0% found this document useful (0 votes)
15 views

Igcse Ict 0470 - Notes

The document provides comprehensive notes and resources for the IGCSE ICT 0470 course, covering various topics across three papers, including hardware and software components, operating systems, and input/output devices. It includes theory notes, solved past papers, and tips for students preparing for the exam. Additionally, it discusses emerging technologies and their impact on daily life.

Uploaded by

zianapanjwani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Igcse Ict 0470 - Notes

The document provides comprehensive notes and resources for the IGCSE ICT 0470 course, covering various topics across three papers, including hardware and software components, operating systems, and input/output devices. It includes theory notes, solved past papers, and tips for students preparing for the exam. Additionally, it discusses emerging technologies and their impact on daily life.

Uploaded by

zianapanjwani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 153

IGCSE ICT 0470

2023 - 2025
Notes + Past Papers
Index
Software and Resources 2-3

Paper 1 – Notes 4 - 90

Paper 1 - Solved Past Paper 91 - 103

Paper 2 – Notes 104 - 122

Paper 2 – Solved Past Paper 123 - 141

Paper 3 – Notes 142 - 151

Paper 3 – Solved Past Paper -

Tips and Tricks + Links -

1|P a g e
Software and
Resources
All Software, Applications, Notes, and Books used in these notes

Paper 1
IGCSE ICT 0417 Quick Revision Paper 1 Theory By: Mr.
Ayman Al-Nahhas Cambridge ICT Tutor
www.etoptutor.com

THEORY NOTES PAPER 01 by Saem Mashud Tariq


www.sirsaem.com

Cambridge IGCSE™ Information and Communication


Technology Third Edition Graham Brown David Watson

2|P a g e
Paper 2 and Paper 3

Microsoft Word

Microsoft PowerPoint

Microsoft Access

Microsoft Excel

Adobe Dreamweaver

Adobe Photoshop

3|P a g e
Paper 1
Theory

4|P a g e
Section 1: Types and Components of Computer Systems

1.1 Hardware and Software

Hardware

Hardware is the physical part of a computer. It includes internal and external


components.

Internal components:

• Central Processing Unit (CPU): The brain of the computer. It processes


instructions.
• Processor: Handles calculations and tasks.
• Motherboard: Connects all components.
• RAM (Random Access Memory): Temporary memory for running programs.
• ROM (Read-Only Memory): Stores essential instructions, like how to start
the computer.

External and additional hardware components:

• Graphics card: Handles images and videos.


• Sound card: Manages audio output.
• Network Interface Card (NIC): Connects to the internet or other networks.
• Camera: Captures photos and videos.
• Storage devices: Internal or external (e.g., hard drives, SSDs, USB drives).
• Input devices: Allow users to enter data (e.g., keyboard, mouse,
microphone).
• Output devices: Show results (e.g., monitor, printer, speakers).

Software

Software is a set of instructions that tells the computer what to do. It can be
divided into two types:

1. Application Software
This helps users complete tasks. Examples include:

• Word processing software: For creating documents.


• Spreadsheet software: For handling data and calculations.

5|P a g e
• Database management systems: For storing and managing large amounts
of data.
• Control and measurement software: Used in industries and automation.
• Applets and apps: Small programs for specific tasks.
• Video and audio editing software: For editing multimedia files.
• Graphics editing software: For designing images.
• Computer-Aided Design (CAD): Used for designing buildings, machines,
and more.

2. System Software
This helps the computer function properly. Examples include:

• Operating systems: Manage hardware and software (e.g., Windows,


macOS, Linux).
• Utilities: Perform maintenance tasks like cleaning disk space.
• Device drivers: Allow hardware components to communicate with the
system.
• Compilers and linkers: Help run programs by converting code into machine
language.

Analogue and Digital Data

Data can be analogue or digital.

• Analogue data is continuous. Examples include sound waves and


temperature readings.
• Digital data is stored as binary (0s and 1s). Computers can only process
digital data.

Why Convert Between Analogue and Digital?

• Analogue to digital: So computers can process it (e.g., converting voice into


text).
• Digital to analogue: So computers can control real-world devices (e.g.,
adjusting speaker volume).

6|P a g e
1.2 The main components of computer systems
Central Processing Unit (CPU)

The CPU (Central Processing Unit) is the brain of the computer. It carries out all
instructions and processes data. It consists of three main parts:

• Control Unit (CU): Directs the flow of data and tells other components what to do.
• Arithmetic Logic Unit (ALU): Performs mathematical calculations and logical
operations.
• Registers: Small, fast storage areas inside the CPU that hold temporary data.

How the CPU Works:

1. The CPU fetches instructions from memory.


2. It decodes the instructions to understand what to do.
3. It executes the instructions and processes the data.
4. It sends the results to an output device or stores them in memory.

The speed of the CPU is measured in GHz (Gigahertz). A higher GHz means the CPU
can process more instructions per second.

Internal Memory

Internal memory stores data and instructions temporarily while the computer is
running. There are two types: ROM and RAM.

7|P a g e
Read-Only Memory (ROM)

• Stores permanent data that does not change.


• Contains instructions needed to start the computer (firmware/BIOS).
• Data in ROM cannot be changed or deleted by the user.
• Non-volatile: Keeps data even when the computer is turned off.

Random Access Memory (RAM)

• Stores temporary data that the CPU needs while running programs.
• Data is lost when the computer is turned off.
• The more RAM a computer has, the more programs it can run at the same time.
• Volatile: Loses data when power is off.

Differences Between ROM and RAM:

Feature ROM RAM

Type of memory Permanent Temporary

Volatility Non-volatile Volatile

Function Stores startup instructions Stores running programs and data

Can be changed? No Yes

Input and Output Devices

Input Devices

Input devices allow users to enter data into a computer.

Examples:

• Keyboard – Used for typing text.


• Mouse – Moves the cursor and selects items.
• Scanner – Converts paper documents into digital form.
• Microphone – Captures audio.
• Touchscreen – Works as both an input and output device.

Output Devices

Output devices display or produce results after processing data.

8|P a g e
Examples:

• Monitor – Displays text, images, and videos.


• Printer – Produces physical copies of documents.
• Speakers – Output sound from the computer.
• Projector – Displays the screen on a large surface.

Differences Between Input and Output Devices:

Feature Input Devices Output Devices

Function Sends data to the computer Receives data from the computer

Examples Keyboard, Mouse, Scanner Monitor, Printer, Speakers

Backing Storage

Backing storage is used for long-term data storage. It keeps data even when the
computer is turned off.

Types of Backing Storage:

1. Magnetic Storage – Uses magnetic fields to store data.


o Examples: Hard drives (HDD), Magnetic tapes.
2. Optical Storage – Uses laser technology to read and write data.
o Examples: CDs, DVDs, Blu-ray discs.
3. Solid-State Storage – Uses flash memory with no moving parts.
o Examples: Solid-State Drives (SSD), USB flash drives, Memory cards.

Differences Between Backing Storage and Internal Memory:

Feature Backing Storage Internal Memory

Purpose Stores data permanently Stores data temporarily

Speed Slower Faster

Volatility Non-volatile Volatile

Examples Hard drives, USBs RAM, ROM

Backing storage is important because internal memory (RAM) cannot store data
permanently. Users need hard drives or USBs to save files, programs, and backups.

9|P a g e
1.3 Operating systems

An operating system (OS) is software that manages computer hardware and


software. It controls how the computer runs and allows users to interact with it.
Without an OS, a computer cannot function properly.

Characteristics of Operating Systems

There are different types of operating systems based on how users interact with
them.

1. Command Line Interface (CLI)

• Uses text commands to operate the computer.


• Requires users to type instructions manually.
• Examples: MS-DOS, Linux Terminal.

Advantages:
✔ Uses fewer system resources (RAM, CPU).
✔ Faster for expert users who know commands.
✔ Allows automation through scripts.

Disadvantages:
✘ Difficult for beginners.
✘ Users must remember complex commands.
✘ No graphical elements like icons or windows.

2. Graphical User Interface (GUI)

• Uses windows, icons, menus, and a pointer (WIMP).


• Users interact with the computer through visual elements.
• Examples: Windows, macOS, Linux (Ubuntu).

10 | P a g e
Advantages:
✔ Easy to use, even for beginners.
✔ No need to remember commands.
✔ Supports multitasking with multiple open programs.

Disadvantages:
✘ Uses more system resources (RAM, CPU).
✘ Can be slower for experienced users.
✘ Needs a graphical display to function.

3. Dialogue-Based Interface

• Uses spoken or typed input to communicate with the computer.


• Common in AI assistants and automated systems.
• Examples: Siri, Google Assistant, chatbots.

Advantages:
✔ Hands-free operation.
✔ Useful for accessibility (disabled users).
✔ Can process natural language.

Disadvantages:
✘ Speech recognition may not be accurate.
✘ Limited to specific commands.
✘ Requires an internet connection in some cases.

4. Gesture-Based Interface

• Uses physical movements to control the system.


• Common in touchscreen devices and motion sensors.
• Examples: Smartphones, tablets, gaming consoles (Kinect, VR).

Advantages:
✔ Intuitive and easy to use.
✔ No need for external devices like a keyboard or mouse.
✔ Faster navigation on touchscreens.

Disadvantages:
✘ Not precise for complex tasks.
✘ Requires specific hardware (touchscreen, motion sensors).
✘ Can be tiring for long use.

11 | P a g e
Differences Between Types of Operating Systems

Type Interaction Method Ease of Use Resource Usage

CLI Text commands Hard for beginners Low

GUI Icons, windows Easy High

Dialogue-Based Voice, text Moderate Medium

Gesture-Based Touch, movement Easy High

Conclusion

Different operating systems have different strengths. GUI is best for everyday
users, CLI is efficient for experts, dialogue-based is useful for automation, and
gesture-based is great for touchscreen devices. The choice depends on the user's
needs and the device's purpose.

12 | P a g e
1.4 Types of computer

Desktop and Mobile Computers

Computers come in different types, each designed for specific purposes. The two
main types are desktop computers and mobile computers.

1. Desktop Computers

A desktop computer is a personal computer designed for use in a fixed location,


such as a home or office. It usually consists of a separate monitor, keyboard,
mouse, and system unit (CPU).

Characteristics of a Desktop Computer:

• Large and stationary; not portable.


• More powerful hardware than most mobile computers.
• Can have multiple external devices connected (printers, speakers, etc.).
• Easier to upgrade and expand (RAM, storage, graphics cards).
• Requires a constant power supply.

13 | P a g e
Uses of a Desktop Computer:

• Office and Business Management: Used for document creation, data analysis,
emails, and meetings.
• Education: Helps students and teachers with research, assignments, and online
learning.
• Gaming: Many desktops have powerful graphics cards for high-performance
gaming.
• Entertainment: Used for watching videos, listening to music, and editing photos
and videos.

2. Mobile Computers

Mobile computers are portable devices that allow users to work from different
locations. They include laptops, smartphones, tablets, and phablets.

Characteristics of Mobile Computers:

• Compact and lightweight.


• Battery-powered, making them portable.
• Often have a touchscreen or a built-in keyboard.
• Usually have built-in wireless connectivity (Wi-Fi, Bluetooth, cellular networks).
• Limited upgrade options compared to desktops.

Types of Mobile Computers:

• Laptops: Small and foldable with a built-in screen, keyboard, and battery.
• Smartphones: Handheld devices with touchscreen functionality, apps, and internet
access.
• Tablets: Larger than smartphones but lack a physical keyboard; use touch-based
input.
• Phablets: A mix between a smartphone and a tablet, offering a larger screen with
phone capabilities.

Uses of Mobile Computers:

• Office and Business Management: Allows professionals to work on the go, attend
meetings, and manage emails.
• Education: Students use mobile devices for online classes, note-taking, and
research.
• Gaming: Many smartphones and tablets support mobile gaming.
• Entertainment: Streaming videos, social media, and reading e-books.

14 | P a g e
• Remotely Controlled Devices: Used for smart home control, drones, and IoT
applications.

3. Advantages and Disadvantages of Desktop and Mobile Computers

Type Advantages Disadvantages

Desktop More powerful hardware, easier to Not portable, requires power


Computer upgrade, better cooling supply

Portable, good performance, battery- Harder to upgrade, battery life


Laptop
powered limits usage

Very portable, multi-functional, easy Small screen, limited


Smartphone
internet access processing power

Larger screen than a phone, good for No physical keyboard, fewer


Tablet/Phablet
reading and media ports

Conclusion

Desktop computers are powerful but not portable. Mobile computers are
convenient but may have limited performance and upgradeability. The choice
depends on the user’s needs and how they plan to use the device.

15 | P a g e
1.5 Emerging technologies

Emerging technologies like Artificial Intelligence (AI) and Extended Reality (XR)
(which includes Virtual Reality (VR) and Augmented Reality (AR)) are changing
daily life. They have many benefits but also some challenges.

Impact on Everyday Life

🔹 Artificial Intelligence (AI)

• AI can analyze data, recognize patterns, and make decisions without human input.
• Used in voice assistants (Siri, Alexa), chatbots, self-driving cars, and medical
diagnosis.
• Helps in education (personalized learning), business (automation), and security
(fraud detection).

✅ Positives:
✔ Speeds up work and reduces human errors.
✔ Helps in medical fields (AI can detect diseases early).
✔ Automates tasks, making businesses more efficient.

❌ Negatives:
✘ Can replace human jobs, leading to unemployment.
✘ AI decisions can be biased if trained on bad data.
✘ Raises privacy concerns (data tracking, surveillance).

🔹 Virtual Reality (VR)

• Creates a fully immersive digital world.


• Used in gaming, education (virtual field trips, training), and healthcare (therapy,
surgery training).

16 | P a g e
✅ Positives:
✔ Provides realistic training for pilots, doctors, and soldiers.
✔ Makes learning interactive (students can explore space or history).
✔ Offers new experiences in gaming and entertainment.

❌ Negatives:
✘ Expensive and requires high-end hardware.
✘ Can cause motion sickness and eye strain.
✘ Disconnects people from the real world.

🔹 Augmented Reality (AR)

• Adds digital elements to the real world using smartphones, glasses, or AR devices.
• Used in games (Pokémon GO), navigation (Google AR Maps), retail (virtual try-ons),
and education (interactive textbooks).

✅ Positives:
✔ Enhances real-world experiences without full immersion.
✔ Useful in shopping (see how furniture looks before buying).
✔ Helps in medicine (doctors can overlay scans on a patient).

❌ Negatives:
✘ Can be distracting if overused in daily life.
✘ Privacy concerns (AR glasses can record people without consent).
✘ Not all devices support AR technology.

Conclusion

Emerging technologies improve efficiency, learning, and entertainment. However,


they also bring risks like job loss, privacy issues, and high costs. Their impact
depends on how they are used and managed.

17 | P a g e
Section: 2 Input and output devices
2.1 Input Devices and Their Uses

Input devices allow users to enter data into a computer. Different input devices are
used for different tasks, and each has its own advantages and disadvantages.

Common Input Devices

Keyboard

• Uses: Used for typing text, entering commands, and programming.


• Advantages: Easy to use, widely available, allows fast typing.
• Disadvantages: Can cause strain with prolonged use, takes up space, prone to
damage from spills.

Numeric Keypad

• Uses: Used in ATMs, calculators, and security systems.


• Advantages: Simple and fast for number entry, small and compact.
• Disadvantages: Limited to numeric input, can be difficult to use for those
unfamiliar.

Pointing Devices (Mouse, Touchpad, Trackball, Stylus)

• Uses: Used to control a cursor, select items, draw, and navigate interfaces.
• Advantages: Precise control, easy to use, ergonomic designs available.
• Disadvantages: Requires a flat surface (for a mouse), can wear out over time.

Remote Control

• Uses: Used for TVs, projectors, and smart devices.


• Advantages: Allows control from a distance, simple button layout.
• Disadvantages: Limited to specific devices, can be lost easily.

Joystick & Driving Wheel

• Uses: Used in gaming, flight simulators, and driving games.


• Advantages: Provides better control in simulations, realistic experience.
• Disadvantages: Expensive, requires practice to use effectively.

Touch Screen (as an Input Device)

• Uses: Used in smartphones, tablets, kiosks, and ATMs.

18 | P a g e
• Advantages: Intuitive, easy to use, saves space by removing the need for a
keyboard/mouse.
• Disadvantages: Prone to fingerprints and scratches, can be inaccurate for precise
tasks.

Scanners

• Uses: Used to digitize paper documents and images.


