Igcse Ict 0470 - Notes
Igcse Ict 0470 - Notes
2023 - 2025
Notes + Past Papers
Index
Software and Resources 2-3
Paper 1 – Notes 4 - 90
1|P a g e
Software and
Resources
All Software, Applications, Notes, and Books used in these notes
Paper 1
IGCSE ICT 0417 Quick Revision Paper 1 Theory By: Mr.
Ayman Al-Nahhas Cambridge ICT Tutor
www.etoptutor.com
2|P a g e
Paper 2 and Paper 3
Microsoft Word
Microsoft PowerPoint
Microsoft Access
Microsoft Excel
Adobe Dreamweaver
Adobe Photoshop
3|P a g e
Paper 1
Theory
4|P a g e
Section 1: Types and Components of Computer Systems
Hardware
Internal components:
Software
Software is a set of instructions that tells the computer what to do. It can be
divided into two types:
1. Application Software
This helps users complete tasks. Examples include:
5|P a g e
• Database management systems: For storing and managing large amounts
of data.
• Control and measurement software: Used in industries and automation.
• Applets and apps: Small programs for specific tasks.
• Video and audio editing software: For editing multimedia files.
• Graphics editing software: For designing images.
• Computer-Aided Design (CAD): Used for designing buildings, machines,
and more.
2. System Software
This helps the computer function properly. Examples include:
6|P a g e
1.2 The main components of computer systems
Central Processing Unit (CPU)
The CPU (Central Processing Unit) is the brain of the computer. It carries out all
instructions and processes data. It consists of three main parts:
• Control Unit (CU): Directs the flow of data and tells other components what to do.
• Arithmetic Logic Unit (ALU): Performs mathematical calculations and logical
operations.
• Registers: Small, fast storage areas inside the CPU that hold temporary data.
The speed of the CPU is measured in GHz (Gigahertz). A higher GHz means the CPU
can process more instructions per second.
Internal Memory
Internal memory stores data and instructions temporarily while the computer is
running. There are two types: ROM and RAM.
7|P a g e
Read-Only Memory (ROM)
• Stores temporary data that the CPU needs while running programs.
• Data is lost when the computer is turned off.
• The more RAM a computer has, the more programs it can run at the same time.
• Volatile: Loses data when power is off.
Input Devices
Examples:
Output Devices
8|P a g e
Examples:
Function Sends data to the computer Receives data from the computer
Backing Storage
Backing storage is used for long-term data storage. It keeps data even when the
computer is turned off.
Backing storage is important because internal memory (RAM) cannot store data
permanently. Users need hard drives or USBs to save files, programs, and backups.
9|P a g e
1.3 Operating systems
There are different types of operating systems based on how users interact with
them.
Advantages:
✔ Uses fewer system resources (RAM, CPU).
✔ Faster for expert users who know commands.
✔ Allows automation through scripts.
Disadvantages:
✘ Difficult for beginners.
✘ Users must remember complex commands.
✘ No graphical elements like icons or windows.
10 | P a g e
Advantages:
✔ Easy to use, even for beginners.
✔ No need to remember commands.
✔ Supports multitasking with multiple open programs.
Disadvantages:
✘ Uses more system resources (RAM, CPU).
✘ Can be slower for experienced users.
✘ Needs a graphical display to function.
3. Dialogue-Based Interface
Advantages:
✔ Hands-free operation.
✔ Useful for accessibility (disabled users).
✔ Can process natural language.
Disadvantages:
✘ Speech recognition may not be accurate.
✘ Limited to specific commands.
✘ Requires an internet connection in some cases.
4. Gesture-Based Interface
Advantages:
✔ Intuitive and easy to use.
✔ No need for external devices like a keyboard or mouse.
✔ Faster navigation on touchscreens.
Disadvantages:
✘ Not precise for complex tasks.
✘ Requires specific hardware (touchscreen, motion sensors).
✘ Can be tiring for long use.
11 | P a g e
Differences Between Types of Operating Systems
Conclusion
Different operating systems have different strengths. GUI is best for everyday
users, CLI is efficient for experts, dialogue-based is useful for automation, and
gesture-based is great for touchscreen devices. The choice depends on the user's
needs and the device's purpose.
12 | P a g e
1.4 Types of computer
Computers come in different types, each designed for specific purposes. The two
main types are desktop computers and mobile computers.
1. Desktop Computers
13 | P a g e
Uses of a Desktop Computer:
• Office and Business Management: Used for document creation, data analysis,
emails, and meetings.
• Education: Helps students and teachers with research, assignments, and online
learning.
• Gaming: Many desktops have powerful graphics cards for high-performance
gaming.
• Entertainment: Used for watching videos, listening to music, and editing photos
and videos.
2. Mobile Computers
Mobile computers are portable devices that allow users to work from different
locations. They include laptops, smartphones, tablets, and phablets.
• Laptops: Small and foldable with a built-in screen, keyboard, and battery.
• Smartphones: Handheld devices with touchscreen functionality, apps, and internet
access.
• Tablets: Larger than smartphones but lack a physical keyboard; use touch-based
input.
• Phablets: A mix between a smartphone and a tablet, offering a larger screen with
phone capabilities.
• Office and Business Management: Allows professionals to work on the go, attend
meetings, and manage emails.
• Education: Students use mobile devices for online classes, note-taking, and
research.
• Gaming: Many smartphones and tablets support mobile gaming.
• Entertainment: Streaming videos, social media, and reading e-books.
14 | P a g e
• Remotely Controlled Devices: Used for smart home control, drones, and IoT
applications.
Conclusion
Desktop computers are powerful but not portable. Mobile computers are
convenient but may have limited performance and upgradeability. The choice
depends on the user’s needs and how they plan to use the device.
15 | P a g e
1.5 Emerging technologies
Emerging technologies like Artificial Intelligence (AI) and Extended Reality (XR)
(which includes Virtual Reality (VR) and Augmented Reality (AR)) are changing
daily life. They have many benefits but also some challenges.
• AI can analyze data, recognize patterns, and make decisions without human input.
• Used in voice assistants (Siri, Alexa), chatbots, self-driving cars, and medical
diagnosis.
• Helps in education (personalized learning), business (automation), and security
(fraud detection).
✅ Positives:
✔ Speeds up work and reduces human errors.
✔ Helps in medical fields (AI can detect diseases early).
✔ Automates tasks, making businesses more efficient.
❌ Negatives:
✘ Can replace human jobs, leading to unemployment.
✘ AI decisions can be biased if trained on bad data.
✘ Raises privacy concerns (data tracking, surveillance).
16 | P a g e
✅ Positives:
✔ Provides realistic training for pilots, doctors, and soldiers.
✔ Makes learning interactive (students can explore space or history).
✔ Offers new experiences in gaming and entertainment.
❌ Negatives:
✘ Expensive and requires high-end hardware.
✘ Can cause motion sickness and eye strain.
✘ Disconnects people from the real world.
• Adds digital elements to the real world using smartphones, glasses, or AR devices.
• Used in games (Pokémon GO), navigation (Google AR Maps), retail (virtual try-ons),
and education (interactive textbooks).
✅ Positives:
✔ Enhances real-world experiences without full immersion.
✔ Useful in shopping (see how furniture looks before buying).
✔ Helps in medicine (doctors can overlay scans on a patient).
❌ Negatives:
✘ Can be distracting if overused in daily life.
✘ Privacy concerns (AR glasses can record people without consent).
✘ Not all devices support AR technology.
Conclusion
17 | P a g e
Section: 2 Input and output devices
2.1 Input Devices and Their Uses
Input devices allow users to enter data into a computer. Different input devices are
used for different tasks, and each has its own advantages and disadvantages.
Keyboard
Numeric Keypad
• Uses: Used to control a cursor, select items, draw, and navigate interfaces.
• Advantages: Precise control, easy to use, ergonomic designs available.
• Disadvantages: Requires a flat surface (for a mouse), can wear out over time.
Remote Control
18 | P a g e
• Advantages: Intuitive, easy to use, saves space by removing the need for a
keyboard/mouse.
• Disadvantages: Prone to fingerprints and scratches, can be inaccurate for precise
tasks.
Scanners
Microphone
• Uses: Used for voice recording, video calls, and speech recognition.
• Advantages: Hands-free operation, enables voice control.
• Disadvantages: Background noise can affect quality, requires software support.
Sensors
Light Pen
• Uses: Used for precise drawing, screen interaction, and design work.
• Advantages: More precise than a mouse, useful for graphics work.
• Disadvantages: Requires a special screen, can be tiring to use for long periods.
Direct data entry devices allow fast and accurate input of data without typing.
These devices are often used in business, security, and automation.
19 | P a g e
Common Direct Data Entry Devices
• Uses: Reads data from magnetic stripes on credit cards and ID cards.
• Advantages: Fast and reliable, requires no physical contact.
• Disadvantages: Can wear out over time, easy to clone (security risk).
• Uses: Used in payment systems to read credit and debit card chips.
• Advantages: More secure than magnetic stripes, requires PIN for authentication.
• Disadvantages: Can be slow, requires user input (PIN entry).
• Uses: Used for inventory tracking, security access, and contactless payments.
• Advantages: Works without direct contact, fast scanning.
• Disadvantages: Expensive, can be affected by interference.
Barcode Reader
QR Scanner
• Uses: Reads Quick Response (QR) codes used in payments, links, and marketing.
• Advantages: Stores more data than barcodes, easy to use with smartphones.
• Disadvantages: Requires a camera, QR codes can be misused for scams.
20 | P a g e
2.3 Output Devices and Their Uses
Multimedia Projector
Printers
✅ Laser Printer
✅ Inkjet Printer
21 | P a g e
✅ Plotter
✅ 3D Printer
Speakers
Actuators
Conclusion
Input and output devices allow computers to interact with users. Some devices
focus on speed and accuracy, while others prioritize ease of use. Choosing the
right device depends on the task, cost, and user needs.
