Information and
Communication
Technology
Second EditionCambridge IGCSE Information and Communication Technology
Study and Revision Guide Second Edition Boost eBook
Boost eBooks are interactive, accessible and flexible. They use the latest
research and technology to provide the very best experience for students
‘and teachers.
Personalise. Easily navigate the eBook with search, zoom and an image
gallery. Make it your own with notes, bookmarks and highlights,
Revise. Select key facts and definitions in the text and save them as flash
cards for revision.
Listen. Use text-to-speech to make the content more accessible to students
nd to improve comprehension and pronunciation.
Switch, Seamlessly move between the printed view for front-of-class
teaching and the interactive view for independent study.
Download. Access the eBook offline on any device — in school, at home or on,
the move - with the Boost eBooks app (available on Android and iOS).
To subscribe or register for a free trial, visit
hoddereducation.co.uk/cambridge-igcse-itSTUDY AND
REVISION
UYo}s
Cambridge IGCSE™
Information
and Computing
Technology
Second Edition
HODDER
4 Hoppe
AN HACHETTE UK COMPANY‘his texthas nt been though the Cambridge International endorsement process. Any vferences
‘ormaterals related to ansnets, ads, papers or examinations ae based onthe opinion af he
{uthr(s)- The Cambie Iterrational ylabes or curiam framework, associated assessment
‘uidance materi and specimen popes shoud sways be refered to for afntve guidance,
‘The Publishers would ke to thank the fllowing or permission to reproduce copyright materi
Acknowledgements
Every effort has been made to ace al copyright Hodes, ut any have been inadvertent
‘overlooked the Pulishers wl be pleased to mat the necessary arangements a the fest
operant.
Photos reproduced by permission of p.2 (opto bottom) Phorlamaiphot/Adabe Stock, Amnach
Finehokanat/ 123, Kaspar Gimaldy/Aobe Stock, Murat BAYSAI/ Total, Geppe/Adabe Stocks
9-34 Sheval/Alamy Stock Photo: p28 JFL Photography /Acbestck.
Although every eHart hasbeen made to onsre that nebste abreast crac at tne of sng
{to pes, Hoade Education canst be held response fr the content of any website mentioned
‘in ebook. Its sometimes posbe to in vlocted web page by typing im he sede ofthe
homme page for website nthe URL window of your browser
Machete Us pole sto ate papers that ate natural, renenable and eeyelable products and
Ide from naad grown i well managed frets and ster contol sure. The logging and
Iaufactarng processes se expected to conform fo the enranmental reultions othe country
ctor,
‘Orders: pease contact Hachette UX Distribution, Hely Hutchinson Cet, Milton Road Didcot.
Oxfordshire, OX1 MH Telephone 44 0)238 627827. Ema eden @hachette 2. ins are
‘open fom 9 aun to 3 pum Monday ray. You can alo order trough our mee
‘twnchodderedueston com
ISBN: 97813983 1852 6
© David Watson and Graham Brown 2022
Fis published in 2017
‘his etion pushed in 2022 by
Hodder easton,
An acette UE Company
Garmeite Hosts
5 Victoria Embanenent
indore 082
ewachoddereducation com
Impression runber 5 43.2 1
‘rights reserved. Apart fom any ue permitted under UX copyright ow no pat ofthis pubiation
ray be reproduced o transmit in any form or by any means, electronic or mechanical eluding
Potocopying nd recording, or held within any information storage and vetrieval stem, without
permission writing fom te publisher or under cence fam the Copyright Licensing Agency
Timid urther dete of sch cences (or reprograpie reproduc
{Copyright eensing Agency Limited, wwe
Cover photo © Juin Eichinger- stock adobecom
ustraions by Aptaa ne
"ypeset in India by Apa, In
Printed in Spain
‘catalogue record fr this titles avaliable from the Bitch rary.
seep scree
ESC Fsc=c1os740Contents
Section 1
Section 2
Introduction
Theory
1 Types and components of computer systems
2 Inputand output devices
3 Storage devices and media
& Networks and the effects of using them
5 The effects of using IT
& CT applications
7 The systems life cycle
8 Safety and security
Audience
10 Communication
Practical
11 File management
42 Images
13° Layout
1% Styles
18 Prooting
16 Graphs and charts
47 Document production
18 Databases
19° Presentations
20 Spreadsheets
21 Website authoring
Practice Paper 1: Theory
Answers to exam-style questions
‘Answers to Practice Paper 1
Index
12
128
131
134
17
10
ue
vue
156
159
167
181
188
206
209
Revise TesteD ReAOY
‘abed sian Adooovoud 09 e601 5141
Hodder & Stoughton Limited © David Watson and Graham Brown 2022Introduction
Welcome to the Cambridge IGCSE™ Information and Communication
Technology Study and Revision Guide Second Edition. This book has
been written to help you revise everything you need to know for your
ICT examinations, alongside the Cambridge IGCSE Information and
Communication Technology Third Edition Student's Book. Following the
new ICT syllabus (First exams in June 2023), it covers all the key content
along with sample questions and answers and exam-style practice
questions. A sample practice paper 1 is at the end of this book, with
sample practice papers 2 and 3 (and their source files) onkine at
https://www.hoddereducation.co.uk/cambridgeextras. These practice papers,
‘written by the authors, are stightly longer than the actual Cambridge IGCSE
papers to ensure questions covering more of the syllabus can be offered.
Red bold words are glossary words. The glossary can also be found online at
Cambridge Extras.
How to use this book
Key objectives
‘A summary ofthe main information
‘Advice on how to answer
the question.
Brewer ee keke
Exam-style questions for you to try and see what
you have learned
tis ilegal to photocopy this page
a Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend EditionSample question and response Ez |
Exam-style questions with sample student answers to show how the
question can be answered. In the Theory section, high-level answers are
strong answers while low-level answers require more revision.
Teacher's comments
Feedback from a teacher showing what was good
and what could be improved in the student answers Se ee ome
Sea
eneeeetemoeeree
Common errors
Mistakes students often make, and how to avoid
them.
Answers,
Outline answers to the exam-style questions and
Practice Paper 1 from page 188.
For answers to Practice Papers 2 and 3 please see
online, along with the source files required to
complete those papers. Where ellipses are used in the
practical answer section, the ellipses indicate follow on marks
‘when the first mark has been attained.
Assessment
The information in this section is taken from the Cambridge IGCSE
Information and Communication Technology 0417/0983 syllabus for
‘examination from 2023. You should always refer to the appropriate syllabus
document for the year of examination to confirm the details and for more
information,
There are three examination papers. Papers 2 and 3 assess practical skills
using a range of different software applications.
Paper 2 Document ‘Theory Paper3
ere ee eee
anos Pre: authoring
Duration hour 30 minutes hours 15 minutes 2hours 15 minutes
Marks 80 marks. To marks Tomarks
Syllabus topics | 1-21 11-16,17,18,19 11-46, 20,21,
examined
‘bed sian Adosovoud 09 e601 131
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 iTypes and components of
computer systems
Key objectives
The objectives of this chapter are to revise: ~ input and output devices
© hardware and software: = backing store
= types of hardware and software = operating systems
= analogue and digital data types © types of computer
= contral processing unit/microprocessor emerging technologies.
= internal memory (RAM, ROM)
1.1 Hardware and software Prevseo l
1.1.1 Types of hardware
Hardware refers to the physical components that make up any typical
computer system. These components can be interal or external to the
computer.
1.1.2 Types of software
‘Software is a general term used for programs that control the computer
‘system and process data; software can be applications software or
system software,
‘abed sup Adooovoud 07 e601 5
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 i1.1 Hardware and software
Applications software provides the services that the user requires to
solve a particular task. System software is designed to provide a platform
‘on which all other software can run. Examples of both include:
1.1.3 Analogue and digital data
Computers can only understand data that is ina binary format (i.e. 0s
‘and 1s only). Ths i referred to as digital data which isin contrast to
‘analogue data found in the real world.
‘Analogue data is physical data that is continuous and not discrete in
nature; it can have an infinite number of values. Digital data is written in
binary format; the data is discrete and can only have specific values. The
accuracy of digital data depends on how many bits are used to represent
the data values. If analogue data needs to be sent to a computer, it must
first be converted into digital data. If a computer needs to control a
device (for example a motor), then the digital output must be converted
‘nto an analogue form. To convert data from analogue to digital requires
‘an analogue-to-digital converter and to convert from digital to analogue
requires a digital-to-analogue converter.
Itis illegal to photocopy this page
i Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend Edition1 Types and components of computer systems
1.2 Main components of computer systems EE |
1.2.1 Central processing unit
The central processing unit (CPU) is a computer component that interprets
and executes commands from computer hardware and software. Its usually
part of the motherboard. The main components of the CPU are the control unit,
and arithmetic logic unit (ALU). It is often referred to as a microprocessor.
1.2.2 Internal memory and backing storage
Random access memory (RAM) is an internal memory chip where data
is stored temporarily. The contents of RAM are lost when the computer is
powered down. Read-only memory (ROM) is also an internal memory chip
and stores data permanently; the data is retained even when the computer
4s powered down.
ROM also contains coding known as a boot file. This file tells the
computer what to do when it first starts up. Basic input-output system
(8105) is also part of this start-up procedure; here BIOS stores computer
settings on a complementary metal oxide semiconductor (CMOS) chip.
This table summarises the differences between RAM and ROM:
‘Temporary memory so data canbe | Permanent memory so data cannot be
changes changed
Volatile memory contents lost when | Non-volatile memory ~ contents
power turned off retained even when power turned off
[Can be written to and read from Can only be read frem
files, part of operating | Used to store BIOS and other start-up
stem currently
Can be increased in size to improve
| computer's performance
use data
1.2.3 Input and output devices
Input devices allow data to be entered into a computer either manually
(e-, using a keyboard) or automatically (e.g direct data entry such as OR
code readers).
Output devices allow the results of a computer's processing to be shown in
a human-readable form (e.g. monitor or printer). Note that some devices
can be both input and output (e.g. a touchscreen). Input and output
devices are covered in more detail in Chapter 2.
1.2.4 Backing storage
Although main memory is RAM and RON, data to be kept permanently.
(that can also be altered) is stored on a backing store. Backing stores are
generally either hard disk drives (HDD) or solid-state drives (550).
Backing storage (usually solid state in modern computers) is used to
permanently store data; but it can also be changed, added to or removed by
‘the computer or user. Backing storage can also be hard disk (magnetic) or
Blu-ray disc (optical) and it can be either internal or external to the computer.
Data access is slower than for RAM or ROM but backing storage is usually
considerably larger (2 TB or 4 TB is not unusual). The cost per byte of
storage is also much less for backing storage devices.
RAM and ROM are
directly addressable
Iie. can be read directly)
by the CPU but backing
storage is not. The data
‘must be loaded into RAM
first before it can be used
by the computer.
‘bed san Adosov0ud 01166)
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 i1.3 Operating systems
1.3 Operating systems Ez |
‘An operating system (0S) isa type of software that enables a computer
system to function and allows the user to communicate with the
computer by:
‘© controlling input/output devices and backing storage devices - this
usually involves control of data flow
supervising the loading, running and storage of applications (apps)
dealing with errors as they occur
maintaining security
keeping a computer log of events
‘© allowing communication between computer and user.