• Advantages: High-quality scanning, allows digital storage of documents.
• Disadvantages: Takes up space, can be slow.

Camera (Webcam, Digital Camera, CCTV)

• Uses: Used for video calls, security surveillance, and photography.


• Advantages: Captures high-quality images and videos, useful for online meetings.
• Disadvantages: Can invade privacy, requires good lighting for quality images.

Microphone

• Uses: Used for voice recording, video calls, and speech recognition.
• Advantages: Hands-free operation, enables voice control.
• Disadvantages: Background noise can affect quality, requires software support.

Sensors

• Uses: Used in automation, security systems, and smart devices (temperature,


motion, light sensors).
• Advantages: Automates processes, improves accuracy.
• Disadvantages: Can be expensive, may require calibration.

Light Pen

• Uses: Used for precise drawing, screen interaction, and design work.
• Advantages: More precise than a mouse, useful for graphics work.
• Disadvantages: Requires a special screen, can be tiring to use for long periods.

2.2 Direct Data Entry and Associated Devices

Direct data entry devices allow fast and accurate input of data without typing.
These devices are often used in business, security, and automation.

19 | P a g e
Common Direct Data Entry Devices

Magnetic Stripe Reader

• Uses: Reads data from magnetic stripes on credit cards and ID cards.
• Advantages: Fast and reliable, requires no physical contact.
• Disadvantages: Can wear out over time, easy to clone (security risk).

Chip and PIN Reader

• Uses: Used in payment systems to read credit and debit card chips.
• Advantages: More secure than magnetic stripes, requires PIN for authentication.
• Disadvantages: Can be slow, requires user input (PIN entry).

Radio Frequency Identification (RFID) Reader

• Uses: Used for inventory tracking, security access, and contactless payments.
• Advantages: Works without direct contact, fast scanning.
• Disadvantages: Expensive, can be affected by interference.

Optical Mark Recognition (OMR) Reader

• Uses: Reads marks on forms (exam sheets, surveys).


• Advantages: Fast processing, reduces human error.
• Disadvantages: Requires clear and correct markings, can misread faint marks.

Optical Character Recognition (OCR) Reader

• Uses: Converts printed or handwritten text into digital text.


• Advantages: Reduces manual typing, useful for digitizing documents.
• Disadvantages: Errors can occur with unclear handwriting, requires good quality
scans.

Barcode Reader

• Uses: Scans barcodes on products for pricing and inventory management.


• Advantages: Fast and accurate, reduces human error.
• Disadvantages: Requires a direct line of sight, cannot scan damaged barcodes.

QR Scanner

• Uses: Reads Quick Response (QR) codes used in payments, links, and marketing.
• Advantages: Stores more data than barcodes, easy to use with smartphones.
• Disadvantages: Requires a camera, QR codes can be misused for scams.

20 | P a g e
2.3 Output Devices and Their Uses

Output devices display or produce data from a computer in different formats.


Each device has specific advantages and disadvantages.

Common Output Devices

Monitors (Screens, Displays)

• Uses: Used to display visual output from a computer.


• Advantages: High-resolution screens improve clarity, available in different sizes.
• Disadvantages: Can be expensive, consumes power.

Touch Screen (as an Output Device)

• Uses: Used in smartphones, tablets, and kiosks.


• Advantages: Combines input and output, easy to use.
• Disadvantages: Can get damaged easily, screen size limits workspace.

Multimedia Projector

• Uses: Used for presentations, classrooms, and home theaters.


• Advantages: Large display, useful for group viewing.
• Disadvantages: Needs a dark environment, bulbs need replacement.

Printers
✅ Laser Printer

• Uses: Used for high-speed and high-quality printing.


• Advantages: Fast, cost-effective for large volumes.
• Disadvantages: Expensive initial cost, requires toner refills.

✅ Inkjet Printer

• Uses: Used for home and office printing.


• Advantages: Good for color printing, affordable.
• Disadvantages: Ink is expensive, slower than laser printers.

✅ Dot Matrix Printer

• Uses: Used for printing receipts and invoices.


• Advantages: Can print multiple copies using carbon paper, durable.
• Disadvantages: Noisy, low print quality.

21 | P a g e
✅ Plotter

• Uses: Used for printing large engineering and architectural designs.


• Advantages: High precision, prints on large sheets.
• Disadvantages: Expensive, slow printing speed.

✅ 3D Printer

• Uses: Used for prototyping, manufacturing, and medical models.


• Advantages: Can create complex 3D objects, useful in design industries.
• Disadvantages: Expensive, slow process.

Speakers

• Uses: Used for playing audio, music, and alerts.


• Advantages: Good sound quality, enhances multimedia experience.
• Disadvantages: Can disturb others, requires power.

Actuators

• Uses: Used in robotics, smart homes, and industrial automation.


• Advantages: Automates processes, improves efficiency.
• Disadvantages: Expensive, may require maintenance.

Conclusion

Input and output devices allow computers to interact with users. Some devices
focus on speed and accuracy, while others prioritize ease of use. Choosing the
right device depends on the task, cost, and user needs.

22 | P a g e
Section 3: Storage Devices and Media
1. Magnetic Drives

• Characteristics: Use magnetic fields to read/write data.


• Types:
o Fixed Magnetic Hard Drives (HDDs): Common in desktops and laptops.
o Portable Magnetic Hard Drives: External drives for additional storage.
o Magnetic Tape Drives: Used for large-scale backups.
• Uses:
o HDD: Primary storage for OS, applications, and files.
o Magnetic Tape: Archival storage.
• Advantages:
o HDD: High capacity, cost-effective.
o Magnetic Tape: Long-term storage, high capacity.
• Disadvantages:
o HDD: Slower speeds, moving parts (can fail).
o Magnetic Tape: Slower access times, less portable.

23 | P a g e
2. Optical Drives

• Characteristics: Use lasers to read/write data on discs.


• Types:
o CD (Compact Disc): Stores up to 700MB.
o DVD (Digital Versatile Disc): Stores up to 4.7GB (single-layer), 8.5GB (dual-
layer).
o Blu-ray: Stores up to 25GB (single-layer), 50GB (dual-layer).
• Uses:
o CD: Audio, software distribution, small data storage.
o DVD: Video, software, larger files.
o Blu-ray: High-definition video, large software.
• Advantages:
o CD/DVD: Portable, relatively inexpensive.
o Blu-ray: High storage capacity, great for HD content.
• Disadvantages:
o CD/DVD/Blu-ray: Susceptible to scratches, slower data transfer compared
to SSDs/HDDs.

3. Solid-State Drives (SSDs)

• Characteristics: Store data on flash memory chips, no moving parts.


• Types:
o Fixed SSD: Built into computers and laptops.
o Portable SSD: External drives for fast, large storage.
o Pen Drives/Flash Drives: Small USB drives for portable storage.
• Uses:
o Fixed SSD: Main storage in modern laptops/desktops for fast access.
o Portable SSD: Backup, data transfer.
o Pen Drive/Flash Drive: Quick file transfer, portable storage.
• Advantages:
o SSD: Fast data access speeds, shock-resistant, energy-efficient.
o Pen/Flash Drive: Compact, portable, plug-and-play.
• Disadvantages:
o SSD: Expensive per GB, limited write endurance.
o Pen/Flash Drive: Limited capacity compared to SSDs/HDDs.

4. Storage Media

• Characteristics: The physical medium on which data is stored.


• Types:

24 | P a g e
o Magnetic Media: Includes magnetic hard disks and tapes.
o Optical Media: Includes CD, DVD, Blu-ray.
o Solid-State Media: Includes SD cards, xD cards, CFast cards.
• Uses:
o Magnetic Media: Long-term storage, backup.
o Optical Media: Software, music, video.
o Solid-State Media: Portable storage, used in cameras, smartphones,
laptops.
• Advantages:
o Magnetic: Cost-effective for large volumes of data.
o Optical: Good for multimedia distribution.
o Solid-State: Fast read/write speeds, durable, portable.
• Disadvantages:
o Magnetic: Slower speeds, mechanical parts can fail.
o Optical: Less capacity, prone to damage.
o Solid-State: Expensive, limited capacity for higher-end applications.

25 | P a g e
Section 4: Networks and the effects of using them

4.1 Networks: Short Notes

1. Router

• Operation and Purpose:


o Connecting Networks and Devices to the Internet: Routers link local
networks (LANs) to the internet, allowing devices within the network to
communicate with external servers or websites.
o Storing Computer Addresses: Routers store IP addresses in their routing
tables, ensuring that data is sent to the correct device or network.
o Routing Data Packets: Routers direct data packets from one network to
another by determining the best path for them using routing algorithms. They
ensure data reaches the destination through the most efficient route.

2. Common Network Devices

• Network Interface Card (NIC):

26 | P a g e
o A hardware component that enables a device to connect to a network (wired
or wireless).
o Provides a unique MAC address for the device.
• Hubs:
o Basic networking device that connects multiple devices in a network.
o Sends data to all devices on the network (not very efficient).
• Bridges:
o Connect two or more network segments to make them act as a single
network.
o Used to reduce network traffic and improve performance.
• Switches:
o Similar to hubs, but smarter; switches direct data packets only to the
intended device, improving efficiency.
o Operates at the data link layer, using MAC addresses to identify devices.

3. Wi-Fi and Bluetooth

• Wi-Fi:
o Use: Wireless networking technology that allows devices to connect to the
internet or local area networks (LANs) over short to medium distances
(typically 100m or less).
o Advantage: High-speed data transfer, ideal for internet browsing,
streaming, and heavy data tasks.
• Bluetooth:
o Use: Wireless technology used for short-range communication between
devices, typically for audio devices, keyboards, mice, or file sharing (usually
under 100 meters).
o Advantage: Low energy consumption, great for small devices and
connecting peripherals.
• Connecting Devices:
o Wi-Fi: Devices connect through a wireless router to access the internet or a
network.
o Bluetooth: Devices pair directly with each other for personal, point-to-point
connections.
• Similarities and Differences:
o Similarities: Both are wireless communication technologies.
o Differences:
▪ Wi-Fi supports higher data transfer speeds, longer range, and is
suited for internet access and network connectivity.
▪ Bluetooth has a shorter range, lower data speeds, and is designed for
device-to-device communication (e.g., audio devices, file transfers).

4. Cloud Computing

• Characteristics:

27 | P a g e
o Cloud computing refers to accessing and storing data and services over the
internet rather than on local servers or devices.
o It provides scalable, on-demand resources (storage, applications,
processing power) without the need for physical infrastructure.
• Uses:
o Data Storage: Files, photos, and documents can be stored in cloud storage
services like Google Drive, Dropbox, etc.
o Software as a Service (SaaS): Applications (like email, office suites) run
directly from the cloud.
o Collaboration: Cloud computing allows teams to collaborate and share files
easily from any device.
• How Data is Stored, Managed, and Shared:
o Stored: Data is stored in remote servers (data centers) maintained by cloud
service providers.
o Managed: Users manage their data through cloud interfaces, which handle
tasks like backups, security, and access control.
o Shared: Data can be easily shared with others via links, permissions, or
collaborative platforms.
• Advantages of Cloud Storage:
o Accessibility: Data is accessible from anywhere with an internet connection.
o Scalability: Users can increase or decrease storage as needed without
worrying about hardware.
o Cost-Efficient: No need for costly physical storage devices, and the pay-
per-use model is cost-effective for businesses and individuals.
o Backup & Security: Automatic backup and high-level security provided by
cloud service providers.
• Disadvantages of Cloud Storage:
o Reliance on Internet Connection: Requires a stable internet connection for
access and upload/download.
o Security & Privacy Concerns: Storing sensitive data on third-party servers
may raise concerns about data security and privacy.
o Ongoing Costs: While it can be cheaper initially, ongoing subscription costs
can add up over time.
o Limited Control: Users have limited control over the infrastructure and
management of their data.

28 | P a g e
Common Network Environments

1. Extranet, Intranet, and the Internet

• Extranet:
o Characteristics: A private network that allows controlled access to external
users (e.g., business partners, vendors).
o Uses: Facilitates secure communication between businesses and external
stakeholders. Often used for sharing specific data or services with
authorized third parties.
o Purpose: Enhances collaboration between an organization and external
entities while maintaining a secure environment.
• Intranet:
o Characteristics: A private network accessible only within an organization,
typically protected by a firewall.
o Uses: Sharing internal resources, such as documents, communication tools,
and databases.
o Purpose: Enhances internal communication and collaboration within the
organization while keeping the data secure from outsiders.
• Internet:
o Characteristics: A global network of networks that connects millions of
devices and computers worldwide. Publicly accessible.
o Uses: Browsing websites, social media, email, online services, and accessing
global resources.
o Purpose: Serves as a worldwide medium for communication, entertainment,
business, and education.
• Differences and Similarities:
o Differences:
▪ Intranet: Private, internal network for use within an organization.
▪ Extranet: Extends the intranet to external users for secure
collaboration.
▪ Internet: Public, global network connecting millions of devices and
services.
o Similarities:

29 | P a g e
▪ All serve as means of communication and data transfer but differ in
terms of access (private vs. public) and user scope.

2. Network Types

• Local Area Network (LAN):


o Characteristics: A network that connects devices within a small geographic
area, like a home, office, or school.
o Uses: File sharing, printer sharing, local communication within the same
building or campus.
o Purpose: Facilitates high-speed data transfer and resource sharing within a
confined space.
o Advantages: Fast speeds, cost-effective, easier to manage.
o Disadvantages: Limited range, requires physical cables or Wi-Fi access
points for wireless connections.
• Wireless Local Area Network (WLAN):
o Characteristics: A LAN that uses wireless technology (Wi-Fi) to connect
devices instead of physical cables.
o Uses: Home networks, office environments, public hotspots (e.g., cafes,
libraries).
o Purpose: Offers mobility and flexibility by enabling devices to connect
wirelessly to the network.
o Advantages: No cables required, convenient for mobile devices, easy to set
up.
o Disadvantages: Potential security risks, slower speeds compared to wired
LANs, signal interference.
• Wide Area Network (WAN):
o Characteristics: A network that connects multiple LANs over large
geographical distances (cities, countries, or even continents).
o Uses: Connecting branch offices of companies, providing internet access.
o Purpose: To facilitate long-distance communication and share data across
geographically dispersed locations.
o Advantages: Provides access to data and resources on a global scale.
o Disadvantages: High setup and maintenance costs, potentially slower
speeds compared to LANs, requires more complex management.
• Differences Between LAN, WLAN, and WAN:
o LAN: Small geographic area, high speed, and low cost.
o WLAN: Similar to LAN but wireless, providing mobility and flexibility.
o WAN: Larger geographic area, slower speeds, higher cost, and more
complex infrastructure.

Summary of Key Points:

• Extranet: Private network for external users.


• Intranet: Private network for internal users within an organization.
• Internet: Public, global network.

30 | P a g e
• LAN: Localized network (office/home), fast speeds.
• WLAN: Wireless version of LAN, offers flexibility.
• WAN: Large-scale network, typically covering large areas, often connecting
multiple LANs.

4.2 Network Issues and Communication

1. Security Issues Regarding Data Transfer

• Privacy and Confidentiality of Data Transfer:


o Ensuring that data being transferred over a network is kept private and
confidential from unauthorized access.
o Encryption: Encrypting data before transmission ensures that even if it is
intercepted, it cannot be read without the decryption key.
o Secure Protocols: Using secure communication protocols (like HTTPS,
SSL/TLS) ensures data privacy and confidentiality during transmission over
the internet.
• Passwords:
o Avoiding Password Interception: Passwords are vulnerable to interception
if transmitted over unsecured networks. To prevent this:

31 | P a g e
▪ Use encrypted channels (SSL/TLS) when entering or transferring
passwords.
▪ Use Anti-spyware Software: Protect devices from spyware and
keyloggers that may attempt to capture passwords.
▪ Change Passwords Regularly: Regularly changing passwords
reduces the risk of them being compromised over time.
• Strong vs. Weak Passwords:
o Weak Passwords: Short, simple passwords (e.g., “123456”, “password”) are
easy to guess or crack through brute force attacks.
o Strong Passwords: Complex passwords, typically combining uppercase
and lowercase letters, numbers, and special characters. A minimum of 12
characters is recommended.
o Password Management Tools: Use password managers to generate and
securely store complex passwords.
• Other Authentication Methods:
o Zero Login: A form of passwordless authentication where access is granted
through methods like biometrics or tokens, reducing reliance on passwords.
o Biometric Methods: Authentication using unique physical features like
fingerprints, face recognition, or iris scans.
o Magnetic Stripes: Used in traditional credit cards and access control cards,
where a magnetic stripe contains encrypted data for authentication.
o Smart Cards: A card with embedded microchip used for secure
identification, data storage, and authentication.
o Physical Tokens: Devices like key fobs or USB tokens that generate a one-
time passcode (OTP) used for authentication.
o Electronic Tokens: Virtual or software-based tokens that generate OTPs for
authentication, such as apps like Google Authenticator.

