Know and understand evaluating the information found on the internet including how up to date, reliable, biased and valid this information is

ICT 0417 – Communication (Cambridge IGCSE/A‑Level)

1. Overview of the Communication Unit

This unit develops the knowledge and practical skills needed to use the Internet and electronic communication safely, responsibly and effectively. It covers syllabus sections 8 – 10 and links to the Systems Life‑Cycle (Section 7) and the practical ICT components (Sections 11 – 21).

2. Syllabus Mapping – What You Need to Know

Syllabus codeTopic (as listed in the syllabus)Covered in these notes?Comments / Links
10.1Email communication – netiquette, attachments, spam, security✔️Section 3 (Email) – includes composition, protocols, CC/BCC, attachments, netiquette, phishing, password & 2FA.
10.2Effective use of the Internet – search techniques, protocols, risks, evaluating information✔️Section 4 (Internet use) – search operators, protocol table, risks & protection; Section 7 (Evaluation) gives the full AO3 criteria.
8.2 & 8.3e‑Safety & Data security – personal data, threats, protection measures✔️Section 5 – personal‑data advice, GDPR/Data Protection Act, threat table, counter‑measures.
9Audience analysis & Copyright – identifying audience, basic copyright principles✔️Section 5 – audience checklist with examples; copyright basics and Creative‑Commons licensing.
7Systems life‑cycle – analysis, design, testing, implementation, documentation, evaluation✔️Section 6 – concise description of each stage and how communication activities fit.
11 – 21Practical ICT skills – file management, graphics, layout, spreadsheets, databases, presentations, website authoring✔️Section 9 – links each practical skill to communication (e.g., embedding hyperlinks, using styles for audience).

3. Email Communication (10.1)

3.1 Composing a Professional Email

  • Subject line – concise, reflects the main purpose.
  • Salutation & sign‑off – appropriate for the relationship (e.g., “Dear Mr Smith”, “Kind regards”).
  • Structure – short introductory paragraph, bullet points for key items, clear closing sentence.
  • Proofreading – check spelling, grammar and tone before sending.

3.2 CC, BCC and When to Use Them

  • CC (Carbon Copy) – recipients who need to see the message but are not expected to act.
  • BCC (Blind Carbon Copy) – hides addresses; useful for newsletters or when privacy is required.

3.3 Attachments

  • Check file‑size limits (commonly ≤ 10 MB). Compress or use cloud links for larger files.
  • Prefer widely‑supported formats: PDF (documents), DOCX (editable text), JPG/PNG (images).
  • Scan every attachment with antivirus software before sending.

3.4 Netiquette

  • Use a polite, professional tone; avoid ALL CAPS (interpreted as shouting).
  • Reply within 24 hours for most school or workplace contexts.
  • Keep emails brief – aim for 150‑200 words unless a detailed report is required.

3.5 Spam & Phishing

  • Never click unknown links or open unexpected attachments.
  • Check the sender’s address – look for miss‑spelled domains (e.g., g00gle.com).
  • Report suspicious mail to your teacher, IT administrator or the service provider.

3.6 Security for Email Accounts

  • Strong password: at least 12 characters, mix of upper‑/lower‑case letters, numbers and symbols.
  • Enable two‑factor authentication (2FA) wherever possible.
  • Log out of webmail on shared or public computers.

3.7 Email Protocols (Technical Background)

ProtocolPurposeTypical PortSecurity Note
SMTPSending mail from client to server25 (plain) / 465 (SMTPS)Use TLS/SSL (SMTPS) to encrypt credentials.
POP3Downloading mail to a single device110 (plain) / 995 (POP3S)Encrypted version POP3S is preferred.
IMAPSynchronising mail across multiple devices143 (plain) / 993 (IMAPS)IMAPS encrypts the session; keeps mail on the server.

4. Effective Use of the Internet (10.2)

4.1 Search Techniques

  • Basic Boolean operatorsAND, OR, NOT.
  • Exact phrase – enclose in quotation marks: "renewable energy policy".
  • Site‑specific searchsite:.gov or site:.edu to limit results to government or educational domains.
  • File‑type searchfiletype:pdf for PDFs, filetype:ppt for presentations.
  • Date filter – use the “Tools → Any time” menu to restrict results to the past year, month, etc.
  • Language & region – helpful when researching local policies.

