consequences in your personal and professional life.
Identity theft Control privacy settings on social media platforms,
Privacy breaches limiting who can access/view personal information and
Misuse of the information posts.
Data be sold to third-party companies Avoid encountering explicit or harmful content online,
Individuals could be held to ransom over personal reducing the risk of exposure to inappropriate material
data gathered or online predators.
could be used to commit a physical crime Engage in online gaming responsibly, avoid sharing
How to avoid inappropriate data disclosure: personal details, and behave respectfully towards other
Personal data must be kept confidential and players.
protected through privacy settings on websites such Protecting devices from malware, viruses, and other
as social media or strong passwords on websites online threats, preventing data loss, privacy breaches, or
where personal data is held or used device damage.
Access to personal data should be limited to Develop responsible online behaviours, promoting
authorized individuals respectful conduct while interacting with others online.
Think before you post - consider what information Maintain a healthy balance between online and offline
could be gathered from your image or content lives, reducing the risk of addiction, mental health issues,
Check website details about the collection, storage, or negative impacts on relationships and self-esteem.
and use of personal data
Only access websites where personal data is used or Safety Suggestions
viewed when on a secure, encrypted connection
eSafety
E-safety is knowing about and using the internet safely
and responsibly.
It refers to when an individual is using the internet,
email, social media, or online gaming.
E-safety refers to the individual knowing how to protect
themselves from potential dangers and threats.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
A security mechanism that requests two different kinds The first step to building effective ICT solutions is
of identification from users to confirm their identity. To identifying and understanding the intended audience's
provide additional protection outside of just a username needs. These needs can be functional, like processing
and password, 2FA was created. Typically, it combines information, or aesthetic, like a visually appealing
something that uniquely identifies a user, like biometric interface.
data, with something the user has, like a smartphone After identifying the needs, select the appropriate
and a token or something they know, like a password. technology and tools to create a solution. This choice
depends on factors like the complexity of the task, the
7. User ID and password: budget available, and the technical expertise of the
A typical authentication technique uses a password plus users.
a secret code (user ID) to identify. To strengthen data An essential aspect to remember while designing ICT
solutions is to ensure they are user-friendly. This means
security, user IDs and passwords restrict access to only
authorized users. Using secure passwords and changing they should be intuitive to use, require minimal training,
them frequently is critical to ensure security. When and have easy-to-understand instructions.
creating passwords, it is advised to utilize a mix of Additionally, ICT solutions should be accessible to all
uppercase, lowercase, digits, and special characters. users, including those with disabilities. This could involve
adding features like voice commands, larger text options,
or compatibility with assistive devices.
9. Audience Once the solution is created, it is crucial to test it to
ensure it functions as expected and fulfils the users'
needs effectively.
9.1. Audience Appreciation
Analysing Audience Requirements
To express gratitude and value for the users by providing
helpful and relevant information, fostering positive Designing an ICT solution requires an understanding of
experiences, and contributing to their understanding and the target audience. The study should consider elements
learning. affecting the audience's capacity to use the solution, like
age, technical proficiency, and expertise.
Planning ICT Solutions The solution creator should know the audience's
requirements for information. This could serve as a
design cue for the data processing elements and the
information architecture.
How the audience utilizes and consumes the content
also influences the design. For instance, the answer
should be mobile-friendly if the audience accesses it
mostly through mobile devices.
Finally, the designer should consider any unique
requirements of the audience, such as visual or auditory
impairments. These requirements should be taken into
account when designing the solution ensuring inclusivity.
9.2. Copyright
What makes Copyright Necessary?
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Copyright regulation is crucial to safeguard the rights of Email is a technique of sending and receiving messages
developers and innovators. and files via the Internet.
It stops software piracy, which is unauthorised use, It is employed in personal communication, business
replication, or distribution. communications, and marketing.
It guarantees developers receive compensation for their Acceptable language must be used based on the email's
efforts, fostering additional innovation and development. recipient, for example, professional when composing a
work-related email.
Principles of Copyright in a Computer Software Employers frequently establish requirements for
professional language, substance, and email frequency.
Copyright law prohibits the unauthorized copying, Email security is critical to preventing sensitive data from
distribution, or modification of software. being accessed or manipulated.
It also includes the End-User License Agreement (EULA), Netiquette is the proper conduct and politeness when
which outlines what the software can and cannot be using email.
used for Don’t be abusive
Violations of these principles, such as software piracy, Don’t send spam
can lead to legal consequences. Be clear and concise with your message
Remember that posts are usually public and can be
Preventing Software Copyright Violation read by anyone.
Always check your spelling and grammar.
Software developers employ various copyright protection Respect people's privacy and do not discuss or
strategies, such as Digital Rights Management (DRM). publish information that might embarrass somebody.
Due to DRM methods and systems, copyrighted works Forgive people’s mistakes
are subject to usage, modification, and distribution Do not use CAPITAL LETTERS to highlight comments
restrictions. Do not plagiarize
Other techniques include software product activation, Do not use too many emoticons, as they might annoy
which needs a unique code to be fully functional. your readers.
