Uploaded by Ayan Widanapathirana

Full ICT 0417 Note Theory update

advertisement
IGCSE
Cambridge
ICT 0417
OL
Theory Notes
From Chapter 1 to 10
Syllabus 2023-2025
Mr. Ayman Al-Nahhas
+965 97956633
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Page 2 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Section 1
ICT Theory
Chapter 1
Types and components of a computer system
1.1 Hardware and software
1.2
1.3
1.4
1.5
Chapter 2
Output devices and their uses
Optical media and optical storage devices
Solid-state media and solid-state storage devices
The future of storage devices
Network issues and communication
Potential health problems related to the prolonged use of ICT equipment
ICT applications
6.1 Communication
6.2
6.3
6.4
6.5
6.6
6.7
6.8
6.9
6.10
6.11
Page 3 of 170
Direct data entry (DDE) devices
The effects of using ICT
5.1 Microprocessor-controlled devices in the home
5.2
Chapter 6
Emerging technologies
Networks and the effects of using them
4.1 Networks
4.2
Chapter 5
Types of computer
Storage devices and media
3.1 Magnetic media and magnetic storage devices
3.2
3.3
3.4
Chapter 4
Operating systems
Input and output devices
2.1 Input devices and their uses
2.2
2.3
Chapter 3
Main components of computer system
Modeling applications
Computer controlled systems
School management systems
Booking systems
Banking applications
Computers in medicine
Expert systems
Computers in die retail industry
Recognition systems
Satellite systems
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Chapter 7
Systems life cycle
7.1 Analysis
7.2
7.3
7.4
7.5
7.6
Chapter 8
Implementation
Documentation
Evaluation
E-safety
Security of data
Additional security of data online
Audiences
9.1 Audience appreciation
9.2
Chapter 10
Development and testing
Safety and security
8.1 Physical security
8.2
8.3
8.4
Chapter 9
Design
Legal, moral, ethical and cultural appreciation
Communication
10.1 Communication with other ICT users using email
10.2 Effective use of the internet
Page 4 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
1. Types and components of computer system
Hardware and Software:


Hardware : is a Physical Components that makes a computer system
Software : is a general term of Programs that control the computer system
and processing data, there are two types
Internal Hardware:






Motherboard
Random access memory (Ram)
Read only memory (Rom)
Video Cards
Sound Cards
Internal Hard storage devices
(HDD & SSD)
RAM
ROM
Video Card
External Hardware:





Monitor
Keyboard
Mouse
Printer
Storage
Sound Card
Hard Disk Drive
Page 5 of 170
Solid State Drive
Motherboard
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Internal hardware:
Motherboard:
 Printed circuit board in all computers.
 It allow the processor and other hardware to function and communicate with
each other
 It is central to any computer system
 All components plug into the motherboard
(CPU) Central Processing Unit or (Microprocessor):
 CPU is brain / heart of the computer and consists of :
o Control unit – Coordinates input and output devices and carries out
program instructions
o Arithmetic and logical Unit ( ALU) – performs calculations and logical
comparison
o Immediate access store ( IAS) – Holds data and program instructions in
current use
 CPU Interprets , execute the commands and handle calculations, data
processing and movement data to and from system memory
Random Access Memory (RAM):




Data stored temporarily
This memory can be Written and Read
Content lost when computer is turned off
Volatile memory
Read only memory (ROM):
 To store permanent information
 Only read
 Data cannot be changed or lost when the power off
 Non-volatile memory
 Used to store BIOS instructions
Page 6 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Video card:
 Allow the computer to send graphical information to video display like monitor
or television, made of memory unit, cooling mechanism and connection to
display unit.
Sound card:
 Integrated circuit to board to provide a computer with ability to produce
sounds
Network interface card (NIC)
 NIC is a component that allows a computer or other devices to be connected to
a network.
Internal Hard Disk Drive (HDD) / Solid State Drive (SSD):
 Main internal storage
 The main advantage is fast data transfer
 Magnetic in nature and one from the methods to store the information
Software: there are two types of software (application & system)
Application software: Program that allow the user to do specific task:
• Word processing: software to manipulate text documents, the user can
create, save, edit the documents, copy and paste, importing photos, translate
etc…
• Spreadsheet: software to manipulate numerical data in columns and rows,
use formula to carry out calculations, create graph and modeling the
calculations.
• Database: software to organize, manipulate, analyze data, each database
consists of one or more tables, and can carry out query, add modify data
and create report.
Page 7 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
• Control and measuring software: designed to allow a computer or
microprocessor to interface with sensors to measuring temperature ,
control application like chemical process (pH)
• Apps and Applet: : Apps it is applications which run on mobile phones or
tablet , An applet is a small application ( software program ) designed to run
within another application and runs in a web browser
•
Audio Editing software : allow to edit and manipulate and generate audio
data
• Video editing software: software allow to manipulate videos and can do
editing, rearrange, adding, removing section, do color correction and
transition
• Graphics manipulate software : software allows bitmap and vector images
to be changed
•
System software : Program that allow the hardware to run properly and allow the
user to communicate with the computer
• Compiler : computer program that translate program written in high level
language as a whole into machine code, the original program called the
Source Code and the program after compilation called the Object code,
Examples of high level language is Java, Python, C++ , Fortran .
• Interpreter: computer program that translate program written in high level
language , translation as one statement at a time ( step by step )
• Linkers: computer program that takes one or more object files produced by
compiler and combine them into a single program. Different pieces of code
called module and the linker put all together.
Page 8 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
• Device driver: the name of software that enable one or more hardware
device to communicate with the operating system and without driver the
device unable to work.
• Operating systems (OS): software running in the background of a computer
system , without operating system the computer will not user friendly, OS
allow:
• Input / Output operation
• User communicate with the computer
• Error handling
• Managing of security ( log in – password – user account )
• Utilities : software to carry out specific tasks on a computer, and to help to
maintain and control computer resources include :
• Antivirus, Anti-spyware, Backup files, Disk repair, File management,
Security , Screensavers, Disk defragmentation
Analogue and digital data:
Computers can understand only data which formatted as a binary as base is 2 and
value only 0 and 1 which referred as digital data and real data is called Analogue
If the analogue data sent to the computer it should be converted to digital by using
hardware known as ADC ( analogue digital converter ) and if the computer is
controlling a device like a motor , data should be converted from digital to analogue
by using DAC ( digital analogue converter ).
Page 9 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Main components of computer system
Computer system consists of:
1. Input devices
2. Output devices
3. Secondary storage devices
Internal hardware devices:
1. The central processing unit (CPU)
2. Internal hard disk drive
3. Random access memory ( RAM)
4. Read only memory ( ROM) :
 Boot files: Code tells the computer what to do when the first
start up referred as BIOS (Basic input/output system.
 CMOS : Chip that BIOS stored the data ( date & time and
system configuration) in non-volatile chip called CMOS
(complementary metal oxide semiconductor) this is battery
powered
Operating systems:
Operating systems: to enable computer system to function and allow users to
communicate with computer systems
General tasks for Operating systems:
1.
2.
3.
4.
5.
6.
Controls operation of input & output & backing storage devices
Supervising running , loading, running and storage applications programs
Deals with errors may occur in applications programs
Maintain security of computer system
Maintain computer log
Allow to communicate between the user and computer system
Page 10 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
User Interfaces:
• Operating systems offer various types of user interface , will consider 4
types
1. Command line interface (CLI) – used by programmers, analyst,
somebody need direct communication with the computer for
development. as MSDOS
2. Graphical User Interface ( GUI) – used by end-user who doesn’t need
to know the computer works or who need to play games, handle the
pointing device .. as Windows
GUI
CLI
Page 11 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
3- Dialogue- based user interface
Use human voice to give commands to computer system as example new
luxury modern cars , and can say some certain commands like (Hey BMW,
drive me to the nearest airport ) , also by giving some voice commands (ON/off
light) , Apple SIRI.
4- Gesture- based interface
Moving hand, head or feet , gesture recognition allow human to interface with
the computer in a more natural fashion , this type of interface is using
computer vision and image processing
Page 12 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Types of computers
PC ( personal computer /desktop computers)
•
•
•
•
•
Advantages
Lower cost because spare parts and
connections tend to be standard
Better specification (fast processor..)
No much heating
Less damaged can be happened
because fixed in one location
Internet access is also stable because
not moved around
Disadvantages
• Not portable.
• You need to copy files if you
do some work outside.
• More complicated than
laptop
Mobile computers:
1- Laptop / Notebook computer
•
•
•
•
•
Advantages
Laptop in single unit then no trilling
wires
Can take full advantage of Wi-Fi.
Lightweight.
Low power consumption.
Portable, can be taken anywhere and
can connect with multimedia system
Page 13 of 170
Disadvantages
• Easier to steal.
• Battery is limited life.
• Keyboard and pointing devices
can sometimes be not suitable
to use.
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
2- Tablets
Advantages compared to laptops
• Very fast to switch on
• Fully portable, small, light can be
carried any where
• Built in camera & video
• Touchscreen , no need input
device
• Long battery life
• Can use several Apps as standard
(example : MP4 player)
• Don’t generate any heat
• When power button is pressed it
will be standby but remain
connected to the internet
Disadvantages compared to laptops:
• Less storage space and memory
• Typing in touch screen can be slow
and can have some errors
• Transferring files has to be done
through App store
• Laptops support type file format
more than tablets
3- Smartphone
Allow normal phone calls and also have OS ( iOS, Android, Windows)
functions of smartphone :









Send/receive email
Surf internet
Global positioning system GPS
Calendar functions
Telephone banking using banking Apps
VIOP – voice over internet protocol using internet
Streaming of video
Streaming of music
Social networking
 Instant message
Page 14 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com





Advantages
Easy to carry (very small in size
and lightweight )
Used to make phone calls and
also connect to internet while on
move
Used anywhere sine have Wi-Fi
Have hundreds of Apps
Have reasonable battery life
compared to laptop







Disadvantages
The small screen make pages
difficult to read
Small keyboard make difficult to
type things and slow also, but this
solved in large screen
Web browsing can consume
battery quickly
Memory is not large when you
compare with laptop
Not all websites compatible with
smartphone operating system
Easier to lose or stolen since small
size
The data transfer rate using mobile
phone networks is slower with WiFi
4- Phablets
Hybrid between tablet and smartphone , they have much larger screen than
smartphone and smaller than tablet but have all features as smartphone and
tablet
Page 15 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Emerging Technologies:
Impacts of Emerging Technologies:
Artificial intelligence AI biometrics:
AI it is a machine or application which carries out a task which required
some degree of intelligence for example:




Recognizing person's face
The use of language
Ability to operate machinery such as a car , airplane, train
Analyzing data to predict the outcome of a future event ( weather
forecasting)
 AI duplicate the task made by human which require decision making
and problem solving ( many tasks replaced human with robots)
The impact of AI on everyday life:
 Driverless vehicle ( train , autopilots , also cars on the future)
 Robots help disabilities people
 Robots can carry heavy things and welding cars body and entering
disaster area like ( fire , nuclear area , volcanos , bomb )
Negative impacts of AI
 Lead to job losses in a number of area (taxi drivers , train drivers .. )
 Dependency on technology can be issue on the future
 Loss of skills because human replaced by machines.
Extended reality (XR) :
XR refers to real and virtual environment and common examples as
 Augmented reality (AR)
 Virtual reality (VR)
 Mixed reality (MR)
Page 16 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Augmented reality (AR)
The features of AR includes:
 Allow the user to experience the relationship between digital (virtual)
and physical (real) worlds
 The real world enhanced with the digital details.
 The user can experience the AR world through special goggles or
smartphone
 The user is not isolated from the real world
 Examples include Pokémon Go game
Impacts in the future of AR in the following area:
 Safety and risk operations
 Entertainment AR takes the user to virtual environment that the user can
interact with the characters
 Shopping and retail
 Healthcare : the doctor can use AR to have better understanding of a
patient's body ( CT scan)
Virtual reality (VR)
The features of VR





Ability to take the user out of the world environment to the digital world
The user are immersed in the simulated digital world
The user wear VR headset to view 360 degree
This technology can be used for medicine, construction, and military.
VR hardware : headphone, head mounted display, speakers, the tactile
glove, VR goggle, joystick, driving wheel
Impacts in the future of AR in the following area:
 Military applications – training pilots
 Education – training surgeons
 Healthcare ( as diagnostic tool )
Page 17 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 Entertainment ( games when wear gloves with helmet , with sound to
make very real
 Fashion show to see the clothes on people
 Heritage ( to see the mountains)
 Business ( Training course )
 Real state ( people can look around the house )
 Engineering ( to show how design of the building will look )
 Media ( special effects of movies( The matrix ) )
 Scientific visualization ( to see molecular structure in chemistry
Page 18 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
2- Input and output devices
Input devices and their used:
1- Keyboards :
Uses :




