ICT Department
Syllabus (0417)
Syllabus Cambridge IGCSE® Information and Communication Technology 0417 | |
File Size: | 482 kb |
File Type: |
Content
1 Types and components of computer systems
2 Input and output devices
3 Storage devices and media
4 Networks and the effects of using them
5 The effects of using IT
6 ICT applications
7 The systems life cycle
8 Safety and security
9 Audience
10 Communication
11 File management
12 Images
13 Layout
14 Styles
15 Proofing
16 Graphs and charts
17 Document production
18 Data manipulation
19 Presentations
20 Data analysis
21 Website authoring
1 Types and components of computer systems
2 Input and output devices
3 Storage devices and media
4 Networks and the effects of using them
5 The effects of using IT
6 ICT applications
7 The systems life cycle
8 Safety and security
9 Audience
10 Communication
11 File management
12 Images
13 Layout
14 Styles
15 Proofing
16 Graphs and charts
17 Document production
18 Data manipulation
19 Presentations
20 Data analysis
21 Website authoring
Unit 1 - Types and Components of Computer Systems
|
Unit 1: Theory Review
Unit 5: Theory Review
Unit 6: Theory Review
Unit 7: Theory Review
|
Types of computers
1.1 hardware and software
|
1.2 the main components of computer systems
- describe the central processing unit including its role
- describe internal memory, i.e. ROM and RAM and the differences between them
- define input and output devices and describe the difference between them
- define secondary/backing storage
1.3 operating systems
- define and describe operating systems which contain a Command Line Interface (CLI)
- define and describe operating systems which contain a Graphical User Interface (GUI)
- describe the differences, including the bene ts and drawbacks, between operating systems which contain a CLI and those which contain a GUI
1.4 types of computer
• describe how emerging technologies are having an impact on everyday life (e.g. arti cial intelligence, biometrics, vision enhancement, robotics, quantum cryptography, computer- assisted translation, 3D and holographic imaging, virtual reality)
- describe the characteristics of a personal/desktop computer and its uses, both as a standalone and networked computer
- describe the characteristics of a laptop computer and what it is used for, both as a standalone and networked computer
- describe the characteristics of a tablet computer and what it is used for, including its ability to use wireless technology or 3G/4G technology
- describe the computer characteristics of a smartphone and what it is used for in computing terms
- describe the advantages and disadvantages of each type of computer (as above) in comparison with the others (as above)
• describe how emerging technologies are having an impact on everyday life (e.g. arti cial intelligence, biometrics, vision enhancement, robotics, quantum cryptography, computer- assisted translation, 3D and holographic imaging, virtual reality)
2.1 input devices and their uses
• identify input devices and their uses, e.g. keyboard, numeric keypad, pointing devices (such as mouse, touchpad, trackerball), remote control, joystick/driving wheel, touch screen, scanners, digital cameras, microphone, sensors (general), temperature sensor, pressure sensor, light sensor, graphics tablet, video camera, web cam 2.2 direct data entry and associated devices
|
3 Storage devices and media
- identify storage devices, their associated media and their uses, e.g.
- – magnetic backing storage media: xed hard disks and drives, portable and removable hard disks, portable and removable hard drives, magnetic tape drives and magnetic tapes, memory cards
- – optical backing storage media (CD/DVD/Blu-ray): CD ROM/DVD ROM, CD R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray discs
- – solid state backing storage: solid state drives, ash drives (pen drive/memory stick/USB stick)
- describe the advantages and disadvantages of the above devices
- Primary Storage Devices
The names of some computer’s primary storage devices are as follows:
1. Random Access Memory (RAM)
DRAM
SRAM
2. Read Only Memory (ROM)
EPROM
PROM
3. Memory
4. Cache Memory
Secondary Storage Devices
1. Hard Disk
2. Floppy Disk
3. CD-ROM (Compact Disc Read-only Memory)
RAM
RAM is that part of the main memory in which data and instructions are held temporarily. RAM provides a working area to the user to enter and process data. In RAM each data element has its own address (location). Any data element can be read easily and quickly by using that address. It is also called as Read-And-Write Memory (RAM) since the computer can store or write data at any selected location (address) and can retrieve or read data when needed. It is a temporary memory of a computer used to store data and an instruction when the computer is on; everything that is stored in RAM is lost when the computer is turned off. For this reason, it is also called volatile memory. Large RAM sizes provide larger data that a computer can hold and process. Additional RAM chips can be installed in a computer simply by plugging them on the motherboard. This increases the storage capacity of the RAM of the computer.
RAM is a semiconductor memory with no moving part. Data can be accessed from RAM at very high speed very close to the speed of light. A memory chip less than one-fourth size of a postage stamp can store more than 500,000 bytes equivalent to the printed matter on a popular daily newspaper.
ROM
ROM stands for ReadOnly Memory. The instructions written in ROM can only be read but cannot be changed or deleted. The ROM is, therefore, also called non-volatile memory. It is not possible to write new information or instructions into the ROM. This is the reason why it is called Read Only Memory.
ROM stores data and instructions permanently. When the power is turned off, the instructions stored in ROM are not lost. The instructions are written into the ROM chips at the time of its manufacturing. When the computer is switched on, the instructions in the ROM are automatically loaded into the memory of the computer. These instructions prepare the computer system for use and display the initial operating system screen.
A variation of ROM is programmable read only memory (PROM). PROM is a ROM into which you can load read-only programs and data. Some microcomputer software packages, such as electronic spreadsheets are available as PROM units as well as on interchangeable disks. ROM and PROM are used in a variety of capabilities within a computer system.
Difference Between RAM and ROM
Everything that is stored in RAM is lost when the computer is turned off. For this reason, it is also called volatile memory.
In contrast, the Read Only Memory (ROM) is a non-volatile memory. Instructions can only be read from ROM. Instructions once written on a ROM chip cannot be changed. It is a permanent memory of a computer, i.e. the contents of this type of memory are not lost when the computer is turned off. As soon as the computer is turned on, a program that resides on ROM automatically makes the computer ready for use. ROM is a semiconductor memory generally programmed by the manufacturer.
