IGCSE ICT (0417) – Complete Syllabus Notes
Objective
Provide a concise, exam‑focused reference for all core areas of the Cambridge IGCSE ICT syllabus, with a special emphasis on scanning data/software when downloading . The notes cover hardware, storage, networks, ICT applications, the systems life‑cycle, safety & security, communication, file management, graphics, documents, databases, spreadsheets and presentations.
1. Types of ICT Systems & Core Components
1.1. Main Hardware Elements
CPU (Central Processing Unit) – “brain” of the computer; executes instructions.
RAM (Random‑Access Memory) – volatile memory used for temporary data while programmes run.
ROM / Firmware – non‑volatile memory that stores permanent instructions (e.g., BIOS).
Motherboard – connects CPU, RAM, storage and peripheral devices.
Input devices – keyboard, mouse, scanner, microphone, touch screen.
Output devices – monitor, printer, speakers, projector.
Storage devices (see Section 2).
Micro‑processor‑controlled devices – calculators, digital watches, traffic lights, household appliances.
1.2. Health & Safety (Physical & E‑Safety)
Aspect Key Points
Physical safety
Electrical shock, fire risk, cable management, proper ventilation, use of UPS.
Ergonomics
Adjust chair/desk height, keep monitor at eye level, take regular breaks to avoid RSI.
E‑safety
Strong passwords, MFA, safe browsing, recognise phishing, avoid sharing personal data online.
2. Storage Devices & Data Management
2.1. Types of Storage
Device Technology Typical Use
Magnetic hard‑disk (HDD) Spinning platters, magnetic heads Primary PC storage, large capacity.
Solid‑state drive (SSD) Flash memory (NAND) Fast OS & application storage.
Optical disc (CD/DVD/Blu‑ray) Laser‑read/write Software distribution, archival.
USB flash drive / External HDD Flash or magnetic Portable data transfer, backup.
Network‑attached storage (NAS) Dedicated file server on a LAN Shared files, automated backups.
2.2. Data Integrity Tools
Checksums – MD5, SHA‑1, SHA‑256 (verify file has not been altered).
Digital signatures – cryptographic verification of publisher identity.
Backup strategies – 3‑2‑1 rule (3 copies, 2 media types, 1 off‑site).
3. Networks – Concepts, Types & Effects
3.1. What Is a Network?
A collection of devices linked together to share resources (files, printers, internet access, etc.).
3.2. Core Network Components
Router – directs traffic between different networks; provides NAT and DHCP.
Network Interface Card (NIC) – hardware that connects a device to a wired or wireless network.
Hub – repeats incoming signals to all ports; no intelligence, can cause collisions.
Bridge – connects two LAN segments; forwards frames based on MAC addresses.
Switch – learns MAC addresses and forwards frames only to the intended port.
Access point (AP) – provides Wi‑Fi connectivity for wireless devices.
Firewall – hardware or software that filters traffic according to rules.
3.3. Network Types
Network Typical Coverage Common Uses
LAN (Local Area Network) Single building or campus File sharing, printers, intranet.
WLAN (Wireless LAN) Same area as LAN but using Wi‑Fi Mobile devices, guest internet.
MAN (Metropolitan Area Network) City‑wide University campuses, municipal services.
WAN (Wide Area Network) Geographically dispersed sites Corporate branches, Internet backbone.
PAN (Personal Area Network) Few metres (Bluetooth, IR) Wearables, headphones.
Internet Global public network Web browsing, email, cloud services.
Intranet Private LAN/WAN Internal communications, document repositories.
Extranet Secure extension of an intranet Supplier portals, partner collaboration.
Cloud Computing Internet‑based services Online storage, SaaS applications.
3.4. Effects of Using Networks
Advantages: resource sharing, cost saving, collaboration, remote access.
Disadvantages: security risks, dependence on connectivity, possible congestion.
3.5. Network Security Controls (Quick Reference)
Control Purpose Typical Example
Firewall Filters traffic based on rules Router‑built firewall, Windows Defender Firewall.
Encryption (SSL/TLS, VPN) Protects data in transit HTTPS websites, corporate VPN.
Authentication (Passwords, MFA) Verifies user identity OTP via authenticator app.
Antivirus/Anti‑malware Detects and removes malicious code Windows Defender, Malwarebytes.
Physical security Prevents unauthorised hardware access Locked server rooms, CCTV.
4. Scanning Data / Software When Downloading
4.1. Why Scanning Is Required
Prevents viruses, worms, Trojans, ransomware and other malicious code from executing.