Input of data (text, number,..) into applications software
Typing commands to the computer ( Ctrl P + Ctrl S … )
Mostly QWERTY keyboard is used
Ergonomic keyboard is used to reduce the health-related problems
like ( carpal tunnel syndrome – RSI )
Advantages
Disadvantages
• Fast text entry into the document • Can be difficult to use if the user
• Easy to use
has limited arm/wrist use.
• Easier to do verification checks as • Slow method when compared
the data is entered.
with direct data entry
• Large device.
2- Numeric keypads
Used to enter number only
USES:
 Automatic teller machines (ATMs).
 Mobile phones.
 Point-of-sale (POS)
 Chip and PIN devices when paying by credit/debit cards
 Fast entry of numeric data into a spreadsheet
Advantages
• Faster than standard keyboard
• Very easy to carry around
Page 19 of 170
Disadvantages
• Sometimes have small keys, input
more difficult.
• Sometimes the order of the numbers
on the keypad isn’t intuitive.
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Pointing devices:
1- Mouse
By moving mouse around, you can control the
position of the pointer on the screen
The optical mouse and wireless mouse are in use in
modern computer and the advantage mouse has no
moving parts
USES:
 Opening, closing and minimizing software.
 Grouping, moving and deleting files.
 Controlling the position of a pointer on the screen
Advantages
• Faster way than using a keyboard.
• Very quick way to navigate
applications and internet
• No need large desk area.
Disadvantages
• More difficult for people with
restricted hand
• Easy to damage
• Difficult to use if no flat surface
2- Touchpad
Used in many laptop as a pointing device
Advantages
• Faster than a keyboard
• No need for a separate
mouse.
Page 20 of 170
Disadvantages
• People with limited hand/wrist movement
find the device difficult to use.
• Difficult to control when compared to a
mouse.
• Difficult in certain operations such as drag
and drop.
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
3-Tracker ball
Uses
 Used in applications where the user has disability
(RSI)
 Used in a control room /faster than a mouse
 Used in some luxury cars to select functions such
as radio, telephone, music
•
•
•
•
Advantages
Disadvantages
Easier than a mouse.
• Not supplied with computers as
More accurate positioning.
standard.
More robust than a mouse.
• User may need training
Needs less desk space than a mouse
4-Remote Control
Uses :
 Televisions, satellite systems, most of systems
use remote controls.
 Control multimedia systems.
 Used in industrial applications to remotely
control processes.
Advantages
• Operated from any reasonable
distance.
• Some chemical processes are
hazardous, can select operation
from distance
Page 21 of 170
Disadvantages
• Difficult to use if the operator has
limited hand/wrist movement.
• It is easier to block the signal.
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
5-Joystick
Uses :
 Used in video/computer games.
 Used in simulators
Advantages
• Easier than a keyboard to
navigate the screen
• Control is more realistic than
using a mouse
Disadvantages
• More difficult to control the onscreen pointer
6- Driving wheel
Uses :
 Used in video/computer games.
 Used in simulators (car-driving
simulators)
Advantages
Disadvantages
• Easier than a keyboard or
• Expensive input device.
joystick.
• Movements too sensitive.
• Actual steering wheel and other
controls operate in real life.
Page 22 of 170
“Success doesn’t come to you, you go to it.” Marva Collins
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
6-Touchscreens ( input and output device)
Uses :





•
•
•
•
Self-service
ATMs
Point-of-sale terminals
Airports, railway stations, tourist offices
Personal digital assistants (PDAs), mobile
phones and satellite navigation systems
 Interactive white boards in education.
 Computer-based training (CBT) - on-screen testing.
 Used as an output device
Advantages
Disadvantages
Faster entry.
• Limited number of options
Very easy method.
available.
User-friendly.
• Can lead to problems.
Option to expand the size if
• The screen can get very dirty,
necessary
reduce its responsiveness
7- Scanners:
There are two types of scanners, The most common is
flatbed scanner, also barcode scanner is another type
Uses
• Scan documents.
• Scan in old/valuable documents/books.
• Scan in photographs.
• Scan in barcodes at POS terminals.
Advantages
Disadvantages
• Images can be stored for editing • Quality can be limited depend on
at a later date.
resolution of the scanner.
• Much faster and more accurate. • Slow at scanning if color scanning
• Recovery damaged documents
selected
and photographs.
Page 23 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
8- Digital Cameras
Digital cameras replaced with traditional based film ,
now the images stored digitally on solid state
memory , and can be transferred to computer by:
 Directly reading the memory card.
 Connecting to the computer using a USB port.
 Using wireless data transfer (Wi-Fi or Bluetooth).
•
•
•
•
Advantages
Easier to produce better-quality
photographs.
Easier and faster to upload
photographs to a computer reader.
No need to print out photographs.
Can store several hundred
photographs.
Disadvantages
• The quality of photographs
depends on the number of pixels.
• Images compressed to reduce
the memory used.
10- Microphone
Microphone connected directly with the computer,
Sounds converted to an analogue signal then converted
into a digital signal
Uses :
 Presentations.
 Input in voice-recognition software
 As a sensor to pick up sound.
 Used in video conferencing or Voice over Internet Protocol
Advantages
Disadvantages
• Faster to read text instead using
• Sound files is big.
keyboard
• Voice-recognition software not
• Manipulate sound.
accurate
• Voice-activation system, Advantage
of improving safety. – driving cars
Page 24 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
11-Sensors
 Sensor is a device to input data into a computer, the data is physical
quantity like temperature, light, moister, this data is analogue in nature
 Computer can read only digital data , then the data from sensor should
be converted to digital using an analogue digital converter ADC
Type of sensors:
•
•
•
•
Advantages
Disadvantages
More accurate than human
• Faulty sensors can give spurious
operators.
results
Readings are continuous - no break • Most sensors are analogue , they
Any necessary action or warning will
require conversion by using ADC
be initiated immediately
Systems can be automatic, removing
the need for human intervention.
Page 25 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
12- Light pens
Light pens contain sensors that send signals to a
computer whenever light changes are detected,
and only work with CRT monitor
Uses :
• Selecting objects on CRT screens
• Drawing on screen ( as example CAD Package)
Advantages
Disadvantages
 Greater accuracy than touch screen  Problems with delay when
drawing on screen.
 Small
 Only works with CRT monitors.
 Easy-to-use
 Not accurate when drawing.
Page 26 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Direct data entry ( DDE ) devices:
Devices for reading information from cards
Card readers:
Magnetic stripe readers
Used to read information on the magnetic stripe
founded in back of credit/debit card
Uses:
 On credit/debit cards for use at ATMs or EFTPOS
(Electronic Funds Transfer at Point Of Sale)
terminals
 Security devices to allow entry to buildings,
(as in hotel rooms)
•
•
•
•
•
•
Advantages
Disadvantages
Fast data entry
• If the magnetic stripe gets
Error free
damaged the data is lost.
Secure
• Doesn’t work at a distance.
Prevents access to restricted areas • Not human readable.
Not affected by oil, water, moisture
Very robust.
Contactless card readers
Contactless debit or credit cards allow customers to pay
for items worth up to $25 without entering their PIN
The steps are taken to pay :
 Costumers look out for the contactless symbol on
the payment terminal
 The shop assistant enter the amount
 The reader inform the customer to present contactless card
 The customer hold the card in front of the reader
 The terminal display the card has been read
Page 27 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
•
•
•
•
•
Advantages
Faster transaction.
Encryption.
No typing errors.
Retailers will not access to the
customer’s card.
The chip in the contactless credit
card responds with a unique
number used for that transaction
only.
•
•
•
•
Disadvantages
More expensive than normal cards.
A thief with a suitable reader could
monitor contactless card
transaction
Can take money twice.
Transactions are a small
Chip and PIN readers
Similar to smart card reader but used in EFTPOS terminal
Uses:
 Payments using card in (restaurants, supermarkets, travel,
etc.).
 Read information on the Chip founded in front of
credit/debit card
Advantages
Disadvantages
• More secure
• Need to be careful to ensure PIN isn’t
• More robust
read by somebody else while typing it in.
Radio frequency identification (RFID) readers
Use radio waves to read and capture information stored on tag
RFID tag is made up of two components:
 A microchip stores and processes information
 An antenna receive and transmit data
Uses:
 Livestock tracking ( each animal in farm will be known)
 Retail ( like barcode but without scanning )
 Admission passes (parks RFID cards )
 Libraries ( book can tracked )
 Electronic passport ( read information from the chip )
Page 28 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
•
•
•
•
Advantages
No direct line
Very robust
Very fast read rate and reuse.
Bulk detection is possible
(hundred tags/s .
•
•
•
•
Disadvantages
Tag collision.
Easy to jam or interrupt.
Easy to hack.
More expensive than barcode
system
Optical Mark recognition / Reader (OMR) Read
Read marks written in pen or pencil
Uses:
 Read questionnaires, multiple-choice
examination papers and other forms
Advantages
Disadvantages
• Very fast way of inputting the
• The forms need to be carefully
results of a survey.
designed and correctly positioned
• More accurate.
which can make problem for result.
Optical character recognition/reader (OCR)
The new system in processing of passport and ID cards
Uses:
 Processing of passports and identity cards
 Converting printed documents to an editable
electronic format
 Read car number plate
Advantages
Disadvantages
• Much faster data-entry system
• Difficulty reading handwriting
• The number of errors is reduced
• Not very accurate
• Can read handwriting
Page 29 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Comparison between OCR and OMR
OCR
Because this method reads handwriting, it
is possible for customers to extend their
answers to questions
poor handwriting may cause reading
errors
OCR is used for converting printed
documents to an editable electronic
format
OCR requires a complex recognition
system
Fewer 'how to fill in' instructions are
needed for forms designed to be
completed and then read by OCR
While OCR is more accurate than data
entered into a computer by keyboard,
there are still problems recognizing
all types of handwriting, leading to
inaccuracies
OMR
Since use shading to answer, the
information obtained is limited to the
choices offered in each question
OMR relies on simply detecting where
marks have been made on a page; the
position of the marks is compared to
a template stored in memory
OMR simply reads the position of marks,
so it is ideal for multiple-choice exam
papers
This method requires complex (and
expensive) forms to be
completed; but the recognition system is
simpler than OCR
While this method requires more 'how to
fill in' instructions, it is easier and faster
for customers to complete OMR forms
than to complete OCR forms
OMR is essentially a more accurate
method for reading data than OCR
Barcodes readers ( portable scanner )
Uses:
 Supermarkets and shops
 Libraries to keep track of books
 Safety function - electrical equipment checking
regular basis.
•
•
•
•
Advantages
Much faster
Way of recording data
Allow automatic stock control.
Trusted technology.
Page 30 of 170
Disadvantages
• Expensive system to administer.
• Not foolproof.
• Easily damaged than RFID tags or
magnetic strips.
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Quick Response (QR) code
• Is made of matrix of filled in dark square on light
background, normal barcode can have 30 digits but
QR can hold over 7000 digits.
• Smartphone with camera can read QR code which
can be website link or advertising
•
•
•
•
•
•
•
•
Advantages
No need to write down a key or
website
QR can store the website address
on business card or on the
magazine, train, bus
Can be used for multiple elements
Fast access to additional
information
Can be linked into a website and
email
The QR code is unique
More robust than bar codes
Secure as the code cannot be
swapped
Page 31 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Output devices and their uses
Monitors (screens)
CRT monitors
Cathode ray tube (CRT) monitors
Uses:
 Output device
 Used with light pens
Advantages
• The angle of viewing is still better
than with most TFT monitors
• They work with light pens in
CAD/CAM applications
•
•
•
•
Disadvantages
Present a safety hazard if not
supported properly
Run very hot and can cause fires
They consume more power than
modern TFT
They can flicker, can lead to
headaches and eyesight problems
LED and LCD screens
Made up of thousands of tiny pixels.
Uses :
 Output device
 Laptop computers.
•
•
•
•
Advantages
Disadvantages
Lightweight
• The angle of viewing a TFT is
Produce less glare than CRT monitors
fairly critical.
Less radiation
• Definition is sometimes not as
Consume less power / don’t generate
good as a CRT monitor.
much heat
Page 32 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
LCD and LED monitors
• CRT monitor almost gone
• Most monitors become LCD ( Crystal Liquid display / diode
technology
• Modern monitors are backlight using light emitting diode LED
which give the monitor better contrast and brightness
• LED no need warm up to reach to full efficiency
• LED produce brighter light
• LED consume very little power / produce less heat
• OLED is new technology , which is very thin, flexible, lighter
Multimedia projectors
Uses :
 Training presentations
 Advertising presentations
 Home cinema systems
Advantages
• Many people can see a presentation
without crowding
• No networked computers
Page 33 of 170
Disadvantages
• Images can sometimes be fuzzy
• Expensive
• Setting little difficult to setup
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Printers
Laser Printers
Produce high-quality, high-volume printing
Uses :
 When low noisy required
 High-quality, high-volume printing
Advantages
•
•
•
•
•
Low noisy
Fast if several copies
Handle very large print jobs
High quality
Long time toner
Disadvantages
• Color laser is expensive
• Produce ozone and volatile
organic compounds.
Inkjet printers
Uses:
 Low volumes are required
 For single pages are ideal
 3-D inkjet printers to produce prototypes
 Working by using two technologies :
• Thermal bubbles
• Piezoelectric
Advantages
Disadvantages
• High-quality
• Slow output if several copies
• Cheaper than laser printers.
• Can't do large print jobs
• Very lightweight and a small
• Printing can (smudge) if user is
• Don’t produce ozone and volatile
not careful
organic compounds
• Can be expensive
Page 34 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Dot matrix printers
type of impact printer head : this type of printer is
slow, noisy and the output is not good,
Uses:
 Used in noisy environments
•
•
•
•
Advantages
Used in environments that would be
a problem to laser or inkjet printers
Carbon copies or multi-part outputs
can be produced
Very cheap
Easy to use
Disadvantages
• Very noisy
• Actually cost more than an inkjet
• Very slow, poor-quality printing
3 D printers
 Primarily used in computer aided design CAD
applications, can produce
solid objects and use inkjet
print heat
 Use additive manufacturing
•
•
•
•
•
Advantages
Disadvantages
The manufacturing of items much easier • None original items
than ever before
• Dangerous or illegal activities.
Take a short length of time for designs to • Due to job losses
be converted into working prototypes
less costs
Medical benefits , producing artificial
organs, prosthetics and medical
products ,tissue engineering, artificial
blood vessels, designs of medical tools.
Parts for machinery manufactured using
3D printers
Page 35 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
• To create a solid object using 3D printers :
• A design is made by computer aided design software ( CAD)
• The finalized drawing is imported into some special software that
prepared it in a format that is understand by 3D printer
• The 3D printer is setup to allow the solid to be made
• The solid object is built up layer
• The object is removed from the printer and then prepared
4- ( Graph) plotters
 Used to produce large drawings e.g. blueprints of
buildings; are often used with CAD applications
 Used to produce large pictures for use on
billboards or giant posters
 They can also print on plastic coated paper
 The most common types are pen plotters



Advantages
Can produce huge printouts
Print quality is extremely high
Able to print on many variety of
materials



