Complete IGCSE ICT Revision Notes
Complete IGCSE ICT Revision Notes
Chapter 1:
Hardware: Physical Software: Programs
components that make that control the
up a computer. computer system.
SSD:
Advantages: Disadvantages:
HDD:
Advantages: Disadvantages:
CPU (Central Processing Unit): Part of the computer that interprets and executes
commands from the computer hardware & software.
Operating Systems (OS): Systems that that enable computer system to work and allow user
communication with the computer.
Functions:
1. Controls input, output & storage devices.
2. Deals with errors in computer system.
3. Maintains security of computer.
4. Allowing user communication with computer.
User interface: Used By: Advantages: Disadvantages:
Emerging Technologies:
AI Biometrics (Artificial Intelligence):
It is a technology that transforms biometrics into a readable code making it easier for the computer
to understand.
VR (Virtual reality):
A technology that produces an artificial environment using goggles, sensors, lights, etc.
Robotics:
A technology that uses machines to perform tasks done by humans.
ADVANTAGES: DISADVANTAGES:
Small = Less Space Needed. Small = Small Screen/Keyboard causing typing errors.
Least Common:
Chapter 2:
Input Devices:
Advantages: Disadvantages:
Keyboard: 1.Fast Data Entry. 1.Difficult to use for people with RSI.
2.Easy to use. 2. Slower than DDE devices.
3.Easy verification checks. 3.Takes up desk space.
Concept Keyboard: 1.Fast Data Entry. 1.Difficult to use for people with RSI.
2.Easy to use. 2.Slower than DDE devices.
3.Waterproof (best in restaurants).
Numeric Keyboard: 1.Fast numeric data entry. 1.Difficult to use for people with RSI.
2.Easy to use. 2.Slower than DDE devices.
3.Portable. 3.Limited to Numeric Data.
Mouse: 1.Faster to select options. 1.Difficult to use for people with RSI.
2.Small – doesn’t take desk space. 2.Difficult to use on rough surface.
3.Portable. 3.Fragile – Easily damaged.
4.Quick Navigation.
Touch Pad: 1. Faster to select options. 1.Difficult to use for people with RSI.
2.Small – doesn’t take desk space. 2.Slow Navigation.
3.Portable. 3.Cannot do drag and drop tasks.
4.Works on any surface.
ADVANTAGES: DISADVANTAGES:
Fast : Data Entry/Select Options. Slower than DDE Devices.
Easy to use. RSI.
Small – Less space needed. Big – More space needed.
Cheap. Expensive.
Accurate. Poor Quality.
User friendly. Needs Computer literacy.
Least Common:
Advantages: Disadvantages:
Sensors: 1.Accurate readings taken. 1.Job loss.
2.Continious readings taken. 2.Expensive maintenance.
3.Cost saving – no need people.
Role Of 1.Data form the sensors are compared to pre – set values.
Microprocessor in 2.The Pre-set value is set to show (_________________) (Depends on Question & Sensor).
Robots: 3.If the Values are Same or Lower: It Signals the actuator (What happens_______________).
4.If the Values are Higher: (What happens______________________).
5.The process keeps continuing.
Motion: Functions when motion is detected. Example light automatically opens when a motion is detected.
Infra – Red: Emits and detects IR radiation in order to find out certain objects/obstacles in its range.
ADVANTAGES: DISADVANTAGES:
Fast. Slow.
Steps:
1. User looks for magnetic card reader.
2. User then swipes the card.
3. Terminal display will indicate whether card has been read.
Advantages: Disadvantages:
1.Fast Data entry. 1.If magnetic stripe is damaged, data is lost.
2.Secure. 2.Doens’t work at a distance.
3.Robust. 3.Effected by magnetic fields.
4.Error free.
1.Account Number.
2. Sort Code.
3. Expiry Date.
4. Issue Date.
Advantages: Disadvantages:
1.Fast Data entry/Transactions. 1.Expensive.
2.Secure. (Uses high level encryption and has an encrypted 2.Limited Transaction Amount. (e.g.: up to $25).
unique number).
