ICT 0417 – Communication (Cambridge IGCSE/A‑Level)
1. Overview of the Communication Unit
This unit develops the knowledge and practical skills needed to use the Internet and electronic communication safely, responsibly and effectively. It covers syllabus sections 8 – 10 and links to the Systems Life‑Cycle (Section 7) and the practical ICT components (Sections 11 – 21).
2. Syllabus Mapping – What You Need to Know
| Syllabus code | Topic (as listed in the syllabus) | Covered in these notes? | Comments / Links |
|---|
| 10.1 | Email communication – netiquette, attachments, spam, security | ✔️ | Section 3 (Email) – includes composition, protocols, CC/BCC, attachments, netiquette, phishing, password & 2FA. |
| 10.2 | Effective use of the Internet – search techniques, protocols, risks, evaluating information | ✔️ | Section 4 (Internet use) – search operators, protocol table, risks & protection; Section 7 (Evaluation) gives the full AO3 criteria. |
| 8.2 & 8.3 | e‑Safety & Data security – personal data, threats, protection measures | ✔️ | Section 5 – personal‑data advice, GDPR/Data Protection Act, threat table, counter‑measures. |
| 9 | Audience analysis & Copyright – identifying audience, basic copyright principles | ✔️ | Section 5 – audience checklist with examples; copyright basics and Creative‑Commons licensing. |
| 7 | Systems life‑cycle – analysis, design, testing, implementation, documentation, evaluation | ✔️ | Section 6 – concise description of each stage and how communication activities fit. |
| 11 – 21 | Practical ICT skills – file management, graphics, layout, spreadsheets, databases, presentations, website authoring | ✔️ | Section 9 – links each practical skill to communication (e.g., embedding hyperlinks, using styles for audience). |
3. Email Communication (10.1)
3.1 Composing a Professional Email
- Subject line – concise, reflects the main purpose.
- Salutation & sign‑off – appropriate for the relationship (e.g., “Dear Mr Smith”, “Kind regards”).
- Structure – short introductory paragraph, bullet points for key items, clear closing sentence.
- Proofreading – check spelling, grammar and tone before sending.
3.2 CC, BCC and When to Use Them
- CC (Carbon Copy) – recipients who need to see the message but are not expected to act.
- BCC (Blind Carbon Copy) – hides addresses; useful for newsletters or when privacy is required.
3.3 Attachments
- Check file‑size limits (commonly ≤ 10 MB). Compress or use cloud links for larger files.
- Prefer widely‑supported formats: PDF (documents), DOCX (editable text), JPG/PNG (images).
- Scan every attachment with antivirus software before sending.
3.4 Netiquette
- Use a polite, professional tone; avoid ALL CAPS (interpreted as shouting).
- Reply within 24 hours for most school or workplace contexts.
- Keep emails brief – aim for 150‑200 words unless a detailed report is required.
3.5 Spam & Phishing
- Never click unknown links or open unexpected attachments.
- Check the sender’s address – look for miss‑spelled domains (e.g.,
g00gle.com). - Report suspicious mail to your teacher, IT administrator or the service provider.
3.6 Security for Email Accounts
- Strong password: at least 12 characters, mix of upper‑/lower‑case letters, numbers and symbols.
- Enable two‑factor authentication (2FA) wherever possible.
- Log out of webmail on shared or public computers.
3.7 Email Protocols (Technical Background)
| Protocol | Purpose | Typical Port | Security Note |
|---|
| SMTP | Sending mail from client to server | 25 (plain) / 465 (SMTPS) | Use TLS/SSL (SMTPS) to encrypt credentials. |
| POP3 | Downloading mail to a single device | 110 (plain) / 995 (POP3S) | Encrypted version POP3S is preferred. |
| IMAP | Synchronising mail across multiple devices | 143 (plain) / 993 (IMAPS) | IMAPS encrypts the session; keeps mail on the server. |
4. Effective Use of the Internet (10.2)
4.1 Search Techniques
- Basic Boolean operators –
AND, OR, NOT. - Exact phrase – enclose in quotation marks:
"renewable energy policy". - Site‑specific search –
site:.gov or site:.edu to limit results to government or educational domains. - File‑type search –
filetype:pdf for PDFs, filetype:ppt for presentations. - Date filter – use the “Tools → Any time” menu to restrict results to the past year, month, etc.