2. Anti-Malware Software

• Anti-Malware and Anti-Virus Software:


o Purpose: These tools are designed to detect, block, and remove malicious
software (malware) and viruses from devices.
o How It Works:
▪ Signature-based detection: Recognizes known malware by
comparing files against a database of virus signatures.
▪ Heuristic-based detection: Identifies new or unknown malware
based on its behavior or characteristics.
▪ Real-time Protection: Continuously scans files and programs running
on the system, providing constant protection against threats.
• Removing/Quarantining Viruses:
o Virus Removal: Anti-virus software can remove or quarantine detected
viruses. In quarantine, the file is isolated, preventing it from causing harm until
further analysis is performed.
o Keep Software Up to Date: Ensures that the latest virus definitions and
protection techniques are applied.

32 | P a g e
• Scanning Storage Media:
o Scanning Storage Devices: Devices like USB drives, external hard drives, and
SD cards should be scanned before data transfer to ensure they are free
from malware.
o Scanning Data/Software During Download: Files and software downloaded
from the internet should be scanned immediately to prevent any malicious
content from being executed.

3. Electronic Conferencing

• Characteristics, Uses, Advantages, and Disadvantages:


o Video-Conferencing:
▪ Characteristics: Involves the real-time exchange of audio and video
between two or more users.
▪ Uses: Commonly used for meetings, interviews, and collaboration
across distances.
▪ Advantages: Enables face-to-face interaction without geographic
constraints, improves engagement, allows screen sharing.
▪ Disadvantages: Requires a high-speed internet connection, potential
for technical issues (e.g., lag or poor video quality), can be exhausting
for long sessions.
o Audio-Conferencing:
▪ Characteristics: Involves only audio communication, often used for
group calls.
▪ Uses: Conference calls for team meetings, client calls, discussions.
▪ Advantages: Less bandwidth required than video, ideal for remote
teams, easy to set up.
▪ Disadvantages: Lack of visual cues can lead to misunderstandings or
disengagement, lower personal interaction.
o Web-Conferencing:
▪ Characteristics: Includes tools for meetings, webinars,
presentations, and collaboration, usually with screen sharing and file
sharing.
▪ Uses: Hosting online workshops, seminars, and virtual training
sessions.
▪ Advantages: Can include both audio and video, integrates various
tools for collaboration (chat, document sharing), highly flexible.
▪ Disadvantages: Requires a stable internet connection, potential for
technical issues, sometimes harder to maintain participant attention.

4. Hardware, Software, and Network Connection Requirements for Each Type of


Electronic Conference

• Video-Conferencing:
o Hardware:
▪ Camera: For transmitting video (built-in webcam or external camera).

33 | P a g e
▪ Microphone/Speakers: For audio input and output.
▪ Computer or Mobile Device: A computer or smartphone with
sufficient processing power and a stable internet connection.
o Software: Video conferencing software like Zoom, Microsoft Teams,
Google Meet, or Skype.
o Network Connection: Requires a stable high-speed internet connection,
preferably via Ethernet or strong Wi-Fi, to support real-time video and audio
transmission.
• Audio-Conferencing:
o Hardware:
▪ Phone or Computer: Basic device capable of making calls or using
VoIP services.
▪ Headset/Microphone: For clear audio communication.
o Software: VoIP platforms like Skype, Zoom (audio-only), or conference call
services.
o Network Connection: A moderate to strong internet connection or mobile
network for VoIP calls, or a traditional phone line for landline calls.
• Web-Conferencing:
o Hardware:
▪ Computer/Tablet/Smartphone: For accessing the conference.
▪ Microphone, Speakers, Webcam: For communication and
collaboration.
o Software: Platforms like Zoom, Microsoft Teams, WebEx, or Google Meet
that support web-based meetings.
o Network Connection: Reliable high-speed internet for optimal performance
(upload/download speed).

34 | P a g e
Section 5: The effects of using IT

5.1 Microprocessor-Controlled Devices

Effects of Using Microprocessor-Controlled Devices

• Microprocessors/Smart Devices in the Home:


o Positive Effects:
▪ Lifestyle: Smart home devices (e.g., thermostats, lights, security
systems) can make daily living more convenient by automating tasks.
▪ Leisure Time: Devices like smart TVs, gaming consoles, and
entertainment systems offer personalized content and experiences,
enhancing leisure time.
▪ Physical Fitness: Fitness trackers and smartwatches monitor physical
activity, encouraging healthier habits and allowing users to track
progress.
▪ Security of Data: With proper encryption, smart home devices can
enhance home security (e.g., smart cameras, smart locks) and protect
personal data.
▪ Social Interaction: Virtual assistants (e.g., Alexa, Google Assistant)
provide easy communication, and social media apps on devices help
maintain connections with friends and family.

35 | P a g e
o Negative Effects:
▪ Lifestyle: Over-reliance on smart devices can lead to reduced
engagement in non-digital activities and a more sedentary lifestyle.
▪ Leisure Time: Excessive use of entertainment devices may lead to
less time spent outdoors or engaging in physical activities.
▪ Physical Fitness: Smart devices can encourage physical inactivity if
overused, particularly with sedentary activities like watching TV or
playing video games.
▪ Security of Data: The increasing amount of data collected by smart
devices can be a target for hackers, posing a risk to privacy if not
properly protected.
▪ Social Interaction: Overuse of virtual assistants and social media can
reduce face-to-face interactions, affecting personal relationships
and contributing to social isolation.
• Microprocessors/Smart Devices in Transport:
o Positive Effects:
▪ Security of Data: Advanced security features in transport systems,
such as encryption and biometric scanning, help protect personal
information in connected vehicles.
▪ Autonomous Vehicles: Microprocessors allow for the development
of self-driving cars, which have the potential to reduce traffic
accidents, increase efficiency, and provide mobility for people with
disabilities.
▪ Transport Safety: Devices like GPS, collision detection, and
automatic braking systems improve the safety of vehicles by
monitoring road conditions and providing real-time alerts.
o Negative Effects:
▪ Security of Data: Autonomous vehicles and connected transport
systems may be vulnerable to cyber-attacks, leading to potential
theft of personal data or control over the vehicle.
▪ Autonomous Vehicles: While self-driving cars may reduce accidents
caused by human error, they also raise concerns about technology
failure, ethical decisions in accidents, and job losses in transport
industries.
▪ Transport Safety: Relying on microprocessor-controlled systems in
vehicles can lead to a lack of manual control in emergency situations,
which may pose risks if the systems malfunction.

5.2 Potential Health Problems Related to Prolonged Use of IT Equipment

Health Issues Caused by Prolonged Use of IT Equipment

• Repetitive Strain Injury (RSI):

36 | P a g e
o Causes: RSI is caused by repetitive motion or overuse of muscles, tendons,
and nerves, typically from long periods of typing, mouse use, or poor
ergonomics.
o Prevention:
▪ Take Regular Breaks: Stand up, stretch, and change positions every
20-30 minutes to prevent strain.
▪ Ergonomics: Set up a comfortable workstation with proper keyboard
and mouse placement, and maintain good posture.
▪ Exercises: Perform exercises to strengthen muscles and improve
flexibility, focusing on wrists, shoulders, and neck.
• Back Problems:
o Causes: Poor posture, sitting for prolonged periods, or improper chair
height can lead to back pain.
o Prevention:
▪ Proper Seating: Use an ergonomic chair with good lumbar support
and sit with feet flat on the floor.
▪ Standing Desks: Consider using a standing desk or alternating
between sitting and standing to reduce strain on the back.
▪ Stretching: Regularly stretch to relieve tension in the lower back and
spine.
• Eye Problems:
o Causes: Prolonged screen time can lead to eye strain, dryness, blurred
vision, and headaches. The blue light emitted from screens can also affect
sleep patterns.
o Prevention:
▪ 20-20-20 Rule: Every 20 minutes, look at something 20 feet away
for at least 20 seconds to reduce eye strain.
▪ Adjust Screen Settings: Reduce screen brightness and increase text
size to reduce strain. Use blue light filters to lessen the impact on
sleep.
▪ Proper Lighting: Use appropriate lighting in the workspace to
minimize glare on the screen and avoid eye strain.
• Headaches:
o Causes: Prolonged use of IT equipment can lead to tension headaches from
poor posture, eye strain, or dehydration.
o Prevention:
▪ Ergonomic Setup: Adjust the position of the computer screen to eye
level to reduce neck and eye strain.
▪ Hydration and Breaks: Drink plenty of water and take regular breaks
to prevent dehydration and reduce the risk of headaches.
▪ Limit Screen Time: Take breaks from the screen throughout the day to
give the eyes and body time to rest.

37 | P a g e
Section 6: ICT applications

6.1 Communication

Communication Media

• Characteristics and Uses:


o Newsletters:
▪ Characteristics: Typically periodic publications distributed to a
specific audience (e.g., email newsletters, printed newsletters). They
contain information about events, news, and updates relevant to the
audience.
▪ Uses: Often used by businesses, schools, and organizations to keep
stakeholders informed and engaged.
o Posters:
▪ Characteristics: Visual communication materials often used for
advertising or informational purposes, typically displayed in public
spaces.
▪ Uses: Used for promotional campaigns, event announcements, or
public service information.
o Websites:

38 | P a g e
▪ Characteristics: A digital platform containing interconnected web
pages that provide information or services.
▪ Uses: Used for businesses, education, personal portfolios, news
outlets, etc., as a central location for information and interaction.
o Multimedia Presentations:
▪ Characteristics: Presentations that combine text, images, audio,
video, and other media to communicate information effectively.
▪ Uses: Common in education, business meetings, and marketing to
present information engagingly and interactively.
o Audio and Video:
▪ Characteristics: Audio refers to sound-based content, while video
incorporates moving images and sound.
▪ Uses: Used for entertainment (e.g., movies, podcasts), education
(e.g., tutorials, lectures), and communication (e.g., meetings,
webinars).
o Media Streaming:
▪ Characteristics: The continuous transmission of audio or video
content over the internet.
▪ Uses: Popular for music, video services (e.g., Netflix, Spotify), live
events, and podcasts. Offers instant access to media content
without requiring storage.
o ePublications:
▪ Characteristics: Digital versions of publications (e.g., eBooks, digital
magazines).
▪ Uses: Often used for convenience and accessibility, allowing users to
read on digital devices.

Mobile Communication

• Mobile Devices for Communication:


o SMS Messaging: Short Message Service allows the sending of short
text messages between mobile devices. It is a quick and convenient
form of communication, though it is limited in character length.
o Phone Calls: Traditional voice communication through mobile phones,
still one of the most common communication methods.
o Voice over Internet Protocol (VoIP): Technology that allows voice
calls to be made over the internet rather than traditional telephone
lines (e.g., Skype, WhatsApp).
▪ Advantages: Cost-effective, especially for international
communication; provides additional features like video calling.
▪ Disadvantages: Relies on a stable internet connection; quality can
vary based on network speed.
o Video Calls: Real-time video communication between users, typically
done through apps like Zoom, Google Meet, or Skype.

39 | P a g e
▪ Advantages: Enables face-to-face interaction despite geographic
distances.
▪ Disadvantages: Requires good internet bandwidth for smooth video
quality.
o Accessing the Internet: Mobile devices allow users to access the
internet anywhere, enabling web browsing, checking emails, and using
web-based apps.
▪ Advantages: Convenience, mobility, and real-time access to
information.
▪ Disadvantages: Can lead to distractions, reliance on data plans, and
security concerns in public Wi-Fi networks.

6.2 Modelling Applications

Computer Modelling

• Personal Finance:
o Characteristics: Software used for managing personal budgets, expenses,
and investments (e.g., budgeting apps, financial planning software).
o Uses: Helps individuals track their income and spending, plan for future
goals, and manage savings.
• Bridge and Building Design:
o Characteristics: Engineering software that allows for the simulation of
structural designs and analysis of their strength and stability.
o Uses: Used by architects and civil engineers to design and test buildings,
bridges, and other structures before actual construction.
• Flood Water Management:
o Characteristics: Models that simulate how water behaves during a flood,
helping to predict the flow of water and the areas that may be at risk.
o Uses: Used by environmentalists, urban planners, and governments to create
flood risk assessments and inform the design of flood control systems.
• Traffic Management:
o Characteristics: Models used to simulate traffic flow and congestion,
helping to design road networks, manage traffic lights, and predict traffic
patterns.
o Uses: Used by urban planners, city officials, and transportation agencies to
optimize traffic systems, reduce congestion, and improve public safety.
• Weather Forecasting:
o Characteristics: Computer models that simulate atmospheric conditions to
predict future weather patterns.
o Uses: Used by meteorologists and climate scientists to forecast weather
and track long-term climate trends.

40 | P a g e
Advantages and Disadvantages of Computer Modelling vs. Human Modeling

• Advantages:
o Speed and Efficiency: Computer models can process large amounts of data
quickly and generate results in a fraction of the time it would take humans.
o Accuracy: Models can provide highly accurate results when based on
accurate input data, and can simulate complex scenarios that are difficult for
humans to manually calculate.
o Safety: In hazardous scenarios (e.g., flood simulations, structural testing),
computer models can predict risks without putting humans in danger.
o Cost-Effective: Models can reduce costs by identifying potential issues
early on in the design or planning stages, preventing costly errors in real-
world applications.
• Disadvantages:
o Dependence on Input Data: The accuracy of a model is highly dependent on
the quality and accuracy of the input data. Inaccurate data can lead to
incorrect predictions.
o Complexity: Some models may be too complex for non-experts to
understand or interpret, leading to potential misapplication.
o Limitations in Real-World Application: Models may not always account for
every variable in real-world scenarios, leading to discrepancies between
predicted and actual outcomes.
o Lack of Human Judgment: Models rely on algorithms and data, which may
not capture the nuance and judgment that a human expert might bring in
interpreting or making decisions based on results.

41 | P a g e
42 | P a g e
6.3 Computer-Controlled Systems

Computer-Controlled Systems

• Robotics in Manufacture:
o Characteristics: Robots are automated machines used in manufacturing
processes to perform tasks like assembly, welding, packaging, and quality
inspection.
o Uses: Common in industries like automobile manufacturing, electronics
assembly, and food processing, where precision and speed are required.
o Advantages:
▪ Efficiency: Robots can work 24/7 without breaks, significantly
improving productivity.
▪ Accuracy: Robots provide consistent, high-quality output without
the variation that human labor may bring.
▪ Safety: Robots can be used for dangerous tasks, reducing the risk to
human workers.
o Disadvantages:
▪ High Initial Cost: Setting up robotic systems requires a significant
investment in machinery and technology.
▪ Job Displacement: Automation may lead to job losses in sectors that
rely on manual labor.
• Production Line Control:
o Characteristics: Computer systems that manage and monitor the
production process, ensuring tasks are completed in sequence and
according to set parameters.
o Uses: Found in mass-production industries like car manufacturing,
electronics, and food production, where precise control over processes is
essential.
o Advantages:
▪ Optimization: Improves the efficiency and consistency of
production, leading to cost savings.
▪ Real-Time Monitoring: Allows for immediate detection of faults,
leading to faster problem resolution and minimizing downtime.
o Disadvantages:
▪ Dependency on Technology: System failure can halt production, and
technical glitches can lead to delays or quality issues.
▪ Complexity: Requires highly skilled personnel for maintenance and
troubleshooting.
• Autonomous Vehicles:
o Characteristics: Vehicles that are capable of operating without human
intervention, using sensors, AI, and machine learning algorithms to navigate
and make decisions.
o Uses: Can be used for personal transport, delivery services, and long-haul
trucking.
o Advantages:

43 | P a g e
▪ Safety: Reduces human errors such as distracted or impaired driving,
potentially lowering traffic accidents.
▪ Efficiency: Optimizes driving patterns for better fuel efficiency and
time savings.
o Disadvantages:
▪ Technological Challenges: Requires complex algorithms and robust
sensors, which can be expensive and prone to failure in extreme
conditions.
▪ Job Losses: Autonomous vehicles could displace drivers in industries
like delivery, transportation, and taxi services.

