Know and understand validation routines including range check, character check, length check, type check, format check, presence check, check digit

ICT 0417 – The Systems Life Cycle and Core ICT Topics

Learning Objective

Know and understand the whole Cambridge IGCSE ICT (0417) syllabus, with particular emphasis on:

  • validation routines (range, character, length, type, format, presence, check‑digit)
  • how validation fits into the Systems Life Cycle
  • all other mandatory content areas required for Papers 1, 2 and 3


1. Computer Hardware

Key Components

  • CPU (Central Processing Unit) – the “brain” that executes instructions. Consists of:

    • Control Unit – directs operation of the processor.
    • Arithmetic‑Logic Unit (ALU) – performs calculations and logical operations.

  • Memory

    • RAM (Random‑Access Memory) – volatile, fast, used for temporary storage while programmes run.
    • ROM (Read‑Only Memory) – non‑volatile, stores firmware such as BIOS.
    • Cache – small, high‑speed memory on the CPU for frequently used data.

  • Motherboard & Bus Architecture – the main printed circuit board that connects CPU, memory, storage and peripherals via system buses (address, data, control).
  • Power Supply Unit (PSU) – converts mains AC to low‑voltage DC; includes safety features (over‑load protection, surge suppression).
  • Cooling & Chassis – fans, heat‑sinks, and case design keep components within safe temperature ranges.

Key Points – Advantages / Disadvantages

ComponentAdvantageDisadvantage
RAMFast access, enables multitaskingVolatile – data lost when power is off
ROMNon‑volatile, secure firmware storageRead‑only – cannot be easily updated
SSDVery fast read/write, no moving partsHigher cost per GB than HDD
HDDLarge capacity, cheaper per GBSlower, mechanical wear


2. Input & Output Devices

DeviceTypeTypical UseKey Features / Example
KeyboardInput – alphanumericData entry, commandsQWERTY layout, tactile feedback
Mouse / TouchpadInput – pointingGUI navigationOptical sensor, left/right buttons, scroll wheel
ScannerInput – opticalDigitising documents/photosFlatbed, resolution (dpi), colour depth
MicrophoneInput – audioVoice recording, speech‑to‑textOmnidirectional, USB or 3.5 mm jack
MonitorOutput – visualDisplay informationLCD/LED, resolution (e.g., 1920×1080), refresh rate
PrinterOutput – hard copyReports, flyersInk‑jet vs. laser, colour vs. monochrome
Speakers / HeadphonesOutput – audioMultimedia playbackStereo, USB or 3.5 mm, noise‑cancelling


3. Storage

Primary Storage

  • RAM – fast, volatile, used while programmes run.
  • Cache – built into CPU, stores frequently accessed data.

Secondary Storage

  • Hard Disk Drive (HDD) – magnetic platters, high capacity, slower access.
  • Solid‑State Drive (SSD) – flash memory, fast random access, no moving parts.
  • Optical Media – CD, DVD, Blu‑ray; read‑only or writeable, useful for distribution.
  • USB Flash Drives & External Hard Disks – portable, plug‑and‑play.

Cloud Storage

  • Remote servers accessed via the internet (e.g., Google Drive, OneDrive, Dropbox).
  • Advantages: accessibility from any device, automatic backup, collaboration.
  • Disadvantages: reliance on internet connection, data security concerns.

Key Points – When to Use Which

Storage TypeBest ForConsiderations
RAMRunning applicationsLimited by motherboard capacity
SSDOperating system, programmes requiring fast load timesHigher cost per GB
HDDLarge media libraries, backupsSlower, mechanical failure risk
CloudCollaboration, off‑site backupInternet bandwidth, privacy


4. Networks

Types of Networks

  • LAN (Local Area Network) – covers a single building or campus; uses Ethernet (copper/fibre) or Wi‑Fi (802.11).
  • WAN (Wide Area Network) – connects multiple LANs over large distances; the Internet is the largest WAN.

Network Topologies

TopologyStructureAdvantagesDisadvantages
StarAll devices connect to a central hub/switchEasy to manage, fault isolationCentral device failure affects whole network
BusAll devices share a single communication lineSimple, cheap cablingCollision, difficult to isolate faults
RingEach device connects to two neighbours forming a circlePredictable data flowBreak in the ring stops communication
MeshMultiple redundant paths between devicesHigh reliabilityExpensive, complex

Key Hardware

  • Router – forwards data between different networks (e.g., LAN to Internet).
  • Switch – connects multiple devices within a LAN, directs traffic using MAC addresses.
  • Hub – simple device that repeats signals to all ports (now largely obsolete).
  • Modem – converts digital data to analog for transmission over telephone lines or cable.
  • Access Point (AP) – provides Wi‑Fi connectivity to wireless devices.