- Language & region – helpful when researching local policies.
4.2 Internet Protocols – The “Plumbing” (Brief Recap)
| Protocol | Purpose | Port | Security Note |
|---|
| HTTP | Unencrypted web pages | 80 | Do not submit personal data over HTTP. |
| HTTPS | Encrypted web pages (TLS/SSL) | 443 | Look for the padlock icon; always use HTTPS for banking, school portals, etc. |
| FTP / SFTP | File transfer | 21 (FTP) / 22 (SFTP) | SFTP encrypts data; avoid plain FTP for sensitive files. |
4.3 Internet Risks & Protection Measures
- Phishing – deceptive messages that steal credentials.
- Malware & Ransomware – software that damages or locks data.
- Inappropriate content – use safe‑search settings and parental‑control tools.
- Data‑mining & tracking – cookies and third‑party analytics.
Protection checklist
- Keep operating system, browsers and plugins up to date.
- Install reputable antivirus/anti‑malware and keep it refreshed.
- Use a firewall (built‑in or hardware).
- Back up important files regularly – cloud services or external drives.
- Enable “Do Not Track” where possible and clear cookies regularly.
5. e‑Safety, Data Security, Copyright & Audience (8.2, 8.3, 9)
5.1 Personal Data & Legal Framework
- Never share passwords, home address, phone number or school ID publicly.
- Use a unique password for each service; store them in a trusted password manager.
- Enable two‑factor authentication wherever offered.
- GDPR (EU) / Data Protection Act (UK) – gives individuals the right to:
- Know what personal data is held about them.
- Request correction or deletion of inaccurate data.
- Be informed when data is shared with third parties.
5.2 Common Threats & Counter‑measures
| Threat | How it works | Prevention |
|---|
| Phishing | Fake emails/websites request login details. | Verify sender address, hover over links, check for HTTPS and padlock. |
| Malware | Software installed without consent, often via infected downloads. | Download only from reputable sites, keep AV updated, avoid pirated software. |
| Social engineering | Manipulating people to reveal confidential information. | Question unsolicited requests, follow verification procedures, never share passwords. |
| Data‑mining / Tracking | Websites collect browsing habits via cookies. | Use private/incognito mode, clear cookies, enable “Do Not Track”. |
5.3 Copyright Basics
- Copyright protects original literary, artistic, musical and software works automatically.
- Allowed uses without permission:
- Short quotations for criticism or review (fair dealing).
- Materials in the public domain (author dead > 70 years).
- When you need permission:
- Explicit written consent from the rights holder, or
- A Creative Commons licence that matches your intended use (e.g., CC‑BY, CC‑BY‑NC).
- Always give a full citation: author, title, source, licence and date accessed.
5.4 Audience Analysis – Why It Matters
Understanding the audience shapes the language, tone, media and layout of any ICT product.
| Audience type | Key considerations | Example of ICT choice |
|---|
| Primary school pupils (age 5‑11) | Simple language, lots of visuals, short sentences. | Use bright colours, large icons, and a slide‑show presentation (PowerPoint) rather than dense text. |
| University students (age 18‑22) | More technical vocabulary, expectation of references. | Provide a downloadable PDF with hyperlinks to scholarly articles. |
| Business executives | Concise, data‑driven, formal tone. | Use a spreadsheet dashboard and a one‑page executive summary. |
6. Systems Life‑Cycle (7)
The life‑cycle provides a framework for planning, creating and evaluating ICT solutions, including communication tools.
- Analysis – Identify the problem, target audience and required functionality (e.g., “students need a way to submit assignments securely”).
- Design – Sketch layouts, decide on file formats, choose protocols (HTTPS for security) and plan data‑validation rules.
- Development / Implementation – Build the solution using appropriate software (e.g., website authoring, database creation, email templates).
- Testing – Check that links work, forms validate, and security settings (passwords, 2FA) function correctly.
- Documentation – Record user instructions, data‑protection measures and maintenance procedures.
- Evaluation – Apply the Five‑C model (see Section 7) to judge whether the solution meets the original objectives.