1.3.1 User interfaces
In this part of the computer, we will consider four types of human=
computer interface (HCI):
AGUI is often called a
windows icons menu and
pointing (WIMP) devi
environment and is used
by PCs not equipped
with touchscreens.
Modern devices, such
as notebooks, tablets
and smartphones, all
Use touchscreens and
these adopt a post-
WIMP environment - this
Interface allows fingers
to be used to carry out
tasks such as pinching
and rotating, which would
bbe impossible with a
.
.
.
.
Sample questions and responses
‘Describe the advantages and disadvantages of using dialogue-based
and gesture-based interfaces, [6 marks]
Give an example of where each type of interface is used. [2 marks]
facts,
features and/or characteristics of both types of interface. No comparison
of the two types of interface has been asked for. In the second part of
the question, itis important that the examples given reflect the list of
advantages and disadvantages; they should nat be contradictory. Six
‘marks are awarded in the first part; you would be expected to give a
minimum of six features. It would be advisable to give three features of
each type of interface.
Itis illegal to photocopy this page
i Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend Edition1 Types and components of computer systems
Sample high-level answer Teacher's comments
8) Advantages logue bneedincertacee
when usedina veil, tere sno need fora ever to tate their hands off
‘he stezring wheel toincrease sound volancin steree. for example
+ inahome thsi very ueeful for people with disabilities, since mary task
‘an be carried out by the spoken wordonty
+ Ieieposeibe to use this asa security feature, since voice recognition could
be used to identity apercon.
Disadvantages of dialogue based interfaces:
+ the system stil ot that reliable with mary commands not beng
recognised or needing to be repeated several times (especialy there
background noice)
+ dialogue-based interfaces can be quite complex to set up
+ theuser needs toknow which command can be used.
‘Advantages of gesture based interfaces:
1+ replaces mecharicalinput devices
+ theres no physical contact required
+ (bls avery naturalinterface fora human operater:no training is needed to
interface with the computer
Disadvantages of gesture-based interfaces:
+ itispossiblefor unintentional movementto be picked up
+ itonly works fairly near to the camera or sensor (maximum of 15 metres)
+ tecanbe imitingwhat the aesture-based system wil accept e,Itmay
‘ake several attempts to find outexactly what finger movements are
recognised).
1) Dialogue based systoms couldbe used inthe home by people with aisabilties
‘todo tacks suchas close th curtains suitchonthelghts (etc) by simple
verbal commards, Gesture-based systems could be usedin avehcle to oper
close windows and doors or to alter the heatinaair conditioning settings
Sample low-level answer
4) The advantage ofa dalogue-ased interface sit allows aperson with
disablities to control the cpering and closing of curtains without them having
‘toleave their seat. The biggest dicadvantage would be verbal commands to
Control devices could annoy other people inthe house.
‘The advantage of gesture-based interfaces wouldbe na car where the
passenger finds the music too loud they coud gesture to the driver to turn
‘the sound down. This, ofcourse, coulddistract the driver which isan obvious
disadvantage,
¥) Dialogue-based interfaces could beused nthe houseby a person with sabilties
‘tocontrol devices without leaving their seat. Gesture-basedintertaces could be
sed ina car tolet the driver know what needs tobe altered
‘abed sup Adonojoud oy e6an 511
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 a1.3 Operating systems
Sree eke kn
‘1 Explain the following terms. In each case, give an example to help in your
‘explanation.
a Input device
b Output device
© Dialogue-based interface
4. Gesture-based interface (81
2 Inthe following table, five statements about CLI and GUI have been made. In
‘each case, tick [7] the appropriate box to show whether the statement refers
toa CLI or GUl interface.
‘The user isin direct communication with the computer
All commands need tobe typed in using the correct format
Needs a complex OS and large memory requirement to operate
Allows computer configuration settings tobe directly changed
Makes use of pointing devices [such as a mousel or finger if
Using a touchscreen] |
(51
3. Seven statements are shown on the left and seven computer terms are shown on
the right. By drawing lines, connect each statement tothe correct term.
[ 1. Nor-voltle chip tats baten- powered and stores
ley BOS data sucha he date, time and stem ARAM
requremerts
2. Used wih touchscrens to alow actions such a,
pinching and rotting as well a pp selection ad
2. Software vedin he cestion, manipulation, eo
‘modification and ana of erawngs and desis
“internal memory chip which an be read om and
‘writen to; stores es, data and prt ofthe operating Dicey
‘stem current use
5. Picure or senbos used on sree to represent apps]
{oranges when selected the app willbe unched, EoD
partof aviNP stem
6 neal memory chip which stores data
permanent, ts non-volatie in rare ands often Poste
{ed to store the computer BOS
7. nerpels ad executes commands from hardware
trad sotore pat of te motherbowrd main 6. eon
‘Components are CU and ALU
m
legal to photocopy this page
a Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend Edition1 Types and components of computer systems
1.4 Types of computer EE |
1.4.1 Desktop computers
‘© Desktops: not portable but less expensive than other computer types
and usually more powerful for the same cost. More stable internet
connection since usually uses wired connectivity.
1.4.2 Mobile computers.
There are four categories of mobile computers:
In the sample question
below, the term ‘give’
‘means it is acceptable to
write a single sentence to
highlight a typical use. in
the second part, be brief
when giving an example.
However, remember your
example must match
with the use or it won't
gain any marks, Note
that each use, plus its
example, is only worth
fone mark. This means it
is very easy to lose the
‘mark ifeither your use or
the chosen example are
too vague ar don't match,
‘© Laptop (or notebook): lightweight, low power consumption, with no
trailing wires, takes up less room than a desktop and is easy to work with
multimedia systems since itis portable. Similar advantages to tablets but
often bulkier (but this fs changing with introduction of notebooks).
‘© Smartphone: very small and easy to carry round (always with you),
can connect to cellular network and WiFi, Has a long battery life.
Small screen size and virtual keyboards can make them difficult to use;
relatively small memories and slower data transfer rates.
‘© Tablet or phablet: similar features to smartphones but much larger
screen size (can be up to 33 cm); can be used with much larger keyboards
built into cases. Slowly taking over from laptops as the preferred portable
computing device since they often have similar or better performance.
Sample question and response En
‘Apart from making phone calls and text messaging, give five
uses of the smartphone. For each use, give an example to Teacher's comments
ilustrate your answer. [5 marks] jrygigagtanawer i welll
- constructed. The student
‘Sample high-level answer eT ere
© nthe Feld ofentertainment ‘examples; this means they
= forexample when streaming videos or musk coulé potentially gain all.
© Asacamera the marks available for
~ forexampe taking on the epur ofthe omen photos at an accident since | the question. Where only
your phones ays withyou 41 mark i available for use
© Internet services and example, both are
(ordeal wea OR Sie por dr iE Seca Se nr needed to gain the marks.
automatic website connections to tourist attractions, hotels or tax, yey pass
© Téephonc banking ate somes ene
~ eros paynontctgooorsenzesatasupomaracorretavrant | | amet jtateg ye
(noneed tocamry a credit/debit card withyou} tse ofa smartphone and
© Remote contrat devices Sean
~ foreanpe devices that contain enbeddedprocessors(ea.anoven)can | tae Coneaquenty they
ve controled an app ta thence. part resat os
‘marks! It is possible to join
accessing the internet
‘Sample low-level answer eth lari aise ee
Foutes ot a emsrtphone woddinchade: and using Facebook giving
accel tte net. a maximum of 2 marks.
plang compte ganes However, you should not
@ using Facebook or Twitter use tradenames (Facebook)
@ playing music ‘so this second mark would.
be at serious risk.
‘bed san Adosov0ud 01166)
© watching videos
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 i1.5 Emerging technologies
Broek uke kes
4 Give three advantages and three disadvantages of using smartphones
rather than laptop computers. ta
5 Explain the following terms. In each case, also give an example to
help in your explanation.
a Phablet Fast battery drain
b Accelerometer d_ App store (G}
6 Six statements about types of computer are shown in the following table,
Tick Iv] the appropriate columns to indicate whether each statement is
true or false.
ne)
‘Desktop computers are easier to upgrade/expand than
laptops
Laptop computers use a touchpad, as part of the
keyboard, a5 a pointing device
Phablets and tablets requir the use of plug-in
keyboards to allow them tobe used to write emails
Tablets don't allow the use of Voice over Internet |
Protocol {VoIP or video calling
‘The built-in cameras on smartphones and tablets can
be used to read OR codes
Desktop computers must use a wired internet
connection; they cannot connect to WiFi
1.5 Emerging technologies _|
1.5.1 Impact of emerging technologies
Artificial intelligence (Al) is a machine or application which carries out a
tas that requires some degre of intelligence, There ae a number of postive
aspects of Al:
© improvements in safety @ faster development of products
‘© improvements in quality ‘© autonomous vehicles.
There are also a number of negative aspects of AI:
‘© can lead to job losses and de-silling
‘© technology dependency
‘suspicion that machines are ‘taking over.
Extended reality (AR) refers tothe combination of real and virtual
) environments. The most common examples are augmented reality (AR) and
| virtual reality (VR). The table summarises the differences between AR and VR:
: SE
3 | [Theuser experiences relationship between digital | Technology i able to take the user out ofthe real world
3 |_| virtuat and physica eat worlds into’ virial, digital environment
“|__| The user is not isolated from the real world and can still The user is fully immersed in the simulated world
2 | | interact and see what sin front of them
| [The user can experience the AR world through special | Users wear a VR headsel which gives a 360° view ofthe
3 | gogotesorvia a smariphone/tabiet virtual wor
| Virtua data and objects are overtaid Can be used in medicine/surgery, construction,
l ‘education and military applications
i Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend Edition1 Types and components of computer systems
Sample question and response
The manager of a car showroom has decided to use AR to allow their
customers to gain the best possible experience when choosing a new car.
Explain what features of AR persuaded the manager to decide to use this
technology in the car showroom. [5 marks]
Sample high-level answer
[ARallows the user to experince the relationship between physica and digital
world: sitingin the showroom the customer could be made to beteve they were
sitting behind the whee of an actualcar, thus gaining the fullexperence of beg in
the car
Virtual formation and objects would be overlaid ontoreal world situations, which
would so lead the customer tobeleve they were actually sitting in the car.
‘The user can experience the AR world through special goggles: this allows an
nmersive experience but also permits the customer to stil interact with the real
world, The customer is stil able task the car salesperson questions wiesiting
Inthe virtual ear
EE |
Since this isan ‘explain’
question, it is necessary
to give as many facts
as possible to support
the chosen features. It
is imperative that the
features given match the
‘car showroom scenario,
‘and generic answers
are not given in the
hope of gaining some
marks. Three features
with full justification
would gain full marks,
or six features, with less
Supporting information,
would also be acceptable.
‘Sample low-level answer
‘AR allows the customer to wear special goggles, which allows them toimmerse
‘themselves into the experience. They willbe cutoff fram the real world, which
allows them to fuly nj the experience without outside noleos and lighting
disturbing them. The AR eystem alows them ta drive the carwithout actually
leaving the showroom
Breck eu kn
7 Six statements about AR and VR are shown on the right. Draw lines to
connect each feature to the AR or VR technology.