3.Robust.
Advantages: Disadvantages:
1.Faster than paying manual cash. 1.Doesn’t work at a distance.
2.Secure. (Uses unique PIN). 2.Slower than contactless cards.
3.Robust. 3.PIN can be read by people around.
MICR (Magnetic Ink Character Recognition):
Steps: Cheque Clearance:
Advantages: Disadvantages:
1.Secure. 1.Expensive.
2.Readable characters. 2.Effected by magnetic fields.
3.No manual input, reduced errors.
1. Account Number.
2. Cheque Number.
3. Sort code.
Advantages: Disadvantages:
1.Fast Reading rate. 1.Tag collisions.
2.Robust. 2.Expensive.
3.Can be read from a Distance. 3.Not secure. Hack-able.
4.Larger storage capacity.
5.Can be updated easily.
Barcode Readers:
Steps:
1.The Barcode is brought near the scanner.
2. The scanner uses laser light to read the code.
3. Information in bar code is transmitted to the scanner.
4. The scanner transmits information to computer/terminal display.
Advantages: Disadvantages:
1.Fast Reading Rate. 1.Not Robust. (Easily Damaged)
2.Reliable. 2.Not secure.
3.Uses a unique number. 3.Barcode is fragile. (If barcode is damaged the reader will not
4. Cheap. be able to read).
QR code Readers:
Advantages: Disadvantages:
1.Secure. 1.Slow.
2.More storge capacity compared to Barcode. Holds up 2.Not Robust. (Easily Damaged).
to 7000 digits. 3.QR code is fragile. (If QR code is damaged the QR scanner
3.Effective way of advertising. will not be able to read).
Advantages: Disadvantages:
OMR (Optical mark reader): 1.Faster than keying in data. 1.Froms need to be carefully
2.Accurate than keying in data. designed.
Reads the positions of marked 2.Prone to errors.
Lozenges
OCR (Optical character reader): 1.Faster than keying in data. 1.Not Accurate.
2.Reduced Errors since no manual 2.System has difficulties reading
Reads characters/writings. input. handwritings.
ADVANTAGES: DISADVANTAGES:
Cheap. Expensive.
Used: Old magnetic tapes, Video Cassettes. Used: HDD, CD, DVD, Blu Ray.
Magnetic Tapes: 1.Batch processing apps. 1.Fast data transfer rate. 1.Effected by magnetic
2.Large organizations. 2. Large memory fields.
capacities. 2.Slow data ACCESS TIME.
3.Cheap.
4.Robust.
Advantages: Disadvantages:
SSD: 1.No Moving Parts. 1.Expensive.
2.Light weight. 2.Rare.
3.Less power consumption. 3.Less storage.
4.Fast.
USB (Memory Sticks): 1.Portable. 1.Easy to lose.
2.Robust. 2.Gets damaged if no ejected properly.
3.Large Storage Capacity.
4.Fast.
Speed: Storage
All Solid-State Storage Devices. Fixed HDD.
Fixed HDD. Portable HDD.
Portable HDD. Magnetic Tape.
Blu – Ray. USB & Flash memory cards.
All CD & DVD’s. Blu – Ray.
Magnetic Tape. DVD-ROM.
DVD – R & RW.
DVD-RAM.
All CD’s.
Portability: Cost:
Flash memory cards. Magnetic Tape.
USB. Portable & Fixed HDD.
All CD’s, DVD’s & Blu-Ray. Flash Memory Cards.
Portable HDD. USB.
Magnetic Tape. Blu-Ray.
Fixed HDD/SSD. DVD – RAM.
DVD’s.
CD’s.
Chapter 4:
PC PC
Bridge
PC Hub/Switch Router Router Hub/Switch
PC
PC PC
Network Security:
➔ How security can be improved in a wi-fi network?
1. Use a strong password.
2. Use WPA Encryption.
3. Uses a wireless network security software.
➔ What is ISP?