22 | P a g e
Section 3: Storage Devices and Media
1. Magnetic Drives
23 | P a g e
2. Optical Drives
4. Storage Media
24 | P a g e
o Magnetic Media: Includes magnetic hard disks and tapes.
o Optical Media: Includes CD, DVD, Blu-ray.
o Solid-State Media: Includes SD cards, xD cards, CFast cards.
• Uses:
o Magnetic Media: Long-term storage, backup.
o Optical Media: Software, music, video.
o Solid-State Media: Portable storage, used in cameras, smartphones,
laptops.
• Advantages:
o Magnetic: Cost-effective for large volumes of data.
o Optical: Good for multimedia distribution.
o Solid-State: Fast read/write speeds, durable, portable.
• Disadvantages:
o Magnetic: Slower speeds, mechanical parts can fail.
o Optical: Less capacity, prone to damage.
o Solid-State: Expensive, limited capacity for higher-end applications.
25 | P a g e
Section 4: Networks and the effects of using them
1. Router
26 | P a g e
o A hardware component that enables a device to connect to a network (wired
or wireless).
o Provides a unique MAC address for the device.
• Hubs:
o Basic networking device that connects multiple devices in a network.
o Sends data to all devices on the network (not very efficient).
• Bridges:
o Connect two or more network segments to make them act as a single
network.
o Used to reduce network traffic and improve performance.
• Switches:
o Similar to hubs, but smarter; switches direct data packets only to the
intended device, improving efficiency.
o Operates at the data link layer, using MAC addresses to identify devices.
• Wi-Fi:
o Use: Wireless networking technology that allows devices to connect to the
internet or local area networks (LANs) over short to medium distances
(typically 100m or less).
o Advantage: High-speed data transfer, ideal for internet browsing,
streaming, and heavy data tasks.
• Bluetooth:
o Use: Wireless technology used for short-range communication between
devices, typically for audio devices, keyboards, mice, or file sharing (usually
under 100 meters).
o Advantage: Low energy consumption, great for small devices and
connecting peripherals.
• Connecting Devices:
o Wi-Fi: Devices connect through a wireless router to access the internet or a
network.
o Bluetooth: Devices pair directly with each other for personal, point-to-point
connections.
• Similarities and Differences:
o Similarities: Both are wireless communication technologies.
o Differences:
▪ Wi-Fi supports higher data transfer speeds, longer range, and is
suited for internet access and network connectivity.
▪ Bluetooth has a shorter range, lower data speeds, and is designed for
device-to-device communication (e.g., audio devices, file transfers).
4. Cloud Computing
• Characteristics:
27 | P a g e
o Cloud computing refers to accessing and storing data and services over the
internet rather than on local servers or devices.
o It provides scalable, on-demand resources (storage, applications,
processing power) without the need for physical infrastructure.
• Uses:
o Data Storage: Files, photos, and documents can be stored in cloud storage
services like Google Drive, Dropbox, etc.
o Software as a Service (SaaS): Applications (like email, office suites) run
directly from the cloud.
o Collaboration: Cloud computing allows teams to collaborate and share files
easily from any device.
• How Data is Stored, Managed, and Shared:
o Stored: Data is stored in remote servers (data centers) maintained by cloud
service providers.
o Managed: Users manage their data through cloud interfaces, which handle
tasks like backups, security, and access control.
o Shared: Data can be easily shared with others via links, permissions, or
collaborative platforms.
• Advantages of Cloud Storage:
o Accessibility: Data is accessible from anywhere with an internet connection.
o Scalability: Users can increase or decrease storage as needed without
worrying about hardware.
o Cost-Efficient: No need for costly physical storage devices, and the pay-
per-use model is cost-effective for businesses and individuals.
o Backup & Security: Automatic backup and high-level security provided by
cloud service providers.
• Disadvantages of Cloud Storage:
o Reliance on Internet Connection: Requires a stable internet connection for
access and upload/download.
o Security & Privacy Concerns: Storing sensitive data on third-party servers
may raise concerns about data security and privacy.
o Ongoing Costs: While it can be cheaper initially, ongoing subscription costs
can add up over time.
o Limited Control: Users have limited control over the infrastructure and
management of their data.
28 | P a g e
Common Network Environments
• Extranet:
o Characteristics: A private network that allows controlled access to external
users (e.g., business partners, vendors).
o Uses: Facilitates secure communication between businesses and external
stakeholders. Often used for sharing specific data or services with
authorized third parties.
o Purpose: Enhances collaboration between an organization and external
entities while maintaining a secure environment.
• Intranet:
o Characteristics: A private network accessible only within an organization,
typically protected by a firewall.
o Uses: Sharing internal resources, such as documents, communication tools,
and databases.
o Purpose: Enhances internal communication and collaboration within the
organization while keeping the data secure from outsiders.
• Internet:
o Characteristics: A global network of networks that connects millions of
devices and computers worldwide. Publicly accessible.
o Uses: Browsing websites, social media, email, online services, and accessing
global resources.
o Purpose: Serves as a worldwide medium for communication, entertainment,
business, and education.
• Differences and Similarities:
o Differences:
▪ Intranet: Private, internal network for use within an organization.
▪ Extranet: Extends the intranet to external users for secure
collaboration.
▪ Internet: Public, global network connecting millions of devices and
services.
o Similarities:
29 | P a g e
▪ All serve as means of communication and data transfer but differ in
terms of access (private vs. public) and user scope.
2. Network Types
30 | P a g e
• LAN: Localized network (office/home), fast speeds.
• WLAN: Wireless version of LAN, offers flexibility.
• WAN: Large-scale network, typically covering large areas, often connecting
multiple LANs.
31 | P a g e
▪ Use encrypted channels (SSL/TLS) when entering or transferring
passwords.
▪ Use Anti-spyware Software: Protect devices from spyware and
keyloggers that may attempt to capture passwords.
▪ Change Passwords Regularly: Regularly changing passwords
reduces the risk of them being compromised over time.
• Strong vs. Weak Passwords:
o Weak Passwords: Short, simple passwords (e.g., “123456”, “password”) are
easy to guess or crack through brute force attacks.
o Strong Passwords: Complex passwords, typically combining uppercase
and lowercase letters, numbers, and special characters. A minimum of 12
characters is recommended.
o Password Management Tools: Use password managers to generate and
securely store complex passwords.
• Other Authentication Methods:
o Zero Login: A form of passwordless authentication where access is granted
through methods like biometrics or tokens, reducing reliance on passwords.
o Biometric Methods: Authentication using unique physical features like
fingerprints, face recognition, or iris scans.
o Magnetic Stripes: Used in traditional credit cards and access control cards,
where a magnetic stripe contains encrypted data for authentication.
o Smart Cards: A card with embedded microchip used for secure
identification, data storage, and authentication.
o Physical Tokens: Devices like key fobs or USB tokens that generate a one-
time passcode (OTP) used for authentication.
o Electronic Tokens: Virtual or software-based tokens that generate OTPs for
authentication, such as apps like Google Authenticator.
2. Anti-Malware Software
32 | P a g e
• Scanning Storage Media:
o Scanning Storage Devices: Devices like USB drives, external hard drives, and
SD cards should be scanned before data transfer to ensure they are free
from malware.
o Scanning Data/Software During Download: Files and software downloaded
from the internet should be scanned immediately to prevent any malicious
content from being executed.
3. Electronic Conferencing
• Video-Conferencing:
o Hardware:
▪ Camera: For transmitting video (built-in webcam or external camera).
33 | P a g e
▪ Microphone/Speakers: For audio input and output.
▪ Computer or Mobile Device: A computer or smartphone with
sufficient processing power and a stable internet connection.
o Software: Video conferencing software like Zoom, Microsoft Teams,
Google Meet, or Skype.
o Network Connection: Requires a stable high-speed internet connection,
preferably via Ethernet or strong Wi-Fi, to support real-time video and audio
transmission.
• Audio-Conferencing:
o Hardware:
▪ Phone or Computer: Basic device capable of making calls or using
VoIP services.
▪ Headset/Microphone: For clear audio communication.
o Software: VoIP platforms like Skype, Zoom (audio-only), or conference call
services.
o Network Connection: A moderate to strong internet connection or mobile
network for VoIP calls, or a traditional phone line for landline calls.
• Web-Conferencing:
o Hardware:
▪ Computer/Tablet/Smartphone: For accessing the conference.
▪ Microphone, Speakers, Webcam: For communication and
collaboration.
o Software: Platforms like Zoom, Microsoft Teams, WebEx, or Google Meet
that support web-based meetings.
o Network Connection: Reliable high-speed internet for optimal performance
(upload/download speed).
34 | P a g e
Section 5: The effects of using IT
35 | P a g e
o Negative Effects:
▪ Lifestyle: Over-reliance on smart devices can lead to reduced
engagement in non-digital activities and a more sedentary lifestyle.
▪ Leisure Time: Excessive use of entertainment devices may lead to
less time spent outdoors or engaging in physical activities.
▪ Physical Fitness: Smart devices can encourage physical inactivity if
overused, particularly with sedentary activities like watching TV or
playing video games.
▪ Security of Data: The increasing amount of data collected by smart
devices can be a target for hackers, posing a risk to privacy if not
properly protected.
▪ Social Interaction: Overuse of virtual assistants and social media can
reduce face-to-face interactions, affecting personal relationships
and contributing to social isolation.
• Microprocessors/Smart Devices in Transport:
o Positive Effects:
▪ Security of Data: Advanced security features in transport systems,
such as encryption and biometric scanning, help protect personal
information in connected vehicles.
▪ Autonomous Vehicles: Microprocessors allow for the development
of self-driving cars, which have the potential to reduce traffic
accidents, increase efficiency, and provide mobility for people with
disabilities.
▪ Transport Safety: Devices like GPS, collision detection, and
automatic braking systems improve the safety of vehicles by
monitoring road conditions and providing real-time alerts.
o Negative Effects:
▪ Security of Data: Autonomous vehicles and connected transport
systems may be vulnerable to cyber-attacks, leading to potential
theft of personal data or control over the vehicle.
