1. Computer Systems – Hardware, Software and the ICT Syllabus
1.1 What is Hardware?
Hardware comprises the tangible components of a computer system that can be seen and touched. Typical examples are:
Central Processing Unit (CPU)
Memory modules (RAM, ROM)
Motherboard and bus circuitry
Primary storage (HDD, SSD)
Power Supply Unit (PSU)
Input devices – keyboard, mouse, touchpad, scanner, digital camera, stylus
Output devices – monitor, printer, speakers, projector, haptic controllers
Peripheral devices – USB flash drives, external hard‑disks, network adapters
1.2 What is Software?
Software is a collection of instructions that tells the hardware what to do. It is divided into two main categories:
System software – manages hardware resources and provides a platform for other programmes.
Operating System (e.g. Windows 11, macOS Ventura, Linux Ubuntu, Android, iOS)
Device drivers
Utility programmes (antivirus, disk‑defragmenter, backup tools)
Application software – performs specific tasks for the user.
Word processors, spreadsheets, databases
Web browsers, multimedia editors, games
Specialist ICT applications (school‑management, banking, medical, retail, expert‑systems, pattern‑recognition)
2. Core Components of All Computer Types
2.1 Central Processing Unit (CPU)
The CPU is the “brain” of the computer. It carries out the fetch–decode–execute cycle and coordinates all data movement via the system bus.
Fetch – the control unit reads the next instruction from RAM.
Decode – the instruction register interprets the opcode and determines the required operation.
Execute – the arithmetic‑logic unit (ALU) performs calculations or logical operations; results are stored in registers or written back to memory.
Key concepts for the syllabus:
CPU registers (program counter, instruction register, accumulator)
System bus (address, data, control lines)
Multi‑core processors – multiple cores share the same bus but can execute independent instruction streams, improving performance and energy efficiency.
2.2 Internal Memory – RAM vs. ROM
Aspect
RAM (Random‑Access Memory)
ROM (Read‑Only Memory)
Volatility
Volatile – data lost when power is removed.
Non‑volatile – retains data without power.
Purpose
Temporary workspace for the OS and running applications.
Stores permanent firmware (BIOS/UEFI) and boot instructions.
Typical Capacity (2024)
4 GB – 128 GB in most PCs; up to 2 TB in high‑end workstations.
Usually 2 MB – 64 MB (firmware) or larger in embedded systems.
Upgradeability
Often user‑upgradeable via DIMM slots; many laptops now use soldered SODIMM.
Generally fixed; replacement requires specialised re‑programming.
2.3 Input Devices – Overview, Advantages & Disadvantages
Device
Typical Use
Advantage
Disadvantage
Keyboard
Text entry, command input
Fast typing, tactile feedback
Requires desk space; less suited to touch‑first environments
Mouse / Touchpad
Pointing, selection, navigation
Precise control; ergonomic variants available
Needs a flat surface; extra peripheral
Scanner
Digitise paper documents or photos
Accurate conversion of hard copies
Slow for large batches; occupies desk space
Digital Camera / Webcam
Capture still images or video
Enables visual communication and documentation
Quality varies; may need additional software
Stylus (for tablets)
Precise drawing or handwriting input
High accuracy for graphic work
Extra accessory to carry; not needed by all users
2.4 Output Devices – Overview, Advantages & Disadvantages
Device
Typical Use
Advantage
Disadvantage
Monitor (LCD/LED/OLED)
Visual display of information
High resolution, adjustable size, low power (LED)
Consumes desk space; glare in bright rooms
Printer (Inkjet/Laser)
Produce hard‑copy documents and images
Convenient for physical records
Ink/toner costs; regular maintenance
Speakers / Headphones
Audio output for media, alerts, communication
Enhances multimedia experience
Potential noise; quality varies widely
Projector
Large‑format visual presentations
Ideal for classrooms and meetings
Requires darkened room; bulb replacement cost
Haptic Feedback Device
Provides tactile sensations (e.g., game controllers)
Improves user immersion
Specialised hardware, limited general‑purpose use
2.5 Storage Devices & Media – Magnetic, Optical, Solid‑State and Cloud
Media Type
Typical Use
Advantage
Disadvantage
Magnetic Hard Disk Drive (HDD)
Primary storage for PCs, servers
Large capacity at low cost (1 TB – 20 TB)
Moving parts → slower access, mechanical failure risk
Solid‑State Drive (SSD)
Primary storage in laptops, high‑performance desktops
Fast random access, no moving parts, lower power draw
Higher cost per GB (256 GB – 4 TB)
Magnetic Tape
Long‑term archival and backup
Very high capacity, inexpensive for bulk storage
Slow retrieval, specialised drives needed
Optical Disc – CD / DVD / Blu‑ray
Software distribution, media playback, occasional backup
Portable, inexpensive media
Limited rewrite cycles, lower capacity than HDD/SSD
USB Flash Drive / SD Card
Portable data transfer, light backup
Compact, plug‑and‑play, capacities 8 GB – 1 TB
Easy to lose, limited lifespan under heavy write cycles
Cloud Storage (e.g., OneDrive, Google Drive, Dropbox)
Online backup, collaboration, remote access
Accessible from any internet‑connected device, automatic versioning
Requires reliable internet; data security depends on provider
Note: Primary storage (RAM, HDD/SSD) holds active data; backup storage (tape, external drives, cloud) protects against loss.