4.2 Internet Protocols – The “Plumbing” (Brief Recap)

ProtocolPurposePortSecurity Note
HTTPUnencrypted web pages80Do not submit personal data over HTTP.
HTTPSEncrypted web pages (TLS/SSL)443Look for the padlock icon; always use HTTPS for banking, school portals, etc.
FTP / SFTPFile transfer21 (FTP) / 22 (SFTP)SFTP encrypts data; avoid plain FTP for sensitive files.

4.3 Internet Risks & Protection Measures

  • Phishing – deceptive messages that steal credentials.
  • Malware & Ransomware – software that damages or locks data.
  • Inappropriate content – use safe‑search settings and parental‑control tools.
  • Data‑mining & tracking – cookies and third‑party analytics.

Protection checklist

  • Keep operating system, browsers and plugins up to date.
  • Install reputable antivirus/anti‑malware and keep it refreshed.
  • Use a firewall (built‑in or hardware).
  • Back up important files regularly – cloud services or external drives.
  • Enable “Do Not Track” where possible and clear cookies regularly.

5. e‑Safety, Data Security, Copyright & Audience (8.2, 8.3, 9)

5.1 Personal Data & Legal Framework

  • Never share passwords, home address, phone number or school ID publicly.
  • Use a unique password for each service; store them in a trusted password manager.
  • Enable two‑factor authentication wherever offered.
  • GDPR (EU) / Data Protection Act (UK) – gives individuals the right to:

    • Know what personal data is held about them.
    • Request correction or deletion of inaccurate data.
    • Be informed when data is shared with third parties.

5.2 Common Threats & Counter‑measures

ThreatHow it worksPrevention
PhishingFake emails/websites request login details.Verify sender address, hover over links, check for HTTPS and padlock.
MalwareSoftware installed without consent, often via infected downloads.Download only from reputable sites, keep AV updated, avoid pirated software.
Social engineeringManipulating people to reveal confidential information.Question unsolicited requests, follow verification procedures, never share passwords.
Data‑mining / TrackingWebsites collect browsing habits via cookies.Use private/incognito mode, clear cookies, enable “Do Not Track”.

5.3 Copyright Basics

  • Copyright protects original literary, artistic, musical and software works automatically.
  • Allowed uses without permission:

    • Short quotations for criticism or review (fair dealing).
    • Materials in the public domain (author dead > 70 years).

  • When you need permission:

    • Explicit written consent from the rights holder, or
    • A Creative Commons licence that matches your intended use (e.g., CC‑BY, CC‑BY‑NC).

  • Always give a full citation: author, title, source, licence and date accessed.

5.4 Audience Analysis – Why It Matters

Understanding the audience shapes the language, tone, media and layout of any ICT product.

Audience typeKey considerationsExample of ICT choice
Primary school pupils (age 5‑11)Simple language, lots of visuals, short sentences.Use bright colours, large icons, and a slide‑show presentation (PowerPoint) rather than dense text.
University students (age 18‑22)More technical vocabulary, expectation of references.Provide a downloadable PDF with hyperlinks to scholarly articles.
Business executivesConcise, data‑driven, formal tone.Use a spreadsheet dashboard and a one‑page executive summary.

6. Systems Life‑Cycle (7)

The life‑cycle provides a framework for planning, creating and evaluating ICT solutions, including communication tools.

  1. Analysis – Identify the problem, target audience and required functionality (e.g., “students need a way to submit assignments securely”).
  2. Design – Sketch layouts, decide on file formats, choose protocols (HTTPS for security) and plan data‑validation rules.
  3. Development / Implementation – Build the solution using appropriate software (e.g., website authoring, database creation, email templates).
  4. Testing – Check that links work, forms validate, and security settings (passwords, 2FA) function correctly.
  5. Documentation – Record user instructions, data‑protection measures and maintenance procedures.
  6. Evaluation – Apply the Five‑C model (see Section 7) to judge whether the solution meets the original objectives.