▪ Autonomous Vehicles: While self-driving cars may reduce accidents
caused by human error, they also raise concerns about technology
failure, ethical decisions in accidents, and job losses in transport
industries.
▪ Transport Safety: Relying on microprocessor-controlled systems in
vehicles can lead to a lack of manual control in emergency situations,
which may pose risks if the systems malfunction.
36 | P a g e
o Causes: RSI is caused by repetitive motion or overuse of muscles, tendons,
and nerves, typically from long periods of typing, mouse use, or poor
ergonomics.
o Prevention:
▪ Take Regular Breaks: Stand up, stretch, and change positions every
20-30 minutes to prevent strain.
▪ Ergonomics: Set up a comfortable workstation with proper keyboard
and mouse placement, and maintain good posture.
▪ Exercises: Perform exercises to strengthen muscles and improve
flexibility, focusing on wrists, shoulders, and neck.
• Back Problems:
o Causes: Poor posture, sitting for prolonged periods, or improper chair
height can lead to back pain.
o Prevention:
▪ Proper Seating: Use an ergonomic chair with good lumbar support
and sit with feet flat on the floor.
▪ Standing Desks: Consider using a standing desk or alternating
between sitting and standing to reduce strain on the back.
▪ Stretching: Regularly stretch to relieve tension in the lower back and
spine.
• Eye Problems:
o Causes: Prolonged screen time can lead to eye strain, dryness, blurred
vision, and headaches. The blue light emitted from screens can also affect
sleep patterns.
o Prevention:
▪ 20-20-20 Rule: Every 20 minutes, look at something 20 feet away
for at least 20 seconds to reduce eye strain.
▪ Adjust Screen Settings: Reduce screen brightness and increase text
size to reduce strain. Use blue light filters to lessen the impact on
sleep.
▪ Proper Lighting: Use appropriate lighting in the workspace to
minimize glare on the screen and avoid eye strain.
• Headaches:
o Causes: Prolonged use of IT equipment can lead to tension headaches from
poor posture, eye strain, or dehydration.
o Prevention:
▪ Ergonomic Setup: Adjust the position of the computer screen to eye
level to reduce neck and eye strain.
▪ Hydration and Breaks: Drink plenty of water and take regular breaks
to prevent dehydration and reduce the risk of headaches.
▪ Limit Screen Time: Take breaks from the screen throughout the day to
give the eyes and body time to rest.
37 | P a g e
Section 6: ICT applications
6.1 Communication
Communication Media
38 | P a g e
▪ Characteristics: A digital platform containing interconnected web
pages that provide information or services.
▪ Uses: Used for businesses, education, personal portfolios, news
outlets, etc., as a central location for information and interaction.
o Multimedia Presentations:
▪ Characteristics: Presentations that combine text, images, audio,
video, and other media to communicate information effectively.
▪ Uses: Common in education, business meetings, and marketing to
present information engagingly and interactively.
o Audio and Video:
▪ Characteristics: Audio refers to sound-based content, while video
incorporates moving images and sound.
▪ Uses: Used for entertainment (e.g., movies, podcasts), education
(e.g., tutorials, lectures), and communication (e.g., meetings,
webinars).
o Media Streaming:
▪ Characteristics: The continuous transmission of audio or video
content over the internet.
▪ Uses: Popular for music, video services (e.g., Netflix, Spotify), live
events, and podcasts. Offers instant access to media content
without requiring storage.
o ePublications:
▪ Characteristics: Digital versions of publications (e.g., eBooks, digital
magazines).
▪ Uses: Often used for convenience and accessibility, allowing users to
read on digital devices.
Mobile Communication
39 | P a g e
▪ Advantages: Enables face-to-face interaction despite geographic
distances.
▪ Disadvantages: Requires good internet bandwidth for smooth video
quality.
o Accessing the Internet: Mobile devices allow users to access the
internet anywhere, enabling web browsing, checking emails, and using
web-based apps.
▪ Advantages: Convenience, mobility, and real-time access to
information.
▪ Disadvantages: Can lead to distractions, reliance on data plans, and
security concerns in public Wi-Fi networks.
Computer Modelling
• Personal Finance:
o Characteristics: Software used for managing personal budgets, expenses,
and investments (e.g., budgeting apps, financial planning software).
o Uses: Helps individuals track their income and spending, plan for future
goals, and manage savings.
• Bridge and Building Design:
o Characteristics: Engineering software that allows for the simulation of
structural designs and analysis of their strength and stability.
o Uses: Used by architects and civil engineers to design and test buildings,
bridges, and other structures before actual construction.
• Flood Water Management:
o Characteristics: Models that simulate how water behaves during a flood,
helping to predict the flow of water and the areas that may be at risk.
o Uses: Used by environmentalists, urban planners, and governments to create
flood risk assessments and inform the design of flood control systems.
• Traffic Management:
o Characteristics: Models used to simulate traffic flow and congestion,
helping to design road networks, manage traffic lights, and predict traffic
patterns.
o Uses: Used by urban planners, city officials, and transportation agencies to
optimize traffic systems, reduce congestion, and improve public safety.
• Weather Forecasting:
o Characteristics: Computer models that simulate atmospheric conditions to
predict future weather patterns.
o Uses: Used by meteorologists and climate scientists to forecast weather
and track long-term climate trends.
40 | P a g e
Advantages and Disadvantages of Computer Modelling vs. Human Modeling
• Advantages:
o Speed and Efficiency: Computer models can process large amounts of data
quickly and generate results in a fraction of the time it would take humans.
o Accuracy: Models can provide highly accurate results when based on
accurate input data, and can simulate complex scenarios that are difficult for
humans to manually calculate.
o Safety: In hazardous scenarios (e.g., flood simulations, structural testing),
computer models can predict risks without putting humans in danger.
o Cost-Effective: Models can reduce costs by identifying potential issues
early on in the design or planning stages, preventing costly errors in real-
world applications.
• Disadvantages:
o Dependence on Input Data: The accuracy of a model is highly dependent on
the quality and accuracy of the input data. Inaccurate data can lead to
incorrect predictions.
o Complexity: Some models may be too complex for non-experts to
understand or interpret, leading to potential misapplication.
o Limitations in Real-World Application: Models may not always account for
every variable in real-world scenarios, leading to discrepancies between
predicted and actual outcomes.
o Lack of Human Judgment: Models rely on algorithms and data, which may
not capture the nuance and judgment that a human expert might bring in
interpreting or making decisions based on results.
41 | P a g e
42 | P a g e
6.3 Computer-Controlled Systems
Computer-Controlled Systems
• Robotics in Manufacture:
o Characteristics: Robots are automated machines used in manufacturing
processes to perform tasks like assembly, welding, packaging, and quality
inspection.
o Uses: Common in industries like automobile manufacturing, electronics
assembly, and food processing, where precision and speed are required.
o Advantages:
▪ Efficiency: Robots can work 24/7 without breaks, significantly
improving productivity.
▪ Accuracy: Robots provide consistent, high-quality output without
the variation that human labor may bring.
▪ Safety: Robots can be used for dangerous tasks, reducing the risk to
human workers.
o Disadvantages:
▪ High Initial Cost: Setting up robotic systems requires a significant
investment in machinery and technology.
▪ Job Displacement: Automation may lead to job losses in sectors that
rely on manual labor.
• Production Line Control:
o Characteristics: Computer systems that manage and monitor the
production process, ensuring tasks are completed in sequence and
according to set parameters.
o Uses: Found in mass-production industries like car manufacturing,
electronics, and food production, where precise control over processes is
essential.
o Advantages:
▪ Optimization: Improves the efficiency and consistency of
production, leading to cost savings.
▪ Real-Time Monitoring: Allows for immediate detection of faults,
leading to faster problem resolution and minimizing downtime.
o Disadvantages:
▪ Dependency on Technology: System failure can halt production, and
technical glitches can lead to delays or quality issues.
▪ Complexity: Requires highly skilled personnel for maintenance and
troubleshooting.
• Autonomous Vehicles:
o Characteristics: Vehicles that are capable of operating without human
intervention, using sensors, AI, and machine learning algorithms to navigate
and make decisions.
o Uses: Can be used for personal transport, delivery services, and long-haul
trucking.
o Advantages:
43 | P a g e
▪ Safety: Reduces human errors such as distracted or impaired driving,
potentially lowering traffic accidents.
▪ Efficiency: Optimizes driving patterns for better fuel efficiency and
time savings.
o Disadvantages:
▪ Technological Challenges: Requires complex algorithms and robust
sensors, which can be expensive and prone to failure in extreme
conditions.
▪ Job Losses: Autonomous vehicles could displace drivers in industries
like delivery, transportation, and taxi services.
• Advantages:
o Precision and Consistency: Computer-controlled systems provide highly
accurate, repeatable results, especially in tasks requiring fine precision.
o Increased Productivity: Machines work faster and longer hours than humans,
improving overall productivity and throughput.
o Reduced Human Error: Automated systems are less likely to make errors due
to fatigue, distraction, or inconsistency.
o Safety: Computers can perform dangerous or hazardous tasks, reducing the
risk to human workers.
• Disadvantages:
o High Initial Costs: Setting up automated systems can require a significant
upfront investment in technology and infrastructure.
o Dependency on Technology: A failure in the system can halt production or
services, potentially leading to losses.
o Job Losses: Automation may lead to unemployment in sectors where tasks
were previously carried out by humans.
44 | P a g e
▪ Accuracy: Provides reliable and up-to-date data on student
attendance.
o Disadvantages:
▪ Privacy Concerns: The storage of personal student information can
raise security and privacy issues if not properly protected.
• Recording Learner Performance:
o Characteristics: Systems that record students’ grades, assessments, and
performance on tests and assignments.
o Uses: Used to track academic progress, generate report cards, and provide
feedback to students and parents.
o Advantages:
▪ Streamlined Record-Keeping: Easier access to historical
performance data and analysis of trends in academic progress.