Common Protocols

  • TCP/IP – suite that underpins the Internet; TCP ensures reliable delivery, IP handles addressing.
  • HTTP / HTTPS – web page transfer; HTTPS adds encryption.
  • FTP – file transfer between client and server.
  • SMTP – sending email.
  • POP3 / IMAP – retrieving email.

Threat Taxonomy (Expanded)

ThreatImpactCounter‑measure
Malware (virus, ransomware, spyware)Data loss, system downtimeAntivirus, regular updates, safe downloading
PhishingUnauthorised access, financial lossSpam filters, user education, two‑factor authentication
Smishing / Vishing / PharmingIdentity theft, fraudVerify sender, avoid clicking unknown links, use secure DNS
Hacking / Unauthorised accessData breach, service disruptionFirewalls, strong passwords, encryption, intrusion detection systems
Card fraudFinancial theftSecure payment gateways, CVV verification, tokenisation
Denial‑of‑Service (DoS)Service unavailableTraffic filtering, rate limiting, redundant servers


5. Effects of ICT on Individuals & Society

  • Positive impacts

    • Increased productivity and efficiency.
    • Instant access to information and learning resources.
    • New job roles (e‑commerce, IT support, digital design).
    • Improved communication (email, video‑conferencing, social media).

  • Negative impacts

    • Digital divide – unequal access to technology.
    • Privacy concerns – data collection and surveillance.
    • Cyber‑bullying and online harassment.
    • Health effects – eye strain, repetitive‑strain injury, sedentary lifestyle.

  • Environmental impact

    • E‑waste – hazardous components require proper recycling.
    • Energy consumption – data centres and devices.
    • Initiatives – recycling programmes, energy‑efficient hardware.


6. ICT Applications – Skills Checklist

Application AreaKey Skills/Knowledge Required (Cambridge Syllabus)
Word ProcessingCreating, editing and formatting documents; inserting tables, images, headers/footers; using styles and templates; spell‑check and proofing.
SpreadsheetsEntering data, using formulas (SUM, AVERAGE, IF, LOOKUP/XLOOKUP), creating charts, applying conditional formatting, sorting & filtering.
DatabasesDesigning tables, defining primary & foreign keys, creating forms and queries, generating reports, understanding relational vs. flat‑file structures.
PresentationsDesigning slides, applying layouts, inserting multimedia, using slide transitions and animations, presenter notes.
Graphics & Image EditingUnderstanding raster vs. vector, cropping, resizing, colour depth, using layers, exporting in appropriate formats.
Web AuthoringWriting basic HTML, linking pages, using meta‑tags, applying external CSS, relative vs. absolute paths, publishing to a web server.
Communication ToolsComposing professional emails, using netiquette, attaching files, understanding spam and how to avoid it, instant messaging etiquette.
Management Information Systems (MIS)Understanding data flow, generating management reports, using forms for data entry, basic security controls.


7. The Systems Life Cycle (SLC)

The SLC provides a structured approach to developing an information system. Each stage produces specific outputs that feed into the next stage.

7.1 Analysis

  • Identify the problem or opportunity.
  • Gather requirements using observation, interviews, questionnaires, and document review.
  • Produce a Requirements Specification – a clear statement of what the system must do.

7.2 Design

  • Translate requirements into a detailed plan.
  • Key artefacts:

    • Data‑flow diagrams (DFDs) – show how data moves through the system.
    • Entity‑relationship diagrams (ERDs) – define tables, fields, primary and foreign keys.
    • Screen mock‑ups / wire‑frames – layout of user interfaces.
    • Input‑output specifications – include validation routines (see 7.7).
    • Database design – relational model, normalisation basics.

7.3 Development & Testing

  • Write the code or configure software according to the design.
  • Testing levels:

    • Unit testing – individual components.
    • Integration testing – interaction between components.
    • System testing – whole system against requirements.
    • User Acceptance Testing (UAT) – real users validate functionality.

  • Test documentation: test plan, test cases, test data, test report.

7.4 Implementation

  • Move the system into the live environment.
  • Common strategies:

    • Direct change‑over
    • Parallel running
    • Pilot implementation
    • Phased rollout

  • Training, data migration, and post‑implementation support are essential.

7.5 Documentation

  • Technical documentation – code comments, system architecture diagrams, maintenance manuals.
  • User documentation – user guides, help files, FAQs, quick‑reference cards.

7.6 Evaluation

  • Assess whether the system meets the original objectives.
  • Consider criteria such as efficiency, effectiveness, usability, reliability, and cost‑benefit.
  • Identify limitations and propose improvements (including enhancements to validation).

7.7 Validation Routines (Key Part of Design & Testing)

7.7.1 Range Check

Ensures a numeric value lies between a minimum and maximum.

Example: Age must be between 0 and 120.