2.6 Operating Systems (OS) – Core Functions
Manage hardware resources (CPU scheduling, memory allocation, I/O control).
Provide a user interface (graphical or command‑line).
Run system software and enable installation of application software.
Handle file management, security, networking services, and peripheral drivers.
Common examples: Windows 10/11, macOS Ventura, Linux (Ubuntu, Fedora), Android, iOS.
3. Types of Computer Systems – Advantages, Disadvantages, Portability & Expandability
3.1 Supercomputers
Extremely fast machines used for scientific research, weather modelling, cryptography and AI training.
Advantages
Petaflop‑level processing speed.
Massive parallelism – thousands of cores work together.
Huge memory pools (hundreds of terabytes).
Disadvantages
Very high purchase, energy and cooling costs.
Fixed installation in specialised data centres.
Limited end‑user expandability – upgrades performed by specialist teams.
3.2 Mainframe Computers
Large, reliable systems for bulk data processing in banks, airlines, governments, etc.
Advantages
High reliability and uptime (often >99.999%).
Supports thousands of concurrent users.
Modular scalability – processors, memory and storage can be added.
Robust security and backup facilities.
Disadvantages
High acquisition and maintenance costs.
Requires dedicated space, power and cooling.
Not portable.
3.3 Servers
Computers that provide services (web, email, database, file storage) to other devices on a network.
Advantages
Configurable for specific roles (e.g., web server, database server).
Designed for 24 / 7 operation and redundancy.
High expandability – additional drives, RAM, NICs, virtual machines.
Disadvantages
Usually rack‑mounted; limited physical mobility.
Initial setup can be complex (network configuration, security hardening).
Significant power consumption.
3.4 Desktop Computers
Standard personal computers used at a fixed location.
Advantages
Relatively low cost compared with larger systems.
Easy internal upgrades – CPU, GPU, RAM, storage, expansion cards.
Broad software compatibility.
Disadvantages
Not portable – requires a desk, power outlet and external monitor.
Performance limited by the form‑factor and cooling capacity.
3.5 Laptop (Notebook) Computers
Portable, all‑in‑one devices with an integrated screen, keyboard, battery and internal components.
Advantages
High portability – can be used anywhere with power or battery.
All‑in‑one design reduces cable clutter.
Built‑in wireless connectivity (Wi‑Fi, Bluetooth).
Often include webcam and microphone for online collaboration.
Disadvantages
Limited internal expandability – usually only RAM and SSD upgrades.
Smaller keyboard and screen may affect ergonomics.
Battery life varies; high‑performance models may drain quickly.
3.6 Tablet Computers
Touch‑screen devices primarily operated with fingers or a stylus.
Advantages
Extreme portability – lightweight, often fits in a pocket.
Intuitive touch interface; stylus support for drawing and note‑taking.
Long battery life for typical usage (8‑12 hours).
Disadvantages
Very limited expandability – no internal RAM or storage upgrades.
Lower processing power than most laptops.
Peripheral support often requires adapters (USB‑C to HDMI, etc.).
3.7 Emerging & Specialist Devices (AI‑enabled, XR, Wearables)
AI‑enabled devices – smart speakers, AI‑accelerated laptops, edge‑AI boxes.
Extended Reality (XR) headsets – VR/AR devices for immersive learning and design.
Wearables – smartwatches and fitness trackers with limited computing but high portability.