Difference Between SIMMs and DIMMs
The capacity of RAM in a computer affects the computer’s power. More RAM can make a computer run faster. The computer does not necessarily have to load a complete program into its main memory to run it. However greater is the part of a program it can fit into memory, the faster the program will run.
Many RAM chips are installed on a small circuit board. These RAM chips are wired together to form a single module of large memory called Single In-Line Memory Modules (SIMMs). SIMM has contact terminals on it one side. It can easily be plugged into the motherboard. SIMMs had different capacities such as 1 Mbyte, 4Mbytes, and 16Mbytes with varying speed.
SIMMs were popular by PC users in 1980s but has now been replaced by DIMMs. Like SIMMs, Dual In-Line Memory Modules (DIMMs) have been developed installing many RAM chips. DIMMs provide larger capacity as compared to SIMMs. DIMMs have a wider data bus and thus have a higher rate of data transfer. DIMMs are available in several configurations having different capacities and speeds. You can expand the RAM capacity of your computer by simply plugging in more DIMMs.
Short Notes
Floppy Diskette
It is a small removable, portable storage device that is made of polyester film coated with a metal oxide compound. It looks like a 45 rpm phonograph record except that it is enclosed in a jacket square in shape. It is readable by a computer with a floppy disk drive. The physical size of disks has shrunk from the early 8 inches to 5.25-inch square and about 1 millimeter thick (mini-floppy) to a 3.5-inch square and about 2 millimeters thick (microfloppy) while the data capacity has risen.
Hard Disk
A hard drive is a magnetic disk on which you can store computer data. The term hard is used to distinguish it from a soft, or floppy disk. Hard disk holds more data and is faster than floppy disks. In general, hard disks are less portable than floppies, although it is possible to buy removable hard disks. Today’s computers typically come with a hard disk that contains several billion bytes (gigabytes) of storage.
CD-ROM
CD-ROM (Compact Disc, Read Only Memory) is an adaption of the CD that is designed to store computer data in the form of text and graphics, as well as hi-fi stereo sound. It is a non-volatile optical data storage medium that is physically the same as an audio CD and is capable of storing large amounts of data up to 1 GB, although the most common size is 650 MB about 12 million bytes per pound weight. All CD-ROMs confirm to a standard size and format, so you can load any type of CD-ROM into any CD-ROM player. In addition, CD-ROM players are also capable of playing audio CDs. A standard CD is 120mm (4.75 inches) in diameter and 1.2 mm (0.05 inches) thick.
Magnetic Tape
A magnetic tape is also a storage device from which you can access data serially like an audio cassette from which you can hear the songs in the order in which they are stored. Serial access is slower than the direct access provided by media such as diskettes. When you want to access some particular data from the tape, the device has to scan through all the data you do not need but that data is stored before the required one. The access speed can be quite slow when the tape is long and what you want is not near the start. So the best use of the magnetic tape is for the data that you do not use very often.
Magnetic Disk
A magnetic disk is a metal or plastic disk coated with magnetic material. Data is recorded into the magnetic material in machine code. Disks have become popular due to their random access. These disk spin in the disk drives Read/Write heads moving on the disk along its radius can read data at any location under the heads.
Different types of disk drives and magnetic disks are in use. The most popular types of magnetic disks are interchangeable disks called the floppy disks and fixed disks called the hard disks.
Generally, PCs are configured with at least one hard disk drive and on a floppy disk drive. Hard Disk provided a very big storage capacity and are very fast but these are not interchangeable. Floppy disks are smaller than the hard disk because they always consist only one platter. Floppies are available in size of 3.5″ and 5.25″ inches. Both of them are available in double density and high-density storage capacities. The storage capacities of these diskettes used for IBM compatible computer.
Floppy Disk, although slower than a hard disk, are inexpensive and can easily be moved from computer to computer. They are comparatively fragile and must be handled with care.
The difference in the Capacity Between Hard Disk and Floppy DiskA hard disk contains several disk platters stacked on a single rotating spindle. Data are stored on all recording surfaces. For a disk with four platters, there are eight recording surfaces on which data can be stored. A floppy disk has only one platter on which data is written, that is why the storage capacity of a hard disk is more as compared to the floppy disk. Hard disks or fixed disks are also called Winchester disk are permanently installed or fixed with in the system unit
Unit 3 MS Excel
Creating CSS document (Unit 4)
body{ background:#FFFF00; } table, th, td { border : 1px solid black; border-collapse: collapse; border-color: blue; } th,td { padding: 4px; text-align: center; } h1{color:#0000FF; font-family:arial,sans-serif; font-weight:bold; text-align:center; font-size:24px; } h2{color:#A00000; font-family:arial,serif; text-align:left; font-size:24px; font-weight:bold; } P{color:#000000; font-family:arial,serif; text-align:justify; font-size:14px; } li{ list-style-type:square; align:left; } |
Creating html document (Unit 4)
<!DOCTYPE html> <html> <head> <link rel="stylesheet" type="text/css" href="Stylesheet.css"> <body> <h2>PRACTICAL TEST 2019</h2> <table style="width:95%"> <tr> <th colspan=3><h1>Welcome to Colin's Coin & Banknote Shop</h1></th> </tr> <tr> <th rowspan=5> <h2>Visit these recommended sites</h2> <h2>The International Banknote Society(IBNS)</h2> <h2>Professional Coin Grading Service</h2> <h2>Numismatists Directory</h2> <h2>Rare Coin Dealers</h2> <h2>Banknote Dealers</h2></th> </tr> <tr> <th colspan=2><P>Colin's Coin Shop is one of the north of England's ...area of dealership</th> </tr> <tr> <td><h2>Banknotes</h2></td> <td><h2>Coins</h2></td> </tr> <tr> <td><img src="Banknote.jpg"</td> <td><img src="Coin.jpg"</td> </tr> <tr> <td><li>Treasury Notes ... 1949-1962</td> <td>I</td> </tr> <tr> <th colspan=3>J</th> </tr> </table> </body> </html> |
