ICT (0417) – Complete Syllabus Overview
1. Hardware – Core Components
- CPU (Central Processing Unit) – “brain” of the computer; carries out the fetch‑decode‑execute cycle.
- RAM (Random‑Access Memory) – volatile memory that holds data and programmes currently in use.
- ROM / BIOS – non‑volatile firmware that stores start‑up instructions.
- Primary storage – HDD, SSD, hybrid drives.
- Secondary / archival storage – magnetic tape, optical discs (CD‑R, DVD‑R, Blu‑ray), cloud backup.
- Input devices – keyboard, mouse, touch‑screen, scanner, microphone, digital camera, direct‑data‑entry devices (magnetic‑stripe reader, RFID reader, QR‑code scanner, OCR/OMR).
- Output devices – monitor, printer, speakers, plotter, projector, head‑mounted display.
1.1 Input & Output Devices – Advantages / Disadvantages
| Device | Advantages | Disadvantages |
|---|
| Keyboard | Fast text entry, tactile feedback, widely supported. | Requires learning layout; not suitable for graphic input. |
| Mouse / Touch‑pad | Precise pointer control, intuitive for GUIs. | Requires flat surface; less accurate for fine drawing. |
| Touch‑screen | Direct interaction, useful for tablets & kiosks. | Finger smudges, limited accuracy for small targets. |
| Scanner (flat‑bed / sheet‑fed) | Creates digital copies of paper, supports OCR. | Slow for large volumes, quality depends on resolution. |
| Microphone | Enables voice input, audio recording, speech‑to‑text. | Background noise can affect quality; privacy concerns. |
| Digital camera | Captures high‑resolution images, video. | Large file sizes; requires storage management. |
| Magnetic‑stripe / RFID reader | Fast, contactless data capture (e.g., cards, tags). | Limited data capacity; security risks if not encrypted. |
| QR‑code scanner | Quick access to URLs, product info, payments. | Requires camera quality; can be mis‑read in poor lighting. |
| OCR / OMR | Automates data entry from printed forms. | Accuracy drops with poor print quality or handwriting. |
2. Software – System vs. Application
- System software – manages hardware and provides a platform for other software.
- Operating Systems (OS): Windows, macOS, Linux, Android, iOS.
- Utility programmes: antivirus, disk‑defragmenter, backup tools.
- Application software – performs specific tasks for the user.
- Productivity: word processors, spreadsheets, presentation software.
- Communication: email clients, instant messengers, video‑conferencing.
- Specialist: database management systems, graphics editors, CAD, expert systems.
3. Emerging Technologies (as listed in the syllabus)
- Artificial Intelligence (AI) – machine learning, expert systems, natural‑language processing.
- Extended Reality (XR) – virtual reality (VR) and augmented reality (AR) applications.
- Internet of Things (IoT) – networked sensors and actuators (smart homes, wearables).
- Cloud Computing – on‑demand services (SaaS, PaaS, IaaS) and storage.
4. Networks – How Devices Communicate
4.1 Network Topologies
- Star – each node connects to a central hub/switch.
- Bus – all nodes share a single communication line.
- Ring – each node connects to two neighbours forming a closed loop.
- Mesh – multiple redundant paths between nodes (full or partial).
- Hybrid – combination of two or more basic topologies.
4.2 Network Categories
- LAN (Local Area Network) – limited to a building or campus.
- WLAN (Wireless LAN) – LAN using Wi‑Fi (IEEE 802.11).
- WAN (Wide Area Network) – spans cities, countries, or the globe.
- Internet – worldwide public network.
- Intranet – private network using Internet protocols within an organisation.
- Extranet – controlled access to part of an intranet for external partners.
4.3 Key Protocols
- TCP/IP – fundamental suite for data transmission.
- HTTP / HTTPS – web page transfer (secure version uses encryption).
- FTP – file transfer between client and server.
- SMTP – sending e‑mail.
- POP3 / IMAP – retrieving e‑mail.
- Wi‑Fi (IEEE 802.11) – wireless LAN standard.
- Bluetooth – short‑range device pairing.
4.4 Network Hardware
- Router – forwards packets between different networks (e.g., LAN ↔ Internet).
- Switch – connects multiple devices within a LAN, creates separate collision domains.
- Hub – basic device that repeats signals to all ports (now largely obsolete).
- Modem – converts digital data to analogue for telephone or cable lines.
- Access point – provides Wi‑Fi connectivity to wired networks.
- Network Interface Card (NIC) – hardware that connects a computer to a network.