▪ Integration: Can be integrated with other systems for a
comprehensive view of the student’s overall performance.
o Disadvantages:
▪ Technical Issues: Data loss or system failure can lead to missing
records or inaccuracies in student performance.
• Computer-Aided Learning:
o Characteristics: Systems that use digital resources and software
applications to aid in the learning process, such as online quizzes, tutorials,
and educational games.
o Uses: Common in classrooms for interactive lessons, homework
assignments, and individualized learning experiences.
o Advantages:
▪ Engaging: Students find computer-aided learning tools more
engaging, which can increase motivation and improve learning
outcomes.
▪ Customizable: Systems can be tailored to meet the needs of
individual students.
o Disadvantages:
▪ Dependence on Technology: Overreliance on computer-based
learning can reduce social interaction and traditional learning
methods.
• Characteristics: Digital platforms that allow users to book services such as travel,
events, or accommodations online.
• Uses:
o Travel Industry: Allows for the booking of flights, hotels, car rentals, etc.
45 | P a g e
o Concerts, Cinemas, Sporting Events: Users can purchase tickets and select
seating for events.
• Advantages:
o Convenience: Users can book services 24/7 from anywhere with internet
access.
o Time-Saving: Eliminates the need for phone calls or in-person bookings.
o Instant Confirmation: Immediate booking confirmation and access to
itineraries or tickets.
• Disadvantages:
o Lack of Personal Interaction: Some users may prefer face-to-face service
or assistance, which is absent in online booking systems.
o Security Concerns: The sharing of personal and payment information online
can lead to potential security breaches.
46 | P a g e
o EFT: Used for transferring funds between individuals, businesses, and
government entities.
o Credit/Debit Card Transactions: Enables payments through cards linked to
a bank account.
o Cheques: Traditional paper-based payment system that allows one party to
pay another through a written order to a bank.
o Internet Banking: Online platforms for managing accounts, making
payments, and transferring funds.
• Advantages:
o Speed: Faster than traditional banking methods like cash or cheques.
o Convenience: Accessible from anywhere with an internet connection.
• Disadvantages:
o Security Risks: Potential for fraud, hacking, or unauthorized access to
personal information.
o Technical Failures: Dependence on internet connectivity and systems that
may be disrupted.
• Patient Records:
o Characteristics: Digital systems for storing patient health information, such
as medical history, diagnoses, treatments, and medications.
o Uses: Doctors and healthcare professionals use these systems to track
patient progress, ensure continuity of care, and make informed decisions.
• Pharmacy Records:
o Characteristics: Systems that track medications prescribed to patients,
including dosages, drug interactions, and refills.
o Uses: Ensures correct prescriptions, reduces errors, and provides
pharmacists with a comprehensive view of patient medication history.
• 3D Printers:
o Characteristics: Devices that can create three-dimensional objects from
digital designs, often using materials like plastics, metals, and
biocompatible materials.
o Uses:
▪ Printing Prosthetics: Used to create customized prosthetics tailored
to an individual’s body.
▪ Tissue Engineering: Used in the creation of tissue samples for
research or medical purposes.
▪ Artificial Blood Vessels: Can print blood vessels to assist in medical
procedures or transplantation.
47 | P a g e
▪ Customised Medicines: 3D printers can be used to create
personalized medication dosages.
• Advantages:
o Personalized Care: Offers tailored treatments and devices to individual
patients.
o Precision: High accuracy in creating medical devices, ensuring proper fit and
function.
• Disadvantages:
o Cost: 3D printing technology can be expensive and may not be accessible in
all healthcare settings.
o Regulation and Safety: Issues around the regulation of 3D printed medical
products need to be addressed to ensure patient safety.
48 | P a g e
6.8 Expert Systems
Expert Systems
• Characteristics:
o Knowledge-Based: Expert systems mimic human expertise in specific fields
by storing vast amounts of specialized knowledge in a knowledge base.
o Inference Engine: The part of the expert system that uses the knowledge
base and rules to derive conclusions or solve problems based on the data
entered.
o User Interface: Allows users to interact with the expert system, entering data
and receiving outputs in a user-friendly format.
o Explanation System: Provides explanations to users on how a conclusion or
decision was reached, enhancing transparency and trust in the system.
• Uses and Purpose:
o Mineral Prospecting: Expert systems are used to analyze geological data
and identify potential mineral deposits, aiding exploration in the mining
industry.
o Car Engine Fault Diagnosis: These systems analyze symptoms reported by
the user and compare them with the knowledge base to diagnose possible
faults in car engines.
o Medical Diagnosis: Medical expert systems analyze symptoms and medical
histories to suggest potential diagnoses and recommend treatments.
o Chess Games: Used to predict the best possible moves in a game by
analyzing the board and evaluating strategies.
o Financial Planning: Expert systems are used to create personalized financial
strategies, analyze risk, and suggest investment options based on a user’s
profile.
o Route Scheduling for Delivery Vehicles: These systems help delivery
companies optimize routes to reduce fuel consumption and improve
delivery times.
o Plant and Animal Identification: Used in environmental and biological
research to identify different species of plants and animals based on
specific features.
• Components of an Expert System:
o User Interface: The communication link between the user and the system,
enabling data input and receiving conclusions or solutions.
o Inference Engine: The brain of the expert system, it processes input data by
applying logic to the knowledge base to generate conclusions or solutions.
o Knowledge Base: A vast repository of specialized information, including
facts, rules, heuristics, and procedures, which the system uses to make
decisions.
o Rules Base: Contains the "if-then" rules that are applied by the inference
engine to derive conclusions from the knowledge base.
o Explanation System: Provides insights into how the system arrived at a
particular decision, allowing the user to understand the reasoning process.
49 | P a g e
• How Expert Systems Are Used:
o Expert systems produce possible solutions by simulating human expertise in
specific domains. The inference engine applies rules to the knowledge base
and uses logical deductions to suggest the most appropriate solutions to a
given scenario.
o For example, in medical diagnosis, symptoms entered by a user can trigger
the system to run through its knowledge base, applying the rules to identify
possible conditions.
50 | P a g e
▪ Speed: Fast transaction processing compared to traditional
methods.
o Disadvantages:
▪ Security Risks: Fraudulent activities like card cloning or skimming can
occur if systems are not adequately protected.
▪ Technical Problems: Connectivity issues or malfunctions may hinder
payment processing.
• Internet Shopping:
o Characteristics: Online shopping platforms where customers can browse
products, make purchases, and arrange for delivery or pickup.
o Advantages:
▪ Convenience: Customers can shop anytime and anywhere, with the
option for home delivery.
▪ Variety: Online stores offer a wider selection of products compared
to traditional brick-and-mortar stores.
o Disadvantages:
▪ Shipping Costs: Some products may come with high delivery fees.
▪ Lack of Physical Interaction: Customers cannot physically examine
products, leading to the risk of receiving items that do not meet
expectations.
▪ Security Concerns: Online transactions involve sharing sensitive
data, which can be at risk if the website is not secure.
Recognition Systems
51 | P a g e
o Characteristics: OCR systems convert printed or handwritten text into
digital format by scanning documents.
o Uses: Used in document digitization, license plate recognition (ANPR), and
data extraction from scanned forms.
o Advantages:
▪ Efficiency: Enables quick digitization of documents and allows text-
based searching.
▪ Versatility: Can read both printed and handwritten text.
o Disadvantages:
▪ Accuracy Issues: Handwritten text or poor-quality scans may result in
incorrect recognition.
▪ Complex Layouts: OCR struggles with documents that have complex
formatting or non-standard fonts.
• Radio Frequency Identification Device (RFID):
o Characteristics: RFID uses radio waves to identify objects, such as inventory
items or vehicles, by scanning tags attached to them.
o Uses: Common in retail for inventory management, as well as in contactless
payment systems and tracking assets like passports and automobiles.
o Advantages:
▪ Automation: RFID enables automatic identification, reducing the
need for manual data entry.
▪ Efficiency: Can track multiple items at once, improving inventory
management speed.
o Disadvantages:
▪ Privacy Concerns: RFID tags can be read without the owner’s
knowledge, raising security and privacy issues.
▪ Cost: Initial setup of RFID systems can be expensive for businesses.
• Near Field Communication (NFC):
o Characteristics: NFC is a short-range wireless technology used for
contactless communication between devices, such as smartphones and
payment terminals.
o Uses: Common in mobile payment systems, ticketing, and data transfer
between devices.
o Advantages:
▪ Convenience: Quick and easy to use for payments and data
exchange, with no need to open apps or cards.
▪ Security: Typically more secure than magnetic stripe cards because
of encryption and authentication methods.
o Disadvantages:
▪ Range: NFC works only within a very short distance, limiting its use to
close proximity transactions.
▪ Compatibility: Not all devices or payment terminals support NFC.
• Biometric Recognition:
o Characteristics: Biometric recognition systems identify individuals based on
unique physical or behavioral traits.
o Types:
52 | P a g e
▪ Face Recognition: Identifies individuals by analyzing facial features.
▪ Iris/Retina Scanning: Identifies individuals based on patterns in their
eyes.
▪ Fingerprint/Thumbprint Recognition: Uses the unique patterns in
fingerprints to identify individuals.
▪ Voice Recognition: Identifies individuals by the sound and pattern of
their voice.
▪ Hand Geometry: Uses the shape and size of the hand for
identification.
o Advantages:
▪ High Security: Biometric data is difficult to replicate, offering a higher
level of security.
▪ Convenience: Quick and easy to use, especially for authentication.
o Disadvantages:
▪ Privacy Concerns: Biometric data is sensitive, and its misuse can lead
to privacy violations.
▪ Cost: Biometric systems can be expensive to implement, requiring
specialized hardware and software.
• GPS: Provides location and time info; accurate, global; affected by weather.
• Satellite Navigation: Offers directions; real-time, worldwide; requires satellite
signal.