4. Networks and the effects of using them
4.1 networks
• understand how a router works and its purpose
– describe how networks and individual computers connect to the internet – describehowarouterstorescomputeraddresses
– describe how it routes data packets
Figure: Basic Network Diagram Template
4.1 networks
• understand how a router works and its purpose
– describe how networks and individual computers connect to the internet – describehowarouterstorescomputeraddresses
– describe how it routes data packets
- understand the use of other common network devices, including: network interface cards, hubs, bridges, switches, modems
- understand the use of WiFi and Bluetooth in networks
- – describe how computers can use WiFi to connect to a network
- – describe how computers can use Bluetooth to connect to a network
- – compare and contrast Bluetooth and WiFi
- understand how to set up and con gure a small network, including: access to the internet, the use of a browser, the use of email, access to an Internet Service Provider (ISP)
- understand the characteristics and purpose of common network environments, such as intranets and the internet
- – define what the internet is
- – define what an intranet is
- – describe the differences between an intranet and the internet
- – explain the purpose of an intranet and how that differs from the purpose of the internet
- – describe the uses of an intranet
- – describe the uses of the internet
- – define the terms Local Area Network (LAN), Wireless Local Area Network (WLAN) and Wide Area Network (WAN)
- – describe the differences between a LAN, a WLAN and a WAN
- understand the advantages and disadvantages of using different types of computer to access the internet
Figure: Basic Network Diagram Template
4.2 network issues and communication
• security issues regarding data transfer
• network communication
• security issues regarding data transfer
- – describe the security issues surrounding the use of computer networks
- – describe other issues such as the idea that the internet is not policed and the effects of this, such as the existence of inappropriate sites
- – identify methods of avoiding password interception (such as the use of anti-spyware and changing passwords regularly)
- – describe the difference between strong and weak passwords
- – describe other authentication techniques (such as biometric methods, magnetic stripes, id cards, passports, other physical tokens, retina scans, iris scans, face scans)
- – describe the use of antivirus software and other methods of avoiding viruses (such as use of unknown storage media to transfer data, the risk of downloading software from the internet)
- – define encryption and describe its use
- – list the principles of a typical data protection act
• network communication
- – describe facsimile communication and describe the differences between physical faxing (which does not require the use of a network) and electronic faxing (which does require the use of a network)
- – describe email communication, including the use of attachments
- – describe the advantages and disadvantages of using email compared with faxing
- – describe video-conferencing, including the hardware used
- – describe audio-conferencing
- – describe web-conferencing and how it can be linked to either video- or audio-conferencing
5 The effects of using IT
Candidates should be able to:
5.1 effects of IT on employment
Candidates should be able to:
5.1 effects of IT on employment
- describe how there has been a reduction of employment in of ces, as workers’ jobs have been replaced by computers in a number of elds (e.g. payroll workers, typing pools, car production workers)
- describe how there has been an increase in employment in other elds (e.g. website designers, computer programmers, delivery drivers in retail stores)
- describe how the use of computers has led to a number of employees changing their working patterns (e.g. part-time working, exible hours, job sharing, compressed hours)
- describe what is meant by part-time working, exible hours, job sharing, compressed hours
- describe the positive effects microprocessors have on aspects of lifestyle (e.g. the amount and use of leisure time, the degree of social interaction, the ability to leave the home)
- describe the negative effects microprocessors have on aspects of lifestyle (e.g. lack of exercise)
- describe repetitive strain injury (RSI) and what causes it
- identify other health issues (e.g. back problems, eye problems, headaches)
- describe some simple strategies for preventing these problems
- evaluate the use of IT equipment and develop strategies to minimise the health risks
Unit 5-10 Analysing spreadsheet data and preparing graphs
You have learned how spreadsheet models can be used to simulate complex situations and that they can be used to analyse events using mathematicl formulae and functions. So far, the output of your work has been limited to numerical data, text labels and the outcomes of calculations. However, spredsheets can also be used to create graphs and charts of the numerical and text-based data. This session will explain how the spreadsheet model can be developed so that data can be analysed and how a pie chart can be prepared and used to illustrate the data.
You have learned how spreadsheet models can be used to simulate complex situations and that they can be used to analyse events using mathematicl formulae and functions. So far, the output of your work has been limited to numerical data, text labels and the outcomes of calculations. However, spredsheets can also be used to create graphs and charts of the numerical and text-based data. This session will explain how the spreadsheet model can be developed so that data can be analysed and how a pie chart can be prepared and used to illustrate the data.