'A Takes the use out ofthe reaord envronment |
Into a simulated dial enirorment
'. ral objects and information are cveiad onto
resl word tuations
Allows the user to experience the reaonship
between rea and physical words at he same te
'. Users wear a headset which allows 360° vw of
‘simulated word (his Yoo the brain to
bekeve the station sea
Thesis ay ined a sited dit
The wer not toate rom the real wor and
‘ast ble to interact and see wha happening
Inthe real word
[= |
6
Teacher's comments
The first answer is
probably worth 4 or 5
‘marks since they have
covered about five
different points. Their
answer has successfully
distinguished AR from VR,
wich fs very important in
this question.
The second answer has not
siven sufficient evidence
that the student really
knows the difference
between AR and VR. They
hhave mixed up the two
technologies in their
answer, They would gain
credit forthe use of special
‘goggles and a reference to
‘immersive experience.
‘bed san Adosov0ud 01166)
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 ilegal to photocopy this page
Input and output devices
Key objectives
The objectives of this chapter are to revise.
© the characteristics, uses, advantages and disadvantages of:
= input devices
= direct data entry devices
= output devices,
2.1 Input devices
‘An input device is hardware that allows a user to interact with a computer
and also allows the computer to collect data. The following table lists a
number of input devices together with some of their uses as well as their
advantages and disadvantages:
Keyboard
© Entering data manually
into a computer
© Typing in commands toa
computer [e.g PrtSern,
(CtrlsP and so on}
Numeric @
oye
‘ALATMs to key in PIN to
‘obtain money
© ALPOS terminals in case
the barcode on aniter
falls to scan property
(© When using chip and PIN
devices to make a card
payment
‘© Well-known method
© Easy method of entering
data into a computer
© Easier to carry out
verification checks on data
entered
‘© Faster input method than
a standard keyboard when
fentering numeric data
© Easy-to-use input dovice
since it involves fewer keys
Difficult to use for people with
certain physical disabilities
Slow entry method compared to
direct data entey
Can lead to aliments such as
RSI
Keys can be small, making input
difficult for some people
(Order of numbers on keypads is
often not intuitive
Pointing | @ Controls the postion of
‘© Faster method to choose
Difficut to use by people with
premium land has more
‘ccurate control than a
‘mousel
© Used in uxury cars.
toselect functions
such as operating the
{Global Positioning
‘System, allowing use of
‘smartphene and oon
mouse
'© More robust and dosen't
reed any special surface to
‘wrk properly
© Requires te
than a mouse
© Less prone than a mouse at
causing RSI
desk space
device: ‘anon-sereen pointer to | on-screen options certain disabilities
allow selections, open/ | compared toakeyboard —_@ Can lead to injuries such as RSI
aoe! © Onlyrequires a small ‘Some surfaces dont work well
amount of desk space with mechanical mice Imouse
slips on the surface]
Pointing @ Similar tomouse but @ Sameadvantages asa @ Not everyone finds touchpads
dovic uses a fiat panel below ‘easy to control and certain
the keyboardon laptop | @ actions can be difficult such as
touchpad computer laptop. there isnoneedto drag ana drop)
carry a mouse around with
you
Pointing @ Usedincontrol rooms | @ More accurate positioning @ More expensive to buy than a
where desk spaceisata | of pointeronsereenthana mouse
May require training to use
properly since t isa less well-
known type of pointing device
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend Edition2 Input and output devices
[nEn
emote | Usediocorra incon: |@ Can operate roma nyt ove te ence
SecA i orice sila eee tase ete oh saree meine
flyers foresamplaavred mess |” repuarbei uv ancronmertat
tedeeon Cayeusrimaroce | ioe
Thaferoatn raat cn
be Maced en ay ot ork
walltntinaret novice
ae | Nei ce beefs cla edeoke eae |e Dserens Loa Cieres il
evces! |" covcestomeyounim | tanamoutinmany, | misigtnempu dete tent
Couclororsinaatrs | gemesndsimutons | _tovarincrismsplcsions
eyes | egtgessnncrsr | 0 teaceardesssecit [a Beer sway eden
Caria srndstrlts | ensmowecrthebnecd |” dering asindston
ees ‘mimic actual controls to control on-screen
newman
Touchcreen |e Sel-servceislegata |e Fast ta enryandexsyto-|@ Lined umber of porsBie
perl ton Stemterace chaceseveae
o KimctoanerPI, |e Meeseytoeondecroen | Screen cangt tery dry
trusts ey Suessneceesaryoth ne’ |" quand cancun ates
@ Publciscrmatentlosts | tny mebod trample nn cleaned one
(egratenarperd | Eau takoop clan ee
Mabie ronecan nce thosuriace lass _ | Screenacange erate,
tte eed ee eee
@ Canpuihesettsining|__ met atic thes dard
Scanner |e Seannoginpaper | Corerts writen tetito[@_Gully of photos mdr
Gecimentsd photos |" cron ormat slowing |” dopnta one ser
cert tee et rete ee
formatonaconpuar.. | byOchaxtwars nd used | Scoming erty coler
o Arcgetwianieotd | Instr dacomers tung « |” inoge seenngl canbe avery
mance word processor somproces
@ Usedioceaninbarcotes [0 Mlows domegudptotss | ifthe urate boing scanned
aposwanglaceer” |” andmanuscypeteoe, |" isdamoged.tesctoer cant
es oa poeta nel Reel
eateries Mie eared
thescamer cones 9 BOE
Sole 22
Distal |e Taking hoaprapha or | Cn ke many hols | Neediobe compute rato
ames |” eet conprrectoatraanat |” usedgtt camera sect
Scat eerte eres Re ers ea oder gece cesaee
(egvevdingslGtcods | sro ear tse brgres carps
Seirowepgetma’ |e Rensediaewppiaes | expeure tl crate
won [bv nme on as gin | sere sftvaretaon
@ entity Inmedtefevbuckebet” | ©. Comprerson mages en
fhotyreattthtor | propel san iene ane ieee
Gerdenaivert |e Eestostrepntoson | _lonestquay
toovaraedtulangs, | coud
india pans don
Weroprone | @ Input spexcsoundie be | Faxtinpstmeiedand | Sound ies cantake vp arge
sed in presentations,
special effects, music
‘sampling and soon
Asa sensor to pick
‘up sounds fe. in an
intruder alert system,
etection of liquid
ripping from pipes]
In video conferencing
Input device for people
with disabilities
Useful for people with
certain disabilities
{© Allows the pessiilty of
‘manipulating sounds in real
time
© Canbe used in voice
activation systems
improving safety le,
verbal commands n'a car
to operate key functions.
‘without the driver taking
their hands off he steering
wheel)
amount of memory uniess they
are compressed
Using verbal input can be
inaccurate le. "how to wreck a
nice beach’ could be mistaken
for howto recognise speech
hich would be a problem ita
‘microphone was used te input
data intoa word processor!
Invoice activation, you must
remember keywords or certain
functions ofthe system can be
activated by mistake
‘abed sup Adoaojoud 01 e6an 511
Hodder & Stoughton Limited © David Watson and Graham Brown 2022ee
rT Dis
2.1 Input devices
‘Analogue | @ Measure physical data |@ Readingstakenaremore | @
‘sensors {rom the environment accurate than manual
and send ittoacomputer | _ methods
© Many sensors exist: | @ Readings taken
= temperature continuousiy Ino vital
(greenhouse readings would be missed) @
environment) © Possible to take readings.
pressure intruder in places hazardous to
‘alert systeml humans or when severe
= light control ot street | weather causes risks to
lighting) human lite
= soundlintruder alert |@ Data gathering s automatic
system] soit can be automatically
= humisity imonit sent toa computer
the atmosphere ina
‘chip manufacturing
process)
= pH (monitor acidity
Tevelsin a chemical
Faulty readings can lead to
spurious results, which con
be dangerous{e.9. sensors
sed in monitoring/contralling
functions in an aeroplanel
Most sensors are analogue,
Which means they require
Conversion to digital using an
Ane
process)
Light pen © Selecting objects ona |@ Have greater accuracy than | @ Problems of ‘ag’ when moving
CRT screen touchscreens the pon on sereon lespeciallyit
© Usedwith CAD/CAM | @ Verysmall devices luseful | the screenis not cleanl
software on a CRT where spaceisan issue] | @ Currently only work with CRT
sereen © Very easy input device to sereens
Sample questions and responses
Name a suitable input device for each of the following applications. Give
an advantage and a disadvantage of your chosen device in each case. A
different device needs to be chosen for each application:
4) street lighting in a town where the lights are turned on automaticaly
when it turns dark and are switched off again when it becomes light.
b) a ‘smart house’ where the opening/closing of windows, turning lights
on/off and operating other devices (such as a television) is done by
voice command,
€) simulation of an aircraft cockpit which needs to be as realistic as possible,
4) selection and control of icons (e.g. representing pumps) on
a large screen in the control room of an oil refinery plant. [12 marks]
‘Sample high-level answer
8) Deviceight sensor
‘Advantage: allows for automatic control ofthe streetlight, therefore there
‘eno need tomanvally switch them oni: allows 24-hour control respective
of the time of day or the weather.
Disadvantage: unless cet up propery lights would come on and off during
heavy cloud cover during the day causing constant onlof light sensors are
analogue devces requiring the use ofan additional ADC to convert input to
digital: sensors also need regular maintenance to operate correctly.
Device: microphone
‘Advantage: person with dleablltes can easily control the operation oF
devices in the hme From their seat without the need to physically openvclose
windows and 20 on
Disadvantage: can be expensive ta set up initially. dependence on technology
is always abig risk for example what happens if the system breaks down?
legal to photocopy this page
Very dated technology
Ey |
The question only asks
for a named devi
not give any unnecessary
descriptions. For
advantages and
disadvantages, ensure
your answers refer
to the scenario given
and don't use generic
‘examples. Think about
your answer carefully
to ensure you don’t
choose the same di
for two applications
for example, choosing
sensors for applications
{a} and {b] would lose you
all the marks for part cl
i Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend Edition©) Devi: joystick
‘Advantage: gives a fairy realstic controlot an aircrattinterface:\tis an easy
input device to operate.
Disadvantage: movement ofa joystick canbe too sensitive reducing the
realism or leading to wanted results; an expensive interface would be needed
{or actual realism since thejeystick doesn't feed backin a eimulation,
4) Device: trackerbal
‘Advantage: spaces at a premium n a controlroom (or safety reasons, desks
need tobe uncluttered), therefore atrackerbal sa better option than, say
‘a mouse ora keyboard they are a very robust device and can handle rough
‘treatment by the operators: they have more accurate controlof the or-
‘screen process parameters.
Disadvantage: ofcen requires training to gain maximum benefit oF the device
since operators would only be used tousing a mouse or touchscreen before.
Sample low-level answer
2) Devices sensor
‘Advantage Inexpenohe tem wthlow malitenarce
Dieadvantage: may reak downinuse
1) Device: sound sencor
‘Advantage: a person with dbs doesn't need tomove.
Disadvantage: can pickup other sounds and nat workpreperty
©) Device: steering wheal
‘Advantage: can contro an arcrafc asin realife.
Dtesdvantage: aeroplanes drive steering whee
4) Device: touchscreen
Advantage: e30y-to-use interface.