Advantages and Disadvantages of Using Computer-Controlled Systems Rather Than


Humans:

• Advantages:
o Precision and Consistency: Computer-controlled systems provide highly
accurate, repeatable results, especially in tasks requiring fine precision.
o Increased Productivity: Machines work faster and longer hours than humans,
improving overall productivity and throughput.
o Reduced Human Error: Automated systems are less likely to make errors due
to fatigue, distraction, or inconsistency.
o Safety: Computers can perform dangerous or hazardous tasks, reducing the
risk to human workers.
• Disadvantages:
o High Initial Costs: Setting up automated systems can require a significant
upfront investment in technology and infrastructure.
o Dependency on Technology: A failure in the system can halt production or
services, potentially leading to losses.
o Job Losses: Automation may lead to unemployment in sectors where tasks
were previously carried out by humans.

6.4 School Management Systems

School Management Systems

• Learner Registration and Attendance:


o Characteristics: Systems that manage student enrollment, track
attendance, and store personal data such as contact information and
medical records.
o Uses: Used by schools to streamline the registration process, ensure
accurate attendance records, and manage student profiles.
o Advantages:
▪ Efficiency: Reduces paperwork and the time required to register
students and track attendance.

44 | P a g e
▪ Accuracy: Provides reliable and up-to-date data on student
attendance.
o Disadvantages:
▪ Privacy Concerns: The storage of personal student information can
raise security and privacy issues if not properly protected.
• Recording Learner Performance:
o Characteristics: Systems that record students’ grades, assessments, and
performance on tests and assignments.
o Uses: Used to track academic progress, generate report cards, and provide
feedback to students and parents.
o Advantages:
▪ Streamlined Record-Keeping: Easier access to historical
performance data and analysis of trends in academic progress.
▪ Integration: Can be integrated with other systems for a
comprehensive view of the student’s overall performance.
o Disadvantages:
▪ Technical Issues: Data loss or system failure can lead to missing
records or inaccuracies in student performance.
• Computer-Aided Learning:
o Characteristics: Systems that use digital resources and software
applications to aid in the learning process, such as online quizzes, tutorials,
and educational games.
o Uses: Common in classrooms for interactive lessons, homework
assignments, and individualized learning experiences.
o Advantages:
▪ Engaging: Students find computer-aided learning tools more
engaging, which can increase motivation and improve learning
outcomes.
▪ Customizable: Systems can be tailored to meet the needs of
individual students.
o Disadvantages:
▪ Dependence on Technology: Overreliance on computer-based
learning can reduce social interaction and traditional learning
methods.

6.5 Booking Systems

Online Booking Systems

• Characteristics: Digital platforms that allow users to book services such as travel,
events, or accommodations online.
• Uses:
o Travel Industry: Allows for the booking of flights, hotels, car rentals, etc.

45 | P a g e
o Concerts, Cinemas, Sporting Events: Users can purchase tickets and select
seating for events.
• Advantages:
o Convenience: Users can book services 24/7 from anywhere with internet
access.
o Time-Saving: Eliminates the need for phone calls or in-person bookings.
o Instant Confirmation: Immediate booking confirmation and access to
itineraries or tickets.
• Disadvantages:
o Lack of Personal Interaction: Some users may prefer face-to-face service
or assistance, which is absent in online booking systems.
o Security Concerns: The sharing of personal and payment information online
can lead to potential security breaches.

6.6 Banking Applications

Automatic Teller Machines (ATM)

• Characteristics: Machines that allow customers to perform basic banking functions


without the need for human interaction.
• Uses:
o Withdrawing Cash: Allows users to withdraw money from their bank
accounts.
o Depositing Cash or Cheques: ATMs equipped with deposit functions allow
users to deposit cash or cheques.
o Account Management: Users can check their account balance, view mini-
statements, and pay bills.
o Money Transfers: Enables transfer of money between accounts or to third
parties.
• Advantages:
o Convenience: Available 24/7, providing access to banking services outside
of regular banking hours.
o Accessibility: Accessible from various locations, reducing the need to visit a
branch.
• Disadvantages:
o Security: ATMs can be targets for fraud and theft if not properly secured.
o Technical Issues: Machine malfunctions can cause inconvenience or loss of
funds if not addressed immediately.

Electronic Funds Transfer (EFT) & Other Banking Methods

• Characteristics: The transfer of money electronically between bank accounts,


including credit/debit card transactions, cheques, and internet banking.
• Uses:

46 | P a g e
o EFT: Used for transferring funds between individuals, businesses, and
government entities.
o Credit/Debit Card Transactions: Enables payments through cards linked to
a bank account.
o Cheques: Traditional paper-based payment system that allows one party to
pay another through a written order to a bank.
o Internet Banking: Online platforms for managing accounts, making
payments, and transferring funds.
• Advantages:
o Speed: Faster than traditional banking methods like cash or cheques.
o Convenience: Accessible from anywhere with an internet connection.
• Disadvantages:
o Security Risks: Potential for fraud, hacking, or unauthorized access to
personal information.
o Technical Failures: Dependence on internet connectivity and systems that
may be disrupted.

6.7 Computers in Medicine

Information Systems in Medicine

• Patient Records:
o Characteristics: Digital systems for storing patient health information, such
as medical history, diagnoses, treatments, and medications.
o Uses: Doctors and healthcare professionals use these systems to track
patient progress, ensure continuity of care, and make informed decisions.
• Pharmacy Records:
o Characteristics: Systems that track medications prescribed to patients,
including dosages, drug interactions, and refills.
o Uses: Ensures correct prescriptions, reduces errors, and provides
pharmacists with a comprehensive view of patient medication history.
• 3D Printers:
o Characteristics: Devices that can create three-dimensional objects from
digital designs, often using materials like plastics, metals, and
biocompatible materials.
o Uses:
▪ Printing Prosthetics: Used to create customized prosthetics tailored
to an individual’s body.
▪ Tissue Engineering: Used in the creation of tissue samples for
research or medical purposes.
▪ Artificial Blood Vessels: Can print blood vessels to assist in medical
procedures or transplantation.

47 | P a g e
▪ Customised Medicines: 3D printers can be used to create
personalized medication dosages.
• Advantages:
o Personalized Care: Offers tailored treatments and devices to individual
patients.
o Precision: High accuracy in creating medical devices, ensuring proper fit and
function.
• Disadvantages:
o Cost: 3D printing technology can be expensive and may not be accessible in
all healthcare settings.
o Regulation and Safety: Issues around the regulation of 3D printed medical
products need to be addressed to ensure patient safety.

48 | P a g e
6.8 Expert Systems

Expert Systems

• Characteristics:
o Knowledge-Based: Expert systems mimic human expertise in specific fields
by storing vast amounts of specialized knowledge in a knowledge base.
o Inference Engine: The part of the expert system that uses the knowledge
base and rules to derive conclusions or solve problems based on the data
entered.
o User Interface: Allows users to interact with the expert system, entering data
and receiving outputs in a user-friendly format.
o Explanation System: Provides explanations to users on how a conclusion or
decision was reached, enhancing transparency and trust in the system.
• Uses and Purpose:
o Mineral Prospecting: Expert systems are used to analyze geological data
and identify potential mineral deposits, aiding exploration in the mining
industry.
o Car Engine Fault Diagnosis: These systems analyze symptoms reported by
the user and compare them with the knowledge base to diagnose possible
faults in car engines.
o Medical Diagnosis: Medical expert systems analyze symptoms and medical
histories to suggest potential diagnoses and recommend treatments.
o Chess Games: Used to predict the best possible moves in a game by
analyzing the board and evaluating strategies.
o Financial Planning: Expert systems are used to create personalized financial
strategies, analyze risk, and suggest investment options based on a user’s
profile.
o Route Scheduling for Delivery Vehicles: These systems help delivery
companies optimize routes to reduce fuel consumption and improve
delivery times.
o Plant and Animal Identification: Used in environmental and biological
research to identify different species of plants and animals based on
specific features.
• Components of an Expert System:
o User Interface: The communication link between the user and the system,
enabling data input and receiving conclusions or solutions.
o Inference Engine: The brain of the expert system, it processes input data by
applying logic to the knowledge base to generate conclusions or solutions.
o Knowledge Base: A vast repository of specialized information, including
facts, rules, heuristics, and procedures, which the system uses to make
decisions.
o Rules Base: Contains the "if-then" rules that are applied by the inference
engine to derive conclusions from the knowledge base.
o Explanation System: Provides insights into how the system arrived at a
particular decision, allowing the user to understand the reasoning process.

49 | P a g e
• How Expert Systems Are Used:
o Expert systems produce possible solutions by simulating human expertise in
specific domains. The inference engine applies rules to the knowledge base
and uses logical deductions to suggest the most appropriate solutions to a
given scenario.
o For example, in medical diagnosis, symptoms entered by a user can trigger
the system to run through its knowledge base, applying the rules to identify
possible conditions.

6.9 Computers in the Retail Industry

Computers in the Retail Industry

• Point of Sale (POS) Terminals:


o Characteristics: Devices used by retailers to complete sales transactions,
including hardware like barcode scanners, receipt printers, and software to
manage sales.
o Uses: Record sales, process payments, and update stock automatically.
o Advantages:
▪ Automation: POS systems speed up transaction processing, reduce
human error, and update inventory in real time.
▪ Integration: POS systems can be integrated with other store
management systems to streamline processes such as stock
management, sales reports, and customer data collection.
o Disadvantages:
▪ System Failures: If the POS system malfunctions, it can halt sales,
leading to lost revenue.
▪ Training Required: Employees need training to efficiently use POS
systems, and improper handling can lead to errors.
• Electronic Funds Transfer at Point of Sale (EFTPOS) Terminals:
o Characteristics: EFTPOS systems allow payment using credit or debit cards,
with a secure connection to the bank to verify transactions.
o Uses:
▪ Card Validation: Verifies the authenticity of the card and checks the
validity of the user’s account.
▪ Chip and PIN: Ensures secure transactions by requiring the
cardholder to enter a PIN when making a payment.
▪ Contactless Payments: Supports payment methods like NFC (Near
Field Communication) for quick and easy payments by tapping cards
or smartphones.
o Advantages:
▪ Convenience: Reduces the need for cash, allowing customers to
make fast, secure payments.

50 | P a g e
▪ Speed: Fast transaction processing compared to traditional
methods.
o Disadvantages:
▪ Security Risks: Fraudulent activities like card cloning or skimming can
occur if systems are not adequately protected.
▪ Technical Problems: Connectivity issues or malfunctions may hinder
payment processing.
• Internet Shopping:
o Characteristics: Online shopping platforms where customers can browse
products, make purchases, and arrange for delivery or pickup.
o Advantages:
▪ Convenience: Customers can shop anytime and anywhere, with the
option for home delivery.
▪ Variety: Online stores offer a wider selection of products compared
to traditional brick-and-mortar stores.
o Disadvantages:
▪ Shipping Costs: Some products may come with high delivery fees.
▪ Lack of Physical Interaction: Customers cannot physically examine
products, leading to the risk of receiving items that do not meet
expectations.
▪ Security Concerns: Online transactions involve sharing sensitive
data, which can be at risk if the website is not secure.

6.10 Recognition Systems

Recognition Systems

• Optical Mark Recognition (OMR):


o Characteristics: Technology used to scan and recognize marks on
documents, such as answers on a multiple-choice exam sheet.
o Uses: Commonly used for scanning examination papers, attendance
registers, and surveys.
o Advantages:
▪ Speed: OMR systems can quickly process large amounts of forms,
making them ideal for exams or surveys.
▪ Accuracy: Reduces human error in reading and interpreting marks on
paper.
o Disadvantages:
▪ Limited to Specific Formats: OMR systems can only recognize
predefined mark shapes (e.g., circles or checkboxes).
▪ Susceptible to Errors: Misaligned marks or faint pencil marks can
cause errors.
• Optical Character Recognition (OCR):

51 | P a g e
o Characteristics: OCR systems convert printed or handwritten text into
digital format by scanning documents.
o Uses: Used in document digitization, license plate recognition (ANPR), and
data extraction from scanned forms.
o Advantages:
▪ Efficiency: Enables quick digitization of documents and allows text-
based searching.
▪ Versatility: Can read both printed and handwritten text.
o Disadvantages:
▪ Accuracy Issues: Handwritten text or poor-quality scans may result in
incorrect recognition.
▪ Complex Layouts: OCR struggles with documents that have complex
formatting or non-standard fonts.
• Radio Frequency Identification Device (RFID):
o Characteristics: RFID uses radio waves to identify objects, such as inventory
items or vehicles, by scanning tags attached to them.
o Uses: Common in retail for inventory management, as well as in contactless
payment systems and tracking assets like passports and automobiles.
o Advantages:
▪ Automation: RFID enables automatic identification, reducing the
need for manual data entry.
▪ Efficiency: Can track multiple items at once, improving inventory
management speed.
o Disadvantages:
▪ Privacy Concerns: RFID tags can be read without the owner’s
knowledge, raising security and privacy issues.
▪ Cost: Initial setup of RFID systems can be expensive for businesses.
• Near Field Communication (NFC):
o Characteristics: NFC is a short-range wireless technology used for
contactless communication between devices, such as smartphones and
payment terminals.
o Uses: Common in mobile payment systems, ticketing, and data transfer
between devices.
o Advantages:
▪ Convenience: Quick and easy to use for payments and data
exchange, with no need to open apps or cards.
▪ Security: Typically more secure than magnetic stripe cards because
of encryption and authentication methods.
o Disadvantages:
▪ Range: NFC works only within a very short distance, limiting its use to
close proximity transactions.
▪ Compatibility: Not all devices or payment terminals support NFC.
• Biometric Recognition:
o Characteristics: Biometric recognition systems identify individuals based on
unique physical or behavioral traits.
o Types:

52 | P a g e
▪ Face Recognition: Identifies individuals by analyzing facial features.
▪ Iris/Retina Scanning: Identifies individuals based on patterns in their
eyes.
▪ Fingerprint/Thumbprint Recognition: Uses the unique patterns in
fingerprints to identify individuals.
▪ Voice Recognition: Identifies individuals by the sound and pattern of
their voice.
▪ Hand Geometry: Uses the shape and size of the hand for
identification.
o Advantages:
▪ High Security: Biometric data is difficult to replicate, offering a higher
level of security.
▪ Convenience: Quick and easy to use, especially for authentication.
o Disadvantages:
▪ Privacy Concerns: Biometric data is sensitive, and its misuse can lead
to privacy violations.
▪ Cost: Biometric systems can be expensive to implement, requiring
specialized hardware and software.

6.11 Satellite Systems

• GPS: Provides location and time info; accurate, global; affected by weather.
• Satellite Navigation: Offers directions; real-time, worldwide; requires satellite
signal.
• GIS: Maps and analyzes spatial data; useful for planning; expensive and data-
dependent.
• Satellite TV: Broadcasts TV globally; wide coverage, high quality; requires dish,
weather-sensitive.
• Satellite Phone: Communication in remote areas; global; expensive, slower
connections.

53 | P a g e
Section 7: The system life cycle

7.1 Analysis

• Analysis of the Current System:


o Purpose: Understand the existing system to identify problems and areas for
improvement.
o Methods:
▪ Observation: Directly watching system use, helpful in identifying
issues in real-time.
▪ Interviews: Gathering insights from users or stakeholders about
system issues and needs.
▪ Questionnaires: Collecting standardized data from users about the
system’s performance.

54 | P a g e
▪ Examination of Existing Documents: Reviewing current reports, user
manuals, and system records.
o Advantages and Disadvantages:
▪ Advantages: Provides user feedback, uncovers hidden issues.
▪ Disadvantages: Time-consuming, potential biases in responses.
• Recording and Analyzing Information:
o Collect data on system inputs (data entered into the system), outputs
(results generated), and processing (how data is handled).
• Identifying Problems:
o Problems in Current System: Bottlenecks, inefficiencies, security issues,
etc.
o User & Information Requirements: Understand user needs and the
necessary data for the new system.
• System Specification:
o Define the hardware and software required for the new system, ensuring it
meets performance, security, and scalability needs.