6 ICT applications
Candidates should be able to:
6.1 communication applications
describe the use of a range of data handling applications (e.g. surveys, address lists, clubs and society records, school reports and school libraries)
measurement applications
describe a range of measurement applications (e.g. scientific experiments, weather stations)
explain the difference between analogue data and digital data
explain the need for conversion between analogue and digital data
describe the use of microprocessors and computers in a number of applications (e.g. pollution monitoring, intensive care units in hospitals)
discuss the advantages and disadvantages of using computers in measurement rather than humans
microprocessors in control applications
describe the role of a microprocessor or computer in control applications, including the role of the pre-set value
describe the use of computer control in applications (e.g. turtle graphics, automatic washing machines, automatic cookers, computer controlled central heating systems, burglar alarms, computer controlled glasshouse)
modelling applications
describe the use of computer modelling in spreadsheets (e.g. for personal finance)
applications in manufacturing industries
describe a range of computer controlled applications (e.g. robotics in manufacture and production line control)
discuss the advantages and disadvantages of using computer controlled systems rather than humans
school management systems
describe how systems are used to manage learner registration and attendance describe how systems can be used to record learner performance
describe how systems can be used for organising examinations, creating timetables and managing teaching cover/substitution
booking systems
identify areas where booking systems are used (e.g. travel industry, theatre and cinemas) describe the online processing involved in booking tickets
discuss the advantages and disadvantages of online booking systems
banking applications
describe the computer processing involved in Electronic Funds Transfer (EFT)
describe the computer processing involved in using automatic teller machines (ATM) (e.g. withdrawing cash, depositing cash or cheques, checking account balance, mini statements, mobile/cellphone recharge/top up, bill paying, money transfers, ordering paper-based goods)
describe the use of processing involved in credit/debit card transactions
Candidates should be able to:
6.1 communication applications
- describe a range of communication applications (e.g. newsletters, websites, multimedia presentations, music scores, cartoons, yers and posters)
- describe the use of mobile phones for communication (e.g. text messaging, phone calls, accessing the internet)
- describe the use of internet telephony, including Voice Over Internet Protocol (VOIP)
- describe applications for publicity and corporate image publications (e.g. business cards, letterheads, yers and brochures)
describe the use of a range of data handling applications (e.g. surveys, address lists, clubs and society records, school reports and school libraries)
measurement applications
describe a range of measurement applications (e.g. scientific experiments, weather stations)
explain the difference between analogue data and digital data
explain the need for conversion between analogue and digital data
describe the use of microprocessors and computers in a number of applications (e.g. pollution monitoring, intensive care units in hospitals)
discuss the advantages and disadvantages of using computers in measurement rather than humans
microprocessors in control applications
describe the role of a microprocessor or computer in control applications, including the role of the pre-set value
describe the use of computer control in applications (e.g. turtle graphics, automatic washing machines, automatic cookers, computer controlled central heating systems, burglar alarms, computer controlled glasshouse)
modelling applications
describe the use of computer modelling in spreadsheets (e.g. for personal finance)
applications in manufacturing industries
describe a range of computer controlled applications (e.g. robotics in manufacture and production line control)
discuss the advantages and disadvantages of using computer controlled systems rather than humans
school management systems
describe how systems are used to manage learner registration and attendance describe how systems can be used to record learner performance
describe how systems can be used for organising examinations, creating timetables and managing teaching cover/substitution
booking systems
identify areas where booking systems are used (e.g. travel industry, theatre and cinemas) describe the online processing involved in booking tickets
discuss the advantages and disadvantages of online booking systems
banking applications
describe the computer processing involved in Electronic Funds Transfer (EFT)
describe the computer processing involved in using automatic teller machines (ATM) (e.g. withdrawing cash, depositing cash or cheques, checking account balance, mini statements, mobile/cellphone recharge/top up, bill paying, money transfers, ordering paper-based goods)
describe the use of processing involved in credit/debit card transactions
- describe the clearing of cheques
- describe phone banking
- describe internet banking, and discuss the advantages and disadvantages of it
- 6.10 computers in medicine
- describe the contents of information systems in medicine (including patient records, pharmacy records, monitoring and expert systems for diagnosis)
- describe how 3D printers can be used in producing medical aids (e.g. surgical and diagnostic aids, development of prosthetics and medical products, tissue engineering, arti cial blood vessels and the design of medical tools and equipment)
- 6.11 computers in libraries
- describe the les used in libraries (e.g. records of books and borrowers)
- describe the computer processing involved in the issue of books, including the use of direct data entry methods
- describe the automatic processing involved in issuing reminders for overdue books
- 6.12 expert systems
- identify a range of applications which use expert systems (e.g. mineral prospecting, car engine fault diagnosis, medical diagnosis, chess games)
- identify the components of an expert system (e.g. interactive user interface, inference engine, rules base, knowledge base)
- describe how an expert system is used to suggest diagnoses
- 6.13 computers in the retail industry
- describe the use of point of sale (POS) terminals, how the stock le is updated automatically, and how new stock can be ordered automatically
- describe the use of electronic funds transfer at point of sale (EFTPOS) terminals (e.g. the checking of the validity of cards, the use of chip and PIN, the communication between the supermarket computer and the bank computer)
- describe internet shopping
- discuss the advantages and disadvantages of internet shopping
- 6.14 recognition systems
- describe how recognition systems work (e.g. Magnetic Ink Character Recognition (MICR), Optical Mark Recognition (OMR) and Optical Character Recognition (OCR), Radio Frequency Identi cation Device (RFID))
- describe how number plate recognition systems work
- describe the processing of cheques
- describe the processing of OMR media (e.g. school registers, multiple-choice examination papers)
- describe how RFID and RF technology is used in a range of applications (e.g. tracking stock, passports, automobiles, contactless payment)
- 6.15 monitoring and tracking systems
- describe how a workforce or member of the public can be monitored or logged
- describe how the use of cookies can be used to monitor a person’s internet activity
- describe the use of key-logging
- describe how worker/employee call monitors can be used
- describe the use of automatic number plate recognition
6.16 satellite systems - • describe the use of different satellite systems (e.g. Global Positioning Systems (GPS), satellite navigation, Geographic Information Systems (GIS), media communication systems)
7 The systems life cycle
7.1 Analysis. (https://www.ictlounge.com/html/analysis_new.htm) I recommand this web site for the systems life cycle.
7.3 development and testing
7.4 implementation
• different methods of system implementation
– describe the four methods of implementation (direct changeover, parallel running, pilot running, phased implementation)
• methods of implementation
7.1 Analysis. (https://www.ictlounge.com/html/analysis_new.htm) I recommand this web site for the systems life cycle.
- methods of researching an existing system
- – identify and describe methods of researching an existing system (e.g. observation, interviews, questionnaires and examination of existing documents)
- – discuss the disadvantages and advantages of the different methods
- Questionnaires: Advantages: Can be answered quickly, more honest, cheap, analysed automatically
- Disadvantages: People often do not complete or return, unclear questions can not be explained, incorrect data, hard to ask technical questions.