Dleadvantage:acreon becomes Art
Exam-style questions for you to try
1 Awater purification plant needs to check acidity levels and oxygen
levels in the water. This process is controlled from large LCD screens
ina control room.
A ist of possible input devices is given in the table below. Select which
input devices would be suitable for this pollution monitoring plant and
its control room,
Peers
Ca
Microphone
pllsensor
| Keypad
Oyen gas sensor
Touchscreen
Joystick
Remote contro
Light pen
Trackerbal “ha
2 Describe applications for each of the following input devices. Justify
your choice of device in each case:
2 Driving wheet
Microphone
© Touchscreen
Digital camera {el
2 Input and output devices
Teacher's comments
The first answer would
‘probably gain the full 12
marks as each device has
bbeen correciy identified
and the advantages and
disadvantages refer to the
actual application and are
not generic.
The second answer would
‘only gain about 5 marks,
Devices (a), (c) and (d)
‘would just about gain 3
marks; the second device
is far too vague and is
also a repeat of sensors
as an input device. Part
() advantage and part
(@) disadvantage would
also gain 2 marks since
they are just enough ~
‘the answers are weak
‘but not wrong. The rest
of the advantages and
disadvantages are either
incorrect or much too
‘vague to gain any marks.
‘bed san Adosov0ud 01 166)
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 ais illegal to photocopy this page
2.2 Direct data entry devices
Direct data entry (DDE) devices are used to input data into a computer
without the need for very much, if any, human interaction. For example,
barcode readers are DDE devices and the only human intervention is to
point a reader/scanner at the barcode. The data collection and transfer to
a computer is done automaticaly. The following table lists a number of
DDE devices together with a description and some of their uses as well as
their advantages and disadvantages:
2.2 Direct data entry devices
EE |
Magnetic | Readsinformation @ On credit/ebit,
Stripereader onmagneticstripes cards foruse
onthe back of a card, at ATMs or POS
for example a debit | terminals
for creditcard, which @ Security cards to
holds data suchas allowentry toa
account number, building, hotel room
sort code, expiry and soon
date and start date
does not hold the
PIN
Contactless Aread-onlyRFID © Debit cards - allow
debitcard_chipisembedded in customersto pay,
readers the card, containing for items up toa
data such as PIN, certain amount)
‘account number, without the need to
Sort code, expiry entera PIN
date and soon
radio trequency
reader can read
the chip from afew
centimetres away
ChipandPIN The credit/debit @ To make payments
reader cardis inserted into at garages,
the device and the restaurants, travel
embedded chip is agents and so.on
read. APINisthen @ Thecardreader
entered that should uses an internet
‘matchthe PIN stared link [usually WiFi
onthe chip before to contact the
the transaction can card-isouing bank
take place when making 2
Faster data entey
than using a
keyboard or keypad
Error-tree (no
typing)
Information is more
secure: the data
isn't held in human
readable format
Physically robust
system
Faster transaction
‘as noneed to enter
PIN,
Uses 128-bit
‘encryption
Noneed tora
customer to
remember their
PIN
Retailers naw don't
have access to
customers’ credit
card/debit card
information
More secure
than contactless
payments ineeds a
PIN}
The limit on
spending is much
higher than for
contactless
methods
Ifthe magnetic
stripe is damages,
the information|
cannot be read
Reader needs to be
in close contact with
card
Data may not be
human-readable
but certain devices
can ead and
clone data on the
‘magnetic stripe
IRis possible to
‘monitor contactless
transactions i
someone near you
is using an RFID
reading device
The maximum
transactions
limited to a smatt
value
Inthe PINs
accessed by third
party, the chip and
PIN systems very
insecure cards can
be cloned using
devices attached to
ATMs)
The lack of an
upper limit can
cause probloms
ita stolen cardis
used before itis
reported stolen
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend Edition2 Input and output devices
Porras ra
io Use radiowaveste |@ Livestocktracking |@ Tagscanberead | ® Tagcollisions can
Frequency | read and capture onatarm fromareasonable | occur where data
fentfication information stored @ Retaillunike distance fom two or more
IRFIDI readers | on a tag. The tag harcodes,thereisno |@ Veryfastreadrate tags overlap]
is made up of a needtoscan-thetag| [ittakesless than @ Radio waves can be
‘microchip and an isautomatically read | 100 milliseconds to blocked or jammed
antenna. (Note from a distance) respond) which means the
passive tags usethe @ Securty|RFIDtags © Allows bi- data cant be read
reader'sradiowave | attachedtogoods | directional data | @ tis possible tohack
energy torelay back | allowsupermarkets | transfer(datacan | into transmitted
information! tocheckifarticles | be sentin bath data and read or
arebeingremoved | directions) changeit
fromthestore | @ Allows bulk © Tho system is more
without payment] detection/reading to complexand more
© Admission passe ‘occur (several tags expensive than
for example ata canbereadatthe barcode readers
theme park togain | same timel
accesso rides and | @ Unlike barcodes, it
events is dificult to copy oF
© Libraries toteack |_alterthe data stored
books cut en ten} | on RFID tags
Optica mark | Canreadmarks © Reading (© Fast method of data | @ Needs expensive
recognition written inink or questionnaire input documents |__ and complex forms
tome) pencil on apre- responses, canbeleadedinto © Formsneedto be
printed orm either @ Automatic marking | ahopperandread | carefully designed
by joining dots of multi-choiew ‘utomaticaly] tocapture required
CA ortiingina || cxampapers 1 More accurate than | _ data OMF iris the
'© Automatic counting | entering the data amount of data that
(oxonge D> of voting choices in| using a keyboard canbe captured)
anclection (removes riskef _@ Problems occur it
typing errors} the form isnot filed
© Fastertofillin a incorrectly loften
formthan fusing | instructions on how
ocr teri out the form
need tobe giver)
‘Optical Converts text (© Processing of (© Much fasterdata | @ Thesystem cant
character | on hard copy passports and ID entry than manually always read certain
recognition documents intoan —cardsat an airport | keyingindata using handwriting styles,
{ocr} electronic format. security desk a keyboard © Scanning of
The data canthen | @ Converting (© More accurate and documents isn't
be processed and handwritten text less error-prone always 100%
used, for examplein into computer- than manual gata accurate
‘word processor Usable format fentrymethods @ ~Acomplex and
© Automaticnumber | @ Ifused in expensive system
plate recognition ‘questionnaires,
toidentfy cars allows customer
when entering, for | to expand on
example, carparks | answers unlike
© Digitisation of OMR where a
valuable, ancient ‘customer is limited
decuments and toanswering a set
books questions)
‘bed sup Adosovoud 01 8H
Hodder & Stoughton Limited © David Watson and Graham Brown 2022legal to photocopy this page
Pores
Reads barcode @ In supermarkets on
labels on tems: products, enabling
automatic product
IMNEOBEUMIENY information, pricing
and automatic re
Barcodesareread ordering o items,
byalaser or LED they also allow for
scanner/reader itemised billing
Whichseans the @ Inlibraries to track
thickness of the dark books out on loan
‘andlight ines and @ Safety records of
converts the data equipment, for
into a digital format example in an office
leg. recording
the last time an
electrical safety
check was carried
out)
‘uiek OR codes aremade @ Inadvertsing, the
response (QR) up of a matrix of QR code can contain
codereaders dark squares on ight phone numbers,
backgrounds. physical addresses,
website addresses
and son
© Cancontain
weblinks that are
automatically
activated when the
codesare scannedin
© Canstore WiFi
authentication details
store large amounts (69. Passwords and
of information! type of encryption
data; the codes | beiogused)
ccan be read by the Inaugment
Comerabuititos | fealiyleg.ina car
showroom)
smartphone or tablet
A Met Canestablish virtual
online stores ithe
{OR code is scanned
bythe customer's
phone and the goods
dre automatically
Geliveredt their
home!
OR codes are able to
Sample question and response
2.2 Direct data entry devices
Faster checkouts
and fewer errors
than tying in prices
using s keypad
Allows for
‘automatic stock
‘entrain many
opplications,
such asina
supermarket,
allowing for just-
in-time’ stocking of
‘Awell-tried ang
trusted technology
OR codes can
store much more
information/data
than barcodes
Fewer errors
than using
barcodes, since
OR codes allow
the use of built-in
‘error-checking|
procedures
Easier to read than
barcodes, they don't
need expensive
seanners and
‘can be read by 2
smartphone/tablet
QR codes canbe
‘encrypted which
makes them
more secure than
barcodes
The local bus station and railway station at @
VISIT WHITEPOOL popular holiday resort use posters containing
etc) QR codes that give arrivals important
information about amenities and attractions
4 in the local area.
Describe how a holidaymaker can use their
Visit our local ‘smartphone to find out information about
attractions. Need help? local attractions in the area using this poster.
Call 0800 1111 11000
[5 marks]
Not totally folproef,
barcodes can be
altered or swopped
by someone
Barcodes are more
easily damaged
than RFID tags oF
magnetic stripe
Cards
damaged or torn,
barcades may not
be successtully
seanned
There is more than
one GR code format
QR codes can’
be used to
store malicious
codes {known
ing).
When the OR code
is scanned, the
User is cont toa
bogus website or
fven unwittingly
downloads malware
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend EditionSample high-level answer
1© the holiiaymaker points thelr smartphone at the GR code on the poster(s)
‘© anapp on thelr smartphone processes the image taken by the camera
(© browser software on the smartphone automatically reads the data abet
holiday resort generated by the app
© theuser will then see either information about local attractions and possible
phone numbers or they wilbe sent alink to. website where they wilfind useful
laformation about various attractions at the holday resort.
(© the user wil alsobe able to buy tickets online to alow them vo isit theatres,
museums and 99 on without the need to queve
© entrypacces wil be sent to the holidaymaker’s emartphone (probably inthe
form ofa barcade or OR code),
‘Asa ‘describe’ question,
a full description of
the process of how the
smartphone and QR
code would be used by
the holidaymaker is
expected. The answer
should be as detailed
as possible and make
references to the given
scenario rather than
giving generic responses.
Five marks will be
awarded so you need
to make at least five
valid points for a strong
answer.
he
Sample low-level answer
The holidaymaker would use their smartphone and photograph the GR code. The
Gk code may conta weblinks which take Che user to the holday resort's website
‘Theuser would typein this website on ther phone and get the information they
want, They could also use their smartphone tocall the number on the poster at
‘the bus station or allway station.
Teacher's comments
The first answer would
Exam-style questions for you to try probably gain full marks,
‘3. Which five computer terms and devices are being described below? pec ty may be marta
a Amatrix of filled-in dark squares on a light background; the matrix anedertaytoes
is read by the builtin camera in a smartphone or tablet. points since this isa
bb Adevice that can read marks written in pen or pencil; the pen or __—_-descrption (and usually
pencil marks must be made in predetermined postions. requires sentences), They
«© Adevice that converts a photograph or document into a computer- would, however, still gain
readable format. at least 4 of the 5 marks
dA device used to control the operation of other electronic devices since their answer is very
using infrared signals. ‘thorough.