3.8 Comparison of Portability and Expandability
Computer Type
Portability
Expandability
Typical Use Cases (Cambridge Syllabus)
Supercomputer
Very low – fixed in specialised facilities
Low – upgrades by specialist teams only
Scientific research, climate modelling, AI training
Mainframe
Very low – data‑centre environment
High – modular addition of CPUs, memory, storage
Large‑scale transaction processing (banking, airlines)
Server
Low – rack‑mounted, can be relocated with effort
High – drives, RAM, NICs, virtual machines
Web hosting, database services, enterprise applications
Desktop
Low – requires a desk and power outlet
High – CPU, GPU, RAM, storage, expansion cards
Office work, gaming, multimedia creation
Laptop
High – carried in a bag, battery powered
Medium – usually RAM and SSD upgrades only
Mobile work, presentations, travel‑based tasks
Tablet
Very high – handheld, fits in a pocket
Very low – no internal upgrades; external accessories only
Reading, web browsing, light productivity, digital art
AI‑enabled / XR devices
Variable – often portable but require tethered power for high performance
Low – hardware is fixed; software updates are the main extension
Immersive learning, design visualisation, AI‑assisted tasks
4. Network, Cloud Computing and Emerging Technologies (Syllabus 4.1‑4.2)
4.1 Networking Basics
LAN (Local Area Network) – connects devices within a building.
WAN (Wide Area Network) – links multiple LANs over large distances.
Wi‑Fi (IEEE 802.11) – wireless LAN; security protocols: WEP (obsolete), WPA2, WPA3.
Bluetooth – short‑range wireless for peripherals.
Network security basics: firewalls, strong passwords, MAC address filtering, VPNs.
4.2 Cloud Computing & Services
Infrastructure as a Service (IaaS) – virtual machines, storage (e.g., AWS EC2, Azure VM).
Platform as a Service (PaaS) – development environments, databases (e.g., Google App Engine).
Software as a Service (SaaS) – web‑based applications (Google Workspace, Microsoft 365).
Benefits: scalability, cost‑effective pay‑as‑you‑go, remote collaboration.
Risks: data‑privacy, dependence on internet connectivity, vendor lock‑in.
4.3 Emerging Technologies (AI, XR, IoT)
Artificial Intelligence (AI) – machine learning, natural language processing; used in chatbots, recommendation systems.
Extended Reality (XR) – virtual reality (VR) and augmented reality (AR) for simulations and design.
Internet of Things (IoT) – sensors and smart devices communicating over networks (e.g., smart classrooms).
5. ICT Applications – Specialist Domains (Syllabus 6)
Application Domain
Purpose
Typical Software Examples
Key Advantages
Key Disadvantages
School‑management systems
Manage timetables, attendance, grades, parent communication
PowerSchool, EMIS, Moodle (LMS)
Centralised data, reduced paperwork, real‑time reporting
Initial cost, staff training, data‑privacy concerns
Booking & reservation systems
Handle appointments, room bookings, ticket sales
OpenTable, Eventbrite, custom web portals
24 / 7 availability, automated confirmations
Dependence on internet, possible double‑booking bugs
Banking & financial applications
Account management, online transactions, fraud detection
Core banking software, mobile banking apps
Instant transfers, detailed statements, security features
High security requirements, regulatory compliance
Medical & health‑care systems
Patient records, appointment scheduling, diagnostic imaging
Electronic Health Records (EHR), PACS
Improved patient care, data sharing across providers
Strict privacy laws (HIPAA/GDPR), system downtime impact
Retail & point‑of‑sale (POS) systems
Sales processing, inventory control, customer loyalty
Square, Shopify POS, Oracle Retail
Fast checkout, real‑time stock updates
Hardware failures can halt sales, security of payment data
Expert‑systems & decision‑support
Provide advice based on knowledge bases (e.g., medical diagnosis)
CLIPS, IBM Watson
Consistent decision‑making, captures expert knowledge
Limited to programmed knowledge, may lack flexibility
Pattern‑recognition systems
Identify images, speech, handwriting
Google Vision API, OCR software, speech‑to‑text engines
Automation of data entry, accessibility improvements
Accuracy varies; requires training data
6. Systems Development Life‑Cycle (SDLC) – Syllabus 7
Analysis – Identify user requirements, define problem, produce a specification document.
Design
Data structures (tables, fields, relationships).
Interface design – mock‑ups, wire‑frames, colour schemes.
Validation rules (range checks, mandatory fields, data‑type checks).
Development (Implementation) – Write code or configure software, create database tables, set up security.
Testing
Unit testing – individual components.
Integration testing – combined modules.
System testing – full solution against requirements.
Document test plans, expected results and actual outcomes.
Implementation Methods
Direct (big‑bang) – switch‑over at once.
Parallel – old and new systems run together for a period.
Pilot – limited rollout to a test group.
Phased – modules introduced sequentially.
Documentation
Technical documentation – architecture, code comments, API specs.
User documentation – manuals, help files, tutorials.
Evaluation
Assess against original specifications (functionality, performance, security).