Stops the spread of malware to other devices on the same network.
Ensures the integrity of the downloaded file – the file received matches the publisher’s original.
Helps organisations meet security policies and data‑protection regulations.
4.2. Common Threats Encountered When Downloading
Viruses – self‑replicating programs that corrupt or delete data.
Worms – spread automatically across networks without user interaction.
Trojan horses – appear legitimate but hide malicious functions.
Adware / Spyware – display unwanted ads or collect personal information.
Ransomware – encrypts files and demands payment for decryption.
Rootkits & Backdoors – provide hidden remote access.
4.3. Scanning Process – Step‑by‑Step
Start the download from a trusted source (official website, reputable app store).
Save the file to a temporary folder (e.g., “Downloads‑Temp”).
Open your antivirus/anti‑malware programme.
Select “Scan file” or “Scan folder” and point to the temporary location.
Review the results:
If clean – move the file to its final folder.
If a threat is detected – delete or quarantine the file and report the incident.
Update the virus‑definition database:
Automatic updates – run in the background.
Manual update – click “Check for updates” before a critical download.
Optional – verify checksum or digital signature (see 4.4).
Optional – open the file in a sandbox/virtual machine first, especially for unknown software.
4.4. Verifying Checksums & Digital Signatures
Publisher may provide an MD5, SHA‑1 or SHA‑256 hash. Use a hash‑checking tool (e.g., certutil on Windows) to compare.
Digital signatures use public‑key cryptography; Windows Explorer and macOS show a “Signed by …” status.
4.5. Tools Frequently Used for Scanning
Tool Type Key Features
Windows Defender Built‑in antivirus Real‑time protection, cloud‑based updates, integration with File Explorer.
Malwarebytes Anti‑malware Specialises in adware, spyware, PUPs; on‑demand scanning.
ClamAV Open‑source scanner Command‑line, suitable for servers and automated scripts.
AVG / Avast Third‑party antivirus Web shield, email scanning, scheduled scans.
Bitdefender, Kaspersky, Norton Commercial suites Multi‑layer protection, ransomware‑specific modules.
4.6. Best Practices for Safe Downloading
Only download from the vendor’s official website or reputable app stores.
Check the URL – look for “https://” and a padlock icon.
Verify digital signatures or checksums when provided.
Keep the operating system and all security software up to date.
Enable real‑time scanning and automatic definition updates.
Educate users about phishing emails and deceptive download links.
Use a sandbox or virtual machine for testing unknown files before installing them on the main system.
Maintain regular backups; ransomware cannot encrypt files that are offline.
4.7. Real‑World Example
In May 2023 the “LockBit 3.0” ransomware outbreak infected thousands of organisations worldwide. Many victims had not scanned newly‑downloaded email attachments, allowing the malicious executable to run, encrypt critical data and demand payments of up to €500 000. The incident illustrates how a single un‑scanned file can cripple an entire network and underlines the importance of regular scanning, up‑to‑date definitions and robust backup strategies.
4.8. Summary Table – Quick Reference
Action When to Perform Result Expected
Check source credibility Before initiating any download Reduced risk of malicious files.
Run a scan on the downloaded file Immediately after download, before opening Detection and removal of threats.
Verify checksum / digital signature When publisher provides one Assurance that the file has not been altered.
Update virus definitions Daily (automatic) or on‑demand (manual) Protection against the latest malware.
Apply network security controls Continuously, as part of policy Enhanced protection of data in transit and at rest.
5. ICT Applications (Key Areas)
5.1. Communication
Email – structure (To, CC, BCC, Subject, Body), attachments, netiquette, spam filtering.
Instant messaging & chat – real‑time text, presence status, file sharing.
Video conferencing – Zoom, Teams, Google Meet; use of passwords, waiting rooms, end‑to‑end encryption.
5.2. Modelling Applications
Spreadsheets for financial, scientific or statistical modelling (e.g., budgeting, weather forecasts).
Simulation software for engineering or business processes.
5.3. School / Booking Systems
Timetable management, online registration, library catalogues.
Room‑booking platforms that prevent double‑booking and send confirmation emails.
5.4. Banking & Financial Systems
Online banking, ATM networks, electronic funds transfer (EFT), mobile payment apps.
Security features – PIN, chip‑and‑PIN, two‑factor authentication.
5.5. Expert Systems
Rule‑based programmes that mimic human decision‑making (e.g., medical diagnosis, troubleshooting wizards).