© Direct data entry device that uses radio waves to read and capture
information stored on an electronic tag. 15] The second answer is very
4 a Explain how barcodes could be used in a library to track books that brief and only worth 1
are out on loan. {4} ‘or 2 marks: 1 mark for
b Another library uses RFID tags to track books on loan. Describe mention of the use of a
the relative advantages and disadvantages of using RFID tags camera (in a smartphone)
compared to the method you described in part (a [4] to record the OR code
5 Seven applications are given below. Tick [v] the appro
iate column ‘and 1 mark (probably) for
toindcae the best ODE device foreach he app Bhering the holiday hot,
oer - line’ since a phone number
Reading the ruber plate on aveniieeterng 3 ee
peyear ark oceans
Reading ond counting he wen aps inan oe aur
cy worth no marks. és
ecb au on emer SEB i
secur desk 5
Used in augmented eaiy ata car showroom to 3
eth canomer en mms experience :
Testing embeded west areaeswritenn i
Brat cod ant bvertag pole 3
Digtiotion ofa cient sok and nranbecrinGs z
Meckling mblilchotes exens questions; 3
automatically im 3
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 a2.3 Output devices
2.3 Output devices Ez |
The following table lists a number of output devices together with some of
their uses as well as their advantages and disadvantag}
Tmontor | @ Inspecstarent,n Jo Theyhaeaverylargevewng, | CRT montorsareeary
catoterer | Sowneresghigen |@ Extimontoreallowtheureot | LeDscrme
foucedtoarowand "|" Ugttpene ol The fro phot
feec Nomen sare posh trent
Set scram Frey consume considera
peepee then
causing beeches and 0
| | _|__problems_
mrontor fw U8 ° @ (co
o teu he an = Wyott owpemr | = Cera conrat om
cyt Sut ee coraumpton ‘arove veg angles
pif UI ca ca NE Ve Wane psa or I esa crit
scrensere | tablet apap theses + Star tro seme mation
mmaceupot | andsmarigaves | Dor afer om nage Dlarinag hong
ylans | = Where bine = Poelats ave weak
coats touenereen = Bont etertroma Puts that cansowat
sont tector fac inge Bier ack at ay
Gag LEDs|| requred/co | = Veryshorpageresolsion| Grea lyon ets
emitting @ LED: screens compared to CRT = Need backlighting (LCDs.
Gode(ade |" = Owmratyused |e LED dont produc teow
mas inlargecaiber |” = Noman layoring ign tlecan adie
tical Sano > Nenwedorbekigng vanaheHriaten
Ty tebe thceleDeprotuetner | LED
omni ore exsensive han
= Cope ensmpin coe
= Letstesveryongte | - Conaufrfom cour
> Serena cea bean oe shitieg econ
Scone allowed
tpecnd npr
traingsom |" tune Kayoor/teyped serahed sd dying
tsingttana | sttoluppbing | Exrymetiodtovseandiess_ | topo prtrmenca or
fete) re @ Aathprel re mechnia
fracinestatratwny/ |” Grkelaysaraionestne | sifeartokoowits users
eciaion none, | _surtece sae felon hsregtered. et
chometsetl |. Theyalbwal-och iret aytons have Pap
© inermaton Henk at |” tuncbonetechesseominewt, | _tsdhackeg. urbng tu
mnaeum port. | rata thts uid the taba
dolar cel | Nophyisn anteesorbutens
‘Nowra traces obs more
coihafiatie
is illegal to photocopy this page
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend Edition2 Input and output devices
Cmrn
‘Multimedia
projectors.
{take computer
‘output and
enlarge itto be
projected onto
white wall)
Laser printer
{uses a rotating
drum, dry
ink toner]
cartridges and
electrostatic
printing)
Inkjet printer:
{use thermat
bubble or
piezoelectric
technology:
use four er five
‘small wet ink
cartridges and
stepper motors
tofeed the
paper!
Dot matrix
printer
{a type of
‘impact printer
that uses an
inked ribbon
Uke an old
typewriter] and
printhead
containing an
array of pins)
Sem
Training presentations | @
llarge sereen makes
iteasyforalarge | @
number of people to
take part}
‘Advertising, for
example at a shopping | @
mall
Home cinema systems
[projecting image
from DYO/BIu-ray,
television, mobile
phone and so on}
Wherelownoise | @
required eg. in an
office! .
‘When fast, high-
quality, high-
resolution printing is
neededle.g.alarge ©
print run}
Where alow-volume @
printrunis needed @
leg.acne-ott
photograph)
Good for high-quality
colour printing leg. | @
they have a photo
quality option which | @
enhances photos]
Useful when an .
‘unusual printing
medium isusedieg. | @
printing logos on
T-shirts (cloth
Usefulin places where |@
the atmosphere is
damp or dusty le.g.2
factory floor! .
Can be used in places
where their noise is
not an issue (e.g. ina
workshop)
Usetut if the print
run requires mlti-
partstationery (ie. | @
carbon copies}or | @
continuous stationery
for example, when
producing thousands
of wage slips during a
night run
Enables many people to see 2
presentation
Avoids the need for several
networked computers since &
‘computer output can be seen
‘on one large screen
‘Space saving - projectors can
be mounted on the ceiling, for
‘example
Faster printing than an inkjet
printer for large print runs
‘ality ofthe printing is high
‘and these printers can handle
‘small fonte and fine lines better
than an inkjet
Toner cartridges last fora tong
time
‘The paper trays have much
‘greater capacity than inkjet
printers
Low start-up costs
‘Can handle many types of paper
(e.g. cardboard! and other
materials (eg. as plastics,
cloth, photo paper. et]
Cheaper to buy than laser
printers
‘The ink cartridges can be
refilled
‘Smaller footprint and lighter
than a laser printer
Don't praduce azone gas or ink
particulates,
‘Can be used in an environment
that would be harmful oa laser
‘or inkjet printer
Carbon copies multi-part} can
be made (very useful when
producing wage slips where
the impact head prints on the
inside ofa folded paper and not
‘onthe outside, thus keeping
information confidential)
Very cheap to run and maintain
Very good for tong print runs
since they can use continuaus
‘stationery {which can be 2000
continuous perforated sheets}
Images can be abit fuzzy and
colours faded or incorrect
shade
Expensive items to purchase
and maintain
Setting up projectors can be
dificult
‘Adarkened room is usually
needed
Need a separate audio
system Iwhich can add to
the costs and complexity of
setting up]
Can be expensive torun
(especially colour printers}
since the toner cartridges.
and maintenance are
expensive
Produce azone gas and volatile
toner particles (which can be
harmful to people inan office,
for exarplel
Unlike inkjet printers,
they can't handle a variety
of printing materials
{any material that is heat
sensitive can't be used)
Larger and heavier than
inkjet printers
Inkjet inkis very expensive
Not suited for long print
runs since they have very
small paper trays andthe ink
cartridges don't last long
The paper fastness of the
ink isn't good: for example, a
highlighter pen cant be used
inthe printed sheets since
the ink wil ‘dissolve
Need regular head cleaning
toprevent the head clogging
up with ink a process which
uses a lot of inkl
Not as durable as laser
printers
Very ncisy in operation
Expensive to buy initially
Yery tow at printing
Very limited colour printing
options {some 4-coloured
ribbons exist, but the colour
range is very limited)
Printing is generally of very
poor quality,
The technology is very
outdated: the printers are
only suitable where laser or
inkjet are not suitable
Hodder & Stoughton Limited © David Watson and Graham Brown 2022
‘abed sup Adoaojoud 01 e6an 511is illegal to photocopy this page
Cre
{graph
plotters
{use pens to
draw lines
onvery large
sheets of paper
or plastic
‘30 printer
uses adaitive
printing
technology
where a solid
‘object is built
upinvery thin
layers (typically
«0.1mm thick)
“makes use of
‘adapted inkjet
or laser printer
technology)
‘Speakers or
loudspeakers
{convert
electri signals
toscund)
Actuators
{used in controt
applications)
Producing
architectural érawings:
and preduct blueprints
Producing engineering
drawings
Drawing animation
characters fr the film
industry
Making prosthetic
limbs, which are
Unique to each person
Making bespoke
items to allow for
reconstructive
surgery based on
exact scans of the
patients anatomy
Making precision
parts for industry leg
in aerospace]
Fashion and art;
allows for new
creative ideas.
Making parts for
items ne longer in
production fog
vintage cars)
Sound in multimedia
presentations:
Actas an interface
‘with devices for
people with certain
disabilities (e.g
people with visual
impairment)
Playback of music
files
Audible warnings
in systems being
computer-contralled
leg. nuclear power
station safety
systems)
Control meters,
pumps, switches and
Allow a computer
to control physicat
devices by using a DAC
Interface
Very high-quality rawings
Can produce large
monochrome and colour
drawings toa high accuracy
(Can print an a variety of
materials (e.9. aluminium,
cardboard, plastic, clath, steel,
wood) as well as paper
Not expensive torun
Easier to produce prototypes.
that work lit is also much
quicker and less expensive than,
making areal part
Although expensive itis stil
‘cheaper than making a product
in the conventional way
Many medical benefits, such as,
producing artificial organs and
Itis good forthe environment
keeping items working for
longer by making bespoke
parts reduces the throw away
‘mentality
‘Sounds add an extra dimension
toa presentation making
itmore interesting and
informative
Useful when helping people
with disabilities where
‘a microphane/speaker
‘combination atfords a workable
interface with devices
‘Awell-tried technology
Allow automatic control of
many devices
Relatively inexpensive
technology
2.3 Output devices
Very stow printing
Expensive equipment to
purchase intialy [although
Funning costs are relatively
low!
Need avery large physical
featprint
Counterfeit tems are easier
te produce using 30 printing
Can lead to illegal activity
leg. production of dangerous
items based on blueprints,
found oninel
Printing isa stow process
Potential for job losses as 90
printing can replace certain
skills
Use of 30 printers is very
expensive
Speaker output can be
very annoying inthe office
environment
Expensive ithigh quality
sound is required
Require the use of a DAC
interface if digital devices
are sending signals to
actuators
[An additional device inthe
system that could go wrong
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend EditionSample question and response
Name the following output devices and give a suitable application for each
device.
Cres
w=
——
ae
=
a 2
eee
‘Sample high-level answer
Device 1:30 printer Application: making parts for
can ro longer be bought
Device 2:(loud) speaker Application ina presentation (i the form of spa
word or music
Device 8:t0 Applicaton: informat
passergers to select opt
Device 4: inkjet printer Application: produ
photograph
Device 5:(araph) plotter App
print
intage vehicle which
keosk at an airport allowing
one-of high quality colour
ation: making large engineering drawing
Look carefully at the
pictures of the devices
since it can be easy
to confuse them. A
brief description of an
application that would
se this output device
is required - don't give
alot of detail since it
only carries one mark.
However, its vital that
your application matches
the device. You shouldn't
use the same application
‘more than once.
Teacher's comments
The first answer would
gain full marks since
‘each device has been
correctly identified. The
applications given are also
‘correct and the student
has given just enough
information.
‘dosoi0ud 01165
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 a2.3 Output devices
Sample low-level answer
Device 1:30 printer Application: making parte that move
Device 2:epeater Applenton, producing sound
Dovce 8 montor Appa showing output ona sere
Doce A:printor Application predicing hard copy output on paper
Dovce 5 plotter Application: making large dravingsof houses.
Teacher's comments
“The second answer would only gain 4 marks. The answer ‘monito’ isn't enough since
‘the image s clearly a touchscreen (monitor: the answer ‘printer fs not enough and
would gain no marks. However, since none ofthe answers are actully wrong, the
student could still gain the application marks. The First four answers given are not
applications; they ae simply describing what type of output is given by the device.