1. Internet service provider.
2. Provides Web space.
3. Provides Storage space on cloud.
4. Provides Internet from a Router.
Advantages: Disadvantages:
Wi-Fi vs Bluetooth:
Feature/Comparison: Bluetooth: Wi-Fi:
Internet vs Intranet:
Intranet: Internet:
Email vs Fax:
Email:
Advantages: Disadvantages:
Fax:
Advantages: Disadvantages:
Chapter 5:
Part Time: Hired for less time than a normal employee.
Job Sharing: Doing the same job at different times.
Flexible Time: Work full hours at any time they want.
Compressed Hours: Working full hours in a shorter duration.
Faster.
Expert Systems:
➔ How to set up an expert system? ➔ Using an Expert System (Basic Steps):
1. Experts are interviewed. 1. An interactive user interface is used.
2. Knowledge base is designed. 2. User interface asks questions.
3. Rule base is designed. 3. User answers questions.
4. Explanation form/system is designed. 4. The inference engine compares answers
5. Expert system is tested. to questions with the facts stored in the
knowledge base using the rules base.
5. The system suggests possible solutions.
Robots:
Advantages: Disadvantages:
Measurement Applications:
Steps of how Sensors Take Readings in Measurement Applications:
1. Weather Stations.
2. Measuring Patients vital signs.
3. Measuring pollution in rivers.
Advantages: Disadvantages:
Advantages: Disadvantages:
Banking Applications:
Steps for Cash Width drawl: Behind The Scenes:
Card is first inserted, and PIN is entered. Computer is contacted and PIN is checked.
Customer chooses amount of money. Card and account are checked (Expiry date,
weather reported stolen and amount of cash
available)
With drawl is proceeded and asked for receipt.
1. Sensors in the roads gather data and count the number of vehicles at the junction.
2. Data is converted to digital for using ADC.
3. Data is then sent to a computer.
4. Data is then compared to pre-set values.
5. The computer decides what action need to be taken.
6. Actuators are signaled accordingly.
Computers in Medicine:
Use of 3D printers in medicine:
Computers in Libraries:
Computer Processing involved when a book is borrowed:
1. Barcode on the book is first scanned & book details are found in the book file.
2. System then calculates return date for book.
3. Then the barcode on the borrowers ID Card is scanned. (Sometimes Biometric information also).
4. Return date for book is saved in the borrower’s file.
1. Proximity sensor detects vehicle and signals the microprocessor which then signals the actuator
(camera) to take a picture of the front of the vehicle.
2. An algorithm is then used to isolate the number plate from the image. (The algorithm involves
cropping, enhancing renders (brightness, color, contrast) and segmentation of each number).
3. The car park barrier is then raised, and a ticket is given.
4. At time of leaving the car park, the ANPR system again reads the number plate and checks
weather it matches the one stored in the database.
Call Monitoring:
Types of Call Monitoring:
1. Monitor: This allows the manager/boss to listen to discussion between the employee and
customer. (In this case the call is muted so neither of them will be able to know of their presence)
2. Whisper: This allows the boss to help the employee speak (Only employee can hear the voice).
3. Barge: This allows both the employee and customer to be heard by the boss/manager.
Satellite Systems:
GPS (Global Positioning Satellite):
Advantages: Disadvantages:
1. Safer (System warns driver about 1. If the maps are not updated, they can
speeding cameras & street closures) give incorrect information.
2. System can estimate arrival time. 2. Loss of satellite signals can cause
3. System can tell fastest route. problems.
Chapter 7:
Analysis
Evaluation Design
Development
Documentation
and Testing
Implementation
Analysis:
Basic Steps is Analysis stage:
1. Research/collect data form the existing 5. Agree to client’s requirements.
system. 6. Interpret requirements.
2. Describing the existing system. 7. Produce a cost-benefit analysis.
3. Identify the problems with the current 8. Identify suitable hardware and
system. software.