Given that pirated software frequently cannot receive Email groups enable mass communication to a specific
automatic upgrades, which renders it less effective and group of subscribers.
secure over time, automatic updates may also serve as a
kind of copyright protection. Guidelines set by employers:
10. Communication
10.1. Communication with Other ICT
users Using E-mail
E-Mail
Uses:
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Carbon copies are used to send the email to multiple A vital communication tool that allows people to
recipients. communicate via emails, instant messaging, and other
Blind carbon copies are made to send the email to means.
multiple recipients without them acknowledging that it It acts as a massive database of information on almost
has been sent to other recipients. any subject
Forward enables users to send an already existing email The Internet has transformed business by offering a
to a new recipient. platform for online purchasing, electronic payments, and
To attach files to be sent with an email, we make use of digital transactions, allowing enterprises to reach global
Attachments. consumers.
It is defined as any unwanted email delivered via the users have access to an incredible amount of
Internet. These can range from annoying to genuinely information, empowering them to learn
harmful, as they may contain viruses. enables individuals and businesses to connect and
The main disadvantages are: communicate with people from different parts of the
world in real-time
the Internet has made many things easier to complete,
thus providing simplicity and effectiveness
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
The Functionality of the Internet Advantages of using the Internet to find information
information tends to be up to date because it is
Internet service providers (ISP): A company that quicker and easier to amend
provides internet access. Typically, a monthly fee is The Internet has vast amounts of information
charged for this service. Users' accounts are created searching for information using a search engine is
when registering with an ISP and acquiring login fast and easy
information such as user ID and password. people can look for information in the comfort of
Uniform Resource Locator (URL): The address of a web their own home
page on the WWW. It is a text-based address that information on the internet is essentially free of
uniquely identifies the location of any resource available charge
on the internet. The three main components are: webpages may have multimedia elements, making
Protocol: learning more interesting
It is the communication protocol used to transfer Disadvantages of using the Internet to find
data between the client and the server information
E.g. HTTP, HTTPS, FTP, and others it isn’t regulated; anything can be posted
Domain: always the risk of accessing inappropriate websites
it is the name of the server where the resource is too easy to be distracted by the many distractions
located available on the internet
it can be a name or an IP address Some research skills are lost when using the internet,
Webpage/file name: as search engines do all the work for you.
it is the location of the file or resource on the server
it can contain the name of the file or directory where Speed of Searching
the resource is located
A URL looks like this: Search engines may scan billions of online pages to
protocol://domain/path/filename locate matches to your search query in a fraction of a
E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is second.
a URL that consists of the HTTPS protocol, the Your internet connection and the effectiveness of the
domain name "www.hoddereducation.co.uk", the search engine's algorithms influence the speed.
path is “IGCSE” and the filename is “ICT”
A hyperlink is a word/phrase/image which references Amount of Information
data that the reader can follow by clicking or tapping,
usually taking you to another web page Because search engines can deliver a deluge of
A web browser is a software application used to locate, information, utilising particular and relevant search
retrieve, and display content on the WWW, including web phrases is critical.
Adding quotation marks for specific phrases, "+" signs for
pages, images, video, and other files
required terms, and "-" signs for omitting terms can help
Use of Search Engines narrow the search.
There are two fundamental methods for obtaining Finding Relevant and Reliable Information
information via the Internet. The first method is to enter the
The search engine algorithm determines the relevancy of
URL if you know the website's address. If you don't know
information by considering parameters such as keyword
where to look, the second option is to employ a search
frequency & page quality.
engine to locate the information you seek.
Reliable information is often obtained from recognized
sources such as educational, government, or well-known
industry websites.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE ICT
Internet Protocols
Protocols are rules on which the sender and recipient agree
when data is exchanged between devices.
1. Hypertext transfer protocol (HTTP): when a web page is
being accessed, entering http:// at the front of an address
tells the web browser that ‘HTTP rules’ for communication
are to be obeyed.
2. Hypertext transfer protocol secure (HTTPS): A secure
version of HTTP that encrypts data for security.
3. File transfer protocol (FTP): network protocol used when
transferring files from one computer to another over the
internet. It is similar to HTTP, but the protocol specifically
transfers files.
4. Secure sockets layer (SSL): a protocol that allows data to
be sent and received securely over the internet.
WWW.ZNOTES.ORG Copyright © 2025 ZNotes Education & Foundation. All Rights Reserved. This document is
authorised for personal use only by Maryam at The Regent Secondary School Abuja on 05/05/25.
CAIE IGCSE
ICT
© ZNotes Education Ltd. & ZNotes Foundation 2025. All rights reserved.
This version was created by Maryam on Mon May 05 2025 for strictly personal use only.
These notes have been created by Farhan Shahid for the 2023-2025 syllabus.
The document contains images and excerpts of text from educational resources available on the internet and printed books.
If you are the owner of such media, test or visual, utilized in this document and do not accept its usage then we urge you to contact us
and we would immediately replace said media. No part of this document may be copied or re-uploaded to another website.
Under no conditions may this document be distributed under the name of false author(s) or sold for financial gain.
"ZNotes" and the ZNotes logo are trademarks of ZNotes Education Limited (registration UK00003478331).