7. Evaluating Internet Information (AO3)

7.1 The Five‑C Model

Criterion (C)What to Look ForKey Questions
CurrencyPublication date, last‑updated date, timeliness of data.When was it published? Is a newer version available?
Credibility (Reliability)Author qualifications, institutional affiliation, domain type (.gov, .edu, .org), peer‑review, citations.Who created the content? Are they an expert? Is the site reputable?
Content (Validity)Evidence supporting claims, logical consistency, factual accuracy, relevance to the question.Are statements backed by data or references? Does the argument make sense?
Context (Purpose & Audience)Intended purpose (inform, persuade, sell), target audience, sponsorship, underlying agenda.Why was this created? Who is it aimed at? Is there a commercial or political motive?
Contribution (Relevance)How well the source answers the specific research question or task.Does this source add useful information to my work?

7.2 Step‑by‑Step Evaluation Process

  1. Identify the source – Record URL, author, organisation and domain.
  2. Check the date – Look for a publication or “last updated” stamp.
  3. Assess authority – Research the author’s credentials and the institution’s reputation.
  4. Determine purpose & audience – Ask whether the content is meant to inform, persuade, or sell, and who the intended readers are.
  5. Examine bias – Spot loaded language, selective evidence, or sponsorship that may colour the message.
  6. Validate the content – Cross‑check claims with at least two other reliable sources; review references and data quality.
  7. Consider relevance – Decide if the information directly helps answer your question.
  8. Make a judgment – Write a concise evaluation (e.g., “Highly reliable, current and directly relevant; suitable for citation”).

7.3 Practical Tips for Students

  • Use advanced search operators (see Section 4.1) to limit results to authoritative domains.
  • Open the site’s “About Us” page to verify mission, funding and possible conflicts of interest.
  • If no date is provided, treat the source with caution and look for an alternative.
  • Read beyond the headline – sensational titles often omit nuance.
  • Record full citation details (author, title, URL, date accessed) as you evaluate.
  • Consider browser extensions such as “NewsGuard” or “WOT” that flag low‑credibility sites.

7.4 Common Pitfalls to Avoid

  • Assuming a professional layout guarantees reliability.
  • Accepting the first Google result without further verification.
  • Overlooking hidden sponsorship, affiliate links or paid‑for content.
  • Falling into confirmation bias – only selecting sources that agree with your pre‑conceptions.
  • Using information whose purpose (e.g., advertising) does not match the academic task.

7.5 Evaluation Checklist (Student Handout)

CheckYes / NoNotes / Evidence
Is the source recent enough for the topic?
Is the author or organisation reputable and qualified?
Does the content provide verifiable evidence or citations?
Is the language neutral and free from strong bias?
Is the purpose appropriate for my task (inform, persuade, sell)?
Do other reliable sources confirm the information?
Is the information directly relevant to my research question?

8. Suggested Diagram – Evaluation Flowchart

Teachers can reproduce the following flowchart on a whiteboard or provide a printable version for students:

  1. Source identified →
  2. Check date (Currency) →
  3. Assess author & institution (Credibility) →
  4. Determine purpose & audience (Context) →
  5. Look for bias →
  6. Verify evidence (Content) →
  7. Judge relevance (Contribution) →
  8. Final judgment & citation.

The communication concepts above underpin many hands‑on tasks in the ICT syllabus. Below is a quick guide to how each practical area connects to communication.

  • File Management (11) – Naming conventions that reflect audience (e.g., ReportYear10Students.pdf).
  • Graphics & Layout (12‑13) – Use colour, fonts and spacing appropriate to the identified audience.
  • Spreadsheets (14‑15) – Embed hyperlinks, protect cells with passwords, and format data for clear communication of trends.
  • Databases (16‑17) – Design tables that store personal data securely; apply access rights according to e‑safety guidelines.
  • Presentations (18‑19) – Choose slide layouts, animation and language that suit the audience; embed videos from trusted sources.
  • Website Authoring (20‑21) – Use HTTPS, provide clear navigation, include an “About Us” page for credibility, and embed a privacy policy to meet data‑protection requirements.

By linking communication theory with these practical skills, students can produce ICT solutions that are not only functional but also safe, ethical and audience‑appropriate.