4. Agree on the objectives with the client. 9. Produce a data flow diagram(DFD).
Methods of Research:
Method: Advantages: Disadvantages:
Observation: 1. Cheap. 1.People may feel uncomfortable and
2. Reliable. may act in a different way.
Design:
Design Stage Tasks:
1. Design Data Capture Forms.(DFD) 5. Design validation rules.
2. Design screen layouts. 6. Design and agree on file structures.
3. Design Outputs in the form of reports or 7. Design and produce necessary algorithms.
screen displays. 8. Design a testing strategy/plan.
4. Produce a Data Flow Chart or pseudo code.
Verification is a way of preventing errors when data is copied from one medium to another.
2 Verification Methods:
Validation:
Length Check: Checks weather data has required number of characters, e.g., 3 no. and 2 words.
Format Check: Checks weather data is in correct format. E.g., Text, Numeric
Presence Check: Checks weather data present hasn’t been missed out.
File Structures:
File Structures Take the Following into Account:
1. Field Length.
2. Field Name.
3. Data Type.
Testing strategies:
1. Normal: Reasonable data (E.g., Between 1 – 20 : If result is 2-19)
2. Extreme: Data at the boundaries (E.g., Between 1-20: If result is 1 or 20)
3. Abnormal: Data outside limits or wrong type of data. (If text is entered instead of numbers)
4. Live: Data with known outcomes.
Implementation:
Implementation Stage Tasks:
1. Staff is trained on the new system.
2. Files are transferred to new system. (By scanning, keying & downloading information).
3. Changeover to new system. (Direct, Parallel running, Pilot running, Phased implementation).
Changeover Methods:
Pilot: New system is 1.If new system fails, only part is 1.Time consuming.
introduced to one are for trial affected, old system remains in other
and assessed before it gets areas.
introduced everywhere. 2.Cheap.
3.Possible to train staff in one area only
(Cheaper, Quicker).
Phased: New system is 1.If latest part fails, you only have to go 1.Expensive.
introduced in parts until the back to point if failure, remaining parts 2.Time consuming.
old system is fully replaced. are unaffected.
Documentation:
User Documentation: Technical Documentation:
Helps users to learn how to use the system. Helps analysts to maintain/improve the system.
Includes: Includes:
1. How to run the software. 1. Program codes.
2. How to save files. 2. Program language.
3. How to search. 3. Program algorithms.
4. How to print. 4. System flowcharts.
5. Purpose of the system. 5. Purpose of the system.
6. Tutorials. 6. Requirements. (Hardware/Software/memory)
Evaluation:
Evaluation Stage Tasks:
1. Compare the final solution with original task.
2. Identify any limitation.
3. Identify necessary improvements.
4. Compare performance of old and new system.
5. Evaluate user’s responses of new system.
Chapter 8:
Phishing: Fraudulent practice of sending emails.
Smishing: Fraudulent practice of sending text messages.
Vishing: Fraudulent practice of making phone calls.
Pharming: Fraudulent practice of directing users to fake websites.
Internet Safety:
E-Safety:
➔ E-Safety refers to the safety when using the internet & how to keep personal data safe.
➔ Personal Data:
o Name. o Medical History.
o Address. o Bank details.
o DOB.
➔ Sensitive Data:
o Ethnic Origin. o Religion.
o Nationality. o Political Views.
o Gender.
Security of Data:
Hacking:
What: Prevention:
Viruses:
What: Prevention:
Cookies:
Small files or codes that are stored on a user’s computer.
Security Techniques:
Firewalls:
What: Tasks:
Security Protocols:
> Sets of rules used by the computers to communicate with each other across a network.
o SSL (Secure Sockets Layer): It is a type of protocol that allows data to be sent and
received securely over the internet.
o TLS (Transport Layer Security): It is a type of recent protocol that allows data to be
sent and received securely between devices and users while communicating over
the internet.
▪ TLS is formed in two layers:
▪ Record Protocol: Contains data being transferred over the internet.
▪ Handshake Protocol: Secure session between user and website.
Encryption:
What: Usage:
Authentication:
1. Passwords: A readable scrambled code for the user to use to access his personal things.
2. Digital Certificates: They are a pair of files stored on a computer. Used for secure transfer
of data over the internet. Each file is divided into (Public Key) & (Private Key).