5.6. Retail & E‑Commerce Systems
Point‑of‑sale (POS) terminals, EFTPOS, online shopping carts, inventory management.
5.7. Recognition Technologies
OCR (Optical Character Recognition) – converts scanned text to editable format.
RFID – automatic identification of items via radio waves.
Biometrics – fingerprint, facial recognition, iris scan for authentication.
5.8. Satellite, GPS & GIS
Satellite communication – TV broadcasting, weather data.
GPS – location services for navigation, fleet tracking.
GIS (Geographic Information Systems) – mapping, spatial analysis.
6. Systems Development Life‑Cycle (SDLC)
6.1. Stages
Analysis – identify user needs, define requirements, produce a feasibility study.
Design – create data flow diagrams, flowcharts, UI mock‑ups, decide on hardware/software specifications.
Development & Testing – write code or configure software, perform unit testing, integration testing, user‑acceptance testing.
Implementation – install the system, migrate data, train users, go‑live.
Documentation – user manuals, technical guides, maintenance procedures.
Evaluation – review performance against objectives, collect feedback, plan future enhancements.
6.2. Artefacts & Tools
Flowcharts & pseudocode – algorithm design.
Data flow diagrams (DFD) – visualise information movement.
Test plans – list of test cases, expected results.
Version control – Git, Subversion for tracking changes.
7. Safety & Security – Full Taxonomy
7.1. Physical Safety
Electrical hazards – unplug devices before cleaning, use surge protectors.
Fire safety – keep flammable materials away from equipment, know evacuation routes.
Ergonomic hazards – proper posture, adjustable chairs, monitor height.
7.2. E‑Safety (Online Behaviour)
Cyberbullying – recognise, report, block.
Phishing, pharming, smishing, vishing – deceptive attempts to obtain personal data.
Social engineering – manipulation to bypass security controls.
Safe browsing – use HTTPS, avoid unknown links, enable pop‑up blockers.
7.3. Data Protection Principles (GDPR‑style)
Lawfulness, fairness, transparency
Purpose limitation
Data minimisation
Accuracy
Storage limitation
Integrity & confidentiality (security)
Accountability
7.4. Threat Taxonomy
Category Examples
Malware Viruses, worms, Trojans, ransomware, spyware, adware, rootkits.
Social Engineering Phishing, vishing, smishing, pharming, pretexting.
Network Attacks Denial‑of‑service (DoS), man‑in‑the‑middle, packet sniffing.
Physical Theft / Loss Stolen laptops, lost USB drives.
Card & Payment Fraud Skimming, duplicate cards, online card‑not‑present fraud.
8. Audience & Copyright
8.1. Understanding the Audience
Identify who will use the system (students, teachers, customers, managers).
Tailor language, layout and functionality to their needs and skill levels.
8.2. Copyright & Licensing
Copyright protects original software, images, text, music.
Common licences – Proprietary, Freeware, Shareware, Open‑source (GPL, MIT).
Software piracy – illegal copying/distribution; schools must use properly licensed software.
Creative Commons – allows sharing under defined conditions.
9. Communication & Internet Fundamentals
9.1. Email Essentials
Structure – To:, Cc:, Bcc:, Subject:, body.
Netiquette – clear subject, polite tone, appropriate signature.
Attachments – keep size reasonable, scan for viruses, use cloud links for large files.
9.2. Internet Components & Protocols
Component / Protocol Purpose
ISP (Internet Service Provider) Provides access to the Internet.
URL (Uniform Resource Locator) Web address; includes protocol, domain, path.
HTTP / HTTPS Web page transfer; HTTPS adds SSL/TLS encryption.
FTP File Transfer Protocol – uploads/downloads files.
SMTP Simple Mail Transfer Protocol – sends email.
POP3 / IMAP Retrieve email from a server; IMAP syncs across devices.
SSL / TLS Encrypts data in transit; used by HTTPS, VPNs.
9.3. Evaluating Web Sources
Authority – Who is the author? Is the site reputable?
Accuracy – Are facts supported by evidence? Check dates.
Bias / Purpose – Is the information presented objectively?
Currency – When was the page last updated?
Relevance – Does it meet the research need?
10. File Management
10.1. Organising Files
Use a hierarchical folder structure (e.g., Documents / Year / Subject).
Adopt consistent naming conventions: YYYYMMDD_ProjectName_Version.ext.
Include file extensions to indicate format (e.g., .docx, .xlsx, .pdf).