7.2 Design

• Designing the New System:


o Design File/Data Structures: Plan how data will be organized. This includes
field length, field names, and data types.
▪ Example: “Gender” field with possible values “M” for Male, “F” for
Female.
• Input Formats:
o Define how data will be captured (e.g., forms, surveys, user input methods).
• Output Formats:
o Determine how the results will be presented (e.g., screen layouts, printed
reports, dashboards).
• Validation Routines:
o Ensure data accuracy and integrity with various checks:
▪ Range Check: Ensures values are within a specified range (e.g., age
between 18-65).
▪ Character Check: Verifies input contains only acceptable characters
(e.g., no digits in a name).
▪ Length Check: Confirms data fits within the expected length (e.g.,
phone number 10 digits).
▪ Type Check: Ensures the correct type of data (e.g., numbers in an age
field).
▪ Format Check: Ensures data is in the correct format (e.g., date as
YYYY-MM-DD).
▪ Presence Check: Verifies required fields are filled.

55 | P a g e
▪ Check Digit: A validation system to detect errors in entered numerical
data (e.g., credit card number validation).

56 | P a g e
7.3 Development and Testing

• Need to Test the System Before Implementation:


o Testing ensures the system functions as expected and helps identify issues
before full deployment.
o Importance: Prevents system failures, reduces downtime, and improves
system quality.
• Test Designs:
o Test Data: Data used during testing to verify system behavior.
o Expected Outcomes: The anticipated results based on test data.
o Actual Outcomes: Results observed after running tests.
o Remedial Action: Actions taken to correct issues or discrepancies found
during testing.
• Test Strategies:
o Module Testing: Testing individual components (modules) of the system.
o Function Testing: Verifying that each function performs as expected.
o System Testing: Testing the entire system to ensure all components work
together seamlessly.
• Types of Test Data:
o Normal Data: Data that falls within the expected operating range (e.g., a valid
age input for a form).
o Abnormal Data: Data that falls outside the expected range (e.g., a negative
age or invalid input).
o Extreme Data: Data that is at the boundary of acceptable input (e.g.,
maximum allowed age or value).
• Live Data:
o Real-world data used in testing after the system has been tested with
simulated data.
o Ensures the system works in an operational environment with actual data
inputs.

7.4 Implementation

• System Implementation:
o Direct Changeover: Replacing the old system with the new one immediately.
▪ Advantages: Quick implementation, cost-effective.
▪ Disadvantages: High risk of system failure or user errors during
transition.
o Parallel Running: Running both the old and new systems simultaneously for a
period.
▪ Advantages: Reduced risk, allows comparison between systems.
▪ Disadvantages: Higher costs due to operating both systems,
potential confusion for users.

57 | P a g e
o Pilot Running: Implementing the new system for a small group of users first,
before a full rollout.
▪ Advantages: Testing in a real environment with minimal risk, easy
identification of issues.
▪ Disadvantages: Limited initial feedback, potential delay in full
implementation.
o Phased Implementation: Implementing the new system in stages or
modules.
▪ Advantages: Easier to manage, allows feedback at each stage.
▪ Disadvantages: Delayed full implementation, potential issues
between old and new systems during transition.

7.5 Documentation

• Technical Documentation:
o Purpose: To provide detailed technical information about the system for
developers and IT professionals.
o Components:
▪ System/Program Purpose: Describes the system’s overall objective
and functionality.
▪ Limitations: Details any restrictions or constraints of the system.
▪ Program Listing: The actual code used for the system.
▪ Program Language: The programming language(s) used.
▪ Program Flowcharts/Algorithms: Diagrams and logical steps
explaining how the system works.
▪ System Flowcharts: Diagrams showing how different components of
the system interact.
▪ Hardware and Software Requirements: Specifies the hardware and
software needed to run the system.
▪ File Structures: Describes how data is organized and stored.
▪ List of Variables: Defines variables used in the system and their
purpose.
▪ Input Format: Describes the format of data entered into the system.
▪ Output Format: Describes the format of data produced by the
system.
▪ Sample Runs/Test Runs: Examples of data processing with expected
outputs.
▪ Validation Routines: Describes the checks in place to ensure data
integrity.
• User Documentation:
o Purpose: To guide end-users in using the system effectively.
o Components:
▪ System Purpose: Describes what the system is and what it does.

58 | P a g e
▪ Limitations: Lists any restrictions or limitations of the system for the
user.
▪ Hardware and Software Requirements: Outlines the system
requirements for the user.
▪ How to Load/Run/Install: Step-by-step instructions for setting up
and using the system.
▪ How to Save a File: Instructions on how to store data generated by
the system.
▪ How to Print Data: Guide on printing reports or documents from the
system.
▪ How to Add/Delete/Edit Records: Instructions on managing data in
the system.
▪ Input Format: Specifies acceptable data formats for user input.
▪ Output Format: Describes the format of the system’s output.
▪ Sample Runs: Examples of typical use cases and expected
outcomes.
▪ Error Messages: Common error messages and troubleshooting tips.
▪ Error Handling: Explains how to resolve common system errors.
▪ Troubleshooting Guide/Helpline: Offers support for resolving user
issues.
▪ Frequently Asked Questions (FAQ): Provides answers to common
user queries.
▪ Glossary of Terms: Defines technical terms and jargon used in the
system.

7.6 Evaluation

• Evaluate a Solution:
o Assess the efficiency, ease of use, and suitability of the solution.
• Comparison with Task Requirements:
o Compare the solution with initial requirements to identify limitations.
• User Feedback:
o Evaluate user responses from system testing to identify areas for
improvement.

59 | P a g e
60 | P a g e
Section 8: Safety and Security
8.1 Physical Safety

• Safety Issues:
o Electrocution:
▪ Spilling drinks near electrical equipment or touching live wires can
lead to electrocution.
o Fire Hazards:
▪ Overloaded electrical sockets or overheating equipment can cause
fires.
o Tripping Hazards:
▪ Cables trailing on the floor or poorly secured can lead to tripping
accidents.
o Heavy Equipment:
▪ Heavy equipment that is not properly secured can fall and cause
injuries.
• Prevention Strategies:
o Keep liquids away from electrical equipment to prevent spills and
electrocution.
o Avoid overloading electrical sockets and use appropriate surge protectors
to prevent fires.
o Tidy and secure cables to reduce tripping hazards.
o Ensure that heavy equipment is placed securely and cannot fall to prevent
injuries.

8.2 eSafety

• Data Protection:
o Purpose of Data Protection Acts:
▪ Data protection laws are in place to ensure personal data is not
misused, stolen, or disclosed without consent.
▪ These laws regulate how organizations should collect, store, and
process personal information.
• Personal Data:
o Sensitive Data:
▪ Includes information such as full names, addresses, date of birth,
medical history, photographs, and other private details.
o Confidentiality:
▪ Personal data must be kept confidential to prevent unauthorized
access and inappropriate disclosure.
▪ It is essential that individuals and organizations respect and protect
personal data to maintain privacy and security.
• eSafety:

61 | P a g e
o The concept of eSafety emphasizes the importance of maintaining safety
and privacy while using digital technologies such as the internet, email, social
media, and online gaming.
• Internet Safety:
o Only use trusted websites, especially those recommended by teachers or
parents.
o Use age-appropriate search engines or settings that limit access to safe
content.
o Be cautious about sharing personal information and use websites that are
secure.
• Email Safety:
o Be aware of the risks of opening emails from unknown senders as they might
contain malicious content.
o Do not send or reply with personal identifiable information (PII) or images, as
this can expose you to risks like identity theft.
• Social Media Safety:
o Blocking and Reporting: Learn how to block or report unwanted or abusive
users.
o Meeting Online Contacts: Be aware of the potential dangers of meeting
someone online in person.
o Inappropriate Content: Avoid posting inappropriate images, language, or
content that could harm your reputation or the safety of others.
o Confidentiality: Respect other people’s privacy and do not share their
personal data or images without consent.
• Online Gaming Safety:
o Anonymity: Avoid using your real name or sharing personal details while
playing online games.
o Financial/Personal Information: Do not provide any personal or financial
information, such as credit card details, in online gaming environments.
o Secure Platforms: Ensure the gaming platform is secure and has proper
privacy policies in place.

62 | P a g e
8.3 Security of Data

Threats to Data

• Hacking:
o Definition: Unauthorized access to computer systems or networks to steal,
alter, or delete data.
o Protection Measures:
▪ Use of strong passwords, multi-factor authentication (MFA),
encryption, firewalls, and security software.
▪ Regular system updates to fix vulnerabilities.
▪ Awareness training to recognize phishing and social engineering
attacks.
• Phishing:

63 | P a g e
o Definition: Fraudulent attempts to acquire sensitive information by
pretending to be a trustworthy entity, typically through emails or websites.
o Prevention:
▪ Be cautious of unsolicited emails and do not click on suspicious links.
▪ Verify the source of emails by checking official websites or calling
directly.
▪ Use anti-phishing filters in email systems.
• Pharming:
o Definition: Redirecting users from legitimate websites to fraudulent ones
without their knowledge, often for credential theft.
o Prevention:
▪ Use updated anti-virus and anti-malware software.
▪ Ensure websites are accessed via HTTPS (check for secure
connection) and look out for unusual URL patterns.
▪ Keep system and browser security up to date.
• Smishing:
o Definition: Similar to phishing, but using SMS messages to trick people into
revealing personal information or downloading malicious software.
o Prevention:
▪ Avoid clicking on links or responding to unsolicited SMS messages.
▪ Be wary of messages that urge urgent action or ask for personal
details.
• Vishing:
o Definition: Voice phishing, where attackers use phone calls to impersonate
legitimate organizations or authorities to steal personal information.
o Prevention:
▪ Never give out personal information over the phone unless you’re sure
of the caller’s identity.
▪ Verify any requests by calling the organization directly using official
contact details.
• Viruses and Malware:
o Definition: Malicious software (viruses, worms, ransomware) that can
damage, corrupt, or steal data from systems.
o Preventative Action:
▪ Install and regularly update anti-virus and anti-malware software.
▪ Avoid downloading files from untrusted sources or opening email
attachments from unknown senders.
▪ Perform regular system scans.
• Card Fraud:
o Types:
▪ Shoulder Surfing: Watching someone enter their PIN or card details in
public spaces.
▪ Card Cloning: Duplicating data from the magnetic stripe of a card to
create a counterfeit card.
▪ Keylogging: Malicious software that records keystrokes to capture
personal information, including credit card details.

64 | P a g e
o Prevention:
▪ Be aware of your surroundings when entering sensitive information.
▪ Use RFID-blocking wallets or sleeves to protect card data.
▪ Avoid using public or unsecured Wi-Fi for financial transactions.
▪ Regularly monitor bank statements for unauthorized transactions.

Protection of Data

• Biometrics:
o Definition: Using unique physical characteristics (fingerprints, facial
recognition, retina scans) to authenticate users.
o Protection: Provides an added layer of security by linking access to an
individual’s physical traits, reducing the risk of impersonation.
• Digital Certificate:
o Definition: An electronic document that proves the ownership of a public
key and helps establish trust between parties in online communications.
o Contents: Public key, owner’s details, certificate authority (CA) information,
and expiration date.
o Purpose: Ensures the authenticity of websites and encrypts
communications between the client and server.
• Secure Socket Layer (SSL):
o Definition: A security protocol used to establish an encrypted link between a
web server and a browser.
o Purpose: SSL ensures that sensitive data like login credentials, credit card
information, and personal details are encrypted and secure while
transmitted over the internet.
o Identification: Websites with SSL encryption have "https://" in the URL, and
often display a padlock icon in the browser address bar.
• Encryption:
o Definition: The process of converting data into a code to prevent
unauthorized access.
o Purpose:
▪ Protects data stored on hard drives, cloud storage, and during
transmission over the internet (e.g., email, HTTPS websites).
▪ Ensures that even if data is intercepted, it cannot be read without the
decryption key.
• Firewall:
o Definition: A security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
o Purpose: Prevents unauthorized access to or from a private network,
protecting data from external attacks.
• Two-Factor Authentication (2FA):
o Definition: A security process that requires two forms of identification
before granting access to an account.

65 | P a g e
o Purpose: Enhances security by requiring both something you know
(password) and something you have (e.g., mobile phone for verification
codes).
o Example: Entering a password followed by a one-time code sent to a mobile
device.
• User ID and Password:
o Definition: The most common form of authentication where a user provides a
unique identifier (user ID) and a secret password.
o Purpose: Ensures that only authorized individuals can access protected data
or systems.
o Best Practices:
▪ Use complex and unique passwords for each account.
▪ Regularly change passwords and avoid sharing them.
▪ Implement a password manager to store and generate secure
passwords.

66 | P a g e
Section 9: Audience
9.1 Audience Appreciation

• Understanding Audience Needs:


o When creating ICT solutions, it is important to consider the audience’s
needs, preferences, and abilities. This helps in designing user-friendly
solutions that are engaging and effective.
o Analyze the audience’s technical capabilities, age, interests, and context
(e.g., a school, business, or general public) to ensure the solution is
appropriate.
• Planning ICT Solutions:
o Plan ICT solutions that cater to the audience's expectations and respect their
requirements.
o Ensure the language, tone, and design are tailored to the audience.
o Consider accessibility features (e.g., text size, contrast, and alt text) to make
sure the solution is usable by everyone, including those with disabilities.
• Audience-Centered Design:
o Develop solutions with a clear sense of purpose. Whether the goal is to
inform, entertain, or engage, ensure the content and features of the solution
match the purpose and audience’s needs.
o Regular feedback from the audience during the development phase can
improve the solution’s effectiveness and satisfaction.

67 | P a g e
9.2 Copyright

• Importance of Copyright:
o Copyright protects the intellectual property rights of creators, preventing
unauthorized use or reproduction of their work.
o In the context of ICT, copyright is especially relevant for software, digital
content (images, music, videos), and designs. Without copyright protection,
creators lose control over how their works are distributed or altered.
• Principles of Copyright in Software:
o Software Piracy: Using or distributing software without permission or
without paying for it is illegal and violates copyright law. This includes
downloading pirated software or using cracked versions.
o Ownership: The original creator or the entity that purchased the copyright
owns the exclusive rights to use, distribute, and modify the software.
• Methods to Prevent Copyright Violation:
o Licensing: Software producers often use licenses that specify how their
software can be used, such as single-user licenses or site-wide licenses for
businesses.
o Digital Rights Management (DRM): DRM tools limit the use, sharing, and
copying of digital content to protect copyright.
o Product Activation: Some software requires activation via a product key,
ensuring that the software is being used legally.
o Encryption: Some software programs use encryption to prevent
unauthorized modification or distribution.

68 | P a g e
Section 10: Communication

10.1 Communication with Other ICT Users Using Email

Characteristics, Uses, and Constraints of Email Communication

• Email Overview:
o Definition: Email (electronic mail) allows users to send messages and files
through the internet.

69 | P a g e
o Uses: It's commonly used for professional, personal, and educational
communication. It allows easy sharing of text, files (attachments), and
multimedia.
• Constraints:
o Security: Email communication can be vulnerable to hacking, phishing, and
malware attacks. Therefore, ensuring security through strong passwords,
anti-virus software, and encryption is vital.
o Netiquette: Netiquette refers to the accepted norms for online
communication. This includes using polite language, avoiding ALL CAPS
(which can seem like shouting), and not spamming inboxes with excessive
emails.
o Employer Guidelines: Some companies have email policies to prevent
inappropriate use, such as sending personal emails during work hours or
sending confidential information insecurely.
• Key Features:
o Carbon Copy (CC): Sends a copy of the email to additional recipients
besides the main recipient. All recipients can see the CC list.
o Blind Carbon Copy (BCC): Sends a copy of the email to additional recipients
without showing their email addresses to others.
o Forward: Allows users to send an email to new recipients after it has been
received.
o Attachments: Files (documents, images, etc.) that can be sent along with the
email. Always ensure the attachment is safe and virus-free.

Spam Email:

• Characteristics:
o Spam refers to unsolicited and often irrelevant or inappropriate messages
sent to a large number of users, typically for advertising purposes. It can be
harmful by spreading viruses, malware, or phishing schemes.
• Prevention Methods:
o Spam Filters: Many email services have built-in spam filters to detect and
block spam messages.
o Do Not Respond: Never respond to suspicious emails or click on links in
spam emails.
o Email Verification: Verify the email address of the sender and be cautious of
unfamiliar addresses.
o Marking as Spam: Mark emails as spam to help improve the accuracy of
spam filters.