7. Evaluating Internet Information (AO3)
7.1 The Five‑C Model
| Criterion (C) | What to Look For | Key Questions |
|---|
| Currency | Publication date, last‑updated date, timeliness of data. | When was it published? Is a newer version available? |
| Credibility (Reliability) | Author qualifications, institutional affiliation, domain type (.gov, .edu, .org), peer‑review, citations. | Who created the content? Are they an expert? Is the site reputable? |
| Content (Validity) | Evidence supporting claims, logical consistency, factual accuracy, relevance to the question. | Are statements backed by data or references? Does the argument make sense? |
| Context (Purpose & Audience) | Intended purpose (inform, persuade, sell), target audience, sponsorship, underlying agenda. | Why was this created? Who is it aimed at? Is there a commercial or political motive? |
| Contribution (Relevance) | How well the source answers the specific research question or task. | Does this source add useful information to my work? |
7.2 Step‑by‑Step Evaluation Process
- Identify the source – Record URL, author, organisation and domain.
- Check the date – Look for a publication or “last updated” stamp.
- Assess authority – Research the author’s credentials and the institution’s reputation.
- Determine purpose & audience – Ask whether the content is meant to inform, persuade, or sell, and who the intended readers are.
- Examine bias – Spot loaded language, selective evidence, or sponsorship that may colour the message.
- Validate the content – Cross‑check claims with at least two other reliable sources; review references and data quality.
- Consider relevance – Decide if the information directly helps answer your question.
- Make a judgment – Write a concise evaluation (e.g., “Highly reliable, current and directly relevant; suitable for citation”).
7.3 Practical Tips for Students
- Use advanced search operators (see Section 4.1) to limit results to authoritative domains.
- Open the site’s “About Us” page to verify mission, funding and possible conflicts of interest.
- If no date is provided, treat the source with caution and look for an alternative.
- Read beyond the headline – sensational titles often omit nuance.
- Record full citation details (author, title, URL, date accessed) as you evaluate.
- Consider browser extensions such as “NewsGuard” or “WOT” that flag low‑credibility sites.
7.4 Common Pitfalls to Avoid
- Assuming a professional layout guarantees reliability.
- Accepting the first Google result without further verification.
- Overlooking hidden sponsorship, affiliate links or paid‑for content.
- Falling into confirmation bias – only selecting sources that agree with your pre‑conceptions.
- Using information whose purpose (e.g., advertising) does not match the academic task.
7.5 Evaluation Checklist (Student Handout)
| Check | Yes / No | Notes / Evidence |
|---|
| Is the source recent enough for the topic? | | |
| Is the author or organisation reputable and qualified? | | |
| Does the content provide verifiable evidence or citations? | | |
| Is the language neutral and free from strong bias? | | |
| Is the purpose appropriate for my task (inform, persuade, sell)? | | |
| Do other reliable sources confirm the information? | | |
| Is the information directly relevant to my research question? | | |
8. Suggested Diagram – Evaluation Flowchart
Teachers can reproduce the following flowchart on a whiteboard or provide a printable version for students:
- Source identified →
- Check date (Currency) →
- Assess author & institution (Credibility) →
- Determine purpose & audience (Context) →
- Look for bias →
- Verify evidence (Content) →
- Judge relevance (Contribution) →
- Final judgment & citation.
9. Links to Practical ICT Skills (11 – 21)
The communication concepts above underpin many hands‑on tasks in the ICT syllabus. Below is a quick guide to how each practical area connects to communication.
- File Management (11) – Naming conventions that reflect audience (e.g.,
ReportYear10Students.pdf). - Graphics & Layout (12‑13) – Use colour, fonts and spacing appropriate to the identified audience.
- Spreadsheets (14‑15) – Embed hyperlinks, protect cells with passwords, and format data for clear communication of trends.
- Databases (16‑17) – Design tables that store personal data securely; apply access rights according to e‑safety guidelines.
- Presentations (18‑19) – Choose slide layouts, animation and language that suit the audience; embed videos from trusted sources.
- Website Authoring (20‑21) – Use HTTPS, provide clear navigation, include an “About Us” page for credibility, and embed a privacy policy to meet data‑protection requirements.
By linking communication theory with these practical skills, students can produce ICT solutions that are not only functional but also safe, ethical and audience‑appropriate.