- recording and analysing information about the current system
- – describe the need to identify inputs, outputs and processing of the current system
- – describe the need to identify problems with the current system
- – describe the need to identify the user and information requirements for the new system
- system specification
- – identify and justify suitable hardware for the new system
- – identify and justify suitable software for the new system
- 7.2 design
- describe how it is necessary to design documents, les, forms/inputs, reports/outputs and validation
- produce designs to solve a given problem
- design data capture forms and screen layouts
- design report layouts and screen displays
- design validation routines (including length check, type check, format check, presence check, check digit)
- design the required data/ file structures (e.g. eld length, eld name, data type)
7.3 development and testing
- testing designs
- – describe how data/ file structures are created and tested
- – describe how validation routines are created and tested
- – describe how input methods are created and tested
- – describe how output formats are created and tested
- testing strategies
- – describe the need to test each module
- – describe the need to test the whole system
- – describe testing using normal data including de nition and examples
- – describe testing using live data including de nition and examples
- – describe testing using abnormal data including de nition and examples
- – describe testing using extreme data including de nition and examples
- improvements needed as a result of testing
7.4 implementation
• different methods of system implementation
– describe the four methods of implementation (direct changeover, parallel running, pilot running, phased implementation)
• methods of implementation
- – identify suitable situations for the use of different methods of system implementation (e.g. organisations or departments within organisations which need a quick changeover, organisations or departments within organisations which cannot afford to lose data)
- – describe advantages and disadvantages of each method of implementation
7.5 documentation
- technical documentation for an information system
- – explain the need for technical documentation
- – identify the components of technical documentation (e.g. purpose of the system/program, limitations of the system, program listing, program language, program owcharts/algorithms, system owcharts, hardware and software requirements, le structures, list of variables, input format, output format, sample runs/test runs, validation routines)
- user documentation for an information system
- – explain the need for user documentation
- – identify the components of user documentation (e.g. purpose of the system, limitations of the system, hardware and software requirements, how to load/run/install software, how to save a le, how to print data, how to add records, how to delete/edit records, input format, output formats, sample runs, error messages, error handling, trouble-shooting guide/help line, frequently asked questions, glossary of terms)
- describe the need to evaluate a solution in terms of the ef ciency of the solution, the ease of use of the solution, and the appropriateness of the solution
- describe the need for a variety of evaluation strategies, e.g.
- – compare the solution with the original task requirements
- – identify any limitations and necessary improvements to the system
- – evaluate the users’ responses to the results of testing the system
8 Safety and security
Candidates should be able to:
8.1 physical safety
8.3 security of data
Candidates should be able to:
8.1 physical safety
- describe common physical safety issues and what causes them, e.g. electrocution from spilling drinks, re from sockets being overloaded or equipment overheating, tripping over trailing cables
- describe some simple strategies for preventing these issues
- evaluate own use of IT equipment and develop strategies to minimise the potential safety risks
8.2 e-safety
- explain what is meant by personal data
- explain why personal data should be confidential and protected
- explain how to avoid inappropriate disclosure of personal data including: own name, address, school name, a picture in school uniform
- discuss why e-safety is needed
- evaluate own use of the internet and use strategies to minimise the potential dangers, e.g. only using websites recommended by teachers, only using a learner-friendly search engine
- evaluate own use of email and use strategies to minimise the potential dangers, including only emailing people already known, thinking before opening an email from an unknown person, never emailing the school’s name or a picture of a learner in school uniform
- evaluate own use of social media/networking sites, instant messaging and internet chat rooms and use strategies to minimise the potential dangers, including: knowing how to block and report unwanted users, never arranging to meet anyone alone, and always telling an adult rst and meeting in a public place, avoiding the misuse of images, using appropriate language, respecting con dentiality
- describe measures which should be taken when playing games on the internet (including not using real names)
8.3 security of data
- effective security of data
- – define the term hacking and describe its effects
- – explain what is meant by the term hacking and the measures that must be taken in order to protect data
- – explain what is meant by the terms user id and password stating their purpose and how they are used to increase the security of data
- – explain what is meant by the term biometric data and why biometric data is used
- security of data online
- – explain what is meant by the term digital certi cate and its purpose
- – explain what is meant by the term Secure Socket Layer (SSL)
- – describe the features of a web page that identify it as using a secure server
- – define the terms: phishing, pharming, smishing
- – describe the methods which can be used to help prevent phishing, pharming and smishing
- – describe the potential for the malicious use of technology to collect personal data, including: phishing, pharming, smishing
- – describe how it is possible to recognise when someone is attempting to obtain personal data, report the attempt and avoid the disclosure of information
- – explain the difference between moderated and un-moderated forums and the relative security of these
- – explain the concept of and how to recognise spam mail and avoid being drawn into it
- – describe what encryption is and why it is used
- – de ne the term computer virus and describe its effects
- – describe the effects of infecting a computer with a virus from a downloaded le
- – describe how to take preventative action to avoid the danger of infecting a computer with a virus from a downloaded le
- – describe the measures that must be taken in order to protect against hacking
- – describe how it is possible to be the subject of fraud when using a credit card online
- – explain the issues related to security of data in the cloud
- – explain the concept of a rewall and why it is used
- – discuss the effectiveness of different methods of increasing security
9.1 audience appreciation
9.2 legal, moral, ethical and cultural appreciation
- 9 Audience
Candidates should be able to:- show a clear sense of audience when planning and creating ICT solutions
- analyse the needs of an audience
- explain why solutions must meet the needs of the audience
9.2 legal, moral, ethical and cultural appreciation
- explain the need for copyright legislation and the principles of copyright relating to computer software (e.g. software piracy)
- describe methods that software producers employ to prevent software copyright being broken
- discuss the legal, moral, ethical and cultural implications of creating an ICT solution
- create ICT solutions that are responsive to and respectful of the needs of the audience
- discuss why the internet is not policed (although legislation is enforced in some countries) and the effects of this, including the existence of inappropriate sites
10 Communication
Candidates should be able to:
10.1 communicate with other ICT users using email
- describe the constraints that affect the use of email, including: the laws within a country, acceptable language, copyright, local guidelines set by an employer, the need for security, netiquette, password protection
- de ne the term spam
- explain why spam needs to be prevented
- describe the methods which can be used to help prevent spam
- explain why email groups are used
10.2 effective use of the internet