70 | P a g e
The Internet

Characteristics, Uses, Advantages, and Disadvantages

• Definition: The internet is a global network of computers that facilitates


communication and access to information across the world.
o Uses: It supports various activities such as research, entertainment, social
networking, online shopping, and communication.
• Advantages:
o Global Connectivity: Instant communication and access to information
globally.
o Access to Services: Online banking, shopping, entertainment, and learning.
o Collaboration: Tools like email, forums, and social media promote
collaboration.
• Disadvantages:
o Security Risks: The internet can be a platform for cyberattacks, identity
theft, and phishing.
o Inappropriate Content: Exposure to harmful material like violence, hate
speech, or explicit content.
o Addiction: Excessive internet use can negatively impact mental and physical
health.

Differences Between Internet, Intranet, Extranet, and WWW

• Internet: A global network connecting millions of computers worldwide, providing


access to all types of information.
• Intranet: A private network, typically used within an organization, which is only
accessible to authorized users.
• Extranet: A private network that allows controlled access to external users or
organizations, often used for business-to-business communication.
• World Wide Web (WWW): A system of interlinked hypertext documents accessed
via the internet using a web browser.

Web Tools:

• Blog: An online platform for posting articles or content, often used for personal or
business purposes.
• Forum: An online discussion site where users can post questions, answers, and
share information.

71 | P a g e
• Wiki: A collaborative website where users can add and modify content (e.g.,
Wikipedia).
• Social Networking: Platforms like Facebook, Twitter, and LinkedIn, where users
connect and share content.

Internet Functionality:

• Internet Service Provider (ISP): A company that provides users with access to the
internet.
• Web Address (URL): A uniform resource locator is the address of a web page on the
internet (e.g., https://www.example.com).
• Hyperlink: A link embedded in a webpage that leads to another web page or
resource.
• Web Browser: A program (e.g., Chrome, Firefox) used to navigate and view
websites.

Using a Search Engine:

• Speed of Searching: Search engines help users find relevant information quickly.
• Amount of Information: Search engines index millions of web pages, providing a
vast range of results.
• Ease of Finding Reliable Information: While search engines provide a lot of
information, it’s important to assess the credibility and accuracy of the sources.

Evaluating Internet Information:

• Up-to-Date: Ensure the information is current and relevant.


• Reliable: Check the authority of the source. Prefer trusted sources like government,
educational institutions, and reputable organizations.
• Biased: Be cautious of content that may have a particular agenda or viewpoint.
• Valid: Ensure the information is accurate and fact-based.

Internet Protocols:

• HTTP: HyperText Transfer Protocol is the standard used to transfer and display web
pages.
• HTTPS: A secure version of HTTP that encrypts data exchanged between the user
and the server.
• FTP: File Transfer Protocol used for transferring files between computers over a
network.

72 | P a g e
• SSL: Secure Socket Layer is a protocol used to secure communications over the
internet by encrypting data.

Risks of Using the Internet:

• Inappropriate and Criminal Material: The internet can be a medium for illegal
activities or exposure to harmful content.
• Parental, Educational, and ISP Control: Parents, schools, and ISPs can restrict
internet usage, block harmful sites, and protect children or employees from
unwanted exposure.

Conclusion:

Understanding how the internet works, its risks, and the necessary tools and
precautions can help ensure safe and efficient use for communication, information
retrieval, and entertainment.

73 | P a g e
Section 11: File Management
11.1 Manage Files Effectively

• Locating Stored Files:


o Search Functions: Use built-in search tools in operating systems to quickly
locate files by name, type, or content.
o Directory/Folders: Ensure a structured and organized folder hierarchy to
make file retrieval efficient.
• Opening and Importing Files:
o Opening Files: Files can be opened using appropriate applications based on
their formats (e.g., Word for .docx, Excel for .xlsx).

74 | P a g e
o Importing Files: Files from other sources can be imported into software
(e.g., importing a CSV file into Excel).
• Saving Files in a Structured Directory:
o Directory/Folders: Create a logical and hierarchical structure for saving files
(e.g., by project, date, or file type).
o Naming Files: Use descriptive and consistent file names for easy
identification and retrieval.
o Organized Folders: Store files under appropriate folders to maintain
organization (e.g., "Reports" folder, "Images" folder).
• Saving and Printing Files in Different Formats:
o Documents: Save documents in formats such as .docx, .doc, or .pdf based
on the need for editing or sharing.
o Screenshots: Save as image files (.jpg, .png).
o Reports/Data Tables: Save database reports as .xls, .xlsx, .csv, or .pdf.
o Web Pages: Save web pages in HTML or browser view (.html, .htm) or as
screenshots.
• File Formats for Application Packages:
o Common Formats:
▪ Word: .docx, .doc
▪ Excel: .xlsx, .xls
▪ Database: .accdb, .odb, .sdb, .sdc
▪ PowerPoint: .pptx, .ppt
▪ Rich Text: .rtf
o Exporting Files: Files can be exported to specific formats required by the
software (e.g., .docx for Word documents, .xlsx for spreadsheets).
• Generic File Formats:
o Common Generic Formats:
▪ .csv: Comma-separated values, used for data storage in tables.
▪ .txt: Plain text format.
▪ .pdf: Portable Document Format, often used for printable
documents.
▪ .css: Cascading Style Sheets, used for website styling.
▪ .html/.htm: Web page files.
▪ .jpg/.png: Image formats.
o Purpose of Generic Formats: These formats ensure compatibility across
different systems and applications, making sharing and opening files easier.

11.2 Reduce File Sizes for Storage or Transmission

• File Compression:
o Why Compress Files?:
▪ Storage: Reducing file size can save disk space.
▪ Transmission: Smaller files are faster to upload and download,
especially over slow internet connections.
o File Compression Formats:

75 | P a g e
▪ .zip: A widely used compression format that packages files into a
single compressed file.
▪ .rar: Another compression format similar to .zip, offering efficient
compression but requires specific software to open.
o Compression Tools: Many operating systems have built-in tools for
compressing files, or third-party software like WinRAR or 7-Zip can be used.
• Benefits of Compression:
o Efficient Storage: Compressing files reduces their size, making them easier
to store.
o Faster Transfer: Compressed files take less time to transmit via email or
cloud storage.

File Formats: Characteristics and Uses

• Common File Formats:


o .csv: Used for storing data in a table format, ideal for importing/exporting
data between different systems (e.g., spreadsheets, databases).
o .gif: A format used for simple graphics and animations.
o .htm/.html: Web page files used for creating websites.
o .jpg/.png: Image file formats; .jpg is widely used for photographs, while
.png supports transparency.
o .pdf: A document format that preserves the layout and formatting, widely
used for sharing professional documents.
o .rtf: Rich Text Format, a text file format that supports basic text formatting
(bold, italics).
o .txt: Plain text format with no special formatting, suitable for storing simple
text data.
o .zip/.rar: Compressed file formats to reduce file size for storage or
transmission.

76 | P a g e
Section 12: Images
Placing and Editing Images

• Placing an Image with Precision:


o Positioning: Images can be placed exactly where needed in a document,
slide, or webpage. Tools allow for fine adjustments to align images with text,
tables, or other elements.
o Text Wrapping: Adjust the image's alignment with surrounding text, such as
"in-line," "square," or "tight."
• Resizing an Image:
o Aspect Ratio: When resizing an image, it's essential to maintain the aspect
ratio to avoid distortion. Holding the shift key while resizing helps maintain
this ratio.
o Custom Sizes: Resize images to specific dimensions (e.g., 200x300 pixels)
without distorting their proportions, ensuring clarity and correct
presentation.
• Cropping an Image:
o Crop Tool: Used to remove unwanted sections of an image, focusing on the
most important part. This can be done manually or using preset aspect ratios
(e.g., square, 16:9).
o Precision: Cropping tools often allow for fine adjustments, ensuring the
image fits the intended layout.
• Rotating an Image:

77 | P a g e
o Rotation: Rotate an image by a specific angle (e.g., 90°, 180°) to fit the
design or presentation needs.
o Free Rotation: Most image editing tools also allow free rotation for precise
alignment.
• Reflecting (Flipping) an Image:
o Horizontal Flip: Mirrors the image along the vertical axis, making it a
reflection of the original.
o Vertical Flip: Mirrors the image along the horizontal axis, useful for symmetry
or creating mirrored designs.
• Adjusting Image Brightness:
o Brightness: Increasing brightness lightens the image, while decreasing it
darkens the image. This can help improve visibility or mood based on design
requirements.
• Adjusting Image Contrast:
o Contrast: Increasing contrast makes dark areas darker and light areas
lighter, which can enhance image details. Reducing contrast softens the
image for a gentler look.
o Applications: Contrast adjustments can help make images stand out more
or blend seamlessly with other elements in a composition.
• Grouping and Layering Images:
o Grouping: Multiple images can be grouped together to make them act as a
single unit, allowing for easier resizing, moving, or formatting.
o Ungrouping: If changes need to be made to individual elements, groups can
be ungrouped.
o Layering: Arrange images in layers, moving an image to the front or back of
other elements. This is useful in designs where multiple visual elements
overlap.

File Size Reduction

• Reducing Image Resolution:


o Resolution: Lowering the resolution of an image reduces its file size, making
it more suitable for web use or sharing. However, this can affect the quality of
the image, particularly in printed material.
o Common Resolutions: For web images, 72 DPI (dots per inch) is often
sufficient, while print images typically require 300 DPI for high quality.
• Reducing Image Colour Depth:
o Colour Depth: Reducing the number of colours in an image can lower its file
size. This is particularly effective for images with large areas of solid colours
or simple graphics.
o File Formats: Switching to formats like GIF or PNG-8 (8-bit colour) reduces
file sizes compared to high-resolution PNG or JPEG formats, which support
millions of colours.

78 | P a g e
79 | P a g e
Section 13: Layout
13.1 Create or Edit a Document

• Create a New Document or Edit an Existing Document:


o Creating a Document: Open the relevant software (e.g., word processor,
spreadsheet) and start a blank document or choose a template to work
from.
o Editing a Document: Open an existing document to make changes, such as
adding, deleting, or updating text and data.
• Enter and Modify Text and Numbers with Accuracy:
o Text Entry: Type text accurately, ensuring correct spelling, grammar, and
formatting.
o Numbers Entry: When working with numerical data, ensure accuracy in entry,
especially for formulas or calculations.
o Number Formatting: Use appropriate formats for numbers, such as
currency, percentage, date, etc.
• Editing Techniques:
o Highlight: Select text or data by clicking and dragging to highlight, enabling
easier manipulation of the content.
o Delete: Remove unwanted text, numbers, or objects from the document.
o Move: Relocate text or objects from one area of the document to another by
cutting and pasting or dragging.
o Cut, Copy, Paste:
▪ Cut: Remove text or objects from one part of the document to place
them elsewhere.
▪ Copy: Duplicate text or objects so they can be placed in another
location.
▪ Paste: Place cut or copied items into a new location within the
document.
o Drag and Drop: Directly move text or objects by dragging them and
dropping them into the desired location.
• Place Objects into the Document:
o Types of Objects: Insert elements such as:
▪ Text from other documents.
▪ Images, screenshots, shapes, and charts.
▪ Tables, graphs, or charts.
▪ Extracts from spreadsheets or databases.
o Sources: These objects can be inserted from files, copied from other
applications, or created within the document itself.
• Wrap Text Around Objects:
o Text Wrapping Styles:
▪ Above/Below: Text appears above or below the inserted object.
▪ Square: Text wraps around the object's outer boundary, making it
flow neatly around the object.

80 | P a g e
▪ Tight: Text hugs the shape of the object tightly, ensuring no gaps
around it.

13.2 Tables

• Create a Table with Specified Rows and Columns:


o Table Creation: Insert a table with the required number of rows and columns.
The software typically allows you to define the size or choose from
predefined table templates.
o Custom Table Sizes: Add or remove rows and columns based on the content
requirements.
• Place Text or Objects in a Table:
o Content Placement: Enter text, numbers, or even objects (e.g., images or
charts) into the cells of a table.
o Cell Management: Ensure content is organized logically within the cells for
clarity.
• Edit a Table and its Contents:
o Insert/Delete Rows/Columns: Add or remove rows and columns to adjust
the table's structure as needed.
o Merge Cells: Combine two or more adjacent cells into one larger cell, which
is useful for headings or special formatting.
o Split Cells: Divide a cell into smaller ones when additional organization is
needed.
• Format a Table:
o Cell Alignment:
▪ Horizontal Alignment: Align content in a cell to the left, right, or
center.
▪ Vertical Alignment: Align content at the top, middle, or bottom of the
cell.
o Gridlines: Choose whether to display gridlines around the table or hide them
for a cleaner look.
o Text Wrapping: Enable text to wrap within a cell, making it fit neatly in smaller
cell sizes.
o Shading/Coloring Cells: Apply color or shading to cells to differentiate rows,
columns, or categories.
o Adjust Row Height and Column Width: Fine-tune the row height and column
width to ensure the table is properly spaced and easy to read.

13.3 Headers and Footers

• Use Headers and Footers Appropriately:


o Create or Edit Headers/Footers: Insert a header (appears at the top of the
page) and/or footer (appears at the bottom of the page). These are used for
repeated information such as page numbers, document titles, or dates.
• Align the Contents of the Header and Footer:

81 | P a g e
o Alignment Options: Align content to the left margin, center, or right margin
depending on the document’s formatting needs.
o Consistency: Ensure the header and footer align consistently across all
pages in the document.
• Place Text and Automated Objects in Headers and Footers:
o Text: Common elements like titles, author names, or section names.
o Automated Objects:
▪ Page Numbering: Insert automatic page numbers that update
dynamically.
▪ Date/Time: Insert the current date and time, updating automatically
when the document is printed or opened.
▪ Total Pages: Include the total number of pages in the document,
ensuring it updates as the document changes.

Purpose of Headers and Footers:

• Headers: Used to display important repetitive information, such as document titles,


chapter names, or author names.
• Footers: Commonly used to show page numbers, copyright information, or other
relevant data that is needed at the end of every page.

82 | P a g e
Section 14: Styles
Create, Edit, and Apply Styles

• Create Styles:
o Purpose: Styles help maintain consistent formatting throughout a
document. By defining a style, you can quickly apply it to different sections
without manually adjusting formatting each time.
o Steps:
▪ Select a text segment (e.g., title, heading, paragraph).
▪ Define the desired formatting options.
▪ Save the formatting settings as a custom style (e.g., "Heading 1",
"Body Text").
• Edit Styles:
o Modify Existing Styles: If you need to change the formatting of all text using
a particular style, modify the style itself rather than editing each occurrence.
o Update Styles: When formatting a document, update the style if changes
are made to text formatting (font size, color, etc.), ensuring uniformity.
• Apply Styles:
o Once a style is defined, it can be quickly applied to text, paragraphs, or
sections, ensuring consistency across the document.
o Application: Select the text or paragraph, then choose the appropriate style
from the style menu.

Font Formatting

• Font Face: The type of font used (e.g., Arial, Times New Roman, Calibri).

83 | P a g e
• Font Type:
o Serif: Fonts with small lines or decorations at the ends of characters (e.g.,
Times New Roman).
o Sans-serif: Fonts without these decorative lines (e.g., Arial).
• Font Size: Determines the size of the text, usually measured in points (pt).
• Font Color: Change the color of the text to match branding, design, or preference.

Text Alignment

• Left Align: Aligns text to the left margin.


• Right Align: Aligns text to the right margin.
• Center Align: Centers text within the page or section.
• Justify: Aligns text to both the left and right margins, adding space between words
to fill the line.

Text Enhancement

• Bold: Makes text thicker, often used for emphasis.


• Underline: Draws a line beneath the text, used for emphasis or highlighting.
• Italic: Slants the text to the right, commonly used for emphasis, titles, or foreign
words.

Spacing

• Paragraph Spacing: Adjust the space before and after paragraphs for readability
and document structure.
• Line Spacing: Adjust the space between lines of text within a paragraph, typically
1.0 (single), 1.5, or 2.0.

Bullets

• Bullet Shape: Choose from a variety of bullet styles, such as dots, squares, or
custom symbols.
• Bullet Alignment: Align bullets properly within lists to maintain a clean look (left,
centered).
• Line Spacing and Indentation: Adjust the space between list items and the
indentation of the bullets to ensure clarity and visual balance.

