Sei sulla pagina 1di 13

IGCSE ICT

June 2010
MIHIR KHUBCHANDANI

CIE IGCSE ICT, Paper 1 (0417), 2.5 Hours, 100


Marks, 40%

Section 1:
1. Hardware and Software:
Hardware is the physical component s that makes up a computer
system, for example the keyboard, mouse, and monitor. Software is
the general programs that control the computer system. There are
two types of software: Systems software are programs that allow
the hardware to run properly and applications software are
programs that allow the user to do specific tasks.
2. Main components of a computer System:
A typical computer system consists of hardware, software, and
processors. Processors contain the CPU, internal hard disk, the RAM
and the ROM.

RAM
Temporary storage
Volatile

ROM

Permanent storage memory


Only can be read from
Non-volatile
Stores the BIOS and the operating
software

3. Operating Systems:
Command Line Interface: The user must type in instructions to choose
from the possible options. Therefore, the user must be fluent with the
command language. This is also a slow way of entering data. However, the
advantage of this is that the user has direct communication with the
computer, and does not have be restricted to the options shown.
Graphical User Interface: GUI allows the user to interact with the
computer, where the lists are all displayed as icons. Once the item is
selected, the system then automatically carries out the required
instructions. This is easy to use, and is faster, but is restricted.
4. Types of computer:
PC/Desktop Computer

Laptops

Netbooks
PDAs
Mainframes

Easy to find spare


parts
Good dissipation of
heat
Portable
Advantages of WiFi

Not portable
Many wires are needed

Easy to lose/Steal
Awkward to use the
keyboard and mouse
No heat dissipation
No optical drives

Same as that of a
laptop
Can be used anywhere Hard to enter text
Lightweight
quickly
Very Fast
Expensive
Large memory
Large space needed.

Section 2:
1. Input devices:
Keyboards

Numeric
Keypads
Mice
Touchpads
Trackerballs

Remote Control
Joysticks
Touch screens

Magnetic Stripe
Readers
Smart Card
Readers
Chip and PIN
Scanner

Barcodes

OMR
OCR
MICR

Fast data entry


Easy to use
Concept keyboards are
fast, waterproof, and
good for disabled
Fast for numeric entry
Portable devices

Faster
Small
Fast
No need for a surface
Easy for disabled
Accurate
Takes up less space
Allows wireless control
3D
Easy to use
Fastest entry
Easy to use
Tamper proof
Fast
Error-free
Secure data
Reduces the need for
carrying cash
Secure data
Secure
Robust
Fast and accurate
Recovery of damaged
files
Error-free
Fast
EFTPOS
Fast
Accurate
****

Security
Error-Proof

Needs a large space


Slower than other methods

Small keys
Order of numbers isnt
intuitive
Not so robust
Needs a flat surface
Harder to use
Less flexibility
Expensive
May need training
Signal blockages
Harder compared to a
mouse
Limited number of options
Gets dirty
Needs to be in contact
Not human readable

PIN must be secret


Quality is poor

Expensive
Barcodes can be swapped
by customers
Forms must be carefully
designed
Cannot read handwriting
Not so accurate
Expensive
Specific characters only are
readable

Cameras

Webcams
Microphones
Sensors

Graphics Tablet

Easier to use
Cheaper
Stores more
Video conferencing
Fastest
Safer
Accurate
Continuous readings
Automatic
Flexibility
Accurate

No artistry
Needs computer knowledge

Poor quality
Takes up memory
Not so accurate
Can go faulty

Expensive
Not good as a pointing
device

2. Output Devices:
CRT Monitor

High Quality
Work with light pens

TFT Monitor

Light
No glare
Less power used

Laser Printers

Inkjet Printer

Dot Matrix
Printer
Plotters

Speakers
Projectors

Fast
Large volume
Quality
High Quality
Cheaper
Lightweight
Carbon copies
Continuous stationery
Cheap
Large sizes
High quality
Accurate
Allows presentations

Heavy
Become hot
Flicker
Not as good definition
Not good for more than one
user
No use for light pens
Expensive
Ozone produced

Slow
Ink cartridges run out fast

Noisy
Costly to buy
Slow and poor quality
Slow
Expensive

Fuzzy
Need to turn off the lights
Expensive

Section 3:
1. Backing up Data: Backing up refers to the copying of files and data to a
different medium. This is to prevent the loss of data through hacking,
physical conditions (such as a fire), and so that duplicates can be
worked on elsewhere.
2. Types of access:
Serial Access: The data is read from the beginning and then
each piece of data is read until the required file is found. This
is used in batch processing systems, and is relatively slow.

Direct Access: In this method, the key field is used to


calculate the exact position of the file, and the computer is
directed to reach it. This is much faster.

3. Backing Storage Media:


Fixed Hard disks

Portable hard disk drives

Floppy disk drives

Magnetic Tapes

CD-ROM/DVD-ROM

CD-R/DVD-R

CD-RW/DVD-RW

DVD-RAM

Blu-ray Disks

Pen Drives

Very fast
Very large memory
space
Fast
Can be used for file
transfer
Can be reused
Low cost

Easily damaged
No portability
Easily damaged

Low memory space


Few computers have
the driver
Slow
Slow
Cannot be updated

Cheap
Robust
Fast
Stores more data than Slower than hard disks
Floppy
Cheaper than hard
disk
Cheaper
Not reusable
Becomes a ROM
Not compatible with all
drives
Reusable
Data could be
Not as wasteful
overwritten by accident
Expensive
Long life
Not as compatible
Fast
Expensive
No need to burn
Large memory
Large storage
Expensive
Fast
Encryption
requirements
Compact
Easy to lose
Robust
No file protection
Large file space

Flash Memory Cards

Portable
Fast
Robust
Compact
Large memory

Expensive
Needs a memory card
reader drive.

Section 4:
1. Common types of network:
Local Area Networks: This is a network within one building. A LAN
consists of many computers and devices connected to hubs or
switches, which are connected to a router to allow the LAN to have
access to a WAN. The advantage of this is the sharing of resources,
communication amongst the users, and there is a single network
administrator to control the network. However, viruses spread easily,
printer queues develop, access is slow, and if the server crashes, then
the network fails.

Ring Networks: Every computer is connected in a ring, and data is


transferred through all the computers, and each takes the data it
needs. This can take heavy loads and can become very large, but is
very dependent, and it is not easy to add devices.
o Bus Networks: In this, each computer or device is connected along a
common central line. Data travels along this line until it reaches the
required computer. This works like a train. It is easy to add new
devices to this, and it is not dependent. However, it is hard to find
any faults, it is still dependent on the centre line, and it slows when
more devices are added.
o Star Networks: In this, each computer or device is connected via a
central hub or switch. The advantages of this are that it is easy to
isolate faults, and it is easy to add devices. However, it is dependent
on the hub.
o Hybrid Network: This has a bus network, on to which each branch
connects to a star network. It has the advantages and
disadvantages of these two networks.
Wireless LANs: This is similar to a LAN, but there are no wires or cables
involved. This works on devices known as access points, which provide
the wireless signal. This is more flexible, and it is easy to add new devices.
However, it has instable signal, and security is a big issue. It can also be
slow.
WiFi: This is any system which allows connection to a network wirelessly.
Examples are mobile phones, PDAs, laptops, and PCs.
Bluetooth: This is a wireless personal area network technology. This allows
wireless links between devices and connection to the internet.
o

Wide Area Networks: A WAN is a connection of many LANs connected


through a router. These cover great areas, and the security is much
stronger. An example of a WAN is the Internet.
2. Network Devices:
Hubs: This is hardware that has a number of devices connected to it. It
forwards data packets that it receives. A switch is a more efficient hub.
Bridges: These connect two LANs by using the same internet protocol.
Routers: Connects LANs together and connect the LANs to the internet.
3. The Internet: A collection of networks which allows subscribers to send
and receive mails, to chat, and to browse the world wide web.
Websites: Websites are collection of many interrelated web pages, which
can be navigated through by hyperlinks.
Accessing the Internet: To get internet access, the user must get an ISP
registration. The ISP will assign a username and a password, which the
user must enter to login to the network as a verification of his identity.
4. Intranets: An intranet is a computer network based on internet technology
that is designed to allow for the internal needs of communication
within a company. This is safer, is more specific, prevents time wasted
on the internet, and allows for privacy.
5. Network Security:
User IDs: This is a unique name given to the users of a system to allow for
the system to identify the user. It assigns the user privileges once he has
logged in.
Passwords: These are secret codes that the user enters as a method of
verifying the user ID, and to ensure only an authorized user is accessing
the system.
Encryption: This is when data is converted into a code by scrambling or
encoding it. This makes it illegible for any hackers.
6. Communication:
Fax: With this, a document is scanned and converted to bitmap images.
This is then transmitted over telephone lines to any receiver.
Email: This is an electronic method for sending text and attachments from
one computer to another. This is cheaper than post, is faster, and is more
convenient. However, this has the risk of viruses, and bulky objects cannot
be sent across.
Video Conferencing: This is a method of visual communication across a
WAN in real time. This saves travel time and costs, and allows for
meetings to be spontaneous. However, it needs much hardware, and the
quality is not consistent. There can also be time lags and it can be
frustrating.

Section 5:
1. Types of data:
Boolean: This data has only two values: true or false. This works for yes
and no questions.

Alhanumeric and Text: Alphabets are referred to as text data, as long as it


only contains alphabets. Alphabets with any symbols or numbers are
classified as alphanumeric data.
Numeric Data: this can be in real numbers, which have a decimal, or
integers, which are whole numbers only.
Date: Any format of the date
2. Data Structure: Data is often stored in files, which consists of records,
which in turn consists of fields. A primary key can also be used, which is a
unique field used to locate a record in a file during a search operation. A
foreign key field is when the same primary key links two tables that are
related.
3. Databases: A database is a collection of information which is structured to
permit manipulation and searching of data. The advantages of this is that
it promotes consistency, and reduces duplication, and is easy to maintain,
and allows for easy sorting and searching.
4. Analogue and Digital data: Computers work with digital data, which is
Boolean data. However, physical measurements are not digital, but are
known as analogue data. Therefore, a special device called an analogue to
digital converter is needed to convert analogue data to digital pulses.

Section 6:
1. Software copyright: This is the protection authors and publishers have
regarding the use of their software. In this sense, the software cannot be
copied and resold, used in numerous computers, rented, or reused.
2. Viruses and Hacking: A Virus is a program that replicates itself and causes
harm on a computer system, causing the system to crash, files to be lost,
and data to be corrupted. Viruses can be prevented by using antivirus
software, prevention of illegal items, and use of firewalls. Hacking is the
act of gaining access to a computer system or network without
authorization.
3. The effects of ICT on society:
Impact on employment: ICT has led to unemployment in factories,
warehouses, and labor intensive jobs
Some jobs have also been created with ICT, such as computer technicians.
Other workers needed to be retrained, and all manual work is now done by
robots. Now, fewer employees are needed, productivity improves, and
quality and convenience are improved.
Banking and Shopping: There has been a surge in the usage of online
shopping and online banking, meaning that more employees are needed
in this area. More people stay home to shop or bank, which means money
is saved, shops can explore a wider market, disabled and elderly find it
easier, and jobs can be done 24/7, and also, time can be put to better use.
However, there is less interaction, there are security issues, there is no
help from sales staff, and new business are growing from outside the town.
Microprocessors: These are mini CPUs, which help make human life easier.
They are divided into two categories, labour saving devices, and other

devices. The advantages of microprocessors is the increased leisure time,


more social time, phones, and they reduce the need for working. However,
it is unhealthy, wastes energy, can be hard to use, and creates wastage.
4. Information from the Internet
Reliability: Information is more up to date, it is easier to get information
from websites, there is more volume of information, but the information
may not be accurate, and there is a risk of information overloads.
Undesirability: There is a risk of finding unwanted websites, and security
problems:
Phishing: This is when fraud emails are sent to find out personal
details.
Pharming: This is when the computer is forced to fraud websites,
and then allows access to the computer.
Spam: Electronic advertising mail sent out to the customers on a
mailing list. It is harmless, but can clog networks and slow the
access down.
Spyware: Software that gathers personal details and all
transactions carried out by a computer.
5. Internet Developments:
Blogs: These are personal internet journals, where the writer will type
observations on some topic of interest. This is a method of sharing
thoughts, but is still government monitored.
Wikis: These are software that allow users to create and edit web pages
with any browser.
Web 2.0: This is the new generation of internet development and design,
leading to improvement s in communication, applications and hosting.
Media Sharing sites: Allow users to upload videos and pictures to the
internet. This is a web host site.
Social Networking: These are sites that allow users with similar interests to
interact and communicate.
6. Health and Safety:

Health
Back and neck strain
RSI
Eyestrain
Headaches
Dry Skin and respiratory
problems due to printers fumes

Safety
Electrocution
Trailing wires
Falling Equipment
Fire

Section 7.1
1. Communications Applications:
Multimedia presentations: This is the usage of presentation software to
create a presentation with animations, video and sound. These can also

have interactive buttons and are more eye catching .However, this needs
special software and equipment.
Printed Presentation: Hard copies of the presentation are supplied to the
audience. This makes it easier to remember, allows note taking, and helps
those who cannot leave home. But this is expensive and is plain and
bland.
Flyers and Posters: These are made with DTP. These can be colorful, and
printed in mass, and look very professional.
Websites: This is a great way to advertise, as it allows anything to be
done, and can combine sounds, videos, hyperlinks, and buttons to make it
attractive and lasting and accessible.
2. Satellite Communications:
Mobile Networks: Mobile phones communicate with each other over wide
networks, using towers to transmit data. Each tower provides service up to
a certain range, then the next tower takes over.
Embedded Web Technology: This is an online service that allows
communication with devices such as alarms at home.
Global Positioning System: This shows the users exact location.
3. Data Handling:
Surveys can be carried out using OCR and OMR, and also could be online.
Recording can be direct to a database, and this also allows for mail merge.
4. Modelling and Simulations:
A simulation is the creation of a model of a real life scenario in order to
study the behavior of the scenario. This is then used to predict the
outcomes in real life, thus saving time, money and energy.