• GIS: Maps and analyzes spatial data; useful for planning; expensive and data-
dependent.
• Satellite TV: Broadcasts TV globally; wide coverage, high quality; requires dish,
weather-sensitive.
• Satellite Phone: Communication in remote areas; global; expensive, slower
connections.
53 | P a g e
Section 7: The system life cycle
7.1 Analysis
54 | P a g e
▪ Examination of Existing Documents: Reviewing current reports, user
manuals, and system records.
o Advantages and Disadvantages:
▪ Advantages: Provides user feedback, uncovers hidden issues.
▪ Disadvantages: Time-consuming, potential biases in responses.
• Recording and Analyzing Information:
o Collect data on system inputs (data entered into the system), outputs
(results generated), and processing (how data is handled).
• Identifying Problems:
o Problems in Current System: Bottlenecks, inefficiencies, security issues,
etc.
o User & Information Requirements: Understand user needs and the
necessary data for the new system.
• System Specification:
o Define the hardware and software required for the new system, ensuring it
meets performance, security, and scalability needs.
7.2 Design
55 | P a g e
▪ Check Digit: A validation system to detect errors in entered numerical
data (e.g., credit card number validation).
56 | P a g e
7.3 Development and Testing
7.4 Implementation
• System Implementation:
o Direct Changeover: Replacing the old system with the new one immediately.
▪ Advantages: Quick implementation, cost-effective.
▪ Disadvantages: High risk of system failure or user errors during
transition.
o Parallel Running: Running both the old and new systems simultaneously for a
period.
▪ Advantages: Reduced risk, allows comparison between systems.
▪ Disadvantages: Higher costs due to operating both systems,
potential confusion for users.
57 | P a g e
o Pilot Running: Implementing the new system for a small group of users first,
before a full rollout.
▪ Advantages: Testing in a real environment with minimal risk, easy
identification of issues.
▪ Disadvantages: Limited initial feedback, potential delay in full
implementation.
o Phased Implementation: Implementing the new system in stages or
modules.
▪ Advantages: Easier to manage, allows feedback at each stage.
▪ Disadvantages: Delayed full implementation, potential issues
between old and new systems during transition.
7.5 Documentation
• Technical Documentation:
o Purpose: To provide detailed technical information about the system for
developers and IT professionals.
o Components:
▪ System/Program Purpose: Describes the system’s overall objective
and functionality.
▪ Limitations: Details any restrictions or constraints of the system.
▪ Program Listing: The actual code used for the system.
▪ Program Language: The programming language(s) used.
▪ Program Flowcharts/Algorithms: Diagrams and logical steps
explaining how the system works.
▪ System Flowcharts: Diagrams showing how different components of
the system interact.
▪ Hardware and Software Requirements: Specifies the hardware and
software needed to run the system.
▪ File Structures: Describes how data is organized and stored.
▪ List of Variables: Defines variables used in the system and their
purpose.
▪ Input Format: Describes the format of data entered into the system.
▪ Output Format: Describes the format of data produced by the
system.
▪ Sample Runs/Test Runs: Examples of data processing with expected
outputs.
▪ Validation Routines: Describes the checks in place to ensure data
integrity.
• User Documentation:
o Purpose: To guide end-users in using the system effectively.
o Components:
▪ System Purpose: Describes what the system is and what it does.
58 | P a g e
▪ Limitations: Lists any restrictions or limitations of the system for the
user.
▪ Hardware and Software Requirements: Outlines the system
requirements for the user.
▪ How to Load/Run/Install: Step-by-step instructions for setting up
and using the system.
▪ How to Save a File: Instructions on how to store data generated by
the system.
▪ How to Print Data: Guide on printing reports or documents from the
system.
▪ How to Add/Delete/Edit Records: Instructions on managing data in
the system.
▪ Input Format: Specifies acceptable data formats for user input.
▪ Output Format: Describes the format of the system’s output.
▪ Sample Runs: Examples of typical use cases and expected
outcomes.
▪ Error Messages: Common error messages and troubleshooting tips.
▪ Error Handling: Explains how to resolve common system errors.
▪ Troubleshooting Guide/Helpline: Offers support for resolving user
issues.
▪ Frequently Asked Questions (FAQ): Provides answers to common
user queries.
▪ Glossary of Terms: Defines technical terms and jargon used in the
system.
7.6 Evaluation
• Evaluate a Solution:
o Assess the efficiency, ease of use, and suitability of the solution.
• Comparison with Task Requirements:
o Compare the solution with initial requirements to identify limitations.
• User Feedback:
o Evaluate user responses from system testing to identify areas for
improvement.
59 | P a g e
60 | P a g e
Section 8: Safety and Security
8.1 Physical Safety
• Safety Issues:
o Electrocution:
▪ Spilling drinks near electrical equipment or touching live wires can
lead to electrocution.
o Fire Hazards:
▪ Overloaded electrical sockets or overheating equipment can cause
fires.
o Tripping Hazards:
▪ Cables trailing on the floor or poorly secured can lead to tripping
accidents.
o Heavy Equipment:
▪ Heavy equipment that is not properly secured can fall and cause
injuries.
• Prevention Strategies:
o Keep liquids away from electrical equipment to prevent spills and
electrocution.
o Avoid overloading electrical sockets and use appropriate surge protectors
to prevent fires.
o Tidy and secure cables to reduce tripping hazards.
o Ensure that heavy equipment is placed securely and cannot fall to prevent
injuries.
8.2 eSafety
• Data Protection:
o Purpose of Data Protection Acts:
▪ Data protection laws are in place to ensure personal data is not
misused, stolen, or disclosed without consent.
▪ These laws regulate how organizations should collect, store, and
process personal information.
• Personal Data:
o Sensitive Data:
▪ Includes information such as full names, addresses, date of birth,
medical history, photographs, and other private details.
o Confidentiality:
▪ Personal data must be kept confidential to prevent unauthorized
access and inappropriate disclosure.
▪ It is essential that individuals and organizations respect and protect
personal data to maintain privacy and security.
• eSafety:
61 | P a g e
o The concept of eSafety emphasizes the importance of maintaining safety
and privacy while using digital technologies such as the internet, email, social
media, and online gaming.
• Internet Safety:
o Only use trusted websites, especially those recommended by teachers or
parents.
o Use age-appropriate search engines or settings that limit access to safe
content.
o Be cautious about sharing personal information and use websites that are
secure.
• Email Safety:
o Be aware of the risks of opening emails from unknown senders as they might
contain malicious content.
o Do not send or reply with personal identifiable information (PII) or images, as
this can expose you to risks like identity theft.
• Social Media Safety:
o Blocking and Reporting: Learn how to block or report unwanted or abusive
users.
o Meeting Online Contacts: Be aware of the potential dangers of meeting
someone online in person.
o Inappropriate Content: Avoid posting inappropriate images, language, or
content that could harm your reputation or the safety of others.
o Confidentiality: Respect other people’s privacy and do not share their
personal data or images without consent.
• Online Gaming Safety:
o Anonymity: Avoid using your real name or sharing personal details while
playing online games.
o Financial/Personal Information: Do not provide any personal or financial
information, such as credit card details, in online gaming environments.
o Secure Platforms: Ensure the gaming platform is secure and has proper
privacy policies in place.
62 | P a g e
8.3 Security of Data
Threats to Data
• Hacking:
o Definition: Unauthorized access to computer systems or networks to steal,
alter, or delete data.
o Protection Measures:
▪ Use of strong passwords, multi-factor authentication (MFA),
encryption, firewalls, and security software.
▪ Regular system updates to fix vulnerabilities.
▪ Awareness training to recognize phishing and social engineering
attacks.
• Phishing:
63 | P a g e
o Definition: Fraudulent attempts to acquire sensitive information by
pretending to be a trustworthy entity, typically through emails or websites.
o Prevention:
▪ Be cautious of unsolicited emails and do not click on suspicious links.
▪ Verify the source of emails by checking official websites or calling
directly.
▪ Use anti-phishing filters in email systems.
• Pharming:
o Definition: Redirecting users from legitimate websites to fraudulent ones
without their knowledge, often for credential theft.
o Prevention:
▪ Use updated anti-virus and anti-malware software.
▪ Ensure websites are accessed via HTTPS (check for secure
connection) and look out for unusual URL patterns.
▪ Keep system and browser security up to date.
• Smishing:
o Definition: Similar to phishing, but using SMS messages to trick people into
revealing personal information or downloading malicious software.
o Prevention:
▪ Avoid clicking on links or responding to unsolicited SMS messages.
▪ Be wary of messages that urge urgent action or ask for personal
details.
• Vishing:
o Definition: Voice phishing, where attackers use phone calls to impersonate
legitimate organizations or authorities to steal personal information.
o Prevention:
▪ Never give out personal information over the phone unless you’re sure
of the caller’s identity.
▪ Verify any requests by calling the organization directly using official
contact details.
• Viruses and Malware:
o Definition: Malicious software (viruses, worms, ransomware) that can
damage, corrupt, or steal data from systems.
o Preventative Action:
▪ Install and regularly update anti-virus and anti-malware software.
▪ Avoid downloading files from untrusted sources or opening email
attachments from unknown senders.
▪ Perform regular system scans.
• Card Fraud:
o Types:
▪ Shoulder Surfing: Watching someone enter their PIN or card details in
public spaces.
▪ Card Cloning: Duplicating data from the magnetic stripe of a card to
create a counterfeit card.
▪ Keylogging: Malicious software that records keystrokes to capture
personal information, including credit card details.
64 | P a g e
o Prevention:
▪ Be aware of your surroundings when entering sensitive information.
▪ Use RFID-blocking wallets or sleeves to protect card data.
▪ Avoid using public or unsecured Wi-Fi for financial transactions.
▪ Regularly monitor bank statements for unauthorized transactions.