Disadvantages
Slow in operation
Expensive to buy and maintain
Have very large physical
footprint
Speakers
Uses :
• Output sound
• Play downloaded sound files
• Audio output helps disabilities user.
Page 36 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Actuators
Advantages
 They allow remote
operation
 They inexpensive
devices
Page 37 of 170
• Used to take signals from a
computer and convert
them into a form of motion
as example operating
motor, pumps and valves, switches , buzzers
• Usually convert from digital to analogue (DAC)
Disadvantages
 They are additional device in the system that
could be wrong
 The signal should be converted to DAC to enable
computer control
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
3- Storage devices and Media
Backing of data concept:
Backing of data is refers to copy files or data to different medium ( disk, tape,
flash drive .. ) in case of problem with the main secondary storage device,
copying should be in regular bases.
Why back up data?
• To safeguard against loss of data due to the failure of the original
secondary storage
• To safeguard damage caused by hackers
• Backup can be made to use the files elsewhere
• Backup also taken to protect data files from virus
Three different types of storage media:
 Magnetic
 Optical
 Solid state
Page 38 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Magnetic media and Magnetic storage media - direct access
Magnetic storage media depend on magnetic properties of certain
materials.
1- Hard disk drives - Fixed (HDD)
Uses :
 To store the operating systems, software
/data/files
 To store applications software
 Real-time systems ( robots, control of a
chemical plants) and online systems
 Used in File Servers for computer networks
How HDD works:
 Actuators are used to move the reads / write heads
 A read/write arm swings the read/write head back
 Each read/write head contains a tiny magnet which allows the
data on the platter to be read
 Platters are made of glass , ceramic or aluminum which are
coated in iron oxide
 There are two read/write heads
 Data is stored in track , each track broken into sectors
 A map of the sectors is stored on HDD and known as file
location table
Advantages
Disadvantages
• Very fast data transfer and fast access • Easily damaged
times
• Have many moving parts
• Very large capacities
• Their read/write operation can
be quite noisy
Page 39 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
2- Portable hard disk drives
Connected to a computer using USB ( Universal
Serial Bus) port
Uses:
 Backup systems
 Transfer data between computers
Advantages
 Access time of data is very fast
 Large memory capacity
 Transferring data between computers
Disadvantages
• Easily damaged if dropped or
subjected to a strong
magnetic field; an incorrect
shut-down procedure could
also lead to loss of data
Magnetic Tapes derives
Data is read from the tape using serial access, this way is useless in real-time or
online applications because is very slow method
Uses:
 In applications where batch processing is
used, for example, clearing bank cheques,
utility billing (gas, electricity, water)
 Backup media
 Used in long-term archiving of data.
Advantages
•
•
•
•
Less expensive.
Very robust technology.
Huge data storage capacity.
The data transfer rate is fast.
Page 40 of 170
Disadvantages
• Very slow data access times.
• When updating, another tape is
needed.
• They are affected by magnetic
fields.
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Optical media and optical storage devices
CD/DVD optical disks
Laser light is used to read data and write
( R - Write once only) – (ROM - only read ) – ( RW - written or read
many times)
DVD have different technology from CD to increase storage capacity
CD-ROM and DVD-ROM
Uses:
 CD-ROMs are used to store
music files, software, computer
games and reference software , they can't be written over
 DVD-ROMs have much larger storage and used to store films and
games
Advantages
Disadvantages
• Store more data than floppy disks
• Less expensive than hard disk
• The data transfer access time is
slower than hard disks
Page 41 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
2- CD-R and DVD-R
R letter means the disk is recordable once only
Uses:
 Home recordings of music (CD-R) and
films (DVD-R)
 Store data to use later or to be transferred to another computer
Advantages
Disadvantages
• Cheaper than RW disks
• CD-R/DVD-R can only be
• Once burned they are like a ROM
recorded on once.
• Not all CD/DVD players can read
CD-R/DVD-R
2- CD-RW and DVD-RW
RW means the disk is rewritable media
and can be written several times
Uses:
 To record television programs
 Data can be added to at a later.
 Used in CCTV systems
Advantages
• Can be written over many times.
• Can use different file formats
each time it is used.
Disadvantages
• Relatively expensive.
• It is possible to accidentally
overwrite data.
3- DVD – RAM
Uses:
 In recording devices such as satellite
receivers to allow simultaneous recording
and playback
 Used in camcorders to store movies
Page 42 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Advantages
• Long life
• A rewrite operation over 100000
times
• Writing on DVD-RAMs is very
reliable
• Very fast access
• No need to finalize the disk
• Very large capacity
• Ability to read data at the same
time written
Disadvantages
• Not as compatible as R or RW
format
• Expensive.
4- Blu-ray discs
The main differences are:
 A blue laser, carry out read and write operations
 Blu-ray can store up to five times more than DVD
Uses:




Home video
Storing and playing back movies.
Data storage or backing up
Camcorder to store movie footage
Advantages
• Very large storage capacity
• Very fast data transfer rate
• Data access speed greater than
other optical
Page 43 of 170
Disadvantages
• Expensive
• Encryption problems
• Fewer movie titles on Blu-ray
format
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Solid state media and solid – state storage device
Solid State drives (SSD)
There are some advantages of using SSD rather than HDD
 More reliable
 Lighter
 Lower power consumption.
 Run much cooler than HDDs
 Very thin.
 Data access faster than HDD
1- Memory sticks/pen drives
Store several gigabytes of data and use the
solid state technology
Uses :
 Transporting files between computers /
backup
 Security device to prevent software piracy ( dongle)
Page 44 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Advantages
Disadvantages
• Very compact and portable media
• Very robust
• Doesn’t need additional software
to work on most computers
• Not affected by magnetic fields
• Small
• Can’t write-protect the data/files
• Easy to lose
• The user needs to be very
careful when removing a
memory stick from a computer incorrect removal may damage
the port and memory stick
2- Flash memory cards
Uses:
 Storing photos on digital cameras
 Used as mobile phone memory cards
 Used in MP3 players to store music files
 Used as a backup store in hand-held
computer devices
Advantages
• Very compact and can be easily
removed and used in another
device
• Very robust.
Disadvantages
• Expensive per gigabyte.
• Have a limited life.
• Lower storage capacity than
hard disks.
The future of the storage devices:
 Recently many computers come only with USB without CD/DVD
player, flash memory now is using to transfer files between
computers
 Many people now store data or music on fixed hard disk or tablet ,
mobile , IPod or cloud which data can be accessed anywhere, they
can streaming the music from internet.
 Many TV now setup as smart TV which can steaming movies without
CD/DVD
Page 45 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
4- Networks and the effects of
using them
Computer Network:
A network is two or more computers or other device connected together so
that can exchange data, share resources and files. Network created using
cables or wireless signal
Advantages of using Network:
 Easily share files and data
 Share resources (printers, internet..)
 Communicate with other network users
 Store data centrally by using file server
 Keep all setting centrally
Disadvantages of using Network:
 Greater risk of hacker
 Greater risk of viruses
 Cost of extra equipment
 Printer queues developing, which can be depressed
 When the main server breaks down, network will not function or using
as standalone computers
Network Devices and terms:
Network interface card (NIC)
Allow to connect device to the network
Page 46 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Internet protocol (IP) and media access control ( MAC ) addresses
 Each device on the internet given unique address called internet
protocol (IP) address and the form is ( 109.108.158.1 )
 Home computer when connect to internet given IP assigned by ISP
(internet service provider )
 This IP can use instead of using full URL ( http://109.108.158.1)
Media access control (MAC)
 MAC Address is used to ensure the physical address of computer. It
uniquely identifies the devices on a network.
 Made of 48 bits shown in 6 groups of hexadecimal digits
Internet protocol IP
• IP address is logical address and used to uniquely identify the
connection of network with that device take part in a network.
• IP changed if you change your area while MAC remain constant.
Data Packets:
Data is moving around the network as data packets, data have header
includes:
 Sender IP address
 Receiver IP address
 Identify number of the packet
 The packet size
 How many data packets make up the whole message
Page 47 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Hubs:
Hubs are hardware devices that can
have a number of devices or
computers connected to them to
make LAN and not very high secure
of data distribution / suitable for
home network, the main task is to
take data packet received at one of
its port and broadcast it to every computer in the network
Switches
Similar to hub, distributing data
packet but more efficient,
connect a number of devices or
computers together to form a
LAN, Switch checks the data
packet and sends to an
appropriate device this makes using switch more secure
Modem
• A device that converts analogue signal from telephone line to
digital signals which can be ready for the computer
• Also converts a computer’s digital signal into an analogue
signal for transmission by telephone line.
• Dial-up modems, transmission speed 60 kb/s
• ADSL (asymmetric digital subscriber line) modems operate at
up to 100 Megabits /s
Page 48 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Bridge:
Bridges are devices that connect
one LAN to another LAN that
uses the same
protocol
Router:
•
•
•
•
Connect network/computer to the internet
Connect LAN/network together
Transfer data between networks
Router can connect two devices using
cables or wireless signal
How the data from a router is routed
•
•
•
•
•
•
Data is sent in data packets
Each data packet contains an IP address of the next router
The router reads/checks/inspects the IP address
It checks the IP address against its routing table
Data packet is sent to the router with the IP address
The router uses the IP address to work out the best route/destination
computer
• The router stores the IP addresses in routing table
Page 49 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Wi-Fi and Bluetooth
Both provide wireless communication and
uses radio signals
Wi-Fi: is wireless networking technology
make it possible to connect devices
with a wireless connection to a network or to a single computer
• Easier to connect many devices to the network
• Better range up to 100 m
• Reduced cost of cabling / better security/ needs password
• Limited area of network
• Strength of signal is weaker
• Possible slow data transfer speeds
• Easier to hack into/Less secure
• Sometimes physical devices can interfere with signal
which due to disconnection
Page 50 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Bluetooth: is wireless networking technology designed for very short
range connections
• Connecting wireless devices such as mouse, phone, which are very
close to a computer
• Transferring files between devices
• Printing wirelessly from a Tablet or Mobile phone
• Very slow data transfer speed
• Short distance of coverage, less than 30 meters distance
• Less secure since no password required
• Support limited number of devices
• Low-bandwidth
Page 51 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Differences between Wi-Fi and Bluetooth
Cloud computing storage
• This method to store data remotely to access from anywhere at
any time
• This data stored in different servers in case of maintenance or
repair this is called data redundancy.
There are three common systems:
1. Public cloud: Storage environment where the client and cloud
storage provider are different companies
2. Private cloud: Storage provided by a company protected by
firewall
3. Hybrid cloud: Combination of the two previous, sensitive data
will be stored in private cloud and less sensitive data will be
stored in public could
Page 52 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Advantages from using cloud computing (storage):
 No need to carry memory sticks
 You don’t have to pay for large storage capacity on your
computer/tablet or mobile phone
 Cloud will ensure that your files are backed
 Ability to synchronize files ( automatically updated )
 Cloud storage is ideal for collaboration purposes ( several users
can edit a single file or document)
 All devices tend to work with the cloud
 Access files anywhere
 Files is centrally stored
Disadvantages from using cloud storage:
 Security aspects
 If the user have slow internet connection it will be a problem
How to configure small network:
Suppose you asked to setup and configure small network, you have to do
the following:
• Setup an account with ISP
(Internet service provider )
to receive internet
connection
• Setting an IP account if
internet access is required
• Buy appropriate hardware
and make setup for all
hardware
• Configure all hardware with software correctly to allow wireless
connectivity
Page 53 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
• Put all software into the server with its license
• Setup privilege (each user can access only on their own area)
• Setup network manager level of privilege to monitor the network
uses and can change the password
Purchase hardware and software:
1-Hardware
Router
to connect your LAN to the
internet
Switch /
Hub
to connect Network devices
together using cables
Network
cables
to connect physical
connections
Firewall
it can be hardware of
software , to protect the
network against hacking
Server
To manage network
functions such as network
security, network file
storage, share resource
courses, etc.
Page 54 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
2- Software
Web
browser
to browse the internet
E-mail
to send and receive e-mail
including attachments
Security
Anti-virus /Spyware software
to protect your computer
from external threats
(Viruses / Hackers )
Page 55 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Common Network Environments
Internet, intranet and Extranet,
Network types
Local area networks (LANs)
 Covers small area (one building) or within close
area.
 LAN consists of number of computers and
devices that usually connect to a Switch/Hub
which is connected to the router
Advantages
Disadvantages
• Sharing of resources
(printer, internet...)
• Ease of communication
between users.
• A network administrator
to control and monitor all
aspects of the network
• Easier spread viruses to whole network.
• Printer queues developing, which can be
depressed
• Slower access to external networks
• Increased security risk compared to
stand-alone computers
• If the main server breaks down mostly
network will not function
Wide area networks (WANs)
 Used where computers or networks are
situated a long distance from each other
 WAN is often created by joining several
LANs together
 Router is used to connect LAN networks
to form a WAN network
 The most common example of WAN is Internet
Page 56 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Wireless LANs (WLANs)
 (WLANs) are similar to LANs but there are no
wires or cables
 Devices known as Access Points (AP) are
connected to wire network at fixed locations.
 These devices provide wireless access to
devices on the network.
 It is much more convenient to use wireless
connections instead of running long wires all
over the building
Advantages
• All computers can access the
same services and resources
(such as printers, scanners,
internet)
• Increased flexibility.
• Adding new computers and
devices is very easy
Page 57 of 170
Disadvantages
• Security a big issue
• Affect the signal by any problem.
• The data transfer rate is slower
than in a wired LAN.
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Page 58 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Network issues and communication:
Security issues:
• How hackers can affect your data and network
• Threats of data:
 Data could be deleted,
edited, corrupted or
replicated
 Data could be passed to
other people
 Accessing your email
account
 Carrying out online banking
• Threats of network:
 Network could be shut down or infected by virus
 Could stop production , cost a lot of money
Methods of Authentication (username and password)
• Authentication: it is a technique to ensure only authorized
users are able to gain access to the network via
Username/Password or Biometrics, Magnetic Card, Digital
certificates...etc.
ID and Password as authentication method:





Page 59 of 170
Password can be guessed especially if week password.
Password can be seen by others
Password can be stolen and used by others
Spyware may be used to get the password
Password can be hacked by using password generating software
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Some ways to protect your password:
 Run anti-spyware software
 Change passwords on a regular basis
 Passwords should not be easy to guess or break, Strong
passwords should contain:
• At least 8 characters, one capital letter.
• At least one numerical value.
• At least one other keyboard character.
 Strong password Exp. (Syl2@#TT90kj=0 )
 Week password Exp.( white, ahmed ,,,, )
Other authentication methods
 Zero login and biometric
Zero login can do by using a device being smart and secure based on
 Biometric (finger print , face recognition)
 Behavioral patterns( how you walk , typing speed , your normal
location, there are some disadvantages that need consideration
 How do users know when they are being monitored
 How do you know if/when he logged out
 How well protected it in reality
 Magnetic strip cards:
• Swiping card through card reader, data as name, ID, number,
already stored in the card.
• Some cards use holographic which is more secure
Advantages of magnetic strip cards
 Easy to use
 Not expensive technology
 Can be remotely deactivated if lost
Page 60 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 Card can be multi-purpose ( door key , network access and
can be used in vending machine to buy food or drink)
Disadvantages of magnetic strip cards
 Less secure than biometric method
 The card wear out with a lot of use
 The reader often fail in the first attempt
 Smart cards
• By adding chip and antenna into a security card it will work as
smart contactless card which have name, ID, date, security
number
Physical token (hardware)
• As in banking, when the user get access to web
page some authentication required to prove
who they are, they need physical token supplied
by the bank
Electronic token
• A software or App. installed in user's device as smartphone
• When the user need access to internet and an website require
electronic token
• This software generate OTP for short time to use it with login
name and password to get access
Viruses:
• Computer virus is a piece of programming code/ software which can
install and replicate itself on the computer system without the user’s
permission which can cause:
 Crash the computer ( become slower)
 Can delete the files
Page 61 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 Data files can be copied by hacker
 Can stop the production
Anti-malware software:
Antivirus:
• Antivirus software will check for virus attacks.
 They check software or files before they are run or loaded
 Checking of software and indicate a possible virus.
 Any possible files or programs that are infected are put into
quarantine that allows automatically deleted or ask the user to
make the decision about deletion.
 Antivirus software should up to date
 Full system should checks once a week.
To avoid virus look at security indicator https or padlock symbol
To avoid virus and spyware when using internet:
 Don’t download any files from
untrusted source
 Don’t install illegal software
 Don’t click any link from unknown
websites
 Ensure antivirus is up-to-date
 Always look at security indicator
https or padlock symbol
 It is possible to pick up virus from any device plugged into your
computer.
Page 62 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Electronic conferencing
Type of
communication
Video Conferencing
Overview
Hardware
• Video conferencing uses
both video and audio
using an internet
connection
• It can be used for
business meeting when
people are in different
locations
Web Camera| Screen
|Speakers| Microphone
Software :
• software is very important in successful conference
• webcam and microphone drivers
• Coder-DECoder to coding and decoding digital data
• Echo cancellation software
Advantages
Disadvantages
• Much easier to access important
documents or bring experts.
• It is possible to hold conferences
at short notice.
• Not travelling to meetings
reduces costs:
 Reduced travelling costs.
 No need to pay for hotel
accommodation.
 Reduces transportation.
• Technical problems with the internet
can affect the quality
• Setup cost and purchase hardware
• Lack of personnel contact
• Different time zone could difficult to
find suitable time
• Not possible to sign document
Page 63 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 When have delegates need
travel to unsafe places
around the world.
Type of
communication
Audio
Conferencing
Overview
Hardware
Audio conference can be done
over the telephone network or
using a computer making use of
VOIP
• The organizer of the phone
conference is given unique Pin which
can be shared participants to join
Telephone (VOIP) –
they have to dial the conference
phone number then they would have Microphone – speakers
enter a PIN
Web
Conferencing
Web conferencing can be done using
internet connection
(webinar or webcasts) • Very similar to video conferencing
as the participants can see Video
and hear Audio
• Participants can join to the
conference by clicking on the link
provided by the organizer.
• Instant message available to
communicate with another
Web Camera|Screen
participants
|Speakers| Microphone
• Business meetings
•
Participants
can
be
given
• Presentations.
permission to speak and can share
• Online education /
contents
training
Page 64 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
5- The effects of using ICT
Microprocessor – controlled devices:
Effects of using microprocessor-controlled devices in the home
The effects can be positive and negative effects in our:
 Lifestyle
 Leisure time
 Physical fitness
 Data security
 Social interaction
The devices that uses computer to control its functions, this devices
fall in main two categories:
1- Labor – saving devices:
 Automatic washing machines
 Microwave ovens
 Cookers
 Automatic dishwashers
 Robotic vacuum cleaners
 Bread making machines
 Smart fridge and freezer
This allow people to get on with other things while the device carries
out their tasks
2- Other type of devices
 Alarm clocks
 Television sets
Page 65 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 Central heating and air conditioning systems
 Home entertainment systems
 Mobile phones and tablets
Lifestyle, leisure, time and physical fitness
Benefits from microprocessor-controlled devices in modern home:










Microprocessor controlled devices do much of the housework
Do not need to do many things manually
Do not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washed
Can leave their home to go shopping/work at any time of the
day
Greater social interaction/more family time
More time to go out/more leisure time/more time to do other
things/work
Are able to do other leisure activities when convenient to them
Can encourage a healthy lifestyle because of smart fridges
analyzing food constituents
Do not have to leave home to get fit
Advantages and disadvantages of microprocessor-controlled laborsaving devices
Advantages
Disadvantages
Reduces number of manual task at
home
Give people time to do some
activities (shopping – hobbies ) while
devices cooking foods or washing
clothes
Smartphone can make control to
switch on/off oven / central heating
Page 66 of 170
Can lead to unhealthy life styles
because readymade meal
Tend to make people lazy since they
are depend on devices
People become less fit if the people
just lie around at home while the
devices carry out the tasks
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Automatic burglar alarms give people Losing household skills
sense of security
Smart fridges and freezer can lead to
healthy lifestyle
Advantages and disadvantages of other of microprocessor-controlled
devices (not related to lifestyle)
Advantages
Disadvantages
Save energy since the device can
switch off themselves
Some people not familiar with this
technology , it will be difficult to use
It is easy to program the device by
using QR codes instead of press
buttons manually
Leaving devises on stand-by like TV +
receiver ) is very wasting of electricity
Some electronic devices can’t repair
specially circuit board ( just thrown
away )
Social interaction
Positive aspects:
 Easier to make new friends using chat rooms
 Easier to find a friends who share similar interests
 Less expensive to keep in touch by using VOIP
Negative aspects:
 Social isolation
 A lack of social interaction
 People behave differently when interacting online
Monitoring and controlling transport
 Social monitoring of traffic on motorway
 Automatic number plate recognition ( ANPR)
 Automatic control of traffic lights
Page 67 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 Air traffic control systems
 Railway signaling systems
Control of smart road systems and smart signs
 Smart motorway : monitoring and control of the traffic and the
information displayed on the sign
 If an accident smart motorway signs can control traffic to
redirect or keep moving
 If the system hacked imagine what will happen
Rail and airline network control system
Advantages and disadvantages of transport monitoring and control
systems
Advantages
Disadvantages
Smart motorway reducing traffic jam Hacker can gain access to the
system
Transport systems are more efficient
If the computer system fails then
all system will stop
Traffic offences can automatically
Poorly designed will compromise
penalized using ANPR
safety
Computerized system reduce human
ANPR system keep all people
error
tracked
Stolen car can be tracked
Autonomous vehicles in transport
 Driverless are increasing through very complex robot
 Autonomous cars use sensors , cameras, actuators and
microprocessors to carry out actions safety:
Page 68 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 Change gear
 Apply the brakes
 Turn the steering wheels
Advantages and disadvantages of autonomous vehicles
Advantages
Disadvantages
Safer , human error is removed ( few Very expensive system
accidents)
Vehicle will operate more efficient
Can be hacked
Reduce traffic congestion
Security and safety issues
Increase lane capacity
The need to make secure system
Reduce travel times
Driver and passenger may be
dislike this technology
Vehicle will find car-park and self-park Reduction in the need of taxis
Angoumois train
This system use system called LiDar (Light detecting and ranging)
Advantages and disadvantages of autonomous train
Advantages
Improve punctuality of the trains
Reduced running cost
Improved safety
Minimize safety consumption
Possible to increase frequency of the
train
Easier to change train schedule
Page 69 of 170
Disadvantages
System possible to hack
System will not work well with
busy system
High cost ( train – control
equipment – train staff )
Ensuring passenger behavior is
acceptable
Passenger dislike new system
Needs CCTV to monitor railway
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Autonomous (pilotless) airplanes:
Advantages and disadvantages of pilotless airplanes
Advantages
Improving of passenger comfort
Reduced running cost
Improved safety
Improved aerodynamics
Disadvantages
Security aspects
Emergency situation during the
flight be difficult to deal with
Hacking into the system
Passenger reluctance
Software mistakes
Potential health problems related to the prolonged use of IT equipment
Health risk
Causes of health
Elimination or reduction of
risk
health risk
Back and neck
Cause by sitting in • Use fully adjustable chairs to
problem/strain front of a computer
give the correct position
screen for long • Use foot rests to reduce
period in the same
position problem
position.
• Use screens that can be
tilted to ensure your neck is
at the correct angle
Repetitive strain Damage fingers or • Ensure correct position is
injury / RSI :
wrist by using
maintained
continuous
• Make proper use of a wrist
keyboard or mouse
rest when using a mouse or a
click buttons
keyboard
• Take regular break and do
some exercise
• Use ergonomic keyboard
Page 70 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Eyestrain :
Headaches :
Ozon irritation:
Page 71 of 170
• Use voice- activated
software
Caused by looking • Ensure there is no screen
at the screen for
flicker which can lead to eye
long time or having
problems
incorrect lighting
• Change screen to LCD which
flicker are less
• Take a regular break
• Use screen anti-glare if the
lighting in the room is not
correct or use window blinds
to reduce sunlight reflecting
from the screen.
Caused by
• Use anti-glare screen or
incorrect lighting,
window blinds to cut out
screen reflections,
reflections
flickering screen.
• Take a regular break
• User should check his eyes
on a regular basis
Caused by laser
• Proper ventilation should
printer in the office
exist to remove the ozone
area
gas as quickly.
• Laser printers should be
housed in a designated
printer room
• Change to the other type of
printer if necessary
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
6- ICT Applications
6.1- Communication:
6.1.1 - Communication media
Posters and Newsletters
Newsletter and posters can easily created by word processor , and
have photos may be taken by camera or download from internet,
How to creat posters or newsletter :
 Run Microsoft word
 Insert photos from camera, internet, clouds, hard disk or scan
hardcopy
 Photos can uploaded from memory card of camera
 You can crop the photos , edit or resize
 Text could be typed using keyboard
 Spelling should be checked
 Names will be highlighted as error and may be acceptable
Newsletter is a very useful method to getting important
information which can be useful for company, which depends on
target audience
Guidelines to produce attractive newsletter:
 Don’t squeeze all information on one page
 Use easy and readable fonts
 Avoid to use capital letters , means " shouting"
 Use bold text in headings
 Use real photos
Page 72 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Posters: is a good way for publishing and advertising
 Can be for movies, and some events
 Can be printed with high quality
 Large poster for eye catching
Websites:
 Companies uses websites
for advertising and
communicate the customers
 Websites can easily updated
and can provide relevant
and up-to-date information
 Websites can use for online shopping, research, social
networking, banking..etc
Advantages
•
•
•
•
•
•
Page 73 of 170
Video/ sound can be added
Can add hyperlink to another websites
Can have navigation buttons
Can have hit counter
Seen by global audience
Much easier to update
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Disadvantages
•
•
•
•
•
•
•
Websites can be hacked
Risk of pharming
You should have a computer and internet
It's not portable like paper-based
Website maintain is expensive
Because its global, difficult to target the correct audience
You have to find a way for people to know your website
Multimedia presentations:
Presentations that use animation, video and
sound or music are generally much more
interesting than a standard presentation
and can be displayed on the projector to
keep the audience see.
Advantages:
•
•
•
•
Video/ Sound/Music can be added
Can add hyperlink to the presentation
Can have transition effects
Presentation can be interactive
Disadvantages:
• It needs special equipment which can be expensive
• Equipment failure can be disaster
• Wherever presentation you need internet connection
Media streaming
User can watch movies or listen to the music through internet, streaming is
a continuous videos or audio files. Buffering make sure the video plays
back smoothly without freezing
Page 74 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
E-publications:
Material can be also available electronic for examples:
• E-books
• Digital magazines
• Digital newspapers
• Digital libraries
Publications can be download from internet, can increase the size and
include media.
Page 75 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
1.2- Mobile communication:
Mobile service allow to:
 SMS : allow quick way to communicate with others at anytime
 Phone calls : make call on the move
 Voice over internet protocol (VIOP) : make calls through internet
 Video calling: use software as facetime and zoom
 Internet access: access to internet through mobile
6.2 Modeling applications:
6.2.2 Computer modeling:
Simulation is the creation of a model of a real system in order to study
behavior of the system.
Advantages of using models:
 Less expensive than to build real thing
 Safer to build model ( chemical process)
 Allow to try different scenarios
 Sometimes impossible to try some tasks in advance
 Faster to use a computer model
Disadvantages of using models:
 Sometimes computer model can be expensive
 People reactions to the result of simulation mat be not positive
Computer modeling fields:
 Personal finance
 Bridge and building design
 Flood water management
 Traffic management
 Weather forecasting
Page 76 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Personal finance: uses spreadsheet model
Bridge and building design:
 Before buildings are constructed, simulator take place to make sure
the building fit the requirements
 When building a bridge the modeler should consider number of
scenarios :
 The amount of traffic
 The effect of strong winds
 The effect of earthquakes
 The effects of tidal waves and ice floes
 The effects of vibration
Similar scenarios are used when designing new building
Page 77 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Computer modelling provide the following features
 Possible to zoom into images to find details
 Design can be rotated
 Build bridge and buildings are expensive , modeling can
detect any mistakes before construction starts
 Various scenarios can be tried
 Flood water management:
To identify source of flooding and predict (water levels – water
flows – flood depth) and how protection measures could work
Inputs to the system:
 Cross section of the river
 Dimensions of the bridges
 Factors that can affect water flows
 Starting and finishing date
 Observation of actual flooding
Page 78 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Traffic management
To repair and find the best solution for traffic flow
Traffic light simulation
• Traffic light simulator look at the flow of traffic ( data
captured from the sensor
• The simulator will adjust the best control for the
flow of traffic
Page 79 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
The following data may be collected to make the model
 The number of vehicle passing
 The time of the day needs to be recorded
 How many vehicles build up the junction at different times
 How long it takes a vehicle to clear the junction
Weather forecasting:
Weather stations setup automatic system by using variety of sensors to
measure:






Rainfall
Temperature
Wind speed
Wind direction
Barometric pressure ( air pressure )
Humidity
Page 80 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
6.3 Computer controlled systems:
Robotics in manufacturing:
• Robots are used in many areas of
manufacturing like, paint spraying
of car bodies, welding bodywork
on cars, manufacturing of
microchips, manufacturing
electrical goods and automatic
warehouses.
• Robots include (built-in)
microprocessors or linked to a
computer system
Advantages:






Work in a bad environments
Work non-stop (24/7)
Less expensive
Don’t need holidays, etc.)
Greater consistency
NO boring, repetitive tasks
Disadvantages:




Difficult to do unusual tasks.
Cause higher unemployment.
There is a real risk of certain skills being lost
Set-up and maintenance is expensive
Production line control
Production line control is using robots in industry as examples:
 Filling bottles with liquid and adding labels
 Filling metal cans and adding labels
Page 81 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Using robots leads to:
 Faster operations
 Greater productivity
 Automatic testing
 Reducing cost
How robots could be used:
 Sensor 1 ( pressure sensor – light sensor – camera ) detects of presence
of bottle
 Sensor send signal back to computer
 When the signal from sensor 1 indicates bottle present
 The computer send signal to actuator to open valve to flow the liquid to
the bottles
 Sensor 2 ( level sensor) detect the correct level liquid height
 This sensor sends continuous signals back to the computer
 When sensor 2 indicates that the bottle is filled send signal to the
actuator to close the valve
 Then sensor send another signal to move to the next bottle
 The whole process continuous
6.4 School management systems:
Daily tasks:
• Registration and attendance records of the students
• Student performance
• Computer-aided learning
Page 82 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Registration and attendance records of the students
The traditional way for student's attendance consume 10 minutes
from each session the beginning. There are number of possible ways
of automating the registration
Method 1 :
 Issue each student with an ID card.
 ID card contain a magnetic stripe on
the rear of the card.
 The student would have to sign the
card and also write his unique
student ID on the back of the card.
 The magnetic stripe would contain the name of the school
and other details, date of birth.
 Each morning the student should swipe his ID card using
magnetic card reader.
 The data now stored on a database.
 On leaving the school he will swipe card again
Method 2 :
 A second method could make
use of biometrics.
 Each student would have their
fingerprint taken and store on a
database.
 When the student enter the
school he would asked to put his
finger on a scanner to read his
fingerprint
 Advantages of finger print:
• Finger print are unique, impossible to sign in with another
fingerprint
Page 83 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
• ID could be easily lost
• ID can be affected by magnetic field
• It is easier to make copy of ID card but you can’t with
fingerprint.
Disadvantages of finger print:
• It would take long time to collect
• The equipment to take and read fingerprint is expensive more
than ID reader
• If the student cut his finger will prevent him to enter.
• May be the parents object to take finger print for their children
Student performance:
• Teacher are able to enter students data ( grades /reports /
applications / behavior) into the school management system
• This data stored in central storage which will be available for
any one from the staff
• The data can be analyzed and make a report.
Computer-aided learning
• Using computer-based system to assist academic teaching of
students
Advantages:
 Students can learn when they want
 Allow to use virtual reality
 The students can stop at any time
 It's possible to re-take test
 CAL can make learning interactive
 CAL makes use of various multimedia
Disadvantages:
 CAL cannot give the students laboratory experience
Page 84 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com




Expensive and time consuming
Students can be districted while online
Can lead to isolation
CAL cannot answer unusual questions
6.5 Booking systems:
1-Online booking system
Example uses:
 Transport : Flight, Trains, Buses
 Entertainment : Theater, Cinema, Stadium
 Accommodation: Hotels, Apartments, Villas
Page 85 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Events (Theatre and cinema booking systems)
(How the system works)
•
•
•
•
•
The customer clicks on the performance they wish to see.
A date and time is typed in
The required number of seats is also entered.
The seating display in the theatre is shown on the screen.
The user selects their seat(s) by highlighting the actual seats on the
screen, display and then clicks CONFIRM to go to the next part of the
process.
• The database searched to check the availability of the selected seats
• If the seats are available, the total price is shown + the seat numbers
• If the customer is happy with this, they select CONFIRM on the
screen
Booking sporting system will be the same
Page 86 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Advantages of online booking systems
 Prevent double-booking.
 The customer gets immediate feedback on the availability of
seats
 The customer can make bookings at any time of the day.
 The customer can receive any special offer by e-mail
 Easier to browse the seating plans to choose the best seats
available.
 No printed tickets which saves costs
 Online booking allows to use modern smartphone and tablet
apps technology.
 Confirmation message sent once payment approved has been
authorized
Disadvantages of online booking systems