3. Biometrics: An authentication Method which relies on unique human features.
Moderated and Unmoderated Forms:
Online Internet Monitored Prevent Filter
Discussion Spam Posts
Moderated:
Unmoderated:
Chapter 9:
Factors for Audience Appreciation:
Factors:
1. Interviews. 3. Surveys.
2. Questionnaires. 4. Market Research.
What: Prevention:
Implications:
1. Legal 3. Ethics
2. Morality 4. Culture:
Chapter 10:
Netiquettes:
1. Don’t Spam.
2. Don’t plagiarize.
3. Don’t be abusive.
4. Don’t use Capital Letters.
5. Use correct spellings and grammar.
Internet vs World Wide Web:
The Internet: Allows users to:
1. Send & Receive Emails. 3. Transfer files.
2. Chat online. 4. Browse the world wide web.
➢ Http (Hyper-Text Transfer Protocol): is a set of rules followed when transferring data
across the internet that are agreed by the sender and receiver.
➢ Https (Hyper-Text Transfer Protocol Secure): is a set of rules followed when transferring
data across the internet that are agreed by the sender and receiver. This is when
encryption, SSL or TLS is used, takes more time than http.
➢ Ftp (File Transfer Protocol): Is a network protocol used when transferring files from one
computer to another.
➢ Smtp (Simple Mail Transfer Protocol): Protocol used when transferring Emails.
Web Browser is a software that allows user to display web pages on their computer screen.
Features:
1. Have a home page. 4. Have ability to choose favorite web
2. Have hyperlinks (allow navigation) pages.
3. Have search history. 5. Have undo and redo options.
URL (Uniform Resource Locator) is a link that gives the address of a webpage.
Basic Format of an URL:
Protocol://Website Address/Path/File Name
Cloud Storage:
Public Cloud: This is a storage environment in where the customer/client and provider are
different companies.
Private Cloud: This is a storage environment in where the customer/client and provider
operate as a single entity behind a firewall.
Hybrid Cloud: Combination of public and private cloud where some data is in public and
some in private cloud.
Advantages: Disadvantages:
Chapter 15:
Validation Check: For what:
Range Check: Check weather data is in given range, e.g.: <10
Length Check: Checks weather data has required number of characters, e.g., 3 no. and 2 words.
Format Check: Checks weather data is in correct format. E.g., Text, Numeric
Presence Check: Checks weather data present hasn’t been missed out.
Advantages: Disadvantages:
1. Less time needed to set up. 1. Takes up storage.
2. Easier to make. 2. Inconsistent.
3. Cheap.
Relational Databases: A database that stores its data in more than one linked table. They are
designed so that data is not stored many times.
Advantages: Disadvantages:
1. Less storage Needed. 1. Takes Time to Set up.
2. Better Security. 2. Costly.
3. Consistency.
Query Searches:
1. If you want 2 or more values: “ABC” Or “DEF”
2. If you don’t want to include: Not “ABC”
3. If it Includes ABC in its name: *ABC*
4. Ranges:
• Below: <123
• Above: >123
• And Below: <=123
• And Above: >=123
Chapter 20:
Absolute referencing: $A$12 (Before each value)
Basic Formulas
+ Addition
- Subtraction
* Multiplication
/ Division
^ To the Power
Complex Formulas and Functions
=SUM Adds 2 or more numbers together.
=AVERAGE Finds the average/mean.
=MAX Finds the highest Value.
=MIN Finds the lowest Value.
=INT Rounds the number to nearest whole.
=ROUND Round the number to whatever value.
=COUNT Counts the number of numeric values.
=COUNTA Counts the number of numeric & text values.
=COUNTIF Counts the number of given condition.
=IF To display something for a condition.
Example: Add all the years of experiences for programmers only. (There are a
number of engineers, doctors, directors, programmers. All with their own experiences)
Lookups
=LOOKUP Looks up a value from somewhere. (useless)
=HLOOKUP Looks up a value from a horizontal table.
=VLOOKUP Looks up a value from a vertical table.
Chapter 21: