Know and understand scanning the data/software when downloading
IGCSE ICT (0417) – Complete Syllabus Notes
Objective
Provide a concise, exam‑focused reference for all core areas of the Cambridge IGCSE ICT syllabus, with a special emphasis on scanning data/software when downloading. The notes cover hardware, storage, networks, ICT applications, the systems life‑cycle, safety & security, communication, file management, graphics, documents, databases, spreadsheets and presentations.
1. Types of ICT Systems & Core Components
1.1. Main Hardware Elements
CPU (Central Processing Unit) – “brain” of the computer; executes instructions.
RAM (Random‑Access Memory) – volatile memory used for temporary data while programmes run.
ROM / Firmware – non‑volatile memory that stores permanent instructions (e.g., BIOS).
Motherboard – connects CPU, RAM, storage and peripheral devices.
Only download from the vendor’s official website or reputable app stores.
Check the URL – look for “https://” and a padlock icon.
Verify digital signatures or checksums when provided.
Keep the operating system and all security software up to date.
Enable real‑time scanning and automatic definition updates.
Educate users about phishing emails and deceptive download links.
Use a sandbox or virtual machine for testing unknown files before installing them on the main system.
Maintain regular backups; ransomware cannot encrypt files that are offline.
4.7. Real‑World Example
In May 2023 the “LockBit 3.0” ransomware outbreak infected thousands of organisations worldwide. Many victims had not scanned newly‑downloaded email attachments, allowing the malicious executable to run, encrypt critical data and demand payments of up to €500 000. The incident illustrates how a single un‑scanned file can cripple an entire network and underlines the importance of regular scanning, up‑to‑date definitions and robust backup strategies.
4.8. Summary Table – Quick Reference
Action
When to Perform
Result Expected
Check source credibility
Before initiating any download
Reduced risk of malicious files.
Run a scan on the downloaded file
Immediately after download, before opening
Detection and removal of threats.
Verify checksum / digital signature
When publisher provides one
Assurance that the file has not been altered.
Update virus definitions
Daily (automatic) or on‑demand (manual)
Protection against the latest malware.
Apply network security controls
Continuously, as part of policy
Enhanced protection of data in transit and at rest.
Table – collection of rows (records) and columns (fields).
Primary key – unique identifier for each record.
Foreign key – links tables together (relationships).
Query – retrieve or manipulate data (SQL SELECT, UPDATE, DELETE).
Form – user‑friendly data entry screen.
Report – formatted output for printing or sharing.
14.2. Relational Database Example
Students (StudentID PK, Name, DOB, ClassID FK)
Classes (ClassID PK, Subject, Teacher)
Query example: “Show all students in ‘Biology’” – uses a JOIN between Students and Classes.
14.3. Data Validation
Field rules – numeric only, date range, mandatory entry.
Drop‑down lists – restrict to predefined options.
Error messages – guide the user to correct input.
15. Spreadsheets
15.1. Core Elements
Cell – intersection of row and column (e.g., B3).
Formula – begins with “=”, can use arithmetic operators and functions.
Functions – SUM, AVERAGE, IF, VLOOKUP, COUNTIF, etc.
15.2. Useful Features
Charts – create bar, line, pie charts directly from data ranges.
Conditional formatting – highlight cells that meet criteria.
Data validation – restrict entry (list, whole number, date).
Pivot tables – summarise large data sets quickly.
What‑if analysis – Goal Seek, Scenario Manager.
15.3. Example Formula
=IF(C2 >= 50, "Pass", "Fail")
Returns “Pass” if the score in C2 is 50 or above, otherwise “Fail”.
16. Presentations
16.1. Design Principles
Keep slides uncluttered – one main idea per slide.
Use high‑contrast text/background; limit fonts to two types.
Incorporate relevant images, diagrams or short videos.
Apply consistent slide master for headings, footers and colour scheme.
16.2. Useful Features
Slide transitions – use sparingly for professional effect.
Animations – reveal bullet points sequentially.
Presenter notes – private cues for the speaker.
Embedded media – audio clips, screen recordings.
Export options – PDF for handouts, video for online sharing.
17. Summary – Quick Reference Tables
17.1. Network Security Controls (Condensed)
Control
Key Benefit
Firewall
Blocks unauthorised traffic.
Encryption (SSL/TLS, VPN)
Protects data in transit.
MFA
Reduces risk of password theft.
Antivirus
Detects and removes malware.
Physical locks & CCTV
Prevents
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.