4.5 Storage Devices & Media – Comparative Matrix
| Media | Typical Capacity | Speed (Read/Write) | Durability | Typical Use |
|---|
| Magnetic (HDD) | 500 GB – 8 TB | ~100 MB/s | Sensitive to shock, magnetic fields. | Desktop & laptop primary storage. |
| Solid‑State (SSD, USB flash, memory card) | 128 GB – 4 TB (SSD); 32 GB – 1 TB (USB/SD) | 200 MB/s – 3 GB/s (NVMe) | Highly resistant to shock, no moving parts. | Portable storage, high‑performance laptops, cameras. |
| Optical (CD‑R, DVD‑R, Blu‑ray) | 700 MB – 25 GB | ~10 MB/s | Long‑term archival if stored properly. | Software distribution, backup of small data sets. |
| Magnetic Tape (LTO) | 1 TB – 30 TB (compressed) | ~300 MB/s | Very durable, ideal for long‑term archiving. | Enterprise backup, data centre archiving. |
5. Effects of IT
- Positive effects – increased productivity, global communication, instant access to information, new services (e‑health, e‑learning, e‑government).
- Negative effects – digital divide, privacy & security concerns, cyber‑bullying, environmental impact (e‑waste, energy consumption).
- Health & safety – repetitive‑strain injury (RSI), eye strain, hearing loss, electrocution risk, cable‑trip hazards.
6. ICT Application Clusters
| Cluster | Typical Uses & Examples |
|---|
| Communication media | Email, instant messaging, video‑conferencing, social networking (e.g., Zoom, Teams, WhatsApp). |
| School‑management systems | Student information, timetabling, online grading (Moodle, PowerSchool). |
| Booking & reservation systems | Airline ticketing, hotel booking, cinema seat reservation. |
| Banking & financial services | Online banking, ATMs, mobile payments (PayPal, Apple Pay). |
| Medical information systems | Electronic health records, tele‑medicine, pharmacy management. |
| Expert systems & AI | Diagnostic support, recommendation engines, chess programmes. |
| Retail‑industry ICT | Point‑of‑sale terminals, inventory control, barcode scanners. |
| Recognition systems | OCR/OMR, RFID, NFC, biometric fingerprint or facial recognition. |
| Computer Modelling | Simulation of real‑world systems such as climate‑change models, traffic‑flow analysis, aircraft‑design testing. |
6.1 Computer Modelling – Definition
Computer modelling uses specialised software to create a virtual representation of a real‑world system, process or phenomenon. The model can be manipulated, tested and analysed without building physical prototypes or exposing people to risk.
6.2 Advantages of Using Computer Modelling
- Speed & efficiency – thousands of iterations can be run in minutes.
- Cost reduction – eliminates the need for expensive prototypes, materials or large test teams.
- Safety – hazardous scenarios (nuclear accidents, aircraft crashes) are examined virtually.
- Accuracy & precision – numerical calculations are performed with high exactness; human arithmetic errors are removed.
- Scalability – large‑scale systems (national power grids, global climate) can be represented.
- Repeatability – the same experiment can be reproduced exactly for verification.
- Data integration – real‑time sensor feeds, historic databases and statistical inputs can be combined.
- Scenario testing – “what‑if” analysis helps decision‑makers explore alternatives.
6.3 Disadvantages of Using Computer Modelling
- Initial development cost – specialised software, high‑performance hardware and skilled staff are required.
- Complexity – sophisticated models can be hard to understand, maintain and debug.
- Dependence on data quality – “garbage‑in, garbage‑out”; inaccurate or incomplete input leads to unreliable results.
- Limited real‑world fidelity – models are simplifications; some variables may be omitted or approximated.
- Technical failures – software bugs, hardware crashes or power loss can halt modelling.
- Over‑reliance on technology – users may accept outputs without critical evaluation.
- Ethical & legal issues – simulations involving personal data or human behaviour raise privacy and consent concerns.
6.4 Comparison – Computer Modelling vs. Human (Manual) Modelling
| Aspect | Computer Modelling | Human / Manual Modelling |
|---|
| Speed | Thousands of runs in minutes | Limited by human calculation speed |
| Cost | High upfront, low marginal cost per run | Low start‑up but high labour cost for each iteration |
| Safety | Dangerous scenarios simulated safely | Physical testing may endanger people |
| Accuracy | Depends on data quality & model fidelity | Prone to human error and limited precision |
| Scalability | Can model national or global systems | Impractical for very large/complex systems |
| Flexibility | Parameters changed instantly | Changes often require new experiments or redesign |
| Learning curve | Requires specialised training | Generally accessible to a broader audience |
6.5 Real‑World Example
Traffic‑flow simulation – a city council uses a computer model to test the impact of a new bus lane. By varying vehicle counts, bus frequencies and traffic‑signal timings, the model predicts congestion levels, emissions and travel times without closing any roads for real tests.