Gather user feedback, calculate ROI, identify future improvements.
7. Safety, e‑Safety and Legal Issues (Syllabus 8‑10)
7.1 Physical Safety
Ergonomic workstation setup – chair height, monitor eye‑level, keyboard position.
Electrical safety – avoid overloaded sockets, use surge protectors.
Handling of storage media – avoid static discharge, proper e‑waste disposal.
7.2 e‑Safety & Data Protection
Strong passwords, two‑factor authentication, regular password changes.
Recognising phishing, spam, and social‑engineering attacks.
Safe browsing – check HTTPS, avoid suspicious downloads.
Data‑protection principles (GDPR/UK Data Protection Act):
Lawful, fair, and transparent processing.
Purpose limitation and data minimisation.
Accuracy, storage limitation, integrity and confidentiality.
Backup strategies – 3‑2‑1 rule (three copies, two media types, one off‑site).
7.3 Copyright, Licensing and Intellectual Property
Copyright protects original literary, artistic, musical, and software works.
Fair dealing / fair use – limited copying for education, criticism, news reporting.
Open‑source licences (GPL, MIT) allow modification and redistribution under conditions.
Consequences of infringement – legal action, reputational damage.
8. File Management, Compression and Data Handling (Syllabus 11‑12)
8.1 File Management
Creating, renaming, moving, copying and deleting files/folders.
Using hierarchical folder structures for logical organisation.
File‑extension awareness – .docx, .xlsx, .pdf, .jpg, .png, .zip, .rar.
8.2 Compression Techniques
Format
Typical Use
Compression Type
Advantages
Disadvantages
.zip
General purpose file/folder compression
Lossless
Widely supported, can contain multiple files
Compression ratio limited for already compressed media
.rar
Higher compression ratios than zip (requires WinRAR)
Lossless
Better for large archives
Proprietary format, not always pre‑installed
.7z
Open‑source high‑ratio compression
Lossless
Excellent compression, supports encryption
Less common on Windows without additional software
.tar.gz / .tgz
Unix/Linux archiving and compression
Lossless
Preserves file permissions, good for source code
Command‑line tools often required on Windows
8.3 Image Resolution, Colour Depth and Trade‑offs
Resolution – measured in pixels (e.g., 1920 × 1080). Higher resolution = larger file size.
Colour depth – bits per pixel (8‑bit = 256 colours, 24‑bit = 16.7 million colours). Greater depth = richer colours but larger files.
When preparing images for web or documents, balance quality with file size using formats:
JPEG – lossy, good for photographs, adjustable quality.
PNG – lossless, supports transparency, larger than JPEG.
GIF – limited to 256 colours, supports animation.
8.4 Proofing and Validation Checks
Range checks – ensure numbers fall within permitted limits.
Type checks – confirm data is the correct format (numeric, date, text).
Length checks – restrict character count (e.g., passwords).
Mandatory field checks – require entry before submission.
Consistency checks – cross‑field validation (e.g., start date before end date).
9. Document Production, Databases, Spreadsheets, Presentations (Syllabus 13‑16)
9.1 Document Production
Use of styles (heading, normal, caption) for consistent formatting.
Page layout – margins, columns, headers/footers, page numbers.
Inserting graphics, tables, captions and cross‑references.
Proofing tools – spell‑check, grammar, track changes, comments.
9.2 Database Fundamentals
Tables, fields, records, primary keys, foreign keys.
Relationships – one‑to‑one, one‑to‑many, many‑to‑many.
Queries – SELECT, WHERE, JOIN, aggregate functions (SUM, COUNT).
Forms for data entry; reports for output.
9.3 Spreadsheets
Cell references – relative, absolute (\$A\$ 1) and mixed.
Formulas and functions – SUM, AVERAGE, IF, VLOOKUP, INDEX/MATCH.
Data visualisation – charts (column, line, pie) and conditional formatting.
Data validation – drop‑down lists, error alerts.
9.4 Presentation Software
Slide design – templates, consistent colour scheme, readable fonts.
Multimedia – inserting images, audio, video, and animation.
Speaker notes and slide timings for rehearsals.
9.5 Website Authoring – Three‑Layer Model (Syllabus 17‑21)
Layer
Purpose
Key Technologies / Examples
Content Layer
Stores the actual information – text, images, data.
HTML elements: <h1>, <p>, <img>, <table>
Presentation Layer
Defines how content looks.
CSS – selectors, properties (font‑size, colour, layout)
Behaviour Layer
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources ,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.
e-Consult
Secure online learning platform connecting students with expert Cambridge tutors across Kenya.
© 2025 e-Consult. All rights reserved.