Corporate House Style

• Purpose: Corporate house style refers to a standardized approach to visual


and textual formatting used across an organization’s documents. This
ensures consistency and enhances the brand’s identity.
o Uses:

84 | P a g e
▪ Consistency: All communications, reports, and documents from the
organization use the same font, layout, and style elements.
▪ Branding: Helps reinforce brand identity and professionalism in
official documents.
▪ Efficiency: Allows employees to focus on content rather than
formatting each document individually.
• Elements:
o Font style, size, color, and type.
o Standardized layouts for headers, footers, and other document
components.
o Consistent use of text formatting, such as bold or italics, for emphasis and
readability.
o Guidelines on spacing, margins, and alignment for a polished appearance.

85 | P a g e
Section 15: Proofing
15.1 Software Tools

• Reduce Errors:
o Automated Software Tools: Tools such as spell check and grammar check
are essential in minimizing errors in written content.
▪ Spell Check: Automatically detects and suggests corrections for
misspelled words. However, it may not always suggest the most

86 | P a g e
accurate change, especially with homophones or context-specific
errors.
▪ Grammar Check: Helps identify issues like sentence structure,
punctuation, and subject-verb agreement.
o Use of Validation Routines: Validation checks help minimize data entry
errors by ensuring that data is correct before it is submitted or processed.
• Spell Check Software:
o Automated spell check tools provide suggestions for misspelled words, but
users should manually verify changes because not all suggestions are
correct (e.g., "there" vs. "their").
• Validation Checks:
o Range Check: Ensures data falls within a specified range (e.g., dates,
numerical values).
o Character Check: Verifies that data entered contains only valid characters
(e.g., letters for name fields).
o Length Check: Ensures that data entered is of the correct length (e.g., a
phone number should have 10 digits).
o Type Check: Verifies that the data is of the correct type (e.g., numbers in a
numerical field).
o Format Check: Ensures that the data entered follows a specific format (e.g.,
email addresses or credit card numbers).
o Presence Check: Verifies that required data is entered (e.g., no mandatory
field is left empty).

15.2 Proofing Techniques

• Perform Visual Verification:


o Data Entry Errors: Manually identifying and correcting mistakes, such as
transposed numbers, misspelled words, inconsistent character spacing, or
incorrect letter case.
• Proofreading:
o Consistency: Ensure that the document has consistent formatting and
structure:
▪ Line Spacing: Correct any inconsistent line spacing throughout the
document.
▪ Remove Blank Pages/Slides: Ensure there are no unnecessary blank
pages or slides.
▪ Widows/Orphans: Remove instances where a single line of a
paragraph appears at the top or bottom of a page/slide (widows) or a
single word is left on its own at the end of a line (orphans).

87 | P a g e
▪ Inconsistent Styles: Ensure that styles (e.g., headers, body text) are
applied consistently.
▪ Tables and Lists: Ensure that tables and lists are not split across
pages or columns inappropriately.
• Verification:
o Visual Checking: Verify the accuracy of data visually by cross-checking the
content.
o Double Data Entry: A method where data is entered twice to ensure
accuracy and catch any errors, often used for critical data.
• Importance of Validation & Verification:
o Validation: Ensures that data is entered correctly before it is processed.
o Verification: Provides an additional layer of error reduction by checking data
visually or through double entry, minimizing potential mistakes.

88 | P a g e
Section 16: Graphs and charts
Creating, Labeling, and Editing Graphs or Charts

• Selecting Data for Graph/Chart:


o Contiguous Data: Data that is placed next to each other in adjacent rows or
columns (e.g., A1:A10, B1:B10).
o Non-contiguous Data: Data that is not placed adjacent to each other but is
selected by holding down the Ctrl key (e.g., A1:A10, C1:C10).
o Specified Data Ranges: Selecting a specific range of data that may be
scattered or structured, depending on the data type.
• Selecting the Graph or Chart Type:
o Various types of charts are available based on the data and purpose, such as:
▪ Bar Chart: Good for comparing quantities.
▪ Line Chart: Ideal for showing trends over time.
▪ Pie Chart: Effective for illustrating proportions of a whole.
▪ Column Chart: Useful for comparing data across categories.
▪ Scatter Plot: Shows relationships between two variables.
• Labeling the Graph or Chart:
o Chart Title: A clear, descriptive title explaining the graph/chart's purpose or
data.
o Legend: Helps identify different data series in the graph, especially when
there are multiple datasets.

89 | P a g e
o Sector Labels (for pie charts): Labels used to identify each slice or segment
of a pie chart.
o Sector Values/Percentages (for pie charts): Display the numerical value or
percentage for each sector.
o Category Axis Title: Label for the horizontal axis, usually representing
categories (e.g., months, years, product types).
o Value Axis Title: Label for the vertical axis, usually representing numerical
values (e.g., sales, revenue).
o Category Axis Labels: These indicate the specific categories on the
horizontal axis.
o Value Axis Labels: These represent the values on the vertical axis.
o Data Value Labels: Show the exact value of the data points, such as the value
of bars or slices in a chart.
• Adding Additional Data:
o Second Data Series: Adding another series of data to compare or contrast
with the first series in the same chart.
o Second Axis: In some charts (e.g., combination charts), a second axis may be
needed to represent different data scales, such as a secondary y-axis.
• Formatting Numerical Values:
o Decimal Places: Adjusting the number of decimal places displayed in
numerical values (e.g., rounding to two decimal places).
o Currency Symbols: Formatting the values to include currency symbols (e.g.,
$ for USD, € for EUR).
• Adjusting Axis Scales:
o Maximum and Minimum Values of Axis: Customizing the scale of the axes,
such as setting the minimum value to 0 and the maximum value to 100.
o Incremental Values: Setting intervals for the axis, such as increments of 10, 5,
or 1.
• Enhancing the Appearance:
o Pie Chart Customization:
▪ Extracting a Pie Chart Sector: Pulling out a sector to emphasize or
highlight it for better visual impact.
▪ Changing the Colour Scheme or Fill Patterns: Adjusting the colours
or fill patterns of the sectors to make them more visually appealing or
to match specific themes (e.g., corporate colors).

90 | P a g e
Past Paper May/June 2024 P1 V2

91 | P a g e
92 | P a g e
93 | P a g e
94 | P a g e
95 | P a g e
96 | P a g e
97 | P a g e
98 | P a g e
99 | P a g e
100 | P a g e
101 | P a g e
102 | P a g e
This Solved Paper would
receive 80/80 according to
Marking Scheme provided by
the CIE board

103 | P a g e
Paper 2
Document Production, Databases and Presentations

104 | P a g e
Document Production
1. Organising Page Layout

Editing Page Layout

Microsoft Word allows for precise control over the page layout to ensure a well-
structured and visually appealing document.

• Page Size:
o Can be adjusted based on requirements (A4, Letter, Legal, Custom).
o Go to Layout > Size and select the appropriate option.
• Page Orientation:
o Portrait (default) or Landscape.
o Change by going to Layout > Orientation.
• Page Margins:
o Controls the spacing between the text and the edge of the page.

105 | P a g e
o Can be adjusted via Layout > Margins.
o Options include Normal, Narrow, Wide, Custom Margins.
o Custom margins allow precise settings for top, bottom, left, and right
margins.
• Columns and Column Width:
o Used for formatting text into multiple columns (e.g., newspapers).
o Set via Layout > Columns (One, Two, Three, Left, Right, Custom).
o Adjust column width and spacing between columns via More Columns.
• Setting and Removing Breaks:
o Page Break: Forces text onto a new page (Ctrl + Enter).
o Section Break: Divides a document into sections (for different formatting in
each section).
▪ Types: Next Page, Continuous, Even Page, Odd Page.
▪ Found in Layout > Breaks.
o Column Break: Moves text to the next column without filling the current
column completely.

2. Formatting Text

Setting Line Spacing

Controls the space between lines of text for readability.

• Adjust via Home > Line and Paragraph Spacing.


• Options: Single, 1.5, Double, Multiple, Custom spacing before and after
paragraphs.

Setting Tabulation

Tabs allow precise positioning of text in a document.

• Left Tab: Aligns text to the left.


• Right Tab: Aligns text to the right.
• Centre Tab: Centers text at the tab stop.
• Decimal Tab: Aligns numbers by decimal points.
• Indented Paragraphs: Moves the entire paragraph inward.
• Hanging Paragraphs: First line aligned left, while the rest of the paragraph is
indented.

Text Enhancement

• Bold (Ctrl + B) – Makes text stand out.


• Underline (Ctrl + U) – Emphasizes text.
• Italic (Ctrl + I) – Used for emphasis.

106 | P a g e
• Superscript (Ctrl + Shift + +) – Raises text (e.g., x²).
• **Subscript (Ctrl + =) ** – Lowers text (e.g., H₂O).
• Change Case:
o Select text and go to Home > Change Case (Uppercase, Lowercase,
Sentence Case, Capitalize Each Word, Toggle Case).

Creating or Editing Lists

• Bulleted List:
o Go to Home > Bullets and choose a bullet style.
• Numbered List:
o Go to Home > Numbering and choose a numbering format.
• Customizing Lists:
o Change bullet styles, numbering format, or multilevel lists via Define New
Bullet/Number Format.

Find and Replace Text

• Find (Ctrl + F): Searches for specific words or phrases.


• Replace (Ctrl + H): Replaces words/phrases with alternatives.
o Match Case: Finds words with exact uppercase/lowercase letters.
o Find Whole Words Only: Prevents partial matches (e.g., finding "cat" but not
"catalog").

3. Navigation

Adding and Deleting Bookmarks/Hyperlinks

Bookmarks

Used for navigating to specific locations within a document.

• Insert a Bookmark:
o Select text or place cursor at desired location.
o Go to Insert > Bookmark, enter a name, and click Add.
• Go to a Bookmark:
o Press Ctrl + G, select Bookmark, and enter the name.
• Delete a Bookmark:
o Open Insert > Bookmark, select the bookmark, and click Delete.

Hyperlinks

Used for linking to webpages, emails, or different sections of a document.

107 | P a g e
• Insert a Hyperlink:
o Select text or image, then press Ctrl + K.
o Choose Existing File/Web Page, Place in This Document, Email Address, or
Create New Document.
• Remove a Hyperlink:
o Right-click the hyperlink and select Remove Hyperlink.

4. Understanding Key Concepts

Pagination

Purpose:

• Ensures proper document organization, structure, and readability.


• Allows different sections to have unique layouts (e.g., portrait/landscape pages in
the same document).

Uses:

• Page Breaks: Start new sections cleanly (Ctrl + Enter).


• Section Breaks: Change formatting between sections.
• Column Breaks: Manage content placement in multi-column layouts.

Gutter Margin

Purpose:

• Used in printed documents (books, booklets, and binding).


• Ensures content is not lost in the binding area of a book.
• Located in Layout > Margins > Custom Margins > Gutter Position.

Settings:

• Gutter Position:
o Left (for left-bound documents).
o Top (for top-bound documents).
• Gutter Size:
o Adjust width to ensure enough space for binding.

108 | P a g e
109 | P a g e
Databases
1. Creating a Database Structure

Importing Data from Existing Files

Microsoft Access allows data import from different file types such as .csv (comma-
separated values) and .txt (text files).

• Steps to Import Data:


1. Open Microsoft Access and create a new database.
2. Go to External Data > New Data Source > From File > Text File.
3. Select the .csv or .txt file and click Import.
4. Choose whether to create a new table or append data to an existing table.
5. Ensure that field names match the correct column headings in the source file.
6. Set the appropriate data types for each field.
7. Finish the import process and review the data for accuracy.

Setting Appropriate Data Types

Each field in a table must have an appropriate data type to ensure accurate data
entry and processing.

Data Type Purpose

Used for names, addresses, and other non-numeric data (up to


Short Text
255 characters).

Long Text Used for lengthy text such as descriptions or comments.

Used for numerical values (can be set as Integer, Decimal, or


Number
Currency).

Date/Time Used to store dates and times.

Currency Stores financial data with a fixed decimal point.

Yes/No
Used for True/False, Yes/No, or Checkbox fields.
(Boolean/Logical)

AutoNumber Automatically assigns a unique number to each record.

110 | P a g e
Data Type Purpose

Hyperlink Stores website URLs or email addresses.

Attachment Stores images, documents, or other files.

Setting Numeric Sub-Types

• Integer: Whole numbers only (e.g., 10, 500, 1024).


• Decimal: Supports fractional values (e.g., 10.25, 1024.75).
• Percentage: Stores percentage values (e.g., 45% is stored as 0.45).

Setting Display Formats

• Boolean/Logical Fields:
o Can be displayed as Yes/No, True/False, Checkbox (set in Design View
under "Format").
• Date/Time Formats:
o Options: Short Date, Long Date, Medium Date, Time Format.
o Set in Field Properties > Format.

Primary and Foreign Keys

Primary Key

• A unique identifier for each record in a table (e.g., Student ID, Employee ID).
• Helps avoid duplicate records.
• Set by selecting a field in Design View and clicking Primary Key in the toolbar.

Foreign Key

• A field in one table that links to the Primary Key in another table.
• Used to establish relationships between tables.

Creating Relationships Between Tables

1. Open Database Tools > Relationships.


2. Add the required tables.
3. Drag the Primary Key from one table to the corresponding Foreign Key in another
table.
4. Choose Referential Integrity to ensure related records exist in both tables.

111 | P a g e
5. Select Cascade Update/Delete if changes in one table should reflect in the related
table.

Creating and Using a Data Entry Form

Forms make data entry easier and more structured.

Creating a Form

1. Go to Create > Form Wizard.


2. Select the table or query the form will be based on.
3. Choose the required fields to include in the form.
4. Select a layout (Columnar, Tabular, Datasheet, Justified).
5. Click Finish to generate the form.

Editing a Form

• Open the form in Design View.


• Customize font styles, sizes, and spacing between fields.
• Add input elements such as:
o Text boxes for general data entry.
o Radio buttons for selecting one option.
o Check boxes for Boolean fields (Yes/No).
o Drop-down menus (Combo Box) for pre-defined selections.

2. Manipulating Data

Performing Calculations

Microsoft Access allows calculations using expressions and built-in functions.

Creating Calculated Fields in Queries

1. Open Query Design View.


2. Add the required table.
3. Click on a blank field and enter a formula, e.g.:

4. Run the query to see calculated results.

112 | P a g e
Common Functions

• SUM() – Adds all values in a field.


• AVG() – Calculates the average.
• MAX() – Finds the highest value.
• MIN() – Finds the lowest value.
• COUNT() – Counts the number of records.

Sorting Data

• Open a Table or Query.


• Click on a column header and choose Sort Ascending (A → Z, 1 → 9) or Sort
Descending (Z → A, 9 → 1).
• Multi-column sorting can be done by sorting one column first, then another.

Searching and Selecting Data (Queries)

Microsoft Access allows filtering of data using Queries.

Using Criteria in Queries

• Single Criterion: Find records matching one condition.


o Example:

• Multiple Criteria (AND, OR, NOT):


o Example:

• Using Wildcards (*, ?):


o LIKE "*Ali" – Finds all names ending with "Ali".
o LIKE "A*" – Finds all names starting with "A".
o LIKE "?A*" – Finds names where the second letter is "A".

113 | P a g e
3. Presenting Data

Generating Reports

Reports allow structured presentation of data for printing and analysis.

Creating a Report

1. Go to Create > Report Wizard.


2. Select the table/query containing the data.
3. Choose the required fields.
4. Select a grouping level (if needed).
5. Select a layout (Tabular, Columnar).
6. Click Finish.

Formatting Reports

• Open in Design View.


• Add Report Header, Footer, Page Header, Page Footer for proper document
structure.
• Set titles and labels for better readability.
• Adjust column width, row height, and text alignment.

Aligning Data and Labels

• Right-align numerical data for clarity.


• Left-align text fields.
• Use decimal alignment for financial or statistical data.

Controlling Display Formats

• Set decimal places (e.g., to display 2 decimal places in currency fields).


• Use currency symbols for financial reports ($, €, PKR).
• Display percentage values properly (e.g., 45% stored as 0.45).

114 | P a g e
115 | P a g e
Presentations

1. Creating a Presentation

Creating a New Presentation Using a Text File

• Open Microsoft PowerPoint.


• Go to File > Open and select a .txt file.
• PowerPoint will automatically convert the text into slides.
• Use the Outline View to organize content effectively.

Using a Master Slide

A Master Slide ensures consistency in formatting across all slides.

Applying a Master Slide

1. Go to View > Slide Master.


2. Select the Master Slide (topmost slide) to make universal changes.
3. Edit objects that should appear on all slides (e.g., logo, footer, background,
font styles).
4. Customize elements such as:
o Text placeholders (position, size, font).
o Background color or image.
o Headers and footers (e.g., date, time, slide number).
o Bulleted list styles.
5. Close Slide Master View to apply changes to all slides.