Section 7.2
1. Types of Processing:
Batch Processing: In this, a number of tasks are all collected over a period
of time and then are processed together in one batch. This works where
there is no real time constraints. The advantage of this is that since the
computer is not constantly working, there is now resource wastage.
Real Time Processing: This is an example of online processing. In this, the
computer responds to the situation immediately.
2. Control Applications:
Turtle Graphics: This is based on the LOGO computer language, and is a
way to experiment different instructions to see the behavior of the floor
turtle.
Sensors Applications: There are two types of control applications, Timed
and Monitored. In monitored events, the computer reviews the sensor data
and updates its files, and can give a warning signal if the readings are out
of the requirements. In control applications, the computer again does take
frequent readings, and if the readings are not correct, it takes action to
rectify the readings. Monitoring is used in hospitals, for alarm systems,
and in environmental systems. Control is used for traffic lights,
greenhouses, and for central heating.
3. Robotics: Robots are used in many areas of manufacturing, for heavy work
or even delicate operations. These robots have sensors, which help to

4.

5.

6.

7.

gather information and prevent unnecessary robotic action. The


advantages: They work nonstop, in dangerous environments, they work
out to be cheaper, are more efficient, and do the boring jobs. However,
there is a limitation on what robots can do, and it also causes
unemployment.
Batch Processing Applications:
Payroll: This is a system that calculates the wages for employees. The
inputs are the employee details, the hours worked, and any other
overtime. The processes are the calculation of the gross pay, less any
taxes, to get the net pay. The output is a printed pay slip.
Billing systems: This is used to produce bills for customers for utilities such
as electricity or gas. The inputs are the customer details, the amount
used, the charge per unit, and the bank details. The processes are the
calculations of the gross and net payment due, and the output is a printed
bill.
Automatic Stock Control: In this system, when a customer purchases an
item, the barcode is swiped and registered, and one item from the stock of
the shop is reduced on the stock database. Then, when the stock levels
are low, it shows a warning.
On-line booking systems: This relies on the ability for the files to be
updated immediately, so as to prevent double booking. In this the
customer simply chooses the product, and the database checks for
availability, and then allows the purchase to continue. The customer then
selects payment methods, and reserves the seat in his name. The
transaction is then recorded on the database.
Chip and PIN: Many credit cards are equipped with a magnetic stripe and a
chip, which stores personal details, such as the PIN code. The way this
works:
The card is inserted into a PIN reader
The restaurant contacts the bank
The card is checked for validity
The customer enters A PIN
The PIN is read from the chip and verified with the one entered
The transaction proceeds of the codes are the same
The money is debited from the bank and credited to the restaurant
A receipt is printed

Section 8:
1. Analysis:
Collecting data, using interviews, observation, examining existing system
work, and sending out questionnaires
Identifying problems with the system
Identifying the objectives
Producing a cost benefit analysis and a data flow diagram
2. Design:
In this, key parts of the system are design, such as the screen layout,
input forms, reports, flowcharts, verification methods, and etc.

o Verification: 1. Double Entry: Data is entered twice and the


computer compares the data entry to find any mistakes. 2. Visual
Verification: The original document is visually checked with the data entry
to find any mistakes.
o Validation:
Range Check
Length Check
Type Check
Limit Check
Presence Check
Consistency Check
Digit Check

Checks
Checks
Checks
Checks
met
Checks
Checks
Checks

for data to be within the range


the number of characters
for invalid characters
for any one of two criteria to be
that all fields are full
that all fields relate
the sum of the digits entered

3. Development and Testing: Development allows for the file structures, user
interface, validation routines, and hardware to be made. Testing uses
different test data to check the system works.
o Normal: Within the range
o Extreme: Maximum and Minimum of the range
o Live: Outside the range
4. Implementation:
Direct Changeover: Immediate switch off ad switch on
Parallel Implementation: When both systems are used for a while
Pilot Running: Its implemented one phase and one office at a time
Phased Implementation: Implemented in pieces.
5. Documentation:
User
Purpose of system
Logging in and out
How tos
Screen layout
Error screens
FAQs
Sample Runs

Technical
Program Coding
Validation Routines
Flowcharts
Input formats
File structures
Outputs
List of variables.

6. Evaluation: The system is compared with the brief, limitations are found,
improvements are identified, and the responses are checked.

Potrebbero piacerti anche