10.2. Compression & Archiving
ZIP, RAR, 7z – reduce file size for storage or email attachment.
Password‑protect archives for sensitive data.
10.3. Backup Strategies
Local backup – external HDD, NAS.
Cloud backup – OneDrive, Google Drive, Dropbox.
Follow the 3‑2‑1 rule (3 copies, 2 media types, 1 off‑site).
11. Images, Layout, Styles & Proofing
11.1. Image Basics
File formats: JPEG (photographs, lossy), PNG (transparent, lossless), GIF (animation, limited colours), SVG (vector).
Resolution – DPI (dots per inch) for print (300 dpi) vs. PPI for screens (72‑96 ppi).
Basic edits – resize, crop, rotate, adjust brightness/contrast.
11.2. Document Layout & Styles
Use headings, sub‑headings, bullet/numbered lists for structure.
Apply consistent paragraph styles (font, size, colour, spacing).
Headers/footers for page numbers, document title, date.
11.3. Proofing Techniques
Spell‑check & grammar tools.
Use “Track Changes” for collaborative editing.
Read aloud or print a hard copy to spot errors.
12. Graphs & Charts
12.1. Common Types
Bar chart – compare quantities across categories.
Column chart – similar to bar but vertical.
Line chart – show trends over time.
Pie chart – illustrate parts of a whole (max 5‑6 slices).
Scatter plot – display relationship between two variables.
12.2. Creating a Good Chart
Select appropriate chart type for the data.
Include clear axis titles, units and a descriptive legend.
Use contrasting colours; avoid 3‑D effects that distort perception.
Label data points if needed and add a concise title.
13. Document Production (Word Processing)
13.1. Core Features
Templates – pre‑designed layouts for letters, reports, flyers.
Mail merge – generate personalised letters or labels from a data source.
Tables – organise data; can be converted to charts.
Comments & reviewing – add feedback without altering original text.
Collaboration – cloud‑based real‑time editing (Google Docs, Office 365).
14. Databases
14.1. Fundamental Concepts
Table – collection of rows (records) and columns (fields).
Primary key – unique identifier for each record.
Foreign key – links tables together (relationships).
Query – retrieve or manipulate data (SQL SELECT, UPDATE, DELETE).
Form – user‑friendly data entry screen.
Report – formatted output for printing or sharing.
14.2. Relational Database Example
Students (StudentID PK, Name, DOB, ClassID FK)
Classes (ClassID PK, Subject, Teacher)
Query example: “Show all students in ‘Biology’” – uses a JOIN between Students and Classes.
14.3. Data Validation
Field rules – numeric only, date range, mandatory entry.
Drop‑down lists – restrict to predefined options.
Error messages – guide the user to correct input.
15. Spreadsheets
15.1. Core Elements
Cell – intersection of row and column (e.g., B3).
Formula – begins with “=”, can use arithmetic operators and functions.
Functions – SUM, AVERAGE, IF, VLOOKUP, COUNTIF, etc.
15.2. Useful Features
Charts – create bar, line, pie charts directly from data ranges.
Conditional formatting – highlight cells that meet criteria.
Data validation – restrict entry (list, whole number, date).
Pivot tables – summarise large data sets quickly.
What‑if analysis – Goal Seek, Scenario Manager.
15.3. Example Formula
=IF(C2 >= 50, "Pass", "Fail")
Returns “Pass” if the score in C2 is 50 or above, otherwise “Fail”.
16. Presentations
16.1. Design Principles
Keep slides uncluttered – one main idea per slide.
Use high‑contrast text/background; limit fonts to two types.
Incorporate relevant images, diagrams or short videos.
Apply consistent slide master for headings, footers and colour scheme.
16.2. Useful Features
Slide transitions – use sparingly for professional effect.
Animations – reveal bullet points sequentially.
Presenter notes – private cues for the speaker.
Embedded media – audio clips, screen recordings.
Export options – PDF for handouts, video for online sharing.
17. Summary – Quick Reference Tables
17.1. Network Security Controls (Condensed)
Control Key Benefit
Firewall Blocks unauthorised traffic.
Encryption (SSL/TLS, VPN) Protects data in transit.
MFA Reduces risk of password theft.
Antivirus Detects and removes malware.
Physical locks & CCTV Prevents
0 improvement suggestions
Log in to suggest improvements to this note.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources ,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.
e-Consult
Secure online learning platform connecting students with expert Cambridge tutors across Kenya.
© 2025 e-Consult. All rights reserved.