7.7.2 Character Check

Confirms each character belongs to an allowed set.

Example: Country code must consist of uppercase letters A–Z.

7.7.3 Length Check

Verifies the number of characters entered matches the required length (or falls within a range).

Example: UK postcode must be 5–7 characters.

7.7.4 Type Check

Ensures the data type entered matches the expected type (numeric, alphabetic, date, etc.).

Example: “Quantity” field must be numeric.

7.7.5 Format Check

Validates that data follows a specific pattern, often using regular expressions.

Example: Telephone number must match +44 0 1234 567890.

7.7.6 Presence Check (Mandatory Field)

Ensures a required field is not left blank.

Example: Email address field must contain a value before submission.

7.7.7 Check Digit

A mathematical digit added to a number to detect entry errors. Common algorithms: Mod‑10, Mod‑11.

Example (ISBN‑13):

Check Digit = (10 – ( Σ (weighti × digiti) mod 10 )) mod 10

where weight_i = 1 for odd positions, 3 for even positions.

Implementation – Pseudo‑code Summary

Check TypePurposeTypical ExamplePseudo‑code
RangeValue within limitsAge 0–120if (value >= min && value <= max) { accept } else { error }
CharacterAllowed characters onlyCountry code A–Zif (/^[A-Z]+$/.test(value)) { accept } else { error }
LengthExact or range of charactersPostcode 5–7if (len >=5 && len <=7) { accept } else { error }
TypeCorrect data typeQuantity numericif (!isNaN(value)) { accept } else { error }
FormatSpecific pattern requiredPhone +44 0 1234 567890if (/^\+44\s0\s\d{4}\s\d{6}$/.test(value)) { accept } else { error }
PresenceField must not be emptyEmail address requiredif (value.trim() !== '') { accept } else { error }
Check DigitDetect entry errorsISBN‑13calc = mod10(value); if (calc == expected) { accept } else { error }


8. Safety & Security

8.1 Physical Safety

  • Ergonomic workstation setup – correct chair height, monitor eye level, keyboard/mouse position.
  • Electrical safety – avoid over‑loading sockets, use surge protectors, unplug equipment during storms.
  • Fire safety – keep fire extinguishers accessible, maintain clear escape routes, avoid blocking vents.

8.2 e‑Safety

  • Responsible internet use – do not share personal details with unknown parties.
  • Social‑media etiquette – respectful communication, privacy settings, avoid cyber‑bullying.
  • Spam email – recognise unsolicited messages, never click unknown links or open suspicious attachments; use spam filters.

8.3 Data Protection (GDPR‑style Principles)

  • Lawfulness, fairness and transparency.
  • Purpose limitation – use data only for the stated purpose.
  • Data minimisation – collect only what is needed.
  • Accuracy – keep data up‑to‑date.
  • Storage limitation – delete or anonymise when no longer required.
  • Integrity & confidentiality – protect data from unauthorised access (encryption, strong passwords).
  • Accountability – be able to demonstrate compliance.

8.4 Threats & Counter‑measures (Expanded Matrix)

ThreatImpactCounter‑measure
Malware (virus, ransomware, spyware)Data loss, system downtimeAntivirus, regular updates, safe downloading practices
PhishingUnauthorised access, financial lossSpam filters, user education, two‑factor authentication
Smishing / Vishing / PharmingIdentity theft, fraudVerify sender, avoid clicking unknown links, use secure DNS, never disclose personal data over phone/SMS
Hacking / Unauthorised accessData breach, service disruptionFirewalls, strong passwords, encryption, intrusion detection systems
Card fraudFinancial theftSecure payment gateways, CVV verification, tokenisation
Denial‑of‑Service (DoS)Service unavailableTraffic filtering, rate limiting, redundant servers


9. Audience & Copyright

Audience Analysis

  • Identify who will read or view the output (e.g., teachers, peers, customers).
  • Tailor language, layout, level of detail and visual style to the audience’s needs and expectations.

Copyright Legislation

  • Software piracy is illegal – only use properly licensed copies.
  • Fair dealing / educational use – limited copying for teaching, research or private study.
  • Creative Commons licences – allow sharing under specified conditions (e.g., attribution, non‑commercial).


10. Communication

Email Etiquette

  • Clear subject line.
  • Appropriate greeting and sign‑off.
  • Concise body, use paragraphs and bullet points.
  • Check spelling/grammar; avoid ALL CAPS (interpreted as shouting).
  • Attach files using appropriate naming conventions.

Internet Basics

  • Intranet – private network within an organisation.
  • Extranet – restricted external access to part of an intranet.
  • World Wide Web – collection of linked hypertext documents.
  • URL – Uniform Resource Locator (e.g., https://www.example.com).
  • IP address – numeric identifier for a device on a network.