Setup and maintenance is expensive.
Service need a computer and internet
Difficult to cancel the booking and get your money back
If the server is down or systems breaks down, it will impossible
to book seats.
 If the websites are not well designed, it is difficult to make
exactly the booking
 Booking online does not allow to build a personal relationship
with the travel
6.6 Banking systems
Banking Applications:
The application of computers in the banking sector have enhanced
productivity regarding account management in this part we will
consider:
Page 87 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
1. The use of automatic teller
machine ATM
2. Internet banking
3. Telephone banking
4. Chip and Pin technology
5. Clearing of cheques
6. Electronic fund transfer
1- Automatic teller machines (ATMs)
ATM cash machines can be used for various purposes including (cash
withdrawal / deposit / checking / printing statement)
Page 88 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
The computer processing involved in depositing a cheque at an ATM
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
Page 89 of 170
Customer is asked to enter their debit card in the ATM
Customer’s bank computer is contacted
The card details are searched in the bank database
Card is checked to see if valid/in date/stolen
Customer is asked to enter their PIN
PIN is compared to the PIN stored on the chip
Customer is asked to deposit cheque
The system checks whether the cheque is valid
The cheque is scanned/read by the ATM
Amount is scanned
Bank account is checked for sufficient funds
The image of the scan is saved
The customer is asked to select the account to deposit money
Money is deducted from the bank of the cheque
Money is added to the account of the payee
A receipt is sent to the printer at the ATM
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Electronic Fund Transfer (EFT)
Electronic Fund Transfer (EFT) allow money to be transferred
electronically from one account to another, an example of EFT is when
an employer pays their employees their salaries
• No actual money is transferred, the whole system relies on
electronic transfer of money between accounts. When an
EFT instruction is received, the computer system
automatically transfers the specified amount from one
account to another
Advantages:
• Very secure payment method
• Very quick payment method
• Less expensive
Disadvantages
• Once the amount transferred , the bank cannot reverse the
transaction
• The customer needs to have funds available
• Cannot guarantee receipt
Page 90 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Credit/debit card transaction
Many credit cards equipped with Chip &
Magnetic strip which have key
information like PIN
• What is happening when the
customer go to restaurant to
pay bill for meal using a chip
and PIN card
• The PIN is entered using a keyboard
• The card is checked if it is valid
• The PIN is read from the chip on the card and compared
to the one entered in
• If the same, the transaction can proceed
• If three times PIN attempt to enter, the transaction
terminated.
• The restaurant’s bank contact to the customer’s bank
• The check is made on whether they have enough funds
• If everything checks out (OK) then the transaction is
authorized
• An authorization code sent to the restaurant
• The price of the meal deducted from the customer
account
• The same amount is added to the restaurant bank account
• A receipt is produced as proof of purchase
Page 91 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Cheques :
Processing bank cheques uses batch processing, and the first step called
"out clearing"
Page 92 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
6.7 Computers in medicine:
Information system in medicine:
Patient and pharmacy records:
• By keeping data of patient records in a database, correct
diagnosis can be given according to patient's medical
history.
• Database allow to easy and quick search for patient records
• The data can be , patient ID , name , address, date of birth,
gender, medical history, blood group
Using 3-D printers:
o Surgical and diagnostic aids: the patient is scanned using:
• CT (computed tomography ) - which involves
producing images of the internal parts of the body
• MRI (magnetic resonance imaging) - this uses strong
magnetic fields and radio waves to produce a series
of images of the internal organs in the body
o Prosthetics:
• 3D printer can print
prosthetics (false arms,
hands, and legs)
Page 93 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
o Tissue engineering:
• Produce multilayered skin tissue, bone tissue,
heart/artery grafts and tracheal splints
o Artificial blood vessels:
• 3D printing of artificial blood vessels using human
cells , this bio-printer tissue working much as
natural blood vessels
o Customized medicine:
• 3D printing can allow the scientists to customize
medicines known as "patient centric medicine" or
"printlets"
• Can have effects on different people
• Possible to create the most effective medicine
release profile for the patient
• Save money
• Better targeting
• Less chance for overdose
6.8 Expert systems:
Expert system is a computer software that attempts to act like a
human expert on a particular field.
Examples of using Expert System:
 Diagnosing a person’s illness
 Diagnostics, finding faults in a car engine.
 Helping to discover locations to drill for water / oil
 Strategy games (chess)
 Identification of items such as plants / animals/ rocks
 Road scheduling for delivery vehicles.
 Providing financial advice
Page 94 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Elements of expert system
An expert system is made up of three parts:
1. User interface - allow a non-expert user to query (question)
the expert system, and to receive advice.
2. Knowledge base - collection of facts and rules. The
knowledge base is created from information provided
by human experts
3. Inference engine – this is the problem solving part , this acts
rather like a search engine, examining the knowledge base
for information that matches the user's query, this use
inference rules in Rules base
4. Explanation system – this informs the user of the reasoning
behind the expert system conclusions and recommended
actions and provide conclusion and suggested action
5. Rules base – this is set of inference rules , they provide
logical thinking
Page 95 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
How to setup an expert system?
• Data is gathered/collected from experts to create knowledge
base
• The rules base is designed/create a based on the information
from the knowledge base.
• A user interface screen is designed / created which would
provide the user with the ability to interact with the system
• An explanation system is also developed
• The inference engine is designed / created as link between the
user interface and the knowledge base
• The system is tested.
• Experts are interviewed about how the expert system effective
Advantages of Expert systems:
•
•
•
•
•
•
•
•
High level of expertise
High accuracy
The result are consistent
Ability to store big amount of ideas and facts
Provide traceable solutions and diagnostics
Much quicker than human expert
Provide unbiased reporting and analysis
Indicate probability of any suggested solution
Disadvantages of Expert systems:
• User of the system need training
• High cost to setup the system
• Not flexible response which is not suitable for some medical
situations
• Good only as information and facts entered to the system
• User sometimes make very dangerous assumption
Page 96 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Using an expert system:
• The non-expert user queries the expert system. By asking a
question, or by answering questions asked by the expert system.
• The inference engine uses the query to search the knowledge
base and then provides an answer or some advice to the user.
Examples of expert system:
Example 1: medical diagnosis
Example 2: Oil prospecting
Example 3: rout scheduling for delivery vehicles
6.9 Computers in the retail industry:
Point-of-sale POS terminal:
• Barcodes allow quick
identification of product details
and retrieve the price once the
barcode has been scanned by a
barcode reader
Page 97 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
• A number of the barcode usually consists of four parts
(a country code, manufacturer’s code, product code and
a check digit.)
• The check digit is a form of validation which is used to make
sure no errors occurred during the reading of the barcode.
• Point of sale is the place a transaction take place and the
customer can pay by cash or can
use debit/credit card
• Stock control system can
automatically update stock
records when item is purchased
at the POS
EPOS
Electronic Point Of Sale
How barcodes are used to automatically control stock levels in a supermarket.
 Barcode is scanned at the POS/barcode number entered manually
 Barcode is searched for in the stock file until the record is found
 Details of the product are read
 Stock level of the item reduced by 1
 New stock level written back to the file
 Item is flagged to state order in place
 If less than the re-order level then the item is automatically reordered
Barcode used in the following applications:
 Library book system
 Administration systems
 Passport / ID cards
 Some burglar alarm systems
 Equipment checking systems
 Automatic stock control systems
Page 98 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Electronic fund transfer at point-of-sale (EFTPOS):
 When payment made by card or electronic device at POS
terminal, this process check credit and debit card, will consider
chip and PIN , contact less card and near field communication
(NFC)
Chip and PIN:
Already discussed in this chapter
Advantages:
• More secure than magnetic strips cards
• Quicker system than magnetic strip cards
Disadvantages:
• The risk of fraud when typing the PIN
• Some countries do not accept the PIN
Contact less cards:
Already discussed
Near field communication (NFC)
• The electronic device as a mobile is held close to NFC
reader
• When payment initiated the NFC and mobile pass
encrypted data back
• This is very secure
• To improve security by using tokenization
Use tokenization with mobile phone:
Tokenization is used when setup smartphone wallet by taking
image for bank who issued the card then the bank replace the
Page 99 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
details on the card with a series of randomly generated numbers
called (tokens) then send back to smartphone manufacturer
then they program this numbers in the smartphone.
Internet banking and Internet shopping:
• Using internet banking requires good security. It allows the
transfer of sums of money between accounts, payment of bills,
ordering of statements, and so on.
• Online shopping and banking means that more and more people
are staying at home to buy goods and services
Advantages of online shopping and online banking
 No need to travel / reducing costs and time-wasting.
 Users have access to a worldwide market and can look for
products that are cheaper.
 Disabled and elderly people can access any shop without to
leave home.
 Shopping and banking can be done at any time 24/7
 Shopping from the supermarket probably took up a lot of time
than online.
 No face-to-face discussion with staff.
 Internet banking saves time.
 The shops and banks save money , not having as many staff
working for them
Disadvantages of online shopping and online banking
 There is the possibility of isolation and lack of socialization
because people stay at home.
 Health risks associated with online shopping or banking (lack of
exercise).
 Security issues.
 It is necessary to have a computer and to pay for the internet
 Unlike high street shopping, it is only possible to see a picture
of the goods.
Page 100 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 High street shops and banks are closing because of the increase
in online shopping or banking and this is leading to "ghost
towns’ forming
 It is easier to make errors with online banking and transfer
money incorrectly to different accounts
Effects on companies due to the spread of online shopping and banking:
 Companies can save cost by hiring fewer staff and no need to
have many shops or banks in high street.
 Because the internet is global the customers is increased.
 Some will increase to retrain the staff and the need to employ
more staff in dispatch department
 More cost will be added to setting up and maintaining of
websites to enable online shopping and banking.
 Because there is no interaction between customer and
employee this can lead to drop loyalty of customers and cause
loss of customers.
 Robberies are less because decreases of number of high street
banks.
 Bank also need to employ fewer security staff which is
reducing cost.
6.10 Recognition systems:
 Recognition systems are used directly to enter data into computer
system.
 Recognition systems more accurate and quicker method of
entering data into a computer system compared to manual
system.
• MICR: magnetic ink character recognition the number on
the bottom of the check is scanned by MICR reader
• OMR: optical mark reader:
o Pencil or pen mark scanned (MCQ) read by OMR ,
also registering student
Page 101 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
•
•
•
•
•
 Advantages : fast way to enter the result and
more accurate
 Disadvantages: form should carefully
designed, the form or MCQ should filled
correctly , working only with black pen or
pencil
Barcode reader: already discussed in chapter 2
QR code readers : already discussed in chapter 2
OCR: scanned text is converted into format which can be
edited ( already discussed in chapter 2 )
Sensor plats: Sensors used to detect car and signal will be
send to the microprocessor to take the image for the
number plate
Multiple-choice question (MCQ) papers
o Multiple-choice form is using OMR and compare the
position filled by pen with the original answer
Automatic Number Plate Recognition (ANPR) System:
• Automatic number plate recognition (ANPR) systems are
used to read the number plates on cars, car parking is an
example of ANPR as the following steps:
o STEP (1)
 Sensor detect vehicle and send signal to
microprocessor to instruct the camera to
capture image of the vehicle
o STEP (2)
 An algorithm used to isolate number plate
 The bright and contract of the number plate is
adjusted to be clearly read
 Each character is on the number plate is
segmented
Page 102 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 Each character recognized by OCR software
then character converted into a string of
editable text by the software
 This text string stored in the database
Number plate is segmented
o STEP (3)
 Once step (1) and (2) happened the car park
barrier is raised
 The ticket is issued to the vehicle driver ,
shows date and time entering the car park
o STEP (4)
 When the vehicle
driver returns to the
car park they insert
the ticket into a
machine which calculate charges
 The payment registered on the database
 The driver then drives to exit the barrier and
the ANPR again reads the number plate
 If the number plate is recognized and payment
is done the barrier is raised
Page 103 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Advantages of ANPR:
• Automatically monitor average speed of vehicles
• No need to employ car park security guard
• Much faster system
• Automatically control the entry and exit
Disadvantages of ANPR:
• Lack of manned security, crime could happened because
nobody checking.
• Damaged of dirt plates will not recognized by the system
• ANPR is detecting only number plate not the car
Radio frequency identification devices (RFID)
• Use radio waves to capture and store information on a tag
Advantages of RFID:
•
•
•
•
No direct line
Very robust
Very fast read rate and reuse.
Bulk detection is possible (hundred tags/s.
Disadvantages of RFID:
•
•
•
•
Tag collision.
Easy to jam or interrupt.
Easy to hack.
More expensive than barcode system
Tracking of the stock:
RFID can read up to 50 meters, tracking the stock can also livestock in farm,
good in a shop, supermarket or distribution center.
Page 104 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Livestock tracking used to:
• Keep track of each animal
• Allow farmers identify each animal owned by whom
• Keep the information of each animal in each tag
Retail make use of RFID:
• Like barcodes but can have much information and do not require
manual scan
• Several tags can read at the same time
USE RFID in Passports:
•
•
•
•
•
•
•
Tags can be embedded in passports
When passports presented to RFID scan
Chip store broadcast information
This information sent to the computer
The chip can contain security data
The data encrypted
RFID in passport can read from 6 meters
Use RFID in vehicles
• The tags allow or deny access to parking
• Tags can be used for Lorries and vans to ensure the vehicles is not
carrying too much weight
• RFID can be used in car production line
Page 105 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Contactless credit/debit cards using RFID
•
•
•
•
The chip in RFID tag is passive and emits low-power radio wave
An antenna is built into the card
Allow connection with contactless card
The RFID pick up the signal from the ship to initiate the payment
process
Near field communication NFC
• NFC operates required sender and receiver very close proximity
which make communication more secure
Three modes of operations with NFC
Peer to peer mode:
 Two smartphone exchange information with each other
 Both devices switch between being active and being
passive
Read write mode:
 One way transmission of data
 The deice link to another device and read data from it
Card emulation mode:
 NFC device can function as smart or contactless card
 Allow the cards to make payments
 NFC has range up to 5 cm
 NFC very fast connectivity
Biometric recognition systems
This systems include:
 Face recognition
 Iris and retina recognition
 Finger recognition
 Hand recognition
 Voice recognition
Page 106 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
6.11 Satellite systems:
Global positioning satellite (GPS) systems and satellite navigation
1- Global positioning systems and satellite (GPS)
GPS can determine specific location using satellite navigation
systems:
 Cars, Ships, Plans can use GPS when navigating specific
location
 Walkers to locate position on
hills / mountains
 Used by runners to calculate
distance
 Four satellites must be visible to
the driver
 Calculates the distance from the
receiver to the satellite
 Calculates the position of the receiver
Advantages:
 Drivers doesn’t have to use maps.
 GPS can re-rout to find quickest routes
 The system can warn the driver about the location of
speed cameras
 The system can estimate the time of arrival.
 The system can also give useful
information such as location of petrol
stations
Disadvantages:
 Loss of satellite signals can cause problems
 Maps should be kept up to date, they can give incorrect
instructions if not up-to-date
Page 107 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 If an incorrect start point or end point is keyed in the
system will give incorrect information
2- Geographic information system (GIS):
Geographic information system (GIS) is a computer system that allows
us to map, model, and query and analyze
large amounts of data according to their
location
GIS uses:
 Road network
 Teachers can use GIS in
geography, science lessons
 Biologist use GIS to protect
animals life and plants
3- Media communication systems:
Communication media is the methods of delivering
and receiving information using telecommunication
 There are many media to send and receive
information (Fiber Optics, Copper Cables, WiFi, Satellite )
 Satellitia can send signal from part to another
any wherein long distance on the earth
 Once the data received from the earth by the
satellite, send back to earth and collected by
dish
 Satellites systems are used to transmit
television, telephone and internet data
around the world
Page 108 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Page 109 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
7- System life cycle
The main stages of system life cycle to develop a new computer
system:
Analysis
Collecting information about the current system and identify the problems
Design
Designing a new system to correct the problems identified in the analysis stage
Development and Testing
Developing and testing new system
Implementation
Replacing old system with the new system
Documentation
Writing technical and user documentation for the new system
Evaluation
Evaluate if the new system meets the requirements and client expectation
Page 110 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
1- Analysis :
The basic step of analysis:
 Research to collect data from the current
system
 Describe the current system (establishing input
and outputs and processing
 Identify the problems with the current system
 Agree the objective with the clients
 Identify and agree customer requirements
 Interpret customer requirements
 Produce a cost- benefits analysis
 Identify suitable hardware and software
 Produce a data flow diagram
Page 111 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
The first step in analysis stage is researching an existing system and there
are four common methods for fact finding:
1- Observation
 Watching personnel using the existing system to find out how it
works
Advantages
Disadvantages
• The analyst obtains reliable data • People uncomfortable being
• Possible to get an overall view
watching, may work in a different
of the system
way
• Inexpensive method
• If workers perform tasks that
against standard procedures,
they may not do this while being
watched
2-Questionnaires
 By distributing questionnaires to the workforce, clients or users to
write their view for the existing system
Advantages
Disadvantages
• The questions can be answered • The number of returned
quit quickly
questionnaires often low
• Inexpensive method
• The questions not flexible
• Individuals can be anonymous if • Not immediate way
they want
• This method allow quick
analysis of data
Page 112 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
3- Interviews
 This method involves one to one question and answer between
analyst and employee or /customer and good if the analyst want
to go deeply into specific aspects of the existing system
Advantages
Disadvantages
• Its open opportunity to
motivate interviewee to give
open and honest answer to the
analyst
• Open for more feed back
• Possible to modify question as
interview
• Time consuming
• Expensive method ( by using
analyst time )
• Interview can’t remain anonymous
4. Looking at existing documents :
 This method allow the analyst to see how the paper files are kept
and look at operating instructions and training manuals and get
some idea about scale of the problems of existing system
Advantages
• Allow the analyst to collect
information which can’t be
collected by another method
• The analyst can see how the
paper system operate
Page 113 of 170
Disadvantages
• It can be time consuming process
• Costly method because the
amount of time needed
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Data Flow Diagram (DFD):
 DFD help the analyst by showing the data flows input and output
requirements, processing and type of data storage needed.
Example of reserving seat on a flight:
DFD used to describe:
 The need to identify inputs, outputs, processing of the current
system.
 The need to identify problems with the current system
 The need to identify the user and information requirements for the
new system
 System specification :
 Identify and justify suitable hardware for the new system
 Identify and justify new software for the new system.
 Storage requirements ( size and type of storage)
Page 114 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
2- Design:
Next stage is to design a new system based on the information from
analysis system.
The basic step of design:
 Design the data capture form / input forms
 Design the screen layout
 Design outputs in the form of screen displays
and the printed report
 Produce system flowcharts
 Design validation rules that need to be used
 Design / agree on file structures
 Produce any algorithms or program flowchart
 Design a testing strategy / plan
Page 115 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
• Data capture forms:
This form allow to enter the data into the system either paper-based or
electronic based form must include:
1. Clear heading and instruction
2. Use of text boxes to collect
information such as name, date of
birth, gender..
3. Use of tick box to make choice
easier
4. Clear fonts and text styles
5. Make sure there is sufficient space to input data or answer the
question
Example of data about can manually completed for input later into the
computer system:
On screen forms should have:
 Appropriate spacing for each field
 Screen filled/not too much white space
 Clearly defined input area for each field
Page 116 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com





An easy to read font/font size
A sensible font color and background color
Drop down list and tick boxes
No overlapping items
Navigation buttons
Form title
Drop down list: to
choose option
Save/ Close /
Navigation button
Tick box /
Radio button
Before entry form created, the database should be created and the
following details should be considered:
• Type of data which will be captured
Page 117 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
• Different tables and its relationships
• Different fields including keys
• Data types for each field :
1. Text
2. Integer (numeric)
3. Boolean
4. Data & Time
5. Object
Page 118 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Output formats – screen layouts and report layouts:
The output form should be designed:
1. Make sure all the output fields is correct
2. Instructions or description are clear
3. Avoid large area without nothing
4. Font color and size are clear
5. Output report should include report type ( header ,
footer , fitting page correctly)
As Example of printed report :
Page 119 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
System flow chart:
 Flow chart used to show data flow through a system and how
decision are made by using special symbols to represent input /
output/ processing/ decision and data storage.
 System analysts use this chart to show overall the proposed
system.
Verification:
Verification is a way of preventing errors when data is copied from
one medium to another, there are two ways for verification check:
• Double entry : data is entered twice, using two people,
and is then compared
• Visual check : checking for errors by the person who is
entering the data; compare the entered data with the
original document
Validation routines :
This is a process where data is checked to see if it satisfies certain
criteria when input into a computer
Page 120 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Validation technique:
 Range check :
• Check weather data within given acceptable value
• Example : check person age >0 and <150
 Look-up check :
• Check the data entered exists and stored in a table of data
• Example : check “ Training manager “ exists in the option”
 Length check :
• Check the input data contains the required number of
character
• Example : If a field needs six digits inputting five or seven
digit number , should cause a problem
 Character type check :
• Check input data doesn’t contain invalid characters
Example: Person /employee name shouldn't have any numbers
 Format / picture check :
• Check the data in specific format
• Example : date should be in date format dd/mm/yyyy or
identification number for a person xnnnnn ( single letter
followed by five digits)
 Presence check :
• Check the data already present and not missed
• Example : in some forms telephone # required if not entered
the system give error message
 Consistency check :
• Check if the fields correspond with each other
Page 121 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
• Example : If Mr. typed in a field the gender should be Male (M)
 Check digit :
• This is an extra digits added to the telephone number
• Example : if two number transposed during entry like ( 13597
instead of 13579
• Example : if number enter twice 13559 instead of 13579
• Example :if one number missing 1359 instead of 13579
• The last digit of a barcode number is a calculated check digit
File Structures:
 Analyst should take the following into account :
• Field length
• Field name ( suitable names )
• Data type
 A data dictionary is used to show suitable field names
Page 122 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Design and testing strategy plan:
When producing a software for the new system it is very important to test
it thoroughly in order to:
 Make sure that meets the clients requirements
 Remove any bugs or error from the system
 Make sure that produces the required output
Page 123 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
3- Developing and testing:
Developing:
Once design stage is completed, the system should be created and fully
tested:
 Create the file structure ( Field names, data type)
 Validation rules
 User interface, check if the user interface is friendly
File structure
User interface
Page 124 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Validation rules
Test designs:





Testing data structures
Testing the file structures
Testing the input methods
Testing the output methods
Testing the validation rules
Testing strategies:
 Software is often developed in modular form. This method allows
the software to be broken down into smaller parts called module
this means each part developed separately.
 Once the development of each module is completed, the whole
system needs to be tested
 Testing take place to ensure all components of system are working
correctly before the system is implemented.
Four categories of testing :