However, the last application is probably just enough to get the mark.
SE ck ounce cers
{6 Acompany manufactures parts for cars. The factory isa very noisy, dirty environment. Each part
needs tobe labelled at each stage of the process; ths abel is produced by a printer onthe factory
floor. The company also has some offices where staff carry out online sales, answer customer
queries, produce monthly salary slips and develop new products.
2 Name a suitable printer for producing the labels onthe factory
ftoor.Justty your choice of printer. a
'b Name the equipment needed in the office to:
produce wage sips.
it find answers to queries from customers’ emails or phone enquiries,
ii, develop new parts for use in their cars.
Justify our choice of device in all cases. )
7 Five input devices (on the left, ive description lin the middlel and five applications on the right are
shown in the diagram below. Draw lines to connect each input device to its correct description. Then
draw lines to connect each description toits correct application.
Device Dat conversed no
cade acer secre caer whch shen Augmented realy
Eoneied no apt sonal
Deve Wiens pra dak care
erphore Sige tes ing nro
LED light source ian os
2 Dave at a ape ae ea
fe OR eater ocean ans the a asomec
zg {Soy mage toot Toma fo
: Device at ea code n he x
2 sensor form of a matrix of dark squares, peers
2 = not batons eres
2 Device that detects acy levels
2 ‘Scanner [of 2 solution; the data is in an a ee
2 fnsiogue format aaa
i
a Cambridge IGCSE Information and Communication Technology Study and Revision Guide Secend Edition2 Input and output devices
‘abed sup Ado2ojoud 01 e697)
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 aItis illegal to photocopy this page
Storage devices and media
Key objectives
The objectives of this chapter are to revise:
= magnetic (hard disk drive and magnetic tape drivel
= optical (CD, DVD and Blu-ray read/write devices)
= solid state [solid-state drive, pen drive and flash drive)
= magnetic media [magnetic disks and magnetic tape)
= optical (CD, DVD and Blu-ray discs)
= solid state fincluding SD, XO and CFast cards)
Secondary storage includes all non-volatile storage devices that are not
part of primary memory. The storage capacity of these devices is much
larger than RAM or ROM (primary memory), but data access time is much
longer. Operating systems, applications, photos, device drivers and other
files/data are all stored on these secondary storage devices. There are
three types of technology used by secondary storage devices:
© magnetic © optical © solid state
3.1 Magnetic media and magnetic
storage devices
itagnetic media rely onthe property that certain materials have magnetic
properties (such as iron oxide) and these properties can be used to store
data (1s and 0s). Magnetic media are a type of permanent storage unless
they are overwritten or deleted by the system or the user.
‘Two common magnetic devices are the magnetic tape drive and the hard
disk drive (400).
3.1.1 Magnetic tape drives
Magnetic tape drives consist of reels of plastic tape coated in a magnetic
oxide layer (e.g. iron oxide). The data stored, the 1s and 0s, have different
magnetic signatures, which allow a read/write head to read and write
data. The tape moves over the read/write head; this is basically a tiny,
‘induced magnet that can magnetise the tape (to write data) or become
‘excited’ when magnetised tape passes over it (to read data).
Magnetic tapes have huge storage capacity, but data access time is very
slow since the tape must fast forward or backward until the required data
is found. The uses of magnetic tapes include:
«in batch processing (e.g. production of utility bills and wage stips in
large numbers overnight)
‘© as backups of data for long-term storage/archiving (magnetic tape is
‘very stable over a long period of time)
«© for daly backups in companies that handle large amounts of data (e.g.
updating customer's bank accounts).
Itis important to
remember that sto
‘medium refers to the
physical device on which
the data is actually
stored (e.g. a CD) anda
storage device refers
to the hardware used to
read data from or write
data to the medium le.
CD reader/writer).
Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition3 Storage devices and media
The following table shows some of the advantages and disadvantages of
magnetic tap
Advantag Disadvant time it takes to find data;
‘© Loss expensive (per bytel than hard | @ Have o very slow data access time data transfer rate is the
tisk drives or solid-state drives @ Updating data requires anew tape | timeit takes to transfer
© Avery robust technology tobe produced: itis not possible to | data from a device to
© Vast storage capacity simply write over the original data- | the computer [and vice
‘Very good data transfer rate this introduces errors and is a stow versal.
process
(© They are affected by magnetic fields
3.1.2 Hard disk drives
Hard disk drives (HDDs) are one of the most common methods to store
data on a computer. Data is stored on disk surfaces (called platters)
that are coated in a magnetic material. The platters can be made from
aluminium, glass or ceramic coated in iron oxide, and a typical disk drive
has several platters. Read/write heads (containing tiny magnets) hover
close to each disk surface on an air cushion to allow data to be written
or read.
[Actuators are used to move the read/write heads, which move back and
forth across the disk surfaces as the disks spin very fast. There are two
read/write heads per platter (one for each surface). Data is stored in
concentric circles (called tracks); these are broken up into sectors. These
sectors are mapped using a file allocation table (FAT) that shows which
sectors are free and which contain data.
Magnetic disk drives suffer from latency (the time taken for a specific
block of data on a track to rotate round to the read/write head).
The uses of HDDs include:
‘© to store operating systems, systems software, apps and data (such as
photos and music)
‘© as website servers and file servers on networks used in real-time
systems (such as airline bookings or booking cinema/theatre tickets).
The following table shows some of the advantages and disadvantages of
HDs:
ages vis:
Very fast data transter rates | @ Havea slow data access time and suffer
Verylarge storage capacities _fromlatency
‘ried and trusted technology, | @ ‘Fairly easly damaged
which makes them suitable for | @ Have many maving parts that can wear
website and eloud sorvers ‘ut and fail leading te data lose
© They are affected by magnetic fields
{© They tend to be fairly noisy due to high-
speed spinning disks.
3.1.3 Portable hard disk drives
Portable hard disk drives work in the same way as fixed HDD devices;
‘they have the same advantages and disadvantages. Their main use is
backing up data and to allow data to be transferred between computers.
‘bed sun AdoDovoud 01 166)
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 a3.2 Optical media and optical storage devices
3.2 Optical media and optical storage devices EE |
Optical media devices use lasers to read and write data onto plastic
(polycarbonate) disks. The media (disks) rely on the optical properties of
certain chemical dyes and metal alloys to enable the storage of 1 and 0s.
The most common types of optical storage devices include:
© CDs and DVDs
© Blu-ray discs.
3.2.1 CD and DVD optical disks
Ds and DVDs can be designated as ‘R’ (write once), ‘RW’ (read/write many
times) and ROM’ (read-only) All disks have a thin coating of alloy or ight
sensitive organic dye on at least one surface. Laser light alters the optical
properties when writing data. As the disk spins, an optical read/write head
moves to the start of the track and a narrow laser beam follows a spiral
track from the centre moving outwards.
CDs and DVDs are split up into sectors and allow for direct access to data.
The data is stored on the surface in pits (low points) and lands (high
points) - these pits and lands are created when laser light writes data to
‘the disk surface. Both CDs and DVDs use red lasers which read the pits and
lands and convert the stored data into a binary format. The wavelength
of the reflected laser light is slightly different to the original wavelength
(due to the pits and Lands) causing destructive interference - this allows
the pits and lands to be read.
DVDs have dual-layering (two polycarbonate disks are sandwiched
together), which increases their storage capacity (two recording surfaces,
are created),
The following table compares the uses, advantages and disadvantages of
the different types of CD and DVD.
| Uses @ Home recordings of @ Used to record TV @ Permanent storage for supply
muse (60-Rl and prograrmescrerand |” cfeimputer games, mike aed
moves (V0-8 ae ee
Transl of data between [© Useain cosed-circut |e Supplying movies on ROM
computers televton(€¢T¥) format can prevent opyng
because the dats canbe
fevsed
| Backup fortes
Tarantsges [@ Cheaperthan RW dks [@_ Can go through Omron oee
Once burned and severatreod andwrte |” biadventage when esed for
finale. they become | operations roves games nd software
5 owe f@ Canusecdtterentrie | stop data beng overwniten
3 formatsaachtinethe | inerrer
a Gskiswritento, | © Lessespensive than HDD
z fe NelesvostetitesR |e) efsers
=| | format |
| | Disadvantages © Can only record on © Relatively expensive © Data transfer rate is slower
3 fanerroreccurs,thedsk | format than HOD or SSO
E hastobe decarded | @ Ie possblto © rent poste change data
: © NotattCO/OVD players acitentaly everwre
2 Canreed CD-Rand data
3] | DVO Rormats
i Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition3 Storage devices and media
3.2.2 Blu-ray discs
Blu-ray discs are an optical medium that use blue laser light. This
light has a shorter wavelength than red laser light, thus increasing
the storage capacity when compared to DVDs. They come with buitt-in
secure encryption systems that help to prevent piracy and copyright
infringements.
Blu-ray allows greater interactivity than DVDs, for example they allow the
user to create playlists, reorder programmes stored, access websites and
download subtitles/artwork, They have a much greater data transfer rate
than DVDs (at least four times faster), which means they are well-suited to
playback of High Definition (HD) or 4 K/8 K formats. The storage capacity
‘is at least five times that of the equivalent DVD.
The following table compares the uses and advantages and disadvantages
of Blu-ray discs.
Serre ences Pence
‘Storing high defintion/4 K/B | Very large storage capacity ‘Mare expensive than OVD formats:
eo Very fast data transfer ates Introduction of new DVDs using an HO format
Used as secondary storage has eroded some of the advantages of Blu=
‘Very good data access times
Have data encryption built-in for
security of data
‘oF for backing up data ray
Used in some camcorders
Comparison of CDs, DVDs and Blu-ray discs
ack pitch (stan
Peed a}
co. Red 780 am Single 1.2mm 1.60 um
polycarbonate layer
| DvD lduatlayer) | Red 60am Two 0.6 mm O4ym
polycarbonate layers
Blu-ray (single-layer) | Blue 205 am Single 1.2mm 0.30 pn
| polycarbonate layer
Blu-ray dual-layer) Blue 405 0m Two 0.8 mm 0.30 pm
polycarbonate layers
(Note: nm = 10° metres; jm = 10-* metres) (Note: Blu-ray can currently go up to six-layer
technology, but this fs outside the scope of this book.)
3.3 Solid-state media and solid-state storage
devices EE |
Solid-state technology does not rely on magnetic or optical properties.
They make use of the ability to control the movement of electrons
across transistors and have no moving parts. By controlling electron
movement, it is possible to create and read 1s and 0s in a massive grid
in a very tiny space. They are often referred to as flash memories or
flash drives.
Due to the technology used, solid-state devices do not suffer from latency,
unlike HDDs. SSDs are also non-volatile, rewritable storage media,
‘bed san Adosov0Ud 01166)
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 i3.3 Solid-state media and solid-state storage devices
3.3.1 Floating gate and control gate transistors
As they have no moving parts, solid-state devices can operate at speeds
much greater than HDDs or optical disk drives. However, they still operate
at speecs that ae slower than RAM.
