| Section | Key Content | Coverage in These Notes | Assessment Objectives (AO) |
|---|---|---|---|
| 1‑5 – Computer systems, I/O, storage, networks, effects of IT | Hardware, analogue vs digital data, CPU, RAM vs ROM, primary & secondary storage, backup, cloud‑computing, network topologies, devices (router, NIC, hub, switch, bridge), Wi‑Fi & Bluetooth, positive/negative impacts of ICT | Expanded overview with definitions, key characteristics and concrete examples | AO1, AO3 |
| 6 – ICT applications (communication, modelling, control, etc.) | e‑mail, instant messaging, video‑conferencing, mobile communication (SMS, VoIP), social‑media etiquette, modelling & simulation, smart‑home control, school‑management, banking, expert systems, retail, pattern‑recognition, satellite navigation | Application families, real‑world vignettes, e‑safety links | AO1, AO3 |
| 7 – Systems life‑cycle | Analysis → Design → Development/Testing → Implementation → Documentation → Evaluation (including inputs/outputs, questionnaires, data structures, test data types, implementation methods) | Flow‑chart + detailed checklist for each phase | AO1, AO2, AO3 |
| 8 – Safety & security | Physical safety (electrocution, overloaded sockets, tripping hazards), e‑safety, data‑protection legislation, backup strategies, virus protection, phishing, pharming, smishing, vishing, malware, card fraud, threat‑matrix | Expanded checklist, legal principle, threat‑matrix table, case study | AO1, AO3 |
| 9‑10 – Audience, copyright, communication | Audience analysis, copyright law (software, fair‑use, Creative Commons), licensing, email & internet etiquette, social‑media etiquette | Key points, examples, extended copyright coverage | AO1, AO3 |
| 11‑16 – File management, images, layout, styles, proofing, graphs/charts | File‑naming conventions, image formats & editing, page layout, style sheets, spell‑check, creating charts | Practical tips, mini‑tasks, style‑sheet examples | AO1, AO2, AO3 |
| 17‑19 – Document production, databases, presentations | Word‑processing workflow, database design, query & report generation, presentation design principles, aligning data & labels | Full coverage; emphasis on aligning data and labels (see Section 19.1) | AO1, AO2, AO3 |
| 20‑21 – Spreadsheets, website authoring | Formulas, functions, sorting, formatting, HTML/CSS basics, page structure, accessibility | Core concepts & example tasks | AO1, AO2, AO3 |
| Application | Typical Use (Business/Education) | e‑Safety / Social‑Media Note |
|---|---|---|
| e‑mail, IM, video‑conferencing | Client contact, remote lessons, staff meetings | Use strong passwords; avoid opening unexpected attachments |
| Mobile communication (SMS, VoIP, video calls) | Quick updates, international calls, virtual classrooms | Beware of phishing via text (smishing); verify caller ID |
| Social‑media (Twitter, Instagram, TikTok) | Brand promotion, student projects, public awareness | Maintain professional tone; respect privacy settings |
| Modelling & Simulation | Design prototypes, scientific experiments, financial forecasts | Data used in models must be stored securely |
| Smart‑home / Control Systems | Thermostat regulation, lighting automation, industrial PLCs | Change default passwords; keep firmware updated |
| School‑Management Systems | Timetabling, attendance, grading, parent portals | Student data protected under Data‑Protection Act |
| Banking & Financial Systems | Online banking, payroll, invoicing | Use two‑factor authentication; monitor for fraud |
| Expert Systems | Diagnostic tools, decision‑support, troubleshooting | Knowledge base must be kept accurate and secure |
| Retail & Point‑of‑Sale | Inventory control, sales reporting, customer loyalty | Secure card‑payment data (PCI DSS compliance) |
| Pattern‑Recognition & Satellite Navigation | Facial ID, GPS routing, GIS mapping | Location data must respect privacy regulations |
Real‑World Vignette – School‑Management System
Scenario: A secondary school adopts “EduTrack”. Teachers enter attendance daily, parents view reports via a secure portal, and the finance department generates payroll automatically.
e‑Safety Highlight: All personal data are encrypted; access requires unique IDs and two‑factor authentication. Regular backups to an off‑site cloud ensure data recovery after a hardware failure.
Real‑World Vignette – Expert System for Medical Diagnosis
Scenario: “MediAssist” uses a rule‑based engine to suggest possible diagnoses based on patient symptoms entered by clinicians.
e‑Safety Highlight: Patient records are stored on a HIPAA‑compliant server; audit logs record every access.
| Threat | Typical Symptom | Preventive Action |
|---|---|---|
| Phishing (email) | Unexpected link or attachment asking for credentials | Verify sender, hover over links, use anti‑phishing filters |
| Pharming (website) | Correct URL redirects to a fake site | Check SSL certificate, use DNS security |
| Smishing (SMS) | Text message with urgent request for personal info | Do not reply; contact organisation via known channel |
| Vishing (voice) | Phone call claiming to be from bank, asking for PIN | Hang up and call back using official number |
| Malware (ransomware, spyware) | Slow computer, unknown files, ransom note | Keep software updated, run regular scans, avoid dubious downloads |
| Card fraud | Unauthorised transactions on card statement | Use chip‑and‑PIN, monitor statements, enable transaction alerts |
A boutique shop stored customer emails in an unencrypted Excel file on a shared network drive. Hackers accessed the drive via a weak Wi‑Fi password, harvested the data, and used it for spam campaigns. Lesson: Encrypt sensitive data, enforce strong Wi‑Fi security, and limit access permissions.
Reportv032024-09-12.docx).These three areas are inter‑linked: a database supplies data for reports and presentations, while a word‑processor formats the final document.
See detailed section 19.1 Aligning Data and Labels below.
SUM, AVERAGE, IF, VLOOKUP, COUNTIF, ROUND, DATE.<!DOCTYPE html>, <html>, <head>, <body>.<h1>–<h6>), paragraphs (<p>), lists (<ul>, <ol>), tables, images (<img> with alt), links (<a>).<link rel="stylesheet" href="style.css">).alt text, use semantic markup, ensure colour contrast meets WCAG AA.Use the style="text-align: …" attribute (the older align attribute is deprecated).
| Item | Quantity | Price (£) |
|---|---|---|
| Notebook | 12 | 1.50 |
| Pen | 30 | 0.45 |
| Calculator | 5 | 12.99 |
#,##0.00 and set column alignment to right. Most spreadsheet programs automatically line up the decimal points.Example – Split‑cell HTML table
| Product | Units | Unit Price (£) | |
|---|---|---|---|
| Whole | .Fraction | ||
| Desk | 3 | 85 | .00 |
| Chair | 12 | 45 | .50 |
| Lamp | 7 | 22 | .75 |
.csv): comma‑separated values; keep numeric columns unquoted; open in spreadsheet to retain right alignment..txt): use tabs to separate columns; ideal for importing into word processors or database tools.When you need to show formulas or totals, embed LaTeX expressions:
Inline example: \$ \text{Total} = \sum{i=1}^{n} (\text{Qty}i \times \text{Price}_i) \$
Displayed example:
\$\$
\text{Total}_{\text{Desk}} = 3 \times 85.00 = 255.00
\$\$
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.