Page 125 of 170
Normal
Abnormal
Extreme
Live
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Normal:
 Data that is acceptable /reasonable and has an expected outcome;
for example, the Month in the range 1 to 12
Extreme:
 Data at the limits of acceptability, for example, the extreme values
of month can be either 1 or 12
Abnormal:
 Data outside the limits of acceptability, or the wrong type of data,
and should be rejected or cause an error message; values are not
allowed as example inputs for the month: -15 or -1 or any value
>12 or letters or non-integer 10.34 all abnormal
Live :
 Data is entered into the new system and the results compared
with those produced from the existing system.
Page 126 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
4- Implementation stage:
There are four common methods used for changing over from the old system
to the new system:
 Direct
Direct changeovers
 Old system stopped overnight
then replaced with the new
Old System
system immediately
Advantages
Disadvantages
• The benefits are immediate
• Cost are reduced because one system is
running
• Less possibility of a malfunction of the
system once new system tested
 Parallel
 Old system and new system
running side by side for a time
until new system take over
Advantages
• If the new system fails the old
system still running
• Possible to train staff gradually
Page 127 of 170
New System
• May will be disaster if
new system failed
Parallel changeovers
Old
System
New
System
Disadvantages
• More expensive than direct,
because extra staff needed
• Time consuming since the
data entered into 2 systems
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 Pilot
Pilot changeovers
 The new system introduced
in one branch or a part of
company before to introduce
for whole company
Old System
New System
Advantages
Disadvantages
• If the new system failed only one
part is affected
• Possible to train staff one area
• The cost will be less than parallel
• It will take time to
implemented across all
departments
 Phased
 Only one part from the system
introduce when its proved to
work satisfactory, then introduce
next part until to fully replaced
whole system
Phased changeovers
Old System
New System
Advantages
• If a part fails, can go to failure
point ( failure is not disaster )
• Possible to ensure the system
working properly before
expanding
Page 128 of 170
Disadvantages
• More expensive than direct
because each phase will
evaluate separately
• Time consuming because each
part will be evaluated
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
5- Documentation:
When the system is fully developed amount of documentation needed. To
introduce for (the end user – people who may need to develop the system in
the future, there are two types of documentation:
User Documentation and Technical Documentation
1- User documentation
To help the user to learn how to use the new system
















How to load/install/run the software
How to save files / search/sort data
How to do print outs
How to add, delete or amend records
The purpose of the system/ program/ software package
Limitations of the system
Screen layouts / Print layouts
Hardware requirements
Software requirements
Sample runs (with results and actual test data used)
Error handling/meaning of errors
Troubleshooting guide/help lines/FAQs
How to log in/log out
Tutorials
Error messages/meaning of error messages
Glossary of terms.
2- Technical documentation:
To help the programmers / analysts to repair and maintains the system and
can consist of any of :
 Program listing/coding
 Programming language used
Page 129 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com















Program flowcharts/algorithms
Systems flowcharts
Purpose of the system/program/software
Limitations of the system
Input formats
Hardware requirements
Software requirements
Minimum memory requirements
known ‘bugs’ in the system
List of variables used (and their meaning/description)
File structures
Sample runs (with results and actual test data used)
Output formats
Validation rules
Meaning of error messages
6-Evaluation:
The final stage of the system life cycle is to evaluate the system which has been
implemented, the main purpose is to see if the new system resolved the issues
of the previous system and met the requirements in the design stage and the
following list is some of the main evaluation points considered when evaluating
the new system:








Compare the final solution with the original task requirements
Identify any limitations of the system
Identify any necessary improvements needs
Evaluate the user’s responses
Compare results from new system with old system
Compare performance of new system with old system
Interview users to gather responses about new system
Give out questionnaires to gather responses about the ease of use of the
new system.
Page 130 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
The results from the evolution may due to two things happening:
Update of hardware because:
• Feedback from end user
• New hardware comes in the market
• Changes within the company require new devices to be added of
updated
Update of software because:
• Feedback from end user
• Changes to the company structure that may need modification
• Changes in legislation that may require modifications to the
software
Page 131 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
8- Safety and security
Physical Security:
Safety issues:
Safety concerned with dangers that could lead to series injury or loss of life
Safety risks:
Safety risk
Ways to eliminating or minimizing risk
(1) Electrocution
•
•
•
•
(2) Trilling wires
• Use cable ducts to keep the wires save
• Cover wires under table
• Use wireless connection wherever possible
(3) personal injury (Heavy
equipment falling and
causing injury)
• Use strong desks and tables to support
hardware
• Use large desk and tables so that hardware
isn't too close to the edge, where it can fall
off
(4) Fire hazard
• Have Co2/dry fire extinguishers
• Don’t cover equipment
• Make sure electrics used in hardware is
fully maintained
• Ensure good ventilation in the room
• Don’t overload socket with many items
• Change to low voltage hardware if possible
Page 132 of 170
Use residual current breaker RCB
Check insulation on wires regularly
Don’t allow drinks near to computers
Check equipment on regular basis
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Strategy to minimize safety risks to check in a regular basis:
 Check the state of the wires and cables and plugs and make sure the
plug is not broken or damaged.
 Make sure any drinks are well away from the computer
 Fix wires along wall or behind the desks wherever possible
 Don’t cover the computer with paper, plastic, tissue paper, towels or
any fabric, which can block ventilation holes
 Don’t plug too many devices into an electric outlet socket overloading can cause a fire
 Make sure you exercise every hour to prevent health risk
E- Safety:
Refers to safety while using internet and devices (keep your data in safe
while using:
 Mobile phone
 Computer or tablet
 Games console
 Wireless technology.
Data Protection Act ( DPA ) :
• Most of countries have some
form of Data Protection Act, these are designed to protect
individuals and to prevent incorrect or inaccurate data being stored
Page 133 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
(8) Principals of the Data Protection Act :
1. Data must be fairly and lawfully processed
2. Data can be only processed for the stated purpose
3. Data must be adequate, relevant and not excessive.
4. Data must be accurate.
5. Data must not be kept longer than necessary.
6. Data must be processed in accordance with the data subject's rights.
7. Data must be kept secure.
8. Data must not be transferred to another country unless they also have
adequate protection
Personal data:
Personal data like (name, birth date, address, medical history, banking
details, photographs)
• Some personnel data referred to as (Sensitive personnel data )
includes ethnic origin, political views, religion, sexual orientation,
criminal activity, medical history .
Some idea of E-safety issues:
 Don’t give out any personal information to people who are
unknown to you.
 Don’t send people photos of yourself either online or via a
mobile phone unless the person known to you.
 Always maintain your privacy settings
 When accessing the internet make sure
the websites being visited can be
trusted
 Only use recommended websites by
teachers
 Only open emails from known sources.
 Only send email people you know
 Using social networking sites, instant messaging or chat room
Page 134 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
You must be conscious when you are using social media networking
sites or chat room:
 Block or report anybody who acts suspiciously or who uses
inappropriate language
 Be very careful with the language used in chat rooms
 Always use a nickname and never use your real name
 Keep private and personal data secret
 Don’t enter private chat rooms, stay public
 Never arrange to meet anyone for the first time on your own
 Always tell an adult first and meet the person in a public place
 Avoid the misuse of images
 Always use appropriate language
 Always respect people’s
Some risks from playing online games:
 Violence in the game, can lead to
violent behavior in reality
 Predators (animal that eats other
animals)
 Cyber-bullying
 Use of webcams
 Voice-masking technology to change voice or age or accent.
 Online games is a source of cyber-attack like (viruses –
phishing – spyware )
Security of data:
There are a number of security risks associated with any electronic device
as the following list:
 Hacking
 Phishing
Page 135 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com







Smishing
Vishing
Pharming
Spyware
Viruses(malware)
Spam
Card fraud
Page 136 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
(1) Hacking:
What is hacking? : Unauthorized access to the computer system
without permission
Effects of hacking:
 Hacker can delete,
corrupt, edit, files or
change data or personnel
information
 Hacker can steel user identity
 Hacker can stop production
Method to avoid or remove:
 Using firewall
 Using strong password
 Using protection software
 Use user ID and password
 Use encryption
(2) Phishing:
What is phishing? : a method of trying to gather personal
information using deceptive e-mails and websites by sending request
from bank or a note from someone in their company.
Effects of phishing:
 The sender can gain personnel data such as credit card
number, this can lead to fraud or theft.
Method to avoid or remove:
 Many ISP or web browsers filter phishing e-mail.
 User always be cautious when opening email or attachment.
 Don’t click on executable files attachment end with exe,
com, php, bat as example.
Page 137 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Phishing example:
Page 138 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
(3) Smishing ( SMS phishing):
What is Smishing? : Uses SMS system of mobile phones to send out
Fake text message which often including URL or telephone number
The user will be asked to log into the website or make telephone call
and supply personnel information like credit card number and
password (example : you won a prize or contact with your)
Effects of Smishing :
 The effects are similar to Phishing and
Pharming where personnel details will
be obtained from users
Strategies to avoid smishing :
 Avoid clicking on any unknown texts
with links
 Double check the SMS message, check for spelling mistakes
 Contact your bank directly if you are requested to change
some details
 Do not reply to text messages that have asked you about any
of your personal finances/details.
 Never call back a phone number that was associated with the
text from an unknown source
 If the text message was sent at an unusual time, this is sign for
smishing
4- Vishing:
What is vishing? Short for voice mail phishing , uses voice mail
message to trick the user into calling the telephone number contained
in the message, The user will be asked to provide personnel data
Page 139 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
5- Pharming:
What is pharming? Malicious code installed in the user computer to
direct the user to fake website
Effects of pharming :
 The creator of malicious code can gain personnel data like bank
account information, this can lead to fraud or theft.
Strategies to avoid pharming :
 Some anti-spy software can identify and remove Pharming
code
 Always double check the URL to see if is the same one you
typed in
6- Viruses and malware:
There are many forms of malware
Page 140 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Virus:
What is the computer virus? : Program code or software which can
replicate or copy itself to do something like deleting or corrupt the
files or operating system, virus need active host program on the target
computer
Effects of virus :
 Viruses can crash the computer , stop
functioning or run slowly
 Viruses can delete files or data
 Viruses can corrupt the operating
system files
Strategies to avoid viruses:
 Install Ani-virus software and update regularly
 Don’t use any software from unknown source
 Don’t open attached file by e-mail from unknown sender
 Always backing up the files
Worm:
Worm are type of standalone virus which replicate by itself , it can spread
to other computers and no need active host program to do damage , worm
arrive as attachments and the user should open this email
Trojan horse:
This is malicious program contains malicious instructions embedded within
it , they need to execute by the user and arrive as attachments message ,
once installed on the user computer Trojan horse will give cyber criminal
access to personal information
Page 141 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
key-logging software
Key logging is a form of spyware
What is Spyware? : software to collect data by monitoring key presses
on the user’s keyboard, the data send back to the user who sent the
software.
Effects of spyware:
 Spyware gives the originator access to all data entered using a
keyboard on the user's computer.
 The software is able to install other spyware, read cookie data
and also change a user's default browser
Strategies to avoid spyware:
 Use anti-spy software
 The user should always alert and check any activity on the
keyboard monitored.
 Enter password by using drop-down menu to reduce risk
Adware :
Type of malware, it is least dangerous it will flood at end user with
advertising as example to redirect user to face website
Ransomware
It is programs that encrypt data on the user computer , the malware
restricts access to the computer, when ransomware executed encrypt the
files straightaway
Page 142 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Protection of data:
Authentication is used to verify the data comes from secure
and trusted source this is working parallel with encryption,
some methods to protect and security of data:







Biometrics
Digital certificates
Secure sockets
Encryption
Firewalls
Two-factors authentication
Password and used ID
Biometrics:
Biometric is a method of authentication, it relies on certain unique
characteristics of human beings and examples include:
1.
2.
3.
4.
5.
6.
Page 143 of 170
Fingerprint scans
Signature recognition
Retina scans
Iris recognition
Face recognition
Voice recognition
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Fingerprint scans
Images of fingerprints are compared against
previously scanned fingerprints stored in a
database, if they matched then access allowed
Advantages:
 Fingerprint for each person is unique and this technique will
improve the security since to be difficult to replicate person’s
fingerprint.
 Other security devices such as (magnetic card) can be lost or
stolen
 It's impossible to sign in by somebody else since the fingerprint
match one person only
 Fingerprint can’t be misplaced; a person always has them.
Disadvantages:
 Expensive to install and set up
 If a person’s fingers are damaged through an injury, this can
have an effect on the scanning accuracy
 Some people may regard it as an infringement of civil liberties
Retina scans
 Retina scans use infrared light to scan the
unique pattern of blood vessels in the
retina
 It is very secure because no way to
duplicate blood vessels patterns
Page 144 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Comparison between six common biometric techniques
Digital certificates:
• A digital certificate is a pair of files stored on a user’s computer ,
each pair of files divided into:
 A public key (which is known by anyone)
 A private key (known to the computer user only).
• When sending an email, the
message is made more secure by
attaching a digital certificate.
When the message is received,
the recipient can verify that it
comes from a known or trusted
source by viewing the public key
information.
Page 145 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
The digital certificate is made up of six parts:






The sender’s email address
The name of the digital certificate owner
A serial number
Expiry date ( validity of certificate)
Public key
Digital signature of certificate authority (CA)
Secure Sockets Layer (SSL)
 SSL type of protocol that allows data to be sent and received
securely over the internet.
Examples of using SSL
 Online banking and transitions
 Online shopping
 Sending and receiving email
Page 146 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com





Using cloud storage
Intranet and extranet
Voice over internet protocol VOIP
Instant messaging
While using social media
Encryption:
 Encryption is used to protect data in case it has been hacked or
accessed illegally
 Encryption is the method by which information is converted into
secret code that hides the information's.
 The science of encrypting and decrypting information is called
cryptography. In computing, unencrypted data is also known as
plaintext, and encrypted data is called cyphertext.
 The key used to encrypt is called encryption key and the key used
to decrypt called decryption key
Page 147 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Firewalls:
 Can be Hardware or Software
 Its sites between the user’s computer and external network
Tasks which can be carried out by firewalls:
1. To examine the traffic between a user’s computer
Page 148 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
2. Checks whether incoming or outgoing data meets a given set of
criteria
3. If the data fails the criteria, firewall will block the traffic and give
the user a warning about security issue.
4. The firewall can be used to log all incoming and outgoing traffic
to allow later interrogation by the user.
5. Criteria can be set so that the firewall prevents access to certain
undesirable sites
6. it is possible for firewalls to help prevent viruses or hackers
entering the network
7. The user is warned if some software on their system is trying to
access an external data source
Page 149 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Two factors authentication:
Way of authentication which require two methods of authentication when
makes online purchase or use credit/debit card to pay
Three common factors used in authentication
1. Password or PIN code
2. Mobile phone or tablet
3. Biometric
User ID and password:
 Strong passwords should contain upper case and lower case
characters, as well as numbers and other keyboard symbols as
example: R_tool$29/!
 Passwords should be changed on a regular basis
 If the password not matching with the user ID that access will
be denied.
 Many systems asking to enter password three times as a
maximum before user lock out.
 It's important to prevent others people to gain access to your
password through spyware or viruses.
Page 150 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
7- Online Credit Fraud:
 Hackers access to the computer through the use of spyware (phishing
or pharming), the user can be tricked into giving personal and
financial details that enable the hacker to gain full access to a user’s
account.
 By breaking of passwords through a number of techniques if
passwords are weak or no encryption is used.
 Always type in a web address or URL rather than copy and paste it
from an email or other website.
 If you are using wireless network, it is very important to access
through password.
 Public Wi-Fi can be found in popular public places like airports, coffee
shops, malls, restaurants, and hotels and it allows you to access the
Internet for free, there is always a risk that somebody is monitoring
internet usage in the area.
Number of simple precautions users can take:
 Always use varied and complex passwords.
 Check the accuracy of bank accounts continually
Page 151 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 Only provide personal information on sites that have ((https)) in the
web address
 Don’t provide personal information to any unsolicited requests for
information
 Don’t open emails or attachments from unknown senders
 Delete any messages from your spam folder on a regular basis
 Report any suspicious phishing activity to the company that is used
by the perpetrator
 Only download software from sites that can be trusted.
Page 152 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
9- Audiences
Audience appreciation
When planning or creating ICT solution, you have to consider audience who
will use or take part in the system
Giving presentation to an audience
The list of factors should be considered:
 The age of the target group (the response is different between
children and mature)
 The experience of the audience (between company manager and
school children)
 The expectation of the audience ( If you advertise your business in
a restaurant older people expect coffee or tea but children expect
pizza or fast food )
 Knowledge of the audience (graduated in media would expect
different approach.
How to find audience target:
 Interviewing the target group to find out how to engage the
audience
 Giving out questionnaires to people in the target group to find
out their background, interests, and so on
 Carrying out market research by using interviewing and
questionnaires techniques
Giving a sample presentation to an audience
Consider Mobile Phone Company decided to do two presentations, one for
sales and features of the 4 different mobile phones the market and sell:
Page 153 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
1. One presentation to sales team who will receive bonus for the
phone sold (they will be interested with technical knowledge and
profitability of each sale).
2. Other presentation for the potential group of customers or enduser (end user will be interested with features for each phone and
the price.
The key factors when you are writing the presentation:
(1) Language used:
 No vulgarity or use inappropriate language , it can offend people
 The use of technical terms should be only for experienced or
technical audience
(2) Multimedia used:
 Use photos, video, sound and animation always will catch the
attention of the audience
 A young audience is more likely high music and sound in addition
to videos clips.
 Complicated description better to use graph or animation or
both
(3) Length of presentation:
 Long presentation will only work if they are interesting and
engage the audience
 A very young audience quickly will get bored.
Page 154 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
(4) Interactive presentation:
 Asking questions but be careful because not everyone wants to
take part
(5) Examples used:
 When using examples to illustrate ideas ( don’t give examples
to meet products while your audience is vegetarian
Audience characteristics (when developing new ICT solutions)
As example developing new website, we need to consider:
 Audience characteristics
 The need of the audience
 Why you need to consider the needs of your audience
Audience characteristics:
 Age range: young age interested with animations while old age
interested with actual contents
 Income levels: suppose website for selling cars , then you have to
consider audience income levels
 Interests : suppose your developing music website you have to
consider interests
 Disabilities or impairments: if the website to be used by people who
are visually impaired.
Needs of audience:
 Young children : bright , cheerful colors , animation and sound , more
pictures, large fonts , user friendly interface
Page 155 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
 Adults and older children: attractive display, interesting contents,
good images and interesting contents appropriate language level, use
bullets to make text easy to read.
 Older people: contrasting colors , large font size , easy to read , don’t
use too much technical words , display consistent
Software copyright and piracy
Software, Music CDs, videos, articles from magazines and books is
protected by copyright laws, piracy is illegal copying of software
It is illegal to:
 Make a software copy and then sell it
 Use software on a network or in multiple computers without a
license
 Rent out a software package without permission
 Use the name of copyrighted software without agreement
Ways to protect software installation:
 Before installation of software the user will be asked to enter




Product Key
The user will be asked OK/I Agree to the license agreement before
installation
The original software always come with the sticker informing the
purchaser it is illegal to make copy ( hologram form)
Some software required to be original CD/DVD available in the drive
Some software run only if dongle is plugged into USB port
Page 156 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Page 157 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
10 - Communication
Communication with other ICT users using email:
Legislation:
Email is very popular for communication between people, however many
countries have laws to protects people against misuse of email.
The following is some laws and guidelines for the countries and companies
they required:
It is important that emails are not
false or misleading subject lines
Organizations must include valid
postal address
Organizations not allowed to capture
or store list of email address
Organizations required to ask
permission before they can send
email to individuals
They should be clear with recipients
to unsubscribe from receiving email
Organizations must insure privacy
policy are clear and that subscribers
are made aware of such policies
Page 158 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Acceptable language:
 When sending an email
Example of using inappropriate language:
the language and
• Absence images
content must be
• Abusive, profane, inflammatory
• Violent message
appropriate
• Use illegal material in messages
 If the email is being
sent to an employee
within a business the language must be formal
Email terminology:
 Attachment: any type of file sent along with an email message,
Attachments can include anything from photos and documents
to zipped files, folders, mp3, and more.
 CC : Stands for Carbon copy, that recipients who else is getting
a copy
 BCC: Similar to CC, Blind Carbon Copy sends a copy of a message
for the information of a large number of people. It is used if you
are sending someone a copy of an email, and you don’t want the
other recipients to see that
 Forward: This sends a message that has been received to
another email address
 Group: This is a group of email addresses that are given a group
name so that the sender only needs to type in one name to send
an email to several recipients at once
 Subject : it’s a short description of the message. Keeping this
short and informative will give people incentive to open your
email.
Page 159 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Copyright:
 Copying or forwarding email is legal unless the sender indicate
clearly that the message is confidential
 Recipient should check the email before copying or forwarding it
 Some companies set out their rules for sending and receiving
email
Netiquette:
Senders should consider
what they write as content
in an email could be
misunderstood or taken
out of context
Sender should check for
spelling and grammatical
error
Page 160 of 170
Netiquette is the rules
of etiquette that apply
when communication
over computer
networks especially
internet
Avoid humor as some
people may not
understand the joke
Do not plagiarize and
obey the copyright law
Do not chaptalize all
text
Respond quickly to an
email message
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Spam:
What is spam email?
Spam or junk email is sent out to the recipients from mailing list, the
email could be part of phishing scam or to promote certain product,
usually unwanted email
Effects of spam email:
 If a spam email is part of a phishing scam then there is a
chance your details could be obtained.
 The network could also become slower or unresponsive if
there is a lot of unnecessary traffic flooding the network.
Email group :
 Are contacts grouped together to send email to multiple
recipients
Strategies to prevent spam email:
• Use a junk email filter to stop spam email
coming into the inbox.
• Do not sign up for any commercial mailing lists.
• Do not reply to spam email.
• Untick the check box if you are asked to give
your email to a third party.
Effective use of the internet:
The internet:
Internet is a worldwide collection of networks that
allows users to:
 Send and receive e-mail
 Chat online
 Transfer files from computer to computer
 Browse the web
Page 161 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
WWW (World Wide Web):
 Is a part of the internet
 Collection of web pages has been
based on the hyper text transfer
protocol (http)
 Can access by web browser
Page 162 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Intranets and extranets:
• Intranet is defined as a computer network based on internet
technology but designed to meet the internal needs for sharing
information within a single organization
• Extranets can be created that allow intranets expand to outside
of the organization with the same advantages of the intranets
What are the differences between internet and intranet?
 Intranets are safer, less chance of hacking/viruses.
 It is possible to prevent external links
 Companies can ensure that the information available is specific
to their needs.
 It is easier to send out sensitive messages
 Intranets offer better bandwidth than the internet
 It is possible to create extranets that allow intranets to be
extended outside the organization
What are the differences between the internet and an intranet?
 Internet is " international network"
 Intranet is "internal restricted access"
 Internet covers topics of global or general interest, whereas Intranet
is used to give local information relevant to the organization
 Internet possible to block certain websites but more difficult where
as in intranet easy to block certain websites
 Internet can be accessed from anywhere but Intranet requires
password and user ID entry
 Internet access is open for hackers , but intranet is behind a firewall,
which gives some protection against hackers
 Internet is public access, whereas intranets can be private access
Page 163 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Blog: web
logs
Wikis
 A blog is based on personal experiences
and usually updated by one author.
 Blog entries are in order (most recent
entries are shown first).
 Blogs cannot be changed by other users of
the internet.
 Bloggers can be prosecuted for posting
offensive material.
 A wiki is a collaboration from users (many
authors) to create content.
 Wiki is can be edited by anyone (content
can be edited or deleted).
 Wikipedia is an example use of Wikis
Moderated and unmoderated forums:
Moderated forums:
Refers to online discussion forum in which all the posts are
checked by an administrator before posting
Moderator can prevent spam, filter out any posts are
inappropriate, rude or offensive
Unmoderated forums:
No one owns the internet
Not policed
Page 164 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Social
Networks
Social Networking sites allow users to interact and
communicate with each other.
The features of social networking sites:
 You can connect with people with similar interests.
 Users are able to share content such as photos,
video and status updates.
 Each member can build public and private profiles
 Members are given free instant messaging and
video chatting
 It is possible to email other members within the
community
 It is possible to invite people to become friends
 Members have control over who can access to
personnel data
b-blog
Page 165 of 170
 Another version short for business blog which
is used by businesses to promote themselves

 n the internet.
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Searching the internet for information
There are two ways to find the information:
 When using the internet you can
either type in a URL address or use
a search engine to find specific data.
 Normally keywords would be typed
in to a search engine to find
particular information.
Search engines:
 Search engines are useful if you don’t
know the URL
 Search engines using variety of methods
to search
 The more specific search you will get
accurate result
 You can narrowing your search by typing
(+) between words (ICT+past+paper+2019)
 You will find thousands of hits, then you can save it
Using the internet
Advantages:
 Information on the internet is up-to-date
 The internet limitless of information
 Searching using a search engine is fast and easy.
 People can look for information from home
 Information on the internet is usually free of charge.
 Pages on the internet can have multimedia elements , which
can make learning is interesting
Page 166 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Disadvantages:
 Anything can be posted on a web page and information may be
incorrect.
 There is always the risk of accessing inappropriate websites
 It is too easy to be distracted when searching on the internet
 There is always the risk of information overload if the user lacks
the necessary experience
 Some research skills are lost when using the internet as search
engines do all the work for you
Effective use of internet:
Why internet search to find relevant information is not always fast?
 Unless the user narrowing the criteria it will take long time to
find the relevant information
 It is possible to find millions of relevant web sites matching with
given criteria
 If the user uncertain what he needs it will take long time to find
the relevant information
Why it is not always easy to find reliable information on the internet?
 Content on the internet is not regulated.
 Anybody can make a website and post any content which is not
factually correct.
 Wikis can be edited to contain false information.
 Information may be biased depending on who was the author.
How can you evaluate information found on the internet?
There are 6 criteria when evaluating information on the internet:
1. If the author of the website is good credential, then the
information is more likely reliable
Page 167 of 170
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
2.
3.
4.
5.
6.
If you compare the information on the web site with another
source or with the information in the book, this will help to
show if the information reliable also spelling and grammar
correct or NO.
Check if the website linked to reliable or unreliable web sites
If the last update was long time ago , this mean the
information is not reliable
Check if the website have a testimonials or recommendation
this can indicate reliability
It is good idea to see if responsible bodies endorsed (support
and permit ) the website
Internet protocols:
 Is a set of rules which are followed when
Hypertext transfer
protocol (HTTP) &
(HTTPS)
transferring information across the internet?
 Rules are agreed between the sender and
recipient when data is being transferred
 When the protocol changed to seen as
padlock symbol
or letter “s” after http
this is refer to “secure”
 A web browser allows the user to display a
Uniform
resource
locator (URL)
& web
browser
Page 168 of 170
webpage.
 A web browser will use URLs to access specified
websites.
 URLs are represented by numbers
(http://195.196.101.1) not user friendly.
 Therefore an alphanumeric format
(http://www.etoptutor.com/ict)
 Web browser translate HTML from websites to
show the result, it can be images, videos, or
sound
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
The format is protocol://www.website address/path/filename,
website address:
1. domain host (WWW)
2. domain name ( name of website)
3. domain type (.com or .gov or .net or .org)
4. Sometimes includes country code like kw, eg or uk ..
5. path which is a webpage
6. filename is the item on the webpage
What is the process a web browser to load a web page?
 When entering URL or clicking the link address request made
 Retrieve code from the server/resources then downloaded
 Interprets the code as a webpage or page resources to build the
web page
 The web page is displayed
 FTP is a network protocol when transferring
File transfer
Protocol (FTP)
Page 169 of 170
files from one computer to another over the
internet.
 FileZilla is popular FTP application which
issued to upload webpages so that they can
be hosted and viewed on the internet.
Last update: 1/7/2023
Mr. Ayman Al-Nahhas - Cambridge IGCSE OL ICT Theory | http://www.mytutor-helpme.com
Internet
Service
Provider (ISP)
 ISP is a company which provides internet
access to users.
 Normally the users would have to pay a
monthly fee.
 Broadband connections tend to use fireoptic cables for increased bandwidth.
Internet risks
Should internet be policed?
Advantages
Disadvantages
• To protect vulnerable users
• It would be extremely difficult
gaining access to undesirable
and expensive to police the
websites
internet
• To prevent illegal material be
• Infrastructure and staff would
opened or shared by web users
have required
• It will stop incorrect information • It is difficult to push roles in
being published on websites
different countries
• This will be against freedom
• Who to deiced which
information is illegal or offensive
Page 170 of 170
Last update: 1/7/2023
Download