SSDs make use of fioating gate transistors and control gate transistors
(the transistors use CMOS and NAND technology). Solid-state memories
make use of a grid; at each intersection of the arid there isa floating gate
transistor and a control gate transistor. When current reaches the control
gate, electrons flow to the floating gate creating a positive charge; by
applying exact voltages to the transistors, a pattern of 1s and Os can be
‘CMOS means
complementary metal
oxide semi-conductor
and NAND refers toa
created. type of logic gate.
contol gate
eecre
floating ote ‘ating Gsultion)
tunel onde coating econ source
(atowselecrors substrate
‘rough
After 12 months or so, this charge can leak away, therefore solid-state
devices should be used once a year (at least) to ensure they retain their
memory contents.
3.3.2 Solid-state drives
Solid-state technology is used to create secondary storage devices known
as solid-state drives (SSDs). The following table summarises the uses,
advantages and disadvantages of SSDs:
antages of solid-state drives Ceres
© SSOshavelargely | @ Nomoving parts ~ loss likely to '@ $$ endurance/longevity is stillan
replaced HDDsasthe malfunction than HDDS ‘issue (but this situation continues to
main type of backing Much lighter in weight improvel
storage Don't need to get up to speed’ before | @ The memory chipsin SSDs havea
© Used in laptops and read/write operations Limited number of write cycles ~ this
tablets where their @ Have very low power consumption and can lead to unrecoverable dats loss
‘smal size makes them sogenerate much less heat than HDDs @ Ifthe controller chip, memory cache
verysuitableas the @ Very thin since they only contain tiny ‘or one of the NAND memory chips
main storage transistors ‘are damaged, it may be impossible
(© Very fast data transter speeds [about torecover the date
100 times faster than HDDs] (© They are more expensive te buy [per
(© Don't suffer from latency since there are | GB) than HDDs,
no moving parts © Although data access is very fast,
© Allow for permanent deletion of data the rewriting of data can be slower
lwhen writing over or deleting dataon |_ than HDDs as SSDs need to delete
‘SSDs, the old datais destroyed unlike | old datafrst before writing the new.
in HDDs where the data can stil be data
recovered) this isa very important
‘end-of-life’ security consideration
3.3.3 Pen drives
Pen drives (memory sticks) are small solid-state storage devices that
connect to a computer via a USB port. They are another example of @
flash drive/memory. They are known as pen drives or memory sticks. The
following table compares the uses and advantages and disadvantages of
pen drives.
legal to photocopy this page
a Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second EditionStorage devices and media
© Back upfiles/data such @ Verycompact and portable storage | @ Longevity still an issue [but this
{3s photos and music device (e.g. can be kept on a key ring) situation continues to improvel
(© Transportfiles/data___@ Veryrabust device Ino moving parts] | @ Itisnt possible to write-protect
between computers @ Don't need additional software towork | data: care must be taken not to
© Asecurity device(eg. © Not affected by magnatc fields ‘overwrite data accidentally
‘containing essentia les @ Plug straight into a USB port © Easyto lose due to small size
tomakesoftware work] © Dont need much current to operate @ Care needed when removing
“called. dongle’ when @ Allow for permanent deletion of data device from computer follow the
Used in this way Very good data transfer rates correct removal procedure or data
© When battery-powered, corruption or data loss can occur]
'$80s can be used as © the device internals become
(MP3) damaged, it may be impossible to
recover lost data
3.3.4 Memory cards
Memory cards use solid-state technology. There are three common types:
‘© SD cards (Secure Digital card) very small, used primarily where high
capacity is needed (e.g. digital video recorders/cameras, smartphones,
tablets and drones).
XD cards (eXtreme Digital card): a type of removable memory card
designed for use in digital cameras.
Fast card (Compact Fast card): 2 memory card used in very small
devices (e.g. used as a removable memory in high-end digital cameras).
re
ons
'© Store photos on digital | @ Very compact - can be used in Expensive per GB comparad to HODs
‘cameras smal portable devices (such asa | @ Much lower storage than other types of
© Inmobite phones to camera) portable storage device
‘extend memory © Nomoving parts: very durable @ Havea finite number af read/write
© InMP3 playersto store @ Makes iteasy to transfer photos cycles
music between devices (© Easy to lose or be stolen due to small
© Abacking store inhand-@ Relatively large memory capacities | size
held devices (© Not all computers/devices have
memory card readers
3.4 The future of storage devices
Flash memory is fast becoming the most common device for storage and
for transferring data between devices. However, these days, data/files are
now stored on remote cloud servers. Music and movies are often streamed
straight from the internet, thus there is no need to store the music or
movies on a computer. Many televisions are now smart televisfons and
programmes can be streamed on demand, meaning OVD and Blu-ray
players are no longer needed.
Sample questions and responses
‘a) Name three types of media used in secondary storage
devices. [3 marks]
b) A current secondary storage medium has enabled the development of
items such as smartphones, tablets and very thin laptop computers.
4) Name this medium.
‘i) Explain why this medium has allowed development of
smartphones, tablets and thin laptop computers.
‘abed sup Adosoj0ud 0
[4 marks}
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 illegal to photocopy this page
3.4 The future of storage devices
Sample high-level answer
8) magnetic (doks and tape), optical (CDIDVD/Bluay) and sold state,
9) solid-state
|i) solid-state devices have the following features:
they are very thin
have low power consumption and run very cool
= they arelightneight
= they have no moving parts and are very rélable
= they havea very fast data transfer rate
~ datacanbe permanently deleted.
Allofthe above features alow for smaller and smaller devices tobe
developed, sine they don't take up much space and allow more component's
tobe crammed into small paces,
In (bl four marks are
awarded for naming the
‘medium; this means no
real details required
‘and you can be as brief
as possible. However,
part (bli) requires an
explanation, so you
need to mention the
advantages and features
of the technology that
allowed it to be used in
the development of the
named devices in the
Sample low-level answer
2) Hard disk dre (HDD). CD/DVD writerreaderandsold-state deve (660).
» 9 990
i) low power concumption big capacity and low might
question.
Teacher's comments
‘The First answer shows a clear understanding of the difference between
‘medium and device and has given more than enough in part (b)ii) to gain
‘maximum marks.
‘The second answer gets no marks since they have confused medium with
device in all cases - very unfortunate since they obviously knew the
technologies. It highlights the importance of reading the question carefully
and making sure you answer the question accurately. Part (b)(}) again names
a device and not the medium. But some leeway could be exercised in part
()() since they obviously knew the question referred to solid state ~ two
marks are possible (‘big capacity’ i just too vague to be worth any marks).
Beek eke hes
11 Tick (V1 whether the following devices use magnetic, optical or soli
state technology:
c al Solid
Blu-ray reader/writer player
Portable hard disk dr
Flash drive I
Fast card [
DVD-RW drive [
Pen drive | al a
2 a Blu-ray and DVD are two types of disk that use optical
technology.
| Describe three differences between Blu-ray and DVD. [3].
ii Give one application that uses Blu-ray and one application
that uses DVD-RW. a1
b Hard disk drives (HDDs| and solid-state drives [SSDs] are
used in many computers.
I Describe three differences between HDDs and SSDs. ta
li Explain why SSDs are gradually leading to the phasing
out of HDDs. (1
a Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition3 Storage devices and media
3 Indicate whether the following ten statements are True or False by
placing a tick (71 in the appropriate box.
— True) Fal
‘550s suffer from high latency due tothe time it
takes for disks to spin round to the read/write head
[Blu-ray discs only allow data to be read
Platters in an HOD can be recorded on both the
bottom and top surfaces
‘The data transfer rate isthe time i takes to locate
data on an HOD
Both DVDs and Blu-ray dises use dual-layer
technology
SSDs have @ shorter working life than the
equivalent HODs
(One advantage of flash drives is that old data can
be permanently deleted
CD-RW can act as a ROM
Solid-state drives have many complex moving
_parts that makes them wear out quickly
Blu-ray dics use laser light mith a shorter
wavelength than DVDs tol
4 Complete the following sentences by writing the correct missing
term or phrase.
a Solid-state devices use a anda. at
the intersection ofa grid of transistors; by applying an exact,
‘pattern of... can be created 16)
b Blu-ray discs use ight toread and write data:
both DVDs and Blu-ray discs Use... toincrease
their storage capacity... have built-in secure
‘encryption (31
¢ Hard disk drives contain a number of which can be
made from each disk surface has a.
head that floats on a cushion of air; HODs suffer from
due to the relatively long time it takes data to be
read waiting for the disk to rotate round to the read/write head. [4]
5 Explain why optical disks are slowly being phased out. In your
answer, give a justification for each statement you make and
indicate why they are being phased out ta
6 Astudent was looking at a laptop made in 2012 and was
‘comparing it to one made in 2022. They noticed the 2012 laptop.
was much thicker and heavier than the 2022 model. They also
noticed that the 2012 model had a DVD/CD player/writer ina side
drawer, a touchpad and four USB connectors. However, the 2022
‘model had only one USB-C connector. no touchpad and no external
devices, such as a DVO reader/writer.
Explain the advances in technology between the 2012 laptop and
the 2022 laptop (51
‘abed sup Adoaoj0ud 01
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 aNetworks and the effects of
using them
Key objectives
The objectives ofthis chapter are to revise:
fe networks
rN rauters
= common network devices: network interface cards, hubs, switches, bridges
= WiFi and Bluetooth
= cloud computing
= intranets, extranets and the internet
= networks, wireless local area networks and wide area networks
ties and communication
security [including passwords and authentication)
-malware
= electronic conferencing,
4.1 Networks EE |
4.1.1 Common network devices and terms
Network interface card
‘Anetwork interface card (NIC) allows a device to connect to a network,
such as the internet. It is usually part of the internal motherboard, but
they can also be wireless (WNICs) and use an antenna to communicate
with a network using microwaves (NICs can either plug into a USB port
or be installed internaly). Each NIC is given a unique hard-wired media
access control address.
Media access control address
‘The media access control (MAC) address is a hexadecimal number that
uniquely identifies a device. MAC addresses use 48 bits made up of six
groups of hexadecimal digits:
NN = NN ~ NN bb - DD - DD
Manufacturer's code Device serial number
For example: 00 ~ 1 ~ B3 - 4F ~ 25 ~ FF is the MAC address of an Apple”
device. MAC addresses are useful in identifying network faults since they
uniquely identify each device connected to the network.
Internet Protocol address
‘Whenever a device connects to the internet, it is given an Internet
Protocol (IP) address supplied by Internet Service Provider. This will
change each time a user connects (website servers keep the same IP value
since they dor't log off the network and are always connected).
Protocols are necessary since they define the rules agreed by senders
‘and receivers of data when communicating over the internet. There are
presently two type of IP address:
‘© IPvé: this is based on 32 bits and is written as four groups of 8 bits
(G2 bits), for example: 254.25.28.77
Itis illegal to photocopy this page
i Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition4 Networks and the effects of using them
‘© IPV6: since IPv4 no longer offers sufficient unique addresses on the
internet as it continues to expand, IPv6 is now being adopted; this
uses 128 bits written as eight groups of four hexadecimal digits, for
example:
|ASFB:7A88:FFFO:OFFF:3021:2085:66FB:FOFA
Data packets
Data moved round networks is split up into data packets; each data packet
travels from ‘A’ to ‘8’ independently. The data packet has a header and a
trailer. The trailer indicates the end of the data packet and also contains
an error-checking mechanism.