Netiquette & Spam

  • Use polite language, respect privacy, and cite sources.
  • Spam – unsolicited bulk messages; prevent by using filters, never reply to unknown senders, and avoid posting email addresses publicly.

Evaluating Web Sources

  • Authority – who published it? Credentials?
  • Accuracy – is the information correct, up‑to‑date, and referenced?
  • Purpose – inform, persuade, sell, or entertain?
  • Bias – any hidden agenda or one‑sided view?


11. File Management

Folder Hierarchy & Naming Conventions

  • Logical structure – e.g., Year/Subject/Project.
  • File names – no spaces, use underscores or hyphens, include date in YYYYMMDD format for version control.
  • Use meaningful extensions: .docx, .xlsx, .pptx, .pdf, .jpg, .png, .html, .css, .js.

Backup Strategies

  • External drive – weekly full backup.
  • Cloud sync – continuous incremental backup.
  • 3‑2‑1 rule – three copies, two different media, one off‑site.

File Compression

Compressing files reduces size for storage or transmission.

  • Common formats: ZIP (built‑in Windows/macOS), RAR (requires WinRAR/7‑Zip).
  • When to use: emailing large documents, archiving old projects, grouping related files.
  • How to create: right‑click → “Send to → Compressed (zipped) folder” (Windows) or “Compress” (macOS).
  • How to extract: double‑click the archive or use extraction software.


12. Images

Raster vs. Vector

  • Raster (bitmap) – pixel‑based, resolution‑dependent (e.g., JPEG, PNG). Best for photographs.
  • Vector – mathematically defined shapes, resolution‑independent (e.g., SVG, EPS). Best for logos and diagrams.

Key Points for Image Editing

  • Resolution – measured in DPI (dots per inch); 300 DPI for print, 72 DPI for screen.
  • Colour depth – 24‑bit colour (16 million colours) is standard for high‑quality images.
  • File formats – JPEG (lossy, good for photos), PNG (lossless, supports transparency), GIF (animation, limited colours), SVG (vector).
  • Basic edits – cropping, resizing (maintain aspect ratio), adjusting brightness/contrast, applying filters.


13. Document Production – Key Checklist

TaskWhat the Candidate Must Demonstrate
Creating a new documentSet up page size, margins, orientation.
Applying stylesUse heading styles, body text, and modify font, size, colour.
Inserting tables & imagesResize, align, add captions, wrap text.
Using spell‑check & proofingRun spell‑check, use thesaurus, track changes.
ExportingSave as PDF and as a compressed ZIP archive.


14. Database Design – Key Checklist

ElementRequirement (Cambridge Syllabus)
Tables & FieldsIdentify appropriate fields, set data types, define primary keys.
Primary & Foreign KeysExplain purpose; create relationships between tables.
RelationshipsOne‑to‑one, one‑to‑many, many‑to‑many (using junction tables).
FormsDesign data entry forms with appropriate validation (see Section 7.7).
QueriesUse SELECT statements, filter criteria, sorting, and simple calculations.
ReportsGenerate a formatted report with headings, totals and grouping.
Relational vs. Flat‑FileExplain differences; advantages of relational databases.


15. Spreadsheet Skills – Key Checklist

SkillWhat to Demonstrate
Data entry & formattingNumber, text, date formats; cell alignment, borders.
Formulas & FunctionsSUM, AVERAGE, COUNT, MIN, MAX, IF, VLOOKUP/XLOOKUP, CONCATENATE.
ChartsCreate a column, line or pie chart; add titles and legends.
Conditional FormattingHighlight cells based on criteria (e.g., values > 100).
Sorting & FilteringSort data alphabetically or numerically; filter rows using criteria.
Data ValidationApply range, list, date, and custom validation (including check‑digit example).
ProtectionLock cells, protect worksheet with a password.


16. Web Authoring – Key Checklist

RequirementWhat the Candidate Must Show
HTML structureUse <!DOCTYPE html>, <html>, <head>, <body> tags.
Meta‑tagsInclude <meta charset="UTF-8"> and <meta name="description" content="..."/>.
Headings & paragraphsUse <h1><h6> and <p> correctly.
Links & imagesInsert internal and external hyperlinks; embed images with alt text.
External stylesheetCreate a separate .css file, link with <link rel="stylesheet" href="style.css">, and apply at least three style rules.
Relative vs. absolute pathsUse relative paths for internal resources; demonstrate an absolute URL example.
PublishingUpload files to a web server (or simulate with local folder) and test in a browser.


17. Proofing & Publishing

  • Proofreading – check spelling, grammar, punctuation, and consistency.
  • Use built‑in tools (spell‑check, grammar check) and peer review.
  • Final publishing – export to PDF, print hard copy, or upload to a website as required.


Summary

This set of notes aligns with the Cambridge IGCSE ICT (