- fundamentals of the internet
- – define the terms internet and intranet
- – explain the differences between the internet, an intranet and the World Wide Web (WWW)
- – explain the concept of storage in the cloud
- – de ne and understand the terms: HyperText Transfer Protocol (HTTP), HyperText Transfer Protocol secure variant (HTTPS), Uniform Resource Locator (URL), hyperlink, Internet Service Provider (ISP), File Transfer Protocol (FTP)
- – describe the structure of a web address
- – explain what a web browser is used for
- – explain what a search engine is used for
- – define the term blog and describe the use of a blog as a means of communication
- – define the term wiki and describe the use of a wiki as a means of communication
- – define the term social networking and describe the use of social networking websites as a means of communication
- advantages and disadvantages of using the internet
- – explain why the internet is so popular, giving reasons such as the amount of information available and the speed of accessing information
- – explain why an internet search to nd relevant information is not always fast
- – explain why it is not always easy to nd reliable information on the internet
- – explain how to evaluate the reliability of information found on the internet
11 File management
11.1 manage files effectively
11.1 manage files effectively
- identify different file types and their use/s, for example: css, csv, gif, htm, jpg, pdf, png, rtf, txt, zip
- locate stored les
- open and import les of different types
- save files in a planned hierarchical directory/folder structure
- save files using appropriate le names
- save and print files in a variety of formats, including: a draft document, final copy, screenshots, database reports, data table, graph/chart, a web page in browser view, a web page in HTML view
- save and export data into file formats for your applications packages, e.g. .doc, .docx, .xls, .sdb, .sdc, .rtf, .ppt
- explain why generic file formats are needed
- save and export data into generic file formats, including: .csv, .txt, .rtf, .pdf, .css, .htm
11.2 reduce le sizes for storage or transmission
- explain the need to reduce le sizes for storage or transmission
- identify where it will be necessary to reduce file sizes for storage or transmission
- reduce file sizes using file compression
- 12 Images
- use software tools to place and edit an image to meet the requirements of its intended application and audience
- know when it is necessary to edit an image and can appropriately:
- – place an image with precision
- – resizeanimage
- – maintain or adjust the aspect ratio of an image, or distort an image where appropriate
- – crop an image
- – rotate an image
- – reflect an image
- – adjust the colour depth of an image
- – adjust the brightness of an image
- – adjust the contrast of an image
- – understand the need to reduce image resolution to increase transmission speed
- – reduce the resolution of an image to reduce le size
- 13 Layout
Note: The word ‘document’ in this section relates to any of the applications used within sections 16 to 21. - use software tools to prepare a basic document to match the purpose and target audience
- – create a new document or, where appropriate, open an existing document
- – enter text and numbers
- – use editing techniques to manipulate text and numbers, including: highlight, delete, move, cut, copy, paste, drag and drop
- – place objects into the document from a variety of sources, including: text, image, screenshot, spreadsheet extract, database extract, clip art or chart
- – create a table with a specified number of rows and columns
- – format a table and its contents
- – place text or objects in a table
- – wrap text around a table, chart or image, including: above, below, square and tight
- use software tools to use headers and footers appropriately within a range of software packages
- – create headers and footers
- – align consistently within a document the contents of the header and footer including: to left margin, right margin and centre of the page
- – place automated objects in headers and footers, including: automated le information, automated page numbering, text, date, time
- – explain why headers and footers are needed
14 Styles
Candidates should be able to:
- understand the purpose of a corporate house style and ensure that all work produced matches this
- – produce documents which conform to a corporate house style
- – explain what is meant by corporate branding/house style
- apply styles to ensure consistency of presentation
- – explain why consistent styles are required
- – apply consistent styles using a variety of application packages
- – ensure that page/slide layout is consistent, including: font styles, text alignment, spacing between lines, spacing between paragraphs, spacing before and after headings
- – create and apply an appropriate style, including: font type (serif, sans-serif), point size, font colour, alignment, line spacing, style of bullets, text alignment to the left, right, centre or fully justi ed
- – select an appropriate font style for a task, taking into account the audience
- – use text enhancement, including: bold, underline, italic, highlight
- – create and apply paragraph style(s) with a new style name to match the corporate house style
15 Proofing
15.1 software tools
• use software tools to ensure that all work produced contains as few errors as possible
Candidates should be able to:
• produce a graph or chart from the given data
17 Document production
Candidates should be able to:
18.1 create a database structure
• design and use suitable software tools to create an appropriate database record structure
• use suitable software tools to search a database to select subsets of data
15.1 software tools
• use software tools to ensure that all work produced contains as few errors as possible
- – explain why the automated suggestions given by spell check software do not always give the correct response
- – use automated tools, including spell check facilities, to remove errors
- – use validation routines to minimise errors
- – explain why validation checks must be appropriate to the data that is being checked
15.2 proofing techniques
- accuracy of data entry
- – describe the importance of accuracy and the potential consequences of data entry errors
- – correct errors in data entry, including: transposed numbers, spelling, consistent character spacing, consistent case and factual errors (following proofreading by a third party)
- – check to ensure consistent line spacing, to remove blank pages/slides, remove widows/ orphans, ensure that tables and lists are not split over columns or pages/slides
- verification
- – define the term verification
- – describe visual veri cation (i.e. visual comparison of data entered with a data source)
- – describe double data entry (i.e. entering data twice and the computer compares the two sets of data, either by comparing them after data has been entered or by comparing them during data entry)
- – explain the need for validation as well as verification
Candidates should be able to:
• produce a graph or chart from the given data
- – select data to produce a graph/chart, including: using contiguous data, non-contiguous data, and speci ed data ranges where necessary
- – select the graph or chart type to match the required purpose and meet the needs of the audience
- – label the graph or chart, including: chart title, legend, sector labels, sector values, segment labels, segment values, percentages, category axis title, value axis title, category axis labels, value axis labels, scales
- – add a second data series to a chart, as necessary
- – add a second axis to a chart, as necessary
- – change the maximum and minimum values of an axis scale to appropriate values
- – enhance the appearance of a graph or chart, including: changing the colour scheme or ll patterns, extracting a pie chart sector to meet the needs of the audience
17 Document production
Candidates should be able to:
- format text and organise page layout
- – set page size
- – set page orientation
- – set page and gutter margins
- – set the number of columns
- – set the column width and spacing between columns
- – de ne the terms widow and orphan
- – explain why it is necessary to use page, section and column breaks, to adjust pagination and to avoid widows and orphans
- – set and remove page, section and column breaks
- – set line spacing, including: single, 1.5 times, double, multiple, spacing before and after paragraphs
- – set tabulation settings, including: indented paragraphs, hanging paragraphs