Protection of Data
• Biometrics:
o Definition: Using unique physical characteristics (fingerprints, facial
recognition, retina scans) to authenticate users.
o Protection: Provides an added layer of security by linking access to an
individual’s physical traits, reducing the risk of impersonation.
• Digital Certificate:
o Definition: An electronic document that proves the ownership of a public
key and helps establish trust between parties in online communications.
o Contents: Public key, owner’s details, certificate authority (CA) information,
and expiration date.
o Purpose: Ensures the authenticity of websites and encrypts
communications between the client and server.
• Secure Socket Layer (SSL):
o Definition: A security protocol used to establish an encrypted link between a
web server and a browser.
o Purpose: SSL ensures that sensitive data like login credentials, credit card
information, and personal details are encrypted and secure while
transmitted over the internet.
o Identification: Websites with SSL encryption have "https://" in the URL, and
often display a padlock icon in the browser address bar.
• Encryption:
o Definition: The process of converting data into a code to prevent
unauthorized access.
o Purpose:
▪ Protects data stored on hard drives, cloud storage, and during
transmission over the internet (e.g., email, HTTPS websites).
▪ Ensures that even if data is intercepted, it cannot be read without the
decryption key.
• Firewall:
o Definition: A security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
o Purpose: Prevents unauthorized access to or from a private network,
protecting data from external attacks.
• Two-Factor Authentication (2FA):
o Definition: A security process that requires two forms of identification
before granting access to an account.
65 | P a g e
o Purpose: Enhances security by requiring both something you know
(password) and something you have (e.g., mobile phone for verification
codes).
o Example: Entering a password followed by a one-time code sent to a mobile
device.
• User ID and Password:
o Definition: The most common form of authentication where a user provides a
unique identifier (user ID) and a secret password.
o Purpose: Ensures that only authorized individuals can access protected data
or systems.
o Best Practices:
▪ Use complex and unique passwords for each account.
▪ Regularly change passwords and avoid sharing them.
▪ Implement a password manager to store and generate secure
passwords.
66 | P a g e
Section 9: Audience
9.1 Audience Appreciation
67 | P a g e
9.2 Copyright
• Importance of Copyright:
o Copyright protects the intellectual property rights of creators, preventing
unauthorized use or reproduction of their work.
o In the context of ICT, copyright is especially relevant for software, digital
content (images, music, videos), and designs. Without copyright protection,
creators lose control over how their works are distributed or altered.
• Principles of Copyright in Software:
o Software Piracy: Using or distributing software without permission or
without paying for it is illegal and violates copyright law. This includes
downloading pirated software or using cracked versions.
o Ownership: The original creator or the entity that purchased the copyright
owns the exclusive rights to use, distribute, and modify the software.
• Methods to Prevent Copyright Violation:
o Licensing: Software producers often use licenses that specify how their
software can be used, such as single-user licenses or site-wide licenses for
businesses.
o Digital Rights Management (DRM): DRM tools limit the use, sharing, and
copying of digital content to protect copyright.
o Product Activation: Some software requires activation via a product key,
ensuring that the software is being used legally.
o Encryption: Some software programs use encryption to prevent
unauthorized modification or distribution.
68 | P a g e
Section 10: Communication
• Email Overview:
o Definition: Email (electronic mail) allows users to send messages and files
through the internet.
69 | P a g e
o Uses: It's commonly used for professional, personal, and educational
communication. It allows easy sharing of text, files (attachments), and
multimedia.
• Constraints:
o Security: Email communication can be vulnerable to hacking, phishing, and
malware attacks. Therefore, ensuring security through strong passwords,
anti-virus software, and encryption is vital.
o Netiquette: Netiquette refers to the accepted norms for online
communication. This includes using polite language, avoiding ALL CAPS
(which can seem like shouting), and not spamming inboxes with excessive
emails.
o Employer Guidelines: Some companies have email policies to prevent
inappropriate use, such as sending personal emails during work hours or
sending confidential information insecurely.
• Key Features:
o Carbon Copy (CC): Sends a copy of the email to additional recipients
besides the main recipient. All recipients can see the CC list.
o Blind Carbon Copy (BCC): Sends a copy of the email to additional recipients
without showing their email addresses to others.
o Forward: Allows users to send an email to new recipients after it has been
received.
o Attachments: Files (documents, images, etc.) that can be sent along with the
email. Always ensure the attachment is safe and virus-free.
Spam Email:
• Characteristics:
o Spam refers to unsolicited and often irrelevant or inappropriate messages
sent to a large number of users, typically for advertising purposes. It can be
harmful by spreading viruses, malware, or phishing schemes.
• Prevention Methods:
o Spam Filters: Many email services have built-in spam filters to detect and
block spam messages.
o Do Not Respond: Never respond to suspicious emails or click on links in
spam emails.
o Email Verification: Verify the email address of the sender and be cautious of
unfamiliar addresses.
o Marking as Spam: Mark emails as spam to help improve the accuracy of
spam filters.
70 | P a g e
The Internet
Web Tools:
• Blog: An online platform for posting articles or content, often used for personal or
business purposes.
• Forum: An online discussion site where users can post questions, answers, and
share information.
71 | P a g e
• Wiki: A collaborative website where users can add and modify content (e.g.,
Wikipedia).
• Social Networking: Platforms like Facebook, Twitter, and LinkedIn, where users
connect and share content.
Internet Functionality:
• Internet Service Provider (ISP): A company that provides users with access to the
internet.
• Web Address (URL): A uniform resource locator is the address of a web page on the
internet (e.g., https://www.example.com).
• Hyperlink: A link embedded in a webpage that leads to another web page or
resource.
• Web Browser: A program (e.g., Chrome, Firefox) used to navigate and view
websites.
• Speed of Searching: Search engines help users find relevant information quickly.
• Amount of Information: Search engines index millions of web pages, providing a
vast range of results.
• Ease of Finding Reliable Information: While search engines provide a lot of
information, it’s important to assess the credibility and accuracy of the sources.
Internet Protocols:
• HTTP: HyperText Transfer Protocol is the standard used to transfer and display web
pages.
• HTTPS: A secure version of HTTP that encrypts data exchanged between the user
and the server.
• FTP: File Transfer Protocol used for transferring files between computers over a
network.
72 | P a g e
• SSL: Secure Socket Layer is a protocol used to secure communications over the
internet by encrypting data.
• Inappropriate and Criminal Material: The internet can be a medium for illegal
activities or exposure to harmful content.
• Parental, Educational, and ISP Control: Parents, schools, and ISPs can restrict
internet usage, block harmful sites, and protect children or employees from
unwanted exposure.
Conclusion:
Understanding how the internet works, its risks, and the necessary tools and
precautions can help ensure safe and efficient use for communication, information
retrieval, and entertainment.
73 | P a g e
Section 11: File Management
11.1 Manage Files Effectively
74 | P a g e
o Importing Files: Files from other sources can be imported into software
(e.g., importing a CSV file into Excel).
• Saving Files in a Structured Directory:
o Directory/Folders: Create a logical and hierarchical structure for saving files
(e.g., by project, date, or file type).
o Naming Files: Use descriptive and consistent file names for easy
identification and retrieval.
o Organized Folders: Store files under appropriate folders to maintain
organization (e.g., "Reports" folder, "Images" folder).
• Saving and Printing Files in Different Formats:
o Documents: Save documents in formats such as .docx, .doc, or .pdf based
on the need for editing or sharing.
o Screenshots: Save as image files (.jpg, .png).
o Reports/Data Tables: Save database reports as .xls, .xlsx, .csv, or .pdf.
o Web Pages: Save web pages in HTML or browser view (.html, .htm) or as
screenshots.
• File Formats for Application Packages:
o Common Formats:
▪ Word: .docx, .doc
▪ Excel: .xlsx, .xls
▪ Database: .accdb, .odb, .sdb, .sdc
▪ PowerPoint: .pptx, .ppt
▪ Rich Text: .rtf
o Exporting Files: Files can be exported to specific formats required by the
software (e.g., .docx for Word documents, .xlsx for spreadsheets).
• Generic File Formats:
o Common Generic Formats:
▪ .csv: Comma-separated values, used for data storage in tables.
▪ .txt: Plain text format.
▪ .pdf: Portable Document Format, often used for printable
documents.
▪ .css: Cascading Style Sheets, used for website styling.
▪ .html/.htm: Web page files.
▪ .jpg/.png: Image formats.
o Purpose of Generic Formats: These formats ensure compatibility across
different systems and applications, making sharing and opening files easier.
• File Compression:
o Why Compress Files?:
▪ Storage: Reducing file size can save disk space.
▪ Transmission: Smaller files are faster to upload and download,
especially over slow internet connections.
o File Compression Formats:
75 | P a g e
▪ .zip: A widely used compression format that packages files into a
single compressed file.
▪ .rar: Another compression format similar to .zip, offering efficient
compression but requires specific software to open.
o Compression Tools: Many operating systems have built-in tools for
compressing files, or third-party software like WinRAR or 7-Zip can be used.
• Benefits of Compression:
o Efficient Storage: Compressing files reduces their size, making them easier
to store.
o Faster Transfer: Compressed files take less time to transmit via email or
cloud storage.
76 | P a g e
Section 12: Images
Placing and Editing Images
77 | P a g e
o Rotation: Rotate an image by a specific angle (e.g., 90°, 180°) to fit the
design or presentation needs.
o Free Rotation: Most image editing tools also allow free rotation for precise
alignment.
• Reflecting (Flipping) an Image:
o Horizontal Flip: Mirrors the image along the vertical axis, making it a
reflection of the original.
o Vertical Flip: Mirrors the image along the horizontal axis, useful for symmetry
or creating mirrored designs.
• Adjusting Image Brightness:
o Brightness: Increasing brightness lightens the image, while decreasing it
darkens the image. This can help improve visibility or mood based on design
requirements.
• Adjusting Image Contrast:
o Contrast: Increasing contrast makes dark areas darker and light areas
lighter, which can enhance image details. Reducing contrast softens the
image for a gentler look.
o Applications: Contrast adjustments can help make images stand out more
or blend seamlessly with other elements in a composition.