Formatting Master Slide Objects

• Headings & Subheadings: Apply uniform font type, size, and color.
• Bullets: Customize shape, color, size, and alignment.
• Background: Use solid color, gradient, image, or texture.
• Logo Placement: Ensure the logo is positioned consistently across slides.

116 | P a g e
2. Editing a Presentation

Applying a Slide Layout

Layouts define the structure of each slide.

1. Select a slide.
2. Go to Home > Layout.
3. Choose from layouts such as Title Slide, Title & Content, Two Content,
Comparison, Picture with Caption.

Inserting a New Slide

• Press Ctrl + M or go to Home > New Slide.


• Choose a layout for the new slide.

Moving or Deleting a Slide

• To Move: Drag a slide in the Slide Sorter View or Normal View.


• To Delete: Right-click the slide and select Delete Slide.

Inserting and Editing Objects on a Slide

Objects enhance presentations by adding visuals and interactivity.

Text Objects

• Insert a Text Box: Go to Insert > Text Box.


• Formatting: Change font, size, color, and alignment.
• Apply Bullets & Numbering:
o Select text, go to Home > Bullets/Numbering.
o Customize spacing and indentation.

117 | P a g e
Images & Videos

• Insert an Image: Insert > Pictures (from file) or Online Pictures.


• Insert a Video: Insert > Video > Video on My PC / Online Video.
• Edit Images: Resize, crop, add borders, and apply effects.

Charts & Tables

• Insert a Chart:
1. Go to Insert > Chart.
2. Select a chart type (Bar, Pie, Line, etc.).
3. Edit data in the Excel window.
• Insert a Table:
1. Insert > Table and select the number of rows and columns.
2. Edit table layout using Table Tools.

Audio Clips

• Insert Audio: Insert > Audio > Audio on My PC / Record Audio.


• Playback Options: Set to play automatically, on-click, or loop.

Symbols, Lines, Arrows, Callout Boxes, and Shapes

• Insert Shapes: Insert > Shapes and select the required shape.
• Edit Shapes: Resize, change color, add effects.

Adding Presenter Notes

• Go to View > Notes Page or click Notes below the slide.


• Type speaker notes to assist during presentations.

Inserting and Editing Hyperlinks

1. Select text or object.


2. Go to Insert > Link.
3. Choose Place in This Document (to link to another slide) or Existing File/Web Page.
4. Click OK.

118 | P a g e
Inserting an Action Button

1. Go to Insert > Shapes > Action Buttons.


2. Choose an action button (Home, Back, Next, etc.).
3. Assign an action:
o Go to Slide
o Open a File
o Run a Program
o Play Sound

Adding Alternative Text / ScreenTip to an Object

Alternative text helps visually impaired users understand images and objects.

1. Right-click an image or object.


2. Select Edit Alt Text.
3. Type a description of the object.

Applying Transitions Between Slides

• Go to Transitions > Select a Transition Effect (e.g., Fade, Wipe, Push).


• Set Duration & Apply to All.

Applying Animation Effects

• Go to Animations > Select an Animation (Appear, Fly-In, Bounce, etc.).


• Use Animation Pane to manage multiple animations.
• Set Animation Triggers (Start on Click, With Previous, After Previous).

Hiding Slides

119 | P a g e
1. Select a slide.
2. Go to Slide Show > Hide Slide.

3. Outputting the Presentation

Displaying the Presentation

PowerPoint allows different presentation modes:

• Presenter-Controlled Mode: Manually advance slides using Spacebar, Arrow


Keys, or Mouse Click.
• Looped On-Screen Carousel:
o Go to Slide Show > Set Up Slide Show.
o Select Loop continuously until Esc.

Printing the Presentation

1. Go to File > Print.


2. Choose a print layout:
o Full Page Slides – Prints one slide per page.
o Handouts – Prints multiple slides per page for audience reference.
o Notes Pages – Prints slides along with speaker notes.
o Outline View – Prints slide text only.
3. Click Print.

120 | P a g e
Additional Skills Required for Paper 2
File Management:

• Create and rename folders to organize work.


• Save files in the correct format (e.g., .docx, .xls, .csv, .rtf, .html).
• Check file sizes and properties when required.
• Sort and filter files by name, type, or date for easy access.
• Use logical filenames that match the task requirements.

Document Handling:

• Adjust page setup (margins, orientation, headers/footers).


• Insert automatic page numbers, dates, and footnotes when needed.
• Format text using bold, italics, underline, font size, and alignment as per
instructions.
• Apply appropriate line spacing (single, 1.5, or double as required).
• Use bullets and numbered lists for structured information.
• Save documents in the required format (e.g., RTF for text-based files).

Data Manipulation in Spreadsheets:

• Input and format data correctly (e.g., currency, percentage, decimal places).
• Use absolute ($) and relative references correctly in formulas.
• Apply formulas for SUM, AVERAGE, MAX, MIN, COUNT, IF statements, and
LOOKUP functions.
• Create and label charts (bar, pie, line, column) with correct titles and
legends.
• Sort and filter data accurately as per given criteria.
• Use conditional formatting to highlight key data points.

Database Handling:

• Import and modify tables with appropriate field types (text, number, date,
Boolean).
• Set primary keys and ensure data validation where necessary.
• Use queries (e.g., criteria-based filters using <, >, =, LIKE, AND, OR).
• Generate and format reports with titles, fields, and summaries.
• Sort records and apply grouping functions when needed.

121 | P a g e
Web Page Authoring (HTML & CSS Basics):

• Structure a page using <html>, <head>, <body>, <h1>-<h6>, <p>, <ul>,


<ol>, <a>, <img>.
• Link external and internal pages correctly.
• Use inline CSS styling (e.g., text color, background color, font size).
• Insert and format tables within a webpage.
• Ensure correct file paths for images and hyperlinks.

Presentations:

• Apply consistent slide formatting (font size, colors, alignments).


• Insert images, tables, and charts appropriately.
• Use slide transitions and animations only if instructed.
• Maintain professional and readable layouts.

Printing and Proofing:

• Print in portrait/landscape as required.


• Use print preview to check formatting before printing.
• Ensure documents are printed with gridlines, row/column headers (for
spreadsheets) when required.
• Check spelling and grammar before final submission.

122 | P a g e
Past Paper May/June 2024 P2 V2

123 | P a g e
124 | P a g e
125 | P a g e
126 | P a g e
Evidence 1 (Q4):

Evidence 2 (Q8):

127 | P a g e
128 | P a g e
Printed Document (Q12):

129 | P a g e
130 | P a g e
Evidence 3 (Q13):

131 | P a g e
132 | P a g e
Evidence 4 (Q13):

Evidence 5 (Q14):

133 | P a g e
134 | P a g e
Printed Report (Q16):

135 | P a g e
Printed Labels (Q17):

136 | P a g e
137 | P a g e
138 | P a g e
Printed Speaker/Presenter Notes (Q25):

139 | P a g e
Printed Presentation (Q26):

140 | P a g e
This paper would receive 70/70 according
to the MS provided by the CIE board

141 | P a g e
Paper 3

142 | P a g e
143 | P a g e
Spreadsheets
Basic Functions:

1. SUM() – Adds a range of numbers.


Example: =SUM(A1:A10)
2. AVERAGE() – Calculates the mean of a range.
Example: =AVERAGE(B2:B8)
3. MAX() – Finds the maximum value in a range.
Example: =MAX(C1:C5)
4. MIN() – Finds the minimum value in a range.
Example: =MIN(D2:D9)
5. COUNT() – Counts the number of numeric values in a range.
Example: =COUNT(A1:A10)
6. COUNTA() – Counts all non-empty cells (text and numbers).
Example: =COUNTA(B1:B10)
7. ROUND() – Rounds a number to a specified number of decimal places.
Example: =ROUND(A1,2) (rounds A1 to 2 decimal places)
8. INT() – Rounds a number down to the nearest integer.
Example: =INT(4.8) → 4

Logical Functions:

144 | P a g e
9. IF() – Returns one value if a condition is true and another if false.
Example: =IF(A1>50, "Pass", "Fail")
10. IFERROR() – Returns a custom message if a formula results in an error.
Example: =IFERROR(A1/B1, "Error!")
11. AND() – Returns TRUE if all conditions are met.
Example: =AND(A1>10, B1<50)
12. OR() – Returns TRUE if at least one condition is met.
Example: =OR(A1>100, B1=50)

Lookup Functions:

13. LOOKUP() – Searches for a value in a range.


Example: =LOOKUP(40, A1:A5, B1:B5)
14. VLOOKUP() – Searches for a value in the first column of a table and returns a
corresponding value from another column.
Example: =VLOOKUP(101, A2:C10, 2, FALSE)
15. HLOOKUP() – Similar to VLOOKUP but searches in rows instead of columns.
Example: =HLOOKUP(101, A1:G2, 2, FALSE)
16. XLOOKUP() – A more advanced replacement for VLOOKUP and HLOOKUP.
Example: =XLOOKUP(101, A2:A10, B2:B10)

Text Functions:

17. LEFT() – Extracts a certain number of characters from the left side of a text
string.
Example: =LEFT("Excel",2) → "Ex"
18. RIGHT() – Extracts a certain number of characters from the right side.
Example: =RIGHT("Excel",3) → "cel"
19. MID() – Extracts characters from the middle of a string.
Example: =MID("Excel",2,3) → "xce"
20. LEN() – Counts the number of characters in a string.
Example: =LEN("Hello") → 5
21. CONCATENATE() / CONCAT() – Joins text from multiple cells.
Example: =CONCATENATE(A1, " ", B1)
Newer version: =CONCAT(A1, " ", B1)
22.TEXT() – Formats a number as text.
Example: =TEXT(A1, "$0.00")

Data Manipulation Functions:

23.TRIM() – Removes extra spaces from text.


Example: =TRIM(" Hello World ") → "HelloWorld"

145 | P a g e
24. UPPER() – Converts text to uppercase.
Example: =UPPER("excel") → "EXCEL"
25. LOWER() – Converts text to lowercase.
Example: =LOWER("Excel") → "excel"
26.PROPER() – Capitalizes the first letter of each word.
Example: =PROPER("hello world") → "Hello World"

Sorting & Filtering Data:

27. SORT() – Sorts a range of data.


Example: =SORT(A1:A10)
28. FILTER() – Filters data based on conditions.
Example: =FILTER(A1:A10, A1:A10>50)

Date & Time Functions:

29.TODAY() – Returns the current date.


Example: =TODAY()
30. NOW() – Returns the current date and time.
Example: =NOW()
31. YEAR(), MONTH(), DAY() – Extracts year, month, or day from a date.
Example: =YEAR(A1), =MONTH(A1), =DAY(A1)
32.DATEDIF() – Calculates the difference between two dates.
Example: =DATEDIF(A1, B1, "Y") (calculates the years between two dates)
33. TEXT() – Formats a date.
Example: =TEXT(TODAY(),"DD/MM/YYYY")

Conditional Formatting:

34. Conditional Formatting Rules – Use formulas like:


o =A1>50 (to highlight cells greater than 50)
o =MOD(A1,2) =0 (to highlight even numbers)

Important Skills for IGCSE ICT:

• Absolute vs. Relative Cell References ($A$1 vs. A1)


• Using Data Validation (e.g., dropdown lists)
• Sorting and Filtering Data
• Creating Charts (Bar, Line, Pie)
• Using Pivot Tables for Analysis
• Using Named Ranges in Formulas

146 | P a g e
147 | P a g e
148 | P a g e
Web Development Layers

Web development is divided into three primary layers, each with a specific function
in creating a webpage.

Content Layer

• Purpose: This layer deals with the structure and content of the web page.
• Responsibility:
o Defines the raw content and its arrangement (text, images, links, etc.).
o It uses HTML (Hypertext Markup Language) to organize the content.
o Example elements: headings (<h1>, <h2>), paragraphs (<p>), images (<img>),
links (<a>), lists (<ul>, <ol>), and tables (<table>).

Presentation Layer

• Purpose: Controls how the content is presented to the user.


• Responsibility:
o Deals with the look and layout of the content, like fonts, colors, and
positioning.
o Uses CSS (Cascading Style Sheets) to define styles for HTML elements.
o Example properties: color, font-size, padding, margins, text alignment, and
background images.

Behavior Layer

• Purpose: Provides interactivity and dynamic behavior to the page.


• Responsibility:
o Uses JavaScript or other scripting languages to control elements on the
page, such as animations, form validations, and dynamic content updates.
o Example elements: buttons that show/hide content, interactive forms,
image sliders.

Create a Web Page

HTML in the Content Layer

• Head Section: Contains meta-information about the web page, such as:
o Title: Sets the name of the web page that appears in the browser tab. (<title>)
o External Stylesheets: Link to an external CSS file using the <link> tag with a
relative file path.
o Meta Tags: Provide metadata for search engines, browsers, and devices.

149 | P a g e
▪ Charset: <meta charset="UTF-8">
▪ Description: <meta name="description" content="Page Description">
▪ Author: <meta name="author" content="Author Name">
▪ Viewport: <meta name="viewport" content="width=device-width, initial-
scale=1.0">
o Default Target Windows: Set the default window or frame for links.
• Body Section: Contains the visible content of the webpage, such as:
o Text: Use heading tags (<h1>, <h2>) and paragraph tags (<p>) for text content.
o Tables: Organize data in rows and columns using <table>, <tr>, <th>, and <td>.
Adjust attributes such as cell spans, widths, heights, and background colors.
o Multimedia: Insert images, videos, sound clips using <img>, <video>, <audio>.
▪ Include attributes like autoplay, controls, width, height, and alt text for
accessibility.
o Hyperlinks: Use <a> tag to link to other web pages, email addresses, or
anchors within the same page.
▪ Syntax for links:
▪ Local page: <a href="page.html">Link</a>
▪ External URL: <a href="http://www.example.com">Example</a>
▪ Email: <a href="mailto:[email protected]">Send Email</a>
o Bookmarks (Anchors): Use <a id="bookmark"> and link to it with
href="#bookmark".

Use Stylesheets

CSS in the Presentation Layer

• External and Inline Styles:


o External Styles: Defined in a separate .css file and linked to the HTML using
the <link> tag.
o Inline Styles: Defined within the style attribute of individual HTML elements.
o Hierarchy: Inline styles override internal styles, which in turn override external
styles due to the CSS cascading rule.
• Basic CSS Properties:
o Background: Set background colors or images (background-color,
background-image).
o Fonts: Define font properties such as family, size, color, style (font-family,
font-size, font-weight).
o Table Styles: Customize table appearance such as borders, padding,
alignment (border, padding, text-align).
• Classes and IDs:
o Class: Defines a reusable style, applied to multiple elements.
▪ Example: .class-name { color: red; }
o ID: Defines a unique style, applied to a single element.

150 | P a g e
▪ Example: #id-name { color: blue; }
o Both classes and IDs can be used to apply styles to HTML elements such as
headings, tables, and paragraphs.
• CSS File Organization:
o Save styles in .css files.
o Use comments (/* comment */) to annotate sections or explain code.
• Cascading Order:
o Styles are applied based on specificity and order. External stylesheets come
first, then internal styles, and finally inline styles.
o The more specific the selector (e.g., div#id-name), the higher its priority.
• Relative File Paths: For linking stylesheets and assets, relative file paths
(e.g., ./styles.css) should be used instead of absolute paths (e.g.,
C:/users/desktop/styles.css).

Concepts to Understand

1. Head and Body Sections: The head contains metadata, while the body contains
visible content.
2. Tables: Used for structuring content like data and forms. Attributes control layout
and appearance.
3. Metatags: Help with SEO (search engine optimization) and device compatibility.
4. Hyperlinks: Links to other resources like web pages, email, and files.
5. CSS Styles: Customize the look of content, including text, images, tables, and
layout.
6. External vs. Inline Styles: External styles affect the entire website, while inline styles
apply only to individual elements.
7. File Paths: Relative paths ensure portability, while absolute paths can make
resources unavailable when moved.

✅ Understand HTML structure & elements


✅ Create web pages with text, images, and tables
✅ Use CSS for styling and layout
✅ Format text, images, and tables properly
✅ Create forms for data input
✅ Use internal & external CSS
✅ Apply basic responsive web design techniques

151 | P a g e
Past Paper May/June 2024 P3 V2

COMING SOON…

152 | P a g e

You might also like