CAIE IGCSE ICT Summary Notes
Computer Systems
- Hardware: Physical components comprising a computer system.
- Internal Devices: CPU, motherboard, RAM, ROM, graphics & sound cards, internal storage (HDD, SSD), NIC.
- External Devices: Monitor, keyboard, mouse, printer, external storage.
- Software: Instructions and programs controlling the operation of hardware.
- Application Software: Specific tasks (e.g., spreadsheets).
- System Software: Platform for applications (e.g., OS, device drivers).
Types of Data
- Analogue vs. Digital Data: Analogue is continuous; digital is binary (0,1).
- ADC/DAC: Hardware converts analogue to digital (ADC) and back (DAC).
CPU and Memory
- CPU: Executes operations; consists of CU, ALU, and registers.
- Memory:
- RAM: Volatile, temporary storage; data lost on power off.
- ROM: Non-volatile; stores configuration data (e.g., BIOS).
- Input Devices: Allow data entry (e.g., keyboard, mouse).
- Output Devices: Display processed results (e.g., monitor, printer).
Operating Systems
- Manage all operations, software and hardware, user input, and device communication.
- Examples: Windows, macOS, Linux.
Types of Computers
- Desktop Computers: General-purpose, stationary, upgradeable.
- Laptops: Portable, all-in-one design; battery-operated, less upgradeable.
- Smartphones: Compact, multifunctional; access to apps and internet.
- Tablets: Larger than smartphones, touch interface, portable.
- Phablets: Hybrid between tablets and smartphones.
Emerging Technologies
- AI: Machines performing tasks requiring human-like intelligence.
- Extended Reality: Combines real and virtual environments (AR & VR).
Networking
- Routers, Hubs, Switches: Devices connecting networks, managing data traffic.
- LAN/WAN: Local Area Networks (within buildings) vs Wide Area Networks (geographically dispersed).
- Wi-Fi/Bluetooth: Wireless communication technologies for local area connections.
Cloud Computing
- Types: Public, Private, Hybrid cloud solutions for data storage and management.
- Benefits: Scalability, remote access, cost-effective.
Data Protection & Security
- Data Protection Act: Regulations governing the collection and storage of personal data.
- E-safety Measures: Awareness of online risks, protecting personal information.
- Security Measures: Firewalls, encryption, and authentication methods like biometric scans.
Health Issues
- Prolonged IT Usage: Risks include RSI, back strain, eye strain.
- Preventative Measures: Ergonomic equipment, regular breaks, proper lighting.
Effective Communication
- Using Email: Guidelines like netiquette, use of CC/BCC, and handling spam.
- Internet Use: Advantages and disadvantages, including access to vast information vs misinformation.
Copyright and Intellectual Property
- Necessary to protect creators' rights and prevent software piracy.
- Importance: Encourages innovation, protects users from fraud.