The header contains the following items:
© sender's IP address
© receiver's IP address
‘© sequence number (so packets can be reassembled in the correct order)
© packet size (number of bytes)
‘© number of packets in the whole message.
‘When a router receives a data packet, it checks the recipient IP address
against a routing table and determines the next stage in its journey. The
sequence numbers allow the data packets to be reassembled in the correct
order at the destination address.
Hubs:
Hubs are hardware devices usually found in local area networks (LANS).
They deliver all data packets received by a network to all devices on
the network. This causes unnecessary traffic on the network reducing
bandwidth,
This is not secure, as
every device is receiving
every data packet.
Switches.
‘Switches are ‘intelligent’ hubs. They deliver each data packet to a specific
device on a network (switches contain MAC addresses of all devices on
a network). None of the other devices will see the data packet, thus
reducing traffic and improving security.
The following table summarises the features of hubs and switches:
'@ Usod to exchange data packets
within their own LANS
© Used to.connect devices ina
network together
(© Can't exchange data ith external
networks.
‘Switches send data packets toa
‘specific device onthe network
© Security using switches is bettor
‘than in hubs.
(© Switches use MAC addresses to
locate devices on the network
© Switches use a lock-up table to
find the MAC address ofthe device
intended to receive the data packet
Used to exchange data packets
within their own LANS.
1© Used to connect devices ina
network together
© Can't exchange data with external
pnotworks.
Hubs send data packets to every
device connected to the network
‘bed sun AdoDovoud 01 166)
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 a4.1 Networks
Bridges
Bridges are used to connect a LAN to another LAN that uses the same
protocol. They allow separate LANs to be joined to form a single LAN.
Bridges cannot communicate with external networks.
4.1.2 Routers
Routers are used to route data packets from one network to another
network using IP addresses. Routers are used to join a LAN to the internet
or to other external networks:
When a data packet is received, the router inspects the IP address of
the recipient and determines whether the data packet is intended for
its own network or for another network; if the IP address indicates
another network, the data packet is sent to the next router.
Routers use a routing table that contains information about the router's
immediate network and information about routers in the immediate
vicinity. This allows routers to establish how to deal with each data packet.
Routers don't store MAC addresses; only IP addresses are stored so it knows
where to send the data packet in the next stage of its journey. Many modern
broadband routers combine the function of a router and a switch,
The following table compares the function of routers and bridges:
com Bridge
‘The main objective ofa router isto
connect various types of network Ae aan obiective ala brigoelet
connect LANs tegether
together
Routers scan adevice's IP address __| Bridges scan a device's MAC address
Data is sent out using data packets | Data is sent out using data packets
‘Connected networks willuse different | Connects networks together that use
protocols the same protocols
‘A routing table is used todirect data Bridges don't make use of routing
packets tothe correct device tables
‘Aroutor has more than two ports __ A bridge has only two ports
4.1.3 WiFi and Bluetooth
WiFi and Bluetooth both allow wireless communications between devices.
The following table compares WiFi and Bluetooth:
WiFi Bluetooth
(@ WiFisendsand receives radio | © Bluetooth uses rado waves in a band of 79 frequencies known as
waves in many frequency bands channels}
@ Bestsuitedto operating full-scale | © Used when transferring data between two or more devices in close
=] | networks becouseitotfers much proximity, where speed of transmission is notimportat e.g. sending
z faster data transfer rates, better music to Bluetooth headphones)
=| | rangeandbettersecuritythan | @ Whena device wants to communicate it picks one of the 79 channels at
2| | tueteoth random
E| |e WiFimakes use ofwireless access |@ ta channel is already in use, another one is chosen
3] |” points (aPst~also known as Maximum elective range i 30m
2 | | hotspots Toinerease security, devices constantly change channels epread-
2 |e Maximumettectve ranges 100m spectrum frequency hopping)
| | wiFican connect manydevices toa | @ Can only allow upt seven devices tbe connected at once
| |” network atthe same time Makes use of key matching encryption [devices are pared and 3
B|_ |e Uses Wireless Equivalent Privacy | temporary key used to encrypt data, Once encrypted a long-term key
| |* (weplana WiFi Protected Access replaces the tomporary key and the connection is encrypted forms 9
(weal secure wireless personal area network - WPAN)
*] Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition4.1.4 Cloud computing
4 Networks and the effects of using them
Cloud storage is a method of data storage using physical remote servers.
The data is Frequently stored on more than one server in case maintenance/
repairs need to be carried out (this is called data redundancy).
There are three common types of cloud storage:
.
provider are different companies/entities
.
client and cloud storage provider act as a single entity.
.
Private cloud: storage provided by dedicated servers behind a
Public cloud: a storage environment where the client and cloud storage
eval;
Hybrid cloud: a combination of public and private clouds; sensitive data
is stored on a private cloud and other data is stored on a public cloud.
The following table compares the advantages and disadvantages of using
cloud storage.
'© Client files stored in the cloud can be accessed atary@
time, from any device, anywhere in the world, provided
internet access is available
‘There is no need for acustomer/client to carry an external
‘storage device with them, or even use the same computer,
to store and retrieve information
‘The claud provides the user with remate backup of data to
alleviate data loss/disaster recovery
la customer/lient has a failure of their harddisk or backup
device, cloud storage wil allow recovery oftheir data
‘The cloud system offers almost unlimited storage capacity fat
price!
‘Security aspects of storing datain the cloud (see
below tab!
Ifthe customer/cient has a slow or unstable
internet connection, they could have problems
accessing or downloading their data/files
Costs can be high a large storage capacity
is required: also high download/upload data
transfer limits with the customer/lient internet
Service Provider can be expensive
Potential failure ofthe cloud storage company is
always possible this posesa risk of loss of all
backup data
‘There are issues regarding cloud security and data loss. A user needs to ask:
‘© What physical security exists in the building housing the servers?
‘© How well protected are the servers against natural disasters or power cuts?
‘© How secure is the data with regards to personnel who work for the
cloud provider?
There have been cases of data loss through hacking (these breaches
‘include the leaking of Facebook accounts in 2019 and Capital One bank had
80000 banks accounts hacked in 2019)
4.1.5 Common network environments:
Refer to Chapter 10, p.117 regarding extranets, intranets and the internet.
4.1.6 Network types
There are three comman types of network:
4 local area network
© wireless local area network
‘© wide area network
Local area network
‘When using local area networks (LANs), connected devices
geographically close, for example in one building. The devices are
connected together using hubs or switches. One hub or switch is usually
connected to a router to connect the LAN to external networks, like the
internet.
are usually
‘bed sun AdoDovoud 01 166)
Hodder & Stoughton Limited © David Watson and Graham Brown 2022 a4.1 Networks
The following table highlights the advantages and disadvantages of
networking computers and devices (such as printers) in the form of a LAN:
EETeOr
© Thessharing ofresources, suchas @ Easier spread of viruses throughout
‘expensive peripherals fe.9.acolour | the whole network
laser printer] and applications @ Queues can form for shared
software resources (such asa printer, which
'© Better communication between canbe frustrating
users of the LAN (© Slower access to external
(© Anetwork administrator can control networks, such asthe internet
‘and monitor all aspects of the @ Increased security risk when
network (2.9. changing passwords, compared to stand-alone
monitoring internet use and so.enl computers
(© tthe main server breaks down, in
many types of network structures,
the network will no longer function
properly
Wireless local area networks
Wireless LANs (WLANs) are very similar to LANs, but they don’t use wires
and cables to connect devices together, they use WiFi. Devices, known as
access points, or hotspots, are connected using wires into a network at
fixed locations. Users or devices can then access the network wirelessly
at these access points. WLANs use spread-spectrum technology (with a
range of 30 m to 50 m) or infrared (range of less than 5 m).
The following table compares the relative advantages and disadvantages of
using wired and wireless networks:
Wireless networking Wired networking
This easier to expand the networks andit isn't Using cables produces a more reliable and stable network.
necessary to connect the devices using cables. This Wireless connectivity is often subjected to interference
‘ives devices increased mobility povided they are
within range of the wireless APS
No cabling so there isa safety improvement and | Having lots of wires can lead toa number of hazards such
increased flexibility 2s tripping hazards, overheating of connections [leading toa
potential fre risk] and disconnection of cables during reutine
office cleaning
‘Theres an increased chance of interference from | Setting up cabled networks tends to be cheaper overall in
external sources spite of the need to buy and install cables
Data is less secure than with wired systems. tis | Cabled networks lose the ability for devices to be mobile;
‘easier to intercept radio waves and microwaves must be close enough to allow for cable connections.
than cables, soit is essential to protect data
transmissions by using encryption
Data transmission rate is stl stower than for
cabled networks although it continues to improve
Itis possible fr signals tobe stopped by thick
walls (eg. in old houses) and there may be areas of
variable signal strength leading to “drop out
Data transfer rates tend tobe faster and there won't be any
‘dead spots’
Wide area networks
‘Wide area networks (WANs) cover a large area geographically, for example a
whole country or even larger. WANS are a number of LANs connected together
by a series of routers (e.g. the network of ATMs is a WAN as is the internet)
legal to photocopy this page
a Cambridge IGCSE Information and Communication Technology Study and Revision Guide Second Edition4 Networks and the effects of using them
Due to the large geographical distances, WANs make use of the public
communications infrastructure (e.g. telephone lines and satellites) but
sometimes use private dedicated lines if greater security is needed. The
typical distances that define the type of network are:
‘© WAN: 100 km to over 1000 km
‘© MAN: 1 km to 100 km
'AMAN is a metropolitan
area network; this is
rot in the syllabus but
is included here for
completeness,
Sample questions and responses Ey |
4) Describe the differences between hubs and switches when
used on a LAN. [3 marks}
b) Describe the differences between routers and bridges. [3 marks} _ | Both these questions
re ‘describe" so iti
necessary to includi
features of hubs,
switches, routers and
bridges. An unbalanced
answer will inevitably
lose many of the
available marks.
Sample high-level answer
4) First ofall there are a numberof similarities between hubs and switches:
© they both alow the exchange of data within their own LANS
© nolther dovice can communicate or exchange data with an external network
(© they are both used to connect devices together to forma LAN,
‘Themain differences canbe summarised as follows:
© switches send data packets toa specific device on the network
© secunty using witches is better than security using hubs
(© switches use MAC addresces tolocate devices on the network
(© switches use alookup table tofind the MAC address of the device
intended to receive the data packet:
(© hubs send data packets to every device connected to the network
8) Themain features oF routers include:
(© themain bjective ofarouter is to connect various types of network together
© routers use data packets to send out data across networks
(© routersallow networks with different: protocols to understand data and
‘communications
(© they usea routing table to direct data packets to the correct network and
hence device.
‘The main features of bridges include
© bridges connect LAN using the same protocole together
(© they use MAC addresses to identify devices on the comected networks
(© data ls sent-to devices on the connected networks and outside using data
packer structures
(© unlike routers, they dorituse routing tables.
‘The above features indicate a numberof similarities and cfferences between
‘the four devices named in the question.
‘Sample low-level answer
2) Hubs and sutches are used innetworks to senddata around the network.
Hubs are usedn LAN and svches ar sed in WLANs whch schema