- – format text as bulleted or numbered lists to meet the needs of the audience
- use software tools to edit tables
- – edit a table structure, where necessary, to include: insert row(s), delete row(s), insert column(s), delete column(s), merge cells
- – set horizontal cell alignment: left, right, centre, fully justi ed
- – set vertical cell alignment: top, centre, bottom
- – format cells and the cell contents, including: show gridlines, hide gridlines, wrap text within a cell, shading/colouring cells
- mail merge a document with a data source
- – explain why mail merged documents are created
- – edit a master document to insert appropriate elds from a data source
- – insert special fields such as date
- – select records to merge
- – merge a document with selected fields
- – save and print merge master document
- – save and print selected merged documents as appropriate
18.1 create a database structure
• design and use suitable software tools to create an appropriate database record structure
- – define the terms at- file database and relational database
- – explain where it would be appropriate to select a at- file database or a relational database
- – assign appropriate data types to fields, including: text, numeric, (integer, decimal, percentage, currency), date/time, Boolean/logical (–1/0, yes/no, true/false)
- – explain that other eld types such as placeholders for media, including images, sound bites and video clips are used in commercial databases
- – use short, meaningful file and field names
- – format fields and identify sub-types, including: specifying the number of decimal places, specifying a particular currency
- – identify the structure of external data with different file types, including: .csv, .txt, .rtf
- – locate, open and import data from an existing file
- – define and understand the terms primary key and foreign key and their role in a relational database
- – create a relationship between two or three tables
- – discuss the advantages and disadvantages of using relational tables rather than a at file database
- – understand the key features of form design
- – create a data entry form to meet the needs of the audience
- – create a data entry form with all fields included to match the purpose of the task
- – create an appropriate data entry form, including: appropriate font styles and sizes, spacing between elds, character spacing of individual elds, use of white space, radio buttons, drop down menus, highlighting key fields
18.2 manipulate data
- use arithmetic operations or numeric functions to perform calculations within a database
- – create a calculated field
- – perform calculations at run time using formulae and functions, including: addition, subtraction, multiplication, division, sum, average, maximum, minimum, count
- use suitable software tools to sort data appropriately in a database
• use suitable software tools to search a database to select subsets of data
- – perform suitable searches using a single criterion and using multiple criteria, on different eld types such as alphanumeric, numeric, Boolean
- – perform searches using a variety of operators including: AND, OR, NOT, LIKE, >, <, =, >=, <=, <>
- – perform searches using wildcards, as appropriate
18.3 present data
- – produce reports to display all the required data and labels in full where required
- – use appropriate headers and footers within a database report, including: report header, report footer, page header, page footer
- – set report titles
- – produce different output layouts as required, including: tabular format, labels
- – align data and labels appropriately, including: right aligning numeric data and decimal alignment
- – format numeric data, including: number of decimal places, variety of currencies, percentages as required by the task
- – show and hide data and labels within a report, as necessary
- – export data for use in another application
19 Presentations
Candidates should be able to:
20.1 create a data model
• create and edit a data model
- use a master slide to appropriately place objects and set suitable styles to meet the needs of the audience
- – identify the need for consistency of presentation, in terms of styles, point sizes, colour schemes, transitions and animations
- – use the master slide to place objects appropriately, including: images, text, logos, slide footers, automated slide numbering
- – use the master slide to set font styles, heading styles and colour schemes as required by the audience
- – manipulate and use speci ed areas for headings, subheadings, bullets, images, charts, colours, text boxes, presenter notes, audience notes as appropriate
- use suitable software tools to create presentation slides to meet the needs of the audience
- – insert a new slide, when required, selecting the appropriate slide type for the purpose
- – place text on the slides including: headings, subheadings, bulleted lists where appropriate
- – apply consistent styles using available software tools, including: select from the presentation colour scheme, the use of text enhancement
- – place appropriate images on the slides, including: still images, video clips, animated images
- – place sound within a slide
- – place charts imported from a spreadsheet
- – place other objects including: symbols, lines, arrows, call out boxes
- – create consistent transitions between pages
- – create consistent animation facilities on text, images and other objects
- use suitable software tools to display the presentation in a variety of formats, including: looped on-screen carousel, controlled presentation, presenter notes, audience notes taking into account the needs of the audience
Candidates should be able to:
20.1 create a data model
• create and edit a data model
- – define the terms: cells, rows, columns, sheets, tabs, pages, charts
- – explain the importance of accurate data entry in spreadsheets
- – enter data with 100 per cent accuracy
- – edit the structure of an existing model, including: inserting cells, deleting cells, inserting rows, deleting rows, inserting columns, deleting columns
- – define the terms: formula, function, absolute reference, relative reference, ranges, named cell, named range, nested formulae/functions
- – explain the difference between a formula and a function
- – explain the order in which mathematical operations are performed and use brackets to make sure that formulae work
- – use mathematical operators, including: add, subtract, multiply, divide, indices, where necessary
- – explain the function of, and use, absolute and relative referencing, as appropriate, when formulae are to be replicated
- – use absolute and relative references, named cells, named ranges and nested formulae, as appropriate
- – use functions, including: sum, average, maximum, minimum, integer, rounding, counting, LOOKUP, VLOOKUP, HLOOKUP, IF and nested functions, when necessary
20.2 test the data model
- – define the terms: testing, test data, expected outcome, actual outcome, normal data,
abnormal data, extreme data, what if - – explain the need to test a model before it is used
- – select appropriate test data to thoroughly test a data model
- – justify the choice of test data
- – calculate the expected outcomes before testing the model
- – test the model, correcting errors and re-testing, where appropriate
- – test the model by the use of what ifs
20.3 manipulate data
- use search tools in spreadsheet software to select subsets of data
- – search using a single criterion and using multiple criteria, where appropriate, with a variety of operators such as: AND, OR, NOT, LIKE, >, <, =, >=, <=
- – search, where appropriate, using wildcards
- sort data using a single criterion and using multiple criteria into ascending or descending order, as required
20.4 present data
- – adjust row height, column width and cell sizes so that all data, labels, and formulae are fully visible
- – wrap text within cells so that all data are fully visible
- – hide and display rows and columns, where appropriate
- – use features to enhance a spreadsheet, including: text colour, cell colour, bold, underline, italic and shading to meet the needs of the audience
- – format numeric data to display the number of decimal places, a variety of different currency values, percentages as appropriate
- – set the spreadsheet to display formulae and values
- – set the page orientation to portrait or landscape as necessary
- – set the page layout so that it prints on a speci ed number of pages
- – use conditional formatting appropriately to change display format depending upon the contents of a cell
IGCSE 2 Please study unit 7 page 315 to 329. We have already done practical parts that is about database.