• Grouping and Layering Images:
o Grouping: Multiple images can be grouped together to make them act as a
single unit, allowing for easier resizing, moving, or formatting.
o Ungrouping: If changes need to be made to individual elements, groups can
be ungrouped.
o Layering: Arrange images in layers, moving an image to the front or back of
other elements. This is useful in designs where multiple visual elements
overlap.
78 | P a g e
79 | P a g e
Section 13: Layout
13.1 Create or Edit a Document
80 | P a g e
▪ Tight: Text hugs the shape of the object tightly, ensuring no gaps
around it.
13.2 Tables
81 | P a g e
o Alignment Options: Align content to the left margin, center, or right margin
depending on the document’s formatting needs.
o Consistency: Ensure the header and footer align consistently across all
pages in the document.
• Place Text and Automated Objects in Headers and Footers:
o Text: Common elements like titles, author names, or section names.
o Automated Objects:
▪ Page Numbering: Insert automatic page numbers that update
dynamically.
▪ Date/Time: Insert the current date and time, updating automatically
when the document is printed or opened.
▪ Total Pages: Include the total number of pages in the document,
ensuring it updates as the document changes.
82 | P a g e
Section 14: Styles
Create, Edit, and Apply Styles
• Create Styles:
o Purpose: Styles help maintain consistent formatting throughout a
document. By defining a style, you can quickly apply it to different sections
without manually adjusting formatting each time.
o Steps:
▪ Select a text segment (e.g., title, heading, paragraph).
▪ Define the desired formatting options.
▪ Save the formatting settings as a custom style (e.g., "Heading 1",
"Body Text").
• Edit Styles:
o Modify Existing Styles: If you need to change the formatting of all text using
a particular style, modify the style itself rather than editing each occurrence.
o Update Styles: When formatting a document, update the style if changes
are made to text formatting (font size, color, etc.), ensuring uniformity.
• Apply Styles:
o Once a style is defined, it can be quickly applied to text, paragraphs, or
sections, ensuring consistency across the document.
o Application: Select the text or paragraph, then choose the appropriate style
from the style menu.
Font Formatting
• Font Face: The type of font used (e.g., Arial, Times New Roman, Calibri).
83 | P a g e
• Font Type:
o Serif: Fonts with small lines or decorations at the ends of characters (e.g.,
Times New Roman).
o Sans-serif: Fonts without these decorative lines (e.g., Arial).
• Font Size: Determines the size of the text, usually measured in points (pt).
• Font Color: Change the color of the text to match branding, design, or preference.
Text Alignment
Text Enhancement
Spacing
• Paragraph Spacing: Adjust the space before and after paragraphs for readability
and document structure.
• Line Spacing: Adjust the space between lines of text within a paragraph, typically
1.0 (single), 1.5, or 2.0.
Bullets
• Bullet Shape: Choose from a variety of bullet styles, such as dots, squares, or
custom symbols.
• Bullet Alignment: Align bullets properly within lists to maintain a clean look (left,
centered).
• Line Spacing and Indentation: Adjust the space between list items and the
indentation of the bullets to ensure clarity and visual balance.
84 | P a g e
▪ Consistency: All communications, reports, and documents from the
organization use the same font, layout, and style elements.
▪ Branding: Helps reinforce brand identity and professionalism in
official documents.
▪ Efficiency: Allows employees to focus on content rather than
formatting each document individually.
• Elements:
o Font style, size, color, and type.
o Standardized layouts for headers, footers, and other document
components.
o Consistent use of text formatting, such as bold or italics, for emphasis and
readability.
o Guidelines on spacing, margins, and alignment for a polished appearance.
85 | P a g e
Section 15: Proofing
15.1 Software Tools
• Reduce Errors:
o Automated Software Tools: Tools such as spell check and grammar check
are essential in minimizing errors in written content.
▪ Spell Check: Automatically detects and suggests corrections for
misspelled words. However, it may not always suggest the most
86 | P a g e
accurate change, especially with homophones or context-specific
errors.
▪ Grammar Check: Helps identify issues like sentence structure,
punctuation, and subject-verb agreement.
o Use of Validation Routines: Validation checks help minimize data entry
errors by ensuring that data is correct before it is submitted or processed.
• Spell Check Software:
o Automated spell check tools provide suggestions for misspelled words, but
users should manually verify changes because not all suggestions are
correct (e.g., "there" vs. "their").
• Validation Checks:
o Range Check: Ensures data falls within a specified range (e.g., dates,
numerical values).
o Character Check: Verifies that data entered contains only valid characters
(e.g., letters for name fields).
o Length Check: Ensures that data entered is of the correct length (e.g., a
phone number should have 10 digits).
o Type Check: Verifies that the data is of the correct type (e.g., numbers in a
numerical field).
o Format Check: Ensures that the data entered follows a specific format (e.g.,
email addresses or credit card numbers).
o Presence Check: Verifies that required data is entered (e.g., no mandatory
field is left empty).
87 | P a g e
▪ Inconsistent Styles: Ensure that styles (e.g., headers, body text) are
applied consistently.
▪ Tables and Lists: Ensure that tables and lists are not split across
pages or columns inappropriately.
• Verification:
o Visual Checking: Verify the accuracy of data visually by cross-checking the
content.
o Double Data Entry: A method where data is entered twice to ensure
accuracy and catch any errors, often used for critical data.
• Importance of Validation & Verification:
o Validation: Ensures that data is entered correctly before it is processed.
o Verification: Provides an additional layer of error reduction by checking data
visually or through double entry, minimizing potential mistakes.
88 | P a g e
Section 16: Graphs and charts
Creating, Labeling, and Editing Graphs or Charts
89 | P a g e
o Sector Labels (for pie charts): Labels used to identify each slice or segment
of a pie chart.
o Sector Values/Percentages (for pie charts): Display the numerical value or
percentage for each sector.
o Category Axis Title: Label for the horizontal axis, usually representing
categories (e.g., months, years, product types).
o Value Axis Title: Label for the vertical axis, usually representing numerical
values (e.g., sales, revenue).
o Category Axis Labels: These indicate the specific categories on the
horizontal axis.
o Value Axis Labels: These represent the values on the vertical axis.
o Data Value Labels: Show the exact value of the data points, such as the value
of bars or slices in a chart.
• Adding Additional Data:
o Second Data Series: Adding another series of data to compare or contrast
with the first series in the same chart.
o Second Axis: In some charts (e.g., combination charts), a second axis may be
needed to represent different data scales, such as a secondary y-axis.
• Formatting Numerical Values:
o Decimal Places: Adjusting the number of decimal places displayed in
numerical values (e.g., rounding to two decimal places).
o Currency Symbols: Formatting the values to include currency symbols (e.g.,
$ for USD, € for EUR).
• Adjusting Axis Scales:
o Maximum and Minimum Values of Axis: Customizing the scale of the axes,
such as setting the minimum value to 0 and the maximum value to 100.
o Incremental Values: Setting intervals for the axis, such as increments of 10, 5,
or 1.
• Enhancing the Appearance:
o Pie Chart Customization:
▪ Extracting a Pie Chart Sector: Pulling out a sector to emphasize or
highlight it for better visual impact.
▪ Changing the Colour Scheme or Fill Patterns: Adjusting the colours
or fill patterns of the sectors to make them more visually appealing or
to match specific themes (e.g., corporate colors).
90 | P a g e
Past Paper May/June 2024 P1 V2
91 | P a g e
92 | P a g e
93 | P a g e
94 | P a g e
95 | P a g e
96 | P a g e
97 | P a g e
98 | P a g e
99 | P a g e
100 | P a g e
101 | P a g e
102 | P a g e
This Solved Paper would
receive 80/80 according to
Marking Scheme provided by
the CIE board
103 | P a g e
Paper 2
Document Production, Databases and Presentations
104 | P a g e
Document Production
1. Organising Page Layout
Microsoft Word allows for precise control over the page layout to ensure a well-
structured and visually appealing document.
• Page Size:
o Can be adjusted based on requirements (A4, Letter, Legal, Custom).
o Go to Layout > Size and select the appropriate option.
• Page Orientation:
o Portrait (default) or Landscape.
o Change by going to Layout > Orientation.
• Page Margins:
o Controls the spacing between the text and the edge of the page.
105 | P a g e
o Can be adjusted via Layout > Margins.
o Options include Normal, Narrow, Wide, Custom Margins.
o Custom margins allow precise settings for top, bottom, left, and right
margins.
• Columns and Column Width:
o Used for formatting text into multiple columns (e.g., newspapers).
o Set via Layout > Columns (One, Two, Three, Left, Right, Custom).
o Adjust column width and spacing between columns via More Columns.
• Setting and Removing Breaks:
o Page Break: Forces text onto a new page (Ctrl + Enter).
o Section Break: Divides a document into sections (for different formatting in
each section).
▪ Types: Next Page, Continuous, Even Page, Odd Page.
▪ Found in Layout > Breaks.
o Column Break: Moves text to the next column without filling the current
column completely.
2. Formatting Text
Setting Tabulation
Text Enhancement
106 | P a g e
• Superscript (Ctrl + Shift + +) – Raises text (e.g., x²).
• **Subscript (Ctrl + =) ** – Lowers text (e.g., H₂O).
• Change Case:
o Select text and go to Home > Change Case (Uppercase, Lowercase,
Sentence Case, Capitalize Each Word, Toggle Case).
• Bulleted List:
o Go to Home > Bullets and choose a bullet style.
• Numbered List:
o Go to Home > Numbering and choose a numbering format.
• Customizing Lists:
o Change bullet styles, numbering format, or multilevel lists via Define New
Bullet/Number Format.
3. Navigation
Bookmarks
• Insert a Bookmark:
o Select text or place cursor at desired location.
o Go to Insert > Bookmark, enter a name, and click Add.