7. Systems Development Life‑Cycle (SDLC)
The SDLC provides a structured approach to creating, testing and maintaining ICT solutions.
| Phase | Key Activities |
|---|
| Analysis | Gather requirements, define user needs, feasibility study. |
| Design | Logical & physical design, data‑flow diagrams, UI mock‑ups, file‑structure planning. |
| Development & Testing | Write code or build forms, create databases, unit testing, integration testing. |
| Implementation | Install hardware/software, migrate data, train users, go‑live. |
| Documentation | User manuals, technical guides, maintenance procedures. |
| Evaluation (Maintenance) | Performance monitoring, bug fixing, updates, user feedback. |
Suggested diagram: a clockwise loop showing the six phases with arrows that allow iteration back to earlier phases when changes are required.
8. Safety & Security
- Physical safety – avoid electrocution, keep cables tidy, use surge protectors, wear safety goggles when handling hardware.
- e‑Safety – strong passwords, two‑factor authentication, regular anti‑malware scans, avoid phishing links, keep software up‑to‑date.
- Data protection – encryption (SSL/TLS), regular backups (cloud & external), access rights, compliance with GDPR / Data Protection Act.
- Legal & ethical issues – copyright, software licences, intellectual‑property rights, responsible use of personal data.
9. Audience & Communication
- Audience analysis – identify needs, prior knowledge, age, cultural background; adapt tone and technical level.
- Copyright basics – use of licensed images, fair‑use, Creative Commons, citation of sources.
- Email & netiquette – clear subject lines, professional salutations, concise body, appropriate signatures, avoid ALL CAPS.
- Internet research skills – keyword selection, evaluating credibility (author, date, domain), avoiding plagiarism.
10. Managing Files & Data
- Folder hierarchy – root folder → project name → sub‑folders (documents, images, data, backups).
- File formats – text (TXT, DOCX, PDF), images (JPEG, PNG, GIF, BMP, SVG), audio (MP3, WAV, OGG), video (MP4, AVI, MOV), archives (ZIP, RAR).
- Compression & backup – use ZIP for archiving, schedule regular backups to external drive or cloud service.
11. Working with Images
- Resolution & DPI – 72 dpi for web, 300 dpi for print.
- Common formats – JPEG (lossy, photographs), PNG (lossless, transparency), GIF (animation, limited colours), SVG (vector, scalable).
- Basic editing – cropping, resizing, colour correction, adding watermarks.
12. Document Production
- Creating and saving documents (DOCX, ODT, PDF).
- Using styles (heading, normal, caption) for consistent formatting.
- Inserting headers, footers, page numbers, tables of contents.
- Proof‑reading tools – spell‑check, grammar check, find‑replace.
- Layout basics – margins, columns, line spacing, justification.
13. Graphs & Charts
- When to use each type:
- Bar chart – comparisons.
- Line graph – trends over time.
- Pie chart – proportions of a whole.
- Scatter plot – correlation between two variables.
- Key steps: select data range → choose chart type → add titles, axes labels, legend → format colours and data markers.
14. Databases
- Table design – fields, records, primary key, appropriate data types.
- Relationships – one‑to‑one, one‑to‑many, many‑to‑many (using foreign keys).
- Forms & Queries – data entry forms, SELECT queries, filtering, sorting, calculated fields.
- Reports – grouping, totals, layout for printing.
15. Presentations
- Master slide creation – consistent background, logo, footer.
- Inserting objects – text boxes, images, charts, video clips.
- Transitions & animations – use sparingly for emphasis.
- Speaker notes & timing – rehearse with slide‑show view.
16. Spreadsheets
- Data modelling – tables, named ranges, data validation.
- Core formulas – arithmetic, cell references (absolute/relative).
- Advanced functions –
VLOOKUP / HLOOKUP / XLOOKUP, IF, nested IF, SUMIF / COUNTIF, INDEX / MATCH, TEXT, DATE. - Charts – creating and formatting bar, line, pie and scatter charts.
- PivotTables – summarising large data sets, grouping, filtering.