Unit 7 - Systems analysis and design
0417 / AY Information and Communication Technology Exam Schedule
Paper 12 Theory 11 May
Paper 21 Practical Test A. 07 April
Paper 31 Practical Test B. 09 April
(We don't have too much time for preparation , this Saturday we will do practical test A at my house and you need to bring your laptop.)
Unit 7 - Systems analysis and design
- The systems life cycle:Analysis
- Design and development
- Testing and implementation
- Documentation and evaluation
0417 / AY Information and Communication Technology Exam Schedule
Paper 12 Theory 11 May
Paper 21 Practical Test A. 07 April
Paper 31 Practical Test B. 09 April
(We don't have too much time for preparation , this Saturday we will do practical test A at my house and you need to bring your laptop.)
)IGCSE 1
Chapter 6 Data types and Database (page: 262)
Files: a collection of related structured data and contains many records.
Record: a collection of the same set of fields and contains many fields.
A field: can contain same data types.
A flat file database is a collection of data held in a single table.
A Relational database data may be held in a number of tables where link are created to connect hte data in different tables.
Primary key: Every tables should have a primary key which is a unique value of a record.
Foreign key: will link two files and creates the relationship between them.
Data types
1. Text data type: characters, words, paragraph, even numbers can be considered as text data types.
2. Number: All number type. Integer, real number.
3. Date/Time: date format
4. Currency: Cash, money
5. Boolean/Logical: yes/no or true/false
6. OLE (object linked nad embedded) A graph, video, clip, picture, sound files
Let's start a creating databse, page 274.
1. Open your database software MS access and select a new database.
2. Name as "MusicStudents"
3. Now you import MusicDepartmentA.csv to your database.
Chapter 6 Data types and Database (page: 262)
Files: a collection of related structured data and contains many records.
Record: a collection of the same set of fields and contains many fields.
A field: can contain same data types.
A flat file database is a collection of data held in a single table.
A Relational database data may be held in a number of tables where link are created to connect hte data in different tables.
Primary key: Every tables should have a primary key which is a unique value of a record.
Foreign key: will link two files and creates the relationship between them.
Data types
1. Text data type: characters, words, paragraph, even numbers can be considered as text data types.
2. Number: All number type. Integer, real number.
3. Date/Time: date format
4. Currency: Cash, money
5. Boolean/Logical: yes/no or true/false
6. OLE (object linked nad embedded) A graph, video, clip, picture, sound files
Let's start a creating databse, page 274.
1. Open your database software MS access and select a new database.
2. Name as "MusicStudents"
3. Now you import MusicDepartmentA.csv to your database.
musicdepartmenta.csv | |
File Size: | 3 kb |
File Type: | csv |
musicdepartmentb.csv | |
File Size: | 3 kb |
File Type: | csv |
musicdepartmentc.csv | |
File Size: | 3 kb |
File Type: | csv |
studentdetail.txt | |
File Size: | 29 kb |
File Type: | txt |
4. Select the option for importing data. File,Data or External Data. The type of file (.csv) you are importing text file. Locate the file and choose for the data to be loaded into an existing table studentDetail.
5. Add the following students in the studentsDetail table.
5. Add the following students in the studentsDetail table.
6. Importing data without creating a structure first
0417_w19_qp_12.pdf | |
File Size: | 2466 kb |
File Type: |
0417_w19_ms_12.pdf | |
File Size: | 154 kb |
File Type: |
0417_s19_qp_21.pdf | |
File Size: | 2392 kb |
File Type: |
0417_s19_ms_21.pdf | |
File Size: | 563 kb |
File Type: |
0417_s19_qp_31.pdf | |
File Size: | 2039 kb |
File Type: |
0417_s19_ms_31.pdf | |
File Size: | 477 kb |
File Type: |
Mail Merging (page 47-48)
Mail merging is a way of placing content from a spreadsheet, database, or table into a word processed document. A mail merge is ideal for creating personalised letters or labels. In order to create a mail merge, two documents are needed; a word processed document ( a template) and a file with the dat for each letter.
All Computers Inc. are advertising for a new Marketing Manager and have short-listed five candidates to attend a second interview. The detail of these candidates are held in the file InterviewCandidates.rtf.
Mail merging is a way of placing content from a spreadsheet, database, or table into a word processed document. A mail merge is ideal for creating personalised letters or labels. In order to create a mail merge, two documents are needed; a word processed document ( a template) and a file with the dat for each letter.
All Computers Inc. are advertising for a new Marketing Manager and have short-listed five candidates to attend a second interview. The detail of these candidates are held in the file InterviewCandidates.rtf.
|
|
2020 Sample Questions
|
|
|
|
|
|
|
|
|
|
|
|
505818-2020-specimen-paper-2-mark-scheme.pdf | |
File Size: | 1345 kb |
File Type: |
cambridge_igcse_ict_2nd_edition.pdf | |
File Size: | 70508 kb |
File Type: |