• Go to a Bookmark:
o Press Ctrl + G, select Bookmark, and enter the name.
• Delete a Bookmark:
o Open Insert > Bookmark, select the bookmark, and click Delete.
Hyperlinks
107 | P a g e
• Insert a Hyperlink:
o Select text or image, then press Ctrl + K.
o Choose Existing File/Web Page, Place in This Document, Email Address, or
Create New Document.
• Remove a Hyperlink:
o Right-click the hyperlink and select Remove Hyperlink.
Pagination
Purpose:
Uses:
Gutter Margin
Purpose:
Settings:
• Gutter Position:
o Left (for left-bound documents).
o Top (for top-bound documents).
• Gutter Size:
o Adjust width to ensure enough space for binding.
108 | P a g e
109 | P a g e
Databases
1. Creating a Database Structure
Microsoft Access allows data import from different file types such as .csv (comma-
separated values) and .txt (text files).
Each field in a table must have an appropriate data type to ensure accurate data
entry and processing.
Yes/No
Used for True/False, Yes/No, or Checkbox fields.
(Boolean/Logical)
110 | P a g e
Data Type Purpose
• Boolean/Logical Fields:
o Can be displayed as Yes/No, True/False, Checkbox (set in Design View
under "Format").
• Date/Time Formats:
o Options: Short Date, Long Date, Medium Date, Time Format.
o Set in Field Properties > Format.
Primary Key
• A unique identifier for each record in a table (e.g., Student ID, Employee ID).
• Helps avoid duplicate records.
• Set by selecting a field in Design View and clicking Primary Key in the toolbar.
Foreign Key
• A field in one table that links to the Primary Key in another table.
• Used to establish relationships between tables.
111 | P a g e
5. Select Cascade Update/Delete if changes in one table should reflect in the related
table.
Creating a Form
Editing a Form
2. Manipulating Data
Performing Calculations
112 | P a g e
Common Functions
Sorting Data
113 | P a g e
3. Presenting Data
Generating Reports
Creating a Report
Formatting Reports
114 | P a g e
115 | P a g e
Presentations
1. Creating a Presentation
• Headings & Subheadings: Apply uniform font type, size, and color.
• Bullets: Customize shape, color, size, and alignment.
• Background: Use solid color, gradient, image, or texture.
• Logo Placement: Ensure the logo is positioned consistently across slides.
116 | P a g e
2. Editing a Presentation
1. Select a slide.
2. Go to Home > Layout.
3. Choose from layouts such as Title Slide, Title & Content, Two Content,
Comparison, Picture with Caption.
Text Objects
117 | P a g e
Images & Videos
• Insert a Chart:
1. Go to Insert > Chart.
2. Select a chart type (Bar, Pie, Line, etc.).
3. Edit data in the Excel window.
• Insert a Table:
1. Insert > Table and select the number of rows and columns.
2. Edit table layout using Table Tools.
Audio Clips
• Insert Shapes: Insert > Shapes and select the required shape.
• Edit Shapes: Resize, change color, add effects.
118 | P a g e
Inserting an Action Button
Alternative text helps visually impaired users understand images and objects.
Hiding Slides
119 | P a g e
1. Select a slide.
2. Go to Slide Show > Hide Slide.
120 | P a g e
Additional Skills Required for Paper 2
File Management:
Document Handling:
• Input and format data correctly (e.g., currency, percentage, decimal places).
• Use absolute ($) and relative references correctly in formulas.
• Apply formulas for SUM, AVERAGE, MAX, MIN, COUNT, IF statements, and
LOOKUP functions.
• Create and label charts (bar, pie, line, column) with correct titles and
legends.
• Sort and filter data accurately as per given criteria.
• Use conditional formatting to highlight key data points.
Database Handling:
• Import and modify tables with appropriate field types (text, number, date,
Boolean).
• Set primary keys and ensure data validation where necessary.
• Use queries (e.g., criteria-based filters using <, >, =, LIKE, AND, OR).
• Generate and format reports with titles, fields, and summaries.
• Sort records and apply grouping functions when needed.
121 | P a g e
Web Page Authoring (HTML & CSS Basics):
Presentations:
122 | P a g e
Past Paper May/June 2024 P2 V2
123 | P a g e
124 | P a g e
125 | P a g e
126 | P a g e
Evidence 1 (Q4):
Evidence 2 (Q8):
127 | P a g e
128 | P a g e
Printed Document (Q12):
129 | P a g e
130 | P a g e
Evidence 3 (Q13):
131 | P a g e
132 | P a g e
Evidence 4 (Q13):
Evidence 5 (Q14):
133 | P a g e
134 | P a g e
Printed Report (Q16):
135 | P a g e
Printed Labels (Q17):
136 | P a g e
137 | P a g e
138 | P a g e
Printed Speaker/Presenter Notes (Q25):
139 | P a g e
Printed Presentation (Q26):
140 | P a g e
This paper would receive 70/70 according
to the MS provided by the CIE board
141 | P a g e
Paper 3
142 | P a g e
143 | P a g e
Spreadsheets
Basic Functions:
Logical Functions:
144 | P a g e
9. IF() – Returns one value if a condition is true and another if false.
Example: =IF(A1>50, "Pass", "Fail")
10. IFERROR() – Returns a custom message if a formula results in an error.
Example: =IFERROR(A1/B1, "Error!")
11. AND() – Returns TRUE if all conditions are met.
Example: =AND(A1>10, B1<50)
12. OR() – Returns TRUE if at least one condition is met.
Example: =OR(A1>100, B1=50)
Lookup Functions:
Text Functions:
17. LEFT() – Extracts a certain number of characters from the left side of a text
string.
Example: =LEFT("Excel",2) → "Ex"
18. RIGHT() – Extracts a certain number of characters from the right side.
Example: =RIGHT("Excel",3) → "cel"
19. MID() – Extracts characters from the middle of a string.
Example: =MID("Excel",2,3) → "xce"
20. LEN() – Counts the number of characters in a string.
Example: =LEN("Hello") → 5
21. CONCATENATE() / CONCAT() – Joins text from multiple cells.
Example: =CONCATENATE(A1, " ", B1)
Newer version: =CONCAT(A1, " ", B1)
22.TEXT() – Formats a number as text.
Example: =TEXT(A1, "$0.00")
145 | P a g e
24. UPPER() – Converts text to uppercase.
Example: =UPPER("excel") → "EXCEL"
25. LOWER() – Converts text to lowercase.
Example: =LOWER("Excel") → "excel"
26.PROPER() – Capitalizes the first letter of each word.
Example: =PROPER("hello world") → "Hello World"
Conditional Formatting:
146 | P a g e
147 | P a g e
148 | P a g e
Web Development Layers
Web development is divided into three primary layers, each with a specific function
in creating a webpage.
Content Layer
• Purpose: This layer deals with the structure and content of the web page.
• Responsibility:
o Defines the raw content and its arrangement (text, images, links, etc.).
o It uses HTML (Hypertext Markup Language) to organize the content.
o Example elements: headings (<h1>, <h2>), paragraphs (<p>), images (<img>),
links (<a>), lists (<ul>, <ol>), and tables (<table>).
Presentation Layer
Behavior Layer
• Head Section: Contains meta-information about the web page, such as:
o Title: Sets the name of the web page that appears in the browser tab. (<title>)
o External Stylesheets: Link to an external CSS file using the <link> tag with a
relative file path.
o Meta Tags: Provide metadata for search engines, browsers, and devices.
149 | P a g e
▪ Charset: <meta charset="UTF-8">
▪ Description: <meta name="description" content="Page Description">
▪ Author: <meta name="author" content="Author Name">
▪ Viewport: <meta name="viewport" content="width=device-width, initial-
scale=1.0">
o Default Target Windows: Set the default window or frame for links.
• Body Section: Contains the visible content of the webpage, such as:
o Text: Use heading tags (<h1>, <h2>) and paragraph tags (<p>) for text content.
o Tables: Organize data in rows and columns using <table>, <tr>, <th>, and <td>.
Adjust attributes such as cell spans, widths, heights, and background colors.
o Multimedia: Insert images, videos, sound clips using <img>, <video>, <audio>.
▪ Include attributes like autoplay, controls, width, height, and alt text for
accessibility.
o Hyperlinks: Use <a> tag to link to other web pages, email addresses, or
anchors within the same page.
▪ Syntax for links:
▪ Local page: <a href="page.html">Link</a>
▪ External URL: <a href="http://www.example.com">Example</a>
▪ Email: <a href="mailto:[email protected]">Send Email</a>
o Bookmarks (Anchors): Use <a id="bookmark"> and link to it with
href="#bookmark".
Use Stylesheets
150 | P a g e
▪ Example: #id-name { color: blue; }
o Both classes and IDs can be used to apply styles to HTML elements such as
headings, tables, and paragraphs.
• CSS File Organization:
o Save styles in .css files.
o Use comments (/* comment */) to annotate sections or explain code.
• Cascading Order:
o Styles are applied based on specificity and order. External stylesheets come
first, then internal styles, and finally inline styles.
o The more specific the selector (e.g., div#id-name), the higher its priority.
• Relative File Paths: For linking stylesheets and assets, relative file paths
(e.g., ./styles.css) should be used instead of absolute paths (e.g.,
C:/users/desktop/styles.css).
Concepts to Understand
1. Head and Body Sections: The head contains metadata, while the body contains
visible content.
2. Tables: Used for structuring content like data and forms. Attributes control layout
and appearance.
3. Metatags: Help with SEO (search engine optimization) and device compatibility.
4. Hyperlinks: Links to other resources like web pages, email, and files.
5. CSS Styles: Customize the look of content, including text, images, tables, and
layout.
6. External vs. Inline Styles: External styles affect the entire website, while inline styles
apply only to individual elements.
7. File Paths: Relative paths ensure portability, while absolute paths can make
resources unavailable when moved.
151 | P a g e
Past Paper May/June 2024 P3 V2
COMING SOON…
152 | P a g e